0% found this document useful (0 votes)
122 views3 pages

Tute

1. The document is a tutorial sheet for a Computer Networks course providing questions to help students learn about the network layer. It includes 15 multiple choice questions, 10 short answer questions, and a crossword puzzle focused on network layer topics like routing algorithms, quality of service, addressing, and congestion control. 2. The questions cover concepts such as improving quality of service using traffic shaping algorithms, subnet masking, IP address classes, ICMP message types, routing algorithms, congestion vs flow control, CIDR notation, shortest path routing, and firewall types. 3. The supplementary questions discuss IP address aggregation, datagram size limits based on line speeds, and reassigning addresses within an aggregated block.

Uploaded by

Satyam Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views3 pages

Tute

1. The document is a tutorial sheet for a Computer Networks course providing questions to help students learn about the network layer. It includes 15 multiple choice questions, 10 short answer questions, and a crossword puzzle focused on network layer topics like routing algorithms, quality of service, addressing, and congestion control. 2. The questions cover concepts such as improving quality of service using traffic shaping algorithms, subnet masking, IP address classes, ICMP message types, routing algorithms, congestion vs flow control, CIDR notation, shortest path routing, and firewall types. 3. The supplementary questions discuss IP address aggregation, datagram size limits based on line speeds, and reassigning addresses within an aggregated block.

Uploaded by

Satyam Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

F:/Academic/27

Refer/WI/ACAD/18

SHRI RAMSWAROOP MEMORIAL GROUP OF PROFESSIONAL COLLEGES


B.Tech. [SEM VI (CS&IT)]
TUTORIAL SHEET-3
(Session : 2018-19)
COMPUTER NETWORK
(RCS-601)
Unit: III Topic: Network Layer
Date of Distribution: 15-03-19 Name of Faculty: Prof. Ajay Kr. Srivastava/
Mr. Manvendra /Mr. Amit Kr Sachan

Q1. How we can improve the Quality of service in a network? Discuss any one algorithm, which is used

for traffic shaping.


Q2. What is the number of subnets and hosts that can be assigned to hosts on a local subnet that
uses the 255.255.255.224 subnet mask?
Q3. How many number of networks and hosts can be represented using the IP address classes?
Q4. Explain ICMP and its types of messages.
Q5. Explain working of leaky bucket algorithm with diagram.
Q6. What is the difference between net id, host id and Network Address? Explain with example.
Q7. What is routing? Explain broadcast routing and multicast routing?
Q8. What is the difference between congestion control and flow control? Explain with example.
Q9. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of
hosts it
can handle? Explain about CIDR.
Q10. Illustrate shortest path routing algorithm with the help of an example.
Q11. The network address of a subnet is 192.168.42.0/28. Show the first and last address of network.
Q12. ARP and RARP both map addresses from one space to another. In this respect, they are similar.
However, their implementations are fundamentally different. In what major way do they differ?
Q13. Compare performance of virtual circuit and datagram subnets.
Q14. What is firewall? What is the difference between packet filtering and proxy server gateways?
Q15. The network address of 172.16.0.0/19 provides how many subnets and hosts?

Supplementary Questions:
Q1. The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to 29.18.0.0/17. However,
there is a gap of 1024 unassigned addresses from 29.18.60.0 to 29.18.63.255 that are now suddenly
assigned to a host using a different outgoing line. Is it now necessary to split up the aggregate address
into its constituent blocks, add the new block to the table, and then see if any reaggregation is possible?
If not, what can be done instead?

Q2. A router is blasting out IP packets whose total length (data plus header) is 1024 bytes.Assuming that
packets live for 10 sec, what is the maximum line speed the router can operate at without danger of
cycling through the IP datagram ID number space?

Short Answer Type Questions:-


1. What is flooding?
2. How Quality of Service (QoS) is ensured in Network layer?
3. How can you differentiate between IPV4 and IPV6 Address ?
4. Why Token is used in Token bucket algorithm?
5. What is the technology to convert IPV4 to IPV6?
6. What is unicasting?
7. What is Host ID?
8. What is the use of IP address ?
9. What is range of IP address of class B?
10. What is subnet mask?

Crossword Puzzle:-
ACROSS

3 every incoming packet is sent out an every


outgoing line except the line on which it has
arrived.
4 _______________ decides which best
route is to be chosen from source to
destination.
6 in the connection-less organization, the
independent packets are called ________.

8 Routers works at the _________ layer of


the OSI model.
9 in _________ algorithm, the routing
decision is not based on the measurement of
current traffic.
11 when too many packets are present in a
part of subnet, the performance degrades.

14 it provides the logical connection


between different types of network.
15 a _________ bucket algorithm shapes the
bursty traffic into a fixed rate traffic.
DOWN

1 ________ routing uses topology and load


condition for deciding a route.
2 when source and destination networks of
same type are to be connected through a
network type.
5 it is necessary to identify each device on
the internet uniquely.
7 the network layer encapsulates the packets
received from upper layer protocol and makes
new packets.
10 in ________ circuits, every router has to
maintain a table.
12 _______ is defined as the variation in
delay for the packets belongings to the same
flow.
13 congestion control is _______ in VC
subnet

References:-
1. B. A. Forouzan, "Data Communication and Networking", McGraw-Hill, 4th edition,2011(2006)
2. A.S. Tanenbaum, Computer Networks, Pearson Education, Fourth edition,2009(2003)
3. W. Stallings, Data and Computer Communication, Macmillan Press, 7th edition,2007.

Signature of the Faculty: __________________ Signature of the HOD: _________________

You might also like