Tuesday, October 13, 2009
CS 1302-COMPUTER NETWORKS-MAY/JUNE 2007 |
PART A( 10 * 2=20marks) |
1.state the purpose of layering in networks? |
2.At which level of OSI model does repesters,bridges,routers and gateways operate? |
3.state the different between token ring and FDDI? |
4.give the structure of encoder and decoder in error coorection |
5.what is meant by IP spoofing?how can be router be used to prevent IP sppofing? |
6.what kind of routing information do router exchange among themselves while running |
distance vector algorithm? in particular, |
briefly describe the format of routing information that is exchanged? |
7.briefly describe 2 advantages of using packet switching for data transmission. |
8.explain how tcp flow control works. |
9.why id DNS nessary?state it's significance |
10.what is security parameter index? |
part B(5 *16=80marks) |
11.a. |
(i)list four properties by which transmission media can differ(8 marks) |
(ii)3 packet -switiching networks each contaion n nodes.the networks has a star |
topology |
with a central switch, a ring respectively and a third is fully interconnected with a wire |
from every node to every other node. |
what are the best,averabge and worst case transmission paths in hops?(8 marks) |
OR |
b |
(i)describe the key elements of protocols and the standards.(8 marks) |
(ii)explain in detail the data transmission in OSI reference model(8 marks) |
12.a |
(i)how does the 802.11 media access control protocol ensure that the receiver has a |
greater chance to transmit the |
acknowledgement frame before any other wireless stations grab the media? |
does it always guarantee that the acknowledgment frame sent by the receiver will not |
collide with another frame transmitted by another wireless station?(8 marks) |
(ii)describe the collision avoidance mechanism used in 802.11 wireless LAN. |
in particular,how such a mechanism solves the hidden terminal problem(8 marks) |
OR |
b.describe 2 approaches by which packet loss is detected in a |
Go back -N ARQ protocol and seletcive repear protocol.(16 marks) |
13.a. |
(i)how is the looping problem solved by switches and by rou ters. |
how do switches/routers handle link failure?(8 marks) |
(ii)explain the IP addressing(8 marks) |
OR |
b.(i)compare and contrast link state and distance vector algorithma(8 marks) |
(ii)in the virtual circuit network service model,before a virtual circuit is set up, the soure |
router needs to specify a path |
(eg. shortest path)from the source to the destination |
what additional information do we need to maintain in the |
routing table to support this function? |
write down the resulting routing table(8 marks) |
14.aif UDp does not provide any service guarantees or reliable transfer, |
why can't application directly access IP and do without it? |
explain UDP in details(16 marks) |
OR |
b.what is QOS in internetworking?state the techniques to improve QOS(16 marks) |
15.a.what are the following acronym SMPT,FTP,WWW and HTTP stand for? |
explain their uses and state the strengths and weakness of each of them(16 marks) |
OR |
b.(i)explain the role of a DNS on computer networks, |
including its involvment in the process of a user accessing a web page(8 mark) |
(ii)describe about symmetric -key cryptography(8 marks) |
Tags COMPUTER NETWORKS