IAT1
IAT1
CS23402-COMPUTER NETWORKS
IAT2 Answers
1.Identify the network address in a class A subnet with the IP addresses of one of the hosts
as 25.34.12.56 and mask 255.255.0.0?
Given:
IP address: 25.34.12.56
Subnet mask: 255.255.0.0
IP address (binary):
25 = 00011001
34 = 00100010
12 = 00001100
56 = 00111000
So 25.34.12.56 = 00011001.00100010.00001100.00111000
255 = 11111111
255 = 11111111
0 = 00000000
0 = 00000000
So 255.255.0.0 = 11111111.11111111.00000000.00000000
00011001.00100010.00001100.00111000 (IP)
AND
11111111.11111111.00000000.00000000 (Subnet mask)
=
00011001.00100010.00000000.00000000
Final Answer:
4. Compare the difference between stop and wait and sliding window protocol?
node that is only capable of understanding IPv4 can be assigned an “IPv4- mapped IPv6
address” by prefixing the 32-bit IPv4 address with 2 bytes of all 1s and then zero-extending the
result to 128 bits.
Hop-by-Hop — source host sends information to all routers visited by the packet Destination
— source host information is passed to the destination only. Source Routing — routing
information provided by the source host.
Fragmentation — In IPv6, only the source host can fragment. Source uses a path MTU
discovery technique to find smallest MTU on the path.
Authentication — used to validate the sender and ensures data integrity.
ESP (Encrypted Security Payload) — provides confidentiality against eavesdropping.
Answer:
Step-by-Step Process Using Dijkstra’s Algorithm (from node A):
We assume all nodes share their link-state information with others, and each router computes the
shortest path using Dijkstra’s algorithm.
7.b. Explain in detail the operation of OSPF Protocol by considering a suitable network.
PART C
8.a. Assume the Scenario, that N number of devices shares a common Communication
Channel for data Sharing in which, apply a Media Access Control algorithm to detect the
occurrence of Collision using Carrier signals, Identify and explain the MAC algorithm.
Discuss why that same algorithm not used in wireless LAN.
When two or more nodes transmit data at the same time, their frames will collide and the
link bandwidth is wasted during collision.
To coordinate the access of multiple sending/receiving nodes to the shared link, we need a
protocol to coordinate the transmission.
These protocols are called Medium or Multiple Access Control (MAC) Protocols. MAC
belongs to the data link layer of OSI model
MAC defines rules for orderly access to the shared medium. It tries to ensure that no two
nodes are interfering with each other’s transmissions, and deals with the situation when
they do.
MECHANISMS USED
Wired Networks: o CSMA / CD – Carrier Sense Multiple Access / Collision Detection
Wireless Networks: o CSMA / CA – Carrier Sense Multiple Access / Collision Avoidance
8.b. Solve the cyclic redundancy check (CRC) based error detection scheme using the
generator polynomial x3+x+1x^3 + x + 1x3+x+1. Suppose the message '11000' is to be
transmitted. Find the codeword and show your detailed evaluation work.
Given:
Division process:
1100
XOR
1011
-----
0111
1110
XOR
1011
-----
0101
1010
XOR
1011
-----
0001
Bring down next bit (0) → new bits: 0010
First bit is 0, so just bring down next bit (0) → 0100
First bit is 0, again bring down next bit (0) → 1000
Now first bit is 1, XOR with 1011:
1000
XOR
1011
-----
0011
Final Answer:
Codeword = 11000011