MAC Sublayer Functions Explanation
MAC Sublayer Functions Explanation
solve this quetion properly from start to end and while at the group c portion give big big answers
Let's solve the MAKAUT Computer Networks Semester 6 exam (2023–2024) paper completely. You
asked for Group C to be answered with long, detailed explanations, so I’ll treat that accordingly.
5. TCP assigns a sequence number to each segment that is being sent. The sequence number
for each segment is the number of the _______ byte carried in that segment.
➤ first byte.
6. What are the transmission modes in FTP?
➤ Stream mode, Block mode, and Compressed mode.
7. In synchronous TDM, for n signal sources of the same data rate, what will be the number of
slots in each frame?
➤ n slots.
8. In bit stuffing, when is an extra 0 bit stuffed to the data section of the frame?
➤ After five consecutive 1s, a 0 is stuffed.
9. What are the number of bits required for IPv4 addresses when expressed in binary?
➤ 32 bits.
10. In the ____ bucket algorithm, bursty chunks are stored in bucket and sent out at an average
rate.
➤ Leaky bucket.
11. Why is PGP needed?
➤ Pretty Good Privacy (PGP) is needed for secure email communication — it provides encryption,
authentication, and integrity.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 1/15
12. The point where the secure internal network and untrusted external network meet and a
firewall is installed is known as ______.
➤ Demilitarized Zone (DMZ).
In active mode, the client opens a random port and tells the server to connect to it.
In passive mode, the server tells the client which port to use for data transfer.
Reduces overhead.
Pure ALOHA:
➤ Send any time. If no collision, success. Else, wait random time and resend.
➤ Vulnerable time = 2 × Tframe.
Slotted ALOHA:
➤ Time is divided into slots. Transmit only at slot boundaries.
➤ Vulnerable time = Tframe.
➤ Throughput is higher than Pure ALOHA (maximum ~37% vs ~18%).
csharp
Sender → F1 → F2 → F3 → ...
← ACK1 ← X (ACK2 lost)
Go back and resend from F2 onward
Private IPs are reserved IPs for internal network use (not routable on the internet).
Ranges:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
Needed to reduce IPv4 exhaustion and for internal communication.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 3/15
(b) DHCP State Transition Diagram [6]
States:
arduino
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 4/15
Token Bucket: Allows burst. Tokens accumulate; data sent when tokens exist.
➤ If enough tokens, a burst can go through.
Combination: Token Bucket for burst tolerance + Leaky Bucket for smooth output → optimized
QoS.
yes
Let's now complete the remaining Group C Long Answer Questions (Q10 and Q11) from your MAKAUT
Computer Networks Semester 6 exam paper, with detailed explanations as requested.
A packet filtering firewall operates at the network layer (Layer 3) of the OSI model and filters traffic
based on predefined rules related to the following criteria:
Source IP address
Destination IP address
Source port
Destination port
Protocol (TCP, UDP, ICMP, etc.)
🔧 Working Principle:
1. When a packet arrives at the firewall, it checks the header information.
2. The firewall compares it against a rule table (Access Control List - ACL).
✅ Advantages:
Lightweight and fast.
Easy to configure for basic security needs.
Can prevent unauthorized access from known IPs or ports.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 5/15
❌ Limitations:
Cannot inspect the packet content (no deep inspection).
Vulnerable to IP spoofing.
Cannot detect attacks in the payload.
Symmetric Key Encryption is a cryptographic technique where the same key is used for both encryption
and decryption of the message.
🧱 Block Diagram:
csharp
[Plaintext]
|
v
[Encryption Algorithm]
| (uses secret key K)
v
[Ciphertext] → (Sent over insecure channel) →
|
v
[Decryption Algorithm]
| (same key K)
v
[Plaintext]
🔐 Important Components:
Plaintext: Original data/message to be encrypted.
Key (K): A shared secret key known to both sender and receiver.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 6/15
DES (Data Encryption Standard)
RC4
Blowfish
✅ Advantages:
Faster than asymmetric encryption.
❌ Disadvantages:
Key distribution is difficult.
(a) Explain the Two Node Instability Problem in Distance Vector Routing. [5 marks]
In Distance Vector Routing, routers exchange information only with their immediate neighbors. The
two-node instability problem arises when:
Both routers keep increasing the metric to a particular destination indefinitely (called count-to-
infinity problem).
🧱 Scenario:
Router A and B connected to each other.
Destination network D is originally 1 hop away from A.
A loses connection to D.
(b) Solutions to the Two Node Instability Problem in Distance Vector Routing. [5
marks]
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 7/15
✅ 1. Split Horizon:
A router does not advertise a route back to the neighbor from which it learned that route.
✅ 3. Hold-Down Timers:
After a route becomes unreachable, routers wait for a certain period before accepting new
updates about that route. Helps avoid false reconvergence.
✅ 4. Triggered Updates:
When a route changes, send updates immediately, rather than waiting for the regular update
interval.
(c) Assume a packet has to visit two routers during transmission from source to
destination. Determine how many times the packet has to visit the network layer
and the data link layer. [5 marks]
Let’s break this step by step. A packet from source → Router 1 → Router 2 → Destination.
💡 At Each Hop:
The data link layer operates between each directly connected pair.
The network layer is involved at every device (source, routers, destination) for routing.
🧾 Total Traversals:
Device Network Layer Data Link Layer
Source 1 1
Router 1 1 2 (receive + forward)
Destination 1 1
Total 4 6
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 8/15
Let me know if you'd like a clean PDF version of the entire solution or help with practicing more CN
problems!
Here’s a detailed explanation of all Group-B questions from the MAKAUT 2023–24 Semester 6
Computer Networks exam (EC602/PCC-CS602):
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to
another over a TCP/IP-based network, such as the internet.
🌐 Client-Server Model:
FTP uses a client-server architecture.
The FTP client initiates a connection to an FTP server to perform operations like uploading or
downloading files.
🔄 Modes of Operation:
Active Mode:
➤ Client opens a random port and tells the server (through the control connection) to connect back
to that port to send data.
Passive Mode:
➤ Server opens a random port and tells the client to initiate the data connection.
➤ Useful when client is behind a firewall.
Q3. Describe the functions of the Session Layer of the OSI Reference Model.
The Session Layer is Layer 5 in the OSI (Open Systems Interconnection) model. It acts as a dialogue
controller between two communicating devices.
2. Dialog Control:
3. Synchronization:
Inserts checkpoints into data streams.
If a failure occurs, communication can resume from the last checkpoint, not from the
beginning.
4. Token Management:
In collaborative environments, a token is passed so only the holder can perform certain
operations (e.g., editing a document).
5. Session Recovery:
In case of session interruption, the layer can help resume from a known good state.
📍 Example:
In video conferencing or file transfer applications, the session layer ensures that the session persists
even if there's temporary disconnection and that data integrity is maintained.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 10/15
🔁 How it Works:
Normally, when Host A sends data to Host B, Host B needs to send an ACK.
Instead of sending the ACK immediately, Host B waits until it has data to send to Host A and
includes the ACK in the header of the data packet.
✅ Advantages of Piggybacking:
1. Improved Efficiency:
❌ Limitation:
If the receiver has no data to send back, ACKs might be delayed, leading to retransmission
timeouts.
Q5. What is the first address of a block of classless addresses if one of the addresses
is 12.2.2.76/27?
To find the first (network) address of a CIDR block, we calculate based on the /27 subnet mask.
Step-by-step:
IP Address: 12.2.2.76
2 × 32 = 64
So, the network address = 12.2.2.64
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 11/15
✅ Answer: 12.2.2.64 is the first address of the block.
Q6. Can the receiver be absolutely sure that no bit errors have occurred if the UDP
checksum matches? What about TCP?
UDP Checksum:
✅ If the checksum matches, it suggests no errors, but it's not 100% guaranteed because:
Some types of errors (e.g., bit inversions that cancel each other) can go undetected.
The checksum is not cryptographically strong.
ACKs
Retransmissions
Flow and congestion control
✅ So, while TCP checksum alone can't guarantee no errors, the overall reliability mechanisms
ensure error detection and recovery.
Would you like me to turn these Group-B explanations into a printable PDF or help you practice similar
questions for preparation?
i cant understanf q5
Q5. What is the first address of a block of classless addresses if one of the addresses
is 12.2.2.76/27?
IP Address: `12.2.2.76`
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 12/15
Subnet mask: `/27`
We are asked:
👉 "What is the first address (i.e., network address) of this block?"
255.255.255.224
This mask keeps 27 bits for network, and 5 bits for host (because 32 − 27 = 5)
So, number of addresses in this block =
25 = 32
👉 Each block will have 32 IP addresses.
✅ Step 2: Find which block `12.2.2.76` belongs to
To find the first address of the block, we need to find the nearest multiple of 32 that is less than or
equal to 76.
✅ Final Answer:
The first address of the block is: `12.2.2.64`
Let me know if you'd also like a visual diagram to explain this, or want help solving more subnetting
problems!
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 13/15
isnt there a similar kind of question in group C ,plese exaplin that also
Yes! You're absolutely right, Nasim — there is a very similar question in Group C, specifically:
✅ Group C, Q8(c):
"A block of 16 addresses is granted to a small organization. If one of the addresses is
205.16.37.39/28, what are the first and last addresses in the block?"
Let’s break it down step by step just like we did with the previous one:
24 = 16
We need to find the first address (network address) of the block that contains `205.16.37.39`.
Since each block has 16 addresses, look at the nearest multiple of 16 that is less than or equal to 39.
Multiples of 16:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 14/15
✅ Step 4: Find usable IP range (optional bonus)
If needed, you could also mention:
✅ Final Answer:
First address (network): `205.16.37.32`
Last address (broadcast): `205.16.37.47`
Let me know if you’d like to practice more CIDR subnetting problems, or want this included in a
summarized PDF notes file!
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 15/15