Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
8th Semester (June-2016) Computer Science and Information Science Engineering Question Papers
1. USN
10rs81
Max. Marks:'100
(05 Marks)
(10 Marks)
(04 Marks)
(06 Marks)
(10 Marks)
(10 Marks)
(20 Marks)
Eighth Semester B.E. Degree Examination, June/July 2016
Software Architecture
Note: Answer FIVE full questions, selecting
at least TWO questions from each part
d
o
o.
d
Eo
0)
!
ox
J-
6v
oo ll
.E .
xbo
Y()
otidO
()=
rE
()O
do
00s(gcd
-a)>r
!d
,o
5r
?()
oj
9E<o
LO
5i
6.;
> qi
5I)o
c50
P.!.)
:iD
U:
tr<
J6i
6)
o
z
l,
o
o
Time: 3 hrs.
1a.
b.
2a.
b.
c.
3a.
b.
c.
With the help of neat block diagram of ABC (Architecture Business Cyclb), explain in detail
the different activities which are involved in creating a software architecture.(l0 Marks)
c. Why is software architecture important? (05 Marks)
PART _ A
Briefly explain software architecture with def,rnitions.
What is modifiability? Explain general scenario for modifiability.
Explain in brief the business qualities.
Explain how faults are detected and prevented.
Explain in brief about KWIC (Kepvord in Context) with shared data solution. (10 Marks)
Enlist architectural styles and explain event-based, implicit invocation. (06 Marks)
Explain the advantages and disadvantages of pipes andSlters in architectural style.(O4 Marks)
6 a. What arethe steps involved in implementing the microkernel system?
b. Explaie.the dynamic scenarios of reflection with neat diagram.
7 , lV.rite notes on:
ai"'' Design pattern
b. Master-Slave pattem
b. Whole-part pattern
d. Proxy pattern
e. Command processor
8 a. Explain the steps performed when designing an architecture using the ADD method.
(10 Marks)
b. Write short notes any two of following:
i) Forming team structures
ii) Documenting across views
iii) Documenting interfaces.
q*$* cs
4 a. What do you mean architectural pattern? How it is categorized? Explain the structure part of
the solution for ISO layered architecture. (10 Marks)
b. Explain the steps involved in the implementation of pipes and filters architecture. (10 Marks)
PART - B
5 a. What do you mean by broker architecture? What are the steps involved in implementing
distributed broker architecture pattern? (10 Marks)
b. Write benefits of MVC. (05 Marks)
c. What are the liabilities of PAC? (05 Marks)
(10 Marks)
2. USN lrlcs/rs841
(06 Marks)
(07 Marks)
{S7 Marks)
{03 S{arks}
{09 Marksi
{S8IV$arks}
(07 Marksi
(13 Marks)
(10 lVfarks)
(10 Marks)
(05 Marks)
(04 Mar[<s]
(1tr Marksi
a.-
b.
q;
o
a
I
!()
()
!
Eg
6lu
7v)
-oo 11
coo
.= c
:o0Yo
-O
o(J
-!6O
rc!
>e/6
6a
-o
o{:
e- ii
trEo"!
9E<o-q ti
!o
6.v
bo:
troa.na
c- ;'i
E'YL
U<
ron
Z
d
!
o
o.
Eighth Sexnester B.E. Degree Examination, June/July 2016
Ad-Hoc Networks
Tirne: 3 hrs. Max. Marks: tr00
Note: Answer uny FIVE fwll qwestiolrs, selectircg
atle{rs{ TWO qwestiafis fr$pn ee*c{o psrt"
PAR.T * A
Write any eight diff,erences between cellular networks and Ad-hoc 'wireless networks.
Expiain the major issues to be considered in designing a MAC protocol for ad*hof-LT:iHl
networks" {tS Marks)
2 a. Explain hidden and exposed termireal problems with a neat diagrarar. (05 Marks)
b. Explain the packet exchange rnechanism in MACAW protocotr wittrl a neat diagrani.
(86 Marks)
c. Explain collision avoidance time allocation protocol frame format with a dia.gram.
(09 Marks)
3 a. Explain MAC protocol using directional antennas.
b. Explain interieaved carrier-sense rnultiple access protoeol in brief.
c. Explain the operation of rnultichannel MAC protocol with a neat diagram"
mechanisrn.
b. Explain DSDV routing-protocol with an example.
c. Explain AODV protocol.
4 a. Write the classification of routing protocol based on the routing information update
5a.
b.
6a.
b:
la.
b"
8a.
b.
P,&RT _ B
Explain zone routing protocol.
Explain Fishey state routing protocol with an example.
Why does TCP not perform well in Ari-hoc wireless networks?
Explain Ad-hoc TCP, with state diagram f,:r ATCP sender.
Explain in brief various routing attacks.
Briefly explain requirements f,or a secure routing protocol.
Explain two major kinds cryptographic algorithms.
Briefly explain the characteristics that affects QoS provisioning in Ad-hoc wireless
networks. (07 Marks)
Explain Location and delay predictions witli respect tc p,redictive location based QoS
routing protocol. (x3 Marks)
****a?
3. USN
b.
6a.
b.
lOCS/IS834
ci
o
o
o
()
ox
':>
dU
Zr,
coo
.gN
df,
-o
*, a.
39
o()
-o>r/6
5r,
ag
o..f
.()E
toal;
LO
6.:r
coo
(-)
=
tr>:iD
UL
!J<
iN
(.)
z
cd
o
O.
Eighth Semester B.E" Degree Examination, Jume/Ju$ 2A16
Network Management Systems
Time: 3 hrs. Max. Marks:-[00
Note: Answer FIVE.fall questiarus, selectircg
at leest TWO qwestions.frow ewch part,
a. Explain Data and Telecornrnurr.*,,ffir* with neat diagrarns. (x0 nrarks)
b. Briefly explain Network Management functional groupings with neat diagrarns. (10 Marks)
a. What are network management standards? Explain. (Sd Marks)
b. Briefly explain models in OSI Network managernent architecture rnodel with a necessary
diagram. (S8 Marks)
c. Explain inforrnation model with a neat diagram. (06 Manks)
a. Explain SNMP organization rnodel with neat diagrarn. (10 Marks)
b. Explain the system overview of SNMP network management archifecture with neat diagrarn.
(10 Marks)
a. Explain the SNMP based ASN.1 data type structure with a rlecessary diagram" (10 Manks)
b. Explain the encoding structure used in SNMPvl. (05 Ntarks)
c. Explain the structure of Managed objects. (05 Marks)
PAT{T _ B
5 a. What is Remote monitoring (RMON)? Explain the advantages of using R.emote rnonitoring
with a necessary diagram. (10 Marks)
Explain various groups and functions RMON 1 performs at the data link layer. (tr8 Marks)
With a neat sketch explain :
i) Layered architecture of {-A}d emula.tion across ATM
ii) LAN emulation client connections across LUNI (10 Marks)
Explain with neat sketches :
i) ATIVT network reference model
ii) M2 interface. (t(} Marks)
Explain with neat sketches Broadband access technology and HFC Technology" (tro Marks)
Explain the protocol trayer architecture in an F{FC system. i05 Marks)
What are ADSL network management elernents? Discuss ADSL fault management.
(05 Marks)
What are event correlation techniques? List the approaches. Explain rule based reasoning
with neat sketches. (1S lllanks)
Explain ctrient/server Authentication system. (10 Marks)
ta.
b.
c.
8a.
b.
4. USN
Time: 3 hrs.
Note: Amswer FIVE fwll qaestions, seleating
at least TWO qwestions fronn each part"
a.Withaneatflowchart,explain,,,,ffiusimulaticrnstudy"
b. Briefly expiain the advantages and disadvantages of simulation.
ltcs82
Max. Marks:100
(I0 Marks)
(tr0 Marks)
(tr2 Marks)
(08 Marks)
(06 Marks)
Eighth Semester B.E. Degree Examination, Jume/July 2016
System Modeling and Simulation
b.
3d,
b.
af
O
o
!
6
6
o
og
3e
(!=
':>
J2
7r)
ico
.= .r
Cosf,
-o
3*
6:Y
o()
oo(
=,e5
>e
-?o
6r=
ia. 6,
oj
!)E
6c)i, aE
!o
^^o
=c0'-a
:.'. I
=oo-
L,)<
*an
o
'7
o,
2 a. A computer technical support center is staffed by twc people, Able and Baker, who take
calls and try to answer questions and solve computer problems. The time between calls
ranges from 1to 4 rninutes with the distribution as shown in Tabie 1.1. Able is rnore
experienced and can provide service faster than Baker, vrhich means that, when both are
idle, Able takes the cal1. The distribution of their service tirrres are shown in Table 1.2 and
Table 1.3 respectively.
Table 1. tr: Inter arrivalaDle l. t: lnter arrwa me A l ) dtstrtbutron
IAT (mins) I 2 -) 4
Probability 0.2s 0.40 0.20 0.15
Table 1.2: Service time distribution of Able
Service time (mins) 2 J 4 5
Frobability 0.30 0.28 0.25 0.i7
Table 1.3: Service tirne distribution of Baker
Service time (rnins) a
J 4 5 5
Probability 0.35 a.25 0.20 4.2
Randorn digits for inter-arrival tirnes are : 26,98, 90, 26, 42,74,80, 69,22,49,34, 45,24,34.
Random digits fbr service tirne are :95,21,51,92,89, 38, 13, d1, SCI,49,39,53,88, 01, 81.
Simulate this system for 10 customers, by finding
i) Average waiting tirne for a customer
ii) Average Inter Arrival tirne
iii) Average service time of Able
iv) Average service time of Baker
v) Average waiting time of those who wait.
prylain the various concepts used in discrete-event sirnulation with an example.
Explain simulation in Java.
A companlz used 6 trucks to haul lxanganese from Kolar to industry. There are two loaders,
to load each truck. After loading, a truck flloves to the weighing scale to be weighed. The
queue discipline is FIFO. When it is weighed, a truck travels to the industry and retums to
the loader queue. The distribution of loading tirne, weighing tirne and travel time are as
follows :
Loading Tirne (mins) 10 5 5 10 15 10 i0 l5
Weiehine Time (mins) 8 t2 B t6 t2 o
L)
Travel Time (mins) 30 60 80 40 50 70
End of simulation is completion of four weighing from the scale. Calculate the total busy
time of both loaders, scale, average loaderand scale utilization.,4ssume that fourtrucks are
at the loaders and Two are at the scale, at time "0". The shopping of simulation is after 10
iterations'. (tr41V[arks)
tr of2
5. 10cs82
What is Poisson process? With example explain the properties of Poisson process. (06 Marks)4a.
b.
c.
5a.
b.
6a.
b.
7a.
1^
U.
c.
c.
Explain the characteristics of a queuing systern.
Explain the various steady state parameters of M/G/1 Queue.
Explain the replication rnethod for steady - state simulations.
Differentiate between point estimation and interv'al estimation.
BAro _-E
Use linear congnrential method to generate a sequence of 5 random numbers, with given
seed27, increment 43, and constant multiplier 17, modulus i00. (04 Marks)
The sequence of random numbers A.54, A.13,0"98, 0.11 and 0.58 has been generated. Use
K - S test with u : 0.05 to determine if the hypothesis that the numbers are uniformly
distributed on the interval [0, 1] can be rejected. Take Du : 0.565. (08 Marks)
Test whether the 2no ,9tn , i6tn ........ Nurnbers in the following sequence are auto correlated
by taking cr : 0.05. Take Zon: i.96.
0.38, 0.48, 0.35, 0.01, 0.54,0.34,0.95, 0.06, 0.6i, 0.95, 0.49, 0.96, 0.14, 0.96, 0.99, 0.37,
0.49, 0.60, 0.04, 0.83, 0.42, A.83,0.37,0.21, 0.90, 0.99, 0.91, 0.79, CI.77, a.99,0.95, a.21,
0.4i, 0.81, 0.96, 0.3i, 0.09, a.06, a.23, a.71, 0.73, 0.47, 0.13, 0.55, 0.11, 0.75, A36, A.25,
4.23, 4.72,0.60, Ci.84, 0.70, 0.30, 0.26, 0.3 8, 0.05, 0. 19, A.73, A.44. (08 Marks)
Explain acceptance - re"iection technique for Foissor: distribution. Generate 5 Poisson
variates with mean cr : 0.25. R.andom numbers are: 0.073, 0.693,0.945,0.739,0.014, a342.
Test whether tlie following data follows Poisson distribution using the chi-square test of
goodness of fit. Srith mean cx, : 0.05. Take l],rr., = 1 i.l (10 Marks)
Arrivals iperiod n I 2
1
J 4 5 6 7 8 I l0 il
Frequencv T2 10 t9 t7 l0 8 7 5 5 J
a
J I
(08 Marks)
(06 Marks)
(10 Marks)
(05 Marks)
Differentiatq between terrninating and steady state sirnulations by giving one example each.
(05 Marks)
a. Explain.components of verification and validation process. Explain with neat dragram,
model buiiding, verification and validation process. (12 Marks)
b. With neat diagrara, expiain the iterative process of calibrating a model. (08 Marks)
**r**
2 of2