👁️ 320 views
University of Barishal Logo

University of Barishal

Department of Computer Science and Engineering

Final Exam

Course Title: Computer Networks (CSE-3105)

Semester: 5th | Session: 19-20

Time: 180 minutes | Marks: 60.00

Course Teacher: Md. Rashid Al Asif

N.B.: Answer any FIVE questions out of the followings. All parts of each question must be answered consecutively. Right side of the question shows the maximum marks.

1.


a)

What is computer network? Describe the Network Crieteria.

 

Please SUBSCRIBE to view full question

Topics: Basic Computer Networks Solution is Coming!
3 Marks
b)

What are the advantages of a multi-point connection over a P2P connection?

 

Please SUBSCRIBE to view full question

Topics: Network Topologies Solution is Coming!
2 Marks
c)

 Define protocol and Standards in Computer networks.

 

 

Please SUBSCRIBE to view full question

Topics: Basic Computer Networks Solution is Coming!
3 Marks
d)

 What do you mean by ARPANET? Describe the physical topology of computer networks.

 

Please SUBSCRIBE to view full question

Topics: Network Topologies Solution is Coming!
4 Marks
2.


a)

In the Go-Back-N protocol, the size of the send window can be 2m - 1, while the size of the receive window is only 1. How can flow control be accomplished when there is a big difference between the size of the send and receive windows? Briefly Explain.

 

Please SUBSCRIBE to view full question

Topics: Go-Back-N Protocol , Sliding Window Protocols Solution is Coming!
5 Marks
b)

 If the data link layer can detect errors between hops, why do you think we need another checking mechanism at the transport layer in the OSI Model? What is a socket address? Compare TCP and UDP protocols.

 

Please SUBSCRIBE to view full question

Topics: Data Link Layer , OSI Model , Socket Addresses , TCP and UDP Protocols , Transport Layer Solution is Coming!
4 Marks
c)

What do you mean by loopback interface? An organization is assigned the block 2000:1456:2474/48. What is the IPv6 address of an interface in the third subnet if the IEEE physical address of the computer is (F5-A9-23-14-7A-D2)16?

 

Please SUBSCRIBE to view full question

Topics: IP Addressing Solution is Coming!
3 Marks
3.


a)

You are given the following network address and subnet mask:

Network address: 192.168.10.0

Subnet mask: 255.255.255.252

i) How many subnets?

ii) How many hosts?

iii) What are the valid subnets

iv) Fill in the table below

Please SUBSCRIBE to view full question

Topics: IP Addressing , Subnetting and Supernetting Solution is Coming!
6 Marks
b)

 If the data link layer can detect errors between hops, why do you think we need another checking mechanism at the transport layer in OSI model?

 

Please SUBSCRIBE to view full question

Topics: OSI Model Solution is Coming!
3 Marks
c)

 How can NAT help in address depletion? Explain with necessary diagram.

 

Please SUBSCRIBE to view full question

Topics: Network Address Translation (NAT) , Network Layer Solution is Coming!
3 Marks
4.


a)

 What is Cryptography? Distinguish between passive and active attacks.

 

Please SUBSCRIBE to view full question

Topics: Cryptography , Network Attacks , Network Security Solution is Coming!
3 Marks
b)

What are the differences between message confidentiality and message integrity? Can you have one without another? Use the additive cipher with k = 5 to encrypt the plaintext "BU". Then decrypt the message to get the original plaintext.

 

Please SUBSCRIBE to view full question

Topics: Additive Cipher (Caesar Cipher) , Cryptography , Encryption and Decryption Techniques , Network Security Solution is Coming!
4 Marks
c)

Consider sending 4000-byte IP datagram (including the 20 bytes IP header) into a link that has an MTU of 1200 bytes. Determine the values of the length field and the offset field in each fragment.

Please SUBSCRIBE to view full question

Topics: Maximum Transmission Unit (MTU) , Network Layer , Packet Segmentation and Reassembly Solution is Coming!
5 Marks
5.


a)

Derive the routing table for the following Fig. 1. Can router R1 in Fig. 1 receive a packet with destination address 140.24.7.194? What will happen to the packet if this occurs?

Please SUBSCRIBE to view full question

Topics: IP Addressing , Packet Forwarding , Routing in Networks , Subnetting and Supernetting Solution is Coming!
6 Marks
b)

Show abbreviations for the following IPv6 addresses:

i) 1234:0000:3456:0000:A058:0000:0000:F02F

ii) 0000:0001:0000:0000:0000:56E2:24.120.12.90

 

 

Please SUBSCRIBE to view full question

Topics: IP Addressing Solution is Coming!
3 Marks
c)

 List three forwarding techniques and give a brief description of each.

 

Please SUBSCRIBE to view full question

Topics: Packet Forwarding Solution is Coming!
3 Marks
6.


a)

What is Frame Relay? What is Frame Relay a better solution for connecting LANs tha T-1 lines?

Please SUBSCRIBE to view full question

Topics: Data Link Layer , Frame Relay , WAN Technologies Solution is Coming!
3 Marks
b)

 What are the differences between IPv4 and IPv6 addressing?

 

Please SUBSCRIBE to view full question

Topics: IP Addressing Solution is Coming!
3 Marks
c)

Briefly define sub-netting and super-netting. How do the subnet mask ad super-net mask differ from a default mask in classful addressing?

 

Please SUBSCRIBE to view full question

Topics: IP Addressing , Network Masking , Subnetting and Supernetting Solution is Coming!
3 Marks
d)

How does Frame Relay control congestion? What attributes are used for traffic control in Frame Relay?

 

Please SUBSCRIBE to view full question

Topics: Frame Relay Solution is Coming!
3 Marks
7.


a)

 What is RSA algorithm? Alice wants to send message a to Bob. Then Bob need to select keys. Suppose, Bob chosen p = 7 and q = 13 in the RSA algorithm. Now, find the value of d. Also, encrypt the message "CSE" using Bob's public key so that he can only decrypt. For simplicity, do the encryption and decryption character by character.

 

Please SUBSCRIBE to view full question

Topics: Encryption and Decryption Techniques , RSA Algorithm Solution is Coming!
5 Marks
b)

What is Digital Signature? How it can be implemented to provide message integrity service?

 

Please SUBSCRIBE to view full question

Topics: Cryptography , Network Security Solution is Coming!
4 Marks
c)

The following shows the IPv6 datagram format. Compare it with IPv4 datagram format.

Please SUBSCRIBE to view full question

Topics: IP Addressing Solution is Coming!
3 Marks
8.


a)

 Describe about the shift cipher and transposition ciphers with example.

 

Please SUBSCRIBE to view full question

Topics: Shift Cipher , Transposition cipher Solution is Coming!
4 Marks
b)

 What do you mean by the "Two-Node Loop Instability" problem with distance vector routing? Explain with necessary diagrams. Also, provide a solution to the problem.

 

Please SUBSCRIBE to view full question

Topics: Distance Vector Routing , Routing in Networks Solution is Coming!
4 Marks
c)

 

Write short notes on (any two):

 

i) Packet Switching

ii) Circuit Switching

iii) HTTP

iv) FDDI

 

Please SUBSCRIBE to view full question

Topics: Circuit Switching , FDDI (Fiber Distributed Data Interface) , HTTP Protocol , Packet Switching Solution is Coming!
4 Marks

Contributors of this Question:

Role Name Date
Prepared By (Teacher): Md. Rashid Al Asif N/A
Uploaded By: Onebyzero Edu (Test User) July 30, 2024, 10:34 p.m.
Converted By (Img/PDF to Text): Soyebur Rahman Nov. 25, 2025, 12:18 a.m.
Reviewed By: Obaydul Hasan Nayeem Nov. 25, 2025, 10:49 a.m.