Code No: NR320502
NR
Set No. 2
in
III B.Tech II Semester Examinations,APRIL 2011 COMPUTER NETWORKS Common to Information Technology, Electronics And Computer Engineering, Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Differentiate between transmission path, virtual path and virtual circuit. [6]
[10]
ld .
(b) Explain link state routing with an example.
2. (a) Does the TC sublayer distinguish between different VCs at either the transmitter or receiver? [8]
or
(b) Does the TC sublayer at the transmitter fill in any of the fields in the ATM header? Which ones? [8] 3. (a) What are the principles applied to arrive at the 7 layers of the OSI
[6]
(b) What are the various issues that arise in data link layer of an OSI model and indicate the steps to correct them. [10]
uW
4. (a) Give the algorithm for CRC method of error checking.
[8]
(b) Given 1101011011 data frame and generator polynomial G(x) = x4 + x + 1. Derive the transmitted frame. [8] 5. (a) Explain the operation of Binary count down protocol.
[8]
(b) Explain the operation of limited Contention protocol.
[8]
6. (a) Suppose transmission channels become virtually error free, is the data link layer still needed? Justify your answer. [8]
nt
(b) Explain how the notation of multiplexing can be applied at the data link layer. [8]
7. (a) Explain working of digital signatures with Big Brother.
[5] [5]
(c) Write short notes on digital signatures using Message digests.
[6]
Aj
(b) Draw and explain the Digital signatures using public-key cryptography.
8. (a) Describe flow control?
[8]
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not only the packet, but also its acknowledgements, have vanished? [8] ?????
1
Code No: NR320502
NR
Set No. 4
in
III B.Tech II Semester Examinations,APRIL 2011 COMPUTER NETWORKS Common to Information Technology, Electronics And Computer Engineering, Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????
ld .
1. (a) Does the TC sublayer distinguish between different VCs at either the transmitter or receiver? [8]
(b) Does the TC sublayer at the transmitter fill in any of the fields in the ATM header? Which ones? [8] 2. (a) Differentiate between transmission path, virtual path and virtual circuit. [6]
or
(b) Explain link state routing with an example.
[10]
3. (a) Suppose transmission channels become virtually error free, is the data link layer still needed? Justify your answer. [8]
uW
(b) Explain how the notation of multiplexing can be applied at the data link layer.
4. (a) Explain working of digital signatures with Big Brother.
[8] [5]
(b) Draw and explain the Digital signatures using public-key cryptography.
[5]
(c) Write short notes on digital signatures using Message digests.
[6]
5. (a) What are the principles applied to arrive at the 7 layers of the OSI
[6]
nt
(b) What are the various issues that arise in data link layer of an OSI model and indicate the steps to correct them. [10] 6. (a) Describe flow control?
[8]
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not only the packet, but also its acknowledgements, have vanished? [8] [8]
(b) Explain the operation of limited Contention protocol.
[8]
Aj
7. (a) Explain the operation of Binary count down protocol.
8. (a) Give the algorithm for CRC method of error checking.
[8]
(b) Given 1101011011 data frame and generator polynomial G(x) = x4 + x + 1. Derive the transmitted frame. [8] ?????
2
Code No: NR320502
NR
Set No. 1
1. (a) Explain working of digital signatures with Big Brother.
in
III B.Tech II Semester Examinations,APRIL 2011 COMPUTER NETWORKS Common to Information Technology, Electronics And Computer Engineering, Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????
[5]
[5]
(c) Write short notes on digital signatures using Message digests.
[6]
ld .
(b) Draw and explain the Digital signatures using public-key cryptography.
2. (a) Describe flow control?
[8]
or
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not only the packet, but also its acknowledgements, have vanished? [8] 3. (a) Does the TC sublayer distinguish between different VCs at either the transmitter or receiver? [8]
uW
(b) Does the TC sublayer at the transmitter fill in any of the fields in the ATM header? Which ones? [8] 4. (a) Explain the operation of Binary count down protocol.
[8]
(b) Explain the operation of limited Contention protocol.
[8]
5. (a) Differentiate between transmission path, virtual path and virtual circuit. [6] (b) Explain link state routing with an example.
[10]
nt
6. (a) Suppose transmission channels become virtually error free, is the data link layer still needed? Justify your answer. [8] (b) Explain how the notation of multiplexing can be applied at the data link layer. [8]
7. (a) What are the principles applied to arrive at the 7 layers of the OSI
[6]
Aj
(b) What are the various issues that arise in data link layer of an OSI model and indicate the steps to correct them. [10]
8. (a) Give the algorithm for CRC method of error checking.
[8]
(b) Given 1101011011 data frame and generator polynomial G(x) = x4 + x + 1. Derive the transmitted frame. [8] ?????
3
Code No: NR320502
NR
Set No. 3
in
III B.Tech II Semester Examinations,APRIL 2011 COMPUTER NETWORKS Common to Information Technology, Electronics And Computer Engineering, Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) What are the principles applied to arrive at the 7 layers of the OSI
[6]
ld .
(b) What are the various issues that arise in data link layer of an OSI model and indicate the steps to correct them. [10]
2. (a) Suppose transmission channels become virtually error free, is the data link layer still needed? Justify your answer. [8]
or
(b) Explain how the notation of multiplexing can be applied at the data link layer.
3. (a) Give the algorithm for CRC method of error checking.
[8]
[8]
uW
(b) Given 1101011011 data frame and generator polynomial G(x) = x4 + x + 1. Derive the transmitted frame. [8] 4. (a) Explain the operation of Binary count down protocol.
[8]
(b) Explain the operation of limited Contention protocol.
[8]
5. (a) Describe flow control?
[8]
(b) Why does the maximum packet lifetime T, have to be large enough to ensure that not only the packet, but also its acknowledgements, have vanished? [8]
nt
6. (a) Does the TC sublayer distinguish between different VCs at either the transmitter or receiver? [8] (b) Does the TC sublayer at the transmitter fill in any of the fields in the ATM header? Which ones? [8]
Aj
7. (a) Differentiate between transmission path, virtual path and virtual circuit. [6] (b) Explain link state routing with an example.
8. (a) Explain working of digital signatures with Big Brother.
[10] [5]
(b) Draw and explain the Digital signatures using public-key cryptography.
[5]
(c) Write short notes on digital signatures using Message digests.
[6]
?????
4