CN Cia2
CN Cia2
1. Compare IP4 and IP6 and Expand the address 0:15::1:12:1213 to its
original.
Ans:-
● IPv4: 32-bit address space; ~4.3 billion addresses; simple header.
● IPv6: 128-bit address space; ~340 undecillion addresses; complex header;
mandatory security features.
● Expansion of 0:15::1:12:1213: 0:15:0:0:0:0:1:12:1213.
2. Compute the size of the window for host A if the value of rwnd is 3000
bytes and the value of cwnd is 3500 bytes?
Ans:-
● rwnd: 3000 bytes
● cwnd: 3500 bytes
● Window Size = min(3000, 3500) = 3000 bytes.
3. List out the drawbacks of User Datagram Protocols (UDP) and compare
with Transmission Control protocol (TCP)
Ans:-
UDP Drawbacks:
● No connection establishment.
● No reliability or error correction.
● No flow control.
Comparison:
Ans:-
Source Port: 16 bits
Destination Port: 16 bits
Sequence Number: 32 bits
Acknowledgment Number: 32 bits
Flags, Window Size, Checksum, Options, Data: Various lengths.
Ans:-
● Features: Cost-effective, flexible, multimedia support, portable.
● Types: Managed VoIP, Hosted VoIP, SIP Trunking.
6. The TCP server sends the SYN +ACK segments to the fake clients, which
are lost. Interpret the attack and methods to overcome.
Ans:-
● Attack: SYN Flooding with fake IP addresses.
● Mitigation: Use SYN Cookies, rate limiting, and firewalls.
Ans:-
Ans:-
● Ping: ICMP echo requests.
● Traceroute: Traces packet paths.
● Monitoring Tools: Check device availability.
Ans:-
● Retransmission Policy: Resending lost packets.
● Admission Policy: Deciding whether to accept new connections based on
load.
10. Draw the frame format of IEEE802.3
Ans:-
● Preamble: 7 bytes
● SFD: 1 byte
● Destination MAC: 6 bytes
● Source MAC: 6 bytes
● Length/Type: 2 bytes
● Data: 46-1500 bytes
● FCS: 4 bytes
Ans:-
NAT (Network Address Translation): Allows multiple devices to share one
public IP address, enhancing security and conserving addresses.
Ans:-
● CSMA/CD: Wired; detects collisions.
● CSMA/CA: Wireless; avoids collisions.
13. Define sub-netting in network layer and list its various classes.
Ans:-
● Sub-netting: Dividing a network into smaller subnets.
● Classes: A (0-127), B (128-191), C (192-223), D (224-239), E (240-255).
Ans:-
● Source Port: 16 bits
● Destination Port: 16 bits
● Length: 16 bits
● Checksum: 16 bits
15. Classify the three types of WWW documents.
Ans:-
16. Compare open loop congestion control and closed loop congestion
control.
Ans:-
● Open Loop: No feedback; simpler.
● Closed Loop: Uses feedback; adaptive.
Ans:-
● Packet Filtering: Blocks packets based on rules.
● Stateful Inspection: Monitors connection states.
● Proxy: Intermediary between users and services.
● Next-Gen: Combines traditional firewall features with advanced
capabilities.
Ans:-
● HDLC: Bit-oriented synchronous data link protocol.
● Features: Framing, error detection, control fields for communication
management.
PART-B
1.
i) Explain the function of Bluetooth (IEEE 802.15.1) with required datagram
and illustrations.
Alternatively asked as:
Assume you are working in a software company where you have been
allotted with Team ‘A’ and Team ‘A’ consist of 26 members including
Project manager and Team members. Among the 26 members your position
is 14. Let’s consider you have to form a team of three members and
complete the new task. You have the option to select the team members as
prime numbers from your position. You need to exchange the task between
the team members in radio telegraphy whose operating frequency is
between 2.40 GHz – 2.48 GHz with a guard band of 2 MHz which is limited to
a short range communication. Construct the mechanism for this radio
telegraphy with a required architecture.
2.
i) For the above network, using distance vector routing, generate the
following routing
tables:
3.
i) Examine that Simple Network Management Protocol (SNMP) is an
application-layer protocol for monitoring and managing network devices on
our campus local area network (LAN).
ii) Explain the following concepts with the required illustration and
examples
a)Firewall
b)DoDS attack
4.
i) Justify that Quality of service (QoS) is the use of mechanisms or
technologies that work on a network to control traffic and supports the
performance of critical applications with limited network capacity.
Ans:-
● Delay Management: Delay, or latency, measures the time it takes for data
to travel from source to destination. Real-time applications, such as voice
and video calls, are highly sensitive to delays. QoS minimizes latency by
prioritizing the flow of packets, ensuring real-time data reaches the
destination as quickly as possible.
● Jitter Control: Jitter refers to the variation in packet arrival times. High
jitter disrupts applications where consistent data flow is critical (e.g., audio
and video). QoS reduces jitter by ensuring packets are delivered at regular
intervals, maintaining steady performance for real-time applications.
FTP is a widely used protocol within the application layer for transferring files
between computers over a network. Here’s why it’s essential:
The World Wide Web (WWW) and HTTPS serve as the backbone of secure web
browsing and internet usage:
5.
i) Using Bellman-Ford algorithm identify the shortest paths from Source
node ‘A’ to the destination node ‘G’ with their respective routing tables.
ii) Intricate the use of mechanisms or technologies that work on a network
to control traffic and ensure the performance of critical applications with
limited network capacity.
Ans:-
5. Load Balancing
Conclusion
These mechanisms and technologies collectively ensure that critical applications
maintain optimal performance, even when network capacity is limited, through
effective traffic management, prioritization, and resource optimization.
6.
i) Illustrate the three-way process of synchronization, synchronization and
acknowledgement and acknowledgement in detail where the message
exchanged between client and server for connection establishment in TCP.
Ans:-
● Client to Server:
○ The client initiates the connection by sending a SYN (synchronize)
packet to the server.
○ This packet contains:
■ The client's initial sequence number (let's call it seq = X).
■ A flag indicating that this is a SYN packet.
● Purpose:
○ The SYN packet informs the server that the client wishes to establish
a connection and starts the synchronization process.
● Server to Client:
○ Upon receiving the SYN packet, the server acknowledges the
request by sending a SYN-ACK (synchronize-acknowledge) packet
back to the client.
○ This packet contains:
■ An acknowledgment number set to X + 1, indicating that it
received the SYN packet from the client.
■ The server's initial sequence number (let's call it seq = Y).
■ A flag indicating that this is a SYN-ACK packet.
● Purpose:
○ The SYN-ACK packet serves two purposes:
■ It acknowledges the client's SYN request.
■ It informs the client of the server's initial sequence number.
● Client to Server:
○ After receiving the SYN-ACK packet from the server, the client sends
an ACK (acknowledge) packet to the server.
○ This packet contains:
■ An acknowledgment number set to Y + 1, indicating that it
received the SYN-ACK from the server.
■ The same sequence number seq = X + 1 used for the initial
SYN.
● Purpose:
○ The ACK packet confirms the client's receipt of the server's
SYN-ACK, completing the handshake process.
Connection Established
Client Server
| |
| |
| |
| |
● Reliability: Ensures that both client and server are ready to communicate.
● Synchronization: Establishes initial sequence numbers for data integrity.
● Flow Control: Facilitates the setup of flow control and congestion control
mechanisms before data transmission begins.
ii) Justify and elaborate with its working why a DNS system is required
instead of directly using IP addresses.
Ans:-
The importance of a DNS system over directly using IP addresses, with each
point broken down further:
1. Human Readability
● Ease of Use: Domain names are easier for people to remember and use
compared to numeric IP addresses.
● User Experience: A memorable name like www.example.com improves
user experience and navigation.
2. Dynamic IP Addressing
● Automatic Updates: DNS allows domain names to point to changing IP
addresses without user knowledge.
● Minimized Downtime: Users can access the same domain even if the
underlying IP address changes.
3. Hierarchical Structure
● Organized Naming: The DNS structure allows for a logical and organized
naming system (e.g., subdomains).
● Easier Management: Simplifies administration of domains and their
respective resources.
4. Decentralization
5. Load Distribution
6. Security Features
● Email Routing: DNS can specify mail exchange (MX) records, directing
email traffic efficiently.
● Service Discovery: Enables applications to discover services on networks
(e.g., using SRV records).
8. Scalability
9. Caching Mechanism
Conclusion
The DNS system is vital for ensuring that the Internet remains user-friendly,
efficient, and robust. It bridges the gap between easy-to-remember domain
names and the technical requirements of the underlying IP address
infrastructure.