0% found this document useful (0 votes)
17 views

Computer Network Assignment 2

This document provides 33 questions related to computer networks. It covers topics like IP addressing, IPv4 packet headers, routing algorithms, DNS, transport layer protocols, and subnetting. Students are asked to find network and host IDs, analyze packet information, discuss protocols like ARP, FTP, and Telnet, and explain concepts such as recursive resolution, caching, and port addressing.

Uploaded by

vikash kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Computer Network Assignment 2

This document provides 33 questions related to computer networks. It covers topics like IP addressing, IPv4 packet headers, routing algorithms, DNS, transport layer protocols, and subnetting. Students are asked to find network and host IDs, analyze packet information, discuss protocols like ARP, FTP, and Telnet, and explain concepts such as recursive resolution, caching, and port addressing.

Uploaded by

vikash kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Network Assignment 2

Submit it by 14.04.2023

1. Find the netid and the hostid of the following IP addresses.


a. 114.35.2.8
b. 135.46.8.6

2. The value of HLEN in an IPv4 datagram is 6. How many option bytes are present? Suppose,
the value ofthe total length field in an IPv4 datagram is 36. How many bytes of data is the
packet carrying?

3. An IPv4 datagram has arrived with the following information in the header (in
hexadecimal):
0x45 00 00 54 00 03 58 50 20 06 00 00 7C 4E 03 02B4 0E 0F 02
a. Is the packet corrupted?
b. Are there any options?
c. Is the packet fragmented?
d. What is the size of the data?
e. How many more routers can the packet travel to?

4. Discuss ARP operation and packet format.

5. What is the role of IP addresses in the network layer, and how do they help in delivering data
packets to thecorrect destination?

6. What are the different types of routing algorithms used in the network layer, and how do they
differ in terms oftheir complexity, efficiency, and suitability for different network topologies?

7. Explain the Recursive Resolution and Iterative Resolution with proper analysis?

8. Explain the File Transfer Protocol (FTP) with proper analysis?


9. Write about the Country Domains in DNS?
10. Explain why some of the transport layer packets may be lost in the internet.
11. What are the services provided by a User Agent?
12. What is the function of the TELNET?
13. Write about Caching mechanism in DNS?

14. Does the wraparound situation create a problem in a network?


15. A packet has arrived in which the offset value is 300 and payload size is 100 bytes. what are
the number of the first byte and the last byte
16. Why do you think RIP uses UDP instead of TCP?
17. Create a home agent advertisement message using 1456 as the sequence number and a life
time of 3hrs. Select your own values for the bits in the code field. Calculate and insert the
value for the length field.

18. An IP machine Q has a path to another IP machine Hvia three IP routers R1, R2, and R3.

Q—R1—R2—R3—H

H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer
encryption isused, with DES as the shared key encryption protocol. Consider the following
four pieces of information:
[I1] The URL of the file downloaded by Q

[I2] The TCP port numbers at Q and H


[I3] The IP addresses of Q and H

[I4] The link layer addresses of Q and H


Which of I1, I2, I3, and I4 can an intruder learnthrough sniffing at R2 alone? Explain.

19. An IP router with a Maximum Transmission Unit (MTU)of 1500 bytes has received an IP
packet of size 4404 bytes with an IP header of length 20 bytes. What are the values of the
relevant fields in the header of the third IP fragment generated by the router for this packet?

20. An organization is granted the block 211.17.180.0/24. The administrator wants to create 32
subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.
c. Find the first and last addresses in subnet 1.
d. Find the first and last addresses in subnet 32.
21. An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants to
distribute these blocks to 2600 customers as follows.
a. The first group has 200 medium-size businesses; each needs 16 addresses.
b. The second group has 400 small businesses; each needs 8 addresses.
c. The third group has 2000 households; each needs 4 addresses.
Design the subblocks and give the slash notation for each subblock. Find out how many
addresses are still available after these allocations.
22. Explain why most of the addresses in class A are wasted. Explain why a medium-size or
large-size corporation does not want a block of class C addresses.
23. What are the five elements of a protocol?

24. DNS has three classes of servers – name and briefly describe them. DNS has four types of
records – name and briefly describe them.

25. What is the key difference between HTTP 1.0 and 1.1? What benefit does this difference
make? Carefully explain how and why this is the case.

26. What are the differences between BOOTP and DHCP protocol?

27. Briefly explain about the working of Telnet protocol.

28. Briefly describe about the working of SMTP and POP protocol.
29. In cases where reliability is not of primary importance, UDP would make a good transport
protocol. Give examples of specific cases.
30. Do port addresses need to be unique? Why or why not? Why are port addresses shorter than
IP addresses?
31. The following is a dump of a UDP header in hexadecimal format.
06 32 00 0D 00 1C E2 17
a. What is the source port number?
b. What is the destination port number?
c. What is the total length of the user datagram?
d. What is the length of the data?
e. Is the packet directed from a client to a server or vice versa?
f. What is the client process?
32. What can you say about the TCP segment in which the value of the control field is one of the
following?
a. 000001
b. 010001
c. 000000
33. UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs
to protect the boundaries of its message, which protocol should be used, UDP or TCP?

You might also like