Practice Problems
Practice Problems
29) What routing is important in a computer network and what are the primary
conditions that affect routing?
30) Distinguish between virtual circuit and datagram type of routing?
31) List out the advantages and disadvantages of fixed routing.
32) Why adaptive routing is preferred over fixed routing?
33) What is flooding? Why flooding technique is not commonly used for routing?
34) In what situation flooding is most appropriate? How the drawbacks of flooding can
be minimized?
35) Describe Bellman-Ford Algorithm. What are the disadvantages of Bellman Ford
Algorithm? Consider the network shown below and assume that each node initially
knows the costs to each of its neighbors. Consider the distance vector algorithm and show
the distance table entries at node E.
36) Differentiate between Link State and Distance Vector routing algorithms.
37) Explain the Count to Infinity problem.
41. Why does UDP exist? Would it not have been enough to just let user processes send raw
IP packets?
42. Both UDP and TCP use port numbers to identify the destination entity when delivering a
message. Give two reasons for why these protocols invented a new abstract ID (port
numbers), instead of using process IDs, which already existed when these protocols were
designed.
43. The following is a dump of a TCP header in hexadecimal format.
45. To make the initial sequence number a random number, most systems start the
counter at 1 during bootstrap and increment the counter by 64,000 every 0.5 s. How
long does it take for the counter to wrap around?
46. To make the initial sequence number a random number, most systems start the
counter at 1 during bootstrap and increment the counter by 64,000 every 0.5 s. How
long does it take for the counter to wrap around?
47. TCP opens a connection using an initial sequence number (ISN) of 14,534. The
other party opens the connection with an ISN of 21,732. Show the three TCP
segments during the connection establishment.
48. TCP is sending data at 1 Mbyte/s. If the sequence number starts with 7000, how
long does it take before the sequence number goes back to zero?
49. A TCP connection is using a window size of 10,000 bytes, and the previous
acknowledgment number was 22,001. It receives a segment with acknowledgment
number 24,001 and window size advertisement of 12,000. Draw a diagram to show
the situation of the window before and after.
50. DNS usage UDP instead of TCP? If a DNS packet is lost, there is no automatic recovery.
Does this cause a problem, and if so, how is it solved?
51. Can machine with single DNS name have multiple IP address? How could this occur.
52. A client has a packet of 68,000 bytes. Show how this packet can be transferred by
using only one UDP user datagram.
53. In a connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host
has sent 2000 bytes which has not been acknowledged. How many more bytes can
be sent?
54. What is the value of the receiver window (rwnd) for host A if the receiver, host B,
has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data?
55. What is the size of the window for host A if the value of rwnd is 3000 bytes and the
value of cwnd is 3500 bytes?
56. An organization is granted the block 130.56.0.0/16. The administrator wants to
create 1024 subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.
c. Find the first and last addresses in subnet 1.
d. Find the first and last addresses in subnet 1024.
59. What is the difference between open-loop congestion control and closed-loop
congestion control?
61. What is difference between an interior router protocol and exterior router
protocol?
62. Explain the main function of BGP. Also discuss the BGP massage in details.
63. Why do OSPF msg propagate faster than RIP msg? Show the Autonomous
Systems with following specification
(a)There are eight network (N1 to N8) and eight router(R1 to R8)
(b)N1 to N6 are Ethernet LANs and N7 and N8 are point to point WANs.
Where R1 connects N1 and N2,
R2………….N1 and N7,
R3………….N2 and N8
R4………….N7 and N6
R5………….N6 and N3
R6………….N6 and N4
R7………….N6 and N5
R8………… N8 and N5
Also draw the graphical representation of AS.
65. In what way token bucket algorithm is superior to leaky bucket algorithm?
66. When Web pages are sent out, they are prefixed by MIME headers. Why?
67. Write a POP3 server that accepts the following commands: USER, PASS, LIST,
RETR, DELE, and QUIT.