0% found this document useful (0 votes)
2K views30 pages

Acn s23 Acn Summer 23 Sloved Model Paper

Bhghjjhhhj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views30 pages

Acn s23 Acn Summer 23 Sloved Model Paper

Bhghjjhhhj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

lOMoARcPSD|38566952

ACN s23 - ACN summer 23 sloved model paper

Computer science (Vishnu Institute of Technology)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)
lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model
answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to
assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance
(Not applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant
values may vary and there may be some difference in the candidate‟s answers and model
answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate‟s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.

Q. Sub Answer Marking


No Q.N. Scheme
.
1. Attempt any FIVE of the following: 10
(a) Draw and label sketch if IPv4 packet format. 2M
Ans.

2M
Diagram

(b) List any two extension headers of IPv6 protocol. 2M


Ans.

Page 1 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

1. Hop by Hop option


2. Source routing
3. Fragmentation
4. Authentication Any
5. Encrypted security payload two
6. Destination option

(c) Define Inter Domain routing. 2M


Ans. Routing between autonomous system is referred to as interdomain
routing. Correct
definiti
on

(d) State the use of 6 flags in TCP header. 2M


Ans. There are 6, 1-bit control bits that control connection establishment,
termination, abortion, flow control etc..
1. URG: The urgent pointer is valid if it is 1.
2. ACK: ACK bit is set to 1 to indicate the acknowledgement
member is valid. Correct
3. PSH: The receiver should pass this data to application as soon as use 2M
possible.
4. RST: This flag is used to reset connection.
5. SYN: Synchronize sequence number to initiate a connection.
6. FIN: It is used to release connection

(e) Differentiate between FTP and TFTP (any two points) 2M


Ans
1m each
point

Page 2 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(f) List types of ICMPv4 messages. 2M


Ans. ICMP Messages are of two types:-
1. Error reporting messages: If a host or router encounter a problem Any two
after processing an IP problem, then it was a error reporting message advanta
for reporting the ges 1M
problem. each
2. Query Messages: A host or a network manager can used the query
messages to get some specific information from a router to another
host.

(g) State the importance of IPv6 over IPv4. 2M


Ans. i) huge number of IP addresses:
IPv6 has 128-bit addresses when compared to 32-bit addresses of Any
IPv4 Two
which results in a very large increase in the availability of IP Points
addresses
and creates a lot of advantages.
ii) End to End Connectivity:
IPv6 eliminates the need for NAT which results in better
connectivity
in peer-peer networks.
iii) Interoperability:
IPv6 promotes interoperability between different IPv6
implementations.
iv) Built-in Security: IPv6 provides authentication and encryption.

Page 3 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

2. Attempt any THREE of the following: 12


4M
(a) Describe flow control under SCTP.
Ans. Flow control under SCTP Flow control in SCTP is similar to that
in
TCP. Like TCP, SCTP executes flow control to prevent
overwhelming the receiver. In SCTP, we need to handle two units
of data, the byte and the chunk. The values of rwnd and cwnd are
expressed in bytes; the values of TSN and acknowledgments are
expressed in chunks. Current SCTP implementations still use a
byte-oriented window for flow control. Receiver Site: The receiver
has one buffer (queue) and three variables. The queue holds the Diagra
received data chunks that have not yet been read by the process. m 2M
The first variable holds the last TSN received,cum TSN. The second Explana
variable holds the available buffer size; winsize. The third variable tion 2M
holds the last accumulative acknowledgment, last ACK. The
following figure shows the queue and variables at the receiver site.

When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize.
The TSN number of the chunk is stored in the cumTSN variable. 2.
When the process reads a chunk, it removes it from the queue and
adds the size of the removed chunk to winSize (recycling). 3. When
the receiver decides to send a SACK, it checks the value of lastAck;
if it is less than cumTSN, it sends a SACK with a cumulative TSN
number equal to the cumTSN. It also includes the value of winSize
as the advertised window size. Sender Site: The sender has one
buffer (queue) and three variables: curTSN, rwnd, and inTransit, as
shown in the following figure. We assume each chunk is 100 bytes
long. The buffer holds the chunks produced by the process that
either have been sent or are ready to be sent.

Page 4 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

The first variable, curTSN, refers to the next chunk to be sent. All
chunks in the queue with a TSN less than this value have been sent,
but not acknowledged; they are outstanding. The second variable,
rwnd, holds the last value advertised by the receiver (in bytes). The
third variable, inTransit, holds the number of bytes in transit, bytes
sent but not yet acknowledged. The following is the procedure used
by the sender.

1. A chunk pointed to by curTSN can be sent if the size of the data is


less than or equal to the quantity rwnd – iNTransit. After sending the
chunk, the value of curTSN is incremented by 1 and now points to the
next chunk to be sent. The value of inTransit is incremented by the size
of the data in the transmitted chunk.
2. When a SACK is received, the chunks with a TSN less than or equal
to the cumulative TSN in the SACK are removed from the queue and
discarded. The sender does not have to worry about them anymore
The value of inTransit is reduced by the total size of the discarded
chunks. The value of rwnd is updated with the value of the
advertised window in the SACK.

Page 5 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(b) Explain ICMP protocol ? Describe the header format of ICMP. 4M

The Internet Control Message Protocol (ICMP) supports the


Ans unreliable and connectionless Internet Protocol (IP).
• ICMP messages are encapsulated in IP datagrams. There are two
categories of ICMP messages: error-reporting and query 2M icmp
messages.The error-reporting messages report problems that a protocols
router or a host (destination) may encounter when it processes an
IP packet. The
• query messages, which occur in pairs, help a host or a network 2M
manager get specific information from a router or another host. header
• The checksum for ICMP is calculated using both the header and format
the data fields of the ICMP message.
• There are several tools that can be used in the Internet for
debugging. We can find if a host or router is alive and running.
Two of
Header these tools are ping and traceroute.
Format:

An ICMP message has an 8-byte header and a variable-size data


section. Although the general format of the header is different for
each message type, the first 4 bytes are common to all. As Figure
shows,
• The first field, ICMP type, defines the type of the message.
• The code field specifies the reason for the particular message
type.
• The last common field is the checksum field for checking
errors
• The rest of the header is specific for each message type.
• The data section in error messages carries information for
finding the original packet that had the error. In query
messages, the data section carries extra information based on
the type of the
• Query.

Page 6 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
(c) Describe SMTP with suitable diagram 4M

• It is an application layer protocol of TCP/IP model.


• It transfer messages from sender’s mail servers to receivers mail
Ans.
server.
• SMTP interacts with local mail system and not user.
• SMTP uses a TCP socket on port 25 to transfer email reliably from
client to server.
• Email is temporarily stored on the local and eventually transferred
directly to receiving server. • It is simple ASCII protocol.
Diagram
2M
Explanati
on 2M

COMMANDS & RESPONSE


SMTP uses commands and response to transfer message between
MTA client and MTA server

❑ SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection
7. VRFY: Verify the add of recipient
8. HELP: Mail

Example: Scenario: Alice sends message to Bob


1. Alice uses user agents (UA) to compose message and send to
bob@technical.org.
2. Alice UA sends message to her mail server, message placed in
Page 7 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
message queue.
3. Client side of SMTP opens TCP connection with Bob’s mail
server.
4. SMTP client sends Alice message over TCP connection.
5. Bob’s mail server places the message in Bob’s mailbox.
6. Bob invokes his user agent to read message.

(d) a) For the block of IPv4 address given below build subnet mask, 4M
broadcast Address and Number of Hosts possible.
I. 10.0.199.237/22
II. 192.168.1487/26 2M for each
correct
Ans answer

Page 8 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

3. Attempt any THREE of the following: 12


(a) Explain distance vector routing with suitable example. 4M
A distance-vector routing (DVR) protocol requires that a router
Ans. inform its neighbours of topology changes periodically. Historically
known as the old ARPANET routing algorithm (or known as
Bellman Ford algorithm). Routing table are updated by exchanging
the information with the neighbours. Distance vector routing
doesn’t have any hierarchical structure. CPU and memory
utilization is lower than link state routing. Bandwidth required is
less due to local sharing, small packet and no flooding. Distance 2m
vector routing are easier to configure. DVR are the slow explanati
convergence protocol. Its count to infinity problems. on
EXAMPLE 2m for
Step 1: Let the given source vertex be 0. Initialize all distances as correct
infinite, except the distance to the source itself. Total number of example
vertices in the graph is 5, so all edges must be processed 4 times.

Step 2: Let all edges are processed in the following order: (B, E),
(D, B), (B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time.
The first row shows initial distances. The second row shows
distances when edges (B, E), (D, B), (B, D) and (A, B) are processed.
The third row shows distances when (A, C) is processed. The
fourth row shows when (D, C), (B, C) and (E, D) are processed.

Page 9 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Step 3: The first iteration guarantees to give all shortest paths which are at
most 1 edge long. We get the following distances when all edges are
processed second time (The last row shows final values.

Step 4: The second iteration guarantees to give all shortest paths which are at
most 2 edges long. The algorithm processes all edges 2 more times. The
distances are minimized after the second iteration, so third and fourth
iterations don’t update the distances.

(b) Describe the working of TELNET. 4M


Ans For TCP / IP networks like the Internet, Telnet is a terminal emulation
program. The software Telnet runs on your system and links your 4M for
Personal Computer to a network server. It allows a user to access an correct
account or computer remotely. working

WORKING
It makes available users by an interactive and bidirectional text-
oriented message system exploit an effective terminal connection
which is much more than 8 byte.
User data is sprinkled in the band long with telnet control information
above the TCP. It helps to achieve some functions in a remote manner.
The user joins the server beside using the TCP protocol, so that means
like the other side connection is also established using the
telnet hostname. These commands are used on the server by the
corresponding user to achieve the need task. These commands are used
Page 10 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
to end a telnet session or logoff a session or a user. Currently, both
virtual terminal and terminal emulators can be used for telnet, which is
fundamentally a modern computer that converses by means of the
identical Telnet protocol. This command helps telnet protocol to
achieve communication with a remote device and mainly various other
OS also provides a large amount of support for these systems

SYNTAX
telnet hostname port

(c) List UDP services and UDP application (any 4 each). 4M


Ans Services offered by the UDP are a s follows:
• Process to process port to port transmission of segment. 2M for
• Connectionless and minimum overhead Protocol Services
• Fast and simple transmission
2M for
• No flow and error control application using UDP services are applicati
responsible for providing them. on
• UDP encapsulates and decapsulates the message.
UDP application
• Domain Name Services.
• Simple Network Management Protocol.
• Trivial File Transfer Protocol.
• Routing Information Protocol.
• Kerberos.
(d) Find out the error, if any in the following IPv4 addresses. 4M
a. 111.56.054.78
b. 222.34.7.8.20
c. 75.45.301.14 1M
d. 11100101.23.14.67 EACH
Ans
Question Answer
111.56.054.78 There must be no leading zero (054)
222.34.7.8.20 4 octets only in IPv4 address
75.45.301.14 Range of each octet is between o and
255
11100101.23.14.67 A mixture of binary and dotted decimal
notation is not allowed

Page 11 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

4. Attempt any THREE of the following: 12


(a) Distinguish between SMTP & POP3 protocol. 4M

SMTP POP3
Ans. SMTP stands for SIMPLE POP3 stands for POST
MAIL TRANSFER OFFICE PROTOCOL
PROTOCOL & is also called VERSION 3 & is also called a
Push Protocol. Pop Protocol.
SMTP is used for Sending POP3 is used to retrieve the
emails. emails.
SMTP transfers Email from POP3 retrieves Emails from Any 4
Sender’s Device to the the mailbox on the receipting’s points
mailbox on the recipient’s server to their device. 1M
server. each
It is a message transfer Agent. It is a message access Agent.
SMTP has two MTAS. POP3 has two MAAS.
SMTP uses Ports 25, 465 & POP3 uses Ports 110 or 995.
587.

(b) Draw & explain IPv6 packet format. 4M


IPV6 PACKET FORMAT-
Ans 2M for
Diagram
& 2M for
Explanati
on

1. Version: This 4-bits field defines the version number of IP.


The value is 6 for IPV6.
2. Priority: This 4-bits priority field defines the priority of packet
with respect to traffic congestion.
3. Flow Label: It is 24 bits field that is designed to provide
Page 12 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
special handling for a particular flow of data.
4. Payload Length: The 16 bits payload length field defines the
length of the IP datagram excluding the base header.
5. Next Header: It is an 8 bits field defining the header that
follows the base header in datagram.
6. Hop Limit: This 8 bits field serves the same purpose as the
TTL field in IPV4.
7. Source Address: The source address field is a 128 bits
internet address that identifies the original.
8. Destination Address: It is 128 bits internet address that
usually identifies the final destination of datagram.
9. Payload: Is combination of zero or more extension
headers(options) which is followed by data from other
protocols such as UDP, TCP etc.
EXTENSION HEADERS
• The length of the base header is fixed at 40 bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option
1. Hop by Hop options is used when the source needs to pass
information to all the routers visited by the datagram.
2. Source routing extension header combines the concept of
strict
source route & the loose source route options of IPV4.
3. Fragmentation is the same as that in IPV4. in IPV6 only the
original
source can be fragment.
4. Authentication header has a dual purpose: it validates the
message
sender & ensure the integrity of data.
5. Encrypted security Payload is an extension that provides
confidentiality & guards.
6. Destination option is used when the service needs to pass
information to destination only, intermediate routers are not
permitted access to this information.

Page 13 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(c) Differentiate between RIP & OSPF routing protocol. 4M


Ans. RIP OSPF
RIP Stands for Routing OSPF stands for Open Shortest
Information Protocol. Path First.
RIP works on the Bellman-Ford OSPF works on Dijkstra
algorithm. algorithm. Any 4
It is a Distance Vector protocol It is a link-state protocol and it points
and it uses the distance or hops analyzes different sources like 1M each
count to determine the the speed, cost and path
transmission path. congestion while identifying the
shortest path.
It is used for smaller size It is used for larger size
organizations. organizations in the network.
It allows a maximum of 15 There is no such restriction on
hops. the hop count.
It is not a more intelligent It is a more intelligent routing
dynamic routing protocol. protocol than RIP.
The networks are classified as The networks are classified as
areas and tables here. areas, sub-areas, autonomous
systems, and backbone areas
here.
Its administrative distance is Its administrative distance is
120. 110.
RIP uses UDP(User Datagram OSPF works for IP(Internet
Protocol) Protocol. Protocol) Protocol.
It calculates the metric in terms It calculates the metric in terms
of Hop Count. of bandwidth.
In RIP, the whole routing table In OSPF, parts of the routing
is to be broadcasted to the table are only sent when a
neighbors every 30 seconds by change has been made to it.
the routers.
RIP utilizes less memory OSPF device resource
compared to OSPF but is CPU requirements are CPU intensive
intensive like OSPF. and memory
It consumes more bandwidth It consumes less bandwidth as
because of greater network only part of the routing table is
resource requirements in to send.
sending the whole routing table.

Page 14 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(d) Describe the state transaction of TCP. 4M


To observe the events happening during connection establishment,
connection termination, and data transfer, TCP is specified as the
Ans. finite state machine (FSM) as shown in Figure 4.4.1. Here two FSMs
used by the TCP client and server combined in one diagram. The
rounded-corner rectangles represent the states. The transition from 2M for
one state to another is shown using directed lines. Each line has two Diagra
strings separated by a slash. The first string is the input, what TCP m & 2M
receives. The second is the output, what TCP sends. for
Explana
tion

Fig4.4.1: State transition diagram.


The dotted black lines in the figure represent the transition that a
server normally goes through; the solid black lines show the
transitions that a client normally goes through.In some situations, a
server transitions through a solid line or a client transitions through a
dotted line. The colored lines show special situations. The rounded-
corner rectangle marked ESTABLISHED has two sets of states, a set
for the client and another for the server, that are used for flow and
error control. Consider the scenario. Figure 4.4.2 shows the state
transition diagram for this scenario. The client process issues an
active open command to its TCP to request a connection to a specific
socket address.
Page 15 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Fig4.4.2: State transition diagram.


TCP sends a SYN segment and moves to the SYN-SENT state. After
receiving the SYN +ACK segment, TCP sends an ACK segment and
goes to the ESTABLISHED state. Data are transferred, possibly in
both directions, and acknowledged. When the client process has no
more data to send, it issues a command called an active close. The
TCP sends a FIN segment and goes to the FINWAIT-
1 state. When it receives the ACK segment, it goes to the FIN-
WAIT-2 state. When the client receives a FIN segment, it sends an
ACK segment and goes to the TIME-WAIT state.The client remains
in this state for 2 MSL .MSL is the maximum time a TCP segment is
expected to live, or stay in the network.When the corresponding
timer expires, the client goes to the CLOSED state.The
server process issues a passive open command. The server TCP goes
to the LISTEN state and remains there passively until it receives a
SYN segment.
The TCP then sends a SYN +ACK segment and goes to the SYN-
RCVD state, waiting for the client to send an ACK segment. After
receiving the ACK segment, TCP goes to the ESTABLISHED state,
where data transfer can take place. TCP remains in this state until it
receives a FIN segment from the client signifying that there are no
more data to be exchanged and the connection can be
closed.The server, upon receiving the FIN segment, sends all queued
data to the server with a virtual EOF marker, which means that the
connection must be closed. It sends an ACK segment and goes to the
CLOSEWAIT state, but postpones acknowledging the FIN segment
received from the client until it receives a passive close command
from its process. After receiving the passive close command, the
server sends a FIN segment to the client and goes to the LASTACK
state, waiting for the final ACK. When the ACK segment is received
from the client,the server goes to the CLOSE state.
Page 16 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(e) Explain the process of resolving the given host name into IP 4M
address using DNS.
Ans. You can find the hostname of any computer with a public IP
address by passing the address to any Domain Name System (DNS)
server. However, since the computers on a small business network
have private IP addresses, you can only discover their hostnames if
the network has a local DNS server. To discover the hostname of a
computer with a private IP address and no local DNS server, you 4M for
need to use a Windows utility to query the host itself. Explanat
ion
Querying DNS

1. Click the Windows Start button, then "All Programs" and


"Accessories." Right-click on "Command Prompt" and choose
"Run as Administrator."
2. Type "nslookup %ipaddress%" in the black box that appears on the
screen, substituting %ipaddress% with the IP address for which you
want to find the hostname.
3. Find the line labeled "Name" underneath the line with the IP
address you entered and record the value next to "Name" as the
hostname of the computer

5. Attempt any two of the following: 12M

(a) Explain the process of transition form ipv4 to ipv6. 6M

Ans TRANSITION FROM IPV4 TO IPV6


➢ There are 3 strategies have devised by IFTF to help transition.
1. Dual Stack 2. Tunnelling 3. Header Translation
2M each
➢ Dual Stack: for
1. All the host must run IPV4 and IPV6 simultaneously until all the Correct
internet uses IPV6. process
2. To determine which version to use when sending packet to transition
destination, the source host queries the DNS.
3. If the DNS returns IPV4 address, the source host sends an IPV4
packet. If DNS returns an IPV6 address the source host sends an IPV6
packet.

Page 17 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

➢ Tunnelling:
1. When two computers using IPV6 want to communicate with each other
& the packet
must pass through a region that uses IPV4.
2. The IPV6 packet is encapsulated in a IPV4 packet when it enter the
region & leaves its capsule when it exits the region.

➢ Header Translation:
1. It is used when some of the system uses IPV4. the sender wants to use
IPV6, but the receiver don’t understand IPV6
2. The header format must be totally changed through header translation.
The header of IPV6 packet is converted to IPV4 header.

Page 18 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(b) Explain TCP with respect to flow control and error control. 6M

Ans.
TCP Flow Control is a protocol designed to manage the data flow
between the user and the server. It ensures that there is a specific
bandwidth for sending and receiving data so the data can be processed
without facing any major issues. In order to achieve this, the TCP
protocol uses a mechanism called the sliding window protocol.

Each
explan
ation
of flow
control
3M
and
error
control
3M

.
Error control in TCP is mainly done through the use of three simple
techniques :
1. Checksum – Every segment contains a checksum field which is
used to find corrupted segments. If the segment is corrupted,
then that segment is discarded by the destination TCP and is
considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been
delivered. Control segments that contain no data but have
sequence numbers will be acknowledged as well but ACK
segments are not acknowledged.
3. Retransmission – When a segment is missing, delayed to

Page 19 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
deliver to a receiver, corrupted when it is checked by the
receiver then that segment is retransmitted again. Segments
are retransmitted only during two events: when the sender
receives three duplicate acknowledgements (ACK) or when a
retransmission timer expires.
• Retransmission after RTO: TCP always preserves one
retransmission time-out (RTO) timer for all sent but not
acknowledged segments. When the timer runs out of
time, the earliest segment is retransmitted. Here no timer
is set for acknowledgement. In TCP, the RTO value is
dynamic in nature and it is updated using the round trip
time (RTT) of segments. RTT is the time duration needed
for a segment to reach the receiver and an
acknowledgement to be received by the sender.
• Retransmission after Three duplicate ACK
segments: RTO method works well when the value of
RTO is small. If it is large, more time is needed to get
confirmation about whether a segment has been delivered
or not. Sometimes one segment is lost and the receiver
receives so many out-of-order segments that they cannot
be saved. In order to solve this situation, three duplicate
acknowledgement method is used and missing segment is
retransmitted immediately instead of retransmitting
already delivered segment. This is a fast retransmission
because it makes it possible to quickly retransmit lost
segments instead of waiting for timer to end.

(c) Describe the architecture of e-mail system using four scenario. 6M


Ans To explain the architecture of e-mail, we give four scenarios. We begin with
the simplest situation and add complexity as we proceed. The fourth
scenario is the most common in the exchange of e-mail. Correct
TCP/IP Protocol Suite 2 Topics Discussed in the Section describtio
• First Scenario n using
• Second Scenario scenarios
• Third Scenario 6M
• Fourth Scenario

• First Scenario

Page 20 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

When the sender and the receiver of an e-mail are on the same mail server, we
need only two user agents.

• Second Scenario

When the sender and the receiver of an e-mail are on different mail servers,
we need two UAs and a pair of MTAs (client and server).

• Third Scenario

When the sender is connected to the mail server via a LAN or a WAN, we
need two UAs and two pairs of MTAs (client and server).
Page 21 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

• Fourth Scenario

When both sender and receiver are connected to the mail server via a LAN or
a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair
of MAAs (client and server). This is the most common situation today.

6. Attempt any TWO of the following: 12


(a) Explain Bellman Ford algorithm with suitable example 6M

Ans
i. Bellman ford algorithm is a single-source shortest path algorithm.

ii. This algorithm is used to find the shortest distance from the single 3M for
vertex to all the other vertices of a weighted graph. explainati
on and 3M
iii. Various other algorithms are used to find the shortest path, like the for
Dijkstra algorithm. example
iv. If the weighted graph contains the negative weight values, then the
Dijkstra algorithm does not confirm whether it produces the correct
answer or not.

v. Rule for the algorithm: Any other


example
We will go on relaxing all the edges (n - 1) times where shall
be conside
n = number of vertices red

vi. Relaxing means:

If (d(u) + c(u , v) < d(v))

d(v) = d(u) + c(u , v)

Page 22 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
vii. Consider the following example:-

Step 1: Let the given source vertex be 0. Initialize all distances as


infinite, except the distance to the source itself. The total number of
vertices in the graph is 5, so all edges must be processed 4 times.

Step 2: Let all edges are processed in the following order: (B, E),
(D, B),(B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time. The
first row shows initial distances. The second row shows distances
when edges (B, E), (D, B), (B, D) and (A, B) are processed. The
third row shows distances when (A, C) is processed. The fourth row
shows when (D, C), (B, C) and (E, D) are processed.

Page 23 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Step 3: The first iteration guarantees to give all shortest paths which
are at most 1 edge long. We get the following distances when all
edges are processed second time (The last row shows final values).

Step 4: The second iteration guarantees to give all shortest paths


which are at most 2 edges long. The algorithm processes all edges 2
more times. The distances are minimized after the second iteration,
so third and fourth iterations do not update the distances.

Page 24 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520

(b) a. For the IP address given below, find the range of addresses in the 6M
following blocks:
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30

a. 123.56.77.32/29
Ans. • The subnet mask “/29” means the first 29 bits are network bits, 𝟏
1𝟐M
and the remaining 3 bits are host bits. for
• The network address can be obtained by setting the host bits to each
zero: 123.56.77.32 sub-
• The broadcast address can be obtained by setting the host bits to questio
n
one: 123.56.77.39
• The range of addresses in this block is from 123.56.77.32 to
123.56.77.39
• Range of addresses: 123.56.77.32 to 123.56.77.39

b. 200.17.21.128/27
• The subnet mask "/27" means the first 27 bits are network
bits, and the remaining 5 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 200.17.21.128.
• The broadcast address can be obtained by setting the host bits
to one: 200.17.21.159.
• Range of addresses: 200.17.21.128 to 200.17.21.159

c. 17.34.16.0/23:
• The subnet mask "/23" means the first 23 bits are network bits,
and the remaining 9 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 17.34.16.0.
• The broadcast address can be obtained by setting the host bits
to one: 17.34.17.255.
• Range of addresses: 17.34.16.0 to 17.34.17.255

Page 25 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
d. 180.34.64.64/30
• The subnet mask "/30" means the first 30 bits are network bits,
and the remaining 2 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 180.34.64.64.
• The broadcast address can be obtained by setting the host bits
to one: 180.34.64.67.
• Range of addresses: 180.34.64.64 to 180.34.64.67

(c) Describe the fields of SCTP packet format. Explain SCTP 6M


association establishment process.

Ans SCTP transmits data in the form of messages and each message 3M for
contains one or more packets. The control come before data chunks. describi
ng
fields &
3M for
associat
ion
establis
hment
process

1. Source and Destination port number to enable multiplexing of


different SCTP associations at the same address.
2. A 32-bit verification tag that guards against the insertion of an
out-of-date or false message into the SCTP association.
3. A 32-bit checksum for error detection. The checksum can be
either a 32-bit CRC checksum or Alder-32 checksum.
4. Chunk Layout: A chunk can be either a control chunk or data
chunk.
i. Chunk Type: This field identifies the type of information
contained in the Chunk data field. The value of chunk field
ranges from 0 to 254. the value 255 is reserved for future.
SCTP consists of one DATA chunk and 12 control chunks.
ii. Chunk Flag: The chunk field contains the flag, such as
Page 26 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
U(unordered bit), B(beginning bit), and E(ending bit). Usage
of this field depends on the chunk type specified in the chunk
type field.
iii. Chunk Length: This field represents the size of the fields
chunk type, chunk flag, chunk length, and chunk value, in
bytes.
5. SCTP DATA CHUNK: Data chunks are used to send actual
data through the stream and have rather complex headers in
some ways, but not really worse than TCP headers in general.

SCTP Association Establishment Process:-


SCTP association startup and shutdown guidelines are described
here.
SCTP association is comprised of a four-way handshake that takes
place in the following order:
i. The client sends an INIT signal to the server to initiate an
association.
ii. On receipt of the INIT signal, the server sends an INIT-ACK
response to the client. This INIT-ACK signal contains a state
cookie. This state cookie must contain a Message
Authentication Code (MAC), along with a time stamp
corresponding to the creation of the cookie, the life span of
the state cookie, and the information necessary to establish
the association. The MAC is computed by the server based on
a secret key only known to it.
iii. On receipt of this INIT-ACK signal, the client sends a
COOKIE-ECHO response, which just echoes the state
cookie.
iv. After verifying the authenticity of the state cookie using the
secret key, the server then allocates the resources for the
association, sends a COOKIE-ACK response acknowledging
the COOKIE-ECHO signal, and moves the association to
ESTABLISHED state.
SCTP supports also graceful close of an active association upon
request from the SCTP user. The following sequence of events
occurs:
i. The client sends a SHUTDOWN signal to the server, which
tells the server that the client is ready to close the connection.
ii. The server responds by sending a SHUTDOWN-ACK
acknowledgement.
iii. The client then sends a SHUTDOWN-COMPLETE signal
back to the server.

Page 27 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SCTP also supports abrupt close (ABORT signal) of an active


association upon the request from the SCTP client or due to an
error in the SCTP stack. However, SCTP does not support half
open connections. More information about the protocol and its
internals can be found in RFC 4960.

Page 28 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)


lOMoARcPSD|38566952

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION


(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Page 29 / 29

Downloaded by Rushikesh Chougule (manoharchougule51@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy