You are on page 1of 2

B.M.S.

COLLEGE OF ENGINEERING, BANGALORE-19


Computer Science & Engineering

INTERNALS-3
Course Code: 20CS5PCCON Course Title: Computer Networks
Semester: V Maximum Marks: 40 Date: 17-1-2022
Faculty Handling the Course: Prof. Lohith J J, Dr. Nandhini Vineeth
Instructions: I n t e r n a l c h o i c e i s provided in Part C.

PART-A

Total 5 Marks (No Choice)


No. Question Marks
1 Give the Datagram format of UDP protocol and explain each field in detail 5

PART-B
Total 15 Marks (No Choice)

No. Question Marks


2 a) In a network using the Selective-Repeat protocol with m = 4 and the sending window of 5
size 8, the value of variables are Sf = 62, Sn = 67, and Rn = 64. Packet 65 has already
been acknowledged at the sender site; packets 65 and 66 are received out-of-order at the
receiver site. Assume that the network does not duplicate the packets.
a. What are the sequence numbers of pending data packets (in transit, corrupted,
or lost)?
b. What are the acknowledgment numbers of pending ACK packets (in transit,
corrupted, or lost)?
2 b) In FTP, a user (Jane) wants to retrieve an EBCDIC file named huge from /usr/ 5
users/report directory using the ephemeral port 61017. The file is so large that the user
wants to compress it before it is transferred. Show all the commands and responses

2 c) FTP uses the services of TCP for exchanging control information and data transfer. 5
Could FTP have used the services of UDP for either of these two connections? Explain

PART- C
Total 20 Marks
No. Question Marks
3 a) Analyse the situation. Alice and Bob have no access to telephones or the Internet (think 10
about the old days) to establish their next meeting at a place far from their homes.
a. Suppose that Alice sends a letter to Bob and defines the day and the time of their
meeting. Can Alice go to the meeting place and be sure that Bob is there?
b. Suppose that Bob responds to Alice’s request with a letter and confirms the date and
time. Can Bob go to the meeting place and be sure that Alice is there?
c. Suppose that Alice responds to Bob’s letter and confirms the same date and time. Can
either one go to the meeting and be sure that the other person is there?
d. Analyse and conclude the drawback of this situation and how it can overcome
OR
3 b) Consider the URL for the base HTML file and 3 JPEG images residing on the same 10
server, http://www.bmsce.ac.in/cse/home.html. Analyze and illustrate the steps involved
in transferring a webpage from Server to the Client in case of non-persistent and
persistent connections.
4a) Analyse the segments given below and explain each field in detail with values 10

OR
4b) In TCP, assume a client has 100 bytes to send. The client creates 10 bytes at a time in 10
each 10 ms and delivers them to the transport layer. The server acknowledges each
segment immediately or if a timer times out at 50 ms. Show the segments and the bytes
each segment carries if the implementation uses Nagle’s algorithm with maximum
segment size (MSS) of 30 bytes. The round-trip time is 20 ms, but the sender timer is set
to 100 ms. Does any segment carry the maximum segment size? Is Nagler’s algorithm
really effective here? Why?

***ALL THE BEST***

You might also like