0% found this document useful (0 votes)
61 views2 pages

Ques

This document provides instructions and questions for a final assignment on computer networks. It includes 5 questions related to routing table construction, broadcast trees, transport layer protocols, DNS queries, and RSA encryption. Students are instructed to follow specific guidelines, show their work, and cite figures and references. Questions assess different course outcomes and cognitive levels, and include rubrics for marking. The assignment is to be completed within 4 hours and 30 minutes, with an additional 30 minutes for submission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views2 pages

Ques

This document provides instructions and questions for a final assignment on computer networks. It includes 5 questions related to routing table construction, broadcast trees, transport layer protocols, DNS queries, and RSA encryption. Students are instructed to follow specific guidelines, show their work, and cite figures and references. Questions assess different course outcomes and cognitive levels, and include rubrics for marking. The assignment is to be completed within 4 hours and 30 minutes, with an additional 30 minutes for submission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

International Islamic University Chittagong

Department of Computer Science and Engineering


B. Sc. in CSE Final Assignment, Spring 2021
Course Code: CSE 3633 Course Title: Computer Networks
Total marks: 30
Time: 4 hours 30 minutes for exam + 30 minutes for submission
[Rubrics: Diagram=2, Explanation=2, Uniqueness=2 for all questions.
Write all the assignments;
Precisely follow the guideline for preparing and submitting the answer script;
Figures in the right hand margin indicate full marks, Course outcomes and Cognitive levels;]

M C L
1.
a) a) Apply DVR on network Fig:1 to construct a routing table for the node Y. 6 2 3
b) Apply LSR on network Fig:1 to construct a routing table for the node Y.
Here Y is the last digit of your ID.

Fig:1
2.
a) Why broadcast is important? Construct a sink tree for the node Y of Fig:1. Show the 3 1 3
broadcast for node Y using reverse path forwarding and calculate the total number of
packets being generated. [Note: You may reuse part of answer of question-1 if necessary
with reference]
b) A leaky bucket is at the host network interface. The data rate on the network is 3
2MByte/s and the data rate on the link from the host to the bucket is 2.5Mbyte/s.
Suppose the capacity of the bucket is 1XYM bytes. If the host sends 3XY M bytes of data
then what will be the longest burst time from the host in order that no data is lost?
3.
It won’t be wrong if we say Internet was born in the womb of TCP. But in reality, after 6 2 2
serving so many years TCP has been facing severe critics. Write at least 3 such critics of
TCP along with your suggestions for improvement.
4.
The foremost requirement of transport layer is to provide data transport from a process 6 2 2
of source machine to a process of a destination machine with reliability. Reliability is
achieved by the connection oriented service. Explain the following qustions.
a) Should transport layer provide connectionless service?
b) Can IP alone be used instead of UDP?
c) Is there any transport protocol for crash recovery truly?
5.
a) Suppose you have registered your newly created website named 3 4 3
www.last_name.cse.iiuc.ac.bd with a DNS server. Describe the DNS iterative and DNS

Page 1 of 2
recursive queries for searching the IP address of your XY web server.
b) Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26, 3
considering p = 5 and q = 13 encrypt your last_name.

Page 2 of 2

You might also like