advanced networking tutorial sheets

Download Advanced Networking Tutorial Sheets

If you can't read please download the document

Upload: xyzking

Post on 03-Nov-2014

116 views

Category:

Documents


1 download

DESCRIPTION

this the tutorial sheet for advanced networking

TRANSCRIPT

Amity School of Engineering & Technology B.Tech (Computer Science & Engineering) 6th Semester Tutorial Sheets (Advance Networking) Tutorial No. 1 Q1. Explain packet format. OSPF RIP RARP BOOTP DHCP BGP ARP IP Ipv6 ICMP UDP TCP SNMP Q2. What is the need of ARP? Explain the ARP format. Q3. What is the subnet mask and default subnet mask? What is the subnetwork address if the destination address is 200.45.34.36 and the subnet mask is 255.255.240.0? Q4. Explain TCP/IP layer protocol suite. Q5. Given the IP address is 18.250.31.14 and the subnet mask is 250.240.0.0, what is the subnet address? Q6. IP address 127.36.22.56/25 is given. Find the following: (a). Block Size (b). First address of the block (c). Last address of the block Q7. In TCP Header, if HLEN field value is set as 1111, how long the header would be? Q8. What is IP addressing scheme? Explain IPV6 in detail? Q9. Discuss ARP and RARP protocols. Q10. Differentiate between i) ARP and RARP protocols ii) BOOTP and DHCP iii) RIP and BGP protocols iv) TCP and UDP

Tutorial No.2 Q1. From the figure given below, draw distance vector routing table for each node and find the least cost to reach from node A to G.

Q2. What is classful addressing? Find the class of each of the following address: (a) 255.255.255.255 (b) 224.0.0.0 (c) 00000001 00001011 00001011 11101111 Q3. Discuss the Frame Relay physical layer. Why is Frame Relay a better solution for connecting LANs than T-1 lines? Q4. Name the ATM layers and their functions. Briefly describe the issues involved in using ATM technology in LANs. Q5. What are the advantages of dividing an Ethernet LAN with a bridge? Q6. What is the relationship between a switch and a bridge? Q7. Explain Dijkstras algorithm with an example. Q8. An organization is granted the block 130.34.12.64/26.The organization needs 4 subnets. What is the subnet prefix length? What are the subnet addresses and the range of addresses for each subnet? Q9. What is OSPF? What are advantages of OSPF as compared to BGP? Q10. Describe SNMP and its components?

Tutorial No. 3 Q1. The following is a dump of a TCP header in hexadecimal format. 05320017 00000001 00000000 500207FF 00000000 a. What is the source port number? b. What is the destination port number? c. What is the sequence number? d. What is the acknowledgment number? e. What is the length of header? f. What is the type of segment? g. What is the window size? Q2. Give definitions for the following. FDM TDM DWDM FDDI MAC LLC/SNAP OUI AUI FOIRL DST PCM DSU/CSU SONET ISDN DSL ADSL HDSL CATV FTTC FTTH HFC CCITT SMDS CIDR ARP ICMP MTU TCP/IP Q3. Define Internet Control Message Protocol with respect to routing? Q4. What is ISDN? Is it technology or architecture? Illustrate with example? Q5. What does B-ISDN stand for? Explain its architecture. Q6. What is ATM? Explain its traffic Management? Q7. Describe the token format of FDDI. How token regulates control in FDDI? Q8. Explain the concept of scatternet & piconet? Define the Frame format and layered formation of Bluetooth? Q9. Explain the concept of Hidden Vs Exposed station problem? How MAC differ as compared to wired network? Explain the concept of frequency reuse in cellular environment?

Q10. Compare TDMA, CDMA, SDMA and FDMA in detail.

Tutorial No. 4 Q1. Explain with the help of an example modeling network as a graph. Q2. There are two promising wireless technologies for LANs: IEEE 802.11 and Bluetooth. Discuss in detail. Q3. What are the different phases of mail transfer? Q4. Explain in detail about DNS in the Internet. Q5. Explain Network Management System. Q6. What is Piconet and Scatternet in Bluetooth? Under what frequency range does Bluetooth work? Why Bluetooth is called a cable replacement technology? Q7. Write down the concept of Queuing theory? How congestion is handled by Queuing theory? Q8. Explain in detail the standards for wireless communication. Explain with diagrams the MAC layer for the same. Q9. An ISP is granted a block of addresses starting with 120.60.4.0/22. The ISP wants to distribute these blocks to 100 organizations with each organization receiving just eight addresses. Design the sub blocks and give the slash notation for each sub block. Find out how many addresses are still available after these allocations. Q10. Describe ATM switching for forwarding cells?

Tutorial No. 5 Q1. Are both UDP and IP unreliable to the same degree? Why or why not? Q2. Do Port addresses need to be unique? Why or why not? Why are port addresses shorter than IP addresses? Q3. A client use UDP to send data to a server. The data are16 bytes.Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes). Q4. TCP is sending data at 1 megabyte per second (8 Mb/s). If the sequence number start that 7000, how long does it take before the sequence number goes back to zero? Q5. How does Gigabit Ethernet differ from Fast Ethernet? Use some examples. Q6. Describe DSL & ADSL with respect to communication. Q7. What is FDDI? Why it is called dual counter rotating rings? Explain MAC techniques used in FDDI?

Tutorial No. 6 Q1.Write the differences between delay and throughput with examples and their relationship. What is an effective throughput? What a delay-throughput product signifies? Q2. What is the networks jitter? How the telephone system and data networks handle jitter? Q3. Explain the differences among Sequencing Out-of-order delivery of packets and Sequencing to eliminate Duplicate packets. Q4. What is the main difference between the Data Overrun and the Network Congestion? Q5. What techniques are used to resolve Data overrun (stop-and-go and Sliding Window techniques, their advantages and disadvantages)? Q6. What techniques are used to resolve Network Congestion?

Tutorial No. 7 Q1. What are the main commercial protocol stacks and their vendor names other than the TCP/IP? Q2. Explain the differences between a class-full IP address and CIDR address schemes. What are the main advantages of CIDR address scheme over a class-full address scheme? Q3. What are the natural (address) masks for Class A, B, and C? Explain why subnetting is necessary. Briefly describe how a subnet is created.

Tutorial No. 8 Q1. What is ARP? Describe one of the three Address Resolution Techniques. Q2. Explain relative advantages and disadvantages of three Address Resolution techniques. Q3. How ARP message is delivered? How does an ARP packet look like? How an ARP frame is identified? Q4. Whats your understanding of Caching ARP responses? Q5. In which protocol layer(s) the address is resolved? Q6. What are the Virtual Packets and IP datagram? What is Best-Effort Delivery? Q7. Examine the Header format of an IP datagram and explain the sections IDENTIFICATION, FLAGS, FRAGMENT OFFSET. Q8. Why fragmentation of a packet is required and it is handled in the network?

Tutorial No. 9 1. Which type of signaling scheme represents data sent as discrete signals? a. Digital signaling b. Analogsignaling c. Asynchronous d. Synchronous 2. Which type of signaling scheme represents continuously changing data? a. Digital signaling b. Analogsignaling c. Asynchronous d. Synchronous 3. Which type of bit synchronization transmission requires both a start bit and a stop bit for clocking purposes? a. Digital signaling b. Analogsignaling c. Asynchronous d. Synchronous 4. Group of bits, including data and control signals, arranged in a specific format and transmitted as a whole, are called what? a. Clocking b. Sequencing c. Synchronization d. Packets 5. Which type of transmission do all devices on the shared network hear and accept? a. Unicast b. Multicast c. Broadcast d. Baseband 6. Which type of signaling uses the entire bandwidth of a cable for a single transmission and allows only one signal at a time? a. Unicast b. Multicast c. Broadcast d. Baseband 7. When all devices have equal access to the network and no one device has priority over another device, what is this called? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain 8. What is the term used to describe the ability of a device to sense simultaneous transmission attempts and wait a random amount of time before retransmitting data? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain

9. What is the ability to listen for a jam signal before transmitting data called? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain 10. Ethernet standards include specifications for which of the following? a. Cabling b. Frame format c. Network access conventions d. All of the above 11. In 10BASE5 Ethernet networks, what type of cable is specified? a. 500-ohm thick coaxial cable b. 50-ohm thick coaxial cable c. 500-ohm thin coaxial cable d. 50-ohm thin coaxial cable 12. In 10BASE2 Ethernet networks, what type of cable is specified? a. 500-ohm thick coaxial cable b. 50-ohm thick coaxial cable c. 500-ohm thin coaxial cable d. 50-ohm thin coaxial cable 13. A BNC-T connector is used with which Ethernet type? a. 10BASE5 b. 10BASE2 c. 10BASE_T d. 100BASE-T e. 10BASE-F 14. The maximum number of devices on a 10BASE-T network is what? a. 30 b. 100 c. 500 d. 1,024 15. The maximum number of devices on a 10BASE5 network is what? a. 30 b. 100 c. 500 d. 1,024 16. What is an AUI connector? a. A 15-pin connector used with an external transceiver b. Device used only with a fan-out unit c. The standard connector used for 100BASE-T connections d. Device used for all Ethernet connections 17. The maximum cable length for each segment in 10BASE-T networks is what? a. 100 meters b. 185 meters

c. 285 meters d. 500 meters 18. A 10Base-T network may use which cable types? a. Category 3 b. Category 4 c. Category 5 d. All of the above 19. The maximum number of devices per segment on a 10BASE-F network is what? a. 30 devices b. 1,024 devices c. 2 devices d. 500 devices 20. What is the difference between a physical bus and a logical bus/physical star topology? a. The physical bus uses a hub b. The logical bus, physical star is always used for Ethernet networks c. The logical bus, physical star uses a hub d. There is no difference 21. What is the topology of 10BASE-T networks? a. Physical bus/logical star b. Physical/logical star c. Physical/logical bus d. Physical star/logical bus 22. Which type of cabling is used to connect devices in a 10BASE-F network? a. Category 5 b. UTP c. STP d. Fiber optic 23. The maximum number of repeaters/hubs per LAN allowed on a 10BASE-T segment is: a. 4 b. 100 c. 30 d. 925 24. Maximum fiber cable distances are: a. 550 meters b. 250 meters c. 2,000 feet d. 2,000 meters 25. What is an AUI? a. An external transceiver b. An internal transceiver c. A transceiver cable d. An N-type connector 26. Which cable type is used in LANs over 1,000 meters in length?

a. UTS b. STP c. Category 5 d. Fiber Optic 27. Which type of copper cable is most useful when EMI and distances of more than 1,000 meters are a concern? a. UTP b. STP c. Thick coaxial d. Thin coaxial

Tutorial No. 10 28. Token Ring networks operate at a. 10, 100 or 1000 Mbps b. 4, 16, 100 or 128 Mbps c. 1 Gbps d. 10, 16 or 1000 Mbps e. 4 or 10 Mbps 29. The Token Ring token frame size is a. 16 bits b. 24 bits c. 32 bits d. 48 bits e. 64 bits 30. After copying data from the token frame, a receiving device a. Releases the token b. Reads error control information from the frame c. Uses the token frame to send new data d. Destroys the token frame e. Send the frame back to the sending device 31. Token Ring networks a. Fail more often than Ethernet networks b. Fail more gracefully than Ethernet networks c. Never fail d. Cannot accept priority assignments e. Must use fiber optic cabling 32. To detect and correct errors a. Every device on a Token Ring network is an active monitor b. Each device on a Token Ring network diagnoses its own errors c. Each device gives control to its nearest active upstream neighbor d. One device is designated as the active monitor e. All devices send out a Claim Token 33. FDDI operates at a. 10 Mbps b. 4 or 16 Mbps c. 100 Mbps d. 1000 Mbps e. 4.5 Mbps 34. To transport streaming media data, FDDI a. Opens a switched circuit b. Can synchronize data with a clocking field c. Can only transmit one frame when the token has been captured d. Uses fiber optic cabling 35. When an FDDI sending device has captured a token a. It can only transmit one frame b. It can transmit as many frames as it wants c. It can only transmit error diagnostics d. It can transmit frames until a time limit expires

e. It releases the token 36. A secondary ring in FDDI a. Automatically steps in if the primary ring fails b. Allows priority communication to select devices c. Doubles communication speed d. Connects to Token Ring networks 37. Which computer manufacturer uses LocalTalk? a. IBM b. Digital Equipment Corporation c. Intel Corporation d. Motorola e. Apple Computer 38. LocalTalk operates at a. 230 Kbps b. 1 Mbps c. 10 Mbps d. 100 Mbps e. 1 Gbps 39. LocalTalk connects using a. Fiber optic cable b. Coaxial cable c. Twisted pair cable d. Microwave radio e. Photonic switches 40. Which type of switching provides lowest delays? a. ATM b. Packet switching c. Circuit switching d. Open circuit leased line 41. Which type of switching introduces the greatest delays? a. ATM b. Packet switching c. Circuit switching d. Open circuit leased line 42. Which application requires the highest quality of service? a. Electronic mail b. Video conferencing c. Audio broadcasting d. Web browsing 43. Which application requires the least quality of service? a. Electronic mail b. Video conferencing c. Audio broadcasting d. Web browsing

44. Which switching method provides a flexible quality of service based on need? a. ATM b. Packet switching c. Circuit switching d. Open circuit leased line 45. Network error rates are measured as a. The number of good bits divided by the number bad bits b. The number of good packets added to the number of bad packets c. The number of bad bits divided by the number of good bits d. The number of bad bits subtracted from the number of good bits 46. Which technique detects more kinds of errors? a. Checksum b. Cyclical redundancy check c. Circuit switching d. Authentication 47. X.25 networks detect and correct errors by a. Checking the CRC and requesting a new copy of a bad packet from the sending switch b. Using a checksum and discarding bad packets c. Allowing the routers and devices on the sending an receiving LANs to detect and handle errors d. Using the lowest level of the protocol stack 48. Frame relay networks detect and correct errors by a. Checking the CRC and requesting a new copy of a bad packet from the sending switch b. Using a checksum and discarding bad packets c. Allowing the routers and devices on the sending and receiving LANs to detect and handle errors d. Using the lowest level of the protocol stack 49. A virtual private network (VPN) a. Requires a private leased line b. Uses encryption to make private network connections across the Internet c. Requires users to connect to a dial-up server d. Can only transport TCP/IP protocols

Tutorial No.11 Q1.Identify which layer of the OSI model each device is assigned. 1. Bridge 2. Repeater 3. Network Interface Card 4. Router 5. Transceiver 6. Multistation Access Unit (MAU) 7. Hub 8. Switch Q2. Match the OSI layer with the appropriate function from the list below. Layer 7 Application ____ 6 Presentation ____ 5 Session ____ 4 Transport ____ 3 Network ____ 2 Data Link ____ 1 Physical ____ Function A. Routes and addresses messages B. Translates data so software applications can read it C. Allows user software to access network services D. Enables network logins E. Frames and controls data flow F. Provides reliable transmission and confirmation G. Defines media specifications

Q3. Label network hardware elements and functions with the appropriate OSI layer. Layer Physical (as an example) Device and Function Repeater.a connector that filters, amplifies and retransmits information to allow signals to travel further along a network. Bridge.connects small numbers of similar LANs into an internetwork or splits an overloaded network into smaller parts without translation. Router.connects different networks together and directs information by best route (using algorithms) to destinations. NIC.provides connection of computer to transmission medium on the network. Gateway.links different network types together. Can be hardware or software that allows different protocols to exchange information. Hub.provides central location with ports where cables on a network come together for connection

Modem.allows computers on a network to exchange information by translating into binary form for transmission over telephone lines. Cable.wires used to connect devices on a network. Q4. Illustrate connection establishment process graphically in three way handshaking. Q5. Describe IEEE 802.11 in detail. Q6. What is the difference between physical address and logical address?

Tutorial No. 12 Q1. Matching: Match the part of the frame with its definition. 1. ___ Preamble A One byte code in the LLC field used to identify the protocol that will encapsulate the data field B Hardware address of the destination device C Actual information being transmitted D Specifies the protocol used for sending the frame E Specifies the length of the data within the frame F Type of frame check that detects errors that occur in the frame during transmission G Added to the data field of IEEE 802.3 when the data is less than 46 bytes H Establishes synchronization and transceiver conditions I Field with 10101011 sequence separate J Hardware address of the sending device

2. ____ Start of Frame 3. ___ Destination Address 4. ___ Source Address 5. ___ Type Field 6. ___ Length Field 7. ___ Pad 8. ___ Data 9. ___ DSAP 10. __ CRC Q2. Matching

1. ____ The speed of the least expensive kind of leased line. 2. ____ A digital telephone line likely to be used by an Internet Service Provider. 3. ____ A digital telephone line that can carry data at 1.544 Mbps. 4. ____ The speed of a single channel on a T1 line. A. 8 B. T1 C. T3 D. 64 Kbps E. 7 F. 6 G. 128 Kbps H. 56 Kbps

Q3. . How cache memory helps address resolution process in ARP. What is proxy ARP? Q4. IPV6 has some advantages over IPV4, explain. Also explain IPV6 format.