5
( C i/ 1,\ USN Time: 3 hrs. Eighth Semester B.E. Degree Examination, June/July 2013 AD-HOG Networks O6CS/I5841 Max. Marks:100 (08 Marks) (08 Marks) (05 Marks) networks. (05 Marks) (10 Marks) (14 Marks) (14 Marks) E I =6 -*t .=A Et4 9^ '=o 9'= o'" aE :9 A;: ()< -i ..i z E Note: Answer FIVE full questions, selecting atleast Tll/O questions from each part. PART_A I a. Give the classification ofdifferent wireless networks. (04 Marks) b. What are the major challenges a routing protocol faces in ad-hoc wireless networks? c. Explain the security threats that exist in wireless networks. 2 a. Mention any five design goals oia MAC protocol for ad-hoc nelr'rorks. b. With a neat diagram, explain hidden and exposed terminal problems in wireless c. Explain in detail. D - PRMA protocol. 3 a. Write a short note on : i) Distributed laxity based priority scheduling scheme ii) Directional busytone based MAC protocol. 4a. b. b. Give the brief explanation of working of a MAC protocol using directional antennas. (06 Marks) Explain any three design issues ofa routing protocol for ad - hoc networks. (06 Marks) With an example, discuss the working of D DSDV routing protocol ii) DSR routing protocol. 5a. b. C- PART - B What are the advantages and disadvantages ofCEDAR protocol? (03 Marks) Explain zone routing protocol. (07 Marks) Give brief explanation of power aware routing metrics of ad-hoc wireless networks. (10 Marks) 6 a. Explain any five major reasons for throughout degradation of TCP when used in ad-hoc wireless networks. (10 Marks) b. Discuss the operation of feedback based TCP, with a suitable example. (10 Marks) 7 a. Briefly explain the network security requirements for ad-hoc wireless networks. (04 Marks) b. Give the classification ofsecurity attacks on ad-hoc wireless networks. (06 Marks) c. List and give brief explanation of network layer attacks. (10 Marks) 8 a. Explain the design choice for providing QoS supporl for ad-hoc wireless networks. ,.ia{-t,''. .. (10 Marks) 6. Explain Ticket -Based QoS routing protocol. .). ,..'.- '" (10 Marks) 'i' " ,,,t:t{,* :

8th Semester Computer Science (2013-June) Question Papers

Embed Size (px)

Citation preview

Page 1: 8th Semester Computer Science (2013-June) Question Papers

( C i/ 1,\USN

Time: 3 hrs.

Eighth Semester B.E. Degree Examination, June/July 2013

AD-HOG Networks

O6CS/I5841

Max. Marks:100

(08 Marks)(08 Marks)

(05 Marks)networks.(05 Marks)(10 Marks)

(14 Marks)

(14 Marks)

E

I

=6-*t

.=A

Et4

9^

'=o9'=

o'"

aE:9

A;:

()<-i ..i

z

E

Note: Answer FIVE full questions, selectingatleast Tll/O questions from each part.

PART_A

I a. Give the classification ofdifferent wireless networks. (04 Marks)

b. What are the major challenges a routing protocol faces in ad-hoc wireless networks?

c. Explain the security threats that exist in wireless networks.

2 a. Mention any five design goals oia MAC protocol for ad-hoc nelr'rorks.

b. With a neat diagram, explain hidden and exposed terminal problems in wireless

c. Explain in detail. D - PRMA protocol.

3 a. Write a short note on :

i) Distributed laxity based priority scheduling scheme

ii) Directional busytone based MAC protocol.

4a.b.

b. Give the brief explanation of working of a MAC protocol using directional antennas.(06 Marks)

Explain any three design issues ofa routing protocol for ad - hoc networks. (06 Marks)

With an example, discuss the working ofD DSDV routing protocolii) DSR routing protocol.

5a.b.

C-

PART - B

What are the advantages and disadvantages ofCEDAR protocol? (03 Marks)

Explain zone routing protocol. (07 Marks)

Give brief explanation of power aware routing metrics of ad-hoc wireless networks.(10 Marks)

6 a. Explain any five major reasons for throughout degradation of TCP when used in ad-hocwireless networks. (10 Marks)

b. Discuss the operation of feedback based TCP, with a suitable example. (10 Marks)

7 a. Briefly explain the network security requirements for ad-hoc wireless networks. (04 Marks)

b. Give the classification ofsecurity attacks on ad-hoc wireless networks. (06 Marks)

c. List and give brief explanation of network layer attacks. (10 Marks)

8 a. Explain the design choice for providing QoS supporl for ad-hoc wireless networks.

,.ia{-t,''. .. (10 Marks)

6. Explain Ticket -Based QoS routing protocol. .). ,..'.- '" (10 Marks)

'i' ",,,t:t{,*:

Page 2: 8th Semester Computer Science (2013-June) Question Papers

USN 06cs81

Eighth Semester B.E. Degree Examination, June I July 2Ol3Advanced Gomputer Architecture

Time: 3 hrs. Max. Marks:100

Note: Answer any FIVE full questions, selecting atleast TWO question from each part.

PART - Aa. Defure Computer Architecture. Illustrate the seven dimensions of an ISA.b. Assume 4 disk subsystem with the following components and MTTF.

i) 10 Disk, each rated at 1000000 hours MTTF ii) 1 SCSI controller 500,000hours MTTF ii| 1 power supply 200,000 - hours MTTF i r) 1 Fan 200,000 -hours MTTF v) 1 SCSI cable 1,000,000 - hours MTTF. Using the simplifyingassumptions that the iife times are exponentially distributed and that lailure are independent.Compute the MTTF olthe sl stem as a whole. (04 Marks)

c. We will run two applieations on this dual Pentium but the resource requirements are notequal. The f-rst application needs 80% of the resources and the other only 20% of theresou.rces.i) Given that 40% of the first application is parallelizable, how much speed up would you

achieve with that application if run in isolation?ii) Given that 99%o of the second application is parallelizable, how much speed up would

this application observe ifrun in isolation?iii) Given that 40Yo of the first application is paralletizable, how much overall system speed

up would you observe ilyou parallelized it?

Eq

g

.= cr

E.J

tt

-a5!

AA

6d,

5.!l

E>

.i ...i

z

oE

2a.b.

(08 Marks)

much overall system(08 Marks)

(10 Marks)(10 Marks)

.4

c.

a.

b.

With a neat diagram. explain the classic five stage pipeline fo1 RISC processor.

Mention the techniques used to reduce branch costs.prediction used for same.

Explain static and dynamic branch(08 Marks)

dependencies. Explain(06 Marks)(06 Marks)

(0E Mrrks)(04 Marks)

b. Explain the basic schemes for enforcing Coherence insystem.

a. Briefly explain four basic Cache optimization methods.1of2

iv) Given that 99% of the seiond application is parallelizable, howspeedup would you get?

What is pipelining? List pipeline hazards. Explain any one in detail.

What is data dependencies? Mention the different types of data

\ame dependencies with example between two instructions.What is correlating predictors? Explain with examples.

Explain the basic VLIW approach for exploiting ILP using multiple issues.Write a note on value prediction.

c. Mention the key issues in implementing advanced speculation techniques. Explain.(08 Marks)

PART - Ba. Explain any two hardware primitives to implement synchronization, with example.

(I0 Marks)a shared memory multiprocessor

( l0 Marks)

ii -' (lo Marks)

li'

Page 3: 8th Semester Computer Science (2013-June) Question Papers

06cs81

b. Assume we have a computer where the Clocks Per Instruction (CPI) is 1.0. When allmemory accesses hit in the Cache. The only data accesses are loads and stores and these

@\)/n

vp-J,\/)

L,r/ et}

'ts,s*-..9nr.W*I.*

.Nv ag-

..* Yf\laV

rlyx\v

{. \-a'\

\(,,{*}

*cI.,'(l:"

'"ar{-J\,,./t,ry

(\\

+S'

2 of2

Page 4: 8th Semester Computer Science (2013-June) Question Papers

USN 06CS/IS834

(06 Marks)(08 Marks)(06 Marks)

(06 Marks)(04 Marks)

(05 Marks)(05 Marks)

(06 Marks)(10 Marks)(04 Marks)

.(05 Mark)(06 Marks)(04 Marks)(05 Marks)

(06 Marks)(08 Marks)(06 Marks)

E

g

Yi

'! a

66

CE

--3og

oi-i ..i

z

E

Eighth Semester B.E. Degree Examination, June / July 2013

Network Management Systems

Time: 3 hrs. Max. Marks:100

Notez Answer ony FIVEfull questions, selecting atleast TlyO question from each part.

PART-A

1 a. What are the goals of network management? Explain the functions of network management.(10 Marks)

b. List the problems that are common in network management system. (04 Marks)c. With a neat diagram, explain network management Dumbbell Architecture. (06 Marks)

Explain the salient features ofvarious network management standards.Explain the functional model of network management system.Explain various data types used in ASN - 1.

a. Explain Two tier, Tluee tier and proxy server organization model of SNMP. (08 Marks)b. With a neat diagram, explain network management architecture of SNMP. (08 Marks)c. Write a note on history of SNMP management. (04 Marks)

b.

c.

4 a. Explain the structure of management inlormation in SNMP.b. Explain how basic encoding rule (BER) is used in SNMP.

d. Explain the Get - Request operation tbr a system group.

PART - B

What is remote monitoring? Explain new data types defined in RMON 1 .

Explain the common RMON1 and Ethernet groups.Describe RMON2 conformance group.

7 a. Brielly explain the dif'ferent broadband access technology.b. Explain the ADSL system reference model.c. What are the different parameters used in ADSL fault management? i

d. Explain the elements of cable modem management MIBs.

8 a. Write a note on Fault management.b. Describe the various kinds ofclient / server authentication systems.c. With a neat diagram, explain policy - based management.

c. What are the types of traps used in SNMP? Explain each with the structure of trap PDU.

5a.b.

c.

6 a. What is the need for ATM LAN emulation? Explain the layered architecture of a LANemulation. (08 Marks)

b. With a neat diagram, explain the role of SNMP and ILMI in ATM management. (06 Marks)c. Describe ATM digital exchange interface management. (06 Marks)

Page 5: 8th Semester Computer Science (2013-June) Question Papers

USN

' Time: 3 hrs.

06IS81

Max. Marks:100

(08 Marks)(04 Marks)(08 Marks)

(04 Marks)(08 Marks)(08 Marks)

cause-effect(05 Marks)(05 Marks)(05 Marks)(05 Marks)

(05 Marks)(05 Marks)(10 Marks)

Eighth Semester B.E. Degree Examination, June/July 2013

Software Testing

Note: Answer FIVE full questions, selectingot least TWO questions from each part.

a

:v1-^t

x0r

-a

:q

6 .9.

4.9

oy(.) <

oz

aE

1a.b.

c.

PART_AExplain in detail the various measures ofsoftware quality attributes.With a suitable example, explain how will you specify program bahviour.Briefly explain the concepts oftest metrics.

Explain the eoncepts ofdefect management.Explain in detail the several strategies for test generation.

With a neat sketch,.explain the elements of model checking.

W}at do you mean by definition - use pairs?Explain the concepts ofdata dependence graph with a suitable example.Briefly explain the concepts ofdata flow analysis.Define data flow testing criteria with respect to DU pa s.

What are the diff'erences between test case and test case specifications?Define the term adequacy criteria with a suitable exampleBriefly explain the concepts ofscaffolding.Explain the concepts ofself-checks as oracles.

Write short notes on the following concepts:Memory leaksSystem testingAcceptance testingIntegration testing

3 a. Briefly explain the concepts of unidimensional versus multidimensional puf,itiorirfljo murr.g

b. Name and explain the four steps which are helpful in creating the equivalence class.(06 Marks)

c. With a neat sketch, explain in detail the steps involved in the generation of tests using the

category-partition method. (08 Marks)

a. Explain the procedures which.are used for the generation of tests usinggraphing.

b. With a neat sketch, explain the notation used in cause-effect graphing.c. Briefly describe the lault model for predicate testing.d. Explain the usage olpredicate testing in practice.

PAR'I'- Ba. Explain the concepts of statement testing.b. Briefly explain the concepts ol branch testing.c. Explain in detail the concepts of path testing with a suitable example.

2a.b.

c.

6a.b.

c.d.

la.b.

cd.

8

(05 Marks)(05 Marks)(05 Marks)(05 Marks)

(05 Marks).(05 Marks)(05 Marks)(05 Marks)

a.

b.

c.

d. (20 Marks)