0% found this document useful (0 votes)
17 views7 pages

Modified CIE-3 Set A With Key

The document outlines the Continuous Internal Evaluation for the Computer Networks course at The Oxford College of Engineering, detailing course objectives, outcomes, and evaluation structure. It includes specific questions for assessment related to transport layer functions, congestion control, and application layer protocols, among others. The evaluation is designed to measure students' understanding of key concepts in data communication networks and their practical applications.

Uploaded by

openai.5060
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views7 pages

Modified CIE-3 Set A With Key

The document outlines the Continuous Internal Evaluation for the Computer Networks course at The Oxford College of Engineering, detailing course objectives, outcomes, and evaluation structure. It includes specific questions for assessment related to transport layer functions, congestion control, and application layer protocols, among others. The evaluation is designed to measure students' understanding of key concepts in data communication networks and their practical applications.

Uploaded by

openai.5060
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Children’s Education Society

THE OXFORD COLLEGE OF ENGINEERING, BANGALORE -560 068


(Approved by AICTE, New Delhi, Accredited by NAAC ‘A’& Affiliated to VTU, Belagavi-590 018)
B.E. DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Outcome Based Education (OBE) and Choice Based Credit System (CBCS), VTU
Semester-V
Continuous Internal Evaluation- III
Date:11-03-2024(AN)
Subject Code: 21CS52-A CIE Marks: 20 Marks
Subject Title: Computer Networks Exam Hrs: 60 Minutes
Course Objectives:
CLO 1. Fundamentals of data communication networks.
CLO 2. Software and hardware interfaces
CLO 3. Application of various physical components and protocols
CLO 4. Communication challenges and remedies in the networks.
Note: Answer FIVE full questions
Q.No Questions Marks CO-PO Bloom’s
Taxonomy
Level
Q.1 A. Demonstrate the functions of a transport layer and State transport CO:3
service primitives. 4 PO:1,2,3,5 L2
OR

4 CO:3 L2
B. Explain upward and downward multiplexing with neat
PO:1,2,3,5
diagram.
Q.2 A. Identify various algorithms used for congestion control in 4 CO:3
transport layer. PO:1,2,3,5 L3

OR

B. Summarize the following


4 CO:3
i) TCP connection management modelling L2
PO:1,2,3,5
ii) TCP header segment

Q.3 A Compare TCP with UDP and list out the applications of UDP. 4 CO:3 L2
PO:1,2,3,5

OR

B. Illustrate the functions and protocols of Application layer. L2


4 CO:3
PO:1,2,3,5
Q.4 A. Discuss about DNS name space in detail. 4 CO:4 L2
PO:1,2,3,5
OR
B. Explain in brief about the formats of HTTP request and Response
messages. 4 CO:4 L2
PO:1,2,3,5
Q.5 A. Interpret the World Wide Web in detail. 4 CO:4 L2
PO:1,2,3,5
OR
B. Identify the difference and write short note for the following 4 CO:4 L3
i) Multimedia ii) SNMP PO:1,2,3,5

Course Outcomes:
CO 1. Learn the basic needs of communication system.
CO 2. Interpret the communication challenges and its solution.
CO 3. Identify and organize the communication system network components
CO 4. Design communication networks for user requirements.

PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO

CO 3 3 1 3 - 1 - - - - - - -

CO 4 3 1 3 - 1 - - - - - - -

a) Substantial (High) /3 b) Moderate (Medium) /2 c) Slight (Low)/1 d) No correlation /-

Faculty
G. ROHINI HOD
Assistant professor
Dept: AIML
Children’s Education Society
THE OXFORD COLLEGE OF ENGINEERING, BANGALORE -560 068
(Approved by AICTE, New Delhi, Accredited by NAAC ‘A’& Affiliated to VTU, Belagavi-590 018)
B.E. DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Outcome Based Education (OBE) and Choice Based Credit System (CBCS), VTU
Semester-V
Continuous Internal Evaluation- III
Date:11-03-2024(AN)
Subject Code: 21CS52-A CIE Marks: 20 Marks
Subject Title: Computer Networks Exam Hrs: 60 Minutes

Q.No Answers Marks


1a)
Functions of a Transport Layer
The Process-to-Process Delivery
End-to-End Connection between Hosts 2M
Multiplexing and Demultiplexing
Congestion Control
Data integrity and Error correction
Flow control
Service Primitives 2M
Request – This primitive is transferred or sent to Layer N by Layer (N+1) to just request for
service.
Indication – This primitive is returned by Layer N to Layer (N+1) to just advise of activation of
service that is being requested or of action that is initiated by the service of Layer N.
Response – This primitive is simply provided by Layer (N+1) in reply to indication primitive. It
might acknowledge or complete action that is previously invoked by indication primitive.
Confirm – This primitive is returned by the N th layer to the requesting (N+1) st layer to simply
acknowledge or complete action that is previously invoked by request primitive.
1b) Multiplexing: - Gathering data from multiple application processes of the sender, enveloping 1M
that data with a header, and sending them as a whole to the intended receiver is called
multiplexing.
2M
Upward Multiplexing: -
In upward multiplexing, the different transport connections are multiplexed in to one network
connection. These transport connections are grouped by the transport layer as per their
destinations. It then maps the groups with the minimum number of network connections possible.
The upward multiplexing is quite useful where the network connections come very expensive.
Downward Multiplexing
1M
It is only used when the connections with high bandwidth are required. In case of the downward
multiplexing, the multiple network connections are opened by the transport layer and the traffic is
distributed among them. But for using downward multiplexing, it is necessary that this capacity
must be handled well by the subnet’s data links.
2a)
Tcp uses three algorithms for congestion control
2M
i)Slow Start Phase
Exponential increment: In this phase after every RTT the congestion window size
increments exponentially.
Example: - If the initial congestion window size is 1 segment, and the first segment is
successfully acknowledged, the congestion window size becomes 2 segments. If the next
transmission is also acknowledged, the congestion window size doubles to 4 segments.
ii)Congestion Avoidance Phase 2M
Additive increment: This phase starts after the threshold value also denoted as ssthresh. The size
of cwnd (congestion window) increases additive. After each RTT cwnd = cwnd + 1.
Example: - if the congestion window size is 20 segments and all 20 segments are successfully
acknowledged within an RTT, the congestion window size would be increased to 21 segments in
the next RTT.
iii)Congestion Detection Phase:
Multiplicative decrement: If congestion occurs, the congestion window size is decreased. The
only way a sender can guess that congestion has happened is the need to retransmit a segment
Retransmission can occur in one of two cases: when the RTO timer times out or when three
duplicate ACKs are received.
Case 1: Retransmission due to Timeout – In this case, the congestion possibility is high.
Case2: Retransmission due to 3 Acknowledgement Duplicates – The congestion possibility is
less.
2b)
i) TCP connection management modelling
2M
TCP transmits data in both the directions (full duplex mode)
When two tcps are connected to each other, each tcp initialize the connection (SYN) and
approval (ACK) for each end to send the data Tree way handshake protocol is used to establish
connection between two tcp’s.

ii) TCP header segment 2M


3a)

TCP UDP 2M

Full form stands for Transmission stands for User Datagram


Control Protocol. Protocol.

Type of connection It is a connection-oriented It is a connectionless protocol,


protocol, which means that which means that it sends the
the connection needs to be data without checking
established before the data is whether the system is ready
transmitted over the network. to receive or not.

Reliable TCP is a reliable protocol as it UDP is an unreliable protocol


provides assurance for the as it does not take the
delivery of data packets. guarantee for the delivery of
packets.

Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.
Difference between UDP and TCP

UDP Applications:
2M
i)Query response protocol ii) Speed (online games) iii) Broad casting/multicasting
iv) Streaming (YouTube, skype)

3b)
The Application Layer is topmost layer in the Open System Interconnection (OSI) model. This
layer provides several ways for manipulating the data (information) which actually enables any
2M
type of user to access network with ease.
Functions of Application Layer:
Application Layer provides a facility by which users can forward several emails and it also
provides a storage facility. This layer allows users to access, retrieve and manage files in a
remote computer. It allows users to log on as a remote host. This layer provides access to global
information about various services. This layer provides services which include: e-mail,
transferring files, distributing results to the user, directory services, network resources and so
on.
Application layer protocols: DNS, HTTP, TELNET, FTP, SMTP, SNMP, NFS etc. 2M

4a) Domain Name System (DNS) is a hostname for IP address translation service. DNS is a
distributed database implemented in a hierarchy of name servers. It is an application layer
protocol for message exchange between clients and servers. It is required for the functioning of 2M
the Internet. To be unambiguous the names assigned to machines must be carefully selected
from a name space with complete control over the binding between the names and IP addresses.
FLATNAME SPACE 2M
• A name is assigned to an address
• A name in this space is a sequence of characters without structure.
• The main disadvantage of a fiat name space is that it cannot be used in a large system such as
the Internet because it must be centrally controlling to avoid ambiguity and duplication.
HIERARCHICAL NAME SPACE
• Each name is made of several parts.
• The first part can define the nature of the organization,
• the second part can define the name of an organization,
• the third part can define departments in the organization, and so on.
• Ex challenger.jhda.edu, challenger.berkeley.edu, and challenger.smart.com.
4b) • To have a hierarchical name space, a domain name space was designed.

HTTP Requests are messages which are sent by the client or user to initiate an action on the
server. The first line of the message includes the request message from the client to the server, 2M
the method which is applied to the resource, identifier of the resource, and the protocol version.

Syntax: Request = Request-Line

*((general-header

| request-header
| entity-header) CRLF)
CRLF
[ message-body]
An HTTP response contains the following things:
2M
i)Status Line Response ii) Header Fields or a series of HTTP headers iii) Message Body HTTP
Request
5a)
The World Wide Web is abbreviated as WWW and is commonly known as the web, WWW can be 2M
defined as the collection of different websites around the world, containing different information shared
via local servers (or computers).
Components of the Web: There are 3 components of the web:
Uniform Resource Locator (URL): serves as a system for resources on the web. Hypertext
Transfer Protocol (HTTP): specifies communication of browser and server. Hyper Text
Markup Language (HTML): defines the structure, organisation and content of a webpage

The basic model of how the web works is shown in the figure below 2M

5b)

The word multi and media are combined to form the word multimedia. The word “multi”
signifies “many.” Multimedia is a type of medium that allows information to be easily 2M
transferred from one location to another.
Multimedia is used in:1. Education 2. Entertainment 3. Business 4. Technology & Science 5 Fine Arts 5.
Engineering
ii) SNMP
Simple Network Management Protocol (SNMP) is an application layer protocol that uses UDP port 2M
number 161/162.SNMP is used to monitor the network, detect network faults, and sometimes even to
configure remote devices.
Components of SNMP
There are mainly three components of SNMP:
SNMP Manager – t is a centralized system used to monitor the network. It is also known as a
Network Management Station (NMS).
SNMP agent – It is a software management software module installed on a managed device. The
manager accesses the values stored in the database, whereas the agent maintains the information
in the database.
Management Information Base – MIB consists of information on resources that are to be
managed. This information is organized hierarchically. It consists of objects instances which are
essentially variables.

Faculty HOD
G. ROHINI
Dept: AIML
Assistant professor

You might also like