Roll No.
: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Amrita Vishwa Vidyapeetham
Amrita School of Computing, Coimbatore
B. Tech Degree Examinations –November 2024
Fifth Semester
Computer Science and Engineering
19CSE301 Computer Networks
Duration: Three hours Maximum: 100 Marks
CO Course Outcomes
CO01 Understand the basic architectural components of computer networks and apply
mathematical
foundations to solve computational problems in computer networking
CO02 Apply network application services, protocols, and programming
CO03 Analyze protocols for data transfer mechanisms, buffer management, and flow
handling mechanisms
CO04 Analyze devices for routing and apply routing protocols
CO05 Apply and Analyze network access protocols and error handling codes to design Local
Area Network
Answer all questions.
1. Answer the following considering the HTTP version 2: [15] [CO02] [BTL 3]
a. Consider a news website where articles are updated frequently. Which HTTP protocol
method can ensure that users always see the latest version of articles without re-downloading
unchanged resources? Write the steps in detail with sample request and response formats.
(8 marks)
b. A popular university website receives 60,000 requests per day. To improve performance, a
cache is implemented with the following characteristics: Cache hit rate: 75%, Average object
size: 600 kB, Latency to serve an object from the cache: 40 ms, Latency to serve an object
from the origin server: 250 ms, Network bandwidth between the cache and the client: 500
Mbps. How many requests are served by the cache and how many are served by the origin
server per day? (2 marks) Calculate the total bandwidth saved by using the cache in a day.
(2 marks) Determine the average response time (in ms) for requests before and after
implementing the cache.(3 marks)
2. A popular online learning platform, “EduConnect,” is streaming lecture videos to students across
the country. To ensure the smooth transmission of video data, the platform uses reliable protocols to
handle potential data loss. For this, they employ two different protocols: Go-Back-N and Selective
Repeat, each with a window size of 5 frames. Suppose the platform’s server needs to transmit 10
frames of data to a student’s device. However, due to network congestion, frames 4 and 7 are lost
during transmission. [15] [CO03] [BTL 2]
a. Using the Go-Back-N protocol, illustrate the sequence of frames being sent and the response
from the receiver. Show how the server handles the loss of frames 4 and 7 by retransmitting
frames, and depict the acknowledgments from the receiver. Clearly indicate the
retransmissions, window adjustments, and acknowledgments in your diagram. (8 marks)
b. Using the Selective Repeat protocol, create a similar sequence diagram for this scenario,
showing how the server only retransmits the specifically lost frames (4 and 7) without
resending the correctly received frames. Illustrate the individual acknowledgments and
highlight the selective retransmissions. (7 marks)
Page 1 of 4
3. Answer the following based on the transmission control protocol: [15] [CO03] [BTL 4]
a. Using the five given SampleRTT values in the second column of the table, calculate the
EstimatedRTT for each SampleRTT using the TCP EstimatedRTT formula, where α = 0.125
and the initial EstimatedRTT is 100 ms before the first sample. Fill the fourth column with
these calculated EstimatedRTT values. Additionally, compute the DevRTT after each sample,
using β = 0.25 and an initial DevRTT value of 5 ms before the first sample, and populate the
fifth column with these values. Finally, determine the TCP TimeoutInterval after each sample
and enter these results in the last column of the table. Round all calculated values in the
respective columns to two decimal places. (10 Marks)
DevRTT
after TCP
Values each TimeoutInterval
Sample EstimatedRTT sample after each of
# (in (in ms) is the sample
ms) obtained
(in ms)
(in ms)
Measured SampleRTT value
1 106
2 120
3 140
(in ms)
4 90
5 115
b. The TCP uses a method called congestion control to regulate the traffic entering the network.
The behaviour of TCP congestion control can be represented as a graph in which the x-axis
indicates the time, and the y-axis indicates the congestion window size. Use the graph shown
below to answer the following questions. Note that the graph does not explicitly show
timeouts, but you should be able to figure out when timeouts happened based on the events
shown. (5 Marks)
Page 2 of 4
i. Identify the intervals of time when TCP slow start is operating.
ii. Identify the intervals of time when TCP congestion avoidance is operating.
iii. Identify the intervals of time when packet loss was detected by duplicate ACKs.
iv. Identify the intervals of time when packet loss was detected by timeout.
v. What is the value of Threshold when packet loss due to timeout occurred initially?
4. Answer the following based on IPv4: [15] [CO04] [BTL 3]
a. If datagram size if 5000 and MTU is 1300, How many fragments are there? Write down the
fragments. (5 Marks)
b. Fill the following based on the data provided: (7 marks)
Number of needed subnets 3
Number of usable hosts 45
Network Address 200.175.14.0
i. Address Class
ii. Default subnet mask
iii. New Subnet mask
iv. Find the first address(for the 3 subnets)
v. Find the last address(for the 3 subnets)
vi. Total number of hosts in every subnet
c. In a network, if a new mobile device with the IP address 192.168.2.2 attempts to join, which
protocol does it use to connect? Describe how the device communicates with the network to
request an IP address and how the network responds with an offer of configuration details.
(3 marks)
5. Consider the following network: [15] [CO04] [BTL 3]
a. Show the operation of Dijkstra’s (Link State) algorithm for computing the least cost path
from B to all destinations (8 Marks)
b. Based on part-a, show the shortest path from B to D, and briefly describe how you got that
answer. (3 marks)
c. Show the effect of the oscillation problem in the link state algorithm from the following
initial setup, where rate is 1 or e<=1. (4 marks)
6. Answer the following based on the 802.3 Ethernet data link layer: [15] [CO05] [BTL 3]
a. Consider the Cyclic Redundancy Check (CRC) algorithm with the 4-bit generator (G) is
1001, that the data payload (D) is 10011110 and that r = 3. Check whether sender and receiver
received it correctly with calculations. (8 marks)
b. A network bridge is a device that connects multiple networks or network segments into a
single network. a bridge connects two local area networks (LANs) while a switch connects
Page 3 of 4
multiple devices to a network. Consider the network of self-learning bridges shown in the
following figure. (7 marks)
Assuming all forwarding tables are initially empty, show the forwarding table in each of the
bridges after the following sequential transmissions:
• A sends to C
• D sends to A
• F sends to E
Fill in a table for each bridge after each transmission, each with two columns: hostname and
ports (numbers), showing how the bridge would forward traffic.
7. Explain the architecture of an email server. Specify the protocols and their features implemented in
the client and server. Consider an email being sent from [email protected] to
[email protected], is the message sent and received on the same server? Give the set of
messages exchanged between the client and server in SMTP protocol. [10] [CO02] [BTL 2]
*****
Course Outcome /Bloom’s Taxonomy Level (BTL) Mark Distribution Table
CO Marks BTL Marks
CO01 0 BTL 1 0
CO02 25 BTL 2 40
CO03 30 BTL 3 45
CO04 30 BTL 4 15
CO05 15 BTL 5 0
Page 4 of 4