0% found this document useful (0 votes)
54 views42 pages

CS3591 CN

The document is a question bank for the Computer Networks course (CS3591) for third-year Computer Science and Engineering students, detailing the syllabus, course objectives, and learning outcomes across five units. It includes topics such as data communication, transport layer protocols, network layer functions, routing protocols, and data link and physical layers. Additionally, it outlines assessment methods, assignments, and resources for further study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views42 pages

CS3591 CN

The document is a question bank for the Computer Networks course (CS3591) for third-year Computer Science and Engineering students, detailing the syllabus, course objectives, and learning outcomes across five units. It includes topics such as data communication, transport layer protocols, network layer functions, routing protocols, and data link and physical layers. Additionally, it outlines assessment methods, assignments, and resources for further study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

FORMAT : QP09 KCE/DEPT.

OF CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

SUBJECT: COMPUTER NETWORKS


(THEORY CUM LAB)

YEAR/SEMESTER: III/V

QUESTION BANK (CS3591)


(Version: 1)

PREPARED BY
Ms.M.KAVITHA, AP/ CSE

CN 1.1 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

CS3591 COMPUTER NETWORKS LTPC


3024

UNIT I INTRODUCTION AND APPLICATION LAYER 10

Data Communication - Networks – Network Types – Protocol Layering – TCP/IP Protocol suite
–OSI Model – Introduction to Sockets - Application Layer protocols: HTTP – FTP – Email
protocols(SMTP - POP3 - IMAP - MIME) – DNS – SNMP

UNIT II TRANSPORT LAYER 9

Introduction - Transport-Layer Protocols: UDP – TCP: Connection Management – Flow control -


Congestion Control - Congestion avoidance (DECbit, RED) – SCTP – Quality of Service

UNIT III NETWORK LAYER 7

Switching : Packet Switching - Internet protocol - IPV4 – IP Addressing – Subnetting - IPV6, ARP,
RARP, ICMP, DHCP

UNIT IV ROUTING 7

Routing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State Routing –
OSPF– Path-vector routing - BGP - Multicast Routing: DVMRP – PIM.

UNIT V DATA LINK AND PHYSICAL LAYERS 12

Data Link Layer – Framing – Flow control – Error control – Data-Link Layer Protocols – HDLC –
PPP - Media Access Control – Ethernet Basics – CSMA/CD – Virtual LAN – Wireless LAN(802.11)
- Physical Layer: Data and Signals - Performance – Transmission media- Switching –
Circuit Switching.
TOTAL: 45 PERIODS

SIGNATURE OF STAFF IN-CHARGE HOD/CSE


(M.KAVITHA)

CN 1.2 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


COURSE PLAN

Sub. Code : CS3591 Branch/Year/Sem : B.E CSE /III/V


Sub.Name : Computer Networks Batch : 2021-2025
Staff Name : Ms.M.Kavitha Academic Year : 2023-24 (ODD)

COURSE OBJECTIVE
1. To understand the concept of layering in networks.
2. To know the functions of protocols of each layer of TCP/IP protocol suite.
3. To visualize the end-to-end flow of information.
4. To learn the functions of network layer and the various routing protocols.
5. To familiarize the functions and protocols of the Transport layer.

TEXT BOOKS
T1. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach
Featuring the Internet, Eighth Edition, Pearson Education, 2021.
T2. Behrouz A. Forouzan, Data Communications and Networking with TCP/IP Protocol Suite,
Sixth Edition TMH, 2022.

REFERENCE BOOKS
R1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition,
Morgan Kaufmann Publishers Inc., 2012.
R2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education,
2013.
R3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
R4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach”, McGraw Hill, 2012.

WEB RESOURCES

W1. https://www.javatpoint.com/osi-model preview (Topic.No:05)


W2. https://techdifferences.com/difference-between-http-and-ftp.html (Topic.No:07)
W3. https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp
(Topic.No:12)
W4. https://www.elprocus.com/network-switching (Topic.No:18)
W5. https://www.geeksforgeeks.org/multicasting-in-computer-network (Topic.No:27)
W6. https://nptel.ac.in/courses/106105183 (Topic.No:34)
W7.https://data-flair.training/blogs/transmission-media-in-computer
Network (Topic.No:36)

CN 1.3 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

Topic Topic Books for Page


Teaching No. of Cumulative
No Reference No.
Methodology Hours No. of
Required periods
UNIT I INTRODUCTION AND APPLICATION LAYER 10
1. Data Communication R2 32-54 BB/PPT 1 1

2. Network Types T2 7-21 BB/PPT 1 2

3. Protocol Layering – T1 47-54 BB/PPT 1 3


Networks R2 42-45

4. TCP/IP Protocol suite T2 45-52 BB/PPT 1 4


L.VIDEO
5. OSI Model T2 29-41 BB/PPT 1 5
W1
6. Introduction to R2 76-85 BB/PPT 1 6
Sockets
7. Application Layer T1 98-110 BB/PPT 1 7
protocols: HTTP – FTP W2
8. Email protocols(SMTP T1 116-139 BB/PPT 1 8
- POP3 - IMAP - MIME) T2 824-840
9. DNS T2 797-811 BB/PPT 1 9
10. SNMP T2 877-897 BB/PPT 1 10
LEARNING OUTCOME
At the end of unit, students will be able to
 Analyze the working of various application layer protocols.
 Explain the basic layers and its functions in computer networks.
 Describe protocols for various functions in the network.
 Understand the concept of socket.
UNIT II TRANSPORT LAYER 9
Introduction- T1 187-192 BB/PPT 1 11
11.
Transport-Layer
Protocols: UDP T1 200-206 BB/PPT 1 12
12. W3 L.VIDEO
TCP: Connection T1 233-260 BB/PPT 2 14
13. Management-Flow
control
14. Congestion Control T1 269-283 BB/PPT 1 15
Congestion avoidance R1 514-529 BB/PPT 1 16
15.
(DECbit, RED)
T2 736-753 BB/PPT 1 17
16. SCTP

17.
Quality of Service R2 732-767 BB/PPT 2 19
LEARNING OUTCOME
At the end of unit, students will be able to
 Understand the basics of how data flows from one node to another.

CN 1.4 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

Topic Topic Books for Page Teaching No. of Cumulative


No Reference No. Methodology Hours No. of
Required periods
 Understand the concept of TCP and UDP.
 Describe protocols for various functions in the network.
UNIT III NETWORK LAYER 7

Switching : Packet R3 3-14 1 20


18. BB/PPT
Switching W4
Internet protocol - T1 329-353 BB/PPT 2 22
19.
IPV4 - IP Addressing
Subnetting R1 220-227 BB/PPT 1 23
20.
IPV6 R2 474-483 BB/PPT 1 24
21.
L.VIDEO
ARP, T2 612-629 BB/PPT 2 26
22. RARP,ICMP, DHCP R1 228-235

LEARNING OUTCOME
At the end of unit, students will be able to
 Describe protocols for various functions in the network.
 Understand the basics of how data flows from one node to another.
 Understand the concept of packet switching.
UNIT IV ROUTING 7
Routing and protocols: T2 658-677 BB/PPT 1 22
23.
Unicast routing
Distance Vector T1 384-390 BB/PPT 1 28
24.
Routing L.VIDEO
RIP - Link State R1 243-261 BB/PPT 2 30
25.
Routing- OSPF
Path-vector routing- R4 309-314 BB/PPT 1 31
26.
BGP
Multicast Routing: R1 338-353 BB/PPT 2 33
27. DVMRP – PIM.
W5
LEARNING OUTCOME
At the end of unit, students will be able to
 Analyze routing algorithms.
 Describe protocols for various functions in the network.
 Gain knowledge about routing and protocols.
UNIT V DATA LINK AND PHYSICAL LAYERS 12
Data Link Layer – T2 307- BB/PPT 1 34
28.
Framing 311
Flow control – Error R2 237-249 BB/PPT 1 35
29.
control
Data-Link Layer R2 250-256 BB/PPT 1 36
30.
Protocols – HDLC

CN 1.5 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

Topic Topic Books for Page Teaching No. of Cumulative


No Reference No. Methodology Hours No. of
Required periods
PPP - Media Access T2 346-350 BB/PPT 1 37
31.
Control
Ethernet Basics – T2 370-379 BB/PPT 1 38
32.
CSMA/CD L.VIDEO
Virtual LAN T2 458-462 BB/PPT 1 39
33.
Wireless LAN(802.11) T1 532-550 NPTEL 2 41
34.
W6
Physical Layer: Data T2 57-80 BB/PPT 1 42
35. and Signals -
Performance
Transmission media T2 191-205 BB/PPT 2 44
36.
W7
Switching – T2 213-218 BB/PPT 1 45
37. Circuit Switching.

LEARNING OUTCOME
At the end of unit, students should be able to
 Explain the basic layers and its functions in computer networks.
 Describe protocols for various functions in the network.
 Understand the concept of wireless LAN.

COURSE OUTCOME
At the end of the course, the students will be able to
CO 1: Explain the basic layers and its functions in computer networks.
CO 2: Understand the basics of how data flows from one node to another.
CO 3: Analyze routing algorithms.
CO 4: Describe protocols for various functions in the network.
CO 5: Analyze the working of various application layer protocols.

CONTENT BEYOND THE SYLLABUS

1. Network Security

INTERNAL ASSESSMENT DETAILS

ASSESSMENT I II
Topic Nos. 1-20 21-37
Date

CN 1.6 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

ASSIGNMENT DETAILS

ASSIGNMENT I II

Topic Nos. for


1-20 21-37
reference / Activity
Deadline

Class Strength : 64

ASSIGNMENT – I

Topics for Reference (1-20)


Level : 1(12 Students)
Question / Activity / Activities Evaluation

POSTER PRESENTATION
L1Q1 OSI Model
L1Q2 HTTP and FTP Poster design 20
L1Q3 Domain Name System Presentation 20
L1Q4 User Datagram Protocol
L1Q5 Transmission Control Protocol
L1Q6 Packet Switching
L1Q7 Data Communication
L1Q8 IPv4
L1Q9 TCP: Connection Management
L1Q10 Email Protocols
L1Q11 Flow control
L1Q12 TCP Congestion Control
Level : 2(17 Students)
SEMINAR
L2Q13 Layered Architecture Presentation : 15
L2Q14 The Development of Packet Switching Communication : 5
L2Q15 Overview of HTTP Marks Report :15
L2Q16 Electronic Mail in the Internet Q&A : 5
L2Q17 Principles of Network Applications
L2Q18 Introduction to Transport Layer Services
L2Q19 IPV4 Datagram Format
L2Q20 Overview of DNS
L2Q21 Congestion avoidance
CASE STUDY PRESENTATION
L2Q22 Protocols and Standards
L2Q23 Layers in the OSI Model Presentation: 20
L2Q24 TCP/IP Protocol Viva Questions:
L2Q25 IP Addressing 10
L2Q26 Congestion Control and Quality of Service Report : 10
L2Q27 DNS in the Internet

CN 1.7 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

L2Q28 Simple Network Management Protocol Concept


L2Q29 Overview of the Transport Layer in the Internet
Level : 3(35 Students)
MINDMAP
L3Q30 Data Communications Model MINDMAP 20
L3Q31 Simple Protocol Architecture Explanation 20
L3Q32 Internet Applications
L3Q33 Simple Network Management Protocol
L3Q34 Introduction to Sockets
L3Q35 File Transfer Protocol
L3Q36 Relationship between Transport and Application Layer
L3Q37 SCTP Features
L3Q38 TCP services and Features
L3Q39 OSI Model
L3Q40 Principles of Congestion Control
L3Q41 Connectionless Transport
VIRTUAL LAB EXERCISE
L3Q42 Star Topology Objective
L3Q43 Bus Topology Explanation 20
L3Q44 Ring Topology Execution&
L3Q45 Sockets Results 20
L3Q46 UDP
L3Q47 IP Addressing
L3Q48 File Transfer Protocol
GATE QUESTIONNAIRE & SOLUTION
L3Q49 Application Layer Protocols Part A
L3Q50 Flow Control 1*20=20
L3Q51 Congestion Control Part B
L3Q52 OSI Model 2*10=20
L3Q53 Transmission Control Protocol
L3Q54 User Datagram Protocol
L3Q55 SNMP
L3Q56 IPV4
L3Q57 Packet Switched Networks
L3Q58 Transport Layer Protocols
L3Q59 HTTP and FTP
L3Q60 Overview of Network Layer
L3Q61 Data Communications and Networking
L3Q62 Stream Control Transmission Protocol
L3Q63 Internet protocols
L3Q64 Connectionless Transport
ASSIGNMENT – II

Topics for Reference (21-37)


Level : 1(12 Students)
Question / Activity / Activities Evaluation

VIRTUAL LAB EXERCISE


L1Q1 Distance Vector Routing Algorithm
L1Q2 Link state routing algorithm Objective

CN 1.8 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

L1Q3 RIP Explanation 20


L1Q4 Error Detection and Correction Techniques Execution &
L1Q5 CSMA / CA protocol Results 20
WRITTEN ASSIGNMENT

L1Q6 IPV6 Advantages and Packet Format Content: 20


L1Q7 Internet Control Message Protocol Marks
L1Q8 The Role of BGP and Route Information Presentation : 20
L1Q9 Data Link Layer Marks
L1Q10 Virtual LAN
L1Q11 Transmission media
L1Q12 Circuit Switching
Level : 2(17 Students)

MINDMAP

L2Q13 DHCP MINDMAP 20


L2Q14 IPv6 Addresses
L2Q15 Unicast routing Explanation 20
L2Q16 Framing
L2Q17 Flow and Error Control
GATE QUESTIONNAIRE & SOLUTION

L2Q18 Error Control Techniques Part A


L2Q19 The Internet Control Message Protocol 1*20=20
L2Q20 Ethernet Part B
L2Q21 High Level Data Link Control 2*10=20
L2Q22 IEEE 802.11 Medium Access Control
L2Q23 Routing Protocols
L2Q24 OSPF
L2Q25 Data and Signals
L2Q26 Path Vector Routing Algorithms
L2Q27 Byte Oriented Protocols
L2Q28 Circuit Switched Networks
L2Q29 Bit Oriented Protocols
Level : 3(35 Students)
POSTER PRESENTATION
L3Q30 IPV6 Poster design 20
L3Q31 ICMP Presentation 20
L3Q32 ARP and RARP
L3Q33 DHCP
L3Q34 Distance Vector Routing
L3Q35 OSPF
L3Q36 Link State Routing
L3Q37 Path vector routing
L3Q38 DVMRP
L3Q39 PIM
L3Q40 RIP
L3Q41 BGP
L3Q42 Overview of Data Link Layer

CN 1.9 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

L3Q43 Error Control


L3Q44 Framing
L3Q45 Flow Control
L3Q46 Overview of Physical Layer
L3Q47 MAC
L3Q48 Virtual LAN
L3Q49 IEEE 802.11
L3Q50 Ethernet
L3Q51 HDLC
L3Q52 Point to Point Protocol
L3Q53 Guided Media
L3Q54 Unguided Media
L3Q55 Structure of a Switch
L3Q56 Virtual Circuit Networks
L3Q57 Data and Signals
PROJECT DESIGN & / CONFERENCE / JOURNAL PAPER PUBLICATION
L3Q58 Wireless Multimedia Systems Design (40) /
L3Q59 Communication Network Architectures Paper &
L3Q60 Network Services and Applications Publication (40)
L3Q61 Wireless Network Efficiency Improvement
L3Q62 Computing shortest path between nodes
L3Q63 Dynamic search algorithm for intelligent message routing
L3Q64 Congestion Free Router Networking

COURSE ASSESSMENT PLAN

CO CO Description Weightage CAT1 CAT2 MODEL ASSIGN.- ASSIGN.- AU


1 2
CO1 Explain the basic 10% √ √ √ √ √
layers and its
functions in
computer
networks
CO2 Understand the 30% √ √ √ √ √
basics of how
data flows from
one node to
another
CO3 Analyze routing 20% √ √ √
algorithms
CO4 Describe 30% √ √ √ √ √
protocols for
various functions
in the network
CO5 Analyze the 10% √ √ √
working of
various
application layer
protocols

CN 1.10 KCE/CSE/QB/III YR/CN


FORMAT : QP09 KCE/DEPT. OF CSE

COURSE OUTCOME ALLIGNMENT MATRIX – MODEL EXAM SAMPLE QUESTION SET

Q.No Question Marks BTL CO

1. What are the components of data communication 2 L1 CO1


system?
2. State the purpose of layering. 2 L2 CO5
3. What are the approaches used to provide a range of 2 L1 CO2
Quality of Sevice(QoS)?
4. Define Congestion. 2 L1 CO2
5. Outline the need for switching. 2 L2 CO4
6. What is DHCP? 2 L1 CO4
7. Define RIP. 2 L1 CO3
8. Mention any four application of multicasting. 2 L1 CO3
9. Illustrate the function of hop by hop flow control. 2 L3 CO2
10. Classify about types major classes of guided media. 2 L3 CO2
11.a.i With a neat sketch, explain the function of OSI 7 L2 CO5
network architecture.
11.a.ii Write your understanding of FTP. 6 L3 CO2
11.b.i Explain the Domain Name Service protocol with an 6 L2 CO4
example.
11.b.ii Describe how SMTP protocol is used in E-mail 7 L3 CO4
applications.
12.a Explain any two TCP congestion control mechanisms 13 L2 CO2
with an example.
12.b Write a detailed note on congestion avoidance 13 L3 CO2
mechanisms used in TCP.
13.a.i Explain about IPV4. 7 L2 CO4
13.a.ii Explain the Packet Switching with an example. 6 L2 CO2
13.b.i Write about IPV6 in detail. What are its new features 7 L3 CO4
and improvements?
13.b.ii Write a short on ICMP. 6 L3 CO4
14.a Discuss about the RIP and OSPF. 13 L3 CO3
14.b Explain the working of Protocol Independent Multi- 13 L2 CO3
cast(PIM) in detail.
15.a.i Discuss the working of CSMA/CD protocol. 7 L3 CO2
15.a.ii Explain the functions of MAC layer present in IEEE 6 L2 CO2
802.11 with necessary diagrams.
15.b.i Discuss the framing technique used in HDLC. What is 6 L3 CO1
the effect of errors on this framing?
15.b.ii Explain in detail about the flow control mechanisms 7 L2 CO2
employed at data link layer.
16.a. Define UDP. Explain UDP checksum with one 15 L2 CO2
example.
16.b. Consider a network scenario and explain the 15 L2 CO4
functions of ARP and RARP protocols with frame
format.

CN 1.11 KCE/CSE/QB/III YR/CN


FORMAT:)P09 KCE/DEPT. OF (SE.

ASSESSMENT PAPER QUALITY MATRIx


PART LEVEL 1 LEVEL 2 LEVEL3 LEVEL 4 LEVEL, 5 LEVEL, 6

A 1,3,4,6,7, 2,5 9,10

B 11.a.i 11.a.ii
11.b.i 11.b.ii
12.a 12.b
13.a.i 13.b.i
13.a.ií 13.b.ii
14.b 14.a
15.a.ií 15.a.i
15.b.íi 15.b.i
C 16.a
16.b
TOTAL 12 45 43
Distribution 57% 431.

Prepared by Verified by
Ms.M.Kavitha
HOD/CSE
Approved by
PRINCIPAL

CN 1.12
KCE/CSE/QB/1IIYR/CN
FORMAT: QP10 KCE / DEPT. OF CSE

SUBJECT: COMPUTER NETWORKS


(THEORY CUM LAB)

YEAR/SEMESTER: III/V

QUESTION BANK (CS3591)


(Version: 1)

PREPARED BY
Ms.M.KAVITHA, AP/ CSE

CN 1.13 KCE/CSE/QB/III YR/CN


FORMAT: QP10 KCE / DEPT. OF CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

ACADEMIC YEAR 2023- 2024 (ODD SEMESTER)

SYLLABUS

CYCLE – 1

1. Learn to use commands like tcpdump, netstat, ifconfig, nslookup and traceroute. Capture
ping and trace route PDUs using a network protocol analyzer and examine.
2. Write a HTTP web client program to download a web page using TCP sockets.
3. Applications using TCP sockets like: a) Echo client and echo server b) Chat
4. Simulation of DNS using UDP sockets.
5. Use a tool like Wireshark to capture packets and examine the packets.

CYCLE – 2

6. Write a code simulating ARP /RARP protocols.


7. Study of Network simulator (NS) and Simulation of Congestion Control Algorithms using NS.
8. Study of TCP/UDP performance using Simulation tool.
9. Simulation of Distance Vector/ Link State Routing algorithm.
10. Simulation of an error correction code (like CRC).

Prepared by Verified By
Ms.M.Kavitha HOD/CSE

CN 1.14 KCE/CSE/QB/III YR/CN


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

COURSE PLAN
Sub. Code : CS3591 Branch / Year / Sem : B.E CSE / III /V
Sub.Name : Computer Networks Batch : 2021-2025
Staff Name : Ms.M.Kavitha Academic Year : 2023-24 (ODD)

COURSE OBJECTIVE

1. To understand the concept of layering in networks.


2. To know the functions of protocols of each layer of TCP/IP protocol suite.
3. To visualize the end-to-end flow of information.
4. To learn the functions of network layer and the various routing protocols.
5. To familiarize the functions and protocols of the Transport layer.

LEARNING OUTCOME
Upon the completion of this lab, students should be able to

CO 1: Explain the basic layers and its functions in computer networks.


CO 2: Understand the basics of how data flows from one node to another.
CO 3: Analyze routing algorithms.
CO 4: Describe protocols for various functions in the network.
CO 5: Analyze the working of various application layer protocols.

PRE-REQUISITE

Knowledge on Java Programming.

EQUIPMENTS / COMPONENTS / SOFTWARE REQUIRMENT

Hardware:
Standalone desktops – 30Nos.
Software:
1. C / C++ / Java / Python / Equivalent Compiler
2. Network simulator like NS2/Glomosim/OPNET/ Packet Tracer / Equivalent

CN 1.15 KCE / CSE/ /III YR / CN


FORMAT: QP10
KCE /DEPT. OF CSE

Ex.No Date Title of the Experiment No. of Cumulative


Hrs.required| No. of periods
CYCLE -I
1 Learn to use commands like tcpdump, 3
netstat, ifconfig, nslookup and traceroute.
Capture ping and trace route PDUs using a
network protocol analyzer and examine.
2 Write a HTTP web client program to 3 6
download a web page using TCP sockets.
3
Applications using TCP sockets like: a) 3 9
Echo client and echo server b) Chat
4 Simulation of DNS using UDP sockets. 3 12
5 Use a tool like Wireshark to capture 3 15
packets and examine the packets.
CYCLE - II
Write a code simulating ARP/RARP 3 18
protocols.
7
Study of Network simulator (NS) and 3 21
Simulation of Congestion Control
Algorithms using NS.
Study of TCP/UDP performance using 3 24
Simulation tool.
9 Simulation of Distance Vector/ Link State 3 27
Routing algorithm.
10 Simulation of an error correction code 30
(like CRC).

CONTENT BEYOND SYLLABUS


1. Simulation of Go Back N protocol

INTERNAL ASSESSMENT DETAILS

MODEL
PORTIONS 1-10
Date

Prepared by Verified By L+27


Ms.M.Kavitha l2023 HOD/CSE
Approved by
PRINCIPAL

CNA1S KCE/CSE/QB/III YR/CN


Subject code/Name: CS3591/Computer Networks

UNIT – I - INTRODUCTION AND APPLICATION LAYER


PART – A

1. What is meant by data communication? REMEMBER CO1


BT-L1
Data communications refers to the transmission of this digital data between two or more
computers and a computer network or data network is a telecommunications network that
allows computers to exchange data. The physical connection between networked computing
devices is established using either cable media or wireless media.
2. Describe computer networks. REMEMBER CO1
BT-L1
A computer network is a collection of computers connected to share resources. It includes a
printer, file server etc. A computer also called computer system participating in network can
both send and receive data to and from the system.
Example: Internet.
3. What are the uses of Network? REMEMBER CO1
BT-L1
 Communication and Access to Information: It helps users at different places to send and
receive data. It allows remote users to connect via video conferencing, virtual meetings
and digital emails.
 Computer networks provide access to online libraries, journals, electronic newspapers,
chat rooms, social networking websites, email, www etc. Computer networks allow users
to access interactive entertainment channels.
 Resource Sharing: It allows users to share files and resources.
 Centralized Support and Administration.
4. What are the subgroups of OSI layers? REMEMBER CO1
BT-L1
The seven layers of the OSI model belonging to three subgroups.
 Physical, data link and network layers are the network support layers; they deal with
the physical aspects of moving data from one device to another.
 Session, presentation and application layers are the user support layers; they allow
interoperability among unrelated software systems.
 The transport layer ensures end-to-end reliable data transmission.
5. What are the three criteria necessary for an effective UNDERSTAND CO1
and efficient network? BT-L2
The most important criteria are performance, reliability and security.
 Performance of the network depends on number of users, type of transmission
medium, and the capabilities of the connected hardware and the efficiency of the
software.
 Reliability is measured by frequency of failure, the time it takes a link to recover from
the failure and the network’s robustness in a catastrophe.
 Security issues include protecting data from unauthorized access and viruses.
.
6. What are the two interfaces provided by protocols? REMEMBER CO4
BT-L1
 Service interface- defines the operations that local objects can perform on the protocol.
 Peer interface- defines the form and meaning of messages exchanged between protocol
peers to implement the communication.

CN 1.17 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

7. Define OSI. REMEMBER CO1


BT-L1
The ISO was one of the first organizations to formally define a common way to connect
computers. Their architecture called the Open Systems Interconnection (OSI) architecture.
OSI is a model for understanding and designing a network architecture that is flexible, robust
and Interoperable.
8. Why protocols are needed? UNDERSTAND CO4
BT-L2
In networks, communication occurs between the entities in different systems. Two entities
cannot just send bit streams to each other and expect to be understood. For communication,
the entities must agree on a protocol. A protocol is a set of rules that govern data
communication.
9. What are the responsibilities of application layer? REMEMBER CO5
BT-L1
The Application Layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as e-mail, shared database
management and other types of distributed information services.
 Network Virtual Terminal
 File Transfer Access and Management (FTAM)
 Mail Services
 Directory Services.
10. What are the four main properties of HTTP? REMEMBER CO5
BT-L1
 Global Uniform Resource Identifier
 Request-response exchanges
 Statelessness
 Resource metadata.
11. What are the four groups of HTTP Headers? and its REMEMBER CO5
methods. BT-L1
The four groups of HTTP headers are
 General headers
 Entity Headers
 Request Headers
 Response Headers
There are two methods of HTTP are
 GetMethod( )
 PostMethod( )

12. What is the function of SMTP? REMEMBER CO5


BT-L1
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail Transfer
Protocol (SMTP). It is a system for sending messages to other computer users based on e-
mail addresses. SMTP provides mail exchange between users on the same or different
computers.
13. Why is an application such as POP needed for electronic UNDERSTAND CO5
messaging? BT-L2
Workstations interact with the SMTP host, which receives the mail on behalf of every host in
the organization, to retrieve messages by using a client-server protocol such as Post Office
Protocol. Although POP3 is used to download messages from the server, the SMTP client still
needed on the desktop to forward messages from the workstation user to its SMTP mail
server.

CN 1.18 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

14. Discuss the three main division of the domain name UNDERSTAND CO5
space. BT-L2
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
 Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
 Country domain: Uses two characters to identify a country as the last suffix.
 Inverse domain: Finds the domain name given the IP address.
15. What is meant by FTP? REMEMBER CO5
BT-L1
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one
host to another host over a TCP-based network, such as the Internet. It is often used to
upload web pages and other documents from a private development machine to a public
web-hosting server. FTP is built on client-server architecture and uses separate control and
data connections between the client and the server.
16. Define HTTP. REMEMBER CO5
BT-L1
 Web page are organized and retrieved information using HTTP Protocol.
 Hyper Text Transfer Protocol (HTTP) is an application protocol that is used to retrieve
web pages from remote servers.
 The core idea of hypertext is that one document can link to another document, and the
protocol (HTTP) and document language (HTML) were designed to meet that goal.
 Hypertext is structured text that uses logical links(hyperlinks) between nodes containing
text. HTTP is the protocol to exchange or transfer hypertext.
17. What is IMAP? REMEMBER CO5
BT-L1
 Internet Message Access Protocol (IMAP) is a standard protocol for accessing e-mail
from your local server. IMAP is a client/server protocol in which e-mail is received and
held for you by your Internet server.
 IMAP can be thought of as a remote file server. POP3 can be thought of as a "store-and-
forward" service.

18. Define SNMP. REMEMBER CO5


BT-L1
Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for
managing devices on IP networks". Devices that typically support SNMP include routers,
switches, servers, workstations, printers, & modem. It is used mostly in network
management systems to monitor network-attached devices for conditions that warrant
administrative attention.

19. Write down the HTTP connection establishment. UNDERSTAND CO5


BT-L2
HTTP runs over TCP. Five phases of interactions between application and transport layer
protocols.
 Request Messages
 Response Messages
 Uniform Resource Identifiers
 TCP Connections
 Caching

CN 1.19 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

20. Outline the purpose of layering. UNDERSTAND CO5


BT-L2
The purpose of the OSI reference model is to make networks more manageable and to aid
the problem of moving data between computers. The main objectives of the ISO OSI
reference model allows manufacture of different systems to interconnect their equipment
through standard interfaces.

a. Allow software and hardware to integration well and be portable on differing


systems.
b. Create a model which all the countries of the world use.
The model divides the problem of moving data between computers into seven smaller, more
manageable tasks, which connect to the seven layers of the OSI reference model.
21. What is Layered Network Architecture? REMEMBER CO1
BT-L1
 A layer is created when a different level of abstraction occurs at protocol.
 Each layer should perform a well defined function.
 Function of each layer should be chosen using internationality standardized protocols.
 Boundaries should be chosen to minimize information flow across the interfaces.
 A set of layers and protocol is called network architecture.
 A list of protocols used by a system is called protocol stack.
22. What are the three fundamentals characteristics does UNDERSTAND CO1
the effectiveness of a data communications system BT-L2
depends upon?
 Delivery- the system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
 Accuracy- the system must deliver data accurately.
 Timeliness-the system must deliver data in a timely manner.
23. What are the advantages of allowing persistent TCP UNDERSTAND CO5
connection in HTTP? BT-L2
 Lower CPU and memory usage (because fewer connections are open simultaneously).
 Enables HTTP pipelining of requests and responses.
 Reduced network congestion (fewer TCP connections).
 Reduced latency in subsequent requests (no handshaking).
 Errors can be reported without the penalty of closing the TCP connection.
These advantages are even more important for secure HTTPS connections, because
establishing a secure connection need much more CPU time and network round-trips.
24. What is POP3? REMEMBER CO5
BT-L1
 Post Office Protocol 3 (POP3) is the most recent version of a standard protocol for
receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for
you by your Internet Server.
 POP and IMAP deal with the receiving of e-mail and are not to be confused with the
Simple Mail Transfer Protocol(SMTP), a protocol for transferring e-mail across the
Internet.
25. What are the transmission modes of FTP? REMEMBER CO5
BT-L1
 Stream mode: Default mode and data is delivered from FTP to TCP as a continuous
stream of data.
 Block mode: Data is delivered from FTP to TCP in terms of blocks. Each data block
follows the three byte header.
 Compressed mode: File is compressed before transmitting if size is big. Run length
encoding method is used for compression.

CN 1.20 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

26. Define MIME. REMEMBER CO5


BT-L1
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the
format of email to support
 Text in characters sets other than ASCII
 Non-text attachments: audio, video, images, application programs
 Message bodies with multiple parts
 Header information in non-ASCII character sets.
27. What is the use of MIME Extension? UNDERSTAND CO5
BT-L2
 MIME converts binary files, executed files into text files. Then only it can be transmitted
using SMTP.
 SMTP cannot transmit text data including national language characters. MIME translates
all these non ASCII codes to SMTP 7 bit ASCII code.
 Messages - more than certain size can be translated by MIME into SMTP acceptable size
MIME is needed to transfer audio and video through SMTP (i.e.) non text data.

PART-B
1. (i) Explain with an example the basic communication model?. UNDERSTAND CO1
(6) BT-L2
(ii) Explain the topologies of the network. (7)
2. Explain the advantages and disadvantages of Bus and Star UNDERSTAND CO1
topologies. (13) BT-L2
3. Draw the ISO-OSI architecture and outline the functions UNDERSTAND CO1
performed by each layer. (13) BT-L2
4. List and discuss about the various layers of TCP/IP protocol REMEMBER CO1
architecture. (13) BT-L1
5. Explain SMTP in detail. (13) REMEMBER CO1
BT-L1
6. Describe the message format and the message transfer and the UNDERSTAND CO5
underlying protocol involved in the working of the electronic BT-L2
mail. (13)
7. Discuss in detail about DNS and its frame format. (13) UNDERSTAND CO5
BT-L2
8. Write shorts on DNS. (13) UNDERSTAND CO5
BT-L2
9. Discuss the needed for name resolution. Illustrate the domain UNDERSTAND CO5
name hierarchy and the steps in resolution. (13) BT-L2
10. Explain in detail about HTTP. (13) UNDERSTAND CO5
BT-L2
11. Write shorts on FTP. (13) REMEMBER CO5
BT-L1
12. Explain the SNMP protocol in detail. (13) REMEMBER CO5
BT-L1
13. Compare and contrast TCP/IP protocol suite with OSI model.(13) UNDERSTAND CO5
BT-L2
14. Discuss in detail about the TCP/IP protocol suite. (13) UNDERSTAND CO1
BT-L2
15. Compare SMTP and HTTP. Give their uses, state strength UNDERSTAND CO5
and weaknesses. (13) BT-L2

CN 1.21 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

PART-C
1. An employee of an organization bring his own device and connects APPLY CO1
it to network and request for a webpage in the given scenario BT-L3
illustrate the operation of each layer of OSI Model with neat
diagram. (15)
2. Suppose a 128-kbps point-to-point link is setup between the APPLY CO1
earth and a rover on mars. The distance from the earth to mars BT-L3
(when they are closest together) is approximately 55 giga
meters and the data travels over the link at the speed of light at
3 x 108 m/s.
(1)Calculate the minimum RTT for the link.
(2)Calculate the delay-bandwidth product for the link.
A camera on the rower takes pictures of it’s surroundings and
sends these to earth. How quickly after a picture is taken, can it
reach mission control on earth? Assume that each image is 5 mb
in size. (15)

UNIT – II – TRANSPORT LAYER


PART – A

1. What are the five main categories of transport layer UNDERSTAND CO2
services? BT-L2
 End to End Delivery
 Addressing
 Reliable Delivery
 Flow Control
 Multiplexing
2. Mention any two transport layer service. UNDERSTAND CO2
BT-L2
Multiplexing: Transport layer performs multiplexing or demultiplexing function. Multiple
applications employ same transport protocol, but use different port number. According to
lower layer n/w protocol, it does upward multiplexing or downward multiplexing.
Reliability: Error Control and Flow Control.
3. What is TCP? REMEMBER CO4
BT-L1
Transmission Control Protocol (TCP) provides Connection oriented and reliable services.
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol,
meaning that each TCP connection supports a pair of byte streams, one flowing in each
direction. It is used by FTP, SMTP. The different phases in TCP state machine are Connection
Establishment, Data transfer and Connection Release. TCP services to provide reliable
communication are Error control, Flow control, Connection control and Congestion control.
4. What is UDP? REMEMBER CO4
BT-L1
 UDP (User Datagram Protocol) is a connectionless, unreliable protocol that has no flow
and error control. It uses port numbers to multiplex data from the application layer. The
Internet protocol suite supports a connectionless transport protocol called UDP.
 It provides a way for applications to send encapsulated IP datagram without having to
establish a connection.

CN 1.22 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

5. What is the main difference between TCP & UDP? UNDERSTAND CO2
BT-L2

TCP UDP
It provides Connection oriented service Provides connectionless service.
Connection Establishment delay will be No connection establishment delay
there
Provides reliable service Provides unreliable, but fast service
It is used by FTP, SMTP It is used by DNS, SNMP, audio, video and
multimedia applications.
6. What is a Port? REMEMBER CO2
BT-L1
A computer port is a type of electronic, software or programming-related docking point
through which information flows from a program on your computer or to your computer
from the Internet or another computer in a network.
7. How congestion occurs in a network? UNDERSTAND CO2
BT-L2
 Too many packets present in (a part of) the network causes packet delay and loss that
degrades performance. This situation is called congestion.
 Congestion can occur on a router when packets arrive at a greater rate than possible rate
to forward.
8. Outline stop-and-wait ARQ mechanism. UNDERSTAND CO2
BT-L2
 Stop-and-wait ARQ means Stop-and-wait automatic repeat request.
 Here, the sender keeps a copy of the sent frame and at the same time, it starts a timer.
 If the timer expires and there is no ACK for the sent frame, the frame is resent, the copy
is heldand the timer is restarted.
 Since the protocol uses the stop-and-wait mechanism, there is only one specific
frame that needs an ACK even though several copies of the same frame can be in the
network.
Thus, this protocol automatically sends the frame and also repeatedly, until it gets
the ACK.
9. What is piggybacking? REMEMBER CO2
BT-L1
 The inclusion of acknowledgment on a data frame is called as piggybacking.
 That is, when a frame is carrying data from node A to B, it also carries control information
(acknowledgement) about frames from B and similarly, when a frame is carrying data from
B to A, it also carries control information about frames from A.This technique is used to
improve the efficiency of the bidirectional protocols.
10. List the advantages of connection-oriented UNDERSTAND CO2
services. BT-L2
Advantages of connection-oriented services are,
 In connection-oriented virtual circuits, buffers can be reserved in advance.
 Sequencing can be guaranteed and Short-headers can be used.
 Troubles caused by delayed duplicate packets can be avoided.
11. HLEN of TCP is 0111. Find number of bytes of options APPLY CO4
included in the segment. BT-L2
(0111)2 = 7
Total length of header =(7*4=28, multiples of 4)
Base header = 20 bytes
Segment 28-20 = 8 bytes of options.

CN 1.23 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

12. How does transport layer perform duplication control? REMEMBER CO2
BT-L1
 If ACK lost, segment is re-transmitted
 Receiver must recognize duplicates
 Duplicate received prior to closing connection
o Receiver assumes ACK lost and ACKs duplicate
o Sender must not get confused with multiple ACKs
o Sequence number space large enough to not cycle
o within maximum life of segment
 Duplicate received after closing connection.
13. Mention the use of flow control and congestioncontrol. UNDERSTAND CO2
BT-L2
 Flow control is used to balance the rate at which bits are produced by the sender with
the rate at which bits are consumed by the receiver. This matches the speed of a sender
with the capabilities of a receiver.
 Congestion control is used to regulate the rate at which senders generate traffic in order
to avoid the over-utilization of the resources available within network. This prevents
network congestion, could lead to a network collapse.
14. What is meant by delay and jitter? REMEMBER CO2
BT-L1
 Delay is the amount of time data (signal) takes to reach the destination.
 A higher delay generally means congestion of some sort of breaking of the communication
link.
 Jitter is the variation of delay time.
 This happens when a system is not in deterministic state.
Eg: Video streaming suffers from jitter a lot because the size of data transferred is quite
large and hence no way of saying how long it might take to transfer.
15. Why UDP pseudo header is included in UDP UNDERSTAND CO4
checksum calculation? BT-L2
 The basic idea is that the UDP checksum is a complement of a 16-bit one's
complement sumcalculated over an IP "pseudo-header" and the actual UDP data.
 The IP pseudo-header is the source address, destination address, protocol (padded with a
zero byte) and UDP length.
16. How can the effect of jitter be compensated? What UNDERSTAND CO1
type of application requires this compensation? BT-L2
 Jitter is defined as a variation in the delay of received packets.
 The sending side transmits packets in a continuous stream and spaces them evenly apart.
Because of network congestion, improper queuing or configuration errors, the delay
between packets can vary instead of remaining constant.
 Cisco voice networks compensate for jitter by setting up a buffer, called the “jitter buffer”
on the gateway router at the receiving end of the voice transmission.
17. What do you mean by QoS? REMEMBER CO2
BT-L1
 The quality of service defines a set of attributes related to the performance of the
connection. For each connection, the user can request a particular attribute.
 Thereby, the attributes can be categorized into those related to the user and those
related to the network.

CN 1.24 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

18. Explain end-to-end delivery in the transport layer and UNDERSTAND CO2
end-to- end delivery in the network layer? BT-L2
 The network layer must be present on all systems and delivers packets hop-by-hop
between adjacent intermediate systems (routers or gateways) or end systems (hosts).
 The transport layer can technically be absent from intermediate systems and delivers
packet content end-to- end between hosts.
 The network layer is usually “unreliable” and connectionless but the transport layer often
adds a measure of reliability (such as resending missing or errored packet content) and
connectionsto the network layer.
 The network layer has the network address, while the transport layer focuses on ports
and multiplexing application’s traffic on the network.
19. What are the advantages of using UDP over TCP? UNDERSTAND CO4
BT-L2
The advantages of using UDP over TCP are
 UDP does not need the overhead required to detect reliability.
 It does not need to maintain the unexpected deception of data flow.
 UDP requires less processing at the transmitting and receiving of hosts.
 UDP is light weight.
 No need to maintain UDP connections information.
 UDP is faster than TCP.
20. What factors determine the reliability of a delivery? UNDERSTAND CO2
BT-L2
The factors are
 Error control
 Sequence control
 Loss control
 Duplication control
21. What are the fields in the TPDU? REMEMBER CO2
BT-L1
The fields of TPDU are
 Length
 Fixed parameters
 Variable parameters
 Data
22. Define congestion. REMEMBER CO2
BT-L1
Congestion in a network occurs if user sends data into the network at a rate greater than that
allowed by network resources. Any given node has a number of I/O ports attached to it.
There are two buffers at each port. One to accept arriving packets & another one to hold
packets that are waiting to depart. If packets arrive too fast node than to process them or
faster than packets can be cleared from the outgoing buffers, then there will be no empty
buffer. Thus causing congestion and traffic in the network.
23. Name the policies that can prevent (avoid) congestion. UNDERSTAND CO2
BT-L2
 DEC (Digital Equipment Corporation) bit.
 Random Early Detection (RED).
 Source based congestion avoidance.
The congestion may be avoided by two bits:
BECN - Backward Explicit Congestion Notification
FECN - Forward Explicit Congestion Notification.

CN 1.25 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

24. What are the two categories of QoS attributes? UNDERSTAND CO2
BT-L2
User Oriented and Network Oriented. User related attributes are
 SCR – Sustainable Cell Rate
 PCR – Peak Cell Rate
 MCR- Minimum Cell Rate
 CVDT – Cell Variation Delay Tolerance.
The network related attributes are, Cell loss ratio (CLR), Cell transfer delay (CTD), Cell delay
variation (CDV), Cell error ratio (CER).
25. If data length is 16 bytes, calculate the efficiency of APPLY CO4
transmission in TCP. BT-L2
Data length = 16 bytes
TCP header = 20 bytes
Efficiency = 16 = 0.444 = 44.4%
16+20
26. Define SCTP. REMEMBER CO4
BT-L1
Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport
layer protocol. SCTP, however, is mostly designed for Internet applications that have
recently been introduced.
These new applications, such as IUA (ISDN over IP), M2UA and M3UA (telephony signaling),
H.248 (media gateway control), H.323 (IP telephony), and SIP (IP telephony), need a more
sophisticated service than TCP can provide. SCTP provides this enhanced performance and
reliability.
27. What is meant by segmentation? REMEMBER CO2
BT-L1
When the size of the data unit received from the upper layer is too long for the network layer
datagram or data link layer frame to handle, the transport protocol divides it into smaller
usable blocks. This dividing process is called as segmentation

PART-B
1. i. Draw the TCP header format. (7) UNDERSTAND CO4
ii. Demonstrate how TCP three-way handshake works. (6) BT-L2
2. i. List the applications of UDP. (3) UNDERSTAND CO4
ii. Explain the UDP header format (6) BT-L2
iii. Difference between TCP and UDP. (4)
3. What are the two broad categories of Congestion Control REMEMBER CO2
mechanisms? Briefly explain all the techniques. (13) BT-L1
4. Explain any two TCP congestion control mechanisms with an REMEMBER CO2
example. (13) BT-L1
5. i. Compare the features of TCP and UDP. (7) UNDERSTAND CO4
ii.Explain the TCP header format. (6) BT-L2
6. Draw and explain about TCP state transition diagram. (13) UNDERSTAND CO4
BT-L2
7. Illustrate and explain UDP with its packet format. (13) UNDERSTAND CO4
BT-L2
8. Explain the adaptive flow control and retransmission UNDERSTAND CO2
techniques used in TCP. (13) BT-L2
9. Elaborate on purpose and functions of SCTP. (13) UNDERSTAND CO4
BT-L2
10. Discuss in detail connection establishment and termination REMEMBER CO2
using three-way handshaking protocol. (13) BT-L1

CN 1.26 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

11. Explain various error control techniques used in TCP. UNDERSTAND CO4
(13) BT-L2
12. Furnish the packet format of Stream Control Transmission UNDERSTAND CO4
Protocol with its fields. How are the data transferred with four BT-L2
way handshaking? (13)
13. List out various flow control mechanisms used in TCP and REMEMBER CO2
explain each one briefly. (13) BT-L1
14. Write the various services of transport layer and explain them in UNDERSTAND CO4
detail. (13) BT-L2
15. Define port. List out various port numbers and its UNDERSTAND CO2
significance. (13) BT-L2
16. Explain congestion avoidance using random early UNDERSTAND CO2
detection in transport layer with an example. (13) BT-L2
17. Specify the justification for having variable field lengths for the UNDERSTAND CO2
fields in TCP header. (13) BT-L2
18. Describe how reliable and ordered delivery is achieved through UNDERSTAND CO2
TCP. (13) BT-L2
19. Explain the working of the TCP protocol. (13) UNDERSTAND CO4
BT-L2
20. Explain the following UNDERSTAND CO2
i) Debit ii) RED (13) BT-L2

PART-C
1. (i) Draw the format of TCP packet header and explain each of UNDERSTAND CO4
its field. (10) BT-L2
(ii) Specify the justification for having variable field lengths
for the fields in the TCP header. (5)
2. Elaborate on TCP congestion control mechanisms. UNDERSTAND CO2
Differentiate these mechanisms. (15) BT-L2

UNIT – III - NETWORK LAYER


PART – A

1. Define IPV4 protocol. REMEMBER


CO4
BT-L1
IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol (IP) used to
identify devices on a network through an addressing system. The Internet Protocol is
designed for use in interconnected systems of packet-switched computer communication
networks.IPv4 is the most widely deployed Internet protocol used to connect devices to the
Internet. IPv4 uses a 32 bit address scheme.

2. Define IPV6 protocol. REMEMBER CO4


BT-L1

IPv6 (Internet Protocol Version 6) is the most recent version of the Internet Protocol (IP),
the communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet. IPV6 was developed by the
Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPV4
address exhaustion. IPv6 is intended to replace IPV4.

CN 1.27 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

3. List the difference between IPv4 and IPv6. UNDERSTAND


CO 2
BT-L2
Terms IPv4 IPv6
Bytes Source and destination Source and Destination
address are 32 bit or addresses are 128 bit or
4 Bytes 16 bytes
Check sum Header includes checksum Header does not include
checksum
Option Header includes options All optional data is
moved to IPv6
extension header
IP Man Manual or DHCP No need of manual
Configuration based IPconfiguration or DHCP
configuration. Nodes
are capable of
auto-configuration
4. Why IPv6 is preferred over IPv4? UNDERSTAND CO4
BT-L2
The Internet Protocol Version 6 (IPV6) is more advanced and has better features compared to
IPv4. It has the capability to provide an infinite number of addresses. It is replacing IPv4 to
accommodate the growing number of networks worldwide and help solve the IP address
exhaustion problem.
5. Define subnetting. REMEMBER CO2
BT-L1
Subnetting enables the network administrator to further divide the host part of the
address into two or more subnets. In this case, a part of the host address is reserved to
identify the particular subnet. This is easier to see if we show the IP address in binary
format.
6. Find the class of each address. a) 11000001 APPLY CO4
10000011 00011011 11111111 b) 252.5.15.111 BT-L3
The first 2 bits are 1; the third bit is 0. This is a class C address. The first 1 bits are 1; the
second bit is 0. This is a class B address. The first 2 bits are 0; the third bit is 0. This is a
class Aaddress. The first 2 bits are 1; the third bit is 1. This is a class E address.
The first byte is 252 (between 240 and 255); the class is E.
7. Present an outline of IPv6 addressing. UNDERSTAND CO4
BT-L2
 IPv6 – Internet Protocol Version 6
 An IPv6 address consists of 16 bytes and thus it is 128 bits long.
 IPv6 has a much larger address space with 2128 addresses are available.
 IPv6 addresses are represented both in binary and hexadecimal colon notation.
Eg: FDEC: 0074 : 0024 : 00A1 : 0B45 : BOFF : 0010 : FFFO
8. Why is IPv4 to IPv6 transition required? UNDERSTAND CO4
BT-L2

 Auto Configuration - Auto Configuration is now built in and helps make IP addressing
more manageable. With IPv4, we relied on DHCP or manually configurating IP addresses.
 Direct Addressing - With Direct Addressing, the primary use of NAT (Network Area
Translation) now becomes obsolete with IPv6. So, Direct Addressing is now possible.
 Mobility - Mobility is better integrated into IPv6 than it is with IPv4. It makes it easier for
users to roam to different networks and keep their same IP address.
 Improved Integrated Security (IPSec) - IPSec is now integrated into IPv6, while with
IPv4 it was more an add-on.
CN 1.28 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks

9. What are the salient features of IPv6? REMEMBER CO4


BT-L1
Salient features of IPv6 are,
 Larger address space.
 Better header format.
 New options.
 Allowance for extension.
 Support for resource allocation.
 Support for more security.
IPv6 networks provide auto configuration capabilities and Better support for QOS.
10. What is IP addressing? REMEMBER CO4
BT-L1
An addressing scheme that assigns address to the various hosts present in the network is
called as IP addressing or logical addressing. And the address assigned is called as IP
address. IP address is a 32-bit address assigned to each host in a computer network that
uses internet protocol for communication.
11. What is the need of Subnetting? REMEMBER CO2
BT-L1

Subnetting reduces the total number of network numbers by assigning a single network
number to many adjacent physical networks.
 Each physical network is referred to as subnet
 For subnetting, the subnets must be close to each other.
For example, each department having a network within a college campus with a router
connecting to the external world.
12. What is DHCP? REMEMBER CO4
BT-L1
 DHCP - Dynamic Host Configuration Protocol.
 It runs at application layer of TCP/IP.
 It assigns static and dynamic IP addresses to DHCP clients.
 A DHCP server has a database that statically binds physical addresses to IP addresses and
DHCP server has a second database with a pool of available IP addresses. This second
database makesDHCP dynamic.
13. Define ICMP. REMEMBER CO4
BT-L1
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet
protocol suite. It is used by network devices, including routers, to send error message and
operational information indicating, for example, that a requested service is not available or
that a host or router could not be reached.
14. When is ICMP redirect message used? UNDERSTAND CO4
BT-L2
An ICMP redirect is an error message sent by a router to the sender of an IP packet. Redirects
are used when a router believes a packet is being routed sub optimally and it would like to
inform the sending host that it should forward subsequent packets to that same destination
through a different gateway.
15. What is meant by ARP? REMEMBER CO4
BT-L1
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-
changing Internet Protocol (IP) address to a fixed physical machine address, also known as a
media access control (MAC) address, in a local-area network (LAN).
CN 1.29 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks

16. What is meant by RARP? REMEMBER CO4


BT-L1
The Reverse Address Resolution Protocol (RARP) is a networking protocol that is used to
map a physical (MAC) address to an Internet Protocol (IP) address. It is the reverse of the
more commonly used Address Resolution Protocol (ARP), which maps an IP address to a
MAC address.
17. Check whether the following IPv6 address notations APPLY CO4
are correct and expand it, if they are correct. BT-L3
(a) 0F53:6382::AB00:67DB::BB27
(b) 7803:42F2::88EC:D4BA:B75D:11CD
a) 0F53:6382::AB00:67DB::BB27
 This abbreviated IPv6 address is invalid, since replacing a series of zeros
(::) canoccur only once in the address notation.
 Here it occurs twice, so we are unable to determine the
address as 0F53:6382:0000:0000:AB00:67DB:0000:BB27
 0F53:6382:0000:AB00:67DB:0000:0000:BB27
(b) 7803:42F2::88EC:D4BA:B75D:11CD
 This abbreviated IPv6 address is valid, since replacing a series of zeros (::)
occurs onlyonce.
Expanded IPv6 address is as follows, 7803:42F2:0000:0000:88EC:D4BA:B75D:11CD
18. What is a Packet Switch? REMEMBER CO2
BT-L1
A packet switch is a device with several inputs and outputs leading to and from the hosts
that the switch interconnects. The core job of a switch is to take packets that arrive on an
input and forward them to the right outputs.
19. What is token holding time (THT)? REMEMBER CO2
BT-L1

 The THT (Token Holding Time) specifies the maximum amount of time a token ring MAC
(media access control) may use the token before releasing it. The inter arrival time is the
time between successive packet generations in the "ON" state.
 It defines that how much data a given node is allowed to transmit each time it possesses
the token or equivalently, how long a given node is allowed to hold the token.
20. When is ICMP redirect message used? UNDERSTAND CO4
BT-L2
An ICMP redirect is an error message sent by a router to the sender of an IP packet. Redirects
are used when a router believes a packet is being routed sub optimally and it would like to
inform the sending host that it should forward subsequent packets to that same destination
through a different gateway.
21. Highlight the characteristics of datagram networks. UNDERSTAND CO1
BT-L2

In datagram approach, each packet is treated independently from all others. Even when one
packet represents just a place of a multi packet transmission, the network treats it although
it existed alone. Packets in this technology are referred to as datagram
22. What is RTT? REMEMBER CO2
BT-L1
 RTT is an acronym for Round Trip Time.
 It is a measure of the time it takes for a packet to travel from a computer, across a
network to another computer and back.
CN 1.30 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks

23. What is silly window syndrome? REMEMBER CO2


BT-L1
 If the sender or the receiver application program processes slowly and can send only 1
byte ofdata at a time, then the overhead is high.
 This is because to send one byte of data, 20 bytes of TCP header and 20 bytes of IP
header are sent. This is called as silly window syndrome.
24. What is meant by TELNET? REMEMBER CO2
BT-L1
 The word telnet is derived by combining the telecommunication and network.
 Telnet is a protocol which provides the capability to log on to the remote computer.
 Hence it is otherwise called as remote login.
25. What is time-to-live or packet lifetime? REMEMBER CO2
BT-L1
As the time-to-live field is generated, each packet is marked with a lifetime, usually the
number of hops that are allowed before a packet is considered lost and accordingly,
destroyed. The time to-live determines the lifetime of a packet.

PART-B

1. (i) Illustrate IPV4 header format and compare UNDERSTAND CO4


with IPv6. (7) BT-L2
(ii) Explain when multicasting is used and explain how it
differs from unicasting. (6)
2. Give the purpose of IP and explain its importance in detail. REMEMBER CO4
(13) BT-L1
3. An ISP is given a block of addresses beginning with APPLY
190.100.0.0/16. The ISP needs to distribute these addresses BT-L3
to 3 groups of customers as follows : CO4
a) Group 1 has 64 customers each needs 56 addresses. (3)
b) Group 2 has 128 customers each needs 28addresses. (3)
c) Group 3 has 128 customers each needs 64addresses. (3)
Design the sub-blocks and give the slash notation for each
sub-block. how many addresses are still available after
these allocations ? (4)
4. Briefly explain various network layer services. (13) UNDERSTAND CO4
BT-L2
5. Explain the working of address resolution protocol with an REMEMBER CO4
example. (13) BT-L1
6. Elaborate on various classes of IPv4 addressing in detail. (13) REMEMBER CO4
BT-L1
7. (i) With a neat sketch explain IPv4 datagram packet format. UNDERSTAND CO4
(7) BT-L2
(ii)With a neat sketch explain IPv6 datagram packet format.
(6)
8. Discuss the notation, representation and address space of REMEMBER CO4
IPv6. (13) BT-L1
9. What are the new features of IPv6 and its improvements? (13) UNDERSTAND CO4
BT-L2
10. Compare and contrast IPv4 with IPv6. (13) UNDERSTAND CO4
BT-L2

CN 1.31 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

11. Write short notes on ICMP v4. (13) REMEMBER CO4


BT-L1
12. Explain how forwarding of IP packets is done. (13) UNDERSTAND CO4
BT-L2
13. Describe the subclasses of packet switched network. (13) UNDERSTAND CO4
BT-L2
14. Enumerate taxonomy of switched networks. (13) UNDERSTAND CO1
BT-L2
15. Differentiate between datagram networks with virtual circuit UNDERSTAND CO4
networks. (13) BT-L2

PART-C
1. (i) Outline IPv4 classful and classless addressing with APPLY CO4
examples. (10) BT-L3
(ii) Assume that you are given a network ID 165.121.0.0. You
are responsible for creating subnets on the network and each
subnet must provide atleast 900 host IDs. What subnet mask
meets the requirement for the minimum number of host IDs
and provides the greatest number ofsubnets? (5)
2. Why subnetting is necessary? With suitable example, develop APPLY CO2
the concept of subneting in class B network. (15) BT-L3

UNIT – IV – ROUTING
PART – A

1. Define routing. REMEMBER CO3


BT-L1
A destination node might be out of range of a source node transmitting packets. Routing is
needed to find a path between source and destination and to forward the packets
appropriately. A switch or router needs to be able to look at the packet’s destination address
and then to determine which of the output ports is the best choice to get the packet to that
address.
2. Define routing algorithm. REMEMBER CO3
BT-L1
 The algorithm that choose the routes and the data structures that they use are a major
area of network layer design.
 The routing algorithm is that part of the network layer software responsible for deciding
which output line an incoming packet should be transmitted on.
3. Mention any four application of multicasting. UNDERSTAND CO3
BT-L2
Many applications transmit the same data at one time to
a. Multiple receivers
b. Broadcasts of Radio or Video
c. Videoconferencing
d. Shared Applications
4. What is the function of a router? REMEMBER CO3
BT-L1
Routers relay packets among multiple interconnected networks. They route packets from
one network to any of a number of potential destination networks on the internet. A packet
sent from a station on one network to a station on the neighboring network goes first to the
jointly held router, which switches it over to the destination network.

CN 1.32 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

5. How do routers forward the incoming Unicast IP UNDERSTAND CO3


packets? BT-L2

 In unicast communication, there is one source and one destination.


 The relationship between the source and the destination is one-to-one.
 In this type of communication, both the source and destination addresses, in the IP
datagram,are the unicast addresses.
 In unicasting, the router forwards the incoming unicast IP packet through only one
of its interfaces, to the single destination in the network.
6. How do routers forward the received multicast IP UNDERSTAND CO3
packets? BT-L2
 In multicast communication, there is one source and a group of destinations. The
relationship is one-to-many.
 In this type of communication, the source address is a unicast address, but the
destination address is a group address, which defines two or more destinations.
 In multicasting, the router forwards the received multicast IP packets through many
interfaces, to reach many destinations in the network.
7. What is routing table? REMEMBER CO3
BT-L1

The routing table is the table that is built up by the routing algorithms as a precursor to
building the forwarding table. It generally contains mappings from network numbers to
next hops. It may also contain information about how this information was learned, so that
the router will be able to decide when it should discard some information.
8. Compare static routing table with dynamic UNDERSTAND CO3
routing table. BT-L2
Static routing table Dynamic routing table
1. A static routing table contains 1. A dynamic routing table contains
information entered manually. information entered dynamically.
2. The administrator enters the route for 2. Dynamic routing protocols such as
each destination into the table. RIP, OSPF or BGP updates the table
periodically.
3. When there is a change in the internet, 3. Whenever there is a change in the
it cannot update automatically. internet, dynamic routing protocols
updates automatically.
4. A static routing table can be used in 4. A dynamic routing table can be used
small networks that does not change very in large networks like internet, where
often. changes occur very often.
5. It is not efficient in delivery of IP packets 5. It is more efficient in delivery of IP
in internet. packets in internet.
9. What are the benefits of OSPF protocol? UNDERSTAND CO3
BT-L2
OSPF - Open Shortest Path First It is a network layer protocol.
OSPF is an interior routing protocol based on link state routing. Benefits of OSPF
protocol are,
 OSPF uses "cost" metric to choose best path.
 Efficiency: RIP does routing updates for every 30 seconds, but OSPF multicasts link-
stateupdates and sends the updates only when there is a change in the network.
 Unlimited hop counts: RIP networks are limited to 15 hops. Therefore, networks with
more than 15 hops cannot be reached by RIP by normal means. On the other hand,
OSPF has practically no limitations in hop counts.
CN 1.33 KCE/CSE / QB /III YR /CN
Subject code/Name: CS3591/Computer Networks

 Fast convergence of OSPF: OSPF network converges faster and the route changes are
floodedimmediately in the shortest time.
 Good security: OSPF supports interface-based plaintext and md5 authentication.
OSPF adapts to various scales of networks, up to thousands of units.

10. Define BGP. REMEMBER CO3


BT-L1
 Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to
exchange routing and reachability information among Autonomous System (AS) on the
Internet. The protocol is often classified as a path vector protocol but is sometimes also
classed as a distance vector routing protocol.
 The BGP makes routing decisions based on paths, network policies, or rule sets configured
by a network administrator and are involved in making core routing decisions.
11. What is RIP? REMEMBER CO3
BT-L1
RIP (Routing Information Protocol) is a widely-used protocol for managing router
information within a self-contained network such as a corporate local area network or an
interconnected group of such LANs. Using RIP, a gateway host (with a router) sends its
entire routing table (which lists all the other hosts it knows about) to its closest neighbor
host every 30 seconds. The neighbor host in turn will pass the information on to its next
neighbor and so on until all hosts within the network have the same knowledge of routing
paths, a state known as network convergence.
12. What is PIM? REMEMBER CO3
BT-L1
Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for Internet
Protocol (IP) networks that provide one-to-many and many-to-many distribution of data
over a LAN, WAN or the Internet. It is termed protocolindependent because PIM does not
include its own topology discovery mechanism, but instead uses routing information
supplied by other routing protocols. There are four variants of PIM:
 PIM Source-Specific Multicast
 Bidirectional PIM
 PIM Dense Mode
 PIM Sparse Mode
13. What is DVMRP? REMEMBER CO3
BT-L1
The Distance Vector Multicast Routing Protocol (DVMRP), is a routing protocol used to share
information between routers to facilitate the transportation of IP multicast packets among
networks. The protocol is based on the RIP protocol. The router generates a routing table
with the multicast group of which it has knowledge with corresponding distances. When a
multicast packet is received by a router, it is forwarded by the router's interfaces specified in
the routing table.

14. How do routers differentiate the incoming Unicast, UNDERSTAND CO3


Multicast and Broadcast IP packets? BT-L2
Unicast addresses – represent a single LAN interface. A unicast frame will be sent to
a specific device, not to a group of devices on the LAN.
Multicast addresses – represent a group of devices in a LAN. A frame sent to a
multicast address will be forwarded to a group of devices on the LAN.
Broadcast addresses – represent all device on the LAN. Frames sent to a broadcast address
will be delivered to all devices on the LAN.

CN 1.34 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

15. Compare RIP and OSPF. UNDERSTAND CO3


BT-L2

S.No RIP OSPF


1. Follows distance vector. Follows link state routing.
2. RIP takes hop count into consideration
OSPF takes Path Cost into consideration
to exchange routing information
3. RIP performs well when network size is While OSPF is mostly used for large
small. network.
4. RIP is only good for 16 hops. But OSPF can reach unlimited hop
counts.
5. No error detection / correction It has own error detection / correction
function. function.
16. Differentiate between forwarding table and routing UNDERSTAND CO3
table. BT-L2
A routing table uses a packet's destination IP address to determine which IP address should
next receive the packet, that is, the "next hop" IP address. A forwarding table uses the "next
hop" IP address to determine which interface should deliver the packet to that next hop, and
which layer 2 address (e.g., MAC address) should receive the packet on multipoint interfaces
like Ethernet or Wi-Fi.
17. State Distance vector routing. REMEMBER CO3
BT-L1
 A distance vector routing algorithm operates by having each router maintain a table (i.e:
a vector) giving the best known distance to each destination and which link to use to get
there.
 These tables are updated by exchanging information with the neighbors. Eventually,
every router knows the best link to reach each destination.
18. How the packet cost referred in distance vector and link REMEMBER CO3
BT-L1
state routing?
In distance vector routing, cost refer to hop count while in case of link state routing,
cost is a weighted value based on a variety of factors such as security levels, traffic
or the state ofthe link.
19. Differentiate between forwarding table and routing UNDERSTAND CO3
table. BT-L2

A routing table uses a packet's destination IP address to determine which IP address should
next receive the packet, that is, the "next hop" IP address. A forwarding table uses the "next
hop" IP address to determine which interface should deliver the packet to that next hop, and
which layer 2 address (E.g., MAC address) should receive the packet on multipoint interfaces
like Ethernet or Wi-Fi.

20. Define router metric. REMEMBER CO3


BT-L1
 Router metric is defined as the metric used by a router to make routing decisions, that is
tochoose the best route among multiple feasible routes to a destination.
 A metric is one of many fields in a routing table.
Eg: Hop count, delay or latency, maximum transmission unit (MTU), path cost etc

CN 1.35 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

21. List out some routing algorithm types. UNDERSTAND CO3


BT-L2
1. Adaptive Algorithms
 Isolated
 Centralized
 Distributed
2. Non-Adaptive Algorithms
 Flooding
 Random walk
3. Hybrid Algorithms
 Link state
 Distance vector
22. State Link state routing. REMEMBER CO3
BT-L1

 Link state routing is the second family of routing protocols. While distance vector routers
use a distributed algorithm to compute their routing tables, link-state routers exchange
messages to allow each router to learn the entire network topology.
 Based on this learned topology, each router is then able to compute its routing table by using
a shortest path computation (Dijkstra). For link state routng , a network is modeled as a
directed weighted graph.
23. State the rules of non boundary-level masking. UNDERSTAND CO3
BT-L2

 The bytes in the IP address that corresponds to 255 in the mask will be repeated in the
sub network address
 The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub
network address
 For other bytes, use the bit-wise AND operator.
Example
IP address 45 123 21 8
Mask 255 192 0 0
Subnet 45 64 0 0 123 0 1 1 1 1 0 1 1 192 1 1 0 0 0 0 0 0 64 0 1 0 0 0 0 0 0
24. What are the metrics used by routing protocols? UNDERSTAND CO3
BT-L2
The metrics used by routing protocols are,
 Hop count
 Delay or latency
 Maximum Transmission Unit (MTU)
 Path cost
 Path reliability
 Bandwidth
 Load
25. What is the role of VCI? REMEMBER CO3
BT-L1
An Incoming virtual circuit identifier (VCI) uniquely identifies the connection at this switch
and that will be carried inside the header of the packets that belong to this connection. It is a
potentially different outgoing VCI that will be used for outgoing packets. The combination of
incoming interface and incoming VCI uniquely identifies the virtual connection. VCI assigned
by network admin is an unused value on that interface and VCIs are unique on a link and not
on entire network. Also incoming and outgoing VCIs need not be same.

CN 1.36 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

PART – B
1. Explain what is Distance Vector Routing and UNDERSTAND CO3
Demonstrate how distance table gives routingtable. (13) BT-L2
2. Explain when is multicasting used and explain how UNDERSTAND CO3
it differs from unicasting. (13) BT-L2
3. What are the different routing algorithms ? List out UNDERSTAND CO3
their pros and cons. (13) BT-L2
4. Outline distance vector routing with an example REMEMBER CO3
and relevant diagrams. (13) BT-L1
5. Illustrate multicasting routing protocols briefly. (13) REMEMBER CO3
BT-L1
6. Explain in detail the unicast routing algorithms. (13) REMEMBER CO3
BT-L1
7. Discuss on link state routing protocol in detail. (13) REMEMBER CO3
BT-L1
8. Explain in detail the operation of OSPF protocol by UNDERSTAND CO3
considering a suitable network. (13) BT-L2
9. Examine the function of the Border Gateway Protocol REMEMBER CO3
used for Inter domain routing in internetwork. (13) BT-L1
10. With an example network scenario explain the UNDERSTAND CO3
mechanism of Routing Information Protocol and specify BT-L2
the routing table contents. (13)
11. Explain in detail about DVMRP. (13) UNDERSTAND CO3
BT-L2
12. Explain in detail about PIM. (13) REMEMBER CO3
BT-L1
13. (i)Describe in detail about reliable flooding. (6) REMEMBER CO3
(ii) Explain Link State Packet in detail. (7) BT-L1
14. Compare Classful Addressing and Classless Addressing. UNDERSTAND CO3
(13) BT-L2
15. Describe the working of RIP with neat diagram and UNDERSTAND CO3
state the major between RIP and OSPF. (13) BT-L2

PART – C
1. i) Consider sending a 2400-byte datagram into a link that has APPLY CO4
an MTU of 700 bytes. Suppose the original datagram is BT-L3
stamped with the identification number 422. How many
fragments are generated? What are the values in the various
fields in the IP datagram(s) generated related to
fragmentation? (8)
(ii) Discuss the fundamentals and advantages of Open Shortest
Path First protocol. (7)

CN 1.37 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

UNIT – V – DATA LINK AND PHYSICAL LAYERS


PART – A
1. What are the functions of data link layer? REMEMBER CO2
BT-L1
The functions of data link layer are as follows,
 Framing
 Physical addressing
 Flow control
 Error control
 Access control
2. What is meant by framing? REMEMBER CO2
BT-L1
The data link layer divides the stream of bits received from the network layer into
manageable data units called frames.And similarly, data link layer groups the stream of
bits received from the physical layerinto manageable data units called frames.
This process of dividing and grouping of bits by the data link layer is called as framing.
3. Write short notes on error correction. REMEMBER CO2
BT-L1
It is the mechanism to correct the errors and it can be handled in 2 ways. When an error
is discovered, the receiver can have the sender retransmit the entire data unit. A
receiver can use an error correcting coder, which automatically corrects certain errors.
4. What is meant by circuit switching? REMEMBER CO2
BT-L1
A circuit switch is a device with n inputs and m outputs that creates a temporary
connection between an input link and output link. The number of inputs does not have to
match the number of outputs.
5. What are the steps followed in checksum generator? UNDERSTAND CO2
BT-L2
The sender follows these steps
a) the units are divided into k sections each of n bits.
b) All sections are added together using 2‟s complement to get the sum.
c) The sum is complemented and become the checksum.
d) The checksum is sent with the data.
6. Define flow control. REMEMBER CO2
BT-L1
 Flow control refers to a set of procedures used to restrict the amount of data. The
sender can send before waiting for acknowledgment from the receiver.
 Flow control mechanism makes sender to wait for an acknowledgement from receiver,
before continuing further transmission from sender side.
7. What is meant by error control? REMEMBER CO2
BT-L1
The detection and handling of errors in data transmission.
Error Detection
Error detection is the process of detecting the error during the transmission between the
sender and the receiver.
Types of error detection
 Parity checking
 Cyclic Redundancy Check (CRC)
 Checksum
Error Correction
This type of error control allows a receiver to reconstruct the original information when it
has been corrupted during transmission.
 Hamming Code.

CN 1.38 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

8. What are the steps followed in checksum generator? UNDERSTAND CO2


BT-L2
The sender follows these steps
a) The units are divided into k sections each of n bits.
b) All sections are added together using 2‟s complement to get the sum.
c) The sum is complemented and become the checksum.
d) The checksum is sent with the data
9. What is the purpose of hamming code? UNDERSTAND CO2
BT-L2
A hamming code can be designed to correct burst errors of certain lengths. So the simple
strategy used by the hamming code to correct single bit errors must be redesigned to be
applicable for multiple bit correction
10. Define Simplex, Half Duplex, Full Duplex transmission REMEMBER CO2
system. BT-L1
Full duplex transmission: Two stations can simultaneously send and receive data from
each other.
Half duplex transmission: Stations can send and receive data from each other. The
signals are transmitted in one direction at a time.
Simplex transmission: Only one way of communication is possible Always, One is the
sender and another one is the receiver.
11. What are the two types of transmission technology? UNDERSTAND CO2
Differentiate Point to Point and multipoint connection. BT-L2
Line Configuration refers to the way in which two or more communication devices are
attached to a link. It is categorized into two types
 Point-to-Point It provides a dedicated link between two devices. Entire capacity of the
channel is reserved between two devices.
 Multi-Point :It is one in which more than two specific devices share a single channel.
12. What are types of transmission media? UNDERSTAND CO2
BT-L2
 Guided is wired transmission in which data signals are guided along a physical path
(i.e) within a wire.
 Unguided communication is wireless transmission. To exchange bits of data for laptop,
notebook, smart watches, without wires.
13. Mention the advantage and disadvantage of error UNDERSTAND CO2
correction by receiver, as compared to error detection. BT-L2
 Error correcting codes are more sophisticated than error detection codes and require
more redundancy bits.
 The number of bits required correcting a multiple-bit or burst error is so high that in
most cases it is inefficient to do so.
14. What are the two different types of errors occurred UNDERSTAND CO2
during data transmission? BT-L2
When an electromagnetic signal flows from one point to another, it is subject to
unpredictable interference from heat, magnetism and other forms of electricity. This
interference can change the shape or timing of the signal. If the signal is carrying encoded
binary data, such changes can alter the meaning of the data.
Types of Errors
 Single Bit Error
The term single bit error means that only one bit of the data unit was changed from
1 to 0 and 0 to 1.
 Burst Error
In term burst error means that two or more bits in the data unit were changed.
Burst error is also called packet level error, where errors like packet loss,
duplication, reordering.

CN 1.39 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

15. What is the average size of Ethernet frame? REMEMBER CO2


BT-L1
IEEE 802.3 Ethernet, the world's most popular LAN technology It is widely used in 10
Mbps, 100, Mbps, and 1000 Mbps (also called Gigabit Ethernet) varieties. This technology
for framing bits can be supported by many types of physical media (Copper wires, Fiber-
Optics, Wireless, Coax).Ethernet Frames can range in size from 64 bytes (512 bits) up to
1518 bytes (12144 bits) in size.
16. How is the minimum size of an Ethernet frame REMEMBER CO2
determined? BT-L1
By defining the minimum Ethernet frame size, you ensure that all necessary information is
being transferred at each transmission. The minimum frame size breaks down like this:
Size is 64 bytes.
o Destination Address (6 bytes)
o Source Address (6 bytes)
o Frame Type (2 bytes)
o Data (46 bytes)
o CRC Checksum (4 bytes)
46 bytes must be transmitted at a minimum, with additional pad bytes added to meet frame
requirements.
17. How a single bit error does differ from a burst error? REMEMBER CO2
BT-L1
Single bit error: error in a data unit in which only one single bit has been altered. Single bit
errors can be detected by the addition of a redundant (parity) bit to the data unit.
Burst error: error in a data unit in which two or more bits have been altered. A hamming
code can be designed to correct burst error of certain lengths.
18. List out any four IEEE 802 standards with its name. REMEMBER CO2
BT-L1
o IEEE 802.1(LAN)
o IEEE 802.2(Logical Link Control)
o IEEE 802.3 (Ethernet)
o IEEE 802.4(Token bus)
o IEEE 802.5(Token Ring)
o IEEE 802.11(Wireless LAN)
19. What is CSMA/CD? REMEMBER CO2
BT-L1
Carrier Sense Multiple Access/Collision Detection, CSMA/CD is a Media Access Control
(MAC) protocol that defines how network devices respond when two devices attempt to
use a data channel simultaneously and encounter a data collision. The CSMA/CD rules
define how long the device should wait if a collision occurs. The medium is often used by
multiple data nodes, so each data node receives transmissions from each of the other nodes
on the medium.
20. What is meant by circuit switching? REMEMBER CO2
BT-L1
A circuit switch is a device with n inputs and m outputs that creates a temporary
connection between an input link and output link. The number of inputs does not have to
match the number of outputs.
21. What is mean by bridge? REMEMBER CO2
BT-L1
In telecommunication networks, a bridge is a product that connects a local area network
(LAN) to another local area network that uses the same protocol. You can envision a bridge
as being a device that decides whether a message from you to someone else is going to the
local area network in your building or to someone on the local area network in the building
across the street. A bridge examines each message on a LAN, "passing" those known to be
within the same LAN, and forwarding those known to be on the other interconnected LAN.

CN 1.40 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

22. What is High Level data link control? REMEMBER CO2


BT-L1
High-Level Data Link Control provides reliable delivery of data frames over a network or
communication link. HDLC provides various operations such as framing, data
transparency, error detection, and correction, and even flow control. Primary stations
simply transmit commands that contain address of secondary stations. The secondary
station then simply transmits responses that contain its own address.

23. Outline the use of cyclic redundancy check. UNDERSTAND CO2


BT-L2

 CRC or Cyclic Redundancy Check is a method used for detecting errors or accidental
changes incommunication channel.
 CRC uses generator polynomial which is available on both sender and receiver side.
 An example of generator polynomial is of the form like x3 + x + 1. This generator
polynomial represents the key 1011.
24. What is a repeater? REMEMBER CO2
BT-L1
 A repeater is a network connecting device that operates only in the physical layer.
 Signals that carry information within a network can travel only a fixed distance.
 A repeater receives a signal and before it becomes too weak or corrupted, it
regenerates theoriginal signal.
 The repeater then sends the refreshed signal and does not has the filtering capability.
25. Explain HDLC. REMEMBER CO2
BT-L1
 HDLC - High-level Data Link Control.
 It is a data link layer protocol.
 HDLC is a bit-oriented protocol for communication over multipoint links.
 HDLC provides two common transfer modes that can be used in different configurations,
theyare Normal Response Mode (NRM) and Asynchronous Balanced Mode (ABM).

PART – B
1. Illustrate the working of CRC code withC(7, APPLY CO2
4)Where n = 7, k = 4, Codeword = 1001110 Give BT-L3
the division in the CRC decoder for two cases
(i)Dataword accepted (ii) Dataword Discarded. (13)
2. i)A message that is to be transmitted is represented APPLY CO2
by the polynomial M(x) = x5 + x4+ x with a generating BT-L3
prime polynomial G(x) = x3 + x2 + 1. Generate a 3 bit
CRC code, C(x) which is to be appended to M(x). (10)
ii)How is a hub related to a repeater ? (3)
3. Explain in detail about the error and flowcontrol UNDERSTAND CO2
mechanisms employed at data link layer. (13) BT-L2
4. Elaborate the working of CSMA UNDERSTAND CO2
and CSMA/CD protocol. (13) BT-L2
5. Present an outline of HDLC protocol. (13) UNDERSTAND CO2
BT-L2
6. Elaborate the various DLC services in detail. (13) UNDERSTAND CO2
BT-L2

CN 1.41 KCE/CSE / QB /III YR /CN


Subject code/Name: CS3591/Computer Networks

7. Illustrate the purpose and functionality of link layer UNDERSTAND CO2


addressing. (13) BT-L2
8. Explain in detail data link layer protocols. (13) REMEMBER CO2
BT-L1
9. Elaborate on point to point protocol. (13) REMEMBER CO2
BT-L1
10. Explain in detail about media access control. (13) UNDERSTAND CO2
BT-L2
11. Explain in detail about the access method and REMEMBER CO2
frame format used in ethernet. (13) BT-L1
12. (i) Show and explain the ethernet frame format. (6) REMEMBER CO2
(ii) Write short notes on ethernet. (7) BT-L1
13. Explain the physical properties of ethernet 802.3 with UNDERSTAND CO2
necessary diagrams. (13) BT-L2
14. Explain the media access control algorithm, UNDERSTAND CO2
CSMA/CD used in ethernet. Why same algorithm BT-L2
cannot be used inwireless LAN? (13)
15. (i) Discuss the MAC layer functions of IEEE 802.11. UNDERSTAND CO2
(6) BT-L2
(ii) Explain the functions of MAC layer present in
IEEE 802.11 with necessary diagrams. (7)
16. Explain the architecture of IEEE 802.11 wireless LAN. REMEMBER CO2
(13) BT-L1

17. (i) Explain the access method used in wireless LAN. REMEMBER CO2
(7) BT-L1
(ii)Discuss the working of CSMA/CD protocol. (6)
18. Compare and contrast CSMA/CD with CSMA/CA. (13) UNDERSTAND CO2
BT-L2
19. Explain in detail about connecting devices used REMEMBER CO2
in networks. (13) BT-L1

PART – C
1. Two hosts are in a CSMA/CD network and the medium has APPLY CO2
a data transfer capacity of 1Gbps. The minimum frame BT-L3
length is fixed to 1,000 bits and the propagation speed is 2
×108 m/s.
i) What will be the distance between the hosts ? (7)
ii) If it is an Ethernet network, what is the efficiencywhen
the hosts have a maximum distance between them ? If
the distance is reduced to 1 m, does it impact the
efficiency? (8)
2. Elaborate on various types of multiple access protocols in UNDERSTAND CO2
detail. (15) BT-L2
3. List out various data link layer protocols and explain REMEMBER CO2
each one of them in detail with necessary diagrams. (15) BT-L1

CN 1.42 KCE/CSE / QB /III YR /CN

You might also like