Ques
Ques
M C L
1.
a) a) Apply DVR on network Fig:1 to construct a routing table for the node Y. 6 2 3
b) Apply LSR on network Fig:1 to construct a routing table for the node Y.
Here Y is the last digit of your ID.
Fig:1
2.
a) Why broadcast is important? Construct a sink tree for the node Y of Fig:1. Show the 3 1 3
broadcast for node Y using reverse path forwarding and calculate the total number of
packets being generated. [Note: You may reuse part of answer of question-1 if necessary
with reference]
b) A leaky bucket is at the host network interface. The data rate on the network is 3
2MByte/s and the data rate on the link from the host to the bucket is 2.5Mbyte/s.
Suppose the capacity of the bucket is 1XYM bytes. If the host sends 3XY M bytes of data
then what will be the longest burst time from the host in order that no data is lost?
3.
It won’t be wrong if we say Internet was born in the womb of TCP. But in reality, after 6 2 2
serving so many years TCP has been facing severe critics. Write at least 3 such critics of
TCP along with your suggestions for improvement.
4.
The foremost requirement of transport layer is to provide data transport from a process 6 2 2
of source machine to a process of a destination machine with reliability. Reliability is
achieved by the connection oriented service. Explain the following qustions.
a) Should transport layer provide connectionless service?
b) Can IP alone be used instead of UDP?
c) Is there any transport protocol for crash recovery truly?
5.
a) Suppose you have registered your newly created website named 3 4 3
www.last_name.cse.iiuc.ac.bd with a DNS server. Describe the DNS iterative and DNS
Page 1 of 2
recursive queries for searching the IP address of your XY web server.
b) Using the RSA public key cryptosystem, with a = 1, b = 2 . . . y = 25, z = 26, 3
considering p = 5 and q = 13 encrypt your last_name.
Page 2 of 2