Course Code : CAT 205 QVRU/RS – 22 / 1171
Fourth Semester B. Tech. ( Computer Science and Engineering /
Artificial Intelligence and Machine Learning ) Examination
COMPUTER NETWORKS
Time : 3 Hours ] [ Max. Marks : 60
Instructions to Candidates :—
(1) All questions are compulsory.
(2) All questions carry marks as indicated against them.
(3) Assume suitable data and illustrate answers with neat sketches wherever necessary.
1. (a) Differentiate the current working protocol stack with the OSI Referenced
Model. 5 (CO 1)
(b) Differentiate between Wired LAN and Wireless LAN. 5 (CO 1)
2. (a) Given the message D = 1010001101 (10 bits) with pattern P as 110101 (6 bits).
Determine the FCSR which is transmitted over channel. 4 (CO 2)
(b) (i) Find the line utilization in stop and wait protocol if the network
bandwidth is 2 MBPS and one way delay is 25 ms and packet
size is 2 KB.
(ii) A 1000 KM long network operates at 1 Mbps is used to
transmit 32 bytes frame and uses SWP. If the propagation speed
is 4 µsec / km. How many bits should the sequence number be ?
4 (CO 2)
(c) Discuss stop with Wait protocol with suitable example. 4 (CO 2)
3. (a) For the IEEE802.11 MAC protocol for wireless communication which of
the following is / are true ? Provide justification for your answer :
(I) At least three non - overlapping channels are available for
transmission.
QVRU/RS-22 / 1171 Contd.
(II) The RTS - CTS mechanism is used for collision detection.
(III) Unicast frames are ACKed.
(a) All. I, II and III.
(b) I and III only.
(c) II and III only.
(d) II only. 3 (CO 3)
(b) Demonstrate the mandatory access mechanism of IEEE802.11. 5 (CO 3)
4. (a) Point out various deficiency of RARP protocol, Describe the scenarios for
BOOTP Protocol. 4 (CO 4)
(b) Consider the following routing table at an IP router :
Network No. Network mask Next Hop
[Link] [Link] Interface 0
[Link] [Link] Interface 1
[Link] [Link] R2
[Link] [Link] R3
[Link] Default R4
For each IP Address in G1 identify the correct next hop entry from G2
using the entries from the routing table above :
G1 G2
i. [Link] a. Interface 0
ii. [Link] b. Interface 1
iii. [Link] c. R2
iv. [Link] d. R3
e. R4 4 (CO 4)
(c) Consider a Class C network with subnet of 7 and 25 hosts per subnet,
propose an appropriate subnet mask. 2 (CO 4)
QVRU/RS-22 / 1171 2 Contd.
5. (a) Define Flow control in TCP. Design the state transition diagram for TCP
protocol. 4 (CO 5)
(b) Provide leaky bucket and token bucket algorithm for congestion control.
4 (CO 5)
(c) Differentiate the working of TCP and UDP protocol. 4 (CO 5)
6. (a) Demonstrate the working of TELNET protocol. State the limitation of FIREWALL.
4 (CO 5)
(b) Comment on Role of AI in network environment. Use suitable example
to describe its key benefits in real world. 4 (CO 5)
QVRU/RS-22 / 1171 3 75