CN NPTL 1-12 Assignments.
CN NPTL 1-12 Assignments.
Week-1 Assignment
1) How many collision domains are in a 10-port hub, an 8-port switch (L2), and a 4-port
router. respectively? A collision domain is the segment of a network, where if more than
one device tries to send data simultaneously, it causes a collision and the data is lost.
a) 1, 8, and 4, respectively.
d) 5, 4, and 2, respectively.
Ans: a
2) Map the devices their associated layer in the TCP/IP model.
Ans: a
A. FTP
B. UDP
C. PPP
D. IP
E. HTTP
Ans: d
I. It involves an addition of a header and trailer to the actual data as it moves down in the
TCP/IP protocol stack.
II. At the transport layer, encapsulation includes port numbers and at the network layer.
encapsulation includes IP addresses.
a) Only (1)
b) Only (II)
Ans: c
5) Which of the following is NOT a disadvantage of the circuit switching technique over the
packet switching technique in computer networks?
c) Less scalable
Ans: a
7) Which transport layer protocol will be chosen by an application that does not require
any reliability?
a) TCP
b) UDP
Ans: b
8) You are a network administrator in your college. You are asked to do troubleshooting for
an issue of a remote server using telnet. Which of the following consideration(s) should
you keep in mind when. using Telnet for this task?
b) It is advisable to use telnet in a local network rather than on the internet to avoid security
risks.
Ans: b, d
9) Choose the statement(s) that correctly describe(s) the roles and responsibilities of the
Network Interface Card (NIC) in the computer networks.
I. NIC takes over the responsibility of segmenting large chunks of data into smaller packets that
can be transmitted over the networks.
II. It converts digital data from the computer's processor to an analog signal.
a) Only (1)
b) Only (II)
Ans: c
10) Identify the INCORRECT statement(s) related to Bridge and Switch (L2) in computer
networks.
a) For small enterprises (without the need for features like QoS, VLANs, and STP), a switch is
more economical/suitable in the case of segmenting the traffic between two LANs than a
bridge.
c) broadcast traffic to all ports, while bridges broadcast the traffic to designated ports (ports
having the same VLAN port as the sender) by using a MAC address table.
d) Switches and bridges are both equally important in modern, large, and complex networks.
Ans: a, c, d
Week-2 Assignment
1. What is the difference between a 'domain' and 'zone' in DNS?
Ans: a
2. What makes FTP more secure than TFTP (Trivial File Transfer Protocol)?
a) TFTP lacks features like user authentication and secure data transfer mechanisms.
Ans: a
3. In the HTTP architecture, which of the following best describes a Uniform Resource
Locator (URL)?
c) A unique identifier for resources, including the protocol, hostname, and path
Ans: c
4. Which of the following statements about HTTP proxy servers is NOT true?
Ans: c
c) Only Q is True
d) Only R is False
Ans: b
6. What is the correct syntax to be written in the command line to initiate a Telnet
connection to the web server of www.iitkgp.ac.in?
a) telnet//www.iitkgp.ac.in
b) telnet:www.iitkgp.ac.in
c) telnet://www.iitkgp.ac.in
d) telnet www.iitkgp.ac.in
Ans: d
7. Which of the following protocols allow non-ASCII data to be sent over email?
a) IMAP4
b) TELNET
c) MIME
d) POP3
Ans: c
a) S1
b) Only $2
c) $2 and $3 only
d) $3 Only
Ans: d
The browser must first resolve the web server's domain name to an IP address.
After the server IP is obtained, the browser opens a TCP connection to request the
webpage and its embedded resources.
The packets leaving the user's machine, in some order, are as follows:
Which of the following is the correct chronological order in which the packets leave the user's
computer (from first to last)?
Ans: a
S1: A user requests a web page that consists of some text and one image. For this page the
client will send one request message and receive 4 response messages.
S2: It is not possible to send two different web pages (for example,
www.nptel.ac.in/student.html and www.nptel.ac.in/course.html) over the same persistent
connection.
a) Only Sl is true
b) Only S2 is false
Ans: d
Week-3 Assignment
d) none of them
Ans: a
I. The transport layer functionalities (e.g.. connection establishment, flow control, error
detection) operate at an abstract level using data structures, algorithms, and system calls
implemented in the OS kernel.
II. The operating system (OS) kernel does not play any role in supporting the transport layer
functionalities of the TCP/IP protocol stack.
a) Only (1)
b) Only (II)
Ans: b
d) Forwarding the datagram from one hop to another hop in the network
Ans: d
4. What can be a primary mechanism used to ensure the reliable data transfer in a stop-
and-wait algorithm (Noisy Channel)?
a) Employing only error detection and correction codes without requiring acknowledgements.
c) Using a sequence number to identify each packet uniquely and waiting for an
acknowledgement for each packet before sending the next packet.
d) Using a sliding window to send multiple packets without waiting for their acknowledgements.
Ans: c
5. A data of 40 bytes need to be delivered using TCP protocol but a sender can send a
segment of maximum size 12 bytes only. Identify the sequence number of the last
segment formed if the sequence number field uses 5 bits only? [Assume sequence
number starts from 0]
a) 1
b) 4
c) 12
d) 31
Ans: b
6. A sender uses a sliding window protocol with a window size of 5. The range of sequence
numbers follows modulo 8 (the sequence number starts from 0 to 7). If the receiver
acknowledges packet 1. what will be the sender's new window range?
a) 1-5
b) 2-6
c) 3-7
d) 0-4
Ans: b
a) True
b) False
Ans: a
8. TCP instance uses a sliding window protocol in the noisy channel. A timeout occurs due
to the loss of a segment (or the acknowledgement). Mark the RIGHT statement among
the following-
a) In the of Go-Back-N ARQ., if any segment of the sliding window is lost, all the segments of the
sliding window are retransmitted while in Selective Repeat ARQ, only the lost packets are
selectively transmitted.
b) In the case of Go-Back-N ARQ, if any segment of the sliding window is lost, only the lost
packets of the sliding window are selectively retransmitted while in Selective Repeat ARQ. all
packets of the sliding window are retransmitted.
c) In both cases, Go-Back-N ARQ and Selective Repeat ARQ, all packets of the sliding window
retransmitted.
d) In the both cases, Go-Back-N ARQ and Selective Repeat ARQ, only lost packets of the sliding
window are selectively retransmitted.
Ans: a
9. Consider a sender using the Go-Back-N ARQ protocol with a window size 5. The
sequence number ranges from 0 to 7 (modulo 8). The sender initially transmits packets
with the sequence numbers- 0. 1, 2, 3, and 4. During the transmission, packet 3 is lost in
the network. The sender receives a cumulative ACK for the packet 2. The sender
continues sending packet 5, 6, and 7 but the receiverdenies accepting them due to the
loss of packet 3. Identify the range of packets that will be retransmitted by the sender
after the timeout of packet 3?
a) 0, 1, 2, 3, and 4.
b) 2.3.4.5, and 6.
c) 3. 4. 5. 6, and 7.
d) 1.2.3.4, and 5.
Ans: c
10. A client and a server establish a connection using TCP's three-way handshake. The
following details are given:
Initial sequence number of the client: 100 and initial sequence number of the server:
300.
RTT (Round Trip Time): 80ms.
Each TCP segment carries 40 bytes of header information.
The server sends a SYN-ACK segment, and the acknowledgement (ACK) segment from
the client is delayed due to congestion, taking 100ms to reach the server.
How much time does it take to establish the connection under such a scenario?
a) 100ms
b) 280ms.
c) 180ms
d) 260ms
Ans: c
Week-4 Assignment
1. Which statement about choosing a transport protocol based on BDP (Bandwidth Delay
Product) is correct?
a) Sliding window protocols always outperform stop-and-wait protocols, regardless of the BDP.
b) When the BDP is smaller than the segment size, a sliding window protocol significantly
improves performance.
c) Stop-and-wait protocols are preferred when the BDP is smaller than the segment size to
minimize complexity.
d) Selective repeat ARQ should always be chosen over go-back-N ARQ to maximize throughput.
Ans: c
b) Allocating bandwidth based on the relative priority of each flow, does not ensure optimal
network efficiency.
d) Allocating bandwidth so that no flow can increase its allocation without decreasing another
flow's allocation.
Ans: d
4. Which of the following conditions does not influence the segment size in TCP?
Ans: d
5. In the TCP connection release process, why does the active closer enter the TIME-WAIT
state after the final acknowledgment?
a) To confirm that the other host has received the FIN message.
Ans: c
Ans: c
7. A TCP sender observes a mismatch between the advertised window size from the
receiver and the available buffer space. Which of the following is True?
Ans: d
8. A transport-layer protocol using AIMD starts with an initial sending rate of 1 Mbps. After
four successful additive increases (each adding 0.5 Mbps). it detects packet loss. If the
multiplicative decrease factor is 0.5, what will be the new sending rate?
a) 2.5 Mbps
b) 1 Mbps
c) 3 Mbps
d) 1.5 Mbps
Ans: d
9. A TCP connection is experiencing high delays and packet reordering. Which features of
TCP help maintain reliable and ordered communication in this scenario?
Ans: d
10. In the case of a simultaneous TCP open (both hosts initiate a connection at the same
time), which of the following are true?
(1): Both hosts will transition to the SYN-RECEIVED state after exchanging SYN messages.
(ii): The three-way handshake completes with the exchange of SYN+ACK messages.
(iii): Both hosts will immediately move to the ESTABLISHED state after receiving SYN messages.
(iv): Simultaneous open is less secure due to lack of proper sequence number synchronization.
Ans: a
Week-5 Assignment
1. How does the TCP Sliding Window mechanism contribute to efficient data transmission?
Ans: b
Ans: b
3. Which mechanism is used to avoid Silly Window Syndrome at the receiver side?
a) Delayed acknowledgment
b) Nagle's algorithm
c) Clark's solution
d) Fast retransmit
Ans: c
Ans: a
6. If the Checksum field in the UDP header is set to 0, what does it indicate?
Ans: a
7. What is the purpose of the pseudo-header used in the UDP checksum calculation?
Ans: b
8. What does the listen() function do in socket programming?
b) It puts the socket into a passive mode to wait for incoming connections.
Ans: b
9. Which function can be used to configure socket options like timeout or buffer size?
a) setsockopt()
b) sockopt()
c) configure()
d) options()
Ans: a
Ans: b
Week-6 Assignment
1. What is the primary function of the network layer in the TCP/IP model?
2. Which of the following is a key advantage of using a Layer 3 switch over a Layer 2
switch?
c) It can route traffic between different subnets without requiring a separate router.
Ans: c
Ans: c
a) Transport Layer
b) Network Layer
d) Application Layer
Ans: b
5. When communicating between two nodes, what role does the transport layer protocol
play
Ans: c
a) Loopback address
c) Broadcast address
d) Unspecified address
Ans: d
a) To replace the traditional classful addressing system with a more flexible and efficient way of
allocating IP addresses.
Ans: a
8. How many subnets can created from a/24 network if the subnet mask is extended to
/26?
a) 2
b) 4
c) 6
d) 16
Ans: b
9. What is the CIDR notation for a supernet 1 point that aggregates 192.168.0.0/24 and
192.168.1.0/24?
a) \23
b) \24
c) \25
d) \22
Ans: a
10. In a home network using NAT, how does a router differentiate between multiple devices
accessing the same web server?
Ans: c
Week-7 Assignment
c) Transmission delay is influenced by the packet size and the bandwidth of the channel.
Ans: d
2. How does traffic shaping differ from traffic policing in the context of QoS?
a) shaping identifies and marks packets for prioritization, while traffic policing drops packets
that violate QoS.
b) shaping regulates outgoing traffic rates, while traffic policing monitors and drops packets
violating QoS.
c) Traffic shaping prioritizes real-time traffic, while traffic policing prioritizes non-real-time
traffic.
d) Traffic shaping is applied only at the router, while traffic policing is applied only at the source.
Ans: b
3. Which of the following statements about the token bucket algorithm are correct?
S4: It allows traffic to exceed the token generation rate temporarily if tokens are available.
a) S1 and S3 only
b) S2 and S4 only
Ans: c
4. A video streaming service uses a token bucket with a token generation rate of 5 Mbps
and a bucket size of 10 MB. If the stream has a sudden burst requiring 20 MB of data,
how much data can be transmitted immediately without exceeding the allowed rate?
a) 10 MB
b) 15 MB.
c) 20 MB
d) 5 MB
Ans: a
5. During peak traffic, a network's RED mechanism begins dropping packets when the
average queue size reaches the maximum threshold. Why is this early packet drop
strategy crucial for maintaining QoS?
a) It reduces packet loss for inelastic traffic by halting elastic traffic completely.
d) It guarantees that all packets from elastic traffic are evenly distributed.
Ans: b
Ans: c
7. A company deploys IntServ for a critical application requiring guaranteed QoS. However,
some flows experience denial of service due to resource unavailability. What mechanism
in IntServ likely caused this issue?
b) Admission Control
c) Priority Queuing
d) Traffic Policing
Ans: b
8. A network router using Weighted Fair Queuing (WFQ) schedules packets from three
classes with the following weights: 1, 2, and 3. If the total available bandwidth is 600
Mbps, how much bandwidth is allocated to the second class?
a) 100 Mbps
b) 200 Mbps
c) 240 Mbps
d) 300 Mbps
Ans: b
9. In a DiffServ domain, which of the following are responsibilities of the edge router?
Ans: a
10. Which of the following parameters must be considered for admission control in QoS
architectures to determine whether a new flow can be admitted?
Ans: c
Week-8 Assignment
IP address: 5.6.7.212
a) 5.6.4.0
b) 5.6.7.0
c) 5.6.7.255
d) 5.6.255.255
Ans: a
2. Consider the following CIDR blocks: 192.168.0.0/24 and 192.168.3.0/24. Identify the
possible aggregated prefix (route summarization/supernetting) among the following.
a) 192.168.0.0/22
b) 192.168.0.0/23
c) 192.168.0.0/24
d) 192.168.0.0/25.
Ans: a
3. Which of the following statements are true for Autonomous Systems (AS)?
c) BGP protocol is primarily used for communication between different Autonomous Systems
(ASs).
d) An Area in an Autonomous System (AS) is a collection of routers, networks, and hosts within
an AS.
Ans: a, c, d
4. How many bits are used to identify the Autonomous Systems (AS)?
a) 1
b) 32
c) 64
d) 8
Ans: b
5. Which transport layer protocol does BGP use for communication between peers?
a) TCP
b) UDP
c) QUIC
d) ICMP
Ans: a
6. Consider the following topology of a network. Numbers labeled in the link between two
routers represent cost. Using the Distance Vector algorithm, identify the updated
distance vector at Router after the first round of updates.
a) A: 0, B: 3, C: 1, D: 4, E: 2
b) A: 0, B: 3, C: 4, D: 4, E: 5
c) A: 0, B: 3, C: 1, D: 4, E: 5
d) A: 0, B: 3, C: 4, D: 4, E: 2
Ans: b
a) It shares the routing table rather than sending the information about its neighborhood only.
b) Each router computes the shortest paths to all independently using Dijkstra's algorithm.
c) Each router does not have a complete view of the network topology.
d) Once a router has detected a local link failure, it generates and floods a new LSP that no
longer contains the failed link and the new LSP replaces the previous LSP in the network.
Ans: a, c
A. BGP local traffic 1. Traffic to an AS either originates or terminates within the AS.
C. BGP transit traffic 3. It connects to two or more Internet Service Providers (ISPs) or
systems.
D. Multihomed AS 4. It has has only one connection to another AS, usually to an upstream
Internet Service Provider (ISP).
Ans: a
9. An ISP is assigned the CIDR block 192.168.0.0/16. Identify the valid subnet(s) among the
following that can be allocated to its customers.
a) 192.169.0.0/16
b) 192.168.0.0/17
c) 192.168.128.0/17
d) 192.168.0.0/18
Ans: b, c, d
10. What is the default value of TTL field in BGP packets in eBGP?
a) 255
b) 1
c) 128
d) 64
Ans: b
Week-9 Assignment
Ans: c
Ans: b
3. Which switching fabric mechanism is most scalable for high-speed routers handling
large volumes of traffic?
a) Shared bus
b) Crossbar switch
c) Memory based switching
d) Circuit switching
Ans: b
4. In the context of router architecture, what does "line card" refer to?
Ans: b
5. If a router receives a new routing update from a protocol like OSPF, where is this
information first stored?
a) In the FIB
c) In the RIB
Ans: c
Ans: c
a) OpenFlow does not allow network applications to run over the connected devices.
Ans: b
8. Which of the following best describes the "Southbound API" in an SDN architecture?
b) It manages communication between the control plane and data plane, typically using
protocols like OpenFlow.
Ans: b
a) OpenFlow
b) OVSDB
c) NETCONF
d) RESTful API
Ans: d
10. In a multi-controller SDN setup, what mechanism is commonly used to ensure consistent
state across controllers?
a) Flow migration
b) Controller federation
d) Multi-path routing
Ans: b
Week-10 Assignment
Ans: c
2. Which MAC technique is most suitable for bursty traffic with sporadic transmissions?
Ans: d
3. In Go-Back-N ARQ. why must the size of the sender's window be less than 2th, where m
is the number of bits in the sequence number?
Ans: d
4. What is the minimum frame size for Ethernet (IEEE 802.3), and why is it important?
Ans: b
5. In a Selective Repeat ARQ system with a 4-bit sequence number and a sender's window
size of 8. what is the minimum size of the receiver's buffer to prevent loss of out-of-
order frames?
a) 4
b) 8
c) 16
d) 1
Ans: b
6. A wireless CSMA/CA network uses a backoff algorithm with a contention window size
that doubles after each collision. If the initial contention window size is 32, what is the
maximum contention window size after 4 collisions?
a) 256
b) 512
c) 128
d) 1024
Ans: b
7. In a shared 75 kbps channel, each station transmits a 20-bit frame every 2000 ms. If the
network uses Slotted Aloha, what is the maximum number of stations that can be
supported?
a) 7500
b) 2775
c) 7000
d) 5000
Ans: b
8. Consider a CSMA/CD network where the frame transmission time Tris much larger than
the propagation delay tp. Which of the following factors affect the efficiency of the
network?
Ans: c
9. In a round-robin MAC technique, a network has 10 stations, and each station gets a time
slot of 2 ms. If a station has a data frame of 2 KB to transmit, and the transmission rate is
1 Mbps, how many rounds will it take for the station to complete its transmission?
a) 4
b) 8
c) 16
d) 20
Ans: b
(iii) A jam signal is transmitted, and the node applies a backoff algorithm.
If the backoff limit is reached without successful transmission, what should the node do next?
Ans: c
Week-11 Assignment
1. Address Resolution Protocol (ARP) is primarily concerned with-
Ans: a
a) BOOTP is a legacy protocol used to assign IP addresses and other configuration information to
devices during startup.
b) BOOTP evolved from DHCP to support dynamic IP addressing and reusable addresses.
c) Both DHCP and BOOTP serve the purpose of providing IP addresses and configurations to
devices.
d) None of them.
Ans: b
3. Which port number does DHCP use for client-server communication at layer 2?
a) TCP 80
b) UDP 67 & 68
c) UDP 80 & 81
d) UDP 23
Ans: b
Ans: d
5. Which feature is/are concerned with trunk links in VLAN-based networks?
I. It can carry data from multiple VLANs over a single physical connection.
II. It allows VLANs to span across multiple switches, enabling seamless communication for
devices in the same VLAN, even if they are connected to different switches.
a) Only (1)
b) Only (II)
Ans: c
a) RTS/CTS mechanism
b) backoff timers
d) None of these.
Ans: a
7. Given a wireless network using CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance), where the transmission time of a data frame is 200 ms. The contention
window backoff time (in the event of a collision) always follows an exponential backoff
mechanism, with a random backoff time selected from a of 0 to 10 slots. Each slot is 10
ms. A collision happens, and the backoff time for retransmission is selected randomly
within the range of 0 to 10 slots. What is the total time spent (in ms) for the first
retransmission if the backoff is randomly selected to be 7 slots? (Ignore the time spent in
the first transmission attempt)
a) 200 ms
b) 250 ms
c) 260 ms
d) 270 ms
Ans: d
a) Layer 2
b) Layer 3
c) Layer 4
d) Layer 5
Ans: a
a) 256
b) 255
c) 234
d) 231
Ans: c
E. Handover 5.802.11s
Ans: d
Week-12 Assignment
1. In which layer of the OSI model does the HTTP (Hypertext Transfer Protocol) operate?
a) Transport Layer
b)Network Layer
c)Application Layer
Ans: c
a) A method that encodes data using transitions at the beginning of each bit period.
b) A self-clocking encoding technique with a transition in the middle of each bit period.
c) A signaling method that uses voltage levels directly to represent 1s and Os.
3. A time-division multiplexing (TDM) link transmits 4,000 frames per second, with each
time slot containing 8 bits. What is the transmission rate of this TDM circuit
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
Ans: a
Ans: b
Ans: c
6. A channel has a capacity of 1 Mbps and an SNR of 9. If the SNR is halved, what happens
to the channel capacity?
d) It is reduced to zero.
Ans: c
7. What is the primary limitation of NRZ-L when used over long distances?
Ans: c
Ans: c
9. Which of the following firewalls offers the highest level of security?
a) Packet-filtering firewall
b) Stateful firewall
c) Proxy firewall
d) NAT firewall
Ans: c
10. A firewall rule that permits outgoing HTTP traffic but denies all incoming traffic except
for established connections operates under which principle?
a) Default allow
b) Default deny
c) Least privilege
d) Fail-safe defaults.
Ans: b