Saturday, June 23, 2012



UNIX
MCA II Year, II Semester
Osmania University


UNIT – I
1. i. Write about UNIX file structure (Feb 12)
ii. What are three levels of security ? Explan in detail about chmod command.
iii. Explain in detail about the different patterns avaliable in awk.
2. i. Write an awk script that given a file name as the arugument.deletes all even lines in the files. (Feb 12)
ii. Define grep family and compare the members of the family.
iii. What are the special parameters and variables in the korn shell ?
3. i. Describe the Uniz file system in detail.
ii. Write notes on Grep command. (July 11)
4. i. Write notes on Unix Shell Programming with suitable examples.
ii. Discuss about awk command. (July 11)
5. Explain thedifference between multiuser operating system and multitask operating system.
6. Explain the difference between utilities and applications.
7. Describe the three phases involved in a session.
8. What methods are available to the system administrator to control system security? Explain each one.
9. What are the three levels of security in UNIX?
10. Identify and explain the six different states of a job.
11. Define a regular expression. Comapre and contrast it with a mathematical expression.
12. Define a operator. Compare and contrast operators in a regular expression and operators in a mathematical
expression.
13. Mention the primary difference between fgrep and the other two members of the family.
14. i. Describe the similarities and differences between the three loop statements in awk.
ii. Describe the similarities and differences between the next statement and the getline statement.
UNIT – II
1. i. What is signal ? Write about signal handling with good example. (Feb 12)
ii. What is inter process communication ? Explain about IPC with different methods.
2. i. Explain about three types of unix file system implementation that can be exploited to provide a type of
locking.
ii. What is shared memory ? What is the importance of it ? Explain in detail about the process of “Allocating
a shared memory segement”.Write about controlling of a shared memory segment. (Feb 12)
3. Expalin about Inter process communication using message queues with suitable examples. (July 11)
4. i. What is a Daemon process ? Discuss. (July 11)
ii. Explain about Semaphores and shared memory.
5. i. Explain about process management in Linux system.
6. i. Explain various components of Linux system.
ii . Explain the functionality of the basic components of the LINUX system.
7. i. Explain the following features of the linux systems
(a) File System (b) I/O System
8. With the help of a suitable diagram, explain the various components of Linux system.
9. Explain the memory management of Linux system.
10. Explain the file and directory structure in UNIX operating system.
11. Explain the general architecture of the following: UNIX operating system
12. Explain how Inter process communication is handled in UNIX Operating System.
13. Write short notes on: (i) NT Kernel functionally (ii) System calls.
14. Explain how inter process communication is accomplished in UNIX operating system.
15. i. Describe the memory management scheme in the UNIX operating system.
ii. Briefly explain UNIX kernel I/O structure.
UNIT – III
1. i. Explain about elementary socket system calls.Discuss about necessary system calls sequence in connection
oriented client server communication.
ii. Write short note on socket addresses. (Feb 12)
2. i. Explin about Internet super server. (Feb 12)
ii Discuss about following advanced socket system calls.
(i) readv ( ),writev ( ) (ii) fcntl ( ),ioctl ( )
3. i. Discuss briefly about Elementary Socket System Calls. (July 11)
ii. Explain about Input/Output Multiplexing.
4. i. Write notes on Sockets and Signals.
ii. Explain about reserved ports and socket options. (July 11)
UNIT – IV
1. i. What are the three categories of perl variables? Expaian about them with good examples.( Feb 12)
ii. Discuss in detail about pattern matching in PERL with good examples.
2. i. Write short note on: (i) Form handling in PHP. (ii) Cookies and session tracking. (Feb 12)
3. i. Discuss about origin and uses of PERL. (July 11)
ii. Give syntax and examples for the control statement of PERL.
4. i. Give an overview of PHP and its charateristics with operations and expressions. (July 11)
ii. Explain about arrays and functions of PHP with suitable examples.
UNIT – V
1. i. Discuss in detail about lists,dictionaries and tupules in phython. (Feb 12)
ii. Write about FILES handling in python with example.
2. i. Discuss about classes,inheritance,class customization inpython. (Feb 12)
ii. Write about exception handling with example.
3. i. Discuss the mapping and set types of python. (July 11)
ii. Explain about Files and I/O of python with examples.
4. i. Briefly explain about errors and Exception handling in python.
ii. Discuss about functions and programming using functions in python with examples. (July 11)

DITRIBUTED SYSTEMS
MCA II Year, II Semester
Osmania University


UNIT I
1. i. Draw the general organization of an internet search engine into three layers and exlain the three layers.
ii. Distinguish between multiprocessing and multi programming. (Feb 12)
2. i. Explan the software agents in distributed system.
ii. Why is it often necessary to specify the ontology in an ACL language. (Feb 12)
3. i. List various properties of adaptive software agents.Where do Agent communication Languages(ACLs)
fit into the OSI model?Why is it often necessary to specify the ontology in an ACL message? (Feb 12)
4. i. Explan the need of code migration.
ii. Discuss about client/server model. (Feb 12)
5. i. Discuss the golas of Distributed System.
ii. Explan about client-server model. (July 11)
6. i. Explain about software agents.
ii. Give the importance of code migration in distributed system. (July 11)
7. i. What are the properties of adaptive software agents? Where do Agent Coomunication Language(ACLS)
fit into the OSI model? Why is it often necessaty to specify the ontology in the ACL message?
ii. Explain how micro kernels can be used to organize an operating system in a client server fashion.
(July 10)
8. i Explain client-server architectures.
ii Explain network operating system. (Nov 09)
9. Explain about server
(i) General design issues (ii) Object servers (Nov 09)
10. i What is the difference between a distributed operating system and a network operating system.
ii Consider a chain of process P1,P2 ...... Pn implementing a multitiered client server architecture. Process Pi
is client of process Pi+1 and Pi will return a reply to Pi+1 only after receiving a reply from Pi+1. What are the
main problems with thias organization when taking a look at the reply-request performance at proccess Pi?
iii What are the properties of adaptive software agents? Where do Agent Communication Languages (ACLs)
fit into the OSI model? Why is it often necessary to specify the ontology in an ACL message?( May 09)
11. i Explain how microkernels can be used to organize an operating system in a client server fashion.
ii An experimental file server is up 3/4 of the time and down 1/4 of the time, due to bugs.How many times
does this file server have to be replicated to give an availaility of at least 99 per cent?
iii Compare the architecture of ‘D’ Agents with that of an platform in the FIPA model. ( May 09)
12. i Explain hardware concepts of distributed systems. (Nov 08)
ii Explain about uniprocessor operating systems.
13. Explain: (Nov 08)
i Introduction to threads.
ii Threads in distributed systems.
14. i Explain the role of middleware in a distributed system (May 08)
ii What is the difference between vertical distribution and horizontal distribution?
iii Sketch the design of a multi threaded server that supports multiple protocols using sokets as its transport
levelinterface to the underlying operating system.
15. i Explain what is meant by transparency and give examples of different types of transparancy. (May 08)
ii What is an open distributed system and what benafit does open ness provide?
iii Discuss various approaches to code migration. Also mention the alternatives for code migration.
16. i Discuss the advantages of distributed systems over centralized ones.
ii Explain the client server communication in a distributed system. (May/June 07)
17. Briefly explain the following:
i Scalability in ditributed systems
ii Blocking vs.Non Blocking primitives
iii Threads
iv. Virtual memory. (May/June 07)
UNIT –II
1. Explan in detail about home-based and hierarchical approaches in mobile agents. (Feb 12)
2 How can the limitation of Lamport’s logical clocks be over comes?What is a “Strongly consistent global
state”? (Feb 12)
3. What is mean by naming?Explain about implementation and working of DNS. (Feb 12)
4. i. Differentiate between logical clock and global clock.
ii. Describe mutual exclusion. (Feb 12)
5. i. Write about X.500 and its importance.
ii. Explain how mobile entities are located. (July 11)
6. Discuss about election algorithms by taking suitable examples. (July 11)
7. i. Expalin the concept of removing unreferenced entites.
ii. What is the idea behind optimistic concurrency control ? What are its advantages ? Is optimistic
concurrency control more or less restrictive than using times stamps ? Discuss. (July 10)
8. Explain naming entites (Nov 09)
i Names,Identifiers ad addresses.
ii Name resolution.
9. Explain the concept of clock synchronization. (Nov 09)
10. i Show that weighted reference counting is more efficient than simple reference counting. Assume that
communication is reliable.
ii It is possible in generation reference counting that an entry G[i] become less than 0 ?
iii What is the idea behind optimistic concurrency control? What are its advantages ? Is optimistic concurrency
control more or less restrictive than using times stamps ? Discuss. (May 09)
11. i A special form of locating an entity is called casting, by which a service is identified by means of an IP
address. Sending a request to an any cast address returns a response from a server implementing the
service identified by that any cast address. Outline the implementation of any cast service based on the
hierarchial location service.
ii Give a comparison of three mutual exclusion algorithms that you have studied. (May 09)
12. Explain the concept of locating mobile entities. (Nov 08)
13. Explain the concept of logical clocks. (Nov 08)
14. i What are the basic approaches for locating mobile entities? (May 08)
ii What is the goal of an election algorithm? Explain election algorithm based on the use of a ring.
15. i Compare garbage collection that requires the support of reference counting with that of trace based
methods.
ii Explain any one algorithm for achieving distributed mutual exclusion. (May 08)
16. i Explain the role of each layer in centralised file system modules.
ii Explain the difference between stateful and stateless file server. (May/June 07)
17. Explain in brief the design and implementation of DNS and X.500. (May/June 07)

UNIT – III
1. Write the different types of consistency protocals explain in details. (Feb 12)
2. Using the finite state automata, explain the non-blocking commit protocols is useful in fault toleranace.
(Feb 12)
3. i. Discuss briefly about client-centric consistency model.
ii. Write about process resilience. (Feb 12)
4. i. Explain about distributed commit and recovery.
ii. Explain about data centric model. (Feb 12)
5. Explan about Distribution and Consistency models briefly. (July 11)
6. i. Discuss about process resilience.
ii. Explain about Data centric model. (July 11)
7. i. Explain about distribution and consistency protocols.
ii. Explain the concept of distributed commit and recovery. (July 10)
8. Explain the concept of consistency protocols. (Nov 09)
9. Explain the concept of reliable group communication. (Nov 09)
10. i How do you compare push - based and pull - based protocols in the case of multiple client, single server
systems.
ii Explain replica placement issues.
iii In three phase commit protocol, it appears that commiting a transaction is based on majority voting. Is this
true. (May 09)
11. i Caching protocols form a special case of consistency protocols-Discuss.
ii Characterize the message - logging schemes. (May 09)
12. Explain about distribution protocols. (Nov 08)
13. Explain about process resilience? (Nov 08)
14. i Why is replication useful? How does replication relate to scalability? (May 08)
ii Can linearizability be implemented for physically distributed data stores?
iii For each of the following applications, do you think at-least-once semantics or at most ance semantic is
best? Discuss.
(a) Reading and writing files from a file server.
(b) Compiling a program.
(c) Remote Banking.
iv. In two-phase commit protocol, why can blocking never be completely eliminated, even when the participants
elect a new coordinator?
15. i Explain the different consistency models for distributed shared memory. (May 08)
ii Briefly explain the motion of incremental snapshot.
16. Discribe the design and implementation issues of distributed mutual exclusion. (May/June 07)
17. Describe with example, the basic architecture model of replication in a distributed data base(May/June 07)
UNIT – IV
1. Give an overview of GLOBE and explain how binding a process to an object is done in GLOBE.
(Feb 12)
2. Write a comparsion between CORBA,DCOM and GLOBE. (Feb 12)
3. i. Discuss about CORBA architecture and the role of ORB in CORBA.
ii. Describe the working of GLOBE. (Feb 12)
4. i. Explain about distributed file system.
ii. Discuss the implementation of CODA file system. (Feb 12)
5. Write short notes on the following: (i) CORBA (ii) GLOBE (July 11)
6. Explan briefly about SUN NFS and CODA file systems. (July 11)
99
MCA II Year,II Semester
7. i. Write short notes on (i) CORBA and (ii) DCOM.
ii. Mention the design goal of Globe. Give an overview of Globe. (July 10)
8. Compare NFS and Coda distributed file systems on major design issues. (July 10)
9. Explain the details of globe. (Nov 09)
10. Explain the details of SUN NFS. (Nov 09)
11. i Write shot notes on type library and monikers in DCOM.
ii Describe the architecture of NFS distributed file system. (May 09)
12. i Mention the design goal of Globe. Give an overview of globe.
ii Compare NFS and Coda distributed file systems on major desgin issues. (May 09)
13 . Explain the following concepts of CORBA. (Nov 08)
(a) Communication
(b) Process
(c) Security
14. Explain about coda file system. (Nov 08)
15. i What is the design goal of CORBA? Give an overview of CORBA system. (May 08)
ii In NFS, attributes are cached using write-through cache coherence policy. is it necessary to forward all
attributes changes immediately?
16. i Compare DCOM and Globe. (May 08)
ii In NFS, what kind of security measures can be taken to prevent a malicious client from reclaiming a lock it
never was granted when a server enters its grace period?
iii Explain how coda solves read-write conflicts on a file that is shared between multiple readers and only a
single write.
17. i Discuss log based transaction recovery.
ii Explain private workspaces as a method for implementing transactions. (May/June 07)
18. Compare and contrast the various methods used for concurrency control. (May/June 07).

UNIT - V
1. Write short notes on:
i. Design issues in distributed shared memory.
ii. Memory coherence. (Feb 12)
2. Write the different types of algorithms for implementing distributed shared memory.Give one explample
(Feb 12)
3. Explain how shared memory implemented by taking any one implementation algorithm. (Feb 12)
4. Explain briefly about load distributing algorithms by taking suitable examples. (Feb 12)
100
MCA II Year,II Semester
5. What is meant by memory coherence protocol?Explain about design issues of shared memory and list
implementation algorithms. (July 11)
6. i. What are issues in load distributing? Explain.
ii. Explain briefly about load distributing algorithms. (July 11)
7. i. Explain about (i) Coherence protocols. (ii) Design issues. (July 10)
8. i. Explain about (i) Issues in load distributing. (ii) Load distribution algorithms. (July 10)
9. i Explain algorithms for implementing DSM.
ii Explain about memory consistence. (Nov 09)
10. Explain about lead distributing algorithms. (Nov 09)
11. i What do you mean by memory access orderings ?
ii Differentiate between load balancing verses load sharing.
iii Explain receiver initiated load sharing algorithm. (May 09)
12. i Explain the alogorithm for implementing distributed shared memory.
ii Distinguish between pre-emptive verses non pre-emptive transfers of tasks in local
distribution algorithms. (May 09)
13. Explain about load distribution algorithms. (Nov 08)
14. i Explain the algorithms for implementing DSM.
ii Explain about design issues of distributed shared memory. (Nov 08)
15. i Explain why write-invalidate protocol is suitable to maintain coherence if several updates occur between
reads or when a program exhibits per-node locality of reference.
ii Classify the load distribution algorithms.
iii Explain the sender initiated algoriyhm for load distribution. (May 08)
16. i Contribute your comments on granularity and page replacement issues in the design of distributed shared
memory systems.
ii Explain briefly about adaptive algorithm for load distribution. (May 08)
17. i What are the goals of transaction management in a distributed system?
ii What are the communiction failures in a distributed system? Explain the different ways to recovery of
distributed transacions. (May/June 07)
18. i Briefly discuss the components and functions of kerberos.
ii Briefly discuss the X.590 certificates. (May/June 07

WEB PROGRAMMING 
MCA II Year, II Semester
Osmania University
UNIT – I
1. Discuss about creation of basicforms and complex forms can be linked. (Feb 12)
2. What is Cascading Style Sheets (CSS) with the help of suitable examples. (Feb 12)
3. i. Explain about form,frame,img and font tags.
ii. Write html code to link webpages. (July 11)
4. i. What are cascading style sheets? Explain. (July 11)
ii. Discuss aboutbox model.
5. What is form? Write a HTML programt to gather information of student using forms. (Dec 10)
6. Explain implementation of ordered and un ordered list in HTML. (Dec 10)
7. Explain in detail about ordered and unordered lists with example. How complex forms can be linked?
(July 10)
8. Explain how external styles can be used. Write an external style file which consists of all font properties.
(July 10)
9. i. Expand and explain briefly about
a) HTTP b) FTP c) URL d) HTTPS
ii. Explain how do you link images, web pages, files and also about other linking within web page. (Nov 09)
10. i. Write the difference between get and post method in informarion transmission using form? (Nov 09)
ii. Write about inline Cascade Style Sheets with the help of examples.
11. Explain about <table>, <frame> and <form> tags with suitable example for each. (May 09)
12. What is Cascading Style Sheets? Explain different types of Cascading Style Sheets. (May 09)
13. Explain about action and method attribute of form tag in detail. (Nov 08)
14. i. Explain when Rowspan and Colspan attributes are used in creating a table with example.
ii. What is floating and box model? Give examples. (Nov 08)
15. i. Illustrate the importance of Meta Page using examples. (May 08)
ii. List out the tags used to format text in HTML. Explain each.
16. i. Write about CSS and its advantages. (May 08)
ii. Write a CSS rule that changes the color of allelements containing attribute class=”green move “ of green
and shifts them down 25 pixels and right 15 pixels..
17. i. Discuss about cascading style sheets in line styles.
ii. Discuss with an example, ordered and nested lists. (Nov 07)
18. Design an HTML page to display the purchase bill in a Grocery Store. (Nov 07)
19. i. Design an HTML page to generate student registaration form.
ii. Explain the tags required to create Hyperlinks and images. (May/June 07)
20. Describe the features of cascading style sheets with an example. (May/June 07)
UNIT – II
1. i. what is meant by object referencing explain about collections all. (Feb 12)
ii. Discuss about ONCLICK,ONFOCUS,ONBLUR.
2. i. describe filters and transitions with suitable examples.. (Feb 12)
ii. Write about structured graphics and its applications..
3. i. Write about object referencing in object model. (July 11)
ii. Explain about ON MOUSEOVER,ONSUBMIT and ONBLUR.
4. i. What are the filters and transitions explain. (July 11)
ii. Discuss about structured graphics.
5. Write a program which enumerate all the tags used in used in HTML file. (Dec 10)
6. Write about filters available in DHTML. (Dec 10)
7. Explain about ONERROR, ONMOUSEOUT, ONFOCUS, ONBLUR event handlers with suitable example
for each. (July 10)
8. i. Explain how data binding can be done with Tabular data control. Give example. (July 10)
ii. Give some structured graphics ActiveX controls.
9. i. Define Active and Control.
ii. List out steps involved in binding data using tabular data control. (Nov 09)
10. i. List out any four objects of DHTML and explain about them.
ii. Why error handling is important? Give any two situations where you need error handling. (Nov 09)
11. What is object referencing? Give example for collections all and children. (May 09)
12. Explain about filters and transitions. (May 09)
13. Write about All and Children object. Give examples to list out all tags used in HTML file. (Nov 08)
14. i. Explain error handling in event model.
ii. Define ActiveX control. (Nov 08)
15. i. Explain object referencing using examples. (May 08)
ii. Write about
(1) ONLOAD (2) ONUNLOAD
(3) ONFOCUS (4) ONSUBMIT
16 Explain briefly about different types of filters and transitions available in DHTML (May 08)
17. Discuss with an example data binding with tabular data. (Nov 07)
18. Mention the salient functions of ONMOUSEOVER, ONLOAD and ON Submit event model. (Nov 07)
19. i. Explain in detail defferent types of filters used in Dynamic HTML.
ii. Write short notes on Translate and rotate in structured graphics. (May/June 07)
20. i. Write an error handler that changes the ALT text of an image to “Error Loading” if the image loading is not
completed.
ii. Short notes on ONMOUSEOUT, ONFOCUS, ONSUBMIT, ONMOUSEOVER. (May/June 07)
UNIT – III
1. i. Write a javascript program to reverise a given number at runtime. (Feb 12)
ii. differentiate between WhileLoop and forloop with suitable examples.
2 i. Write java script program to find prime numbers from 1 to 100 (Feb 12)
ii. how arrays are passed to functions?Explain with an example.
3 Discuss about various control Structures with syntax and examples. (July 11)
4 i. Write a javascript program to create multiplication table using arrays. (July 11)
ii differentiate between recursion and iteration functions.
5. Explain how do you send parameter as array to functions using example. (Dec 10)
6. Explain what is the role of Scripting Languages in developing web pages. (Dec 10)
7. Write a Java Script code to validate a user by taking input as user name and password from the form and
assume user name as “WEB” and password as “PROGRAMMING”. (July 10)
8. i. Explain the usage of reference parameters and how it can be used in functions. (July 10)
ii. Explain the Math and String objects.
9. i. Write a program using Java Script to validate user name and password.
ii. Explain selection structures available in Java Script. (Nov 09)
10. i. Write a Java Script program to sort array using functions. Implement selection sort.
ii. Differentiate client side scripting and server side scripting. (Nov 09)
11. Explain Java Script control structures with example. (May 09/JULY 11)
12. i. What is recursion? Differentiate between recursion and iteration with example.
ii. Explain Boolean and Number objects. (May 09)
13. i. What does the following function do?
function mystery(a,b)
{
if(6==1)
return a;
else
return a+ mystery(a,b-1);
}
ii. What is scripting? When we need scripting language? GIve advantages. (Nov 08)
14. Write a Java Script program to search an element in array using Linear search. (Nov 08)
15. i. Write a script that reads in two integers and determines outputs HTML text that whether the first is
multiple of second. (May 08)
ii. Identify and correct the errors in each of the following segments of code
(1) While (c<=5) (2) IF (gender==1)
Product * =c; document.writeln(“woman”);
++c; else;
document.writeln(“man”);
16. Explain string objcect using examples in detail. (May 08)
17. Write a script for creating a mathematical table. (Nov 07)
18. Write short notes on: (Nov 07)
i. Control Structures in Java Script.
ii. String manipulations in Java Script.
19. i. Write a Java Script to generate a Mathematical Table.
ii. Short notes on Javascript control structures. (May/June 07)
20. Explain in detail all Javascript objects Math, String, Data, Boolean and numbers. (May/June 07)
UNIT – IV
1. i. discuss about strings manipulation functions (Feb 12)
ii. Write a VB Script program to find fibbnacci series.
2 i. Discuss the installation of a webserver. (Feb 12)
ii differentiate betwwen ApacheWebserver and internelinformationserver.
86
MCA II Year, II Semester.
3. i explain how functions are declared in VB script by taking a suitable example. (July 11)
ii .discuss about various datatypes and operations in VB script.
4. i What is a Web Server.?discuss about personal Web Server. (July 11)
ii write procedure to install a Web Server.
5. Give syntax of function declaration in VB script. Explain using example. (Dec 10)
6. Write about IIS. (Dec 10)
7. Explain how string manipulation can be done in VB script? Give example. (July 10)
8. Explain about web server functionality and differentiate between personal web server and internet
information server. (July 10)
9. i. Write about web server and its functions.
ii. Write about control structures available in VB script. (Nov 09)
10. i. List out string manipulation functions of VB script. (Nov 09)
ii. Write about data types of VB script.
11. Explain how classes and objects can be used in VB script. Give example. (May 09)
12. Explain about Web Server functionality and differentiate between Personal Web Server and Internet
Information Server. (May 09)
13. Explain about IIS detail. (Nov 08)
14. i. Using example explain dynamic arrays in VB script.
ii. Write VB script code to validate username and password fields. Password should be atleast 8 characters
in which atleast 2 characters should be numeric and 2 characters should be alphabetic. (Nov 08)
15. i. Write about various data types available in VB Script. (May 08)
ii. Write short notes on :
(a) Option Explicit.
(b) Dim
(c) New
(d) Redim
16. i. In a three-tire application explain how the middle tire interact with the client tire. (May 08)
ii. Define the following terms:
(a) Top- level domain
(b) Virtual directory
(c) Web server
17. Discuss with a program oriented example, how client side scripting is done in VB Script. (Nov 07)
18. Write short notes on: (Nov 07)
i. Classes and objects in VB Script.
ii. Data types and control structures in VB Script.
19. i. Write a VB Script to find the largest of three numbers.
ii. Short Description of Input Box and MSG Box. (May/June 07)
20. Simulate the function of a Simple Calculator using VB Script. (May/June 07)
UNIT – V
1. Write short notes on the following : (Feb 12)
(a) Active server pages (b) CGI and PERL5
2 i. What is XML parser?Explain. (Feb 12)
ii discribe about cookies.
3. i. What is mean by session tracking?explain. (July 11)
ii. Discuss about ActiveX control.
4. Write shrt notes on the following (July 11)
(a)cookies (b)parsers.
5. i. Write about server side scripting.
ii. Write ASP program to gather information sent by form and display the same information. (Dec 10)
6. Write a perl program using matching operation to determine if a string is a substring within another string.
(Dec 10)
7. Write a short note on Active Server Pages. (July 10)
8. Write a CGI code to find factorial of a given number. (July 10)
9. i. Write about advantages of Perl language.
ii. Write about server side scripting languages. (Nov 09)
10. Explain ASP objects in details. (Nov 09)
11. Explain about ADO in ASP with suitable example. (May 09)
12. Write a Perl code to find minimum of given three numbers. (May 09)
13. i. Differentiate between clientside scripting and serverside scripting.
ii. Define cookies. What is its use? (Nov 08)
14. List out different objects provided by ASP. Explain briefly. (Nov 08)
15. i. How can a pert program determine the type of browser of browser a web client is using? (May 08)
ii. Write short notes on pert data types.
16. Write a asp program to handle from details and save to database file. (May 08)
17. Write short notes no: (Nov 07)
i. Features of Web Server
ii. XML DTD.
18. Write short notes on:
i. Web Services.
ii. Client Side Scripting v / s Server Side Scripting. (Nov 07)
19. i. Differentiate between Client side Scripting and Server side Scripting.
ii. Explan the different datatypes used in Perl program. (May/June 07)
20. i. Describe the importance of Webserver.
ii. Write a XML DTD for a student information which has the following details name, address 1, address 2,
City, State, Zip, Phone. (May/June 07)



COMPUTER NETWORKS 
MCA II Year, II Semester
Osmania University

UNIT – I
1. i. Explain about TCP/IP Architecture and its significance.
` ii. What are the major components of data communication systems?explain about it. (Feb 12 new)
2. i. Discuss about any two transimission media. (Feb 12 new)
ii. Explain about RS-232 INTERFACE.
3. i. Compare and contrast between virtual circuit and data gram subnet. (Feb 12 old)
ii. Explain about distance vector routine algorithm.
4. Write short notes on a)load shedding b)jitter control c)design issues of network layer (Feb 12 old)
5 i. What are five major components of data communication system. (July 11)
ii. What is protocol.explain in detail about ISO OSI reference model.
6. i. Explain about different guided transmission media and its characteristics. (July 11)
ii. What is modem explain about the various types of modems.
7 i. Differentiate between adaptive and non adaptive Alogorithms. (Dec10)
ii. Explain about Linkstate routing with an example?.
iii. What are disadvantages of distance vectar routing Algorithm?
8 i Explain about different Traffic Shaping Techniques. (Dec 10)
ii Explain how choke packets and load shedding are used in controlling congestion in a network?
9 i Distinguish between Linkstate and Distance Vector Routin g Algorithm . (July 10)
ii Find how many packets are generated by Broadcast from router using Reverse path forwarding.
10 Write short note on : (July 10)
i Jitter Control
ii Load Shedding
iii Describe about different cngestion control techniques in virtual circiuts.
11 i Discuss design issues of layers. (Nov 09)
ii What is routing algorithm ? Explain hierarchical and flooding?
12 i Compare virtual circuits and datagrams? (Nov 09)
ii What is Congestion and explain concept of choke packet and load shedding congestion control algorithm?
13 i Compare virtual circuits and Data gram Subnets.
ii What is traffic shaping and illustrate any one congestion control Algorithm? (May 09)
14 i What is connection oriented Service and connection less service .Briefly overview 5 service primitive for
impleting a simple connection orriented service.
ii What is Optimality principle and explain any 2 routing algorithm with an example? (May 08)
15 i. Briefly explain the functions of each layer of OSI model.
ii. With suitable example explain shortest path and distance vector routing algorithms. (Nov 08)
16. i. Explain in detail resource reservation protocol.
ii. Explain how choke packets and load shedding are used in controlling congestion in a network. (Nov 08)
17. i. Define congestion control. Write any three methods to control congestion.
ii. Differentiate between virtual circuits and datagrams. (May 08)
18. i. How are routing algorithms classified? Expalain in detail hierarchical and flooding routing algorithm.
ii. Discuss the differences between ISO-OSI and TCP/IP reference model. (May 08)
19. i Compare virtual circuits and Datagrams subnets. (May/June 07)
ii. How are Routing Algorithms classified? Explain Hierarchical routing, by means of an example.
20. i. Dicuss choke packets and load shedding congestion control mechanisms.
ii. What does “nogotiation” mean when discussing network protocols? Give an example. (May/June 07)
iii. List out the advantages and disadvantages of having international standards for network protocols.
UNIT – II
1. i. Given data frame 1010011010 and pattern 10101.Derive the frame that is to be transmitted using CRC.
ii. What is piggy backing?discuss about Go-back-N and selective repeat ARQ. (Feb 2012 new)
2. i. Discuss about pure ALOHA and slotted ALOHA. (Feb 2012 new)
ii. Draw and explain 802.4 frame format.
3. i. Discuss about firewalls (Feb 2012 old )
ii. Explain about fragmentation.
4. i. Describe about IP adresses. (Feb 2012 old)
ii. Discuss about anyone gateway protocol.
5. i. Explain about flow control.what are the different protocls used for them.explain that protocols.
ii. Given message D=100100, pattern p=1101,calculate FCS using CRC (July 2011)
6. i. Give frame format of ethernet and explain each field in detail.
ii. Explain about LAN protocol architecture. (July 2011)
7 i. Write a short note on : Tunneling , Fragmentation .
ii. Give IP packet header format. Specify the significance and functionality of each field? (Dec10)
8. i Explain how networks are classified based on IP addressing?
ii Convert IP address whose hexadecimal repreentation is C22F1580 to dotted decimal notation? Find the
class of address.
iii List diffrent ICMP messages. (Dec10)
9 i Write about Firewalls
ii With the help of a neat sketch explain in detail about IP header and each field. (July 10)
10 i Explain OSPF.
ii Explain about different IP addresses.
iii Find the addresses of networks for class B to support 6 networks. (July 10)
11 i Define Fragmentation and explain 2 types of fragmentation in detail.
ii Explain IPV4 header format with examples. (Nov 09)
12 i Explain the concept of firewalls
ii. Explain IP addresses format with examples. (Nov 09)
13 i Define Internet working and describe how networks differ.
ii Discuss Gateway routing protocols. (May 09)
14 i What is Tunneling and Firewalls ?Explain (May 09)
ii Give IP address formats and range of IP address in each class. Give also some example IP address.
15 i .Explain the concept of tunneling.
ii. Give IP packet header format? Specify the significance and functionality of each field. (Nov 08)
16. i. Explain how IP addresses are divided into different categories and who give special IP addresses.
ii. Explain in detail address resolution protocol. (May 08)
17. i. Explain in detail interior gateway routing protocol.
ii. What are IP address clauses? Why subnetting is required in network layer? (May 08)
18. i. Give the cell format of ATM and elaborate them.
ii. Discuss about working of firewalls. (May 08)
19. Explain Internetworking issues using concatenated virtual circuits. (May/June 07)
UNIT-III
1. i. How networks can be connected by using different devices.Explain. (Feb 12 new)
ii. Write about fragmentation.
2. i. What is distance vector algorithm.Explain its usage for the following subnet.what problems are associated
with this algorithm.how are they overcomed.
ii. Write about BGP. (Feb 12 new)
3. i. Discuss in detail about connection establishment and releasing in transport layer. (Feb 12 Old)
ii. Write short notes on multiplexing.
4. a)explain about tcp segment header.
b)write about timer management in transport layer. (Feb 12 old)
5. i. Discuss different types of gateways. (July 11)
ii. Write short notes on i)fragmentation ii)ip adress classes
6. i. Explain link state routing with an example.
ii. Write short notes on OSPF,BGP (July 11)
7 i Explain connection management in TCP.
ii Write short notes on following
(a) Crash Recovery (b) Timers in Transport layers. (Dec 10)
8. i Discuss ATM adaption layer.
ii Write and explain service primitives used by transportation layer entities. (Dec 10)
9. i Describe about multiplexing in transport layer.
ii Explain about TCP connection and Release. (July 10)
10. Write short note on: a) Creash recovery b) Timer management c) ATM Adoption layer. (July 10)
11. i What is Crash Recovery?
ii Explain TCP transmission policy. (Nov 09)
12. i What is transport layer and briefly describe its service primitive?
ii Explain ATM ALL (Nov 09)
13. i How is connection released in Transport layer?
ii Explain TCP segment Header. (May 09)
14. i Discuss the concept of flow control and buffering in detail.
ii What is UDP and explain the structure of ATM adaptation layer. (May 09)
15. i. Explain how user process sets up a connection with a remote application process.
ii. Why flow control and buffeing is required? (Nov 08)
16. i. Draw the header format of TCP and explain how each field is used in its operation?
ii. Discuss about TCP transmission policy. (Nov 08)
17. i. Why multiplexing is required at transport level?
ii. Discuss in detail the transport layer in ATM. (May 08)
18. i. Explain about crash recovery.
ii. Draw the header format of TCP and explain how each field is used in its operation. (May 08)
19. i Discuss the issues and protocols used in Establing Transport connection between two hosts. (May 08)
ii. A TCP machine is sending full windows of 65, 535 bytes over a 1Gbps channel that has a 10 m sec one-way
delay. What is the maximum thruput achievable? What is the line efficiency? (May/June 07)
20. i. Explain the TCP Transmission Policy.
ii. Discuss the Crash recovery strategies of Transport connections. (May/June 07)

UNIT –IV
1. i. Briefly discuss about transport layer quality of service parameters. (Feb 2012 new)
ii. Draw the header part of tcp protocol.explain the usage of each field in providing transport service.
2 i. Discuss about congession control in tcpl
ii. W rite short notes on: (a) UDP (b) Tim er m anagem ent in TCP (Feb 2012 new)
3. Explain in detail about elementary socket system call for connection oriented client server and connection
less C/S. (Feb 2012 old)
4. Write short notes on (any two): (a) advance socket system call (Feb 2012 old)
(b)out of band data (c)internet super server.
5. i. Explain in detail about multiplexing and demultiplexing in transport layer with suitable examples.
ii. Explain about tcp congession control algorithm in detail with examples. (July 11)
6. i. briefly discuss about timer management in TCP
ii. What are the features of UDP draw the header part of UDP Protocol.explain each and every part.In what
application UDP is used and why. (July 11)
7. i. Explain different address structures . (Dec 10)
ii. Write the client and server code to implement connection oriented echo server using socket primitives.
8 i Explain about I/O multiplexing.
ii Describe in detail about advanced socket system calls. (Dec10)
9 i Explain about socket addresses
ii Describe about elementary system calls. (July 10)
10 i Briefly describe the operation principle of Internet Superserver.
ii Write about I/O Multiplexing. (July10)
11 Discuss about elementary socket system calls. (Nov 09)
12 i Explain I/O multiplexing.
ii Discuss advanced socket system call (Nov09)
13 Give an overview of socket interface and socket addresses. (May09)
14 i Explain I/O Multiplexing.
ii Discuss Internet supersever. (May09)
15 i. What are advanced sockets? Explain with their syntax?
ii. Write in detail about internet super server. (Nov 08)
16. i. What do you understand about asynchronous I/O?
ii. Explain about input/output multiplexing. (Nov 08)
17. i. What are advanced sockets? Explain with their syntax.
ii. By means of a sample program,explain the concept of Asynchronous I/O. (May 08)
18. Write the flow chart of internet super server. Explain select and dup system calls in detail. (May 08)
19. i List and explain the different Socket system calls that will be used in the implementation of connectionless
client-server programs.
ii. What is asynchronous I/O? Is it better than synchronous I/O? If so exmpal. (May/June 07)
20. i. What are reserved ports? List atleast 5 of them.
ii. Explain few socket options.
iii. What is Out-of-Band Data? Explain. (May/June 07)
UNIT – V
1. Write notes on: (a) DNS (b) 5MTP (Feb 12 New)
2. i. Descibe basic model of FTP.
ii. Write short notes HTTP. (Feb 12 New)
3. i. What is cryptography explain about public key algorithm. (Feb 12 old)
ii. Write short notes on digital signatures.
4. Write short notes on : (a) email architechture (b) SNMP model. (Feb 12 old)
5. Write short notes on: (a) SMTP (b) FTP (Jul 11)
6. i. What is the architecture of WWW.discuss requirements of server side and client side.
ii. What is search engine.explain how it works. (Jul 11)
7. i. Distinguish the private and public key and how are they useful in cryptography.
ii. Explain about RSA algorithm. (Dec 10)
8. Write short note on DNS ,Email, DataCompression (Dec 10)
9. Distinguish among the following approaches to digital signatures symmetric key,public key and message
digest. (July 10)
10 . i Explain how e-mail system can do and how they are organized.
ii Explain RSA Algorithm in detail. (July 10)
11. i Explain Diffie-Hellman Key advantage
ii What is SNMP model? Explain. (Nov 09)
12. i What is DNS and define resourse records in details?
ii Define digital signatures and explain PGP and PEM. (Nov 09)
13. i Explain about Traditional Cryptography
ii Write briefly about DNS and explain functionality of DNS protocol. (July 09)
14. i Discuss RSA algorithm with asuitable example.
ii Explain E-mail architecture. (July 09)
15. i. Discuss the architecture of electronic mail?
ii. Write in detail about DNS. (Nov 08)
16. i. Write RSA algorithm? How it can be used in message integrity and digital signatures?
ii. What is encryption and decryption? (Nov 08)
17. i. Dicuss about SMTP and DNS?
ii. Write brief note on digital signatures. (May 08)
18. i. Distinguish between substitution and transportation cipher.
ii. Write brief note on digital signatures. (May 08)
19. Explain the DNS Protocol. (May/June 07)
20. i. Discuss with an illustration SNMP architecture. (May/June 07)
ii. Write notes on the following: