Similar documents
JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY Pagalavadi, Tiruchirappalli (An approved by AICTE and Affiliated to Anna University)

QUESTION BANK UNIT-I

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

7010INT Data Communications Lecture 7 The Network Layer

Internetwork Protocols

The History and the layers of the OSI Model 30 - October

QUESTION BANK EVEN SEMESTER

Course 6. Internetworking Routing 1/33

ES623 Networked Embedded Systems

1: Review Of Semester Provide an overview of encapsulation.

Running Head: NETWORKING 1

TCP/IP protocol suite

KINGS COLLEGE OF ENGINEERING

Chapter 11 in Stallings 10 th Edition

ET4254 Communications and Networking 1

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

CCNA 1: Chapter 2 Exam Answer v %

Network Reference Models

Networks: Access Management

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING TWO MARK QUESTION WITH ANSWER TWO MARK QUESTIONS. UNIT I PART- A (2 Marks question and answers)

Introduction to Internetworking

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data & Computer Communication

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Network Devices,Frame Relay and X.25

Chapter Two. The OSI Model

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

CS1302 / Computer Networks

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Chapter 3 Protocols and the TCP/IP Suite

DC Assignment III. Communication via circuit switching implies that there is a dedicated communication path between two stations.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

Other Protocols. Arash Habibi Lashkari

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Lecture 2. Computer Networks Models. Network Models 1-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Networking interview questions

OSI Network Layer. Chapter 5

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Chapter 2 Network Models 2.1

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Configuring your VLAN. Presented by Gregory Laffoon

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee

Lecture (04 & 05) Packet switching & Frame Relay techniques

Revision of Previous Lectures

Chapter Motivation For Internetworking

ELC 537 Communication Networks

Code No: RR Set No. 1

BROADBAND AND HIGH SPEED NETWORKS

CCNA 1 Chapter 6 v5.0 Exam Answers 2013

UNIT I PART A DATA COMMUNICATION

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Network Models. Presentation by Dr.S.Radha HOD / ECE SSN College of Engineering

CS3600 SYSTEMS AND NETWORKS

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

Chapter 11: Wide-Area Networks and the Internet

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

SEN366 (SEN374) (Introduction to) Computer Networks

Computer Networking Chapter 2. The OSI reference Model

Wide area networks: packet switching and congestion

Data Communication and Network. Introducing Networks

Chapter 2 Network Models

CS164 Final Exam Winter 2013

Chapter 6: Network Layer

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

AppleTalk. Chapter Goals. Introduction CHAPTER

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

OSI ISO, OSI Reference Model

Review of Important Networking Concepts


Review of Network Technologies

Defining Networks with the OSI Model. Module 2

IP Addressing and Subnetting

General comments on candidates' performance

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Data Link Layer Lecture 7

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

CS343: Data Communication LAN Overview

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

CCNA Exploration1 Chapter 7: OSI Data Link Layer

UNIT- 2 Physical Layer and Overview of PL Switching

Copyright 2011 Sakun Sharma

Question 7: What are Asynchronous links?

Chapter 2 Network Models 2.1

Introduction to LAN Protocols

ITEC 3800 Data Communication and Network. Introducing Networks

Transcription:

UNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These deals with electrical specifications, physical connection, transport timing and reliability. User support layers: The user support layers are: Session layer, Presentation layer, Application layer. These allow interoperability among unrelated software system. 2. With a neat diagram explain the relationship of IEEE Project to the OSI model? The IEEE has subdivided the data link layer into two sub layers: * Logical link control (LLC) * Medium access control (MAC) LLC is non-architecture specific. The MAC sub layer contains a number of distinct modules, each carries proprietary information specific to the LAN product being used. 3. What are the functions of LLC? The IEEE project 802 models takes the structure of an HDLC frame and divides it into 2 sets of functions. One set contains the end user portion of the HDLC frame the Other layers Network Data link Physical Other layers Network Logical Link Control Media Access Control Physical logical address, control information, and data. These functions are handled by the IEEE802.2 logical link control (LLC) protocol. 4. What are the functions of MAC? MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a packet.

5. What is protocol data unit? The data unit in the LLC level is called Protocol Data Unit (PDU). It contains four fields. Destination Service Point Address (DSAP) Source Service Access Point Control field Information field 6. What are headers and trailers and how do they get added and removed? The control data added to the beginning of a data is called headers. The control data added to the end of a data is called trailers. At the sending machine, when the message passes through the layers each layer adds the headers or trailers. At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. 7. What are the responsibilities of network layer? The network layer is responsible for the source-to-destination delivery of packet across multiple network links. The specific responsibilities of network layer include the following: Logical addressing. Routing. 8. What is a virtual circuit? A logical circuit made between the sending and receiving computers. The connection is made after both computers do handshaking. After the connection, all packets follow the same route and arrive in sequence. 9. What are data grams? In datagram approach, each packet is treated independently from all others. Even when one packet represents just a place of a multipacket transmission, the network treats it although it existed alone. Packets in this technology are referred to as datagram. 10. What are the two types of implementation formats in virtual circuits? Virtual circuit transmission is implemented in 2 formats.

Switched virtual circuit Permanent virtual circuit. 11. What is meant by switched virtual circuit? Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange. 12. What is meant by Permanent virtual circuit? Permanent virtual circuits are comparable to leased lines in circuit switching. In this method, the same virtual circuit is provided between two uses on a continuous basis. The circuit is dedicated to the specific uses. 13. Define Routers. DSAP SSAP Control Information Routers relay packets among multiple interconnected networks. They Route packets from one network to any of a number of potential destination networks on Internet routers operate in the physical, data link and network layer of OSI model. 14. What is meant by hop count? The pathway requiring the smallest number of relays, it is called hop-count routing, in which every link is considered to be of equal length and given the value one. 15. How can the routing be classified? The routing can be classified as, Adaptive routing Non-adaptive routing. 16. What is time-to-live or packet lifetime? As the time-to-live field is generated, each packet is marked with a lifetime, usually the number of hops that are allowed before a packet is considered lost and accordingly, destroyed. The time

to-live determines the lifetime of a packet. 17. What is meant by brouter? A brouter is a single protocol or multiprotocol router that sometimes act as a router and sometimes act as a bridge. 18. Write the keys for understanding the distance vector routing. The three keys for understanding the algorithm are Knowledge about the whole networks Routing only to neighbors Information sharing at regular intervals 19. Write the keys for understanding the link state routing. The three keys for understanding the algorithm are Knowledge about the neighborhood. Routing to all neighbors. Information sharing when there is a range. 20. How the packet cost referred in distance vector and link state routing? In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value based on a variety of factors such as security levels, traffic or the state of the link. 16 Marks 1. Explain distance vector routing in detail. 2. Explain packet switching in detail. 3. What are routers? Explain in detail. 4. What are the services provided by DNS server? Explain in detail. 5. Find the class of each IP address. Give suitable explanation. (8 x 2 = 16) i) 227.12.14.87 ii) 193.14.56.22 iii) 14.23.120.8 iv) 252.5.15.111 v) 134.11.78.56

vi) 172.18.58.1 vii) 00000000 11110000 11111111 00110011 viii) 10000000 11110000 11111111 00110011 6. State the major difference between Distance Vector Routing and Link State Routing. Discuss how these routing techniques work. 7. What is the sub network address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? 8. List and diagrammatically illustrate and discuss the four general categories of attack. 9. With relevant example discuss about Substitution Ciphers. 10. Briefly discuss how DES algorithm works.