Sei sulla pagina 1di 2

Saveetha Eng.

College
www.saveetha.ac.in No 1. Engineering College The Exciting World of Opportunities
Home Syllabus Subject Notes Results TA NCET 2013 TNEA 2013 8th Sem Results Events Latest News Question Papers Tell Us

Anna University May/June 2013 Timetable Announced|1st/2nd Sem UG|Post Graduate | Check Anna University May/June 2013 Exam Internal Marks(Check Between 6:00 PM to 7:00 AM) Anna University 1st/2nd Semester Important Questions For may/June 2013 Exams Anna University 8th Semester may/June 2013 Results Announced

Search

Anna Univ May/June Model Questions High Performance Computer Networks Question Paper June 2011-2013

This webpage is not available


The connection to www.facebook.com was interrupted. Here are some suggestions:

M.E./M.Tech. DEGREE EXAMINATION, JUNE 2011. Common to M.E. Applied Electronics/M.E. Computer and Communication/ M.E. Common System First Semester 250102 HIGH PERFORMANCE COMPUTER NETWORKS (Regulation 2010) Time : Three hours Maximum : 100 marks Answer ALL questions. PART A (10 2 = 20 marks) 1. What is the difference between UNI and NNI in ATM? 2. What is the principle behind Bellman Ford routing algorithm? 3. Enlist the features of Reservation Protocol (RSVP). 4. How does the soft-state feature of RSVP allow it to adapt to failures in the network. 5. State the principle of multiprotocol label switching (MPLS) operation. 6. What is meant by RED policy? 7. State Littles theorem. 8. What is the need for data traffic modelling? 9. Define the term Kerberos. How does it offer authentication service over a network? 10. List out any four MIB variables. Question Paper Code : 31019 PART B (5 16 = 80 marks) 11. (a) (i) Explain the layered architecture of TCP/IP. Compare with OSI model. (10) (ii) Describe the signaling system #7 architecture which supports. ISDN network. (6) Or (b) (i) Write a brief note on variable length packet switches and Non-FIFO input queued switches. (8) (ii) What are the uses of DWDM in network configurations? (8) 12. (a) Discuss in detail about the various protocols available for real time interactive multimedia applications. (16) Or (b) (i) What are the different scheduling services defined in multimedia applications? Explain. (8) (ii) Discuss the interplay between a QOS routing algorithm, RSVP and integrated services IP. (8) 13. (a) (i) Describe the access method in VPN for remote users. (8) (ii) What are the security issues with respect to tunneling in point to point protocol? (8) Or (b) (i) Explain the difference between the leaky bucket traffic shaper and the token bucket traffic shaper. (8) (ii) In what way does the MPLS support for virtual private network (VPN)? (8) 14. (a) (i) Briefly explain the buffered communication system with arriving and departing packets. Give suitable examples. (10) (ii) Consider a data communication system with three transmission lines packets arrive at three different nodes with arrival rates 200 1 l = packets/sec, 300 2 l = packets/sec and 10 3 l = packets/sec

Reload this webpage later. Check your Internet connection. Restart any router, modem, or other network devices you may be using. Add Google Chrome as a permitted program in your firewall's or antivirus
2nd se m anna unive rsity note s NO TES SEM Q P Inte rnal 2nd Se m Nov/De c 2012 Q P 2ND SEM SC HEDULE Mark s ANNA UNIV 2ND SEM 2ND

Anna Univ SYLLABUS AU BE

ANNA UNIVER SITY Q UESTIO N PAPER S SYLLABUS BE 2nd se m e ste r note s

se cond Se m e ste r Q ue stion Pape r

R e sults

Engineering Paper Model Question Paper Computer Networks

Exam Paper Examination Table Paper Anna University

Sample Paper Network Security Paper High Performance Computer

RejinPaul on

Follow

+2,141

6/19/13

Anna Univ May/June Model Questions High Performance Computer Networks Question Paper June 201
respectively. Assume that an average of 50000 same size packets float in this system. Find the average delay/packets. (6) Or (b) (i) Mention the factors that make the Poisson model of data traffic a failure in network. (4) (ii) Describe the role of non Poisson model of data traffic in networks. (12) 15. (a) (i) Explain the reference architecture of SNMP for managing devices on IP network. (10) (ii) When is IP security appropriate? When is SSC/TLS appropriate? (6) Or (b) (i) What is NTA and mention the role of NTA in firewall? (6) (ii) Narrate the various types of firewalls and their features. (10)

Tw eet

Related Posts ANNA UNIV DESIGN OF HYDRAULIC S AND PNEUMATIC SYSTEMS ED9264 ANNA UNIVERSITY APRIL / MAY / JUNE QUESTION PAPER 2011 ANNA UNIVERSITY QUALITY C ONC EPTS IN DESIGN PD9211 ANNA UNIVERSITY JANUARY 2010 QUESTION PAPER ANNA UNIV PREVIOUS SEMESTER QUESTIONS 2013 - 2014 ANNA UNIVERSITY APPLIED MATHEMATICS FOR ENGINEERING DESIGN ANNA UNIVERSITY QUESTION PAPER JANUARY 2010 CONCEPTS OF ENGINEERING DESIGN ED9211 ANNA UNIVERSITY ME QUESTION PAPER C OMPUTER APPLIC ATIONS IN DESIGN CD9211 ANNA UNIVERSITY ME QUESTION PAPER FOR M.E. ENGINEERING DESIGN, M.E. PRODUC T DESIGN AND DEVELOPMENT AND M.E. C OMPUTER AIDED DESIGN
Labels: ME QUESTION PAPER

Newer Post

Home

Older Post

rejinpaul.com//Anna-Univ-May-June-Model-Questions-High-Performance-Computer-Networks-Questi

2/2

Potrebbero piacerti anche