www.annauniv.edu TNEA 2015 Rank List for B.E / B.Tech Admissions Anna University Counselling

TNEA 2015 Rank List

Tamilnadu Engineering Admissions ( TNEA ) counselling begins on 1st July 2015 for which the TNEA Rank List has been released online .

Candidates who've applied for TNEA 2015 may check RANKING Online by entering random number  / application number.

TNEA 2015 Rank List - Check Here


Anna university engineering admissions 2015, tnea 2015 counselling updates, tnea 2015 rank list, tnea ranking 2015 .

TNEA Rank List 2015 udpates, how to check tnea ranking online, anna university engineering admissions, engineering counselling .


Engineering Courses in India | Courses available in India

Engineering Courses in India

After completing HSC / 12th as high school education, students probably have to choose their career wisely, they've to chose the profession that will be very proseperous in future and have good oppurtunity for them to get a job further.

For students who've chosen Engineering , here are some things you need to know, there are several courses available for the stduents .

In engineering we've listed the availability courses in India. You can choose any one among them . Be it ECE , or Aero or Mining.

You choose your career..!! All the Best..If you've any other doubts , post your comments.

Engineering Courses in India


Agricultural Engineering
Aeronautical Engineering
Architecture
Automobile Engineering
Biomedical Engineering
Biotechnology
Broadcast Engineering
Communication Engineering
Ceramic Technology
Chemical Engineering
Civil Engineering
Computer Engineering
Environmental Engineering
Electrical Engineering
Earthquake Engineering
Electronics Engineering
Fire Engineering
Genetic Engineering
Industrial & Production Engineering
Instrumentation Engineering
Marine Engineering
Mechanical Engineering
Metallurgical Engineering
Mining Engineering
Material Engineering
Nuclear Engineering
Ocean Engineering
Petroleum Engineering
Plastic Technology
Polymer Engineering
Rubber Technology
Space Technology
Textile Industry

Hope you like it.. Share it to your friends via Facebook,Twitter..

List of Entrance Exams for Engineering in India 2012

Entrance Exams for Engg
The one whom always searching for "What are all the entrance exam available for Engineering",here is the list of institutions that conduct entrance exams for the various streams of engineering courses.This includes govt and deemed univeristy ,the entrance dates will be shortly updated in this blog.


1. All India Engineering Entrance Examination (AIEEE)
2. NERIST Entrance Examination (NEE)
3. Karunya University Entrance Exam [ BTech, BE ]
4. Kalinga Institute of Industrial Technology Entrance Exam (KIITEE) [ BTech, MTech
5. SRM Engineering Entrance Exam (SRMEEE) [ BTech, MTech ]
6. All India Common Entrance Test (AICET)
7. IIT Joint Entrance Examination (IIT JEE)
8. Birla Institute of Technology and Science Examination (BITSAT)
9. Delhi Combined Entrance Examination CEE
10. Netaji Subhas Institute of Technology (NSIT)
11. National Institute of Technology (NIT)
12. National Aptitude Test in Architecture (NATA)
13. Madhya Pradesh Pre Engineering Test (MP PET)
14. Vellore Institute of Technology Engineering Entrance Exam (VITEEE)
15. Vinayaka Missions University Engineering Entrance Exam
16. Tolani Maritime Institute - Birla Institute of Technology and Science
17. School of Planning and Architecture
18. Rajasthan Pre Engineering Test
19. Jawaharlal Nehru University Engineering Entrance Exam (JNU EEE)
20. JNTU Planning and Architecture Common Entrance Test (PACET)
21. Jamia Milia Islamia (JMI) Entrance Exam
22. International Institute of Information Technology -Post Graduate Entrance Exam (IIIT PGEE)
23. Graduate Aptitude Test in Engineering (GATE)
24. Engineering Common Entrance Test for Diploma Holders (ECET-FDH)
25. Dr.D.Y.Patil Institute All India Entrance Test
26. Dhirubhai Ambani Institute Of Information and Communication Technology
27. Central Institute of Plastic Engineering & Technology Entrance Exam (CIPET)
28. Bharath University Engineering Entrance Exam (BIHER)
29. Bharati Vidyapeeth Engineering Entrance Exam
30. Bureau of Energy Efficiency (BEE)
31. Admission Test for IcfaiTech
32. Amrita Schools of Engineering BTech Entrance Exam
33. Annamalai University Engineering Entrance Exam
34. Associate Membership of Institute of Electronics and Telecommunication Engineers (AMIETE)
35. Associate Membership of Institution of Engineers (AMIE)
36. All India Competitive Examination (AICE) for Admissions to Master’s Degree Programmes
37. Avinashilingam University for Women Entrance Exam 2008
38. Indian Institute of Maritime Studies (IIMS) Entrance Exam
39. Marine Engineering & Research Institute (MERI) Entrance Exam
Engineering Entrance Exam dates for each of the listed will be updated shortly.

Anna Univ 3rd Sem Exam time table - Arear Exams of Reg 2008

Anna Univ 3rd Sem Exam time table (Arear Exam )
Anna university ,chennai has recently announced exam dates for third sem (3rd sem) Nov/Dec ,2011 of Regulation 2008.

Anna univ exams (r-2008)
3rd sem timetable for those who reapear for arear exams.

28.11-M3(FN)
29.11-Data Structure &OOPS(FN)
30.11-Electrical Engineering (FN)
01.12-Signal Systems (FN)
02.12-Electronic Circuits 1(FN)
03.12-Digital Electronics (FN)
For Regulation 2001,2008,2010 check this post (Click here)

Have query ? Ask it via comments. .We would reply you as soon as possible. .

TNEA 2011 New Engineering Colleges in Tamilnadu - under Anna University

New Engineering Colleges in Tamil Nadu 2011
As per the mention in Anna University official site,here are the  lists of new engineering colleges that are approved by AICTE , and affiliated to Anna University,Tamil Nadu.


1.Jawahar Engineering College

2.Saraswathy College of Engineering & Technology

3.OAS Institute of Technology and Management

4.Nadar Saraswathi College of Engineering & Technology

5.C.A.R.E School of Architecture

6.Sri Ramana Maharishi College of Engineering

7.Sri Shanmugha College of Engineering & Technology

8.Thamirabharani Engineering College

9.SSM Institute of Engineering and Technology

Tamil Nadu (TANCET) 2011 New Engineering Colleges ,

 Don't forgot to share this useful informations to your friends @facebook , Twitter..

CS2302 Computer Networks Question Bank with Answers -Two marks

CS2302 Computer Networks Question Bank Dowload

Hi friends,hope you all fine,here is an another release of question bank for Computer Networks which comes for ECE in 6th Semester ,Anna University ,Chennai.


You can download this Q'bank and share with your friends,but don't forgot to subscribe for Email Alerts,
For Download of Computer Networks Click here below
View  Download


TWO MARKS

UNIT-I

1. What are the three criteria necessary for an effective and efficient network? 
The most important criteria are performance, reliability and security. 
Performance of the network depends on number of users, type of transmission medium, and the capabilities of the connected h/w and the efficiency of the s/w. 
Reliability is measured by frequency of failure, the time it takes a link to recover from the failure and the network’s robustness in a catastrophe.
Security issues include protecting data from unauthorized access and viruses.


2. Group the OSI layers by function?
The seven layers of the OSI model belonging to three subgroups. 
Physical, data link and network layers are the network support layers; they deal with the physical aspects of moving data from one device to another. 
Session, presentation and application layers are the user support layers; they allow interoperability among unrelated software systems. 
The transport layer ensures end-to-end reliable data transmission.


3. What are header and trailers and how do they get added and removed? 
Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it. This information is added in the form of headers or trailers. Headers are added to the message at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers are removed, and actions appropriate to that layer are taken.


4. What are the features provided by layering?
Two nice features:
• It decomposes the problem of building a network into more manageable components.
• It provides a more modular design.


5. Why are protocols needed? 
In networks, communication occurs between the entities in different systems. Two entities cannot just send bit streams to each other and expect to be understood. For communication, the entities must agree on a protocol. A protocol is a set of rules that govern data communication.


6. What are the two interfaces provided by protocols?
• Service interface 
• Peer interface
Service interface- defines the operations that local objects can perform on the protocol.
Peer interface- defines the form and meaning of messages exchanged between protocol peers to implement the communication service.


7. Mention the different physical media?
• Twisted pair(the wire that your phone connects to)
• Coaxial cable(the wire that your TV connects to)
• Optical fiber(the medium most commonly used for high-bandwidth, long-distance links)
• Space(the stuff that radio waves, microwaves and infra red beams propagate through)


8. Define Signals?
Signals are actually electromagnetic waves traveling at the speed of light. The speed of light is, however, medium dependent-electromagnetic waves traveling through copper and fiber do so at about two-thirds the speed of light in vacuum.


9. What is wave’s wavelength?
The distance between a pair of adjacent maxima or minima of a wave, typically measured in meters, is called wave’s wavelength.


10. Define Modulation?
Modulation -varying the frequency, amplitude or phase of the signal to effect the transmission of information. A simple example of modulation is to vary the power (amplitude) of a single wavelength.


11. Explain the two types of duplex?
• Full duplex-two bit streams can be simultaneously transmitted over the links at the same time, one going in each direction.
• Half duplex-it supports data flowing in only one direction at a time.


12. What is CODEC?
A device that encodes analog voice into a digital ISDN link is called a CODEC, for coder/decoder. 


13. What is spread spectrum and explain the two types of spread spectrum?
Spread spectrum is to Spread the signal over a wider frequency band than normal in such a way as to minimize the impact of interference from other devices.
• Frequency Hopping 
• Direct sequence


14. What are the different encoding techniques?
• NRZ
• NRZI
• Manchester
• 4B/5B


15. How does NRZ-L differ from NRZ-I? 
In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0 and negative for 1. in the NRZ-I sequence, the voltages are meaningless.
Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s. 


16. What are the responsibilities of data link layer? 
Specific responsibilities of data link layer include the following. a) Framing b) Physical addressing c) Flow control d) Error control e) Access control.


17. What are the ways to address the framing problem?
• Byte-Oriented Protocols(PPP)
• Bit-Oriented Protocols(HDLC)
• Clock-Based Framing(SONET)


18. Distinguish between peer-to-peer relationship and a primary-secondary relationship. peer -to- peer relationship?
All the devices share the link equally. 
Primary-secondary relationship: One device controls traffic and the others must transmit through it. 


19. Mention the types of errors and define the terms?
There are 2 types of errors 
• Single-bit error. 
• Burst-bit error. 
Single bit error: The term single bit error means that only one bit of a given data unit (such as byte character/data unit or packet) is changed from 1 to 0 or from 0 to 1.
Burst error: Means that 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.


20. List out the available detection methods. 
There are 4 types of redundancy checks are used in data communication. 
• Vertical redundancy checks (VRC).
• Longitudinal redundancy checks (LRC).
• Cyclic redundancy checks (CRC).
• Checksum. 


21. Write short notes on VRC. 
The most common and least expensive mechanism for error detection is the vertical redundancy check (VRC) often called a parity check. In this technique a redundant bit called a parity bit, is appended to every data unit so, that the total number of 0’s in the unit (including the parity bit) becomes even. 


22. Write short notes on LRC. 
In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is added to the whole block. 
23. Write short notes on CRC. 
The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks (CRC) CRC is based on binary division. Here a sequence of redundant bits, called the CRC remainder is appended to the end of data unit. 


24. Write short notes on CRC checker. 
A CRC checker functions exactly like a generator. After receiving the data appended with the CRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is dropped and the data accepted. Otherwise, the received stream of bits is discarded and the dates are resent. 


25. Define checksum. 
The error detection method used by the higher layer protocol is called checksum. Checksum is based on the concept of redundancy. 


26. What are the steps followed in checksum generator? 
The sender follows these steps a) the units are divided into k sections each of n bits. b) All sections are added together using 2’s complement to get the sum. c) The sum is complemented and become the checksum. d) The checksum is sent with the data. 


27. Mention the types of error correcting methods. 
There are 2 error-correcting methods.
• Single bit error correction 
• Burst error correction.


28. Write short notes on error correction?
It is the mechanism to correct the errors and it can be handled in 2 ways.
• When an error is discovered, the receiver can have the sender retransmit the entire data unit.
• A receiver can use an error correcting coder, which automatically corrects certain errors.
29. What is the purpose of hamming code? 
A hamming code can be designed to correct burst errors of certain lengths. So the simple strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction. 


30. What is redundancy? 
It is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the destination of each unit. 


31. Define flow control?
Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting for acknowledgment. 






32. Mention the categories of flow control?
There are 2 methods have been developed to control flow of data across communication links. a) Stop and wait- send one from at a time. b) Sliding window- send several frames at a time. 


33. What is a buffer? 
Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they are processed. 






UNIIT-II


1. What are the functions of MAC? 
MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a packet. 


2. What are the functions of LLC? 
The IEEE project 802 models take the structure of an HDLC frame and divides it into 2 sets of functions. One set contains the end user portion of the HDLC frame – the logical address, control information, and data. These functions are handled by the IEEE 802.2 logical link control (LLC) protocol. 


3. What is Ethernet?
Ethernet is a multiple-access network, meaning that a set of nodes send and receive frames over a shared link.


4. Define the term carrier sense in CSMA/CD?
All the nodes can distinguish between idle and a busy-link and “collision detect” means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered (collided) with a frame transmitted by another node.


5. Define Repeater?
A repeater is a device that forwards digital signals, much like an amplifier forwards analog signals. However, no more than four repeaters may be positioned between any pairs of hosts, meaning that an Ethernet has a total reach of only 2,500m.


6. Define collision detection?
In Ethernet, all these hosts are competing for access to the same link, and as a consequence, they are said to be in the same collision detection.


7. Why Ethernet is said to be a I-persistent protocol?
An adaptor with a frame to send transmits with probability ‘1 ‘whenever a busy line goes idle.


8. What is exponential back off?
Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of time it waits before trying again. This strategy of doubling the delay interval between each transmission attempt is a general technique known as exponential back off.


9. What is token holding time (THT)?
It defines that how much data a given node is allowed to transmit each time it possesses the token or equivalently, how long a given node is allowed to hold the token.


10. What are the two classes of traffic in FDDI?
• Synchronous
• Asynchronous
11. What are the four prominent wireless technologies?
• Bluetooth
• Wi-Fi(formally known as 802.11)
• WiMAX(802.16)
• Third generation or 3G cellular wireless.


12. Define Bluetooth?
Bluetooth fills the niche of very short-range communication between mobile phones, PDAs, notebook computers, and other personal or peripheral devices. For example, Bluetooth can be used to connect mobile phones to a headset, or a notebook computer to a printer. 


13. What are the four steps involves in scanning?
1. The node sends a Probe frame.
2. All APs within reach reply with a Probe Response frame.
3. The node selects one of the access points, and sends that AP an Association Request frame.
4. The AP replies with an Association Response frame.


14. Explain the term handoff?
If the phone is involved in a call at the time , the call must be transferred to the new base station in what is called a hand off.


15. Define satphones?
Satphones use communication satellites as base stations, communicating on frequency bands that have been reserved internationally for satellite use.


16. How to mediate access to a shared link?
Ethernet,token ring, and several wireless protocols. Ethernet and token ring media access protocols have no central arbitrator of access. Media access in wireless networks is made more complicated by the fact that some nodes may be hidden from each other due to range limitations of radio transmission.


17. Define Aggregation points?
It collects and processes the data they receive from neighboring nodes, and then transmit the processed data. By processing the data incrementally, instead of forwarding all the raw data to the base station, the amount of traffic in the network is reduced.


18. Define Beacons?
Beacon to determine their own absolute locations based on GPS or manual configuration. The majority of nodes can then derive their absolute location by combining an estimate of their position relative to the beacons with the absolute location information provided by the beacons.


19. What is the use of Switch?
It is used to forward the packets between shared media LANs such as Ethernet. Such switches are sometimes known by the obvious name of LAN switches.


20. Explain Bridge?
It is a collection of LANs connected by one or more bridges is usually said to form an extended LAN. In their simplest variants, bridges simply accept LAN frames on their inputs and forward them out on all other outputs.


21. What is Spanning tree?
It is for the bridges to select the ports over which they will forward frames.


22. What are the three pieces of information in the configuration messages?
1. The ID for the bridge that is sending the message.
2. The ID for what the sending bridge believes to the root bridge.
3. The distance, measured in hops, from the sending bridge to the root bridge.


23. What is broadcast?
Broadcast is simple – each bridge forwards a frame with a destination broadcast address out on each active (selected) port other than the one on which the frame was received.


24. What is multicast?
It can be implemented with each host deciding for itself whether or not to accept the message.


25. How does a given bridge learn whether it should forward a multicast frame over a given port?
It learns exactly the same way that a bridge learns whether it should forward a unicast frame over a particular port- by observing the source addresses that it receives over that port.


26. What are the limitations of bridges?
• scale
• heterogeneity




UNIT-III


1. Define packet switching?
A packet switch is a device with several inputs and outputs leading to and from the hosts that the switch interconnects.


2. What is a virtual circuit? 
A logical circuit made between the sending and receiving computers. The connection is made after both computers do handshaking. After the connection, all packets follow the same route and arrive in sequence. 


3. What are data grams? 
In datagram approach, each packet is treated independently from all others. Even when one packet represents just a place of a multi packet transmission, the network treats it although it existed alone. Packets in this technology are referred to as datagram.


4. What is meant by switched virtual circuit? 
Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange.


5. What is meant by Permanent virtual circuit? 
Permanent virtual circuits are comparable to leased lines in circuit switching. In this method, the same virtual circuit is provided between two uses on a continuous basis. The circuit is dedicated to the specific uses. 


6. What are the properties in star topology?
• Even though a switch has a fixed number of inputs and outputs, which limits the number of hosts that can be connected to a single switch , large networks can be built by interconnecting a number of switches.
• We can connect switches to each other and to hosts using point-to point links, which typically means that we can build networks of large geographic scope.


7. What is VCI?
A Virtual Circuit Identifier that uniquely identifies the connection at this switch, and which will be carried inside the header of the packets that belongs to this connection.






8. What is hop-by-hop flow control?
Each node is ensured of having the buffers it needs to queue the packets that arrive on that circuit. This basic strategy is usually called hop-by-hop flow control.


9. Explain the term best-effort?
If something goes wrong and the packet gets lost, corrupted, misdelivered, or in any way fails to reach its intended destination, the network does nothing.


10. What is maximum transmission unit?
MTU- which is the largest IP datagram that it can carry in a frame .


11. Define Routing?
It is the process of building up the tables that allow thwe collect output for a packet to be determined.


12. Define ICMP? 
Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully


13. Write the keys for understanding the distance vector routing?
The three keys for understanding the algorithm are,
• Knowledge about the whole networks 
• Routing only to neighbors 
• Information sharing at regular intervals 


14. Write the keys for understanding the link state routing? 
The three keys for understanding the algorithm are, 
• Knowledge about the neighborhood. 
• Routing to all neighbors. 
• Information sharing when there is a range. 


15. How the packet cost referred in distance vector and link state routing? 
In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link.


16. Define Reliable flooding?
It is the process of making sure that all the nodes participating in the routing protocol get a copy of the link state information from all the other nodes.


17. What are the features in OSPF?
• Authentication of routing messages.
• Additional hierarchy.
• Load balancing.


18. Define Subnetting?
Subnetting provides an elegantly simple way to reduce the total number of network numbers that are assigned. The idea is to take a single IP network number and allocate the IP address with that network to several physical networks, which are now referred to as subnets.


19. What are the different types of AS?
• Stub AS
• Multi homed AS
• Transit AS


20. What is an Area?
An Area is a set of routers that are administratively configured to exchange link-state information with each other. There is one special area- the backbone area, also known as area 0.


21. What is Source Specific Multicast? 
SSM , a receiving host specifies both a multicast group and a specific host .the receiving host would then receive multicast addressed to the specified group, but only if they are from the special sender.


22. What is meant by congestion? 
Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. 


23. Why the congestion occurs in network?
Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.


24. What are the rules of non boundary-level masking? 
• The bytes in the IP address that corresponds to 255 in the mask will be repeated in the sub network address 
• The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub network address 
• For other bytes, use the bit-wise AND operator.


25. What is LSP?
In link state routing, a small packet containing routing information sent by a router to all other router by a packet called link state packet. 




UNIT-IV


1. Explain the main idea of UDP?
The basic idea is for a source process to send a message to a port and for the destination process to receive the message from a port.


2. What are the different fields in pseudo header?
• Protocol number
• Source IP address
• Destination IP addresses.


3. Define TCP?
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol, meaning that each TCP connection supports a pair of byte streams, one flowing in each direction.


4. Define Congestion Control?
It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.




5. State the two kinds of events trigger a state transition?
• A segment arrives from the peer.
• The local application process invokes an operation on TCP.


6. What is meant by segment? 
At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment. 


7. What is meant by segmentation? 
When the size of the data unit received from the upper layer is too long for the network layer datagram or data link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing process is called segmentation. 


8. What is meant by Concatenation?
The size of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. The combining process is called concatenation.


9. What is rate based design?
Rate- based design, in which the receiver tells the sender the rate-expressed in either bytes or packets per second – at which it is willing to accept incoming data.


10. Define Gateway. 
A device used to connect two separate networks that use different communication protocols.










11. What is meant by quality of service?
The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular attribute each service class is associated with a set of attributes. 


12. What are the two categories of QoS attributes? 
The two main categories are,
• User Oriented 
• Network Oriented 


13. List out the user related attributes? 
User related attributes are SCR – Sustainable Cell Rate PCR – Peak Cell Rate MCR- Minimum Cell Rate CVDT – Cell Variation Delay Tolerance.


14. What are the networks related attributes? 
The network related attributes are, Cell loss ratio (CLR) Cell transfer delay (CTD) Cell delay variation (CDV) Cell error ratio (CER). 


15. What is RED?
Random Early Detection in each router is programmed to monitor its own queue length and when it detects that congestion is imminent, to notify the source to adjust its congestion window.


16. What are the three events involved in the connection? 
For security, the transport layer may create a connection between the two end ports. A connection is a single logical path between the source and destination that is associated with all packets in a message. Creating a connection involves three steps: 
• Connection establishment 
• Data transfer
• Connection release




UNIT-V


1. What is the function of SMTP? 
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail Transfer (SMTP). It is a system for sending messages to other computer users based
on e-mail addresses. SMTP provides mail exchange between users on the same or different computers.


2. What is the difference between a user agent (UA) and a mail transfer agent (MTA)? 
The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.


3. How does MIME enhance SMTP?
MIME is a supplementary protocol that allows non-ASCII data to be sent through SMTP. MIME transforms non-ASCII data at the sender site to NVT ASCII data and deliverers it to the client SMTP to be sent through the Internet. The server SMTP at the receiving side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original data. 


4. Why is an application such as POP needed for electronic messaging? 
Workstations interact with the SMTP host, which receives the mail on behalf of every host in the organization, to retrieve messages by using a client-server protocol such as Post Office Protocol, version 3(POP3). Although POP3 is used to download messages from the server, the SMTP client still needed on the desktop to forward messages from the workstation user to its SMTP mail server. 


5. Give the format of HTTP request message?
































6. What is the purpose of Domain Name System? 
Domain Name System can map a name to an address and conversely an address to name. 


7. Discuss the three main division of the domain name space. 
Domain name space is divided into three different sections: generic domains, country domains & inverse domain. 
Generic domain: Define registered hosts according to their generic behavior, uses generic suffixes. 
Country domain: Uses two characters to identify a country as the last suffix. 
Inverse domain: Finds the domain name given the IP address. 


8. Discuss the TCP connections needed in FTP. 
FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred. 


9. Discuss the basic model of FTP. 
The client has three components: the user interface, the client control process, and the client data transfer process. The server has two components: the server control process and the server data transfer process. The control connection is made between the control processes. The data connection is made between the data transfer processes. 


10. Name four factors needed for a secure network?
Privacy: The sender and the receiver expect confidentiality. 
Authentication: The receiver is sure of the sender’s identity and that an imposter has not sent the message. 
Integrity: The data must arrive at the receiver exactly as it was sent. 
Non-Reputation: The receiver must able to prove that a received message came from a specific sender. 


11. How is a secret key different from public key? 
In secret key, the same key is used by both parties. The sender uses this key and an encryption algorithm to encrypt data; the receiver uses the same key and the corresponding decryption algorithm to decrypt the data. In public key, there are two keys: a private key and a public key. The private key is kept by the receiver. The public key is announced to the public. 


12. What is a digital signature? 
Digital signature is a method to authenticate the sender of a message. It is similar to that of signing transactions documents when you do business with a bank. In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data.


13. What are the advantages & disadvantages of public key encryption?
Advantages: 
a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys, keep the private one, and publicly distribute the other one.
b) The no. of keys needed is reduced tremendously. For one million users to communicate, only two million keys are needed. 
Disadvantage: 
If you use large numbers the method to be effective. Calculating the cipher text using the long keys takes a lot of time. So it is not recommended for large amounts of text. 


14. What are the advantages & disadvantages of secret key encryption? 
Advantage: 
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason is that the key is usually smaller. So it is used to encrypt or decrypt long messages. 
Disadvantages: 
a) Each pair of users must have a secret key. If N people in world want to use this method, there needs to be N (N-1)/2 secret keys. For one million people to communicate, a half-billion secret keys are needed. 
b) The distribution of the keys between two parties can be difficult. 


15. Define permutation.
Permutation is transposition in bit level. 
Straight permutation: The no. of bits in the input and output are preserved. 
Compressed permutation: The no. of bits is reduced (some of the bits are dropped). 
Expanded permutation: The no. of bits is increased (some bits are repeated).


16. Define substitution & transposition encryption?
. Substitution: A character level encryption in which each character is replaced by another character in the set. 
Transposition: A Character level encryption in which the characters retain their plaintext but the position of the character changes.


17. Define CGI?
. CGI is a standard for communication between HTTP servers and executable programs. It is used in crating dynamic documents. 


18. What are the requests messages support SNMP and explain it?
• GET
• SET
The former is used to retrieve a piece of state from some node and the latter is used to store a new piece of state in some node.


19. Define PGP?
Pretty Good Privacy is used to provide security for electronic mail. It provides authentication, confidentiality, data integrity, and non repudiation.


20. Define SSH?
Secure Shell is used to provide a remote login, and used to remotely execute commands and transfer files and also provide strong client/server authentication / message integrity.


21. Give the format of HTTP response message?


PART B
UNIT I


1. Explain in detail the error detection and error corrections.(UQ)
2. Discuss in detail about the layers of OSI model. (UQ)
3. Discuss in detail about HDLC.
4. Discuss in detail about SONET.
5. Explain the different approaches of framing in detail.
6. Write the Sliding Window Algorithm and explain it in detail.
7. Compare Stop and Wait ARQ scheme with sliding window ARQ scheme.
8. Write in detail about the flow control mechanisms.
UNIT II
1. Name the four basic network topologies and explain them giving all the relevant features.(UQ)
2. Explain the functioning of wireless LAN in detail.(UQ)
3. Explain Ethernet in detail.
4. Discuss the frame format of token ring in detail.
5. Differentiate FDDI from token ring
6. Write in detail about Resilient Packet Ring.
7. Write short notes on WI-Fi,Wi-Max.
8. Write short notes on Cellphone technologies.


UNIT III
1. Write notes on the following(UQ)
(i) Internet protocol. 
(ii) Routers. 
2. Discuss in detail the various aspects of IPV6. (UQ)
3. What are the different approaches in Packet Switching.Explain them in detail.
4. Write in detail about bridges.
5. Discuss the spanning tree algorithm in detail.
6. What are the limitations of bridges.
7. Explain in detail the ATM cell format.
8. Explain about the different AAL protocols. 
9. Discuss DHCP in detail.
10. Explain Distance Vector routing in detail.
11. Explain OSPF in detail.
12. Discuss RIP in detail.
13. Problems in subnetting.
14. Write short notes on the following
i. Broadcasting
ii. Multicasting
iii. ARP
iv. RARP


UNIT IV
1. With neat architecture, explain TCP in detail. 
2. Explain adaptive flow control in detail and its uses. 
3. With neat architecture, explain UDP in detail.
4. Discuss the different Queuing Discipline in detail.
5. Explain the Congestion Avoidance techniques in detail.
6. Explain TCP Congestion control techniques in detail.
7. Explain how QoS is provided through Integrated Services.
8. Explain how QoS is provided through Differentiated Services.


UNIT V
1. Explain the SMTP and HTTP. Give their uses, state strengths and weaknesses. 
2. Explain the role of a DNS on a computer network. 
3. Explain Email protocols in detail.
4. Discuss FTP in detail.
5. Discuss SNMP and Telnet in detail.
6. Write short notes on
i. PGP
ii. SSH

Like this site ? Please d't forgot to share this with your firends by using Facebook Like button,and ask your needs via comments..

Top 50 Engineering Colleges in India in 2011

Top Engineering Colleges in India 2011
Engineering Colleges are huge in number growing every year ,So for you to know the Top of them all out there here is the list of The Top Engineering college listed below.These rankings were provided on the grade points they earned by their performance in 2010. The IIT Bombay got the 1st place and the check the rank of other colleges also.


Stay tuned @studentsidea and don't forgetto subscribe for feeds and Email Alerts..

TNEA 2011 Anna Univ Admission Complete Guide

TNEA 2011 Anna Univ Admission Procedures
TNEA - 2011 Notification Applications are invited for the unified single window
admission for first year B. E. /B.Tech. Degree Programme 2011 to the University Departments of Anna Universities, Government ,Government Aided Engineering Colleges and for the seats surrendered by the Self – Financing Engineering Colleges.
Update:
3-06-2011 - Know Anna univ Tnea 2011 Random No. And Rank lists dates
.
All the new updates regarding Tnea 2011 and the councelling dates for each groups will be published as soon as we get announced.Stay Tuned!!



Tnea 2011 Application Process
Take a note of following informations.
1. In Person -Tnea 2011Candidates can obtain the application form in person
from the centres detailed
below by paying Rs.500/-
(Rs.250/- in case of SC/ST
candidates belonging to Tamil Nadu) towards registration fee, by cash/demand draft.

2.Tnea 2011 - By Post
Application forms can also be obtained by post from "The Secretary,
Tamil Nadu Engineering
Admissions (TNEA),
Anna University Chennai ,
Chennai - 600 025
by sending a
request letter along with a Demand Draft for Rs.700/- and (Rs.450/- in case of SC/ST candidates belonging to Tamil
Nadu) and an address label written in capital letters to which the application is to be
mailed.

3.Apply Tnea 2011 Online
candidates can also register through internet by logging on to
www.annauniv.edu/tnea2011. After entering the required information in the application form, press the submit button, then take a printout, affix a photograph and affix the signature at the appropriate spaces provided. The printout application along with the registration fee in the form of a D.D. only should be sent along with all the enclosures by Speed / Registered post to the address given below.

4.Special Reservations
Candidates seeking admission under Special reservation category should enclose a separate special reservation application along with the main application together with a DD for Rs.100/- for each special reservation with attested xerox copies of required documents.

*Sports Quota - Tnea 2011
The applicants under Sports Quota should submit Tnea 2011 applications along with all the documents only in person.

5. Submission of filled-in applications - Tnea 2011.

Candidates have to send the filled-in application along with attested xerox copies of Mark Sheet(s) and attested xerox copies of all other certificates, or documents to
" The Secretary,
Tamil Nadu Engineering Admissions 2011,
Anna University Chennai , Chennai - 600 025
"

Application to be sent on or before 03.06.2011 (5.30 p.m.)

All Demand Drafts should be drawn in favour of “The Director, Admissions, Anna University Chennai” payable at Chennai, drawn on any Nationalised Bank dated on or after 15.05.2011. Candidates are instructed to write the name and address on the reverse side of the Demand Draft. SC/ST candidates belonging to Tamil Nadu who want to avail Registration fee concession (Rs.250/-) should produce a xerox copy of the Community certificate obtained from competent authority.
Tnea2011 :
Telephone No. 044 - 2235 8265, 2235 8266 and2235 8267,8

Issue Dates and Time 16.05.2011 to 31.05.2011, 9.30 a.m. to 5.30 p.m.

Last date for Tnea 2011 Submission of filled in applications 03.06.2011 (5.30 p.m.)

For further details please contact: No. 044 - 2235 8265, 2235 8266 and 2235 8267,8.

For further details visit Anna University website
http:// www.annauniv.edu/

Share with your friends!
Ask your doubts via comments?


AIEEE Key 2011 Download Now Online

AIEEE Answers Key book 2011 Online
Those who appeared for Aieee exam 2011 can now get the key book.

Download AIEEE Key 2011
Students can now download the full key book / answer book of Aieee 2011 from below site.
Download AIEEE Key 2011
Direct Link ! Get it !

Stay wit Us! share the articles to your friends via Facebook,Twitter,!

VLSI Theory and Application a complete book

< Vlsi design theory and application free material,download this !! and share your viwes..!! Download this file



VLSI theory and applications free material


Like this file..?

share it on facebook,and twitter to be useful to your friends too.

Question Bank for Engineering Graphics


The model question bank for Engineering graphics for first year under Anna University.
UNIT – I (PLANE CURVES & FREEHAND SKETCHING
a) ELLIPSE, PARABOLA & HYPERBOLA
1. Draw the locus of a point P moving so that the ratio of its distance from a fixed point F to
its distance from a fixed straight line DD’ is ¾ . Also draw tangent and normal to the curve
from any point on it.
2. Construct an ellipse given the distance of the focus from the directrix as 60 mm and
eccentricity as 2/3. Also draw tangent and normal to the curve at a point on it 20 mm
above the major axis.
3. Construct a parabola given the distance of the focus from the directrix as 50 mm. Also
draw tangent and normal to the curve from any point on it.
4. Draw the locus of a point P moving so that the ratio of its distance from a fixed point F to
its distance from a fixed straight line DD’ is 1. Also draw tangent and normal to the curve
from any point on it.
5. Draw a hyperbola when the distance between the focus and directrix is 40 mm and the
eccentricity is 4/3. Draw a tangent and normal at any point on the hyperbola.
b) CYCLOIDS & INVOLUTES
6. Draw the involute of a square of side 30 mm. Also draw tangent and normal to the curve
from any point on it.
7. A coir is unwound from a drum of 30mm diameter. Draw the locus of the free end of the
coir for unwinding through an angle of 360°. Draw also a tangent and normal at any point
on the curve.
8. A circle of 50 mm diameter rolls along a straight line without slipping. Draw the curve
traced by a point P on the circumference for one complete revolution. Draw a tangent and
normal on it 40 mm from the base line.
9. Draw an epicycloids generated by a rolling circle of diameter 40 mm and the diameter of
the directing circle is 140 mm. Also draw tangent and normal to the curve from any point
on it.
10. Draw a hypocycloid generated by a rolling circle of diameter 50 mm and the diameter of
the directing circle is 240 mm. Also draw tangent and normal to the curve from any point
on it.


UNIT – II (PROJECTION OF POINTS, LINES & PLANE SURFACES)
a) POINTS
1. Mark the projections of the following points on a common reference line:
P, 35 mm behind the VP and 20 mm below the HP.
Q, 40 mm in front of VP and 30 mm above the HP.
R, 50 mm behind the VP and 15 mm above the HP.
S, 40 mm below the HP and in the VP.
2. A point C is on HP and 15 mm behind VP. Another point D is also on HP and 40 mm in
front of VP. The distance between their projectors is 45 mm. Join their front views and
determine inclination of this line with XY line.
3. A point P is on HP and 20 mm in front of VP. Another point Q is also on HP and behind
VP. The distance between their end projectors is 60 mm. Draw its projections if the line
joining P & Q makes an angle of 60º with the reference line. Also find the positions of
point P and Q.
b) LINES
4. A line PQ, 50 mm long is perpendicular to HP and 15 mm in front of VP. The end P
nearer to HP 20 mm above it. Draw the projections of the line.
5. A line PQ, 60 mm long has one end P, 20 mm above the HP and 35 mm in front of VP.
The line is parallel to HP. The front view has a length of 50 mm. Find its true inclinations
with VP.
6. A line NS, 80 mm long has its end N,10 mm above the HP and 15 mm in front of VP. The
other end S is 65 mm above the HP and 50 mm in front of VP. Draw the projections of the
line and find its true Inclination with HP and VP.
7. The end P of a line PQ is 30 mm above HP and 35 mm in front of VP. The line is inclined
at 35° to HP. Its top view is 70 mm long inclined at 40° to XY. Draw the projections of
straight line. Find the true length and inclination of the line with VP.
8. A line MN has its end M, 15 mm in front of VP and 20 mm above the HP. The other end N
is 55 mm in front of VP. The front view has a length of 80 mm. The distance between end
projectors is 65 mm. Draw the projections of line. Find its true length and true inclinations
by trapezoidal method.
9. The mid point of a line AB, 80 mm long, is 30 mm above HP and 45 mm in front of VP.
The line is inclined at 30º to HP and 50º to VP. Draw the projections.
10. A straight line ST has its end S, 10 mm in front of VP and nearer to it. The mid point ‘m’ of
the line is 50 mm in front of VP and 40 mm above HP. The front and top views measure
90 mm and 120 mm respectively. Draw the projections of the line. Also, find the true
inclinations with VP and the HP.
11. A line MN has its end M, 10 mm in front of VP and 15 mm above HP. The other end N is
50 mm in front of VP. The front view has a length of 70 mm. The distance between the
end projectors is 60 mm. Draw the projections of the line. Find its true length, true
inclinations and traces by trapezoidal method.
c) PLANE SURFACES
12. A regular hexagonal lamina of side 30 mm rests on one of its edges on HP. The lamina
makes 60°with HP and the edge on which it is resting makes an angle of 60° with VP.
Draw its projections.
13. A circular plate of diameter 70 mm has the end P of the diameter PQ in the HP and the
plate is inclined at 40° to HP. Draw its projections when the diameter PQ appears to be
inclined at 45° to VP in the top view.
14. A hexagonal plate of side 20 mm rests on the HP on one of its sides inclined at 45° to VP.
The surface of the plate makes an angle of 30° with the HP. Draw the front view and top
view of the plate.

UNIT – III (PROJECTION OF SOLIDS)
1. A cube of side 40 mm rests on the HP on one of its ends with a vertical face inclined at
40° to VP. Draw its projections (top view, front view and side view).
2. A pentagonal prism of base side 30 mm and axis length 55mm is lying on the ground on
one of its rectangular faces. Draw its top view, front and left side view when its axis is
perpendicular to VP and the end nearer to the VP is 15 mm away from it.
3 A hexagonal prism of base side 30 mm and axis length 60 mm rests on the HP on one of
its base edges with its axis inclined at 60° to HP and parallel to the VP. Draw its top and
front views.
4. A cylinder of diameter 30 mm and axis length 50 mm is resting on the HP on a point so
that its axis is inclined at 45° to HP and parallel to VP. Draw its top and front views.
5. A hexagonal prism, side of base 20mm and axis 60mm long lies on one of its longer
edges on HP and its axis is parallel to both HP and VP. Draw its projections.
6. Draw the projection of a cone of diameter 40mm and height 70mm lying on the ground on
one of its base points with a generator perpendicular to HP.
7. A cone of base diameter 50mm and axis length 65mm is resting on H.P on a point
on the circumference of the base with its axis inclined at 400 to V.P and parallel to
H.P. Draw its Projections.
8. A square prism of base side 35mm and axis length 60mm lies on the HP on one of its
longer edges with its faces equally inclined to the HP. Draw its projections when its axis
is inclined at 300 to the VP.
9. A square pyramid of base side 35mm and axis length 65mm is resting on HP on one of its
triangular faces with its axis parallel to VP. Draw its projections.
10. A right pentagonal pyramid of side 20 mm and altitude 50 mm rests on one of its edges of
the base in the HP. The base being tilted up such that the apex is 30 mm above HP.
Draw the projection of the pyramid when the edge on which it is resting is perpendicular
to VP.
11. A hexagonal pyramid of side 25mm, axis 75 mm long lies with one of its triangular faces
on the HP and its axis parallel to VP. Draw its projections.

UNIT – IV (SECTION OF SOLIDS AND DEVELOPMENT OF SURFACES)
SECTION OF SOLIDS
1. A cube of side 30 mm rests on the HP on its end with the vertical faces equally inclined to
the VP. It is cut by a plane perpendicular to the VP and inclined at 30° to HP meeting the
axis at 25 mm above the base. Draw its front view, sectional top view and true shape of
the section.
2. A pentagonal prism of base side 40mm and height 85mm rests on the H.P such that two
of its base edges are equally inclined to VP. It is cut by a plane perpendicular to the V.P
and inclined 450 to the H.P. The cutting plane meets the axis at 30mm from the top. Draw
the front view, sectional top view and true shape of the section.
3. A hexagonal prism of side of base 20 mm and length 60 mm rests on HP with its axis
being vertical and one edge of its base inclined at 15° to VP. The solid is cut by a plane
perpendicular to VP and inclined at 40° to HP and bisecting the axis of the prism. Draw
the projections of the prism and true shape of thesection.
4. A cylinder of diameter 50mm and height 60mm rests on its base on H.P. It is cut by a
plane perpendicular to V.P. and inclined at 450 to H.P. The cutting plane meets the axis at
a distance of 15mm from the top. Draw the sectional plan and true shape of the section.
5. A right circular cone of base diameter 50mm and axis length 60mm rests on its base on
the H.P. It is cut by a plane perpendicular to the H.P and inclined at 600 to the VP. The
shortest distance between the cutting plane and the top view of the axis is 8mm. Draw the
top view, sectional front view and the true shape of the section.
6. A pentagonal pyramid of base side 20mm and altitude 55mm rests on its base on HP with
one base edge being perpendicular to VP. It is cut by plane inclined at 500 to base. The
cutting plane meets the axis at 15mm above the base. Draw the front view, sectional top
view and true shape of the section
7. A hexagonal pyramid of base side 25mm and axis 55 mm rests on its base on the HP
with two base edges perpendicular to VP. It is cut by a plane perpendicular to VP and
inclined at 30° to HP, meeting the axis at 20mm from the vertex. Draw its front view,
sectional top view and true shape of the section.
8. A square pyramid of base side 25mm and altitude 40mm rests on the HP on its base with
the base edges equally inclined to the VP. It is cut by a plane perpendicular to the VP and
inclined at 30° to the HP meeting the axis at 21mm above the HP .Draw the sectional top
view and the true shape of the section.
9. A cone of base diameter 50mm and altitude 60mm rests on its base on the HP. It is cut
by a plane perpendicular to the VP and inclined at 400 to the HP. The cutting plane
meets the axis at 30mm from the vertex .Draw the sectional top view.
10. A cone of base diameter 50mm and altitude 60mm rests on its base on the HP . It is cut
by a plane perpendicular to the VP and parallel to one of the extreme generators , 10mm
away from it .Draw the sectional top view and the true shape of the section
DEVELOPMENT OF SURFACES
1. A pentagonal prism of base side 30 mm and axis height 75 mm is resting on its base on
HP with two of its lateral surfaces parallel to VP. It is cut by plane perpendicular to VP
and inclined at 45º to HP, bisecting the axis. Draw the development of lateral surfaces of
the lower portion of the prism.
2. A hexagonal prism of base side 30 mm and axis height 70 mm is resting on its base on
HP with one of its faces parallel to VP. It is cut by plane perpendicular to VP and inclined
at 35º to HP, meeting the axis at a distance of 40 mm from the base. Draw the
development of lateral surfaces of the lower portion of the prism
3. A pentagonal prism of base side 30 mm and height 60 mm is cut by a plane
perpendicular to VP and 50º to HP and passing through the axis at a height of 35 mm
above the base. Draw the development of the lower portion of the solid.
4. A hexagonal prism of side of base is 25 mm and height 55mm rests with its base on HP
and one of its rectangular faces is parallel to VP. A circular hole of 40 mm diameter is
drilled through the prism such that the axis of the hole bisects the axis of the prism at right
angles and is perpendicular to VP. Draw the development of the lateral surface of the
prism with the hole.
5. A cylinder of diameter 45 mm and height 70 mm is resting vertically on one of its ends on
the HP. It is cut by a plane perpendicular to VP and inclined at 45º to HP. The plane
meets the axis at a point 35 mm above the base. Draw the development of the lateral
surface of the lower portion of the truncated cylinder.
6. A vertical chimney of 60 m diameter joins a roof sloping at an angle of 35º with the
horizontal. The shortest portion over the roof is 25 m. Determine the shape of the sheet
metal from which the chimney can be fabricated. Take a scale of 1:20.
7. A right circular cone of base diameter 50 mm and height 75 mm is resting on its base on
the ground. It is cut by a plane perpendicular to VP and inclined at 30º to HP. The cutting
plane bisects the axis of the cone. Draw the development of the lateral surface of the
truncated cone.
8. A cone of base diameter 50 mm and height 75 mm rests vertically on its base on the
ground. A string is wound around the curved surface of the cone starting from the left
extreme point on the base and ending at the same point. Find the shortest length of the
string required. Also trace the path of the string in front and top views.
9. A hexagonal pyramid of base side 30 mm and height 65 mm rests on its base on the
ground with a base edge parallel to VP. It is cut by a plane perpendicular to VP and
inclined at 55º to HP and meets the axis at a height of 30 mm from the base. Draw the
lateral surface development.
10. A square pyramid of base side 25 mm and altitude 50 mm rests on its base on the HP
with two side of the base parallel to VP. It is cut by a plane bisecting the axis and inclined
at 30º to the base. Draw the development of the lower part of the pyramid.
11. A pentagonal pyramid of base side 30 mm and height 70 mm is resting vertically on its
base on the ground with one of its base edge parallel to VP. It is cut by a plane
perpendicular to VP and parallel to HP at a distance of 35 mm above the base. Draw the
development of the lateral surfaces of the frustum of pyramid. Also show the sectional
plan view.
12. A pentagonal prism of base side 25mm and height 60mm stands on one of its ends on
the HP with a rectangular face parallel to the VP.A hole of diameter 30mm is drilled
centrally through the prism in such a way that the axis of the hole bisects the axis of the
prism at right angles. The axis of the hole is perpendicular to the VP. Draw the
development of the lateral surfaces of the prism.
13. A circular hole of diameter 30mm is drilled through a vertical cylinder of diameter 50mm
and height 65mm .The axis of the hole is perpendicular to the VP and meets the axis of
the cylinder at right angles at a height of 30mm above the base. Draw the development of
the lateral surface of the cylinder.

UNIT – V ISOMERTIC AND PERSPECTIVE PROJECTION
ISOMERTIC PROJECTION
1. A cylinder of height 65 mm and diameter 40 mm is resting on its base on the HP. It is cut
by a plane perpendicular to VP and inclined at 30º to the HP. The plane passes through a
point on the axis located at 25 mm from the top. Draw the isometric projection of the cut
cylinder.
2. A frustum of a square pyramid of bottom edge 50 mm, top edge 25 mm and height 50
mm. Draw the isometric projection of the frustum.
3. A hexagonal pyramid of base 25 mm and height 60 mm stands with its base on the HP
with an edge of base parallel to VP. A horizontal plane cuts the pyramid and passes
through a point on the axis at a distance of 30 mm from the apex. Draw the isometric
projection of the frustum of the pyramid.
4. A pentagonal pyramid of base side 30 mm and height 65 mm stands with its base on HP
with a side of base perpendicular to VP. It is cut by a plane inclined at 30º to HP and
perpendicular to VP and passes through a point at a distance of 30 mm from the apex.
Draw the isometric view of the bottom portion of the pyramid.
5. Draw the isometric projection of a hexagonal prism of base side 25 mm and height 50
mm when it rests on one of its ends on HP with two its base sides parallel to VP.
6. A cone of 50 mm diameter and height 70 mm stands on HP with its base. It is cut by a
cutting plane perpendicular to VP and inclined at 30º to HP, cutting the axis of the cone at
a height of 40 mm from the base. Draw the isometric view of the remaining part of the
cone.
PERSPECTIVE PROJECTION
1. A cube of side 40mm is resting on the ground on one of its faces, with a vertical
face in PP and the rest behind it. The central plane is located 50mm to the left of
the axis of the cube. This station point is 40mm in front of PP and 60mm above
GP. Draw the perspective view of the solid.
2. A square pyramid of side of base 50mm and altitude 70mm stands on the ground
vertically with an edge of base parallel to and 20mm behind PP. The station point
is 40mm in front of PP and 70mm above the ground. The central plane is located
45mm to the left of the axis of the solid. Draw the perspective view of the solid.
3. A Pentagonal pyramid of 30mm base side and axis height 40mm is standing on its
base on the ground Plane with a base side parallel to and 25mm behind PP. The
central plane is 35mm to the left of the apex and the station point is 40mm in front
of PP and 20mm above the GP. Draw the perspective view of the solid.
4. A cylinder of diameter 40mm and height 65mm rests with its base on the GP such
that the axis is 25mm behind the PP. The station point is 30mm in front of the PP
and 110mm above the GP and lies in a central plane which is 65mm to the right of
the axes of the solids. Draw the perspective view of the cylinder.
5. Draw the perspective projection of a square prism of base side 40 mm and height 50 mm.
One of the vertical lateral faces is parallel to PP and 30 mm behind it. The station point is
80 mm from the PP and 80 mm above the ground and 60 mm to the right of the axis of
the prism. (Use visual ray method).

Sixth semester ECE syllabus

Sixth semester ECE syllabus for Anna University,and all its affiliated colleges,Chennai.


Electronics and communication Engineering syllabus -

Information Technology Syllabus


IT

Computer Architecture Question Bank

QUESTION BANK

CS1251   COMPUTER ARCHITECTURE
All Possible question in all the 5 units.     or view n download online at Docstoc


UNIT I:BASIC STRUCTURE OF COMPUTER


Part – A( 2Marks)
1. What is meant by the stored program concept?
2. What are the basic functional units of a computer?
3. What is the use of buffer register?
4. Define memory access time.
5. Write the differences between RISC and CISC.
6. What is meant by MAR and MDR?
7. What is an interrupt?
8. Why data bus is bidirectional in most microprocessors?
9. What do you mean by multiprogramming or multitasking?
10. Give the basic performance equation.
11. What are the limitations of assembly language?
12. What are the two techniques used to increase the clock rate R?
13. What are big-endian and little-endian representations?
14. What is the information conveyed by addressing modes?
15. What are the different types of addressing modes available?
16. What is indirect addressing mode?
17. What is indexed addressing mode?
18. Define auto increment mode of addressing?
19. Define auto decrement mode of addressing?
20. What are condition code flags?
21. What is the use of assembler directive?
22. What is meant by straight – line sequencing?
23. What is stack?
24. Which data structure is best supported using indirect addressing mode?
25. What are the differences between Stack and Queue?
Part – B
1. Explain the basic functional units of a simple computer. (8)
2. Explain the basic I/O operations of modern processors. (8)
3. Explain various addressing modes found in modern processors (16)
4. Explain various assembler directives used in assembly language program (8)
5. What are stack and queues? Explain its use and give its differences (10)
6. What are the various types of ISAs possible? Discuss. (8)
7. Discuss the various issues to be considered while designing the ISA of a processor.(8)




UNIT II:ARITHMETIC UNIT


Part - A( 2Marks)
1. Draw the full adder circuit using two half adders and give the truth table.
2. Why floating point number is more difficult to represent and process than integer?
3. What are the two approaches used to reduce delay in adders?
4. What is a carry look-ahead adder?
5. Discuss the principle behind the Booth’s algorithm?
6. How can we speed up the multiplication process?
7. What is bit pair recoding? Give an example.
8. What are the two methods of achieving the 2’s complement?
9. What is the advantage of using Booth algorithm?
10. Write the algorithm for restoring division.
11. Write the algorithm for non restoring division.
12. Define IEEE floating point single and double precision standard.
13. When can you say that a number is normalized?
14. Explain about the special values in floating point numbers.
15. Write the Add/subtract rule for floating point numbers.
16. Write the multiply rule for floating point numbers.
17. What is the purpose of guard bits?
18. What are the ways to truncate the guard bits?
19. Define carry save addition (CSA) process.
20. What are generated and propagate function?
21. What is excess-127 format?
22. What is a ripple carry adder?
23. Draw the structure of 4-bit MSI ALU circuit block.
24. What are the various ways of representing signed integers in the system?
25. Give the booth’s recoding and bit pair recoding of the number 1000011100100101.
Part – B
1. Discuss the principle of operation of carry-look ahead adders. (8)
2. Discuss the non-restoring division algorithm. Simulate the same for 23/5. (8)
3. Multiply the following pair of signed 2’s complements numbers using bit pair recoded
multiplier: Multiplicand = 110011 Multiplier = 101100. (8)
4. With a neat sketch, Explain in detail about logic design for fast adders. (16)
5. Describe how the floating-point numbers are represented and used in digital arithmetic operations. Give an example. (16)
6. Explain the representations of floating point numbers in detail. (6)
7. Design a multiplier that multiplies two 4-bit numbers. (6)
8. Give the block diagram of the hardware implementation of addition and subtraction ofsigned number and explain its operations. (10)
9. Explain the working of floating point adder and subtractor. (10)




UNIT III:BASIC PROCESSING UNIT


Part – A( 2Marks)
1. What are the limitations of super scalar device?
2. Define pipeline speedup.
3. What is a processor clock?
4. Write down the control sequence for Move (R1), R2.
5. What is the function of a TLB (translation look-aside buffer)?
6. What is the WMFC step needed when reading from or writing to the main memory?
7. Define register file.
8. Define the hardware organization of two-stage pipeline?
9. What is the role of cache memory in pipeline?
10. Name the methods for generating the control signals.
11. Define hardwired control.
12. Discuss the principle of operation of a micro programmed control.
13. Differentiate micro programmed control from hardwired control.
14. Define parallelism in microinstruction.
15. What are the types of microinstructions available?
16. Differentiate horizontal microinstruction from vertical microinstruction.
17. What is MFC?
18. What are the major characteristics of a pipeline?
19. What is a pipeline hazard?
20. What is data hazard?
21. What is instruction or control hazard?
22. Define structural hazards.
23. What is side effect?
24. What do you mean by branch penalty?
25. What is branch folding?
26. What do you mean by delayed branching?
27. What are the two types of branch prediction techniques available?
28. What is the ideal speedup expected in a pipelined architecture with n stages. Justify your answer.
29. Draw the structure of two stage instruction pipeline.
Part – B
1. Give the organization of typical hardwired control unit and explain the functions
performed by the various blocks. (16)
2. Discuss the various hazards that might arise in a pipeline. What are the remedies commonly adopted to overcome/minimize these hazards. (16)
3. Explain in detail about instruction execution characteristics. (16)
4. With a neat block diagram, explain in detail about micro programmed control unit and explain its operations. (16)
5. Explain the execution of an instruction with diagram. (8)
6. Explain the multiple bus organization in detail. (8)
7. Explain the function of a six segment pipeline showing the time it takes to process eight tasks. (10)
8. Highlight the solutions of instruction hazards. (6)
9. Explain the instruction cycle highlighting the sub-cycles and sequence of steps to be followed. (8)




UNIT IV:MEMORY SYSTEM


Part – A( 2Marks)
1. Define Memory Access time for a computer system with two levels of caches.
2. How to construct an 8M * 32 memory using 512 K * 8 memory chips.
3. Write two advantages of MOS device.
4. List the factors that determine the storage device performance.
5. What will be the width of address and data buses for a 512K * 8 memory chip?
6. Define memory cycle time.
7. What is RAM?
8. What is cache memory?
9. Explain virtual memory.
10. List the various semiconductors RAMs?
11. What do you mean by static memories?
12. Define DRAM’s.
13. Define DDR SDRAM.
14. What is ROM?
15. What is the mapping procedures adopted in the organizatio n of a cache Memory?
16. Give the format for main memory address using direct mapping function for 4096 blocks
in main memory and 128 blocks in cache with 16 blocks per cache.
17. Give the format for main memory address using associative mapping function for 4096
blocks in main memory and 128 blocks in cache with 16 blocks per cache.
18. Give the format for main memory address using set associative mapping function for 4096 blocks in main memory and 128 blocks in cache with 16 blocks per cache.
19. Define Hit and Miss rate?
20. What are the enhancements used in the memory management?
21. What is meant by memory management unit?
22. What is meant by memory interleaving?
23. What do you mean by seek time?
24. What is disk controller?
25. What is RAID?
26. Define data stripping?
27. How the data is organized in the disk?
28. Define latency time.
29. What is the significance of TLB?
Part – B
1. Discuss the various mapping techniques used in cache memories. (8)
2. A computer system has a main memory consisting of 16 M words. It also has a 32Kword cache organized in the block-set-associative manner, with 4 blocks per set and 128 words per block.
1. Calculate the number of bits in each of the TAG, SET and WORD fieldsof the main memory address format.
2. How will the main memory address look like for a fully associative
mapped cache? (8)
3. Explain the concept of virtual memory with any one virtual memory management technique. (8)
4. Give the basic cell of an associative memory and explain its operation. Show how associative memories can be constructed using this basic cell. (8)
5. Give the structure of semiconductor RAM memories. Explain the read and write operations in detail. (16)
6. Explain the organization of magnetic disks in detail. (8)
7. A digital computer has a memory unit of 64K*16 and a cache memory of 1K words.The cache uses direct mapping with a block size of four words. How many bits are there in the tag, index, block and word fields of the address format? How many blocks can the caches accommodate? (10)
8. Explain the concept of memory hierarchy. (6)




UNIT V:I/O ORGANIZATION

Part – A( 2Marks)
1. What are the functions of I/O interface?
2. How does the processor handle an interrupt request?
3. What are the necessary operations needed to start an I/O operation using DMA?
4. What are the three types of channel usually found in large computers?
5. Why does a DMA have priority over the CPU when both request a memory transfer?
6. What is the advantage of using interrupt initiated data transfer?
7. Why do you need DMA?
8. What is the difference between subroutine and interrupt service routine?
9. What is the need for interrupt masks?
10. How does bus arbitration typically works?
11. How does a processor handle an interrupt?
12. Distinguish synchronous bus and asynchronous bus.
13. Why I/O devices cannot be directly be connected to the system bus?
14. What are the major functions of I/O system?
15. What is an I/O interface?
16. Write the factors considered in designing an I/O subsystem?
17. Explain Direct Memory Access.
18. Define DMA controller.
19. What is polling?
20. What is the need of Interrupt controller?
21. What is a priority interrupt?
22. Define bus.
23. Define synchronous bus.
24. Define asynchronous bus.
25. State the differences between memory mapped I/O and I/O mapped I/O.
26. Define interrupt.
27. Define exception.
28. What are the different methods used for handling the situation when multiple interrupts
occurs?
29. What is a privileged instruction?
30. What is bus arbitration?
31. What is port? What are the types of port available?
32. What is a parallel port?
33. What is a serial port?
34. What is PCI bus?
35. What is SCSI?
36. Define USB.
Part – B
1. Explain the functions to be performed by a typical I/O interface with a typical input output
interface. (16)
2. Discuss the DMA driven data transfer technique. (8)
3. Discuss the operation of any two input devices (8)
4. Explain in detail about interrupt handling. (16)
5. Explain in detail about standard I/O interface. (16)
6. Describe the functions of SCSI with a neat diagram. (16)
7. What is the importance of I/O interface? Compare the features of SCSI and PCI
interfaces. (8)
8. Write note on the following.
1. Bus arbitration
2. Printer process communication
3. USB
4. DMA (16)
9. Explain the use of vectored interrupts in processes. Why is priority handling desired in interrupt controllers? How does the different priority scheme work? (8)


post your comments and views below at comments