Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CCN Assignment 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Review Questions

1. Suppose that the UDP receiver computes the Internet checksum for the received UDP
segment and finds that it matches the value carried in the checksum field. Can the receiver
be absolutely certain that no bit errors have occurred? Explain.

2. UDP and TCP use 1s complement for their checksums. Suppose you have the following
three 8-bit bytes: 01010011, 01100110, 01110100. What is the 1s complement of the sum
of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the
checksum, for this problem you are being asked to consider 8-bit sums.) Show all work.
Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum?
With the 1s complement scheme, how does the receiver detect errors? Is it possible that a
1-bit error will go undetected?

3. Draw the FSM for the receiver side of protocol rdt3.0.


4. Differentiate between UDP and TCP protocols.
5. Explain the multiplexing and demulitplexing techniques. With a neat diagram of the
TCP/UDP segment formats explain a scenario and elaborate with respect to the changes in
the address fields during the multiplexing and demultiplexing process.
6. With an example of a network scenario explain the Connection oriented demux technique.
7. With the help of a flow chart and state diagram, explain the principles of reliable data
transfer.
8. Describe the operation of rdt2.0 considering the scenarios with errors and with no errors.
9. With a FSM explain how the sender, handles garbled ACK/NAKs with respect to rdt2.1
10. List the examples of pipelined protocols. Differentiate between their operations (Go-Back-
N and Selective repeat)with an example scenario.
11. Explain the TCP retransmission for lost ACK scenario and for scenario with premature
timeout.
12. With the help of a FSM explain the TCP 3-way handshake.
13. Identify the two important network-layer functions. Explain the functioning of a routing
protocol with the help of a self defined network scenario and demonstrate the formation of
forwarding tables.
14. What are the three identifiable phases in a virtual circuit.Explain how the network layer
helps in the process of VC maintainance.

15. Discuss the architecture of a generic router. Highlight on decentralizing switching


technique.
16. Compare and contrast link-state and distance-vector routing algorithms.

17. Compare and contrast the advertisements used by RIP and OSPF.

18. What is meant by subnetting. Explain why a subnet mask is used.

19. Explain the IPv4 datagram format. Highlight on IP fragmentation and reassembly.

20. For the IP 192.168.1.0, Give the total no. of subnets, blocksize, first host and last host of
each subnet for a CIDR value of 28.

21. Write a short notes on DHCP.

22. Explain the concepts CSMA with different persistent a) p-persistent b) Non-persistent c)
1-persistent.

You might also like