Assignment Week 1-12 Solution Jan-April 2025
Assignment Week 1-12 Solution Jan-April 2025
QUESTION 1
How many collision domains are in a 10-port hub, an 8-port switch (L2), and a 4-port router,
respectively? A collision domain is the segment of a network, where if more than one device tries to
send data simultaneously, it causes a collision and the data is lost.
a) 1, 8, and 4, respectively.
b) 10, 8, and 4, respectively.
c) 10, 10, and 10, respectively.
d) 5, 4, and 2, respectively.
Answer: (a)
Detailed solution:
Router has per-port broadcast and collision domain. Switch has a per-port collision domain with a
single broadcast domain. Hub has a single collision and broadcast domain.
QUESTION 2
Map the devices with their associated layer in the TCP/IP model.
Answer: (a)
Detailed solution:
Hub operates at Layer 1 of the TCP/IP model, while Bridge, NIC, and Switch(L2) work with MAC
addresses at Layer 2. A Router works with IP addresses and it operates in a network layer.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Answer: (d)
Detailed solution:
File Transfer Protocol (FTP), and HyperText Transfer Protocol (HTTP) operate in an application
layer; User Datagram Protocol (UDP) operates in a transport layer; Internet Protocol (IP) operates in
a network layer; and Point to Point Protocol (PPP) operates in a data link layer. For more details,
please refer to the lecture slides no. 5.
QUESTION 4
Which of the following statement(s) are concerned with encapsulation in computer networks?
I. It involves an addition of a header and trailer to the actual data as it moves down in the TCP/IP
protocol stack.
II. At the transport layer, encapsulation includes port numbers and at the network layer,
encapsulation includes IP addresses.
a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)
Answer: (c)
Detailed solution:
Encapsulation is the process of addition of a header and trailer while moving down from upper layer
to lower layer like adding source and destination port numbers to the application layer data, adding
source and destination IP addresses to the transport layer segment etc.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Which of the following is NOT a disadvantage of the circuit switching technique over the packet
switching technique in computer networks?
Answer: (d)
Detailed solution:
Circuit switching techniques establish a dedicated path for communication, and it remains
unutilised in case of no data transmission. It also suffers from greater setup time delay, scalability
issues, lack of fault tolerance, etc.
QUESTION 6
Answer: (a)
Detailed solution:
Bridges filter network traffic based on MAC addresses.
QUESTION 7
Which transport layer protocol will be chosen by an application that does not require any reliability?
a) TCP
b) UDP
Answer: (b)
Detailed solution:
User Datagram Protocol (UDP) is a connectionless-oriented protocol and provides no reliability.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 8
You are a network administrator in your college. You are asked to do troubleshooting for an issue of
a remote server using telnet. Which of the following consideration(s) should you keep in mind when
using Telnet for this task?
Detailed solution:
Telnet is an insecure method to connect to a remote server. Its traffic is flowing in the networks as a
plaintext including login credentials. For the security aspect, we adopt SSH instead of telnet.
QUESTION 9
Choose the statement(s) that correctly describe(s) the roles and responsibilities of the Network
Interface Card (NIC) in the computer networks.
I. NIC takes over the responsibility of segmenting large chunks of data into smaller packets that
can be transmitted over the networks.
II. It converts digital data from the computer’s processor to an analog signal.
a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)
Answer: (c)
Detailed solution:
The NIC's primary role at the Data Link Layer is to ensure reliable frame-based transmission of data
over a local network, including responsibilities for framing, MAC addressing, error detection, flow
control, and managing access to the transmission medium. In computer networking, large send
offload (LSO) is a technique for increasing egress throughput of high-bandwidth network connections
by reducing CPU overhead. It works by passing a multipacket buffer to the network interface card
(NIC). The NIC then splits this buffer into separate packets. The technique is also called TCP
segmentation offload (TSO) or generic segmentation offload (GSO) when applied to TCP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
Identify the INCORRECT statement(s) related to Bridge and Switch (L2) in computer networks.
a) For small enterprises (without the need for features like QoS, VLANs, and STP), a switch is
more economical/suitable in the case of segmenting the traffic between two LANs than a
bridge.
b) Switches operate in full-duplex mode while bridges in half-duplex mode.
c) Switches broadcast traffic to all ports, while bridges broadcast the traffic to designated ports
(ports having the same VLAN port as the sender) by using a MAC address table.
d) Switches and bridges are both equally important in modern, large, and complex networks.
Detailed solution:
Bridge and Switch (L2) Both are layer 2 devices. Bridges are replaced by multiport switches in large
and complex networks. Bridges operate in only two ports and permit traffic in only one direction at a
time. Switches have multiports and permit the traffic in full-duplex mode. It also supports modern
features like QoS, VLANs, STP, etc. that are unavailable in the bridges. This is why switches are
called more intelligent than bridges. Switches take support of the MAC address table to pass the
traffic, so it reduces the floods of broadcast traffic to a great extent by just sending it to the ports
having the same VLAN as the sender.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Detailed solution: A zone refers to a specific portion of this domain that is managed by a particular
administrative entity or DNS server. DNS zones aren’t necessarily physically separated from each
other.
QUESTION 2
What makes FTP more secure than TFTP (Trivial File Transfer Protocol)?
a) TFTP lacks features like user authentication and secure data transfer mechanisms.
b) TFTP allows simultaneous connections without encryption.
c) TFTP uses TCP, which is inherently less secure than UDP.
d) TFTP is designed for unreliable networks, making it inherently less secure.
Detailed solution: Compared to FTP, which uses TCP and has authentication mechanisms, TFTP is
less dependable and safe since it lacks crucial security features like user authentication and runs on
UDP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
In the HTTP architecture, which of the following best describes a Uniform Resource Locator (URL)?
Detailed solution: A URL uniquely identifies resources on the web, specifying the protocol (e.g.,
HTTP or HTTPS), hostname (e.g., example.com), port (if applicable), and the path to the resource."
QUESTION 4
Which of the following statements about HTTP proxy servers is NOT true?
Detailed solution: HTTP proxy servers are not limited to secure connections; they can process both
HTTP and HTTPS queries. Because they have the ability to filter requests and cache responses, option
C is erroneous.
QUESTION 5
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed Solution:
R: True. DNS typically runs on UDP for queries but switches to TCP for zone transfers or large responses.
QUESTION 6
What is the correct syntax to be written in the command line to initiate a Telnet connection to the
web server of www.iitkgp.ac.in?
a) telnet//www.iitkgp.ac.in
b) telnet:www.iitkgp.ac.in
c) telnet://www.iitkgp.ac.in
d) telnet www.iitkgp.ac.in
Which of the following protocols allow non-ASCII data to be sent over email?
a) IMAP4
b) TELNET
c) MIME
d) POP3
Detailed Solution: MIME transforms data into a format that SMTP can transmit, such as Base64
encoding for binary files, allowing non-ASCII data to be sent over email.
QUESTION 8
a) Only S1
b) Only S2
c) S2 and S3 only
d) S3 Only
Detailed Solution:
S1: Incorrect. SMTP cannot send image files directly; it requires MIME (not IMAP4) for sending
non-ASCII data like images.
S2: Incorrect. POP3 is used for retrieving emails, not for sending them. SMTP sends emails, but
image files are sent via MIME.
S3: Correct. IMAP4 is generally more secure than POP3 because it supports features like
encrypted communication and better mailbox management.
QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
A user is accessing a webpage hosted on a remote server. The webpage contains multiple elements, such as
text content, several images, and a JavaScript file. The user's browser starts by initiating a connection to
the server and sending requests to fetch the necessary resources. Assume the following steps:
● The browser must first resolve the web server's domain name to an IP address.
● After the server IP is obtained, the browser opens a TCP connection to request the webpage and its
embedded resources.
● The packets leaving the user's machine, in some order, are as follows:
Which of the following is the correct chronological order in which the packets leave the user's computer
(from first to last)?
Detailed Solution:
1. DNS Query: The browser must resolve the web server’s domain name into an IP address.
This is the first step, so (ii) comes first.
2. TCP Connection Setup: After the IP address is obtained, the browser must establish a TCP
connection with the server. This involves the TCP handshake, so (iii) is the second step.
3. HTTP GET Request for Main Page: After the connection is established, the browser sends an
HTTP GET request for the main HTML page, which is (i).
4. HTTP GET Requests for Embedded Resources: After receiving the main page, the browser
requests the embedded resources (image and JavaScript files). These requests are typically sent
after receiving the HTML page, so (v) (image) and (iv) (JavaScript) can be executed in any order.
QUESTION 10
S1: A user requests a web page that consists of some text and one image. For this page the client
will send one request message and receive 4 response messages.
S2: It is not possible to send two different web pages (for example, www.nptel.ac.in/student.html
and www.nptel.ac.in/course.html) over the same persistent connection.
a) Only S1 is true
b) Only S2 is false
c) Both S1 and S2 are true
d) Both S1 and S2 are false
Detailed Solution: S1: It will send 4 message, and receive 4 response messages
S2: If the connection does not timeout and we do not close it, persistent HTTP keeps the connection
open. so that more web pages can be sent over persistent HTTP connections.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 3 - Week 3 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1
Answer: (a)
Detailed solution:
TCP uses byte-oriented sequence numbering to ensure reliable, ordered, and efficient data
transmission over a network.
QUESTION 2
a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)
Answer: (b)
Detailed solution:
The transport layer relies on data structures (e.g., buffers, sequence number tables) to manage
connections, algorithms (e.g., sliding window for flow control, checksum for error detection) to
ensure reliable communication, and system calls (e.g., socket(), send(), recv()) to interact with the OS
kernel, which implements these functionalities abstractly for application-level use.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Answer: (d)
Detailed solution:
The transport layer provides services like End-to-end packet delivery, Ordered packet delivery,
Reliable data delivery, Connection establishment, and Flow & Congestion control etc. The hop-to-
hop network packet forwarding is supported by data link layer and network layer.
QUESTION 4
What can be a primary mechanism used to ensure the reliable data transfer in a stop-and-wait
algorithm (Noisy Channel)?
a) Employing only error detection and correction codes without requiring acknowledgements.
b) Increasing the timeout interval.
c) Using a sequence number to identify each packet uniquely and waiting for an
acknowledgement for each packet before sending the next packet.
d) Using a sliding window to send multiple packets without waiting for their acknowledgements.
Answer: (c)
Detailed solution:
Stop-and-Wait (Noisy Channel) flow control algorithm uses a sequence number to individually
identify each frame and corresponding acknowledgement. It ensures reliability by attaching a
sequence number to each packet and transmits a packet & waits for an acknowledgment (ACK)
from the receiver before sending the next packet. If the ACK is not received within a timeout period,
the sender retransmits the packet.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
A data of 40 bytes need to be delivered using TCP protocol but a sender can send a segment of
maximum size 12 bytes only. Identify the sequence number of the last segment formed if the sequence
number field uses 5 bits only? [Assume sequence number starts from 0]
a) 1
b) 4
c) 12
d) 31
Answer: (b)
Detailed solution:
TCP uses byte sequencing. It treats data as a continuous stream of bytes rather than discrete packets.
Since the sequence number field uses 5 bits only, it produces sequence numbers ranging from 0 to
31.
The first segment of 12 bytes will use the sequence number range (0-11),
Next segment of 12 bytes will use the sequence number range (12-23),
Next segment of 12 bytes will use the sequence number range (24-31) & (0-3), and
The last segment of 4 bytes will use the sequence number range (4-7).
The sequence number in a TCP segment header refers to the first byte of data in that segment
relative to the start of the stream.
QUESTION 6
A sender uses a sliding window protocol with a window size of 5. The range of sequence numbers
follows modulo 8 ( the sequence number starts from 0 to 7). If the receiver acknowledges packet 1,
what will be the sender’s new window range?
a) 1-5
b) 2-6
c) 3-7
d) 0-4
Answer: (b)
Detailed solution:
When the receiver acknowledges the packet, resulting in a forward slide of the sender’s window. The
sliding window now starts at 2 (the next unacknowledged sequence number) till the allowed window
size.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
“During the three-way handshaking of connection establishment procedure (from Host 1 to Host 2),
Delayed duplicate SYN can be handled by TCP at Host 2 simply by ignoring it, as the sequence
number is invalid”
a) True
b) False
Answer: (a)
Detailed solution:
The TCP 3-Way Handshake is a fundamental process that establishes a reliable connection between
two devices over a TCP/IP network. During the handshake, the client and server exchange initial
sequence numbers. It uses sequence numbers to identify and validate the legitimacy of connection
requests. A delayed duplicate SYN will have an outdated sequence number that doesn't match the
current connection state at Host 2 and can be ignored as invalid sequence number.
QUESTION 8
TCP instance uses a sliding window protocol in the noisy channel. A timeout occurs due to the loss
of a segment (or the acknowledgement). Mark the RIGHT statement among the following-
a) In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, all the segments
of the sliding window are retransmitted while in Selective Repeat ARQ, only the lost packets
are selectively transmitted.
b) In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, only the lost
packets of the sliding window are selectively retransmitted while in Selective Repeat ARQ,
all packets of the sliding window are retransmitted.
c) In both cases, Go-Back-N ARQ and Selective Repeat ARQ, all packets of the sliding window
are retransmitted.
d) In the both cases, Go-Back-N ARQ and Selective Repeat ARQ, only lost packets of the
sliding window are selectively retransmitted.
Answer: (a)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed solution:
In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, all the segments of the
corresponding sliding window are retransmitted while in Selective Repeat ARQ, only the lost packets
are selectively transmitted.
QUESTION 9
Consider a sender using the Go-Back-N ARQ protocol with a window size 5. The sequence number
ranges from 0 to 7 (modulo 8). The sender initially transmits packets with the sequence numbers- 0,
1, 2, 3, and 4. During the transmission, packet 3 is lost in the network. The sender receives a
cumulative ACK for the packet 2. The sender continues sending packet 5, 6, and 7 but the receiver
denies accepting them due to the loss of packet 3.
Identify the range of packets that will be retransmitted by the sender after the timeout of packet 3?
a) 0, 1, 2, 3, and 4.
b) 2, 3, 4, 5, and 6.
c) 3, 4, 5, 6, and 7.
d) 1, 2, 3, 4, and 5.
Answer: (c)
Detailed solution:
In Go-Back-N ARQ, when a timeout occurs, the sender retransmits all packets starting from the lost
packet to all permissible packets in accordance with the window size.
QUESTION 10
A client and a server establish a connection using TCP's three-way handshake. The following details
are given:
● Initial sequence number of the client: 100 and initial sequence number of the server: 300.
● RTT (Round Trip Time): 80ms.
● Each TCP segment carries 40 bytes of header information.
● The server sends a SYN-ACK segment, and the acknowledgement (ACK) segment from the client is
delayed due to congestion, taking 100ms to reach the server.
How much time does it take to establish the connection under such a scenario?
a) 100ms
b) 280ms
c) 180ms
d) 260ms
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Answer: (c)
Detailed solution:
In three way handshaking, the connection is established after three steps. In first step, sender sends a
connection request SYN packet to the server. Server responds to client with SYN+ACK packet.
Finally, sender sends a ACK packet to the server. Since RTT = 80ms so for one way packet
transmission will take 40ms. Since, there is a delay during transmission of ACK packet from sender
to server due to congestion and it takes greater time i.e. 100ms. So, the total time needed to complete
this connection procedure will be (time taken for SYN packet + time taken for SYN+ACK packet +
time taken for ACK packet) i.e. (80/2ms+80/2ms+100ms=180ms).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Which statement about choosing a transport protocol based on BDP (Bandwidth Delay Product) is
correct?
a) Sliding window protocols always outperform stop-and-wait protocols, regardless of the BDP.
b) When the BDP is smaller than the segment size, a sliding window protocol significantly
improves performance.
c) Stop-and-wait protocols are preferred when the BDP is smaller than the segment size to
minimize complexity.
d) Selective repeat ARQ should always be chosen over go-back-N ARQ to maximize throughput.
Detailed solution: The simplicity of stop-and-wait protocols comes from avoiding the complexity of
managing multiple packets in transit, retransmissions, and acknowledgments simultaneously. In cases
where the BDP is smaller than the segment size, the channel cannot effectively utilize the benefits of
a sliding window protocol, making stop-and-wait a better choice for reducing complexity without
sacrificing performance.
QUESTION 2
Detailed solution: Max-Min Fairness ensures that bandwidth is allocated in such a way that
increasing the allocation for one flow can only occur by decreasing the allocation for another flow.
This principle prioritizes fairness while respecting the constraints of the network, particularly at
bottleneck links, ensuring that no flow is unfairly starved.
QUESTION 3
What happens if a transport-layer application Transmission Control Protocol (TCP) attempts to send
data before the connection is established?
Detailed solution: In a stateful transport-layer protocol like TCP, data transmission is only allowed
when the connection is in the "established" state. If an application attempts to send data before the
connection is established, the operation is invalid, and the transport layer will block or reject it."
QUESTION 4
Which of the following conditions does not influence the segment size in TCP?
Detailed solution: Header Length of the IP Protocol does not directly affect the TCP segment size.
Instead, it impacts the total size of the network packet but is unrelated to the TCP segmentation
process.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
In the TCP connection release process, why does the active closer enter the TIME-WAIT state after
receiving the final acknowledgment?
a) To confirm that the other host has received the FIN message.
b) To allow the passive closer to resend data if needed.
c) To ensure that any delayed packets in the network are discarded.
d) To avoid reusing the same port for a new connection.
The TIME-WAIT state ensures that all delayed packets in the network from the just-closed connection are
discarded. This prevents any potential interference with subsequent connections that might reuse the same
port and sequence numbers.
QUESTION 6
In a distributed system, a server advertises a receiver window of 0 due to lack of buffer space.
However, the application frees up space but the updated acknowledgment is lost. What should the
client do to prevent deadlock?
QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
A TCP sender observes a mismatch between the advertised window size from the receiver and the
available buffer space. Which of the following is True?
Detailed Solution : If acknowledgments are delayed, the receiver’s advertised window size may not
reflect the current buffer availability, leading to a perceived mismatch.
QUESTION 8
A transport-layer protocol using AIMD starts with an initial sending rate of 1 Mbps. After four
successful additive increases (each adding 0.5 Mbps), it detects packet loss. If the multiplicative
decrease factor is 0.5, what will be the new sending rate?
a) 2.5 Mbps
b) 1 Mbps
c) 3 Mbps
d) 1.5 Mbps
Detailed Solution:
Initial rate: 1 Mbps.
Four additive increases: 1+4×0.5=3 Mbps
Multiplicative decrease: 3×0.5=1.5 Mbps
QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
A TCP connection is experiencing high delays and packet reordering. Which features of TCP help
maintain reliable and ordered communication in this scenario?
Detailed Solution:
A and B: Sequence and acknowledgment numbers allow TCP to reorder out-of-order packets and ensure
reliable delivery.
D: Sliding window flow control ensures efficient data transfer despite delays.
C: The urgent pointer is unrelated to packet reordering or delays
QUESTION 10
In the case of a simultaneous TCP open (both hosts initiate a connection at the same time), which of
the following are true?
(i) : Both hosts will transition to the SYN-RECEIVED state after exchanging SYN messages.
(ii): The three-way handshake completes with the exchange of SYN+ACK messages.
(iii): Both hosts will immediately move to the ESTABLISHED state after receiving SYN messages.
(iv): Simultaneous open is less secure due to lack of proper sequence number synchronization.
Detailed Solution: In a simultaneous open, both hosts send SYN packets and transition to the
SYN-RECEIVED state. The handshake proceeds as normal, ensuring proper synchronization of
sequence numbers. Security is not compromised (D) because sequence numbers are negotiated
during the handshake. So only (i) and (ii) are true.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
How does the TCP Sliding Window mechanism contribute to efficient data transmission?
Detailed solution: The TCP Sliding Window mechanism ensures efficient data transmission by
dynamically adjusting the size of the transmission window based on the receiver's buffer capacity and
network conditions. This allows TCP to send data continuously while ensuring that the receiver is not
overwhelmed. It also prevents unnecessary retransmissions and optimizes the use of available
network bandwidth. Unlike fixed-size windows, the sliding window adapts to real-time feedback
from the receiver and the network, making it a core feature of TCP's reliability and flow control.
QUESTION 2
Detailed solution: Nagle's algorithm can introduce additional latency for small packets, as it waits
for either an acknowledgment of the last packet or enough data to fill the MSS before sending. This
can be undesirable in applications requiring low-latency communication.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which mechanism is used to avoid Silly Window Syndrome at the receiver side?
a) Delayed acknowledgment
b) Nagle’s algorithm
c) Clark’s solution
d) Fast retransmit
Detailed solution: Clark’s solution is used to avoid SWS at the receiver's side. It prevents the receiver
from advertising a small window size until the buffer can hold a significant amount of data.
QUESTION 4
Detailed solution: In Jacobson’s algorithm, α\alphaα controls the smoothing of SRTT. A higher
α\alphaα places more emphasis on historical RTT values, reducing the influence of new RTT
measurements. This leads to a slower adaptation to sudden RTT changes, which may provide more
stability but less responsiveness. Conversely, a lower α\alphaα increases sensitivity to sudden RTT
variations but can make SRTT less stable.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Detailed Solution:TCP transitions from Slow Start to Congestion Avoidance once the congestion window
size exceeds the ssthresh.
QUESTION 6
If the Checksum field in the UDP header is set to 0, what does it indicate?
Detailed Solution: A checksum value of 0 in UDP indicates that the sender did not compute the
checksum. This is allowed only in IPv4, but in IPv6, the checksum is mandatory.
QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
What is the purpose of the pseudo-header used in the UDP checksum calculation?
Correct Answer: b)
Detailed Solution: The pseudo-header includes the source IP, destination IP, protocol, and UDP
length. It is used in the checksum calculation to verify data integrity.
QUESTION 8
Detailed Solution: The listen () function sets up a socket to accept incoming connections by
placing it in a passive listening mode.
QUESTION 9
Which function can be used to configure socket options like timeout or buffer size?
a) setsockopt()
b) sockopt()
c) configure()
d) options()
Correct Answer: a)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed Solution : The setsockopt() function is used to configure various socket options, such as
timeout values, buffer sizes, and other protocol-specific settings.
QUESTION 10
Detailed Solution: An iterative server is simpler to implement and debug due to its sequential
nature, making it easier to manage compared to concurrent server models.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
What is the primary function of the network layer in the TCP/IP model?
Detailed solution: The network layer is responsible for logical addressing (e.g., IP addresses) and
routing data packets across networks.
QUESTION 2
Which of the following is a key advantage of using a Layer 3 switch over a Layer 2 switch?
a) It reduces the need for VLANs.
b) It improves network performance by enabling faster switching at Layer 1.
c) It can route traffic between different subnets without requiring a separate router.
d) It only supports static routing.
Detailed Solution: A Layer 3 switch combines the functionality of a switch and a router, allowing it to
perform routing between different subnets. Unlike a Layer 2 switch, which only forwards frames within the
same subnet using MAC addresses, a Layer 3 switch can use IP addresses to route traffic between VLANs
or subnets, reducing the need for an external router.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Detailed solution: ISPs do not create content. They provide infrastructure and services like email
hosting, web hosting, and VPNs.
QUESTION 4
In a network communication scenario involving an Internet Service Provider (ISP), which of the
following is responsible for determining the most efficient path for packet delivery?
a) Transport Layer
b) Network Layer
c) Data Link Layer
d) Application Layer
Detailed solution: The network layer, using routing protocols and IP, determines the best path for
packet delivery.
QUESTION 5
When communicating between two nodes, what role does the transport layer protocol play
Detailed Solution: Transport layer protocols like TCP ensure reliable delivery, while UDP provides faster
but less reliable delivery.
QUESTION 6
a) Loopback address
b) Default route address
c) Broadcast address
d) Unspecified address
QUESTION 7
a) To replace the traditional classful addressing system with a more flexible and efficient way
of allocating IP addresses.
b) To enhance encryption during transmission.
c) To improve the speed of DNS resolution.
d) To allocate MAC addresses dynamically.
Detailed Solution : CIDR (Classless Inter-Domain Routing) simplifies and allows for more
efficient way of IP address allocation.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 8
How many subnets can be created from a /24 network if the subnet mask is extended to /26?
a) 2
b) 4
c) 6
d) 16
Detailed Solution :Extending the subnet mask to /26 creates 2^(26−24)= 4 subnets.
QUESTION 9
What is the CIDR notation for a supernet that aggregates 192.168.0.0/24 and 192.168.1.0/24?
a) \23
b) \24
c) \25
d) \22
Detailed Solution : The supernet 192.168.0.0/23 includes both 192.168.0.0/24 and 192.168.1.0/24.
QUESTION 10
In a home network using NAT, how does a router differentiate between multiple devices accessing
the same web server?
Detailed Solution : The router uses unique port numbers for each session in NAT to differentiate
between devices.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Detailed solution: In congested networks, queuing delay is usually much greater than transmission
delay. Queuing delay arises when packets wait in a buffer due to high traffic and limited processing
capacity, which is more significant during congestion. Transmission delay, on the other hand, is
determined by the time it takes to push all bits of a packet onto the transmission medium, which
remains constant for a given packet size and link bandwidth.
QUESTION 2
How does traffic shaping differ from traffic policing in the context of QoS?
a) Traffic shaping identifies and marks packets for prioritization, while traffic policing
drops packets that violate QoS.
b) Traffic shaping regulates outgoing traffic rates, while traffic policing monitors and
drops packets violating QoS.
c) Traffic shaping prioritizes real-time traffic, while traffic policing prioritizes non-real-
time traffic.
d) Traffic shaping is applied only at the router, while traffic policing is applied only at
the source.
Detailed solution: Traffic shaping regulates outgoing traffic rates, while traffic policing monitors
and drops packets violating QoS.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following statements about the token bucket algorithm are correct?
S1: It allows burst traffic by using accumulated tokens.
S2 : It discards excess tokens when the bucket is full.
S3 : It smooths out traffic to a constant rate by dropping excess packets.
S4 : It allows traffic to exceed the token generation rate temporarily if tokens are available.
a) S1 and S3 only
b) S2 and S4 only
c) S1, S2 and S4 only
d) S2, S3 and S4 only
Detailed solution: Only S3 is incorrect. The token bucket does not smooth traffic to a constant rate;
that is the characteristic of the leaky bucket algorithm. The token bucket allows bursts instead.
QUESTION 4
A video streaming service uses a token bucket with a token generation rate of 5 Mbps and a bucket
size of 10 MB. If the stream has a sudden burst requiring 20 MB of data, how much data can be
transmitted immediately without exceeding the allowed rate?
a) 10 MB
b) 15 MB.
c) 20 MB
d) 5 MB
Detailed solution: Since b=10 MB and r×t=5 MB, the request requires 20 MB, but at most, 10 MB
is available in the bucket immediately.
10 MB of the 20 MB burst transmitted immediately.
QUESTION 5
During peak traffic, a network's RED mechanism begins dropping packets when the average queue size
reaches the maximum threshold. Why is this early packet drop strategy crucial for maintaining QoS?
a) It reduces packet loss for inelastic traffic by halting elastic traffic completely.
b) It triggers congestion control in TCP before queue overflow occurs.
c) It ensures low-priority traffic is always prioritized over high-priority traffic.
d) It guarantees that all packets from elastic traffic are evenly distributed.
Detailed Solution:
When the queue size approaches the maximum threshold, RED starts dropping packets to signal congestion
to TCP flows. This early signaling allows TCP to reduce its sending rate before the queue completely
overflows, thus avoiding severe packet loss and ensuring better Quality of Service (QoS) for all traffic
classes.
QUESTION 6
QUESTION 7
A company deploys IntServ for a critical application requiring guaranteed QoS. However, some
flows experience denial of service due to resource unavailability. What mechanism in IntServ likely
caused this issue?
Detailed Solution: IntServ's Admission Control ensures that new flows are admitted only if
sufficient resources are available. If resources are insufficient, the flow is denied access to preserve
QoS for existing flows.
QUESTION 8
A network router using Weighted Fair Queuing (WFQ) schedules packets from three classes with
the following weights: 1, 2, and 3. If the total available bandwidth is 600 Mbps, how much
bandwidth is allocated to the second class?
a) 100 Mbps
b) 200 Mbps
c) 240 Mbps
d) 300 Mbps
Detailed Solution:
The weights sum to 1+2+3=6 The second class (weight 2) gets (2/6)×600=200 Mbps.
QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
In a DiffServ domain, which of the following are responsibilities of the edge router?
Detailed Solution: Only A and C are correct. Edge routers perform classification, marking, and
SLA policing. PHB enforcement occurs at core routers, and queue management is a general
function across routers.
QUESTION 10
Which of the following parameters must be considered for admission control in QoS architectures to
determine whether a new flow can be admitted?
Detailed Solution: All these parameters are critical for determining whether admitting a new flow
will violate the QoS of existing flows.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 8 - Week 8 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1
a) 5.6.4.0
b) 5.6.7.0
c) 5.6.7.255
d) 5.6.255.255
Answer: (a)
Detailed solution:
The network address can be obtained by performing a bitwise AND operation over binary
representation of IP address and the subnet mask.
QUESTION 2
Consider the following CIDR blocks: 192.168.0.0/24 and 192.168.3.0/24. Identify the possible
aggregated prefix (route summarization/supernetting) among the following.
a) 192.168.0.0/22
b) 192.168.0.0/23
c) 192.168.0.0/24
d) 192.168.0.0/25.
Answer: (a)
Detailed solution:
Convert the given dotted-decimal format CIDR blocks address into binary dotted representation and
find the longest common prefix from left to right.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following statements are true for Autonomous Systems (AS)?
Detailed solution:
The Autonomous Systems (ASs) is a logical portion of a larger IP network. It is only administered
by a single administrator. An Area in an Autonomous System (AS) is a collection of routers,
networks, and hosts within an AS. The exterior gateway protocol-BGP is primarily used for
communication between different Autonomous Systems (ASs).
QUESTION 4
How many bits are used to identify the Autonomous Systems (AS)?
a) 1
b) 32
c) 64
d) 8
Answer: (b)
Detailed solution:
Autonomous Systems (AS) primarily use 32-bit numbers .
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Which transport layer protocol does BGP use for communication between peers?
a) TCP
b) UDP
c) QUIC
d) ICMP
Answer: (a)
Detailed solution:
Border Gateway Protocol (BGP) uses TCP (Transmission Control Protocol) for communication
between peers at port number 179.
QUESTION 6
Consider the following topology of a network. Numbers labeled in the link between two routers
represent cost. Using the Distance Vector algorithm, identify the updated distance vector at Router
A after the first round of updates.
a) A: 0, B: 3, C: 1, D: 4, E: 2
b) A: 0, B: 3, C: 4, D: 4, E: 5
c) A: 0, B: 3, C: 1, D: 4, E: 5
d) A: 0, B: 3, C: 4, D: 4, E: 2
Answer: (b)
Detailed solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Router A receives the distance vectors from B and D and updates its distance vector
accordingly. The rule is: for each router, the distance is updated to the minimum distance obtained
by adding the distance from the router to a neighbor, and the distance from that neighbor to the
destination.
QUESTION 7
a) It shares the routing table rather than sending the information about its neighborhood only.
b) Each router computes the shortest paths to all independently using Dijkstra's algorithm.
c) Each router does not have a complete view of the network topology.
d) Once a router has detected a local link failure, it generates and floods a new LSP that no longer
contains the failed link and the new LSP replaces the previous LSP in the network.
Detailed solution:
The Link State Routing Algorithm is a type of routing algorithm used in computer networks to
determine the shortest path from a source node to all other nodes in the network. Unlike distance
vector algorithms, which share information about routes only with directly connected neighbors, link
state routing involves building a complete map of the network's topology at each router. Each router
constructs a map (or graph) of the entire network. Each router independently computes the shortest
paths using Dijkstra's algorithm.
QUESTION 8
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
A. BGP local traffic 1. Traffic to an AS either originates or terminates within the AS.
B. Stub AS 2. Traffic that passes through an AS but neither originates nor
terminates in it.
C. BGP transit traffic 3. It connects to two or more Internet Service Providers (ISPs) or
autonomous systems.
D. Multihomed AS 4. It has has only one connection to another AS, usually to an
upstream Internet Service Provider (ISP).
Answer: (a)
Detailed solution:
Local traffic in BGP refers to data that starts or ends within an Autonomous System (AS). This traffic
does not transit through the AS to reach another network. A Stub AS is an AS that has only one
connection to the internet, meaning it cannot provide transit services for other networks. It only sends
and receives traffic to/from its upstream provider. Transit traffic occurs when an AS acts as a
middleman, forwarding data between other ASes without being the source or destination of the traffic.
A Multihomed AS connects to multiple ISPs for redundancy and better performance, ensuring that if
one provider fails, the AS can still maintain connectivity.
QUESTION 9
An ISP is assigned the CIDR block 192.168.0.0/16. Identify the valid subnet(s) among the following
that can be allocated to its customers.
a) 192.169.0.0/16
b) 192.168.0.0/17
c) 192.168.128.0/17
d) 192.168.0.0/18
Detailed solution:
CIDR ensures that the subnet mask doesn't extend beyond the /16 prefix, as this would fall outside
the assigned block.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
a) 255
b) 1
c) 128
d) 64
Answer: (b)
Detailed solution:
In eBGP (External Border Gateway Protocol), the Time to Live (TTL) field in the IP header plays a
crucial role in preventing routing loops and controlling the scope of BGP updates. By default, BGP
packets have a TTL of 1 in eBGP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Detailed solution: A routing table is a database in a router that contains information about the paths
to various network destinations. The table includes details like destination network, next hop, and
metric values, enabling the router to forward packets efficiently.
QUESTION 2
Detailed solution: Static routing involves manually configuring routes, making it inflexible. If the
network topology changes, the administrator must manually update the routing table. This makes
static routing unsuitable for dynamic or large networks.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which switching fabric mechanism is most scalable for high-speed routers handling large volumes of traffic?
a) Shared bus
b) Crossbar switch
c) Memory-based switching
d) Circuit switching
Detailed solution: Routers use switching fabrics to move packets from input ports to output ports
efficiently. Scalability depends on how well the switching fabric handles large traffic volumes.
Crossbar switches provide parallel paths between input and output ports, allowing multiple packets
to be forwarded simultaneously. Whereas a shared bus means all ports use the same communication
channel, memory-based switching stores incoming packets in memory and forwards them later and
circuit switching establishes a dedicated path before transmission, which is used in telecom networks,
not in modern packet-switched IP routers.
QUESTION 4
In the context of router architecture, what does "line card" refer to?
Detailed solution: A line card is a hardware module in a router that houses input and output ports for
packets.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
If a router receives a new routing update from a protocol like OSPF, where is this information first stored ?
a) In the FIB
b) In the MAC address table
c) In the RIB
d) In the ARP table
Detailed Solution:The RIB stores routing updates from routing protocols such as OSPF, and then, based
on those updates, the best routes are selected and forwarded to the FIB.
QUESTION 6
QUESTION 7
a) OpenFlow does not allow network applications to run over the connected devices.
b) OpenFlow allows for granular control over the flow of packets.
c) OpenFlow is primarily used to monitor network security.
d) OpenFlow increases network congestion by adding overhead.
QUESTION 8
Which of the following best describes the "Southbound API" in an SDN architecture?
Detailed Solution :The "Southbound API" connects the SDN controller with the data plane
(switches/routers), enabling communication with network devices using protocols such as
OpenFlow.
QUESTION 9
a) OpenFlow
b) OVSDB
c) NETCONF
d) RESTful API
Detailed Solution : "Northbound APIs" are used to enable communication between the SDN
controller and network applications. RESTful APIs are a common example of northbound APIs that
allow external applications to interact with the controller to request network services.
QUESTION 10
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
In a multi-controller SDN setup, what mechanism is commonly used to ensure consistent
state across controllers?
a) Flow migration
b) Controller federation
c) Dynamic flow recalculation
d) Multi-path routing
Detailed Solution : In a multi-controller SDN setup, controller federation is used to ensure that
multiple controllers can work together, share information, and maintain a consistent state across the
entire network. This involves mechanisms like state synchronization, coordination, and fault
tolerance among different controllers in the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
The CSMA/CD protocol, predominantly used in Ethernet, addresses which of the following
challenges?
Detailed solution: The CSMA/CD protocol ensures efficient use of shared media by detecting
collisions and managing retransmissions.
QUESTION 2
Which MAC technique is most suitable for bursty traffic with sporadic transmissions?
Detailed solution: Contention-based asynchronous MAC is ideal for sporadic, short transmissions
like those typical of interactive terminal-host traffic, as it is simple to implement and efficient under
light load conditions.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
In Go-Back-N ARQ, why must the size of the sender's window be less than 2m , where m is the
number of bits in the sequence number?
Detailed solution: If the window size were equal to or greater than 2m, the same sequence numbers
could be reused before the acknowledgment for earlier frames is received, causing confusion at the
receiver about whether the frames are retransmissions or new ones.
QUESTION 4
What is the minimum frame size for Ethernet (IEEE 802.3), and why is it important?
Detailed solution: If the frame size were smaller than 64 bytes, it is possible for the transmission to
complete before a collision is detected, leading to undetected collisions and corrupted data.The frame
size includes a 14-byte header, 46 bytes of payload, and a 4-byte CRC (Cyclic Redundancy Check).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
In a Selective Repeat ARQ system with a 4-bit sequence number and a sender's window size of 8, what is
the minimum size of the receiver's buffer to prevent loss of out-of-order frames?
a) 4
b) 8
c) 16
d) 1
Detailed Solution:
Selective Repeat ARQ, the sender's and receiver's window sizes are equal and must be at most half of 2�,
where � = 4. 2m / 2 = 16 / 2 = 8. The receiver's buffer size must equal the sender's window size to store
out-of-order frames.
QUESTION 6
A wireless CSMA/CA network uses a backoff algorithm with a contention window size that
doubles after each collision. If the initial contention window size is 32, what is the maximum
contention window size after 4 collisions?
a) 256
b) 512
c) 128
d) 1024
QUESTION 7
In a shared 75 kbps channel, each station transmits a 20-bit frame every 2000 ms. If the network
uses Slotted Aloha, what is the maximum number of stations that can be supported?
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
a) 7500
b) 2775
c) 7000
d) 5000
QUESTION 8
Consider a CSMA/CD network where the frame transmission time Tf is much larger than the
propagation delay tp. Which of the following factors affect the efficiency of the network?
Detailed Solution :
Frame Size : Larger frames improve efficiency by reducing overhead.
Propagation Delay (tp) : Higher delay increases collision probability, reducing efficiency.
Backoff Time : Longer backoff after collisions leads to idle time, lowering efficiency.
Total Number of Stations : More stations increase contention and collisions, reducing efficiency.
So All are True.
QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
In a round-robin MAC technique, a network has 10 stations, and each station gets a time slot of 2 ms. If a
station has a data frame of 2 KB to transmit, and the transmission rate is 1 Mbps, how many rounds will it
take for the station to complete its transmission?
a) 4
b) 8
c) 16
d) 20
Detailed Solution :
Time to transmit 2 KB (16 Kb) at 1 Mbps: (16Kb/1Mbps) = 16ms
Number of time slots needed of each 2 ms : (16/2) = 8
Number of rounds (10 stations = 10 slots per round) : 8 slots / (1 slot per round) = 8
QUESTION 10
A network administrator is analyzing a collision on a traditional Ethernet network using CSMA/CD. They
observe the following sequence:
If the backoff limit is reached without successful transmission, what should the node do next?
Detailed Solution : If the backoff limit is exceeded in CSMA/CD, the node aborts the transmission
and reports a failure. This prevents indefinite retries that could congest the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 11 - Week 11 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10
QUESTION 1
Answer: (a)
Detailed solution:
The Address Resolution Protocol (ARP) is a protocol used for discovering the link layer address, such
as a MAC address, associated with a given IPv4 address.
QUESTION 2
a) BOOTP is a legacy protocol used to assign IP addresses and other configuration information
to devices during startup.
b) BOOTP evolved from DHCP to support dynamic IP addressing and reusable addresses.
c) Both DHCP and BOOTP serve the purpose of providing IP addresses and configurations to
devices.
d) None of them.
Answer: (b)
Detailed solution:
DHCP evolved from BOOTP to support dynamic IP addressing and reusable addresses.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which port number does DHCP use for client-server communication at layer 2?
a) TCP 80
b) UDP 67 & 68
c) UDP 80 & 81
d) UDP 23
Answer: (b)
Detailed solution:
DHCP client uses UDP 68 and DHCP server uses UDP 67 during communication.
QUESTION 4
a) Point-To-Point Protocol(PPP)
b) Dynamic Host Configuration Protocol (DHCP)
c) Address Resolution Protocol (ARP)
d) Spanning Tree Protocol (STP)
Answer: (d)
Detailed solution:
Spanning Tree Protocol (STP) is specifically designed to prevent bridge loops in Ethernet networks
by creating a loop-free topology. It ensures that there is always one active path between any two
devices on a network while blocking redundant paths that could cause loops.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
I. It can carry data from multiple VLANs over a single physical connection.
II. It allows VLANs to span across multiple switches, enabling seamless communication for
devices in the same VLAN, even if they are connected to different switches.
a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)
Answer: (c)
Detailed solution:
Trunk links are a foundational component of modern VLAN-based networks, providing a scalable,
efficient, and versatile way to manage and transport VLAN traffic across the network. These type of
ports are usually found in connections between switches. These links require the ability to carry
packets from all available VLANs because VLANs span over multiple switches.
QUESTION 6
a) RTS/CTS mechanism
b) backoff timers
c) Interframe Space (IFS)
d) None of these.
Answer: (a)
Detailed solution:
The hidden terminal problem is a common issue in Wireless Local Area Networks (WLANs) that
arises when two or more devices (nodes) are within the communication range of a central access point
(AP) but are not within the range of each other. Mechanisms like RTS/CTS and CSMA/CA, along
with careful network planning, are essential to mitigate its effects and maintain efficient wireless
communication.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
Given a wireless network using CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance), where the transmission time of a data frame is 200 ms. The contention window backoff
time (in the event of a collision) always follows an exponential backoff mechanism, with a random
backoff time selected from a range of 0 to 10 slots. Each slot is 10 ms. A collision happens, and the
backoff time for retransmission is selected randomly within the range of 0 to 10 slots. What is the
total time spent (in ms) for the first retransmission if the backoff time is randomly selected to be 7
slots? (Ignore the time spent in the first transmission attempt)
a) 200 ms
b) 250 ms
c) 260 ms
d) 270 ms
Answer: (d)
Detailed solution:
Transmission time of the data frame: 200 ms
Backoff time range: 0 to 10 slots
Slot duration: 10 ms
Backoff time randomly selected: 7 slots
Backoff Time = 7 slots × 10 ms/slot = 70 ms
Total time spent: Original transmission time + Backoff time = 200 ms + 70 ms = 270 ms.
QUESTION 8
a) Layer 2
b) Layer 3
c) Layer 4
d) Layer 5
Answer: (a)
Detailed solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Spanning Tree Protocol (STP) is a protocol that prevents Layer 2 loops or Bridging loops
by computing a tree structure of nodes in a network.
QUESTION 9
a) 256
b) 255
c) 234
d) 231
Answer: (c)
Detailed solution:
QUESTION 10
Answer: (d)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed solution:
The 802.3 standard defines Ethernet, as the most widely used wired LAN technology. The 802.11s
standard defines mesh networking, allowing Wi-Fi devices to form self-configuring, multi-hop
networks without a central access point. The 802.11af standard enables Wi-Fi operation in unused
TV spectrum bands (white spaces) for better coverage and signal penetration. The 802.11h standard
introduces transmit power control (TPC) and dynamic frequency selection (DFS) to comply with
European radio regulations. The 802.11f standard was a recommendation for inter-access point
communication to facilitate handover (roaming) between Wi-Fi APs.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
In which layer of the OSI model does the HTTP (Hypertext Transfer Protocol) operate?
a)Transport Layer
b)Network Layer
c)Application Layer
d) Data Link Layer
Detailed solution: HTTP (Hypertext Transfer Protocol) is a protocol used for web communication.
It belongs to the Application Layer, which provides network services like email (SMTP, POP3), file
transfer (FTP), and web browsing (HTTP, HTTPS).
QUESTION 2
a) A method that encodes data using transitions at the beginning of each bit period.
b) A self-clocking encoding technique with a transition in the middle of each bit period.
c) A signaling method that uses voltage levels directly to represent 1s and 0s.
d) An encoding technique that combines multiple signals into one.
QUESTION 3
A time-division multiplexing (TDM) link transmits 4,000 frames per second, with each time slot containing
8 bits. What is the transmission rate of this TDM circuit
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
QUESTION 4
What is the main difference between Manchester and Differential Manchester encoding?
a) Differential Manchester requires more bandwidth
b) Differential Manchester uses a transition for every 1-bit
c) Manchester encoding has no transitions at all
d) Manchester encoding is only used in analog signals
Detailed solution:
Manchester encoding:
0 → High to Low transition at the middle of the bit
1 → Low to High transition at the middle of the bit
QUESTION 5
Detailed Solution:In PSK, information is transmitted by altering the phase of the carrier signal.
QUESTION 6
A channel has a capacity of 1 Mbps and an SNR of 9. If the SNR is halved, what happens to the
channel capacity?
QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
What is the primary limitation of NRZ-L when used over long distances?
Detailed Solution: For long sequences of 0s or 1s, the constant voltage in NRZ-L results in no
transitions, making it challenging for the receiver to maintain synchronization with the transmitter.
QUESTION 8
Detailed Solution: FSK has a constant envelope, making it suitable for applications requiring
power-efficient amplifiers, such as in wireless communications. However, it is less bandwidth-
efficient than QPSK or QAM.
QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed Solution: Proxy firewalls offer the highest level of security by acting as an intermediary
between users and the internet. They prevent direct connections, filter malicious traffic, and provide
content inspection, logging, and authentication.
QUESTION 10
A firewall rule that permits outgoing HTTP traffic but denies all incoming traffic except for
established connections operates under which principle?
a) Default allow
b) Default deny
c) Least privilege
d) Fail-safe defaults
Detailed Solution: This rule operates under the default deny principle, where all traffic is denied
unless explicitly permitted (e.g., outgoing HTTP and established connections).