0% found this document useful (0 votes)
38 views

Course: Be Cse & B.Tech IT Cs8591 Computer Networks Sem & Class: V Sem Iii Cse & It Duration: 1 Hour 30 Mins Maximum: 50 Marks Answer ALL Questions

1) The document discusses a computer networks exam for a class covering topics like scatternets, Bluetooth, access points, IPv4 vs IPv6, and routing protocol metrics. 2) It includes two parts, with part A containing 7 short answer questions worth 2 marks each, and part B containing 3 longer answer questions worth 12 marks each. 3) The questions assess knowledge of Bluetooth architecture, Ethernet frame format, ICMP redirect messages, IPv4 to IPv6 transition strategies, and common routing protocol metrics.

Uploaded by

Vidhya Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Course: Be Cse & B.Tech IT Cs8591 Computer Networks Sem & Class: V Sem Iii Cse & It Duration: 1 Hour 30 Mins Maximum: 50 Marks Answer ALL Questions

1) The document discusses a computer networks exam for a class covering topics like scatternets, Bluetooth, access points, IPv4 vs IPv6, and routing protocol metrics. 2) It includes two parts, with part A containing 7 short answer questions worth 2 marks each, and part B containing 3 longer answer questions worth 12 marks each. 3) The questions assess knowledge of Bluetooth architecture, Ethernet frame format, ICMP redirect messages, IPv4 to IPv6 transition strategies, and common routing protocol metrics.

Uploaded by

Vidhya Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

www.AUNewsBlog.

net

COURSE: BE CSE & B.TECH IT


CS8591 COMPUTER NETWORKS
Sem & Class: V Sem III CSE & IT

Duration: 1 Hour 30 Mins Maximum: 50 Marks


Answer ALL questions

PART A - (7 X 2 = 14 marks)
What is Scatternet? K-1
A scatternet is a number of interconnected piconets that supports communication between
1. 2 CO-2
more than 8 devices. Scatternets can be formed when a member of one piconet (either the
master or one of the slaves) elects to participate as a slave in a second, separate piconet.
How would you describe access point? K-2
In a wireless local area network (WLAN), an access point is a station that transmits and
2. receives data (sometimes referred to as a transceiver). An access point connects users to 2 CO-2
other users within the network and also can serve as the point of interconnection between
the WLAN and a fixed wire network.
What is Bluetooth? K-1
A Bluetooth device works by using radio waves instead of wires or cables to connect with
3. your cell phone, smartphone or computer. Bluetooth is a wireless short-range 2 CO-2
communications technology standard found in millions of products we use every day –
including headsets, smartphones, laptops and portable speakers.
Compose the OSPF header format K-3

4. 2 CO-3

When ICMP redirect message is is used. K-3


An ICMP redirect is an error message sent by a router to the sender of an IP packet
5. .Redirects are used when a router believes a packet is being routed sub optimally and it 2 CO-3
would like to inform the sending host that it should forward subsequent packets to that
same destination through a different gateway.
Why is IPv4 to IPv6 transition required? K-2
Define a transition day on which every host or router should stop using the old version and
6. 2 CO-3
start using the new version. However this is not practical, because of huge number of
systems in the internet, the transition from IPV4 to IPV6 cannot happen suddenly. It will

IAE_2_CN_Answer_KEY Page 1
www.AUNewsBlog.net
take considerable amount of time before every system in the internet can move from IPV4
to IPV6. The transition must be smooth to prevent any problems between IPV4 and IPV6.
www.AUNewsBlog.net
Strategy implemented are dual stack, tunneling. Header translation
What are the metrics used by routing protocol? K-2
For some routing protocols these metrics are static and may not be changed. For other
7. 2 CO-3
routing protocols these values may be assigned by a network administrator. The most
common metric values are hop, bandwidth, delay, reliability, load, and cost.

PART B - (3 X 12 = 36 marks)
Explain in detail the architecture and functions in Ethernet with neat diagram. K-3

Preamble. This field contains 7 bytes (56 bits) of alternating 0s and 1s

Start frame delimiter (SFD). This field (1 byte: 10101011) signals the beginning of
the frame.

Destination address (DA). This field is six bytes (48 bits) and contains the link- layer
address of the destination station or stations to receive the packet.

Source address (SA). This field is also six bytes and contains the link-layer address of
8. (a) the sender of the packet. 12 CO-2

Type. This field defines the upper-layer protocol whose packet is encapsulated in the
frame. This protocol can be IP, ARP, OSPF, and so on

Data. This field carries data encapsulated from the upper-layer protocols. It is a
minimum of 46 and a maximum of 1500 bytes.

CRC. The last field contains error detection information, in this case a CRC-32. The
CRC is calculated over the addresses, types, and data field.

10Base5: Thick Ethernet The first implementation is called 10Base5, thick Ethernet,
or Thicknet.
10Base2: Thin Ethernet The second implementation is called 10Base2, thin
Ethernet, or Cheapernet.

10Base-T: Twisted-Pair Ethernet


The third implementation is called 10Base-T or twisted-pair Ethernet.

10Base-F: Fiber Ethernet


Although there are several types of optical fiber 10-Mbps Ethernet, the most common

IAE_2_CN_Answer_KEY Page 2
www.AUNewsBlog.net
is called 10Base-F.
www.AUNewsBlog.net
OR
How would you describe about Bluetooth and develop with neat sketch about its K-3
architecture?
Architecture
Bluetooth defines two types of networks: piconet and scatternet.
Piconets
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight
stations, one of which is called the primary; the rest are called secondaries
Scatternet
Piconets can be combined to form what is called a scatternet. A secondary station in
one piconet can be the primary in another piconet.

(b) 12 CO-2
Bluetooth Layers
L2CAP
The Logical Link Control and Adaptation Protocol, or L2CAP (

9. (a) Explain about IPV6? Compare IPV4 and IPV6. 12 CO-3 K-3
An IPv6 address is a 128-bit binary value, which can be displayed as 32 hexadecimal
digits. Colons isolate entries in a sequence of 16-bit Hexadecimal fields. It provides 3.4
x 1038 IP addresses. This version of IP addressing is designed to fulfill the needs of
exhausting IP’s and providing sufficient addresses for future Internet growth
requirements.
As IPv4 uses two-level address structure where the use of address space is insufficient.
That was the reason for proposing the IPv6, to overcome the deficiencies IPv4. The
format and the length of the IP addresses were changed along with the packet format
and protocols were also modified.

IAE_2_CN_Answer_KEY Page 3
www.AUNewsBlog.net
BASIS OF
IPV4
www.AUNewsBlog.net IPV6
COMPARISON

Address Configuration Supports Manual Supports Auto-


and DHCP configuration and
configuration. renumbering

End-to-end connection Unachievable Achievable


integrity

Address Space It can generate 4.29 It can produce quite a large


x 109 addresses. number of addresses, i.e.,
3.4 x 1038.

Security features Security is IPSEC is inbuilt in the


dependent on IPv6 protocol
application

Address length 32 bits (4 bytes) 128 bits (16 bytes)

Address In decimal In hexadecimal


Representation

Fragmentation Sender and Only by the sender


performed by forwarding routers

Packet flow Not available Available and uses flow


identification label field in the header

Checksum Field Available Not available

Message Transmission Broadcasting Multicasting and


Scheme Anycasting

Encryption and Not Provided Provided


Authentication

OR
(b) With the neat sketches generalize the algorithm of link state routing and 12 CO-3 K-4
explain the same
Two phases
◆ Reliable flooding
» Tell all routers what you know about your local topology
◆ Path calculation (Dijkstraʼs algorithm)
» Each router computes best path over complete network

IAE_2_CN_Answer_KEY Page 4
www.AUNewsBlog.net
Motivation
◆ Global information allows optimal route computation
www.AUNewsBlog.net
◆ Straightforward to implement and verify
Graph algorithm for single-source shortest path tree
S ! {}
Q ! <remaining nodes keyed by distance>
While Q != {}
u ! extract-min(Q)
S ! S plus {u}
for each node v adjacent to u
“relax” the cost of v

Broadcasting Link State


Reliable flooding
◆ Each router transmits a Link State Packet (LSP) on all links
◆ A neighboring router forwards out all links except incoming
» Keep a copy locally; don’t forward previously-seen LSPs
Challenges
◆ Packet loss

◆ Out-of-order arrival
Solutions
◆ Acknowledgments and retransmissions

◆ Sequence numbers
◆ Time-to-live for each packet

With neat sketch explain about IP service model, Packet format, Fragmentation K-3
and reassembly.
IP stands for Internet Protocol Key tool used today to build scalable, heterogeneous
10. (a) 12 CO-3
internetworks
A IP router is a gateway from one network to another Can interface with many
network types Ethernet PPP Token Ring 802.11

IAE_2_CN_Answer_KEY Page 5
www.AUNewsBlog.net
www.AUNewsBlog.net

IP Fragmentation and Reassembly


Each network has some MTU (Maximum Transmission Unit)
Ethernet (1500 bytes), FDDI (4500 bytes)
Strategy
Fragmentation occurs in a router when it receives a datagram that it wants to
forward over a network which has (MTU < datagram)
Reassembly is done at the receiving host
All the fragments carry the same identifier in the Ident field
Fragments are self-contained datagrams
IP does not recover from missing fragments
IP Addressing
Globally unique logical address for a host
Address resolution
Logical to physical address mapping
What was the physical address?
Is possible to address any host in the network
Even if on different physical network
32-bit number that uniquely identifies a
location
Written using dotted decimal notation
Common form: 134.161.240.211
Binary representation:
10000110 10100001 11110000 11010011
Two-level hierarchy: network id and host id
Network IDs administered by Internet Assigned Number Authority (IANA)
Host IDs administered locally
IP address is assigned to each network
interface (NIC)
Routers connect two or more physical networks
Each interface has its own address
Multi-homed host
A host having multiple connections to Internet
Multiple addresses identify the same host
Does not forward packets between its interfaces
Classful addressing scheme separates groups of
addresses into classes
Class A
8 bits used for network (256)
24 bits used for hosts and network devices (16,777,216)
Binary address starts with 0
Class B
16 bits for networks (65,536)

IAE_2_CN_Answer_KEY Page 6
www.AUNewsBlog.net
16 bits for hosts and network devices (65,536)
binary address starts with 10
www.AUNewsBlog.net
Class C
24 bits for the network (16,777,216)
8 bits for the host (256)
Binary address starts with 110

OR
Discuss in detail about open source shortest path routing with neat diagram. K-4
Open Shortest Path First (OSPF) is a link-state routing protocol which is used to find
the best path between the source and the destination router using its own Shortest Path
First).
Router I’d
Router priority
Designated Router (DR)
Backup Designated Router (BDR)
DR and BDR election – DR and BDR election takes place in broadcast network or
multi access network. Here is the criteria for the election:
Router having the highest router priority will be declared as DR.
If there is a tie in router priority then highest router I’d will be considered. First,
highest loopback address is considered. If no loopback is configured then the highest
(b) 12 CO-3
active IP address on the interface of the router is considered.
OSPF states
Down In this state, no hello packet have been received on the interface.
INIT – In this state, hello packet have been received from the other router.
2WAY – In the 2WAY state, both the routers have received the hello packets from
other routers. Bidirectional connectivity has been established.
Exstart – In this state, NULL DBD are exchanged.In this state, master and slave
election take place.
Exchange – In this state, the actual DBDs are exchanged.
Loading – In this sate, LSR, LSU and LSA (Link State Acknowledgement) are
exchanged.
Full – In this state, synchronization of all the information takes place. OSPF routing
can begin only after the Full state.

IAE_2_CN_Answer_KEY Page 7
www.AUNewsBlog.net

You might also like