1(a)
Differentiate between connection oriented and connectionless services.
4 M
1(b)
Define routing algorithm. Explain the Bellman ' Ford algorithm with an example.
10 M
1(c)
A 64 ' kilobyte message is to be transmitted over two hops in a network. The network limits packets to a maximum size of 2 kilobytes, and each packet has a 32 -byte header. The transmission lines in the network are error and have a speed of 50 Mbps. Each hop is 1000 km long. How long does it take to get the message from source to destination?
6 M
2(a)
With neat diagram explain leaky bucket algorithm used for policing.
8 M
2(b)
Explain the FIFO and priority queue scheduling for managing traffic at packet level.
8 M
2(c)
Write a note on closed loop control in packet switching network.
4 M
3(a)
Explain the format of IPV4 basic header.
8 M
3(b)
With neat diagram, explain UDP datagram.
8 M
3(c)
Write a note on address resolution protocol
4 M
4(a)
Explain the three ' way handshake for establishing a Tcp connection.
8 M
4(b)
Write a note on RIP protocol.
4 M
4(c)
Explain the border getway protocol.
8 M
5(a)
Define domain name system. Explain DNS message format.
8 M
5(b)
Explain in detail any two major categories of threats to network security.
8 M
5(c)
Write note on network management system.
4 M
6(a)
Explain the overview of differentiated services operation of QOS with neat diagram.
8 M
6(b)
Explain multiprotocol Lable switching (MPLS) and its packet format.
6 M
6(c)
Write a note on P2P connection in context with overlay networks.
6 M
7(a)
Define data compression. Explain overview of digital voice process in netoworking.
8 M
7(b)
Explain in brief SIP.
8 M
7(c)
Write a short note on H-323 protocol.
4 M
8(a)
Explain types of attack in Ad-hoc networks.
6 M
8(b)
Explain LEACH clustering protocol in wireless sensor network.
8 M
8(c)
Write a note on Zig-Bee technology.
6 M
More question papers from Computer Networks 2