Download as pdf or txt
Download as pdf or txt
You are on page 1of 58

L.

J Institutes of Engineering and Technology


Remedial MSE List of Questions

SEM: 5
Subject Name: Computer Networks
Subject Code: 3150710

1. What is the difference between guided and unguided transmission media? Write briefly
about following
1) twisted pair.
2) Fiber optical
3) Coaxial

ANS

1. Guided transmission media: Guided transmission is where the signal (information or data) is sent
through some sort of cable, usually copper or optical fiber.

There are many different types of cabling:


1. Twisted Pair
2. Coaxial Cable (coax)
3. Fiber Optic Cable

2. Unguided transmission media : Information is usually transmitted by either radio or microwave


transmission. Unguided media transport electromagnetic waves without using a physical conductor.
Signals are broadcast through air (or in a few cases, water).

There are many different types:


1. Radiowave
2. Microwave
3. Infrared

1. Twisted pair

This consists of two or more insulated wires twisted together in a shape similar to a helix.
Use metallic conductor
The cables are twisted around each other to reduce the amount of external interference
It consist of two conductor (copper), each with it’s colored plastic insulation.
This cable can be used at speeds of several Mb/s for a few kilometers.
Used for telephone line and lab network.

Computer Networks 2021 Page 1


Two types of twisted pair cable”
a. Shielded twisted pair b. Unshielded twisted pair

Fiber Optic Cable:

Components of Fiber Optics:-

Light Source ,Transmission Medium ,Light Detector

• This consists of a central glass core, surrounded by a glass cladding of lower refractive index,
so that the light stays in the core (using Total Internal Reflection)
• outside is covered with plastic jacket
• Many fibers may be bundled together surrounded by another plastic cover

Refraction:-

When Light travels from one medium to another medium changes occurs in its speed and
direction, This changes is called refraction. I - Angle of Incidence. R- Angle of Refraction.

Critical Angle:-
Computer Networks 2021 Page 2
At some points, the changes in the incident angle results in the refracted angle of 90 degrees,
with the refracted beam lying along the Horizontal. The incident angle at this point is known
as Critical Angle.

Reflection:-

When the angle of incidence becomes grater than the critical angle, a new phenomenon is
Occurs is called reflection.

Light traveling of fiber optic cable:

The source of light is usually a Light Emitting Diode (LED) or a LASER. The light source is
placed at one end of the optical fiber.

The detector, which is placed at the other end of the fiber, is usually a Photo Diode and it
generates an electrical pulse when light falls on it.

Hence by attaching a light source on one end of an optical fiber and a detector at the other end,
we have a unidirectional data transmission system (Simplex)

The light source would accepts an electrical signal, converts and transmits it as light pulses

The detector at the far end reconverts the light pulses into an electrical signal to be then
interpreted as 1 or a 0.

The limits the data rate is 1Gb/sec (1x109 bits / sec)

Coaxial Cable (coax)

This consists of a copper cable inside a layer of insulating material.


The insulating material is then inside a braided outer conductor.
A layer of plastic is on the outermost layer.
This type of cable was commonly used in the telephone system but has since been replaced by
fiber optics on longer routes
This cable has also been used for Cable TV.

Computer Networks 2021 Page 3


Categories of coaxial cables

RG-Radio Government., Each cable define by RG ratting. RG-8 &RG-9 also used in Thin
Ethernet. RG number denotes a unique set of physical Specification, including the wire gauge
of the inner conductor. Impedance

Connector of coaxial cables

The most common connector is barrel connector. The most popular type is BNC(Bayonet
Network connector) Two other types are T-connectors and terminators. T-connectors and
terminators are used in bus topology.

Advantages:-
Easy to Install.
Inexpensive installation.
It is better for Higher Distance at Higher speed than twisted pair.
Excellent noise immunity.

Disadvantage:-
High Cost
Harder to work

Computer Networks 2021 Page 4


2. What is network topology? Explain different types of network topology.

ANS.
1. Bus Topology:-

Uses a single backbone cable.


All the Nodes connect directly to this backbone.

Advantage:-

Disadvantage:-

2. Ring topology:-

Connects one Node to the next and the last Node to the first.
Use the token.
Token is passing from 1 Node to another Node.
Only the node with the token is allowed to send data.

Advantage:-
If Link is broken then that node is reachable from other side of ring.

Disadvantage:-
Un directional Traffic
Computer Networks 2021 Page 5
3. Star topology:-

Each Node is directly connected to the central Devices.


We can use Hub, switch, router as a Central Device.

Advantage:-
If one link is broken then only that particular node is
Unreachable.
Less Collision.
Most Efficient.
Simple and easy to identify Fault.

Disadvantage:-
Traffic is more at Central Point.
All Nodes are depended on Central devices.

4. Tree Topology:-

It’s also known as hierarchical topology.


All the nodes are connected in a tree structure.

Advantage:-
Simple and easy to identify Fault.

Computer Networks 2021 Page 6


Disadvantage:-
If one link is broken then sub branch node can not send data to other side.

5. Mesh topology:-
Two type of Mesh Topology:-
1. Fully Connected
2. Partially Connected

3. a) Define and explain following terms: (a) Delay (b) Throughput (c) Loss (d) Jitter
b) Explain following terms: 1) Processing Delay 2) Queuing Delay 3) Transmission Delay
4) Propagation Delay

ANS.(a)

a) Delay:
It specifies the latency for a bit of data to travel across the network from one communication
endpoint to another. It is typically measured in multiples or fractions of a second.

b) Throughput:
Throughput is the average rate of successful message delivery over a communication channel.

c) Packet Loss:
When accessing the internet or any network, small units of data called packets are sent and
received. When one or more of these packets fails to reach its intended destination, this is
called packet loss.

d) Jitter:
In Computer Networking, jitter refers to the delay variation in the packets' arrival

ANS.(b)

Processing Delay (Nodel Delay) [Dproc]: Time required examining the packet header and
determining where to direct the packet.

Propagation[Dprop]:
This is simply the time it takes for a packet to travel between one place to another at the speed
of light. IT is a simple measurement of how long it takes for a signal to travel along the cable
being tested Propagation time= Distance/ Propagation speed

Queuing Delay [Dqueue]

Computer Networks 2021 Page 7


It is a waiting time experienced by packet for transmission across the link.

Transmission time [Dtrans]( Transmission time Delay): It is the time between the first bit
leaving the sender and the last bit arriving at the receiver.
Transmission time = Message size/Bandwidth

4. Draw the OSI reference model. Explain the functionality of each layer in brief

ANS.

 ISO is an Organization and OSI is a model.


 ISO stands for International Standard Organization.
 OSI stands for Open System Interconnections.
 OSI model is used for understanding the concept of network architecture.
 OSI consists of seven separate but related layers, each of which defines a segment of
the process of moving information across a network.

1. Physical Layer

Physical characteristic of interfaces and media


 Transmission media between Source and Destination
 It may be wired or wireless

Representation of bits
 Bit must be encoded into signals-Electrical or Optical.
 It is define the type of encoding.

Data rate
 Rate of data transmission / No. of bits transmitted per second

Computer Networks 2021 Page 8


Synchronization
 Sender and Receiver must be synchronies at bit level.
 Clock must be synchronies.

Line configuration
 Point-to-Point configuration & multipoint configuration

Physical topology
 Type of topology:-Star, Mesh, Ring, Bus.

Transmission mode
Simplex, half-duplex or full-duplex

2. Data Link Layer

Responsibilities of the data link layer

Framing:
 the data link layer divides the stream of bits received from the network layer into
manageable data units called frames.

Physical addressing:
 Add MAC Address (Layer 2 address/physical address) of Source and Receiver.

Flow control:
 Flow of data must be controlled.
 If sending rate of sender is higher than receiving rate of receiver then flow control is
required.

Error Control:
 Adds reliability
 Detect and Retransmit damaged or lost frames.
 Prevent duplication of frames.
 Trailer is added to the end of the frame for error controlling.

Access Control:
 Determine the Controlling of node over the link at any time.
 HUB and Switch (L2) are operated at Layer2.

3. Network Layer:

It is Responsible for the source-to-destination delivery of a packet.


The network layer ensures that each packet gets from its point origin to its final destination.
Specific responsibilities of the network layer include the following:

Logical Addressing:
 Add IP Address (Layer 3 address/Logical address) of Source and Receiver.
 Routing:
 Route the packets to their final destination
 Switch (l3) and Router is operated at Layer3.
 Routing table is maintained by router.
Computer Networks 2021 Page 9
4. Transport Layer
Responsible for source-to-destination (end-to-end) delivery of the entire message
Network layer oversees end-to-end delivery of individual packets; it does not recognize any
relationship between those packets.
The transport layer ensures that the whole message arrives in order.
It is managing both error control and flow control at the source-to-destination level.

Responsibilities of the transport layer

Service-point Addressing:
 Computers often run several programs at the same time.
 The transport layer header therefore must include a type of address called a service-
point address (or port address).

Segmentation and reassembly:


 A message is divided into transmittable segments.
 Each segment is containing a sequence number.
 Reassemble the message correctly upon arriving at the destination and to identify and
 Replace packets that were lost in transmission.

Connection Control:
 The transport layer can be either connectionless or connection-oriented.
 A connectionless transport layer treats each segment as an independent packet and
delivers it to the transport layer at the destination machine.
 A connection-oriented transport layer makes a connection with the transport layer at
the destination machine first before delivering the packets. After all the data are
transferred, the connection is terminated.

Flow control:
 It is responsible for flow control for end to end rather than across a single link.

Error control:
 It is responsible for error control. for end to end rather than across a single link.
 The sending transport layer makes sure that entire message arrives at the receiving
transport layer without error (damage, loss or duplication).
 Error correction is usually achieved through retransmission.

Session Layer
The session layer is network dialog controller.
It establishes, maintains, and synchronizes the interaction between communicating systems.
Specific responsibilities of the session layer include the following:

Dialog control:
 The session layer allows two systems to enter into a dialog.
 Prepared By: Prof. Ajay N. Upadhyaya, Asst. Prof. CE Dept, LJIET Page 39
 It allows the communication between two processes to take place either in half-duplex
(one way at a time) or full-duplex (two ways at a time). For example, the dialog
between a terminal connected to a mainframe can be half-duplex.

Synchronization:
 It allows a process to add checkpoints (synchronization points) into a stream of file.

Computer Networks 2021 Page 10


6. Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
Specific responsibilities of the presentation layer include the following:

Translation:
 The processes (running programs) in two systems are usually exchanging information
in the form of character strings, numbers, and so on.
 The information should be changed to bit streams before being transmitted. Because
different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods.
 The presentation layer at the sender changes the information from its sender-dependent
format into a common format. The presentation layer at the receiving machine changes
the common format into its receiver-dependent format.

Encryption:
 To carry sensitive information, a system must be able to assure privacy.
 Encryption means that the sender transforms the original information to another form
and sends the resulting message but over the network. Decryption reverses the original
process to transform the message back its original form.

7. Application Layer
The application layer, enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information services.
The application layer, enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information services.
5. Differentiate TCP/IP stack and OSI reference model.

ANS.

Computer Networks 2021 Page 11


6. a) Discuss the parity checks for error detection in data transfer
b) Generate the CRC code for 1101011011.The divisor is 10011. Append CRC with data.

ANS.(a)

Parity checks

Mainly two types of parity check methods are available


Computer Networks 2021 Page 12
1. LRC
2. VRC

[1]VRC –Vertical Redundancy Check


It’s least expensive method.
It’s also called Parity Checking and bit is called parity bit.
This Parity bit is append to every data unit, So the total number of 1‘s (Including parity bit)
becomes either Even or Odd.
-
If data is 10101010 And if user wants data with Even Parity then Data becomes
101010100{Total number of 1 is Four}, And if user wants data with Odd Parity then Data
becomes 101010101{Total number of 1 is Five}
VRC can detect all single bit error.
It also detects burst error as long as the total number of bit changed to Odd (1, 3, 5<) & For
Odd parity, and total number of bit changed to Even (2, 4, 6<) For Even parity.

[2] LRC –Longitudinal Redundancy Check


Blocks of bits are organized in a table format (means In a Row and Column).
Example:
We have data 01100111000111010001100100101001 32 bit block is divided into 4 rows and 8
columns.

01100111 00011101 00011001 00101001 Arrange it in table Format.

01100111
00011101
00011001
00101001
------------
01001010 LRC Sender sends Original Data plus LRC to the receiver.
01100111 00011101 00011001 00101001 01001010

and 11000011.

And if the first and last bit in each of them are changed, Then Data becomes 01110001 and
01000010 and LRC not find an Error.

ANS.(b)

Computer Networks 2021 Page 13


7. a) List and explain the services provided by the link layer.
b) Explain Ethernet Frame structure.

ANS.(a)

Link Layer

Transmitting Frame
Responsible for Node to Node delivery
Makes the physical layer appear error free to the upper layer (network layer).

Framing:
o the data link layer divides the stream of bits received from the network layer into
manageable data units called frames.

Physical addressing:
Computer Networks 2021 Page 14
o Add MAC Address (Layer 2 address/physical address) of Source and Receiver.

Flow control:
o Flow of data must be controlled.
o If sending rate of sender is higher than receiving rate of receiver then flow control is
required.

Error Control:
o Adds reliability
o Detect and Retransmit damaged or lost frames.
o Prevent duplication of frames.
o Trailer is added to the end of the frame for error controlling.

Access Control:
o Determine the Controlling of node over the link at any time.
o HUB and Switch (L2) are operated at Layer2.

ANS.(b)

Frame Structure:

PREAMBLE – Ethernet frame starts with 7-Bytes Preamble. This is a pattern of alternative 0’s and
1’s which indicates starting of the frame and allow sender and receiver to establish bit
synchronization.

Start of frame delimiter (SFD) – This is a 1-Byte field which is always set to 10101011. SFD
indicates that upcoming bits are starting of the frame, which is the destination address.

Destination Address – This is 6-Byte field which contains the MAC address of machine for which
data is destined.

Source Address – This is a 6-Byte field which contains the MAC address of source machine.

Length – Length is a 2-Byte field, which indicates the length of entire Ethernet frame. This 16-bit
field can hold the length value between 0 to 65534, but length cannot be larger than 1500 because
Computer Networks 2021 Page 15
of some own limitations of Ethernet.

Data – This is the place where actual data is inserted, also known as Payload. Both IP header and
data will be inserted here if Internet Protocol is used over Ethernet. The maximum data present
may be as long as 1500 Bytes.

Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field contains a 32-bits hash code of
data, which is generated over the Destination Address, Source Address, Length, and Data field.

8. Enlist various framing techniques used in data link layer. What is bit and byte stuffing?
Explain with example

ANS.

Framing In the OSI model of computer networking, a frame is the protocol data unit at the data
link layer. Frames are the result of the final layer of encapsulation before the data is
transmitted over the physical layer

Types of framing methods:

1. Counters method
2. Byte stuffing
3. Bit stuffing

Framing: Byte stuffing

 Each frame starts and ends with special bytes: flag bytes.
 Two consecutive flag bytes indicate end of frame and beginning on new frame.

Computer Networks 2021 Page 16


(a) A frame delimited by flag bytes.
(b) Four examples of byte sequences before and after stuffing.
 Single ESC: part of the escape sequence.
 Doubled ESC: single ESC is part of data.
 De-stuffing.

Bit Stuffing
 Allows character codes with arbitrary bits per character.
 Each frames begins and ends with special pattern.
 Example: 01111110.
 When sender’s DLL finds 5 consecutive 1’s in data stream, stuffs 0.
 When receiver sees 5 1’s followed by 0, de-stuffs.

(a) Original data. (b) Data as they appear on the line. (c) Data after de-stuffing.

9. Explain ALOHA system. How slotted ALOHA works? Differentiate it with pure ALOHA

ANS.

ALOHA is a multiple access protocol for transmission of data via a shared network channel. It
operates in the medium access control sublayer (MAC sublayer) of the open systems
interconnection (OSI) model.

Computer Networks 2021 Page 17


Types of ALOHA
1. Pure ALOHA
2. Slotted ALOHA

Slotted ALOHA Assumptions:


 All frames same size
 Time is divided into equal size slots, time to transmit 1 frame
 Nodes start to transmit frames only at beginning of slots
 Nodes are synchronized
 If 2 or more nodes transmit in slot, all nodes detect collision

Operation:
When node obtains fresh frame, it transmits in next slot
No collision, node can send new frame in next slot
If collision, node retransmits frame in each subsequent slot with prob. p until success

Pros:
 Single active node can continuously transmit at full rate of channel
 Highly decentralized: only slots in nodes need to be in sync
 Simple
 Cons:
 Collisions, wasting slots
 Idle slots
 Nodes may be able to detect collision in less than time to transmit packet
 Clock synchronization

Difference between Slotted and Pure ALOHA:


1. Pure Aloha is a Continuous time system whereas Slotted Aloha is discrete time system.
2. Pure ALOHA doesn't check whether the channel is busy before transmission.
3. Slotted ALOHA send the data at the beginning of timeslot.
Pure aloha not divided in to time .Slotted aloha divided in to time
4. In slotted ALOHA, a frame can be sent only at fixed times, whereas in pure ALOHA, you
can send any time.
5. Pure ALOHA is featured with the feedback property that enables it to listen to the channel
and finds out whether the frame was destroyed.
10. Write a short note on CSMA and also explain CSMA/CA.

ANS.

CSMA (Carrier Sense Multiple Access) Introduction:

Computer Networks 2021 Page 18


A station senses the channel before it starts transmission
If busy, either wait or schedule backoff (different options)
If idle, start transmission
Vulnerable period is reduced to tprop (due to channel capture effect)
When collisions occur they involve entire frame transmission times

CSMA/CA:

The basic idea behind CSMA/CA is that the station should be able to receive while
transmitting to detect a collision from different stations. In wired networks, if a collision has
occurred then the energy of received signal almost doubles and the station can sense the
possibility of collision. In case of wireless networks, most of the energy is used for
transmission and the energy of received signal increases by only 5-10% if a collision occurs. It
can’t be used by the station to sense collision. Therefore CSMA/CA has been specially
designed for wireless networks.

These are three types of strategies:

InterFrame Space (IFS) – When a station finds the channel busy, it waits for a period of time
called IFS time. IFS can also be used to define the priority of a station or a frame. Higher the
IFS lower is the priority.

Contention Window – It is the amount of time divided into slots.A station which is ready to
send frames chooses random number of slots as wait time.

Acknowledgments – The positive acknowledgments and time-out timer can help guarantee a
successful transmission of the frame.

Flow chart of CSMA / CA

Computer Networks 2021 Page 19


11. Explain CSMA/CD Protocol.

ANS:

CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a media access control
method that was widely used in Early Ethernet technology/LANs When there used to be
shared
Bus Topology and each node ( Computers) were connected By Coaxial Cables.

CSMA/CD is one such technique where different stations that follow this protocol agree on
some terms and collision detection measures for effective transmission. This protocol decides
which station will transmit when so that data reaches the destination without corruption.

How CSMA/CD works?

Step 1: Check if the sender is ready for transmitting data packets.

Step 2: Check if the transmission link is idle?


Sender has to keep on checking if the transmission link/medium is idle. For this, it
continuously senses transmissions from other nodes. Sender sends dummy data on the link. If
it does not receive any collision signal, this means the link is idle at the moment. If it senses
that the carrier is free and there are no collisions, it sends the data. Otherwise, it refrains from
sending data.

Computer Networks 2021 Page 20


Step 3: Transmit the data & check for collisions.
Sender transmits its data on the link. CSMA/CD does not use an ‘acknowledgment’ system. It
checks for successful and unsuccessful transmissions through collision signals. During
transmission, if a collision signal is received by the node, transmission is stopped. The station
then transmits a jam signal onto the link and waits for random time intervals before it resends
the frame. After some random time, it again attempts to transfer the data and repeats the above
process.

Step 4: If no collision was detected in propagation, the sender completes its frame transmission
and resets the counters.

Flow chart of CSMA/CD

12. a) Compare : Ethernet and Fast Ethernet


b) Compare : Circuit switched vs Packet switched network

ANS. [1]

Ethernet Fast Ethernet


Standard 802.3 Standard 802.3u
Different types 10BASE5, 10BASE2, 10BASE-F Different types 100BASE-Tx, 100BASE-FX
and 10BASE-T. 100BASE-T4
Speed upto 10Mbps Speed upto 100Mbps
Shorter length cables used Longer Length cables used

Computer Networks 2021 Page 21


ANS. [2]

13. Explain the self-Learning properties of link layer switches.

ANS.

Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network.

A switch has many ports, to which computers are plugged in. When a data frame arrives at any
port of a network switch, it examines the destination address, performs necessary checks and
sends the frame to the corresponding device(s).It supports unicast, multicast as well as
broadcast communications.

A switch holds a switching table which contains two columns i.e. ports and MAC address.
Initially the table is empty. A switch sends dummy packet to all its interfaces to learn about
their MAC addresses. When devices connected to particular port replies with the their MAC
address switch makes entry in its table.

Self-Learning:
Computer Networks 2021 Page 22
Its table is built automatically, dynamically, and autonomously—without any intervention
from a network administrator or from a configuration protocol

14. a) Differentiate : Router and Switch


b) Explain the usage of following devices. Also discuss the OSI layer at which they are
used.
1. Bridge
2. Repeater
3. Hub and Switch
4. Router

ANS:

1. Bridge
 Bridge operates at both the physical layer and data link layer.
 Bridge divides a larger network onto smaller segments.
 Maintain traffic for each segment.
 Maintain physical address of each node of each segment.
 Store address into look-up table.
 Types of bridge

1. Simple Bridge
Used to connect two segments
Least expensive
Address of each node entered manually
Installation and maintenance is high & time consuming

2. Multiport Bridge
Used to connect more than two LAN
Maintain physical address of each station
If three segment is connected then it maintain three tables
Address of each node entered manually
Installation and maintenance is high & time consuming

Computer Networks 2021 Page 23


2. Repeater
 Repeater is also known as a Regenerator.
 It’s an electronic device.
 Used at Physical layer of OSI model.
 Used for carry information at longer distance.
 Not work as an amplifier, it’s not amplifying the signal.
 It regenerates the original bit patterns from weak signal patterns.
 So, Repeater is a regenerator not an amplifier.
 It’s not an intelligent device.

3. Hub and switch


Switch
 Two type of switch: Layer two and Layer three switch
 Layer two switch is operates at second layer and layer three switch is operates
at third layer
 We can configure layer three switch
 Switch(l2) maintain physical address of each node
 L3 switch handle logical address
 Not manually handling is required for tables
 For the first time broadcast the message if destination address is not available in
the table.

Two different strategies of switch

1. Store and forward Switch: store the frame in the input buffer until the whole
packet has arrived.
2. Cut through Switch: Not wait for other frames; just transmit it towards the
destination
Hub
Computer Networks 2021 Page 24
 Used at physical layer
 Dump device
 Not maintaining any type of node details
 Each time broadcast the packets
 Cheaper
 Used to connect two or more number of computers
4. Router
 It is used at network layer of OSI model
 Maintain logical address of each node
 It’s an intelligent device
 It has its own softwar
 Determines the best path among available different path
 Used to connect two different networks
 Manually handling is not required
 We can configure the router according to our requirement
 Maintain address by its own
 At initial level table is empty
 After each process its storing details of each node
 Its self updating
15. Explain IPv4 header in detail

VERSION: Version of the IP protocol (4 bits), which is 4 for IPv4

HLEN: IP header length (4 bits), which is the number of 32 bit words in the header. The
minimum value for this field is 5 and the maximum is 15.

Type of service: Low Delay, High Throughput, Reliability (8 bits)

Total Length: Length of header + Data (16 bits), which has a minimum value 20 bytes and the
maximum is 65,535 bytes.

Identification: Unique Packet Id for identifying the group of fragments of a single IP datagram
(16 bits)
Computer Networks 2021 Page 25
Flags: 3 flags of 1 bit each : reserved bit (must be zero), do not fragment flag, more fragments
flag (same order)

Fragment Offset: Represents the number of Data Bytes ahead of the particular fragment in the
particular Datagram. Specified in terms of number of 8 bytes, which has the maximum value
of 65,528 bytes.

Time to live: Datagram’s lifetime (8 bits), It prevents the datagram to loop through the
network by restricting the number of Hops taken by a Packet before delivering to the
Destination.

Protocol: Name of the protocol to which the data is to be passed (8 bits)

Header Checksum: 16 bits header checksum for checking errors in the datagram header

Source IP address: 32 bits IP address of the sender

Destination IP address: 32 bits IP address of the receiver

Option: Optional information such as source route, record route. Used by the Network
administrator to check whether a path is working or not.

16. a) Compare datagram subnet and virtual-circuit subnets.


b) Compare the IPv4 and IPv6
a) Compare datagram subnet and virtual-circuit subnets.

b) Compare the IPv4 and IPv6

Computer Networks 2021 Page 26


17. Explain all steps of link state routing with example.

Computer Networks 2021 Page 27


Computer Networks 2021 Page 28
Computer Networks 2021 Page 29
Computer Networks 2021 Page 30
Computer Networks 2021 Page 31
18. Explain Distance Vector routing with example.

Computer Networks 2021 Page 32


Computer Networks 2021 Page 33
Computer Networks 2021 Page 34
19. Explain Path Vector Algorithm

Computer Networks 2021 Page 35


Computer Networks 2021 Page 36
20. Write note on:
1) Internet Control Message Protocol (ICMP)

Computer Networks 2021 Page 37


2) Tunneling

Computer Networks 2021 Page 38


21. 1) Network address translation and
2) DHCP
Network address translation

Computer Networks 2021 Page 39


DHCP

Computer Networks 2021 Page 40


22. An organization is granted a block starting with 190.100.0.0 /16. The ISP wants to distribute
these addresses to three groups of customers as follows
a) the first group has 64 customers :each needs 256 addresses.
b) the second group has 128 customers :each needs 128 addresses.
c) the third group has 128 customers :each needs 64 addresses.
Design the sub blocks

Computer Networks 2021 Page 41


23. Compare distance vector routing and link state routing algorithm.

24. a) Explain : MAC address and IP address.


b) Discuss transport layer multiplexing and Demultiplexing concept.
Explain : MAC address and IP address.

What is the Mac address?


MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/
Card).

It consists of a 48 bit or 64-bit address, which is associated with the network adapter. MAC
address can be in hexadecimal format.

The full form of MAC address is Media Access Control address. A MAC address is generally
in six sets of two-digits/characters that are separated by colons.

Example: 55:AA:53:22:2A:F1

What is the IP address?


An IP address is an address that helps you to identify a network connection. It is termed as the
‘Logical Address,’ which is provided to a connection in a network.

Computer Networks 2021 Page 42


IP address helps you to control how devices on the Internet communicate and defines the
behavior of internet routers.

Example 120.10.10.203

Key Differences

 MAC address is a unique hardware identification number that is assigned to a NIC


(Network Interface Controller/ Card), whereas the IP address is an address that helps
you to identify a network connection.
 MAC address is assigned by the manufacturer of the hardware interface while the IP
address is assigned by the network administrator or Internet Service Provider (ISP).
 Mac address defines the devices identity, but IP address describes how the devices are
connected to the network.
 MAC addresses can be used for broadcasting, on the other hand, IP address can be used
for broadcasting or multicasting.
 The MAC address is implemented in the Data-Link layer of the OSI or TCP/IP
reference model. In contrast, the IP address is implemented in the Network layer of the
TCP/IP or OSI model.

Discuss transport layer multiplexing and Demultiplexing concept.

Computer Networks 2021 Page 43


25. Explain Stop and Wait ARQ in detail.

Computer Networks 2021 Page 44


Computer Networks 2021 Page 45
Computer Networks 2021 Page 46
Computer Networks 2021 Page 47
26. Describe the working of sliding window protocol. Explain Sliding window protocol using
GO back to N

Computer Networks 2021 Page 48


Computer Networks 2021 Page 49
Computer Networks 2021 Page 50
Computer Networks 2021 Page 51
27. Explain following
a) Piggy backing
b) Selective Repeat and Go back N

Computer Networks 2021 Page 52


Piggy backing

Computer Networks 2021 Page 53


Selective Repeat and Go back N

28. Compare:

a) UDP and TCP.

Computer Networks 2021 Page 54


b) Connection oriented v/s Connectionless services

29. Explain WWW and HTTP.

Computer Networks 2021 Page 55


Computer Networks 2021 Page 56
30. Explain how Email works.

Computer Networks 2021 Page 57


Computer Networks 2021 Page 58

You might also like