Model KTU QP With Answer
Model KTU QP With Answer
3. Data link protocols almost always put the CRC in a trailer rather than in a header.
Why?
The CRC is computed during transmission and appended to the output stream as soon
as the last bit goes out onto the wire. If the CRC were in the header, it would be
necessary to make a pass over the frame to compute the CRC before transmitting.
This would require each byte to be handled twice— once for checksumming and once
for transmitting. Using the trailer cuts the work in half.
The procedure used by the sender to encode the message encompasses the following steps
−
12 11 10 9 8 7 6 5 4 3 2 1
1 1 1 1 0 0 1 0 0 1 0 1
Distance vector routing reacts rapidly to good news, but leisurely to bad news. Consider a
router whose best route to destination X is long. If, on the next exchange, neighbor A suddenly
reports a short delay to X, the router just switches over to using the line to A to send traffic to
X. In one vector exchange, the good news is processed. (Figure on left side)
A goes down or the link between A and B is cut (which is effectively the same thing from B’s
point of view). At the first packet exchange, B does not hear anything from A. Fortunately, C
says ‘‘Do not worry; I have a path to A of length 2.’’ Little does B suspect that C’s path runs
through B itself. For all B knows, C might have ten links all with separate paths to A of length
2. As a result, B thinks it can reach A via C, with a path length of 3. D and E do not update
their entries for A on the first exchange. On the second exchange, C notices that each of its
neighbors claims to have a path to A of length 3. It picks one of them at random and makes its
new distance to A 4, as shown in the third row of Fig. fig(b). Subsequent exchanges produce
the history shown in the rest of Fig(b). From this figure, it should be clear why bad news travels
slowly.
6. Describe two major differences between the warning bit method and the
Random Early Detection (RED) method.
7. The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.
Why?
The Protocol field tells the destination host which protocol handler to give the IP packet to.
Intermediate routers do not need this information, so it is not needed in the main header.
Actually, it is there, but disguised. The Next header field of the last (extension) header is used
for this purpose.
8. How many octets does the smallest possible IPv6 (IP version 6) datagram contain?
1,280 octets
9. Can Transmission Control Protocol(TCP) be used directly over a network
(e. g. an Ethernet) without using IP? Justify your answer.
Explain the need of network layer / IP – host-to-host delivery. The layer above it,
transport layer is implemented with the help of services provided by network layer.
Ethernet – Data Link Layer
IP – Network Layer
TCP – Transport Layer
TCP depends on IP to deliver the data, even to another machine on the same network.
The IP header contains the IP address to which the data is sent. Finally, there is a
configured IP packet type code for the Ethernet header, but no TCP type code, so
there is no way to put TCP directly on top of the Ethernet header.
10. When Web pages are sent out, they are prefixed by MIME headers. Why?
PART B
11. A) With a neat diagram, explain Open Systems Interconnection (OSI) Reference
Model.
The main functions of each of the layers are as follows −
• Physical Layer − Its function is to transmit individual bits from one node to another
over a physical medium.
• Data Link Layer − It is responsible for the reliable transfer of data frames from one
node to another connected by the physical layer.
• Network Layer − It manages the delivery of individual data packets from source to
destination through appropriate addressing and routing.
• Transport Layer −It is responsible for delivery of the entire message from the source
host to destination host.
• Session Layer − It establishes sessions between users and offers services like dialog
control and synchronization.
• Presentation Layer − It monitors syntax and semantics of transmitted information
through translation, compression, and encryption.
• Application Layer − It provides high-level APIs (application program interface) to
the users.
<More explanation required for high mark question. Refer text book. One quick ref link
which provides explanation is https://www.techtarget.com/searchnetworking/definition/OSI
11. B) Compare Twisted Pair, Coaxial Cable and Optical Fibre guided transmission media.
12. A) Consider two networks providing reliable connection-oriented service. One of
them offers a reliable byte stream and the other offers a reliable message stream. Are
they identical? Justify your answer.
Reliable connection-oriented service has two minor variations: message sequences and byte
streams. In the former variant, the message boundaries are preserved. When two 1024-byte
messages are sent, they arrive as two distinct 1024- byte messages, never as one 2048-byte
message. In the latter, the connection is simply a stream of bytes, with no message
boundaries. When 2048 bytes arrive at the receiver, there is no way to tell if they were sent
as one 2048-byte message, two 1024-byte messages, or 2048 1-byte messages. If the pages
of a book are sent over a network to a phototypesetter as separate messages, it might be
important to preserve the message boundaries. On the other hand, to download a DVD
movie, a byte stream from the server to the user’s computer is all that is needed. Message
boundaries within the movie are not relevant.
12. B) Sketch the waveform in Manchester and Differential Manchester Encoding for the
bitstream 11000110010.
Important points to note: State your initial signal level assumption for differential Manchester
Both are biphase schemes – your waves should cross the horizontal line through ‘0’.
First write the rules for both and then draw the waveform.
Manchester Encoding
13. A) A bit stream 10011101 is transmitted using the standard CRC method. The generator
polynomial is 𝑥3 + 1. Show the actual bit string transmitted. Suppose the third bit from
the left is inverted during transmission. Show that this error is detected at the receiver's
end.
<Refer page numbers 340 -346 of the text – Data communication and networking 4th edition
– uploaded to CN drive>
Or
https://www.tutorialspoint.com/high-level-data-link-control-
hdlc#:~:text=High%2Dlevel%20Data%20Link%20Control%20(HDLC)%20is%20a%20gro
up,that%20verifies%20its%20successful%20arrival.
<Refer page numbers 423 of the text – Data communication and networking 4th edition –
uploaded to CN drive>
Or
https://www.tutorialspoint.com/the-802-11-mac-sublayer-
protocol#:~:text=The%20802.11%20MAC%20sublayer%20provides,frames%20and%20de
scribing%20frame%20formats.
<Refer page numbers 384 of the text – Computer Networking: a Top Down Approach –
uploaded to CN drive>
16. A) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket
is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long
can the computer transmit at the full 6 Mbps?
<Refer page numbers 410 of the text – Computer Networks by Andrew S Tannenbeum –
uploaded to CN drive>
17. A) Explain the address resolution problem using Address Resolution Protocol (ARP)
and Reverse Address Resolution Protocol (RARP)with an example network.
ARP – Page 612, Data communication and networking 4th edition
17. B) A network on the Internet has a subnet mask of 255.255.240.0. What is the
maximum number of hosts it can handle?
Number hosts in a network = 2^no.of bits used for host id part – 2(reserved)
Here First 20 bits are network id and remaining (32-20=12bits) are host id.
18. A) How do you subnet the Class C IP address 195.1.1.0 so as to have 10 subnets
with a maximum of 12 hosts in each subnet.
<For studying Subnetting, I have uploaded one more pdf in the drive titled “IP
Addressing Detailed” >
• Version: It defines the version number of IP which is 6 here. Its length is 4 bits.
• Priority: It defines the priority of the packet. Its length is 4 bits.
• Flow label: It helps in controlling the flow of data. The source device labels to the
data packets so that the router route the packet in sequence efficiently. Its length is
24 bits.
• Payload length: It tells the entire length of the IP datagram except for the base
header. Its length is 16 bits.
• Next header: It denotes the presence of any extension headers or if is not present
then it denotes the protocol such as TCP or UDP.
• Hop limit: This works similarly as TTL as in IPv4. This is used to prohibit the data
to go in an infinite loop in the system. At each hop, the value of TTL is decreased
by 1 and when it reaches 0, the packet is abandoned. Its length is 8 bits.
• Source address: It has the IP address of the source. The length is 128 bits.
• Destination address: It has the IP address of the destination. The length is 128 bits.
19. A) Distinguish the header formats of Transmission Control protocol (TCP) and User
Datagram Protocol (UDP).
20. A) What is the role of Simple Mail Transfer Protocol (SMTP) in E- mail?
<Refer page numbers 623 of the text – Computer Networks by Andrew S Tannenbeum –
uploaded to CN drive>
20. B) With the help of a basic model, explain the working of World Wide Web (WWW).
<Refer page numbers 646 of the text – Computer Networks by Andrew S Tannenbeum –
uploaded to CN drive>