Acn Weekly Test Question Bank

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

1.

Explain fields and subfields of OPTION format:


The OPTION format in IP headers allows the transmission of additional
functionalities that aren't covered by the basic header. Options consist of:
o Option Type: Defines the option's purpose.
o Option Length: Indicates the total length of the option field.
o Option Data: Holds the option-specific data.
2. State flags used in Fragmentation; explain fragmentation with a simple example:
Flags in fragmentation include:
o DF (Don't Fragment): Signals that the packet cannot be fragmented.
o MF (More Fragments): Indicates whether more fragments are to follow.
o Fragment Offset: Specifies where the fragment fits in the entire data.

Example: A 4000-byte packet that needs to be transmitted over a network with a


maximum transmission unit (MTU) of 1500 bytes will be fragmented as:

o Fragment 1: 1500 bytes, MF = 1


o Fragment 2: 1500 bytes, MF = 1
o Fragment 3: 1000 bytes, MF = 0 (indicating it's the last fragment).
3. Give significance of Auto-configuration and Re-numbering concepts and explain
in detail:
o Auto-configuration: It allows a device to configure its IP address without
manual intervention, which simplifies the process in large networks.
o Re-numbering: The process of changing the IP addressing scheme of a
network. This is crucial in IPv6 for easy network expansion or when networks
merge. Devices are reconfigured without user input, using protocols like
DHCPv6.
4. Give IP address representation notations in IPv6:
IPv6 uses 128-bit addresses, usually represented as eight groups of four hexadecimal
digits, separated by colons (:). Leading zeros in a group can be omitted, and
consecutive groups of zeros can be replaced by ::.
Example: 2001:0db8:0000:0000:0000:ff00:0042:8329 can be compressed to
2001:db8::ff00:42:8329.
5. Describe static dynamic translation and load balancing:
o Static Translation: In NAT (Network Address Translation), it involves a one-
to-one mapping between internal and external IP addresses.
o Dynamic Translation: Dynamically assigns an external IP to an internal one
as needed.
o Load Balancing: Distributes traffic across multiple servers or devices to
optimize resource use, prevent overload, and improve performance.
6. Enlist blocks of IPv4 header; explain any one in short:
The IPv4 header contains:
o Version
o IHL (Internet Header Length)
o DSCP/ECN (Differentiated Services/Explicit Congestion Notification)
o Total Length
o Identification
o Flags
o Fragment Offset
o Time to Live (TTL)
o Protocol
o Header Checksum
o Source IP Address
o Destination IP Address
Example: Time to Live (TTL): This field prevents packets from looping
endlessly in the network. Each router reduces TTL by 1; when it reaches 0, the
packet is discarded.
7. Enlist types/categories of OPTION:
There are two main types of options in IP headers:
o Hop-by-hop options: Processed by every router along the packet's path.
o Destination options: Processed only by the packet's destination.
8. State benefits/comparison of IPv6 over IPv4:
o Larger address space (128-bit vs. 32-bit)
o Simplified header format for efficient processing
o Built-in security features with IPsec
o Better support for Quality of Service (QoS)
o Stateless address auto-configuration (SLAAC)
o Improved multicast support
o Elimination of NAT
9. Draw IPv6 Header format in detail:
The IPv6 header includes:
o Version (4 bits)
o Traffic Class (8 bits)
o Flow Label (20 bits)
o Payload Length (16 bits)
o Next Header (8 bits)
o Hop Limit (8 bits)
o Source Address (128 bits)
o Destination Address (128 bits)
10. Give IP address representation notations in IPv4:
IPv4 addresses are 32 bits, represented in decimal notation as four 8-bit groups
(octets), separated by dots.
Example: 192.168.1.1.
11. Draw formats of IPv6 Extension Header types:
The common extension headers in IPv6 are:

 Hop-by-Hop Options Header


 Routing Header
 Fragment Header
 Destination Options Header
 Authentication Header (AH)
 Encapsulating Security Payload (ESP) Header

12. Draw IPv6 Address Representation (EUI-64) for Global and Stateless Auto-
configuration:
Stateless auto-configuration in IPv6 uses the EUI-64 format, which converts a 48-bit
MAC address to a 64-bit interface identifier by inserting FFFE in the middle and
inverting the 7th bit.
13. Explain Dual Stack IP implementation:
Dual Stack refers to running IPv4 and IPv6 simultaneously on the same network.
Devices and applications can handle both protocols, ensuring compatibility during the
transition from IPv4 to IPv6.
14. Describe transition from IPv4 to IPv6:
The transition from IPv4 to IPv6 can be achieved through:

 Dual Stack: Running both IPv4 and IPv6 simultaneously.


 Tunneling: Encapsulating IPv6 packets within IPv4 packets to travel across IPv4
networks.
 NAT64: Allows IPv6-only devices to communicate with IPv4 devices using
translation.

15. Explain strategies of transition with diagrams:


The three main strategies include:

 Dual Stack: Devices run both IPv4 and IPv6.


 Tunneling: IPv6 packets are tunneled inside IPv4 packets.
 Header Translation: IPv4 and IPv6 headers are translated to allow communication
between them.

16. Draw IPv4 header and explain its blocks in short:


The IPv4 header contains:

 Version: IP version (4 for IPv4)


 IHL: Header length
 Type of Service: Priority of the packet
 Total Length: Size of the entire packet
 Identification: Used for packet reassembly
 Flags: Control fragmentation
 Fragment Offset: Position of this fragment in the original packet
 TTL: Limits the packet's lifetime in the network
 Protocol: Indicates the upper-layer protocol (e.g., TCP, UDP)
 Header Checksum: Validates the integrity of the header
 Source IP: Sender’s IP address
 Destination IP: Receiver’s IP address

17. Draw IPv6 header and explain its blocks in short:


The IPv6 header consists of 8 fields, unlike IPv4’s 14. This simplification allows for
faster processing:

 Version (4 bits): Indicates the IP version (6 for IPv6).


 Traffic Class (8 bits): Used for QoS (Quality of Service).
 Flow Label (20 bits): Helps to identify traffic flows requiring special handling.
 Payload Length (16 bits): Indicates the size of the payload following the header.
 Next Header (8 bits): Identifies the type of extension header or upper-layer protocol
(e.g., TCP, UDP).
 Hop Limit (8 bits): Decrements at each hop, similar to TTL in IPv4.
 Source Address (128 bits): The address of the sender.
 Destination Address (128 bits): The address of the receiver.
18. Draw and explain RIP message format in detail:
A RIP (Routing Information Protocol) message format consists of:

 Command (16 bits): Specifies whether the message is a request or response.


 Version (16 bits): Indicates the version of RIP (1 or 2).
 Address Family Identifier (16 bits): Indicates the address family used (IPv4 or
IPv6).
 Route Tag (16 bits): A tag assigned to the route.
 IP Address (32 bits): The IP address of the destination network.
 Subnet Mask (32 bits): Used for classless addressing.
 Next Hop (32 bits): Specifies the next router in the path.
 Metric (32 bits): The cost of the route.

19. Describe Router Solicitation and Router Advertisement:

 Router Solicitation (RS): A message sent by a host to discover routers on the local
link.
 Router Advertisement (RA): A message sent by routers in response to RS,
containing information like the prefix and default gateway that the host can use.

20. Differentiate static and dynamic routing (any four points):

 Configuration: Static routing requires manual setup, while dynamic routing


automatically updates using routing protocols.
 Adaptability: Static routes do not adapt to changes, while dynamic routes can change
based on network conditions.
 Overhead: Static routing has no overhead, whereas dynamic routing requires
processing power and bandwidth.
 Scalability: Static routing is difficult to scale in large networks, while dynamic
routing is suitable for large, complex networks.

21. Explain types of OSPF Packets in detail:

 Hello Packet: Establishes and maintains neighbor relationships.


 Database Description Packet: Describes the contents of the router's link-state
database.
 Link State Request Packet: Requests specific parts of a router's database.
 Link State Update Packet: Contains updated information about the state of links.
 Link State Acknowledgment Packet: Acknowledges the receipt of link state update
packets.

22. Explain ICMP message categories: Query and Error reporting with
subcategories in short:

 Query Messages: Include Echo Request/Reply (used for ping), and Address Mask
Request/Reply.
 Error Reporting Messages: Include Destination Unreachable, Time Exceeded, and
Parameter Problem.

23. Explain Border Gateway Protocol (BGP) and state any two characteristics:
 BGP: A protocol used for exchanging routing information between autonomous
systems (AS).
 Characteristics:
o Path Vector Protocol: Uses path information (the AS path) to determine the
best route.
o Policy-Based Routing: Routes are selected based on policies set by the
network administrators.

24. Explain: 1) Distance Vector Protocol 2) Link State Protocol:

 Distance Vector Protocol: Routes are calculated based on distance metrics (hop
count). Each router sends its routing table to its neighbors.
 Link State Protocol: Routers have full knowledge of the network topology. Each
router computes the shortest path to every other router using algorithms like
Dijkstra's.

25. Explain types of Links used in OSPF:

 Point-to-Point Link: Direct connection between two routers.


 Broadcast Link: A network where a single packet can reach multiple routers.
 Non-Broadcast Link: Simulates a broadcast link over non-broadcast networks, like
Frame Relay.

26. Explain Link Local steps using stateless auto configuration:

In IPv6, stateless auto-configuration allows devices to configure their own IP addresses


without requiring a DHCP server. The steps involved in Link Local stateless auto-
configuration are:

1. Generation:
The device generates a link-local address based on its MAC address. It uses the EUI-
64 format, which inserts FFFE in the middle of the MAC address.
2. Uniqueness Test (Duplicate Address Detection - DAD):
The device sends a Neighbor Solicitation (NS) message to ensure that no other device
on the network is using the same address. If a Neighbor Advertisement (NA) is
received in response, the address is already in use, and the process fails.
3. Address Assignment:
If the address is unique (no response to the NS message), the link-local address is
assigned to the interface.
4. Router Contact:
The device contacts a router by sending a Router Solicitation (RS) message to obtain
more configuration information.
5. Router Direction:
The router responds with a Router Advertisement (RA), which includes information
about global prefixes, default gateways, and whether to use stateful auto-configuration
(DHCPv6).
6. Global Address Configuration:
If global configuration is required, the device generates a globally unique address
based on the prefix provided in the RA message and completes the stateless auto-
configuration.
27. List and explain RIP timers:

RIP (Routing Information Protocol) uses the following timers to manage routing updates and
maintain route accuracy:

1. Periodic Timer:
Defines how often a router sends out its routing table updates. The default value is 30
seconds.
2. Expiration Timer (Invalid Timer):
If a route isn't updated or refreshed within the expiration time, the route is marked as
invalid. The default value is 180 seconds.
3. Garbage Collection Timer:
After a route is marked invalid, it remains in the routing table for this period before
being removed entirely. During this time, it is still advertised with an infinite metric.
The default value is 240 seconds.
4. Flush Timer:
Specifies the time it takes for a route to be removed from the routing table after it
becomes invalid. This is often set slightly longer than the expiration timer to allow
updates to come in before the route is flushed.

28. Enlist any 8 features of OSPF routing:

1. Classless:
OSPF supports Variable Length Subnet Mask (VLSM) and Classless Inter-Domain
Routing (CIDR).
2. Link-State Algorithm:
OSPF uses Dijkstra’s algorithm to calculate the shortest path, providing faster
convergence than distance-vector protocols.
3. Fast Convergence:
OSPF converges quickly due to its use of link-state advertisements (LSAs) and
incremental updates.
4. Supports Hierarchical Routing:
OSPF divides large networks into smaller areas, reducing the size of routing tables
and improving efficiency.
5. Multicast Support:
OSPF uses multicast addresses to communicate with routers, reducing network traffic
(using 224.0.0.5 for all OSPF routers and 224.0.0.6 for OSPF DR/BDR).
6. Load Balancing:
OSPF supports equal-cost load balancing, allowing traffic to be distributed over
multiple paths with equal cost.
7. Authentication:
OSPF can authenticate routing updates, providing security against unauthorized
routing information.
8. Support for IPv4 and IPv6:
OSPFv2 is used for IPv4, and OSPFv3 is used for IPv6, offering broad support across
network environments.
29. Give significance of ICMP Checksum; give an example of checksum calculation:

The ICMP (Internet Control Message Protocol) Checksum is used to ensure the integrity
of ICMP messages. It detects errors in the header and data during transmission. If the
checksum value does not match upon receipt, the packet is discarded, and an error may be
generated.

Example of checksum calculation:

 Divide the message into 16-bit words.


 Add all the words together.
 If there is a carry-over, add it back to the sum.
 Take the one’s complement (invert all the bits).

For instance, if the message is 4500 0034 1c46 4000, the sum is 1dce, and the one's
complement is e231. This becomes the checksum.

30. Describe given types of BGP Messages: 1) Open, 2) Update, 3) Keep-alive, 4)


Notification:

1. Open:
This message establishes a connection between two BGP peers. It contains
information like the BGP version, AS (Autonomous System) number, and hold time.
2. Update:
The most important BGP message, it is used to advertise new routes or withdraw
previously advertised routes.
3. Keep-alive:
Sent periodically to ensure that the connection between BGP peers remains active and
functional. If not received within the hold time, the connection is considered down.
4. Notification:
Sent when an error is detected. It terminates the connection between peers, providing
details about the error.

31. Describe any one in detail: 1) Triangular Routing 2) Double Crossing:

1. Triangular Routing:
Occurs in mobile IP networks when packets travel through the mobile node's home
network even if the communication is between two nodes on the same foreign
network. This leads to inefficiency and increased latency.

Example: A mobile node is connected to a foreign network, and a correspondent node


sends a packet. The packet first goes to the mobile node's home agent, which then
forwards it to the mobile node, even though the mobile node could be in the same
local network as the correspondent node.

2. Double Crossing:
Refers to the situation in which packets cross the same network boundary multiple
times, often because of inefficient routing policies or network configurations. This
can cause increased latency and bandwidth usage, especially in international or long-
distance communications.

32. Explain routing example with graph and routing tables for each node; assume any
node diagram:

In this example, let’s assume a simple network with four routers (A, B, C, D). Each router has
a direct link to its neighboring routers. Using the Dijkstra’s shortest path algorithm or
another suitable algorithm, the routing tables are filled with the shortest path to each
destination node. The routing table includes the destination, next hop, and the cost (hop count
or metric).

 Router A’s table:

Destination Next Hop Cost


B B 1
C B 2
D B 3

 Router B’s table:

Destination Next Hop Cost


A A 1
C C 1
D C 2

 Router C’s table:

Destination Next Hop Cost


A B 2
B B 1
D D 1

 Router D’s table:

Destination Next Hop Cost


A C 3
B C 2
C C 1

32. Explain Dijkstra’s shortest path algorithm:


Dijkstra's algorithm calculates the shortest path from a source node to all other nodes
in a graph. It assigns a tentative distance to every node, starting from the source. The
algorithm iterates, selecting the node with the smallest tentative distance, updating the
distances of its neighbors, and repeating until all nodes are processed.
33. Explain Bellman-Ford algorithm:
The Bellman-Ford algorithm computes the shortest paths from a single source vertex
to all other vertices in a graph. Unlike Dijkstra, it can handle graphs with negative-
weight edges. The algorithm iterates, relaxing all edges repeatedly, and checks for
negative-weight cycles.
34. List advantages of RIP V1/V2, OSPF, BGP:

 RIP V1/V2: Simple to configure, suitable for small networks.


 OSPF: Scales well for larger networks, faster convergence, supports VLSM and
CIDR.
 BGP: Scalable, policy-based routing, used for inter-domain routing.

36. Explain Record Route, Strict Source-route Record, Loose Source-route Record:

 Record Route: Option in the IP header that records the route taken by a packet.
 Strict Source-route Record: Specifies the exact route a packet must take through the
network.
 Loose Source-route Record: Allows the packet to specify a partial route, with
intermediate routers deciding the rest

You might also like