Computer Networks - B.Tech. 7th Semester Examination, 2023
Computer Networks
Instructions:
- The marks are indicated in the right-hand margin.
- There are NINE questions in this paper.
- Attempt FIVE questions in all.
- Question No. 1 is compulsory.
-
Flow control is the responsibility of?
-
Which one of the following layers of abstraction is not present in the TCP/IP (Transmission Control Protocol/Internet Protocol) model but is included in the OSI model?
-
How many bits are required to represent IPv4 address in any IPv4 header?
-
Which one of the following functionalities do TCP and UDP have in common?
-
What type of application would prefer UDP transport service?
-
Which one of the following statements is true about Go-Back-N (GBN) protocol?
-
Which one of the following statements is true about Selective Repeat (SR) protocol?
-
Which one of the following statements is true about TCP's "Slow Start" algorithm?
-
In which computer network topology, a single cable is used, through which all data propagates and to which all computers and networked nodes are connected?
-
Bluetooth is the wireless technology for -
-
List, in order, the layers of the TCP/IP protocol stack, and briefly write the functions provided by each layer. Also give an example of a protocol or networking technology associated with each layer.
-
Draw the IPV4 Datagram Header Format and explain it.
-
What are the differences in the treatment of collisions in CSMA/CD (Carrier Sense Multiple Access, with Collision Detection) and CSMA/CA (Carrier Sense Multiple Access, with Collision Avoidance)?
-
Write down the sender-side steps and the receiver-side steps in Cyclic Redundancy Check (CRC) method, with examples.
-
Explain why Slotted ALOHA approach performs better than pure ALOHA approach?
-
In a Slotted ALOHA system, suppose there are 5 nodes, in which each node transmits a frame with probability \( p \). What is the probability that in a given time slot, one of the nodes successfully transmits a frame?
-
Consider a sender S and a receiver R that are connected on a network, where the one-way latency is 250 milliseconds. The data rate of that network is 32000 bits per second, and size of each frame in that network is 1000 bits. Assume that S and R are using sliding windows with Selective Repeat. How large must the sliding window for S be in order to maximize the utilization?
-
Discuss Link-State routing protocol with an example.
-
Explain count-to-infinity problem associated with distance vector routing. Discuss the countermeasures taken in Split Horizon and Poison Reverse techniques.
-
An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for 2 organizations each 500 addresses, 2 organizations each with 250 addresses and 3 organizations each with 50 addresses. Design a subnet and find the range of addresses and unallocated addresses for each organization.
-
Compare any two the following: (i) TCP and UDP. (ii) Packet switching and Circuit switching (iii) Bit-stuffing and Byte-stuffing
-
Consider a router receiving an IP packet of header size 20 Bytes (having no optional fields) and payload size of 4000 Bytes. Now the router must now transmit this packet across an Ethernet network, which has Maximum Transmission Unit (MTU) of 1500 Bytes. If the router attempts to send the maximum payload bits permissible in each attempt, how fragmentation is to be carried out to transmit the IP packet in the Ethernet network?
-
What are the differences between leaky bucket algorithm and token bucket algorithm?
-
Write down the handshaking steps required to setup a TCP connection between two applications running on two end-hosts A and B. Also, write down the purpose of each data unit of TCP that is sent and received for establishing TCP connection.
-
Write down the similarities and differences between Hyper-Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP).
-
Hamming distance
-
DNS
-
DHCP
-
Telnet