CIA 2 - Computer Networks - QB
CIA 2 - Computer Networks - QB
PART A
1. Compare IP4 and IP6 and Expand the address 0:15::1:12:1213 to its original.
2. Compute the size of the window for host A if the value of rwnd is 3000 bytes and the value of
cwnd is 3500 bytes?
3. List out the drawbacks of User Datagram Protocols (UDP) and compare with Transmission
Control protocol (TCP)
4. Illustrate the Datagram of Transmission Control protocol (TCP)
5. Mention the features and types of VoIP
6. The TCP server sends the SYN +ACK segments to the fake clients, which are lost. Interpret
the attack and methods to overcome.
7. Define back pressure and choke point in congestion mechanism
8. Interpret the ways of checking network reachability.
9. Compare the retransmission policy with the Admission policy in TCP congestions
10. Draw the frame format of IEEE802.3
13. Define sub-netting in network layer and list its various classes.
16. Compare open loop congestion control and closed loop congestion control.
Page 1 of 3
PART-B
i Explain the function of Bluetooth (IEEE 802.15.1) with required datagram and illustrations
Alternatively asked as
Assume you are working in a software company where you have been allotted with Team ‘A’ and
Team ‘A’ consist of 26 members including Project manager and Team members. Among the 26
members your position is 14. Let’s consider you have to form a team of three members and
complete the new task. You have the option to select the team members as prime numbers from
your position. You need to exchange the task between the team members in radio telegraphy
whose operating frequency is between 2.40 GHz – 2.48 GHz with a guard band of 2 MHz which is
limited to a short range communication. Construct the mechanism for this radio telegraphy with a
required architecture.
ii Illustrate that Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an Internet Protocol (IP) host with its IP address and other related
configuration information
i
For the above network, using distance vector routing, generate the following routing tables:
Page 2 of 3
i Examine that Simple Network Management Protocol (SNMP) is an application-layer protocol for
monitoring and managing network devices on our campus local area network (LAN).
ii Explain the following concepts with the required illustration and examples
a) Firewall
b) DoDS attack
i Justify that Quality of service (QoS) is the use of mechanisms or technologies that work on a
network to control traffic and supports the performance of critical applications with limited network
capacity
ii Justify the significance of the following methods in application layer of OSI model
a) FTP (File Transfer Protocol)
b) WWW and HTTPs
Using Bellman-Ford algorithm identify the shortest paths from Source node ‘A’ to the destination
node ‘G’ with their respective routing tables.
Intricate the use of mechanisms or technologies that work on a network to control traffic and ensure
the performance of critical applications with limited network capacity.
Illustrate the three-way process of synchronization, synchronization and acknowledgement and
acknowledgement in detail where the message exchanged between client and server for
connection establishment in TCP.
Justify and elaborate with its working why a DNS system is required instead of directly using IP
addresses.
Page 3 of 3