VTU Computer Science (Semester 6)
Computer Networks 2
June 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Differentiate between connection oriented and connectionless services.
5 M
1 (b) Compare the datagram packet switching and virtual packet switching.
6 M
1 (c) Explain the Dijkstra's routing algorithm, with an example.
9 M

2 (a) Explain the FIFO and priority queue scheduling for managing traffic at packet level.
8 M
2 (b) Define congestion control with graph. Explain the leaky bucket algorithm for policing the traffic at flow level.
12 M

3 (a) Explain:
i) IP address classification
ii) Subnet addressing.
10 M
3 (b) Give the format of IPV6 basic header. Compare IPV6 with IPV4.
10 M

4 (a) Explain OSPF protocol and its operation.
10 M
4 (b) Write a note on:
i) IGMP protocol
ii) Mobile IP.
10 M

5 (a) Write a note on only Two:
i) Remote login protocols
ii) File transfer and FTP
iii) World wide web and HTTP.
8 M
5 (b) Define network management and explain SNMP and SNMP messages.
6 M
5 (c) Compare secret key and public key cryptography systems.
6 M

6 (a) Explain the differentiated services QoS with a neat diagram.
8 M
6 (b) Explain VPN and its types based on tunnelling.
8 M
6 (c) Explain the need for overlay networks.
4 M

7 (a) Briefly explain the MPEG standards and frame types of compression.
6 M
7 (b) Explain the Huffman encoding, with an example.
6 M
7 (c) With a neat diagram, explain the H.23 components and list the steps in signaling.
8 M

8 (a) Explain the wireless routing protocol for AD-HoC networks.
5 M
8 (b) Briefly explain the direct and multi-hop routing of intra-cluster routing protocol, with the help or relevant diagrams.
6 M
8 (c) Write short notes on:
i) Clustering in sensor networks
ii) Security vulnerabilities of AD-HoC networks.
9 M



More question papers from Computer Networks 2
SPONSORED ADVERTISEMENTS