0% found this document useful (0 votes)
89 views2 pages

Assignment Module 2: Question 1: The Distance Vector Routing Algorithm Is Used. Router P Has Measured Its

The document contains 17 questions related to networking concepts like distance vector routing, OSPF link types, CRC checksums, byte stuffing, subnetting, and IP fragmentation. The questions cover topics such as calculating router routing tables, comparing OSPF and RIP propagation, performing CRC checksums and detecting errors, applying byte stuffing algorithms, subnet mask and address calculations for variable length subnetting.

Uploaded by

Suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views2 pages

Assignment Module 2: Question 1: The Distance Vector Routing Algorithm Is Used. Router P Has Measured Its

The document contains 17 questions related to networking concepts like distance vector routing, OSPF link types, CRC checksums, byte stuffing, subnetting, and IP fragmentation. The questions cover topics such as calculating router routing tables, comparing OSPF and RIP propagation, performing CRC checksums and detecting errors, applying byte stuffing algorithms, subnet mask and address calculations for variable length subnetting.

Uploaded by

Suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Assignment Module 2

Question 1: The distance vector routing algorithm is used. Router P has measured its
routes to its neighbours Q, R and S as 3, 7 and 2 respectively. P has received the
following vectors from node Q: (P, Q, R, S, T, U) [3, 0, 1, 4, 7, 5], from node R: (P, Q, R,
S, T, U) [7, 4, 0, 6, 8, 7] and from node S: ( P, Q, R, S, T, U) [2, 5, 7, 0, 4, 2]. What will be
the state of routing table of router table P?

Question 2: What is the basis of classification for the four types of links defined by
OSPF?

Question 3: Why do OSPF messages propagate faster than RIP messages?

Question 4: A bit stream 1101011011 is transmitted using the standard CRC method.
The generator polynomial is x4+x+1. What is the actual bit string transmitted?

Question 5: A bit stream 10011101 is transmitted using the standard CRC method. The
generator polynomial is x3+1.

1. What is the actual bit string transmitted?

2. Suppose the third bit from the left is inverted during transmission. How will
receiver detect this error?

Question 6: What is the minimal Hamming distance between any two correct
codewords?

Question 7: It the receiver Joe receives 10010100101 from Alice. Check whether the
received message is correct or not. (Hint: message is encoded using hamming code)

Question 8: Suppose a router receives an IP packet containing 600 data bytes and has
to forward the packet to a network with maximum transmission unit of 200 bytes.
Assume that IP header is 20 bytes long. What are fragment offset values for divided
packets?
Question 9: The value of the total length field in an IP datagram is 36, and the value of
the header length field is 5. How many bytes of data is packet carrying?
Question 10: Which fields in the IP header remain the same as the packet travels from
the source host to destination host?
Question 11: The following data fragment occurs in the middle of a data stream for
which the byte stuffing algorithm described in the text is used:

A B ESC C ESC FLAG FLAG D

What is the output after stuffing?

Question 12:  What is the maximum overhead in byte-stuffing algorithm?

 Question 13:  The following character encoding is used in a data link protocol:

A 01000111 B 11100011 FLAG 01111110 ESC 11100000

Show the bit sequence transmitted (in binary) for the four-character frame A B ESC
FLAG when each of the following framing methods is used:

(a) Flag bytes with byte stuffing.

(b) Starting and ending flag bytes with bit stuffing.

Question 14: An organization is granted a block of classless addresses with the starting
address 199.34.32.0/27. How many addresses are granted?

Question 15: An organization is granted the block 21.17.18.10/25. The administrator


wants to create 3 subnets each of size 64, 32 and 32.Find the subnet mask. Also find the
first address and last address of each subnet.

Question 16: Find the range of addresses in a block of classless addresses if one of the
addresses is 200.17.21.135/27.

Question 17: An organization is granted a class C network 210.1.2.0. The administrator


wants to create 4 subnets each of size 64, 32, 16 and 16.Find the first address and last
address of each subnet. Find the subnet mask of each subnet.

You might also like