CAT 1 Answer Key

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1.1 define the OSI model and describe the function of its lower layer.

1.1

1.2 why is the concept of layered architecture important in network design ?


Layered architecture is a design approach that's important in network design because it helps to:
 Simplify design: Layered architecture breaks down a design into manageable parts.
 Provide modularity: Each layer has a specific role and can be managed and maintained
independently.
 Ensure independence: Changes to one layer don't impact the others.
 Allow for testing: Each layer can be tested separately.
 Make code easier to manage: Each layer manages a single aspect of the application.
 Provide a flexible architecture: Layered architecture is especially beneficial for cloud-based
applications.
 Simplify protocol implementation: Breaking protocol functions into smaller pieces makes
them easier to implement.

1.3 what is a socket in the context of network programming?

A socket is a communication endpoint in a computer network that allows two computers to


communicate with each other. It is a software construct that allows a computer to send and
receive data over the network. For example, consider a client computer that wants to send a
request to a server to access a webpage.
1. 1.4 why is error control necessary in networks? Name the error correction method used in
networks?

Error control is necessary in networks to prevent information loss or corruption during data
transmission or storage. Error control techniques aim to maximize transmission reliability while
considering signal power, system bandwidth, and circuitry complexity.
Here are some error correction methods used in networks:
 Automatic repeat request (ARQ)
Uses error-detection codes, acknowledgment messages, and timeouts to ensure reliable data
transmission. ARQ is suitable for communication channels with varying or unknown capacity,
such as the internet.
 Forward error correction (FEC)
Adds redundant data to a message so that the receiver can recover it even if errors occur during
transmission or storage.
 Error-correcting codes (ECC)
A more efficient and cost-effective solution than error detection and retransmission (EDR). ECC
avoids the additional latency of retransmission, which is important for high-speed services and
long-distance connections.

error detection in computer networks is crucial for ensuring data is transmitted accurately and
reliably. By using various techniques, like checksums, parity bits, and cyclic redundancy checks,
networks can identify and correct errors that occur during data transmission.

2.1 How does subnetting improve network management and performance?

Subnetting improves network management and performance by dividing a network into smaller
segments, or subnets, which makes the network easier to manage and improves performance:
 Improved network performance
Subnetting reduces network congestion by limiting the scope of broadcast messages to a specific
subnet. This allows devices to communicate more efficiently and prevents network traffic from
overwhelming a network segment.
 Enhanced network security
Subnetting allows you to limit a network breach by isolating the compromised subnetwork. You
can also use access control lists (ACLs) and security policies to control traffic flow from devices
within specific subnets.
 Simplified network management
Subnetting makes network management easier by breaking down a large network into smaller,
more manageable segments.
 Optimized IP address utilization
Subnetting helps conserve IP addresses by breaking a large network into smaller segments, each
with its own range of IP addresses.
 Control network growth
Subnetting enables you to control the growth of your network

2.2 Differentiate between ALOHA and CSMA/CD protocols.


Summary of Differences

Feature ALOHA CSMA/CD

Access Method Random access Carrier sensing

Collision Handling Retransmit after collision Detect and backoff

Efficiency ~18.4% (Pure), ~36.8% (Slotted) ~60-70%

Typical Use Cases Satellite, wireless networks Wired Ethernet networks

2.3 Given the IP address 192.168.1.1 determine its class and explain why it fall into this
category.
The IP address 192.168.1.1 is a Class C IP address. Class C IP addresses are typically used for
home networks, small businesses, and small organizations. The range of Class C IP addresses is
192.168.0.0 to 192.168.255.255.

Here's why:
1. IP Address Classes are determined by the first few bits of the IP address:
o Class A: First octet (8 bits) ranges from 0 to 127. (Addresses like 10.x.x.x)
o Class B: First octet ranges from 128 to 191. (Addresses like 172.x.x.x)
o Class C: First octet ranges from 192 to 223. (Addresses like 192.x.x.x)
2. 192.168.1.1 falls in the range of 192 to 223, which means it is a Class C address.
Class C Characteristics:
 The first three octets (24 bits) are used for the network part, and the last octet (8 bits) is
used for the host part.
 This class is often used for small-sized networks because it supports up to 254 hosts per
network (the range for hosts is from 192.168.1.1 to 192.168.1.254, with .0 reserved for the
network address and .255 for the broadcast address).
Special Note:
The 192.168.x.x range is a private IP range, reserved for local networks and not routable on
the public internet. This is why it's commonly used in home and small business networks.

2.4 2.4 Explain the purpose of DHCP in network configuration.

DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign
IP addresses and other network configuration parameters to devices on a network. It simplifies
the process of managing IP addresses and eliminates the need for manually configuring devices.
3.1 what is a router ? HOw does a router make decision is forwarding the packets?

A router is a networking device that forwards data packets between networks, and makes
forwarding decisions by using a routing table to find the best path for a packet to take:
Here's how a router works:
 Routing table
A router's routing table contains a list of network destinations and the next-hop router addresses
for each.
 Packet inspection
When a router receives a packet, it checks the destination IP address.
 Routing table search
The router searches the routing table for a match to the destination IP address.
 Path determination
The router determines the best path to send the packet based on the routing table search
results. The three possible outcomes are:
 Directly connected network: The packet is sent directly to the destination device.
 Remote network: The packet is sent to another router.
 No route determined: The router checks for a Gateway of Last Resort.
Routers use routing protocols like Border Gateway Protocol (BGP) or Open Shortest Path First
(OSPF) to exchange routing information with other routers. These protocols allow routers to
update their routing tables based on network changes, so packets are always sent along the best
path.

3.2 Define "Link state routing" and its advantage over other routing techniques.

Link state routing is a network routing protocol that uses a graph to map network connectivity and
calculate the shortest path between nodes. It has several advantages over other routing techniques,
including:

 More accurate network topology

Link state routing protocols have a complete picture of the network topology, which is more accurate
than other routing techniques.

 Faster convergence

Link state routing protocols flood link state packets (LSPs) out all interfaces, except for the one the
LSP was received on. This is faster than other routing techniques, which need to process each routing
update before flooding it out.

 Event-driven updates

Link state routing protocols only send out LSPs when there is a change in the network topology.

 Hierarchical design

Link state routing protocols use areas to create a hierarchical design, which allows for better route
aggregation and isolation of routing issues.

 Avoids the "count to infinity" problem


Link state routing protocols are not susceptible to the "count to infinity" problem, which can occur
with the Bellman-Ford Algorithm Distance Vector routing protocols.

You might also like