The document is an examination paper for a Computer Networks course at PES University, covering various topics such as packet propagation, circuit vs. packet switching, DNS processes, email delivery protocols, and TCP connection management. It includes questions requiring calculations, diagrams, and explanations of networking concepts and protocols. The exam aims to assess students' understanding of networking fundamentals and their ability to apply theoretical knowledge to practical scenarios.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
13 views4 pages
CN Unit 3 PYQ
The document is an examination paper for a Computer Networks course at PES University, covering various topics such as packet propagation, circuit vs. packet switching, DNS processes, email delivery protocols, and TCP connection management. It includes questions requiring calculations, diagrams, and explanations of networking concepts and protocols. The exam aims to assess students' understanding of networking fundamentals and their ability to apply theoretical knowledge to practical scenarios.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
SRN
o PES University, Bengaluru
PES (edabianod under aratsha AcINo 16 0201) UE18CS301
DECEMBER 2020: END SEMESTER ASSESSMENT (ESA)
B.Tech (CSE) — V SEMESTER
UE18CS301 ~ Computer NETWORKS
Time: 3 Hrs Answer All Questions ‘Max Marks: 100
a)
Round your answer to two decimals after leading zeros.
|. How long does it take a packet of length 1000 bytes to propagate over a link of
distance 2500km, propagation speed 2.5x10"8 m/s, and transmnission rate 2
Mbps?
Consider the figure below, with three links, each with the specified transmission
rate and link length. Assume the length of a packet is 16000 bits. The speed of
light propagation delay on each link is 3x108 m/sec. Compute end-end delay.
‘Tranenteaion rate: 100 Nps
Line Length 9X
TranenLesion rate: 10 Mops
Une Length 5000 kn
b)
Refer to the exhibit below. Assume that Alice sends a packet to Bob via a switch and a
router. With a neat diagram, illustrate the physical path taken by the packet down the
‘Alice’s protocol stack and taken up at the Bob’s protocol stack (Hint: Encapsulation).
s—
10
°)
Compare circuit and packet switching with any four important differences.
a)
You are accessing www.cnn.com from your university network. Describe the process of
obtaining the IP address for the hostname assuming that it is not cached at the local
DNS server. Describe this for the recursive case with a neat diagram.
Write a short note on various DNS resource records with an example for each.
b)
Consider an e-commerce site (say, Amazon) that wants to keep a purchase record for
each of its customers. Describe how this can be done with cookies with a neat diagram.°)
‘Alice @umn.edu plans to send an email to Bob @google.com. Please describe the
sequence of actions of protocols to deliver this email to Bob's mailbox. Please also
describe the actions for Bob to access this email. A neat diagram would suffice.
a)
‘Assume there’s an institutional cache (proxy) in the client’s subnet. The client's initial
request is cached by this cache. Since news pages change frequently the client wants to
make sure that it does not get served an outdated HTML page from the cache. Explain
the HTTP mechanism that prevents this from happening. What would be in the body of
the second server reply if the reply would be 304 Not Modified?
Given the below Figure, that describes the evolution a TCP connection. Assuming that
‘TCP-Reno is being used, please answer the following questions.
2
5
4
:
8 7
a)
Ta eb 6 7 8 o Hor tsisieis toi7 io 1920 222320252627 297990
Tranemision Roun each rouné isan RTT)
i. Specify all the intervals of transmission rounds during which AIMD is being used.
Fictional e.g, of answer, AIMD is used in the following Intervals: 3-20, 45-50)
|. Specify all the interval of transmission rounds during which Slowstart is being
used.
|__ Identify transmission rounds where a loss is detected by triple duplicate ACKs.
iv, What is the initial value of ssthresh (ssthreshold)? Why?
Why doesn’t slow start use Additive Increase?
How many times does the value of ssthresh change? When do these changes
occur? And what is the new value after each change? (Here's a fictional example
of an answer, it changes once, at transmission round 45 it changes to 4.)
| Wha nest lara, describe the four steps involved in TCP closing sequence. Also
fy
justify why those steps are required.Consider the sliding window protocol in figure (a) & (b) below.
sender coceier sender coer
send pktO ‘send pled
send send pitt
ack send. pet
oo (walt) ack
t
( )
c) | i What does these figures (a) & (b) indicate - Go-Back-N or Selective Repeat or no | 7
adequate information to tell? Explain your answer separately and briefly.
Ji, Refer figure (b). Suppose the sender and receiver windows are of size N =5 and
suppose the sequence number space goes from 0 to 15. Show the position of
the sender and receiver windows over this sequence number space at time t
(the horizontal dashed line).
lil, Assume a TCP sender transmits 4 TCP segments with respective sequence
numbers 1200, 2400, 3600, 4800, 6000. The sender receives four
acknowledgements with the following sequence numbers, 2400, 2400, 2400,
2400, 7200. What could you infer from this?
Suppose datagrams are limited to 1,500 bytes including header) between source Host
‘and destination Host B. Assuming a 20-byte IP header, how many datagrams would
) | be required to send an MP3 consisting of 5 million bytes? What is the size of last 4
datagram? (Hint: MP3 file transfer uses ROT)
The topology below shows a small network with 3 routers which connects client and
server machines. Complete the static routing table entries for the Routers 1, 2and 3
respectively so that packets will be delivered successfully.
ted
ise * ice \ ew asi
B Such ‘aed server
b) a 10
aes sim yaora ares eosnana
With respect to above topology, answer the following.
i. When you ping from client to server. what will be the TTL value? Justify your
answer,
While pinging, disconnect the link between Router1 and Router2, What change
you will observe now and why?
On pinging from client to server, you receive a response “TTL expired in transit”
error. Why?Suppose an ISP owns a block of addresses of the form 128.119.40.64/26. Suppose It
wants to create 4 subnets from this block, with each block having the same number of
IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets? How many
6
| addresses per subnet is possible (including network and broadcast addresses)? What do
you mean by route summarization?
Consider hosts A, 8, C, D, E, F, Gand learning switches S1, 52, $3, 54, with their
corresponding port numbers marked as shown. Assume the switches were just
powered on so their forwarding tables are empty. Also assume that entries added to
each forwarding table do not have a timeout.
a) 10
i. Given that hosts send packets to each other in the following order, list all of the
hosts and switches that receive each packet.
M1: Host A sends a packet to Host 8
M2: Host A sends a packet to Host C
M3: Host E sends a packet to Host A
M4: Host C sends a packet to Host A
MS: Host B sends a packet to Host C
M6: Host G sends a packet to Host E
ji, Fillin the forwarding table for switch 2 as it will look after the above six packets
have been sent (note: some entries may be unused).
ii, With this forwarding table, will switch S2 know the exact port to send a packet
‘when it receives a packet from host A destined to any other host on the
network? Justify your answer.
Tn this question, you will put together much of what you have learned about
networking protocols. Suppose you walk into a Computer Science laboratory (say, B-
205), connect your laptop to Ethernet, and want to access Edmodo website. What are
py | the arotocl steps that take place, starting from powering on your PC to getting the | 5
web page? Assume there is nothing in our DNS or browser caches when you power on
your PC. (Hint: the steps include the use of Ethernet, DHCP, ARP, DNS, TCP, and HTTP
protocols.) Explicitly indicate in your steps how you obtain the IP and MAC addresses of
a gateway router with a suitable diagram.