Professional Documents
Culture Documents
Bannari Amman Institute of Technology
Bannari Amman Institute of Technology
Bannari Amman Institute of Technology
Reg. No.:
Instructions:
1. Students should not mark/write anything on the Question Paper other than the register number.
2. Sections A to E contain questions for 30 Marks each.
3. Students can attempt answering any two out of three subsections in each section.
Q.No. Questions
Figure 1
Figure 1 shows the network design of ABC private limited. With this network design, answer the
following questions.
(i) Match the devices and protocols against each of the Network layers.
Page 1 of 13
(5 Marks – [U/C,2])
LAYERS PROTOCOLS DEVICES
1 Physical A TCP,UDP i Router
2 Data link B IP ii Gateway, Firewall
Hub, Repeater,Cable,
3 Network C MAC iii
Fiber, wireless
4 Transport D API’s iv PC
Bridge, Modem, Network
5 Session E Digital Signal v
card, Switch
(ii) In the figure 1, if the PC on port is disconnected, would the Mac-address table be flushed?
(2 Marks – [An/C,2])
(iii) In the figure 1, after PC1 communicates with PC2, how many Mac-addresses would be available
in the Mac-Address table of the switch? Justify.
(3 Marks – [An/C,2])
A2
Figure 2
Figure 2 shows the network design of ABC private limited. With this network design, answer the
following questions.
(i) Whether there is a need of IP address for PC1 to communicate with PC2 in Lab 1? Justify.
(3 Marks – [An/C,2])
(ii) Which PCs Mac-address is learned by the Lab 3 switch on port 2?
(2 Marks – [An/C,2])
(iii) If PC1 wants to communicate with PC2 in Lab 2, what is required from PC2?
(2 Marks – [An/C,2])
(iv) Whether IP address is required for a router to make a communication between PC1 and PC2 in
Lab 4? Justify.
(3 Marks – [An/C,2])
Page 2 of 13
A3
Figure 3
Figure 3 shows the different types of mode of communication that happens in computer networks.
(i) Select an appropriate real time application for half duplex from the given options
(2 Marks – [An/C,2])
a) b) c) d)
(ii) Identify the type of topology involved in the figure given below and justify.
(2 Marks – [An/C,2])
Page 3 of 13
(iii) Identify the type of transmission medium used in the following figures.
(6 Marks – [U/C,2])
(A) (B)
(C) (D)
(F)
(E)
Page 4 of 13
SECTION B COURSE OUTCOME 2 MAXIMUM : 20 MARKS
B1
Figure 4
Figure 4 represents the data that is transmitted from the sender to the receiver during the transmission
process from ABC client to TATA server. Answer the following questions based on this scenario.
(i) Identify the type of error that occurred in Figure 4 a,b & c during the transmission from ABC
client to TATA server.
(3 Marks – [U/C,2])
(ii)
Figure 5
In the process of data transmission from the sender to receiver that is shown in Figure 5, how
errors are detected using block coding technique?
(3 Marks – [U/C,2])
(iii) Find the minimum hamming distance for the given code words.
Code words: (0000, 01011,10101, 11110)
(4 Marks – [An/C,2])
B2
Page 5 of 13
Figure 6
Figure 6 shows the types of frames involved in data transmission process in the data link layer.
(i) Compare the two types of frames shown in figure 6 based on its variable size framing capability
where you need to define the end of frame and beginning of the next.
(4 Marks – [An/C,2])
(ii) In character oriented framing, any pattern that is used for the flag could be a part of the
information. The receiver when it encounters this pattern in the middle of the data, may
misinterpret as end of the frame. Byte stuffing is used to fix this issue. Justify.
(3 Marks – [An/C,2])
(iii) In data communication, data link layer is responsible for controlling the amount of data sent from
the sender side and also for retransmitting the data whenever necessary. Justify.
(3 Marks – [An/C,2])
B3
Figure 7
Figure 7 shows the simplest protocol for the noiseless channels. This protocol has no error control and
flow control mechanism.
(i) With the sender site algorithm given in figure 7, complete the receiver site algorithm for the
simplest protocol given here.
(6 Marks – [U/C,2])
while (true)
{
WaitForEvent();
Page 6 of 13
(ii)
Figure 8
Identify the frame sequences A, B, C & D on the sending window of Go Back – N ARQ before
sliding in figure 8.
(4 Marks – [U/C,2])
SECTION C COURSE OUTCOME 3 MAXIMUM: 20 MARKS
C1
Figure 9
Figure 9 shows a network with its networking components and its corresponding IP addresses.
(i) Identify the internal IP address and external IP address in figure 9.
(2 Marks – [An/C,2])
(ii) Convert all the IP address provided in figure 9 into binary.
(4 Marks – [An/C,2])
(iii) Find the class of each IP address given here.
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 14.23.120.8
d. 252.5.15.111
.
(4 Marks – [An/C,2])
C2
Figure 10
Figure 10 shows the position of IPv4 in TCP/IP protocol suite.
(i) Complete the missing parts of IPv4 datagram format which was the major protocol in network
Page 7 of 13
layer as shown in Figure 10.
(6 Marks – [U/C,2])
(ii)
Figure 11
Figure 11 shows one of the strategies involved in transition from IPv4 to IPv6. Justify.
(4 Marks – [An/C,2])
C3 Figure 12 shows the network design of John’s organization. Imagine yourself as a network
administrator of the organization and do the configuration of the routers.
Figure 12
Page 8 of 13
Router0(config-if)# exit
router0 enable
router0 #configure terminal
router0 (config)#router rip
router0 (config-terminal) #network 192.168.1.1
router0 (config-router) #end
(4 Marks – [Ap/P,2])
Figure 13
Figure 13 shows the types of data deliveries that happens when the data communication occurs
between the sender and the receiver.
(i) Identify the layers involved in node to node, host to host and process to process delivery in
figure 13.
(3 Marks – [U/C,2])
Page 9 of 13
(ii)
Figure 14
Identify the missing contents along with its size (A, B & C) in user datagram format given in
figure 14.
(3 Marks – [U/C,2])
(iii) In transport layer, if a process wants to communicate with multiple processes, it obtains one port
number, one outgoing queue and one incoming queue. Justify.
(4 Marks – [An/C,2])
D2
Figure 15
Figure 15 shows the connection establishment using three way handshaking in TCP.
(i) In figure 15, SYN is sent from sender to receiver which synchronizes the sequence numbers. It
consumes 1 sequence number and it cannot carry data. Compare SYN+ACK and ACK in figure
15 based on its data carrying capacity and consumption of sequence numbers during connection
establishment in figure 15.
(4 Marks – [An/C,2])
(ii) After connection establishment is over as shown in figure 15, design the data transfer between
client and server. Client has to sends2000 bytes of data in two segments. The server has to
send 2000 bytes in one segment.
(6 Marks – [An/C,2])
Page 10 of 13
D3
Figure 16
Figure 16 shows the different types of real time network traffic.
(i) Identify the type of traffic profile for voice traffic, video traffic and data traffic in figure 16.
(3 Marks – [U/C,2])
(ii) The type of window used at the sender side affect the congestion occurs in a network. Selective
repeat window should be adopted to avoid congestion. Justify.
.
(2 Marks – [An/C,2])
(iii) Switches in a flow should first check the resource requirement of a network flow before
transmitting it further. If there is a chance of congestion or there is congestion in the network,
router should deny establishing a virtual network connection to prevent further congestion.
Identify the open loop congestion mechanism involved in this scenario.
(2 Marks – [An/C,2])
(iv)
Figure 17
Figure 17 shows one of the closed loop congestion control mechanism. Justify.
(3 Marks – [An/C,2])
SECTION E COURSE OUTCOME 5 MAXIMUM: 20 MARKS
E1
Figure 18
Figure 18 shows an example which uses the Domain Name System (DNS) service.
Page 11 of 13
(i) Match the following resource records in DNS with appropriate definition.
(6 Marks – [U/C,2])
Figure 19
Compare the domain names in Figure 19 A and B based on its naming constraints.
(4 Marks – [U/C,2])
E2
Figure 20
Page 12 of 13
Figure 20 shows a simple scenario of sending an e-mail from Alice to Bob who were the users of same
system.
(i) Design a system to send e-mail from Alice to Bob where Alice and Bob were the users of
different systems. Use two user agents and a pair of message transfer agents (MTAs).
(4 Marks – [An/C,2])
(ii)
Figure 21
Identify the service A and B involved in figure 21 where e-mail communication happens between
MTA client to MTA server and MAA server to MAA client respectively.
(3 Marks – [U/C,2])
(iii) Identify the command driven user agent and GUI based user agent based on its usage in e-mail
communication.
a.Outlook
b.Pine
c.Netscape
(3 Marks – [An/C,2])
E3
Figure 22
Figure 22 shows the sending of messages into the internal network and sending of messages to the
global internet.
(i)
Confidential and authenticated email is sent from Alice to Bob with the help of Pretty Good
Privacy (PGP). Justify.
(4 Marks – [An/C,2])
(ii) Create a static HTML document for “Bannari Amman Institute of Technology” which must include
HTML root element, text formatting tags, images, links, lists and tables.
(6 Marks – [An/C,2])
***End of Question Paper***
Page 13 of 13