SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
www.jntuworld.com                                                                                     www.jwjobs.net




              Code No. N0521
                                                         R07                               Set No.1
                    IV B.Tech I Semester Supplementary Examinations, February/March, 2012
                                       NETWORK PROGRAMMING
                    (Common to Computer Science & Engineering and Information Technology)

            Time: 3 hours                                                            Max. Marks: 80
                                            Answer any FIVE Questions
                                          All Questions carry equal marks
                                                         *****
               1. a) Distinguish between UDP & TCP protocol.
                  b) What are the limitations on the size of the IP datagram? How they affect the
                     data transmitted by an application.



                                                                                  L D
               2. Write the syntax and explain each of the following socket functions.



                                                                    R
                         a) Listen                     b) Close and related
                         c) Connect                    d) Bind



                                                                  O
               3. a) Explain about terminate and signal handling server process termination.
                  b) Discus about TCP Echo server functions.




                                               U W
               4. a) Explain about IPV6 Socket option and TCP socket options.
                  b) Make a comparison of the five different I/O models.




                               N T
               5. a) Explain about Lack of flow control with UDP.
                  b) Describe the important functions of UDP echo server.



                         J
               6. a) Explain the use of uname function with an example?
                  b) Discuss the use of gethostbyname function with an example?

               7. a) Explain about File and Record Locking?
                  b) Explain how semaphores are used to synchronize the access to the shared
                      memory segments?

               8. Discuss about terminal modes and control terminals?




                                                      1of 1




                                                 www.jntuworld.com
www.jntuworld.com                                                                                         www.jwjobs.net




              Code No. N0521                             R07                                Set No.2
                    IV B.Tech I Semester Supplementary Examinations, February/March, 2012
                                       NETWORK PROGRAMMING
                    (Common to Computer Science & Engineering and Information Technology)

              Time: 3 hours                                                              Max. Marks: 80
                                             Answer any FIVE Questions
                                           All Questions carry equal marks
                                                         *****



                                                                                     D
               1. a) With the help of a neat sketch explain the steps and buffers involved when an
                     application writes to a TCP socket.




                                                                    R
               2. a) Explain byte ordering and byte manipulating functions.        L
                  b) Summarize the protocol usage of any 4 common Internet applications.


                  b) Explain about and exec function and close function and related function


                                                                  O
               3. a) Explain about normal startup and termination between client and server.




                                               U W
                  b) Explain the procedure steps for crashing, rebooting and shutdown of server hosts.

               4. a) What socket options are processed by IPv6 with a level of IPPROTO_IPv6?



                                 T
                     Explain.
                  b) Explain protocol independent socket options.




                         J     N
               5. Explain the UDP client-server application for echoing the text given by the user.

               6. a) Describe geteservbyname and getservbyport fuctions with example.
                  b) Explain about Resolver options.

               7. a) What are the advantages of FIFO’s over pipes? Explain stream and messages
                     with example.
                  b) Discuss the importance of message queue? Explain different functions.

               8. a) Explain about RPC transparency issues.
                  b) Briefly explain on Pseudo-Terminals.



                                                         1of 1




                                                 www.jntuworld.com
www.jntuworld.com                                                                                      www.jwjobs.net




              Code No. N0521                             R07                                Set No.3
                    IV B.Tech I Semester Supplementary Examinations, February/March, 2012
                                        NETWORK PROGRAMMING
                    (Common to Computer Science & Engineering and Information Technology)

            Time: 3 hours                                                             Max. Marks: 80
                                             Answer any FIVE Questions
                                           All Questions carry equal marks
                                                          *****
               1. a) Draw the OSI seven layered model along with the approximate mapping to
                     the internet protocol suite. Explain the functions offered by each layer?

                     protocol?


                                                                                     L D
                  b) Explain how TCP connection is established using Three-way handshake




                                                                     R
               2. a) Discuss IPv4 socket address structure and the significance of each field?
                  b) Explain byte ordering and byte manipulating functions?



                                                                   O
               3. a) Explain the procedure steps for rebooting and shutdown of server hosts.
                  b) Discuss about signal handling server process termination?

               4. Write short note on
                                 a) Batch input
                                               U W              b) select function




                               N T
                                 c) Shutdown function           d) poll function

               5. Write a program for UDP Echo Server and Echo client and Explain?



                         J
               6. Explain the following functions
                                 a) gethostbyname       b) uname

               7. a) What is semaphore ? Explain how locking can be achieved with
                     semaphores?
                  b) What is pipe? How are Pipes are different from FIFO’s?

               8. a) Briefly discuss overview of rlogin with an Example?
                  b) Explain about Terminal line disciplines?



                                                        1of 1




                                                  www.jntuworld.com
www.jntuworld.com                                                                                         www.jwjobs.net




              Code No. N0521
                                                         R07                                  Set No.4
                    IV B.Tech I Semester Supplementary Examinations, February/March, 2012
                                       NETWORK PROGRAMMING
                    (Common to Computer Science & Engineering and Information Technology)

              Time: 3 hours                                                              Max. Marks: 80
                                            Answer any FIVE Questions
                                           All Questions carry equal marks
                                                         *****
               1. a) What are the limitations on the size of the IP datagram? How they affect the data
                     transmitted by an application.




                                                                                   L D
                  b) Summarize the protocol usage of any 4 common Internet applications.

               2. Write the syntax and explain each of the following socket functions.



                                                                    R
                                 a) Accept                     b) Close and related
                                 c) Connect                    d) Bind

               3. a) Discus about TCP Echo server functions
                                                                  O
                  b) Explain the procedure steps for crashing and shutdown of server hosts.




                                               U W
               4. a) Explain protocol independent socket options
                  b) Explain about IPV6 Socket option and TCP socket options




                               N T
               5. a) Determine outgoing interface with UDP?
                  b) Explain about Lack of flow control with UDP.



                         J
               6. a) Explain about Resolver options
                  b) Explain the use of uname function with an example

               7. a) Explain about File and Record Locking? Write a program to lock a file using
                     advisory locking.
                  b) Discuss about FIFO’s and Pipes? Give an example

               8. a) Briefly discuss overview of rlogin with an Example?
                  b) Discuss about control terminals?


                                                         1of 1




                                                 www.jntuworld.com

Más contenido relacionado

La actualidad más candente

An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...MINTUKAN RABHA
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Jim Geovedi
 
EtherTester overview
EtherTester overviewEtherTester overview
EtherTester overviewAndre Souto
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyhome
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017Satyendra Singh
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumpsccnaguide
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Maximilan Wilhelm
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorialpinck2329
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03Dhananja Kariyawasam
 
SCL
SCLSCL
SCLESUG
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFMaximilan Wilhelm
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overviewPeter Waher
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 

La actualidad más candente (20)

CCNA Exam Question
CCNA Exam QuestionCCNA Exam Question
CCNA Exam Question
 
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
 
CCNA DUMPS 200-120
CCNA DUMPS 200-120CCNA DUMPS 200-120
CCNA DUMPS 200-120
 
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
 
EtherTester overview
EtherTester overviewEtherTester overview
EtherTester overview
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
 
9517ijnsa03
9517ijnsa039517ijnsa03
9517ijnsa03
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumps
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
 
SCL
SCLSCL
SCL
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018Muriel Medard - Network Coding in Satellites - Global SIP 2018
Muriel Medard - Network Coding in Satellites - Global SIP 2018
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 

Similar a Network programming

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
1.1 Chapter1)Assume we add a new protocol to the application lay.docx
1.1 Chapter1)Assume we add a new protocol to the application lay.docx1.1 Chapter1)Assume we add a new protocol to the application lay.docx
1.1 Chapter1)Assume we add a new protocol to the application lay.docxpaynetawnya
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecturevamsi krishna
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestd436758
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestac67362
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questionsvaidheeswari
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestac67362
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestd436758
 
M I C R O P R O C E S S O R S A N D I N T E R F A C I N G J N T U M O D E...
M I C R O P R O C E S S O R S  A N D  I N T E R F A C I N G  J N T U  M O D E...M I C R O P R O C E S S O R S  A N D  I N T E R F A C I N G  J N T U  M O D E...
M I C R O P R O C E S S O R S A N D I N T E R F A C I N G J N T U M O D E...guest3f9c6b
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx
1102159.334 CP ALB Internal - Page 1 of 7 - .docxhyacinthshackley2629
 

Similar a Network programming (20)

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
 
Web technologies
Web technologiesWeb technologies
Web technologies
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
1.1 Chapter1)Assume we add a new protocol to the application lay.docx
1.1 Chapter1)Assume we add a new protocol to the application lay.docx1.1 Chapter1)Assume we add a new protocol to the application lay.docx
1.1 Chapter1)Assume we add a new protocol to the application lay.docx
 
Advanced computer architecture
Advanced computer architectureAdvanced computer architecture
Advanced computer architecture
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
Cs 69
Cs 69Cs 69
Cs 69
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
M I C R O P R O C E S S O R S A N D I N T E R F A C I N G J N T U M O D E...
M I C R O P R O C E S S O R S  A N D  I N T E R F A C I N G  J N T U  M O D E...M I C R O P R O C E S S O R S  A N D  I N T E R F A C I N G  J N T U  M O D E...
M I C R O P R O C E S S O R S A N D I N T E R F A C I N G J N T U M O D E...
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
 
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
Computer Organization Jntu Model Paper{Www.Studentyogi.Com}
 
Cs 68
Cs 68Cs 68
Cs 68
 
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx1102159.334 CP       ALB Internal  - Page 1 of  7 - .docx
1102159.334 CP ALB Internal - Page 1 of 7 - .docx
 

Más de vamsi krishna

Más de vamsi krishna (11)

Software project management
Software project managementSoftware project management
Software project management
 
Data warehousing and data mining
Data warehousing and data miningData warehousing and data mining
Data warehousing and data mining
 
Xml
XmlXml
Xml
 
Servletarchitecture,lifecycle,get,post
Servletarchitecture,lifecycle,get,postServletarchitecture,lifecycle,get,post
Servletarchitecture,lifecycle,get,post
 
Javax.servlet,http packages
Javax.servlet,http packagesJavax.servlet,http packages
Javax.servlet,http packages
 
Cookies
CookiesCookies
Cookies
 
Servletand sessiontracking
Servletand sessiontrackingServletand sessiontracking
Servletand sessiontracking
 
Unit4wt
Unit4wtUnit4wt
Unit4wt
 
Unit3wt
Unit3wtUnit3wt
Unit3wt
 
Unit2wt
Unit2wtUnit2wt
Unit2wt
 
Unit 1wt
Unit 1wtUnit 1wt
Unit 1wt
 

Network programming

  • 1. www.jntuworld.com www.jwjobs.net Code No. N0521 R07 Set No.1 IV B.Tech I Semester Supplementary Examinations, February/March, 2012 NETWORK PROGRAMMING (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max. Marks: 80 Answer any FIVE Questions All Questions carry equal marks ***** 1. a) Distinguish between UDP & TCP protocol. b) What are the limitations on the size of the IP datagram? How they affect the data transmitted by an application. L D 2. Write the syntax and explain each of the following socket functions. R a) Listen b) Close and related c) Connect d) Bind O 3. a) Explain about terminate and signal handling server process termination. b) Discus about TCP Echo server functions. U W 4. a) Explain about IPV6 Socket option and TCP socket options. b) Make a comparison of the five different I/O models. N T 5. a) Explain about Lack of flow control with UDP. b) Describe the important functions of UDP echo server. J 6. a) Explain the use of uname function with an example? b) Discuss the use of gethostbyname function with an example? 7. a) Explain about File and Record Locking? b) Explain how semaphores are used to synchronize the access to the shared memory segments? 8. Discuss about terminal modes and control terminals? 1of 1 www.jntuworld.com
  • 2. www.jntuworld.com www.jwjobs.net Code No. N0521 R07 Set No.2 IV B.Tech I Semester Supplementary Examinations, February/March, 2012 NETWORK PROGRAMMING (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max. Marks: 80 Answer any FIVE Questions All Questions carry equal marks ***** D 1. a) With the help of a neat sketch explain the steps and buffers involved when an application writes to a TCP socket. R 2. a) Explain byte ordering and byte manipulating functions. L b) Summarize the protocol usage of any 4 common Internet applications. b) Explain about and exec function and close function and related function O 3. a) Explain about normal startup and termination between client and server. U W b) Explain the procedure steps for crashing, rebooting and shutdown of server hosts. 4. a) What socket options are processed by IPv6 with a level of IPPROTO_IPv6? T Explain. b) Explain protocol independent socket options. J N 5. Explain the UDP client-server application for echoing the text given by the user. 6. a) Describe geteservbyname and getservbyport fuctions with example. b) Explain about Resolver options. 7. a) What are the advantages of FIFO’s over pipes? Explain stream and messages with example. b) Discuss the importance of message queue? Explain different functions. 8. a) Explain about RPC transparency issues. b) Briefly explain on Pseudo-Terminals. 1of 1 www.jntuworld.com
  • 3. www.jntuworld.com www.jwjobs.net Code No. N0521 R07 Set No.3 IV B.Tech I Semester Supplementary Examinations, February/March, 2012 NETWORK PROGRAMMING (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max. Marks: 80 Answer any FIVE Questions All Questions carry equal marks ***** 1. a) Draw the OSI seven layered model along with the approximate mapping to the internet protocol suite. Explain the functions offered by each layer? protocol? L D b) Explain how TCP connection is established using Three-way handshake R 2. a) Discuss IPv4 socket address structure and the significance of each field? b) Explain byte ordering and byte manipulating functions? O 3. a) Explain the procedure steps for rebooting and shutdown of server hosts. b) Discuss about signal handling server process termination? 4. Write short note on a) Batch input U W b) select function N T c) Shutdown function d) poll function 5. Write a program for UDP Echo Server and Echo client and Explain? J 6. Explain the following functions a) gethostbyname b) uname 7. a) What is semaphore ? Explain how locking can be achieved with semaphores? b) What is pipe? How are Pipes are different from FIFO’s? 8. a) Briefly discuss overview of rlogin with an Example? b) Explain about Terminal line disciplines? 1of 1 www.jntuworld.com
  • 4. www.jntuworld.com www.jwjobs.net Code No. N0521 R07 Set No.4 IV B.Tech I Semester Supplementary Examinations, February/March, 2012 NETWORK PROGRAMMING (Common to Computer Science & Engineering and Information Technology) Time: 3 hours Max. Marks: 80 Answer any FIVE Questions All Questions carry equal marks ***** 1. a) What are the limitations on the size of the IP datagram? How they affect the data transmitted by an application. L D b) Summarize the protocol usage of any 4 common Internet applications. 2. Write the syntax and explain each of the following socket functions. R a) Accept b) Close and related c) Connect d) Bind 3. a) Discus about TCP Echo server functions O b) Explain the procedure steps for crashing and shutdown of server hosts. U W 4. a) Explain protocol independent socket options b) Explain about IPV6 Socket option and TCP socket options N T 5. a) Determine outgoing interface with UDP? b) Explain about Lack of flow control with UDP. J 6. a) Explain about Resolver options b) Explain the use of uname function with an example 7. a) Explain about File and Record Locking? Write a program to lock a file using advisory locking. b) Discuss about FIFO’s and Pipes? Give an example 8. a) Briefly discuss overview of rlogin with an Example? b) Discuss about control terminals? 1of 1 www.jntuworld.com