Elective-I-Fundamental of Networks-Assignment
Elective-I-Fundamental of Networks-Assignment
SCIENCE
(AUTONOUMUS), SULUR.
SCHOOL OF COMPUTER STUDIES (UG)
B.Sc. INFORMATION TECHNOLOGY
ASSIGNMENT
NETWORK SIGNALING
1. How does Manchester line code differ from Return-to-Zero and non-return-to-zero.
One such encoding technique is called return-to-zero. With this encoding method, the signal
returns to a zero state between each electrical pulse, as shown here. This method allows for a
digital signal that is self-clocking, meaning it doesn't need a source of synchronization, such as a
separate clock signal being sent, in order to decode the information. This is useful because it
prevents transmission errors with the data.
By not returning to a zero state, this method can achieve the same data rate as return-to-zero
with half the bandwidth(amount of data) usage. However, non-return-to-zero is not a self-
clocking signal. This means it requires a separate clock signal in order to prevent transmission
errors.
For example, this transition from a negative voltage to a positive voltage would be 0 and this
transition from a positive voltage to a negative voltage would be 1. The clocking element is
encoded by having the data transitions always occur at the middle of each bit period.
1. The service company in Chennai has just acquired another branch in the same city. You
are given the task of integrating the two e-mail systems so that messages can be
exchanged between the email servers. However, each network uses an email package
from a different vendor. Brief about TCP/IP protocol which will enable messages to be
exchanged between systems?
2. Based on the diagram which network line code technique is being used and explain the
technique.
Coaxial cabling is made up of four components. In the center is an inner conductor. This inner
conductor is usually made of copper, or copper that's been coated with tin, and it's used to
transmit data.
Outside the PVC insulator is secondary mesh conductor, normally made out of aluminum or
tin-coated copper. This mesh conductor is usually used for grounding, and doesn't transmit
data.
4. The software company adding new wires in the building. The building has a false ceiling
that holds the lights. And would like to run your Ethernet cables in this area. Which type
of cable must can use for this purpose and explain?
i)
10. Which connector type will you most likely use in a broadband home internet service that
uses coaxial cable? State the reason.
FIBER OPTIC
11. In the fiber optic cable, how does light waves travel around corners?
Inside of a piece of fiber optic cable is the core. The core is made of extremely fine glass or
plastic that readily transmits light.
Light travels in a straight line, but fiber optic networking cable rarely runs in a straight
line.
If the cable goes around a corner, the light within it will want to keep going straight. The
job of the cladding is to bounce that light back into the center of the core as the
network cable goes around corners.
Surrounding the cladding are several layers of sheathing that protect the cladding and the inner
glass core.
12. Which connector types combine two strands of fiber into a single connector?
Most Ethernet over fiber will use two strands of fiber.
13. Optical fiber would usually be used to connect two buildings across campus from each
other as well both the buildings are several kilometers apart. What type of fiber optic
cable is used for this scenario?
14. Name the below mentioned connector and show their description.
i)
WIRING IMPLEMENTATION
15. Identify the following cable and discuss the standards of this cable.
Let's suppose that we're dealing with a situation where we don't have a switch or a hub
available but we still need to connect two different computers together.
If I were to connect these two computers together using a straight through cable, we
would have a problem because the receive pins on each side would be connected to each
other and the transmit pins on each side would be connected to each other. That won't
work.
In essence, when a computer tried to transmit, it would send the data to the other
computers' transmit port. The other computer is not looking for data on its transmit pin,
it's looking for data on its receive pins. What we need to do is construct our cable such
that the transmit pin on one end is wired to the receive pin on the other in this particular
situation.
16. You are working with 25 pair wires and 49 blocks. You have pushed the wires on to the
49 block, Which tool is used for cut off the excess end of each wire? Explain.
17. Network that occupies all three floors of a building. The WAN service provider has
installed the line for the WAN service into the building in a wiring closet on the main
19. Explain the tools used to reduce the troubleshooting physical connectivity problems?
Loopback plugs, smartjacks, cable testers, TDR/OTDR, cable certifiers, toner probes,
multmeters.
20. Consider the 850nm multimode fiber optic cable shown below. Explain the process
UNIT III
1. Discuss the network component which connects a device with the transmission media and
allows it to send and receive messages.
3. You have a server that has a 100BaseFX network interface card that you need to connect
to a switch. The switch only has 100BaseTX switch ports. Which device is suitable for
the above scenario?
4. What type of modules might a switch use to allow it to modify the media type supported
by a switch port?
3. Bridge can have upto 16 ports while switch can handle many ports.
8. What type of device do we use to translate from one network architecture to another?
MEDIA CONVERTERS
9. How does a router differ from a switch or a hub?
Routers might have a single WAN port and a single LAN port and are designed to
connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be
connected to a router with multiple PC ports to expand a LAN. ... Somerouters even
have USB ports, and more commonly, wireless access points built into them.
11. A device wants to send a message to another device with the IP address 115.99.80.157.
IP does not know the hardware address of the destination device. Which protocol can be
used to discover the MAC address?
ARP
12. Give short note on the function of switch. REFER CLASS WORK
13. Name the hardware device that regenerates a signal out all connected ports without
examining the frame or packet contents. Sketch and discuss the roles of that hardware
device. Ans:hub,repeater
14. An 8-port switch receives a frame on port number 1. The frame is addressed to an
unknown device. What will the switch do?
A firewall works as a barrier, or a shield, between your computer network and internet.
When you are connected to the Internet, you are constantly sending and receiving
information. All messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet the specified security
criteria.
Firewalls provide security over a number of online threats such as Remote login, Trojan
backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many
more.
17. Which of the following hardware devices links multiple networks and directs traffic
between networks? ANS:ROUTER
18. You are the network administrator for an IT industry. Recently, you contracted with an
ISP to connect your office network to the internet to provide users with internet access.
While doing, an intruder has invaded your network from the internet on three separate
occasions. What type of network hardware should you implement to prevent this from
happening again?
Firewalls provide security over a number of online threats such as Remote login, Trojan
backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many
more.
20. You are an administrator of an IT company’s network. You want to prevent unauthorized
access to your intranet from the internet. How to implement this process?
UNIT-IV
ETHERNET
1. What topologies are used when in the Ethernet, Computers are connected to the network
using networking medium. Discuss it.
3. Discuss it: Computers Aa, Bb, and Cc are connected to the network medium, all are
sending the transmitting messages at the same time.
Suppose computer A needs to send a message to computer B. According to the CSMA/CD media
access method, the first thing computer A must do is listen to the transmission medium to see if data
is already being transmitted. This is called carrier sense. It's like using a two-way radio. Before
you talk, you briefly listen to see if anybody else is already talking.
Computer A listens to the medium, determines that it is clear, and transmits its message to computer
B. When the message is sent to computer B, it also arrives at computer C because we're using a
physical bus topology.
Computer B receives the message and determines that it is addressed to itself, so it accepts that
message and processes it. Computer C realizes that the message is not addressed to it, so it
discards the message.
Suppose computer C has a message to send to computer B. It would go through the same process.
First, it listens to the medium to determine if it is busy. This time, computer A is in the middle of a
transmission. Computer C can tell that there's a signal being transmitted on the wire. It waits a
random period of time and then listens again. While it waits, computer A finishes its transmission and
the transmission medium becomes clear. Computer C determines that the medium is now free and
can transmit the message to computer B.
4. What is jam signal ? What occurs in the network medium if jam signal happens?
After the jam signal, the devices perform a back-off, where they each wait a random amount of time
before starting the process all over again.
Ideally, if computer A and computer C send a jam signal at the same time, then they both back off
at the same time.
Because the back-off time is random, one of them should back off a little longer than the other.
Let's say computer C backs off a shorter amount of time. After the back-off period, it senses the wire
again, notices that it's not being used, and then transmits its message. Computer A backs-off for a longer
period and then senses the wire. It notices that computer C is already transmitting and must wait to
transmit.
To eliminate collisions. A switch offers a guaranteed transmission path between two connected
devices. This network has four devices connected through a switch. When one device needs to send a
message, logical circuits inside of the switch automatically close off and send that message to just the
destination device. Instead of the message being sent out to all the devices, the message goes only to
the destination device. A switch can simultaneously switch multiple messages. For example, we
have a dedicated path between these two devices, yet these two devices can also establish a dedicated
path for communications. The communication path is used only between the two devices; it isn't used
by any other devices. Collisions are completely eliminated as a result.
Without collisions, there's no need for carrier sense or collision detection. Devices, as soon as they are
ready to transmit, simply transmit. They also do not try to sense collisions.
When you're using a switch, the media access method isn't used. It's still there in the specifications,
but the devices don't need it. Switched Ethernet networks are much faster than hub-based networks.
As you add more devices to the network, the number of collisions remains at zero.
7. Sketch and illustrate the devices that are supported on an Ethernet network?
Devices used on Ethernet networks include:
NICs
Hubs (obsolete)
Switches
Routers
Let's say computer C backs off a shorter amount of time. After the back-off period, it senses the wire
again, notices that it's not being used, and then transmits its message. Computer A backs-off for a longer
period and then senses the wire. It notices that computer C is already transmitting and must wait to
transmit.
3. State the appropriate cable type is suitable for the below situations:
i) to connect a router to the uplink port on a switch
ii) to connect two switches together using their uplink ports
iii) to connect a workstation to a regular port on a hub or a switch
ANS:
4. The company has four computers that need to communicate with each other and the
internet. The ISP’s cable modem has only one RJ45 port. You need to set up the
network with the following in mind:
Speed as little money as possible.
Do not purchase unnecessary equipment.
Computers need to have a gigabit connection to the network.
New devices should not require management or configuration.
You examine each computer and notice only one of the four computers has a wireless
NIC; they all have Ethernet NICs. What should you purchase? Why?
2. What are the tools that are used to measure the voltage, amps, and ohms of various
devices.
5. Name and explain about the device that allows the service provider to remotely test the
local loop?
7. You are creating an Ethernet network for the company A. One of the department is
located in a different building that is located 150 meters from the main wiring closet.
You connect a single Cat6e cable to connect the wiring closet to the shipping building.
Briefly explain the conditions that you most likely to experience.
42. Which two of the following IP addresses are Class B addresses? Point out the reason for
identifying that as Class B addresses.
i) 224.15.55.2 ii) 190.65.2.0 iii) 129.0.0.0 iv) 115.33.0.0
ANS: ii) 190.65.2.0 iii) 129.0.0.0
43. Give any two IP addresses have a default subnet mask of 255.255.0.0.
ANS: 168.16.5.1, 191.168.2.15
The IP address actually includes two different addresses; the subnet address and
the host address. Part of the IP address identifies the subnet, and the other part
identifies the host. Where this division occurs is the function of the subnet mask.
A subnet mask looks like an IP address; it has four octets. The subnet mask
identifies which portion of the IP address is the subnet address and which is the
host address. Wherever you see 255 you know that this octet is part of the
network address. In this example, the subnet address is 167.12.0.0, while the host
address, indicated by zeros in the subnet mask, is 155.16. You can have multiple
hosts on the same subnet, and each host must have a different host address. All
hosts on the same subnet share the same subnet address, but must have unique
host addresses.
51. Small network connected to the internet as shown in the diagram. You need to configure
the default gateway address on Wrk1 so that it can communicate with hosts on the
internet. Which address would you use for the default gateway address? State the reason.
You need to manually configure the workstation to connect to the network. The
workstation should use RouterA as the default gateway, and DNS1 as the DNS server
address. Write the appropriate parameters to configure the workstation’s TCP/IP
settings.
53. Recently created a new network segment for development. Because the hosts are now on
a different network segment, they no longer contact the DHCP server. Both segments are
connected via a router. What will be action has to be taken in order to fix this problem?
ALTERNATING IP ADDRESS
55. Mention the disadvantages of Static IP Assignment.
The slightest network change, such as a new DNS server address, requires a
significant amount of effort on the part of the network administrator.
Suppose that on the network two of the hosts are used by dayshift workers, and two of
the hosts are used by nightshift workers. We only need two IP addresses at any given
time. During the day, just two hosts are on, and during the night just two hosts are
on. If static IP address assignments are used, then all four addresses are consumed,
whether or not they're actually in use.
A DHCP server is a special server configured to pass out IP addresses and other IP configuration
information to network clients. It ensures that each client is assigned a unique IP address.
When a DHCP client system boots, it contacts the DHCP server for IP configuration
information. The DHCP server is configured with a range of IP addresses it can assign to
hosts. These ranges are called scopes.
o The DHCP server can be configured to prevent specific addresses in the range
from being assigned to clients. This is called an exclusion.
o You can also configure a DHCP server to deliver the same address to a specific
host each time it requests an address. This is called a reservation.
The DHCP server can also be configured to pass out other IP configuration information, such
as the default gateway and DNS server addresses.
The DHCP server assigns the IP address and other information to the client. The assignment
is called alease, and it includes a lease time that identifies how long the client can use the IP
address.
o Periodically, the client contacts the DHCP server to renew the lease on the IP
address. The client will also attempt to renew the lease on the same IP address if it
reboots.
o The DHCP lease process uses broadcast frames at Layer 2. For this reason, DHCP
requests do not pass through routers to other subnets by default. To enable DHCP
broadcasts between subnets, enable IP helper or DHCP relay on the appropriate
routers.
Any client configured to use DHCP can get an IP address from any server configured for
DHCP, regardless of its operating system.
42. Which IP configuration parameters are set when APIPA is used? Which parameters are
not set?
44. What will be the IP address ranges is reserved for Automatic Private IP Addressing?
Explain.
For example, suppose host A gets an address of 192.168.1.25 from the DHCP
server. Then a network cable gets damaged and the DHCP server is no longer
accessible. At this point, host Band C are powered on. Because they can't contact
the DHPC server, they select an address out of the APIPA address range, such
as 169.254.0.1 and 169.254.0.2. In this situation, hosts B and C are able to
communicate because of APIPA. However, host A can't communicate with hosts B
and C. Most network infrastructure devices have static IP addresses assigned and
are not affected by a DHCP server outage. Suppose this server has an IP address
of 192.168.1.2 statically assigned to it. After the DHCP server goes down, host
A can still communicate with the server.
However, hosts B and C cannot. The default gateway router has an IP address of
192.168.1.254 statically assigned to it. After the DHCP outage, host A can still go
out through the default gateway to other networks, including the Internet. APIPA
does not assign a gateway router address, nor is the statically assigned address
on the router on the same logical network as the APIPA-assigned host
addresses. Hosts B and C can only communicate on the local network
segment. They can't access other networks, nor do they have Internet access.
UNIT-IV
1. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The
address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need
to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to
be assigned to other hosts?
SOLUTION:
If the block of addresses allocated to the pool is 192.168.10.0/24, there are 254 IP addresses to
be assigned to hosts on the network. As there are 3 printers which need to have their addresses
assigned statically, then there are 251 IP addresses left for assignment.
2. If a network device has a mask of /28, how many IP addresses are available for hosts on this
network? Explain.
A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4 host bits, 16
IP addresses are possible, but one address represents the subnet number and one address
represents the broadcast address. 14 addresses can then be used to assign to network devices.
3. A network administrator wants to have the same network mask for all networks at a particular
small site. The site has the following networks and number of devices:
IP phones – 22 addresses
The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site.
Which single subnet mask would make the most efficient use of the available addresses to use
for the four sub networks?
SOLUTION:
If the same mask is to be used, then the network with the most hosts must be examined for the
number of hosts, which in this case is 22 hosts. Thus, 5 host bits are needed. The /27 or
255.255.255.224 subnet mask would be appropriate to use for these networks.
4. You have a network with 50 workstations. You want to automatically configure workstations
with the IP address, subnet mask and default gateway values. Which device should you use?
Explain.
SOLUTION:
DHCP Sever
5. Explain the steps involved in configuring a DHCP server through Cisco Packet Tracer for the
following Topology.
Step 2: Choose the end devices and select one server paste.
Step 5: All the devices connected to the cable copper straight through.
Step 6: By clicking server choose services go to DHCP option-->click service on-->type pool
name-->type start IP address finally select add.
Step7: Select any client and go for desktop-->click option DHCP automaticlly the IP address
allocated by DHCP server.
6. How to reduce the troubleshooting configuration problems with IPConfig facts explain in
detail.
ipconfig /all to troubleshoot IP configuration problems. The following table describes how the
output for this command changes, based on how IP settings are configured and for specific
problem situations:
When you have a rogue DHCP server on the network, some hosts
will likely receive configuration information from the correct
DHCP server and others from the rogue DHCP server.
The DNS Servers line will not include any IPv4 addresses.
When APIPA is used, the workstation sets its own IP address and
mask. It does not automatically configure default gateway or DNS
server values. When APIPA is being used:
If the workstation has received configuration information from the wrong DHCP server or has
configured itself using APIPA, you may need to contact the DHCP server again once the DHCP
problems have been resolved. Use the following commands:
UNIT-V
1. Find out the following cable types to make the initial connection to the switch or router for
device management in detail.
SOLUTION:
Pin-
Cable Type Use
outs
2. 17. Refer and Exhibit the following image illustrates some of the configuration modes
available on a Cisco switch. Explain.
SOLUTION:
GigabitEthernet (1 GB
Interface Ethernet) Switch(config-if)#
Configuration
VLAN
3. Illustrate the Trunking facts when you configure VLANs that span multiple switches as
shown in the following diagram.
In this example, each switch has two VLANs configured, with one port on each VLAN.
Workstations in VLAN 1 can only communicate with other workstations in VLAN 1. This
means that workstations connected to the same switch in this example cannot communicate
directly with each other. Communications between workstations within each VLAN must pass
through the trunk link to the other switch.
Access ports are connected to endpoint devices (such as workstations), while trunk ports
are connected to other switches.
By default, trunk ports carry traffic for all VLANs between switches. However, you can
reconfigure a trunk port so that it carries only specific VLANs on the trunk link.
When trunking is used, frames that are sent over a trunk port are tagged with the VLAN ID
number so the receiving switch knows which VLAN the frame belongs to. In VLAN tagging:
Tags are appended by the first switch in the path and removed by the last.
With 802.1Q trunking, frames from the default VLAN are not tagged, but frames from all other
VLANs are tagged. For example, suppose VLAN 1 is the default VLAN on a switch (the default
setting on most Cisco switches). In this configuration, any frame on VLAN 1 that is placed on a
trunk link will not be assigned a VLAN tag. If a switch receives a frame on a trunk port that
doesn't have a VLAN tag, the frame is automatically put onto VLAN 1
4. Computers A and B are on the same VLAN and are separated by two switches, as shown
below. Computer A sends a frame to Computer B. Find that the composition of the frame as it
travels from A to B?
SOLUTION:
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The second switch removes the VLAN ID before forwarding it to Computer B.
5. Assume that you have just connected four switches as shown below. Find the default switch
configuration and which switch will become the root bridge?
SOLUTION: