Computer Networks (CSE 3152) (Makeup)
Computer Networks (CSE 3152) (Makeup)
EXAMINATIONS (Feb-2022) -
QUESTION PAPER - PART A
COURSE CODE : CSE3152
COURSE NAME : Computer Networks
SEMESTER : V
DATE OF EXAM : 22/02/2022
DURATION : 45 + 3 minutes
* Required
* This form will record your name, please fill your name.
1. Name *
2. Registration Number
*
2/15/2022
3. Section *
4. Class Roll No
*
Connectionless
6. Which one of the following task is not done by data link layer?
(1 Point)
flow control
channel coding
framing
error control
2/15/2022
7. When the sender and the receiver of an email are on different systems, we need
only _________
(1 Point)
One MTA
Two UAs
8 MSS
7 MSS
12 MSS
14 MSS
2/15/2022
10. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
(1 Point)
MAC
Name
Port
IP
11. The transport layer protocols used for real time multimedia, file transfer, DNS and
email, respectively are:
(1 Point)
12. A generator that contains a factor of ____ can detect all odd-numbered errors.
(1 Point)
x+n
x+1
2/15/2022
13. Which sublayer of the data link layer performs data link functions that depend upon
the type of medium?
(1 Point)
14. If there are N routers from source to destination, the total end to end delay in
sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to
______________
(1 Point)
L/R
(2N*L)/R
(N*L)/R
15. A network with CSMA/CD protocol in the MAC layer is running at 1 Gbps over a 1
km cable with no repeaters. The signal speed in the cable is 2 x 108 m/sec. The
minimum frame size for this network should be
(1 Point)
10000 bits
5000 bits
5000 bytes
10000 bytes
2/15/2022
16. Which of the following is not a phase of virtual circuit network?
(1 Point)
Setup phase
Termination phase
Teardown phase
17. Which is the correct expression for the length of UDP datagram?
(1 Point)
18. Routers forward a packet using forwarding table entries. The network address of
incoming packet may match multiple entries. How routers resolve this?
(1 Point)
Forward it the router whose entry matches with the longest prefix of incoming packet
Forward it the router whose entry matches with the longest suffix of incoming packet
2/15/2022
19. _________ is a multiple-access method in which the available bandwidth of a link is
shared in time, frequency, or through code, between different stations.
(1 Point)
Partition acess
Random access
Controlled access
Channelization
Error packet
Data packet
21. As the resources are reserved between two communicating end systems in circuit
switching, ___________ is achieved.
(1 Point)
authentication
reliability
2/15/2022
22. How does a DHCP server dynamically assign IP address to host?
(1 Point)
Addresses are assigned for a fixed period of time. At the end of period, a new quest for an address
must be made, and another address is then assigned.
Addresses are leased to host. A host will usually keep the same address by periodically contacting
the DHCP sever to renew the lease.
Addresses are permanently assigned so that the host uses the same address at all times.
Addresses are allocated after a negotiation between the server and the host to determine the
length of the agreement.
23. If a server has no clue about where to find the address for a hostname then _______
(1 Point)
request is aborted
24. Suppose that the maximum transmit window size for a TCP connection is 12000
bytes. Each packet consists of 2000 bytes. At some point of time, the connection is
in slow-start phase with a current transmit window of 4000 bytes. Subsequently, the
transmitter receives two acknowledgements. Assume that no packets are lost and
there are no time-outs. What is the maximum possible value of the current transmit
window?
(1 Point)
8000 bytes
10000 bytes
12000 bytes
4000 bytes
2/15/2022
25. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
(1 Point)
additively
multiplicatively
exponentially
suddenly
26. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in
only one segment?
(1 Point)
11001
10001
10000
11000
2/15/2022
28. RIP is based on ------------- algorithm that uses ----- as cost metric.
(1 Point)
Header line
Status line
Entity line
Request line
30. In Go-Back-N window, when the timer of the packet times out, several packets have
to be resent even some may have arrived safe. Whereas in Selective Repeat
window, the sender resends ___________
(1 Point)
2/15/2022
31. The address of a class B host is to be split into subnets with a 6-bit subnet number.
What is the maximum number of subnets and the maximum number of hosts in each
subnet?
(1 Point)
205.16.31.10
205.16.39.44
205.17.32.76
205.16.42.56
33. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
(1 Point)
Segment
Packet
Acknowledgment
Buffer
2/15/2022
34. How many types of message formats are there in HTTP protocol?
(1 Point)
2 types
5 types
3 types
4 types
This content is neither created nor endorsed by Microsoft. The data you submit will be sent to the form owner.
Microsoft Forms
2/15/2022
Department of Computer Science & Engineering
Sem-V
Computer Networks
CSE3152
Online -Makeup(Feb-2022)
Part B(20M)
Scheme
Q. No Question Marks
1A Host cse.manipal.edu asks dns1.manipal.edu to resolve the hostname 2M
omnisecu.com. Assume there are no cached entries relevant to this
request. Write down the steps taken to resolve omnisecu.com and
respond to cse.manipal.edu with diagram.
1B Both UDP and TCP use port numbers to identify the destination entity 3M
when delivering a message. Give two reasons for why these protocols
invented a new abstract ID (port numbers), instead of using process Ids,
which already existed when these protocols were designed.
Now, Suppose a process in Host C has a UDP socket with port number
6789. Suppose both Host A and Host B each send a UDP segment to
Host C with destination port number 6789. Will both of these segments
be directed to the same socket at Host C? If so, how will the process at
Host C know that these two segments originated from two different
hosts?
1C Describe the connection establishment procedure in TCP with diagram. 5M