Computer Networks - B.Tech. 7th Semester Examination, 2023

2023Semester 3Civil-CAEnd Semester
Bihar Engineering University, Patna
B.Tech. 7th Semester Examination, 2023

Computer Networks

Time: 03 HoursCode: 110715Full Marks: 70

Instructions:

  1. The marks are indicated in the right-hand margin.
  2. There are NINE questions in this paper.
  3. Attempt FIVE questions in all.
  4. Question No. 1 is compulsory.
Q.1 Choose the correct answer of the following (Any seven question only):[14]
  1. Flow control is the responsibility of?

    1. Data Link Layer
    2. Transport Layer
    3. Both (a) and (b)
    4. Application Layer
  2. Which one of the following layers of abstraction is not present in the TCP/IP (Transmission Control Protocol/Internet Protocol) model but is included in the OSI model?

    1. Network layer.
    2. Transport layer.
    3. Session layer.
    4. Application layer.
  3. How many bits are required to represent IPv4 address in any IPv4 header?

    1. 64 bits.
    2. 32 bits.
    3. 16 bits.
    4. 8 bits.
  4. Which one of the following functionalities do TCP and UDP have in common?

    1. In-order delivery.
    2. Reliable transfer.
    3. Checksum.
    4. Connection establishment.
  5. What type of application would prefer UDP transport service?

    1. Video conferencing.
    2. World Wide Web (WWW).
    3. Online chess game.
    4. Email.
  6. Which one of the following statements is true about Go-Back-N (GBN) protocol?

    1. Sequence number in GBN needs to be at least twice as large as the window size.
    2. GBN uses multiple timers.
    3. GBN retransmits packets upon receiving duplicate acknowledgements.
    4. GBN discards packets that are received out of order.
  7. Which one of the following statements is true about Selective Repeat (SR) protocol?

    1. SR receiver sends duplicate acknowledgement for all packets that are not expected.
    2. SR uses multiple timers.
    3. SR retransmits packets upon receiving duplicate acknowledgements.
    4. SR uses cumulative acknowledgement.
  8. Which one of the following statements is true about TCP's "Slow Start" algorithm?

    1. TCP's congestion window size increases linearly.
    2. TCP's congestion window size decreases linearly.
    3. TCP's congestion window size increases exponentially.
    4. TCP's congestion window size decreases exponentially.
  9. In which computer network topology, a single cable is used, through which all data propagates and to which all computers and networked nodes are connected?

    1. Star.
    2. Bus.
    3. Ring.
    4. Mesh.
  10. Bluetooth is the wireless technology for -

    1. Personal area network.
    2. Local area network.
    3. Metropolitan area network.
    4. Wide area network.
Q.2 Solve both questions:[10+4=14]
  1. List, in order, the layers of the TCP/IP protocol stack, and briefly write the functions provided by each layer. Also give an example of a protocol or networking technology associated with each layer.

  2. Draw the IPV4 Datagram Header Format and explain it.

Q.3 Solve both questions:[4+10=14]
  1. What are the differences in the treatment of collisions in CSMA/CD (Carrier Sense Multiple Access, with Collision Detection) and CSMA/CA (Carrier Sense Multiple Access, with Collision Avoidance)?

  2. Write down the sender-side steps and the receiver-side steps in Cyclic Redundancy Check (CRC) method, with examples.

Q.4 Solve all three questions:[3+5+6=14]
  1. Explain why Slotted ALOHA approach performs better than pure ALOHA approach?

  2. In a Slotted ALOHA system, suppose there are 5 nodes, in which each node transmits a frame with probability \( p \). What is the probability that in a given time slot, one of the nodes successfully transmits a frame?

  3. Consider a sender S and a receiver R that are connected on a network, where the one-way latency is 250 milliseconds. The data rate of that network is 32000 bits per second, and size of each frame in that network is 1000 bits. Assume that S and R are using sliding windows with Selective Repeat. How large must the sliding window for S be in order to maximize the utilization?

Q.5 Solve both questions:[7+7=14]
  1. Discuss Link-State routing protocol with an example.

  2. Explain count-to-infinity problem associated with distance vector routing. Discuss the countermeasures taken in Split Horizon and Poison Reverse techniques.

Q.6 Solve both questions:[7+7=14]
  1. An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for 2 organizations each 500 addresses, 2 organizations each with 250 addresses and 3 organizations each with 50 addresses. Design a subnet and find the range of addresses and unallocated addresses for each organization.

  2. Compare any two the following: (i) TCP and UDP. (ii) Packet switching and Circuit switching (iii) Bit-stuffing and Byte-stuffing

Q.7 Solve both questions:[9+5=14]
  1. Consider a router receiving an IP packet of header size 20 Bytes (having no optional fields) and payload size of 4000 Bytes. Now the router must now transmit this packet across an Ethernet network, which has Maximum Transmission Unit (MTU) of 1500 Bytes. If the router attempts to send the maximum payload bits permissible in each attempt, how fragmentation is to be carried out to transmit the IP packet in the Ethernet network?

  2. What are the differences between leaky bucket algorithm and token bucket algorithm?

Q.8 Solve both questions:[8+6=14]
  1. Write down the handshaking steps required to setup a TCP connection between two applications running on two end-hosts A and B. Also, write down the purpose of each data unit of TCP that is sent and received for establishing TCP connection.

  2. Write down the similarities and differences between Hyper-Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP).

Q.9 Write short notes on any two of the following:[7x2=14]
  1. Hamming distance

  2. DNS

  3. DHCP

  4. Telnet