Computer Networks Course File
Computer Networks Course File
Computer Networks Course File
COURSE FILE
Programme : BE
Semester : Vth
Course Code : IT- 503
Subject Name : Computer Networks
1. Scheme
2. Syllabus
3. Time Table
4. Lecture Plan
9. Tutorial Questions
Unit-I
Importance of computer networks, broadcast and point to point networks, Local area networks and Wide area
networks , Introduction to ISO-OSI reference model, TCP/IP reference model , function of each layer, interfaces
and services, Protocol data unit, connection oriented and connectionless services, service primitives, comparison
of TCP/IP and ISO-OSI reference model, Novel Netware, Arpanet , X.25
Unit-II
Data-Link layer: - Data link layer design issues, framing , flow & error control , physical addressing,Stop &
Wait protocol ,Go back N ARQ ,selective repeat ARQ ,piggybacking and pipelining ,HDLC LAN Protocol
stack-Logical link control and Media Access Control sublayer, IEEE 802.2 LLC Frame format Data link
layer in the internet, Serial line IP and Pont to point Protocol
Unit-III`
MAC layer Protocols- , static and dynamic allocation , Pure and slotted ALOHA protocols, Carrier sense
multiple access, Persistent and non persistent CSMA, IEEE standard 802.3 and Ethernet,802.3 cabling,
IEEE 802.4, IEEE 802.5, FDDI Wireless LAN , Comparison of wired and wireless LAN, WIMAX
Unit-IV
The Network layer- logical addressing, classful & classless addressing , address mapping packet delivery &
forwarding. unicast routing protocols , multicast routing protocols, Routing algorithm- Least Cost, Dijkstra's,
Bellman-ford, congestion control algorithms, Internetworking devices, Introduction to Internet protocol IPv4
Unit-V
Transport layer-Transport services , Process to process delivery, UDP ,TCP ,congestion control , quality of
service , Integrated services, Differentiated services LAN-WAN Design and implementation-Configuring TCP/IP,
using Ipconfig, ping command , study of structured LAN , study of internetworking devices and their
configuration– switches, hubs, Bridges, routers and Gateways
3. Time Table
4. LECTURE PLAN
Oriental College of Technology, Bhopal
Department of Information Technology
R3: “Computer Communications & Networking Technologies”-Michael A. Gallo & William M. Hancock –
Cengage pearsen publications (R3)
R4: Computer Networks: Protocols, Standards and Interfaces By Black, PHI learning (R4)
Websites
1..http://www.studytonight.com/computer-networks/types-of-networks
2.http://textofvideo.nptel.iitm.ac.in/106105081/lec15.pdf
3. http://nptel.ac.in/courses/Webcourse-contents/IIT%20Kharagpur/Computer%20networks/New_index1.html
4. http://www.academia.edu/4575950/Tutorial_4_Chapter5_Answers_V2
5. http://www.nptel.ac.in/courses/106105080/pdf/M3L3.pdf
6.http://computernetworkingsimplified.com/data-link-layer/components-data-link-layer-llc-mac/
7. https://www.karunya.edu/it/files/QP_Pdfs/Computer%20Networks.pdf
Prepared by Approved by
UNIT TEST-I
Branch/Semester Information Technology /V Session July – December, 2016
Note: All Questions are Compulsory. Each Question carries 2.5 Marks.
UNIT TEST-II
Branch/Semester Information Technology /V Session July – December, 2016
Note: All Questions are Compulsory. Each Question carries 2.5 Marks.
UNIT TEST-III
Branch/Semester Information Technology/V Session July – December, 2016
Note: All Questions are Compulsory. Each Question carries 2.5 Marks.
2. Explain why token bus is suited for real time application in comparison to CSMA/CD with the help of
suitable example.
3. Derive efficiency of slotted aloha protocol with graph.
UNIT TEST-IV
Branch/Semester Information Technology/V Session July – December, 2016
Note: All Questions are Compulsory. Each Question carries 2.5 Marks.
1. In a Class 13 Network use subliming inask 255. 255. 248.0? Find out how many bits used for subnetting?
3.Find class of following IP address and justify: i) 172.16.3.0 ii) 252.5.15.111 Explain addressing at network layer.
UNIT TEST-V
Branch/Semester Information Technology/V Session July – December, 2016
Note: All Questions are Compulsory. Each Question carries 2.5 Marks.
2. Explain Ping Command and also write its full form of Ping Command?
Roll No……………………………..
Oriental College of Technology, Bhopal
Total no. of Questions: 3 SET-A Total No. of Printed pages: …
B.E. V Semester
IT- 503 Computer Networks
Mid Semester Examination-I September, 2016
Time: Two Hours
Maximum Marks: 40
Note: i) Answer five questions. In each question part A, B, C is compulsory and D part has internal choice.
ii) All parts of each question are to be attempted at one place.
iii) All questions carry equal marks, out of which part A and B (Max. 50 words) carry 2 marks, part C
(Max. 100 words) carry 3 marks, part D (Max. 400 words) carry 7 marks.
iv) Except numerical, Derivation, Design and Drawing etc.
Q.1 (a) Difference between Connection oriented service and Connectionless service. 2
(d) Why flow, error and access control functions are defined in both transport and Data 7
Link layers of OS1 Model? Which layer takes care of dialogue control and how?
OR 7
Explain briefly the following (i) ARPANET ii) X25
(c) Why flow and error control is important in data transmission? Explain Go-Back- 3
NARQ with diagram.
5
(d) A pure ALOHA network transmits 200bit frames on a shared channel of 200kbps.
What is the through put if the
system produces 1000 frames/second. b) Describe about CSMA / CD protocol. 5
Roll No……………………………..
Oriental College of Technology, Bhopal
Total no. of Questions: 3 SET-B Total No. of Printed pages: …
B.E. V Semester
IT- 503 Computer Networks
Mid Semester Examination-II October 2016
Time: Two Hours
Maximum Marks: 40
Note: i) Answer five questions. In each question part A, B, C is compulsory and D part has internal choice.
ii) All parts of each question are to be attempted at one place.
iii) All questions carry equal marks, out of which part A and B (Max. 50 words) carry 2 marks, part C
(Max. 100 words) carry 3 marks, part D (Max. 400 words) carry 7 marks.
iv) Except numerical, Derivation, Design and Drawing etc.
1 a Write the application of computer network. 2
b Differentiate point to point and broadcast network. 2
c The following data fragment occurs in the middle of a data stream for which 3
the character-stuffing algorithm described in the text is used
DLE,STX,A,DLE,B,DLE,ETX. What is the output after stuffing?
d Calculate the frame for the sequence 10110110101 with the G(x) X4+X+1 7
Using CRC method.
OR
Show the flow of data through all the layers of OSI model at the receiver
end.
2 a Explain WAN.. 2
b Explain star , ring, bus ,tree topology. 2
c Explain designing issue for data link layer. 3
d Explain the various switching method with diagram. 7
OR
Why error control function define in the datalink layer and transport layer of
OSI model. Which layer take care of routing.
B.E. V Semester
IT- 503 Computer Networks
Mid Semester Examination- I September, 2016
Time: Two Hours
Maximum Marks: 40
Note: i) Answer five questions. In each question part A, B, C is compulsory and D part has internal choice.
ii) All parts of each question are to be attempted at one place.
iii) All questions carry equal marks, out of which part A and B (Max. 50 words) carry 2 marks, part C (Max. 100 words)
carry 3 marks, part D (Max. 400 words) carry 7 marks.
iv) Except numerical, Derivation, Design and Drawing etc.
Note: i) Answer five questions. In each question part A, B, C is compulsory and D part has internal choice.
ii) All parts of each question are to be attempted at one place.
iii) All questions carry equal marks, out of which part A and B (Max. 50 words) carry 2 marks, part C (Max. 100 words)
carry 3 marks, part D (Max. 400 words) carry 7 marks.
iv) Except numerical, Derivation, Design and Drawing etc.
b What is HDLC. 2
d Difference b/w classless and classful addressing and also explain IPV6. 7
OR
A host is an organization 150.37.64.34 and a subnet mask is 255.255.240.0
what is the address of the subnet? What are the range of IP address that is
host can have on this subnet?
b Explain WIMAX. 2
TUTORIAL-I
Branch Information Technology Session July – December - 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit I Subject/Sub Code Computer Networks / IT- 503
Q1: When were OSI model developed and why its standard called 802.XX and so on?
Solution: OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80 means
==> 1980, 2means ==> February)
1. Point-to-Point connection
2. Multipoint connection
Q.3 What are the two broad classifications under which Networks can be divided?
Ans: All computer networks fit in one of the two dimensions namely, a). Transmission Technology, this
focuses on the basic underlying physical network, for e.g. whether the nodes share a communication media or
each pair of node has a separate dedicated link. b). Scale, it focuses on the scale of network how large is your
network.
Ans: Main benefits of layered network are given below: i) Complex systems can be broken down into understandable
subsystems. ii) Any facility implemented in one layer can be made visible to all other layers. iii) Services offered at a
particular level may share the services of lower level. iv) Each layer may be analyzed and tested independently. v)
Layers can be simplified, extended or deleted at any time. vi) Increase the interoperability and compatibility of various
components build by different vendors.
Ans: Data is represented by computers and other telecommunication devices using signals. Signals are transmitted in
the form of electromagnetic energy from one device to another. Electromagnetic signals travel through vacuum, air or
other transmission mediums to travel between one point to another(from source to receiver).
Electromagnetic energy (includes electrical and magnetic fields) includes power, voice, visible light, radio waves,
ultraviolet light, gamma rays etc.
Transmission medium is the means through which we send our data from one place to another. The first layer (physical
layer) of Communication Networks OSI Seven layer model is dedicated to the transmission media, we will study the
OSI Model later.
LAN can be a simple network like connecting two computers, to share files and network among each other while it can
also be as complex as interconnecting an entire building.LAN networks are also widely used to share resources like
printers, shared hard-drive etc.
Wireless Network
It is the fastest growing segment of computer. They are becoming very important in our daily life because wind
connections are not possible in cars or aeroplane. We can access Internet at any place avoiding wire related troubles..
These can be used also when the telephone systems gets destroyed due to some calamity/disaster. WANs are really
important now-a-days.
Inter Network
When we connect two or more networks then they are called internetwork or internet. We can join two or more
individual networks to form an internetwork through devices like routers gateways or bridges.
Q.7 Difference between Connection oriented service and Connectionless service.
Ans:
1. In connection oriented service authentication is needed while connectionless service does not need any
authentication.
2. Connection oriented protocol makes a connection and checks whether message is received or not and sends again if
an error occurs connectionless service protocol does not guarantees a delivery.
3. Connection oriented service is more reliable than connectionless service.
4. Connection oriented service interface is stream based and connectionless is message based
Ans: Following are some major differences between OSI Reference Model and TCP/IP Reference Model, with
1. OSI is a generic, protocol independent standard, 1. TCP/IP model is based on standard protocols around which
acting as a communication gateway between the the Internet has developed. It is a communication protocol,
network and end user. which allows connection of hosts over a network.
2. In OSI model the transport layer guarantees the 2. In TCP/IP model the transport layer does not guarantees
delivery of packets. delivery of packets. Still the TCP/IP model is more reliable.
4. OSI model has a separate Presentation layer and 4. TCP/IP does not have a separate Presentation layer or Session
Session layer. layer.
5. OSI is a reference model around which the 5. TCP/IP model is, in a way implementation of the OSI model.
networks are built. Generally it is used as a
guidance tool.
6. Network layer of OSI model provides both 6. The Network layer in TCP/IP model provides connectionless
connection oriented and connectionless service. service.
7. OSI model has a problem of fitting the 7. TCP/IP model does not fit any protocol
protocols into the model.
8. Protocols are hidden in OSI model and are 8. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
9. OSI model defines services, interfaces and 9. In TCP/IP, services, interfaces and protocols are not clearly
protocols very clearly and makes clear distinction separated. It is also protocol dependent.
between them. It is protocol independent.
Q-9. What are the main categories based on which applications of computer network can be categorized?
Ans: The main areas under which the applications for computer network can be categorized are as follows:
Scientific and Technical Computing – Client Server Model, Distributed Processing, Parallel Processing,
Communication Media
Commercial – Advertisement, Telemarketing, Teleconferencing – Worldwide Financial Services
Network for the People (this is the most widely used application nowadays) – Telemedicine, Distance
Education, Access to Remote Information, Person-to Person Communication, Interactive Entertainment
TUTORIAL-II
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit II Subject/Sub Code Computer Networks / IT- 503
Character count
Starting and ending characters, with character stuffing
Starting and ending flags, with bit stuffing
Physical layer coding violations
Sliding Window Protocols: Inspite of the use of timers, the stop and wait protocol still suffers from a few drawbacks.
Firstly, if the receiver had the capacity to accept more than one frame, its resources are being underutilized. Secondly, if
the receiver was busy and did not wish to receive any more packets, it may delay the acknowledgement. However, the
timer on the sender's side may go off and cause an unnecessary retransmission. These drawbacks are
overcome by the sliding window protocols.
In sliding window protocols the sender's data link layer maintains a 'sending window' which consists of a set of
sequence numbers corresponding to the frames it is permitted to send. Similarly, the receiver maintains a 'receiving
window' corresponding to the set of frames it is permitted to accept. The window size is dependent on the
retransmission policy and it may differ in values for the receiver's and the sender's window. The sequence numbers
within the sender's window represent the frames sent but as yet not acknowledged. Whenever a new packet arrives from
the network layer, the upper edge of the window is advanced by one. When an acknowledgement arrives from the
receiver the lower edge is advanced by one.
The receiver's window corresponds to the frames that the receiver's data link layer may accept. When a frame with
sequence number equal to the lower edge of the window is received, it is passed to the network layer, an
acknowledgement is generated and the window is rotated by one. If however, a frame falling outside the window is
received, the receiver's data link layer has two options. It may either discard this frame and all subsequent frames until
the desired frame is received or it may accept these frames and buffer them until the appropriate frame is received and
then pass the frames to the network layer in sequence.
In this simple example, there is a 4-byte sliding window. Moving from left to right, the window "slides" as bytes in the
stream are sent and acknowledged.
Most sliding window protocols also employ ARQ ( Automatic Repeat reQuest ) mechanism. In ARQ, the sender waits
for a positive acknowledgement before proceeding to the next frame. If no acknowledgement is received within a
certain time interval it retransmits the frame. ARQ is of two types :
1. Go Back 'n': If a frame is lost or received in error, the receiver may simply discard all subsequent frames,
sending no acknowledgments for the discarded frames. In this case the receive window is of size 1. Since no
acknowledgements are being received the sender's window will fill up, the sender will eventually time out and
retransmit all the unacknowledged frames in order starting from the damaged or lost frame. The maximum
window size for this protocol can be obtained as follows. Assume that the window size of the sender is n. So the
window will initially contain the frames with sequence numbers from 0 to (w-1). Consider that the sender
transmits all these frames and the receiver's data link layer receives all of them correctly. However, the sender's
data link layer does not receive any acknowledgements as all of them are lost. So the sender will retransmit all
the frames after its timer goes off. However the receiver window has already advanced to w. Hence to avoid
overlap , the sum of the two windows should be less than the sequence number space.
Ans:- In practice, the link between receiver and transmitter is full duplex and usually both transmitter and receiver
stations send data to each over. So, instead of sending separate acknowledgement packets, a portion (few bits) of the
data frames can be used for acknowledgement. This phenomenon is known as piggybacking. The piggybacking helps in
better channel utilization. Further, multi-frame acknowledgement can be done.
Q.5 What do you understand by MAC sub layer of the data link layer (Layer 2).
Ans:- In Layer 2 of a network, the Media Access Control (MAC) sub layer provides addressing and channel access
control mechanisms that enable several terminals or network nodes to communicate in a network.
The MAC sublayer acts as an interface between the logical link control (LLC) Ethernet sub layer and Layer 1 (the
physical layer). The MAC sub layer emulates a full-duplex logical communication channel in a multipoint network.
This channel may provide unicast, multicast, or broadcast communication service. The MAC sub layer uses MAC
protocols to prevent collisions.
In Layer 2, multiple devices on the same physical link can uniquely identify one another at the data link layer, by using
the MAC addresses that are assigned to all ports on a switch. A MAC algorithm accepts as input a secret key and an
arbitrary-length message to be authenticated, and outputs a MAC address.
A MAC address is a 12-digit hexadecimal number (48 bits in long). MAC addresses are usually written in one of these
formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an
Internet standards body. The second half of a MAC address represents the serial number assigned to the adapter by the
manufacturer.
Layer 2 contains two sub layers:
Logical link control (LLC) sub layer, which is responsible for managing communications links and handling frame
traffic.
Media access control (MAC) sub layer, which governs protocol access to the physical network medium. By using the
MAC addresses that are assigned to all ports on a switch, multiple devices on the same physical link can uniquely
identify one another.
Ans:-The data link layer, namely LLC (Logical Link Control) and MAC (Media Access Control).
The data link layer functionality is usually split it into logical sub-layers, the upper sub-layer, termed as LLC, that
interacts with the network layer above and the lower sub-layer, termed as MAC, that interacts with the physical layer
below, as shown in the diagram given below:
LLC
The primary responsibilities of LLC are:
Based on whether a logical connection is established between the layer 2 peers and based on whether frames are
acknowledged by the peer, LLC can be classified to provide the following types of service modes:
MAC
The MAC sub-layer interacts with the physical layer and is primarily responsible for framing/de-framing and collision
resolution.
Framing/De-Framing and interaction with PHY: On the sending side, the MAC sub-layer is responsible for creation
of frames from network layer packets, by adding the frame header and the frame trailer. While the frame header consists
of layer2 addresses (known as MAC address) and a few other fields for control purposes, the frame trailer consists of
the CRC/checksum of the whole frame. After creating a frame, the MAC layer is responsible for interacting with the
physical layer processor (PHY) to transmit the frame.
On the receiving side, the MAC sub-layer receives frames from the PHY and is responsible for accepting each frame, by
examining the frame header. It is also responsible for verifying the checksum to conclude whether the frame has come
uncorrupted through the link without bit errors. Since checksum computation and verification are compute intensive
tasks, the framing/de-framing functionality is done by dedicated piece of hardware (e.g. NIC card on PCs).
Collision Resolution :
On shared or broadcast links, where multiple end nodes are connected to the same link, there has to be a collision
resolution protocol running on each node, so that the link is used cooperatively. The MAC sub-layer is responsible for
this task and it is the MAC sub-block that implements standard collision resolution protocols like CSMA/CD, CSMA
etc. For half-duplex links, it is the MAC sub-layer that makes sure that a node sends data on the link only during its
turn. For full-duplex point-to-point links, the collision resolution functionality of MAC sub-layer is not required.
Q.8Obtain the 4-bit CRC code word for the data bit sequence 10011011100 (leftmost bit is the least significant) using
the generator polynomial given in the previous problem.
Ans: Divide (Mod-2) 001110110010000 by 10101 to get 4-bit code word: 1101.
Details of the steps is given
001110110010000
10101
----------------
10001
10101
------------------
10000
10101
------ -------------
10110
10101
--------------------
11000
10101
1101
Q.9 Consider the following three 16-bit bytes: 01100110 01100000, 01010101 01010101, 10001111
00001100. Calculate the UDP checksum.
Q.10An 8 bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is
the binary value after encoding?
Oriental College of Technology, Bhopal
Department of Information Technology
TUTORIAL- III
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit III Subject/Sub Code Computer Networks / IT- 503
Q-4. What is vulnerable period? How it affects the performance in MAC protocols?
Ans:-The total period of time when collision may occur for a packet is called vulnerable period. Let, all
packets have a fixed duration λ. Then vulnerable period is 2λ in pure ALOHA scheme and λ in slotted
ALOHA scheme. If vulnerable period is long, probability of the occurrence collision increases leading to
reduction in throughput.
IFM interfaces with the LLC sublayer. The LLC sublayer frames are passed on to the ACM by the IFM and if
the received frame is also an LLC type, it is passed from RxM component to the LLC sub layer. IFM also
provides quality of service.
The ACM is the heart of the system. It determines when to place a frame on the bus, and responsible for the
maintenance of the logical ring including the error detection and fault recovery.
The responsibility of a TxM is to transmit frame to physical layer. It accepts the frame from the ACM and
builds a MAC protocol data unit (PDU) as per the format.
The RxM accepts data from the physical layer and identifies a full frame by detecting the SD and ED (start
and end delimiter). It also checks the FCS field to validate an error free transmission.
Q.8 In what way the MAC protocol of FDDI differs from that of token ring?
Ans:-In the frame format of FDDI protocol, preamble is eight bytes instead of one byte in token ring. Also
token has one additional byte. FDDI can have multiple frames simultaneously, which cannot be present in
token ring. Here, the access method is timed token passing. Multiple frames can be transmitted after capturing
a token. First, the entire token is captured and then the data frames are introduced, whereas token ring follows
token passing protocol and beginning of token is converted to the header of a frame. In case of token ring
token is released after receiving the acknowledgement (as the data frame returns after circulating the ring). On
the other hand, in case of FDDI, token is released immediately after sending data frame, which is known as
early token release.
Q.10 Suppose nodes A and B are on the same 10 Mbps Ethernet segment, and the propagation delay between
the two nodes is 225-bit times. Suppose node A begins transmitting a frame, and before it finishes station, B
begins transmitting a frame. Can A finish transmitting before it detects that B has transmitted? Why or why
not? If the answer is yes, then A incorrectly believes that its frame was successfully transmitted without a
collision.
Oriental College of Technology, Bhopal
Department of Information Technology
TUTORIAL- IV
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit IV Subject/Sub Code Computer Networks / IT- 503
Q.6 What is the purpose of dotted decimal representation? Give dotted decimal representation of the IP
address 11011101 10001111 11111101 00001111
Ans: To represent the 32-bit IP address in short and easy to read form, Internet addresses are represented in
decimal form with decimal points separating the bytes. This is known as dotted decimal notation. For the
given IP address the dotted decimal representation is 221.143.253.15.
TUTORIAL- V
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit V Subject/Sub Code Computer Networks / IT- 503
ASSIGNMENT-I
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit I Subject/Sub Code Computer Networks / IT- 503
2. What are header and trailers and how do they get added and removed?
6. What are the criteria necessary for an effective and efficient network?
ASSIGNMENT-II
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit II Subject/Sub Code Computer Networks / IT- 503
1. What is use of CRC? Compute the CRC-4 character for the following message using a modified divisor
constant of 10011:
6. What are the different design issues for data link layer?
7. Identify various fields after destuffing extra zeros from the following HDLC frame:
0111111010111101001110111110011111011111001111010000001111110
8. What is the Hamming distance between 001111 and 010011?
9. What is Error Detection? What are its methods?
10. What Automatic Repeat Request (ARQ)?
Oriental College of Technology, Bhopal
Department of Information Technology
ASSIGNMENT-III
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit III Subject/Sub Code Computer Networks / IT- 503
1. Show that for pure ALOHA, the maximum throughput is ½ e and occurs at G=0.5 and differentiate ALOHA
and slotted ALOHA.
2 Imagine the length of a 10Base5 cable is 2500 m. if the speed of propagation in a thick coaxial cable is
200,000,000 m/s, how long does it take for a bit to travel from the beginning to the end of the network? Ignore
any propagation delay in the equipment.
3 The data rate of 10 Base 5 is 10 Mbps. how long does it take to create the smallest frame? Show your
calculation.
4 Why is there no need for CSMA/CD on a full duplex Ethernet LAN?
5 Explain 802.4, 802.5.
ASSIGNMENT-IV
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit IV Subject/Sub Code Computer Networks / IT- 503
117.34.4.8
29.34.41.5
23.67.12.1
7. What are the main advantages of IPv6 over IPv4?
8. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts
it can handle?
9. Using Link state routing algorithm find the best path for B as root node.
10. With the indicated link cost, use Dijkstra’s shortest path algorithm to compute the shortest path from x to
all network nodes.
Oriental College of Technology, Bhopal
Department of Information Technology
ASSIGNMENT-V
Branch Information Technology Session July – December, 2016
Name of Faculty Mrs. Swati Pandey Semester V
Unit V Subject/Sub Code Computer Networks / IT- 503
(a) How does the layer of TCP/IP protocol suite correlate to the layers of OSI model?
(b) Write any two differences between connection oriented and connection less services. 2mark each
1
(c) What are the various functions performed by the data link layer? 3marks
(d) Suppose a group of N stations share a 56 kbps pure ALOHA channel. Each station 7 marks
outputs 1000 bit frame on an average of once every 100 sec, even if the previous one
has not yet been sent (e.g. the stations can buffer outgoing frames). What is the
maximum value of N?
OR
Explain why token bus is suited for real time application in comparison to
CSMA/CD with the help of suitable examples.
(a) What do mean by protocol verification?
(b) Explain ALOHA and slotted ALOHA protocol. Compare the efficiency in each case. 2mark each
2 (c) Using CRC a bit stream 1101011011 is to be transmitted. If the generator 3marks
polynomial is find the
(d) Explain the leaky bucket mechanism for congestion control. 7 marks
OR
(e)
(c) What are the various connecting devices used in networking? Explain design and 3marks
functioning of Bridges.
(d) Write short notes on any four of the followings: any two 7marks
i) UDP Header format
ii) TCP Header format
iii) HIT P
iv) Network Management
v) Presentation layer protocol
OR
Differentiate Logical, classful and classless addressing techniques. And give a
comparative study of IPv4 and IPv6.
Pre University Examination Roll No……………………………..
(a) If IP Address 192. 168.5.128 and mask 255, 255. 255. 128, What is the Broadcast
Address? 2mark each
4 (b) Explain IPv4 header format with the help of a neat diagram. State four major
improvements of IPv6 over IP4
(c) Write the default mask of class A,B, C Network? 3marks
(c) Explain Ping Command and also write its full form of Ping Command? 3marks
(d) Write short notes on any four of the followings: any two 7marks
i) UDP Header format
ii) TCP Header format
iii) HIT P
iv) Network Management
v) Presentation layer protocol
OR
Explain different lntemetworking devices?