You are on page 1of 4

Bihar Engineering University, Patna

End Semester Examination - 2022


Course: B.Tech Semester:8th Time: 03 Hours
Code: 051813 Subject: Computer networks Full Marks: 70
___________________________________________________________________________________________________________

Instructions:

(i) The marks are indicated in the right-hand margin.


(ii) There are NINE questions in this paper.
(iii) Attempt FIVE questions in all.
(iv) Question No.1 is compulsory.
________________________________________________________________________________

Q.1 Choose the correct answer of the following (any seven):[𝟐 × 𝟕 = 𝟏𝟒]
(a) The maximum length (in byte) of an IPV4 datagram is

(i) 32 (iii) 65535


(ii) 1024 (iv)512

(b) When the mail server sends mail to other mail server, it becomes
(i) SMTP client (ii) SMTP server
(iii) peer (iv) master

(c) Frames from one LAN can be transmitted to another LAN via the device
(i) Router (ii) Repeater

(iii) Bridge (iv) Modem


(d) The first network is
(i) CNNET (ii) NSFNET
(iii)ASAPNET (iv) ARPANET

(e) TCP
(i) Operates at the data link layer

(ii) is connection-orientated and unreliable


(iii) is connected –oriented and reliable
(iv) is connectionless and unreliable

(f) What is the default subnet mask for a class A network?


(i) 127.0.0.1 (ii) 255.0.0.0

(iii) 255.255.255.0.0 (iv) 255.255.255.0


(g) What is the port number for POP3?

P.T.O.
(i) 110 (iii) 80

(ii) 90 (iv) 49
(h) Which protocol does DHCP use at the transport layer?

(i) IP (iii) UDP


(ii) TCP (iv) ARP

(i) A physical layer is responsible for


(i) line coding (ii) channel coding
(iii) Modulation (iv) All the above

(j) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
(i) CDMA (ii) CSMA/CA

(iii) ALOHA (iv) TDMA

Q.2
(a)What is the important and duties of Application Layer? A system 100 bytes mgs is send
through a private internet using the TCP/IP protocol suite. If the protocol adds a 10-bytes
header at each layer, what is efficiency of the system?
[7]

(b) Explain the major categories of transmission media, Difference between twisted pair cable
and fiber optics cable. Explain the political policies of physical distribution of relational
database tables across multiple sites

[7]

Q.3
(a) Explain random access protocol. Difference between pure ALOHA and Slotted ALOHA.

[7]
(b) Compare and Contrast a random access protocol with a controlled access protocol.
Explain why collision is an issue in a random access protocol but not in controlled access or
channelizing protocol.
[7]

Q.4
(a) Compare and contrast the IPV4 and IPV6 header field. Do they have any field in
common?

[7]

P.T.O.
(b) A router with IP address 125.45.23.12 and Ethernet physical address 23:45:AB:4F:67:CD
has received a packet from a host to destination with IP address 125.11.78.10 and Ethernet
physical address AA:BB:A2:4F:67:CD.
Show the entries in the ARP request packet sent by the router and also show the entries in
ARP packet sent in response. Assume no sub netting.\

[7]

Q.5
(a) Describe about service provided by Transport layer

[𝟕]
(b) Why does the transport layer take measures to control congestion when it is primarily
handled at the network layer? TCP is provided with techniques to control congestion, but not
UDP Why?

[𝟕]

Q.6
(a)An FTP server has received a packet from an FTP client with IP address 153.2.7.9.The
FTP server wants to verify that the FTP client is an authorized client .The FTP server can
consult a file containing the list of authorized clients. However, the file consists only of
domain name. The FTP server has only the IP address of requesting client, which was the
source IP address in the received IP datagram. The FTP server asks the resolver to send an
inverse query to a DNS server to ask for the name of the FTO client.

[𝟕]
(b) Show the sequence of characters exchanged between the TELNET client and the server to
switch from
I. Default mode to character mode
II. Characters mode to default mode
III. Default mode to line mode
IV. Line mode to character mode
[𝟕]
Q.7
(a) Why is a connection established for mail transfer needed if TCP has already established a
connection? User aaa@xxx.com send a message to user bbb@yyy.com , which is the
forwarded to user ccc@zzz.com .Show all SMTP commands and response

[𝟕]
(b) Define the type of the following destination address:

I. 4A:30:10:21:10:1A
II. 47:20:1B:2E:08:EE
III. FF:FF:FF:FF:FF:FF

P.T.O.
[7]

Q.8
(a) Find the class of each address

I. 00000001 00001011 00001011 11101111


II. 11000001`10000011 00011011 11111111
III. 10100111 11011011 10001011 01101111
IV. 11110011 10011011 11111011 00001111
[7]

(b) With a neat diagram, explain distance vector routing protocol.


[7]

Q.9
(a). Explain in detail about TCP IP protocol suite with neat diagram
[7]
(b). A TCP connection is using a window size of 10,000 bytes and the previous
acknowledgment number was 22,001.
[7]

END OF THE QUESTION PAPER

P.T.O.

You might also like