CAT 1 Answer Key
CAT 1 Answer Key
CAT 1 Answer Key
1.1
Error control is necessary in networks to prevent information loss or corruption during data
transmission or storage. Error control techniques aim to maximize transmission reliability while
considering signal power, system bandwidth, and circuitry complexity.
Here are some error correction methods used in networks:
Automatic repeat request (ARQ)
Uses error-detection codes, acknowledgment messages, and timeouts to ensure reliable data
transmission. ARQ is suitable for communication channels with varying or unknown capacity,
such as the internet.
Forward error correction (FEC)
Adds redundant data to a message so that the receiver can recover it even if errors occur during
transmission or storage.
Error-correcting codes (ECC)
A more efficient and cost-effective solution than error detection and retransmission (EDR). ECC
avoids the additional latency of retransmission, which is important for high-speed services and
long-distance connections.
error detection in computer networks is crucial for ensuring data is transmitted accurately and
reliably. By using various techniques, like checksums, parity bits, and cyclic redundancy checks,
networks can identify and correct errors that occur during data transmission.
Subnetting improves network management and performance by dividing a network into smaller
segments, or subnets, which makes the network easier to manage and improves performance:
Improved network performance
Subnetting reduces network congestion by limiting the scope of broadcast messages to a specific
subnet. This allows devices to communicate more efficiently and prevents network traffic from
overwhelming a network segment.
Enhanced network security
Subnetting allows you to limit a network breach by isolating the compromised subnetwork. You
can also use access control lists (ACLs) and security policies to control traffic flow from devices
within specific subnets.
Simplified network management
Subnetting makes network management easier by breaking down a large network into smaller,
more manageable segments.
Optimized IP address utilization
Subnetting helps conserve IP addresses by breaking a large network into smaller segments, each
with its own range of IP addresses.
Control network growth
Subnetting enables you to control the growth of your network
2.3 Given the IP address 192.168.1.1 determine its class and explain why it fall into this
category.
The IP address 192.168.1.1 is a Class C IP address. Class C IP addresses are typically used for
home networks, small businesses, and small organizations. The range of Class C IP addresses is
192.168.0.0 to 192.168.255.255.
Here's why:
1. IP Address Classes are determined by the first few bits of the IP address:
o Class A: First octet (8 bits) ranges from 0 to 127. (Addresses like 10.x.x.x)
o Class B: First octet ranges from 128 to 191. (Addresses like 172.x.x.x)
o Class C: First octet ranges from 192 to 223. (Addresses like 192.x.x.x)
2. 192.168.1.1 falls in the range of 192 to 223, which means it is a Class C address.
Class C Characteristics:
The first three octets (24 bits) are used for the network part, and the last octet (8 bits) is
used for the host part.
This class is often used for small-sized networks because it supports up to 254 hosts per
network (the range for hosts is from 192.168.1.1 to 192.168.1.254, with .0 reserved for the
network address and .255 for the broadcast address).
Special Note:
The 192.168.x.x range is a private IP range, reserved for local networks and not routable on
the public internet. This is why it's commonly used in home and small business networks.
DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign
IP addresses and other network configuration parameters to devices on a network. It simplifies
the process of managing IP addresses and eliminates the need for manually configuring devices.
3.1 what is a router ? HOw does a router make decision is forwarding the packets?
A router is a networking device that forwards data packets between networks, and makes
forwarding decisions by using a routing table to find the best path for a packet to take:
Here's how a router works:
Routing table
A router's routing table contains a list of network destinations and the next-hop router addresses
for each.
Packet inspection
When a router receives a packet, it checks the destination IP address.
Routing table search
The router searches the routing table for a match to the destination IP address.
Path determination
The router determines the best path to send the packet based on the routing table search
results. The three possible outcomes are:
Directly connected network: The packet is sent directly to the destination device.
Remote network: The packet is sent to another router.
No route determined: The router checks for a Gateway of Last Resort.
Routers use routing protocols like Border Gateway Protocol (BGP) or Open Shortest Path First
(OSPF) to exchange routing information with other routers. These protocols allow routers to
update their routing tables based on network changes, so packets are always sent along the best
path.
3.2 Define "Link state routing" and its advantage over other routing techniques.
Link state routing is a network routing protocol that uses a graph to map network connectivity and
calculate the shortest path between nodes. It has several advantages over other routing techniques,
including:
Link state routing protocols have a complete picture of the network topology, which is more accurate
than other routing techniques.
Faster convergence
Link state routing protocols flood link state packets (LSPs) out all interfaces, except for the one the
LSP was received on. This is faster than other routing techniques, which need to process each routing
update before flooding it out.
Event-driven updates
Link state routing protocols only send out LSPs when there is a change in the network topology.
Hierarchical design
Link state routing protocols use areas to create a hierarchical design, which allows for better route
aggregation and isolation of routing issues.