0% found this document useful (0 votes)
20 views2 pages

CN-End-Semester 2023

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

Bihar Engineering University, Patna

B. TECH End Semester Examination – 2023

Course Name: Computer Networks Semester:8th Time: 03 Hours


Code: Full Marks: 70
Instructions:-
(i) The marks are indicated in the right-hand margin.
(ii) There are NINE questions in this paper.
(iii) Attempt FIVE questions in all.
(v ) Question No. 1 is compulsory
-----------------------------------------------------------------------------------------------------------------------------------------------
Q.1 Choose the correct answer of the following: [2x7=14]
(a) What is the window size of the Go back N ARQ with 4 bit sequence numbers?
I. 3
II. 7
III. 15
IV. 31
(b) What is the maximum number of networks possible in class C IP addresses
I. 2^14
II. 2^24
III. 2^21
IV. 2^22
(c) When an acknowledgement is lost during Go-Back-N ARQ, the receiver retransmits the
acknowledgement after a timeout.
I. TRUE
II. FALSE
(d) When a collision is detected, the source backs off for a fixed amount of time before retrying for
packet transmission.
I. TRUE
II. FALSE
(e) Which are true for Go Back N ARQ (Window size > N)
I. All segments from 0 to N are retransmitted if segment N is lost.
II. All segments from 1 to (N-1) are retransmitted if Segment N is lost.
III. All segments from 1 to (N) are retransmitted if Segment N is lost.
IV. All segments from 0 to (N-1) are retransmitted if Segment N is lost.

(f) What is the system designed to prevent unauthorized access to or from a private network called.
I. Computer scan
II. Digital scan
III. Biotech
IV. Firewall
(g ) Which of this is not a network edge device?
I. Switch
II. PC
III. Smartphones
V. Servers

Q.2 (a) Explain various components of connection(network) tropology. [7]

(b) Explain the standard OSI model layers. [7]


Q.3 (a) What will be throughput for the Selective-return given, transmission time 1ms,
propagation time 49.5ms, sender window size is 50 and bandwidth is 4mbps. [7]

(b) In GB3(Go-back-N), if every 5th packet that is being transmitted is lost and if we have
to send 10 packets then.
i) How many transmissions required.
ii) Which packets are being re-transmitted. [7]

Q.4 (a) Differentiate between symmetric key cryptosystem and asymmetric key cryptosystem. [7]

(b) Differentiate between active and passive attack with example [7]

Q.5 Compare and explain briefly stop-and-wait, Go-back-N and Selective-return,


for the following parameters.
i) Bandwidth required
ii) CPU required
iii) Implementation.
iv) Re-transmission (if one packet lost)
v) Buffers required [14]

Q.6 (a) What is error detection and its types? [7]

(b) Find out the actual bit string transmitted using the standard CRC method for,

A bit stream 1101011011 and the generator polynomial is x4+x+1. [7]

Q.7 (a) What is classful addressing? Explain all the classes of networks? [7]

(b) What is Hamming distance and Hamming code with example. [7]

Q.8 (a) Explain how SSL provide security, and what services are provided by the SSL record Protocol. [7]

(b) Explain Hash Key Encryption algorithm. How it is used in message authentication. [7]

Q.9 Write short notes on any two of the following: [7x2=14]


i) HTTP
ii) DNS
iii) FTP
iv) SNMP
v) Firewalls
vi) VPN
vii) TELNET

You might also like