👁️ 202 views
University of Barishal Logo

University of Barishal

Department of Computer Science and Engineering

Final Exam

Course Title: Computer Networks (CSE-3105)

Semester: 5th | Session: 18-19

Time: 180 minutes | Marks: 60.00

Course Teacher: Md. Rashid Al Asif

N.B.: Answer any FIVE questions out of the followings. All parts of each question must be answered consecutively. Right side of the question shows the maximum marks.

1.


a)

Determine one or more layers of OSI model to perform the following task.

i) Format and code conversion services

ii) Establishes, manages, and terminates sessions

iii) Ensures reliable transmission of data

iv) Log-in and log-out procedures
v) Provides independence from differences in data representation?

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
b)

What is port address? From Fig. 1, Assume that the communication is between a process running at computer A with port address m and a process running at computer D with port address n. Show the contents of packets and frames at the network, data link, and transport layer for each hop.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
c)

If the data link layer can detect errors between hops, why do you think we need another checking mechanism at the transport layer in OSI model?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
2.


a)

Consider sending 4000-byte IP datagram (including the 20 bytes IP header) into a link that has an MTU of 1400 bytes. Determine the values of the length field and the offset field in each fragment.

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
b)

Explain the advantages of IPv6 when compared to IPv4. In which transition strategy do we need to encapsulate IPv6 packets in the IPv4 packets?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
c)

What do you mean by loopback interface? An organization is assigned the block 2000:1456:2474/48. What is the CIDR notation for the blocks in the first and second subnets in this organization?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
3.


a)

You are given the following network address and subnet mask:

Network address: 192.168.10.0

Subnet mask: 255.255.255.224

i) How many subnets?

ii) How many hosts?

iii) What are the valid subnets

iv) Fill in the table below

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
6 Marks
b)

Define physical, logical and socket address.

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
c)

Depict the frame format of standard Ethernet.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
4.


a)

In an IPv4 datagram, the value of total-length field is (00A0)16 and the value of the header-length (HLEN) is (5)16. How many bytes of payload are being carried by the datagram? What is the efficiency (ratio of the payload length to the total length) of this datagram?

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
b)

Derive the routing table for the following Fig. 2. Also, show the forwarding process if a packet arrives at RI with the destination address 180.70.65.140.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
c)

It is possible to share a single public IP address on a Local Area Network (LAN) using a form of Network Address Translation (NAT). Explain how this accomplished by clearing stating the type of addresses used in the LAN; how the NAT device functions address mappings, any issues that may appear and measure taken by the NAT device to resolve the issue.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
6 Marks
5.


a)

The following shows the IPv6 datagram format. Compare it with IPv4 datagram format.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
b)

What are the policies of congestion control in TCP? Explain any of them with necessary diagram.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
c)

A switch uses a filtering table; a router uses a routing table. Can you explain the difference?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
2 Marks
6.


a)

Define Routing Protocol. Use Dijkstra's algorithm to find the shortest path tree and the forwarding table for node A in the Fig. 3.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
b)

What do you mean by the "Two-Node Loop Instability" problem with distance vector routing? Explain with necessary diagrams. Also, provide a solution to the problem.

 

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
c)

Briefly define subnetting and supernetting. How do the subnet mask and supernet mask differ from a default mask in classful addressing?

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
7.


a)

Define the type of attack in each of the following cases:

i) Ranchoddas Shyamaldas Chanchad breaks into the Virus's office to obtain a copy of the next exam

ii) Stuart gives a check for USD 500 to buy a used book. Later Fin finds out that the check was cashed for USD 5000

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
3 Marks
b)

Difference between Cryptography and Steganography. Use the additive cipher with k = 3 to encrypt the plaintext "BU". Then decrypt the message to get the original plaintext.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
c)

When Diffie-Hellman algorithm is effective compared with RSA in public-key cryptography? Let's assume that, Alice wants to establish a shared secret with Bob and they agree on a prime number, p and a base, g in advance. For our example, let's assume that p = 9 and g = 7. Now, calculate the shared secret using Diffie-Hellman algorithm.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
5 Marks
8.


a)

What is RSA algorithm? Alice wants to send message a to Bob. Then Bob need to select keys. Suppose, Bob chosen p = 7 and q = 13 in the RSA algorithm. Now, find the value of d. Also, encrypt the message "BU" using Bob's public key so that he can only decrypt. For simplicity, do the encryption and decryption character by character.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
b)

How message authentication code (MAC) works? Does it provide Confidentiality? Justify your answer.

 

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks
c)

Describe about the shift cipher and transposition ciphers with example.

Please SUBSCRIBE to view full question

Topics: N/A Solution is Coming!
4 Marks

Contributors of this Question:

Role Name Date
Prepared By (Teacher): Md. Rashid Al Asif N/A
Uploaded By: Onebyzero Edu (Test User) July 30, 2024, 10:34 p.m.
Converted By (Img/PDF to Text): Obaydul Hasan Nayeem Nov. 28, 2025, 11:35 p.m.
Reviewed By: Obaydul Hasan Nayeem Nov. 29, 2025, 12:01 a.m.