0% found this document useful (0 votes)
167 views66 pages

Assignment Week 1-12 Solution Jan-April 2025

The document contains assignments for an online certification course on Computer Networks and Internet Protocol from IIT Kharagpur, detailing multiple-choice questions covering various networking concepts. Topics include collision domains, TCP/IP model layers, encapsulation, circuit switching, transport layer protocols, DNS, and HTTP architecture. Each question is accompanied by a correct answer and a detailed explanation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views66 pages

Assignment Week 1-12 Solution Jan-April 2025

The document contains assignments for an online certification course on Computer Networks and Internet Protocol from IIT Kharagpur, detailing multiple-choice questions covering various networking concepts. Topics include collision domains, TCP/IP model layers, encapsulation, circuit switching, transport layer protocols, DNS, and HTTP architecture. Each question is accompanied by a correct answer and a detailed explanation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur


Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 1 - Week 1 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

How many collision domains are in a 10-port hub, an 8-port switch (L2), and a 4-port router,
respectively? A collision domain is the segment of a network, where if more than one device tries to
send data simultaneously, it causes a collision and the data is lost.

a) 1, 8, and 4, respectively.
b) 10, 8, and 4, respectively.
c) 10, 10, and 10, respectively.
d) 5, 4, and 2, respectively.

Answer: (a)

Detailed solution:
Router has per-port broadcast and collision domain. Switch has a per-port collision domain with a
single broadcast domain. Hub has a single collision and broadcast domain.

QUESTION 2

Map the devices with their associated layer in the TCP/IP model.

A. NIC 1. Physical Layer


B. Router 2. Data Link Layer
C. Bridge 3. Network Layer
D. Hub 4. Transport Layer

a) A-2, B-3, C-2, and D-1


b) A-3, B-3, C-2, and D-1
c) A-3, B-3, C-1, and D-2
d) A-2, B-3, C-2, and D-2

Answer: (a)

Detailed solution:
Hub operates at Layer 1 of the TCP/IP model, while Bridge, NIC, and Switch(L2) work with MAC
addresses at Layer 2. A Router works with IP addresses and it operates in a network layer.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Map the protocols with their associated layer in TCP/IP.

A. FTP 1. Physical Layer


B. UDP 2. Data Link Layer
C. PPP 3. Network Layer
D. IP 4. Transport Layer
E. HTTP 5. Application Layer

a) A-1, B-2, C-3, D-4, and E-5


b) A-5, B-4, C-3, D-2, and E-1
c) A-5, B-2, C-2, D-3, and E-5
d) A-5, B-4, C-2, D-3, and E-5

Answer: (d)

Detailed solution:
File Transfer Protocol (FTP), and HyperText Transfer Protocol (HTTP) operate in an application
layer; User Datagram Protocol (UDP) operates in a transport layer; Internet Protocol (IP) operates in
a network layer; and Point to Point Protocol (PPP) operates in a data link layer. For more details,
please refer to the lecture slides no. 5.

QUESTION 4

Which of the following statement(s) are concerned with encapsulation in computer networks?

I. It involves an addition of a header and trailer to the actual data as it moves down in the TCP/IP
protocol stack.
II. At the transport layer, encapsulation includes port numbers and at the network layer,
encapsulation includes IP addresses.

a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)

Answer: (c)

Detailed solution:
Encapsulation is the process of addition of a header and trailer while moving down from upper layer
to lower layer like adding source and destination port numbers to the application layer data, adding
source and destination IP addresses to the transport layer segment etc.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

Which of the following is NOT a disadvantage of the circuit switching technique over the packet
switching technique in computer networks?

a) Delay in the establishment of a dedicated connection between two hosts


b) Inefficient utilization of the resources
c) Less scalable
d) Provides a dedicated communication path between two end hosts

Answer: (d)

Detailed solution:
Circuit switching techniques establish a dedicated path for communication, and it remains
unutilised in case of no data transmission. It also suffers from greater setup time delay, scalability
issues, lack of fault tolerance, etc.

QUESTION 6

Choose the FALSE statement.

a) Bridges filter network traffic based on IP addresses.


b) Hubs share bandwidth among all attached devices.
c) Switch provides dedicated bandwidth for each LAN segment.

Answer: (a)

Detailed solution:
Bridges filter network traffic based on MAC addresses.

QUESTION 7

Which transport layer protocol will be chosen by an application that does not require any reliability?

a) TCP
b) UDP
Answer: (b)
Detailed solution:
User Datagram Protocol (UDP) is a connectionless-oriented protocol and provides no reliability.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 8

You are a network administrator in your college. You are asked to do troubleshooting for an issue of
a remote server using telnet. Which of the following consideration(s) should you keep in mind when
using Telnet for this task?

a) Telnet is more secure than SSH while making a remote connection.


b) It is advisable to use telnet in a local network rather than on the internet to avoid security risks.
c) Telnet encrypts all traffic by itself during communication.
d) Telnet transmits data as a plaintext including login credentials.

Answer: (b), (d)

Detailed solution:
Telnet is an insecure method to connect to a remote server. Its traffic is flowing in the networks as a
plaintext including login credentials. For the security aspect, we adopt SSH instead of telnet.

QUESTION 9

Choose the statement(s) that correctly describe(s) the roles and responsibilities of the Network
Interface Card (NIC) in the computer networks.

I. NIC takes over the responsibility of segmenting large chunks of data into smaller packets that
can be transmitted over the networks.
II. It converts digital data from the computer’s processor to an analog signal.

a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)

Answer: (c)

Detailed solution:
The NIC's primary role at the Data Link Layer is to ensure reliable frame-based transmission of data
over a local network, including responsibilities for framing, MAC addressing, error detection, flow
control, and managing access to the transmission medium. In computer networking, large send
offload (LSO) is a technique for increasing egress throughput of high-bandwidth network connections
by reducing CPU overhead. It works by passing a multipacket buffer to the network interface card
(NIC). The NIC then splits this buffer into separate packets. The technique is also called TCP
segmentation offload (TSO) or generic segmentation offload (GSO) when applied to TCP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 10

Identify the INCORRECT statement(s) related to Bridge and Switch (L2) in computer networks.

a) For small enterprises (without the need for features like QoS, VLANs, and STP), a switch is
more economical/suitable in the case of segmenting the traffic between two LANs than a
bridge.
b) Switches operate in full-duplex mode while bridges in half-duplex mode.
c) Switches broadcast traffic to all ports, while bridges broadcast the traffic to designated ports
(ports having the same VLAN port as the sender) by using a MAC address table.
d) Switches and bridges are both equally important in modern, large, and complex networks.

Answer: (a), (c), and (d)

Detailed solution:
Bridge and Switch (L2) Both are layer 2 devices. Bridges are replaced by multiport switches in large
and complex networks. Bridges operate in only two ports and permit traffic in only one direction at a
time. Switches have multiports and permit the traffic in full-duplex mode. It also supports modern
features like QoS, VLANs, STP, etc. that are unavailable in the bridges. This is why switches are
called more intelligent than bridges. Switches take support of the MAC address table to pass the
traffic, so it reduces the floods of broadcast traffic to a great extent by just sending it to the ports
having the same VLAN as the sender.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment 2 - Week 2 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

What is the difference between a ‘domain’ and ‘zone’ in DNS?

a) Zone is a subset of a domain, and a domain can contain multiple zones.


b) Domain is a subset of a zone, and a zone can contain multiple domains.
c) Domain is a logical hierarchy, whereas a zone is a physical DNS server.
d) DNS zones must be physically separated from each other.

Correct Answer: (a)

Detailed solution: A zone refers to a specific portion of this domain that is managed by a particular
administrative entity or DNS server. DNS zones aren’t necessarily physically separated from each
other.

QUESTION 2

What makes FTP more secure than TFTP (Trivial File Transfer Protocol)?

a) TFTP lacks features like user authentication and secure data transfer mechanisms.
b) TFTP allows simultaneous connections without encryption.
c) TFTP uses TCP, which is inherently less secure than UDP.
d) TFTP is designed for unreliable networks, making it inherently less secure.

Correct Answer: (a)

Detailed solution: Compared to FTP, which uses TCP and has authentication mechanisms, TFTP is
less dependable and safe since it lacks crucial security features like user authentication and runs on
UDP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

In the HTTP architecture, which of the following best describes a Uniform Resource Locator (URL)?

a) A secure protocol for encrypting HTTP communication.


b) A client-side scripting language for web development.
c) A unique identifier for resources, including the protocol, hostname, and path
d) A header that allows caching of web pages for better performance.

Correct Answer: (c)

Detailed solution: A URL uniquely identifies resources on the web, specifying the protocol (e.g.,
HTTP or HTTPS), hostname (e.g., example.com), port (if applicable), and the path to the resource."

QUESTION 4

Which of the following statements about HTTP proxy servers is NOT true?

a) They can cache responses from web servers to improve performance.


b) They can filter requests based on predefined rules.
c) They only work with secure connections (HTTPS).
d) They act as intermediaries between clients and web servers.

Correct Answer: (c)

Detailed solution: HTTP proxy servers are not limited to secure connections; they can process both
HTTP and HTTPS queries. Because they have the ability to filter requests and cache responses, option
C is erroneous.

QUESTION 5
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Which of the following is correct for statements P, Q and R?

P: HTTP uses TCP port 80 for communication.

Q: TELNET transmits data in an encrypted format.

R: DNS can operate on both TCP and UDP.

a) Both P and R is False, Only Q is True


b) Both P and R is True, Q is False
c) Only Q is True
d) Only R is False

Correct Answer: (b)

Detailed Solution:

P: True. HTTP uses TCP port 80 for communication.

Q: False. TELNET transmits data in plaintext, making it unencrypted and insecure.

R: True. DNS typically runs on UDP for queries but switches to TCP for zone transfers or large responses.

QUESTION 6

What is the correct syntax to be written in the command line to initiate a Telnet connection to the
web server of www.iitkgp.ac.in?

a) telnet//www.iitkgp.ac.in
b) telnet:www.iitkgp.ac.in
c) telnet://www.iitkgp.ac.in
d) telnet www.iitkgp.ac.in

Correct Answer: (d)


Detailed Solution: The command starts with Telnet, followed by the hostname or IP address.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7

Which of the following protocols allow non-ASCII data to be sent over email?

a) IMAP4
b) TELNET
c) MIME
d) POP3

Correct Answer: (c)

Detailed Solution: MIME transforms data into a format that SMTP can transmit, such as Base64
encoding for binary files, allowing non-ASCII data to be sent over email.

QUESTION 8

Which of the following is true about the mail transfer protocol?

S1: Can send image files with the help of IMAP4


S2: Can send image files with the help of POP3
S3: IMAP4 is more secure than POP3

a) Only S1
b) Only S2
c) S2 and S3 only
d) S3 Only

Correct Answer: (d)

Detailed Solution:
S1: Incorrect. SMTP cannot send image files directly; it requires MIME (not IMAP4) for sending
non-ASCII data like images.
S2: Incorrect. POP3 is used for retrieving emails, not for sending them. SMTP sends emails, but
image files are sent via MIME.
S3: Correct. IMAP4 is generally more secure than POP3 because it supports features like
encrypted communication and better mailbox management.

QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

A user is accessing a webpage hosted on a remote server. The webpage contains multiple elements, such as
text content, several images, and a JavaScript file. The user's browser starts by initiating a connection to
the server and sending requests to fetch the necessary resources. Assume the following steps:

● The browser must first resolve the web server's domain name to an IP address.

● After the server IP is obtained, the browser opens a TCP connection to request the webpage and its
embedded resources.

● The packets leaving the user's machine, in some order, are as follows:

(i) HTTP GET request for the main HTML page


(ii) DNS query to resolve the web server's domain name
(iii) TCP SYN to establish a connection with the server
(iv) HTTP GET request for a JavaScript file
(v) HTTP GET request for an image file

Which of the following is the correct chronological order in which the packets leave the user's computer
(from first to last)?

a) (ii), (iii), (i), (v), (iv)


b) (iii), (ii), (i), (v), (iv)
c) (ii), (iv), (i), (iii), (v)
d) (ii), (i), (iii), (v), (iv)

Correct Answer: (a)

Detailed Solution:
1. DNS Query: The browser must resolve the web server’s domain name into an IP address.
This is the first step, so (ii) comes first.
2. TCP Connection Setup: After the IP address is obtained, the browser must establish a TCP
connection with the server. This involves the TCP handshake, so (iii) is the second step.
3. HTTP GET Request for Main Page: After the connection is established, the browser sends an
HTTP GET request for the main HTML page, which is (i).
4. HTTP GET Requests for Embedded Resources: After receiving the main page, the browser
requests the embedded resources (image and JavaScript files). These requests are typically sent
after receiving the HTML page, so (v) (image) and (iv) (JavaScript) can be executed in any order.

Thus, the correct chronological order is:


(ii), (iii), (i), (v), (iv)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 10

Consider the following statements:

S1: A user requests a web page that consists of some text and one image. For this page the client
will send one request message and receive 4 response messages.

S2: It is not possible to send two different web pages (for example, www.nptel.ac.in/student.html
and www.nptel.ac.in/course.html) over the same persistent connection.

Which one of the above statements are true?

a) Only S1 is true
b) Only S2 is false
c) Both S1 and S2 are true
d) Both S1 and S2 are false

Correct Answer: (d)

Detailed Solution: S1: It will send 4 message, and receive 4 response messages
S2: If the connection does not timeout and we do not close it, persistent HTTP keeps the connection
open. so that more web pages can be sent over persistent HTTP connections.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 3 - Week 3 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

What kind of sequence number does TCP use?

a) byte-oriented sequence number


b) packet-oriented sequence number
c) Randomly generated fixed sequence numbers
d) none of them

Answer: (a)

Detailed solution:
TCP uses byte-oriented sequence numbering to ensure reliable, ordered, and efficient data
transmission over a network.

QUESTION 2

Identify the FALSE statement(s) in the following-


I. The transport layer functionalities (e.g., connection establishment, flow control, error
detection) operate at an abstract level using data structures, algorithms, and system calls
implemented in the OS kernel.
II. The operating system (OS) kernel does not play any role in supporting the transport layer
functionalities of the TCP/IP protocol stack.

a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)

Answer: (b)

Detailed solution:
The transport layer relies on data structures (e.g., buffers, sequence number tables) to manage
connections, algorithms (e.g., sliding window for flow control, checksum for error detection) to
ensure reliable communication, and system calls (e.g., socket(), send(), recv()) to interact with the OS
kernel, which implements these functionalities abstractly for application-level use.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which of the following services is NOT supported by the transport layer?

a) End-to-end packet delivery


b) Ordered packet delivery
c) Reliable data delivery
d) Forwarding the datagram from one hop to another hop in the network

Answer: (d)
Detailed solution:
The transport layer provides services like End-to-end packet delivery, Ordered packet delivery,
Reliable data delivery, Connection establishment, and Flow & Congestion control etc. The hop-to-
hop network packet forwarding is supported by data link layer and network layer.

QUESTION 4

What can be a primary mechanism used to ensure the reliable data transfer in a stop-and-wait
algorithm (Noisy Channel)?

a) Employing only error detection and correction codes without requiring acknowledgements.
b) Increasing the timeout interval.
c) Using a sequence number to identify each packet uniquely and waiting for an
acknowledgement for each packet before sending the next packet.
d) Using a sliding window to send multiple packets without waiting for their acknowledgements.

Answer: (c)

Detailed solution:
Stop-and-Wait (Noisy Channel) flow control algorithm uses a sequence number to individually
identify each frame and corresponding acknowledgement. It ensures reliability by attaching a
sequence number to each packet and transmits a packet & waits for an acknowledgment (ACK)
from the receiver before sending the next packet. If the ACK is not received within a timeout period,
the sender retransmits the packet.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

A data of 40 bytes need to be delivered using TCP protocol but a sender can send a segment of
maximum size 12 bytes only. Identify the sequence number of the last segment formed if the sequence
number field uses 5 bits only? [Assume sequence number starts from 0]

a) 1
b) 4
c) 12
d) 31

Answer: (b)

Detailed solution:
TCP uses byte sequencing. It treats data as a continuous stream of bytes rather than discrete packets.
Since the sequence number field uses 5 bits only, it produces sequence numbers ranging from 0 to
31.
The first segment of 12 bytes will use the sequence number range (0-11),
Next segment of 12 bytes will use the sequence number range (12-23),
Next segment of 12 bytes will use the sequence number range (24-31) & (0-3), and
The last segment of 4 bytes will use the sequence number range (4-7).
The sequence number in a TCP segment header refers to the first byte of data in that segment
relative to the start of the stream.

QUESTION 6

A sender uses a sliding window protocol with a window size of 5. The range of sequence numbers
follows modulo 8 ( the sequence number starts from 0 to 7). If the receiver acknowledges packet 1,
what will be the sender’s new window range?

a) 1-5
b) 2-6
c) 3-7
d) 0-4

Answer: (b)

Detailed solution:
When the receiver acknowledges the packet, resulting in a forward slide of the sender’s window. The
sliding window now starts at 2 (the next unacknowledged sequence number) till the allowed window
size.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 7

Determine whether the following information is True or False?

“During the three-way handshaking of connection establishment procedure (from Host 1 to Host 2),
Delayed duplicate SYN can be handled by TCP at Host 2 simply by ignoring it, as the sequence
number is invalid”

a) True
b) False

Answer: (a)
Detailed solution:
The TCP 3-Way Handshake is a fundamental process that establishes a reliable connection between
two devices over a TCP/IP network. During the handshake, the client and server exchange initial
sequence numbers. It uses sequence numbers to identify and validate the legitimacy of connection
requests. A delayed duplicate SYN will have an outdated sequence number that doesn't match the
current connection state at Host 2 and can be ignored as invalid sequence number.

QUESTION 8

TCP instance uses a sliding window protocol in the noisy channel. A timeout occurs due to the loss
of a segment (or the acknowledgement). Mark the RIGHT statement among the following-

a) In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, all the segments
of the sliding window are retransmitted while in Selective Repeat ARQ, only the lost packets
are selectively transmitted.
b) In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, only the lost
packets of the sliding window are selectively retransmitted while in Selective Repeat ARQ,
all packets of the sliding window are retransmitted.
c) In both cases, Go-Back-N ARQ and Selective Repeat ARQ, all packets of the sliding window
are retransmitted.
d) In the both cases, Go-Back-N ARQ and Selective Repeat ARQ, only lost packets of the
sliding window are selectively retransmitted.

Answer: (a)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed solution:
In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, all the segments of the
corresponding sliding window are retransmitted while in Selective Repeat ARQ, only the lost packets
are selectively transmitted.

QUESTION 9

Consider a sender using the Go-Back-N ARQ protocol with a window size 5. The sequence number
ranges from 0 to 7 (modulo 8). The sender initially transmits packets with the sequence numbers- 0,
1, 2, 3, and 4. During the transmission, packet 3 is lost in the network. The sender receives a
cumulative ACK for the packet 2. The sender continues sending packet 5, 6, and 7 but the receiver
denies accepting them due to the loss of packet 3.
Identify the range of packets that will be retransmitted by the sender after the timeout of packet 3?

a) 0, 1, 2, 3, and 4.
b) 2, 3, 4, 5, and 6.
c) 3, 4, 5, 6, and 7.
d) 1, 2, 3, 4, and 5.

Answer: (c)
Detailed solution:

In Go-Back-N ARQ, when a timeout occurs, the sender retransmits all packets starting from the lost
packet to all permissible packets in accordance with the window size.

QUESTION 10

A client and a server establish a connection using TCP's three-way handshake. The following details
are given:
● Initial sequence number of the client: 100 and initial sequence number of the server: 300.
● RTT (Round Trip Time): 80ms.
● Each TCP segment carries 40 bytes of header information.
● The server sends a SYN-ACK segment, and the acknowledgement (ACK) segment from the client is
delayed due to congestion, taking 100ms to reach the server.
How much time does it take to establish the connection under such a scenario?

a) 100ms
b) 280ms
c) 180ms
d) 260ms
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Answer: (c)

Detailed solution:
In three way handshaking, the connection is established after three steps. In first step, sender sends a
connection request SYN packet to the server. Server responds to client with SYN+ACK packet.
Finally, sender sends a ACK packet to the server. Since RTT = 80ms so for one way packet
transmission will take 40ms. Since, there is a delay during transmission of ACK packet from sender
to server due to congestion and it takes greater time i.e. 100ms. So, the total time needed to complete
this connection procedure will be (time taken for SYN packet + time taken for SYN+ACK packet +
time taken for ACK packet) i.e. (80/2ms+80/2ms+100ms=180ms).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment 4 - Week 4 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

Which statement about choosing a transport protocol based on BDP (Bandwidth Delay Product) is
correct?

a) Sliding window protocols always outperform stop-and-wait protocols, regardless of the BDP.
b) When the BDP is smaller than the segment size, a sliding window protocol significantly
improves performance.
c) Stop-and-wait protocols are preferred when the BDP is smaller than the segment size to
minimize complexity.
d) Selective repeat ARQ should always be chosen over go-back-N ARQ to maximize throughput.

Correct Answer: (c)

Detailed solution: The simplicity of stop-and-wait protocols comes from avoiding the complexity of
managing multiple packets in transit, retransmissions, and acknowledgments simultaneously. In cases
where the BDP is smaller than the segment size, the channel cannot effectively utilize the benefits of
a sliding window protocol, making stop-and-wait a better choice for reducing complexity without
sacrificing performance.

QUESTION 2

Which of the following best describes Max-Min Fairness in congestion control?

a) Allocating bandwidth equally to all flows regardless of their requirements..


b) Allocating bandwidth based on the relative priority of each flow, does not ensure optimal
network efficiency.
c) Maximizing the minimum bandwidth across all links in the network.
d) Allocating bandwidth so that no flow can increase its allocation without decreasing another
flow's allocation.

Correct Answer: (d)


NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed solution: Max-Min Fairness ensures that bandwidth is allocated in such a way that
increasing the allocation for one flow can only occur by decreasing the allocation for another flow.
This principle prioritizes fairness while respecting the constraints of the network, particularly at
bottleneck links, ensuring that no flow is unfairly starved.

QUESTION 3

What happens if a transport-layer application Transmission Control Protocol (TCP) attempts to send
data before the connection is established?

a) The data is queued until the connection is established.


b) The operation is invalid, and the transport layer prevents it.
c) The data is sent, but the receiver might ignore it.
d) The data is fragmented and sent in packets to the destination.

Correct Answer: (b)

Detailed solution: In a stateful transport-layer protocol like TCP, data transmission is only allowed
when the connection is in the "established" state. If an application attempts to send data before the
connection is established, the operation is invalid, and the transport layer will block or reject it."

QUESTION 4

Which of the following conditions does not influence the segment size in TCP?

a) Maximum Transmission Unit (MTU) of the underlying link.


b) Receiver's advertised window size.
c) Network congestion window size.
d) Header length of the IP protocol.

Correct Answer: (d)

Detailed solution: Header Length of the IP Protocol does not directly affect the TCP segment size.
Instead, it impacts the total size of the network packet but is unrelated to the TCP segmentation
process.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

In the TCP connection release process, why does the active closer enter the TIME-WAIT state after
receiving the final acknowledgment?

a) To confirm that the other host has received the FIN message.
b) To allow the passive closer to resend data if needed.
c) To ensure that any delayed packets in the network are discarded.
d) To avoid reusing the same port for a new connection.

Correct Answer: (c)


Detailed Solution:

The TIME-WAIT state ensures that all delayed packets in the network from the just-closed connection are
discarded. This prevents any potential interference with subsequent connections that might reuse the same
port and sequence numbers.

QUESTION 6

In a distributed system, a server advertises a receiver window of 0 due to lack of buffer space.
However, the application frees up space but the updated acknowledgment is lost. What should the
client do to prevent deadlock?

a) Wait indefinitely until the server sends a new acknowledgment.


b) Resend data packets at periodic intervals to elicit a response.
c) Use a keep-alive mechanism to periodically check the buffer status.
d) Close the connection and restart communication.

Correct Answer: (c)


Detailed Solution : A keep-alive mechanism allows the client to periodically probe the server for
updated buffer availability without retransmitting data, preventing deadlock.

QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

A TCP sender observes a mismatch between the advertised window size from the receiver and the
available buffer space. Which of the following is True?

a) The receiver has miscalculated the advertised window size.

b) Congestion control mechanisms have reduced the sender’s transmission rate.


c) The sender's maximum segment size (MSS) is incorrectly set.
d) A delayed acknowledgment has caused the advertised window size to be outdated.

Correct Answer: (d)

Detailed Solution : If acknowledgments are delayed, the receiver’s advertised window size may not
reflect the current buffer availability, leading to a perceived mismatch.

QUESTION 8

A transport-layer protocol using AIMD starts with an initial sending rate of 1 Mbps. After four
successful additive increases (each adding 0.5 Mbps), it detects packet loss. If the multiplicative
decrease factor is 0.5, what will be the new sending rate?

a) 2.5 Mbps
b) 1 Mbps
c) 3 Mbps
d) 1.5 Mbps

Correct Answer: (d)

Detailed Solution:
Initial rate: 1 Mbps.
Four additive increases: 1+4×0.5=3 Mbps
Multiplicative decrease: 3×0.5=1.5 Mbps

QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

A TCP connection is experiencing high delays and packet reordering. Which features of TCP help
maintain reliable and ordered communication in this scenario?

(i) Sequence numbers in the TCP header.


(ii) Acknowledgment numbers indicating the next expected byte.
(iii) The urgent pointer to prioritize packets.
(iv) Sliding window flow control.

a) (i), (iii), (iv)


b) (i), (ii), (iii)
c) (ii), (iii), (iv)
d) (i), (ii), (iv)

Correct Answer: (d)

Detailed Solution:
A and B: Sequence and acknowledgment numbers allow TCP to reorder out-of-order packets and ensure
reliable delivery.
D: Sliding window flow control ensures efficient data transfer despite delays.
C: The urgent pointer is unrelated to packet reordering or delays

QUESTION 10

In the case of a simultaneous TCP open (both hosts initiate a connection at the same time), which of
the following are true?
(i) : Both hosts will transition to the SYN-RECEIVED state after exchanging SYN messages.
(ii): The three-way handshake completes with the exchange of SYN+ACK messages.
(iii): Both hosts will immediately move to the ESTABLISHED state after receiving SYN messages.
(iv): Simultaneous open is less secure due to lack of proper sequence number synchronization.

a) (i) and (ii)


b) (iii) and (iv)
c) All are True
d) All are False

Correct Answer: (a)


NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed Solution: In a simultaneous open, both hosts send SYN packets and transition to the
SYN-RECEIVED state. The handshake proceeds as normal, ensuring proper synchronization of
sequence numbers. Security is not compromised (D) because sequence numbers are negotiated
during the handshake. So only (i) and (ii) are true.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment - Week 5 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

How does the TCP Sliding Window mechanism contribute to efficient data transmission?

a) By retransmitting all data upon detecting a single packet loss


b) By dynamically adjusting the size of the transmission window
c) By sending data in fixed-size packets regardless of network conditions
d) By prioritizing specific data packets for faster delivery

Correct Answer: (b)

Detailed solution: The TCP Sliding Window mechanism ensures efficient data transmission by
dynamically adjusting the size of the transmission window based on the receiver's buffer capacity and
network conditions. This allows TCP to send data continuously while ensuring that the receiver is not
overwhelmed. It also prevents unnecessary retransmissions and optimizes the use of available
network bandwidth. Unlike fixed-size windows, the sliding window adapts to real-time feedback
from the receiver and the network, making it a core feature of TCP's reliability and flow control.

QUESTION 2

What is a potential drawback of Nagle's algorithm?

a) Increased error rate


b) Increased latency for small packets
c) Reduced bandwidth utilization
d) Inefficient congestion control

Correct Answer: (b)

Detailed solution: Nagle's algorithm can introduce additional latency for small packets, as it waits
for either an acknowledgment of the last packet or enough data to fill the MSS before sending. This
can be undesirable in applications requiring low-latency communication.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which mechanism is used to avoid Silly Window Syndrome at the receiver side?

a) Delayed acknowledgment
b) Nagle’s algorithm
c) Clark’s solution
d) Fast retransmit

Correct Answer: (c)

Detailed solution: Clark’s solution is used to avoid SWS at the receiver's side. It prevents the receiver
from advertising a small window size until the buffer can hold a significant amount of data.

QUESTION 4

What impact does a higher α value have on Jacobson’s algorithm?

a) It makes SRTT more sensitive to sudden RTT changes.


b) It reduces the impact of new RTT measurements on SRTT.
c) It increases the weight of RTTVAR in RTO calculation.
d) It eliminates the need for RTTVAR.

Correct Answer: (b)

Detailed solution: In Jacobson’s algorithm, α\alphaα controls the smoothing of SRTT. A higher
α\alphaα places more emphasis on historical RTT values, reducing the influence of new RTT
measurements. This leads to a slower adaptation to sudden RTT changes, which may provide more
stability but less responsiveness. Conversely, a lower α\alphaα increases sensitivity to sudden RTT
variations but can make SRTT less stable.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

When does TCP enter the Congestion Avoidance phase?

a)When ssthresh (slow start threshold) is reached

b) After three duplicate acknowledgments

c) When the receiver's buffer is full

d) After the congestion window is halved

Correct Answer: (a)

Detailed Solution:TCP transitions from Slow Start to Congestion Avoidance once the congestion window
size exceeds the ssthresh.

QUESTION 6

If the Checksum field in the UDP header is set to 0, what does it indicate?

a) The checksum is not computed.


b) The checksum failed.
c) The checksum is valid.
d) The checksum is reserved for future use.

Correct Answer: (a)

Detailed Solution: A checksum value of 0 in UDP indicates that the sender did not compute the
checksum. This is allowed only in IPv4, but in IPv6, the checksum is mandatory.

QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

What is the purpose of the pseudo-header used in the UDP checksum calculation?

a) To verify data integrity across multiple networks


b) To include additional information like source and destination IPs
c) To ensure compatibility with TCP
d) To pad the UDP datagram to a fixed size

Correct Answer: b)

Detailed Solution: The pseudo-header includes the source IP, destination IP, protocol, and UDP
length. It is used in the checksum calculation to verify data integrity.

QUESTION 8

What does the listen() function do in socket programming?

a) It binds a socket to an address.


b) It puts the socket into a passive mode to wait for incoming connections.
c) It actively connects to a server socket.
d) It sends data over the socket.

Correct Answer: (b)

Detailed Solution: The listen () function sets up a socket to accept incoming connections by
placing it in a passive listening mode.

QUESTION 9

Which function can be used to configure socket options like timeout or buffer size?

a) setsockopt()
b) sockopt()
c) configure()
d) options()

Correct Answer: a)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed Solution : The setsockopt() function is used to configure various socket options, such as
timeout values, buffer sizes, and other protocol-specific settings.

QUESTION 10

What is the advantage of an iterative server over a concurrent server?

a) It is faster in handling multiple requests.


b) It is easier to implement and debug.
c) It supports asynchronous I/O.
d) It has lower response times for high-traffic scenarios.

Correct Answer: (b)

Detailed Solution: An iterative server is simpler to implement and debug due to its sequential
nature, making it easier to manage compared to concurrent server models.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment - Week 6 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

What is the primary function of the network layer in the TCP/IP model?

a) Establish end-to-end connections between nodes.


b) Ensure reliable data transfer between devices.
c) Handle logical addressing and routing of data.
d) Encrypt and decrypt data for secure transmission.

Correct Answer: (c)

Detailed solution: The network layer is responsible for logical addressing (e.g., IP addresses) and
routing data packets across networks.

QUESTION 2

Which of the following is a key advantage of using a Layer 3 switch over a Layer 2 switch?
a) It reduces the need for VLANs.
b) It improves network performance by enabling faster switching at Layer 1.
c) It can route traffic between different subnets without requiring a separate router.
d) It only supports static routing.

Correct Answer: (c)

Detailed Solution: A Layer 3 switch combines the functionality of a switch and a router, allowing it to
perform routing between different subnets. Unlike a Layer 2 switch, which only forwards frames within the
same subnet using MAC addresses, a Layer 3 switch can use IP addresses to route traffic between VLANs
or subnets, reducing the need for an external router.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which of the following is NOT typically offered by an ISP?

a) Email hosting services.


b) Web hosting services.
c) Content creation for websites.
d) Virtual Private Network (VPN) services.

Correct Answer: (c)

Detailed solution: ISPs do not create content. They provide infrastructure and services like email
hosting, web hosting, and VPNs.

QUESTION 4

In a network communication scenario involving an Internet Service Provider (ISP), which of the
following is responsible for determining the most efficient path for packet delivery?

a) Transport Layer
b) Network Layer
c) Data Link Layer
d) Application Layer

Correct Answer: (b)

Detailed solution: The network layer, using routing protocols and IP, determines the best path for
packet delivery.

QUESTION 5

When communicating between two nodes, what role does the transport layer protocol play

a) Routing the data packets.


b) Providing IP logical addressing to the communicating devices.
c) Ensuring reliable or fast data delivery based on protocol choice.
d) Forwarding the data to the next hop through LAN.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Correct Answer: (c)

Detailed Solution: Transport layer protocols like TCP ensure reliable delivery, while UDP provides faster
but less reliable delivery.

QUESTION 6

What type of address is "0.0.0.0" in IPv4?

a) Loopback address
b) Default route address
c) Broadcast address
d) Unspecified address

Correct Answer: (d)


Detailed Solution : "0.0.0.0" is used to indicate an unspecified address, often during the
bootstrapping process.

QUESTION 7

What is the significance of CIDR notation in IP addressing?

a) To replace the traditional classful addressing system with a more flexible and efficient way
of allocating IP addresses.
b) To enhance encryption during transmission.
c) To improve the speed of DNS resolution.
d) To allocate MAC addresses dynamically.

Correct Answer: (a)

Detailed Solution : CIDR (Classless Inter-Domain Routing) simplifies and allows for more
efficient way of IP address allocation.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 8

How many subnets can be created from a /24 network if the subnet mask is extended to /26?

a) 2
b) 4
c) 6
d) 16

Correct Answer: (b)

Detailed Solution :Extending the subnet mask to /26 creates 2^(26−24)= 4 subnets.

QUESTION 9

What is the CIDR notation for a supernet that aggregates 192.168.0.0/24 and 192.168.1.0/24?

a) \23
b) \24
c) \25
d) \22

Correct Answer: (a)

Detailed Solution : The supernet 192.168.0.0/23 includes both 192.168.0.0/24 and 192.168.1.0/24.

QUESTION 10

In a home network using NAT, how does a router differentiate between multiple devices accessing
the same web server?

a) By assigning unique public IP addresses to each device.


b) By using different MAC addresses for each device.
c) By assigning unique port numbers for each session.
d) By encrypting the IP packets.

Correct Answer: (c)


NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed Solution : The router uses unique port numbers for each session in NAT to differentiate
between devices.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment 7 - Week 7 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

Which of the following statements about delay components in a network is false?

a) Propagation delay depends on the length of the transmission link.


b) Queuing delay increases when incoming data exceeds the processing rate of a router.
c) Transmission delay is influenced by the packet size and the bandwidth of the channel.
d) Transmission delay is typically greater than queuing delay in congested networks.

Correct Answer: (d)

Detailed solution: In congested networks, queuing delay is usually much greater than transmission
delay. Queuing delay arises when packets wait in a buffer due to high traffic and limited processing
capacity, which is more significant during congestion. Transmission delay, on the other hand, is
determined by the time it takes to push all bits of a packet onto the transmission medium, which
remains constant for a given packet size and link bandwidth.

QUESTION 2

How does traffic shaping differ from traffic policing in the context of QoS?

a) Traffic shaping identifies and marks packets for prioritization, while traffic policing
drops packets that violate QoS.
b) Traffic shaping regulates outgoing traffic rates, while traffic policing monitors and
drops packets violating QoS.
c) Traffic shaping prioritizes real-time traffic, while traffic policing prioritizes non-real-
time traffic.
d) Traffic shaping is applied only at the router, while traffic policing is applied only at
the source.

Correct Answer: (b)

Detailed solution: Traffic shaping regulates outgoing traffic rates, while traffic policing monitors
and drops packets violating QoS.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which of the following statements about the token bucket algorithm are correct?
S1: It allows burst traffic by using accumulated tokens.
S2 : It discards excess tokens when the bucket is full.
S3 : It smooths out traffic to a constant rate by dropping excess packets.
S4 : It allows traffic to exceed the token generation rate temporarily if tokens are available.

a) S1 and S3 only
b) S2 and S4 only
c) S1, S2 and S4 only
d) S2, S3 and S4 only

Correct Answer: (c)

Detailed solution: Only S3 is incorrect. The token bucket does not smooth traffic to a constant rate;
that is the characteristic of the leaky bucket algorithm. The token bucket allows bursts instead.

QUESTION 4

A video streaming service uses a token bucket with a token generation rate of 5 Mbps and a bucket
size of 10 MB. If the stream has a sudden burst requiring 20 MB of data, how much data can be
transmitted immediately without exceeding the allowed rate?

a) 10 MB
b) 15 MB.
c) 20 MB
d) 5 MB

Correct Answer: (a)


NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Detailed solution: Since b=10 MB and r×t=5 MB, the request requires 20 MB, but at most, 10 MB
is available in the bucket immediately.
10 MB of the 20 MB burst transmitted immediately.

QUESTION 5

During peak traffic, a network's RED mechanism begins dropping packets when the average queue size
reaches the maximum threshold. Why is this early packet drop strategy crucial for maintaining QoS?

a) It reduces packet loss for inelastic traffic by halting elastic traffic completely.
b) It triggers congestion control in TCP before queue overflow occurs.
c) It ensures low-priority traffic is always prioritized over high-priority traffic.
d) It guarantees that all packets from elastic traffic are evenly distributed.

Correct Answer: (b)

Detailed Solution:

When the queue size approaches the maximum threshold, RED starts dropping packets to signal congestion
to TCP flows. This early signaling allows TCP to reduce its sending rate before the queue completely
overflows, thus avoiding severe packet loss and ensuring better Quality of Service (QoS) for all traffic
classes.

QUESTION 6

What is the primary role of a bandwidth broker in the DiffServ architecture?

a) Assign DSCP values to packets dynamically.


b) Reserve resources in all routers within a domain.
c) Facilitate inter-domain QoS agreements.
d) Manage traffic shaping at edge routers.

Correct Answer: (c)


Detailed Solution: The bandwidth broker manages and communicates QoS policies between
DiffServ domains, enabling end-to-end QoS through bilateral agreements.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 7

A company deploys IntServ for a critical application requiring guaranteed QoS. However, some
flows experience denial of service due to resource unavailability. What mechanism in IntServ likely
caused this issue?

a) RSVP Policy Control


b) Admission Control
c) Priority Queuing
d) Traffic Policing

Correct Answer: (b)

Detailed Solution: IntServ's Admission Control ensures that new flows are admitted only if
sufficient resources are available. If resources are insufficient, the flow is denied access to preserve
QoS for existing flows.

QUESTION 8

A network router using Weighted Fair Queuing (WFQ) schedules packets from three classes with
the following weights: 1, 2, and 3. If the total available bandwidth is 600 Mbps, how much
bandwidth is allocated to the second class?

a) 100 Mbps
b) 200 Mbps
c) 240 Mbps
d) 300 Mbps

Correct Answer: (b)

Detailed Solution:
The weights sum to 1+2+3=6 The second class (weight 2) gets (2/6)×600=200 Mbps.

QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

In a DiffServ domain, which of the following are responsibilities of the edge router?

(i) Packet classification and marking based on DSCP.


(ii) Queue management for congestion control.
(iii) Policing to ensure compliance with Service Level Agreements (SLAs).
(iv) Per-hop behavior (PHB) enforcement for forwarding packets.

a) (i), (iii) only


b) (i), (ii) only
c) (ii), (iii) only
d) (i), (iv) only

Correct Answer: (a)

Detailed Solution: Only A and C are correct. Edge routers perform classification, marking, and
SLA policing. PHB enforcement occurs at core routers, and queue management is a general
function across routers.

QUESTION 10

Which of the following parameters must be considered for admission control in QoS architectures to
determine whether a new flow can be admitted?

(i) Bandwidth availability on the network


(ii) Delay tolerance of the existing flows
(iii) Jitter requirements of the new flow
(iv) Packet loss rate of the current network traffic

a) (i), (ii) and (iii)


b) (ii), (iii) and (iv)
c) All are True
d) All are False

Correct Answer: (c)

Detailed Solution: All these parameters are critical for determining whether admitting a new flow
will violate the QoS of existing flows.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 8 - Week 8 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

What is the network address of the following?


IP address: 5.6.7.212
Subnet Mask: 255.255.252.0

a) 5.6.4.0
b) 5.6.7.0
c) 5.6.7.255
d) 5.6.255.255

Answer: (a)

Detailed solution:
The network address can be obtained by performing a bitwise AND operation over binary
representation of IP address and the subnet mask.

QUESTION 2

Consider the following CIDR blocks: 192.168.0.0/24 and 192.168.3.0/24. Identify the possible
aggregated prefix (route summarization/supernetting) among the following.

a) 192.168.0.0/22
b) 192.168.0.0/23
c) 192.168.0.0/24
d) 192.168.0.0/25.

Answer: (a)

Detailed solution:
Convert the given dotted-decimal format CIDR blocks address into binary dotted representation and
find the longest common prefix from left to right.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which of the following statements are true for Autonomous Systems (AS)?

a) The internet is composed of interconnected Autonomous Systems.


b) It is administered by multiple authorities.
c) BGP protocol is primarily used for communication between different Autonomous Systems
(ASs).
d) An Area in an Autonomous System (AS) is a collection of routers, networks, and hosts within
an AS.

Answer: (a), (c), and (d)

Detailed solution:
The Autonomous Systems (ASs) is a logical portion of a larger IP network. It is only administered
by a single administrator. An Area in an Autonomous System (AS) is a collection of routers,
networks, and hosts within an AS. The exterior gateway protocol-BGP is primarily used for
communication between different Autonomous Systems (ASs).

QUESTION 4

How many bits are used to identify the Autonomous Systems (AS)?

a) 1
b) 32
c) 64
d) 8

Answer: (b)

Detailed solution:
Autonomous Systems (AS) primarily use 32-bit numbers .
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

Which transport layer protocol does BGP use for communication between peers?

a) TCP
b) UDP
c) QUIC
d) ICMP

Answer: (a)

Detailed solution:
Border Gateway Protocol (BGP) uses TCP (Transmission Control Protocol) for communication
between peers at port number 179.

QUESTION 6

Consider the following topology of a network. Numbers labeled in the link between two routers
represent cost. Using the Distance Vector algorithm, identify the updated distance vector at Router
A after the first round of updates.

a) A: 0, B: 3, C: 1, D: 4, E: 2
b) A: 0, B: 3, C: 4, D: 4, E: 5
c) A: 0, B: 3, C: 1, D: 4, E: 5
d) A: 0, B: 3, C: 4, D: 4, E: 2

Answer: (b)

Detailed solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Router A receives the distance vectors from B and D and updates its distance vector
accordingly. The rule is: for each router, the distance is updated to the minimum distance obtained
by adding the distance from the router to a neighbor, and the distance from that neighbor to the
destination.

QUESTION 7

The Link State Routing Algorithm is/are NOT concerned with-

a) It shares the routing table rather than sending the information about its neighborhood only.
b) Each router computes the shortest paths to all independently using Dijkstra's algorithm.
c) Each router does not have a complete view of the network topology.
d) Once a router has detected a local link failure, it generates and floods a new LSP that no longer
contains the failed link and the new LSP replaces the previous LSP in the network.

Answer: (a), and (c)

Detailed solution:
The Link State Routing Algorithm is a type of routing algorithm used in computer networks to
determine the shortest path from a source node to all other nodes in the network. Unlike distance
vector algorithms, which share information about routes only with directly connected neighbors, link
state routing involves building a complete map of the network's topology at each router. Each router
constructs a map (or graph) of the entire network. Each router independently computes the shortest
paths using Dijkstra's algorithm.

QUESTION 8
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Match the following-

A. BGP local traffic 1. Traffic to an AS either originates or terminates within the AS.
B. Stub AS 2. Traffic that passes through an AS but neither originates nor
terminates in it.
C. BGP transit traffic 3. It connects to two or more Internet Service Providers (ISPs) or
autonomous systems.
D. Multihomed AS 4. It has has only one connection to another AS, usually to an
upstream Internet Service Provider (ISP).

a) A-1, B-4, C-2, and D-3


b) A-2, B-3, C-1, and D-4
c) A-2, B-4, C-1, and D-3
d) A-1, B-2, C-3, and D-4

Answer: (a)

Detailed solution:
Local traffic in BGP refers to data that starts or ends within an Autonomous System (AS). This traffic
does not transit through the AS to reach another network. A Stub AS is an AS that has only one
connection to the internet, meaning it cannot provide transit services for other networks. It only sends
and receives traffic to/from its upstream provider. Transit traffic occurs when an AS acts as a
middleman, forwarding data between other ASes without being the source or destination of the traffic.
A Multihomed AS connects to multiple ISPs for redundancy and better performance, ensuring that if
one provider fails, the AS can still maintain connectivity.

QUESTION 9

An ISP is assigned the CIDR block 192.168.0.0/16. Identify the valid subnet(s) among the following
that can be allocated to its customers.

a) 192.169.0.0/16
b) 192.168.0.0/17
c) 192.168.128.0/17
d) 192.168.0.0/18

Answer: (b), (c), and (d).

Detailed solution:

CIDR ensures that the subnet mask doesn't extend beyond the /16 prefix, as this would fall outside
the assigned block.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 10

What is the default value of TTL field in BGP packets in eBGP?

a) 255
b) 1
c) 128
d) 64

Answer: (b)

Detailed solution:
In eBGP (External Border Gateway Protocol), the Time to Live (TTL) field in the IP header plays a
crucial role in preventing routing loops and controlling the scope of BGP updates. By default, BGP
packets have a TTL of 1 in eBGP.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment - Week 9 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

What is the primary purpose of a routing table in a router?

a) To store user credentials


b) To log network traffic
c) To maintain information about the routes to various network destinations
d) To assign MAC addresses to devices

Correct Answer: (c)

Detailed solution: A routing table is a database in a router that contains information about the paths
to various network destinations. The table includes details like destination network, next hop, and
metric values, enabling the router to forward packets efficiently.

QUESTION 2

What is the main disadvantage of using static routing?

a) High bandwidth usage


b) Inability to adapt to network topology changes
c) Complex configuration for small networks
d) Requires a routing protocol

Correct Answer: (b)

Detailed solution: Static routing involves manually configuring routes, making it inflexible. If the
network topology changes, the administrator must manually update the routing table. This makes
static routing unsuitable for dynamic or large networks.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which switching fabric mechanism is most scalable for high-speed routers handling large volumes of traffic?

a) Shared bus
b) Crossbar switch
c) Memory-based switching
d) Circuit switching

Correct Answer: (b)

Detailed solution: Routers use switching fabrics to move packets from input ports to output ports
efficiently. Scalability depends on how well the switching fabric handles large traffic volumes.
Crossbar switches provide parallel paths between input and output ports, allowing multiple packets
to be forwarded simultaneously. Whereas a shared bus means all ports use the same communication
channel, memory-based switching stores incoming packets in memory and forwards them later and
circuit switching establishes a dedicated path before transmission, which is used in telecom networks,
not in modern packet-switched IP routers.

QUESTION 4

In the context of router architecture, what does "line card" refer to?

a) Component that connects routers to electrical power supplies.


b) A hardware module containing input and output ports.
c) A software routine for managing forwarding tables.
d) A routing protocol used to configure static routes.

Correct Answer: (b)

Detailed solution: A line card is a hardware module in a router that houses input and output ports for
packets.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
If a router receives a new routing update from a protocol like OSPF, where is this information first stored ?

a) In the FIB
b) In the MAC address table
c) In the RIB
d) In the ARP table

Correct Answer: (c)

Detailed Solution:The RIB stores routing updates from routing protocols such as OSPF, and then, based
on those updates, the best routes are selected and forwarded to the FIB.

QUESTION 6

Which of the following is not a core principle of Software-Defined Networking (SDN)?

a) Centralized control of the network through a controller


b) Dynamic configuration of network devices without manual intervention
c) Tight coupling of data plane and control plane
d) The ability to programmatically define network behavior

Correct Answer: (c)


Detailed Solution : In SDN, the control plane is decoupled from the data plane to allow for
centralized management, making the network more flexible and programmable. Tight coupling of
the control and data planes is contrary to the SDN architecture.

QUESTION 7

Which of the following is a major benefit of OpenFlow in SDN?

a) OpenFlow does not allow network applications to run over the connected devices.
b) OpenFlow allows for granular control over the flow of packets.
c) OpenFlow is primarily used to monitor network security.
d) OpenFlow increases network congestion by adding overhead.

Correct Answer: (b)


NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed Solution : OpenFlow enables granular control of packet flows and allows for
dynamic adjustments to the forwarding behavior of network devices.

QUESTION 8

Which of the following best describes the "Southbound API" in an SDN architecture?

a) It facilitates communication between the SDN controller and network applications.


b) It manages communication between the control plane and data plane, typically using protocols
like OpenFlow.
c) It connects the SDN controller with other controllers in a multi-controller setup.
d) It is used to monitor the health of the physical devices in the network.

Correct Answer: (b)

Detailed Solution :The "Southbound API" connects the SDN controller with the data plane
(switches/routers), enabling communication with network devices using protocols such as
OpenFlow.

QUESTION 9

Which of the following is an example of a "Northbound API" in SDN?

a) OpenFlow
b) OVSDB
c) NETCONF
d) RESTful API

Correct Answer: (d)

Detailed Solution : "Northbound APIs" are used to enable communication between the SDN
controller and network applications. RESTful APIs are a common example of northbound APIs that
allow external applications to interact with the controller to request network services.

QUESTION 10
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
In a multi-controller SDN setup, what mechanism is commonly used to ensure consistent
state across controllers?

a) Flow migration
b) Controller federation
c) Dynamic flow recalculation
d) Multi-path routing

Correct Answer: (b)

Detailed Solution : In a multi-controller SDN setup, controller federation is used to ensure that
multiple controllers can work together, share information, and maintain a consistent state across the
entire network. This involves mechanisms like state synchronization, coordination, and fault
tolerance among different controllers in the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment 10 - Week 10 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

The CSMA/CD protocol, predominantly used in Ethernet, addresses which of the following
challenges?

a) Efficient encoding and decoding of data signals


b) Synchronization of devices in wireless networks.
c) Detection and management of data collisions in shared media networks.
d) Guaranteeing data delivery across multiple broadcast domains.

Correct Answer: (c)

Detailed solution: The CSMA/CD protocol ensures efficient use of shared media by detecting
collisions and managing retransmissions.

QUESTION 2

Which MAC technique is most suitable for bursty traffic with sporadic transmissions?

a) Synchronous MAC with reserved slots.


b) Asynchronous MAC with round-robin allocation.
c) Token passing in ring topology.
d) Contention-based asynchronous MAC.

Correct Answer: (d)

Detailed solution: Contention-based asynchronous MAC is ideal for sporadic, short transmissions
like those typical of interactive terminal-host traffic, as it is simple to implement and efficient under
light load conditions.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

In Go-Back-N ARQ, why must the size of the sender's window be less than 2m , where m is the
number of bits in the sequence number?

a) To prevent out-of-order frames from being accepted by the receiver


b) To allow cumulative acknowledgments to function correctly
c) To ensure the receiver's window size can accommodate all pending frames
d) To avoid ambiguities in the sequence numbers during retransmission

Correct Answer: (d)

Detailed solution: If the window size were equal to or greater than 2m, the same sequence numbers
could be reused before the acknowledgment for earlier frames is received, causing confusion at the
receiver about whether the frames are retransmissions or new ones.

QUESTION 4

What is the minimum frame size for Ethernet (IEEE 802.3), and why is it important?

a) 46 bytes, to prevent collisions from being detected too late


b) 64 bytes, to ensure collision detection within the frame transmission time.
c) 512 bytes, to maximize bandwidth efficiency.
d) 1500 bytes, to support large data payloads.

Correct Answer: (b)

Detailed solution: If the frame size were smaller than 64 bytes, it is possible for the transmission to
complete before a collision is detected, leading to undetected collisions and corrupted data.The frame
size includes a 14-byte header, 46 bytes of payload, and a 4-byte CRC (Cyclic Redundancy Check).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5

In a Selective Repeat ARQ system with a 4-bit sequence number and a sender's window size of 8, what is
the minimum size of the receiver's buffer to prevent loss of out-of-order frames?

a) 4
b) 8
c) 16
d) 1

Correct Answer: (b)

Detailed Solution:

Selective Repeat ARQ, the sender's and receiver's window sizes are equal and must be at most half of 2�,
where � = 4. 2m / 2 = 16 / 2 = 8. The receiver's buffer size must equal the sender's window size to store
out-of-order frames.

QUESTION 6

A wireless CSMA/CA network uses a backoff algorithm with a contention window size that
doubles after each collision. If the initial contention window size is 32, what is the maximum
contention window size after 4 collisions?

a) 256
b) 512
c) 128
d) 1024

Correct Answer: (b)


Detailed Solution : After n collisions, the contention window size is Initial Size×2n. For n=4:
32×24=32×16=512.

QUESTION 7

In a shared 75 kbps channel, each station transmits a 20-bit frame every 2000 ms. If the network
uses Slotted Aloha, what is the maximum number of stations that can be supported?
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
a) 7500
b) 2775
c) 7000
d) 5000

Correct Answer: (b)

Detailed Solution : Transmission rate per station = 20 bits/2000 ms=10 bits/s.


The number of stations N = 75kbps/10bits/s = 7500. Slotted Aloha has an efficiency of 1/e, or
approximately 0.37. The effective number of stations that can be supported is:
Neffective=7500×0.37=2775

QUESTION 8

Consider a CSMA/CD network where the frame transmission time Tf is much larger than the
propagation delay tp. Which of the following factors affect the efficiency of the network?

(i) Frame size.


(ii) Propagation delay tp.
(iii) Backoff time after a collision.
(iv) Total number of stations.

a) (i), (ii) and (iii)


b) (ii), (iii) and (iv)
c) All are True
d) All are False

Correct Answer: (c)

Detailed Solution :
Frame Size : Larger frames improve efficiency by reducing overhead.
Propagation Delay (tp) : Higher delay increases collision probability, reducing efficiency.
Backoff Time : Longer backoff after collisions leads to idle time, lowering efficiency.
Total Number of Stations : More stations increase contention and collisions, reducing efficiency.
So All are True.

QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

In a round-robin MAC technique, a network has 10 stations, and each station gets a time slot of 2 ms. If a
station has a data frame of 2 KB to transmit, and the transmission rate is 1 Mbps, how many rounds will it
take for the station to complete its transmission?

a) 4
b) 8
c) 16
d) 20

Correct Answer: (b)

Detailed Solution :
Time to transmit 2 KB (16 Kb) at 1 Mbps: (16Kb/1Mbps) = 16ms
Number of time slots needed of each 2 ms : (16/2) = 8
Number of rounds (10 stations = 10 slots per round) : 8 slots / (1 slot per round) = 8

QUESTION 10

A network administrator is analyzing a collision on a traditional Ethernet network using CSMA/CD. They
observe the following sequence:

(i) A node transmits a frame after sensing the medium is free.


(ii) A collision occurs, detected by voltage fluctuations.
(iii) A jam signal is transmitted, and the node applies a backoff algorithm.

If the backoff limit is reached without successful transmission, what should the node do next?

a) Retry immediately without further sensing.


b) Send another jam signal and continue to backoff indefinitely.
c) Abort the transmission and report a failure.
d) Switch to a synchronous MAC protocol.

Correct Answer: (c)

Detailed Solution : If the backoff limit is exceeded in CSMA/CD, the node aborts the transmission
and reports a failure. This prevents indefinite retries that could congest the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Course Name: Computer Networks and Internet Protocol
Assignment 11 - Week 11 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

Address Resolution Protocol (ARP) is primarily concerned with-

a) To resolve IP addresses to MAC addresses.


b) To resolve hostnames to IP addresses
c) To resolve port numbers to IP addresses.
d) To resolve MAC addresses to IP addresses.

Answer: (a)

Detailed solution:
The Address Resolution Protocol (ARP) is a protocol used for discovering the link layer address, such
as a MAC address, associated with a given IPv4 address.

QUESTION 2

Identify the WRONG statement in the following-

a) BOOTP is a legacy protocol used to assign IP addresses and other configuration information
to devices during startup.
b) BOOTP evolved from DHCP to support dynamic IP addressing and reusable addresses.
c) Both DHCP and BOOTP serve the purpose of providing IP addresses and configurations to
devices.
d) None of them.

Answer: (b)

Detailed solution:
DHCP evolved from BOOTP to support dynamic IP addressing and reusable addresses.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

Which port number does DHCP use for client-server communication at layer 2?

a) TCP 80
b) UDP 67 & 68
c) UDP 80 & 81
d) UDP 23

Answer: (b)

Detailed solution:
DHCP client uses UDP 68 and DHCP server uses UDP 67 during communication.

QUESTION 4

Which protocol is used to prevent bridge loops in an Ethernet network?

a) Point-To-Point Protocol(PPP)
b) Dynamic Host Configuration Protocol (DHCP)
c) Address Resolution Protocol (ARP)
d) Spanning Tree Protocol (STP)

Answer: (d)

Detailed solution:
Spanning Tree Protocol (STP) is specifically designed to prevent bridge loops in Ethernet networks
by creating a loop-free topology. It ensures that there is always one active path between any two
devices on a network while blocking redundant paths that could cause loops.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

Which feature is/are concerned with trunk links in VLAN-based networks?

I. It can carry data from multiple VLANs over a single physical connection.
II. It allows VLANs to span across multiple switches, enabling seamless communication for
devices in the same VLAN, even if they are connected to different switches.

a) Only (I)
b) Only (II)
c) Both (I) and (II)
d) Neither (I) nor (II)

Answer: (c)

Detailed solution:
Trunk links are a foundational component of modern VLAN-based networks, providing a scalable,
efficient, and versatile way to manage and transport VLAN traffic across the network. These type of
ports are usually found in connections between switches. These links require the ability to carry
packets from all available VLANs because VLANs span over multiple switches.

QUESTION 6

Which provides a solution to the hidden terminal problem in wireless LANs?

a) RTS/CTS mechanism
b) backoff timers
c) Interframe Space (IFS)
d) None of these.

Answer: (a)

Detailed solution:
The hidden terminal problem is a common issue in Wireless Local Area Networks (WLANs) that
arises when two or more devices (nodes) are within the communication range of a central access point
(AP) but are not within the range of each other. Mechanisms like RTS/CTS and CSMA/CA, along
with careful network planning, are essential to mitigate its effects and maintain efficient wireless
communication.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 7

Given a wireless network using CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance), where the transmission time of a data frame is 200 ms. The contention window backoff
time (in the event of a collision) always follows an exponential backoff mechanism, with a random
backoff time selected from a range of 0 to 10 slots. Each slot is 10 ms. A collision happens, and the
backoff time for retransmission is selected randomly within the range of 0 to 10 slots. What is the
total time spent (in ms) for the first retransmission if the backoff time is randomly selected to be 7
slots? (Ignore the time spent in the first transmission attempt)

a) 200 ms
b) 250 ms
c) 260 ms
d) 270 ms

Answer: (d)

Detailed solution:
Transmission time of the data frame: 200 ms
Backoff time range: 0 to 10 slots
Slot duration: 10 ms
Backoff time randomly selected: 7 slots
Backoff Time = 7 slots × 10 ms/slot = 70 ms
Total time spent: Original transmission time + Backoff time = 200 ms + 70 ms = 270 ms.

QUESTION 8

In which layer, Spanning Tree Protocol (STP) works?

a) Layer 2
b) Layer 3
c) Layer 4
d) Layer 5

Answer: (a)

Detailed solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Spanning Tree Protocol (STP) is a protocol that prevents Layer 2 loops or Bridging loops
by computing a tree structure of nodes in a network.

QUESTION 9

The configuration of a DHCP server is as follows-


Network Address: 192.0.1.0/24
Reserved Addresses: 192.0.1.1 to 192.0.1.20 (for routers and servers)

How many addresses are available for clients?

a) 256
b) 255
c) 234
d) 231

Answer: (c)

Detailed solution:

Total addresses available in /24 network is 2^8 = 256.


Network address = 192.0.1.0
Broadcast address = 192.0.1.255
Reserved IP = 192.0.1.1 to 192.0.1.20 = 20
Total IP addresses available for client = 256 – (1+ 20+ 1) = 234

QUESTION 10

Match the following-


A. Ethernet Working Group 1. 802.11f
B. Mess Networking 2. 802.11af
C. Wi-Fi in TV spectrum white spaces 3. 802.3
D. Power control 4. 802.11h
E. Handover 5. 802.11s

a) A-3, B-5, C-2, D-1, E-4


b) A-3, B-5, C-2, D-4, E-4
c) A-3, B-5, C-2, D-1, E-1
d) A-3, B-5, C-2, D-4, E-1

Answer: (d)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed solution:
The 802.3 standard defines Ethernet, as the most widely used wired LAN technology. The 802.11s
standard defines mesh networking, allowing Wi-Fi devices to form self-configuring, multi-hop
networks without a central access point. The 802.11af standard enables Wi-Fi operation in unused
TV spectrum bands (white spaces) for better coverage and signal penetration. The 802.11h standard
introduces transmit power control (TPC) and dynamic frequency selection (DFS) to comply with
European radio regulations. The 802.11f standard was a recommendation for inter-access point
communication to facilitate handover (roaming) between Wi-Fi APs.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Course Name: Computer Networks and Internet Protocol


Assignment - Week 12 (Jan 2025)
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 X 1 = 10

QUESTION 1

In which layer of the OSI model does the HTTP (Hypertext Transfer Protocol) operate?
a)Transport Layer
b)Network Layer
c)Application Layer
d) Data Link Layer

Correct Answer: (c)

Detailed solution: HTTP (Hypertext Transfer Protocol) is a protocol used for web communication.
It belongs to the Application Layer, which provides network services like email (SMTP, POP3), file
transfer (FTP), and web browsing (HTTP, HTTPS).

QUESTION 2

Which of the following best describes "Manchester Encoding"?

a) A method that encodes data using transitions at the beginning of each bit period.
b) A self-clocking encoding technique with a transition in the middle of each bit period.
c) A signaling method that uses voltage levels directly to represent 1s and 0s.
d) An encoding technique that combines multiple signals into one.

Correct Answer: (b)

Detailed solution: Manchester Encoding ensures synchronization by placing a transition in the


middle of each bit period: from low to high for a "1" and high to low for a "0." It is self-clocking,
making it suitable for high-reliability communication.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 3

A time-division multiplexing (TDM) link transmits 4,000 frames per second, with each time slot containing
8 bits. What is the transmission rate of this TDM circuit

a) 32kbps
b) 500bps
c) 500kbps
d) 32bps

Correct Answer: (a)

Detailed solution: Transmission rate= frame rate * number of bits in a slot.


Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps

QUESTION 4

What is the main difference between Manchester and Differential Manchester encoding?
a) Differential Manchester requires more bandwidth
b) Differential Manchester uses a transition for every 1-bit
c) Manchester encoding has no transitions at all
d) Manchester encoding is only used in analog signals

Correct Answer: (b)

Detailed solution:
Manchester encoding:
0 → High to Low transition at the middle of the bit
1 → Low to High transition at the middle of the bit

Differential Manchester encoding:


Every bit starts with a transition
1 → No transition at the middle
0 → Transition at the middle
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

QUESTION 5

In Phase Shift Keying (PSK), how is information transmitted?

a) By varying the frequency of the carrier signal


b) By varying the amplitude of the carrier signal
c) By varying the phase of the carrier signal
d) By varying both amplitude and phase of the carrier signal

Correct Answer: (c)

Detailed Solution:In PSK, information is transmitted by altering the phase of the carrier signal.

QUESTION 6

A channel has a capacity of 1 Mbps and an SNR of 9. If the SNR is halved, what happens to the
channel capacity?

a) It remains the same.


b) It is reduced by exactly 50%.
c) It is reduced by less than 50%.
d) It is reduced to zero.

Correct Answer: (c)


Detailed Solution: Initial capacity:C=B×log2(1+SNR)
When SNR=9: C1=B×log2(1+9)=B×log2(10)
When SNR=4.5 C2=B×log2(1+4.5)=B×log2(5.5)
Capacity ratio:C1/C2=log2(5.5)/log2(10 )= 2.46/3.32=0.74
The capacity is reduced to 74% of its original value, which is less than a 50% reduction.

QUESTION 7
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

What is the primary limitation of NRZ-L when used over long distances?

a) Increased signal distortion at high frequencies.


b) Difficulty in handling multiple voltage levels.

c) Poor synchronization for long sequences of 0s or 1s.


d) Requires higher power for transmission.

Correct Answer: (c)

Detailed Solution: For long sequences of 0s or 1s, the constant voltage in NRZ-L results in no
transitions, making it challenging for the receiver to maintain synchronization with the transmitter.

QUESTION 8

Which of the following statements is true for FSK modulation?

a) It is more bandwidth-efficient than QPSK.


b) It is inherently immune to noise.
c) It is suitable for applications requiring constant envelope signals.
d) It is always more power-efficient than QAM.

Correct Answer: (c)

Detailed Solution: FSK has a constant envelope, making it suitable for applications requiring
power-efficient amplifiers, such as in wireless communications. However, it is less bandwidth-
efficient than QPSK or QAM.

QUESTION 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025

Which of the following firewalls offers the highest level of security?


a) Packet-filtering firewall
b) Stateful firewall
c) Proxy firewall
d) NAT firewall

Correct Answer: (c)

Detailed Solution: Proxy firewalls offer the highest level of security by acting as an intermediary
between users and the internet. They prevent direct connections, filter malicious traffic, and provide
content inspection, logging, and authentication.

QUESTION 10

A firewall rule that permits outgoing HTTP traffic but denies all incoming traffic except for
established connections operates under which principle?

a) Default allow
b) Default deny
c) Least privilege
d) Fail-safe defaults

Correct Answer: (b)

Detailed Solution: This rule operates under the default deny principle, where all traffic is denied
unless explicitly permitted (e.g., outgoing HTTP and established connections).

You might also like