Sunteți pe pagina 1din 17

ASSIGNMENT

SUBMITTED FROM: Yousra Nur Obaid

ID:19204025

SUBMITTED TO: MD. HASANUZAMAN

QUESTION & ANSWER:


1.What is MAC Address? How to check MAC by cmd mode?
Ans:

A media access control address (MAC address) is a unique identifier for an Ethernet or network
adapter over a

network. It distinguishes different network interfaces and is used for a number of network
technologies, particularly most IEEE 802 networks, including Ethernet. In the OSI model, MAC
addresses occur in the Media Access Control

Protocol sub-layer. MAC Address is 48bits and Hexadecimal Number.

A MAC address is also known as physical address, hardware address and burned-in address.And
We can find mac address (physical address) of a computer using the command ‘getmac‘.

Windows ® - cmd - getmac

This can be used to get mac address for remote computers also. Below are few examples on how
to use this

command. It works on XP, Vista, Windows 7, Server 2003 and Server 2008 operating systems.

2.Write down the color code formula of twisted pair cable?


Ans:
The color code formula of twisted pair cable are given below:

STRAIGHT THROUGH
*White Orange
*Orange
*white green
*blue
*white blue

*green
*white brown
*brown

Cross Over

*White Green
*Green

*White Blue

*Orange
*White Orange
*Blue
*White Brown
* Brown

Rolled Over

*White Brown
*Brown
*White Blue
*Green
*White Green
*Blue
*White Orange
*Orange

3.Briefly define the categories & activities of twisted pair cable?


Ans:

Twisted Pair Cable :

It consists of 2 separately insulated conductor wires wound about each other.


Generally, several

such pairs are bundled together in a protective sheath. They are the most widely
used Transmission Media.
Twisted Pair is of two types:

(i) Unshielded Twisted Pair (UTP) : This type of cable has the ability to block
interference and

does not depend on a physical shield for this purpose. It is used for telephonic
applications.

(ii)Shielded Twisted Pair (STP):This type of cable consists of a special jacket to


block external interference. It is used infast-data-rate Ethernet and in voice and data

channels of telephone lines.

ADVANTAGES:

•Least expensive.

 Easy to install.

 High speed capacity.

•Better performance at a higher data rate in comparison to UTP.

 Eliminates crosstalk.

 Comparatively faster.

Disadvantages:

•Susceptibl to external interference


 Lower capacity and performance in comparison to STP

• Short distance transmission due to attenuation.

• Comparatively difficult to install and manufacture.

• More expensive.

• Bulky.

4.Explain with suitable example about the seven types of physical


topology?

Ans:

The seven types physical topology are given below:

• Point-to-point topology

•Bus(point-to-multipoint topology

• Star topology

• Ring topology

• Tree topology

• Mesh topology
• Hybrid topology
Point to Point:

Point-to-point topology is the easiest of all the network topologies. In this


method, the network consists of a direct link between two computers.
exmple: a microphone to a single public address speaker is another.

Bus Topology :

Bus topology uses a single cable which connects all the included nodes. The main
cable acts as a spine for the entire network. One of the computers in the network

acts as the computer server. When it has two endpoints, it is known as a linear bus
topology.
example:
a multistory office building.The network could consist of a bus running vertically

through the building to provide network access to each floor.


Ring Topology:

In a ring network, every device has exactly two neighboring devices for

communication purpose. It is called a ring

topology as its formation is like a ring. In this topology, every computer is


connected to another computer. Here, the

last node is combined with a first one.

This topology uses token to pass the information from one computer to another.

In this topology, all the messages

travel through a ring in the same direction.


example:
Suppose computer A wants to send data to computer D then data is first placed in
the packet and the packet is transferred to computer B then computer C and

finally, to the computer, D. Data is travelling in the form packets in the ring
topology.

Star Topology:

In the star topology, all the computers connect with the help of a hub. This cable

is called a central node, and all other nodes are connected using this central node.
It is most popular on LAN

networks as they are inexpensive and easy to install.


example:
Star network topologies are common in home networks, where the central

connection point may be a router, switch, or network hub.

Mesh Topology:
The mesh topology has a unique network design in which each computer on the
network connects to every other. It is develops a P2P (point-to-point) connection

between all the devices of the network. It offers a high level of redundancy, so
even if one network cable fails, still data has an alternative path to reach its

destination.
example:
tennis nets and football goals.

Tree Topology:

Tree topologies have a root node, and all other nodes are connected which form
a hierarchy. So it is also known as

Hierarchical topology.This topology integrates various star topologies together in

a single bus, so it is known as a Star Bus topology. Tree topology is a very common
network which is similar to a bus and star topology.
example:
Different floors can be connected to each other through combining star topology

network and central bus backbone.

Hybrid Topology:

Hybrid topology combines two or more topologies. The resulting network does
not exhibit one of the standard topologies.
example:
an office in one department, Star and P2P topology is used. A hybrid topology is
always produced when two different basic network topologies are connected.

5.Briefly define 4types of 10mbps Ethernet with example?


Ans:

According to use of different media 10 mbps Ethernet is also divided in to 4 categories.

*10 Base 5 Ethernet Thicknet Coaxial:


1. Cable Name – 10 Base 5

2. Cable Type – Thick Coaxial

3. Transmission on rate – 10 mbps

4. Max. No. of Computer – 100 per Segment

5. Max. length before Repeater – 500 meters

6. Connector –BNC(Bayonet Neill Concelman)

*10 Base 2 Ethernet Thinnet Coaxial:


1. Cable Name – 10 Base 2

2. Cable Type – Thin Coaxial

3. Transmission On Rate – 10 mbps

4. Max length before Repeater 185 meter

5. Max. No. of Computer – 30 per Segment

6. Connector – BNC (Bayonet Neill Concelman)

7. Topology - Bus

*10 Base T Ethernet (twisted pair cable)/utp:


1. Cable Name – 10 Base T

2. Cable Type – UTP

3. Transmission On Rate – (10 – 100)mbps

4. Max. length before Repeater – 100 meters

5. Max. No. of Computer – 1024 per Segment

6. Connector – BNC (Registered Jack)

7. Topology - Star

*10 Base FL Ethernet Fiber Optic:


1. Cable Name – 10 Base FL

2. Cable Type – Fiber Optic Cable

3. Transmission On Rate – (100 – 1000)mbps

4. Max. length before Repeater – 200 meters

5. Max. No. of Computer – 1024 per Segment

6. Connector – BNC (Registered Jack)

7. Topology - Star

6. Short notes:
Well-known port Number.
Ans:
the well known port number are the port number which are reserved for
assignment by ICANN for use by the applications end points that communicate
using the UDP or TCP.
well known port number range is 0-1023.
example:
-FTP.
-TFTP.
-DHCP.
-DNS.
-HTTP.

7. Write down the elaboration of ICMP, ARP, RARP and IGMP. Shortly describe
about themselves.

Ans:
1. ICMP: Internet Control Message Protocol

ICMP is an error- reporting protocol network devices like routers use to generate
error messages to the source IP address when network problems prevent delivery of IP
packets

2. ARP: Address Resolution Protocol

ARP is a network protocol used to find out the hardware (MAC) address of a device from
an IP Address. The sending device uses ARP to translate IP addresses to MAC addresses.

3. RARP: Reverse Address Resolution Protocol

RARP is a networking protocol used by a client machine in a local area network to


request its Internet Protocol address (IPv4) from the gateway-router's ARP table.
4. IGMP: Internet Group Management Protocol
Internet Group Management Protocol is a group management protocol that mainly
manages the group membership in a multicast network.

8. Briefly define distance vector, link state, and path vector protocol.
Ans:
Distance-vector routing protocol:
A distance-vector routing protocol in data networks determines the best route for data packets
based on distance. Distance-vector routing protocols measure the distance by the number of
routers a packet has to pass, one router counts as one hop
Examples: RIP-Routing Information Protocol
IGRP-Interior Gateway Routing Protocol
EIGRP-Enhanced Interior Gateway Routing Protocol

Link-State Routing Protocols:


Link-state routing protocols can transmit routing information to all other routers running the
same protocol, not just directly connected neighbors. This way, all routers are receiving first-
hand information. This makes the routes more reliable.

Example: OSPF- Open Shortest Path First


IS-IS-Intermediate System to Intermediate System

Path Vector Routing Protocol:


Path Vector Routing is a routing algorithm in unicast routing protocol of network layer, and it is
useful for interdomain routing. The principle of path vector routing is similar to that of distance
vector routing.
Path Vector routing protocol which maintains the path information that gets updated
dynamically. Each entry in the routing table contains the destination network.

Example: BGP- Border Gateway Protocol

9. Distinguish among distance vector, link state, and path vector protocol.
Ans:

10. Short notes: Autonomous System, Administrative Distance (AD


Value), Routing Protocol Metric.
Ans:
Autonomous system:
An autonomous system is referred to as a routing domain. An autonomous
system communicates routing information to each other using an Interior Gateway
Protocol (IGP)
Administrative Distance (AD Value):
Administrative Distance (AD) is a value that routers use in order to select the best path
when there are two or more different routes to the same destination from two
different routing protocols. AD is numeric value which can range from 0 to 255.
Routing Protocol Metric:
Router metrics are metrics used by a router to make routing decisions. A metric is
typically one of many fields in a routing table. Router metrics help the router choose the
best route among multiple feasible routes to a destination.

11. What is Routed protocol and Routing Protocol. Describe about


the features of Router.
Ans:
Routed Protocol
Routed protocols are those protocols which support such data traffic.
Examples:
IPv4, IPv6 and AppleTalk

Routing Protocol:
Routing protocols are mechanisms by which routing information is exchanged between
routers so that routing decisions can be made. In the Internet, there are three types of
routing protocols commonly used. They are: distance vector, link state, and path vector.
Example:
RIP, EIGRP, OSPF, BGP

Features of a Router:

1. Best Path Selection

2. Packet Forwarding /Switching

3. Packet Filtering

4. Connect to more network

5. Find out the shortest path of network

12. Describe the Router components and Router activities

Ans:

Router Components:

Power Supply
Processor

Operating Systems (Firmware/Embedded System)

RAM

NVRAM

ROM

Flash Memory (EEPROM)

Router Interfaces

Router activities:

o Routers are used to connect hardware equipment with remote location


networks like BSC, MGW, IN, SGSN, and other servers.
o It provides support for a fast rate of data transmission because it uses
high STM links for connectivity; that's why it is used in both wired or
wireless communication.
o Internet service providers widely use routers to send the data from
source to destination in the form of e-mail, a web page, image, voice,
or a video file. Furthermore, it can send data all over the world with
the help of an IP address of the destination.
o Routers offer access restrictions. It can be configured in a way that
allows for few users to access the overall data and allows others to
access the few data only, which is defined for them.
o Routers are also used by software testers for WAN communications.
For example, the software manager of an organization is located in
Agra, and its executive is located at a different place like Pune or
Bangalore. Then the router provides the executive the method to
share his software tools and other applications with the manager with
the help of routers by connecting their PCs to the router using WAN
architecture.
o In wireless networks, by configuring VPN in routers, it can be used in
the client-server model, which allows sharing the internet, video, data,
voice, and hardware resources

S-ar putea să vă placă și