University QP Computer Networking
University QP Computer Networking
University QP Computer Networking
Instructions:
Q.1 Choose the correct answer of the following (any seven):[𝟐 × 𝟕 = 𝟏𝟒]
(a) The maximum length (in byte) of an IPV4 datagram is
(b) When the mail server sends mail to other mail server, it becomes
(i) SMTP client (ii) SMTP server
(iii) peer (iv) master
(c) Frames from one LAN can be transmitted to another LAN via the device
(i) Router (ii) Repeater
(e) TCP
(i) Operates at the data link layer
P.T.O.
(i) 110 (iii) 80
(ii) 90 (iv) 49
(h) Which protocol does DHCP use at the transport layer?
(j) Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
(i) CDMA (ii) CSMA/CA
Q.2
(a)What is the important and duties of Application Layer? A system 100 bytes mgs is send
through a private internet using the TCP/IP protocol suite. If the protocol adds a 10-bytes
header at each layer, what is efficiency of the system?
[7]
(b) Explain the major categories of transmission media, Difference between twisted pair cable
and fiber optics cable. Explain the political policies of physical distribution of relational
database tables across multiple sites
[7]
Q.3
(a) Explain random access protocol. Difference between pure ALOHA and Slotted ALOHA.
[7]
(b) Compare and Contrast a random access protocol with a controlled access protocol.
Explain why collision is an issue in a random access protocol but not in controlled access or
channelizing protocol.
[7]
Q.4
(a) Compare and contrast the IPV4 and IPV6 header field. Do they have any field in
common?
[7]
P.T.O.
(b) A router with IP address 125.45.23.12 and Ethernet physical address 23:45:AB:4F:67:CD
has received a packet from a host to destination with IP address 125.11.78.10 and Ethernet
physical address AA:BB:A2:4F:67:CD.
Show the entries in the ARP request packet sent by the router and also show the entries in
ARP packet sent in response. Assume no sub netting.\
[7]
Q.5
(a) Describe about service provided by Transport layer
[𝟕]
(b) Why does the transport layer take measures to control congestion when it is primarily
handled at the network layer? TCP is provided with techniques to control congestion, but not
UDP Why?
[𝟕]
Q.6
(a)An FTP server has received a packet from an FTP client with IP address 153.2.7.9.The
FTP server wants to verify that the FTP client is an authorized client .The FTP server can
consult a file containing the list of authorized clients. However, the file consists only of
domain name. The FTP server has only the IP address of requesting client, which was the
source IP address in the received IP datagram. The FTP server asks the resolver to send an
inverse query to a DNS server to ask for the name of the FTO client.
[𝟕]
(b) Show the sequence of characters exchanged between the TELNET client and the server to
switch from
I. Default mode to character mode
II. Characters mode to default mode
III. Default mode to line mode
IV. Line mode to character mode
[𝟕]
Q.7
(a) Why is a connection established for mail transfer needed if TCP has already established a
connection? User [email protected] send a message to user [email protected] , which is the
forwarded to user [email protected] .Show all SMTP commands and response
[𝟕]
(b) Define the type of the following destination address:
I. 4A:30:10:21:10:1A
II. 47:20:1B:2E:08:EE
III. FF:FF:FF:FF:FF:FF
P.T.O.
[7]
Q.8
(a) Find the class of each address
Q.9
(a). Explain in detail about TCP IP protocol suite with neat diagram
[7]
(b). A TCP connection is using a window size of 10,000 bytes and the previous
acknowledgment number was 22,001.
[7]
P.T.O.