PrevYearQues CN
PrevYearQues CN
CN QUESTIONS
Page 1 of 11
(IT-3001) Computer Network HA
1.17 Which one of the following is used to communicate between different networks?
(2015MID-QS)
(a) ADSL (b) HDSL (c) Gateway/Router (d)Modem (e) None of these choices
1.18 In TCP, if the value of HLEN is 0111, how many bytes of [2 x 10 options are included in the
segment? (2015 END-QS-NEW)
1.19 In a TCP connection, the initial sequence number at the client site is 210. The client opens the
connection, sends 1000 bytes of data successfully, and closes the connection. What is the
value of the sequence number in each of the following segments sent by the client? (2015
END-QS-NEW)
(i) The SYN segment
(ii) The FDN segment
1.20 Briefly explain how exactly the flow occurs among various layers in OSI model when you are
giving any URL address in any browser. (2016 END-QS-NEW)
1.21 In TCP, does a FIN segment close a connection in only one direction or in both directions?
Explain. (2016 END-QS-NEW)
1.22 During data communication in mobile network whether packet switching or circuit switching
is prefered, explain. (2016 END-QS-NEW)
1.23 Assume propagation delay is less than transmission delay on a link connecting host A to B. If
host A starts transmission at t=0, at time equal to transmission delay, where is the first bit of
the packet? (2015 MID-QS-NEW)
1.24 Suppose a user wants to acess a webpage using a given URL. The IP address of the HTTP
server is initially unknown. What transport and application-layer protocols besides HTTP are
needed in this scenario? (2015 MID-QS-NEW)
1.25 Suppose you want to do a transaction from a remote client to a server as fast as possible. what
transport layer protocol will you use and Why? (2015 MID-QS-NEW)
2.1 Explain different layersof OSI model. Compare it with layers in TCP/IP model. (2013
END-QS)
2.2 Explain the design of Go-back-to-N flow control protocol with he help of a diagram. How
does Go-back-to-N protocol improves efficiency over Stop and Wait protocol? (2013 END-QS)
2.3 If m number of bits are used for representing a sequence number in selective repeat ARQ,
then the maximum size of sliding window is 2m-1. Justify this statement using aboundary case
example. What will happen if the sizeof sliding window exceeds 2m-1? (2013 END-QS)
Page 2 of 11
(IT-3001) Computer Network HA
2.4 Write down different layers of TCP/IP model. Explain each One of them with example. (2013
END-SUPL-QS)
2.5 What isthe difference between Packet switching and Circuit switching? Explain with
examples. (2013 END-SUPL-QS)
2.6 What is ICMP protocol? Why it isused? What is the minimum size of an ICMP-v4 packet
which in turn carries an ICMP-v4 packet? What is the maximum size? (2013 END-SUPL-QS)
2.7 In a TCP Connection, the initial sequence number at the client side is 2171. The client
opens the connection, send three segments, the second of which carries 1,000 bytes of
data and closes the connection. What is the value of the sequence number in each of the
segments sent by the client? (2013 END-SUPL-QS)
(i) The SYN Segment
(ii) The data segment
(iii) The FIN segment
2.8 Compare and contrast GO-Back-N-ARQ protocol with Selective-Repeat ARQ protocol w.r.t.
send and receive window size, timers and acknowledgements. (2014 END-QS)
2.9 List the four broad class of services that a transport protocol can provide. For each of service
classes, indicate if either UDP or TCP (or both) provide such a sevice. (2014 END-QS)
2.10 Describe the various layers of OSI Model. Explain the functionality of for each layer.
(2015 END-QS)
2.11 What is DNS? Briefly explain the Directory Services. (2015 END-QS)
2.12 Describe the E-mail architecture in detail. Explain why SMTP can not be used at the
receiver end for receiving the E-mail. (2015 END-QS)
2.13 What is stop and wait protocol? A Stop and wait protocol has a frame size of 100 bits and
transmission speed of 10 Mbps and ACK frame is 100 bits.Distmce and Velocity of
Propagation is 1OOkms andm/sec respectively. Calculate bandwidth utilization of the link.
(2015 END-QS)
2.14 Using 5-bit sequence number, what is the maximum size of the send and receive windows for
each of the following protocols? (2016 END-QS)
(i) Stop-Wait protocol
(ii) (ii)) Selective-Repeat ARQ
2.15 The distance from earth to a distant planet is approximately 9 x 10^10 m. What is the channel
utilization if a stop-and-wait protocol is used for frame transmission on a 64 Mbps
point-to-point link? Assume that the frame size is 32 KB and the speed of light is 3 x 10^8
m/s. (2016 END-QS)
2.16 Explain, how data communication between sender and receiver happens using
different layers of TCP/IP Stack. (2016 END-QS)
Page 3 of 11
(IT-3001) Computer Network HA
2.17 Describe how Web caching can reduce the delay in receiving a requested object. Will Web
caching reduce the delay for al l objects req uested by a user or for only some of the objects?
Why?(2016 END-QS)
2.18 What advantage does a circuit-switched network have over a packet-switched network? What
advantages does TDM have over FDM in a circuit-switched network? (2015MID-QS)
2.19 Using Stop-and-Wait, how many bits are needed for the sequence number? Justify with proper
example. (2015MID-QS)
2.20 Consider a packet switching architecture. (2015MID-QS)
(i) What are the main components of delay when we use packet switching and give details of
each delay?
(ii) What is the difference between transmission delay and propagation delay?
(iii) How is propagation delay affected if the length of the packet is increased?
2.21 What is the difference between pull and push network protocols? Explain the difference by
using two example protocols. (2015MID-QS)
2.22 Describe how Web caching can reduce the delay in receiving a requestedobject. Will Web
caching reduce the delay for all objects requested by a useror for only some of the objects?
Why? (2015MID-QS)
2.23 Briefly describe what HTTP is and sketch its operation using a simple figure (i.e., the typical
messages exchanged during operation of HTTP). (2015MID-QS)
2.24 What is DNS and what is it used for? If all DNS servers could be "crashed" (taken offline),
what would happen to the Internet (be precise). (2015MID-QS)
2.25 Sketch the TCP connection initiation and connection termination packet flows using a timing
diagram. (2015MID-QS)
2.26 Consider the use Of 10 K-bit size frames on a 10 Mbps satellite channel with 270 ms delay.
What is the link utilization for stop-and-wait ARQ technique assuming P = 10-3.
(2015MID-QS)
2.27 OSI is called as a model, whereas TCP/IP is called as a protocol suite. Be precise.
(2015MID-QS)
2.28 List out the advantages and disadvantages of star and ring topology. (2015 END-QS-NEW)
2.29 Explain in detail how SMTP send your email to your friend's mailbox. (2015
END-QS-NEW)
2.30 The distance from earth to a distant planet is approximately 9 x 1010 m. What is the channel
utilization if a stop-and-wait protocol is used for frame transmission on a 64 Mbps
point·-to-point link? Assume that the frame size is 32 KB and the speed of light is 3 x108 m/s.
(2015 END-QS-NEW)
2.31 Differentiate switch and hub. Expl ain, how data communication is carried out
using star topology with central node both as a switch or a hub. (2016 END-QS-NEW)
Page 4 of 11
(IT-3001) Computer Network HA
2.32 What is ICMP protocol and how it is used in ping utility? (2016 END-QS-NEW)
2.33 A channel has a bit rate of 4 Kbps and a propagation delay of 20 msec. For what frame size
does the stop-and-wait protocol gives a channel utilization of at least 50%. (2015
MID-QS-NEW)
2.34 Explain, why SMTP can not be used at t'.!e receiver end for receiving the E-mail. (2015
MID-QS-NEW)
2.35 Explain the relationship among message, segment, datagram, a.n. d a frame. Also name the
layers at which they are generated. (2015 MID-QS-NEW)
Page 5 of 11
(IT-3001) Computer Network HA
4 Network layer
4.1 Which of the following is public IP address ?
(A) 10.15.14.12 (B) 192.168.52.62 (C) 172.32.1.1 (D) None of the Above
Ans: C
Explanation:
Range of Private IP
10.0.0.0 – 10.255.255.255
Page 6 of 11
(IT-3001) Computer Network HA
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255
Ans: C
Explanation:
10.0.0.1 and 172.16.0.10 are private IP address. Thus cannot be used in WAN. 15.1.5.6 is
a ublic IP address.
4.3 Which of the following can be used as both Source and Destination IP ?
Ans: B
Explanation:
4.4 An organization has a class B network and wishes to form subnets for 64 departments. What
would be thr subnet mask? (GATE-2005)
Ans: 255.255.252.0
Explanation:
Class B network, so first two octet would be all 1 and rest 6 bits one followed by zeros.
4.5 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum
number of hosts per subnet? (GATE-2008)
Ans: 2046
Explanation:
Page 7 of 11
(IT-3001) Computer Network HA
Class B, first two octet netid, next two octet 248.0 =>11111000.00000000 => 11 zeros
4.6 In a class B subnet, we know the IP address of one host and the mask as given below:
IP address: 125.134.112.66
Mask: 255.255.224.0
Ans: A
Explanation:
We can obtain Network Address by performing bitwise and operation of IP address and
Subnet Mask.
------------------------------------------------------------------------------------------
4.7 The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the
maximum number of subnets and the maximum number of hosts in each subnet?
(A) 62 subnets and 262142 hosts. (B) 64 subnets and 262142 hosts.
(C) 62 subnets and 1022 hosts. (D) 64 subnets and 1024 hosts.
Explanation:
Note that 2 is subtracted from 2^6. The RFC 950 specification reserves the subnet values
consisting of all zeros (see above) and all ones (broadcast), reducing the number of available
subnets by two.
2 is subtracted for Number of hosts is also. The address with all bits as 1 is reserved as
broadcast address and address with all host id bits as 0 is used as network address of subnet.
In general, the number of addresses usable for addressing specific hosts in each network is
always 2^N – 2 where N is the number of bits for host id.
4.8 The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP
addresses could belong to this network? (GATE-2003)
Ans: D
Explanation:
Suppose we have a host A with IP Address IPA and Subnet mask of the subnet of which A is
a part is Ms. Now when A wants to send packet to a host B with an IP address say IPB, then A
will first AND the subnet-Mask Ms with IPA to find out the subnet-id IDN of the subnet in
order to identify whether IPB belongs to the same network. Now if B also belongs to the same
network, then IPB BITWISE-AND Ms must be equal to IDN which A has calculated. If IPA
and IPB belongs to same network, we must have
4.9 Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and
they both use the same net mask N. Which of the values of N given below should not be used
if A and B should belong to the same network? (GATE-2010)
Page 9 of 11
(IT-3001) Computer Network HA
Ans: D
Explanation:
The last octets of IP addresses of A and B are 113 (01110001) and 91 (01011011). The
netmask in option (D) has first three bits set in last octet. If netmask has first 3 bits set, then
these bits nmust be same in A and B, but that is not the case. In simple words, we can say
option (D) is not a valid netmask because doing binary ‘&’ of it with addresses of A and B
doesn’t give the same network address. It must be same address as A and B are on same
network. See this for more details.
4.10 The broadcast address for IP network 172.16.0.0 with subnet mask 255.255.0.0 is
Ans: B
Explanation:
IP Address = 172.16.0.0
Mask = 255.255.0.0
------------------------------------------------------------------------------------------
IP Address & Mask =172.16.0.0 <= Network Address => 172.16.255.255 is the DBC (Direct
Broacast Address)
4.11 If Direct Broadcast Address of subnet is 201.15.16.31. Which of the following will be subnet
mask ?
Ans: A
Explanation:
4.12 If subnet mask 255.255.255.224, which of the following will be Direct Broadcast address ?
(A) 202.15.19.127 (B) 202.15.19.63 (C) Both a and b (D) None of the Above
Page 10 of 11
(IT-3001) Computer Network HA
Ans: C
Explanation:
4.13 A packet addressed to 128.48.64.0 came to a router having routing table as follows.
Ans: B
Explanation:
Logical AND operation between subnet mask and IP address gives the subnet ID.
a)128.48.64.0 & 255.255.255.0 = 128.48.64.0 which is not equal to the destination so the
packet will not be forwarded to the interface A.
If two IP addresses match then the packet should be forwarded to the subnet with more
number of 1’s in the subnet mask.
4.14 (GATE-2004)
Ans: A
Explanation:
IP Address = 128.75.43.16
------------------------------------------------------------------------------------------
IP Address & Mask =128.75.43.0 <= Network Address => packet is forwarded to eth0
------------------------------------------------------------------------------------------
IP Address & Mask =128.75.43.0 <= Network Address not matched => so packet is is not
forwarded to eth3
Page 12 of 11
(IT-3001) Computer Network HA
IP Address = 128.75.43.16
------------------------------------------------------------------------------------------
IP Address & Mask =128.75.43.16 <= Network Address => packet is forwarded to eth1
Ans: A
Explanation:
128.96.171.92
4.16 Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to
an-other host Y with IP address 192.168.1.80. Router R1 has IP addresses 192.168.1.135 and
192.168.1.110. R2 has IP addresses 192.168.1.67 and 192.168.1.155. The netmask used in the
Page 13 of 11
(IT-3001) Computer Network HA
network is 255.255.255.224. Given the information above, how many distinct subnets are
guaranteed to already exist in the network?
Ans: C
Explanation:
Alternative approach –
Each link which connects a router-router, or a router-host(s) has a different subnet. In this
case, there are 3 subnets,
We can also find the number of subnets by couting the number of network prefixes as each
network ID corresponds to a subnet. Subnet Mask – 255.255.255.224 or /27.
In the following table, Network ID only displays bits 24 to 26 since bits 0 to 23 are the same
for all subnets. Subnet ID is obtained after AND’ing the IP address with the subnet Mask.
Page 14 of 11
(IT-3001) Computer Network HA
b) Find out the range of IP addresses in the block. (First IP address and last IP address in the
block.
4.18 The range of IP addresses in a block are given. Test whether they satisfy the CIDR block or
not. If satisfied represent it in CIDR notation.
a) 100.20.30.32 to 100.20.30.47
b) 30.20.18.32 to 30.20.18.67
c) 200.20.30.64 to 200.20.30.127
Page 15 of 11
(IT-3001) Computer Network HA
4.19 An ISP has requested a block of 1000 addresses. Then find a valid block in CIDR notation
that is granted to the ISP. A block 18.14.12.0/22 is available. Can it be granted to ISP? Justify
your answer.
4.20 Host X has IP address 192.168.1.97 and is connected through two routers R1 and R2 to
an-other host Y with IP address 192.168.1.80. Router R1 has IP addresses 192.168.1.135 and
192.168.1.110. R2 has IP addresses 192.168.1.67 and 192.168.1.155. The netmask used in the
network is 255.255.255.224. Which IP address should X configure its gateway as?
(A) 192.168.1.67
(B) 192.168.1.110
(C) 192.168.1.135
(D) 192.168.1.155
Ans: B
Explanation:
For: 192.168.1.110/28
For network address keep Network bits as it is and put host bits =0 in any given IP address.
For: 192.168.1.97/28
4.21 Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and
netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask 255.255.192.0. which
one of the following statements is true? (GATE-2006)
Ans: C
Explanation:
4.22 An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses
available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to
Organization A, and a quarter to Organization B, while retaining the remaining with itself.
Which of the following is a valid allocation of address to A and B? (GATE-2012)
Ans: A
Explanation:
4.23 An IP router implementing Classless Inter-domain routing (CIDR) receives a packet with
address 131.23.151.76. The router’s routing table has the following entries: (GATE-2014)
Ans: 1
Explanation:
Page 17 of 11
(IT-3001) Computer Network HA
4.24 In the network 200.20.11.144/27, the fourth octet (in decimal) of the last IP address of the
network which can be assigned to a host is ________. (GATE-2015)
Ans: 158
Explanation:
4.25 In class B if subnet mask is 255.192.0.0 Total Number of networks than can be joined
(A) 32
(B) 64
(C) 16
Ans: B
Explanation:
Number of network can be joined is 2^n , n is the number bits borrowed from network bits.
4.26 F
4.27 F
4.28 F
4.29 F
4.30 f
5 G
Page 18 of 11
(IT-3001) Computer Network HA
Page 19 of 11