Model Answer Paper 22520 Winter 2024 Question Paper
Clustering and cloud computing (Wainganga College of Engineering and Management)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Downloaded by Jane Doe (
[email protected])
Answer Sheet for 22520
Winter 2024 Question Paper
Below is the complete answer sheet for the 22520 Winter 2024 question paper, addressing all questions in sequential
order. Answers are concise, accurate, and aligned with the marking scheme.
Question 1: Attempt any FIVE of the
following (10 Marks, 2 marks each)
(a) State any two advantages of IPv6 Protocol over IPv4
Protocol.
1. Larger Address Space: IPv6 uses 128-bit addresses, supporting ~340 undecillion addresses, compared to
IPv4’s 32-bit addresses (~4.3 billion).
2. Simplified Header: IPv6 has a fixed 40-byte header with optional extensions, improving routing efficiency over
IPv4’s variable-length header.
(b) Enlist any four extension headers of IPv6.
1. Hop-by-Hop Options: Processed by each router along the path.
2. Routing: Specifies intermediate nodes for packet routing.
3. Fragment: Manages packet fragmentation and reassembly.
4. Destination Options: Processed by the destination node.
(c) Compare SMTP and HTTP w.r.t. (i) use of port number
(ii) used for type of service.
Feature SMTP HTTP
Port Number Port 25 Port 80 (443 for HTTPS)
Type of Sending emails between Transferring web content (e.g., HTML,
Service servers images)
(d) Enlist any two services provided by UDP.
1. DNS: Fast domain name resolution.
2. Streaming Media: Low-latency delivery for video/audio (e.g., RTP).
(e) Draw a neat labelled sketch of TCP Header format.
TCP Header:
[Source Port (16 bits) | Destination Port (16 bits)]
[Sequence Number (32 bits)]
[Acknowledgment Number (32 bits)]
[Data Offset (4 bits) | Reserved (3 bits) | Flags (9 bits) | Window (16 bits)]
[Checksum (16 bits) | Urgent Pointer (16 bits)]
[Options (if any, variable length)]
Fields: Source/Destination Ports, Sequence/Acknowledgment Numbers, Flags (e.g., SYN, ACK), Window,
Checksum, etc.
(f) State the use of following FTP commands:
1. Mget: Downloads multiple files from the server to the client using a single command.
2. Site: Executes server-specific commands (e.g., changing file permissions).
(g) State any two limitations of IPv4 Protocol.
1. Limited Address Space: Only ~4.3 billion unique addresses, insufficient for modern internet growth.
2. Complex Header: Variable-length header with options slows down routing compared to IPv6.
Question 2: Attempt any THREE of the
following (12 Marks, 4 marks each)
(a) Compare TCP and UDP w.r.t (i) Connection setup (ii)
Retransmission of data (iii) Reliability & acknowledgement
(iv) Flow control & error control.
Feature TCP UDP
Connection Setup Connection-oriented (handshake) Connectionless
Retransmission of Data Retransmits lost packets No retransmission
Reliability & Acknowledgement Reliable, uses ACKs Unreliable, no ACKs
Flow & Error Control Supports flow/error control No flow/error control
(b) Draw a neat labelled sketch of IPv4 Header format. Also
explain (i) Service type (ii) Identification (iii) Flag (iv) Header
checksum fields of it.
IPv4 Header:
[Version (4 bits) | IHL (4 bits) | Service Type (8 bits) | Total Length (16 bits)]
[Identification (16 bits) | Flags (3 bits) | Fragment Offset (13 bits)]
[Time to Live (8 bits) | Protocol (8 bits) | Header Checksum (16 bits)]
[Source Address (32 bits)]
[Destination Address (32 bits)]
[Options (if any, variable length)]
Service Type: Specifies QoS (e.g., precedence, delay, throughput).
Identification: Unique ID for packet fragments to aid reassembly.
Flags: Controls fragmentation (e.g., Don’t Fragment, More Fragments).
Header Checksum: Verifies header integrity.
(c) Explain in brief the components of DHCP.
DHCP (Dynamic Host Configuration Protocol) components:
1. DHCP Server: Assigns IP addresses and configuration (e.g., gateway, DNS).
2. DHCP Client: Requests IP configuration from the server.
3. DHCP Relay Agent: Forwards DHCP messages between clients and servers in different subnets.
4. IP Address Pool: Range of addresses allocated by the server.
(d) A block of IP address is granted to a small organization.
From this block of address one address is 205.16.37.39/28.
Find (i) First address of the block (ii) Last address of the
block (iii) Subnet Mask (iv) No. of Hosts.
/28: 28 bits for network, 4 bits for hosts.
Subnet Mask: 255.255.255.240 (28 ones).
Block Size: 2^4 = 16 addresses.
First Address: 205.16.37.32 (network address, 205.16.37.39 & 255.255.255.240).
Last Address: 205.16.37.47 (broadcast address, 32 + 15).
No. of Hosts: 2^4 - 2 = 14.
Question 3: Attempt any THREE of the
following (12 Marks, 4 marks each)
(a) Describe Routing Information Protocol (RIP).
RIP:
Distance-vector routing protocol for intra-domain routing.
Uses hop count as metric (max 15 hops).
Exchanges routing tables every 30 seconds via UDP (port 520).
Suitable for small networks; slow convergence due to count-to-infinity problem.
(b) Explain in brief following IPv4 to IPv6 transition
techniques:
1. Dual Stack: Devices run both IPv4 and IPv6 stacks, enabling communication with both protocols during
transition.
2. Header Translation: Converts IPv6 headers to IPv4 (e.g., NAT64) for compatibility with IPv4-only devices,
mapping addresses and adjusting fields.
(c) Compare FTP and TFTP w.r.t. (i) Authentication (ii)
Protocol used (iii) Ports (iv) Data Transfer.
Feature FTP TFTP
Authentication Requires username/password No authentication
Protocol Used TCP UDP
Ports 21 (control), 20 (data) 69
Data Transfer Complex, supports ASCII/binary Simple, binary only
(d) Explain connection establishment process of TCP.
TCP Three-Way Handshake:
1. SYN: Client sends SYN segment (Seq=x).
2. SYN-ACK: Server responds with SYN-ACK (Ack=x+1, Seq=y).
3. ACK: Client sends ACK (Ack=y+1).
Establishes reliable, bidirectional connection.
Question 4: Attempt any THREE of the
following (12 Marks, 4 marks each)
(a) Explain the process of resolving the host name
www.msbte.org (http://www.msbte.org) into IP address using
DNS.
1. Client Query: Client sends DNS query for www.msbte.org (http://www.msbte.org) to local DNS resolver.
2. Resolver Query: Resolver contacts root DNS server, which refers to .org TLD server.
3. TLD Query: .org server refers to msbte.org’s authoritative DNS server.
4. Authoritative Response: msbte.org server returns IP address (e.g., 103.122.26.156).
5. Response to Client: Resolver caches and returns IP to client.
(b) Enlist any four features of OSPF. Explain any two OSPF
features in brief.
Features of OSPF:
1. Link-state routing.
2. Hierarchical areas.
3. Fast convergence.
4. Supports authentication.
Link-State Routing: Uses Dijkstra’s algorithm to compute shortest paths based on full topology.
Hierarchical Areas: Divides network into areas to reduce routing overhead and improve scalability.
(c) Explain the working of TELNET.
TELNET:
Enables remote login over TCP (port 23).
Working:
1. Client connects to server.
2. Server prompts for authentication.
3. Client sends commands; server executes and returns output.
4. Session ends on logout.
Used for remote device management (e.g., routers).
(d) Describe the flow control in TCP.
Flow Control in TCP:
Uses sliding window mechanism to regulate data transmission.
Receiver advertises window size (in bytes) in TCP header’s Window field.
Sender transmits data within window, pausing if window is full.
Prevents receiver buffer overflow.
(e) Explain the operations of POP3.
POP3 (Post Office Protocol v3):
Retrieves emails from server (port 110).
Operations:
1. Connection: Client connects to server (TCP).
2. Authentication: Client provides username/password.
3. Transaction: Client lists, retrieves, or deletes emails.
4. Update: Server updates mailbox (e.g., deletes retrieved emails).
Downloads emails to client, typically removing from server.
Question 5: Attempt any TWO of the
following (12 Marks, 6 marks each)
(a) Explain following services provided by TCP with neat
labelled sketch of each service:
1. Stream Delivery Service:
TCP delivers data as a continuous byte stream, not packets.
Sketch:
[App sends byte stream] -> [TCP segments bytes] -> [Receiver reassembles stream]
2. Sending and Receiving Buffer:
Buffers store outgoing/incoming data to smooth transmission.
Sketch:
[App -> Sending Buffer -> Network] | [Network -> Receiving Buffer -> App]
3. Bytes and Segments:
TCP breaks data into segments, each with sequence numbers.
Sketch:
[Byte Stream] -> [Segments with Seq Numbers] -> [Reassembled Stream]
(b) How flow control, congestion control, and error control is
handled by SCTP?
SCTP (Stream Control Transmission Protocol):
1. Flow Control: Uses sliding window (per stream) to regulate data rate, preventing receiver overload.
2. Congestion Control: Employs TCP-like mechanisms (e.g., slow start, congestion avoidance) to adjust
transmission based on network conditions.
3. Error Control: Uses checksums for error detection and selective acknowledgments (SACK) for retransmitting lost
chunks.
(c) Draw a neat labelled sketch of IPv6 header format and
explain all the fields of IPv6 header.
IPv6 Header:
[Version (4 bits) | Traffic Class (8 bits) | Flow Label (20 bits)]
[Payload Length (16 bits) | Next Header (8 bits) | Hop Limit (8 bits)]
[Source Address (128 bits)]
[Destination Address (128 bits)]
Version: Set to 6.
Traffic Class: QoS prioritization.
Flow Label: Identifies packet flows.
Payload Length: Size of payload (excluding header).
Next Header: Type of next header (e.g., TCP, extension header).
Hop Limit: Decremented by routers; packet discarded if zero.
Source Address: Sender’s 128-bit address.
Destination Address: Receiver’s 128-bit address.
Question 6: Attempt any TWO of the
following (12 Marks, 6 marks each)
(a) Compare distance vector routing and link state routing
w.r.t. (i) Concept (ii) Information sharing (iii) Algorithm used
(iv) Convergence (v) Problem in Protocol (vi) Example
Protocol.
Feature Distance Vector Routing Link State Routing
Feature Distance Vector Routing Link State Routing
Concept Shares distance to destinations Shares full network topology
Information Sharing Neighbor-to-neighbor Floods to all routers
Algorithm Used Bellman-Ford Dijkstra’s
Convergence Slower, prone to loops Faster, loop-free
Problem in Protocol Count-to-infinity High resource usage
Example Protocol RIP OSPF
(b) For the following IP address given below:
(i) 208.34.54.12
Class: Class C (192–223).
Network Address: 208.34.54.0.
Host Address: 12.
No. of Hosts: 2^8 - 2 = 254.
(ii) 238.34.2.1
Class: Class D (224–239, multicast).
Network Address: N/A (multicast).
Host Address: N/A.
No. of Hosts: N/A (multicast).
(iii) 114.34.2.8
Class: Class A (1–126).
Network Address: 114.0.0.0.
Host Address: 34.2.8.
No. of Hosts: 2^24 - 2 = 16,777,214.
(iv) 129.14.6.8
Class: Class B (128–191).
Network Address: 129.14.0.0.
Host Address: 6.8.
No. of Hosts: 2^16 - 2 = 65,534.
(c) Explain three main components of E-mail system.
1. User Agent (UA): Email client (e.g., Outlook) for composing, sending, and reading emails.
2. Message Transfer Agent (MTA): SMTP servers that relay emails between sender and recipient.
3. Message Access Agent (MAA): POP3/IMAP servers for retrieving emails from the server to the client.
This completes the answer sheet for all questions in the 22520 Winter 2024 question paper, following the instructions and
marking scheme.
Downloaded by Jane Doe (
[email protected])