FMTH0301/Rev.5.3 Course Plan
FMTH0301/Rev.5.3 Course Plan
3
Course Plan
1. Apply suitable routing algorithm to route the data in a given network topology.
2. Analyze various buffering strategies using queuing theory
3. Apply the data link layer functionalities and compare the various channel access mechanisms.
4. Describe various LAN standards and VLAN concepts for an IP based network.
5. Describe wireless and multimedia network characteristics along with mobility management.
1
Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes (POs)
Course Title: Computer Networks-2 Semester: VI
2
Competency addressed in the Course and corresponding Performance Indicators
1.4: Demonstrate competence 1.4.5 - Apply suitable network 1.4.5.1 - Apply suitable routing
in computer science concepts for data transmission. algorithms to determine the path
engineering knowledge. for data transmission.
12.2 Demonstrate an ability to 12.2.2 Recognize the need and be able 12.2.2.1 - Examine the impact of
identify changing trends in to clearly explain why it is vitally Software-Defined Networking
engineering knowledge and important to keep current regarding (SDN) / 5G / IoT-based networking
on modern communication
practice new developments in the field.
systems.
3
Course Content
Content Hrs
Unit – 1
Network Layer- Routing Algorithms
1 The Link-State (LS) Routing Algorithm, The Distance-Vector (DV) Routing Algorithm, 08hrs
Hierarchical Routing, Routing in the Internet, intra-AS Routing in the Internet: RIP, Intra-AS
Routing in the Internet: OSPF, Inter-AS Routing: BGP. Broadcast and Multicast Routing,
Broadcast Routing Algorithms.
Network Layer – Queuing theory
2 08hrs
Router structure, Buffering strategies: Input queuing, Output queuing, Application of queuing
theory for performance of queuing mechanisms: M/M/1 system, M/M/m system, M/M/1/B
system.
Unit – 2
Data Link Layer
Introduction to the Link Layer, Error-Detection and -Correction Techniques : Parity Checks,
3 Check summing Methods, Cyclic Redundancy Check (CRC)binary and polynomial, ,Hamming 08hrs
Code, Multiple Access Links and Protocols: Channel Partitioning Protocols, Random Access
Protocols: Aloha, Slotted Aloha, CSMA, CSMA/CD, CSMA/CA, Taking-Turns Protocols, The Link-
Layer Protocol for Cable Internet Access.
Switched Local Area Networks
4 08hrs
Link-Layer Addressing and ARP, Ethernet 802.3, Token ring 802.5, FDDI and LAN standards,
Link-Layer Switches, Virtual Local Area Networks (VLANs), Multiprotocol Label Switching
(MPLS)
Unit – 3
Wireless and Mobile Networks
5 04hrs
Wireless Links and Network Characteristics, 802.11 Wireless LANs, Architecture, MAC Protocol,
Frame, Mobility, Personal Area Networks: Bluetooth and Zigbee. Cellular Networks and
Internet Access, Mobility, Mobile IP, Managing Mobility in Cellular Network.
6 Multimedia Networking: Multimedia Networking Applications, Streaming Stored Video, Voice- 04hrs
over-IP, Protocols for Real-Time Conversational Applications.
4
Text Books (List of books as mentioned in the approved syllabus)
1. J. F. Kurose, K. W. Ross, “Computer Networking, A Top-Down Approach”, 8th Edition, Pearson Education,
2021.
2. Raj Jain, “Performance evaluation of computer systems”, Wiley, 1991.
References
1. Behrouz A. Forouzan , “Data Communications and Networking with TCPIP Protocol Suite”, 6th Edition ,
McGraw Hill, 2021
2. Larry Peterson, Bruce Davie “Computer networks : a systems approach”, 6th Edition, 2021.
5
Evaluation Scheme
ISA Scheme
Total 50
Activity Title: "Exploring Modern Networking Technologies – SDN / 5G / IoT / Wi-Fi 6 / 6G"
Objective:
Students will research, configure, and analyse modern networking technologies, emphasizing Software-Defined
Networking (SDN), 5G network slicing, IoT-based networking, Wi-Fi 6 optimizations, and emerging 6G
advancements.
Activity Structure:
1. Presentation (3M)
o Groups of students will explore recent advancements in SDN / 5G / IoT /Wi-Fi 6 / 6G.
o Each group will present findings on how these technologies impact modern communication
systems.
o SDN Lab: Configure and analyse SDN controllers using Mininet or ONOS.
o 5G/IoT Lab: Simulate a 5G network with IoT device connectivity in NS-3 or MATLAB.
o Wi-Fi 6 Lab: Configure a high-performance WLAN using Cisco Packet Tracer or GNS3.
o Evaluate key performance metrics such as latency, bandwidth utilization, and network
efficiency in different setups.
6
Course Unitization for Minor Exams and End Semester Assessment
Unit II
Chapter 3: Data Link Layer 8 - 1.5 - 1.5
Unit III
Chapter 5: Wireless and Mobile Networks 4 - - - 1
Note
1. Each Question carries 20 marks and may consists of sub-questions.
2. Mixing of sub-questions from different chapters within a unit (only for Unit I and Unit II) is allowed in ISA I, II
and ESA
3. Answer 5 full questions of 20 marks each (two full questions from Unit I, II and one full questions from Unit
III) out of 8 questions in ESA.
7
Course Assessment Plan
8
Assessment Plan:
Activity Rubrics:
Report submission Well-structured report with Report is somewhat Poorly structured, difficult
a logical flow, clear organized but lacks logical to follow, multiple
headings, and well- flow or has minor grammatical and formatting
formatted content. No formatting and errors.
grammatical errors. grammatical errors.
9
Chapter wise Plan
Lesson Schedule
Class No. - Portion covered per hour
1. The Link-State (LS) Routing Algorithm.
2. The Link-State (LS) Routing Algorithm (continued).
3. The Distance-Vector (DV) Routing Algorithm.
4. The Distance-Vector (DV) Routing Algorithm (continued).
5. Hierarchical Routing.
6. Routing in the Internet, intra AS Routing in the Internet: RIP.
7. Intra-AS Routing in the Internet: OSPF and Inter-AS Routing: BGP.
8. Broadcast routing algorithms and Multicast routing algorithms
Review Questions
Sl.No. - Questions TLOs BL PI Code
1. Compare and contrast link-state and distance-vector routing algorithms 1 L3 1.4.5
2. Compare and contrast the advertisements used by RIP and OSPF. 3 L2 1.4.5
5. Consider the following network. With the indicated link costs, use 1 L3 3.3.1
Dijkstra’s shortest-path algorithm to compute the shortest path from x to all
network nodes.
10
6. Consider the network shown below, and assume that each node initially 1 L3 3.3.1
knows the costs to each of its neighbours. Consider the distance-vector algorithm
and show the distance table entries at node z.
7. Consider the network shown below. Suppose AS3 and AS2 are running 3 L3 3.3.1
OSPF for their intra-AS routing protocol. Suppose AS1 and AS4 are running RIP for
their intra-AS routing protocol. Suppose eBGP and iBGP are used for the inter-AS
routing protocol. Initially suppose there is no physical link between AS2 and AS4.
i. Router 3c learns about prefix x from which routing protocol: OSPF,
RIP,eBGP, or iBGP?
ii. Router 3a learns about x from which routing protocol?
iii. Router 1c learns about x from which routing protocol?
iv. Router 1d learns about x from which routing protocol?
11
8. Explain the different broadcast routing algorithms. 4 L2 1.4.5
10. What is the difference between a group-shared tree and a source-based 4 L2 1.4.5
tree in the context of multicast routing?
11. Explain the uncontrolled flooding mechanism for broadcasting. 4 L2 1.4.5
12. Describe the reverse path forwarding algorithm for broadcasting. 4 L2 1.4.5
12
Chapter wise Plan
Learning Outcomes:-
At the end of the topic the student should be able to:
Lesson Schedule
Class No. - Portion covered per hour
1. Router structure, Buffering strategies: Input queuing and output queuing
2. Understanding basics of queuing theory for performance of queuing mechanisms
3. Deriving performance metrics for an M/M/1 system
4. Deriving performance metrics for an M/M/1/B system
5. Understanding M/M/m systems
6. Applying queuing theory to analyze performance of real world problems
Review Questions
Sl.No. - Questions TLOs BL PI Code
1. What do you understand by a queue? Give some important applications 1 L2 1.4.5
of queuing theory.
2. Explain various components of Kendall notation. 2 L2 1.4.5
3. Derive equations for expected waiting time and expected response time 3 L3 13.2.5
of the server in an M/M/1 system.
4. Derive equations for expected waiting time, expected service time, and 4 L3 13.2.5
blocking probability in an M/M/1/B system.
5. A Television repairman finds that the time spent on his jobs has an 6 L3 13.2.5
exponential distribution with mean 30 minutes. If he repairs the sets in the order
in which they come in, and if the arrivals of sets are approximately Poisson with
an average rate of 10 per 8 hours per day, what is the repairs man idle time each
day? Find the expected number of units in the system and in the queue?
13
6. A two channel waiting line with Poisson arrival has a mean arrival rate of 6 L3 13.2.5
50 per hour and exponential service with a mean service rate of 75 per hour for
each channel. Find (i) The probability of the empty system. (ii) The probability
that an arrival in the system will have to wait.
7. Arrivals to a router with single core processor are Poisson distributed 6 L3 13.2.5
with a rate of 20 per minute. The average time for a packet to get service is 2
seconds and this time is exponentially distributed. What would be the average
waiting time of a packet in the system, average length of packets in the queue,
and average response time?
8. A small railway ticket booking office has two counters – Counter 1 for 6 L3 13.2.5
enquiry and Counter 2 for ticket booking. Customer arrival is Poisson at 5 per
hour to the enquiry and 10 per hour to the ticket booking counter. Exponentially
distributed service time in each counter is 4 minutes per customer. Find the
average waiting time of a customer.
9. In the above problem, find by how much the average waiting time of a 5 L3 13.2.5
customer in the system reduces at Counter 1 (original enquiry counter) when the
office decides to go for pooling of resources – i.e. an arriving customer will get
enquiry or ticket booking facility at any of the counters.
14
Chapter wise Plan
Chapter Number and Title: 3.Data Link Layer Planned Hours: 8 hrs
Learning Outcomes:-
At the end of the topic the student should be able to:
4. Compare and contrast ALOHA, CSMA/CD, and CSMA/CA for different 3 L3 2.2
networking scenarios.
Lesson Schedule
Review Questions
Sr.No. - Questions TLO BL PI Code
1. What is CRC? Explain with an example. Generate check bits for the 2 L2 2.2.3
following information 1100 and generator polynomial 1011.
2. A bit stream 10011101 is transmitted using the standard CRC method. 2 L3 2.2.3
The generator polynomial is x3 + 1. Show the actual bit string transmitted.
Suppose the third bit from the left is inverted during transmission. Show that this
error is detected at the receivers end.
3. Distinguish between forward errors corrections versus error correction 2 L3 2.2.3
by retransmission.
4. Suppose the information portion of a packet contains 7 bytes consisting 2 L2 2.2.3
of the 8-bit unsigned binary ASCII representation of string “network” Compute
the Internet checksum for this data.( Note: ASCII for ‘a’ is 0x61)
5. Differentiate between pure ALOHA and slotted ALOHA. Justify how 4 L3 2.2.3
slotted ALOHA is better than pure ALOHA.
6. Create Hamming code for the data “1011010”. If the sixth bit is flipped 2 L3 2.2.3
during the transmission, explain how error correction can be performed using
15
Hamming code.
7. Consider a 4-bit message which is to be transmitted as a 7-bit code word 2 L3 2.2.3
by including three parity bits. In general, this would be called a (7,4)
code. Determine the Hamming code for the message 1101.
8. Consider a 4-bit message which is to be transmitted as a 7-bit code word 2 L3 2.2.3
by including three parity bits. In general, this would be called a (7,4)
code. Suppose the message 1100110 is sent and a single bit error occurs
such that the Hamming code word 1110110 is received. Identify the
position of the bit to be corrected using Hamming code correction
technique.
9. Determine the hamming code distance between the two code words 2 L3 2.2.3
below:
0000000
0000111
10. Find the minimum Hamming code distance between the below code 2 L3 2.2.3
words:
A - 0000000
B - 0000111
C - 0011001
D - 0011110
E - 0101010
F - 0101101
11. The frames generated by active users of a wireless channel follow 4 L3 2.2.3
Poisson’s distribution. If T represents the frame time and G represents the mean
number of transmissions per frame time, what is the
i. Probability of k transmission attempts per frame time?
ii. When is the probability that 0 frames are generated in the collision duration in
pure ALOHA?
iii. What is the throughput of the pure ALOHA?
iv. Determine the throughput if the channel is accessed using slotted ALOHA.
12. Suppose four active nodes—nodes A, B, C and D—are competing for access to 4 3 2.2.3
a channel using slotted ALOHA. Assume each node has an infinite number of
packets to send. Each node attempts to transmit in each slot with probability p.
The first slot is numbered slot 1, the second slot is numbered slot 2, and so on.
What is the probability that node A succeeds for the first time in slot 5?
14. Assume that there are 3 active nodes, each of which has an infinite supply of 4 L3 2.2.3
frames they want to transmit, and these frames have a constant size of L bits. If
two or more frames collide, then all nodes will detect the collision. Given a
probability of transmission p = 0.34, what is the maximum efficiency in case of
16
slotted ALOHA?
15. Consider the figure below, which shows the arrival of 7 messages for 4 L3 2.2.3
transmission at different multiple access wireless nodes at times
t = <0.6, 1.2, 2.2, 3.1, 3.7, 3.8, 4.9> and each transmission requires exactly one
time unit.
a. Suppose all nodes are implementing the Aloha protocol. For each message,
indicate the time at which each transmission begins. Separate each value with a
comma and no spaces.
16. Consider the figure below, which shows the arrival of 11 messages for 4 L3 2.2.3
transmission at different multiple access wireless nodes at times
t = <0.3, 0.7, 0.8, 1.2, 1.4, 2.3, 2.6, 2.7, 3.1, 3.3, 4.6> and each transmission
requires exactly one time unit.
a. Suppose all nodes are implementing the Slotted Aloha protocol. For each
message, indicate the time at which each transmission begins. Separate each
value with a comma and no spaces.
17. Suppose that a packet’s payload consists of 10 eight-bit values (e.g., 2 L3 2.2.3
representing ten ASCII-encoded characters) shown below. (Here, we have
arranged the ten eight-bit values as five sixteen-bit values):
Fig 1
10000011 01110101
01001101 00011010
01110010 01110001
01101010 11101011
11001111 00010111
17
Fig 2
Both the payload and parity bits are shown. One of these bits is flipped.
10100100 10100110 0
10000001 01100010 1
00100110 11101011 1
11000100 11101110 1
11000000 10101000 1
00010111 01101001 0
Fig 3
Both the payload and parity bits are shown; Either one or two of the bits have
been flipped.
00001101 11011100 1
00111000 11110010 0
01100001 11101010 1
10110001 00011000 0
00110000 00001000 1
11010100 11011100 1
a. For fig 1, compute the two-dimensional parity bits for the 16 columns.
Combine the bits into one string
b. For fig 1, compute the two-dimensional parity bits for the 5 rows (starting from
the top). Combine the bits into one string
c. For fig 1, compute the parity bit for the parity bit row from question a. Assume
that the result should be even.
d. For fig 2, indicate the row and column with the flipped bit (format as: x,y),
assuming the top-left bit is 0,0
e. For fig 3, is it possible to detect and correct the bit flips? Yes or No
19. Explain the Link-Layer Protocol for Cable Internet Access. 3 2 1.4.5
18
Chapter wise Plan
Chapter Number and Title: 4.Switched Local Area Networks Planned Hours: 8 hrs
Learning Outcomes:-
At the end of the topic the student should be able to:
1. Explain the link layer addressing and Address Resolution Protocol (ARP). 4 L2 1.4
2. Recognize the standards for VLANs using the different network devices. 4 L3 13.2
Lesson Schedule
1. Link-Layer Addressing
2. Address Resolution Protocol (ARP)
3. Ethernet and LAN standards
4. Link-Layer Switches
5. Virtual Local Area Networks (VLANs)
6. Multiprotocol Label Switching (MPLS)
7. Data Center Networking
8. Retrospective: A Day in the Life of a Web Page Request
Review Questions
Sr.No. - Questions TLO BL PI Code
1 What are some of the possible services that a link-layer protocol can 1 L2 1.4.5
offer to the network layer? Which of these link-layer services have corresponding
services in IP? In TCP?
2 Suppose that N switches supporting K VLAN groups are to be connected 2 L2 1.4.5
via a trunk protocol. How many ports are needed to connect the switches? Justify
your answer.
3 Describe the drawbacks identified in the configuration of VLAN’s. 2 L2 1.4.5
5 Discuss the MPLS header located between link- and network-layer 3 L2 1.4.5
19
7 Describe the working of data center network with a hierarchical topology 4 L2 1.4.5
9. Consider the figure below. The IP and MAC addresses are shown for nodes A, 2 L3 13.2.2
B, C and D, as well as for the router's interfaces.
5. Do the source and destination mac addresses change at point 4? Answer with
yes or no, and provide justification.
6. Do the source and destination mac addresses change at point 2? Answer with
yes or no, and provide justification.
9. Do the source and destination mac addresses change at point 1? Answer with
yes or no, and provide justification.
10. Consider the LAN below consisting of 10 computers connected by two self- 2 L3 13.2.2
learning Ethernet switches. At t=0 the switch table entries for both switches are
empty. At t = 1, 2, 3, and 4, a source node sends to a destination node as shown
below, and the destination replies immediately (well before the next time step).
20
Assume that the following transmissions occur (the transmissions in reply occur
but are not shown in the list below):
t=1: G -> K
t=2: C -> L
t=3: I -> C
t=4: G -> C
Fill out the two switch tables and answer the questions below. Format your
answer as letter, number or 'n/a'
21
Chapter wise Plan
Chapter Number and Title: 5. Wireless and Mobile networks Planned Hours: 4 hrs
Learning Outcomes:-
At the end of the topic the student should be able to:
Lesson Schedule
4. What are the differences between the following types of wireless 1 L2 1.4.5
channel impairments: path loss, multipath propagation, interference from other
sources?
5. What is the role of the anchor MSC in GSM networks? 3 L2 1.4.5
6. What are the purposes of the HLR and VLR in GSM networks? What 2 L2 1.4.5
elements of mobile IP are similar to the HLR and VLR?
22
Chapter wise Plan
Learning Outcomes:-
At the end of the topic the student should be able to:
Lesson Schedule
.Review Questions
1. What is the difference between end-to-end delay and packet jitter? 1 L2 1.4.5
What are the causes of packet jitter?
2. Why is a packet that is received after its scheduled play out time 3 L2 1.4.5
considered lost?
3. Describe the transmission rate of the stream by adding overhead. Does 3 L2 1.4.5
interleaving also increase the transmission rate? Justify
4. How are different RTP streams in different sessions identified by a 2 L2 1.4.5
receiver? How are different streams from within the same session identified?
23
Model Question Paper for In Semester Assessment (ISA-1)
Course Code: 23ECSC303 Course Title: Computer Networks-2
Duration 75 Mins
Max. Marks 40
Note: Answer any 2 full Questions. Each full question carries 20 marks
Q.No Questions Marks CO BL PO PI
Code
Explain with diagram broadcast routing algorithm which prevents 6 1 L2 1 1.4.5
1a broadcast storms and completely avoids transmission of redundant
packets.
24
Figure 2 Network Topology
25
Model Question Paper for In Semester Assessment (ISA-2)
Course Code: 23ECSC303 Course Title: Computer Networks-2
Duration 75 Mins
Max. Marks 40
Note: Answer any 2 full Questions. Each full question carries 20 marks
Q.No Questions Marks CO BL PO PI
Code
Consider a 4-character string "TEST". Each character is represented 6 3 L3 1 1.4.5
by its 7-bit ASCII value. Calculate the 2D parity bits (both row and
column parity bits) for error detection and correction.
1a Suppose a single bit error occurs in the fifth bit of the third row
(changing it from 0 to 1). Demonstrate how the parity bits can be
used for error detection and correction if a single bit error occurs.
Note: ASCII value of 'T' = 84, 'E' = 69 and 'S' = 83.
Given the data word 1010011110 and the generator is x4 + x2 +x +1. 6 3 L3 13 13.2.5
i. Show the generation of the code word at the sender site
b
using binary division.
ii. What is the syndrome at the receiver end if the data word
has an error in the 5th bit position counting from the right?
Describe the process by which a self-learning switch builds the switch 8 4 L3 2 2.2.3
forwarding table.
Consider the LAN in Fig 1, consisting of 10 computers connected by
two self-learning Ethernet switches. At t=0 the switch table entries
for both switches are empty. At t = 1, 2, and 3, a source node sends
to a destination node as shown below, and the destination replies
immediately. Assume that the following transmissions occur (the
transmissions in reply occur but are not shown in the list below):
t=1: B -> K
t=2: E -> J
t=3: H -> L
Fill out the two switch tables and answer the questions below.
Briefly explain ARP. Why is an ARP query sent within a broadcast 6 4 L3 2 2.2.3
frame?
Consider the Fig 2. The IP and MAC addresses are shown for nodes A,
B, C and D, as well as for the router's interfaces. Consider an IP
datagram being sent from node A to node B.
27
Model Question Paper for End Semester Assessment (ESA)
Course Code: 23ECSC303 Course Title: Computer Networks-2
Duration: 3hrs
Max. Marks 100
Note: : Answer Five Questions: Any two full questions from each Unit I & Unit II and one full question from
Unit III
UNIT
Q.N Questions Marks CO BL PO PI
o Code
1a Explain the Bellman-Ford algorithm with an example. 6 1 L2 1 1.4.5
Derive equations for expected waiting time, response time, number of 6 2 L2 1 1.4.5
b jobs waiting in a queue, and probability that a packet is dropped in an
M/M/1/B system.
i. A small railway ticket booking office has two counters – Counter 1 for 8 2 L3 1 2.2.3
enquiry and Counter 2 for ticket booking. Customer arrival is Poisson at
5 per hour to the enquiry and 10 per hour to the ticket booking
counter. Exponentially distributed service time in each counter is 4
c minutes per customer. Find the average waiting time of a customer.
ii. In the above problem, find by how much the average waiting time of
a customer in the system reduces at Counter 1 (original enquiry
counter) when the office decides to go for pooling of resources – i.e. an
arriving customer will get enquiry or ticket booking facility at any of the
counters.
Differentiate M/M/1 system, M/M/1/B, and M/M/m systems with 6 2 L3 1 1.4.5
2a respect to their working and their performances. Give appropriate
justification.
Consider the network topology illustrated in figure 1 and assume that 6 1 L3 1 3.3.1
each node initially knows the cost to each of its neighbors. Apply DV
algorithm to determine the distance table entries at each node.
2
b A B
3 8
C
28
What do you understand by a queue? Give some important 6 2 L2 1 1.4.5
3a
applications of queuing theory. Explain components used in Kendall’s
notation.
A two channel waiting line with Poisson arrival has a mean arrival rate 6 2 L3 1 1.4.5
b of 50 per hour and exponential service with a mean service rate of 75
per hour for each channel. Find (i) The probability of the empty system.
(ii) The probability that an arrival in the system will have to wait.
Write a link-state routing algorithm to calculate shortest path. Apply 8 1 L3 1 3.3.1
the same algorithm for the network topology illustrated in figure 2 and
compute the shortest path from w to all network nodes.
UNIT-II
29
Fig 6. Local Area Network Topology.
At t=1, determine the source and destination entry for switch 1.
At t=1, determine the source and destination entry for switch 2.
At t=2, determine the source and destination entry for switch 1.
At t=2, determine the source and destination entry for switch 2.
At t=3, determine the source and destination entry for switch 1.
At t=3, determine the source and destination entry for switch 2.
5a Explain with diagram FDDI and Token Ring LAN standards. 6 4 L2 2 2.2.3
30
Fig 8. Multiple Access Protocol.
a) Suppose all nodes are implementing the Aloha protocol. For each
message, indicate the time at which each transmission begins.
Which messages transmit successfully? Write your answer using
the messages' numbers
b) Suppose all nodes are implementing the Slotted Aloha protocol.
For each message, indicate the time at which each transmission
begins. Which messages transmit successfully? Write your answer
using the messages' numbers
6a Explain MPLS header format. With example describe the working of 6 4 L2 1 1.4.5
MPLS along with its forwarding table.
b Describe the working of data center network with a hierarchical 6 4 L2 1 1.4.5
topology.
Create Hamming code for the data “1011011”. If the fifth bit in the 8 3 L3 13 13.2.2
c
hamming code is flipped during the transmission, explain how error
correction can be performed.
UNIT III
Why is a packet that is received after its scheduled play out time
b 10 5 L2 1 1.4.5
considered lost?
31