Cloud Computing Bible1
Cloud Computing Bible1
Cloud Computing Bible1
2 a) Discuss different policies applied to prevent congestion with open loop congestion control
mechanisms. 5
b) With the state transition diagram explain the different states of DCHP client. 6
c) An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two
organisations each with 500 addresses, two organisations each with 250 addresses and three
organisations each with 50 addresses.
i) Find the number of range of addresses in the ISP block.
ii) Find the range of addresses for each organization.
iii) Find the range of unallocated addresses. 9
3 a) Show IPV4 packet format and identify the purpose of every field in IPV4 and explain. 8
b) Consider the network as shown in Fig. 3(b).
5 a) Explain in detail, the process of TCP connection establishment using three-way handshaking. 8
b) Identify some of the typical application that can benefit more from the services of UDP rather
than TCP. 6
c) Construct the transition diagrams for half-close connection termination and explain. 6
6 a) Explain how RSVP protocol is used to achieve quality of service in unicast and multicast
applications. 8
b) Interpret the steps involved in name and address resolution in DNS with neat diagram. 6
c) Summarise Mine data types along with the header format. 6
________