CSE 3124 26 Sep 2024
CSE 3124 26 Sep 2024
CSE 3124 26 Sep 2024
Q1. _____ defines the format and the order of messages exchanged between two or more
communicating entities (0.5)
1. Server
2. Client
3. **Protocol
4. Network edge
1. **Application
2. Transport
3. Network
4. Link
Q4. The amount of time required to push all the packet’s bits into the link is ________ (0.5)
1. propagation delay
2. queuing delay
3. processing delay
4. **transmission delay
Q5. Identify the protocol characteristic that allows SMTP to send multiple messages over the same
connection. (0.5)
1. Non-persistent connections
2. ** Persistent connections
3. Multithreading
4. Pipelining
Q6. Choose the statement that illustrates the role of Type NS records in the DNS hierarchy.(0.5)
1. Type NS records specify the mail servers for a domain, affecting email delivery.
2. Type NS records map alias names to canonical names, impacting name resolution.
3. ** Type NS records indicate the authoritative DNS servers for a domain, directing where
queries should be routed.
Q11. Consider the Go-Back-N protocol scenario with a window size of 7 (n=7). Analyse the sender
and receiver side transmissions for the following scenarios with suitable sliding-window diagrams.
Also, indicate the changes at both sender and receiver side windows for every data transmission.
(i) Frame 0 is sent; Frame 0 is acknowledged.
(ii) Frames 1 and 2 are sent; Frames 1 and 2 are acknowledged.
(iii) Frames 3, 4, and 5 are sent; Frames 3 and 4 is acknowledged; Timer for Frame 5 expires.
(iv) Frames 5, 6, and 7 are sent; Frames 5 through 7 are acknowledged. (4)
Ans: [ Windows-1M, Frames-1M, Timer-1M, appropriate Ack-1M]
Although there are many types of LAN technologies, Ethernet is by far the most prevalent access
technology in corporate, university, and home networks. As shown in above figure, Ethernet users
use twisted-pair copper wire to connect to an Ethernet switch. The Ethernet switch, or a network of
such interconnected switches, is then in turn connected into the larger Internet. With Ethernet
access, users typically have 100 Mbps access to the Ethernet switch, whereas servers may have 1
Gbps or even 10 Gbps access. Increasingly, however, people are accessing the Internet wirelessly
from laptops, smartphones, tablets, and other devices (see earlier sidebar on “A Dizzying Array of
Devices”). In a wireless LAN setting, wireless users transmit/receive packets to/from an access point
that is connected into the enterprise’s network (most likely including wired Ethernet), which in turn
is connected to the wired Internet. A wireless LAN user must typically be within a few tens of meters
of the access point. Wireless LAN access based on IEEE 802.11 technology, more colloquially known
as WiFi, is now just about everywhere—universities, business offices, cafes, airports, homes, and
even in airplanes.
Q13. Given that HTTP is stateless, elaborate how websites implemented by Ecommerce companies
can able to track customer’s sessions and preferences across multiple visits. Illustrate its working
with suitable diagram. (3)
Ans: [ How cookies works-2M, explanation and appropriate Diagram-1M]
To manage user sessions and personalize content, HTTP uses cookies. Defined in [RFC 6265], cookies
are small data packets sent by servers to clients (browsers) that are stored and sent back with
subsequent requests. They allow websites to identify users, manage sessions, and customize content
based on user preferences, making them essential for many modern web applications.
• Initial Visit: Susan visits Amazon.com for the first time. Amazon generates a unique ID (e.g.,
1678) and sends it to Susan’s browser via the Set-Cookie header.
• Cookie Storage: Susan’s browser stores this ID in its cookie file.
• Subsequent Requests: Each time Susan requests a page from Amazon, her browser includes
the Cookie: 1678 header, allowing Amazon to track her actions.
• Return Visit: If Susan returns to Amazon later, her browser continues to send the same
cookie ID, enabling Amazon to recognize her and provide personalized recommendations and
services.
Q14. Explain the concepts of multiplexing and demultiplexing in the transport layer.
Which transport layer protocol is to be used for the following cases. Justify your answer.
i) An application that needs to protect the boundaries of its messages.
ii) An application needs a stream-oriented environment in which it accepts the responsibility
of delivering the bytes in-order to the other side. (3)
Ans:[ Multiplexing-0.5 M,Demultiplexing & ports-0.5 M, Protocol-1M, Proper Justification-1M]
Multiplexing: This process occurs at the sender’s side where the transport layer combines data from
multiple applications into a single data stream for transmission. Each application's data is tagged
with a unique source port number, allowing the transport layer to keep track of different data
streams.
Demultiplexing: At the receiver’s side, the transport layer uses the destination port numbers
included in the data packets to direct the data to the correct application. Each application listens on
a specific port number, ensuring that data is delivered to the appropriate process.
Port Numbers: They are used to identify which application the data should be sent to or received
from. This tagging allows multiplexing and demultiplexing to manage multiple data streams
efficiently and accurately.
i. UDP. UDP is a transport layer protocol that helps in transmitting each message as an
independent user datagram thus helps in preserving the message boundary.
ii. TCP. TCP gives a connection-oriented transport layer protocol which transmits a stream of
bytes in order and reliably to the receiver.
Q15. Describe Classful Addressing of IPv4 in detail. Discuss why all the addresses in IPv4 cannot be
assigned to computers.
An organization is granted a network address 172.16.0.0/16.
i) Find the first and last addresses in the block
ii) Find the maximum number of interfaces that can be used by organisation. (3)
Ans: [ Classful addressing-1M, All address can’t be used-0.5M, first and last address-1M,
interfaces-0.5M]
IPv4 (Internet Protocol version 4) is a 32-bit addressing scheme used to identify devices on a
network. In classful addressing, the 32-bit IPv4 address is divided into different parts based on
predefined address classes.
1. Class A
• Range: 0.0.0.0 to 127.255.255.255
2. Class B
• Range: 128.0.0.0 to 191.255.255.255
3. Class C
• Range: 192.0.0.0 to 223.255.255.255
4. Class D
• Range: 224.0.0.0 to 239.255.255.255
5. Class E
• Range: 240.0.0.0 to 255.255.255.255