0% found this document useful (0 votes)
31 views

A-I

Uploaded by

2021ucp1377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

A-I

Uploaded by

2021ucp1377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Malaviya National Institute of Technology 2023-24

Department of Computer Science and Engineering B-Tech (CSE)


CST-307:Computer Network Semester - V
Due Date :22/11/2023 Time : Before 12 PM

Assignment

Name: ID:

Problem 1: Answer all the following questions.

1 (2 Marks) True or false: When a BGP router receives an advertised path from its neighbor,
it must add its own identity to the received path and then send that new path on to all
of its neighbors. Explain.

2 (2 Marks) What is the purpose of the SNMP trap message?

3 (2 Marks) What is the ”count to infinity” problem in distance vector routing?

4 (2 Marks) What are some of the possible services that a link-layer protocol can offer to
the network layer? Which of these link-layer services have corresponding services in IP?
In TCP?

5 (2 Marks) 40GBASE-T. Explain the acronym.

6 (2 Marks) How big is the MAC address space? The IPv4 address space? The IPv6 address
space?

7 (8 Marks) Circle ”yes” or ”no” for following.

(a) YES NO DHCP is a network layer service


(b) YES NO ARP is defined in RFC 826
(c) YES NO ICMP uses for Internet error control

A-I-1
(d) YES NO ECMP (Equal Cost MultiPath) is associated to OSPF routing.
(e) YES NO Random back-off mechanism not used for CSMA/CA.
(f) YES NO Token ring is a special routing mechanism.
(g) YES NO Split horizon is solution for Denial of service (DoS) attack.
(h) YES NO IEEE 802.16 is wireless local area network(WLAN) standard.

Problem 2: Answer all the following questions in the ETE answer-sheet.

8 Consider the network described in the previous problem. Now suppose that the two
TCP connections, C1 and C2 , have the same RTT of 100 msec. Suppose that at time t , C1 ’s
congestion window size is 15 segments but C2 ’s congestion window size is 10 segments.

(a) What are their congestion window sizes after 2200 msec?

A-I-2
(b) In the long run, will these two connections get about the same share of the band-
width of the congested link?
(c) We say that two connections are synchronized, if both connections reach their max-
imum window sizes at the same time and reach their minimum window sizes at the
same time. In the long run, will these two connections get synchronized eventually?
If so, what are their maximum window sizes?
(d) Will this synchronization help to improve the utilization of the shared link? Why?
Sketch some idea to break this synchronization.

9 (5 Marks) A large number of consecutive IP addresses are available starting at 198.16.0.0.


Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 ad-
dresses, respectively, and in that order. For each of these, give the first IP address as-
signed, the last IP address assigned, and the mask in the w.x.y.z/s notation

10 (5 Marks) A 1-km-long, 10-Mbps CSMA/CD LAN (not 802.3) has a propagation speed
of 200 m/µsec. Repeaters are not allowed in this system. Data frames are 256 bits long,
including 32 bits of header, checksum, and other overhead. The first bit slot after a suc-
cessful transmission is reserved for the receiver to capture the channel in order to send
a 32-bit acknowledgment frame. What is the effective data rate, excluding overhead,
assuming that there are no collisions?

A-I-3
11 (5 Marks) Suppose a router has built up the routing table shown in Table . The router
can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers
R2 , R3 , or R4 . Assume the router does the longest prefix match. Describe what the router
does with a packet addressed to each of the following destinations:

(a) 128.96.171.92
(b) 128.96.167.151
(c) 128.96.163.151
(d) 128.96.169.192
(e) 128.96.165.121

Subnet Number Subnet Mask Next Hop


128.96.170.0 255.255.254.0 interface 0
128.96.168.0 255.255.254.0 Interface 1
128.96.166.0 255.255.254.0 R2
128.96.164.0 255.255.252.0 R3
default R4

12 (5 Marks) Provide in-detail discussion on SDN with a neat sketch.

A-I-4
13 (5 Marks)
(a) A token bucket scheme is used for traffic shaping. A new token is put into the
bucket every 5 µsec. Each token is good for one short packet, which contains 48
bytes of data. What is the maximum sustainable data rate?

(b) A computer on a 6-Mbps network is regulated by a token bucket. The token bucket
is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How
long can the computer transmit at the full 6 Mbps?

14 (5 Marks)
(a) What is HOL blocking? Does it occur in input ports or output ports? (1 Mark)
(b) What is meant by a “plug-and-play” or “zeroconf” protocol? (1 Mark)
(c) Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes.
Suppose the original datagram is stamped with the identification number 422. How
many fragments are generated? What are the values in the various fields in the IP
datagram(s) generated related to fragmentation? (3 Marks)

A-I-5
””Knowledge is being aware of what you can do. Wisdom is knowing when not to do it.” - -

A-I-6

You might also like