Download JNTUH MCA 3rd Sem R13 2018 June-July 813AR Computer Networks Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 3rd Sem (Third Semester) Regulation-R13 2018 June-July 813AR Computer Networks Previous Question Paper


R13

Code No: 813AR

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA III Semester Examinations, June/July - 2018

COMPUTER NETWORKS



Time: 3 Hours















Max. Marks: 60


Note: This question paper contains two parts A and B.

Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B

consists of 5 Units. Answer any one full question from each unit. Each question carries 8

marks and may have a, b, c as sub questions.



PART - A



















5 ? 4 Marks = 20

1.a) Give a critical comparison between OSI and TCP-IP network models.



[4]

b) Compare working of ALOHA and Slotted ALOHA. How is the performance improved in

Slotted ALOHA?

















[4]

c)

What is count-to-infinity problem in Distance Vector Routing? Give a solution to solve this

problem.



















[4]

d)

Explain the process of fragmentation with suitable examples.





[4]

e)

Explain the slow start algorithm used in TCP congestion control.



[4]



PART - B

















5 ? 8 Marks = 40


2.a) A bit stream 10011101 is transmitted using the standard CRC method. The generator

polynomial is x3+ 1. Show the actual bit string transmitted. Supposethat the third bit from

the left is inverted during transmission. Show that this error is detected at the receiver's

end. Give an example of bit errors in the bit string transmitted that will not be detected by

the receiver.

b) In CRC, show the relationship between the size of the divisor and the remainder. [6+2]

OR

3.

Explain about Go-Back N and Selective Repeat versions of sliding window.

[8]





4.

Give the frame format of standard IEEE 802.3 Ethernet and explain the binaryexponential

backoff algorithm used in Ethernet.











[8]

OR

5.a) Store-and-forward switches have an advantage over cut-through switches with respect to

damaged frames. Explain.

b) Explain the working of Token Passing as a Collision Free Protocol.



[4+4]


6.a) For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen

to minimize the size of the routing table for a three-layer hierarchy?

b) Explain Hierarchical Routing.













[3+5]













OR

7.

What are the advantages of Token Bucket over Leaky Bucket? Explain the working of

Token Bucket algorithm with suitable diagrams.









[8]






8.

Write Short notes on:



a) Tunneling







b) IPv4 Header Format.















[4+4]

OR

9.a) A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum

number of hosts it can handle?

b) Why do we need addressing at transport layer also? With a neat diagram explain how a

process in one host establishes a connection with a server in another host.

[3+5]



10.

With a neat diagram explain the different fields of TCP Segment header.

[8]

OR

11.

Give a brief introduction to Electronic Mail and FTP applications.



[8]



---oo0oo---

This post was last modified on 17 March 2023