0% found this document useful (0 votes)
39 views2 pages

CST303 CN Dec 2022

qs paper

Uploaded by

csemcet2125
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

CST303 CN Dec 2022

qs paper

Uploaded by

csemcet2125
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B 1100csr303122106

Reg No.:

APJ ABDUL KALAM TECHNOLOGICAL UNI


t
Fifth Semester B.Tech Degree Regular and Supplementary Examination December

Course Code: CST 303


Course Name: COMPUTER NETWORIG
Max. Marks: 100 Duration: 3 Hours
PART A
(Answer all questions; each question canies 3 marks) Marks

Illustrate layering principle with necessary diagrams. 3

What is the propagation delay if distance between two points is 12,000 km? 3

Assume propagation speed to be 2.4x108 m/s in cable.


a
J Show how the data field is managed in the Ethernet frame format. 3

4 Differentiate between bridges and switches. 3

5 Illustrate the optimality principle in routing. 3

6 Identifu two methods by which multicast routing is handled by network layer. 3

7 In IP, the checksum covers only the header and not the data. Identif, the reason 3

8
TRACE KTU
for selecting this design.
Differentiate between Open loop and Closed loop approaches for congestion 3

control. Give one example for each.


9 Why is Transport layer called true End to End layer? Why is flow control and 3

error control used in Transport layer in addition to data link layer ?

l0 Describe the ports used by the FTP with suitable diagram. 3


i "1 PART B
(Answer onefull questionfrom each module, eoch question carries 14 marks)

Module -1
11 a) Justiff why TCP/ IP reference model is called as a protocol stack model.
Describe TCP/P model with suitable diagrams.
b) Compare LAN, MAN, WAN. 6

12 a)' Compare the types of networks formed based on topology. Discuss the 8

advantages and disadvantages ofeach type.

b) Illustrate the construction of optical fiber and justifr how this reduces the
interference. Draw the structure of optical fiber.

Page 1 of 2
1100csT303122t06

Module -2
13 a) Summarize about the high-speed LANs specified in IEEE standard. 6

,. . , ,b) Compare Go back N protocol with Selective Repeat protocol using'required 8

diagrams.
14 a) Discuss about the frame formats of HDLC protocol. 8

b) Write short notes on any two carrier sense multiple access protocols used in 6

IEEE standards.
Module -3
15 a) Compare the features of link state routing with distance vector routing. 8

b) Differentiate between the implementation of datagram subnet and virtual circuit 6

subnet.

16 a) What is count to infinity problem? Describe two techniques to solve the count to 6

infinity problem in distance vector routing algorithm.


b) Identifu and describe the scheduling techniques to improve the Quality of 8

Services (QoS).

Module -4
17 a) Illustrate the sub-netting concept. A company is granted the siteaddress 8

b)
TRACE KTU
181.56.0.0 (class B). The company needs 1000 subnets. Find the number of
subnets possible and hosts which can be connected in each subnet.

Identifr the characteristics of BGP. 6

l8 a) Describe how does OSPF perform routing in larger networks? Also explain the 7

different types of OSPF messages.


b) Explain the purposes of using ARP and RARP in the network layer. Also 7

'describe tfr'e workins of each.


Module -5
19 a) Describe the TCP congestion conhol4proaches with necessary diagrams. ' 8

b) Demonstrate the UDP segment structure. 6

20 a) Summarize the architecture of electronic mail system with neat diagram. 9

b) Identift and describe the DNS attacks. 5


***

Page2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy