PART A- (10x2=20 marks)

1. What is spreading factor?

2. What is polling?

3. Distinguish between soft hand over and hard hand over.

4. Define footprint with respect to satellite systems.

5. State the three phases of the medium access of different competing nodes.

6. What are the power saving mechanisms in Bluetooth?

7. What are the drawbacks of wired networks?

8. Define: Dynamic Source Routing.

9. What is the difference between TCP and UDP?

10. Mention any two salient features of WAP.

PART B- (5x16=80 marks)

11.(a)(i) Discuss in detail the types of Antennas with their radiation patterns.
(ii) Explain Diversity techniques.


(b) Explain Space, Frequency, Code and Time Division multiplexing in detail.

12.(a) Describe Digital Audio Broadcasting.


(b) Explain routing, localization and hand over in satellite systems.

13.(a) Describe the architecture of BLUE TOOTH.


(b) Explain channel control sub layer in HIPERLAN.

14.(a) Explain optimization in Mobile IP in detail.


(b) Explain IPv6 protocol in detail.

15.(a) Discuss the role of WWW in support for mobility.


(b) Explain the following:
(i) Indirect TCP.
(ii) Snooping TCP.
(iii) Explain about performance enhancing proxies.


Eighth Semester
Information Technology
(Regulation 2004)
Time: Three hours Maximum:100 marks
Answer ALL Questions.
PART A- (10 X 2= 20 marks)

1. Why is ERP important to a company?
2. List the two advantages of SCM.
3. Mention three risks of ERP.
4. What is the difference between verification and discovery in data mining.
5. What is general ledger?
6. What is just- in- time manufacturing?
7. List any four ERP softwares.
8. What is verticalization and localization.
9. What is TQM?
10. What are the new markets for ERP?

PART B- (5 X 16 = 80 Marks)

11. (a) Explain the technologies related to ERP. (16 Marks)
(b) Explain Data warehousing in detail. (16 Marks)

12. (a) Explain the role of vendors and consultants in ERP implementation. (16 Marks)
(b) Discuss the ERP implementation methodologies. (16 Marks)

13. (a) Explain the various sales and distribution sub- systems. (16 Marks)
(b) Discuss the materials management business module. (16 Marks)

14. (a) Describe the benefits of using SAP AG ERP software in detail. (16 Marks)
(b) Explain the features of Peoplesoft ERP software in detail. (16 Marks)

15. (a) Explain the roles of ERP and E- business in optimizing a company's performance. (16 Marks)
(b) Explain the benefits obtained by effective use of TQM in ERP implementation. (16 Marks)

CA5153 DESIGN AND ANALYSIS OF ALGORITHMS anna university previous year question paper



Time: Three hours Maximum: 100 marks

Answer all questions.

PART A – [10 X 2 = 20 marks]

1.What is amortized efficiency?

2.Write the names of the basic asymptotic efficiency classes with their growth functions.

3.Define the internal path length of an extended binary tree.

4.State the Triomino Puzzle problem.

5.What are the differences between dynamic programming and divide-and-conquer techniques?

6.Give two reasons why the memory function approach is unattractive for the problem of computing a binomial coefficient.

7.Write the differences between backtracking and branch-and-bound techniques.

8.Write the three reasons to terminate a search path at the current node in a state-space tree of a branch-and-bound algorithm.

9.What are the two types to show a decision problem is NP-Complete?

10.What is halting problem?

PART B – [5 X 16 = 80 marks]

11.(a) Briefly discuss the sequence of steps typically required in designing and analyzing an algorithm. (10)

(b) Design a recursive algorithm for computing 2n for any nonnegative integer n which is based on the formula 2n = 2n-1 + 2n-1. (6)


12.(a) Write a recursive algorithm for the Tower of Hanoi puzzle. Obtain the recurrence equation. (8)

(b) Solve the recurrence equation which is to be obtained the above by the method of backward substitution. (8)

13.(a) Write a Mergesort algorithm and explain with an example using divide-and-conquer technique. (8)

(b) Explain the working of binary search algorithm using divide-and-conquer with an example. (8)


14.(a) Write the Quicksort algorithm and illustrate the operation of the algorithm with an example. (8)

(b) Describe the Strassen’s Matrix Multiplication technique. (8)

15.(a) Write and explain the dynamic programming algorithm for computing a binomial coefficient. Obtain the time efficiency of the algorithm. (8)

(b) Explain the importance of optimal binary search tree. (8)


16.(a) Explain the Warshall’s algorithm for computing the transitive closure of a directed graph. (8)

(b) Design a dynamic programming algorithm and explain for finding an optimal order of multiplying n matrices. (8)

17.(a) State and explain the n-Queen problem using backtracking. (8)

(b) Apply the branch-and-bound technique in solving the Traveling Salesman Problem. (8)


18.(a) Illustrate the Branch-and-Bound approach of solving assignment problem. (8)

(b) Solve the following instance of the knapsack problem by the branch-and-bound algorithm, with W = 16. (8)

Item Weight Value
1 10 100
2 7 63
3 8 56
4 4 12

19.(a) Explain the procedure to solve the Traveling salesman Problem with approximation algorithms. (10)

(b) Give short notes on decision problems, undecidable problem, and NP-Complete problem. (6)


20.(a) Explain how the knapsack problem is solved with approximation algorithm. (8)

(b) Apply the nearest algorithm to the instance defined by the distance matrix below. Start the algorithm at the first city, assuming that the cities are numbered from 1 to 5. (8)


Computer Science and Engineering

CS 1010- C# and .NET Framework

Part-A(10*2=20 marks)

1. Differentiate value type and reference type.

2. Is it possible to have two Main() in a C# code? if so,how is it resolved?

3. What is the use of static constructor in C#?

4. What is the use of 'new' in inheritance ?

5. List out the different types of applications that can be created on .NET.

6. What are the advantages in using a dataset ?

7. What are the uses of server side controls ?

8. List out the server side state management options supported by ASP.NET.

9. What are assemblies ?

10.What is the difference between Single call and Singleton ?

Part-B(5*16=80 marks)

11. (a) (i) List out the various value and reference types supported
in C#.[8]

(ii)What is a jagged array ? Explain the use with example.[8]


(b) (i) Explain the execution model of the .NET framework. [6]

(ii)Describe the components of the .NET framework and explain the
features of each component. [10]

12. (a) (i) List out the exception handling statements supported in C# and
explain with an example. [8]

(ii)What is the use of 'is' operator in interfaces ? Explain. [8]


(b) (i) Consider a class distance which stores a distance value using
kilometer and meter. Overload the +operator to add two distance
objects. [8]

(ii)What is a delegate ? Explain with an example. [8]

13. (a) (i) List out the categories of controls supported in window based
application and explain the importance of each. [8]

(ii)Explain the process of creating a window based calculator with
your own UI. [8]


(b) (i) Compare the architecture of ADO with ADO.NET. [8]

(ii)Write a database application to display the details of student
table details in a datagrid control. [8]

14. (a) (i) Compare ASP with ASP.NET. [8]

(ii)Write a web based application to implement a ticket status
checking system. [8]


(b) Explain the web service architecture. What are the steps involved in
the creation and consumption of web services. Explain with an
example. [16]

15. (a) (i) Explain the features of CLR. [8]

(ii)What is reflection ? Explain its use with an example. [8]


(b) What is remoting ? Explain the steps involved in the process of
creating a remoting application. [16]


Computer Science and Engineering

IT 1402- Mobile Computing

Part-A(10*2=20 marks)

1. Assume a receiver is located 10 km from a 150 W transmitter. The carrier
frequency is 6 GHz and free space propagation is assumed, Gain at
transmitter is 1 dB and Gain at receiver is 1 dB.

(a) Calculate the transmit power in dBW.

(b) Find the power at the receiver in Watts.

2. What limits the number of simultaneous users in a TDM/FDM system compared
to a CDM system ? What happens to the transmission quality of connections
if the load gets higher on the cell ?

3. Consider the handoff procedure in GSM system that is based on relative
signal strength with threshold; that is, a mobile switches from one cell
to another if (a) the signal at the current BS is sufficiently weak (less
than a predefined threshold) and (b) the other signal is stronger than
the two. What are the drawbacks of this scheme, when the threshold is
too low or too high ?

4. State the different types of transport modes and channels used to carry
packets in Digital Audio Broadcasting.

5. In the Distributed Coordination Function(DCF) protocol of IEEE 802.11,
why does a Node wait only SIFS time units (after the last data packet
reception) before sending an ACK, while waiting DIFS time units before
attempting a data transmission ?

6. What are the advantages and problems of forwarding mechanisms in Bluetooth
networks regarding security and power saving ?

7. How can DHCP be used for mobility and support of Mobile IP ?

8. What are the differences between AODV and the standard distance vector
algorithm ? Why are extensions needed ?

9. How and why does I-TCP isolate problems on the wireless link ? What are
the main drawbacks of this solution ?

10.Mention two WAP service providers. Find two cell phones supporting WAP
and identify which WAP version they support.

Part-B(5*16=80 marks)

11. (a) How does frequency reuse enhance cellular network capacity ? Besides
the number of users, what other major factor influences the decision
on cluster size ? A cellular system uses frequency spectrum 1800 MHz
to 1840 MHz for uplink channels and 1860 MHz to 1900 MHz for downlink
channels respectively. Each channel takes 200 KHz and can be shared
by 8 users. Each user needs one uplink and one downlink channel. How
many users can be supported without frequency reuse in this cellular
system ? [16]


(b) What is the use of spread spectrum ? Sketch the block diagram of the
Transmitter and Receiver of DSSS. Explain what each block does and
what the signal looks like (in time and/or frequency domains) at each
location in the block diagram with an example.[16]

12. (a) Name the main elements of GSM system architecture and describe their
functions. What are the advantages of specifying not only the radio
interface but also the internal interfaces of the GSM system ?
Explain the inter-BSC,intra-MSC handover process in the GSM system
using typical signals and a message sequence chart. Explain the
decision points and the resource allocation steps,if they exist.[16]


(b) What is DAB ? Explain the components,frame format and the protocol
used by DAB to access different formats of data also describe how
DVB is used for data broadcasting and to access high speed internet.

13. (a) (i) Using IEEE 802.11 (DCF): S1 and S2 send CBR/UDP traffic to the
common destination D. Consider S1,S2 and D all within receive
range of each other when the basic scheme is used (no RTS/CTS):
Describe a collision (what happens before,during and after).What
does the collision probability depend on ? When RTS/CTS is used:
What are the changes to the previous answers ? comment also on
the throughput and fairness. [16]


(b) (i) Describe the briefly how collision is avoided in HIPERLAN-1. [8]

(ii)Draw the protocol architecture of Bluetooth and explain briefly
the Base band layer and L2CAP of Bluetooth. [8]

14. (a) Given the network topology below, use the dynamic source routing
algorithm to compute the shortest path from A to all other nodes.
Make sure to show the results of the computation at each step.[16]

B --- D
|\ 1/ |
| \ / |
12| /\ |1
| /10\ |
A --- C -------- E
3 1


(b) Consider a mobile node MN from network X. The user of MN wishes to
communicate with a corresponding node CN in network Y. The node MN
moves from X to a foreign network A. Describe the sequence of
messages that are required in Mobile IPv4 so that MN and CN can
continue to communicate. Include both the user data messages and the
Mobile IP control messages. Now, consider the case where CN moves to
foreign network B while MN is still in the foreign network A. Can
CN and MN still communicate ? (Does Mobile IP support both endpoints
moving? ) Show the message flow to indicate how it will succeed or
fail in this case. [16]

15. (a) As a transport layer protocol, TCP uses a window mechanism to
exercise flow control over the best effort IP in the internet.
Flow control is exercised by the edge router based on congestion
status encountered in the core routers between teh TCP sender and
TCP receiver.

(i) Describe the operation of the window flow control mechanism. [8]

(ii)ACKs from the TCP receiver are the basis that the TCP sender
uses to adjust the sending window size. Describe and discuss
how ACKs are used for this purpose. [8]


(b) Specify the enhancements made to the basic client server architecture
of the web to suit a mobile wireless user ? Briefly discuss the main
goals of WAP. Expain the layers of WAP protocol used to achieve the
following : A client wants to have a shared state with the server
for transferring the content. [16]


Computer Science and Engineering

EC 1008 - High Speed Networks

Part-A(10*2=20 marks)

1. Define cell switching.

2. Frame relay networks are faster than X.25 networks. Justify this

3. Mention any four queuing models used to measure the performance of

4. What is the purpose of choke packets in networks ?

5. Write short notes on slow start process of congestion control.

6. What is the necessity of a 3-way handshake protocol to establish a
transport layer connection ?

7. Mention any four features of ABR traffic.

8. What types of applications require GFR in ATM networks ?

9. What are the limitations of First Come First Served queuing discipline ?

10. RSVP is based on the concept of soft state. Justify this statement.

Part -B (5*16=80 marks)

11. (a) (i) Explain the B-ISDN reference model with a neat diagram. [8]

(ii)Draw the format of an ATM cell at UNI and NNI. Explain the
purpose of each field in the header.[8]


(b) (i) Explain the protocol stack of IEEE 802.11 Wireless LAN with a
neat diagram.[8]

(ii)Discuss about the different cabling and encoding schemes used
in the fast Ethernet.[8]

12. (a) (i) Discuss the various reasons that lead to congestion in

(ii)Consider a configuration in which packets are sent from computers
on a LAN to systems on other networks. All of these packets must
pass through a router that connects the LAN to a wide area
network and hence to the outside world. Let us look at the
traffic from the LAN to a WAN and hence to the outside world.
Let us look at the traffic from the LAN through the router.
Packets arrive with a mean arrival rate of 5 per second. The
average packet length is 144 octets and it is assumed that the
packet length is exponentially distributed Line speed from the
router to the wide area network is 9600 bps. The following
question are asked.

(1) What is the mean residence time for the router ?[2]

(2) How many packets are in the router, including those waiting
for transmission and the one currently being transmitted
for the 90th percentile ? [4]

(3) How many packets are in the router, including those waiting
for transmission and the one currently being transmitted
for the 95th percentile ? [4]


(b) (i) Describe the techniques followed in the network layer to deal
with congestion. [8]

(ii)Consider a LAN with 100 personal computers and a server that
maintains a commmon database for a query application. The
average time for the server to respond to a query is 0.6 seconds.
The standard deviation is estimated to equal the mean. At peak
times, the query rate over the LAN reaches 20 queries per minute.
We would like to answer the following questions.

(1) What is the average response time ignoring line overhead ?[2]

(2) If a 1.5 second response time is considered the maximum
acceptable, what percent growth in message load can occur
before the maximum is reached ? [3]

(3) If 20% more utilization is experienced, will response time
increase by more or less than 20% ? [3]

13. (a) (i) Explain the mechanisms followed by the early TCP specification
to maintain the timer. [8]

(ii)Explain the refinements proposed by Karn Patridge and Jacobson/
Karel to improve the basic timer management mechanism of TCP. [8]


(b) (i) Explain the mechanisms followed by the early TCP specification
to manage the window. [8]

(ii)Explain the refinements proposed by Nagle and Clark to avoid the
silly window syndrome faced by the window management. [8]

14. (a) (i) Justify the need for Fair Queuing and explain the Weighted Fair
Queuing scheduling discipline. [8]

(ii)Justify the need for the improvement in the basic drop tail
mechanism and explain the Random Early Drop dropping policy. [8]


(b) (i) Describe the various functional modules that must be present in
a router of the Integrated Services Architecture. [10]

(ii)Discuss the limitations of the ISA framework. [6]

15. (a) (i) Discuss the labeling and label switched path of MPLS network.[8]

(ii)Explain the stacking rules followed in the label switched path
of MPLS network. [8]


(b) (i) Illustrate the different ways of placing the RTP in the TCP/IP
reference model. [8]

(ii)Draw the TCP header and explain the various fields of RTP header
in detail. [8]

CS 1020 -Software Quality Management ANNA UNIVERSITY QUESTION BANK

Computer Science and Engineering

CS 1020 -Software Quality Management

Part-A(10*2=20 marks)

1. Mention the project parameters that affect the quality of product.

2. Differentiate the terms "Validity" and "reliability".

3. Define cost of quality.

4. Differentiate "Bugs","Errors" and "Defects".

5. Write the formula to compute defect removal efficiency.

6. Mention the criteria for evaluating the reliability model.

7. Give the pictorial view of inspection effort/defect rate when the actual
is compared with model.

8. Define cyclomatic complexity.

9. Why quality standards are needed?

10.In which way CMM differs from CMMI?

Part-B(5*16=80 marks)

11. (a) Explain briefly about the levels of quality measurement? [16]


(b) Explain the concept of product quality metrics and process quality
metrics by considering an example on your own. [16]

12. (a) List the constituency and their tasks to conduct software quality
assurance. Also enlist the activities conducted by SQA group for
attaining a high quality end product. [16]


(b) Explain how software engineers perform software quality control
activity in detail. [16]

13. (a) Write about the basic tools for quality control suggested by
Ishikawa. [16]


(b) Explain briefly about the dynamic software reliability models.[16]

14. (a) Why nonparametric PTR model is used for defect tracking ? How it is
used ? [16]


(b) Brief the five point satisfaction scale used in customer satisfaction
surveys. [16]

15. (a) Write a note on CMMI developed by software engineering institute.[16]


(b) Narrate a suitable solution for the application of six sigma concepts
and ISO 9000 series. [16]