0% found this document useful (0 votes)
159 views7 pages

Student Name Student No. Group: Noorkhairunnisa Binti Hassan 2022770469 CS2402B

Here are the subnet masks for the given IP addresses: 192.149.24.191 - 255.255.255.0 117.15.2.51 - 255.0.0.0 27.125.200.151 - 255.0.0.0 223.169.23.20 - 255.255.0.0 48.21.25.54 - 255.255.0.0 199.120.150.35 - 255.255.255.0 10.10.10.10 - 255.0.0.0 191.55.165.135 - 255.255.255.0 10.10.48.80

Uploaded by

Nisa Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views7 pages

Student Name Student No. Group: Noorkhairunnisa Binti Hassan 2022770469 CS2402B

Here are the subnet masks for the given IP addresses: 192.149.24.191 - 255.255.255.0 117.15.2.51 - 255.0.0.0 27.125.200.151 - 255.0.0.0 223.169.23.20 - 255.255.0.0 48.21.25.54 - 255.255.0.0 199.120.150.35 - 255.255.255.0 10.10.10.10 - 255.0.0.0 191.55.165.135 - 255.255.255.0 10.10.48.80

Uploaded by

Nisa Hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

STUDENT NAME STUDENT NO.

GROUP

NOORKHAIRUNNISA BINTI 2022770469 CS2402B


HASSAN
PART A – ERROR DETECTION (Chapter 6)

1. Define the terms the types of errors.


- The terms the types of errors is Single-Bit Error and Burst Error.
2. Define the concept of CRC.
- The Cyclic Redundancy Checks (CRC) is the most powerful method for error-
detection and correction. It is given as a kbit message and the transmitted creates an
(n - k) bit sequence called frame check sequence. And it is used in networks such
as LANs and WANs.
3. Explain how CRC checker works.
- CRC is an error detection code used for verifying the integrity of data. It works just
like checksum and is appended to the end of the payload data and transmitted or
stored along with that data. Like example, send the lower-case letter z to someone
else. In unicode, the z is represented by the number 0x7A, that’s 0111 1010 in
binary representation.
4. List the steps followed in checksum generator.
- Steps followed in checksum generator:
i. The message is divided into n bit words.
ii. The value of the checksum word is set to 0.
iii. All words including the checksum are added using one’s complement
addition.
iv. The sum is complemented and becomes the checksum.
v. The checksum is sent with the data.
5. Sort these Checksum steps into order.
i) The sending computer uses the block of data to be sent, and a predefined
mathematical algorithm, to calculate a checksum value.
ii) The sending computer sends the data, plus the checksum value.
iii) The receiving computer uses the data it receives to also calculate what it
believes should be the checksum, using the same mathematical algorithm.
iv) The two checksum values are compared by the receiving computer.
v) If the checksum values don’t match, the receiving computer requests that the
data is transmitted again.
6. The final number in a code of numbers. It is calculated from all the other numbers in
the code. Its purpose is to spot errors on data entry. From the explanation, what is the
detection method referring to?
- The detection method referring to check digit.
7. The receiving computer sends a copy of the data immediately back to the sending
computer for comparison. From the explanation, what is the detection method
referring to?
- The detection method referring to error detection.
8. Sort these Parity Check steps into order
i) The sending and receiving computers agree the protocol to be used (even or
odd).
ii) The sending computer adds the correct parity bit to the binary data (either extra
1 or 0).
iii) The sending computer sends the binary data, including the parity bit.
iv) The receiving computer checks to make sure the overall parity of the data
received is as agreed (an even or odd number of 1 bits).
v) If the parity of the data is incorrect, the receiving computer will request that the
data is transmitted again.
9. A block of data is sent alongside a calculated value. The receiving computer also
calculates what it believes should be the value. The values are then compared to see if
an error has occurred during transmission. From the explanation, what is the detection
method referring to?
- The detection method referring to checksum.
10. An extra bit added to a string of binary code to ensure the number of 1-bits are either
even or odd, depending upon the system used. From the explanation, what is the
detection method referring to?
- The detection method referring to parity check.
11. How can the simple parity bit detect a damage data unit?
- A simple parity-check code is a single-bit error-detecting code in which n=k + 1
with dmin = 2.
- The extra bit, called the parity bit, is selected to make the total number of 1s in the
codeword even or odd.
- A simple parity-check code can detect either an even or odd number of errors.
12) What is the difference between even parity and odd parity?
- Even parity and odd parity both refer to asynchronous communication parity
checking modes. Even parity sets an extra bit to 1 if the data item already has an
odd number of “1” bits or to 0 if the number of “1” bits is even, while odd parity
checking does the same but leaves the number of “1” bits odd.
13) Discuss the two-dimensional parity check and the types of errors it can and cannot
detect
- Performance can be improved by using two-dimensional parity-check, which
organizes the block of bits in the form of a table. Two-dimension parity checking
increases the likelihood of detecting burst errors. If two bits in one data unit are
damaged and two bits in exactly same position in another data unit are also
damaged, the 2-D Parity check checker will not detect an error.
14) Discuss the concept of redundancy in error detection.
- The main concept in the detection of error is redundancy, but to be able to detect or
correct the errors some extra bits are needed and these bits are called the redundant
bit that are added by the sender and removed by the receiver. In case of error
detection, one must check whether an error has occurred or not the answer lies in a
yes or no.
15) How is the check sum method of error detection take place?
- Checksum is an error-detecting technique that can be applied to a message of any
length. On the Internet, the checksum technique is mostly used at the network and
transport layer than the data-link layer. Can use own checksum calculator to
produce a checksum using the same cryptographic hash function.
PART B – IP ADDRESSING (Chapter 7)

1) Identify the class for the following IP address:


Address Class
148.17.9.1 Class B
193.42.1.1 Class C
126.8.156.0 Class A
220.200.23.1 Class D
230.230.45.58 Class D
10110001 01100100 00010010 00000100 Class B
01110111 00010010 00101101 00000000 Class A
11111001 11110000 01010000 01001110 Class E
01011111 00000000 00000101 01011010 Class A
10011110 01100010 01010000 00000000 Class B

2) Write the network id (netid) for the following addresses:


117.89.56.45 117.0.0.0
215.45.45.0 215.45.45.0
10.250.1.1 10.0.0.0
150.10.15.0 150.10.0.0
192.14.2.0 192.14.2.0

3) Write the device id (hostid) for the following addresses:


123.102.45.254 123.102.45
148.17.9.155 148.17
100.0.21.98 100.0.21
195.0.21.98 195
25.250.135.46 25.250.135
4) Using the following IP address and subnet mask, write the network address:
IP Address Subnet Mask Network Address
192.149.24.191 255.255.255.0 192.149.24.0
150.203.23.19 255.255.0.0 150.203.0.0
27.125.200.151 255.0.0.0 27.0.0.0
223.69.230.250 255.255.0.0 233.69.0.0
28.212.250.254 255.255.0.0 28.212.0.0
199.20.150.35 255.255.255.0 199.20.150.0
10.10.10.10 255.0.0.0 10.0.0.0
186.13.23.110 255.255.255.0 186.13.23.0
10.10.48.80 255.255.255.0 10.10.48.0
188.10.18.2 255.255.0.0 188.10.0.0

5) Using the following IP address and subnet mask, write the host address:
IP Address Subnet Mask Host Address
192.149.24.191 255.255.255.0 254
117.15.2.51 255.0.0.0 62
27.125.200.151 255.0.0.0 254
223.169.23.20 255.255.0.0 30
48.21.25.54 255.255.0.0 62
199.120.150.35 255.255.255.0 62
10.10.10.10 255.0.0.0 14
191.55.165.135 255.255.255.0 254
10.10.48.80 255.255.255.0 126
188.10.10.2 255.255.0.0 2
6) Write the correct subnet mask for each of the following addresses:
IP Address Subnet Masks
126.123.23.1 255.0.0.0
223.69.230.250 255.255.255.0
192.12.35.105 255.255.255.0
77.251.200.51 255.0.0.0
189.210.50.1 255.255.0.0
88.45.65.35 255.0.0.0
128.212.250.254 255.0.0.0
193.100.77.83 255.255.255.0
125.125.250.1 255.0.0.0
1.1.10.50 255.0.0.0

7) Given the address 23.56.7.91 and the default class A mask, find the first address
(network address).
- 23.56.7.1
8) Given the address 132.6.17.85 and the default class B mask, find the first address
(network adress).
- 132.6.17.1
9) Consider the IP address of 182.133.129.55.
a) What is the class of this network if classful addressing was used?
- Class B
b) How many bit long is the network-ID if classful addressing was used?
- 16/16
c) What is the network ID and host-ID of our computer?
- Network ID = 182.133.0.0
- Host ID = 182.133
d) What is the default network mask?
- 255.255.0.0
e) How many network hosts (computers) can be addressed in this network?
- 62

You might also like