Tutorial 7_merged
Tutorial 7_merged
Tutorial 7
1. Explain the main reasons for the development of IPv6 and highlight the key
differences between IPv4 and IPv6.
2. Describe the structure of an IPv6 address, and explain the purpose of the network
prefix and interface identifier.
3. What is leading zero suppression in IPv6 addresses? Provide an example, and
demonstrate how to apply it to the following address:
2001:0db8:0000:0000:0000:ff00:0042:8329.
4. Explain zero compression in IPv6 addresses, when it can be applied, and provide an
example. Apply zero compression to the following address:
ff05:0000:0000:0000:0000:0000:0000:00b3.
1
Faculty of Computing
IE1030 – Data Communication Networks
Year 1 Semester 1 (2024)
Tutorial 8
1. Explain the difference between an intranet, extranet, and the Internet. Provide
examples of their use in real-world scenarios.
2. How does a router forward IP datagrams between two different subnets? Use the
addressing and MAC layer details discussed in the document.
3. What is the function of a routing table in both hosts and routers? What are the key
columns in a typical routing table?
4. Compare static routing and dynamic routing. What are the benefits and limitations of
each in network design?
5. Describe the key differences between Distance Vector and Link State routing
protocols. In what scenarios would each type of protocol be most beneficial?
6. What is the 'longest prefix match' method in routing? Provide an example of how it is
used by routers to select the correct route.
7. Explain the concept of an Autonomous System (AS) and its significance in
internetworking. How do Interior Gateway Protocols (IGP) differ from Exterior
Gateway Protocols (EGP)?
8. What challenges arise with static routing in large networks? Why is dynamic routing
more suitable for such environments?
9. Describe how a router processes an incoming datagram to determine its next hop
using the routing table and address matching.
10. In the context of routing, explain what is meant by 'bad news travels slowly' in
Distance Vector protocols. How do Link State protocols address this issue?