You are on page 1of 5

Assignment 2

Set 1

1. Given the data word 1010011110 and the divisor 10111,


a. Show the checking of the codeword at the receiver site (assume no error).
2. Assuming even parity, find the parity bit for each of the following data units.
a. 1001111
b. 0001000
c. 1000110
d. 1110001
3. Can the value of a checksum be all 0’s (in binary)? Defend your answer. Can the
value be all 1s (in binary)? Defend your answer.
4. A sender sends a series of packets to the same destination using 5-bit sequence numbers.
If the sequence number starts with 0, what is the sequence number after sending 100
packets?
5. In analyzing ALOHA, we use only one parameter, time; in analyzing CSMA, we
use two parameters, space and time. Can you explain the reason?

Set 2
1. If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the
address (unicast, multicast, or broadcast)?
2. Using 5-bit sequence numbers, what is the maximum size of the send and receive
windows for each of the following protocols?
a. Stop-and-Wait ARQ
3. Design a bidirectional algorithm for the Stop-and-Wait ARQ Protocol using
piggybacking. Note that both parties need to use the same algorithm
4. How much time in a Bluetooth one-slot frame is used for the hopping mechanism?
What about a three-slot frame and a five-slot frame?
5. An organization is granted the block 211.17.180.0/24. The administrator wants to
create 32 subnets.
a. Find the subnet mask.
b. Find the number of addresses in each subnet.

Set 3
1. An ISP is granted a block of addresses starting with 150.80.0.0/16. The ISP wants
to distribute these blocks to 2600 customers as follows
a. The first group has 200 medium-size businesses; each need 128 addresses. Design the
subblocks and give the slash notation for each subblock. Find out how many
addresses are still available after these allocations.
2. What is a mask in IPv4 addressing? What is a default mask in IPv4 addressing?
3. What is the use of NAT?
4. How the routers get the information about neighbor?
5. A host is sending 100 datagrams to another host. If the identification number of the
first datagram is 1024, what is the identification number of the last (in IPv4)?

Set 4
1. An IPv4 fragment has arrived with an offset value of 100. How many bytes of data?
were originally sent by the source before the data in this fragment?
2. An IPv4 packet has arrived with the first 8 bits as shown: 01000010. The receiver
discards the packet. Why?
3. Find the range of addresses in the following blocks.
a. 123.56.77.32/29
b. 200.17.21.128/27
4. Find the class of each address.
a. 00000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
c. 14.23.120.8
d. 252.5.15.111

5. Why do OSPF messages propagate faster than RIP messages?

Set 5
1. Explain why collision is an issue in a random-access protocol but not in controlled
access or channelizing protocols.
2. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-
kbps bandwidth. Find the throughput if the system (all stations together) produces
a. 1000 frames per second
b. 500 frames per second

3. How can the station determine the success or failure of the transmission?
4. Compare and contrast the Go-Back-NARQ Protocol with Selective-Repeat ARQ.
5. Define piggybacking and its usefulness.
Set 6
Q1. You are designing a subnet mask for the 192.168.172.0 network. In first network you have 50
hosts and in second network you have 35 hosts. Design the network by using FLSM method.
Q.2 Do port addresses need to be unique? Why or why not? Why are port addresses shorter than
IP addresses?
Q3. Given the dataword 1010011110 and the divisor 10111,
a. Show the generation of the codeword at the sender site (using binary division)
Q4. Highlight the various Congestion Control mechanisms to control Congestion problems.
Q5. A group of 15 routers are interconnected in a centralized complete binary tree with a router
at each tree node. Router i communicate with router j by sending a message to the root of the
tree. The root then sends the message back down to router j. Find the mean number of hops per
message, assuming all possible router pairs are equally likely?

Set 7
Q1. The message 11001001 is to be transmitted using the CRC polynomial x^3 + 1 to
protect it from errors. Find the message that should be transmitted.
Q2. Consider the NID of a network is 193.168.0.0, Divide the network into 16 sub-
networks, list the NIDs and BIDs of all the sub-networks. Also find the subnet mask of the
network. Using this subnet mask and and HOST IP address 193.168.0.29, locate the subnet
ID in which this host is residing.
Q3 The distance between two stations M and N is L kilometers. All frames are K bits long.
The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity.
Assuming that processing delay is negligible, find the minimum number of bits for the
sequence number field in a frame for maximum utilization, when the sliding window
protocol is used.
Q4. Given the dataword 1010011110 and the divisor 10110,
a. Show the checking of the codeword at the receiver site (assume no error).

Q5. Explain why collision is an issue in a random-access protocol but not in controlled
access or channelizing protocols.
Set 8

Q1. Consider three IP networks A, B and C. Host HA in networks A sends messages each
containing 180 bytes of application data to a host HC in network C. The TCP layer prefixes a 20
byte header to the message. This passes through an intermediate network B. the maximum packet
size, including 20 byte IP header, in each network is A : 1000 bytes B : 100 bytes C : 1000 bytes
.The network A and B are connected through a 1 Mbps link, while B and C are connected by a 512
Kbps link (bps = bits per second). Assuming that the packets are correctly delivered, how many
bytes, including headers, are delivered to the IP layer at the destination for one application
message, in the best case? Consider only data packets.

Q.2 Match the layers in Bluetooth and the Internet model.


Q3. Illustrate congestion control. Why it is required? List all policies used for the
congestion control. Explain any two policies used for the congestion control in detail.
Q.4 Your router has the following IP address on Ethernet0: 172.16.2.1/23. What are valid
host IDs on the LAN interface attached to the router?
Q.5 An organization uses class C and requires 3 subnets with 60, 60 and 120 systems
respectively. Propose suitable subnet mask.
Set 9
Q1. Explain the IP address classification. Identify the following IP addresses and their address
class: (i) 200.58.20.165
ii)128.127.23.20
iii)16.196.128.50
iv)150.156.10.10
Q2. Disclose Private IP and Public IP. Where to use each? How can get each? What is the
purpose of these terms?
Q3. How IPV6 provides services. Discuss with its frame format. Also list advantages of IPV6 over
IPV4.
Q4. Differentiate between Distance Vector Routing Protocols and Link State Routing Protocols
Q5. Which of the following CRC generators guarantee the detection of a single bit error?
a. x3 + x + 1 b. x4 + xl c. 1 d. x2 + 1
Set 10
Q1. Assuming even parity, find the parity bit for each of the following data units. a. 1001011 b.
0001100 c. 1000000 d. 1110111
Q2 Distinguish between forward error correction versus error correction by retransmission.
Q3. Illustrate the role of IEEE in computer networking? Elaborate different IEEE standards.
Q4. For each of the following given IP and subnet mask (sm) find
i) Number of subnets available
ii) Subnet ids
a) IP: 192.192.192.200
subnet mask: 255.255.255.128
b) IP: 192.192.192.200
subnet mask: 255.255.255.240
Q5. Demonstrate the concept of Dijkstra algorithm. Explain the algorithm with suitable example.

Set 11
Q1. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide the correct
subnet mask?
Q2. In CRC, show the relationship between the following entities (size means the number
of bits):
a. The size of the dataword and the size of the codeword
b. The size of the divisor and the remainder
c. The degree of the polynomial generator and the size of the divisor
d. The degree of the polynomial generator and the size of the remainder
Q3. What is the difference between a BSS and an ESS?
Q4. A router uses the following routing table:
Destination Mask Interface
144.16.0.0 255.255.0.0 Eth0
144.16.64.0 255.255.224.0 Eth1
144.16.68.0 255.255.255.0 Eth2
144.16.68.64 255.255.255.224 Eth3
A packet bearing a destination address 144.16.68.117 arrives at the router. On which interface
will it be forwarded?
Q5. A sub-netted class B network has the following broadcast address: 144.16.95.255. Find Its
subnet Mask . Expand the concept of Routing. How different routing algorithms help in routing.

Set 12
Q.1 If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be
the valid subnet address of this host. Explain CSMA/ CD protocol in detail.
Q2. You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to the router
interface?
Q3 What is the subnetwork number of a host with an IP address of 172.16.66.0/21?
Q4. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum
number of hosts per subnet? Explain Gigabit Ethernet.
Q5 The network address of 172.16.0.0/19 provides how many subnets and hosts?

You might also like