0% found this document useful (0 votes)
8 views5 pages

CN 4113 - New

The document is a question paper for a Computer Networks course, detailing instructions for candidates and the structure of the exam. It includes two sections, with Section A containing compulsory questions and Section B offering a choice of questions. The paper covers various topics such as network topologies, protocols, bandwidth calculations, and error detection methods.

Uploaded by

brosy812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views5 pages

CN 4113 - New

The document is a question paper for a Computer Networks course, detailing instructions for candidates and the structure of the exam. It includes two sections, with Section A containing compulsory questions and Section B offering a choice of questions. The paper covers various topics such as network topologies, protocols, bandwidth calculations, and error detection methods.

Uploaded by

brosy812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

This question paper contains 8 printed pages.

Your Roll No2304s5760 Go

Sr. No. of Question Paper: 4133 H


Unique Paper Code : 2342012403

Name of the Paper : Computer Networks

Name of the Course : B.Sc. (Hons.) Computer


Science (UGCF NEP)

Semester : IV

Duration: 3 Hours Maximum Marks : 90

Instructions for Candidates

1. Write your RollNo. on the top immediately on receipt


of this question paper.

2. The paper has two sections. All questions in Section


A' are compulsory.

3. Attempt any four questions from Section B.


4.
Parts of a question must be answered together.

Section A

1.
For each of the following four networks, discuss
the consequences if a connection fails : (3)

() Five devices arranged in a mesh topology


4133 4133 3
(i) Five devices arranged in a bus topology
(ii) Process-to-process delivery

(iü) Five devices arranged in a ring topology (i) Error Correction and error Detection

For each of the following network applications. the significance of the following special IP
o'State
indicate whether TCP or UDP would best fit addresses : (3)

the service requirements of the application, and


(i) 127.0.0.1
justify. (3)
(ii) 255.255.255.255
(i) Multiplayer online first-person shooting
(iii) 0.0.0.0
game

(i) Text-based instant messaging app Kg) What is the purpose of following flag bits with

respect to TCP header? (3)


(iii) Video Streaming
()) SYN
maximum data rate of a channel
(o) Calculate the
FIN
bandwidth of 200KHz when sixteen levels
(ii)
with a

(3)
of digital signaling are used.

( Suppose a communication system has a bandwidth (b)In a mesh network configuration comprising eight
of 10MHz. Using FDM, this bandwidth is divided
devices, how many
does each device require
ports
5 equal frequency bands. Each band carries
into to establish direct
connections with every other
signal with a bandwidth of 2 MHz.
a separate device in the network?
for Furthermore, what is the
Calculate the total bandwidth required
total count of physical links necessary
FDM. (3) to facilitate
multiplexing these signals using data
communication between al1
interconnected
devices?
of the OSI model which performs
(e) Name the layer
(3)
(3)
the following functions :
Give three
differences between circuit
(i)Route determination and packet switching
switching?
(3)
4133 4 5
4133
the step-by
Name the protocols to be used in the following Dijkstra's algorithm,illustrate
ysing from
shortest path
scenarios :
process of determining the
(3) step (8)
E.
router A to router
(i) To map an IP address to a MAC address
(ii) To map a MAC address to an IP address ARQ protocol operating
3. (a) Consider a Go-Back-N and
window size (W) is 4,
To assign the IP addresses to the host over a network. The
(111)
range from 0 to 7.
Assume
automatically the sequence numbers
and 3
that frames with
sequence numbers 0, 1,2,
by the receiver,
Section B have been successfully received
and the receiver has sent acknowledgment
(ACK)
3. Now, due to
for frames up to sequence number
2. (a)Compare and contrast TCP and UDP (User
network congestion, the frame with sequence
Datagram Protocol) in terms of their features,
number 4 is lost. (7)
advantages, and disadvantages. Discuss scenarios
where each protocol would be suitable for data (i) What is the size of the window for sender
transmission. (7) and receiver?

labeled Calculate the range


(b) Consider a network comprising fiverouters of valid
(ii)
sequence
as A, B, C, D, and E. The interconnections and numbers at the sender's side after the loss
their associated costs are given as follows : of frame with sequence
number 4.
Link between A and B: Cost 2 (ii) Determine the
range of sequence numbers
Link between A and C: Cost 4 expected by the receiver
after it has sent
Link between B and C: Cost 1 ACK for frames up to
sequence number 3.
• Link between B and D: Cost 5 (iv) Explain
how the sender
and receiver
Link between C and D: Cost 3 the loss of handle
frame 4 and
Link between C and E: Cost 7 maintain
synchronization using
the sequence numbers
Link between D and E: Cost 2 Go-Back-N ARQ in
protocol.
4133 6 4133 7
(b) Differentiate between the following: (8) (a) Assume that a voice channel occupies a bandwidth
of 4 kHz. We need to multiplex 10 voice channels
() Unipolar and Bipolar Line Coding Schemes with guard bands of 500 Hz usingFDM. Calculate
the required bandwidth. E couut to oo
(ii) Data Element and Signal Element

(b) (i) A code includes the four four-bit codewords:


(a) Which algorithm is used in CSMA/CD networks, 1001, 01 10, 1010, and 0101.

particularly in scenarios where multiple stations What is the minimum distance of this code?
contend for the channel while transmitting long
files? Give the functionality of the algorithm.
.What is the maximum number of errors
that this code is guaranteed to detect?
(5)
• What is the maximum number of errors
(b)Given the IP address 192.168.0.0/24, an
that this code is guaranteed to correct?
organization needs to create two subnets with the
following requirements: (10) G A 12-bit odd-parity Hamming code whose
binary value
• Subnet 1: 50 hosts
is ii10010011Í arrives at a
receiver. What was the original value of the
• Subnet 2: 30 hosts message ? Assume that not more than 1 bit
is in error.
(4+6)
For each of these subnets, give the

(a) The following


(i) first IP address assigned character encoding is used in a data
link protocol: A: 7 11010101; B: 10101001;
(ü) last IP address assigned FLAG:
01111110: ESC: 10100011 Show the
bit sequence
in the w.x.y.z/s notation
(ii)subnet mask transmitted (in binary) for
the
five-character frame:
A ESCB ESC
of IP addresses available FLAG when each of the
(iv) identify the range following
framing methods are used:
bits (7)
(v) number of host and network () Flag bytes with
byte stuffing.
4133 8

(ii) Starting and ending flag bytes, with bit


td
stuffing. 2bit

(ii) Character Count

Also, what will be the original data, if the output


after byte-stuffing is given

FLAG A B ESC ESC C ESC ESC ESC FLAG


ESC FLAG D X FLAG.

(b) Write short notes on : (8)

() File Transfer Protocol

(ii) Simple Mail Transfer Protocol

7. (a) State Shannon'stheorem. Determine the maximum


achievable data rate for this channel based on
Shannon's theorem when the communication
channel has a bandwidth of 5 MHz and an SNR

of 40 dB.
(7)

(b) Draw the layered architecture of TCP/IP


model
explaining the services provided by each layer.
Given an example network,if we change the
LAN
technology to anew one, which layers in the
TCP/
IP protocol suite need to be
changed and why?
Listthe layers at which
routers and switches are
used.
(8)

You might also like