# VTU Previous year question paper-BE-Sixth Semester-Computer network-1-December 2010

VTU CSE 6th Semester Computer Networks -1 Question Paper December 2010: To secure better marks in the exam, you should practice as many question papers as possible. It will give you information about the important chapters and concepts to be covered in all chapters.

Here we are providing you the complete guide on VTU CSE 6th Semester Computer Networks -1 Question Paper December 2010.

## VTU CSE 6th Semester Computer Networks -1 Question Paper December 2010

You must have Computer Networks -1 Question Paper along with the latest Computer Science 6th sem Syllabus to enhance your semester exam preparation.

Here you can check the Question Paper December 2010

VTU Sixth Semester B.E. Degree Examination, December 2010

Computer Networks – 1

1. a. An alternative to LAN is simply a big time sharing system with terminals for all users. Give two advantages of a client server system using LAN. Draw a block diagram of client – server model.

b. Imagine that you have trained a dog to carry a box of three 8 mm tapes, each containing 7 gigabytes. The dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does the dog has a higher clock rate than transmission line whose data rate is 150 Mbps?

c. How is the internet useful for home users?

d. Explain the terms: repeater, bridge, router and gateway.

2. a. Explain spanning tree algorithm for bridged LAN.

b. Draw IEEE 802.3 MAC frame structure and explain.

c. Use 802.3 and IEEE 802.11 to discuss the differences between wired and wireless LAN.

d. Suppose that 80% of the traffic generated in a LAN is for the stations in the LAN and 20% is for the stations outside the LAN. Is an Ethernet hub preferable to an Ethernet switch? Does the answer change if the percentages are reversed?

3. a. Why we can’t have a CSMA/CD in wireless LAN? Explain CSMA/CA operation in wireless LAN.

b. Convert the IP address whose hexadecimal representation is C22F1582 to doted decimal notation.

c. For a hierarchical routing with 4800 routers, what region and cluster size should be chosen to minimize the routing table for a 3 tier hierarchy? How many entries would be required for normal case?

d. Explain network address translation (NAT).

4. a. Explain count to infinity problem in case of distance vector routing.

b. Compare virtual circuits and datagram subnet.

c. How do computer networks differ?

d. A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations A, B, C and D request 4000, 2000, 4000 and 8000 addresses respectively in that order. For each of these, give the first IP address assigned and mask in the w.x.y.z/s notation.

5. a. Imagine a flow specification that has maximum packet size of 1000 bytes, a token bucket rate of 10 million bytes/sec, a token bucket size of 1 million bytes, and a maximum transmission rate of 50 million bytes/sec. How long can a burst at maximum speed last?

b. Give two examples of computer applications each for connection oriented and connectionless service.

C. Briefly explain the Quality of Service (QoS) parameters in ATM.

d. Identify the components that contribute to the end – to – end delay experienced in setting up an ATM connection using PNNI.

6. a. What is the bandwidth – delay product for a 50 Mbps channel on a geostationary satellite? If the packets are 1500 byes (including overhead), how big should the window be in packets?

b. R.T.P. is used to transmit CD quality audio, which makes a pair of 16 bit samples 44100 times/sec, one sample for each of the stereo channels. How many packets per second RTP must transmit?

c. Draw TCP segment header and explain.

d. Explain dynamic buffer allocation.

7. a. Explain how three way handshake for releasing connection perform i) when response is lost ; ii) when response lost and subsequent DRs lost.

b. List out some of the potential pitfalls while measuring network performance and parameters.

C. List out Berkley Socket primitives. Which primitives are used only by server? Why?

d. A client sends a 128 byte request to a server located 100 km away, over a one gigabit network. What is the efficiency of the line during the remote procedure call?

8. Write short notes on :

1. Layered network architecture.
2. Token ring network.
1. Tunneling.

Protocols for gigabit networks.

We have covered VTU CSE 6th Semester Computer Networks -1 Question Paper December 2010. Feel free to ask us any questions in the comment section below.