👁️ 114 views
University of Barishal Logo

University of Barishal

Department of Computer Science and Engineering

Final Exam

Course Title: Computer Networks (CSE-3105)

Semester: 5th | Session: 20-21

Time: 180 minutes | Marks: 60.00

Course Teacher: Md. Rashid Al Asif

N.B.: Answer any FIVE questions out of the followings. All parts of each question must be answered consecutively. Right side of the question shows the maximum marks.

1.


a)

Define ICMP and explain how it is used in error reporting and diagnostics.

 

Please SUBSCRIBE to view full question

Topics: Internet Control Message Protocol (ICMP) , Network Layer Solution is Coming!
5 Marks
b)

What is the difference between IPv6 link-local and unique local addresses? Provide examples.

Please SUBSCRIBE to view full question

Topics: IPv6 Networks Solution is Coming!
4 Marks
c)

c) Define: bandwidth, ping, jitter

Please SUBSCRIBE to view full question

Topics: Basic Computer Networks Solution is Coming!
3 Marks
2.


a)

You are transmitting a 5000-byte datagram over a link with MTU = 1500 bytes. Calculate how many fragments are created and show offset values.

 

Please SUBSCRIBE to view full question

Topics: IP Fragmentation , Maximum Transmission Unit (MTU) Solution is Coming!
5 Marks
b)

Explain the process of flow control in TCP using the sliding window mechanism.

Please SUBSCRIBE to view full question

Topics: Sliding Window Protocols , TCP and UDP Protocols Solution is Coming!
4 Marks
c)

What is tunneling in IPv6? Give an example scenario where tunneling is required.

Please SUBSCRIBE to view full question

Topics: IPv6 Networks Solution is Coming!
3 Marks
3.


a)

Define subnetting. An organization is assigned the block 172.30.0.0/16. It wants to create 256 subnets.

i) Find the subnet mask

ii) Find the number of addresses in each subnet

iii) Find the first and last addresses in subnet 10

iv) Find the first and last addresses in subnet 256

 

 

Please SUBSCRIBE to view full question

Topics: IP Addressing , Subnetting and Supernetting Solution is Coming!
6 Marks
b)

What is symmetric key encryption? Compare symmetric and asymmetric encryption with examples.

Please SUBSCRIBE to view full question

Topics: Encryption and Decryption Techniques Solution is Coming!
3 Marks
c)

Write any two advantages and disadvantages of using IPv6 over IPv4.

Please SUBSCRIBE to view full question

Topics: IPv4 Networks , IPv6 Networks Solution is Coming!
3 Marks
4.


a)

In an IPv4 datagram, the value of total-length field is (00A0)16 and the value of the header length (HLEN) is (5)16. How many bytes of payload are being carried by the datagram? What is the efficiency (ratio of the payload length to the total length) of this datagram?

Please SUBSCRIBE to view full question

Topics: IPv4 Networks Solution is Coming!
3 Marks
b)

What is NAT? How can NAT help in address depletion? Explain with the necessary diagram.

Please SUBSCRIBE to view full question

Topics: Network Address Translation (NAT) Solution is Coming!
5 Marks
c)

Explain the responsibilities of the session and transport layer in the Internet model?

 

Please SUBSCRIBE to view full question

Topics: OSI Model , Transport Layer Solution is Coming!
4 Marks
5.


a)

Derive the routing table for the following Fig. 1. Also, show the forwarding process if a packet 5 arrives at R1 with the destination address 180.70.65.140.

 

Please SUBSCRIBE to view full question

Topics: Packet Forwarding , Routing in Networks Solution is Coming!
5 Marks
b)

What is CIDR? How does CIDR contribute to address aggregation?

Please SUBSCRIBE to view full question

Topics: Classless Inter-Domain Routing (CIDR) , Network Layer Solution is Coming!
4 Marks
c)

Briefly describe: Destination-based forwarding and Source-based forwarding.

Please SUBSCRIBE to view full question

Topics: Packet Forwarding Solution is Coming!
3 Marks
6.


a)

What is Distance Vector Routing? Use distance vector algorithm to construct routing table for node C in the Fig. 2.

 

Please SUBSCRIBE to view full question

Topics: Distance Vector Routing Solution is Coming!
5 Marks
b)

What is congestion? Explain the slow start algorithm used in TCP congestion control with a suitable example.

Please SUBSCRIBE to view full question

Topics: TCP and UDP Protocols Solution is Coming!
4 Marks
c)

What is the difference between a pubiic IP and a private IP? Provide examples of each.

Please SUBSCRIBE to view full question

Topics: IP Addressing Solution is Coming!
3 Marks
7.


a)

Describe Diffie-Hellman key exchange. Let p = 23. g = 5. Alice picks a = 6, Bob picks b = 15. Find the shared key.

 

Please SUBSCRIBE to view full question

Topics: Cryptography , Diffie-Hellman Key Exchange , Network Security Solution is Coming!
5 Marks
b)

A switch uses a filtering table; a router uses a routing table. Can you explain the difference?

Please SUBSCRIBE to view full question

Topics: Packet Switching , Routing in Networks Solution is Coming!
3 Marks
c)

Define Network Security. Differentiate between spoofing and sniffing attacks.

Please SUBSCRIBE to view full question

Topics: Network Security Solution is Coming!
4 Marks
8.


a)

What is HMAC? How does it ensure message integrity? Does it encrypt the message content?

Please SUBSCRIBE to view full question

Topics: Hash-based Message Authentication Code (HMAC) , Network Security Solution is Coming!
5 Marks
b)

Explain the process of creating and verifying a digital signature using asymmetric key cryptography. Use a step-by-step example involving a sender and a receiver.

 

Please SUBSCRIBE to view full question

Topics: Cryptography Solution is Coming!
5 Marks
c)

Alice uses a mobile app to hide messages in image pixels. Is this encryption or steganography? Explain.

Please SUBSCRIBE to view full question

Topics: Encryption and Decryption Techniques , Steganography Solution is Coming!
2 Marks

Contributors of this Question:

Role Name Date
Prepared By (Teacher): Md. Rashid Al Asif N/A
Uploaded By: Israt Jahan Tamanna Nov. 25, 2025, 1:12 a.m.
Converted By (Img/PDF to Text): Obaydul Hasan Nayeem Nov. 25, 2025, 10:51 a.m.
Reviewed By: Obaydul Hasan Nayeem Nov. 25, 2025, 12:39 p.m.