Professional Documents
Culture Documents
CIE Questions
CIE Questions
Demonstrate the concept of piggybacking and error handling while using HDLC frame.
Suppose the following sequence of bits arrives at the receiver over a link:
1101011111010111110010111110110
Show the resulting frame after stuffed bits, if any, have been removed.
Indicate any errors that might have been introduced into the frame. Defend your answer.
Network layer provides services to transport layer. In this case what are the goals that should
be considered while designing ?
With a neat flow diagram, explain the process of data transmission in CSMA/CA.
Match the following functions to one or more layers of the TCP/IP protocol suite.
i. transforming bits to electromagnetic signals
ii. route determination
iii. end to end error detection and correction
iv. providing services for the end user
v. handling flow control
Observe the figure above and identify the protocol whose working is represented in this
diagram. Also explain the communication scenario of the diagram.
Design Routing tables for nodes 1,2,3,4,5 for performing routing in the given datagram
network across Host H1 and Host H2
Using Distance Victor Routing, design routing tables for following Subnet
Consider a network with 6 routers 𝑅1 to 𝑅6 connected with links having weights as show in
the following diagram. All the routers use the distance vector based routing algorithm to
update their routing tables. Each router starts with its routing table in initialized to contain an
entry for each neighbour with the weight of the respective connecting link. After all the
routing tables stabilize, how many links in the networks will never be used for carrying any
data?
Demonstrate the working principle of Link State routing with suitable example.
For hierarchical routing with 4800 routers, What region and cluster sizes should be chosen to
minimize the size of the routing table for a three-layer hierarchy?
Consider the following network and apply the Dijkstra Algorithm by considering A as the
Source and Z as the destination.
Illustrate Count to Infinity Problem by considering a small network List and explain solution
for the same.
Write the difference between the chocking and Hop-by-Hop Backpressure Hop-by-Hop
flocking.
Consider any network and discuss how Random Early Detection handles the congestion.
Let n is the counter with the value 1000 and the leaky bucket has the following packets in it
(Refer below Figure) Demonstrate how leaky bucket regulate the traffic using appropriate
figures. 200 700 500 450 400 200
Consider the following multiact network and discuss Recourse Reservation Protocol.
Explain the concept of Load Shedding and Jitter with suitable examples.
Distinguish between integrated and differentiated services. Describe the scheme of assured
forwarding with relevant diagram.
A computer on a 6 − 𝑀𝑏𝑝𝑠 network is regulated by a token bucket. The token bucket is filled
at a rate of 1 𝑀𝑏𝑝𝑠. It is initially filled to capacity with 8 megabits. How long can the
computer transmit at the full 6 𝑀𝑏𝑝𝑠?
Describe the internetworking happens with tunneling. Mention its advantages and
disadvantages.
Suppose a 𝑇𝐶𝑃 message containing 2048 bytes of data +20 bytes 𝑇𝐶𝑃𝐻 is passed to 𝐼𝑃 for
delivery across two networks in 𝑁1 & 𝑛2 𝑁1: 14-Bytes Header; 𝑀𝑇𝑈 1024 bytes 𝑁2: 8-
Bytes Header; 𝑀𝑇𝑈 512 bytes. Give the sizes and offsets of the sequence of fragments
delivered to the network layer at the destination host.
Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and
R2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and
20 bytes of TCP header is passed to the IP code at host A for delivery to B. Show the Total
length, Identification, DF, MF, and Fragment offset fields of the IP header in each packet
transmitted over the three links. Assume that link A-R1 can support a maximum frame size of
1024 bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size
of 512 bytes, including an 8-byte frame header, and link R2-B can support a maximum frame
size of 512 bytes including a 12byte frame header.
Write in detail how Exterior Gateway Routing Protocol are used to implement
Internetworking.
Consider an application with a server and a number of remote clients. Discuss the different
socket primitives for a simple transport service to implement the above application.
How do IP addresses get mapped onto data link layer addresses, such as Ethernet?
With a neat sketch explain the protocol used for this purpose.
With a neat diagram explain the protocol used to determine the best paths for routing data
packets between routers within an Autonomous System.
With the help of a neat diagram, explain the fields of TCP header.
Explain the process of TCP connection establishment and TCP connection Release
Draw and explain in detail the architecture of Electronic mail service? What
are the protocols used to implement the different component of Electronic
mail service.
1.1 The data link layer is subdivided into two protocol sublayers: Logical Link Control
(LLC) and Media Access Control (MAC).
(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer
1.3 In the IPv4 addressing format, the number of networks allowed under class C addresses is
2^21, which is 2,097,152.
1.4 Flooding is a network communication technique where data is sent to all devices on a
network, regardless of whether they are the intended recipients. It is often used in
broadcasting or multicast scenarios.
1.5 The probability that ONLY one station transmits in a given time slot in a slotted LAN
with n stations, where each station attempts to transmit with a probability p, can be calculated
as n * p * (1-p)^(n-1).
1.6 In distance-vector routing algorithms, each router maintains a table (vector) indexed by
and containing one entry for each router in the subnet.
1.7 To calculate the maximum duration for which the computer can transmit at the full 10
Mbps with a token bucket filled at 2 Mbps and initially filled to 16 Megabits, you can use the
formula: Maximum duration = Initial bucket size / Peak rate = 16Mb / 10Mbps = 1.6
milliseconds.
1.8 If a class B network on the Internet has a subnet mask of 255.255.248.0, there can be
2^11 - 2 = 2,046 hosts per subnet. The subtraction of 2 accounts for the network and
broadcast addresses.
1.9 The minimum frame size for a 10 Mbps Ethernet with a 48-bit jamming signal and a
round trip propagation delay of 46.4 ms is 512 bits (64 bytes).
1.10 In the IP address 25.193.155.233, the number of bits allocated for network ID (NID)
is 8 bits, and the number of bits allocated for host ID (HID) is 24 bits.
1.11
Interior Gateway Protocol (IGP): These are routing protocols used within a single
autonomous system (AS) and are responsible for routing within that AS. Examples include
RIP, OSPF, and EIGRP.
Exterior Gateway Protocol (EGP): These are routing protocols used to exchange routing
information between different autonomous systems. BGP (Border Gateway Protocol) is an
example of an EGP.
1.12
m1: Send an email from a mail client to a mail server - SMTP (Simple Mail Transfer
Protocol)
m2: Download an email from mailbox server to a mail client - POP3 (Post Office Protocol
version 3) or IMAP (Internet Message Access Protocol)
m3: Checking email in a web browser - HTTP (Hypertext Transfer Protocol) or HTTPS
(HTTP Secure)
1.13 A stream of packets from a source to a destination is called a "data flow" or "data
stream."
2. For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission
delay is 3.2 microseconds.
3. In the OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is the Session Layer.
4. Bit stuffing is a technique used in framing protocols to ensure data integrity. When a
frame contains the bit sequence "11010111110010111111010111101," the stuffed
bits are "011" inserted between any sequences of five consecutive "1" bits to
prevent ambiguity.
5. The total packet delay for a route with 10 routers can be calculated using the formula:
Total Delay = Propagation Delay + Transmission Delay + Processing Delay.
10. Email service is implemented using the SMTP (Simple Mail Transfer Protocol)
protocol.
11. Jitter is the variation in the delay of received packets in a network, typically caused
by differences in packet arrival times.
14. FTP uses two parallel TCP connections: one for data transfer and one for control.
15. In TELNET character mode, to copy a file named file1 to another file named file2
using the command "cp file1 file2," a few characters for the command and file names
would be exchanged between the client and server, typically less than 100
characters.
16. The set of optimal routes from all sources to a given destination forms a routing tree
rooted at the destination.
17. In the two scenarios described, you are comparing a high-speed point-to-point
connection (Case 1) with a store-and-forward network with multiple slower links
(Case 2).
Flow Control: In Case 1, flow control might not be as critical due to the high-
speed connection, but it can still be managed by the TCP protocol. In Case 2,
flow control is crucial due to the potential for congestion on slower links, and it
would be managed by the store-and-forward switches/routers.