CS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A

Similar documents
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Computer Networks (Unit wise Questions)

CS1302 / Computer Networks

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Reminder: Datalink Functions Computer Networking. Datalink Architectures

COMPONENTS OF DATA COMMUNICATION

SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COMPUTER NETWORKS UNIT - II DATA LINK LAYER

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

QUESTION BANK EVEN SEMESTER

BVRIT HYDERABAD College of Engineering for Women Department of Information Technology. Hand Out

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Links. CS125 - mylinks 1 1/22/14

LAN PROTOCOLS. Beulah A AP/CSE

The Link Layer and LANs. Chapter 6: Link layer and LANs

Medium Access Protocols

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

University of Southern California EE450: Introduction to Computer Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 11: Networks & Networking

Study Guide. Module Two

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Summary of MAC protocols

EE 122: Ethernet and

Ethernet. Introduction. CSE 3213 Fall 2011

Internetworking Part 1

Chapter 2: Getting Connected

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Computer Networks (Introduction to TCP/IP Protocols)

Chapter 6: Network Communications and Protocols

UNIVERSITY QUESTIONS

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CCNA Exploration1 Chapter 7: OSI Data Link Layer

IT4405 Computer Networks (Compulsory)

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Direct Link Networks (II)

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

Question 7: What are Asynchronous links?

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Local Area Network Overview

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Chapter 6 The Link Layer and LANs

CIS 777 Telecommunications Networks

ET4254 Communications and Networking 1

Chapter 16 Networking

CS 455/555 Intro to Networks and Communications. Link Layer

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

Link Layer and Ethernet

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

Chapter 5 Link Layer and LANs

PSD2A Computer Networks. Unit : I-V

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

1: Review Of Semester Provide an overview of encapsulation.

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

EEC-484/584 Computer Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 5 Link Layer and LANs

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Department of Information Technology. CS6551 Computer Networks. Anna University - Two Mark Questions

CS 4453 Computer Networks Winter

Layer 2 functionality bridging and switching

ECEN 5032 Data Networks Medium Access Control Sublayer

Link Layer and Ethernet

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

QUESTION BANK(PART A AND PART B) TWO MARKS UNIT-I

Data Link Layer, Part 3 Medium Access Control. Preface

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

UNIT II MEDIA ACCESS & INTERNETWORKING

Computer and Network Security

CSC 4900 Computer Networks: The Link Layer

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

Principles behind data link layer services

CS 428/528 Computer Networks Lecture 01. Yan Wang

CSCI 466 Midterm Networks Fall 2011

Review of Topology and Access Techniques / Switching Concepts

CSE 461: Multiple Access Networks. This Lecture

Transcription:

CS6551 COMPUTER NETWORKS QUESTION BANK UNIT 1 PART A 1. What are the different types of connections (direct links) available? 2. What metrics are used to assess the performance of a network? 3. What is topology? 4. For n devices in a network, what is the number of cable links required for a mesh and ring topology? 5. Assume 6 devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device? 6. Mention the different physical media? 7. What is the need for layering? 8. What is a protocol? 9. How does NRZ-L differ from NRZ-I? 10. What are the main features of Internet Architecture? 11. What are the responsibilities of data link layer? 12. What is framing? 13. What are the ways to address the framing problem? 14. If data is 0110111111111100 what is the transmitted data and if received data is 01111110000111011111011111011001111110 what is the actual data in HDLC framing? 15. What are the issues in data link layer? 16. Define Bandwidth and Latency. 17. Define Error detection and correction. 18. What is redundancy? 19. List out the available detection methods. 20. Write short notes on CRC. 21. Define flow control? 22. Define ARQ. 23. Mention the categories of flow control? 24. Define HDLC. 25. What is piggy backing? 26. Define socket. How it is created? PART B 1. Explain network architecture in detail 2. Explain different error detection and correction mechanisms with examples 3. Explain different flow control mechanisms used in brief. 4. What is framing? Explain different types of framing protocols with their format. 5. Explain how network software is implemented in networks.

UNIT 1 PART A ANSWERS 1. What are the different types of connections (direct links) available? Two types are 1. Point to point 2. Multipoint 2. What metrics are used to assess the performance of a network? Network performance is measured in two fundamental ways: 1. bandwidth (also called throughput) 2. latency (also called delay). 3. What is topology? Topology refers to the way in which network is laid out physically. Two or more links form a topology. The topology of a network is the geometric representation of the relationship of all the links and the linking devices tone another. The basic topologies are: Mesh Star Bus hybrid Ring 4. For n devices in a network, what is the number of cable links required for a mesh and ring topology? Mesh topology n (n-1)/2 Ring topology n 5. Assume 6 devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device? Number of cables=n (n-1)/2=6(6-1)/2=15 Number of ports per device=n-1=6-1=5 6. Mention the different physical media? 1. Guided ( Bounded ) a. Twisted pair cable i. Shielded ii. Unshielded b. Coaxial cable i. Baseband ii. Broadband c. Fibre optic cable 2. Unguided (Unbounded) a. Radio transmission b. Microwave transmission CS6551 CN Unit 1 K. VIJAY AP (SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 1

7. What is the need for layering? Layering provides two nice features. It decomposes the problem of building a network into more manageable components. It provides a more modular design. 8. What is a protocol? o A protocol is a set of rules that govern data communication. o Protocol defines the interfaces between the layers in the same system and with the layers of peer system o These are the Building blocks of a network architecture o Two interfaces provided by protocols Service interface Peer interface 9. How does NRZ-L differ from NRZ-I? In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0 and negative for 1. in the NRZ-I sequence, the voltages are meaningless. Instead, the receiver looks for changes from one level to another as its basis for recognition of 1s. 10. What are the main features of Internet Architecture? 1. Does not imply strict layering. The application is free to bypass the defined transport layers and to directly use IP or other underlying networks 2. An hour-glass shape wide at the top, narrow in the middle and wide at the bottom. IP serves as the focal point for the architecture 3. In order for a new protocol to be officially included in the architecture, there needs to be both a protocol specification and at least one (and preferably two) representative implementations of the specification 11. What are the responsibilities of data link layer? Specific responsibilities of data link layer include the following. a) Framing b) Physical addressing c) Flow control d) Error control e) Access control. 12. What is framing? It divides the stream of bits received from the upper layer (network layer) into manageable data units called frames. It adds a header to the frame to define the physical address (source address & destination address). Two types of framing are 1. Fixed-Size Framing 2. Variable Size framing CS6551 CN Unit 1 K. VIJAY AP (SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 2

13. What are the ways to address the framing problem? 1. Byte-Oriented Protocols BYSYNC, PPP, DDCMP 2. Bit-Oriented Protocols - HDLC 3. Clock-Based Framing - SONET 14. If data is 0110111111111100 what is the transmitted data and if received data is 01111110000111011111011111011001111110 what is the actual data in HDLC framing? transmitted data 0111111001101111101111100001111110 actual data is *000111011111-11111-110* 15. What are the issues in data link layer? The data link layer has a number of specific functions it can carry out. These functions include a) Providing a well-defined service interface to the network layer. b) Dealing with transmission errors. c) Regulating the flow of data so that slow receivers are not swamped by fast senders. 16. Define Bandwidth and Latency. Bandwidth o Width of the frequency band o Number of bits per second that can be transmitted over a communication link latency refers to a delay in packet delivery Latency = Propagation + transmit + queue 17. Define Error detection and correction. Error Detection: Data can be corrupted during transmission. It is called as an error. For reliable communication, the receiver must find out the errors occurred in the data which is called as error detection. Its achieved by redundancy. Methods used are, Parity check, Cyclic redundancy Check, Checksum Error Correction: It is the mechanism to correct the errors and it can be handled in 2 ways. a) When an error is discovered, the receiver can have the sender retransmit the entire data unit. b) A receiver can use an error correcting coder, which automatically corrects certain error (hamming codes) 18. What is redundancy? It is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the destination of each unit. CS6551 CN Unit 1 K. VIJAY AP (SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 3

19. List out the available detection methods. There are 3 types of redundancy checks are used in data communication. 1. Parity check o Simple parity check ( Vertical Redundancy Check) o Two dimensional Parity Check (Longitudinal Redundancy Check) 2. Cyclic redundancy check 3. Checksum. 20. Write short notes on CRC. CRC is based on binary division. In CRC, instead of adding bits to achieve the desired parity, a sequence of redundant bits, called the CRC or the CRC remainder, is appended to the end of the data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number. At its destination, the incoming data unit is assumed to be intact and is therefore accepted. A remainder indicates that the data unit has been damaged in transit and therefore must be rejected. 21. Define flow control? Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before waiting for acknowledgment. This is accomplished using a combination of two fundamental mechanisms called acknowledgement and timeout. achieved through two different mechanisms 1. Stop and Wait 2. Sliding window 22. Define ARQ. The general strategy of using acknowledgements and timeouts to implement reliable delivery is sometimes called Automatic Repeat request (ARQ). 23. Mention the categories of flow control? There are 2 methods have been developed to control flow of data across communication links. a) Stop and wait - send one from at a time. b) Sliding window - send several frames at a time. 24. Define HDLC. High-Level Data Link Control is a bit-oriented data link protocol designed to support both half-duplex and full duplex communication over point to point and midpoint links.a bit oriented protocol is not concerned with byte boundaries it simply views the frame as a collection of bits. CS6551 CN Unit 1 K. VIJAY AP (SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 4

25. What is piggy backing? Piggy backing means combining data to sent and acknowledgement of the frame received in one single frame. Piggy backing can save bandwidth because the overhead from a data frame and an ACK frame can be combined into just one frame 26. Define socket. How it is created? Socket is the end point in communication. #include <sys/socket.h> int socket (int family, int type, int protocol); Returns: non-negative descriptor if OK, -1 on error Where, family - specifies the protocol family ( AF_INET / AF_INET6 / AF_LOCAL) type - specifies the type of the socket ( SOCK_STREAM, SOCK_DGRAM, SOCK_RAW) protocol - specifies the protocol to be used for the socket. (IPPROTO_protocol name) -protocol field is set to zero for TCP and UDP protocols. CS6551 CN Unit 1 K. VIJAY AP (SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 5

UNIT 2 Question Bank PART A 1. What are the functions of MAC? 2. What is CSMA?. List the protocols used with CSMA 3. Define the term carrier sense in CSMA/CD? 4. What is the access method used by wireless LAN? 5. Define Ethernet 6. What is fast Ethernet and gigabit Ethernet? 7. What is the use of transceiver? 8. What is a hidden node and exposed node? 9. What is a Bluetooth? 10. What are the four prominent wireless technologies? 11. What are the four steps involves in scanning? 12. What is exponential back off? 13. What is the use of switches? 14. Differentiate circuit switching and packet switching 15. Compare datagram approach and virtual circuit approach. 16. What is a role of VCI? 17. What is a bridge? What are the functions of bridges? 18. What is a loop problem in bridges? 19. How does a given bridge learn whether it should forward a multicast frame over a given port? 20. What are the limitations of bridges? 21. In what way bridges differs from switches? 22. What are the advantages of datagram delivery model? 23. Define IP. 24. Find the class of the following addresses 227.13.14.88 227.13.14.88 25. Define subnetting 26. What is the network address in a class A subnet with the IP address of one of the hosts as 25.34.12.56 and mask 255.255.0.0? 27. Define CIDR 28. What is ARP? 29. What is DHCP? 30. What is ICMP? CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 1

PART B 1. Discus about physical properties of Ethernet 802.3 with necessary diagram of Ethernet transceiver, adopter and algorithm. 2. a) What is internetworking?. Explain its service model, global address and packet format. b) Explain the operations and packet format of ARP in detail 3. Explain the following a. ICMP b. DHCP 4. Explain the functioning of wireless LAN in detail 5. Explain bridges and switches in brief. 6. Explain CSMA and protocols with Collision detection and Avoidance 7. A company is granted the site address 181.56.0.0 (class B). The company needs 1000 subnets. Design the subnets. CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 2

UNIT 2 Question Bank PART A 1. What are the functions of MAC? 2. What is CSMA?. List the protocols used with CSMA 3. Define the term carrier sense in CSMA/CD? 4. What is the access method used by wireless LAN? 5. Define Ethernet 6. What is fast Ethernet and gigabit Ethernet? 7. What is the use of transceiver? 8. What is a hidden node and exposed node? 9. What is a Bluetooth? 10. What are the four prominent wireless technologies? 11. What are the four steps involves in scanning? 12. What is exponential back off? 13. What is the use of switches? 14. Differentiate circuit switching and packet switching 15. Compare datagram approach and virtual circuit approach. 16. What is a role of VCI? 17. What is a bridge? What are the functions of bridges? 18. What is a loop problem in bridges? 19. How does a given bridge learn whether it should forward a multicast frame over a given port? 20. What are the limitations of bridges? 21. In what way bridges differs from switches? 22. What are the advantages of datagram delivery model? 23. Define IP. 24. Find the class of the following addresses 227.13.14.88 227.13.14.88 25. Define subnetting 26. What is the network address in a class A subnet with the IP address of one of the hosts as 25.34.12.56 and mask 255.255.0.0? 27. Define CIDR 28. What is ARP? 29. What is DHCP? 30. What is ICMP? CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 1

PART B 1. Discus about physical properties of Ethernet 802.3 with necessary diagram of Ethernet transceiver, adopter and algorithm. 2. a) What is internetworking?. Explain its service model, global address and packet format. b) Explain the operations and packet format of ARP in detail 3. Explain the following a. ICMP b. DHCP 4. Explain the functioning of wireless LAN in detail 5. Explain bridges and switches in brief. 6. Explain CSMA and protocols with Collision detection and Avoidance 7. A company is granted the site address 181.56.0.0 (class B). The company needs 1000 subnets. Design the subnets. CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 2

UNIT 2 PART A 1. What are the functions of MAC? MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a packet. 2. What is CSMA?. List the protocols used with CSMA CSMA (Carrier Sense Multiple Access) CSMA is based on the principle Sense Before Transmit or Listen Before Talk. Each station must listen before transmitting. Types of CSMA Protocols 1. Non-Persistent CSMA 2. 1-Persistent CSMA 3. p-persistent CSMA 3. Define the term carrier sense in CSMA/CD? All the nodes can distinguish between idle and a busy-link and collision detect means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered (collided) with a frame transmitted by another node. CSMA/CD is Widely used for bus topology LANs (IEEE 802.3, Ethernet). 4. What is the access method used by wireless LAN? CSMA-CA ( Carrier Sense Multiple Access with Collision Avoidance) is the access method used by wireless LAN. It is Used in a network where collision cannot be detected 5. Define Ethernet Ethernet is a multiple-access network, meaning that a set of nodes send and receive frames over a shared link. Uses CSMA/CD technology Uses Aloha (packet radio network) as the root protocol Ethernet can operate at - 100 Mbps (Fast Ethernet) - 1000 Mbps (Gigabit Ethernet) Ethernet also used in full duplex, point-to-point configuration 6. What is fast Ethernet and gigabit Ethernet? 100 Mbps Ethernet is called as Fast Ethernet 1000 Mbps Ethernet is called as Gigabit Ethernet CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 3

7. What is the use of transceiver? A transceiver used in Ethernet (a small device directly attached to the tap) detects when the line is idle and drives signal when the host is transmitting. The transceiver also receives incoming signal. The transceiver is connected to an Ethernet adaptor which is plugged into the host. The protocol is implemented on the adaptor. 8. What is a hidden node and exposed node? In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is visible from a wireless access point (AP), but not from other nodes communicating with that AP. This leads to difficulties in media access control. In wireless networks, the exposed node problem occurs when a node is prevented from sending packets to other nodes due to a neighboring transmitter. 9. What is a Bluetooth? Bluetooth fills the niche of very short-range communication between mobile phones, PDAs, notebook computers, and other personal or peripheral devices. For example, Bluetooth can be used to connect mobile phones to a headset, or a notebook computer to a printer. CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 4

10. What are the four prominent wireless technologies? Bluetooth Wi-Fi(formally known as 802.11) WiMAX(802.16) Third generation or 3G cellular wireless. 11. What are the four steps involves in scanning? 1. The node sends a Probe frame. 2. All APs within reach reply with a Probe Response frame. 3. The node selects one of the access points, and sends that AP an Association Request frame. 4. The AP replies with an Association Response frame. 12. What is exponential back off? Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of time it waits before trying again. This strategy of doubling the delay interval between each transmission attempt is a general technique known as exponential back off. 13. What is the use of switches? Such switches are sometimes known by the obvious name of LAN switches A mechanism that allows us to interconnect links to form a large network is called switches. Switches are devices capable of creating temporary connections between two or more devices linked to the switch. A multi-input, multi-output device which transfers packets from an input to one or more outputs 14. Differentiate circuit switching and packet switching Circuit switching The connection between two station is a dedicated path using physical links Physical layer is responsible Messages are not packetized and there is a continuous flow of messages Used in telephone companies Packet switching Virtual connection is established between two station Network layer is responsible Messages are divided into packets of fixed or variable size Used in switched WANs such as frame relay and ATM networks CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 5

15. Compare datagram approach and virtual circuit approach. Datagram approach Virtual circuit switching Connectionless approach Connection-oriented approach Every packet contain enough information ie destination address that enable any switch to decide where the packet has to go. To decide how to forward a packet, a switch consults a forwarding table (sometimes called a routing table) A host can send a packet anywhere at any time, Each packet is forwarded independently of previous packets that might have been sent to the same destination. Any network component failure might not have any serious effect on communication if it is possible to find an alternate route around the failure and update the forwarding table accordingly Host to host address is always needed in sending the datagram (Embedded in the datagram itself) Error checking is required by host to resemble the packet and find out the missing packets. messages may be out of order in the communication sub-network Uses the concept of virtual circuit (VC). It establishes a VC before transfer begins. Refers the VCI to forward the packet First set up a virtual connection from the source host to the destination host and then send the data Packets are dependent as it travels through the same path Network components failures cause serious effect on communication. Host to host address is needed in link setup only Errors is handled by subnetwork. Host will receive the packets in correct sequence. Messages passed in order to the network. 16. What is a role of VCI? A virtual circuit identifier (VCI) that uniquely identifies the connection at this switch and that will be carried inside the header of the packets that belong to this connection An incoming interface on which packets for this VC arrive at the switch An outgoing interface in which packets for this VC leave the switch CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 6

17. What is a bridge? What are the functions of bridges? It is a collection of LANs connected by one or more bridges is usually said to form an extended LAN. In their simplest variants, bridges simply accept LAN frames on their inputs and forward them out on all other outputs. Functions of bridges (three criteria) 1. Frame filtering or forwarding 2. Learning 3. Avoidance of loops in system 18. What is a loop problem in bridges? Loop Problem Transparent bridges work fine as long as there are no redundant bridges in the system. Systems administrators, however, like to have redundant bridges (more than one bridge between a pair of LANs) to make the system more reliable. If a bridge fails, another bridge takes over until the failed one is repaired or replaced. Redundancy can create loops in the system, which is very undesirable 19. How does a given bridge learn whether it should forward a multicast frame over a given port? It learns exactly the same way that a bridge learns whether it should forward a unicast frame over a particular port- by observing the source addresses that it receives over that port. 20. What are the limitations of bridges? scale heterogeneity 21. In what way bridges differs from switches? Bridge Switch Bridges are generally used to connect switch is a network device that two LANs( Local Area Networks) selects a path or circuit for sending a unit of data to its next destination. Bridges usually have 2 to 16 ports Switches are multi port network devices bridges perform forwarding it in Switches perform forwarding in software we need to have router over the Bridge to route the packets to desired destination hardware A switch may also include the function of the router, a device or program that can determine the route and specifically what adjacent network point the data should be sent to. CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 7

Bridge is rarely used Bridge is a device that connects two LANs and controls data flow between them. Switches are frequently used Switch is a networking device that learns which machine is connected to its port by using the device's IP address. 22. What are the advantages of datagram delivery model? Best-effort, connectionless service simplest service model asking for a reliable packet delivery service may need to include a lot of extra functionality into the router. It enables IP to run over anything ie today IP can run over many network technologies Higher level protocols such as TCP that run over IP is aware of all failure modes. 23. Define IP. IP stands for Internet Protocol Key tool used today to build scalable, heterogeneous internetworks It runs on all the nodes in a collection of networks and defines the infrastructure that allows these nodes and networks to function as a single logical internetwork Has two versions IPv4 and IPv6 24. Find the class of the following addresses 227.13.14.88.1.1.1 class B 227.13.14.88.1.1.1 class D 25. Define subnetting Subnetting provides an elegantly simple way to reduce the total number of network numbers that are assigned. The idea is to take a single IP network number and allocate the IP addresses with that network number to several physical networks, which are now referred to as subnets. 26. What is the network address in a class A subnet with the IP address of one of the hosts as 25.34.12.56 and mask 255.255.0.0? AND operation with IP address and subnet masks gives 25.34.0.0 CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 8

27. Define CIDR Classless Inter-Domain Routing (CIDR) Do not use classes to determine network ID Assign any range of addresses to network Use common part of address as network number E.g., addresses 192.4.16-192.4.31 have the first 20 bits in common. Thus, we use these 20 bits as the network number netmask is /20, /xx is valid for almost any xx Enables more efficient usage of address space (and router tables) 28. What is ARP? The Address Resolution Protocol (ARP) is used to associ ate a logical address with a physical address. ARP is used to find the physical address of the node when its Internet address is known. ARP operation 1. ARP request 2. ARP reply 29. What is DHCP? Dynamic Host Configuration Protocol DHCP server is responsible for providing configuration information to hosts.there is at least one DHCP server for an administrative domain DHCP server maintains a pool of available addresses DHCP is a protocol that dynamically assigns IP addresses to host. DHCP relies on the existence of a DHCP server which is responsible for providing configuration information to host. The use of DHCP avoids the network administrator from assigning addresses to individual host. 30. What is ICMP? ICMP Internet Control Message Protocol ICMP is used for error and control information Defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully ICMP always reports error messages to the original source. ICMP messages are divided into two broad categories: 1. error-reporting messages 2. query messages. CS6551 CN Unit 2 QB K.VIJAY AP(SS) / CSE RAJALAKSHMI ENGINEERING COLLEGE PAGE 9