Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

COMSATS University Islamabad, Wah Campus: Final (Fall 2020)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

COMSATS University Islamabad, Wah

Campus
Final (Fall 2020)

Department of: COMPUTER SCIENCE

Class/Program: BSE-4A &B Date: 11/01/2021


Subject: DCCN Instructor: Ms.Faiza Akram
Total Time Allowed: 3 Hours Maximum Marks: 60
Student Name: Registration #:

Note: The marks for each question are given. Write your complete name and registration
number on each side of answer sheet. If two or more than two answers submitted by different
students are found matching, all matching answers will get zero marks. Please submit the
soft copy via CUOnline within the given time. In case CUOnline is not working, please send
it to the email faizaakram1992@gmail.com within the given time. The file name of the
submitted document should be the student registration number, like Fall2020-BCS-001.pdf.
Please send the document with Subject “Terminal-{put your registration number}”, e.g.,
“Terminal-SP18-BSE-001”.Solve question parts sequentially.

Question #01 [CLO: C1, C2] [Marks: 18]


a) For achieving reliability at the transport layer, there can be two types of pipeline approaches;
(i) Selective Repeat, and (ii) Go-back-N. You are required to explain through an example
scenario whether TCP uses selective repeat or GBN or any other approach. When TCP
connection receives data, it store it in receiver buffer and receiver may read this data after some
time. If the application is relatively slow at reading data, the sender can easily overflow
receiver buffer? How does TCP solve this problem? Explain with help of an example scenario.
(5)
b) Suppose an attacker knows that a target TCP host uses SYN cookies. Can the attacker create a
half-open or fully open connections by simply sending an ACK packet to the target? Why or
why not? (3)
c) Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The
first segment has sequence number 140; the second has sequence number 165. (5)
i. . How much data is in the first segment?
ii. Suppose that the first segment is lost but the second segment arrives at B. In the
acknowledgment that Host B sends to Host A, what will be the acknowledgment
number?
d) Explain why is TCP slow start? Explain it with help of diagram. Explain AIMD? (5)

Question #02 [CLO: C3] [Marks: 10]


a) Keep in mind the concept of IP datagram fragmentation. Suppose there is a datagram of 8000
bytes and this datagram needs to be routed on a link with MTU of 1800 bytes. Original
datagram is stamped with an ID # “X”. Perform data fragmentation. (5)
b) Write the reason of using NAT table in a network? Suppose in private network ID is 172.16.0.0
and the public IP is 140.56.17.1. Write NAT table if private network IP sends data to a
destination (write destination address& port number of your choice). (3)
c) What is the problem of oscillations in Link state routing algorithms and what is the reason of
this? (2)

Question #03 [CLO: C4] [Marks: 10]


From the given graph find the shortest path from x to all other nodes. Also draw the forwarding
table. Choose a ten-digit random number that should start with your registration number (no digit
should be zero).For example if your registration is SP18-BSE-045 then the random number could
be 4528796319. Each digit will be the weight of the link. (10)
9
v y

4 8
6
u 5
9
w
3
2
7

z
x
1
Question #04 [CLO: C3] [Marks: 12]
a) What is hidden terminal problem? How it can be solved using control signals? (4)
b) Perform CRC. The divisor is 𝑥 4 +𝑥 2 +𝑥1 +1 and the dividend is “1’s complement of 8-bit binary
of your registration number”. Perform operations on both sender’s and receiver’s side. (5)
c) The data is 10100110,11011010,10101011,10101010. Perform two dimensional parity check
code. (3)

Question #05 [CLO: C4] [Marks: 10]


a) Convert your registration number into 8 bit binary code, then take 1’s complement of this and
then plot that digital data into a digital signal using NRZ-I Polar Scheme.(3).
b) Convert your registration number into 8 bit binary code, then take 1’s complement of this and
then plot that digital data into a digital signal using 2B/1Q according to given transition
table.(3).
Previous Previous
Level: Level:
Positive Negative
Next Bit Next Next
Transition Table
Level Level
00 -3 +3
01 -6 +6
10 +3 -3
11 +6 -6

c) Consider a link with a bandwidth of 7000 and the number of levels used in signals is eight.
The average signal power is 962,080 and average noise power is 280. Calculate the capacity
of this link. Again calculate the bit rate of this channel if this is a noiseless channel. (4)

Good Luck

You might also like