It-3009 (CN) - CS Mid Sept 2022
It-3009 (CN) - CS Mid Sept 2022
Semester: 5th
4th
Subject
Sub & Code: OSComputer
Name:- Network
& CS - 2009
Code:- IT-3005
Branch (s): CSE, IT, CSSE, CSCE
Branch (s): -
ANS: 16
b) What are the minimum functionality should be implemented by a transport protocol over
and above the network protocol?
ANS: End to end connectivity is the required functionality provided by Trnasport protocol.
UDP of transport layer protocol that doesn’t implement other three functionalities, they are
implemented only in TCP
c) A client uses UDP to send data to a server. The data is 16 bytes long. Calculate the
efficiency of transmission at the UDP level.
ANS: 8 byte header + 16 bytes data = 24 bytes
16/24 = 66.667% efficiency
d) What would be the type of resource record (RR) that contains the canonical name of the
host?
ANS: CNAME
(b) Using caching, the response time of downloading a object can be reduced. However, it may
introduce a stale cache problem. Describe how HTTP handle this problem.
ANS: Stale data is an artifact of caching, in which an object in the cache is not the most recent version
committed to the data source. To avoid stale data, implement an appropriate cache locking strategy.
Semester:
Semester: 5th
4th
Subject
Sub & Code: OSComputer
Name:- Network
& CS - 2009
Code:- IT-3005
Branch (s): CSE, IT, CSSE, CSCE
Branch (s): -
The following shows how a HTTP client imposes the modification data and time condition on a request.
The status line in the response shows the file was not modified after the defined point in time. The body
of the response message is also empty.
3. [ 2.5+2.5 ]
(a) DNS can use either UDP or TCP as a transport layer protocol. Explain, in what circumstance UDP is
preferred over TCP and vice-versa.
ANS: There are the following interesting facts about TCP and UDP on the transport layer.
1) UDP is much faster. TCP is slow as it requires a 3-way handshake. The load on DNS servers is also
an important factor.
2) DNS requests are generally very small and fit well within UDP segments.
3) UDP is not reliable, but reliability can be added to the application layer. An application can use UDP
and can be reliable by using a timeout and resend at the application layer.
Actually, DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests.
DNS queries consist of a single UDP request from the client followed by a single UDP reply from the
server. When the length of the answer exceeds 512 bytes, larger UDP packets are used. Otherwise, the
query is sent again using the Transmission Control Protocol (TCP). TCP is also used for tasks such as
zone transfers.
(b) Following are the information for a TCP Client and a Server:
– The MSS (Maximum Segment Size) in both directions is 1000 bytes.
– The ISN (Initial Sequence Number) for Client is 50 and for Server is 81.
The Client sends 2000 bytes to the Server and the Server sends 3000 bytes to the client. Give the
complete TCP message exchange between client and server. For each segment draw a vector showing
the value of the SYN, ACK and FIN bits, with the value of the SEQ (Sequence Number) and the ACK
(Acknowledgement Number). Assume no packets are lost and the application consumes the data as soon
as it is received.
Semester:
Semester: 5th
4th
Subject
Sub & Code: OSComputer
Name:- Network
& CS - 2009
Code:- IT-3005
Branch (s): CSE, IT, CSSE, CSCE
Branch (s): -
ANS:
4. [2.5+2.5 ]
(a) Explain the flow diagram of stop and wait protocol with both packet lost and acknowledgment lost
scenario.
ANS:
Semester:
Semester: 5th
4th
Subject
Sub & Code: OSComputer
Name:- Network
& CS - 2009
Code:- IT-3005
Branch (s): CSE, IT, CSSE, CSCE
Branch (s): -
(b) Assume that, in a Stop-and-Wait system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20
milliseconds to make a round trip. What is the bandwidth-delay product? If the system data packets are
1,000 bits in length, what is the utilization percentage of the link?
ANS: Bandwidth of the line = 1 mbps
1 bit takes 20 ms to make a round trip
The length of system data frames = 1000 bits
bandwidth-delay product = 1 X 106 X 20 X 10-3 = 20,000 bits
During the time it takes the data to go from the sender to the recipient and then back again, the device
will send 20,000 bits.
The unit, however, only sends 1,000 bits. We can say that the use of the link is only 1000/20,000, or 5%.
A uniform path is followed throughout the There is no uniform path that is followed end
session. to end through the session.
It is ideal for voice communication, while It is used mainly for data transmission as the
also keeping the delay uniform. delay is not uniform.
Without a connection, it cannot exist, as the A connection is not necessary, as it can exist
connection needs to be present on a physical without one too. It needs to be present on a
layer. network layer.
Additive increase: