Self Studies
Selfstudy
Selfstudy

Computer Networks Test 1

Result Self Studies

Computer Networks Test 1
  • Score

    -

    out of -
  • Rank

    -

    out of -
TIME Taken - -
Self Studies

SHARING IS CARING

If our Website helped you a little, then kindly spread our voice using Social Networks. Spread our word to your readers, friends, teachers, students & all those close ones who deserve to know what you know now.

Self Studies Self Studies
Weekly Quiz Competition
  • Question 1
    2 / -0.33
    If in CIDR notation an IP address is written as 172.26.17.1/25 the subnet mask is:
    Solution

    Concept:

    In subnet mask: Network Id are all ones(1’s) and host Id of IP address are all zeros(0’s).

    Calculation:

    IP address consist of host id and network id

    Host Id + Network id = 32 bits

    IP address: 172.26.17.1/25

    Network ID =25 bits

    Therefore, Host ID= 32- (25) = 7

    172.26.17.1 ≡ 172.26.17.00000001

    Subnet Mask (binary) = 11111111. 11111111. 11111111.10000000

    Subnet Mask = 255.255.255.128.

  • Question 2
    2 / -0.33

    Consider a network, in which the data transmission rate is 10 Mbps. It uses CSMA/CD in the MAC layer. The maximum signal propagation time from one node to another node is 50 microseconds. What is the minimum size of a frame in the network?

    Solution

    Data:

    L = size of frame

    BW → bandwidth = 10 Mbps = 10 × 106 b/s

    Tp → propagation time = 50 μs = 50 × 10-6 s

    Tt → transmission time

    Formula:

    For CSMA/CD,

    Tt ≥ 2 × Tp

    \({{\rm{T}}_{\rm{t}}} = \frac{{\rm{L}}}{{{\rm{BW}}}}\)

    Calculation:

    \(\frac{{\rm{L}}}{{{\rm{BW}}}} \ge 2 \times 40 \times {10^{ - 6}}\)

    L ≥ 2 × 50 × 10-6 × 10 × 106

    L ≥ 1000 bits

    L ≥ 125 bytes

    Lmin = 125 bytes

    Therefore, the minimum size of a frame in the network is 125 bytes. 

  • Question 3
    2 / -0.33

    A block of addresses is granted to a small organization. If one of the addresses is 210.32.64.79/26, then what will be the values of the following?

    (i) First address

    (ii) Last address

    (iii) Total number of addresses
    Solution

    IP address is 210. 32. 64. 79/26

    Comparing with a.b.c.d/n

    where n is number of bits in network id.

    0 ≤ a, b, c, d ≤ 255

    Network ID + Host ID = 32

    ∴ Host ID = 32 – 26 = 6

    First address:

    First address is obtained by making right most 32 – n bits to 0. Here n is 26

    32 – 26 = 6, make right most 6 bits to 0.

    210. 32. 64. 79 = 11010010.00100000.01000000.01001111

    First address = 11010010. 00100000. 01000000. 01000000

    In decimal form = 210.32.64. 64

    Last address

    It is obtained by making rightmost 32 – n bits to 1. Make rightmost 6 bits to 1

    It becomes: 11010010. 00100000. 01000000. 01111111

    In decimal form = 210. 32. 64. 127

    Total number of address

    Total number of addresses possible are: 232-n

    232-26 = 26 = 64
  • Question 4
    2 / -0.33
    Let a source S be sender sending packets to destination D using stop and wait protocol. S needs to send 500 packets to D while error occurs during sending the packets is 20%. The total number of packets sent by S is _____.
    Solution

    Data:

    Packets needed to be sent = p = 500

    Error = e = 20% = 0.2

    Total number of packets transmitted by the sender = n

    Concepts:

    In stop and wait protocol, packet loss during transmission is the only packet retransmitted.

    Formula:

    n = p + e × p + e× (e × p) + e × (e× e × p) + e × (e × e× e × p)

    n = p(1 + e + e2 + e3 …)

    \(n = \frac{p}{1 - e}\)

    Calculation:

    \(n = \frac{500}{1 - 0.2}\)

    n = 625

  • Question 5
    2 / -0.33

    Consider a designed link layer protocol. The bandwidth of the link is 2 gigabits per second. The length of the fibre link is 5 ×105 m. If the speed of the light in the given medium is 250000 kilometre per second then the propagation delay of the link is _____ ms.

    Solution

    Data:

    Bandwidth = BW = 2 ×109 bps

    Distance = D = 5 × 105 m = 500 k m

    Speed = V = 2.5 × 105 km/s

    Formula:

    \({\rm{Propagation\;Delay}} = {{\rm{T}}_{\rm{p}}} = \frac{{\rm{D}}}{{\rm{V}}}{\rm{\;}}\)

    Calculation:

    \( {{\rm{T}}_{\rm{p}}} = \frac{{\rm{D}}}{{\rm{V}}} = \frac{{500}}{{2.5 × {{10}^5}}} = 2 × {10^{ - 3}} = 2\;ms\)

    The propagation delay in this link is 2 ms.

  • Question 6
    2 / -0.33

    Your router has the following IP address a Ethemet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router?

    1. 172.16.1.100

    2. 172.16.1.198

    3. 172.16.2.255

    4. 172.16.3.0

    Solution

    Concept:

    a.b.c.d/NID

    Therefore 23 bits are in NID and only 9 bits for Host id.

    Explanation:

    Last two-byte of IP address is represented in binary

    Ethernet: 172.16.2.1/23

    Range of IP address: 172.16.0000 00010.0000000 to 172.16.0000011.11111111

    Range of IP address: 172.16.2.0 to 172.16.3.255

    First and last IP address is reserved

    Valid Host IP address: 172.16.2.1 to 172.16.3.254

    Statement 1: 172.16.1.100

    It is not valid since it does not fall in the range

    Statement 2: 172.16.1.198

    It is not valid since it does not fall in the range

    Statement 3: 172.16.2.255

    It is valid since it does fall in the valid range

    Statement 4:172.16.3.0

    It is valid since it does fall in the valid range

    Hence option 3 is the correct answer.

    Important Point:

    NID stands for network ID.
  • Question 7
    2 / -0.33

    Consider a binary code that consists of only 5 valid codewords as given below.

    10111, 00011, 10110, 11111 and 00001

    P is the minimum Hamming distance and Q is the maximum Hamming distance. The number of P and Q possible are _____ and _____ respectively.

    Solution

    Codeword

    Hamming distance

    10111 and 00011

    2

    10111 and

    10110

    1 (P)

    10111 and

    11111

    1 (P)

    10111 and 00001

    3

    00011 and 10110

    3

    00011 and 11111

    3

    00011 and 00001

    1 (P)

    10110 and 11111

    2

    10110 and 00001

    4 (Q)

    11111 and 00001

    4 (Q)

     

    Number of P = 3

    Number of Q = 2

  • Question 8
    2 / -0.33
    Consider a classful addressing scheme in which the percentage (%) of IP address covered by Class A is x and by Class C is y. What is the value of x + y? 
    Solution

    IPv4 address size = 32 bit

    Number of IP address possible = 232

    Class of IP address

    Bit reserved for last byte

    Total IP address possible

    Percentage

    Class A

    1 bit

    231

    \(\frac{{{2}^{31}}}{{{2}^{32}}}\times 100=50%\)

    Class B

    2 bits

    230

    \(\frac{{{2}^{30}}}{{{2}^{32}}}\times 100=25%\)

    Class C

    3 bits

    229

    \(\frac{{{2}^{29}}}{{{2}^{32}}}\times 100=12.5%\)

    Class D

    4 bits

    228

    \(\frac{{{2}^{28}}}{{{2}^{32}}}\times 100=6.25%\)

    Class E

    4 bits

    228

    \(\frac{{{2}^{28}}}{{{2}^{32}}}\times 100=6.25%\)

    x = 50

    y = 12.5

    Therefore, x + y = 50 + 12.5 = 62.5
  • Question 9
    2 / -0.33

    Consider the following application layer services:

    (a) Domain names to IP Address mapping

    (b) Data Communication over World Wide Web

    (c) Electronic mail transmission

    (d) Retrieve e-mail from a remote server

    (e) Transfer files from one host to another host

    Which one of the following order of application layer protocols is correct for the above services?
    Solution

    DNS: (Domain Name System)

    • The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
    • DNS protocol is used for Domain names to IP Address mapping.


    HTTP: (Hypertext Transfer Protocol)

    • It is an application-layer protocol for transmitting hypermedia documents, such as HTML.
    • It was designed for communication between web browsers and web servers, but it can also be used for other purposes


    SMTP: (Simple Mail Transfer Protocol)

    • SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another.
    • SMTP uses port 25.


    POP (Post Office Protocol)

    • POP is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine.


    FTP (File Transfer Protocol)

    • FTP stands for file transfer protocol. It is provided by TCP/IP for copying a file from one host to another. FTP can transfer a file through one of the following three modes: stream mode, block mode and compressed mode. Stream mode is the default mode.
    • FTP uses two TCP connections one for data and another for control.


    Therefore option 3 is correct

  • Question 10
    2 / -0.33

    Consider a long-lived TCP session, for which the end-to-end bandwidth 4 Gb/s. The session starts with a sequence number of (0000)16 . The minimum time in seconds before this sequence number can be used again is _____.

    Note: answer up to one decimal places)

    Solution

    Concepts:

    Bytes are numbered in TCP protocol

    Calculation:

    4 Gb → 1 second

    \(1 \;b \to \frac{1}{{4 \times {{10}^9}\;}}\;seconds\)

    \(8 \;b \to \frac{8}{{4 \times {{10}^9}\;}}\;seconds\)

    \(1 \;B \to \frac{8}{{4 \times {{10}^9}\;}}\;seconds\)

    Sequence number = 32 bits

    \(2^{32} \;B \to \frac{2^{32}\times8}{{4 \times {{10}^9}\;}}\;seconds\)

    \({2^{32}}B \to 8.58\;seconds\)

    The minimum time before this sequence number can be used again is 8.58 seconds.

  • Question 11
    2 / -0.33
    If the data frame is 1101011011 and the divisor is 10011 in a CRC error detection process, a burst error 0000010011 occurs in transmission, Justify whether it will be detected:
    Solution

    Concept:

    CRC stands for cyclic redundancy check.  It is an error detection technique which is used in digital networks such as WAN and LAN as well as in some storage devices.

    Explanation:

    CRC is used to detect data units, such as packets with burst errors and sometimes after error correction.

    It is based on modulo-2 division, in that addition is performed by XOR operation.

    It is said that a CRC can detect burst errors of fewer than r + 1 bits where r is the degree of the polynomial. A burst of length greater than r + 1 bits is detected with probability of 1- 2r.

    Here it is given that data frame is 1101011011 and the divisor is 10011 in a CRC error detection process, a burst error 0000010011 occurs in transmission. Here both the divisor and burst error are same. It is not satisfying the condition of error detection. So, error will not be detected.
  • Question 12
    2 / -0.33

    Consider the following set of statements:

    1. The physical layer is concerned with the connection of the devices to the media.

    2. The data link layer defines the direction of transmission between two devices.

    3. The transport layer can be either connectionless or connection-oriented.

    Which of the above statements is/are true?

    Solution

    Both statements 1 and 3 are true.

    The physical layer is concerned with the connection of the devices to the media. In a point to point configuration, two devices are connected through a dedicated link. In a multipoint configuration, the sender link is shared among devices.

    The physical layer defines the direction of transmission between two devices: simplex, half-duplex or full-duplex. In simplex mode, only device can send; the other can only receive. In half-duplex, two devices can send and receive but not at the same time. In a full-duplex mode, two devices can send and receive at the same time.

    The transport layer can be either connectionless or connection-oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. A connection-oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packet. When the data is transferred, the connection is terminated.

  • Question 13
    2 / -0.33
    The value of the expression 23237 (mod 29), in the range 0 to 28, is______. 
    Solution

    Generate the cyclic patter

    231 (mod 29) ≡ 23

    232 (mod 29) ≡ 7

    233 (mod 29) ≡ 16

    234 (mod 29) ≡ 20

    235 (mod 29) ≡ 25

    236 (mod 29) ≡ 24

    237 (mod 29) ≡ 1

    238 (mod 29) ≡ 23

    239 (mod 29) ≡ 7

    Cyclic pattern = (23, 7, 16, 20, 25, 24, 1, 23 …)

    23236 (mod 29) ≡ 237 × 33 + 6 (mod 29) ≡ 236 (mod 29) ≡ 24
  • Question 14
    2 / -0.33
    The size of the congestion window of a TCP connection is 64 KB when a timeout occurs. The round trip time of the connection is 20 msec and the maximum segment size used is 2 KB. What is the time taken (in msec) by the TCP connection to get back to 64 KB congestion window?
    Solution

    Data:

    Maximum Segment Size (MSS) = 2 KB

    Round trip time (RTT) = 20 ms

    Congestion window Size (CWS) = 64 KB

    Formula:

    \({\rm{Threshold}} = \frac{{{\rm{CWS}}}}{{{\rm{MSS}}}}\)

    Calculation

    \({\rm{Threshold}} = \frac{{{\rm{CWS}}}}{{{\rm{MSS}}}} = \frac{{64}}{2} = 32\;KB\)

     

     

    Transmission

    segment

    size (KB)

     

     

    Slow start phase

    1

    1

    2

    2

    2

    4

    3

    4

    8

    4816

    5

    16

    32 (Threshold)

     

     

    congestion avoidance phase

    6

    17

    34

    7

    18

    36

    8

    19

    38

    9

    20

    40

    10

    21

    42

    11

    22

    44

    12

    23

    46

    132448
    142550
    152652
    162754
    172856
    182958
    193060
    203162

    21

    32

    64

     

    Number of round trips = 21 – 20 = 20

    Total time taken = 20 × 20 ms = 400

    The time taken (in msec) by the TCP connection to get back to 64 KB congestion window is 400 ms.
  • Question 15
    2 / -0.33

    An IP router implementing Classless Inter-domain Routing (CIDR) receives a packet with address 210.128.22.67. The router’s routing table has the following entries:

    Mask

    Network address

    Interface

    /23

    210.128.11.0

    4

    /17

    210.128.26.0

    1

    /20

    210.128.16.0

    2

    /21

    210.128.30.0

    3

     

    On which interface packet will be forwarded?

    Solution

    The third mask (/20) is applied to the destination address 210.128.22.67

    Prefix length = 20

    210.128.22.67   ⇒     11010010     10000000     00010110      01000011

    Mask                 ⇒     11111111       11111111       11110000       00000000

    Network add         11010010     10000000     00010000      00000000   ⇒   210.128.16

    The result is 210.128.16.0, which matches the corresponding network address. Therefore, a packet will be forwarded on interface 2.

  • Question 16
    2 / -0.33
    In an RSA cryptosystem, the value of the public modulus parameter n is 15251. If it is also known that φ(n) = 15000, where φ() denotes Euler’s Totient Function, then the smallest prime factor of n is _____. (Hint: one of the prime factors of n is less than 200 and greater than 150)
    Solution

    Let p and q be two prime number that generated the modulus parameter n in RSA cryptosystem

    n = p × q = 15251

    φ(n) = φ(p × q) = (p - 1) × (q - 1) = 15000

    p × q – p – q + 1 = 15000

    15251 – p – q + 1 =15000

    p + q = 252

    p + 15251/p = 252

    p2 – 252p + 15251 = 0

    (p – 101) (p – 151) = 0

    ∴ p = 101 or p = 151

    if p = 101 then q = 151 and vice versa

    Smallest prime factor of n is 101

    Alternate Method:

    n = p × q = 15251

    From question: one question is less than 200 and greater than 150, that is, 150 < p < 200

    Prime number less than are: 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199

    Now find which prime number will give remainder 0 on division with 15251

    15251%151 = 0

    ∴ 151 is the prime number

    Other prime number is 15251/151 = 101

    Smallest prime factor = 101

    Tips to generate prime number:

    Prime number is multiple of (6k ± 1) (except 2 and 3) where k is natural number but vice versa is not true
  • Question 17
    2 / -0.33

    Consider the following statements about leaky bucket and token bucket algorithm.

    I. In leaky bucket algorithm, network interface transmits packets at a constant rate.

    II. The token bucket algorithm is less restrictive than the leaky bucket algorithm.

    III. The implementation of leaky bucket algorithm is simple.

    Which of the above statement is correct?

    Solution

    In leaky bucket algorithm, the packet arrival rate is varying the output rate is always constant. The bucket leaks at a constant rate, i.e. the network interface transmits packets at a constant rate.

    The token bucket algorithm is less restrictive than the leaky bucket algorithm, as it allows bursty traffic. However, the limit of burst is restricted by the number of tokens available in the bucket at a particular instant of time.

    The implementation of basic token bucket algorithm is simple; a variable is used just to count the tokens. This counter is incremented every t seconds and is decremented whenever a packet is sent. Whenever this counter reaches zero, no further packet is sent out.

  • Question 18
    2 / -0.33

    Consider two hosts,a frame of size 1000 byte is sent over 30 Mb/s duplex link between them. Frames are to be transmitted into this link to maximally pack them in transit. The propagation time is 100 milliseconds. What is the minimum number of bits that will be required to represent the sequence numbers distinctly?

    Solution

    Bandwidth = 30 Mb/s =3 ×107 b/s

    In 1 second, 10 bits can be sent

    ∴ 1 s → 3 × 107 b

    1 ms →  3 ×104 b

    100 ms → 300 × 104 b

    Frame size = 1000 B = 1000 × 8 bit

    Number of frames = ⌈(300 × 104) ÷ (1000 × 8)⌉

    ∴ Number of frames = 375 

    Minimum number of bits = ⌈log2 375⌉ = 9 
  • Question 19
    2 / -0.33
    Let the two host X and Y connected via a packet switch with 107 bits per second links. Switch is placed at 50 km from X. X and Y are located at 100 Kilometer apart also the propagation speed along the link is 2 × 108 m/s. The switch begins forwarding a packet after 0.1 milliseconds it receives the packet. If 1000 bytes of File are needed to be transmitted and each packet size is 500 bytes, the time elapsed between the transmission of the first bit of data and the reception of the last bit of the data in millisecond is _____.
    Solution

    Data:

    File size = 1000 bytes

    Length of packet = L = 500 bytes = 500 × 8 bit

    Number of packets = 2

    Bandwidth = BW = 107 b/s

    Distance = d1= 50 km

    Distance = d2 = 50 km

    Propagation speed = v = 2 × 108 m/s = 2 × 105 km/s

    Transmission delay = Tt

    Propagation delay = Tr = 0.1 ms

    Processing time at switch = 0.1 millisecond

    Formula:

    \({T_t} = \frac{L}{{BW}}\)

    \({T_p} = \frac{d}{v}\)

    Calculation:

    Packet 1:

    Link 1:

    \({T_{t1}} = \frac{{500 \times 8}}{{{{10}^7}}} = 0.4\;ms\)

    \({T_{p1}} = \frac{{50}}{{2 \times {{10}^5}}} = 0.25\;ms\)

    Tr = 0.1 ms

    Link 2:

    \({T_{t2}} = \frac{{500 \times 8}}{{{{10}^7}}} = 0.4\;ms\)

    \({T_{p1}} = \frac{{50}}{{2 \times {{10}^5}}} = 0.25\;ms\)

    Delay for packet 1:

    T1 = 0.4 + 0.25 + 0.1 + 0.4 + 0.25 = 1.4 ms

    Packet 2:

    Transmission is started at 0.4 ms (after the transmission of 1st packet)

    Link 1:

    \({T_{t1}} = \frac{{500 \times 8}}{{{{10}^7}}} = 0.4\;ms\)

    \({T_{p1}} = \frac{{50}}{{2 \times {{10}^5}}} = 0.25\;ms\)

    Tr = 0.1 ms

    Link 2:

    \({T_{t2}} = \frac{{500 \times 8}}{{{{10}^7}}} = 0.4\;ms\)

    \({T_{p1}} = \frac{{50}}{{2 \times {{10}^5}}} = 0.25\;ms\)

    T2 = 0.4 + 0.25 + 0.1 + 0.4 + 0.25 = 1.4 ms

    Total delay to transmit data = 0.4 + T2 = 0.4 + 1.4 = 1.8 ms

    the time elapsed between the transmission of the first bit of data and the reception of the last bit of the data in millisecond is 1.8 ms
  • Question 20
    2 / -0.33

    Consider the following three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links.

    [S1] The computational overhead in link state protocols is higher than in distance vector protocols.

    [S2] A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link

    state protocol.

    [S3] After a topology change, a link state protocol will converge faster than a distance vector

    protocol.

    Which one of the following is correct about S1, S2, and S3?

    Solution

    Statement 1: TRUE

    The computational overhead in link state protocols is higher than in distance vector protocols because LSR is based upon global knowledge whereas DVR is based upon Local information.

    Statement 2: FALSE

    Persistent looping can be avoided with the help of split horizon in DVR but there is no concept of persistent looping in LSR, in LSR only temporary loop exist and can automatically solved by system or router.

    Statement 3: TRUE

    After a topology change, a link state protocol will converge faster than a distance vector protocol.

    Therefore option 4 is correct.

    Important Point:

    LSR → Link State Routing

    DVR → Distance Vector Routing

  • Question 21
    2 / -0.33
    In a network two systems are connected and are separated by 400 km. The bandwidth of the network is 40 × 107 bytes per second. The propagation speed of the media is 2 × 107 meters per second. In given network, Go-Back-N sliding protocol is used with maximum network capacity. Packet size is 16 × 106 bits and processing delay at nodes are negligible. Then the minimum size in bits of the sequence number filed of sender is _____.
    Solution

    Data:

    Length of packet = L = 16 × 106 bits = 2 × 106 bytes

    Bandwidth (BW) = 40 × 107 B/s

    Distance = d= 400 km

    Propagation speed = v = 2 × 107 m/s

    Efficiency = η

    Formula:

    \({\rm{\eta }} \le \frac{{\rm{N}}}{{1 + 2a}}\)

    \({\rm{a}} = \frac{{{\rm{Tp}}}}{{{\rm{Tt}}}}\)

    \({{\rm{T}}_{\rm{t}}} = \frac{{\rm{L}}}{{{\rm{BW}}}}\)

    \({{\rm{T}}_{\rm{p}}} = \frac{{\rm{d}}}{{\rm{v}}}\)

    Minimum bits = ⌈log2 N⌉

    Calculation:

    \({{\rm{T}}_{\rm{t}}} = \frac{{2 \times {{10}^6}}}{{40 \times {{10}^7}}} = 5\;ms\)

    \({{\rm{T}}_{\rm{p}}} = \frac{{400 \times {{10}^3}}}{{2 \times {{10}^7}}} = \;20\;ms\)

    \({\rm{a}} = \frac{{20}}{5} = 4\)

    Since efficiency is maximum

    \(1 = \frac{{\rm{N}}}{{1 + 2a}}\)

    N = 1 + 2(4) = 9

    Minimum bits = ⌈log2 9⌉ = 4
  • Question 22
    2 / -0.33
    Consider three machines X, Y, and Z with IP address 200.20.15.3, 200.20.15.1, and 200.20.15.2 respectively. The subnet mask is set to 255.255.255.254 for all the three machines. Which one of the following is true?
    Solution

    Subnet mask: 255.255.255.254→ 255.255.255.1111 1110

    X’s IP address: 200.20.15.3 →      200.20.15. 0000 0011

    Subnet Mask & X’s IP address →  200.20.15.2

    ∴ Subnet Id = 200.20.15.2

    Y’s IP address: 200.20.15.1 →       200.20.15.0000 0001

    Subnet Mask & Y’s IP address →  200.20.15. 0

    ∴ Subnet Id = 200.20.15. 0

    Z’s IP address: 200.20.15.2 →      200.20.15.0000 0010

    Subnet Mask & Z’s IP address → 200.20.15.2

    ∴ Subnet Id = 200.20.15.2

    X and Z belongs to same subnet 200.20.15.2

    Tips and Tricks:

    & → bitwise AND

    Since Network Mask is 255.255.255.254, not have to check first 3-byte because subnet id will same as first 3 bytes of IP address. Only 4th byte need to bitwise AND with given IP address
  • Question 23
    2 / -0.33

    Consider an IP packet with a data length of 4400 bytes. TCP header is of 40 bytes while that of IPv4 header is 20 bytes. The packet is forwarded to an IPv4 router that supports MTU of 900 bytes. Length of the IP header for outgoing fragments is 20 bytes. Assume that the fragment offset value stored in the first fragment is 100.

    The fragmentation offset value of the penultimate fragment is _____.
    Solution

    Application layer

    4460(bytes)

    Transport layer (TCP)

    40(Header)

    4420(Data)

    Network layer

    20(Header)

    4400(Data)

     

    Data = 4400 Byte

    Router MTU = 900 byte

    Data + header = 900

    Data = 900 – 20

    ∴ Data = 880

    Number of fragments = \(\frac{{4400}}{{880}} = 5\)

    Since initial fragment offset is 100.

    Fragment offset of 2nd fragment = \(100 + \frac{{880}}{8} = 210\)

    Fragment offset of 3rd fragment = \(210 + \frac{{880}}{8} = 320\)

    Fragment offset of 4th fragment = \(220 + \frac{{880}}{8} = 430\)

    Fragment offset of 5th fragment = \(430 + \frac{{880}}{8} = 540\)

    penultimate fragment = 2nd last fragment = 430

    Shortcuts:

    penultimate fragment = Initial fragment offset + 110 × (n - 2)

    where n is number of fragments
  • Question 24
    2 / -0.33
    Let X and Y be the two stations on an Ethernet and both stations have a ready state of frames to send. Both X and Y attempt to transmit a frame, collide, and no one wins the race. What is the probability that neither X nor Y wins the next back-off race?
    Solution

    Since both 1 and 2 transmit and collide

    After the collision, Using the Back-off algorithm:

    Range (0, 21 -1) = Rang (0, 1) for both X and Y

    Station whose time is less wins the or the person whose time is more back-offs

    X

    Y

    Situation

    0

    0

    No one wins

    0

    1

    X wins

    1

    0

    Y wins

    1

    1

    No one wins

     

    No one wins, after the first collision, means they have collided for the second time 

    Range (0, 22 -1) = Rang (0, 3) for both X and Y

    X

    Y

    Situation

    0

    0

    No one wins

    1

    0

    Y wins

    2

    0

    Y wins

    3

    0

    Y wins

    0

    1

    X wins

    1

    1

    No one wins

    2

    1

    Y wins

    3

    1

    Y wins

    0

    2

    X wins

    1

    2

    X wins

    2

    2

    No one wins

    3

    2

    Y wins

    0

    3

    X wins

    1

    3

    X wins

    2

    3

    X wins

    3

    3

    No one wins

     

     The probability that neither X nor Y wins = \(\frac{4}{{16}} = \frac{1}{4}\)

Self Studies
User
Question Analysis
  • Correct -

  • Wrong -

  • Skipped -

My Perfomance
  • Score

    -

    out of -
  • Rank

    -

    out of -
Re-Attempt Weekly Quiz Competition
Self Studies Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Self Studies
Click on Allow to receive notifications
Allow Notification
Self Studies
Self Studies Self Studies
To enable notifications follow this 2 steps:
  • First Click on Secure Icon Self Studies
  • Second click on the toggle icon
Allow Notification
Get latest Exam Updates & FREE Study Material Alerts!
Self Studies ×
Open Now