CNND Question Bank
CNND Question Bank
1) Physical Layer: This layer deals with the physical transmission of data bits over a communication
channel. It defines the electrical, mechanical, procedural, and functional specifications for transmitting
raw data.
Protocols and technologies in this layer include:
Ethernet
Wi-Fi (IEEE 802.11)
Fiber Optics
RS-232
USB
2) Data Link Layer: This layer is responsible for the reliable transfer of data between adjacent nodes on
the network. It provides framing, error detection, and error correction functionalities. Protocols and
technologies in this layer include:
Ethernet (IEEE 802.3)
Point-to-Point Protocol (PPP)
HDLC (High-Level Data Link Control)
IEEE 802.11 MAC layer (Wi-Fi)
3) Network Layer: This layer is concerned with routing packets from the source to the destination
across multiple network nodes. It provides logical addressing, routing, and path determination.
Protocols and technologies in this layer include:
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Internet Protocol version 6 (IPv6)
4) Transport Layer: This layer ensures that data is reliably delivered between endpoints and provides
error checking and recovery mechanisms. It also handles flow control and congestion control. Protocols
and technologies in this layer include:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Stream Control Transmission Protocol (SCTP)
5) Session Layer: This layer establishes, manages, and terminates connections between applications. It
also handles synchronization and checkpointing of ongoing transmissions. Protocols and technologies
in this layer include:
Remote Procedure Call (RPC)
NetBIOS (Network Basic Input/Output System)
Session Layer in OSI model is generally implemented by the application layer of TCP/IP model.
6) Presentation Layer: This layer is responsible for data translation, encryption, compression, and
formatting for the application layer. It ensures that data is presented in a readable format. Protocols
and technologies in this layer include:
JPEG (Joint Photographic Experts Group)
MPEG (Moving Picture Experts Group)
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
7) Application Layer: This layer interacts directly with end-users and provides services such as file
transfer, email, remote login, and web browsing. Protocols and technologies in this layer include:
Hypertext Transfer Protocol (HTTP)
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Domain Name System (DNS)
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
Each layer in the OSI model relies on the services provided by the layers beneath it and provides
services to the layers above it, thus creating a hierarchical and modular network architecture.
TCP/IP is a layered server architecture system in which each layer is defined according to a specific
function to perform. All these four TCP IP layers work collaboratively to transmit the data from one
layer to another.
Application Layer
Transport Layer
Internet Layer
Network Interface
a) Application Layer: This layer interacts directly with end-users and provides network services such as
email, file transfer, and remote login. It includes protocols that support communication between
applications.
Protocols:
HTTP (Hypertext Transfer Protocol): Used for transmitting and receiving web page data over the Internet.
FTP (File Transfer Protocol): Used for transferring files between a client and server on a network.
SMTP (Simple Mail Transfer Protocol): Used for sending email messages between servers.
DNS (Domain Name System): Translates domain names to IP addresses, enabling users to access websites
using human-readable addresses.
b) Transport Layer: This layer is responsible for end-to-end communication between devices. It
ensures data reliability, flow control, and error recovery.
Protocols:
TCP (Transmission Control Protocol): Provides reliable, connection-oriented communication by establishing
a connection, ensuring data delivery, and handling acknowledgments and retransmissions.
UDP (User Datagram Protocol): Provides connectionless communication, suitable for applications where
speed and efficiency are prioritized over reliability.
c) Internet Layer: This layer is responsible for routing packets across networks and enabling
communication between different networks. It deals with IP addressing and packet forwarding.
Protocols:
IP (Internet Protocol): Defines the addressing scheme and packet structure for routing data packets across
networks.
ICMP (Internet Control Message Protocol): Used for error reporting and diagnostics in IP networks.
d) Link Layer (also known as Network Access Layer or Network Interface Layer):
This layer deals with the physical connection between devices and the transmission of data frames
over the local network medium.
Protocols:
Ethernet: A widely used protocol for wired LANs, defining how data is formatted, addressed, transmitted,
and received.
Wi-Fi (IEEE 802.11): Defines standards for wireless LANs, allowing devices to communicate over radio
frequencies.
It's worth noting that the TCP/IP model is a simplified version of the OSI model (Open Systems
Interconnection model) and is commonly used in the context of the Internet and modern networking.
1) Twisted Pair Cable: Twisted pair cables are the most common type of guided media used in
networking. They consist of pairs of insulated copper wires twisted together to reduce electromagnetic
interference.
There are two main types:
i) Unshielded Twisted Pair (UTP): Used in Ethernet networks for short to medium distances.
ii) Shielded Twisted Pair (STP): Provides additional protection against electromagnetic interference,
commonly used in industrial environments.
2) Coaxial Cable: Coaxial cables consist of a central conductor surrounded by an insulating layer, a
metallic shield, and an outer insulating layer.
They are commonly used in cable television (CATV) networks and high-speed internet connections.
3) Optical Fiber Cable: Optical fiber cables transmit data signals using light pulses instead of electrical
signals. They offer high bandwidth, low attenuation (signal loss), and resistance to electromagnetic
interference. Optical fiber cables are widely used in long-distance communication networks, such as
internet backbone connections and telecommunications.
b) Unguided Media: Unguided media, also known as wireless media, transmit data signals through the
air without the use of physical cables. These signals propagate freely in the surrounding environment.
1) Radio Waves: Radio waves are electromagnetic waves with frequencies ranging from kilohertz to
gigahertz. They are used in wireless communication technologies such as Wi-Fi, Bluetooth, cellular
networks, and radio broadcasting.
2) Microwaves: Microwaves have higher frequencies than radio waves, typically in the gigahertz range.
They are used for point-to-point communication links, such as microwave transmission towers for long-
distance communication and satellite communication.
3) Infrared: Infrared waves have frequencies lower than visible light and higher than microwaves.
They are commonly used for short-range communication, such as remote controls, infrared data
transmission between devices, and infrared-based proximity sensors.
4) Light Waves: Light waves, including visible light and ultraviolet waves, can also be used for wireless
communication.
For example, Li-Fi (Light Fidelity) technology uses visible light to transmit data wirelessly, offering high-
speed communication in indoor environments.
Unguided media offer the advantage of mobility and flexibility since they do not require physical
cables. However, they are more susceptible to interference and attenuation compared to guided
media.
5) What are different classes of IP Addresses?
6) Explain IP Addresses with ranges & number of Networks and Hosts in each class.
An IP address is the identifier that enables your device to send or receive data packets across the
internet. It holds information related to your location and therefore making devices available for two-
way communication. The internet requires a process to distinguish between different networks,
routers, and websites. Therefore, IP addresses provide the mechanism of doing so, and it forms an
indispensable part in the working of the internet.
IP addresses are classified into several classes based on the number of network bits and host bits they
contain. However, with the introduction of Classless Inter-Domain Routing (CIDR), the traditional
concept of IP address classes has become less relevant. Nevertheless, here are the historical classes of
IP addresses:
Class A:
Range: 1.0.0.0 to 126.255.255.255
First octet ranges from 1 to 126, with the first bit always set to 0.
The remaining 7 bits in the first octet represent the network portion of the address, while the remaining 24
bits represent the host portion.
Number of Networks: 2^7 - 2 = 126 (subtracting 2 for reserved addresses)
Number of Hosts per Network: 2^24 - 2 = 16,777,214 (subtracting 2 for network and broadcast addresses)
Example: 10.0.0.1, 49.123.45.67
Class B:
Range: 128.0.0.0 to 191.255.255.255
First octet ranges from 128 to 191, with the first two bits always set to 10.
The remaining 14 bits in the first two octets represent the network portion of the address, while the
remaining 16 bits represent the host portion.
Number of Networks: 2^14 - 2 = 16,384 (subtracting 2 for reserved addresses)
Number of Hosts per Network: 2^16 - 2 = 65,534 (subtracting 2 for network and broadcast addresses)
Example: 172.16.0.1, 150.200.1.10
Class C:
Range: 192.0.0.0 to 223.255.255.255
First octet ranges from 192 to 223, with the first three bits always set to 110.
The remaining 21 bits in the first three octets represent the network portion of the address, while the
remaining 8 bits represent the host portion.
Number of Networks: 2^21 - 2 = 2,097,152 (subtracting 2 for reserved addresses)
Number of Hosts per Network: 2^8 - 2 = 254 (subtracting 2 for network and broadcast addresses)
Example: 192.168.1.1, 200.10.20.30
High-Speed Connectivity: Gigabit Ethernet provides significantly higher speeds compared to previous
Ethernet standards, making it suitable for demanding applications that require fast data transfer rates.
Backward Compatibility: Gigabit Ethernet is backward compatible with older Ethernet standards, allowing
for seamless integration with existing network infrastructure. It can operate at lower speeds (such as 100
Mbps or 10 Mbps) when connected to devices or networks that do not support Gigabit Ethernet.
Physical Medium: Gigabit Ethernet can be deployed over various physical media types, including twisted
pair copper cables (such as Cat 5e, Cat 6, Cat 6a), fiber optic cables (both multimode and single-mode), and
even wireless connections (using Wi-Fi standards like 802.11ac).
Duplex Modes: Gigabit Ethernet supports both half-duplex and full-duplex operation. Full-duplex mode
allows simultaneous transmission and reception of data, effectively doubling the potential bandwidth
compared to half-duplex mode.
Applications: Gigabit Ethernet is widely used in various applications, including high-speed internet access
for homes and businesses, local area network (LAN) connectivity in office environments, data center
networking for server-to-server communication and storage area networks (SANs), and backbone
connections in campus networks and metropolitan area networks (MANs).
Improved Performance: The high-speed connectivity provided by Gigabit Ethernet improves network
performance, reduces latency, and enhances overall user experience, particularly in bandwidth-intensive
environments where large volumes of data need to be transferred quickly and efficiently.
In summary, Gigabit Ethernet is a fundamental technology for modern networking, offering high-speed
connectivity and ample bandwidth to support the growing demands of today's digital world.
8) Calculate the check-summed frame to be Transmitted for a given frame 1101011011 using the
generator G(x) = x4 + x + 1.
12) What are different Sliding Window Protocols? Explain any one.
There are two types of Sliding Window Protocol –
Go-Back-N ARQ
Selective Repeat ARQ
a) Go-Back-N ARQ - Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It
is a data link layer protocol that uses a sliding window method. In this, if any frame is corrupted or lost,
all subsequent frames have to be sent again.
b) Selective Repeat ARQ - Selective Repeat ARQ is also known as the Selective Repeat Automatic
Repeat Request. If the receiver receives a corrupt frame, it does not directly discard all the frames. It
sends a negative acknowledgment to the sender. The sender sends that frame again as soon as on the
receiving negative acknowledgment.
Version (4 bits): Indicates the version of the IP protocol being used. For IPv4, this field has a fixed value
of 4.
IHL (Internet Header Length) (4 bits): Specifies the length of the IPv4 header in 32-bit words. This field
is needed because the IPv4 header length can vary due to the presence of optional fields such as
options.
Type of Service (TOS) (8 bits): Originally designed to specify the quality of service (QoS) for the packet,
this field has been largely replaced by Differentiated Services Code Point (DSCP) and Explicit Congestion
Notification (ECN) fields in modern networks.
Total Length (16 bits): Indicates the total length of the IPv4 packet, including the header and data, in
bytes.
Identification (16 bits): Used for fragmentation and reassembly of IP packets. Each packet originating
from a source is assigned a unique identification value.
Time to Live (TTL) (8 bits): Prevents packets from looping indefinitely in the network. Decremented by
one each time the packet traverses a router. When TTL reaches 0, the packet is discarded.
Protocol (8 bits): Specifies the higher-layer protocol used by the data in the packet. For example, 6 for
TCP, 17 for UDP, etc.
Header Checksum (16 bits): Used to verify the integrity of the IPv4 header. The checksum is calculated
over the header fields only and is recalculated at each hop to ensure that the header hasn't been
corrupted.
Source IP Address (32 bits): Specifies the IP address of the sender of the packet.
Destination IP Address (32 bits): Specifies the IP address of the intended recipient of the packet.
Options (Variable length): Optional fields that can be used for various purposes, such as record route,
strict source routing, etc.
Padding (Variable length): Used to ensure that the IPv4 header is a multiple of 32 bits in length. It
consists of zero bits and is added if the length of the header is not already a multiple of 32 bits.
Version (4 bits): Specifies the version of the Internet Protocol being used. For IPv6, the value is 6.
Traffic Class (8 bits): Provides Quality of Service (QoS) information and differentiated services for
packet prioritization. It replaces the Type of Service (ToS) field in IPv4.
Flow Label (20 bits): Used for flow identification and handling by routers in a network. It ensures that
packets belonging to the same flow receive consistent treatment.
Payload Length (16 bits): Indicates the length of the IPv6 payload (data) in bytes. This includes the data
following the IPv6 header but excludes the header itself.
Next Header (8 bits): Specifies the type of the next header following the IPv6 header. It indicates the
protocol or extension header that immediately follows the IPv6 header.
Hop Limit (8 bits): Similar to the Time to Live (TTL) field in IPv4, the Hop Limit field specifies the
maximum number of hops (routers) that a packet can traverse before being discarded.
Source Address (128 bits): Contains the IPv6 address of the packet's source, identifying the originator
of the packet.
Destination Address (128 bits): Contains the IPv6 address of the packet's destination, specifying where
the packet should be delivered.
15) What are different types of Routing Algorithms? Explain any one
Link state Routing Protocol –
However, in the above arrangement, traffic load doubles for each data unit that is transmitted. Half of
all data transmission comprise of transmission of acknowledgments.
So, a solution that provides better utilization of bandwidth is piggybacking. Here, sending of
acknowledgment is delayed until the next data frame is available for transmission. The
acknowledgment is then hooked onto the outgoing data frame. The data frame consists of an ack field.
The size of the ack field is only a few bits, while an acknowledgment frame comprises of several bytes.
Thus, a substantial gain is obtained in reducing bandwidth requirement.
Working Principle
Suppose that there are two communication stations X and Y. The data frames transmitted have an
acknowledgment field, ack field that is of a few bits length. Additionally, there are frames for sending
acknowledgments, ACK frames. The purpose is to minimize the ACK frames.
The three principles governing piggybacking when the station X wants to communicate with station
Y are −
If station X has both data and acknowledgment to send, it sends a data frame with the ack field
containing the sequence number of the frame to be acknowledged.
If station X has only an acknowledgment to send, it waits for a finite period of time to see whether a
data frame is available to be sent. If a data frame becomes available, then it piggybacks the
acknowledgment with it. Otherwise, it sends an ACK frame.
If station X has only a data frame to send, it adds the last acknowledgment with it. The station Y
discards all duplicate acknowledgments. Alternatively, station X may send the data frame with the ack
field containing a bit combination denoting no acknowledgment.
FDM
These different regions of the electromagnetic spectrum have diverse properties and applications,
ranging from everyday technologies like radio and microwave communication to advanced medical
imaging techniques like X-rays and gamma rays.