0% found this document useful (0 votes)
29 views

18CS46

Uploaded by

SAKSHAM PRASAD
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

18CS46

Uploaded by

SAKSHAM PRASAD
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

18CS46

USN
RV COLLEGE OF ENGINEERING®
(An Autonomous Institution affiliated to VTU)
IV Semester B. E. Grade Improvement Examinations Nov-2020
Computer Science and Engineering
COMPUTER NETWORKS
Time: 03 Hours Maximum Marks: 100
Instructions to candidates:
1. Answer all questions from Part A. Part A questions should be answered
in first three pages of the answer book only.
2. Answer FIVE full questions from Part B.In Part B question number 2, 7
and 8 are compulsory. Answer any one full question from 3 and 4 & one
full question from 5 and 6
PART A

1 1.1 The data link layer subdivided into two protocol sublayers _________ and
_________. 01
1.2 Match the following:
(𝑃) 𝑆𝑀𝑇𝑃 (1)𝐴𝑝𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝑙𝑎𝑦𝑒𝑟
(𝑄 )𝐵𝐺𝑃 (2) 𝑇𝑟𝑎𝑛𝑠𝑝𝑜𝑟𝑡 𝐿𝑎𝑦𝑒𝑟
(𝑅) 𝑇𝐶𝑃 (3) 𝐷𝑎𝑡𝑎 𝑙𝑖𝑛𝑘 𝑙𝑎𝑦𝑒𝑟
(𝑆) 𝑃𝑃𝑃 (4) 𝑁𝑒𝑡𝑤𝑜𝑟𝑘 𝑙𝑎𝑦𝑒𝑟
(5) 𝑃ℎ𝑦𝑠𝑖𝑐𝑎𝑙 𝑙𝑎𝑦𝑒𝑟 02
1.3 In the 𝐼𝑃𝑉4 addressing format, the number of networks allowed under class
C addresses is _________. 02
1.4 Define the term Flooding. 01
1.5 There are n stations in a slotted 𝐿𝐴𝑁. Each station attempts to transmit
with a probability 𝑝 in each time slot. What is the probability that 𝑂𝑁𝐿𝑌 one
station transmits in a given time slot? 02
1.6 In _________ routing algorithm each router maintained a table (i.e vector),
indexed by, and containing one entry for, each router in the subnet. 01
1.7 A computer on a 10 𝑀𝑏𝑝𝑠 network is regulated by a token bucket. The token
bucket is filled at a rate of 2𝑀𝑏𝑝𝑠. It is initially filled to capacity with
16Megabits. What is the maximum duration for which the computer can
transmit at the full 10𝑀𝑏𝑝𝑠? 02
1.8 If a class 𝐵 network on the Internet has a subnet mask of 255.255.248.0,
what is the maximum number of hosts per subnet? 01
1.9 Suppose the round trip propagation delay for a 10𝑀𝑏𝑝𝑠 Ethernet having
48-bit jamming signal is 46.4 𝑚𝑠. The minimum frame size is _________. 01
1.10 How many bits are allocated for network id (𝑁𝐼𝐷) and host id (𝐻𝐼𝐷) in the 𝐼𝑃
address 25.193.155.233? 02
1.11 Differentiate between interior gateway protocol, within each 𝑁𝑊 exterior
gateway protocol. 02
1.12 Consider different activities:
m1:Send an email from a mail client to mail server
m2:Download an email from mailbox server to a mail client
m3:Checking email in a web browser
Which is the application level protocol user should use in each activity? 02
1.13 A stream of packets from a source to a destination is called a __________. 01
PART B

2 a Draw and explain 𝑇𝐶𝑃/𝐼𝑃 protocol suite in detail. 08


b Suppose the following sequence of bits arrives at the receiver over a link:
1101011111010111110010111110110
Show the resulting frame after stuffed bits, if any, have been removed.
Indicate any errors that might have been introduced into the frame. Defend
your answer. 04
c Describe the frame format for Point-to-Point protocol(𝑃𝑃𝑃) 04

3 a Differentiate between datagram and virtual circuit subnet. 08


b Consider a network with 6 routers 𝑅1 to 𝑅6 connected with links having
weights as show in the following diagram.

All the routers use the distance vector based routing algorithm to update
their routing tables. Each router starts with its routing table in initialized to
contain an entry for each neighbor with the weight of the respective
connecting link. After all the routing tables stabilize, how many links in the
networks will never be used for carrying any data? 04
c Compare Link State Routing and Distance vector Routing algorithms. 04

OR

4 a Demonstrate the working principle of Link State routing with suitable


example. 08
b Foe hierarchical routing with 4800 routers, What region and cluster sizes
should be chosen to minimize the size of the routing table for a three-layer
hierarchy? 03
c Discuss the different ways used to implement Broadcast Routing. 05

5 a Distinguish between integrated and differentiated services. Describe the


scheme of assured forwarding with relevant diagram. 08
b A computer on a 6 − 𝑀𝑏𝑝𝑠 network is regulated by a token bucket. The
token bucket is filled at a rate of 1 𝑀𝑏𝑝𝑠. It is initially filled to capacity with
8 megabits. How long can the computer transmit at the full 6 𝑀𝑏𝑝𝑠? 03
c Discuss the different ways to implement Traffic Throttling. 05

OR
6 a Describe the internetworking happens with tunneling. Mention its
advantages and disadvantages. 08
b Suppose a 𝑇𝐶𝑃 message containing 2048 bytes of data +20 bytes 𝑇𝐶𝑃𝐻 is
passed to 𝐼𝑃 for delivery across two networks in 𝑁1 & 𝑛2
𝑁1: 14-Bytes Header; 𝑀𝑇𝑈 1024 bytes
𝑁2: 8-Bytes Header; 𝑀𝑇𝑈 512 bytes
Give the sizes and offsets of the sequence of fragments delivered to the
network layer at the destination host 08

7 a Consider an application with a server and a number of remote clients.


Discuss the different socket primitives for a simple transport service to
implement the above application. 08
b Explain in detail the working principle of 𝑅𝑇𝑃 and 𝑅𝑇𝐶𝑃 protocols. 08

8 a The following is a partial dump of a 𝑇𝐶𝑃 header in hexadecimal format:


0532001700000001 00000000 500207𝐹𝐹 00000000
i) What is the source port number?
ii) What is the application being used?
iii) What is the sequence number?
iv) What is the ack number? 08
b Draw and explain in detail the architecture of Electronic mail service? What
are the protocols used to implement the different component of Electronic
mail service. 08

You might also like