Assignment Questions
1. Q1. Differentiate between repeater, bridge, router, and gateway in terms of their roles in
internetworking.
2. Q2. An organization has been assigned the IP address [Link]/24. Divide the
network into 8 equal subnets. Write the subnet mask, number of hosts per subnet, and
first and last valid addresses for subnet 3.
3. Q3. Convert the following IPv4 address into its binary form: [Link]. Also identify
the class of the IP address.
4. Q4. Compare the header structures of IPv4 and IPv6. Highlight at least three major
differences.
5. Q5. Consider the following distance vector table for a node A:
| Destination | Cost via B | Cost via C | Cost via D |
|-------------|------------|------------|------------|
|B |2 |5 |1 |
|C |3 |2 |6 |
|D |7 |4 |0 |
Using the Distance Vector Routing algorithm, find the next-hop chosen by A to reach C.
Show steps.
6. Q6. Explain how Link State Routing (LSR) ensures loop-free paths compared to Distance
Vector Routing (DVR).
7. Q7. Describe the working principles of ARP, RARP, and DHCP. Give a real-world example
where each is required.
8. Q8. Differentiate between TCP and UDP with respect to: Reliability, Connection type,
Applications.
9. Q9. A file of size 10 MB is sent over a TCP connection with MSS = 1000 bytes. Find the
number of segments required for transmission. Assume no header overhead.
10. Q10. Explain how congestion control in TCP uses AIMD (Additive Increase Multiplicative
Decrease). Illustrate with a simple diagram of congestion window growth.
11. Q11. Discuss Quality of Service (QoS) in networking. How do techniques like traffic
shaping and packet scheduling improve performance for video conferencing?
12. Q12. Explain the role of the following application layer protocols: a) DNS b) SMTP c)
FTP
13. Q13. A client requests a webpage from a web server using HTTP/1.1 persistent
connection. Show the sequence of request and response messages exchanged.
14. Q14. What are the advantages of Wi-Fi (IEEE 802.11) over wired LANs? Discuss in terms
of mobility, scalability, and cost.
15. Q15. Consider a simple public-key cryptosystem where: Public key: (n=55, e=3), Private
key: d=27. Encrypt the message M = 9 using the public key, and then decrypt it with the
private key. Show the calculations.