0% found this document useful (0 votes)
29 views3 pages

Previous QP

The document is an examination question paper for B.E./B.Tech. degree students in Computer Science and Engineering, specifically for the course CS 3591 - Computer Networks. It includes various sections with questions related to communication systems, protocols, data transmission, routing algorithms, and network configurations. The paper consists of multiple parts, with a total of 100 marks allocated for answering all questions within a three-hour timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Previous QP

The document is an examination question paper for B.E./B.Tech. degree students in Computer Science and Engineering, specifically for the course CS 3591 - Computer Networks. It includes various sections with questions related to communication systems, protocols, data transmission, routing algorithms, and network configurations. The paper consists of multiple parts, with a total of 100 marks allocated for answering all questions within a three-hour timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
EnggTree.com Reg. No. : Question Paper Code : 20875 B.E./B.Tech. DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2023. In[e[e[t[RJEle[ Je ]o[m] Fourth/Fifth Semester : For More Visit our Website Computer Science and Engineering EnggTree.com CS 3591 - COMPUTER NETWORKS (Common to : Computer Science and Engineering (Cyber Security) / Computer and Communication Engineering / Artificial Intelligence and Data Science and Information Technology) (Regulations 2021) ‘Time : Three hours Maximum : 100 marks 10. Answer ALL questions. PART A —(10 x 2= 20 marks) What are the basic tasks of a communications system? What is the meaning of stateful and stateful of a protocol? Give an example for each one. An IP datagram is carrying a TCP segment destined for address 130.14.16.17. The destination port address is corrupted and it arrives at destination 130.14.16.19. How does the receiving TCP react to this error? We need three types of addresses, i.e. each computer has 3 addresses IP, MAC and port number while working with the internet. Why? Consider a subnet with prefix 128.119.40,128/28, Give the “range” of IP addresses that can be assigned to this network. What type of switching is used in present digital communications? A home user upgrades from a dial-up connection to high-speed broadband, but does not see much improvement in Internet performance for visiting a Web site. Give one reason why this might happen, even if the network and the Web server have ample capacity. What are the important attributes for a good routing algorithm? List the responsibilities of Data Link Layer. What is an Virtual Lan? Downloaded from EnggTree.com 1. @) () 12. (@) ) 18. (a) (b) 14. (a) ) EnggTree.com PART B — (6 x 13 = 65 marks) Explain in detail how data is transmitted as data units from source to destination in a layered approach using the TCP/IP protocol Suite. Or Briefly explain the necessary protocols for a message to transfer from aaa@xxx.com to bbb@yyy.com. Give an overview of Flow control and Congestion control TCP. Or ‘Explain in detail congestion avoidance techniques in TCP. ‘Suppose an ISP owns the block of addresses of the form 128.119.40.96/26. ‘Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets? Draw the network diagram for the same. Or Briefly explain the ARP in detail. A host with IP address 130.23.43.20 and physical address B2:34:56:10:22:10 has a packet to send to another host with IP address 180.23.43.25 and physical address A4:6E:F4:59:83:AB (which is unknown to the fist host). The two hosts are on the same Ethernet network. Show the ARP request and reply packets that are encapsulated in Ethernet frames. Consider the network shown below. Show the operation of Dijkstra’s (Link State) algorithm for computing the least cost path from router F to all deetinations. Explain the process. Consider two routers exchanging information via BGP protocol. Explain BGP Sessions and packet formats in detail between two routers. 2 20875 Downloaded from EnggTree.com 15. 16. @) ) (@) ) EnggTree.com Elaborate on the CSMA protocols. What is the main downfall of the Carrier Sense Multiple Access (CSMA) method? How does Collision Detection (CD) methods will help to alleviate this problem? Or Discuss in detail about wireless LAN (802.11). PART C—(1x 15 = 15 marks) Briefly explain the error control techniques in data link layer. (8) Consider the cyclic redundancy check (CRC) based error detecting scheme having the generator polynomial X*+X+1. Suppose the message 11000 is to be transmitted. Find the codeword. Show your evalution work for the same. a Or Suppose you open a startup company “foo” and want to set up your company network your network has the following servers: @ Gi) Gi) DNS server “dns1.foo com” with IP as “140.112.30.40" Web server: “foo.com” with two IP as “140.112.30.55" and “140.112.30.56". ‘The web server also has a name ais www.foo.com Email server: “galaxy.foo.com” with IP as “140.112.30.60" ‘Your company’s email address is “username@foo.com” Briefly explain in detail about the working of DNS. ® What resource records (RRs) do you need to provide to the upper-level “.com” Registrar? @ What RRs do you need to put in your company’s DNS server? (4) 3 20875 Downloaded from EnggTree.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy