0% found this document useful (0 votes)
51 views4 pages

Practice Problems

The document contains 76 practice problems related to computer networking concepts. The problems cover topics such as routing algorithms, TCP and UDP, IP addressing, congestion control, router protocols, network security, web protocols, and network management functions.

Uploaded by

PRAGASM PROG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views4 pages

Practice Problems

The document contains 76 practice problems related to computer networking concepts. The problems cover topics such as routing algorithms, TCP and UDP, IP addressing, congestion control, router protocols, network security, web protocols, and network management functions.

Uploaded by

PRAGASM PROG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Practice Problems

29) What routing is important in a computer network and what are the primary
conditions that affect routing?
30) Distinguish between virtual circuit and datagram type of routing?
31) List out the advantages and disadvantages of fixed routing.
32) Why adaptive routing is preferred over fixed routing?
33) What is flooding? Why flooding technique is not commonly used for routing?
34) In what situation flooding is most appropriate? How the drawbacks of flooding can
be minimized?
35) Describe Bellman-Ford Algorithm. What are the disadvantages of Bellman Ford
Algorithm? Consider the network shown below and assume that each node initially
knows the costs to each of its neighbors. Consider the distance vector algorithm and show
the distance table entries at node E.

36) Differentiate between Link State and Distance Vector routing algorithms.
37) Explain the Count to Infinity problem.

41. Why does UDP exist? Would it not have been enough to just let user processes send raw
IP packets?
42. Both UDP and TCP use port numbers to identify the destination entity when delivering a
message. Give two reasons for why these protocols invented a new abstract ID (port
numbers), instead of using process IDs, which already existed when these protocols were
designed.
43. The following is a dump of a TCP header in hexadecimal format.

a. What is the source port number?


b. What is the destination port number?
c. What the sequence number?
d. What is the acknowledgment number?
e. What is the length of the header?
f. What is the type of the segment?
g. What is the window size?
44. The following is a dump of a UDP header in hexadecimal format.

a. What is the source port number?


b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?
f. What is the client process?

45. To make the initial sequence number a random number, most systems start the
counter at 1 during bootstrap and increment the counter by 64,000 every 0.5 s. How
long does it take for the counter to wrap around?
46. To make the initial sequence number a random number, most systems start the
counter at 1 during bootstrap and increment the counter by 64,000 every 0.5 s. How
long does it take for the counter to wrap around?
47. TCP opens a connection using an initial sequence number (ISN) of 14,534. The
other party opens the connection with an ISN of 21,732. Show the three TCP
segments during the connection establishment.
48. TCP is sending data at 1 Mbyte/s. If the sequence number starts with 7000, how
long does it take before the sequence number goes back to zero?
49. A TCP connection is using a window size of 10,000 bytes, and the previous
acknowledgment number was 22,001. It receives a segment with acknowledgment
number 24,001 and window size advertisement of 12,000. Draw a diagram to show
the situation of the window before and after.
50. DNS usage UDP instead of TCP? If a DNS packet is lost, there is no automatic recovery.
Does this cause a problem, and if so, how is it solved?
51. Can machine with single DNS name have multiple IP address? How could this occur.
52. A client has a packet of 68,000 bytes. Show how this packet can be transferred by
using only one UDP user datagram.
53. In a connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host
has sent 2000 bytes which has not been acknowledged. How many more bytes can
be sent?
54. What is the value of the receiver window (rwnd) for host A if the receiver, host B,

has a buffer size of 5000 bytes and 1000 bytes of received and unprocessed data?
55. What is the size of the window for host A if the value of rwnd is 3000 bytes and the
value of cwnd is 3500 bytes?
56. An organization is granted the block 130.56.0.0/16. The administrator wants to
create 1024 subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.
c. Find the first and last addresses in subnet 1.
d. Find the first and last addresses in subnet 1024.

57. A large number of consecutive IP address are available starting at 198.16.0.0.


Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000
addresses, respectively, and in that order. For each of these, give the first IP
address assigned, the last IP address assigned, and the mask in the w.x.y.z/s
notation.

58. An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536


addresses). The ISP needs to distribute these addresses to three groups of
customers as follows:
a. The first group has 64 customers; each needs 256 addresses.
b. The second group has 128 customers; each needs 128 addresses.
c. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and find out how many addresses are still available after these
allocations.

59. What is the difference between open-loop congestion control and closed-loop
congestion control?

60. Name the policies that can prevent congestion.

61. What is difference between an interior router protocol and exterior router
protocol?
62. Explain the main function of BGP. Also discuss the BGP massage in details.
63. Why do OSPF msg propagate faster than RIP msg? Show the Autonomous
Systems with following specification
(a)There are eight network (N1 to N8) and eight router(R1 to R8)
(b)N1 to N6 are Ethernet LANs and N7 and N8 are point to point WANs.
Where R1 connects N1 and N2,
R2………….N1 and N7,
R3………….N2 and N8
R4………….N7 and N6
R5………….N6 and N3
R6………….N6 and N4
R7………….N6 and N5
R8………… N8 and N5
Also draw the graphical representation of AS.

64. How congestion control is performed by leaky bucket algorithm?

65. In what way token bucket algorithm is superior to leaky bucket algorithm?
66. When Web pages are sent out, they are prefixed by MIME headers. Why?

67. Write a POP3 server that accepts the following commands: USER, PASS, LIST,
RETR, DELE, and QUIT.

68. Explain the OSI security architecture.

69. Differentiate between symmetric and asymmetric cryptosystems.

70. Explain how a monoalphabatic cipher may be cryptanalysed.

71. Explain structure of DES cipher.

72. What is public key cryptography?

73. What is a digital signature?

74. How is web security achieved by SSL?

75. What are functions of network management?

76. Write the short note on following:

(A) Autonomous Systems


(B) Routing in the Internet
(C) SYN flooding attack
(D) MIME
(E) SMTP
(F) POP3
(G) CGI
(H)HTTP
(I) WWW
(J) IMAP
(K) IGMP
(L) FTP
(M) DDNS
(Y) FQDN and PQDN

You might also like