VTU Previous Year Question Papers BE CS sixth Semester Computer Networks-II June 2010

VTU CSE 6th Semester Computer Network II Question Paper June 2010

VTU CSE 6th Semester Computer Networks II Question Paper June 2010: To score better marks in the 6th semester, you should also have depth knowledge in the entire subject. You can boost your preparation by solving previous year question papers. I will give you information about the important chapters and concepts to be covered in all chapters.

Here we are providing you the complete guide on Computer Networks II Question Paper June 2010.

VTU CSE 6th Semester Computer Networks II Question Paper June 2010

You should practice as many questions as possible along with other study materials. It will help you to secure better marks in the semester exam.

You must have Computer Networks II Question Paper along with the latest Computer Science 6th sem Syllabus to enhance your semester exam preparation.

Download Ultimate Study Materials to Boost Your Preparation
GATE CS Study Packages VTU CS Study Packages

Here you can check the Computer Networks II Question Paper June 2010

PART-A

1 a. Explain and derive delays in datagram packet switching.

b.  Consider the network given below in Fig.Ql(b). Use the Dijkstra’s algorithm to find shortest paths from all nodes to destination node

2. a. Explain the FIFO and priority queue scheduling for managing traffic at packet level.

b.   Explain the leaky bucket algorithm for policing the traffic; at flow level.

3 a. Explain the IP address classification. Identify the following IP addresses and their address class: 200.58.20.165 128.167.23.20 16.196.128.50 150.156.10.10

b. Give the format of IPV6 basic header. Explain the importance.

4 a. Explain the OSPF protocol and its operation.

b. Give the structure of ATM cell header and details of QOS parameters. 

PART-B

5 a. Which are the different data types used in the structure of management information?

b.   Give the comparison between public key and secret key crypto graphic systems.

6 a. Explain VPN and its types based on tunneling.

b. Explain the need for overlay networks and P2P connection.

7 a. Explain the JPEG compression method and still image processing,

b. Explain the session initiation protocol.

8 a. With an example, explain the dynamic source routing protocol,

b.  List the security issues in ad-hoc networks. Explain types of attacks.

We have covered VTU CSE 6th Semester Computer Networks II Question Paper June 2010. Feel free to ask us any questions in the comment section below.

Leave a Comment