CS3591 CN
CS3591 CN
OF CSE
YEAR/SEMESTER: III/V
PREPARED BY
Ms.M.KAVITHA, AP/ CSE
Data Communication - Networks – Network Types – Protocol Layering – TCP/IP Protocol suite
–OSI Model – Introduction to Sockets - Application Layer protocols: HTTP – FTP – Email
protocols(SMTP - POP3 - IMAP - MIME) – DNS – SNMP
Switching : Packet Switching - Internet protocol - IPV4 – IP Addressing – Subnetting - IPV6, ARP,
RARP, ICMP, DHCP
UNIT IV ROUTING 7
Routing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State Routing –
OSPF– Path-vector routing - BGP - Multicast Routing: DVMRP – PIM.
Data Link Layer – Framing – Flow control – Error control – Data-Link Layer Protocols – HDLC –
PPP - Media Access Control – Ethernet Basics – CSMA/CD – Virtual LAN – Wireless LAN(802.11)
- Physical Layer: Data and Signals - Performance – Transmission media- Switching –
Circuit Switching.
TOTAL: 45 PERIODS
COURSE OBJECTIVE
1. To understand the concept of layering in networks.
2. To know the functions of protocols of each layer of TCP/IP protocol suite.
3. To visualize the end-to-end flow of information.
4. To learn the functions of network layer and the various routing protocols.
5. To familiarize the functions and protocols of the Transport layer.
TEXT BOOKS
T1. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach
Featuring the Internet, Eighth Edition, Pearson Education, 2021.
T2. Behrouz A. Forouzan, Data Communications and Networking with TCP/IP Protocol Suite,
Sixth Edition TMH, 2022.
REFERENCE BOOKS
R1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition,
Morgan Kaufmann Publishers Inc., 2012.
R2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education,
2013.
R3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
R4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach”, McGraw Hill, 2012.
WEB RESOURCES
17.
Quality of Service R2 732-767 BB/PPT 2 19
LEARNING OUTCOME
At the end of unit, students will be able to
Understand the basics of how data flows from one node to another.
LEARNING OUTCOME
At the end of unit, students will be able to
Describe protocols for various functions in the network.
Understand the basics of how data flows from one node to another.
Understand the concept of packet switching.
UNIT IV ROUTING 7
Routing and protocols: T2 658-677 BB/PPT 1 22
23.
Unicast routing
Distance Vector T1 384-390 BB/PPT 1 28
24.
Routing L.VIDEO
RIP - Link State R1 243-261 BB/PPT 2 30
25.
Routing- OSPF
Path-vector routing- R4 309-314 BB/PPT 1 31
26.
BGP
Multicast Routing: R1 338-353 BB/PPT 2 33
27. DVMRP – PIM.
W5
LEARNING OUTCOME
At the end of unit, students will be able to
Analyze routing algorithms.
Describe protocols for various functions in the network.
Gain knowledge about routing and protocols.
UNIT V DATA LINK AND PHYSICAL LAYERS 12
Data Link Layer – T2 307- BB/PPT 1 34
28.
Framing 311
Flow control – Error R2 237-249 BB/PPT 1 35
29.
control
Data-Link Layer R2 250-256 BB/PPT 1 36
30.
Protocols – HDLC
LEARNING OUTCOME
At the end of unit, students should be able to
Explain the basic layers and its functions in computer networks.
Describe protocols for various functions in the network.
Understand the concept of wireless LAN.
COURSE OUTCOME
At the end of the course, the students will be able to
CO 1: Explain the basic layers and its functions in computer networks.
CO 2: Understand the basics of how data flows from one node to another.
CO 3: Analyze routing algorithms.
CO 4: Describe protocols for various functions in the network.
CO 5: Analyze the working of various application layer protocols.
1. Network Security
ASSESSMENT I II
Topic Nos. 1-20 21-37
Date
ASSIGNMENT DETAILS
ASSIGNMENT I II
Class Strength : 64
ASSIGNMENT – I
POSTER PRESENTATION
L1Q1 OSI Model
L1Q2 HTTP and FTP Poster design 20
L1Q3 Domain Name System Presentation 20
L1Q4 User Datagram Protocol
L1Q5 Transmission Control Protocol
L1Q6 Packet Switching
L1Q7 Data Communication
L1Q8 IPv4
L1Q9 TCP: Connection Management
L1Q10 Email Protocols
L1Q11 Flow control
L1Q12 TCP Congestion Control
Level : 2(17 Students)
SEMINAR
L2Q13 Layered Architecture Presentation : 15
L2Q14 The Development of Packet Switching Communication : 5
L2Q15 Overview of HTTP Marks Report :15
L2Q16 Electronic Mail in the Internet Q&A : 5
L2Q17 Principles of Network Applications
L2Q18 Introduction to Transport Layer Services
L2Q19 IPV4 Datagram Format
L2Q20 Overview of DNS
L2Q21 Congestion avoidance
CASE STUDY PRESENTATION
L2Q22 Protocols and Standards
L2Q23 Layers in the OSI Model Presentation: 20
L2Q24 TCP/IP Protocol Viva Questions:
L2Q25 IP Addressing 10
L2Q26 Congestion Control and Quality of Service Report : 10
L2Q27 DNS in the Internet
MINDMAP
B 11.a.i 11.a.ii
11.b.i 11.b.ii
12.a 12.b
13.a.i 13.b.i
13.a.ií 13.b.ii
14.b 14.a
15.a.ií 15.a.i
15.b.íi 15.b.i
C 16.a
16.b
TOTAL 12 45 43
Distribution 57% 431.
Prepared by Verified by
Ms.M.Kavitha
HOD/CSE
Approved by
PRINCIPAL
CN 1.12
KCE/CSE/QB/1IIYR/CN
FORMAT: QP10 KCE / DEPT. OF CSE
YEAR/SEMESTER: III/V
PREPARED BY
Ms.M.KAVITHA, AP/ CSE
SYLLABUS
CYCLE – 1
1. Learn to use commands like tcpdump, netstat, ifconfig, nslookup and traceroute. Capture
ping and trace route PDUs using a network protocol analyzer and examine.
2. Write a HTTP web client program to download a web page using TCP sockets.
3. Applications using TCP sockets like: a) Echo client and echo server b) Chat
4. Simulation of DNS using UDP sockets.
5. Use a tool like Wireshark to capture packets and examine the packets.
CYCLE – 2
Prepared by Verified By
Ms.M.Kavitha HOD/CSE
COURSE PLAN
Sub. Code : CS3591 Branch / Year / Sem : B.E CSE / III /V
Sub.Name : Computer Networks Batch : 2021-2025
Staff Name : Ms.M.Kavitha Academic Year : 2023-24 (ODD)
COURSE OBJECTIVE
LEARNING OUTCOME
Upon the completion of this lab, students should be able to
PRE-REQUISITE
Hardware:
Standalone desktops – 30Nos.
Software:
1. C / C++ / Java / Python / Equivalent Compiler
2. Network simulator like NS2/Glomosim/OPNET/ Packet Tracer / Equivalent
MODEL
PORTIONS 1-10
Date
14. Discuss the three main division of the domain name UNDERSTAND CO5
space. BT-L2
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
15. What is meant by FTP? REMEMBER CO5
BT-L1
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one
host to another host over a TCP-based network, such as the Internet. It is often used to
upload web pages and other documents from a private development machine to a public
web-hosting server. FTP is built on client-server architecture and uses separate control and
data connections between the client and the server.
16. Define HTTP. REMEMBER CO5
BT-L1
Web page are organized and retrieved information using HTTP Protocol.
Hyper Text Transfer Protocol (HTTP) is an application protocol that is used to retrieve
web pages from remote servers.
The core idea of hypertext is that one document can link to another document, and the
protocol (HTTP) and document language (HTML) were designed to meet that goal.
Hypertext is structured text that uses logical links(hyperlinks) between nodes containing
text. HTTP is the protocol to exchange or transfer hypertext.
17. What is IMAP? REMEMBER CO5
BT-L1
Internet Message Access Protocol (IMAP) is a standard protocol for accessing e-mail
from your local server. IMAP is a client/server protocol in which e-mail is received and
held for you by your Internet server.
IMAP can be thought of as a remote file server. POP3 can be thought of as a "store-and-
forward" service.
PART-B
1. (i) Explain with an example the basic communication model?. UNDERSTAND CO1
(6) BT-L2
(ii) Explain the topologies of the network. (7)
2. Explain the advantages and disadvantages of Bus and Star UNDERSTAND CO1
topologies. (13) BT-L2
3. Draw the ISO-OSI architecture and outline the functions UNDERSTAND CO1
performed by each layer. (13) BT-L2
4. List and discuss about the various layers of TCP/IP protocol REMEMBER CO1
architecture. (13) BT-L1
5. Explain SMTP in detail. (13) REMEMBER CO1
BT-L1
6. Describe the message format and the message transfer and the UNDERSTAND CO5
underlying protocol involved in the working of the electronic BT-L2
mail. (13)
7. Discuss in detail about DNS and its frame format. (13) UNDERSTAND CO5
BT-L2
8. Write shorts on DNS. (13) UNDERSTAND CO5
BT-L2
9. Discuss the needed for name resolution. Illustrate the domain UNDERSTAND CO5
name hierarchy and the steps in resolution. (13) BT-L2
10. Explain in detail about HTTP. (13) UNDERSTAND CO5
BT-L2
11. Write shorts on FTP. (13) REMEMBER CO5
BT-L1
12. Explain the SNMP protocol in detail. (13) REMEMBER CO5
BT-L1
13. Compare and contrast TCP/IP protocol suite with OSI model.(13) UNDERSTAND CO5
BT-L2
14. Discuss in detail about the TCP/IP protocol suite. (13) UNDERSTAND CO1
BT-L2
15. Compare SMTP and HTTP. Give their uses, state strength UNDERSTAND CO5
and weaknesses. (13) BT-L2
PART-C
1. An employee of an organization bring his own device and connects APPLY CO1
it to network and request for a webpage in the given scenario BT-L3
illustrate the operation of each layer of OSI Model with neat
diagram. (15)
2. Suppose a 128-kbps point-to-point link is setup between the APPLY CO1
earth and a rover on mars. The distance from the earth to mars BT-L3
(when they are closest together) is approximately 55 giga
meters and the data travels over the link at the speed of light at
3 x 108 m/s.
(1)Calculate the minimum RTT for the link.
(2)Calculate the delay-bandwidth product for the link.
A camera on the rower takes pictures of it’s surroundings and
sends these to earth. How quickly after a picture is taken, can it
reach mission control on earth? Assume that each image is 5 mb
in size. (15)
1. What are the five main categories of transport layer UNDERSTAND CO2
services? BT-L2
End to End Delivery
Addressing
Reliable Delivery
Flow Control
Multiplexing
2. Mention any two transport layer service. UNDERSTAND CO2
BT-L2
Multiplexing: Transport layer performs multiplexing or demultiplexing function. Multiple
applications employ same transport protocol, but use different port number. According to
lower layer n/w protocol, it does upward multiplexing or downward multiplexing.
Reliability: Error Control and Flow Control.
3. What is TCP? REMEMBER CO4
BT-L1
Transmission Control Protocol (TCP) provides Connection oriented and reliable services.
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol,
meaning that each TCP connection supports a pair of byte streams, one flowing in each
direction. It is used by FTP, SMTP. The different phases in TCP state machine are Connection
Establishment, Data transfer and Connection Release. TCP services to provide reliable
communication are Error control, Flow control, Connection control and Congestion control.
4. What is UDP? REMEMBER CO4
BT-L1
UDP (User Datagram Protocol) is a connectionless, unreliable protocol that has no flow
and error control. It uses port numbers to multiplex data from the application layer. The
Internet protocol suite supports a connectionless transport protocol called UDP.
It provides a way for applications to send encapsulated IP datagram without having to
establish a connection.
5. What is the main difference between TCP & UDP? UNDERSTAND CO2
BT-L2
TCP UDP
It provides Connection oriented service Provides connectionless service.
Connection Establishment delay will be No connection establishment delay
there
Provides reliable service Provides unreliable, but fast service
It is used by FTP, SMTP It is used by DNS, SNMP, audio, video and
multimedia applications.
6. What is a Port? REMEMBER CO2
BT-L1
A computer port is a type of electronic, software or programming-related docking point
through which information flows from a program on your computer or to your computer
from the Internet or another computer in a network.
7. How congestion occurs in a network? UNDERSTAND CO2
BT-L2
Too many packets present in (a part of) the network causes packet delay and loss that
degrades performance. This situation is called congestion.
Congestion can occur on a router when packets arrive at a greater rate than possible rate
to forward.
8. Outline stop-and-wait ARQ mechanism. UNDERSTAND CO2
BT-L2
Stop-and-wait ARQ means Stop-and-wait automatic repeat request.
Here, the sender keeps a copy of the sent frame and at the same time, it starts a timer.
If the timer expires and there is no ACK for the sent frame, the frame is resent, the copy
is heldand the timer is restarted.
Since the protocol uses the stop-and-wait mechanism, there is only one specific
frame that needs an ACK even though several copies of the same frame can be in the
network.
Thus, this protocol automatically sends the frame and also repeatedly, until it gets
the ACK.
9. What is piggybacking? REMEMBER CO2
BT-L1
The inclusion of acknowledgment on a data frame is called as piggybacking.
That is, when a frame is carrying data from node A to B, it also carries control information
(acknowledgement) about frames from B and similarly, when a frame is carrying data from
B to A, it also carries control information about frames from A.This technique is used to
improve the efficiency of the bidirectional protocols.
10. List the advantages of connection-oriented UNDERSTAND CO2
services. BT-L2
Advantages of connection-oriented services are,
In connection-oriented virtual circuits, buffers can be reserved in advance.
Sequencing can be guaranteed and Short-headers can be used.
Troubles caused by delayed duplicate packets can be avoided.
11. HLEN of TCP is 0111. Find number of bytes of options APPLY CO4
included in the segment. BT-L2
(0111)2 = 7
Total length of header =(7*4=28, multiples of 4)
Base header = 20 bytes
Segment 28-20 = 8 bytes of options.
12. How does transport layer perform duplication control? REMEMBER CO2
BT-L1
If ACK lost, segment is re-transmitted
Receiver must recognize duplicates
Duplicate received prior to closing connection
o Receiver assumes ACK lost and ACKs duplicate
o Sender must not get confused with multiple ACKs
o Sequence number space large enough to not cycle
o within maximum life of segment
Duplicate received after closing connection.
13. Mention the use of flow control and congestioncontrol. UNDERSTAND CO2
BT-L2
Flow control is used to balance the rate at which bits are produced by the sender with
the rate at which bits are consumed by the receiver. This matches the speed of a sender
with the capabilities of a receiver.
Congestion control is used to regulate the rate at which senders generate traffic in order
to avoid the over-utilization of the resources available within network. This prevents
network congestion, could lead to a network collapse.
14. What is meant by delay and jitter? REMEMBER CO2
BT-L1
Delay is the amount of time data (signal) takes to reach the destination.
A higher delay generally means congestion of some sort of breaking of the communication
link.
Jitter is the variation of delay time.
This happens when a system is not in deterministic state.
Eg: Video streaming suffers from jitter a lot because the size of data transferred is quite
large and hence no way of saying how long it might take to transfer.
15. Why UDP pseudo header is included in UDP UNDERSTAND CO4
checksum calculation? BT-L2
The basic idea is that the UDP checksum is a complement of a 16-bit one's
complement sumcalculated over an IP "pseudo-header" and the actual UDP data.
The IP pseudo-header is the source address, destination address, protocol (padded with a
zero byte) and UDP length.
16. How can the effect of jitter be compensated? What UNDERSTAND CO1
type of application requires this compensation? BT-L2
Jitter is defined as a variation in the delay of received packets.
The sending side transmits packets in a continuous stream and spaces them evenly apart.
Because of network congestion, improper queuing or configuration errors, the delay
between packets can vary instead of remaining constant.
Cisco voice networks compensate for jitter by setting up a buffer, called the “jitter buffer”
on the gateway router at the receiving end of the voice transmission.
17. What do you mean by QoS? REMEMBER CO2
BT-L1
The quality of service defines a set of attributes related to the performance of the
connection. For each connection, the user can request a particular attribute.
Thereby, the attributes can be categorized into those related to the user and those
related to the network.
18. Explain end-to-end delivery in the transport layer and UNDERSTAND CO2
end-to- end delivery in the network layer? BT-L2
The network layer must be present on all systems and delivers packets hop-by-hop
between adjacent intermediate systems (routers or gateways) or end systems (hosts).
The transport layer can technically be absent from intermediate systems and delivers
packet content end-to- end between hosts.
The network layer is usually “unreliable” and connectionless but the transport layer often
adds a measure of reliability (such as resending missing or errored packet content) and
connectionsto the network layer.
The network layer has the network address, while the transport layer focuses on ports
and multiplexing application’s traffic on the network.
19. What are the advantages of using UDP over TCP? UNDERSTAND CO4
BT-L2
The advantages of using UDP over TCP are
UDP does not need the overhead required to detect reliability.
It does not need to maintain the unexpected deception of data flow.
UDP requires less processing at the transmitting and receiving of hosts.
UDP is light weight.
No need to maintain UDP connections information.
UDP is faster than TCP.
20. What factors determine the reliability of a delivery? UNDERSTAND CO2
BT-L2
The factors are
Error control
Sequence control
Loss control
Duplication control
21. What are the fields in the TPDU? REMEMBER CO2
BT-L1
The fields of TPDU are
Length
Fixed parameters
Variable parameters
Data
22. Define congestion. REMEMBER CO2
BT-L1
Congestion in a network occurs if user sends data into the network at a rate greater than that
allowed by network resources. Any given node has a number of I/O ports attached to it.
There are two buffers at each port. One to accept arriving packets & another one to hold
packets that are waiting to depart. If packets arrive too fast node than to process them or
faster than packets can be cleared from the outgoing buffers, then there will be no empty
buffer. Thus causing congestion and traffic in the network.
23. Name the policies that can prevent (avoid) congestion. UNDERSTAND CO2
BT-L2
DEC (Digital Equipment Corporation) bit.
Random Early Detection (RED).
Source based congestion avoidance.
The congestion may be avoided by two bits:
BECN - Backward Explicit Congestion Notification
FECN - Forward Explicit Congestion Notification.
24. What are the two categories of QoS attributes? UNDERSTAND CO2
BT-L2
User Oriented and Network Oriented. User related attributes are
SCR – Sustainable Cell Rate
PCR – Peak Cell Rate
MCR- Minimum Cell Rate
CVDT – Cell Variation Delay Tolerance.
The network related attributes are, Cell loss ratio (CLR), Cell transfer delay (CTD), Cell delay
variation (CDV), Cell error ratio (CER).
25. If data length is 16 bytes, calculate the efficiency of APPLY CO4
transmission in TCP. BT-L2
Data length = 16 bytes
TCP header = 20 bytes
Efficiency = 16 = 0.444 = 44.4%
16+20
26. Define SCTP. REMEMBER CO4
BT-L1
Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport
layer protocol. SCTP, however, is mostly designed for Internet applications that have
recently been introduced.
These new applications, such as IUA (ISDN over IP), M2UA and M3UA (telephony signaling),
H.248 (media gateway control), H.323 (IP telephony), and SIP (IP telephony), need a more
sophisticated service than TCP can provide. SCTP provides this enhanced performance and
reliability.
27. What is meant by segmentation? REMEMBER CO2
BT-L1
When the size of the data unit received from the upper layer is too long for the network layer
datagram or data link layer frame to handle, the transport protocol divides it into smaller
usable blocks. This dividing process is called as segmentation
PART-B
1. i. Draw the TCP header format. (7) UNDERSTAND CO4
ii. Demonstrate how TCP three-way handshake works. (6) BT-L2
2. i. List the applications of UDP. (3) UNDERSTAND CO4
ii. Explain the UDP header format (6) BT-L2
iii. Difference between TCP and UDP. (4)
3. What are the two broad categories of Congestion Control REMEMBER CO2
mechanisms? Briefly explain all the techniques. (13) BT-L1
4. Explain any two TCP congestion control mechanisms with an REMEMBER CO2
example. (13) BT-L1
5. i. Compare the features of TCP and UDP. (7) UNDERSTAND CO4
ii.Explain the TCP header format. (6) BT-L2
6. Draw and explain about TCP state transition diagram. (13) UNDERSTAND CO4
BT-L2
7. Illustrate and explain UDP with its packet format. (13) UNDERSTAND CO4
BT-L2
8. Explain the adaptive flow control and retransmission UNDERSTAND CO2
techniques used in TCP. (13) BT-L2
9. Elaborate on purpose and functions of SCTP. (13) UNDERSTAND CO4
BT-L2
10. Discuss in detail connection establishment and termination REMEMBER CO2
using three-way handshaking protocol. (13) BT-L1
11. Explain various error control techniques used in TCP. UNDERSTAND CO4
(13) BT-L2
12. Furnish the packet format of Stream Control Transmission UNDERSTAND CO4
Protocol with its fields. How are the data transferred with four BT-L2
way handshaking? (13)
13. List out various flow control mechanisms used in TCP and REMEMBER CO2
explain each one briefly. (13) BT-L1
14. Write the various services of transport layer and explain them in UNDERSTAND CO4
detail. (13) BT-L2
15. Define port. List out various port numbers and its UNDERSTAND CO2
significance. (13) BT-L2
16. Explain congestion avoidance using random early UNDERSTAND CO2
detection in transport layer with an example. (13) BT-L2
17. Specify the justification for having variable field lengths for the UNDERSTAND CO2
fields in TCP header. (13) BT-L2
18. Describe how reliable and ordered delivery is achieved through UNDERSTAND CO2
TCP. (13) BT-L2
19. Explain the working of the TCP protocol. (13) UNDERSTAND CO4
BT-L2
20. Explain the following UNDERSTAND CO2
i) Debit ii) RED (13) BT-L2
PART-C
1. (i) Draw the format of TCP packet header and explain each of UNDERSTAND CO4
its field. (10) BT-L2
(ii) Specify the justification for having variable field lengths
for the fields in the TCP header. (5)
2. Elaborate on TCP congestion control mechanisms. UNDERSTAND CO2
Differentiate these mechanisms. (15) BT-L2
IPv6 (Internet Protocol Version 6) is the most recent version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet. IPV6 was developed by the
Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPV4
address exhaustion. IPv6 is intended to replace IPV4.
Auto Configuration - Auto Configuration is now built in and helps make IP addressing
more manageable. With IPv4, we relied on DHCP or manually configurating IP addresses.
Direct Addressing - With Direct Addressing, the primary use of NAT (Network Area
Translation) now becomes obsolete with IPv6. So, Direct Addressing is now possible.
Mobility - Mobility is better integrated into IPv6 than it is with IPv4. It makes it easier for
users to roam to different networks and keep their same IP address.
Improved Integrated Security (IPSec) - IPSec is now integrated into IPv6, while with
IPv4 it was more an add-on.
CN 1.28 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks
Subnetting reduces the total number of network numbers by assigning a single network
number to many adjacent physical networks.
Each physical network is referred to as subnet
For subnetting, the subnets must be close to each other.
For example, each department having a network within a college campus with a router
connecting to the external world.
12. What is DHCP? REMEMBER CO4
BT-L1
DHCP - Dynamic Host Configuration Protocol.
It runs at application layer of TCP/IP.
It assigns static and dynamic IP addresses to DHCP clients.
A DHCP server has a database that statically binds physical addresses to IP addresses and
DHCP server has a second database with a pool of available IP addresses. This second
database makesDHCP dynamic.
13. Define ICMP. REMEMBER CO4
BT-L1
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet
protocol suite. It is used by network devices, including routers, to send error message and
operational information indicating, for example, that a requested service is not available or
that a host or router could not be reached.
14. When is ICMP redirect message used? UNDERSTAND CO4
BT-L2
An ICMP redirect is an error message sent by a router to the sender of an IP packet. Redirects
are used when a router believes a packet is being routed sub optimally and it would like to
inform the sending host that it should forward subsequent packets to that same destination
through a different gateway.
15. What is meant by ARP? REMEMBER CO4
BT-L1
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-
changing Internet Protocol (IP) address to a fixed physical machine address, also known as a
media access control (MAC) address, in a local-area network (LAN).
CN 1.29 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks
The THT (Token Holding Time) specifies the maximum amount of time a token ring MAC
(media access control) may use the token before releasing it. The inter arrival time is the
time between successive packet generations in the "ON" state.
It defines that how much data a given node is allowed to transmit each time it possesses
the token or equivalently, how long a given node is allowed to hold the token.
20. When is ICMP redirect message used? UNDERSTAND CO4
BT-L2
An ICMP redirect is an error message sent by a router to the sender of an IP packet. Redirects
are used when a router believes a packet is being routed sub optimally and it would like to
inform the sending host that it should forward subsequent packets to that same destination
through a different gateway.
21. Highlight the characteristics of datagram networks. UNDERSTAND CO1
BT-L2
In datagram approach, each packet is treated independently from all others. Even when one
packet represents just a place of a multi packet transmission, the network treats it although
it existed alone. Packets in this technology are referred to as datagram
22. What is RTT? REMEMBER CO2
BT-L1
RTT is an acronym for Round Trip Time.
It is a measure of the time it takes for a packet to travel from a computer, across a
network to another computer and back.
CN 1.30 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks
PART-B
PART-C
1. (i) Outline IPv4 classful and classless addressing with APPLY CO4
examples. (10) BT-L3
(ii) Assume that you are given a network ID 165.121.0.0. You
are responsible for creating subnets on the network and each
subnet must provide atleast 900 host IDs. What subnet mask
meets the requirement for the minimum number of host IDs
and provides the greatest number ofsubnets? (5)
2. Why subnetting is necessary? With suitable example, develop APPLY CO2
the concept of subneting in class B network. (15) BT-L3
UNIT – IV – ROUTING
PART – A
The routing table is the table that is built up by the routing algorithms as a precursor to
building the forwarding table. It generally contains mappings from network numbers to
next hops. It may also contain information about how this information was learned, so that
the router will be able to decide when it should discard some information.
8. Compare static routing table with dynamic UNDERSTAND CO3
routing table. BT-L2
Static routing table Dynamic routing table
1. A static routing table contains 1. A dynamic routing table contains
information entered manually. information entered dynamically.
2. The administrator enters the route for 2. Dynamic routing protocols such as
each destination into the table. RIP, OSPF or BGP updates the table
periodically.
3. When there is a change in the internet, 3. Whenever there is a change in the
it cannot update automatically. internet, dynamic routing protocols
updates automatically.
4. A static routing table can be used in 4. A dynamic routing table can be used
small networks that does not change very in large networks like internet, where
often. changes occur very often.
5. It is not efficient in delivery of IP packets 5. It is more efficient in delivery of IP
in internet. packets in internet.
9. What are the benefits of OSPF protocol? UNDERSTAND CO3
BT-L2
OSPF - Open Shortest Path First It is a network layer protocol.
OSPF is an interior routing protocol based on link state routing. Benefits of OSPF
protocol are,
OSPF uses "cost" metric to choose best path.
Efficiency: RIP does routing updates for every 30 seconds, but OSPF multicasts link-
stateupdates and sends the updates only when there is a change in the network.
Unlimited hop counts: RIP networks are limited to 15 hops. Therefore, networks with
more than 15 hops cannot be reached by RIP by normal means. On the other hand,
OSPF has practically no limitations in hop counts.
CN 1.33 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks
Fast convergence of OSPF: OSPF network converges faster and the route changes are
floodedimmediately in the shortest time.
Good security: OSPF supports interface-based plaintext and md5 authentication.
OSPF adapts to various scales of networks, up to thousands of units.
A routing table uses a packet's destination IP address to determine which IP address should
next receive the packet, that is, the "next hop" IP address. A forwarding table uses the "next
hop" IP address to determine which interface should deliver the packet to that next hop, and
which layer 2 address (E.g., MAC address) should receive the packet on multipoint interfaces
like Ethernet or Wi-Fi.
Link state routing is the second family of routing protocols. While distance vector routers
use a distributed algorithm to compute their routing tables, link-state routers exchange
messages to allow each router to learn the entire network topology.
Based on this learned topology, each router is then able to compute its routing table by using
a shortest path computation (Dijkstra). For link state routng , a network is modeled as a
directed weighted graph.
23. State the rules of non boundary-level masking. UNDERSTAND CO3
BT-L2
The bytes in the IP address that corresponds to 255 in the mask will be repeated in the
sub network address
The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub
network address
For other bytes, use the bit-wise AND operator.
Example
IP address 45 123 21 8
Mask 255 192 0 0
Subnet 45 64 0 0 123 0 1 1 1 1 0 1 1 192 1 1 0 0 0 0 0 0 64 0 1 0 0 0 0 0 0
24. What are the metrics used by routing protocols? UNDERSTAND CO3
BT-L2
The metrics used by routing protocols are,
Hop count
Delay or latency
Maximum Transmission Unit (MTU)
Path cost
Path reliability
Bandwidth
Load
25. What is the role of VCI? REMEMBER CO3
BT-L1
An Incoming virtual circuit identifier (VCI) uniquely identifies the connection at this switch
and that will be carried inside the header of the packets that belong to this connection. It is a
potentially different outgoing VCI that will be used for outgoing packets. The combination of
incoming interface and incoming VCI uniquely identifies the virtual connection. VCI assigned
by network admin is an unused value on that interface and VCIs are unique on a link and not
on entire network. Also incoming and outgoing VCIs need not be same.
PART – B
1. Explain what is Distance Vector Routing and UNDERSTAND CO3
Demonstrate how distance table gives routingtable. (13) BT-L2
2. Explain when is multicasting used and explain how UNDERSTAND CO3
it differs from unicasting. (13) BT-L2
3. What are the different routing algorithms ? List out UNDERSTAND CO3
their pros and cons. (13) BT-L2
4. Outline distance vector routing with an example REMEMBER CO3
and relevant diagrams. (13) BT-L1
5. Illustrate multicasting routing protocols briefly. (13) REMEMBER CO3
BT-L1
6. Explain in detail the unicast routing algorithms. (13) REMEMBER CO3
BT-L1
7. Discuss on link state routing protocol in detail. (13) REMEMBER CO3
BT-L1
8. Explain in detail the operation of OSPF protocol by UNDERSTAND CO3
considering a suitable network. (13) BT-L2
9. Examine the function of the Border Gateway Protocol REMEMBER CO3
used for Inter domain routing in internetwork. (13) BT-L1
10. With an example network scenario explain the UNDERSTAND CO3
mechanism of Routing Information Protocol and specify BT-L2
the routing table contents. (13)
11. Explain in detail about DVMRP. (13) UNDERSTAND CO3
BT-L2
12. Explain in detail about PIM. (13) REMEMBER CO3
BT-L1
13. (i)Describe in detail about reliable flooding. (6) REMEMBER CO3
(ii) Explain Link State Packet in detail. (7) BT-L1
14. Compare Classful Addressing and Classless Addressing. UNDERSTAND CO3
(13) BT-L2
15. Describe the working of RIP with neat diagram and UNDERSTAND CO3
state the major between RIP and OSPF. (13) BT-L2
PART – C
1. i) Consider sending a 2400-byte datagram into a link that has APPLY CO4
an MTU of 700 bytes. Suppose the original datagram is BT-L3
stamped with the identification number 422. How many
fragments are generated? What are the values in the various
fields in the IP datagram(s) generated related to
fragmentation? (8)
(ii) Discuss the fundamentals and advantages of Open Shortest
Path First protocol. (7)
CRC or Cyclic Redundancy Check is a method used for detecting errors or accidental
changes incommunication channel.
CRC uses generator polynomial which is available on both sender and receiver side.
An example of generator polynomial is of the form like x3 + x + 1. This generator
polynomial represents the key 1011.
24. What is a repeater? REMEMBER CO2
BT-L1
A repeater is a network connecting device that operates only in the physical layer.
Signals that carry information within a network can travel only a fixed distance.
A repeater receives a signal and before it becomes too weak or corrupted, it
regenerates theoriginal signal.
The repeater then sends the refreshed signal and does not has the filtering capability.
25. Explain HDLC. REMEMBER CO2
BT-L1
HDLC - High-level Data Link Control.
It is a data link layer protocol.
HDLC is a bit-oriented protocol for communication over multipoint links.
HDLC provides two common transfer modes that can be used in different configurations,
theyare Normal Response Mode (NRM) and Asynchronous Balanced Mode (ABM).
PART – B
1. Illustrate the working of CRC code withC(7, APPLY CO2
4)Where n = 7, k = 4, Codeword = 1001110 Give BT-L3
the division in the CRC decoder for two cases
(i)Dataword accepted (ii) Dataword Discarded. (13)
2. i)A message that is to be transmitted is represented APPLY CO2
by the polynomial M(x) = x5 + x4+ x with a generating BT-L3
prime polynomial G(x) = x3 + x2 + 1. Generate a 3 bit
CRC code, C(x) which is to be appended to M(x). (10)
ii)How is a hub related to a repeater ? (3)
3. Explain in detail about the error and flowcontrol UNDERSTAND CO2
mechanisms employed at data link layer. (13) BT-L2
4. Elaborate the working of CSMA UNDERSTAND CO2
and CSMA/CD protocol. (13) BT-L2
5. Present an outline of HDLC protocol. (13) UNDERSTAND CO2
BT-L2
6. Elaborate the various DLC services in detail. (13) UNDERSTAND CO2
BT-L2
17. (i) Explain the access method used in wireless LAN. REMEMBER CO2
(7) BT-L1
(ii)Discuss the working of CSMA/CD protocol. (6)
18. Compare and contrast CSMA/CD with CSMA/CA. (13) UNDERSTAND CO2
BT-L2
19. Explain in detail about connecting devices used REMEMBER CO2
in networks. (13) BT-L1
PART – C
1. Two hosts are in a CSMA/CD network and the medium has APPLY CO2
a data transfer capacity of 1Gbps. The minimum frame BT-L3
length is fixed to 1,000 bits and the propagation speed is 2
×108 m/s.
i) What will be the distance between the hosts ? (7)
ii) If it is an Ethernet network, what is the efficiencywhen
the hosts have a maximum distance between them ? If
the distance is reduced to 1 m, does it impact the
efficiency? (8)
2. Elaborate on various types of multiple access protocols in UNDERSTAND CO2
detail. (15) BT-L2
3. List out various data link layer protocols and explain REMEMBER CO2
each one of them in detail with necessary diagrams. (15) BT-L1