0% found this document useful (0 votes)
9 views

DSDSD 2022

Uploaded by

riddhixgupta1907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

DSDSD 2022

Uploaded by

riddhixgupta1907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

[This questi on paper contai ns 8 printe d pages.

Your Roll No ......... ..... .

Sr. No. of Question Paper : 1402 C


Uniqu e Paper Code 32341303

Name of the Paper BHCS12 - Computer Networks

Name of the Cours e B.Sc. (H) Computer Science


(CBC S-LO CF)

Semes ter III

Durati on : 3 Hours Maxim um Marks : 75

Instru ctions for Candi dates

l I.
Write your Roll No. on the top immed iately on receip t
of this questi on paper.

2. Sectio n A is compu lsory and carries 35 marks.


3. Attem pt any four questi ons from Sectio n B.

4. All questi ons carry equal marks .

SECT ION A

I. (a) Consid er a selecti ve repeat sliding windo w protoc ol


that uses a frame size of 1 KB to send data on a
1.5 Mbps link with a one-w ay latenc ~ of 50 msec.
To achiev e a link utiliza tion of 60%, what is the
minim um numbe r of bits requir ed to repres ent the
sequen ce numbe r field. (3)
P.T.O .
1402 2
(b) Give any one differen ce bet ween port address.
physical address and logical address ? (3)

( c) Suppose the fallowing characte r encoding is used


in a data link protocol : (2)
A: 1101011 1; B: 11101101 ; FLAG: 0111111 0: ESC :
10100011 .

Consider the character frame: A B ESC B ESC


ESC FLAG

Show the bit sequence transmit ted (in binary) for

I the above characte r frame when Flag bytes with


byte stuffing framing methods is used.

I (d) Explain the significa nce of the followin g special


IP addresse s :
CD 127 .o.o.o
(ii) 255.255 .255 .255 (2)

(e) Explain the differenc e between packet switchin g


and circuit switchin g with the help of suitable
example . (3)

(f) How are IP addresse s resolved from a gt ve n


URL? (3)

(g) Five channels each with a 100 KHz b a ndwidth


are to be multiple xed together . What is th e
minimum bandwidth of the link if th e re is n need
for a guard band of l O KHz bandwidth channd ~
to prevent interference. (2)
t402 3

(h) In a given modulation scheme , th ere are 4


amplitude levels and 16 phase levels an d t h e bit. •
rate (N) is 72 Kbps. Calculate the following:

(i) Number of bits per baud (r)

(ii) Baud rate (S) (2)

(i) Indicate True or False for each of the following :

(i) Switches in circuit-switc hed networks


involve connection establishmen t and
connection release.

(ii) Switches in circuit-switch ed networks do


not need any information about the network
topology to function correctly. (2)

U) What is the benefit of "twisting" in twisted-pair


cables? (2)

(k) What is the purpose of PSH and SYN flag bits


with respect to TCP header? (2)

(1) What do you mean by well-known ports?


Mention the port nun1bers assigned to HTTP and
SMTP. (2)

(m) Assume six devices are arranged in a mesh


topology. How many ports are needed for each
device? How many physical links are needed in
full duplex mode? (2)
P.T.O.
-· --- ----

1402 4

(n) Which of the four digital to analog modulation


techniques (ASK, FSK, PSK) is most susceptible
to noise? Justify your answer. (2)

(o) Map the following to a suitable layer of the OSI


model:
(j) Route determination
(ii) Interface to transmission media
(iii) Provides access to the end user . (3)

SECTION B

2. (i) Consider a coding scheme with two legal


codewords: 01010 and 10101.

(a) Calculate its Hamming distance.

(b) How many bit errors can be detected by


this code?

(c) How many bit errors can be corrected by


this code? (3)

(ii) A 12-bit even-parity Hamming code whose binary


value is 111001001111 arrives at a receiver.
What was the original value of the message?
Assume that not more than 1 bit is in error.
(3)
1402 5

(iii) Expla in and discu ss the vario us fields of IP


heade r with the help of a diagr am. ( 4)

3. (i) Hype rTex t Tran sfer Proto col (HTT P) 1s a


statel ess proto col. Justif y. (2)

(ii) A route r has the follow ing (CIDR ) entrie s in its


routin g table : (2)

Addr ess/m ask Next hop

135.4 6.56.0 /22 Interf ace 0

135.4 6.60.0 /22 Interf ace

192.5 3.40.0 /23 Route r I

defau lt Route r 2

For each of the follow ing IP addre sses, find the


next hop selec ted by the route r?

(a) 135.4 6.63.1 0

(b) 192.5 3.56.7

(iii) Two CSM A/CD statio ns are each tryin g to


transm it long (mult ifram e) files. After each frame
is sent, they conte nd for the chann el, using the
binar y expon ential backo ff algori thm. Expla in the
funct ional ity of the algor ithm in brief. (3)

P.T.O .
140 2 6

(iv) Com pare and con tras t Tra nsm issi on Con trol
Prot ocol (TC P) and Use r Dat agra m Prot ocol
(UD P) with resp ect to the follo win g parameters:

(a) Con nect ion

(b) Seq uenc e of Data pack ets at the receiver

( c) Ac know ledge1nent of the rece ived packets


(3)

4. (i) Com pute the Nyq uist Sam plin g rate for a signal
with ban dwi dth of 200 KHz if the low est
freq uenc y is l 00 KHz. (2)

(ii) Diff eren tiate betw een stati c and dyna mic rout ing
with the help of suit able exam ple. (3)

g
(iii) A message M(x ) 1101101 10 l is tran smit ted usin
the CRC met hod . The gen erat or poly nom ial is
x 3 + 1. (3+2 )

(a) Com pute the tran smi tted bit strin g whic h
incl udes the mes sage and CRC.

(b) Sup pose that the fifth bit from the left is
inverted duri ng tran smis sion . Show that this
erro r is dete cted at the rece iver 's end.
l
l
7
1402
d
e IP pa ck et is fo rw ar de
5. (i) Su pp os e a 90 00 -b yt
ro ss a lin k w ith a 15 00 -b yt e M ax im um
ac
is si on U ni t (M TV ). H ow m an y fra gm en ts
Tr an sm
ar e th ei r le ng th s? (2)
w ill be cr ea te d ? W ha t

e
H ow ca n a m ac hi ne w ith a si ng le D N S na m
(ii)
se s? (2)
ha ve m ul tip le IP ad dr es

dr es s 18 4. 86 .9 2. 18 2,
(iii) C on si de r th e IP ad

e gi ve n IP .a dd re ss , if
(a ) Fi nd th e cl as s of th
ad dr es si ng .
w e ar e us in g cl as s- ba se d

rt (a ) is to be di vi de d
(b) If th e ne tw or k in pa
w ha t w ou ld be th e
in to 8 di ff er en t su bn et s,
su bn et m as k?

ad dr es s of th e su bn et
( c) W ha t is th e ne tw or k
to w hi ch th is IP ad dr es s
would be at ta ch ed ?

Fo r CI D R ad dr es si ng , fin d th e le ng th of
(d )
tw or k in pa rt (c ).
CI D R pr ef ix fo r th e ne
(1 +2 +2 +1 )

th e
W ha t is th e im po rta nc e of flo w co nt ro l in
6. (i)
un ic at io n? Su gg es t an y
co nt ex t of ne tw or k co m m
e te ch ni qu e us ed to ha ndle th e is su e of flo w
on
(3)
control.
P. T. O .
1402 8

(ii) Brief lv discuss the conc ept of multiplexing.


Diff eren tiate betw e en Time Di vis ion an d
Frequency division Multiplexing. (3)

(i ii) Consider the network shown below and assume


tha t eac h node initia ll y knows the costs to each
of its nei ghbors. Consider the distance vector
algo rithm and show the distance table entries at
node E. (4)

7. (i) Why is the header checksum of an IP packet


comp uted at ever y hop from sour ce to
destination? (2)

(ii) DNS uses UDP instead of TCP. If a DNS packet


is lost, there is no automatic recovery. Does this
cause a problem, and if so, how is it solved?
(2)

(iii) State Optimality Principle. (3)

(iv) Exp lain the concept of transmission impairment?


Briefly, discuss the difference between distortion
and attenuation. (3)
(1500)

You might also like