1. Processes in network identify each other by an abstract locator called ______ Port address 2. Which flag is used in the first step of connection termination phase of TCP? FIN 3. Which of the following is true regarding the characteristics of UDP? a. Implements mechanisms for reliable delivery b. Does not implement mechanisms for flow control. Only b is true 4. What mechanism in TCP involves preventing too much data from being injected into the network? Congestion control 5. In the original algorithm for adaptive retransmission in TCP, EstimatedRTT and TimeOut value is computed as _________(Assume α is the smoothing parameter, SampleRTT is the difference between these two times in receiving the current and previous acknowledgment ) EstimatedRTT = α×EstimatedRTT+(1−α)×SampleRTT , TimeOut = 2×EstimatedRTT 6. When the fast retransmit mechanism signals congestion, rather than drop the congestion window all the way back to one packet and run slow start, it is possible to use the ACKs that are still in the pipe to clock the sending of packets. This mechanism is called ____ Fast recovery 7. Congestion avoidance mechanism in which a single congestion bit is added to the packet header is called _____ DECbit 8. Consider the congestion window size for a TCP connection when a timeout occurs be 16 KB. The round trip time of the connection is 50 msec and the maximum segment size used is 2 KB. The size of the congestion window in terms of Maximum Segment Size(MSS) is _________. 8 MSS 9. Which application layer protocol runs in port number 53? DNS 10. The transport layer protocol which is used to improve the performance of connection-oriented web application is called ______ QUIC 11. The application layer protocol that helps in the transfer of flies from one computer to another is ___ FTP 12. An adaptive streaming protocol that enables high quality streaming of media content over the Internet is ____ DASH 13. A simple protocol to retrieve email from server with minimal error is ____ POP 3 14. Which of the following statement(s) is/ are not correct? I. TCP connections are full duplex II. TCP has no option for selective acknowledgment III. TCP connections are message streams Only II and III 15. What extra component is added with the TCP and UDP header fields to verify the message delivery between two end points? pseudoheader 1. What happened at time 20? Ans: timeout 2. What happened at time 10? Ans: duplicate acknowledgement,multiplicative decrease 3. When is the Congestion avoidance phase of slow start? Ans: 10-20,34-44,after 44 4. What congestion control mechanism is followed between time 10-20? Ans: Additive increase 5. What congestion control mechanism is followed at time 20? Ans: Slow start 6. The protocol value of UDP in IP header is ____ Ans: 17 7. What extra component is added with the TCP and UDP header fields to verify the message delivery between two end points? Ans: pseudoheader 8. The size of the source and destination port fields is ____ Ans: 2 bytes 9. The size of the sequence number and the advertised window fields in TCP header are ___ and ____ respectively. Ans: 4 bytes, 2 bytes 10. The algorithms used to establish TCP connection is called Ans: Three-way handshaking What is the congestion window size at 4th RTT? Ans: 16 Identify the time periods when TCP slow start is operating(more than one answer possible) Ans: 0-4,7-10 Identify the time periods when TCP congestion avoidance is operating (AIMD). Ans:4-6,10-14,15-17,6-9 At the 6th RTT, is the segment loss detected by_______ Ans:timeout What is the initial value of ssthreshold, before the first congestion avoidance interval? Ans: 16 What is the value of ssthreshold, after the first congestion avoidance interval? Ans: 9 What is the value of ssthreshold, after the second congestion avoidance interval? Ans: 6 At the 14th RTT, is the segment loss detected by Ans: duplicate ack Assuming a packet loss is detected after the 17th RTT by the receipt of a triple duplicate ACK, what will be the values of the congesion-window size and of ssthreshold? Ans: 4,4 1. TCP/IP model follows a. Connection oriented approach b. Connectionless approach c. Connection oriented over connectionless approach d. Connectionless over connection oriented approach 2. Flag bit used for establishing a connection is Ans: SYN 3. The client sends the following information to the server during the initiation of 3-way handshaking Ans: SYN, Sequence number=x 4. The sequence number of the TCP segment starts with ___ Ans: random number 5. One of the important part of the TCP message includes ________ a. b. c. d. Information about application which generated that message Information about machine which generated that message Information about user who generated that message Information about the status of that message 6. TCP segment is verified by ______________ a. b. c. d. The next network layer The previous application layer The receiving TCP layer The TCP layer of the next immediate router 7. The core protocol used in tcp is __ Ans: sliding window 8. TCP is also called as ______ Ans: byte-oriented protocol 9.__________ is the address used to by the TCP to identify the target process. Ans: port number 10. The size of the source address in a UDP header is__ Ans:16 bits 11. _________is used to reassemble the message at the receiving end if the segments are received out of order. a. Sequence Number b. Advertised Window b. Sender Window c. Receiver Window 12. TCP uses _________ as error error detection a. check sum b. CRC c. Parity check d. LRC 13. ________ involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Ans: Congestion control 14. A TCP connection are likely to have different ____ Ans: RTT 15. The server which is willing to accept data is in ______ state Ans: passive open 16. _____ is a mechanism used to increase the congestion window rapidly from a cold start. Ans: slow start 17. In which method a single bit is added to the packet header to predict congestion . Ans: DECbit 18. In ____________ mail in the sender is not deleted after download a. b. c. d. IMAP POP3 SMTP ICMP 19. _________ is one of the FTP transfer parameter command a. STRU b. ALLO c. REST d. STOR 20. ________ allows a user to connect to a remote host and upload or download the files. a. TCP b. UDP c. FTP d. SMTP_ 21. ______ maintains the domain name system. a) distributed database system b) a single server c) a single computer d) none of the mentioned 22. _________contains all labels, from the most specific to the most general, that uniquely define the name of the host. a. Fully Qualified Domain Name(FQDN) b. Partially Qualified Domain Name(PQDN) c. Both FQDN and PQDN d. None of the above 23. The formal protocol that defines the Mail Transfer Agents( client and server) in the Internet is called _________ Ans:Simple Mail Transfer Protocol (SMTP). 24. The process of transferring a mail message occurs in the following order of phases : Ans: connection establishment, mail transfer, and connection termination. 25. The two modes of POP3 protocol are: 26. Ans: the delete mode and the keep mode. 27. _________ the standard mechanism provided by TCP/IP for copying a file from one host to another. Ans: FTP 28. 11. The two types of DNS message are: Ans: query and response Refer the Figure 1 to answer the questions number from 16 - 24)(12) 29. Identify the time periods when TCP slow start is operating. (2) 0 - 4, 7 – 10 30. Identify the time periods when TCP congestion avoidance is operating (AIMD).(3) 4 - 6, 10 - 14, 15 - 17 31. At the 6th RTT, is the segment loss detected by_______ (1) 32. What is the initial value of ssthreshold, before the first congestion avoidance interval? (1) 16 33. What is the value of ssthreshold, after the first congestion avoidance interval?(1) 9 34. At the 14th RTT, is the segment loss detected by________ (1) 35. What is the value of ssthreshold, after the second congestion avoidance interval? (1) 6 36. Assuming a packet loss is detected after the 17th RTT by the receipt of a triple duplicate ACK, what will be the values of the congesion-window size and of ssthreshold? (1) 4,4 37. Assuming a packet loss is detected after the 17th RTT by the receipt of a timeout , what will be the values of the congesion-window size and of ssthreshold?(1) 4,1 1/31/22, 2:22 PM Tutorial 1 Tutorial 1 Total points 20/20 The respondent's email (19z350@psgtech.ac.in) was recorded on submission of this form. If the network bandwidth = 10Mbps, what is the time taken to transmit one bit? 2/2 10^7 s 0.1 micro sec 0.1 s 10s Logical addressing is a service provided by ______ layer in OSI reference 1/1 model. network datalink transport physical https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 1/6 1/31/22, 2:22 PM Tutorial 1 The type of network that handles the interconnection of IT devices at the 1/1 surrounding of a single user is called _____________________ local area network metropolitan area network personal area network wide area network What is the propagation delay if the distance between the two points is 2/2 12,000 km? Assume the propagation speed to be 2.4 x 10^8 m/s in cable. 50s 100s 50ms 100ms The number of bits that can be transmitted over the network in a certain 1/1 period of time is called __________. round trip delay propagation delay bandwidth transmission delay https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 2/6 1/31/22, 2:22 PM Tutorial 1 SMTP is a protocol in ______ layer of TCP/IP model. 1/1 network application transport link The hiding of details behind well-defined interface is called __________ 1/1 layering decoding abstraction encapsulation The process of determining systematically how to forward messages towards the destination node based on its address is called __________ 1/1 Encoding Multiplexing Routing Linking https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 3/6 1/31/22, 2:22 PM Tutorial 1 ______ connector is used to connect coaxial cable. 1/1 BNC RJ45 SC connector ST connector For a noiseless channel, the Nyquist bit rate formula defines the 1/1 theoretical maximum bit rate is given by: Bit Rate = 2 x bandwidth x 1og(base 2) L . What does L stands for? number of signal levels used to represent data. data bits per signal level total number of data bits peak value of the signal levels The communication type where source node sends a message to all the 1/1 nodes is called _________ anycast unicast multicast broadcast https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 4/6 1/31/22, 2:22 PM Tutorial 1 _____ cable has a metal foil or braided mesh-covering that encases each 1/1 pair of insulated conductors. unshielded twisted pair shielded twisted pair optical coaxial _______ is the maximum value or strength of the signal over time 1/1 Frequency Time Phase Amplitude Consider a point-to-point link 50 km in length. At what bandwidth would 2/2 propagation delay(at a speed of 2x10^8 m/s) equal transmit delay for 100-byte packets? 3.2 kbps 2.5 Mbps 3.2 Mbps 2.5 kbps https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 5/6 1/31/22, 2:22 PM Tutorial 1 Consider a dial-up connection whose bandwidth is 56kbps with RTT of 2/2 87 micro seconds. The maximum number of bits in transit at a particular time. 3 6 5 4 If there are 5 nodes connected using bus topology then the number of 1/1 links is ___________ 2 4 5 6 This form was created inside of PSG College of Technology. Forms https://docs.google.com/forms/d/e/1FAIpQLScVJrtrC4fGZbns8P2D8xbpHV5XeBdRTNsSwVAuCa77b6euZg/viewscore?viewscore=AE0zAgA-UknsJr9… 6/6 1 mark qns: 1. A class of switches that connects Ethernet segments are called as _________ Ans: bridges 2. The protocol which is mainly used to deal with interconnection of different type is called __________ Ans: IP 3. The path taken by a packet in a network should have the following characteristics: Ans: loop free, respond to addition of new nodes, respond to failure of existing nodes. 4. If a connection has to be made by allocating dedicated resources it is called as ______ Ans: circuit-switching 5. Which of the following is a type of packet switched network Ans: datagram, virtual-circuit switched 6. _______________ is used to uniquely identify a connection to a switch. Ans: virtual circuit identifier (VCI) 7. In this approach, to establish a connection state by virtual circuit switching, the host sends messages/signal into the network to cause the state to be established. Ans: switched virtual circuit (SVC) 8. For the following network topology, what can be the content of virtual circuit table if the packet has to move from host A to host B Ans: 3,7,2,6 9. If all the information about network topology that is required to switch a packet across the network is provided by the source host then the type of switching is called Ans: source routing 10. The minimum size of IPv4 header is _______ Ans: 32 11. ___________ is the largest IP datagram that it can carry in a frame. Ans: maximum transmission unit (MTU), 12. The default value of TTL in IPv4 header is __________ Ans: 64 13. Header length in IPv4 header specifies the length of the header as ____ Ans: 32 bit word 14. Protocol to convert IP address to link-level address is ______ Ans: Address Resolution Protocol (ARP) 15. In ARP the value of Hardware type field if the link-level technology used is Ethernet and network protocol used is IPv4 is Ans: 1 16. The type of communication for an ARP request is _______ Ans: broadcast 17. The protocol used if the host system has to be configured to connect to a network automatically is called ______ Ans: DHCP 18. DHCP is derived from __________ protocol Ans: BOOTP 19. The error reporting protocol associated with IP is ____ Ans: Internet Control Message Protocol (ICMP) 20. Debugging tool that uses ICMP is Ans: ping, traceroute. 2 mark qns(as MCQs): 1. Advantages of having a switch in network: Ans: many hosts can be connected to a switch, connection can be made between two switches, network with switches is scalable, hosts connected with switch can transmit at full link speed. 2. Following are the characteristics of a datagram network: Ans: host can send packet anywhere at any time, each packet is treated independently, link failure many not be a serious problem, packets from a specific source to specific destination can take different paths, sender host need not know whether then network will be able to deliver the packet to the destination, no connection establishment phase 3. Which of the following are the characteristics of virtual circuit switching? Ans: if a link fails, new connection has to be established, if the switch fails, new connection has to be established, requires routing algorithm, per packet overhead is reduced when compared to the datagram model, has connection establishment phase, has to send tear-down signal/message to disconnect the connection 4. The following are the characteristics of IP protocol Ans: can build scalable network, can build heterogeneous network, uses logical addressing, uses datagram approach to forward packets, packets are sent in a connectionless manner, does not make any attempt to recover from failure, can deliver out-of-order packet, can deliver duplicate packet. 5. The following are the fields of IP header with the size of the fields in bits : Ans: Version number – 4 bits, Header length -4 bits, Type of service – 8 bits, length of the datagram – 16 bits, Time to live -8 bits, protocol – 8 bits, checksum -16 bits, source address – 32 bits, destination address – 32 bits, fragment identifier-16 bits, fragment flags – 3 bits, fragment offset – 13 bits (any 4 options can be given) 1. Nodes that support users and run application programs. Ans: Host 2. Byte string that identifies a node is called _______ Ans: Address 3. When an application uses the ___________service, the client and the server (residing in different end systems) send control packets to each other before sending packets with real data. Ans: connection-oriented 4. The internet’s connectionless service is ________ Ans: UDP 5. In __________ the resources needed for communication between the end-systems are reserved for the duration of the session. Ans: Circuit-Switched Networks 6. The hiding of details behind well-defined interface is called __________ Ans: abstraction 7. Which of the following is a valid IP address: Ans: 8. The range of System ports/ Well known ports is ____________ Ans: 0 – 1023 9. The number of bits that can be transmitted over the network in a certain period of time is called __________. Ans: bandwidth 10. The communication type where source node sends a message to a subset of nodes but not all nodes is called _________ Ans: multicast 11. If the switch run out of buffer space, some packets are dropped. This operating state is called _______ Ans: Congested. 12. Repeater belongs to __________ layer in a network model. Ans: Physical 13. The layer in the network model that handles routing among nodes within a packet-switched network is ______________ Ans: network 14. The type of network that handles the interconnection of IT devices at the surrounding of a single user is called _____________________ Ans: personal area network 15. If there are 10 nodes connected using bus topology then the number of links is ___________ Ans: 11 16. What is the propagation delay if the distance between the two points is 12,000 km? Assume the propagation speed to be 2.4 x 108 m/s in cable. Ans: 50ms 17. What is the transmission time for a 2.5-kbyte message (an e-mail) if the bandwidth of the network is 1 Gbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 mls. Ans: Transmission time = 0.020ms 18. Consider a dial-up connection whose bandwidth is 56kbps with RTT of 87 micro seconds. . The maximum number of bits in transit at a particular time. Ans: 5 19. Assume that Source S and Destination D are connected through an intermediate router R. How many times a packet has to visit the network layer and data link layer during a transmission from S to D? Network layer – 4 times, Data link layer – 4 times Network layer – 4 times, Data link layer – 6 times Network layer – 2 times, Data link layer – 4 times Network layer – 3 times, Data link layer – 4 times 20. The OSI layers that is resent only at the end hosts are Ans: transport,session,presentation,application PSG COLLEGE OF TECHNOLOGY, COIMBATORE - 641 004 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING BE CSE, SEM V CONTINUOUS ASSESSMENT TEST 1 Date: 13/09/2021 19Z504 COMPUTER NETWORKS Time: 75 min. Maximum Marks: 50 INSTRUCTIONS: 1. Answer ALL questions. Each question carries 10 Marks. Answer the following: 1. Consider a network that uses one switch. We need to send two packets of size is 10000. Transmission time for each packet is 500 μs. Two hosts are connected via a packet switch with 107 bits per second links. Each link has a propagation delay of 20 μs. The switch begins forwarding a packet 35 μs after it receives the same. If 20000 bits of data are to be transmitted between the two hosts using a packet size of 10000 bits, what is the time elapsed between the transmission of the first bit of data and the reception of the last bit of the data. (10) 2. Discuss about the OSI reference model of computer networks with neat sketch. (10) 3. Given the data word 1010001101 and the divisor 110101.Show the generation of the codeword at the sender site and Show the checking of the codeword at the receiver site using CRC technique. (10) 6 4. Frames of 1000 bits are sent over a 10 bps duplex link between two hosts. The propagation time is 25ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).What is the minimum number of bits that will be required to represent the sequence numbers distinctly? (Assume that no time gap needs to be given between transmissions of two frames). (i) If receiver window size is one (ii) If receiver window size is equal to sender window size 5. What is meant by Hidden Terminal and Exposed node Problems? How to solve it? Illustrate with the suitable examples. (10) PSG COLLEGE OF TECHNOLOGY, COIMBATORE - 641 004 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING BE CSE, SEM V CONTINUOUS ASSESSMENT TEST 3 Date: 18/11/2021 19Z504 COMPUTER NETWORKS Time: 60 min. Maximum Marks: 35 PART B Answer the following (2x10=20 marks) 1. i.Describe the purpose of the sequence number in TCP (6 marks) ii. Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 80; the second has sequence number 110. a. Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B send to Host A, what will be the acknowledgment number? b. How much data is in the first segment?(4 marks) 2. What is DHCP and describe how it works?(10 marks) PSG COLLEGE OF TECHNOLOGY, COIMBATORE - 641 004 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING BE CSE, SEM V CONTINUOUS ASSESSMENT TEST 2 Date: 21/10/2021 19Z504 COMPUTER NETWORKS Time: 60 min. Maximum Marks: 50 1. A router maintains the following routing table and it can deliver the packets directly to hosts through interfaces and can forward the packet to the routers Rn (n =2, 3, &4). (10) With the following destination IP addresses, what does the router do? (a) 128.96.171.91 (b) 128.96.167.152 (c) 128.96.163.153 (d) 128.96.169.193 (e) 128.96.165.122 2. Consider a message from TCP layer contains 1044 bytes of data without including the header. It is passed to network layer’s IP protocol for delivery across 3 networks with MTUs 1024 and 500 and 200. Show the values of all the Flag bits and offset field of IP header and the size of each data packet (without header) when it passes though each network and reach the destination host. (Assume all IP and TCP headers are 20 bytes). (10) 3. (i) For the network given in the Figure 1, give the datagram forwarding table (both initial and final) for each node. The links are labeled with relative costs; your table should forward each packet via the lowest-cost path to its destination using distance vector routing. (10) Figure 1 (ii) Consider the figure 2. Initially both the node A and B know how to reach node C. But suddenly the link B to C goes down. What will happen in distance routing and also discuss how to overcome that problem? (5) A 1 1 B C Figure 2 4. Consider a traditional Class C address space like 192.168.1.0/24and an organization wants to formsubnets for four departments, with hosts as follows: A) CSE: 75 hosts B) EEE: 50 hosts C) Civil: 25 hosts D) ECE: 20 hosts Design the subblocks and show the first and last address of each subblocks (using slash notation). Find out how many addresses are still available after these allocations (15)