Bannari Amman Institute of Technology

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

Regulation: 2018

Reg. No.:

BANNARI AMMAN INSTITUTE OF TECHNOLOGY


(An Autonomous Institution Affiliated to Anna University, Chennai)
SATHYAMANGALAM – 638 401

END SEMESTER THEORY EXAMINATIONS - JANUARY 2022


V Semester

18CS503 & COMPUTER NETWORKS

Degree & Branch: B.E. & CSE

Time: 3 Hrs. Maximum: 100 Marks

Instructions:
1. Students should not mark/write anything on the Question Paper other than the register number.
2. Sections A to E contain questions for 30 Marks each.
3. Students can attempt answering any two out of three subsections in each section.

Q.No. Questions

SECTION A COURSE OUTCOME 1 MAXIMUM: 20 MARKS


A1

Figure 1
Figure 1 shows the network design of ABC private limited. With this network design, answer the
following questions.
(i) Match the devices and protocols against each of the Network layers.

Page 1 of 13
(5 Marks – [U/C,2])
LAYERS PROTOCOLS DEVICES
1 Physical A TCP,UDP i Router
2 Data link B IP ii Gateway, Firewall
Hub, Repeater,Cable,
3 Network C MAC iii
Fiber, wireless
4 Transport D API’s iv PC
Bridge, Modem, Network
5 Session E Digital Signal v
card, Switch
(ii) In the figure 1, if the PC on port is disconnected, would the Mac-address table be flushed?
(2 Marks – [An/C,2])
(iii) In the figure 1, after PC1 communicates with PC2, how many Mac-addresses would be available
in the Mac-Address table of the switch? Justify.
(3 Marks – [An/C,2])
A2

Figure 2
Figure 2 shows the network design of ABC private limited. With this network design, answer the
following questions.
(i) Whether there is a need of IP address for PC1 to communicate with PC2 in Lab 1? Justify.
(3 Marks – [An/C,2])
(ii) Which PCs Mac-address is learned by the Lab 3 switch on port 2?
(2 Marks – [An/C,2])
(iii) If PC1 wants to communicate with PC2 in Lab 2, what is required from PC2?
(2 Marks – [An/C,2])
(iv) Whether IP address is required for a router to make a communication between PC1 and PC2 in
Lab 4? Justify.
(3 Marks – [An/C,2])

Page 2 of 13
A3

Figure 3
Figure 3 shows the different types of mode of communication that happens in computer networks.
(i) Select an appropriate real time application for half duplex from the given options
(2 Marks – [An/C,2])

a) b) c) d)

(ii) Identify the type of topology involved in the figure given below and justify.
(2 Marks – [An/C,2])

Page 3 of 13
(iii) Identify the type of transmission medium used in the following figures.
(6 Marks – [U/C,2])

(A) (B)

(C) (D)

(F)
(E)

Page 4 of 13
SECTION B COURSE OUTCOME 2 MAXIMUM : 20 MARKS
B1

Figure 4
Figure 4 represents the data that is transmitted from the sender to the receiver during the transmission
process from ABC client to TATA server. Answer the following questions based on this scenario.
(i) Identify the type of error that occurred in Figure 4 a,b & c during the transmission from ABC
client to TATA server.
(3 Marks – [U/C,2])
(ii)

Figure 5

In the process of data transmission from the sender to receiver that is shown in Figure 5, how
errors are detected using block coding technique?
(3 Marks – [U/C,2])
(iii) Find the minimum hamming distance for the given code words.
Code words: (0000, 01011,10101, 11110)
(4 Marks – [An/C,2])
B2

Page 5 of 13
Figure 6
Figure 6 shows the types of frames involved in data transmission process in the data link layer.
(i) Compare the two types of frames shown in figure 6 based on its variable size framing capability
where you need to define the end of frame and beginning of the next.
(4 Marks – [An/C,2])
(ii) In character oriented framing, any pattern that is used for the flag could be a part of the
information. The receiver when it encounters this pattern in the middle of the data, may
misinterpret as end of the frame. Byte stuffing is used to fix this issue. Justify.
(3 Marks – [An/C,2])
(iii) In data communication, data link layer is responsible for controlling the amount of data sent from
the sender side and also for retransmitting the data whenever necessary. Justify.
(3 Marks – [An/C,2])
B3

Figure 7
Figure 7 shows the simplest protocol for the noiseless channels. This protocol has no error control and
flow control mechanism.
(i) With the sender site algorithm given in figure 7, complete the receiver site algorithm for the
simplest protocol given here.
(6 Marks – [U/C,2])
while (true)
{
WaitForEvent();

Page 6 of 13
(ii)

Figure 8
Identify the frame sequences A, B, C & D on the sending window of Go Back – N ARQ before
sliding in figure 8.
(4 Marks – [U/C,2])
SECTION C COURSE OUTCOME 3 MAXIMUM: 20 MARKS
C1

Figure 9
Figure 9 shows a network with its networking components and its corresponding IP addresses.
(i) Identify the internal IP address and external IP address in figure 9.
(2 Marks – [An/C,2])
(ii) Convert all the IP address provided in figure 9 into binary.
(4 Marks – [An/C,2])
(iii) Find the class of each IP address given here.
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 14.23.120.8
d. 252.5.15.111
.
(4 Marks – [An/C,2])
C2

Figure 10
Figure 10 shows the position of IPv4 in TCP/IP protocol suite.
(i) Complete the missing parts of IPv4 datagram format which was the major protocol in network

Page 7 of 13
layer as shown in Figure 10.
(6 Marks – [U/C,2])

(ii)

Figure 11
Figure 11 shows one of the strategies involved in transition from IPv4 to IPv6. Justify.
(4 Marks – [An/C,2])
C3 Figure 12 shows the network design of John’s organization. Imagine yourself as a network
administrator of the organization and do the configuration of the routers.

Figure 12

(i) Complete the commands to configure the Router 0 in figure 12.


(3 Marks – [Ap/P,2])
Router0# configure terminal

Page 8 of 13
Router0(config-if)# exit

(ii) Write the commands to configure the Router 1 in figure 12.


(3 Marks – [Ap/P,2])
Hint: Global configuration involves the steps given below:
a. Configure terminal
b. interface type number
c. ip address ip address mask
d. exit
(iii) Given the commands to configure the RIP Routing Protocol. With that, write the commands for
EIGRP routing protocol for the network shown in figure 12.

router0 enable
router0 #configure terminal
router0 (config)#router rip
router0 (config-terminal) #network 192.168.1.1
router0 (config-router) #end
(4 Marks – [Ap/P,2])

SECTION D COURSE OUTCOME 4 MAXIMUM: 20 MARKS


D1

Figure 13
Figure 13 shows the types of data deliveries that happens when the data communication occurs
between the sender and the receiver.
(i) Identify the layers involved in node to node, host to host and process to process delivery in
figure 13.
(3 Marks – [U/C,2])

Page 9 of 13
(ii)

Figure 14
Identify the missing contents along with its size (A, B & C) in user datagram format given in
figure 14.
(3 Marks – [U/C,2])
(iii) In transport layer, if a process wants to communicate with multiple processes, it obtains one port
number, one outgoing queue and one incoming queue. Justify.
(4 Marks – [An/C,2])
D2

Figure 15
Figure 15 shows the connection establishment using three way handshaking in TCP.
(i) In figure 15, SYN is sent from sender to receiver which synchronizes the sequence numbers. It
consumes 1 sequence number and it cannot carry data. Compare SYN+ACK and ACK in figure
15 based on its data carrying capacity and consumption of sequence numbers during connection
establishment in figure 15.
(4 Marks – [An/C,2])
(ii) After connection establishment is over as shown in figure 15, design the data transfer between
client and server. Client has to sends2000 bytes of data in two segments. The server has to
send 2000 bytes in one segment.
(6 Marks – [An/C,2])

Page 10 of 13
D3

Figure 16
Figure 16 shows the different types of real time network traffic.
(i) Identify the type of traffic profile for voice traffic, video traffic and data traffic in figure 16.
(3 Marks – [U/C,2])
(ii) The type of window used at the sender side affect the congestion occurs in a network. Selective
repeat window should be adopted to avoid congestion. Justify.
.
(2 Marks – [An/C,2])
(iii) Switches in a flow should first check the resource requirement of a network flow before
transmitting it further. If there is a chance of congestion or there is congestion in the network,
router should deny establishing a virtual network connection to prevent further congestion.
Identify the open loop congestion mechanism involved in this scenario.
(2 Marks – [An/C,2])
(iv)

Figure 17
Figure 17 shows one of the closed loop congestion control mechanism. Justify.
(3 Marks – [An/C,2])
SECTION E COURSE OUTCOME 5 MAXIMUM: 20 MARKS
E1

Figure 18
Figure 18 shows an example which uses the Domain Name System (DNS) service.

Page 11 of 13
(i) Match the following resource records in DNS with appropriate definition.
(6 Marks – [U/C,2])

Resource Record Meaning Definition


Creates a pointer that maps an IP
1 A A Start of Authority i address to a host name for reverse
lookups.
Maps a host name to an IP
address. When a computer has
2 CNAME B Name Server ii multiple adapter cards and IP
addresses, it should have multiple
address records.
Declares the host that is the most
authoritative for the zone and, as
such, is the best source of DNS
information for the zone. Each
3 MX C Canonical Name iii zone file must have an SOA
record (which is created
automatically when you add a
zone).
Sets an alias for a host name. For
example, using this record,
4 NS D Address iv
zeta.tvpress.com can have an alias
as www.tvpress.com.
Specifies a name server for the
domain, which allows DNS lookups
5 PTR E Mail Exchange v within various zones. Each primary
and secondary name server should
be declared through this record.
Specifies a mail exchange server
for the domain, which allows mail to
6 SOA F Pointer vi
be delivered to the correct mail
servers in the domain.
(ii)

Figure 19

Compare the domain names in Figure 19 A and B based on its naming constraints.

(4 Marks – [U/C,2])

E2

Figure 20

Page 12 of 13
Figure 20 shows a simple scenario of sending an e-mail from Alice to Bob who were the users of same
system.
(i) Design a system to send e-mail from Alice to Bob where Alice and Bob were the users of
different systems. Use two user agents and a pair of message transfer agents (MTAs).
(4 Marks – [An/C,2])
(ii)

Figure 21
Identify the service A and B involved in figure 21 where e-mail communication happens between
MTA client to MTA server and MAA server to MAA client respectively.
(3 Marks – [U/C,2])
(iii) Identify the command driven user agent and GUI based user agent based on its usage in e-mail
communication.
a.Outlook
b.Pine
c.Netscape
(3 Marks – [An/C,2])
E3

Figure 22
Figure 22 shows the sending of messages into the internal network and sending of messages to the
global internet.
(i)

Confidential and authenticated email is sent from Alice to Bob with the help of Pretty Good
Privacy (PGP). Justify.
(4 Marks – [An/C,2])
(ii) Create a static HTML document for “Bannari Amman Institute of Technology” which must include
HTML root element, text formatting tags, images, links, lists and tables.
(6 Marks – [An/C,2])
***End of Question Paper***

Page 13 of 13

You might also like