18CS46
18CS46
USN
RV COLLEGE OF ENGINEERING®
(An Autonomous Institution affiliated to VTU)
IV Semester B. E. Grade Improvement Examinations Nov-2020
Computer Science and Engineering
COMPUTER NETWORKS
Time: 03 Hours Maximum Marks: 100
Instructions to candidates:
1. Answer all questions from Part A. Part A questions should be answered
in first three pages of the answer book only.
2. Answer FIVE full questions from Part B.In Part B question number 2, 7
and 8 are compulsory. Answer any one full question from 3 and 4 & one
full question from 5 and 6
PART A
1 1.1 The data link layer subdivided into two protocol sublayers _________ and
_________. 01
1.2 Match the following:
(𝑃) 𝑆𝑀𝑇𝑃 (1)𝐴𝑝𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝑙𝑎𝑦𝑒𝑟
(𝑄 )𝐵𝐺𝑃 (2) 𝑇𝑟𝑎𝑛𝑠𝑝𝑜𝑟𝑡 𝐿𝑎𝑦𝑒𝑟
(𝑅) 𝑇𝐶𝑃 (3) 𝐷𝑎𝑡𝑎 𝑙𝑖𝑛𝑘 𝑙𝑎𝑦𝑒𝑟
(𝑆) 𝑃𝑃𝑃 (4) 𝑁𝑒𝑡𝑤𝑜𝑟𝑘 𝑙𝑎𝑦𝑒𝑟
(5) 𝑃ℎ𝑦𝑠𝑖𝑐𝑎𝑙 𝑙𝑎𝑦𝑒𝑟 02
1.3 In the 𝐼𝑃𝑉4 addressing format, the number of networks allowed under class
C addresses is _________. 02
1.4 Define the term Flooding. 01
1.5 There are n stations in a slotted 𝐿𝐴𝑁. Each station attempts to transmit
with a probability 𝑝 in each time slot. What is the probability that 𝑂𝑁𝐿𝑌 one
station transmits in a given time slot? 02
1.6 In _________ routing algorithm each router maintained a table (i.e vector),
indexed by, and containing one entry for, each router in the subnet. 01
1.7 A computer on a 10 𝑀𝑏𝑝𝑠 network is regulated by a token bucket. The token
bucket is filled at a rate of 2𝑀𝑏𝑝𝑠. It is initially filled to capacity with
16Megabits. What is the maximum duration for which the computer can
transmit at the full 10𝑀𝑏𝑝𝑠? 02
1.8 If a class 𝐵 network on the Internet has a subnet mask of 255.255.248.0,
what is the maximum number of hosts per subnet? 01
1.9 Suppose the round trip propagation delay for a 10𝑀𝑏𝑝𝑠 Ethernet having
48-bit jamming signal is 46.4 𝑚𝑠. The minimum frame size is _________. 01
1.10 How many bits are allocated for network id (𝑁𝐼𝐷) and host id (𝐻𝐼𝐷) in the 𝐼𝑃
address 25.193.155.233? 02
1.11 Differentiate between interior gateway protocol, within each 𝑁𝑊 exterior
gateway protocol. 02
1.12 Consider different activities:
m1:Send an email from a mail client to mail server
m2:Download an email from mailbox server to a mail client
m3:Checking email in a web browser
Which is the application level protocol user should use in each activity? 02
1.13 A stream of packets from a source to a destination is called a __________. 01
PART B
All the routers use the distance vector based routing algorithm to update
their routing tables. Each router starts with its routing table in initialized to
contain an entry for each neighbor with the weight of the respective
connecting link. After all the routing tables stabilize, how many links in the
networks will never be used for carrying any data? 04
c Compare Link State Routing and Distance vector Routing algorithms. 04
OR
OR
6 a Describe the internetworking happens with tunneling. Mention its
advantages and disadvantages. 08
b Suppose a 𝑇𝐶𝑃 message containing 2048 bytes of data +20 bytes 𝑇𝐶𝑃𝐻 is
passed to 𝐼𝑃 for delivery across two networks in 𝑁1 & 𝑛2
𝑁1: 14-Bytes Header; 𝑀𝑇𝑈 1024 bytes
𝑁2: 8-Bytes Header; 𝑀𝑇𝑈 512 bytes
Give the sizes and offsets of the sequence of fragments delivered to the
network layer at the destination host 08