0% found this document useful (0 votes)
19 views13 pages

DCC PIP On Chapter 5

The document contains a set of questions and their solutions related to the chapter 5 of the course Data Communication and Networking. The questions cover topics like functions of network layer, classes of IP addressing, OSI model, TCP/IP model, types of IP addresses and configuration of TCP/IP protocol.

Uploaded by

seemakasture75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views13 pages

DCC PIP On Chapter 5

The document contains a set of questions and their solutions related to the chapter 5 of the course Data Communication and Networking. The questions cover topics like functions of network layer, classes of IP addressing, OSI model, TCP/IP model, types of IP addresses and configuration of TCP/IP protocol.

Uploaded by

seemakasture75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 13

JAYAWANT SHIKSHAN PRASARAK MANDAL’s

Bhivrabai Sawant Polytechnic


(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai)
Gat No. 720 (1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 65335100 Tele fax: - + 91-020-65335100
E-mail: [email protected] Website: www.jspm.edu.in

Computer Engineering Department


Academic Year 2023-2024
PIP Questions on Chapter 5
Course: Data Communication & Networking Course Code: 22414
Semester: IV
Que. Bloom’s Marks Assignment Questions Relevance
No. Level to CO
1 R 2 State functions of Network layer
2 R 2 List classes of IP addressing with their IP address range.

3 U 4 Draw and explain layered architecture of OSI model.


4 U 4 State the functions of any two layers of OSI Model

5 U 4 Describe the major functions of network layer in TCP/IP protocol suite COI403.5

6 U 4 Compare IPV4 and IPV6 (any four point)

7 U 4 Draw and explain TCP/IP model.


8 R 4 Describe types of IP address classes.
9 R 4 Describe the process of DHCP server configuration.
10 U 6 Explain configuration of TCP/IP protocol in network.

Sign of Course Coordinator Sign of Module Coordinator Sign of H.O.D.


JAYAWANT SHIKSHAN PRASARAK MANDAL’s

Bhivrabai Sawant Polytechnic


(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai)
Gat No. 720 (1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 65335100 Tele fax: - + 91-020-65335100
E-mail: [email protected] Website: www.jspm.edu.in

Computer Engineering Department


Academic Year 2021-2022
PIP Chapter 5 Solution
Course: Data Communication & Networking Course Code: 22414 Semester: IV

Que. Bloom’s Relevance


Marks Assignment Questions
No. Level to CO
1 R 2 State functions of Network layer COI403.5

Marking Scheme 1/2 M each


Functions of network layer:

1. logical addressing

2. Routing.
Answer
3. Congestion control

4. Accounting and billing

5. Address transformation

6. Source host to destination host error free delivery of packet.


2 R 2 List classes of IP addressing with their IP address range.
Marking Scheme List1M,correct range 1M
Answer An IP address is an address used to uniquely identify a device on an IP network.
Classes and range:
Class A- 1.0.0.1 to 126.255.255.254
Class B - 128.1.0.1 to 191.255.255.254
Class C - 192.0.1.1 to 223.255.254.254
Class D- 224.0.0.0 to 239.255.255.255
Class E - 240.0.0.0 to 254.255.255.254
3 U 4 Draw and explain layered architecture of OSI model.
Marking Scheme 1 M diagram and 3 M explanation
Answer
OSI model (Open System Interconnection) model was developed by ISO (international standard
organization) which provides way to understand how internetwork operates. It gives guidelines
for creating network standard.

OSI model has 7 layers as shown in the figure. Application Layer, Presentation Layer ,Session
Layer ,Transport Layer ,Network Layer ,Data link Layer and Physical Layer

Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It provides the hardware
means of sending and receiving data on a carrier, including defining cables, cards and physical
aspects.

Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the physical
layer, flow control and frame synchronization. The data link layer is divided into two sub layers:
The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC
sub layer controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer
Network (Layer 3) Layer 3 provides switching and routing technologies, creating logical paths,
known as virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion control
and packet sequencing.

Transport (Layer 4) Model, Layer 4, provides transparent transfer of data between end systems,
or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer from source to destination.

Session (Layer 5) This layer establishes, manages and terminates connections between
applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.

Presentation (Layer 6) This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. It is sometimes called the syntax & semantics.
Application (Layer 7) OSI Model, Layer 7, supports application and end-user processes.
Everything at this layer is application-specific. This layer provides application services for file.

4 U 4 State the functions of any two layers of OSI Model


Marking Scheme Functions of each layer- 2M
Answer
The functions of the physical layer are :
1. Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes
are arranged in a network i.e. bus, star or mesh topology.
4. Transmission mode: Physical layer also defines the way in which the data flows between
the two connected devices. The various transmission modes possible are: Simplex, half-
duplex and full-duplex.
Functions of data link layer:

 Framing: Data-link layer takes packets from Network Layer and encapsulates them into
Frames. Then, it sends each frame bit-by-bit on the hardware. At receiver’ end, data link
layer picks up signals from hardware and assembles them into frames.
 Addressing: Data-link layer provides layer-2 hardware addressing mechanism. Hardware
address is assumed to be unique on the link. It is encoded into hardware at the time of
manufacturing.
 Synchronization: When data frames are sent on the link, both machines must be
synchronized in order to transfer to take place.
 Error Control: Sometimes signals may have encountered problem in transition and the
bits are flipped. These errors are detected and attempted to recover actual data bits. It also
provides error reporting mechanism to the sender.
 Flow Control: Stations on same link may have different speed or capacity. Data-link layer
ensures flow control that enables both machines to exchange data on same speed.
 Multi-Access: When host on the shared link tries to transfer the data, it has a high
probability of collision. Data-link layer provides mechanism such as CSMA/CD to equip
capability of accessing a shared media among multiple Systems.
Functions of the Network layer are as follows:
 It is responsible for routing packets from the source host to the destination host. The routes
can be based upon static tables that are rarely changed, or they can be automatically
updated depending upon network conditions.
 The data link layer assigns the physical address locally. When the data packets are routed
to remote locations, a logical addressing scheme is required to differentiate between the
source system and the destination system. This is provided by the network layer.
 This layer also provides mechanisms for congestion control.
 The network layer tackles issues like transmission delays, transmission time, avoidance of
jitters, etc.
Functions of Transport Layer

 Service Point Addressing: Transport Layer header includes service point address which is
port address. This layer gets the message to the correct process on the computer unlike
Network Layer, which gets each packet to the correct computer.
 Segmentation and Reassembling: A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message.
Message is reassembled correctly upon arrival at the destination and replaces packets which
were lost in transmission.
 Connection Control: It includes 2 types:
 Connectionless Transport Layer: Each segment is considered as an independent packet
and delivered to the transport layer at the destination machine.
 Connection Oriented Transport Layer: Before delivering packets, connection is made
with transport layer at the destination machine.
 Flow Control: In this layer, flow control is performed end to end.
 Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error
Correction is done through retransmission.

The functions of the Session layer are :


1. Session establishment, maintenance and termination: The layer allows the two processes
to establish, use and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization point help to identify the error
so that the data is re- synchronized properly, and ends of the messages are not cut
prematurely and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.

The functions of the presentation layer are :


1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the cipher text and the decrypted data is known as plain
text. A key value is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.

The functions of the Application layer are :


1. Network Virtual Terminal
2. FTAM-File transfer access and management
3. Mail Services
 Directory Services
5 U 4 Describe the major functions of network layer in TCP/IP protocol suite
Marking Scheme 1 M for each function
Internetworking: This is the main duty of network layer. It provides the logical connection
between different types of networks.
Addressing: Addressing is necessary to identify each device on the internet uniquely. This is
similar to telephone system. The address used in the network layer should uniquely and
universally define the connection of a computer.
Answer
Routing: In a network, there are multiple roots available from a source to a destination and one
of them is to be chosen. The network layer decides the root to be taken. This is called as routing.
Packetizing: The network layer encapsulates the packets received from upper layer protocol and
makes new packets. This is called as packetizing. It is done by a network layer protocol called IP
(Internetworking Protocol).
Compare IPV4 and IPV6 (any four point)
6 U 4
Marking Scheme Any 4 correct points1M each

IPV4 IPv6

Source and destination Source and destination


addresses are 32 bits (4 addresses are 128Bits (16
bytes) in length. bytes) in length.
No. addresses are limited to Larger addressing area
number of bits (32 bits)
Uses broadcast addresses to There are no IPv6 broadcast
Answer
send traffic to all nodes on a addresses. Instead, multicast
subnet. scoped addresses aroused
Fragmentation is supported at Fragmentation is not
Originating hosts and supported at routers. It is only
intermediate routers. supported at the originating
host
IP header includes a IP header does not include a
checksum checksum.
IP header includes options All optional data is moved to
IPv6extension headers

IPv4 has classful addressing Classless addressing scheme.


scheme, includes classes like
A,B,C,D and E.
Uses decimal dotted notation Uses hexadecimal notation

7 U 4 Draw and explain TCP/IP model.


Marking Scheme 1 M for diagram. 3 M for explaination

Answer TCP/IP that is Transmission Control Protocol and Internet Protocol has following features
● Support for a flexible architecture. Adding more machines to a network was easy.
● The network is robust, and connections remained intact until the source and destination
machines were functioning. The main idea was to allow one application on one computer to talk to
(send data packets) another application running on different computer.

Different Layers of TCP/IP Reference Model Below:


Layer 1: Host-to-network Layer

1. Lowest layer of the all.

2. Protocol is used to connect to the host, so that the packets can be sent over it.

3. Varies from host to host and network to network.

Layer 2: Internet layer

1. Selection of a packet switching network which is based on a connectionless internetwork layer


is called a internet layer.
2. It is the layer which holds the whole architecture together.

3. It helps the packet to travel independently to the destination.

4. Order in which packets are received is different from the way they are sent.

5. IP (Internet Protocol) is used in this layer.

6. The various functions performed by the Internet Layer are:

o Delivering IP packets
o Performing routing
o Avoiding congestion

Layer 3: Transport Layer

1. It decides if data transmission should be on parallel path or single path.

2. Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.

3. The applications can read and write to the transport layer.

4. Transport layer adds header information to the data.

5. Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
6.Transport layer also arrange the packets to be sent, in sequence

Layer 4: Application Layer

The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a remote machine and
run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport electronic
mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
It allows peer entities to carry conversation.6.It defines two end-to-end protocols: TCP and UDP.

8 R 4 Describe types of IP address classes.


Marking Scheme
Class A:
Class A range for first byte is 0-127. Class A type of IP addresses have First byte consisting of
Network address with first bit as 0 and the next 3 bytes with host id. Hence, number of hosts are
more when compared to number of networks. The default subnet masks for class A networks is
255.0.0.0. Class A networks have their network addresses from 1.0.0.0 to 126.0.0.0, with the
zero's being replaced by node addresses.

Class B: Class B range for first byte is 128-191. This type has first two bytes specifying network
ID with starting two bits as 10 and last two bytes referring to host ID. The default subnet masks
for class B is 255.255.0.0. Network addresses for these ranges from 128.0.0.0 to 191.0.0.0.

Class C: Class C range for first byte is 192-223. This class has first three bytes referring to
network with starting bits as 110 and last byte signifies Host ID. Here, number of networks is
more when compared to number of hosts in each network. The default subnet masks for class C is
255.255.255.0 The network IP addresses for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting and its starting
bits are 1110
Class E: Class E range for first byte is 240-255 .Class E is reserved for future use and its starting
bits are 1111

9 A 4 Describe the process of DHCP server configuration.


Marking Scheme Diagram 2M, Explanati on 4 M

Answer DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses DHCP servers
and DHCP clients. A DHCP server is a machine that runs a service that can lease out IP addresses
and other TCP/IP information to any client that requests them. The DHCP server typically has a
pool of IP addresses that it is allowed to distribute to clients, and these clients lease an IP address
from the pool for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client machines that run
special DHCP client software enabling them to communicate with DHCP server.
DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various DHCP options from DHCP
servers in a four-step process:

DHCP DISCOVER: The client broadcasts a request for a DHCP server.

DHCPOFFER: DHCP servers on the network offer an address to the client.

DHCPREQUEST: The client broadcasts a request to lease an address from one of the offering DHCP
servers.

DHCPACK: The DHCP server that the client responds to acknowledges the client, assigns it
any configured DHCP options, and updates its DHCP database. The client then initializes and
binds its TCP/IP protocol stack and can begin network communication.

10 U 6 Explain configuration of TCP/IP protocol in network.

Marking Scheme
Step by step procedure -6M

Answer
Before beginning configuration procedure, the following are the prerequisites.
 Network hardware is installed and cabled. .
 TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
Read TCP/IP protocols for the basic organization of TCP/IP.
 Minimally configure each host machine on the network.
This means adding a network adapter, assigning an IP address, and assigning a host name to
each host, as well as defining a default route to your network. For background information on
these tasks, refer to TCP/IP network interfaces, TCP/IP addressing, and Naming hosts on
your network.

 Configure and start the intend daemon on each host machine on the network. Read
TCP/IP daemons and then follow the instructions in Configuring the intend daemon.
 Configure each host machine to perform either local name resolution or to use a name
server. If a hierarchical Domain Name networks being set up, configure at least one host to
function as a name server.

 If the network needs to communicate with any remote networks, configure at least one
host to function as a gateway. The gateway can use static routes or a routing daemon to perform
inters network routing.

 Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network services if you
wish to make a particular service unavailable.

 Decide which hosts on the network will be servers, and which services a particular server
will provide.Follow the instructions in Server network services to start the server daemons you
wish to run.

 Configure any remote print servers that are needed.


 Optional: If desired, configure a host to use or to serve as the master time server for the
network.

You might also like