Sunteți pe pagina 1din 10

Amity Campus

Uttar Pradesh
India 201303

ASSIGNMENTS
PROGRAM: PGD IT
SEMESTER-II
Subject Name
Study COUNTRY
Roll Number (Reg.No.)
Student Name

: Network Fundamentals
: Rwanda
: PGDIT01162015-2016002
: Ernest HATEGEKIMANA

INSTRUCTIONS
a) Students are required to submit all three assignment sets.
ASSIGNMENT
Assignment A
Assignment B
Assignment C

DETAILS
Five Subjective Questions
Three Subjective Questions + Case Study
Objective or one line Questions

MARKS
10
10
10

b)
c)
d)
e)

Total weightage given to these assignments is 30%. OR 30 Marks


All assignments are to be completed as typed in word/pdf.
All questions are required to be attempted.
All the three assignments are to be completed by due dates and need to be
submitted for evaluation by Amity University.
f) The students have to attached a scan signature in the form.
Signature :
Date
:

_________________________________
____June 12, 2016__________________

( ) Tick mark in front of the assignments submitted


Assignment A
Assignment B
Assignment C

Networking Fundamentals
Assignment A
1) Identify the five components of a data communication system.
Answer: The five components are:
o

Message - It is the information to be communicated. Popular forms of information include


text, pictures, audio, video etc. Text is converted to binary, number doesnt converted, image is
converted to pixels, etc.

Sender - It is the device which sends the data messages. It can be a computer, workstation,
telephone handset etc.

Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.

Transmission Medium - It is the physical path by which a message travels from sender to
receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.

Protocol - It is a set of rules that governs the data communications. It represents an


agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating.

2) What are the various popular communication tools?


Answer: These tools can be categorized as follow:
Phones The days when people used landlines as their primary communication tool are over.
Back then, cell phones were thought of as a luxury. Now, wireless phones are a dominant form of
communication in many countries. Text messaging is rampant, and the advent of the smartphone
has enabled mobile phones to have PC functionality as well as the functionality to send large
pictures and video files. The use of a hand-held device is nearly antiquated, as Bluetooth devices
allows users to speak hands-free.
Email In 1965, Massachusetts Institute of Technology researchers and staff first used email.
They sent one another internetwork messages. Now, it is quite rare to come across someone
without at least one email account. Email is a function of the Internet, and users can access it
from myriad devices, including cell phones; PDAs; and, of course, computers. Email is virtually
instant, much like all modern communication modes.
Social Networks Twitter is in essence a form of mass communication, as messages get spread
to many recipients. Twitter is a social medium in that it enables instant interaction among users,
who can communicate directly and "retweet" other Twitterer messages. Facebook is a social
media platform similar to its predecessor Myspace. Facebook has numerous functions and
benefits and allows users to communicate on a one-on-one basis or to large groups. Picture
uploads are a prominent feature of Facebook and allow for digital record keeping, for free. As of
2011, Facebook has more than 600 million users.
Instant Messaging and Skype Instant messaging saw its peak early in the 21st century before
the rise of more interactive social media platforms. Instant messaging is still prevalent, however,
as Yahoo, America Online and MSN have successful services. Instant messaging is done most

often on keyboards over the Internet. Skype offers online calling, messaging and video calling all
across the world via the Internet. Skype is a hybrid free-paid service and charges for its calling
and video calling services.
Website Establishing a website for your grassroots coalition will allow you to post alerts,
events, group membership, mission, and a host of other information in a place that is accessible to
members and non-members alike. Because building an engaging and easy to navigate website
can be complicated, some groups may choose not to have one. Also, a useful website must be
updated regularly. However, if you decide to go this route there are a myriad of services that will
host your website for free and many tools available to make development and maintenance much
easier.

3) What is the difference between local and remote log-in in TELNET?


Answer: Both telnet and remote log-in are used to remotely log into another server and control it
remotely. They do the same thing, but are actually different protocols. Telnet requires the user to
specify their username and password to log in. remote log-in does not require additional
authentication if the account name is the same between systems
4) Explain why ftp does not have a message format?
Answer: FTP does not have a message format because of security reasons. It is not safe for FTP, also
known as file transfer protocol, source code to be shared openly.
5) The following is a dump of a TCP header in hexadecimal format.
05320017 00000001 00000000 500207FF 00000000
a) What is the source port number?
Answer: Source port number = (0532)16 = 1330
b) What is the destination port number?
Answer: Destination port number = (0017)16 = 23
c) What the sequence number?
Answer: Sequence number = (00000001)16
d) What is the acknowledgment number?
Answer: Acknowledgement number = (00000000)16
e) What is the length of the header?
Answer: Length of the header = 5*4 = 20
f) What is the type of the segment?
Answer: It is a SYN segment.
g) 7. What is the window size?
Answer: Windows size = (07FF)16

Assignment B
1) Explain why most of the addresses in class A are wasted. Explain why a medium size or largesize corporation does not want a block of class C addresses.

Answer: A block in class A address is too large for almost any organization. This means most of the
addresses in class A are wasted and not used. A block in class C is probably too small for many
organizations
2) How many multicast addresses can be supported for the IPv4 protocol in Ethernet. How many
multicast addresses can be supported for the IPv4 protocol. What is the size of address space lost
when we transform a multicast IPv4 address to an Ethernet multicast address?
Answer: Ethernet layer acts as an imperfect filter and the IP layer will have to decide whether to
accept the datagrams the data-link layer passed to it. The IP layer acts as a definitive perfect filter.
Both Ethernet and FDDI frames have a 48 bit destination address field. In order to avoid a kind of
multicast ARP to map multicast IP addresses to Ethernet/FDDI ones, the IANA reserved a range of
addresses for multicast: every Ethernet/FDDI frame with its destination in the range 01-00-5e-00-0000 to 01-00-5e-ff-ff-ff (hex) contains data for a multicast group. The prefix 01-00-5e identifies the
frame as multicast; the next bit is always 0and so only 23 bits are left to the multicast address. As IP
multicast groups are 28 bits long, the mapping cannot be one-to-one. Only the 23 least significant bits
of the IP multicast group are placed in the frame. The remaining 5 high-order bits are ignored,
resulting in 32 different multicast groups being mapped to the same Ethernet/FDDI address.
3) Name the advantages of optical fiber over twisted-pair and coaxial cable.
Answer:
For Optical fiber; They are light-weighted, They are immune to noise, Electromagnetic isolation and
Lower attenuation, They can tolerate data rates of the order of 100 mbps, Data transfer at very high
speed, Very less loss of data, Can transfer different data at the same time so it is not sequential but
parallel transfer, Requires less space as compared to Co-axial cable, Highly reliable, less cost on
Maintenance
4) How does sky propagation differ from line-of-sight propagation?
Answer:
Sky propagation is when higher frequency radio waves upward into the ionosphere where they are
then reflected back to earth. This allows for greater distance with lower output power. Line of sight
propagation is when very high frequency signal are transmitted in straight lines directly from antenna
to antenna. These antennas must be directional (), facing each other, and either tall enough or close
enough together to not be affected by the curvature of earth.

Assignment C
1) Put the following in the correct order, from high to low: session (a), presentation (b), physical (c),
data link (d), network (e), application (f), transport (g).
a) c, d, e, g, a, b, f

b) f, a, b, g, d, e, c
c) f, b, g, a, e, d, c
d) f, b, a, g, e, d, c
2) The _________ layer provides for hardware addressing.
a) Transport
b) Network
c) Data link
d) Physical
3) Which component of the data link layer for IEEE specifies network protocols?
a) LLC
b) MAC
c) 802.5
d) 802.3
4) The network layer solves all of the following problems except ___________.
a) Broadcast problems
b) Conversion between media types
c) Hierarchy through the use of physical addresses
d) Collision problems
5) Connection multiplexing is done through the use of a ________ number.
a) Socket
b) Hardware
c) Network
d) Session
6) Reliable connections go through a three-way handshake. Place the following in the correct order:
ACK (1), SYN, (2), SYN/ACK (3).
a) 2, 1, 3
b) 3, 2, 1
c) 2, 3, 1

d) 1, 2, 3
7) _________ describe(s) users working from home.
a) SOHO
b) Branch office
c) Regional office
d) Corporate office
8) _________ has a physical star topology but a logical ring topology
a) Ethernet
b) FDDI
c) Token Ring
d) FDDI and Token Ring
9) A _________ uses Gigabit Ethernet as a media type
A. WAN
B. LAN
C. MAN
D. LAN and MAN
10) The TCP/IP protocol stack has ________ layers.
a) 4
b) 5
c) 6
d) 7
11) A Class A address has _________ host bits.
a) 8
b) 16
c) 20
d) 24
12) 191.75.39.24 is a Class __________ address.
a) A
b) B
c) C
d) None of the above
13) Which of the following is a valid subnet mask value?
a) 255.0.255.255
b) 0.0.0.255
c) 255.255.254.0
d) 255.255.255.256
14) You are given a Class C network with 25 bits of networking. How many subnets do you have?
a) 1

b) 2
c) 3
d) 4
15) You are given a Class B network with a subnet mask of 255.255.255.192. How many host
addresses are there on each subnet?
a) 30
b) 62
c) 126
d) 254
16) You are given the following addressing information: 192.168.37.192/25. What type of address is
this?
a) Network
b) Directed broadcast
c) Host
17) When choosing a networking product, you should consider all of the following except _______.
a) Ease of installation and support
b) Product features and functions
c) Backplane capacity
d) Amount of memory
18) When connecting a router to a PC, use a __________ cable.
A. Crossover
B. Straight-through
C. Rollover
19) With _________ switching, the switch reads the destination MAC address of the frame and
immediately starts forwarding the frame.
A. Store-and-forward
B. Cut-through
C. Fragment-free
D. Runtless
20) Which type of traffic is sent to a group of devices?
A. Multicast
B. Unicast
C. Broadcast

D. Groupcast
21) What subnet mask would you use to set up a default route?
A. 0.0.0.0
B. 255.255.255.255
C. Depends on the type of network number
D. None of these answers
22) When choosing a dynamic routing protocol, which of the following should not be considered?
A. Metrics used
B. How routing information is shared
C. How routing information is processed
D. Number of PCs in the network
23) A routing protocol will use a(n) _________ to determine which path is the best path.
A. Administrative distance
B. Metric
C. Hop count
D. cost
24) Which type of routing protocol uses the Shortest Path First algorithm?
A. Distance vector
B. Link state
C. Hybrid
25) What command activates the IP routing process?
A. router
B. enable
C. network
D. no shutdown
26) RIP has a maximum hop count of ____________ hops.
A. 10
B. 15

C. 16
D. 100
27) Which of the following is false concerning OSPF?
A. It provides a loop-free topology.
B. It is a classful protocol and allows for a hierarchical design.
C. It requires more memory and processing cycles than distance vector protocols.
D. It is complex to configure and difficult to troubleshoot.
28) The OSPF process ID is __________.
A. Locally significant and is the router ID
B. Globally significant and must be configured on every router
C. Locally significant
D. OSPF doesnt use a process ID, but an AS number
29) An OSPFs router ID is based on __________.
A. The lowest IP address on its loopback interface, if configured, or the lowest IP address on its
active interfaces
B. The highest IP address on its loopback interface, if configured, or the highest IP address on its
active interfaces
C. The highest IP address on its active interfaces, if configured, or the highest IP address on its
loopback interfaces
D. The lowest IP address on its active interfaces, if configured, or the lowest IP address on its
loopback interfaces
30) You are given a Class C network, 192.168.1.0/24. You need one network with 120 hosts and three
networks with 60 hosts. What subnet mask values would you use?
A. 255.255.255.128 and 255.255.255.192
B. 255.255.255.128
C. 255.255.255.192
D. None of these
31) Which of the following is a private address?
A. 192.169.7.17
B. 172.32.28.39

C. 10.1.256.8
E. 172.16.255.89
32) Which of the following reasons might you need to use address translation?
A. You have to use public addressing because your ISP didnt assign you enough private addresses.
B. You are using private addresses but have changed ISPs, and your new ISP wont support these
private addresses.
C. You want to assign the same IP address to multiple machines so that users on the Internet see this
offered service as a single logical computer.
D. You are merging two companies that use different address spaces.

S-ar putea să vă placă și