Computer Network Assignment 2
Computer Network Assignment 2
Submit it by 14.04.2023
2. The value of HLEN in an IPv4 datagram is 6. How many option bytes are present? Suppose,
the value ofthe total length field in an IPv4 datagram is 36. How many bytes of data is the
packet carrying?
3. An IPv4 datagram has arrived with the following information in the header (in
hexadecimal):
0x45 00 00 54 00 03 58 50 20 06 00 00 7C 4E 03 02B4 0E 0F 02
a. Is the packet corrupted?
b. Are there any options?
c. Is the packet fragmented?
d. What is the size of the data?
e. How many more routers can the packet travel to?
5. What is the role of IP addresses in the network layer, and how do they help in delivering data
packets to thecorrect destination?
6. What are the different types of routing algorithms used in the network layer, and how do they
differ in terms oftheir complexity, efficiency, and suitability for different network topologies?
7. Explain the Recursive Resolution and Iterative Resolution with proper analysis?
18. An IP machine Q has a path to another IP machine Hvia three IP routers R1, R2, and R3.
Q—R1—R2—R3—H
H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer
encryption isused, with DES as the shared key encryption protocol. Consider the following
four pieces of information:
[I1] The URL of the file downloaded by Q
19. An IP router with a Maximum Transmission Unit (MTU)of 1500 bytes has received an IP
packet of size 4404 bytes with an IP header of length 20 bytes. What are the values of the
relevant fields in the header of the third IP fragment generated by the router for this packet?
20. An organization is granted the block 211.17.180.0/24. The administrator wants to create 32
subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.
c. Find the first and last addresses in subnet 1.
d. Find the first and last addresses in subnet 32.
21. An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to
distribute these blocks to 2600 customers as follows.
a. The first group has 200 medium-size businesses; each needs 16 addresses.
b. The second group has 400 small businesses; each needs 8 addresses.
c. The third group has 2000 households; each needs 4 addresses.
Design the subblocks and give the slash notation for each subblock. Find out how many
addresses are still available after these allocations.
22. Explain why most of the addresses in class A are wasted. Explain why a medium-size or
large-size corporation does not want a block of class C addresses.
23. What are the five elements of a protocol?
24. DNS has three classes of servers – name and briefly describe them. DNS has four types of
records – name and briefly describe them.
25. What is the key difference between HTTP 1.0 and 1.1? What benefit does this difference
make? Carefully explain how and why this is the case.
26. What are the differences between BOOTP and DHCP protocol?
28. Briefly describe about the working of SMTP and POP protocol.
29. In cases where reliability is not of primary importance, UDP would make a good transport
protocol. Give examples of specific cases.
30. Do port addresses need to be unique? Why or why not? Why are port addresses shorter than
IP addresses?
31. The following is a dump of a UDP header in hexadecimal format.
06 32 00 0D 00 1C E2 17
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?
f. What is the client process?
32. What can you say about the TCP segment in which the value of the control field is one of the
following?
a. 000001
b. 010001
c. 000000
33. UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs
to protect the boundaries of its message, which protocol should be used, UDP or TCP?