Cloud Computing Bible1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

USN 1 S I 6CCI01

Siddaganga Institute of Technology, Tumakuru – 572 103


(An Autonomous Institution affiliated to VTU, Belagavi, Approved by AICTE, New Delhi)

Sixth Semester B.E. Examinations April – May 2018


Computer Networks
(Common to CS / IS)
Time: 3 Hours Max. Marks: 100
Note : 1. Question No. 1 is Compulsory.
2. Answer any 4 full questions from question No. 2 to Question No. 6.

1 a) Find the class of the classfull IP address 130.35.54.12. 1


b) If n=14 change of the prefix length to a mask in dotted decimal notation. 1
c) Give an example for transient AS. 1
d) What is the purpose of using expiration timers in RIP? 1
e) List different types of LSPs. 2
f) Give an example for well known path attribute. 1
g) An AS number in an organization is 24101. Find the range of multicast addresses that the
organization can use in the GLOP block. 1
h) Change the multicast IP address 238.212.24.9 to an Ethernet multicast address. 1
i) Assume a host with Ethernet address (F5-A9-23-11-9B-E2)16 has joined the network. What
would be its global unicast, address if the global unicast prefix of the organization is
3A21:1216:2165 and the subnet identifier is A243. 1
j) A packet has arrived in which the offset value is 100, the value of HLEN is 5, and the value
of the total length field is 100. What are the numbers of the first byte and the last byte? 2
k) What is silly window syndrome? What is the solution for silly window syndrome? 2
ℓ) The following is the content of a UDP header in hexadecimal format: CB84000D001C001C.
i) What is the destination port number? Ii) What is the total length of the user datagram? 2
m) If the token bucket capacity is 10,000 tokens and tokens are added at the rate of 1,000 tokens
per second. If the system is idle for 10 seconds (or more), the bucket collects 10,000 tokens and
becomes full. Any additional token will be discarded. What is the maximum average rate? 2
n) Mention the hierarchy of proxy server locations. 2

2 a) Discuss different policies applied to prevent congestion with open loop congestion control
mechanisms. 5
b) With the state transition diagram explain the different states of DCHP client. 6
c) An ISP is granted the block 80.70.56.0/21. The ISP needs to allocate addresses for two
organisations each with 500 addresses, two organisations each with 250 addresses and three
organisations each with 50 addresses.
i) Find the number of range of addresses in the ISP block.
ii) Find the range of addresses for each organization.
iii) Find the range of unallocated addresses. 9

3 a) Show IPV4 packet format and identify the purpose of every field in IPV4 and explain. 8
b) Consider the network as shown in Fig. 3(b).

i) Use Dijkstra’s algorithm to find the set of shortest


paths from node 4 to other nodes.
ii) Construct the set of associated routing table entries.
Fig. 3(b) 8
-1- Please Turn Over
-2- 6CCI01
c) Explain in brief an operation of external BGP (eBGP). 4

4 a) With an example topology explain protocol independent multicast-protocol in spare


mode(PIM-SM) 8
b) Discuss the two approaches of multicast routing. 6
c) Enumerate the extension headers used in IPV6 and examine the purpose of each of them. 6

5 a) Explain in detail, the process of TCP connection establishment using three-way handshaking. 8
b) Identify some of the typical application that can benefit more from the services of UDP rather
than TCP. 6
c) Construct the transition diagrams for half-close connection termination and explain. 6

6 a) Explain how RSVP protocol is used to achieve quality of service in unicast and multicast
applications. 8
b) Interpret the steps involved in name and address resolution in DNS with neat diagram. 6
c) Summarise Mine data types along with the header format. 6
________

You might also like