Course: Be Cse & B.Tech IT Cs8591 Computer Networks Sem & Class: V Sem Iii Cse & It Duration: 1 Hour 30 Mins Maximum: 50 Marks Answer ALL Questions
Course: Be Cse & B.Tech IT Cs8591 Computer Networks Sem & Class: V Sem Iii Cse & It Duration: 1 Hour 30 Mins Maximum: 50 Marks Answer ALL Questions
net
PART A - (7 X 2 = 14 marks)
What is Scatternet? K-1
A scatternet is a number of interconnected piconets that supports communication between
1. 2 CO-2
more than 8 devices. Scatternets can be formed when a member of one piconet (either the
master or one of the slaves) elects to participate as a slave in a second, separate piconet.
How would you describe access point? K-2
In a wireless local area network (WLAN), an access point is a station that transmits and
2. receives data (sometimes referred to as a transceiver). An access point connects users to 2 CO-2
other users within the network and also can serve as the point of interconnection between
the WLAN and a fixed wire network.
What is Bluetooth? K-1
A Bluetooth device works by using radio waves instead of wires or cables to connect with
3. your cell phone, smartphone or computer. Bluetooth is a wireless short-range 2 CO-2
communications technology standard found in millions of products we use every day –
including headsets, smartphones, laptops and portable speakers.
Compose the OSPF header format K-3
4. 2 CO-3
IAE_2_CN_Answer_KEY Page 1
www.AUNewsBlog.net
take considerable amount of time before every system in the internet can move from IPV4
to IPV6. The transition must be smooth to prevent any problems between IPV4 and IPV6.
www.AUNewsBlog.net
Strategy implemented are dual stack, tunneling. Header translation
What are the metrics used by routing protocol? K-2
For some routing protocols these metrics are static and may not be changed. For other
7. 2 CO-3
routing protocols these values may be assigned by a network administrator. The most
common metric values are hop, bandwidth, delay, reliability, load, and cost.
PART B - (3 X 12 = 36 marks)
Explain in detail the architecture and functions in Ethernet with neat diagram. K-3
Start frame delimiter (SFD). This field (1 byte: 10101011) signals the beginning of
the frame.
Destination address (DA). This field is six bytes (48 bits) and contains the link- layer
address of the destination station or stations to receive the packet.
Source address (SA). This field is also six bytes and contains the link-layer address of
8. (a) the sender of the packet. 12 CO-2
Type. This field defines the upper-layer protocol whose packet is encapsulated in the
frame. This protocol can be IP, ARP, OSPF, and so on
Data. This field carries data encapsulated from the upper-layer protocols. It is a
minimum of 46 and a maximum of 1500 bytes.
CRC. The last field contains error detection information, in this case a CRC-32. The
CRC is calculated over the addresses, types, and data field.
10Base5: Thick Ethernet The first implementation is called 10Base5, thick Ethernet,
or Thicknet.
10Base2: Thin Ethernet The second implementation is called 10Base2, thin
Ethernet, or Cheapernet.
IAE_2_CN_Answer_KEY Page 2
www.AUNewsBlog.net
is called 10Base-F.
www.AUNewsBlog.net
OR
How would you describe about Bluetooth and develop with neat sketch about its K-3
architecture?
Architecture
Bluetooth defines two types of networks: piconet and scatternet.
Piconets
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight
stations, one of which is called the primary; the rest are called secondaries
Scatternet
Piconets can be combined to form what is called a scatternet. A secondary station in
one piconet can be the primary in another piconet.
(b) 12 CO-2
Bluetooth Layers
L2CAP
The Logical Link Control and Adaptation Protocol, or L2CAP (
9. (a) Explain about IPV6? Compare IPV4 and IPV6. 12 CO-3 K-3
An IPv6 address is a 128-bit binary value, which can be displayed as 32 hexadecimal
digits. Colons isolate entries in a sequence of 16-bit Hexadecimal fields. It provides 3.4
x 1038 IP addresses. This version of IP addressing is designed to fulfill the needs of
exhausting IP’s and providing sufficient addresses for future Internet growth
requirements.
As IPv4 uses two-level address structure where the use of address space is insufficient.
That was the reason for proposing the IPv6, to overcome the deficiencies IPv4. The
format and the length of the IP addresses were changed along with the packet format
and protocols were also modified.
IAE_2_CN_Answer_KEY Page 3
www.AUNewsBlog.net
BASIS OF
IPV4
www.AUNewsBlog.net IPV6
COMPARISON
OR
(b) With the neat sketches generalize the algorithm of link state routing and 12 CO-3 K-4
explain the same
Two phases
◆ Reliable flooding
» Tell all routers what you know about your local topology
◆ Path calculation (Dijkstraʼs algorithm)
» Each router computes best path over complete network
IAE_2_CN_Answer_KEY Page 4
www.AUNewsBlog.net
Motivation
◆ Global information allows optimal route computation
www.AUNewsBlog.net
◆ Straightforward to implement and verify
Graph algorithm for single-source shortest path tree
S ! {}
Q ! <remaining nodes keyed by distance>
While Q != {}
u ! extract-min(Q)
S ! S plus {u}
for each node v adjacent to u
“relax” the cost of v
◆ Out-of-order arrival
Solutions
◆ Acknowledgments and retransmissions
◆ Sequence numbers
◆ Time-to-live for each packet
With neat sketch explain about IP service model, Packet format, Fragmentation K-3
and reassembly.
IP stands for Internet Protocol Key tool used today to build scalable, heterogeneous
10. (a) 12 CO-3
internetworks
A IP router is a gateway from one network to another Can interface with many
network types Ethernet PPP Token Ring 802.11
IAE_2_CN_Answer_KEY Page 5
www.AUNewsBlog.net
www.AUNewsBlog.net
IAE_2_CN_Answer_KEY Page 6
www.AUNewsBlog.net
16 bits for hosts and network devices (65,536)
binary address starts with 10
www.AUNewsBlog.net
Class C
24 bits for the network (16,777,216)
8 bits for the host (256)
Binary address starts with 110
OR
Discuss in detail about open source shortest path routing with neat diagram. K-4
Open Shortest Path First (OSPF) is a link-state routing protocol which is used to find
the best path between the source and the destination router using its own Shortest Path
First).
Router I’d
Router priority
Designated Router (DR)
Backup Designated Router (BDR)
DR and BDR election – DR and BDR election takes place in broadcast network or
multi access network. Here is the criteria for the election:
Router having the highest router priority will be declared as DR.
If there is a tie in router priority then highest router I’d will be considered. First,
highest loopback address is considered. If no loopback is configured then the highest
(b) 12 CO-3
active IP address on the interface of the router is considered.
OSPF states
Down In this state, no hello packet have been received on the interface.
INIT – In this state, hello packet have been received from the other router.
2WAY – In the 2WAY state, both the routers have received the hello packets from
other routers. Bidirectional connectivity has been established.
Exstart – In this state, NULL DBD are exchanged.In this state, master and slave
election take place.
Exchange – In this state, the actual DBDs are exchanged.
Loading – In this sate, LSR, LSU and LSA (Link State Acknowledgement) are
exchanged.
Full – In this state, synchronization of all the information takes place. OSPF routing
can begin only after the Full state.
IAE_2_CN_Answer_KEY Page 7
www.AUNewsBlog.net