This document is an assignment submission for a networking fundamentals course. It contains the student's enrollment information and responses to 4 questions. The questions address topics like the components of a data communication system, popular communication tools, the differences between local and remote login in Telnet, and why FTP does not have a message format.
This document is an assignment submission for a networking fundamentals course. It contains the student's enrollment information and responses to 4 questions. The questions address topics like the components of a data communication system, popular communication tools, the differences between local and remote login in Telnet, and why FTP does not have a message format.
This document is an assignment submission for a networking fundamentals course. It contains the student's enrollment information and responses to 4 questions. The questions address topics like the components of a data communication system, popular communication tools, the differences between local and remote login in Telnet, and why FTP does not have a message format.
This document is an assignment submission for a networking fundamentals course. It contains the student's enrollment information and responses to 4 questions. The questions address topics like the components of a data communication system, popular communication tools, the differences between local and remote login in Telnet, and why FTP does not have a message format.
Assignment-A Question 1). Identify the five components of a data communication system.An identified sender and receiver
An agreed-upon method of communicating (face-to-face), telephone, letter, photograph. Common language and grammar An agreed-upon speed and timing of delivery (for example please slow down so that I can understand you.) Confirmation requirements (for example is that clear? Yes, thank you.).
Question 2). What are the various popular communication tools?
Instant messaging is real-time communication between two or more users. It has expanded to include voice, photo and video sharing, and file transfers. Instant messaging is also used by customer service centres to assist customers and friends in communicating with each other. Blogs are web pages where people can publish their personal opinions and thoughts about any conceivable topic. Blogs allow unfiltered and unedited publication of ideas from experts and non experts alike. Podcasting is an audio-based medium that allows people to deliver their recordings to a wide audience. The audio file is placed on a website (or blog or wiki), where others can download it and play the recording on their computers, laptops and ipods. Wikis are also publicly created web content. Wiki web pages are created and edited by groups of people sharing information. The best known example of a wiki is the Wikipedia, an online encyclopaedia made up of public contributions edited by the public users. Thousands of people contribute their specialised knowledge to the Wikipedia, and anyone can access the information at no cost.
Question 3). What is the difference between local and remote log-in in TELNET?
In local login, a user logs into a local time-sharing program, and types at a terminal running a terminal emulator. The keystrokes are accepted by the terminal driver which passes the characters to the operating system that may assign special meanings to these characters. These situations do not create any problem in local login because the terminal emulator and the terminal driver know the exact meaning of each character, they may create problems in remote login.
In remote login, on the other hand, when a user wants to access an application program,he or she performs remote login. The user sends keystrokes to the terminal driver where the local operating system accepts the characters but does interpret them. They are sent to the telnet client which in turn transforms the characters to a universal character set called "Network Virtual terminal characters" and delivers them to the local TCP/IP stack. However, the characters cannot be passed directly to the operating system because the remote operating system is designed to receive characters from terminal drivers and not directly from the telnet server. The solution for this is to add a piece of software called a
Pseudoterminal driver, which pretends that the characters are coming from a terminal. The operating system then passes the characters to appropriate application programs.
Question 4). Explain why ftp does not have a message format?
Because FTP uses TCP, which allows data to be streamed a byte at a time. FTP does not have headers. The only response that the client gets from the server is: <code> <message>
1) The following is a dump of a TCP header in hexadecimal format. 05320017 00000001 00000000 500207FF 00000000
a) What is the source port number? The source port number: source port is 2 bytes take 05 32 = 1330
b) What is the destination port number? The destination port number is 2 bytes as destination address 00 17 == 23 (default TCP port)
c) What is the sequence number? The sequence number is 4 bytes as sequence number 00 00 00 01 ==1
d) What is the acknowledgment number? The acknowledgment number is next 4 bytes as ack 00 00 00 00 == 0
e) What is the length of the header? The length of the header is 4 bits as HLEN 5 ==5 -- this indicates number of sets of 4 bytes which makes the header lenght = 20bytes..
f) What is the type of the segment? The type of the segment is 6 bits are reserved i.e.0 =0000and 2 bits from hex
g) What is the window size? The window size is 2 bytes indicate the window length 07 FF == 2047 bytes
Assignment B
Question 1). Explain why most of the addresses in class A are wasted. Explain why a medium size orlarge-size corporation does not want a block of class C addresses.
Most addresses in class A are wasted because even though they were originally designed for large organisations with a large number of attached hosts or routers, because a block in the class A address is too large for almost any of the organisations resulting in most of the addresses in class A not being used and hence being wasted. In class A the first bit is 0 and the first byte in decimal notation is from 0-127. In class C the first 2 bits are 1 and the third bit is 0,the first byte is basically between 192-223 this results in a class C address being too small for an average medium sized or large-sized corporation.
Question 2). How many multicast addresses can be supported for the IPv4 protocol in Ethernet? What is the size of address space lost when we transform a multicast IPv4 address to an Ethernet multicast address?
The multicast address group for IPV4 is in the range of 224.0.0.0/4 former class D network (224.0.0.0 to 239.255.255.255). Since ethernet acts as an imperfect filter,the IP layer has to decide whether to accept the datagrams data link layer passed to it. The IP layer therefore acts as a more perfect filter.
Ethernet has a 48-bit destination address field. To avoid a kind of multicast ARP when mapping multicast IP addresses to Ethernet and FDDI ones, IANA reserved a range of addresses for multicast. Every Ethernet frame with its destination in the range 01-00-5e- 00-00-00 to01-00-5e-ff-ff-ff (hexadecimal format) contains data for a multicast group. The prefix 01-00-5eidentifies the frame as multicast, the next bit is 0 and so only 23 bits are left to the multicast address. Since IP multicast groups are 28 bits long, the mapping cannot be one to one.Only the 23 significant bits of the IP multicast group are placed in the frame, and the remaining 5 higher order bits are ignored, resulting in 32 different multicast groups being mapped to the same Ethernet/FDDI address.
Question 3). Name the advantages of optical fiber over twisted-pair and coaxial cable.
1.Optical fibre can carry data for a longer distance (up 40 km with single mode). 2. Optical fiber also has higher transmission speeds than twisted pair or coaxial cable. 3. Lower attenuation: Attenuation is significantly lower for optical fiber than for coaxial c able or twisted pair and is constant over a wide range. Optical fibres carry signals with much less signal energy loss than twisted pair or co-axial cable. 4.Greater capacity: optical fibre can carry a much higher bandwidth e.g upto 2gbps thanco-axial (hundreds of Mbps) and twisted pair (100mbps) and over greater distances. 3- Fibre optic is also easier for installation engineers to handle. 4-Optical fibre cables are much lighter and thinner than coaxial and twisted pair cables of the same bandwidth 5- Security Optical fibres are much more difficult to tap information from undetected; a great advantage for banks and security installations.
6- Fibre optic is also immune to electromagnetic interference from radio signals, car ignition systems, lightning 7. Optical fibre requires fewer repeaters than twisted pair and co-axial cable resulting in lower cost and fewer sources of error. 8.Optical fiber is non-conductive and hence immune to high-voltage spikes and can be used to connect equipment where complete electrical isolation is required to prevent ground loops. 9.For equivalent bandwidth capability, an optical cable generally has (or can have, depending on how it is constructed) a much smaller bend radius than a copper cable.
Question 4). How does sky propagation differ from line-of- sight propagation?
Electromagnetic waves - radio waves - propagate through the air and vacuum by altering theelectro-magnetic (EM) properties of space. They will be reflected whenever the EM properties of the space change. Incoming radiation from the sun partly ionizes some of the air molecules in the upper atmosphere and, for some frequencies, this will reflect (or refract) the EM signal. This allows the EM signal to be reflected over long distances - even around the world - multiple hops. This is the sky propagation that allows signals to travel all around the world via multiple atmospheric reflections. This effect is only true for frequencies up to 10MHz or so. varies naturally, day and night. A related phenomenon affecting the upper atmosphere, is that incoming meteorites may give temporary ionization tracks for this reflection/refraction. These have been used for burst transmissions but are not suitable for broadcast communications. Higher frequencies, 100 MHz or so, on the other hand are not affected by the ionized layers and require line - of - sight propagation, from the transmitter to the receiver. Line of site propagation basically requires both transmitter and receiver to be visible. Sky wave propagation therefore transmits AM and lower frequencies over much longer distances by bouncing them off the ionosphere whereas line of sight propagation is limited to transmitting higher frequency microwaves between visible transmitter and receiver.
Assignment-C
1). Put the following in the correct order, from high to low: session (a), presentation (b), physical (c), data link (d), network (e), application (f), transport (g). a) c, d, e, g, a, b, f b) f, a, b, g, d, e, c c) f, b, g, a, e, d, c d) f, b, a, g, e, d, c ()
2). The _________ layer provides for hardware addressing. a) Transport b) Network c) Data link () d) Physical
3). Which component of the data link layer for IEEE specifies network protocols? a) LLC () b) MAC c) 802.5 d) 802.3
4). The network layer solves all of the following problems except ___________. a) Broadcast problems b) Conversion between media types c) Hierarchy through the use of physical addresses () d) Collision problems
5). Connection multiplexing is done through the use of a ________ number. a) Socket () b) Hardware c) Network d) Session
6). Reliable connections go through a three-way handshake. Place the following in the correct order: ACK (1), SYN, (2), SYN/ACK (3). a) 2, 1, 3 b) 3, 2, 1 c) 2, 3, 1 () d) 1, 2, 3
7). _________ describe(s) users working from home. a) SOHO () b) Branch office c) Regional office d) Corporate office
8). _________ has a physical star topology but a logical ring topology a) Ethernet b) FDDI c) Token Ring () d) FDDI and Token Ring
9). A _________ uses Gigabit Ethernet as a media type a) WAN b) LAN c) MAN d) LAN and MAN ()
10). The TCP/IP protocol stack has ________ layers. a) 4 b) 5 () c) 6 d) 7
11). A Class A address has _________ host bits. a) 8 b) 16 c) 20 d) 24 ()
12). 191.75.39.24 is a Class __________ address. a) A b) B () c) C d) None of the above
13). Which of the following is a valid subnet mask value?
a) 255.0.255.255 b) 0.0.0.255 c) 255.255.254.0 () d) 255.255.255.256
14). You are given a Class C network with 25 bits of networking. How many subnets do you have? a) 1 b) 2 () c) 3 d) 4
15). You are given a Class B network with a subnet mask of 255.255.255.192. How many host addresses are there on each subnet? a) 30 b) 62 () c) 126 d) 254
16). You are given the following addressing information: 192.168.37.192/25. What type of address is this? a) Network b) Directed broadcast c) Host ()
17). When choosing a networking product, you should consider all of the following except _______. a) Ease of installation and support b) Product features and functions c) Backplane capacity d) Amount of memory ()
18). When connecting a router to a PC, use a __________ cable. A) Crossover () B) Straight-through C) Rollover
19). With _________ switching, the switch reads the destination MAC address of the frame and immediately starts forwarding the frame. a) Store-and-forward b) Cut-through () c) Fragment-free d) Runtless
20). Which type of traffic is sent to a group of devices? a) Multicast () b) Unicast c) Broadcast d) Groupcast
21). What subnet mask would you use to set up a default route?
a) 0.0.0.0 b) 255.255.255.255 c) Depends on the type of network number d) None of these answers ()
22). When choosing a dynamic routing protocol, which of the following should not be considered? a) Metrics used b) How routing information is shared c) How routing information is processed d) Number of PCs in the network ()
23). A routing protocol will use a(n) _________ to determine which path is the best path. a) Administrative distance b) Metric () c) Hop count d) Cost
24). Which type of routing protocol uses the Shortest Path First algorithm? a) Distance vector b) Link state () c) Hybrid
25). What command activates the IP routing process? a) router b) enable c) network () d) no shutdown
26). RIP has a maximum hop count of ____________ hops. A.10 B.15 () C.16 D.100
27). Which of the following is false concerning OSPF? a) It provides a loop-free topology. b) It is a classful protocol and allows for a hierarchical design () c) It requires more memory and processing cycles than distance vector protocols. d) It is complex to configure and difficult to troubleshoot.
28). The OSPF process ID is __________. a) Locally significant and is the router ID b) Globally significant and must be configured on every router c) Locally significant () d) OSPF doesnt use a process ID, but an AS number
29). An OSPFs router ID is based on __________. a) The lowest IP address on its loopback interface, if configured, or the lowest IP address on its active interfaces
b)The highest IP address on its loopback interface, if configured, or the highest IP address on its active interfaces () c) The highest IP address on its active interfaces, if configured, or the highest IP address on its loopback interfaces d) The lowest IP address on its active interfaces, if configured, or the lowest IP address on its loopback interfaces
30). You are given a Class C network, 192.168.1.0/24. You need one network with 120 hosts and three networks with 60 hosts. What subnet mask values would you use? a)255.255.255.128 and 255.255.255.192 b)255.255.255.128 c) 255.255.255.192 d) None of these ()
31). Which of the following is a private address? a) 192.169.7.17 b) 172.s32.28.39 c) 10.1.256.8 d) 172.16.255.89 ()
32). Which of the following reasons might you need to use address translation? a) You have to use public addressing because your ISP didnt assign you enough private addresses. b) You are using private addresses but have changed ISPs, and your new ISP wont support these private addresses. c) You want to assign the same IP address to multiple machines so that users on the Internet see this offered service as a single logical computer. d) You are merging two companies that use different address spaces ()