The document is an examination question paper for B.E./B.Tech. degree students in Computer Science and Engineering, specifically for the course CS 3591 - Computer Networks. It includes various sections with questions related to communication systems, protocols, data transmission, routing algorithms, and network configurations. The paper consists of multiple parts, with a total of 100 marks allocated for answering all questions within a three-hour timeframe.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
29 views3 pages
Previous QP
The document is an examination question paper for B.E./B.Tech. degree students in Computer Science and Engineering, specifically for the course CS 3591 - Computer Networks. It includes various sections with questions related to communication systems, protocols, data transmission, routing algorithms, and network configurations. The paper consists of multiple parts, with a total of 100 marks allocated for answering all questions within a three-hour timeframe.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
EnggTree.com
Reg. No. :
Question Paper Code : 20875
B.E./B.Tech. DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2023.
In[e[e[t[RJEle[ Je ]o[m]
Fourth/Fifth Semester :
For More Visit our Website
Computer Science and Engineering EnggTree.com
CS 3591 - COMPUTER NETWORKS
(Common to : Computer Science and Engineering (Cyber Security) / Computer and
Communication Engineering / Artificial Intelligence and Data Science and
Information Technology)
(Regulations 2021)
‘Time : Three hours Maximum : 100 marks
10.
Answer ALL questions.
PART A —(10 x 2= 20 marks)
What are the basic tasks of a communications system?
What is the meaning of stateful and stateful of a protocol? Give an example for
each one.
An IP datagram is carrying a TCP segment destined for address 130.14.16.17.
The destination port address is corrupted and it arrives at destination
130.14.16.19. How does the receiving TCP react to this error?
We need three types of addresses, i.e. each computer has 3 addresses IP, MAC
and port number while working with the internet. Why?
Consider a subnet with prefix 128.119.40,128/28, Give the “range” of IP
addresses that can be assigned to this network.
What type of switching is used in present digital communications?
A home user upgrades from a dial-up connection to high-speed broadband, but
does not see much improvement in Internet performance for visiting a Web
site. Give one reason why this might happen, even if the network and the Web
server have ample capacity.
What are the important attributes for a good routing algorithm?
List the responsibilities of Data Link Layer.
What is an Virtual Lan?
Downloaded from EnggTree.com1. @)
()
12. (@)
)
18. (a)
(b)
14. (a)
)
EnggTree.com
PART B — (6 x 13 = 65 marks)
Explain in detail how data is transmitted as data units from source to
destination in a layered approach using the TCP/IP protocol Suite.
Or
Briefly explain the necessary protocols for a message to transfer from
aaa@xxx.com to bbb@yyy.com.
Give an overview of Flow control and Congestion control TCP.
Or
‘Explain in detail congestion avoidance techniques in TCP.
‘Suppose an ISP owns the block of addresses of the form 128.119.40.96/26.
‘Suppose it wants to create four subnets from this block, with each block
having the same number of IP addresses. What are the prefixes (of form
a.b.c.d/x) for the four subnets? Draw the network diagram for the same.
Or
Briefly explain the ARP in detail. A host with IP address 130.23.43.20
and physical address B2:34:56:10:22:10 has a packet to send to another
host with IP address 180.23.43.25 and physical address
A4:6E:F4:59:83:AB (which is unknown to the fist host). The two hosts are
on the same Ethernet network. Show the ARP request and reply packets
that are encapsulated in Ethernet frames.
Consider the network shown below. Show the operation of Dijkstra’s
(Link State) algorithm for computing the least cost path from router F to
all deetinations. Explain the process.
Consider two routers exchanging information via BGP protocol. Explain
BGP Sessions and packet formats in detail between two routers.
2 20875
Downloaded from EnggTree.com15.
16.
@)
)
(@)
)
EnggTree.com
Elaborate on the CSMA protocols. What is the main downfall of the
Carrier Sense Multiple Access (CSMA) method? How does Collision
Detection (CD) methods will help to alleviate this problem?
Or
Discuss in detail about wireless LAN (802.11).
PART C—(1x 15 = 15 marks)
Briefly explain the error control techniques in data link layer. (8)
Consider the cyclic redundancy check (CRC) based error detecting
scheme having the generator polynomial X*+X+1. Suppose the
message 11000 is to be transmitted. Find the codeword. Show your
evalution work for the same. a
Or
Suppose you open a startup company “foo” and want to set up your
company network your network has the following servers:
@
Gi)
Gi)
DNS server “dns1.foo com” with IP as “140.112.30.40"
Web server: “foo.com” with two IP as “140.112.30.55" and
“140.112.30.56".
‘The web server also has a name ais www.foo.com
Email server: “galaxy.foo.com” with IP as “140.112.30.60"
‘Your company’s email address is “username@foo.com”
Briefly explain in detail about the working of DNS. ®
What resource records (RRs) do you need to provide to the
upper-level “.com” Registrar? @
What RRs do you need to put in your company’s DNS server? (4)
3 20875
Downloaded from EnggTree.com