BTCOC602
BTCOC602
blocks?
AC C25 CB 306 500 0F25 5178 8FD 86AA4C C9C 1DAA7B BAC C25C CB3 3065 500 F25 178
25 CB 306 500 F25 178 FD 86A 4C 9C 1DA 7B AC 25C B3 065 00 F25 178 FD
CB 30 50 F2 17 F 86 4 9C 1D 7 A 25 B 06 00 F2 17 FD 86
30 650 0F2 517 8F D86 A4 C9C 1D A7 BA C25 CB 306 50 F2 517 8FD 86 A4
65 0F 51 8F D8 A C9 1 A BA C2 C 30 50 0F 51 8F 8 A4 C9
00 25 78 D 6A 4C C DA 7B C 5C B3 65 0F 25 78 D 6A C C1
51 8F 8 A4 C9 1D A7 BA C2 CB 30 50 F2 517 8F 86 A4 9C 1D A7
78 D8 6A C C1 A B C 5C 3 65 0F 51 8F D8 A C9 1 A BA
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA 7B C
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7 A 25 CB
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 BA C2 CB 30
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA C2 5C 30 650
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B C 5C B3 65 0F
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC 25C B3 065 00F 251
Instructions to the Students:
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA 7B C
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7 A 25 CB
F2 17 FD 86 4 9C 1D 7 A 25 B 06 00 2 17 FD 86 4C 9C D
51 8F 8 A4 C9 1D A7 BA C2 CB 30 50 F2 517 8F 86 A4 9C 1D A7
78 D8 6A C C1 A B C 5C 3 65 0F 51 8F D8 A C9 1 A BA
Subject Code & Name: Computer Networks (BTCOC602)
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA 7B C
178FD86A4C9C1DA7BAC25CB306500F25
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
a. What is the source port number and the destination port number?
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 BA C2 CB 30
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA C2 5C 30 650
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B C 5C B3 65 0F
A) Explain network software with respect to protocol hierarchy and design
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC 25C B3 065 00F 251
4. Assume suitable data wherever necessary and mention it clearly.
Regular End Semester Examination – Summer 2022
A) Illustrate the services provided to the network layer by the data link layer.
address) and the last address (limited broadcast address) in each of these
B) Calculate CRC code for Message “11101010111101010100011” if divisor
Apply
C) In a block of addresses, we know the IP addresses of two hosts are Apply
Course: B. Tech. Branch : Computer Science and Engineering Semester : VI
Apply
78 D8 6A C C1 A B C 5C 3 65 0F 51 8F D8 A C9 1
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7
Understand
Understand
Understand
DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE
Remember
Understand
Understand
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 B
Application
2. The level of question/expected answer as per OBE or the Course Outcome (CO) on
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC
AC 25 B 06 00 25 178 FD 86A 4C 9C DA 7B AC
6
6
6
6
6
6
6
6
6
6
12
12
12
12
CB 30 50 F2 17 F 86 4 9C 1D 7 A 25
( BT Level) Marks
traffic shaping?
F2 17 FD 86 4 9C 1D 7 A 25 B 06 00 2 17 FD 86 4C 9C D
51 8F 8 A4 C9 1D A7 BA C2 CB 30 50 F2 517 8F 86 A4 9C 1D A7
78 D8 6A C C1 A B C 5C 3 65 0F 51 8F D8 A C9 1 A BA
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA 7B C
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7 A 25 CB
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 BA C2 CB 30
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA C2 5C 30 650
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B C 5C B3 65 0F
g. What is the window size?
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC 25C B3 065 00F 251
AC 25 B 06 00 25 178 FD 86A 4C 9C DA 7B AC 25C B3 065 00 25 78
c. What the sequence number?
25 CB 306 500 F25 178 FD 86A 4C 9C 1DA 7B AC 25C B3 065 00 F25 178 FD
CB 30 50 F2 17 F 86 4 9C 1D 7 A 25 B 06 00 F2 17 FD 86
65 0F 51 8F D8 A C9 1 A BA C2 C 30 50 0F 51 8F 8 A4 C9
00 25 78 D 6A 4C C DA 7B C 5C B3 65 0F 25 78 D 6A C C1
F2 17 FD 86 4 9C 1D 7 A 25 B 06 00 2 17 FD 86 4C 9C D
B) Compare SMTP and POP Protocols.
51 8F 8 A4 C9 1D A7 BA C2 CB 30 50 F2 517 8F 86 A4 9C 1D A7
78 D8 6A C C1 A B C 5C 3 65 0F 51 8F D8 A C9 1 A BA
d. What is the acknowledgment number?
FD 6A 4C 9C D 7B AC 25 B3 06 00 25 78 D 6A 4C C DA 7B C
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7 A 25 CB
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 BA C2 CB 30
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA C2 5C 30 650
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B C 5C B3 65 0F
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC 25C B3 065 00F 251
AC 25 B 06 00 25 178 FD 86A 4C 9C DA 7B AC 25C B3 065 00 25 78
178FD86A4C9C1DA7BAC25CB306500F25
86 4C 9C 1D A7B AC 25 CB 06 500 F25 17 FD 86A 4C 9C 1D 7B AC 25
C) Illustrate with example public key and private key cryptography?
A4 9 1D A7 A 2 CB 30 50 F2 17 8F 86 4 9C 1D A7 A 25 CB
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 BA C2 CB 30
C) Illustrate with example leaky bucket and token bucket algorithms for
Understand
Understand
Understand
C9 C1 A BA C2 5C 30 650 0F 51 8F D8 A4 C9 1D A7 B
C1 DA 7B C 5C B3 65 0F 251 78F D8 6A C9 C1 A BA
DA 7B AC 25C B3 065 00F 25 78 D 6A 4C C1 DA 7B
7B AC 25C B3 065 00F 25 178 FD 86A 4C 9C1 DA 7B AC
AC 25 B 06 00 25 178 FD 86A 4C 9C DA 7B AC
6
6
6
6
6
CB 30 50 F2 17 F 86 4 9C 1D 7 A 25
30 650 0F2 517 8F D86 A4 C9C 1D A7 BA C25
65 0F 51 8F D8 A C9 1 A BA C2 C
00 25 78 D 6A 4C C DA 7B C 5C B
F2 17 FD 86 4 9C 1D 7 A 25 B
51 8F 8 A4 C9 1D A7 BA C2 CB 3
78 D8 6A C C1 A B C 5C 3
FD 6A 4C 9C D 7B AC 25 B3 0