Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Draw and explain TCP/IP protocol suite in detail.

A system has five-layer protocol hierarchy. Applications generate messages of length 10


bytes. At each of the layers, 5-byte header is added. What fraction of the network band-
width is filled with headers.

Demonstrate the concept of piggybacking and error handling while using HDLC frame.
Suppose the following sequence of bits arrives at the receiver over a link:
1101011111010111110010111110110
Show the resulting frame after stuffed bits, if any, have been removed.
Indicate any errors that might have been introduced into the frame. Defend your answer.

Describe the frame format for Point-to-Point protocol(𝑃𝑃𝑃)

Network layer provides services to transport layer. In this case what are the goals that should
be considered while designing ?

With a neat flow diagram, explain the process of data transmission in CSMA/CA.

Match the following functions to one or more layers of the TCP/IP protocol suite.
i. transforming bits to electromagnetic signals
ii. route determination
iii. end to end error detection and correction
iv. providing services for the end user
v. handling flow control

Observe the figure above and identify the protocol whose working is represented in this
diagram. Also explain the communication scenario of the diagram.

Differentiate between Circuit-Switched and Packet Switched Network?

Implement bit/byte stating for following bit streams:


i. 00011111 11001111 10100011 11111111 10000111
ii. Unstuff the following frame payload in which E is the escape byte, F is the flag byte, and
D is a data byte other than an escape or a flag character.
EEDE FDDE FEED DD

Design Routing tables for nodes 1,2,3,4,5 for performing routing in the given datagram
network across Host H1 and Host H2

Differentiate between connection oriented service and connectionless service used to


implement network layer.

Consider the following two cases :


(i)a VC service implementation using 3-byte header and 8 bytes of storage for VCid
(ii) a datagram implementation service using 15-byte header
The average duration of a session is 1000 seconds during which 200 packets are transmitted.
The average no. of hops is 4.
Assume :
(i) cost of transmission capacity is 0.5 paisa per 106 bytes per hop
(ii) cost of router memory is 0.5 paisa per byte and depreciates in 2 years @ 40 hours per
week
Compute and compare the cost of overheads in the above two implementations (VC and
datagram) for the given set of parameters

Discuss different method used to implement Broadcast routing

Using Distance Victor Routing, design routing tables for following Subnet

Differentiate between datagram and virtual circuit subnet.

Consider a network with 6 routers 𝑅1 to 𝑅6 connected with links having weights as show in
the following diagram. All the routers use the distance vector based routing algorithm to
update their routing tables. Each router starts with its routing table in initialized to contain an
entry for each neighbour with the weight of the respective connecting link. After all the
routing tables stabilize, how many links in the networks will never be used for carrying any
data?

Compare Link State Routing and Distance vector Routing algorithms.

Demonstrate the working principle of Link State routing with suitable example.

For hierarchical routing with 4800 routers, What region and cluster sizes should be chosen to
minimize the size of the routing table for a three-layer hierarchy?

Discuss the different ways used to implement Broadcast Routing.


Differentiate between Routing Forwarding.

Consider the following network and apply the Dijkstra Algorithm by considering A as the
Source and Z as the destination.

Illustrate Count to Infinity Problem by considering a small network List and explain solution
for the same.

Discuss the factors causing the Congestion in the Networks.

Summaries how Congestion Control is different form the Flow Control.

Write the difference between the chocking and Hop-by-Hop Backpressure Hop-by-Hop
flocking.

Consider any network and discuss how Random Early Detection handles the congestion.
Let n is the counter with the value 1000 and the leaky bucket has the following packets in it
(Refer below Figure) Demonstrate how leaky bucket regulate the traffic using appropriate
figures. 200 700 500 450 400 200

Consider the following multiact network and discuss Recourse Reservation Protocol.

Distinguish Integrated Services and Differentiated Services.

Explain working principle of Differentiated service and Integrated service.

How congestion control is implemented in Datagram networks?

Describe the techniques for achieving Good Quality of Service.

Explain the concept of Load Shedding and Jitter with suitable examples.
Distinguish between integrated and differentiated services. Describe the scheme of assured
forwarding with relevant diagram.
A computer on a 6 − 𝑀𝑏𝑝𝑠 network is regulated by a token bucket. The token bucket is filled
at a rate of 1 𝑀𝑏𝑝𝑠. It is initially filled to capacity with 8 megabits. How long can the
computer transmit at the full 6 𝑀𝑏𝑝𝑠?

Discuss the different ways to implement Traffic Throttling.

Describe the internetworking happens with tunneling. Mention its advantages and
disadvantages.

Suppose a 𝑇𝐶𝑃 message containing 2048 bytes of data +20 bytes 𝑇𝐶𝑃𝐻 is passed to 𝐼𝑃 for
delivery across two networks in 𝑁1 & 𝑛2 𝑁1: 14-Bytes Header; 𝑀𝑇𝑈 1024 bytes 𝑁2: 8-
Bytes Header; 𝑀𝑇𝑈 512 bytes. Give the sizes and offsets of the sequence of fragments
delivered to the network layer at the destination host.

Suppose that host A is connected to a router R1, R1 is connected to another router, R2, and
R2 is connected to host B. Suppose that a TCP message that contains 900 bytes of data and
20 bytes of TCP header is passed to the IP code at host A for delivery to B. Show the Total
length, Identification, DF, MF, and Fragment offset fields of the IP header in each packet
transmitted over the three links. Assume that link A-R1 can support a maximum frame size of
1024 bytes including a 14-byte frame header, link R1-R2 can support a maximum frame size
of 512 bytes, including an 8-byte frame header, and link R2-B can support a maximum frame
size of 512 bytes including a 12byte frame header.

What is Tunneling? Briefly explain how Tunneling is used to implement internetworking?

A large no. of consecutive IP addresses are available starting at 198.16.0.0 Organizations A, B


request for the following no. of addresses (in that order) A 4000 B 2000
For each of A, B give :
(a) IP address range
(b) mask

Write in detail how Exterior Gateway Routing Protocol are used to implement
Internetworking.

Consider an application with a server and a number of remote clients. Discuss the different
socket primitives for a simple transport service to implement the above application.

Explain in detail the working principle of 𝑅𝑇𝑃 and 𝑅𝑇𝐶𝑃 protocols.

Compare and contrast Inter-domain Routing and Intra-domain Routing .

Explain the concept of tunneling.


Outline the different types of fragmentation.

Describe the different types of ICMP messages.

How do IP addresses get mapped onto data link layer addresses, such as Ethernet?
With a neat sketch explain the protocol used for this purpose.

With a neat diagram explain the protocol used to determine the best paths for routing data
packets between routers within an Autonomous System.

Differentiate between UDP and TCP.

Write a note on TCP Service Model.

The following is a partial dump of a TCP header in hexadecimal format :


05320017 00000001 00000000 500207FF 00000000
(i) What is the source port number?
(ii) What is the application being used?
(iii) What is the sequence number?
(iv) What is the ack number?

With a neat diagram, explain the RTP header in detail.

With the help of a neat diagram, explain the fields of TCP header.

Explain the process of TCP connection establishment and TCP connection Release

Draw and explain in detail the architecture of Electronic mail service? What
are the protocols used to implement the different component of Electronic
mail service.

1.1 The data link layer is subdivided into two protocol sublayers: Logical Link Control
(LLC) and Media Access Control (MAC).
(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer

1.3 In the IPv4 addressing format, the number of networks allowed under class C addresses is
2^21, which is 2,097,152.

1.4 Flooding is a network communication technique where data is sent to all devices on a
network, regardless of whether they are the intended recipients. It is often used in
broadcasting or multicast scenarios.

1.5 The probability that ONLY one station transmits in a given time slot in a slotted LAN
with n stations, where each station attempts to transmit with a probability p, can be calculated
as n * p * (1-p)^(n-1).

1.6 In distance-vector routing algorithms, each router maintains a table (vector) indexed by
and containing one entry for each router in the subnet.

1.7 To calculate the maximum duration for which the computer can transmit at the full 10
Mbps with a token bucket filled at 2 Mbps and initially filled to 16 Megabits, you can use the
formula: Maximum duration = Initial bucket size / Peak rate = 16Mb / 10Mbps = 1.6
milliseconds.

1.8 If a class B network on the Internet has a subnet mask of 255.255.248.0, there can be
2^11 - 2 = 2,046 hosts per subnet. The subtraction of 2 accounts for the network and
broadcast addresses.

1.9 The minimum frame size for a 10 Mbps Ethernet with a 48-bit jamming signal and a
round trip propagation delay of 46.4 ms is 512 bits (64 bytes).

1.10 In the IP address 25.193.155.233, the number of bits allocated for network ID (NID)
is 8 bits, and the number of bits allocated for host ID (HID) is 24 bits.

1.11
Interior Gateway Protocol (IGP): These are routing protocols used within a single
autonomous system (AS) and are responsible for routing within that AS. Examples include
RIP, OSPF, and EIGRP.
Exterior Gateway Protocol (EGP): These are routing protocols used to exchange routing
information between different autonomous systems. BGP (Border Gateway Protocol) is an
example of an EGP.

1.12
m1: Send an email from a mail client to a mail server - SMTP (Simple Mail Transfer
Protocol)
m2: Download an email from mailbox server to a mail client - POP3 (Post Office Protocol
version 3) or IMAP (Internet Message Access Protocol)
m3: Checking email in a web browser - HTTP (Hypertext Transfer Protocol) or HTTPS
(HTTP Secure)

1.13 A stream of packets from a source to a destination is called a "data flow" or "data
stream."

1. The functionalities of the presentation layer include data translation, encryption,


and compression.

2. For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission
delay is 3.2 microseconds.

3. In the OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is the Session Layer.

4. Bit stuffing is a technique used in framing protocols to ensure data integrity. When a
frame contains the bit sequence "11010111110010111111010111101," the stuffed
bits are "011" inserted between any sequences of five consecutive "1" bits to
prevent ambiguity.

5. The total packet delay for a route with 10 routers can be calculated using the formula:
Total Delay = Propagation Delay + Transmission Delay + Processing Delay.

6. An endpoint of an inter-process communication flow across a computer network is


called a socket.

7. In a distance-vector routing algorithm, each router exchanges routing information


with its neighbors.

8. A 4-byte IP address consists of a network portion and a host portion.

9. A general class of routing algorithms known as Adaptive Routing algorithms


change their routing decisions based on changes in network topology and network
traffic.

10. Email service is implemented using the SMTP (Simple Mail Transfer Protocol)
protocol.

11. Jitter is the variation in the delay of received packets in a network, typically caused
by differences in packet arrival times.

12. The entire hostname has a maximum of 255 characters.


13. For hierarchical routing with 4800 routers, the region and cluster sizes should be
chosen based on network requirements, but typically, a good practice is to have
regions with around 100 routers and clusters with around 12 routers in a 3-layer
hierarchy.

14. FTP uses two parallel TCP connections: one for data transfer and one for control.

15. In TELNET character mode, to copy a file named file1 to another file named file2
using the command "cp file1 file2," a few characters for the command and file names
would be exchanged between the client and server, typically less than 100
characters.

16. The set of optimal routes from all sources to a given destination forms a routing tree
rooted at the destination.

17. In the two scenarios described, you are comparing a high-speed point-to-point
connection (Case 1) with a store-and-forward network with multiple slower links
(Case 2).

Flow Control: In Case 1, flow control might not be as critical due to the high-
speed connection, but it can still be managed by the TCP protocol. In Case 2,
flow control is crucial due to the potential for congestion on slower links, and it
would be managed by the store-and-forward switches/routers.

Congestion Control: In Case 1, congestion is less likely due to the high


bandwidth, but it can still occur, and TCP's congestion control mechanisms
would handle it. In Case 2, congestion is more likely due to the shared lower
bandwidth, and congestion control mechanisms like TCP's congestion window
would be actively managing congestion.

You might also like