0% found this document useful (0 votes)
24 views

Computer Network Beu - Solution - 2022

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Computer Network Beu - Solution - 2022

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Computer network

previous year solution 2022 solved by deepak


1. Choose the CorreCt answer from the following(any
seven) :

(a) A proxy server is used as the computer

(i) With external access


(ii) Acting as a backup
(iii) Performing the handling
(iv) Accessing user permissions
Correct option is (i)

(b) The term ‘WAN’ stands for

(i) Wide Area Net


(ii) Wide Access Network
(iii) Wide Area Network
(iv) Wide Access Net
Correct option is (iii)

(c) Which layer of the TCP / IP stack corresponds to the OSI model
transport layer?

(i) Host – to – Host


(ii) Application
(iii) Internet
(iv) Network access
Correct option is (i)
(d) What is the maximum header size of an IP packet?

(i) 32 bytes
(ii) 64 bytes
(iii) 30 bytes
(iv) 60 bytes
Correct option is (iv)

(e) The address which is used to identify a process on a host is :

(i) Physical address


(ii) Port address
(iii) Logical address
(iv) Specific address
Correct option is (ii)
(f) Which sublayer of the information link layer performs circuit
functions that depend on the kind of medium?

(i) Media access control sublayer


(ii) Logical link control sublayer
(iii) Network interface control sublayer
(iv) Both (i) and (ii)
Correct option is (i)
(g) Transport layer protocol deals with

(i)application-to-application communication
(ii) node-to-node communication
(iii) the process-to-process communication
(iv)Both (i) and (iii)
Correct option is (iii)
(h) FTP server
(i)maintains state information
(ii) is stateless
(iii) has single TCP connection for a file transfer
(iv)has UDP connection for file transfer
Correct option is (i)
(i) Which of the following is the multiple access protocol for channel
access control?
(i)CSMA / CD
(ii) CSMA / CA
(iii) Both CSMA / CD and CSMA / CA
(iv)HDLC
Correct option is (iii)

(j) Physical layer provides


(i)mechanical specification of electrical connectors and cables
(ii) electrical specification of transmission line signal level
(iii) specification for IR over optical fiber
(iv)All of the above
Correct option is (iv)
2. Explain the duties of different layers in TCP/IP model.
Ans:- The TCP/IP model, also known as the Internet protocol suite,
consists of four layers: Link, Internet, Transport, and Application.
Each layer has specific responsibilities in facilitating communication
over a network.

Here's an overview of the duties of each layer:

1. Link Layer (Network Interface Layer):


 Responsibility: This layer deals with the physical
connection to the network and is concerned with the
transmission of frames (packets) within a local network.
 Functions:
 Frame encapsulation and addressing: Adding
physical addressing to frames for local delivery.
 Media Access Control (MAC): Controlling access to
the physical transmission medium.
 Error detection and correction: Ensuring the integrity
of data during transmission within the local network.
 Flow control: Managing the flow of data between
devices on the same network.
2. Internet Layer:
 Responsibility: The Internet layer is responsible for
routing packets between different networks, enabling end-
to-end communication across the Internet.
 Functions:
 IP addressing: Assigning unique addresses to devices
on the network.
 Routing: Determining the best path for data packets
to travel from the source to the destination across
interconnected networks.
 Fragmentation and reassembly: Breaking down and
reassembling large packets for efficient transmission
over different network types.
 Internet Control Message Protocol (ICMP): Handling
error messages and network management functions.
3. Transport Layer:
 Responsibility: The transport layer ensures reliable, end-
to-end communication between devices on different
networks.
 Functions:
 Segmentation and reassembly: Breaking down and
reassembling data into manageable chunks
(segments).
 Flow control: Regulating the flow of data to prevent
congestion.
 Error detection and correction: Ensuring the integrity
of data during transmission between devices.
 Connection establishment, maintenance, and
termination: Managing the setup and teardown of
communication sessions.
 Multiplexing and demultiplexing: Handling multiple
communication sessions simultaneously.
4. Application Layer:
 Responsibility: The application layer provides network
services directly to end-users or applications.
 Functions:
 High-level protocols: Implementing specific
communication protocols like HTTP, FTP, SMTP,
etc.
 Data representation and encryption: Ensuring that
data is presented in a format that applications can
understand and providing encryption if needed.
 Session establishment, maintenance, and termination:
Managing communication sessions between
applications.
 User authentication and authorization: Verifying the
identity of users and controlling their access to
resources.
3. What do you mean by term ‘ethernet’ ? What are the types
of cable commonly used for ethernet?
Ans:- Ethernet refers to a family of computer networking technologies
commonly used in local area networks (LANs). It defines a set of standards for
the physical and data link layers of the OSI model, enabling devices to
communicate within a local network. Ethernet is widely used for connecting
computers, servers, printers, and other devices in both home and business
networks.

Key characteristics and features of Ethernet include:

1. Physical Medium:
 Ethernet can operate over various physical media, including
twisted pair cables, coaxial cables, and fiber-optic cables. The most
common type today is Ethernet over twisted pair cables.
2. Data Link Layer:
 Ethernet operates at the data link layer (Layer 2) of the OSI model.
It uses a frame-based communication protocol to encapsulate data
for transmission over the network.
3. CSMA/CD Protocol:
 Traditional Ethernet (e.g., 10BASE-T and 100BASE-T) used a
protocol called Carrier Sense Multiple Access with Collision
Detection (CSMA/CD). However, modern Ethernet networks,
especially those based on twisted pair cables, often use full-duplex
communication and do not rely on CSMA/CD.
4. Standardization:
 Ethernet standards are defined by the Institute of Electrical and
Electronics Engineers (IEEE). Common Ethernet standards include
10BASE-T, 100BASE-TX, 1000BASE-T, and 10GBASE-T, each
specifying different data transfer rates and cabling requirements.
5. Frame Format:
 Ethernet frames consist of various fields, including source and
destination MAC addresses, type or length, data payload, and a
cyclic redundancy check (CRC) for error detection.
6. Topology:
 Ethernet supports different network topologies, including star, bus,
and ring configurations. In a modern Ethernet network, the star
topology is prevalent, with devices connected to a central switch or
router.

Types of Ethernet Cables:


Mainly there are three types of ethernet cables used in LANs i.e., Coaxial cables,
Twisted Pair cables, and Fiber optic cables.

1. Coaxial Cables: A coaxial cable is used to carry high-frequency electrical


signals with low losses. It uses 10Base2 and 10Base5 Ethernet variants. It has
a copper conductor in the middle that is surrounded by a dielectric insulator
usually made of PVC or Teflon.

Types of Coaxial cables:


 Hardline coaxial cable
 RG-6 Coaxial Cable
 Tri-axial Cable
2. Twisted Pair Cable: Twisted pair is a copper wire cable in which two
insulated copper wires are twisted around each other to reduce interference or
crosstalk. It uses 10BASE-T, 100BASE-T, and some other newer ethernet
variants. It uses RJ-45 connectors.

Types of twisted pair cable:


 Shielded Twisted Pair (STP) Cable
 Unshielded Twisted Pair (UTP) Cable
3. Fiber Optic Cable: Fiber optic cables use optical fibers which are made of
glass cores surrounded by several layers of cladding material usually made of
PVC or Teflon, it transmits data in the form of light signals due to which there
are no interference issues in fiber optics.

Types of Fiber Optics:


 SMF (Single-mode fiber)
 MMF (Multi-mode Fiber)

4.Differentiate between pure aloha and slotted aloha with


examples.

Ans:-
Pure Aloha Slotted Aloha

In this, any station can transmit the


In this Aloha, any station can
data at the beginning of any time
transmit the data at any time.
slot.

In this, The time is continuous and In this, The time is discrete and
not globally synchronized. globally synchronized.

Vulnerable time for Pure Aloha = 2 Vulnerable time for Slotted Aloha =
x Tt Tt

In Pure Aloha, the Probability of In Slotted Aloha, the Probability of


successful transmission of the data successful transmission of the data
packet packet
= G x e-2G = G x e-G

In Slotted Aloha, Maximum


In Pure Aloha, Maximum efficiency
efficiency
= 18.4%
= 36.8%

Slotted Aloha reduces the number of


Pure Aloha doesn’t reduce the
collisions to half and doubles the
number of collisions to half.
efficiency of Pure Aloha.

It was introduced under the


It was introduced by Robert in 1972
leadership of Norman Abramson in
to improve pure aloha's capacity.
1970 at the University of Hawaii.
5.How data link layer provide flow and error control? Explain
with examples.
Ans:- The Data Link Layer of the OSI model provides mechanisms
for flow control and error control to ensure reliable communication
between devices on a network. Let's discuss each of these concepts
with examples:

1. Flow Control:
 Definition: Flow control manages the pace of data
transmission between devices to prevent congestion and
ensure that a fast sender does not overwhelm a slower
receiver.
 Example: Stop-and-Wait Protocol
 In a simple example, consider the Stop-and-Wait
protocol. In this protocol, the sender sends a frame
and waits for an acknowledgment from the receiver
before sending the next frame. If the sender does not
receive an acknowledgment within a specified time,
it assumes that the frame was lost or corrupted and
retransmits it.
2. Error Control:
 Definition: Error control ensures the integrity of data
during transmission and detects and corrects errors that
may occur.
 Example: Automatic Repeat reQuest (ARQ)
 ARQ is a common error control technique. In the
context of flow control, a common ARQ method is
the Selective Repeat protocol.
 The sender sends a series of frames and waits
for acknowledgments from the receiver.
 If the sender does not receive an
acknowledgment for a particular frame within a
specified time, it assumes the frame was lost or
corrupted and retransmits only that specific
frame.
 The receiver acknowledges correctly received
frames and requests retransmission only for the
frames that were received with errors or not
received at all.
 Example: Cyclic Redundancy Check (CRC)
 CRC is a method for detecting errors in transmitted
frames. The sender generates a CRC code based on
the frame's content and appends it to the frame
before transmission. The receiver performs the same
calculation upon receiving the frame. If the
calculated CRC at the receiver matches the one
received, the frame is assumed to be error-free.
Otherwise, it is considered corrupted, and the
receiver may request retransmission.

These examples illustrate how flow control and error control work at
the Data Link Layer:

 Flow control helps regulate the rate of data transmission to


prevent congestion and ensure efficient communication.
 Error control mechanisms detect and, in some cases, correct
errors to ensure the integrity of the transmitted data.

These techniques collectively contribute to reliable communication


over a network, even in the presence of potential issues like
congestion or transmission errors.
6.Describe RIP routing protocol with an example. Explain count
to infinity problem and its countermeasures.
Ans:- RIP, which stands for Routing Information Protocol, is one of the oldest and simplest
interior gateway protocols (IGP) used for routing within a local area network (LAN) or an
autonomous system.

RIP is categorized as a distance-vector routing protocol, and it uses the Bellman-Ford


algorithm to determine the best path to a destination based on the number of hops.

Here's an overview of RIP along with an example:

Routing Information Protocol (RIP):

1. Version:
 RIP has two main versions: RIP version 1 (RIPv1) and RIP version 2 (RIPv2).
RIPv1 is simpler and uses classful routing, while RIPv2 supports subnetting
and Variable Length Subnet Masking (VLSM).
2. Metric:
 RIP uses hop count as its metric, where each hop represents a router that a
packet traverses. The route with the fewest hops is considered the best.
3. Routing Updates:
 RIP routers exchange routing information periodically through routing
updates. By default, updates are sent every 30 seconds.
4. Split Horizon:
 RIP employs the split horizon mechanism to prevent routing loops. In split
horizon, a router does not advertise routes back out on the interface from
which it learned those routes.
5. Route Poisoning:
 RIP uses route poisoning, marking unreachable routes with a metric of 16
(infinity). This informs other routers that the route is unreachable.

Example of RIP:

Consider a simple network with three routers (A, B, and C) connected as follows:
 Initially, each router knows only about its directly connected networks.
 Router B advertises its routes to router A and C, and vice versa.
 If router A wants to reach a network connected to router C, the route
would be A -> B -> C.
 RIP exchanges routing information periodically, updating the routers
about the network topology.

7.An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate
addresses for two organizations each with 500 addresses, two organizations
each with 250 addresses, and three organizations each with 50 addresses.
(a) Find the number and range of addresses in the ISP block.
(b) Find the range of addresses for each organization and the range of
unallocated addresses.
Ans 7(a) :- The given ISP block is 80.70.56.0/21. To find the number and range of
addresses, let's break down the information:

1. Subnet Mask:
 The /21 in CIDR notation implies that the first 21 bits are the network portion,
and the remaining bits are for host addresses.
2. Calculating Addresses:
 The total number of addresses in the block can be found using the formula
232−subnet mask232−subnet mask.
232−21=211=2048232−21=211=2048
So, the ISP block has a total of 2048 addresses.
3. Range of Addresses:
 To find the range of addresses, we need to determine the start and end
addresses.
 The block 80.70.56.0/21 can be divided as follows:
 Network Address: 80.70.56.0
 Usable Addresses: 80.70.56.1 to 80.70.63.254
 Broadcast Address: 80.70.63.255
4. Allocating Addresses for Organizations:
 Two organizations each with 500 addresses will need 2×500=1000 addresses.
 Two organizations each with 250 addresses will need 2×250=500 addresses.
 Three organizations each with 50 addresses will need 3×50=1503×50=150
addresses.
5. Calculating the Remaining Addresses:
 Subtracting the allocated addresses from the total addresses in the ISP block
gives the remaining addresses:
2048−(1000+500+150)=2048−1650=3982048−(1000+500+150)=2048−1650=398
So, the ISP block 80.70.56.0/21 has a total of 2048 addresses, and the usable range is from
80.70.56.1 to 80.70.63.254.

7(b) Ans:- To find the range of addresses for each organization and the range of
unallocated addresses, we need to allocate blocks of addresses for each organization
based on their requirements and then determine the remaining unallocated
addresses. Let's break down the allocation:

1. Two organizations each with 500 addresses:


 Each organization requires a block of 500 addresses.
 The first organization can be allocated addresses from 80.70.56.1 to
80.70.57.254.
 The second organization can be allocated addresses from 80.70.58.1 to
80.70.59.254.
2. Two organizations each with 250 addresses:
 Each organization requires a block of 250 addresses.
 The third organization can be allocated addresses from 80.70.60.1 to
80.70.60.254.
 The fourth organization can be allocated addresses from 80.70.61.1 to
80.70.61.254.
3. Three organizations each with 50 addresses:
 Each organization requires a block of 50 addresses.
 The fifth organization can be allocated addresses from 80.70.62.1 to
80.70.62.50.
 The sixth organization can be allocated addresses from 80.70.62.51 to
80.70.62.100.
 The seventh organization can be allocated addresses from 80.70.62.101
to 80.70.62.150.
4. Calculating the Range of Unallocated Addresses:
 The remaining unallocated addresses are from 80.70.62.151 to
80.70.63.254.
8.How transport layer provides congestion control? Differentiate between
leaky bucket and token bucket algorithms.
Ans:- The transport layer provides congestion control mechanisms to manage and
alleviate congestion in a network. Congestion occurs when the demand for network
resources exceeds their availability, leading to degraded performance, increased
packet loss, and delays. The transport layer employs several techniques to address
and mitigate congestion:

1. Window-based Flow Control:


 Sliding Window Protocol: Many transport layer protocols, such as TCP
(Transmission Control Protocol), use a sliding window approach for flow
control. The sender can transmit a certain number of packets before
waiting for an acknowledgment from the receiver.
2. Congestion Avoidance:
 AIMD (Additive Increase, Multiplicative Decrease): TCP uses AIMD
as part of its congestion control algorithm. When congestion is not
detected, the sender gradually increases its sending rate (additive
increase). In the presence of congestion signals (e.g., packet loss), the
sender reduces its transmission rate significantly (multiplicative
decrease) to alleviate congestion.
3. Slow Start:
 Slow Start Algorithm: TCP employs a slow start mechanism when
establishing a connection. The sender begins by sending a small
number of packets and doubles the window size after each
acknowledgment.
4. Explicit Congestion Notification (ECN):
 ECN Bits in IP Header: Some transport layer protocols, like TCP,
support ECN, which allows routers to notify endpoints of impending
congestion.
5. Random Early Detection (RED):
 Active Queue Management: RED is an active queue management
algorithm implemented at routers. It monitors the queue length, and
when the queue reaches a certain threshold, it starts marking or
dropping packets randomly.
6. Traffic Policing and Shaping:
 Token Bucket and Leaky Bucket Algorithms: These algorithms are
used for traffic shaping and policing.
7. Fair Queuing:
 Fair Queuing Algorithms: Fair queuing algorithms ensure that each
flow or connection is treated fairly in terms of bandwidth allocation.
Leaky Bucket Token Bucket

When the host has to send a In this, the bucket holds tokens
packet , packet is thrown in generated at regular intervals of
bucket. time.

Bucket leaks at constant rate Bucket has maximum capacity.

Bursty traffic is converted If there is a ready packet , a token


into uniform traffic by leaky is removed from Bucket and packet
bucket. is send.

In practice bucket is a finite If there is no token in the bucket,


queue outputs at finite rate then the packet cannot be sent.

Token bucket is token Leaky bucket is token


dependent. independent.

Token bucket allows for


large bursts to be sent Leaky bucket sends the packets at
faster by speeding up the an average rate.
output.

9.Explain the difference between TCP and UDP. A client residing on a host
with IP address 122.45.12.7 sends a message to the corresponding server
residing on a host with IP address 200.112.45.90 . If the well-known port is
161 and the ephemeral port is 51000, what are the pair of socket addresses
used in this communication?
Ans:- The main differences between TCP (Transmission Control Protocol) and UDP
(User Datagram Protocol) are:

Transmission Control User Datagram Protocol


Basis Protocol (TCP) (UDP)

TCP is reliable as it guarantees The delivery of data to the


Reliability the delivery of data to the destination cannot be
destination router. guaranteed in UDP.

An acknowledgment segment No acknowledgment


Acknowledgment
is present. segment.

TCP is comparatively slower UDP is faster, simpler, and


Speed
than UDP. more efficient than TCP.

TCP has a (20-60) bytes UDP has an 8 bytes fixed-


Header Length
variable length header. length header.

Weight TCP is heavy-weight. UDP is lightweight.

Handshaking Uses handshakes such as SYN, It’s a connectionless protocol


Techniques ACK, SYN-ACK i.e. No handshake

TCP doesn’t support


Broadcasting UDP supports Broadcasting.
Broadcasting.

Overhead Low but higher than UDP. Very low.

In networking, a socket is identified by a combination of the IP address and port


number. In this case, we have a client with IP address 122.45.12.7 and an
ephemeral port of 51000 communicating with a server with IP address
200.112.45.90 on the well-known port 161.

The pair of socket addresses for the client and server communication can be
expressed as:

1. Client Socket Address:


 IP Address: 122.45.12.7
 Port Number: 51000
So, the client socket address is (122.45.12.7, 51000).
2. Server Socket Address:
 IP Address: 200.112.45.90
 Port Number: 161 (well-known port for SNMP)
So, the server socket address is (200.112.45.90, 161).

In summary, the pair of socket addresses for the communication between the
client and server are:

 Client Socket Address: (122.45.12.7, 51000)


 Server Socket Address: (200.112.45.90, 161)

solved by deepak kumar

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy