Data Communication and Computer Network Questions and Answer
Data Communication and Computer Network Questions and Answer
1. What is the main problem of the Byte count method in the framing
method? (5 no slide)
= The first framing method (Byte count method) uses a field in the header to specify the
✓The trouble with this algorithm is that the count can be garbled by a transmission
number of characters in the frame.
error. For example, if the character count of 5 in the second frame of fig. b becomes a 7,
the destination will get out of synchronization and will be unable to locate the start of the
next frame
2. What will happen if FLAG and ESC byte appear on the data or
payload field? Show the phenomenon with a diagram. (7 no slide – only
fig)
=
3. Mention the best case and worst case of byte stuffing. (10 – 2nd & 3rd
para)
=✓ For instance, if there are no flag bytes in the data, 100 bytes might be carried in a
✓ If, however, the data consists solely of flag bytes, each flag byte will be escaped and
frame of roughly 100 bytes (best case).
the frame will become roughly 200 bytes long (worst case). (byte stuffing case)
✓The source must wait until it receives the acknowledgment before sending the next
the frame just received.
✓The destination can thus stop the flow of data simply by withholding acknowledgment.
frame.
8. What are the stop and flow control limitations? (29 – 1st & last para)
=✓This protocol works fine when a message is sent in a few large frames but its
✓ For this case of small frame the line is always underutilized
performance is very poor for small frames.
9. Show sliding window flow control for the case of the variable window
with a diagram. (35, 36, 37 – only diagram)
=
10. What is the main drawback of Random Access Protocol? Why
sometimes is preferable. (45 – 3rd para)
= For example ALOHA protocol. The efficiency of such protocol is very poor under
heavy traffic condition because of frequent collision of packets. Under light traffic
condition the throughput of such protocol is high due to low probability of collision.
This type of protocol is very simple and can be implemented easily.
11. Compare exhaustive service, gated service, and limited service. (48, 49,
and 50 no slide)
=When a station captures a token its serves the queue in one of the following three type
of service.
-----------------------------------------------------------------------------------------------------
Lecture-5
1. Show the flow of IP packets on a heterogeneous network. (3 no slide -
only fig.)
=
3. Give the functions of the protocol field of the IPV4 packet. (12 no slide -
without fig.)
=Protocol (8 bits)
The Protocol field tells it which transport process to give the packet to. TCP is one possibility, but so are
UDP and some others.
Identifies the higher-level protocol
“6” for the Transmission Control Protocol (TCP)
“17” for the User Datagram Protocol (UDP)
4. What is the function of flow level in IPV6? (19 - 1st, 2nd & 3rd para)
= ➢The Flow label field provides a way for a source and destination to mark groups of
packets that have the same requirements and should be treated in the same way by the
network.
➢For example, a stream of packets from one process (on a certain source host) to a process on a
specific destination host might have stringent (strict condition) delay requirements and thus need
reserved bandwidth.
➢When a packet with a nonzero Flow label shows up, all the routers can look it up in internal tables to
see what kind of special treatment it requires.
5. What is the function of the Hop limit of IPV6? (20 no slides - middle
para)
=➢ Next header field tells which transport protocol (e.g., TCP, UDP) is passed to the packet.
➢The Hop limit field is used to keep packets from living forever. It is, in practice, the same as the Time
to live field in IPv4, namely, a field that is decremented on each hop.
6. Mention the function of the flow level of IPV6. (19 no slide) (4 no qus
same just fig added)
=➢The Flow label field provides a way for a source and destination to mark groups of
packets that have the same requirements and should be treated in the same way by the
network.
➢For example, a stream of packets from one process (on a certain source host) to a process on
a specific destination host might have stringent (strict condition) delay requirements and thus
need reserved bandwidth.
➢When a packet with a nonzero Flow label shows up, all the routers can look it up in internal
tables to see what kind of special treatment it requires.
Example-2
If the subnet mask 255.255.240.0 is used for a class B IP address then find the number of
subnets and number of hosts/subnet
Binary: 11111111 . 11111111 . 11110000 . 00000000
Decimal: 255.255.240.0
The number of hosts/subnet = 212 – 2 = 4094
The number of subnets = 24 = 16
Example-2
If the subnet mask 255.255.255.192 is used for a class C IP address then fined the
number of subnets and number of hosts/subnet.
The number of hosts/subnet = 26 – 2 = 62
The number of subnets = 22 = 4
Example-3
A class C IP address is 150.100.14.163 and the corresponding subnet mask is
255.255.255.128 Determine the maximum number of hosts per subnet and the number of
subnets.
Ans. The subnet mask in both binary and decimal is like:
11111111. 11111111. 11111111. 10000000
255.255.255.128
Here 1 bits are for subnets and 7 bits for hosts.
Therefore, the number of hosts per subnet 27 -2 = 126
The number of subnets are 21= 2
8. Given the example of the IPV6 address and its format. (35 no slide)
= IPv6 uses 128 bit and expressed in 32 hexadecimal numbers like:
EFAC: BA89: 7529:AFDC: 92AF:8654:1293 :29A2
After every 4 digits a colon ‘:’ is used therefore 32 digits + 7
colons = 39 characters hence called addressing system of 39 characters.
In some addresses huge number of zeros exits like:
DFAC: 0000: 0000:0000: 0009:03AC1:5923 :FEA2 can be expressed as:
DFAC: 0: 0:0: 9:3AC1:5923 :FEA2
Or
DFAC: : 9:3AC1:5923 :FEA2
Double colon can be used only once in a IPv6 address.
Lecture-6
1. Compare connectionless and connection-oriented services. (3 no slide)
= If connectionless service is offered, packets are injected onto the subnet individually
and routed independently of each other. No advanced setup is needed. In this context, the
packet are frequently called datagram's (in analogy with telegram) and the network is
called a datagram network.
If connection oriented service is used, a path from the source to destination router must
be established before any data packets can be sent. This connection is called a VC
(virtual circuit), in analogy with the physical circuits set up by the telephone system, and
the network is called a virtual circuit network.
2. Routing tables on connectionless service. Draw the routing table
under two-phase (1st and last path).( 5 no slide - only fig)
=
Visited nodes: { }
Lecture-7
1. Show the arrangement of a three-way handshake in connection
establishment. (10 no slide - only fig(a)).
=
3. Show the scenario of the case for both old duplicate CR and old
duplicate data arrives. (12 no slides - fig(c))
=The worst case is when both a delayed
CONNECTION REQUEST and an ACK are floating
around in the subnet. This case is shown in Fig. below.
*As in the previous example, host 2 gets a delayed
CONNECTION REQUEST and replies to it using y
as the initial sequence number.
*When the second delayed TPDU arrives at
host 2, the fact that z has been acknowledged
rather than y tells host 2 that this, too, is an
old duplicate.
Lecture-8
1. Why DNS server is necessary? (6 no slide - Without 2nd para)
=✓Although a user terminal or server theoretically can refer to web pages, mailboxes,
web server and other resources by using the network addresses (IP address) of the
8. Mention the function of three phases of the pop 3 protocol. (20 no slide)
=
✓ During the first phase, authorization, the user agent sends a username and a password (in the
clear) to authenticate the user.
✓ During the second phase, transaction, the user agent retrieves messages; also during this phase,
the user agent can mark messages for deletion, remove deletion marks, and obtain mail statistics.
✓ The third phase, update, occurs after the client has issued the quit command, ending the POP3
session; at this time, the mail server deletes the messages that were marked for deletion.
--------------------------------------------------------------------------------------------------------------------------------------
EXTRA
3. Give the steps of detemining a web page under client side.(28,29)
1. The browser determines the URL (by seeing what was selected).
2. The browser asks DNS server for the IP address of the server www.cs.washington.edu.
4. The browser makes a TCP connection to 128.208.3.88 on port 80 (service ID at transport layer
imposed by application layer), the well-known port for the HTTP protocol.
5. It sends an HTTP request asking for the page /index.html.
6. The www.cs.washington.edu server sends the page as an HTTP response, for example, by sending
the file /index.html.
7. If the page includes URLs that are needed for display, the browser fetches the other URLs using
the same process. In this case, the URLs include multiple embedded images also fetched from
www.cs.washington.edu, an embedded video from youtube.com, and a script from google-
analytics.com.
9. The TCP connections are released if there are no other requests to the same servers for a short
period.
b. Reduce latency
2. The system checks the cache to see if there is already a stored copy of the resource.
3. If the resource is cached, the result will be a cache hit response and the resource will be delivered
from the cache.
4. If the resource is not cached, cache loss will result and the file will be accessed in its original
source. 5. After the resource is cached, it will continue to be accessed there until it expires or the
cache is cleared.