Network-Layer

Question 1

An IP router with a Maximum Transmission Unit (MTU) of 1500 bytes has received an IP packet of size 4404 bytes with an IP header of length 20 bytes. The values of the relevant fields in the header of the third IP fragment generated by the router for this packet are

     Prefix            Output Interface
                          Identifier 
  131.16.0.0/ 12              3
  131.28.0.0/ 14              5
  131.19.0.0/ 16              2
  131.22.0.0/ 15              1

The identifier of the output interface on which this packet will be forwarded is ______.

A
1
B
2
C
3
D
4
       Computer-Networks       Network-Layer       GATE 2014 [Set-3]
Question 1 Explanation: 
Lets take, 131.22.0.0/15 Its Net Mask is 255.254.0.0.
If we do AND operation between 255.254.0.0 and given IP 131.23.151.76, gives 131.22.0.0 which is matching with interface 1.
Question 2

Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.

A
Network layer – 4 times and Data link layer – 4 times
B
Network layer – 4 times and Data link layer – 3 times
C
Network layer – 4 times and Data link layer – 6 times
D
Network layer – 2 times and Data link layer – 6 times
       Computer-Networks       Network-Layer       GATE 2013
Question 2 Explanation: 

From above given diagram, its early visible that packet will visit network layer 4 times, once at each node [S, R, R, D] and packet will visit Data Link layer 6 times. One time at S and one time at D, then two times for each intermediate router R as data link layer is used for link to link communication.
One at packet reaches R and goes up from physical –DL-Network and second time when packet coming out of router in order Network –DL-Physical.
Question 3

In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are

A
Last fragment, 2400 and 2789
B
First fragment, 2400 and 2759
C
Last fragment, 2400 and 2759
D
Middle fragment, 300 and 689
       Computer-Networks       Network-Layer       GATE 2013
Question 3 Explanation: 
M = 0 - Means there is no fragment after this, i.e. Last fragment.
HLEN = 10 - So header length is 4×10 = 40, as 4 is constant scale factor.
Total Length = 400 (40 Byte Header + 360 Byte Payload)
Fragment Offset = 300, that means 300×8 Byte = 2400 bytes are before this last fragment.
So the position of datagram is last fragment.
Sequence number of First Byte of Payload = 2400 (as 0 to 2399 Sequence no are used)
Sequence number of Last Byte of Payload = 2400+360-1 = 2759
Question 4

A link of capacity 100 Mbps is carrying traffic from a number of sources. Each source generates an on-off traffic stream; when the source is on, the rate of traffic is 10 Mbps, and when the source is off, the rate of traffic is zero. The duty cycle, which is the ratio of on-time to off-time, is 1:2. When there is no buffer at the link, the minimum number of sources that can be multiplexed on the link so that link capacity is not wasted and no data loss occurs is S1. Assuming that all sources are synchronized and that the link is provided with a large buffer, the maximum number of sources that can be multiplexed so that no data loss occurs is S2. The values of S1 and S2 are, respectively,

A
10 and 30
B
12 and 25
C
5 and 33
D
15 and 22
       Computer-Networks       Network-Layer       GATE 2006-IT
Question 4 Explanation: 
For S1,
Since there is no buffer and constraint given is there should not be any data lost, and no wastage of capacity as well.
Since data should not be lost, we calculate for the extreme case when all sources are ontime (that is transmitting).
10Mbps × n-station ≤ 100Mbps
n = 10 = S1
In the next part of question, it is given that the link is provided with large buffer and we are asked to find out large no. of stations.
For that we calculate expected value of bandwidth usage,
E = 1/3 × 10 + 1/3 × 10 + .......+ ....... n-station times ≤ 100Mbps
⇒ 1/3 × 10 × n-station ≤ 100Mbps ⇒ n-station = 30 = S2
So option (A) is answer.
Question 5

Traceroute reports a possible route that is taken by packets moving from some host A to some other host B. Which of the following options represents the technique used by traceroute to identify these hosts

A
By progressively querying routers about the next router on the path to B using ICMP packets, starting with the first router
B
By requiring each router to append the address to the ICMP packet as it is forwarded to B. The list of all routers en-route to B is returned by B in an ICMP reply packet
C
By ensuring that an ICMP reply packet is returned to A by each router en-route to B, in the ascending order of their hop distance from A
D
By locally computing the shortest path from A to B
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 5 Explanation: 
Traceroute works by sending packets with gradually increasing TTL value, starting with TTL value of 1. The first router receives the packet, decrements the TTL value and drops the packet because it then has TTL value zero. The router sends an ICMP time exceeded message back to the source. The next set of packets are given a TTL value of 2.
So the first router forwards the packets, but the second router drops them and replies with ICMP time exceeded. Proceeding in this way, traceroute uses the returned ICMP time exceeded messages to build a list of routers that packets traverse, until the destination is reached and returns an ICMP echo reply message.
Question 6

Which of the following statements is FALSE regarding a bridge?

A
Bridge is a layer 2 device
B
Bridge reduces collision domain
C
Bridge is used to connect two or more LAN segments
D
Bridge reduces broadcast domain
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 6 Explanation: 
Bridge devices works at the data link layer of the open system interconnected (OSI) model, connecting two different networks together and providing communication between them. So, option A, C are true.
The bridge acts as a interface between two networks and speed the traffic between them and there by reduces the collision domain.
So, option B also True.
Question 7

Count to infinity is a problem associated with

A
link state routing protocol.
B
distance vector routing protocol.
C
DNS while resolving host name.
D
TCP for congestion control.
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 7 Explanation: 
Distance vector routing protocol uses the Bellman-Ford algorithm and Ford-Fulkerson algorithm.
The Bellman-Ford algorithm does not prevent routing loops from happening and suffers from the count-to-infinity problem.
Question 8

In a communication network, a packet of length L bits takes link L1 with a probability of p1 or link L2 with a probability of p2. Link L1 and L2 have bit error probability of b1and brespectively. The probability that the packet will be received without error via either L1 or L2 is

A
(1 – b1)L p1 + (1 – b2)Lp2
B
[1 – (b1 + b2)L]p1p2
C
(1 – b1)L (1 – b2)Lp1p2
D
1 – (b1 Lp1 + b2 Lp2)
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 8 Explanation: 
Probability of choosing link L1 = p1
Probability for no bit error for any single bit = (1 - b1)
Similarly, for link L2,
Probability of no bit error = (1 - b2)
Packet can go either through link L1 or L2, they are mutually exclusive events.
Probability packet will be received without any error = Probability of L1 being chosen and no errors in any of L bits + Probability of L2 being chosen and no error in any of the L bits
= (1 - b1)L p1 + (1 - b2)L p2
Hence, answer is option A.
Question 9

A company has a class C network address of 204.204.204.0. It wishes to have three subnets, one with 100 hosts and two with 50 hosts each. Which one of the following options represents a feasible set of subnet address/subnet mask pairs?

A
204.204.204.128/255.255.255.192
204.204.204.0/255.255.255.128
204.204.204.64/255.255.255.128
B
204.204.204.0/255.255.255.192
204.204.204.192/255.255.255.128
204.204.204.64/255.255.255.128
C
204.204.204.128/255.255.255.128
204.204.204.192/255.255.255.192
204.204.204.224/255.255.255.192
D
204.204.204.128/255.255.255.128
204.204.204.64/255.255.255.192
204.204.204.0/255.255.255.192
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 9 Explanation: 
MSB in last 8 bits is in use to get subnet since it is class C IP.
10000000/128 (mask) - subnet id bit (1) (subnet 1)
01000000/192 (mask) - subnet id bit (01) (subnet 2)
0000000/192 (mask) - subnet id bit (00) (subnet 3)
Question 10

Assume that “host1.mydomain.dom” has an IP address of 145.128.16.8. Which of the following options would be most appropriate as a subsequence of steps in performing the reverse lookup of 145.128.16.8? In the following options “NS” is an abbreviation of “nameserver”.

A
Query a NS for the root domain and then NS for the “dom” domains
B
Directly query a NS for “dom” and then a NS for “mydomain.dom” domains
C
Query a NS for in-addr.arpa and then a NS for 128.145.in-addr.arpa domains
D
Directly query a NS for 145.in-addr.arpa and then a NS for 128.145.in-addr.arpa domains
       Computer-Networks       Network-Layer       GATE 2005-IT
Question 10 Explanation: 
We are performing reverse lookup of IP address to its hostname.
First we need to locate in-addr.apra, then perform reverse lookup of 8.16.128.145.in-addr.arpa which will point to host1.mydomain.com.
Question 11

A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet?

A
14
B
30
C
62
D
126
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 11 Explanation: 
Maximum no. of hosts = 2(no. of bits in HID) - 2
= 26- 2
= 64 - 2
= 62
Question 12

A host is connected to a Department network which is part of a University network. The University network, in turn, is part of the Internet. The largest network in which the Ethernet address of the host is unique is:

A
the subnet to which the host belongs
B
the Department network
C
the University network
D
the Internet
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 12 Explanation: 
The answer is option (D), in a specified LAN technology - Ethernet is mentioned here. So, MAC addresses will be specifically taken as physical address which is unique in the entire world.
Question 13

In TCP, a unique sequence number is assigned to each

A
byte
B
word
C
segment
D
message
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 13 Explanation: 
In TCP, a unique sequence number is assigned to each byte.
Question 14

Which of the following objects can be used in expressions and scriplets in JSP (Java Server Pages) without explicitly declaring them?

A
session and request only
B
request and response only
C
response and session only
D
session, request and response
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 14 Explanation: 
Note: Out of syllabus.
Question 15

Consider a 10 Mbps token ring LAN with a ring latency of 400 µs. A host that needs to transmit seizes the token. Then it sends a frame of 1000 bytes, removes the frame after it has circulated all around the ring, and finally releases the token. This process is repeated for every frame. Assuming that only a single host wishes to transmit, the effective data rate is

A
1Mbps
B
2Mbps
C
5Mbps
D
6Mbps
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 15 Explanation: 
Note: Out of syllabus.
Question 16

A 20 Kbps satellite link has a propagation delay of 400 ms. The transmitter employs the "go back n ARQ" scheme with n set to 10. Assuming that each frame is 100 bytes long, what is the maximum data rate possible?

A
5 Kbps
B
10 Kbps
C
15 Kbps
D
20 Kbps
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 16 Explanation: 
Question 17

In the TCP/IP protocol suite, which one of the following is NOT part of the IP header?

A
Fragment Offset
B
Source IP address
C
Destination IP address
D
Destination port number
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 17 Explanation: 
Destination port number is not present at IP header.
Question 18

A TCP message consisting of 2100 bytes is passed to IP for delivery across two networks. The first network can carry a maximum payload of 1200 bytes per frame and the second network can carry a maximum payload of 400 bytes per frame, excluding network overhead. Assume that IP overhead per packet is 20 bytes. What is the total IP overhead in the second network for this transmission?

A
40 bytes
B
80 bytes
C
120 bytes
D
160 bytes
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 18 Explanation: 
At Router-1:
2120B reach R1's network layer. It removes original IP header, fragments data part at IP and then appends IP header to all fragments and forwards . So, it divides 2100 Bytes into two fragments of size 1200 and 900. And both fragments are sent to R2.
At Router-2:
Both fragments that reach R2 exceed MTU at R2. So, both are fragmented. First packet of 1200B is fragmented into 3 packets of 400 Bytes each. And second packet of 900B is fragmented into 3 fragments of 400, 400 and 100 Bytes respectively.
So, totally 6 packets reach destinations.
So, total IP overhead = 6 × 20 = 120 Bytes
Question 19

Suppose that the maximum transmit window size for a TCP connection is 12000 bytes. Each packet consists of 2000 bytes. At some point of time, the connection is in slow-start phase with a current transmit window of 4000 bytes. Subsequently, the transmitter receives two acknowledgements. Assume that no packets are lost and there are no time-outs. What is the maximum possible value of the current transmit window?

A
4000 bytes
B
8000 bytes
C
10000 bytes
D
12000 bytes
       Computer-Networks       Network-Layer       GATE 2004-IT
Question 19 Explanation: 
Since maximum transmit window size = 12000 B
and packet size =2000 B (or MSS)
Receiver window size = 6 MSS and
Current sender window size = 2 MSS
Slow start threshold = receiver window/2 = 3 MSS
Now current sender window size = 2 MSS <3 MSS,
which implies transmission is in slow start phase.
After receiving first Ack: Current sender window should increase exponentially to 4 MSS but since threshold = 3 MSS, current sender window size goes to threshold which is 3 MSS, then after receiving second Ack: Since now it is in congestion avoidance phase, sender window size increases linearly which makes current sender window
= 4 MSS
= 4 × 2000 B
= 8000 B
Question 20
Which transport class should be used with residual-error network layer ?
A
TP0, TP2
B
TP1, TP3
C
TP1, TP3, TP4
D
TP0, TP1, TP2, TP3, TP4
       Computer-Networks       Network-Layer       UGC NET CS 2004 Dec-Paper-2
Question 20 Explanation: 
Transport Protocol Class 1 (TP1)​ performs segmentation (fragmentation) and reassembly, plus error recovery. TP1 sequences protocol data units (PDUs) and will retransmit PDUs or re-initiate the connection if an excessive number of PDUs are unacknowledged.
Transport Protocol Class 3 (TP3)​ offers error recovery, segmentation and reassembly, and multiplexing and demultiplexing of data streams over a single virtual circuit. TP3 also sequences PDUs and retransmits them or re-initiates the connection if an excessive number are unacknowledged.
Question 21
The program used to determine the round - trip delay between a workstation and a destination address is :
A
Tracert
B
Traceroute
C
Ping
D
Pop
       Computer-Networks       Network-Layer       UGC NET CS 2006 June-Paper-2
Question 21 Explanation: 
The program used to determine the round - trip delay between a workstation and a destination address is Traceroute. A traceroute is a function which traces the path from one network to another. It allows us to diagnose the source of many problems.
There are 21 questions to complete.
PHP Code Snippets Powered By : XYZScripts.com
error: Content is protected !!