Sunteți pe pagina 1din 33

W

FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Ref No: 325624
Time: 120 min
Marks: 70
Student Info
Student ID:

WWW.vujannat.ning.COM
Center:

Exam Date:

For Teacher's Use Only


Q No. 1 2 3 4 5 6 7 8 Total

Marks
M
Q No. 9 10 11 12 13 14 15O 16

Marks
g .C
Q No. 17 18 19 20 21
i
22
n 23 24

Marks
.t n
Q No.

Marks
25 26 27 28

n na29 30 31

j a
v u
.
W
W
W

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 1 ( Marks: 1 ) - Please choose one

The number of connections needed for N computer in direct point to point communication is
equal to:

► (N2 –N)/2

WWW.vujannat.ning.COM
► N(N- 1)

► N2

► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one M


O
g .C
When an application--------------- data, it makes a copy of the data available to all other
computers on the network.

i n
► Broadcasting
.t n
► Multicasting
n a
► Unicasting
an
► None of the given
u j
. v
W
Question No: 3
W ( Marks: 1 ) - Please choose one

W
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique
address by the manufacturer.

► 64

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
► 48

► 32

►8

Question No: 4 ( Marks: 1 ) - Please choose one

WWW.vujannat.ning.COM
A system with redundant bridges might have a problem with_______ in the system.

► Loop

► Filters

► Spanning Trees
M
► All given choices
O
g .C
Question No: 5 ( Marks: 1 ) - Please choose one
i n
.t n
network.
n a
The product of delay and throughput measures the _____ of data that can be present on the

an
► Area
u j
► Volume
. v
► Length
W
W
► None of the given

W
Question No: 6 ( Marks: 1 ) - Please choose one

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary
interaction and operating system independent are the characteristics of _____________

► TCP

► UDP

► IP

WWW.vujannat.ning.COM
► None of the given

Question No: 7 ( Marks: 1 ) - Please choose one

M
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication,
Stream interface, Reliable connection startup and Graceful connection shutdown are the services
provided by__________
O
► None of the given
g .C
► TCP
i n
► UDP
.t n
► IP
n a
an
Question No: 8
u j
( Marks: 1 ) - Please choose one

. v
W
The process of using a routing table to select a next hop for a given datagram is called_________

W
► Encapsulation

W
► Reassembling

► Routing or forwarding

► None of the given

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 9 ( Marks: 1 ) - Please choose one

____________ uses distance vector approach to define routing

WWW.vujannat.ning.COM
► BGP

► OSPF

► RIP

► None of the given

M
Question No: 10 ( Marks: 1 ) - Please choose one
O
g .C
A multicast routing scheme in which the protocol software builds a delivery tree from a central
point is called__________
i n
.t n
a
► Distance Vector Multicast Routing Protocol (DVMRP)

n
► Core Based Trees (CBT)

an
j
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
u
. v
► Protocol Independent Multicast _ Dense Mode (PIM-DM)

W
Question No: 11 W ( Marks: 1 ) - Please choose one

W
One repeater _______, two repeaters ________ the maximum cable length limitation.

► doubles, cancel

► doubles, triple

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
► square roots, cude roots

► and, triple

Question No: 12 ( Marks: 1 ) - Please choose one

WWW.vujannat.ning.COM
Whenever it handles a packet, IP software needs to separate the destination address into a
_________ and ___________.

► postfix, Infix

► non of these

► Infix, prefix

► prefix, suffix M
O
g .C
Question No: 13 ( Marks: 1 ) - Please choose one

i n
.t n
Although message exchange can be used to bind addresses, sending a request for each binding is
hopelessly inefficient.

n a
► True

an
► False
u j
. v
Question No: 14
W
( Marks: 1 ) - Please choose one

W
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

► 32, 48 W
► 24, 32

► 32, 64

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
► 32, 128

Question No: 15 ( Marks: 1 ) - Please choose one

End-to-end delivery service is connection oriented.

WWW.vujannat.ning.COM
► True

► False

Question No: 16 ( Marks: 1 ) - Please choose one

A single networking technology is best for all needs.


M
► True
O
► False
g .C
i n
Question No: 17 ( Marks: 1 ) - Please choose one
.t n
n a
an
In the 1970s large organizations began to acquire multiple networks. Each network in the
organization formed island. Employees needed to choose a computer appropriate for each task.
j
So they needed multiple screens, keyboards and computers.
u
► False . v
► True W
W
Question No: 18W ( Marks: 1 ) - Please choose one

Which method of Address Resolution Protocol is useful with any hardware?


Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
►T

►C

►D

► C, D

WWW.vujannat.ning.COM
Question No: 19 ( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address is determined by hardware
address?

M
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
O
►T

g .C
►D

i n
►C
.t n
► T, C

n a
an
Question No: 20 j
( Marks: 1 ) - Please choose one
u
. v
We use the term _______ to refer to a measure of the path that routing software use
when choosing a route.
W
W
► routing path

W
► routing metric

► routing

► switching

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 21 ( Marks: 2 )

Is there a comparision between TCP/IP reference model and ISO reference model.

Question No: 22 ( Marks: 2 )

WWW.vujannat.ning.COM
Does OSPF only share information within an area or does it allow communication
between areas?

Question No: 23 ( Marks: 2 )

What are the implimentations of Network Address Translation?


M
O
Question No: 24 ( Marks: 3 )

g .C
Describe the difference between static and dynamic routing?
i n
.t n
Question No: 25 ( Marks: 3 )

n a
an
What is the first address in the block if one of the addresses is 140.120.84.24/20?

u j
Question No: 26
.
( Marks: 3 )
v
W
Write three new features of IPV6.

W
Question No: 27
W ( Marks: 5 )

What is the difference between an interior gateway protocol and an exterior gateway protocol?
Name an example of each.

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 28 ( Marks: 5 )

As the Internet grew, the original Classful addressing scheme became a limitation, what is was
the designed solution.

Question No: 29 ( Marks: 5 )

WWW.vujannat.ning.COM
What are IPv6 ADDRESS NOTATION?

Question No: 30 ( Marks: 10 )

LIST SOME CHARACTERISTICS OF A CLIENT.

Question No: 31 ( Marks: 10 ) M


O
With help of the diagram below, explain TCP Segment Format:
g .C
i n
.t n
n a
an
u j
. v
W
W
W

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
www.vujannat.ning.com

CS610 Computer Networks


Final Term Examination – Spring 2005
Time Allowed: 150 Minutes

Please read the following instructions carefully before attempting any


question:
1. This examination is closed book, closed notes, closed neighbors.
2. Answer all questions.
a. There is no choice.
b. You will have to answer correctly all questions in this
examination to get the maximum possible marks.
3. Do not ask any questions about the contents of this examination
from anyone.
a. If you think that there is something wrong with any of the
questions, attempt it to the best of your understanding.
b. If you believe that some essential piece of information is
missing, make an appropriate assumption and use it to solve
the problem.

**WARNING: Please note that Virtual University takes serious note


of unfair means. Anyone found involved in cheating will get an `F`
grade in this course.

Total Marks: 75 Total Questions: 06

Question No. 1 Marks : 10

Given the following technologies, determine which characteristics apply by placing


an 'X' in the appropriate place.
Question No. 2 Marks : 10

Fill in the blanks.


1. TCP/IP protocols use the name ____________ to refer to an internet packet.
2. The process of using a routing table to select a next hop for a given datagram is called
__________.
3. The translation from a computer's protocol address to the equivalent hardware address is
known as ____________.
4. The ________ field in frame header specifies that the frame contains an ARP message.
5. The basic hardware component used to connect heterogeneous networks is known as
________.
6. TCP/IP protocol is organized into _______ conceptual layers.
7. The Suffix part of a Class 'B' network contains _______ octets.
8. 224.49.53.9 is a class _________ address.
9. If congestion in a network persists, the entire network can become unusable. This condition is
known as ____________.
10. __________ is a measure of the rate at which data can be sent through the network.

Question No. 3 Marks : 25

Answer the following questions briefly?

a) Briefly define the two main points of the "Locality of Reference


Principle"?
b) Briefly define the function of a Network Analyzer with an elaboration of
the term "Promiscuous Mode"?
c) What is the difference between a Bridge and a Repeater?
d) Name the three Address Resolution Techniques?
e) Differentiate between Static and Dynamic Routing?

Question No. 4 Marks : 10


Convert the following 32-Bit Binary addresses into their equivalent Dotted Decimal
Notation?

Question No. 5 Marks : 10

Draw the OSPF Graph for the following network?

Question No. 6 Marks : 10

Given the IP address and subnet mask 192.168.10.0 and 255.255.255.224


a) What is the maximum number of subnets in the network?
b) What is the number of hosts?
c) What are the valid subnets?
WWW.vujannat.ning.COM
Connecting VU Students

CS610-COMPUTER NETWORKS
FINAL SPRING 2007
(1):Given the IP address 18.250.31.14 and subnet mask 255.240.0.0, what is the
subnet address?

• 18.9.0.14
• 18.240.0.0
• 18.31.0.14
• 18.0.0.14

Answer the following questions:


a. Why would an internet need an Autonomous System? [3]
b. What is the difference between an interior gateway protocol and an exterior gateway
protocol? Name an example of each [4]
c. What is the difference between unicast routing and multicast routing? [3]

Answer the following questions:


i. What is meant by Virtual Private Networks and how guarantee absolute privacy
of packets in it? [3]

ii. What information are obtained from network sniffer and in which mode Network
sniffer operates? [3]

iii. How does a bridge know on which segment a destination computer is attached?[2]

iv. What is the difference between private network and public network? [2]

Suppose an ISP has class B address i.e. 130.8.0.0/16. If the ISP has three customers
with only six computers each then determine the following parameters:
a. Network prefixes assigned to three customers?[3]
b. Address Mask for each Network prefix?[3]
c. Lowest Host Address and Highest Host Address of one customer?[4]

In IP datagram header format, what is the value of the data field given H.LEN value
of 12 and TOTAL LENGTH value of 40,000?
• 39,952
• 10,048
• 40,012
• 39,988

Which of the following is an exterior routing protocol?

• RIP and OSPF


• BGP
• OSPF
• RIP

Given are the five networks connected to each other via routers.

Networks1 is connected to Network 2 through R1-2, Network 2 is connected to the


Network3 through R2-3 and so on. W represents the weights between network nodes.
Host A belongs to Network 1 whereas Host B belongs to Network 5

The MTU size of each network is as follows

Network MTU size


No.
1 256 bits
2 16 bits
3 32 bits
4 16 bits
5 8 bits
Host A sends a datagram of size 256 bits to Host B.
a. Find out which path will the datagram be adopting in reaching to the destination B
by Distance Vector Routing algorithm. [4]
b. Which of the routers in the path needs to fragment the datagram? [4]
c. The original datagram is finally split into how many datagrams to reach at the
destination? [4]

An ARP reply is ------- to ----

• Unicast: one host


• Unicast: all hosts
• Multicast: one host
• Broadcast: all hosts
WWW.vujannat.ning.COM
Connecting VU Students

CS610-Computer Networks
MID FALL 2007
a. Explain how the CSMA/CD protocol answers the following questions: (Marks:
08)
i. When should the station access the medium?
ii. What should be done if the medium is busy?
iii. How should the station determine the success or failure of the transmission?
iv. What should the station do if there is an access conflict?

b. Imagine the length of a 10Base5 cable is 2500 m. If the speed of propagation in a


thick coaxial cable is 400,000,000 m/s, how long does it take for a bit to travel from
the beginning to the end of the network? Ignore any propagation delay in the
equipment. (Marks: 06)

Ethernet uses a ____________ static addressing scheme in which each device is


assigned a unique address by the manufacturer.
64
48
32
8

Consider the six computers connected to a pair of bridged LAN segments as shown
below: (Marks:14)

Fill the segments list as given below according to the events occurs (How a bridge can
learn the locations of computers when a sequence of events occurs).

Event Segment 1 List Segment 2 List


Bridge boots
A sends to B
B sends to A
F broadcast
E sends to B
E sends to D
D sends to C
C sends to F

a. Answer the following question: (Marks: 08)


i. What are the main reasons for which PING command is not used for probing in
the large network?
ii. What is a ring network technology that is designed to overcome severe failure,
explain its working briefly?
iii. What is difference byte stuffing and bit stuffing?

b. What is the ratio of useful data to the entire packet for the smallest Ethernet
frame? What is the ratio for the largest frame? What is the average ratio?(Marks:
06)

An interface for twisted pair Ethernet must have a ____________ connector, and
must generate signals according to the_____________ specification.
BNC- t base 10
Rj 45- t base 10
BNC-t base 5
Rj 45-t base 2

A bridge uses the ___________ to determine which computers connect to which


segment, and uses the __________ to determine whether to forward a copy of frame.
Source , destination
Source , source
Destination, source
None from above

A system with redundant bridges might have a problem with_______ in the system.
Loop
Filters
Spamming
All above
W
MIDTERM EXAMINATION
Fall 2008
CS610- Computer Network (Session - 2)

Time: 60 min
Marks: 38
Student Info
StudentID:

OPKST Center:

WWW.vujannat.ning.COM
12/5/2008 12:00:00 AM ExamDate:

For Teacher's Use Only


Q No. 1 2 3 4 5 6 7 8 Total

Marks

Q No. 9 10 11 12 13 14 15
M16

Marks O
Q No. 17 18 19 20 21
g .C
Marks
i n
.t n
n a
an
u j
. v
W
W
W

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 1 ( Marks: 1 ) - Please choose one
A
typical port on an ATM switch operates at __________ or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
► OC-3 speed (155Gbps)

WWW.vujannat.ning.COM
Question No: 2 ( Marks: 1 ) - Please choose one
The
product of delay and throughput measures the _____ of data that can be present on the network.

► Area
► Volume
► Length
► None of the given

Question No: 3 ( Marks: 1 ) - Please choose one M


O
compression that can be achieved.
►Constant Bit Rate (CBR) service g .C
__________is used for compressed audio and video where the data rate depends on the level of

►Variable Bit Rate (VBR) service


i n
.t n
►Available Bit Rate (ABR) service
►None of the given

n a
Question No: 4 ( Marks: 1 )
n
- Please choose one

a
►Bridge
u j
Which of the following is a connecting device?

►Repeater
►Hub . v
►All the given
W
Question No: 5
W ( Marks: 1 ) - Please choose one
A

W
bridges function in the _________ layers(s).
►Physical (MAC)
►Data link
►Network
►Physical (MAC) and Data link

Question No: 6 ( Marks: 1 ) - Please choose one

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
►8 octets
►8 bytes
►8 bits
►None of the given

Question No: 7 ( Marks: 1 ) - Please choose one


The

WWW.vujannat.ning.COM
third field of the header consists of ------ bit Ethernet frame type.
►48
►32
►16
►8

Question No: 8 ( Marks: 1 ) - Please choose one


An -
-----------method, the network hardware designers specify how type information is included in
the frame and the value use to identify various frame types.
►Explicit frame type M
►Ideal frame type
O
►Implicit frame type

►None of the given g .C


i n
.t n
Question No: 9 ( Marks: 1 ) - Please choose one

a
Local Talk is a LAN technology that employs -------------

n
►Star topology
►Bus topology
an
►Ring topology
u j
►None of the given
. v
Question No: 10
W
( Marks: 1 ) - Please choose one
The

W
Fast Ethernet hardware operates at a rate of --------
►10 Mbps

W
►100 Mbps
►1000 Mbps
►None of the given

Question No: 11 ( Marks: 1 ) - Please choose one

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
-
--------- scheme, which is designed to help detect transmissions errors, send one extra bit of
information with each character
►Parity
►Checksums
►CRC
►None of given

Question No: 12 ( Marks: 1 ) - Please choose one

WWW.vujannat.ning.COM
Computer networks are often called -------------- because they use packet technology.
►Ethernet

►Switch networks

►Packet networks

►None of the given


M
Question No: 13 ( Marks: 1 ) - Please choose one
O
.C
-----
- Program sends a message to a remote computer and reports whether the computer responds.
►Ping
n g
Ping
i
.t n
►Traceroute
►ICMP
►Non of the given

n a
Question No: 14 ( Marks: 1 )
n
- Please choose one

a In --

►LAN
u j
-------, network occupies larger areas like cities & countries.

►WAN . v
►MAN
►None of the given W
Question No: 15 W ( Marks: 1 ) - Please choose one

W
-----------, network occupies the smaller area like a room a floor or a building
In --

►LAN
►WAN
►MAN
►None of the given

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
W
Question No: 16 ( Marks: 1 ) - Please choose one
In
Point-to-Point topology there are two topologies.
►Tree and Ring
►Star and Ring
►Star and Tree
►None of the given

WWW.vujannat.ning.COM
Question No: 17 ( Marks: 2 )



Question No: 18 ( Marks: 2 )





Question No: 19 ( Marks: 3 ) M


O
Question No: 20 ( Marks: 5 ) g .C
Why 10-base T wiring scheme is called star shaped bus wiring scheme.

i n
.t n
What are the main factors due to which mechanism of error detections schemes differ?

Question No: 21 ( Marks: 10 )


n a
an
How much data can be present on an original Ethernet segment at one time? To find out,

u j
compute the delay-throughput product. The original Ethernet operate at 10 mega bits per second,
and a segment was limited to 500 meters. Assume the signals propagate down the cable at 66
percent of the speed of light.
. v
W
W
W

Visit vujannat.ning.Com For Video Lectures ,previous assigmnets ,Papers,Chat, Study


discussions and many more.
www.vujannat.ning.com

CS610 Computer Networks


Mid Term Examination – Spring 2005
Time Allowed: 90 Minutes

Please read the following instructions carefully before


attempting any of the questions:
1. Attempt all questions. All Questions carry Different Marks.
2. Do not ask any questions about the contents of this
examination from anyone.
a. If you think that there is something wrong with any of
the questions, attempt it to the best of your understanding.
b. If you believe that some essential piece of information is
missing, make an appropriate assumption and use it to
solve the problem.
3. Exam is Closed Book. No handouts or extra material is allowed
in exam hall other than rough sheet which will be provided by the
examiner.

**WARNING: Please note that Virtual University takes serious


note of unfair means. Anyone found involved in cheating will
get an `F` grade in this course.

Total Marks: 100 Total Questions: 10

Question No. 1 Marks : 03

A popular LAN Technology that uses a shared Bus Topology.

o Star
o CSMA
o WAN
o Ethernet
o Multicast
Question No. 2 Marks : 03

An electronic device that connects LAN segments.

o Ethernet
o NIC
o 10Baset
o Bridge
o 10Base5

Question No. 3 Marks :30

[15 + 15 Marks]
For the packet switched network below:

a. Determine the routing table.


b. Determine the collapsed routing table using default route.
.

Question No. 4 Marks : 03

A form of addressing in which a set of computers is assigned one address.


.
o Broadcast
o Multicast
o Packet Switch
o Bandwidth
o CRC

Question No. 5 Marks : 10

Draw and label all the components for a 10Base5 Network.


Question No. 6 Marks : 03

A network technology that uses Collision Avoidance.

o Bridge
o CRC
o Broadcast
o WAN
o Wireless LAN

Question No. 7 Marks : 15

[15 Marks]
Assume a 10Mega Byte file must be transmitted across a network. Ignoring delays caused
by waiting for access and other overhead, how long will it take to send the file across?
a. Ethernet (10Mbps)
b. Fast Ethernet (100Mbps)
c. Token Ring (16Mbps)
d. Local Talk (230Kbps)
e. ATM (155Mbps)

Question No. 8 Marks : 15

Draw an example of 'Cycle of Bridges' with the segments. (At least 6 segments)

Question No. 9 Marks : 15

[15 Marks]
As discussed in the lecture, each ATM Switch rewrites or switched the Label. Assuming the
sending computer 'S' uses a VPI/VCI value of 3 and the receiving computer 'R' uses a
VPI/VCI value of 6, use a table containing the old VPI/VCI, the Interface and the new
VPI/VCI to complete the tables for each of the switches below?
Question No.10 Marks : 03

Formal name for Thick Ethernet.


.
o Star
o TDM
o Bandwidth
o Network Analyzer
o Broadcast
Connecting VU Students

FINALTERM EXAMINATION
SPRING 2006 Marks: 60
CS610 - COMPUTER NETWORK (Session - 1 ) Time: 120min

StudentID/LoginID: ______________________________

Student Name: ______________________________

Center Name/Code: ______________________________

Exam Date: Tuesday, August 15, 2006

Please read the following instructions carefully before attempting any


of the questions:
1. Attempt all questions. Marks are written adjacent to each question.
2. Do not ask any questions about the contents of this examination
from anyone.
a. If you think that there is something wrong with any of the
questions, attempt it to the best of your understanding.
b. If you believe that some essential piece of information is
missing, make an appropriate assumption and use it to solve the
problem.
c. Write all steps, missing steps may lead to deduction of marks.
**WARNING: Please note that Virtual University takes serious note of
unfair means. Anyone found involved in cheating will get an `F` grade
in this course.

For Teacher's use only


Question 1 2 3 4 5 6 7 8 9 Total
Marks

Question No: 1 ( Marks: 2 ) - Please choose one

Two computers E and F are expected to communicate frequently, in a LAN. While designing a
LAN which of the following is the way through which the traffic between E and F, will be least
affected to the other computers/traffic on the network
Connecting VU Students

► Make the two computers in different LAN segment and connect both the segments via
bridge

► Make the computer in a single LAN segment

► Connect both the computers using switch in between them

► Make the two computers in different LAN segments and connect both the segments
via router

Question No: 2 ( Marks: 2 ) - Please choose one

In which of the following OSI reference layers, does repeater operates?

► Physical

► Data link

► Network

► Session

Question No: 3 ( Marks: 2 ) - Please choose one

Which of the following is not true about OSPF?

► Allows routers introduce routes learned from other means

► Similar to IGP

► An address mask is attached with each address


Connecting VU Students

► Allows classful and classless addresses but not subnetted

Question No: 4 ( Marks: 2 ) - Please choose one

Static routing is more flexible than dynamic routing.

► True

► False

Question No: 5 ( Marks: 2 ) - Please choose one

UDP provides connectionless data delivery.

► True

► False

Question No: 6 ( Marks: 7 )

Write the use of token in-case of ring or star topology, how it works?

Question No: 7 ( Marks: 10 )


Connecting VU Students

Consider the above figure, in which there is a cloud of networks having various networks.

Suppose there are 7 routers in between Host A and Host B.


Identify

a. How come host A knows the addresses of all the routers between A to B?
b. What will be the value of the TTL field when the source host A sends the datagram 7th
time towards the destination B, and the third router in the path receives that datagram?
c. How many times does the source A needs to send the datagram so that it finally reaches at
destination host B?
d. What will be the value of the TTL field when the source host A sends the datagram 4th
time towards the destination B, and the second router in the path receives that datagram?

e. What will be the value of the TTL field when the source host A sends the datagram first
time towards the destination B, and the first router in the path receives that datagram?

Question No: 8 ( Marks: 15 )


Connecting VU Students

Given are the five networks connected to each other via routers.

Networks1 is connected to Network 2 through R1-2, Network 2 is connected to the Network3


through R2-3 and so on. W represents the weights between network nodes. Host A belongs to
Network 1 whereas Host B belongs to Network 5

The MTU size of each network is as follows


Network MTU size
No.
1 128bits
2 32 bits
3 64 bits
4 32 bits
5 16 bits

Host A sends a datagram of size 128 bits to Host B.

a. Find out which path will the datagram be adopting in reaching to the destination B by
Djikstra’s algorithm.
b. Which of the routers in the path needs to fragment the datagram?
c. The original datagram is finally split into how many datagrams to reach at the destination.

Question No: 9 ( Marks: 18 )


Connecting VU Students
Consider the IP addresses and the corresponding subnet masks,

i- 187.199.127.5 , 255.255.255.0
ii- 72.32.10.4 , 255.240.0.0

Find out the following against both of the above IP addresses

a. The network class in which the IP address falls.


b. The number of bits used for subnetting.
c. Total number of host in the subnet
d. The network address of the subnet.
e. The subnet address of the IP address.

S-ar putea să vă placă și