is82 inew scheme , eighth semester b.e. degree examination

18
IS82 USN I NEW SCHEME , Eighth Semester B.E. Degree Examination, May 2007 Infor ation Science and Engineering Softw:lre Practice and Testing Time:3 hrs.] [Max. Marks: 100 Note: Answer any FIVEful1 questions. 1 a. Explain the different guidelines used for framing variable and function names in a program. (10 Marks) b. Explain comma-separated values with examples. (10 Marks) 2 a. Explain growing array with examples. b. Explain Markov chain algorithm with example. (10 Marks) (10 Marks) 3 a. List all the suggestions for tuning the code and explain any four. b. Explain the different guidelines used for the portability of a language. (10 Marks) (10 Marks) 4 a. Explain any two programming tools used for structuring a special purpose language. (10 Marks) b. Explain "No clues, Hard bugs" method of debugging the program. (10 Marks) 5 a. Discuss any five essentials of the software testing process. (10 Marks) b. What is configuration management? Explain the different disciplines, which are used for administrative direction, control and surveillance for configuration management. (10 Marks) 6 a. Explain the different key elements and phases in : i) Inspection. ii) Walkthroughs. ill) Buddy checks. (10 Marks) b. What are the different critical factors and recommendations required for successful implementation of verification testing? Explain them. (10 Marks) 7 a. List all the axioms that apply to validation testing. b. Explain the different validation testing tasks and deliverables. (08 Marks) (12 Marks) 8 a. Explain the different approaches for organizing the test function. (10 Marks) b. Write an explanatory note on software measures and practices and benchmark study. (10 Marks) *****

Upload: khangminh22

Post on 15-Jan-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

IS82

USN

I NEW SCHEME ,

Eighth Semester B.E. Degree Examination, May 2007Infor ation Science and EngineeringSoftw:lre Practice and Testing

Time:3 hrs.] [Max. Marks: 100Note: Answer any FIVEful1 questions.

1 a. Explain the different guidelines used for framing variable and function names in aprogram. (10 Marks)

b. Explain comma-separated values with examples. (10 Marks)

2 a. Explain growing array with examples.b. Explain Markov chain algorithm with example.

(10 Marks)(10 Marks)

3 a. List all the suggestions for tuning the code and explain any four.b. Explain the different guidelines used for the portability of a language.

(10 Marks)(10 Marks)

4 a. Explain any two programming tools used for structuring a special purpose language.(10 Marks)

b. Explain "No clues, Hard bugs" method of debugging the program. (10 Marks)

5 a. Discuss any five essentials of the software testing process. (10 Marks)b. What is configuration management? Explain the different disciplines, which are used

for administrative direction, control and surveillance for configuration management.(10 Marks)

6 a. Explain the different key elements and phases in :i) Inspection.ii) Walkthroughs.ill) Buddy checks. (10 Marks)

b. What are the different critical factors and recommendations required for successfulimplementation of verification testing? Explain them. (10 Marks)

7 a. List all the axioms that apply to validation testing.b. Explain the different validation testing tasks and deliverables.

(08 Marks)(12 Marks)

8 a. Explain the different approaches for organizing the test function. (10 Marks)b. Write an explanatory note on software measures and practices and benchmark study.

(10 Marks)

*****

PageNo ... 1 IS835

USN

I NEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

Information Science and EngineeringAdvanced Algorithms

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVE full questions.

a. What are recurrence relations? Mention different methods for solving recurrences.Explain recursion-tree method to solve the following recurrence and hence find thetime complexity :

T(n) ~ {~~~)+cn, :;::: <10 Marks)

b. What is meant by amortized analysis? Mention different techniques used in analysisof algorithms. Discuss the accounting method for stack operations. (10 Marks)

2 a. Explain aive string matching algorithm briefly. Mention the disadvantage of usingthis algorithm. (04 Marks)

b. Explain Rabin-Karp algorithm.Working modulo q = 11, how. many spurious hits does the Rabin-Karp matcherencounter in the text T = 3141592653589793 when looking for the pattern P = 26?

(10 Marks)c. Prove that if ~ is a final-state function of a string-matching automation for a given

pattern P and T[l .... n] is an input text for the automation, then ~(Ti) = cr(Tj) fori= 0, 1, ..... n. (06 Marks)

3 a. Describe EUCLID's algorithm to calculate GCD of two numbers, and hence computeGCD(30, 21) and GCD(O, 21). Also discuss the EXTENDED-EUCLID algorithm.

(10 Marks)b. Describe modular-linear-equation-solver procedure, and hence find all solutions to

the equation35x == 10(mod50) (10 Marks)

4 a. Describe an algorithm to generate Huffman codes. Generate an optimal Huffmancode for the following set of frequencies.

a=45, b=13. c=12, d=16, e=9, f=5 (12 Marks)b. What is DFT and FFT? Give a recursive FFT algorithm for computing the DFT of an

n-element vector a = (aO,al ,- - - - - - - - - - -an-I) where n is a power of 2.(08 Marks)

5 a. What do you mean by maximum-bipartite-matching problem?Ford-Fulkerson method is used to find a maximum matching inbipartite graph G = (Y, E).

Explain howan undirected

(10 Marks)Contd .... 2

Page No ... 2 IS83~

b. Describe ..the Bellman-Ford algorithm and its time complexity on a directed graphwith 'V' nodes and 'E' edges. Illustrate the execution of Bellman-Ford algorithm onthe following graph. ?

-2.

.-2 -4

r------'-.J§z (10 Marks)

6 a. What are sparse graphs? What is the purpose of applying Johnson's algorithm forsparse graphs? Discuss the Johnson's algorithm for computing all-pairs shortest pathsand its run by considering simple graph. (12 Marks)

b. Consider an RSA key set with p = 11, q = 29, n = 319 and e = 3. What value of'd'should be used in the secret key? What is the encryption of the message M = 100?

(08 Marks)

7 a. A Hamiltonian path in a graph is a simple path that visits every vertex exactly once.Show that the language HAM-PATH = {< G, U, v >: there is a Hamiltonian pathfrom u to v in graph G } belbngs to NP. (08 Marks)

b. Discuss the traveling salesman problem with the triangle inequality by consideringsuitable example. Also discuss about its time complexity. (12 Marks)

8 Write short notes oil the following:a. Constraints while designing a parallel algorithm.b. Shared memory - PRAM.c. Matrix multiplication on PRAM.d. Parallel prefix computations on a complete binary tree. (20 Marks)

*****

IS844

USN

I NEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

Information Science and EngineeringSupply Chain Management

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVEfull questions.

1 a. Explain the process views of a supply chain. (10 Marks)b. Explain with examples, the three basic steps required to achieve the strategic fit.

(10 Marks)

2 a. Explain with a figure, the different scopes of strategic fit across a supply chain.(10 Marks)

b. Explain with example, the impact of different drivers on the performance of thesupply chain. (10 Marks)

3 a. Explain the different types of forecasting methods.b. Explain the basic approaches to demand forecasting.c. What are the main objectives of a aggregate planner for the

operational parameters over the specified time horizon.

(08 Marks)(08 Marks)

identification of(04 Marks)

4 a. Explain the different approaches used by a firm for managinginventory.

b. Explain the different componeats involved in the estimation of:i) Inventory holding cost.ii) Order cost.

the capacity and(10 Marks)

(10 Mari{s)

5 a. Demand for the Deskpro computer at best buy is 1000 units/month, best buy incurs afixed order placement, transportation, and receiving cost of $ 4000, each time anorder is placed. Each computer costs best buy $ 500 and the retailer has a holdingcost of 20%. Evaluate the number of computers that the store manager should orderin each replenishment lot. (10 Marks)

b. Explain, how the manufacturers use short-term discounting for trade promotions.(10 Marks)

6 a. Explain the different modes of transportation with their performance characteristics.(10 Marks)

b. List all the advantages and disadvantages of transportation networks. (10 Marks)

7 a. Explain the different factors that influence the network design decisions.b. Explain the different characteristics of information which are useful

supply chain decisions.

(10 Marks)for making

(10 Marks)

8 a. What are the important ideas that a manager of IT company should keep in mindwhile making decision regarding supply chain in IT? (10 Marks)

b. Explain the different ideas to be considered while setting up an e-business in practice.(10 Marks)

*****

CS831

USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

CS lISMobile Communications

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVEfull questions.

1 a. Briefly discuss the main location dependant services used m mobile computingapplications. (10 Marks)

b. What are the main reasons for signal loss during propagation? Explain briefly.(10 Marks)

2 a. Clearly distinguish between the four basic multiple access techniques used inwireless system. (10 Marks)

b. What is the main benefit of a spread spectrum system? How can spreading beachieved using the chipping sequence? Briefly explain. (10 Marks)

3 a. With a neat diagram, explain the functional architecture of a GSM system. (12 Marks)b. With reference to GSM architecture explain the important hand over scenarios.

(08 Marks)

4 a. Explain the GPRS reference model end also list out the key features of GPRS .. (10 Marks)

6

b. Explain briefly the following with respect to UTRA :i) TD-CDMA.ii) Basic classes of handover. (10 Marks)

a. What characteristics do the GEO orbit have? What are its pros and cons? Brieflydescribe. (10 Marks)

b. Explain the two basic transport mechanisms of DAB, and also its frame structure.(10 Marks)

a. Explain the method of avoiding the hidden-terminal problem with respect toDFWMAC. (10 Marks)

b. What advantages and disadvantages do WLANs offer over its wired counterparts?Briefly discuss. (10 Marks)

7 a. Explain the important entities which makeup the mobile IP networks. (10 Marks)b. What are the key benefits and drawbacks of the following TCP mechanisms?

Explain.i) I-TCPii) Snooping TCPiii) M-TCPiv) Transaction-oriented TCP.

8 Writebriefly on :a. Newdevelopments in WLAN standards.b. Listadvantages and disadvantages of small cells in cellular system.c. Givethe structure of Pica net.

(10 Marks)

5

(07 Marks)(07 Marks)(06 Marks)

*****

CS83:

USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

."'-. CS / ISNeural Networks

Time: 3 hrs.]

1 a.b.c.

2 a.

b.c.

3 a.

b.

c.

4 a.

b.

c.

5 a.b.

c.

6 a.

b.c.

7 a.b.

8 a.b.c.

[Max. Marks: 100Note: Answer any FIVE full questions.

Define a neural network as viewed as an adaptive machine. (04 Marks)Discuss the benefits of a neural network. (08 Marks)Describe the non-linear model of neural network and explain the activation functionused. (08 Marks)

Describe the way in which the dynamic behavior of the system is controlled byweight. Derive the expression for the same. (12 Marks)Implement Mc.Culloch Pitls model for a NOR gate. (04 Marks)Compare AI with neural network. (04 Marks)

Describe the difference between pattern association and pattern recognition.(05 Marks)

Describe Hebb's hypothesis and covariance hypothesis with the help of someillustration. (08 Marks)Explain reinforcement learning with an example. (07 Marks)

What is an associative memory? Describe the storage and recall of the patterns in theassociative memory. (08 Marks)Consider the following orthonormal sets of key patterns, applied to a correlationmatrix.

T T TXl = [1,0,0,0] ; x2 = [0,1,0,~ ; x3 = [0,0,1,0]

Respective stored patterns are y) = [5,1,0Y ; Y2 = [- 2,1,6Y ; Y3 = [- 2,43 Yi) Calculate the Mem Matrix M.ii) Show that the Mem associates perfectly. (08 Marks)Compare supervised learning with unsupervised learning. (04 Marks)

What do you mean by iterative desc nt? What are their applications? (05 Marks)Describe the limiting form of the linear-learnt squares filter for Ergolic environment.

(06 Marks)Explain LMS algorithm with its signal flow representation. (09 Marks)

Derive an expression for finding out the maximum number of iterations that isrequired for the perception to converge. (08 Marks)Compare Perception classifier with Bayes classifier. (03 Marks)Describe the characteristics of a multiplayer perceptron. What are the different kindsof signals identified in the multi-layered perceptron? (09 Marks)

Explain Back-propagation algorithm in detail. (12 Marks)Describe the optimum decision boundary, using Bayes classifier with necessaryderivation. (08 Marks)

Describe Radial-basis function network. (03 Marks)Explain Cover's theorem on the separability of patterns. (06 Marks)Explain Regularization theorem in detail. (11 Marks)

*****

Page No ... ] CS833

USN

--- .1 NEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

. Computer Science and EngineeringEmbedded Systems

Time:3 hrs.] [Max. Marks: 100

Note: Answer any FIVE full questions.

1 a. What are the different classifications of embedded systems? Explain. (06 Marks)b. Explain the different techniques of power and energy management in a system.

(10 Marks)c. What is the role of processor reset and system reset in a system? (04 Marks)

2 a. What do you mean by the following: i) Pipe ii) Kernel iii) Virtual Deviceiv) Loader v) Device Manager vi) FPGA. (06 Marks)

b. Why does a processor system always need an Interrupt Handler (InterruptController)? (06 Marks)

c. Explain various types of memories in a system with functions assigned to each type.(08 Marks)

3 a. What are the major registers of 8051 ? Specify their use with a simple instruction.(06 Marks)

b. How the stacks are accessed in the 8051? Show the stack and stack pointer for thefollowing program. '

MOV R1, # 10 HMOV R2,#20HMOV R3, # 30 HPUSH 1PUSH 2PUSH 3

Assume Default Stack Area. (05 Marks)c. Explain the functions of the following pins of 8051.

- --i) XTAL1 and XTAL2. ii) EA iii) PSEN iv) ALE v) VO parts. (09 Marks)

4 a. Explain different Addressing modes of 8051 with examples. (08 Marks)b. A block of 10 data bytes are stored from location 40H. Write a 8051 assembly

language program to count number of even and odd numbers. Even count should bestored in R6 and odd count should be stored in R7. (05 Marks)

c. What are the functions of each bit of TMOD register of Timer 0 / Timer 1 of 8051and specify steps invol ed in the programming of MODI of Timer O. (07 Marks)

5 a. What are the steps to be taken to transfer data serially using 8051. (07 Marks)b. Assume that XTAL = 11.0592 MHz. What value do we need to load into the timer's

registers if we want to have a time delay of 5 ms? Show the program for timer 0 tocreate a pulse width of 5 ms on P2.3. (07 Marks)

c. Write a flow chart for detection and identification of key activation in a keyboard.(06 Marks)Contd ... 2

Page No ...2 CS833

6 a. Discuss essentiality of using the interrupt. service routines in any system and theworking of interrupt mechanism with the help of simple example. (06 Marks)

b. Why are Device drivers important routines in a system? Explain with examples.(06 Marks)

c. What is an interrupt vector? Explain the mechanism to find the starting address ofinterrupt routine in an 8086 based system. (04 Marks)

d. Discuss context switching in ARM 7 processor on an ISR call. (04 Marks)

7 . a. List out the issues in a multiprocessor system.b. Explain the use of Petri Net Model.c. Explain SDFG model and APEG model.

(06 Marks)(06 Marks)(08 Marks)

8 a. What is a Mailbox? How does a mailbox pass a message during an IPC? Explainwith example. (06 Marks)

b. Write short notes on any two of the following:i) Parallel Port Device Drivers.ii) Skills required for an embedded system designer.iii) Modes of operation of 8255. (14 Marks)

*****

CS834

USN

INEW SCHEME I •Eighth Semester B.E. Degree Examination, May 2007

CS/ISNetwork Management

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVE full questions.

a. Defme Network Management. Explain Network Management goals and functions.(12 Marks)

b. Distinguish between Network Management and System Management. (08 Marks)

a. Explain the different Network Management Standards which are currently used.(08 Marks)

b. What are the different types of Network Management models? Explain the functionsofi) Information model.ii) Communication model. (12 Marks)

3 a. Explain clearly the functions of two tier and three tier SNMP organization model.(10 Marks)

b. With a neat sketch explain the SNMP Network Management architecture. (10 Marks)

4 a. Define and explain SNMP access policy in SNMP management.b. Explain SNMP protocol specifications.

(10 Marks)(10 Marks)

5 a. Witha neat sketch explain the RMONI group and functions.b. Explain clearly the RMON token ring groups and its tables.

(10 Marks)(10 Marks)

6 a. What is AIM LAN emulation? Explain ATM LAN emulation network by usinglayeredarchitecture. (10 Marks)

b. WithAIM network explain the functions ofi) AIM switch.ii) ATM virtual LAN. (10 Marks)

7 a. Discussthe functions of the different broad band access technology.b. Explainbriefly the complete ADSL system reference model.

(10 Marks)(10 Marks)

8 Writeshort notes on:a. Faultmanagement.b. Performancemanagement.c. Securitymanagement.d. Reportmanagement. (20 Marks)

*****

Page No ... J EC835

USN

.1 NEW SCHEME I.' Eighth Semester B.E. Degree Examination, May 2007

Electronics and Communication Engineering .Embedded System Design

Time: 3 hrs.] [Max. Marks: 100

Note: Answer any FIVEfull questions.

1 a. Explain the various metrics that need to be optimized while designing an embeddedsystem. (08 Marks)

b. Explain the three main processor technologies that can be used with embeddedsystem. Also highlight the-benefits of each. (06 Marks)

c. Explain how the top-down design process improves the productivity. (06 Marks)

2 a. Explain the various steps involved in designing a custom single-purpose processor.(06 Marks)

b. Explain the concept of 'data path' in the embedded systems. (04 Marks)c. Design a single-purpose processor that outputs Fibonacci numbers upto n. Start with

a function computing the desired result, translate it into a state diagram and sketch aprobable datapath. (10 Marks)

3 a. Explain the various events that take place when a processor executes an instruction.Explain bow does pipelining improves the execution speed. (08 Marks)

b. Explain the various addressing modes that are commonly used by processors.(04 Marks)

c. Explain the steps involved in designing a general-purpose processor. (08 Marks)

4 a. Explain how UART is used for communication highlighting the advantages ofUART. (06 Marks)

b. Schematically explain how a PWM helps in controlling the speed of DC motor.(06 Marks)

c. Highlight the advantages of using data in digital form over its analog form. Explainthe working of successive approximation type of analog to digital converter.

(08 Marl<s)

5 a. Explain the various types of RAM highlight the features of each. (06 Marks)b. What is cache memory? Explain its need and how it helps in improving the execution

speed. (06 Marks)c. With a neat diagram explain the advanced RAM architecture. Also explain how this

is extended to improve the performance through synchronous DRAM. (08 Marks)

Contd .... 2

Page No ... 2 EC~

6 a. What is multi-level bus architecture? Explain its need and also the reasonsimprove the processor performance by this architecture. (06 Mar

b. Explain the reasons that make the serial communication more preferred than .parallel communication systems. (06 Mar

c. Explain how r'c bus structure in peripherals to communicate with the process(08 Mar

7 a. Explain the need for interrupts in processing systems. Also explain the various evethat take place when a processor is interrupted. (06 Mar

b. Explain the problems associated with interrupts that deals with the shared-data. Asuggest solutions to solve these problems. (08 Mar

C. What is interrupt latency? Explain the factors affecting it. (06 Mar

8 a. Explain the reasons why the systems with the conventional operating system failrespond to the real time problems. Also explain how these are taken care in RTOS.

(06 Marb. Explain the concept of semaphores. How these help us in solving the shared - d

problem in embedded systems? (08 Marc. Differentiate between hard and soft RTOS highlighting the advantages ,

disadvantages of each. (06 Mar

*****

CS841USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

CS lISDistributed Objects

Time:3 hrs.] [Max. Marks: 100Note: Answer any FIVE full questions.

a. What are the characteristics of distributed systems? Briefly describe differenttransparencies. (10 Marks)

b. What are the components of CORBA object model? Explain any three of thembriefly. (05 Marks)

c. Onwhat instances RPC are used? Give basic structure ofRPC. (05 Marks)

a. Write the flowchart to translate 00 design to IDL (Interface Definition Language)and explain. Also give the characteristics ofIDL. (10 Marks)

b. With a neat diagram explain the structure of CORBA interface. (10 Marks)

a. Illustrate with diagrams interface and implementations repositories of CORBA.(10 Marks)

b. List out services offered in CORBAI, CORBA2 and CORBA3 and explain anyservice in CORBA3. (10 Marks)

4 a. Explain following with respect to ORB interoperability architecturei) Inter-ORB Bridge Supportii) General Inter-ORB Protocol (GHOP)iii) Internet Inter-ORB Protocol (IIOP)iv) Environment-Specific Inter-ORB Protocols(ESIOPs) (12 Marks)

b. Compare vertical CORBA facilities with horizontal CORBA facilities. (08 Marks)

5 a. What are the drawbacks in C++ type libraries and explain how these can beovercome using COM? (08 Marks)

b. Explain how COM interface pointers are used. (06 Marks)c. Explain resource management axioms. (06 Marks)

6 a. Explain the following types of properties:i) Reflexive propertyii) Transitive property.

Illustratewith an example how these properties can be combined.b. Whatare the applications of apartments?c. Explainmarshalling and briefly describe different types of marshalling.

7 a. Withneat block diagram explain stub architecture and proxy architecture.b. Whatis the role of SCM? Explain.c. Explainsecurity features of COM.

(08 Marks)(04 Marks)(08 Marks)

(10 Marks)(05 Marks)(05 Marks)

Writeshort notes ona. Typecoercionb. Dynamiccompositionc. Tokenmanagementd. Monikers. (20 Marks)

*****

CS842

USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

CSE IISEReal Time Systems

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVEfull questions.

1 a. Explain and define Real-time Systems, its design issues and their specificationtechniques. (12 Marks)

b. Develop a petri net representation for a hospitals patient monitoring system with testlike blood pressure, heart rate and EKG over a patient. (08 Marks)

2 a. Briefly explain the following with a coding example:i) Real-time kernel.ii) Coroutines.iii) Interrupt driven system.

b. Illustrate with a block the task-control model system.(12 Marks)(08 Marks)

3 a. What are critical regions? How are they protected? What are the alternatives, ifsemaphore primitives are not provided by the operating system? Demonstrate thealternatives to implement semaphores with a code. (12 Marks)

b. What is dead lock? List the conditions and explain avoidance detect and recovery., (08 Marks)

4 a. Explain dynamic allocation pertaining to real-time memory management. (10 Marks)b. What are the various sources of response time delay in real-time systems? How can

they be reduced? (10 Marks)

5 a. Justify the statement "most scheduling problems involving real systems are NP-complete problems". (12 Marks)

b. How is memory divided in real-time systems? Explain. (08 Marks)

6 a. Discuss characterization of reliability in real time system and techniques forapproximating system reliability. (10 Marks)

b. Briefly explain fault-tolerance for real-time system. (10 Marks)

7 a. Explain distributed real time system and reliability in it.b. Explain in brief:

i) Data flow architecture.ii) Memory testing.

(10 Marks)

(10 Marks)

8 a. What are the goals of real-time system integration?b. Write short notes on :

i) Real-time database.ii) Real-time image processing.iii) Real-time Unix.

(05 Marks)

(15 Marks)

*****

CS843

USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

Computer Science & EngineeringCryptography and Network Security

Time: 3 hrs.] [Max. Marks: 100Note: Answer any FIVEfull questions.

1 a. Briefly explain the various security services defined in X.800. (05 Marks)b. Compare the following:

i) Cryptography and steganography. ii) Confusion and diffusion. (05 Marks)c. Explain the multi letter encryption using play fair cipher. Encrypt the following message

using play fair cipher."PROGRAMMING IS FUN" using BELGAUM as keyword. (10 Marks)

2 a. What is meant by avalanche effect? Explain its significance. (04 Marks)b. Explain the process of triple DES using two keys. Theoretically, how it can be attacked.

(10 Marks)c. Distinguish between link-level and end-to-end encryption. Also discuss about the logical

placement of end-to-end encryption. (06 Marks)

3 a. What is the difference between master-key and session key. Explain the process ofautomatic key-distribution for connection oriented protocol. (05 Marks)

b. State and prove Enter's theorem. (05 Marks)c. What is meant by Pseudorandom number? What are its necessary requirements? Explain

about ANSI x 9.17 PRNG. (10 Marks)

4 a. Discuss the various requirements of public key encryption. (04 Marks)b. If p and q are large prime numbers such that n = p x q and ~(n) = (p-I)(q -1), then

show that d = e-I modo/»)Where {e, n}, {d, n} are public and private key pairs and ~(n) is the number of relativelyprime numbers and n. (06 Marks)

c. How session key is exchanged using Diffie-hellman key exchanger. Explain. Consider aDiffie-Hellman scheme with prime number q = 11 and a primitive root a = 2 .i) Show that 2 is primitive root of 11.ii) If user A has a public key YA = 9, what is its private key?

iii) Ifuser B has a public key YB = 3, what is the shared key? (10 Marks)

5 a. What type of attacks are addressed by message authentication? What is the differencebetween MAC and one-way Hash function? (06 Marks)

b. Explain about MDS, message digest algorithm. (08 Marks)c. What is meant by a digital signature? What are requirements? Distinguish between

direct digital signature and arbitrated digital signature. (06 Marks)

6 a. How the access to a server is authenticated using Kerberos? (10 Marks)b. Explain about X.509 authentication service. (10 Marks)

7 a. Explain about the services provided by SSL record protocol and also discuss about thesteps involved in SSL record protocol transmission. (10 Marks)

b. How confidentiality service is achieved by PGP protocol? Explain. (10 Marks)

8 Write short notes on the following:a. Intrusion deletion. b. Secured electronic transaction.c. Viruses. d. Firewalls. (20 Marks)

*****

CS845

USN

I NEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

CSE/ISEData Mining and Warehousing

Time: 3 hrs.] [Max. Marks: 100

Note: Answer any FIVEfull questions.

1 a. Discuss the differences between Operational Database System and DataWarehousing and hence explain the comparison between OLTP and OLAP systems.

(10 Marks)b. Explain with an example of typical online analytical processing operation on multi -

dimensional data model. (10 Marks)

2 a. Explain the following in connection with data cleaning for preprocessing the datai) Mining value ii) Noisy data iii) Inconsistent data. (10 Marks)

b. Clearly explain data reduction techniques can be applied to obtain a reducedrepresentation of the data set that is much smaller in volume, yet clearly maintain theintegrity of original data. (10 Marks)

3 a. Explain why it is important to have a data mining query language in data miningprimitives. (10 Marks)

b. Clearly explain the primitive fop specifying a data mining task. (10 Marks)

4 a. Explain clearly the mining multi dimensional association rules from RelationalDatabase and Data Ware houses. (10 Marks)

b. Explain in detail constraint based association mining in large database. (10 Marks)

5 a. Explain the preprocessing steps for classification and prediction process. (10 Marks)b. Explain the various classification methods, which are commonly used in commercial

data mining system. (10 Marks)

6 a. Explain in detail the various typical requirements of clustering in data mining.(10 Marks)

b. Explain the major clustering method classification categories in data mining.(10 Marks)

7 a. Explain statistical approach and neural network approach or two major approachesin clustering method. (10 Marks)

b. Explain the data mining application and trends in data mining. (10 Marks)

8 a. Explain the various additional themes on data mining.b. Explain in general the social impacts of data mining.

(10 Marks)(10 Marks)

*****

CS84.

us

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

Computer Science & Engineering.Multicast Communication

Time:3 hrs.] [Max. Marks:l00Note: Answer any FIVE full questions.

1 a. What is group communication? Explain unicast,communication techniques.

b. Explain characterstics of group communication.c. Bring out the features of k-reliable group services.

multicast and concast group(08 Marks)(06 Marks)(06 Marks)

2 a. Explain static and adaptive routing algorithms. (10 Marks)b. Reverse path broadcasting (RPB) was proposed as a technique to improve reverse

path forwarding (RPF). Comment with suitable answering. (07 Marks)c. Write a note on' Steiner Tree's'? (03 Marks)

3 a. What is group dynamics? Explain operations provided by IGMP for joining andleaving groups on the Internet. (10 Marks)

b. What are the reasons for using scooping? Explain scooping based on TTL value.(10 Marks)

4 a. What are the three different categories of service offered by the integrated services?Explain anyone of them (06 Marks)

b. Why ST2 protocol is complex? Explain different steps of communication process inST2. (08 Marks)

c. Compare the Intserv and Diffserv. (06 Marks)

5 a. Explain the virtual connections required before user data is transmitted over ATMnetwork. (07 Marks)

b. What are the service categories supported by ITU-T in ATM. (05 Marks)c. Explain the mechanism offered by ATM for multicast communication at user

network interface ( I). (08 Marks)

6 a. Bring out the steps required to undertake multicast receiver and sender. (07 Marks)b. Explain connection management in XTP protocol for high performance networks.

(07 Marks)c. Explain the mechanisms used for error control and recovery, and also data transfer in

MTP (multicast transport protocol). (06 Marks)

7 a. Explain data and group management in reliable multicast protocol.b. Explain the concept of group management in MFTP protocol.

(10 Marks)(10 1arks)

8 a. Explain Mbone Architecture briefly.b. Discuss any two applications of multicast backbone.c. Write a note on the tool M-trace.

III

(06 Marks)(08 Marks)(08 Marks)

PageNo ... J CS82

USN

INEW SCHEME IEighth Semester B.E. Degree Examination, May 2007

Computer ScienceAdvanced Computer ~rchitecture

Time:3 hrs.] [Max. Marks: 100

Note: 1.Answer any FIVE full questions.2. Support the answers with relevant neat block diagram /

timing diagram. .

a With neat block diagrams, explain the Flynn's classification of computerarchitecture. (08 Marks)

b. With neat generic block diagrams, explain any two shared-memory multiprocessormodels. .. (08 Marks)

c. A 40MHz processor was used to execute a bench mark program with the followinginstruction mix and clock cycle counts:

Instruction Instruction count Clock cycle countInteger arithmetic 45000 1

Data transfer 32000 2Floating point 15000 2

Control transfer 8000 2

Determine the effective CPl, MIPS rate and execution time for this program.(04 Marks)

2 a. Explain the terms flow dependence, antidependence and output dependence.(06 Marks)

b. Consider the following code fragment:

Sl: Load Rl, A;S2: Add R2, Rl;S3: Move Rl, R3;S4: Store B, Rl;

II Rl +- [A]II R2 +- [Rl] + [R2]II Rl +- [R3]II B +- [Rl]

Indicate the types of data dependence present across the different statement andhence draw the data dependence graph. (06 Marks)

. c. Discuss anyone scheme of connection network that implements all communicationpatterns based on program demands. (08 Marks)

3 a. Draw the block diagram of a typical super scalar processor architecture consisting ofan integer unit and a floating point unit and explain the salient features of super scalarprocessor of degree m = 2. (10 Marks)

b. With a neat block diagram, explain the c-access interleaved memory organizationwhich allows block access in a pipelined fashion. Also sketch the timing chartindicating the major and minor cycle time. (10 Marks)

Contd .... 2

Page No ... 2 c

1 2 3 4 5 6

4 a. For the reservation table of a non-linear pipeline shown below:

SlS2S3

x XX

X X X

i) Determine the Forbidden latency set and initial collision vector.ii) Draw the state transition diagram.iii) List all simple cycles and greedy cycles.iv) Determine MAL. (10 Mar

b. With an example differentiate between CSA and CPA adders. Design a pipelineUJ

for fixed-point multiplication of 8-bit integers using CSA tree. (10 Mar

5 a. With a neat schematic block diagram, explain the design of a cross-point switch'cross bar network. Indicate atleast one advantage and a limitation of cross ~network. (10 Marl

b. Discuss the cache coherence problem. Explain the snoopy bus protocol usedachieve data consistency among the caches and shared memory. (10 Ma

6 a. Describe how a sequential program can be converted into parallel program. (08 Marlb. Write the pseudocode for the data parallel equation solver kernel and explain.

(08 MarlC. Highlight the need of BARRIER and LOCK primitive in solver kernel. (04 Mar,

7 a. What is meant by scalable system? Explain the requirements it places on a sys«design interms of bandwidth, latency and cost. (10 Marl

b. With diagram, explain anyone message passing protocols. Mention the advantagand disadvantages of it. (10 Marl

8 Write short notes on:a. Hardware parallelism and software parallelismb. Message routing schemec. VLIWarchitectured. Branch handling technique. (20 Marl

*****