Total no. of Pages: 2 ROM NO .seeerssessee
SIXTH SEMESTER B.Tech, CSE
ENDTERM EXAMINATION May-2024
COURSE CODE C0306
COURSE TITLE COMPUTER NETWORKS
Time: 03:00Hours Max.Marks:40
Note :Attempt any five Questions.
All questions carry equal marks.
‘Assume suitable missing data, if any.
Q.1 (a). What is the function of transmission media? Differentiate
between guided and unguided media, and explain the three principal
classifications of guided media. [4][CO 1]
(b). Explain the concept of Framing in the data link layer. Write the
difference between bit stuffing and character stuffing.If a bit string,
0111101111101111110, needs to be transmitted at the data link layer.
What is the string transmitted after bit stuffing given flag as 01111110?
{4][C 02}
Q.2 (a). Describe the role of TCP" additive increase and multiplicative
decrease algorithm in congestion control. Considering an initial slow start
phase followed by the congestion avoidance phase, how long does it take
to reach the full transmission capacity on a network with a 10-
millisecond RTT and no congestion, given a receiver window of 3200
KB and a maximum segment size of 200 KB? [4][CO 4)
(b). Explain the fundamental steps involved in performing a remote
procedure call (RPC) and the respective roles of the client and server in
this process. [4]{Co 4)
Q3 (a). Discuss the significance of firewalls in network security and the
different types of firewalls employed to protect networks from
unauthorised access and malicious activities. Describe the tole of
firewalls in filtering incoming and outgoing email traffic to prevent spam,
malware, and other threats. [4]ICO 6}
Page 1of 2(b). Explain the three phases in TCP client-server communication. In
TCP, the initial RTT is 20 ms. The ack for the first four segments are
received in times 25 ms, 18 ms, 23 ms, and 21 ms. Using the basic
algorithm, find the timeout timer value for the first five segments.
Use a=0.5. [4][CO 4}
Q.4 (a).What role does cryptography play within the presentation layer?
Describe the key selection algorithm in RSA and apply it to solve the
following scenario: Given p = 13, q = 5, and e = the RSA algorithm,
determine the value of d and the cipher value of '6' with the key (e, n).
[4][CO 5]
(b). Give a diagram and explain the IPv4 header fields in detail. If a
datagram of size 600 bytes is transmitted over a network with a
Maximum Transmission Unit (MTU) of 200 bytes, and the header length
is 20 bytes, what are the offsets of the first, second, and third fragments?
[4][CO 3]
Q.5 (a). Describe IPV4 classful IP addressing. Discuss the limitations and
the significance of subnetting. If a class B address is to be divided into
subnets with a 6-bit subnet number, determine the maximum number of
subnets and the maximum number of hosts in each subnet. [4][CO 3]
(b). Explain the difference between multicast and broadcast. Suppose
there are n stations in a slotted LAN. Each station attempts to transmit
with a probability ‘p’ in each time slot. What is the probability that only
one station transmits in a given slot? [4][CO 3]
Q. 6 (a). Explain the concept of digital signatures in cryptography. What
is the significance of digital signatures in ensuring data integrity,
authenticity, and non-repudiation in electronic transactions? _[4][CO 5]
(b). Discuss the flow control and error control collaboration in the Data
Link Layer to ensure reliable data transmission. What is the minimum
frame size needed to achieve a channel efficiency of at least 50% for a
channel operating at 4 Kbps with a one-way propagation delay of 20
milliseconds, using the stop-and-wait protocol where the ack frame
transmission time is negligible? [4][CO 2}NO Bas pis Rall Nav
i SIN TIESEMES THe
Wetwh (Sb
\ we
END SE ESTin UNAMINA TION AAD td
St Mia
| COMPUTER NET WOL
' Ma. Marky: 0
* Newer any BIVE question
“Al questions catty equal nei
Neste suitable Uitissinye
vata, tf any
Yel What re the advan
tepolory comprisi
ANT NENWOFK rebiabitig
(D} What are the
aes aint dl
MHS, anal vines
?
UiMerent transmission inpatients
Ml camtagtes a aatsliginays a bis bis
HPS We ters of Lilt tlenens
My jeor
Hypeory
SHEEN how panting cont
usi
A used To COFEEL stip is
clreck bi My
IH)\ hamming codeword consists of 8 bit date ann check hit
PLE
Cheek tut |
Explain with working how the datibis and check bits ave
arranyed ane
how they are related, What are the values tors and y?
MI co2y
3 [a] Explain the distance vector touting: alyorithny, Distance veetoy
routing is used, and the followin vectors have Just come
from B: (5, 0, 8 12, 6, 2); liom D (16, 12, 6, 0.9, 10)
6, 3.9, 0,4). The new messured delays to B,D, and E, are 6, 3, and 3,
into router C;
sand fron ne,respectively, What is C's new routing lable? Give both the outgoing
lite to use and the expected ee [4][CO3]
{b] How does Network layer resoive congestion control? — [4}{CO3]
71] How does TCP determine the timer for acknowledgment?
J4] (CO#!
{b] What is the Si
ificance of TCP and UDP protocol”
[4j/CO4
STs] What is symmetric encryption? Whar is the divterence hivece
yanspo nen and substitution cipher explain with an example
JANE sy
VW tse
[hs SA algorithm if p= 7,0 = 4 ya nen what wy
Jin RSA alge itp Vande = 13 eres
wail access
te value of
. . .AP
g (o) Define E-Mail. Explain the basics of por3 and ES ©
“protocol , COs
to resolve the HP address ot
[5] Explain what is DNS and how it ic wed {COL
a server
J Answer the following:- [4X 2 4 Marks|
[a] Differentiate reliable and unreal ple communication. \coul
1b] What is a socket and which layer yses it? {con
fe] Describe the functions of 8554 ayg application lay {coe}
(d] Ifthe bit rate = 3000 aP4 EACH Sip) Clement carries 6 bits. Find
the baud rate. \co2\Roll wongery Lee Lee
B.Tech. (MCB
May-2024
Total No of P,
‘ages 2
VISEMESTER
END TERM EXAMINATION
KS
Mc308 ¢ p NETWOR
OMPUTE! ae Marks
Ti ‘ON Hours
Note : Answer all the questions. —
Assume suitable missing dala, My
§}[|COS]L2]
QY-Esplain the Pv packet header in detail ts]1C O51
eck and checksum crror detection
2 Der c y
Q. ‘monstrate the parity che [5]|CO6)[L3]
techniques with the help of an example.
s weiphted graph to find the shortest path from
y-step—vise perforaing, Dijksiva‘'s algsitlun.
State the shortest path and the cost to traverse it. Also, illustrate the
> Q2 Analyse the fotlowi
Rode A to nc
resultant graph IS}COSILA]
oo,
x KI
% " 2 »~o,
2
NEON A
6—1— 6
Q4 Determine various congestion control techniques in a datagram
subnet. {S1(CO3}|1.3]
QSta] Compare and differentiate between TCP and UDP,
[21[CO3}[L5}
[bL Determine how the transport layer ensures that the complete
‘message arrives at the destination and in the proper order,
[3}1CO3}{L3}follow)
Q.6 Answer any One ot
[a] Explain various control fags in the TCP segment header,
[SJCO3]L2]
{b] Eaplain various design issues in the Session layer.
[5yCO2I1.3
Q.7 An ISP is granted a block af 65,536 addresses starting with
190.10,0.0/16. The ISP needs to distribute these addresses to three
£roups of customers as follows: .
4) The first group has 64 customers; cach needs 256 addresses
b)The second yroup has 128 customers; each needs 128
addresses .
©) The third group has 12% customers; each needs 64 addresses
Generate the subblocks and find out how many addresses are still
available alter these allocations. [5]|COS]|1.6]
Q.8 AS] Apply the LZ encoding technique step by step to compress the
character sequence “AAARBICCCARCBA", (S][CO4]|L3)
Determine the binary encoding of the messaze “HEADACHE”
after performing Huftinan coding, for the following characters with
the corresponding Trequencjog: (5}[CO4|[ 1.3]
character fa | edu |
cle ; |
jCracter {A ly |e |p EOF \s n |
, Pa |
[Prequeney }75 | 14 tao j30_/ 146/33 jax [ar |
Qg-Ranwer any One oF the foi) owing:
i] Ilustrate and explain the working of the Domain Name System.
. {5}[CO1]|LA}
[b] Discuss the message transfor protocols in the Application layer.
[S][CO3}{L2]Total no. of Pages: 2. : . Roll no...
BTech SEMESTER
END TERM EXAMINATION May-2023
COURSE CODE (C0306) COURSE TITLE COMPUTER NETWORKS
Time: 03:00 Hours Max. Marks: 40
Note : Attempt any five questions
All questions carry equal marks.
Assume suitable missing data, if any.
E axSuppose a data link layer uses CRC (Cyclic Redundancy Check) to,
z detect errors in transmitted data. If the data word is 101001 and the
generator polynomial is x*3 + x+ 1, what is the remainder obtained
after performing CRC and Code word received at the receiver side? [3]
[co2} :
sisi come transmits 10 packets to a receiver using the Stop-and-Wait
protocol. The propagation delay is 100 ms and the transmission time for
ench packet is 10 ms. If the acknowledgement delay is negligible, what
is the time taken to transmit all the packets, Explain steps? _[3][CO3]
: raw UDP header and explain cach field. [2][C02]
WN Selective Repeat protocol, the sender's window size is 4 and the
receiver's window size is also 4, The sequence numbers range from 0 to
‘7, The sender sends packets 0, 1, 2,3 and they dre all acknowledged. The .
sender then sends packets 4, 5, 6, 7, but packet 6 is lost. The sender then
sends packet 6 again. What is the minimum number of packets that need
to be retransmitted and why? [2][CO3)
‘Explain congestion contro] algorithms with the help of a diagram.
[3][C03} .
A CSMA/CD network has a data tate of 100 Mbps and a propagation
delay of 5 ps. The: minimum frame size is Al2 bytes. What is the minimum
"packet fransmnission time? . ~ os 8 [3][CO2]
Q3. 8) Suppose there are 5 stations in a CSMA p-persistent network. The
channel is idle with a probability 0.2 and each station has a probability
‘of.0.5 of transmitting in a given time slot. If station 1 is ready totransmit, what is the probability that it will successfully transmit on the
first attempt? {4][CO2]
b) i) Given the IP address 10.0.0.0/8, how many subnets and hosts per
subnet can be created? - [21{C03]
ii t is the network address and broadcast address for the IP address
10.20.30.40/26? 2](C03)
iswer IPv4 header questions [2][C03]
i, What is the size of the IPv4 header in bytes?
ii, How many bits are used to represent the [Pv4 address?
iii, What is the maximum size of an IPv4 datagram?
iv. What is the value of the TTL (Time To Live) field in the IPv4
* header for a packet that has to traverse 15 routers?
pie a short note ( Any two) [4][C05]{CO6)
ii) Remote Procedure Call (RPC)
iii) Domain Name System (DNS)
iv) _ Simple Mait Transfer Protocol (SMTP)
wey What is a digital signature, explain with the help of diagram and
mention applications of digital signature. [2]IC06)
QS. a) In TCP, the initial RTT is 20 ms. The acknowledgements for the first
four segments arc reccived in time 25 ms, 18 ms, 23 ms, and 21 ms,
‘Using the basic algorithm, find the timeout timer value for the first five
segments. Use a= 0.5. (3][CO6]
b)If.a datagram of size 5000 bytes is transmitted over a network with an
MTU of 1200 bytes, and the header length is 20 Bytes. What is the
offset of the first, second and third fragments? (3}[C04)
Suppose Alice and Bob want to establish a shared secret key using
"aR ie-Hellman key exchange. They agree to use a prime modulus p =
13 and a base g=3. Alice chooses a secret integer a= 4 and sends g*a
mod p to Bob. Bob chooses a secret integer b = 3 and sends gb mod p.”
to Alice. What is the shared secret key that Alice and Bob can use to
ptand deceypt their messages? [2}[C04]
& cast is the difference between guided and unguided transmission
medig? Give an example of each. [2][C01}
fins TCP is slower but more reliable than UDP Protocol in Transport
Layer, Explain. : [2}[CO4)
c) What is count to infinity in distance vector routing? How does split
horizon prevents routing loops in distance vector routing, Explain.
[4][C03)Total no, of Pages: 02 Roll no...
End Semester Examination JAN-202) ODD-2020
Fifth Semester B.Tech.(SE)
Paper Code: SE-305 Computer Network
(Old scheme)
Duration: 3 Hrs. Max Marks: 70
NOTE: Attempt all the questions. Assuine the missing data, if any.
QI. Answer thé following questions in brief: (7°2=14)
a) What are two reasons for using layered protocols?
b) Which control bit is involved in setting up a TCP session?
c) List out the advantages and drawbacks of bus topology.
4) Why do you require a limit on the minimum size of Ethernet
frame?
) What is count to infinity problem?
f) How can a device have more than one IP address?
4) Is there any drawback of using pigeybacking?
Q2. a) Differentiate between ISO-OSI and TCP/IP reference
model,
(10)
b) List the advantages of fiber-optics over copper as a transmission
medium.
(4)
Q3. a) Explain the working of 3 bit sliding window protocol with
suitable example, q)
b) Differentiate between Link state and Distance Vector Routing
algorithm a
Q4. a) Explain the following ARQ techniques in detail: (285)
Gi) Stop and wait ARQ
(ii) Selective repeat ARQ
b) What are the benefits of remote access VPNs? @
P.T.O.
Q5. Explain the following terms (any two) (72-14)
a) DNS
b) SSL
©) Aloha
4) Congestion control
ENDROU NO! crcceccercecee
B.Tech. [ SE]
Nov-2019
Total No. of Pages 02
VII SEMESTER
END SEMESTER EXAMINATION
Paper Code: SE407 Title of Paper: Computer Networks
Time: 3:00 Hours Max. Marks : 40
Note : Answer any FIVE questions. All Questions Carry equal marks
Assume suitable missing data, if any.
Ql
a) What are the various layers of OSI model? Compare and contrast
OSI model with TCP/IP model
b) What are the differences between guided and unguided media.
Discuss various types of guided and unguided media.
Q2
a) Explain the dynamic channel allocation model in details. And also
explain pure and slotted aloha.
a) What are the functions of Data link layer? A channel has a bit rate
of 4kbps and a propagation delay of 20 msec. For what range of
frame sizes does stop-and-wait give an efficiency of at least 50
percent?
Q3
a) Define Channel capacity in detail. Find the channel capacity for a
3 KHz bandwidth channel and SNR of 3 db.
b) Discuss various frame format techniques in Data Link Layer.
P.T.O.4 .
8 fe ses of IPv4 in terms of netid and hostid. What
a) Compare different cl
are the advant and disadvantages of classfull addresses?
b) Discuss Link State Routing Algorithm in detail.
Explain in detail TCP header format. ,
b) Explain distance vector algorithm with suitable example
Q6
a) What is cryptography? Discuss various methods of cryptography.
Explain substitution & transposition encryption with suitable
example and also discuss the working of Data Encryption Standards
(DES).
b) Explain working of RSA algorithm for encryption and decryption
and also find cipher text corresponding to plain text M=3, also
generate Public key and Secret key using RSA algorithm by taking
two prime numbers p=11 and q=23.
Q.7 Write short notes on the following
a) Scalar Factor in TCP.
b) Digital Signature
c) Piggy back and Silly Window Syndrom.
d) ARP and RARP
End—Goo -
Total No. of Pages 2,
FIFTH SEMESTER B.TECH. [11]
END SEMESTER EXAMINATION: -~ (NOV- 2019)
1T303 COMPUTER NETWORKS
Max. Mi
‘Answer any FIVE questions.
Assume suitable at
any
Q1fa] Explain with the help of suitable diagram(s) the terms layer, protocol,
service and interface in the OSI model of a computer network. What
functions do the upper 4 layers perform?
[b] Compare peer-to-peer architecture with the client-server architecture
‘of computer networks. (642-8)
Q2[a] Define the terms static, adaptive and hierarchical routing. Explain
Distance Vector Routing with a small example network ?
[6] The internet uses OSPF routing protocol which is based on link state
routing? Suggest possible reasons to support such preference,
(6+2=8)
Q3[a] Draw and explain the TCP header format.-What are:socket, port and
pseudo header and why are they required?
[b] Given two applications an IP phone call and a file transfer, compare
the Quality of services characteristic and the protocol required at the
transport layer. (612-8)
Q.4{a] How is the concept of dynamic window size at transport layer flow
control linked to congestion control? Explain congestion control in
TCP terms of slow start, congestion avoidance and congestion
detection.
{[b] Explain the 3-way handshake in TCP, considering all stenarios.
(642-8)
Q.5 [a] What is the Network ID, subnet mask , broadcast address, First
Usable IP and Last Usable IP on the subnet that a node
182.175.1.15/27 belongs to? If the given block was to be divided
among 4 and 8 subnets determine the First Usable IP of each subnets in
both scenari
{b] How is IPv6 an improvement over IPv4? (612-8)
66 [a] Explain (with diagram) the IPv6 protocol header in detail
{bj Given the following network addresses, find the class,
and the range of the addresses.
i 182.25.15.12
ii, 220:34.76.0 (4r4=8)
the block,
Q7 Write Short notes on:
[a] Controlled Access MAC Protocols
[b] Domain Name Service (4+4=8)
seeeENDS OORoll No:
Total No. of Pages 02
B.Tech. {col
VI SEMESTER
SUPPLIMENTARY EXAMINATION May- 2019
Title of Paper: Computer Networks
Max. Marks : 40
Paper Code: CO-306
Time: 3:00 Hours
Note ; Answer any FIVE questions. All Questions Carry equal marks
Assume suitable missing data, if any.
Ql :
A) What are the various layers of OSI model? Compare and contrast
OSI model with TCP/IP model
B) Explain connection. establishment -and release using 3-way
handshaking in transport layer
Q2
A) What are the functions of Data link layer? A channel has a bit rate
of 4kbps and a propagation delay of 20 msec. For what range of
frame sizes does stop-and-wait give an efficiency of at least 50
. percent?
B) Explain the Bus, Star, Ring, Hybrid and Tree network topologies
giving their advantages and disadvantages.
Q3
(A) Explain pure and slotted aloha in detail.
(B) What is Ethernet 802.3 standard? Discuss in detail the frame
format and the channel access method used.
Q4
(A) Compare different classes of IPv4 in terms of netid and hostid.
What are the advantages and disadvantages of classfull addresses?
(B) What are the different types of error detection methods? Write the
steps to compute the Checksum in CRC code. if the frame is 110101011
es generator is x4 + x+1 what would be the transmitted frame?
A) Explain in detail TCP header format.
B) Explain distance vector algorithm with suitable example .Q6
i i i f cryptography.
A) What is cryptography? Discuss various methods of cr, a
Explain substitution &transposition encryption with suitable
example and also discuss the working of Data Encryption
Standards (DES).Explain distance vector algorithm with suitable
example
B) Explain working of RSA algorithm for encryption and decryption
and also find cipher text corresponding to plain text M=9, also
generate Public key and Secret key using RSA algorithm by
taking two prime numbers p=11 and q=23.
Q.7 Write short notes on the following
a) Piggy back and Sliding Window-Syndrom.
b) IPv6 address structure ss
c) DNS ;
4) Digital signature using public-key cryptographyTotal No. of Pages 02 Roll No:
‘MISEMESTER BTech.(¢O)
SUPPLIMENTARY EXAMINATION Sept-2019
Paper Code: CO-306 Title of paper: Computer Networks.
Time: 3:00 Hours Max. Marks : 40
Note : Answer any FIVE Question. All question carry, equal marks
Assume suitablé:missing data; if any.
Qi
[a] What is OSI reference model? Explain responsibilities of various layers of OSI
model. And also Compare and contrast OSI model with TCP/IP model.
{b] What are different data encoding techniques? Explain and Encode data
stream 00110101 by using Manchester, Differential Manchester and NRZ-L
encoding methods.
Q2
[a] Explain in detail TCP header format.
[b] Explain the working of Sliding Window Protocol with suitable example.
Explain how ARQ can be used for error correction? How does Go back N ARQ
differ from selective repeat ARQ.
Q3
{a} Compare Link State and Distance vector routing algorithms and with the
indicated link cost, use Dijksta's shortest path algorithm to compare the shortest
path from x to all nodes,
[b] What are the major differences between IPv4 and IPv6? Discuss header
format and Network addressing with reference to IPv6.
Q4
[a] What is cryptography? Discuss various methods of cryptography with
example and also explain the working of Data Encryption Standards (DES).[b] Explain working of RSA algorithm for encryption and decryption and also
find cipher text corresponding to plain text _M=9, also generate Public key
and Secret key using RSA algorithm by taking two prime numbers p=11 and
q=23.
Qs
[a] How do guided media differ from unguided media? Explain with suitable
examples.
[b] The data link-layer in IEBE standard is divided into sub layers LLC and MAC.
Justify statement with example.
Q6.
[a] What is channel capacity? Find the Channel Capacity for a 3khz: bandwidth and
SNR of 3db,
[b] What is count to infinity problem? How it can be solved. What are its limitations?
Q.7 Write short notes on the following:
[a] Digital Signature. -
[b] Slotted ALOHA.
[qd DNS
[4] Three way hand shaking of connection establishment.‘Roll No...
“Total No: of Pages 01~
SEVEN SEMESTER Bech.
SUPPLEMENTRY EXAMINATION FEB-2019
SE407 COMPUTER NETWORK
Time: 3:00 Hours Max. Marks: 40
Note: Answer ANY FIVE questions. All questions carry equal marks.
Assume suitable missing data, if any.
1. [a] Describe Hamming code in detail.
__{b] The data string is 10011001000010011 101. What remainder should be append to message
“if the ‘cyclic code polyfontifal used i832 +1> ~~ ~
2. [a] Explain sliding window protocol and when it gives 100% efficiency and what is efficiency
of stop and wait protocol.
[b] What do you mean by Manchester encoding for signaling standard?
3. [a] A selective repeat ARQ is using 7 bits to represent the sequence number . What is the
maximum size of the sliding window ?
[b] Explain how TCP perform congestion control based on three phases namely slow start
congestion avoidance and congestion detection.
ta] Draw and explain header format of Ethernet IEEE 802- $$
[b] Difference between IPv4 and IPv6 and how IPVé provide connection oriented services.
5, [a] Explain Subnetting in IP address explain with example.
[b] The following is a dump of UDP header in hexadecimal format.
CB84000D001C001C
a) what is source port number. (in hexadecimal)
) what is destination port number (in decimal)
) what is total length of the user datagram.(in Bytes)