0% found this document useful (0 votes)
16 views31 pages

CN

The document outlines the structure and content of an end-term examination for a Computer Networks course, scheduled for May 2024, with a maximum of 40 marks. It includes various questions covering topics such as transmission media, TCP algorithms, firewalls, IPv4 addressing, digital signatures, and error detection methods. Students are instructed to attempt any five questions, with equal marks assigned to each.

Uploaded by

nipunagarwal821
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
16 views31 pages

CN

The document outlines the structure and content of an end-term examination for a Computer Networks course, scheduled for May 2024, with a maximum of 40 marks. It includes various questions covering topics such as transmission media, TCP algorithms, firewalls, IPv4 addressing, digital signatures, and error detection methods. Students are instructed to attempt any five questions, with equal marks assigned to each.

Uploaded by

nipunagarwal821
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 31
Total no. of Pages: 2 ROM NO .seeerssessee SIXTH SEMESTER B.Tech, CSE ENDTERM EXAMINATION May-2024 COURSE CODE C0306 COURSE TITLE COMPUTER NETWORKS Time: 03:00Hours Max.Marks:40 Note :Attempt any five Questions. All questions carry equal marks. ‘Assume suitable missing data, if any. Q.1 (a). What is the function of transmission media? Differentiate between guided and unguided media, and explain the three principal classifications of guided media. [4][CO 1] (b). Explain the concept of Framing in the data link layer. Write the difference between bit stuffing and character stuffing.If a bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the string transmitted after bit stuffing given flag as 01111110? {4][C 02} Q.2 (a). Describe the role of TCP" additive increase and multiplicative decrease algorithm in congestion control. Considering an initial slow start phase followed by the congestion avoidance phase, how long does it take to reach the full transmission capacity on a network with a 10- millisecond RTT and no congestion, given a receiver window of 3200 KB and a maximum segment size of 200 KB? [4][CO 4) (b). Explain the fundamental steps involved in performing a remote procedure call (RPC) and the respective roles of the client and server in this process. [4]{Co 4) Q3 (a). Discuss the significance of firewalls in network security and the different types of firewalls employed to protect networks from unauthorised access and malicious activities. Describe the tole of firewalls in filtering incoming and outgoing email traffic to prevent spam, malware, and other threats. [4]ICO 6} Page 1of 2 (b). Explain the three phases in TCP client-server communication. In TCP, the initial RTT is 20 ms. The ack for the first four segments are received in times 25 ms, 18 ms, 23 ms, and 21 ms. Using the basic algorithm, find the timeout timer value for the first five segments. Use a=0.5. [4][CO 4} Q.4 (a).What role does cryptography play within the presentation layer? Describe the key selection algorithm in RSA and apply it to solve the following scenario: Given p = 13, q = 5, and e = the RSA algorithm, determine the value of d and the cipher value of '6' with the key (e, n). [4][CO 5] (b). Give a diagram and explain the IPv4 header fields in detail. If a datagram of size 600 bytes is transmitted over a network with a Maximum Transmission Unit (MTU) of 200 bytes, and the header length is 20 bytes, what are the offsets of the first, second, and third fragments? [4][CO 3] Q.5 (a). Describe IPV4 classful IP addressing. Discuss the limitations and the significance of subnetting. If a class B address is to be divided into subnets with a 6-bit subnet number, determine the maximum number of subnets and the maximum number of hosts in each subnet. [4][CO 3] (b). Explain the difference between multicast and broadcast. Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability ‘p’ in each time slot. What is the probability that only one station transmits in a given slot? [4][CO 3] Q. 6 (a). Explain the concept of digital signatures in cryptography. What is the significance of digital signatures in ensuring data integrity, authenticity, and non-repudiation in electronic transactions? _[4][CO 5] (b). Discuss the flow control and error control collaboration in the Data Link Layer to ensure reliable data transmission. What is the minimum frame size needed to achieve a channel efficiency of at least 50% for a channel operating at 4 Kbps with a one-way propagation delay of 20 milliseconds, using the stop-and-wait protocol where the ack frame transmission time is negligible? [4][CO 2} NO Bas pis Rall Nav i SIN TIESEMES THe Wetwh (Sb \ we END SE ESTin UNAMINA TION AAD td St Mia | COMPUTER NET WOL ' Ma. Marky: 0 * Newer any BIVE question “Al questions catty equal nei Neste suitable Uitissinye vata, tf any Yel What re the advan tepolory comprisi ANT NENWOFK rebiabitig (D} What are the aes aint dl MHS, anal vines ? UiMerent transmission inpatients Ml camtagtes a aatsliginays a bis bis HPS We ters of Lilt tlenens My jeor Hypeory SHEEN how panting cont usi A used To COFEEL stip is clreck bi My IH)\ hamming codeword consists of 8 bit date ann check hit PLE Cheek tut | Explain with working how the datibis and check bits ave arranyed ane how they are related, What are the values tors and y? MI co2y 3 [a] Explain the distance vector touting: alyorithny, Distance veetoy routing is used, and the followin vectors have Just come from B: (5, 0, 8 12, 6, 2); liom D (16, 12, 6, 0.9, 10) 6, 3.9, 0,4). The new messured delays to B,D, and E, are 6, 3, and 3, into router C; sand fron ne, respectively, What is C's new routing lable? Give both the outgoing lite to use and the expected ee [4][CO3] {b] How does Network layer resoive congestion control? — [4}{CO3] 71] How does TCP determine the timer for acknowledgment? J4] (CO#! {b] What is the Si ificance of TCP and UDP protocol” [4j/CO4 STs] What is symmetric encryption? Whar is the divterence hivece yanspo nen and substitution cipher explain with an example JANE sy VW tse [hs SA algorithm if p= 7,0 = 4 ya nen what wy Jin RSA alge itp Vande = 13 eres wail access te value of . . .AP g (o) Define E-Mail. Explain the basics of por3 and ES © “protocol , COs to resolve the HP address ot [5] Explain what is DNS and how it ic wed {COL a server J Answer the following:- [4X 2 4 Marks| [a] Differentiate reliable and unreal ple communication. \coul 1b] What is a socket and which layer yses it? {con fe] Describe the functions of 8554 ayg application lay {coe} (d] Ifthe bit rate = 3000 aP4 EACH Sip) Clement carries 6 bits. Find the baud rate. \co2\ Roll wongery Lee Lee B.Tech. (MCB May-2024 Total No of P, ‘ages 2 VISEMESTER END TERM EXAMINATION KS Mc308 ¢ p NETWOR OMPUTE! ae Marks Ti ‘ON Hours Note : Answer all the questions. — Assume suitable missing dala, My §}[|COS]L2] QY-Esplain the Pv packet header in detail ts]1C O51 eck and checksum crror detection 2 Der c y Q. ‘monstrate the parity che [5]|CO6)[L3] techniques with the help of an example. s weiphted graph to find the shortest path from y-step—vise perforaing, Dijksiva‘'s algsitlun. State the shortest path and the cost to traverse it. Also, illustrate the > Q2 Analyse the fotlowi Rode A to nc resultant graph IS}COSILA] oo, x KI % " 2 »~o, 2 NEON A 6—1— 6 Q4 Determine various congestion control techniques in a datagram subnet. {S1(CO3}|1.3] QSta] Compare and differentiate between TCP and UDP, [21[CO3}[L5} [bL Determine how the transport layer ensures that the complete ‘message arrives at the destination and in the proper order, [3}1CO3}{L3} follow) Q.6 Answer any One ot [a] Explain various control fags in the TCP segment header, [SJCO3]L2] {b] Eaplain various design issues in the Session layer. [5yCO2I1.3 Q.7 An ISP is granted a block af 65,536 addresses starting with 190.10,0.0/16. The ISP needs to distribute these addresses to three £roups of customers as follows: . 4) The first group has 64 customers; cach needs 256 addresses b)The second yroup has 128 customers; each needs 128 addresses . ©) The third group has 12% customers; each needs 64 addresses Generate the subblocks and find out how many addresses are still available alter these allocations. [5]|COS]|1.6] Q.8 AS] Apply the LZ encoding technique step by step to compress the character sequence “AAARBICCCARCBA", (S][CO4]|L3) Determine the binary encoding of the messaze “HEADACHE” after performing Huftinan coding, for the following characters with the corresponding Trequencjog: (5}[CO4|[ 1.3] character fa | edu | cle ; | jCracter {A ly |e |p EOF \s n | , Pa | [Prequeney }75 | 14 tao j30_/ 146/33 jax [ar | Qg-Ranwer any One oF the foi) owing: i] Ilustrate and explain the working of the Domain Name System. . {5}[CO1]|LA} [b] Discuss the message transfor protocols in the Application layer. [S][CO3}{L2] Total no. of Pages: 2. : . Roll no... BTech SEMESTER END TERM EXAMINATION May-2023 COURSE CODE (C0306) COURSE TITLE COMPUTER NETWORKS Time: 03:00 Hours Max. Marks: 40 Note : Attempt any five questions All questions carry equal marks. Assume suitable missing data, if any. E axSuppose a data link layer uses CRC (Cyclic Redundancy Check) to, z detect errors in transmitted data. If the data word is 101001 and the generator polynomial is x*3 + x+ 1, what is the remainder obtained after performing CRC and Code word received at the receiver side? [3] [co2} : sisi come transmits 10 packets to a receiver using the Stop-and-Wait protocol. The propagation delay is 100 ms and the transmission time for ench packet is 10 ms. If the acknowledgement delay is negligible, what is the time taken to transmit all the packets, Explain steps? _[3][CO3] : raw UDP header and explain cach field. [2][C02] WN Selective Repeat protocol, the sender's window size is 4 and the receiver's window size is also 4, The sequence numbers range from 0 to ‘7, The sender sends packets 0, 1, 2,3 and they dre all acknowledged. The . sender then sends packets 4, 5, 6, 7, but packet 6 is lost. The sender then sends packet 6 again. What is the minimum number of packets that need to be retransmitted and why? [2][CO3) ‘Explain congestion contro] algorithms with the help of a diagram. [3][C03} . A CSMA/CD network has a data tate of 100 Mbps and a propagation delay of 5 ps. The: minimum frame size is Al2 bytes. What is the minimum "packet fransmnission time? . ~ os 8 [3][CO2] Q3. 8) Suppose there are 5 stations in a CSMA p-persistent network. The channel is idle with a probability 0.2 and each station has a probability ‘of.0.5 of transmitting in a given time slot. If station 1 is ready to transmit, what is the probability that it will successfully transmit on the first attempt? {4][CO2] b) i) Given the IP address 10.0.0.0/8, how many subnets and hosts per subnet can be created? - [21{C03] ii t is the network address and broadcast address for the IP address 10.20.30.40/26? 2](C03) iswer IPv4 header questions [2][C03] i, What is the size of the IPv4 header in bytes? ii, How many bits are used to represent the [Pv4 address? iii, What is the maximum size of an IPv4 datagram? iv. What is the value of the TTL (Time To Live) field in the IPv4 * header for a packet that has to traverse 15 routers? pie a short note ( Any two) [4][C05]{CO6) ii) Remote Procedure Call (RPC) iii) Domain Name System (DNS) iv) _ Simple Mait Transfer Protocol (SMTP) wey What is a digital signature, explain with the help of diagram and mention applications of digital signature. [2]IC06) QS. a) In TCP, the initial RTT is 20 ms. The acknowledgements for the first four segments arc reccived in time 25 ms, 18 ms, 23 ms, and 21 ms, ‘Using the basic algorithm, find the timeout timer value for the first five segments. Use a= 0.5. (3][CO6] b)If.a datagram of size 5000 bytes is transmitted over a network with an MTU of 1200 bytes, and the header length is 20 Bytes. What is the offset of the first, second and third fragments? (3}[C04) Suppose Alice and Bob want to establish a shared secret key using "aR ie-Hellman key exchange. They agree to use a prime modulus p = 13 and a base g=3. Alice chooses a secret integer a= 4 and sends g*a mod p to Bob. Bob chooses a secret integer b = 3 and sends gb mod p.” to Alice. What is the shared secret key that Alice and Bob can use to ptand deceypt their messages? [2}[C04] & cast is the difference between guided and unguided transmission medig? Give an example of each. [2][C01} fins TCP is slower but more reliable than UDP Protocol in Transport Layer, Explain. : [2}[CO4) c) What is count to infinity in distance vector routing? How does split horizon prevents routing loops in distance vector routing, Explain. [4][C03) Total no, of Pages: 02 Roll no... End Semester Examination JAN-202) ODD-2020 Fifth Semester B.Tech.(SE) Paper Code: SE-305 Computer Network (Old scheme) Duration: 3 Hrs. Max Marks: 70 NOTE: Attempt all the questions. Assuine the missing data, if any. QI. Answer thé following questions in brief: (7°2=14) a) What are two reasons for using layered protocols? b) Which control bit is involved in setting up a TCP session? c) List out the advantages and drawbacks of bus topology. 4) Why do you require a limit on the minimum size of Ethernet frame? ) What is count to infinity problem? f) How can a device have more than one IP address? 4) Is there any drawback of using pigeybacking? Q2. a) Differentiate between ISO-OSI and TCP/IP reference model, (10) b) List the advantages of fiber-optics over copper as a transmission medium. (4) Q3. a) Explain the working of 3 bit sliding window protocol with suitable example, q) b) Differentiate between Link state and Distance Vector Routing algorithm a Q4. a) Explain the following ARQ techniques in detail: (285) Gi) Stop and wait ARQ (ii) Selective repeat ARQ b) What are the benefits of remote access VPNs? @ P.T.O. Q5. Explain the following terms (any two) (72-14) a) DNS b) SSL ©) Aloha 4) Congestion control END ROU NO! crcceccercecee B.Tech. [ SE] Nov-2019 Total No. of Pages 02 VII SEMESTER END SEMESTER EXAMINATION Paper Code: SE407 Title of Paper: Computer Networks Time: 3:00 Hours Max. Marks : 40 Note : Answer any FIVE questions. All Questions Carry equal marks Assume suitable missing data, if any. Ql a) What are the various layers of OSI model? Compare and contrast OSI model with TCP/IP model b) What are the differences between guided and unguided media. Discuss various types of guided and unguided media. Q2 a) Explain the dynamic channel allocation model in details. And also explain pure and slotted aloha. a) What are the functions of Data link layer? A channel has a bit rate of 4kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 percent? Q3 a) Define Channel capacity in detail. Find the channel capacity for a 3 KHz bandwidth channel and SNR of 3 db. b) Discuss various frame format techniques in Data Link Layer. P.T.O. 4 . 8 fe ses of IPv4 in terms of netid and hostid. What a) Compare different cl are the advant and disadvantages of classfull addresses? b) Discuss Link State Routing Algorithm in detail. Explain in detail TCP header format. , b) Explain distance vector algorithm with suitable example Q6 a) What is cryptography? Discuss various methods of cryptography. Explain substitution & transposition encryption with suitable example and also discuss the working of Data Encryption Standards (DES). b) Explain working of RSA algorithm for encryption and decryption and also find cipher text corresponding to plain text M=3, also generate Public key and Secret key using RSA algorithm by taking two prime numbers p=11 and q=23. Q.7 Write short notes on the following a) Scalar Factor in TCP. b) Digital Signature c) Piggy back and Silly Window Syndrom. d) ARP and RARP End —Goo - Total No. of Pages 2, FIFTH SEMESTER B.TECH. [11] END SEMESTER EXAMINATION: -~ (NOV- 2019) 1T303 COMPUTER NETWORKS Max. Mi ‘Answer any FIVE questions. Assume suitable at any Q1fa] Explain with the help of suitable diagram(s) the terms layer, protocol, service and interface in the OSI model of a computer network. What functions do the upper 4 layers perform? [b] Compare peer-to-peer architecture with the client-server architecture ‘of computer networks. (642-8) Q2[a] Define the terms static, adaptive and hierarchical routing. Explain Distance Vector Routing with a small example network ? [6] The internet uses OSPF routing protocol which is based on link state routing? Suggest possible reasons to support such preference, (6+2=8) Q3[a] Draw and explain the TCP header format.-What are:socket, port and pseudo header and why are they required? [b] Given two applications an IP phone call and a file transfer, compare the Quality of services characteristic and the protocol required at the transport layer. (612-8) Q.4{a] How is the concept of dynamic window size at transport layer flow control linked to congestion control? Explain congestion control in TCP terms of slow start, congestion avoidance and congestion detection. {[b] Explain the 3-way handshake in TCP, considering all stenarios. (642-8) Q.5 [a] What is the Network ID, subnet mask , broadcast address, First Usable IP and Last Usable IP on the subnet that a node 182.175.1.15/27 belongs to? If the given block was to be divided among 4 and 8 subnets determine the First Usable IP of each subnets in both scenari {b] How is IPv6 an improvement over IPv4? (612-8) 66 [a] Explain (with diagram) the IPv6 protocol header in detail {bj Given the following network addresses, find the class, and the range of the addresses. i 182.25.15.12 ii, 220:34.76.0 (4r4=8) the block, Q7 Write Short notes on: [a] Controlled Access MAC Protocols [b] Domain Name Service (4+4=8) seeeENDS OO Roll No: Total No. of Pages 02 B.Tech. {col VI SEMESTER SUPPLIMENTARY EXAMINATION May- 2019 Title of Paper: Computer Networks Max. Marks : 40 Paper Code: CO-306 Time: 3:00 Hours Note ; Answer any FIVE questions. All Questions Carry equal marks Assume suitable missing data, if any. Ql : A) What are the various layers of OSI model? Compare and contrast OSI model with TCP/IP model B) Explain connection. establishment -and release using 3-way handshaking in transport layer Q2 A) What are the functions of Data link layer? A channel has a bit rate of 4kbps and a propagation delay of 20 msec. For what range of frame sizes does stop-and-wait give an efficiency of at least 50 . percent? B) Explain the Bus, Star, Ring, Hybrid and Tree network topologies giving their advantages and disadvantages. Q3 (A) Explain pure and slotted aloha in detail. (B) What is Ethernet 802.3 standard? Discuss in detail the frame format and the channel access method used. Q4 (A) Compare different classes of IPv4 in terms of netid and hostid. What are the advantages and disadvantages of classfull addresses? (B) What are the different types of error detection methods? Write the steps to compute the Checksum in CRC code. if the frame is 110101011 es generator is x4 + x+1 what would be the transmitted frame? A) Explain in detail TCP header format. B) Explain distance vector algorithm with suitable example . Q6 i i i f cryptography. A) What is cryptography? Discuss various methods of cr, a Explain substitution &transposition encryption with suitable example and also discuss the working of Data Encryption Standards (DES).Explain distance vector algorithm with suitable example B) Explain working of RSA algorithm for encryption and decryption and also find cipher text corresponding to plain text M=9, also generate Public key and Secret key using RSA algorithm by taking two prime numbers p=11 and q=23. Q.7 Write short notes on the following a) Piggy back and Sliding Window-Syndrom. b) IPv6 address structure ss c) DNS ; 4) Digital signature using public-key cryptography Total No. of Pages 02 Roll No: ‘MISEMESTER BTech.(¢O) SUPPLIMENTARY EXAMINATION Sept-2019 Paper Code: CO-306 Title of paper: Computer Networks. Time: 3:00 Hours Max. Marks : 40 Note : Answer any FIVE Question. All question carry, equal marks Assume suitablé:missing data; if any. Qi [a] What is OSI reference model? Explain responsibilities of various layers of OSI model. And also Compare and contrast OSI model with TCP/IP model. {b] What are different data encoding techniques? Explain and Encode data stream 00110101 by using Manchester, Differential Manchester and NRZ-L encoding methods. Q2 [a] Explain in detail TCP header format. [b] Explain the working of Sliding Window Protocol with suitable example. Explain how ARQ can be used for error correction? How does Go back N ARQ differ from selective repeat ARQ. Q3 {a} Compare Link State and Distance vector routing algorithms and with the indicated link cost, use Dijksta's shortest path algorithm to compare the shortest path from x to all nodes, [b] What are the major differences between IPv4 and IPv6? Discuss header format and Network addressing with reference to IPv6. Q4 [a] What is cryptography? Discuss various methods of cryptography with example and also explain the working of Data Encryption Standards (DES). [b] Explain working of RSA algorithm for encryption and decryption and also find cipher text corresponding to plain text _M=9, also generate Public key and Secret key using RSA algorithm by taking two prime numbers p=11 and q=23. Qs [a] How do guided media differ from unguided media? Explain with suitable examples. [b] The data link-layer in IEBE standard is divided into sub layers LLC and MAC. Justify statement with example. Q6. [a] What is channel capacity? Find the Channel Capacity for a 3khz: bandwidth and SNR of 3db, [b] What is count to infinity problem? How it can be solved. What are its limitations? Q.7 Write short notes on the following: [a] Digital Signature. - [b] Slotted ALOHA. [qd DNS [4] Three way hand shaking of connection establishment. ‘Roll No... “Total No: of Pages 01~ SEVEN SEMESTER Bech. SUPPLEMENTRY EXAMINATION FEB-2019 SE407 COMPUTER NETWORK Time: 3:00 Hours Max. Marks: 40 Note: Answer ANY FIVE questions. All questions carry equal marks. Assume suitable missing data, if any. 1. [a] Describe Hamming code in detail. __{b] The data string is 10011001000010011 101. What remainder should be append to message “if the ‘cyclic code polyfontifal used i832 +1> ~~ ~ 2. [a] Explain sliding window protocol and when it gives 100% efficiency and what is efficiency of stop and wait protocol. [b] What do you mean by Manchester encoding for signaling standard? 3. [a] A selective repeat ARQ is using 7 bits to represent the sequence number . What is the maximum size of the sliding window ? [b] Explain how TCP perform congestion control based on three phases namely slow start congestion avoidance and congestion detection. ta] Draw and explain header format of Ethernet IEEE 802- $$ [b] Difference between IPv4 and IPv6 and how IPVé provide connection oriented services. 5, [a] Explain Subnetting in IP address explain with example. [b] The following is a dump of UDP header in hexadecimal format. CB84000D001C001C a) what is source port number. (in hexadecimal) ) what is destination port number (in decimal) ) what is total length of the user datagram.(in Bytes)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy