CS3591-COMPUTER-NETWORKS
CS3591-COMPUTER-NETWORKS
Question Bank
1
Vision of Institution
To build Jeppiaar Engineering College as an Institution of Academic Excellence in Technical education
and Management education and to become a World Class University.
Mission of Institution
To equip students with values, ethics and life skills needed to enrich their lives and
M3
enable them to meaningfully contribute to the progress of society
M4 To prepare students for higher studies and lifelong learning, enrich them with the
practical and entrepreneurial skills necessary to excel as future professionals and
contribute to Nation’s economy
2
the knowledge of, and need for sustainable development.
M3 To produce engineers with good professional skills, ethical values and life skills for the
betterment of the society.
3
provide solutions to real time challenges of national and global society
PEO3 Apply ethical knowledge for professional excellence and leadership for the
betterment of the society.
PEO4 Develop life-long learning skills needed for better employment and
entrepreneurship
PSO1 – An ability to understand the core concepts of computer science and engineering and to
enrich problem solving skills to analyze, design and implement software and hardware based
systems of varying complexity.
PSO2 - To interpret real-time problems with analytical skills and to arrive at cost effective and
optimal solution using advanced tools and techniques.
PSO3 - An understanding of social awareness and professional ethics with practical proficiency
in the broad area of programming concepts by lifelong learning to inculcate employment and
entrepreneurship skills
4
CS3591-Computer 2023-
SYLLABUS
CS3591 COMPUTER NETWORKS LTPC3024
UNIT I INTRODUCTION AND APPLICATION LAYER 10
Data Communication - Networks - Network Types - Protocol Layering - TCP/IP Protocol suite - OSI Model -
Introduction to Sockets - Application Layer protocols: HTTP - FTP - Email protocols (SMTP - POP3 - IMAP -
MIME) - DNS - SNMP
UNIT IV ROUTING 7
Routing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State Routing - OSPF
- Path-vector routing - BGP - Multicast Routing: DVMRP - PIM.
45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO 1: Explain the basic layers and its functions in computer networks. CO 2:
Understand the basics of how data flows from one node to another. CO 3:
Analyze different routing algorithms.
CO 4: Describe protocols for various functions in the network. CO 5:
Analyze the working of various application layer protocols.
TEXT BOOKS
1. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the Internet,
Eighth Edition, Pearson Education, 2021.
2. Behrouz A. Forouzan, Data Communications and Networking with TCP/IP Protocol Suite, Sixth Edition
TMH, 2022
REFERENCES
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition, Morgan
Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”,
Page 1
CS3591-Computer 2023-
McGraw Hill, 2012.
Page 2
CS3591-Computer 2023-
CS3591: Computer Networks
Corresponding Lab, with code (If any): Nil
Course Prerequisites: -
Course Outcomes
On successful completion of this course, the student will be able to
C301. Understand the concept of layering in networks and basic application layer protocols
1
C301. Familiar with the Transport layer protocols like UDP, TCP and SCTP and their functions
2
C301. Understand switching in Internet, IP addressing protocol versions 4 and 6, Supporting
3
C301. Intra domain routing and Inter domain routing protocols and multicast routing protocols
4
C301. Familiar with the services provided by Datalink layer and Physical Layer.
5
Page 3
CS3591-Computer 2023-
2. UDP L2 2 T2
3. TCP: Connection Management, Flow control L2 2 T2
4. Congestion Control L2 2 T2
5. Congestion Avoidance – DECbit, RED L2 1 R1
6. SCTP L2 1 T2
7. Quality of Service L2 1 T2
Page 4
CS3591-Computer 2023-
UNIT IV-ROUTING
Knowledge No. of Hrs Books
S. Topic
level to Referre
No
be handled d
1. Routing and Protocols L1,L2 1 T2
2. Unicast Routing – Distance Vector Routing L2 1 T2
3. RIP L2 1 T2
4. Link State Routing – OSPF L2 2 T2
5. Path Vector Routing L2 1 T1
6. BGP L2 1 R1
7. Multicast Routing: DVMRP, PIM L2 2 T2
L1- Remember; L2- Understand; L3- Apply; L4- Analyze; L5- Evaluate; L6- Create
Page 5
CS3591-Computer 2023-
Page 6
CS3591-Computer 2023-
6 What are the five components of data communications C301.1 BL2
system?
The five components are Message, Sender, Receiver, Transmission
Medium and Protocol.
Page 7
CS3591-Computer 2023-
7 Define link and state the types of connection. C301.1 BL1
A link is the communication pathway that transfers data from one
device to another. The two possible types of connections are point
to point and multipoint
8 Define point to point and Multipoint. C301.1 BL1
Point to point: A point to point connection provides a dedicated
link between two devices.
Multipoint: A multipoint connection is one in which more than
two specific devices share a single link.
9 What is Network topology? List its types. C301.1 BL1
Network topology is the interconnected pattern of network
elements. A network topology may be physical, mapping
hardware configuration, or logical, mapping the path that the data
must take in order to travel around the network. The types are
Bus topology, Star topology, Mesh topology and Ring Topology.
10 What are the four main properties of HTTP? C301.1 Bl1
● Global Uniform Resource Identifier.
● Request-response exchange.
● Statelessness.
● Resource metadata.
11 What is a protocol? What are the key elements of a protocol? C301.1 BL1
(Nov
15)
Protocol is the set of rules governing the exchange of data
between two entities. It defines what is communicated, how it is
communicated, when it is communicated. The Key elements of a
Protocol are as follows,
● Syntax – It refers to the structure or format of data meaning the
order in which they are presented.
● Semantics – It refers to the meaning of each section of bit. How
to do interpretation.
● Timing – When data should be sent and how fast they can be
sent.
12 Define File Transfer Protocol. (Nov 21) C301.1 BL1
The File Transfer Protocol is a standard communication protocol
used for the transfer of computer files from a server to a client on
a computer network. FTP is built on a client–server model
architecture using separate control and data connections between
the client and the server.
Page 8
CS3591-Computer 2023-
13 What is WWW and SMTP? (Nov 10,15 ) (May 15) C301.1 R
World Wide Web is an internet application that allows user to view
pages and move from one web page to another.
Page 9
CS3591-Computer 2023-
It helps to store and share data across varied distances. The
TCP/IP protocol that supports electronic mail on the Internet is
called Simple Mail Transfer (SMTP). It is a system for sending
messages to other computer users based on e-mail addresses.
14 List the two types of DNS message. (May 16) C301.1 BL1
There are two types of DNS messages – Query and Response
● Query message – consists of the header and question records.
● Response message – consists of header, question record,
authoritative record and additional record.
15 What is a layered Network Architecture? C301.1 BL1
A layer is created when a different level of abstraction occurs at
protocol. Each layer should perform a well-defined function.
Function of each layer should be chosen using internationality
standardized protocols. Boundaries between should be chosen to
minimize information flow across the interfaces.
16 Compare OSI and TCP/IP models. C301. BL2
OSI Model TCP / IP Model 1
It distinguishes It does not distinguish between
between Service, Interface, Protocol
Service, Interface, Protocol
Protocols are well hidden Protocols are not just hidden
Dejure standard Fit Model Defacto standard Fit Model
In transport layer In Transport layer choice is for
only connection- connection oriented
oriented services and
are available connectionless
Contains 7 layers Contains 5 layers
17 How do layers of the internet model correlate to the layers of C301. BL2
the 1
OSI model?
OSI TCP/IP
Physical Layer Physical Layer
Data Link Layer Network Access Layer
Network Layer IP Layer
Transport Layer TCP Layer
Session Layer
Presentation Layer Application Layer
Application layer
18 Describe why HTTP is defined as a stateless protocol. C301.1 BL2
Maintaining state across request – Response
Page 10
CS3591-Computer 2023-
connections significantly increases the initial
interactions in a connection, since the identity of each party needs
to be established and any saved
state much be retrieved. HTTP is therefore stateless to ensure that
Page 11
CS3591-Computer 2023-
internet is scalable since state is not contained in a HTTP request /
response pair by default.
19 What are the four groups of HTTP Headers? What are the two C301. BL1
methods of HTTP? (May 15) (Nov 15) 1
The four groups of HTTP headers are
●General headers
●Entity Headers
●Request Headers
●Response Headers.
Two methods of HTTP are Get Method( ) Post Method( )
20 Justify the need for layer five in the OSI model. (Nov 21) C301. BL2
Layer 5 of the OSI Model: Session Layer is the layer of the ISO 1
Open Systems Interconnection (OSI) model that controls the
dialogues (connections) between computers. It establishes,
manages, and terminates the connections between the local and
remote application.
21 What are the functions of Application Layer? (Apr 11) C301.1 BL1
It enables the user (human/software) to access the network. It
provides user interfaces and support for services such as
electronic mail, remote file access and transfer, shared database
management and other types of distributed information services.
Services provided by the application layer are Network Virtual
terminal, File transfer, access and management. Mail services,
Directory
services.
22 Define anonymous FTP. (May / June 2021) C301. BL1
An anonymous FTP is where users are given access to a distributed 1
file where they do not need to sign in with a specific
username and password.
23 What are the transmission modes of FTP? C301. BL1
Stream mode: Default mode and data is delivered from FTP to TCP 1
as a continuous stream of data.
Block mode: Data is delivered from FTP to TCP in terms of blocks.
Each data block follows the three-byte header.
Compressed mode: File is compressed before transmitting if size
is big. Run length encoding method is used for compression.
Page 12
CS3591-Computer 2023-
24 Why is an application such as POP needed for electronic C301. BL2
messaging? (May 12) 1
Workstations interact with the SMTP host, which receives the mail
on behalf of every host in the organization, to retrieve messages
by using a client-server protocol such as Post Office Protocol.
Although POP3 is used to download messages from the server, the
Page 13
CS3591-Computer 2023-
SMTP client still needed on the desktop to forward messages from
the workstation user to its SMTP mail server.
25 What is the difference between IMAP and POP? (May / June C301. BL2
2021) 1
POP IMAP
POP allows IMAP allows the user to see all
downloading the folders on the mail server.
messages from your Inbox to
your local computer
The mail can only be accessed Messages can be
from a single device at a time. accessed
across multiple devices
To read the mail it has to be The mail content can be read
downloaded on the partially before downloading.
local system
The user cannot organize The user can organize the
mails in the mailbox of the emails directly on the mail
mail server.
server.
26 What is the use of MIME Extension? C301.1 BL2
Multipurpose Internet Mail Extensions (MIME) is a
supplementary protocol that allows non-ASCII data to be sent
through SMTP. MIME transforms non-ASCII data at the sender site
to NVT ASCII data and deliverers it to the client SMTP to be sent
through the Internet. MIME converts binary files, executed
files into text files. Then only it can be transmitted using SMTP
27 How are the subgroups of the OSI model layers segregated by C301.1 BL1
their functions? (May / June 2021)
The lower 4 layers (transport, network, data link and physical)
are concerned with the flow of data from end to end through the
network and hence are called as network support layers. The
upper four layers of the OSI model (application, presentation and
session) are orientated more toward services to the applications
and hence are called user support layers.
28 Identify the Port number of Hyper Text Transfer Protocol and C301.1 BL1
Telnet. (Nov 21)
By default, these two protocols are on their standard port number
of 80 for HTTP and 443 for HTTPS. For telnet port number is 23.
29 Discuss the three main division of the domain name space. C301.1 BL1
(May
12)
Page 14
CS3591-Computer 2023-
Domain name space is divided into three different sections: generic
domains, country domains & inverse domain.
● Generic domain: Define registered hosts according to their
generic behavior, uses generic suffixes.
Page 15
CS3591-Computer 2023-
● Country domain: Uses two characters to identify a country as
the last suffix.
Inverse domain: Finds the domain name given the IP address.
30 Define SNMP. (May 12) C301.1 BL1
Simple Network Management Protocol (SNMP) is an "Internet-
standard protocol for managing devices on IP networks". Devices
that typically support SNMP include routers, switches, servers,
workstations, printers, & modem. It is used mostly in network
management systems to monitor network-attached devices for
conditions that warrant administrative attention.
31 List the two types of DNS message. (May 16) C301.1 BL1
There are two types of DNS messages,
● Query
● Response
Query message – consists of the header and question records.
Response message – consists of header, question
record, authoritative record and additional record.
PART-B
1 Explain different types of networks in detail with neat diagram C301.1 BL1
(Nov/Dec 2021)
3 Discuss in detail about the layers in OSI model. C301.1 BL2
(Nov
10,11,12,15,19) (May 12) (May / June 2021)
4 Explain in detail about the TCP/IP protocol suite with neat C301.1 BL1
diagram
5 Discuss how the Simple Mail Transfer Protocol (SMTP) is useful in C301.1 BL2
electronic mail. (May 12,15) (Nov 13,15) (Nov 19)
(May/June 2021)
(Nov 21)
6 Explain the role of a DNS on a computer network, including its C301.1 BL1
involvement in the process of a user accessing a web page. (May
13) (Nov 15, 19) (Nov 21)
7 Explain about HTTP. Give their uses, state strengths and C301.1 BL1
weaknesses. (Nov 10,13)
8 Explain about FTP. (Nov 12, 13, 19), May 13) C301.1 BL1
Page 16
CS3591-Computer 2023-
Congestion Control - Congestion avoidance (DECbit, RED) - SCTP - Quality of Service
PART-A CO Knowledge
Statem Level(R/U/
e Ap
Page 17
CS3591-Computer 2023-
nt /An/E/C)
1 Give any two Transport layer service. (Dec 12) C301.2 BL1
Multiplexing: Transport layer performs multiplexing/de-
multiplexing function. Multiple applications employ same
transport protocol, but use different port number. According to
lower layer n/w protocol, it does upward multiplexing or
downward multiplexing.
Reliability: Error Control and Flow Control.
2 How IANA has divided port numbers? C301.2 BL2
IANA (Internet Assigned Number Authority) has divided port
numbers into three ranges: 1) Well Known ports
2) Registered ports 3) Dynamic Ports.
3 List few well known ports for UDP. C301.2 BL1
Po Protoco Description
rt l
7 Echo Echoes a received datagram back to the sender
9 Discard Discards any datagram received
11 Users Active Users
13 Daytime Returns Date and Time
4 How congestion occurs in a network? (May / June 2021) C301.2 BL2
The routers / switches in a network have a limited buffer size to
store the received packets. If the packets arrive at a faster rate
than what the receiver can store, then the packets are dropped
leading
to congestion.
5 What is a Port? (Nov 21) C301.2 BL1
In computer networking, a port is a communication endpoint. At
the software level, within an operating system, a port is a logical
construct that identifies a specific process or a type of network
service.
6 Give the datagram format of UDP? C301. BL1
The basic idea of UDP is for a source process to send a message to 2
a port and for the destination process to receive the message from
a port.
Source Port Destination Port
Address Address
16 bits 16 bits
Page 18
CS3591-Computer 2023-
Total Length Checksum
16 bits 16 bits
Page 19
CS3591-Computer 2023-
7 What is the main difference between TCP & UDP? C301. BL2
2
TCP UDP
It provides connection- Provides connectionless service.
oriented service
Connection No connection
establishment
Establishment and no delay
delay will be there
Provides reliable service Provides unreliable, but fast
service
It is used by FTP, SMTP It is used by DNS, SNMP, audio,
video and
multimedia
applications.
8 Name the techniques and policies that can prevent (avoid) C301.2 BL1
congestion.
Techniques to avoid congestion:
● DEC (Digital Equipment Corporation) bit.
● Random Early Detection (RED).
● Source based congestion avoidance.
The congestion may be avoided by two policies:
● BECN - Backward Explicit Congestion Notification
● FECN - Forward Explicit Congestion Notification.
9 List out various congestion control techniques. C301.2 BL1
AIMD (Additive Increase Multiplicative Decrease), Slow start, Fast
retransmit, Fast Recovery
10 What are the advantages of using UDP over TCP? (Nov 10) C301.2 BL1
UDP is very useful for audio or video delivery which does not need
acknowledgement. It is useful in the transmission of multimedia
data. Connection Establishment delay will occur in TCP.
11 What is the use of UDP’s Pseudo header? C301.2 BL1
The pseudo header consists of three field from the IP header
protocol number, source IP address and destination IP address
plus the UDP length field (which is included twice in checksum
calculation). The pseudo header is used to check whether the
message is delivered between 2 endpoints.
Page 20
CS3591-Computer 2023-
12 What are the four aspects related to the reliable delivery of C301.2 BL1
data?
(May 12)
The four aspects are
(i) Error control,
(ii) Sequence control
(iii) Loss control
(iv) Duplication control.
Page 21
CS3591-Computer 2023-
13 Outline Stop and Wait ARQ mechanism. (Nov 19) C301.2 BL1
In the stop-and-wait ARQ mechanism, sender sends one frame at a
time; it is a special case of the general sliding window protocol
with transmit and receive window sizes equal to
one in both cases.
14 What do you mean by slow start in TCP congestion? (May C301.2 BL1
16)
TCP slow start is an algorithm which balances the speed of a
network connection. Slow start gradually increases the amount of
data transmitted until it finds the network’s maximum carrying
capacity.
15 Differentiate congestion control and flow control. (Nov C301 BL2
13,15) .2
Congestion Control Flow Control
Congestion control Flow control means preventing the
means preventing the source from sending data that the
source from sending receiver will end up dropping
data that will end up because it runs out of buffer space.
getting dropped by a
router
because its queue is full.
This is more This is fairly easy with a sliding
complicated, because window protocol
packets from different
sources travelling
different paths can
converge on the same
queue.
16 List the different phases used in TCP Connection. (May 16) C301.2 BL1
The different phases used in TCP connection are Connectio
establishment Phase, Data transfer and Connection Terminatio
Phase
17 List the advantages of Connection oriented services over C301.2 BL1
connectionless services. (May 17)
Connection
Oriented:
Advantages:
1. Buffers can be reserved in advance
2. Sequencing can be
Page 22
CS3591-Computer 2023-
guaranteed. Short headers.
18 How do fast retransmit mechanism of TCP works? (May 17) C301.2 BL2
Fast Retransmit is an enhancement to TCP that reduces the time
sender waits before retransmitting a lost segment. A TCP sende
uses a timer to recognize lost segments. If an acknowledgement i
not received for a particular segment within a specified time (
Page 23
CS3591-Computer 2023-
function of the estimated round-trip delay time), the sender wil
assume the segment was lost in the network, and will retransmit th
segment.
Page 24
CS3591-Computer 2023-
23 What are the two categories of QoS attributes? C301.2 BL1
User Oriented and Network Oriented. User related attributes are
Page 25
CS3591-Computer 2023-
SCR – Sustainable Cell Rate
PCR – Peak Cell Rate
MCR- Minimum Cell Rate
CVDT – Cell Variation Delay Tolerance.
The network related attributes are, Cell loss ratio (CLR), Cell
transfer delay (CTD), Cell delay variation (CDV), Cell error ratio
(CER).
UNIT-II / PART-B
1 Write short notes on (May 12) (Nov 19) (Nov 21) C301.2 BL1
(i) TCP segment format (ii) Silly window syndrome (Or) discuss
the silly window syndrome and explain how to avoid it.
2 With neat architecture, Explain TCP and its sliding window C301.2 BL2
algorithm for flow control. (Nov 15)
3 Describe with examples the three mechanisms by C301.2 BL2
which
congestion control is achieved in TCP. (Nov 13,15)(May
15,16)(Nov 19)
4 Discuss congestion avoidance algorithm like DEC bit method and C301.2 BL2
random early detection in transport layer with an example.(May
12,17)
5 What are the 2 broad categories of congestion control C301.2 BL1
mechanisms?
Briefly explain all the techniques. (May / June 2021)
6 Explain connection establishment and connection closing in TCP C301.2 BL2
(Or) Describe how reliable and ordered delivery is achieved
through TCP. (Nov 13) (May 15)
7 Explain the significance of Clark’s solution and Nagle’s algorithm. C301.2 BL4
(Or) What is the need for Nagle’s algorithm? How does it
determine when to transmit data? (May 13)
8 Define UDP. Discuss the operations of UDP. Explain UDP C301.2 BL2
checksum with one example. (Nov 21)
9 Discuss the effectiveness of Go Back N and Selective Repeat ARQ C301.2 BL2
among the Sliding window Protocols. (Nov 21)
10 Explain SCTP in Detail (May 17) C301.2 BL2
11 Explain the association establishment of SCTP through four-way C301.2 BL2
handshake in detail.
12 Furnish the packet format of Stream Control Transmission C301.2 BL1
Protocol with its fields. How the data are transferred using 4-way
handshaking? (May / June 2021)
Page 26
CS3591-Computer 2023-
13 Explain the various approaches to improve quality of services in a C301.2 BL2
data transmission network.
Page 27
CS3591-Computer 2023-
UNIT III NETWORK LAYER
Switching: Packet Switching - Internet protocol - IPV4 - IP Addressing - Subnetting - IPV6, ARP, RARP,
ICMP, DHCP
UNIT-III / PART-A CO Knowledge
Statem Level
e nt (R/U/Ap
/An/E/C)
1 What is packet switching? (Nov 12) C301.3 BL1
In a packet-switched network, it’s not necessary to dedicate
transmission capacity along a path through the network. Rather,
data are sent out in a sequence of small chunks, called packets.
2 What is subnetting? (Nov 11,15) C301.3 BL1
The whole network can’t manage by single server, so that the
entire network divided into small network in order to manage the
network easily. Subnetting provides an elegantly simple way to
reduce the total number of network numbers that are assigned.
The idea is to take a single IP network number and allocate the IP
address with that network to several physical networks, which
are
now referred to as subnets.
3 What is subnet mask? C301.3 BL1
A subnet mask is a number that defines a range of IP addresses
available within a network. A single subnet mask limits the
number of valid IPs for a specific network. Multiple subnet masks
can organize a single network into smaller networks (called
subnetworks or subnets).
4 Define CIDR? C301.3 BL1
CIDR, which stands for Classless Inter-Domain Routing, is an IP
addressing scheme that improves the allocation of IP addresses. It
replaces the old system based on classes A, B, and C. This helped
to extend the life of IPv4 as well as slow the growth of routing
tables.
5 How many network addresses and host addresses are C301.3 BL1
supported by class A, class B networks?
Class A: Number of networks = 127 Number of hosts = 224 -1
Class B: Number of networks = 214 -1
Number of hosts = 216 – 1 = 65,535
6 List out the functions of IP. C301.3 BL1
Page 28
CS3591-Computer 2023-
IP services are unreliable, best-effort, connectionless packet
delivery system. Unreliable – delivery is not guaranteed,
Connectionless – each pocket is treated independent from others,
Page 29
CS3591-Computer 2023-
Best-effort delivery – it makes an earnest attempt to deliver
packets. It defines basic unit of data transfer through TCP/IP.
7 What do you mean by ICMP? C301.3 BL1
ICMP is an error reporting mechanism. It does not specify the
action to be taken for each possible error. The source must relate
the error to an individual application program and take other
actions to correct the problem.
8 To whom ICMP reports error message will be sent? C301.3 BL2
ICMP allows routers to send error messages to other router or
hosts. ICMP is an error reporting mechanism. It does not specify
the action to be taken for each possible error. It is informing the
source that the error has occurred and the source has to take
actions to rectify the errors.
9 When ICMP redirect message is used? (May 17) C301.3 BL2
An ICMP redirect is an error message sent by a router to the
sender of an IP packet Redirects are used when a router believes a
packet is being routed sub optimally and it would like to inform
the sending host that it should forward the subsequent packets to
that same destination through a different gateway.
10 State the rules of non-boundary-level masking? (May 12) C301.3 BL3
● The bytes in the IP address that corresponds to 255 in the
mask will be repeated in the sub network address.
● The bytes in the IP address that corresponds to 0 in the mask
will change to 0 in the sub network address.
● For other bytes, use the bit-wise AND operator.
Example-
IP address 45 123 21 8
Mask 255 192 0 0
Subnet 45 64 0 0
123 01111011
192 11000000
64 01000000
11 How many network addresses and host addresses are C301.3 BL2
supported by class A, class B networks?
Class A: Number of networks = 127 Number of hosts = 224 -1
Class B: Number of networks = 214 -1
Number of hosts = 216 – 1 = 65,535
Page 30
CS3591-Computer 2023-
12 What is the network address in a class A subnet with the IP C301.3 BL2
addresses of one of the hosts as 25.34.12.56 and
Page 31
CS3591-Computer 2023-
fields, with each field bounded by a colon. Each field must contain
a hexadecimal number, in contrast to the dotted-decimal notation
Page 32
CS3591-Computer 2023-
of IPv4 addresses. In the below figure, the x's represent
hexadecimal numbers.
18 C301. BL1
What are the differences between IPV4 and IPV6? (Nov 21)
3
IPV4 IPV6
A 32-bit numeric address in IPv6 addresses are 128-bit IP
IPv4 is written in decimal as address written in hexadecimal
four numbers separated by and separated by colons. An
periods. Each number can be example IPv6 address could be
zero to 255. written like this:
For eg, 3ffe:1900:4545:3:200:f8ff:fe2
1.160.10.240 could be an 1:67
IP address.
cf
19 Identify the class of the following IP Address: (May / June C301.3 BL2
2021)
11000001 10000011 00011011 11111111 = Class C
252.5.15.111 = Class D
20 Why is IPV4 to IPV6 transition required? (May 17) C301.3 BL2
IPv4 and IPv6 networks are not directly interoperable, transition
technologies are designed to permit hosts on either network type
to communicate with any other host.
21 C301. BL2
Compare ARP and RARP.
3
ARP RARP
Address Resolution Protocol. Reverse Address Resolution
Protocol.
Retrieves the physical address Retrieves the logical address for
of the receiver. a computer from the server.
22 What is the need of ARP? (Nov/Dec 2015) C301.3 BL2
ARP is used to find the physical address of the node when its
Internet address is known. Any time a host/router needs to find
the physical address of another host on its network, it formats an
ARP query packet that includes the IP address and broadcasts it.
All hosts in the network process the ARP packet but only the
required station sends back physical address.
23 Define RARP. C301.3 BL1
Allows a host to discover its internet address when it knows only
its physical address (a diskless computer). The host wishing to
retrieve its internet address broadcasts an RARP query packet
Page 33
CS3591-Computer 2023-
that
contains its physical address to every host on its physical network.
Page 34
CS3591-Computer 2023-
A server on the network recognizes the RARP packet and returns
the host’s internet address.
24 How many network addresses and host addresses are C301.3 BL1
supported by class A, class B networks?
● Class A: Number of networks = 127
Number of hosts = 224 -1
● Class B: Number of networks = 214 -1
Number of hosts = 216 – 1 = 65,535
25 List the difference between Packet Switching and Circuit C301. BL1
Switching. (Apr/May 2011, Nov/Dec 2011, May/June 2014) 3
transmission
delay
Addressing Each packet contains Only data is sent
the full source and
destination address
Bandwidth Dynamic Bandwidth Fixed Bandwidth
Routing Each packet is routed Entire data is
independently sent
through the same path
Congestion Difficult Easy if enough buffers
control can be located in
advance for each VC
set
up
Complexity In the transport layer In the network layer
Suited for Connection-oriented Connection-oriented
and service
connectionless
service
UNIT-III / PART-B
1 Explain Packet Switching in detail. C301.3 BL2
Page 35
CS3591-Computer 2023-
2 i) Discuss the IP addressing methods. (May/June2014) C301.3 BL2
ii) Write short notes on ARP. (May/June2014) or Explain in detail
ARP. (Nov/Dec 2015)
3 Explain in detail about DHCP. (Nov/Dec 2015) C301.3 BL2
4 What is the need for ICMP? Mention ICMP MESSAGES and their C301.3 BL1
purpose. (May/June 2013)
5 Explain about IPV6? Compare IPV4 and IPV6 (May 16)(Nov C301.3 BL2
21)
Page 36
CS3591-Computer 2023-
6 Discuss about address Resolution protocols. (Nov/Dec 2013) C301. BL2
3
7 Explain in detail about: i) ICMP ii) ARP iii) RARP. (Nov 19) C301. BL2
3
8 Explain IPv4 packet format and how fragmentation is applied in C301. BL3
datagram delivery. 3
9 Draw an IPv4 datagram and explain about the fields present in it. C301. BL2
3
UNIT IV ROUTING
Routing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State Routing - OSPF
- Path-vector routing - BGP - Multicast Routing: DVMRP - PIM.
UNIT IV - PART A CO Knowledge
Statem Level(R/U/
e nt Ap
/An/E/C)
1 Define routing. (Nov12,15) C301.4 BL1
It is the process of building up the tables that allow the collect
output for a packet to be determined. It is a lot harder to create
the forwarding tables in large, complex networks with
dynamically changing topologies and multiple paths between
destinations. Routing is a process that takes place in the
background so that, when a data packet turns up, we will have
the right information
in the forwarding table to be able to forward, or switch, the
packet.
2 Write on the packet cost referred in distance vector and link C301. BL1
state routing. (May 2012) 4
In distance vector routing, cost refer to hop count while in case of
link state routing, cost is a weighted value based on a variety of
factors such as security levels, traffic or the state of the link.
3 What is source routing? (Nov 13) C301. BL1
Rotation, stripping off and using pointers are the different types 4
of source routing approach.
4 What is the function of a router? (Nov 10)(Nov 21) C301. BL1
Routers relay packets among multiple interconnected networks. 4
They route packets from one network to any of a number of
potential destination networks on internet. A router operates at
the physical, data link and network layer of the OSI model.
5 Write the difference between Distance vector routing and Link C301. BL2
state routing. 4
Distance Vector Routing Link state routing
Basic idea is each node sends Basic idea is every node
its knowledge about the sends its knowledge about its
Page 37
CS3591-Computer 2023-
entire network to its neighbors to the
neighbors. entire
network
It is dynamic routing It is dynamic routing
RIP uses Distance OSPF uses link state routing
vector
routing
Page 38
CS3591-Computer 2023-
6 What does a router do when it receives a packet with a C301.4 BL1
destination address that it does not have an entry for, in
its routing table?
Default Router: If IP Software is not able to find the destination, from
routing table then it sends the datagram to default router. It is useful
when a site has small set of local address connected to it and connected
to the rest of the Internet.
7 What is piggybacking? (Nov 19) C301.4 BL1
The technique of temporarily delaying outgoing acknowledgment
so that they can be hooked onto the next outgoing data frame is
widely known as piggybacking.
8 Explain Multicast routing? C301.4 BL2
Multicast IP Routing protocols are used to distribute data for
example, audio/video streaming broadcasts) to multiple recipients.
Using multicast, a source can send a single copy of data to a single
multicast address, which is then distributed to an entire
group of recipients.
9 What is RIP? C301.4 BL1
RIP (Routing Information Protocol) is a widely-used protocol for
managing router information within a self-contained network
such as a corporate local area network or an interconnected group
of such LANs. Using RIP, a gateway host (with a router) sends its
entire routing table (which lists all the other hosts it knows about)
to its closest neighbor host every 30 seconds.
10 Explain about OSPF. C301.4 BL2
OSPF (Open Shortest Path First) is a router protocol used within
larger autonomous system networks in preference to the Routing
Information Protocol (RIP), an older routing protocol that is
installed in many of today's corporate networks.
11 What is PIM? C301.4 BL1
Protocol-Independent Multicast (PIM) is a family of
multicast routing protocols for Internet Protocol (IP) networks
that provide one-to-many and many-to-many distribution of data
over a LAN, WAN or the Internet. It is termed protocol-
independent because PIM does not include its own topology
discovery mechanism, but instead uses routing information
supplied by other routing protocols.
PIM Source-Specific Multicast, Bidirectional PIM
PIM Dense Mode, PIM Sparse Mode
12 What is DVMRP? C301.4 BL1
The Distance Vector Multicast Routing Protocol (DVMRP), is a
routing protocol used to share information between routers to
Page 39
CS3591-Computer 2023-
facilitate the transportation of IP multicast packets among
networks. The protocol is based on the RIP protocol. The router
Page 40
CS3591-Computer 2023-
generates a routing table with the multicast group of which it has
knowledge with corresponding distances. When a multicast
packet is received by a router, it is forwarded by the router's
interfaces specified in the routing table.
13 What are the metrics used by routing protocols? (Apr/May C301. BL1
2015) Path length, bandwidth, load, hop count, path cost, delay, 4
Maximum Transmission Unit (MTU), reliability
and
communications cost.
14 Define Unicasting, Broadcasting and Multicasting. (Nov/Dec C301. BL1
2011) 4
Unicasting: Transmitting data from a single sender to a single
receiver.
Broadcasting: Transmitting data from a single source to all the
other nodes in the network
Multicasting: Transmitting data from a single source to a group of
destination nodes.
15 Explain BGP. C301. BL2
BGP stands for Border Gateway Protocol. It can be defined as a 4
standardized exterior gateway protocol which is developed to
interchange routing information and reachability information
between various autonomous systems (AS) on the Internet. It is
classified as a path vector protocol as well as a distance-vector
routing protocol.
16 What is a path vector routing protocol? C301. BL1
A path-vector routing protocol is a network routing protocol 4
which maintains the path information that gets updated
dynamically. Updates that have looped through the network and
returned to the same node are easily detected and discarded.
17 What is count to infinity problem in distance vector routing? C301. BL2
1. One of the important issues in Distance Vector Routing is 4
County of Infinity Problem.
2. Counting to infinity is just another name for a routing loop.
3. In distance vector routing, routing loops usually occur when an
interface goes down.
4. It can also occur when two routers send updates to each other
at the same time.
18 What techniques are used to overcome the count to infinity C301. BL1
issue in distance vector routing? 4
Split horizon technique and split horizon with poison reverse
technique are used to overcome count to infinity issue in distance
vector routing.
Page 41
CS3591-Computer 2023-
19 What are the contents of a link spate packet (LSP)? C301. BL1
LSP contains the following information: 4
1. The ID of the node that created the LSP
2. A list of directly connected neighbors of that node, with the
Page 42
CS3591-Computer 2023-
cost of the link to each one
3. A sequence number
4. A time to live for this packet
20 What is the main difference between BGP and Distance vector C301. R
routing. 4
BGP differs from Distance Vector and Link State routings as it
advertises complete paths as an enumerated list of ASs to reach a
particular network.
UNIT IV - PART B
1 Explain what is Distance Vector Routing and Demonstrate how C301.4 BL2
distance table gives routing table (Nov 21)
2 Discuss about Link-state routing and routers. (Nov 12) (May C301.4 BL2
15)
3 Explain about the inter domain routing (BGP) routing algorithms. C301.4 BL2
4 Explain the Routing Information protocol/Distance vector C301.4 BL2
routing in detail. (Nov 13,15) (May 15,16)(Nov
19)
5 What are the different routing algorithms? List out their pros and C301.4 BL1
cons. (May / June 2021)
6 Explain Link state routing with Dijkstra's algorithm for the C301.4 BL3
following graph.
7 Explain Distance Vector Routing Algorithm for the graph given C301.4 BL3
below.
Page 43
CS3591-Computer 2023-
UNIT V - PART A CO Knowledge
Statem Level(R/U/
e nt Ap
/An/E/C)
1 List out the functions of data link layer (May / June 2021) C301. BL1
5
Page 44
CS3591-Computer 2023-
Data link layer deals with node-to-node delivery of data. The
services provided by the data link layer include: framing, flow
control, error control and access control.
2 What do you mean by framing? (Nov/Dec2013 and Nov/Dec C301.5 BL1
2014)
The data link layer divides the stream of bits received from the
network layer into manageable data units called frames. The ways
to address the framing problem are
● Byte-Oriented Protocols (PPP)
● Bit-Oriented Protocols (HDLC)
● Clock-Based Framing (SONET)
3 What are the two types of errors occurred during data C301.5 BL1
transmission? (May/June 2012)
Single bit error and burst error
4 Compare error detection and correction. (Nov/Dec 2012) C301. BL2
Error Detection Error Correction 5
Only the occurrence of an The exact number of bits that
error is checked are corrupted and location of
error in the message are
known.
5 Define bit stuffing. (Apr/May 2011) C301.5 BL1
HDLC denotes both the beginning and the end of a frame with the
distinguished bit sequence 01111110. This sequence might
appear anywhere in the body of the frame, it can be avoided by bit
stuffing. On the sending side, any time five consecutive 1’s has
been transmitted from the body of the message (i.e., excluding
when the sender is trying to transmit the distinguished 01111110
sequence), the sender inserts a 0 before transmitting the next bit.
6 What do you mean by Flow Control? (Nov/Dec 2011) C301.5 BL1
Flow control is a technique for assuring that a transmitting entity
does not overwhelm a receiving entity with data. It is a feedback
mechanism by which the receiver is able to regulate the sender.
Such a mechanism is used to keep the sender from overrunning
the receiver, i.e., from transmitting more data than the receiver is
able to process
Page 45
CS3591-Computer 2023-
7 Why is flow control and error control duplicated in different C301.5 BL2
layers?
Like the data link layer, the transport layer is responsible for flow
and error control. Flow control and error control at data link layer
Page 46
CS3591-Computer 2023-
is node-to-node level. But at transport layer, flow control and error
control is performed end-end rather than across a single link.
8 Differentiate between lost frame and damaged frame? C301. BL2
Lost Frame Damaged Frame 5
Lost frame is the frame that The damaged frame is
fails to arrive at the other side. a recognizable frame
does arrive,
but some of the bits are in
error
9 What is the difference between stop and wait and sliding C301. BL2
window protocol? (Nov/Dec 2012) 5
Page 47
CS3591-Computer 2023-
13 Define hidden node problem. (May 16) C301.5 BL1
In wireless networking, the hidden node problem or hidden
terminal problem occurs when a node is visible from a wireless
access point (AP), but not from other nodes communicating with
that AP. This leads to difficulties in media access control sub layer.
14 What is the access method used by wireless LAN? (May 14) C301.5 BL1
Page 48
CS3591-Computer 2023-
The access method used by wireless LAN is Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA)
15 What is meant by Exponential back of algorithm? C301.5 BL1
After first collision, each station waits either 0 or 1 slot time
before trying again. If two stations collide and each one picks
same random number 0/1. After second collision, each one picks
0, 1, 2 or 3 slot at random and waits. If collision occurs again, then
next time the number of slots to wait is chosen at random from 0
to [23 – 1]. This algorithm is called binary exponential “back off
algorithm”.
16 What is High Level data link control? (Nov 21) C301.5 BL1
High-Level Data Link Control is a bit-oriented code-transparent
synchronous data link layer protocol developed by the
International Organization for Standardization. The standard for
HDLC is ISO/IEC 13239:2002. HDLC provides both connection-
oriented and connectionless service.
17 Give the format of Ethernet address. C301. BL1
Pream De Src Typ Body CRC 5
bl e st addr e
64 ad 32
dr 48 16
48
18 Outline the use of cyclic redundancy check. (Nov 19) C301.5 BL2
A cyclic redundancy check (CRC) is an error-detecting code
commonly used in digital networks and storage devices to detect
accidental changes to raw data.
19 What is CSMA/CD? (Nov 11) C301.5 BL1
Carrier Sense Multiple Access with Collision Detection is one of
the methods of medium access. It is used to sense whether a
medium is busy before transmission. If the medium is busy, it
refrains from transmitting the data or else proceeds with the
transmission. Also has the ability to check whether a transmission
has collided with another.
20 Examine how Network Interface Card works. (Nov 21) C301.5 BL2
A Network Interface Card provides a computer with a dedicated,
full-time connection to a network. It implements the physical
layer circuitry necessary for communicating with a data link layer
standard, such as Ethernet or Wi-Fi.
Page 49
CS3591-Computer 2023-
21 List the rules for CSMA/CD. C301.5 BL1
1. If the medium is idle, transmit; otherwise go to step 2.
2. If the medium is busy, continue to listen until the channel is idle,
and then transmit immediately.
Page 50
CS3591-Computer 2023-
3. If a collision detected during transmission, transmit a brief
jamming signal to all station to indicate collision has occurred and
then cease transmission.
22 Mention some of the physical properties of Ethernet. C301.5 BL1
(May 11)
The Ethernet is a multiple-access network, meaning that a set of
nodes send and receive frames over a shared link. An Ethernet is
like a bus that has multiple stations plugged into it.
23 Write the parameters used to measure network performance. C301.5 BL1
(May 2016)
The parameters used to measure network performance are
Latency, Throughput, Delay and Bandwidth.
24 Outline the need for switching. (Nov 19) C301.5 BL2
Switched communication networks are those in which data
transferred from source to destination is routed between various
intermediate nodes. Switching is the technique by which nodes
control or switch data to transmit it between specific points on a
network. There are three common switching techniques:
Circuit Switching, message switching and packet switching.
25 List the types of Transmission media. (Nov 21) C301.5 BL1
Transmission Media is broadly classified into the following types:
Guided Media: It is also referred to as Wired or Bounded
transmission media. Common types are: (i) Twisted Pair Cable (ii)
Coaxial Cable (iii) Optical Fiber Cable
Unguided Media: Wireless Transmission. Common Types are:
(i) Satellite (ii) Infrared (iii) Broadcast (iv)Wi-Fi
26 Define Bandwidth C301.5 BL1
Bandwidth refers to the number of bits per second that a channel,
a link, or even a network can transmit.
27 What is Throughput? C301.5 BL1
It is a measure of how data can actually be sent through network.
28 What is meant by the contention period of Ethernet? C301.5 BL1
When several stations on an Ethernet have data to send, there are
contention periods during which collisions happen and no data is
successfully transmitted.
Page 51
CS3591-Computer 2023-
29 What does IEEE 10 Base 5 standard signify? C301.5 BL1
● 10 represents data rate 10 Mbps.
● 5 refers to segment length 5* 100 m that can run without
repeaters
● Base represents Base band communication.
Page 52
CS3591-Computer 2023-
30 What do you mean by CSMA protocol? (Apr/May 2015) C301.5 BL1
Carrier sense multiple access (CSMA) is a media access control
(MAC) protocol in which a node verifies the absence of other
traffic before transmitting on a shared transmission medium.
Carrier sense means that a transmitter attempts to determine
whether another transmission is in progress before initiating a
transmission. If a carrier is sensed, the node waits for the
transmission in progress to end before initiating its own
transmission. In other words, CSMA is based on the principle
"sense before transmit". Multiple access means that multiple
nodes may send and receive on the medium. Transmissions by
one node
are generally received by all other nodes connected to the medium.
UNIT-V / PART-B
1 Given a remainder of 111, a data unit of 10110011 and a divisor of C301.5 BL3
1001, is there an error in the data unit. Justify your answer with
necessary principles. (May 14)
2 Explain the various error detection techniques with example. (Nov C301.5 BL2
10,12), (May 12,16)
3 The message X5 + X4 + X 11001001 is to be transmitted, using CRC C301.5 BL3
error detection algorithm. Assuming the CRC polynomial to be X3
+ X2 + 1, determine the three-bit CRC code that should be
appended to message. (May / June 2021)
4 Discuss in detail about the HDLC protocol (Bit Oriented Protocol). C301.5 BL2
(May 16) (Nov 19)
5 Explain various flow control mechanisms. i) Stop Wait protocol ii) C301.5 BL2
Go Back-N iii) Selective Repeat (Nov 15)
6 Discuss in detail about the PPP protocol (Byte Oriented Protocol). C301.5 BL2
7 Describe the CSMA/CD protocol and comment on its performance C301.5 BL4
for medium access. (May 11,14,17) (Nov 19)
8 Explain the functioning of wireless LAN in detail. (Nov C301.5 BL2
10,12,15)
(May 15)
9 Explain how hidden node and exposed node problem is solved in C301.5 BL2
IEEE 802.11 (Nov 13)
10 Explain Transmission media and its types in detail. (May / June C301.5 BL2
2021)
11 Explain the various performance metrics in detail. C301.5 BL2
12 Explain Circuit Switching in detail. (Nov 19)(Nov/Dec 2021) C301.5 BL2
Page 53