1 (a)
Differentiate between connection oriented and connectionless services.
5 M
1 (b)
Compare the datagram packet switching and virtual packet switching.
6 M
1 (c)
Explain the Dijkstra's routing algorithm, with an example.
9 M
2 (a)
Explain the FIFO and priority queue scheduling for managing traffic at packet level.
8 M
2 (b)
Define congestion control with graph. Explain the leaky bucket algorithm for policing the traffic at flow level.
12 M
3 (a)
Explain:
i) IP address classification
ii) Subnet addressing.
i) IP address classification
ii) Subnet addressing.
10 M
3 (b)
Give the format of IPV6 basic header. Compare IPV6 with IPV4.
10 M
4 (a)
Explain OSPF protocol and its operation.
10 M
4 (b)
Write a note on:
i) IGMP protocol
ii) Mobile IP.
i) IGMP protocol
ii) Mobile IP.
10 M
5 (a)
Write a note on only Two:
i) Remote login protocols
ii) File transfer and FTP
iii) World wide web and HTTP.
i) Remote login protocols
ii) File transfer and FTP
iii) World wide web and HTTP.
8 M
5 (b)
Define network management and explain SNMP and SNMP messages.
6 M
5 (c)
Compare secret key and public key cryptography systems.
6 M
6 (a)
Explain the differentiated services QoS with a neat diagram.
8 M
6 (b)
Explain VPN and its types based on tunnelling.
8 M
6 (c)
Explain the need for overlay networks.
4 M
7 (a)
Briefly explain the MPEG standards and frame types of compression.
6 M
7 (b)
Explain the Huffman encoding, with an example.
6 M
7 (c)
With a neat diagram, explain the H.23 components and list the steps in signaling.
8 M
8 (a)
Explain the wireless routing protocol for AD-HoC networks.
5 M
8 (b)
Briefly explain the direct and multi-hop routing of intra-cluster routing protocol, with the help or relevant diagrams.
6 M
8 (c)
Write short notes on:
i) Clustering in sensor networks
ii) Security vulnerabilities of AD-HoC networks.
i) Clustering in sensor networks
ii) Security vulnerabilities of AD-HoC networks.
9 M
More question papers from Computer Networks 2