0% found this document useful (0 votes)
9 views6 pages

438

Uploaded by

i4658764
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

438

Uploaded by

i4658764
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

a.What are the three criteria necessary for an effective and efficient network?

b.Mention the difference between a port address, a logical address and a physical address?

c.Draw the control Fields of HDLC Frames format and describe control field for I-frame.

2.

a.Describe the functions of each layer in the OSI model.

b.Define protocol?What are the key elements of a protocol?

c.Describe briefly four level of addresses employing in TCP/IP internet model.

3.

a.Write the Subnet Mask, Subnet Address, Broadcast Address and valid Hostel range for the following
addresses.

192.168.1.66/27

192.168.1.5/28

b.A network of three Local Area Networks LAN 1, LAN 2 and LAN3.These three LANs are connected with three
serial links:link F ,link G and link H.Design an IP plan if your classless IP is 192.168.10.0/24 using VLSM.

4.

a.Write down the function of LLC and MAC.

b.Describe 802.3 MAC frame format?

c.Compare between X.25 and Frame Relay

5.

a.Explain DNS with example.

b.What is the difference between a primary server and a secondary server?

c.In electronic mail,What is MIME?

d.Why do we need POP3 or IMAP4 for electronic mail?

6.

a Write down the role of HTTP protocol in brief.

b.Describe AAL of ATM architecture.

c.Write down the transition strategies from IPV4 to IPV6?

7.

a.Whar are the difference between UDP and TCP?

b.Discuss three way of Handshaking in TCP connection establishment.

c.Why MIME is important for E-mail?

d.Describe the role of SMTP as a MTA.

Like
0

AnswerCreated with AI

1 year ago

Question 1

a. The three criteria necessary for an effective and efficient network are:

 Reliability: The network should be able to deliver data accurately and consistently without errors or
loss.

 Performance: The network should provide sufficient bandwidth and low latency to meet the needs of
the users and applications.

 Scalability: The network should be able to accommodate growth and handle increased traffic without
significant degradation in performance.

b. The difference between a port address, a logical address, and a physical address is as follows:

 Port Address: It is a specific number assigned to a process or application running on a device. It helps in
identifying the specific service or application that the data needs to be sent to within a device.

 Logical Address: It is an address assigned to a device on a network, such as an IP address. It helps in


identifying the device within a network.

 Physical Address: It is a unique identifier assigned to a network interface card (NIC) or network adapter.
It is also known as a MAC address and is used to identify a device on a physical network.

c. The control fields of HDLC (High-Level Data Link Control) frame format include:

 Flag: Marks the beginning and end of the frame.

 Address: Specifies the destination address.

 Control: Contains control information, such as frame type and sequence number.

 Information: Carries the actual data being transmitted.

 FCS (Frame Check Sequence): Provides error detection.

For an I-frame (Information frame), the control field contains the sequence number and other control
information related to the reliable delivery of data.

Question 2

a. The functions of each layer in the OSI model are as follows:

 Physical Layer: Handles the physical transmission of data over the network, including the electrical,
mechanical, and timing aspects.

 Data Link Layer: Provides error-free transmission of data frames between adjacent network nodes and
handles flow control and error detection.

 Network Layer: Manages the addressing and routing of data packets across multiple networks.

 Transport Layer: Ensures reliable and efficient end-to-end delivery of data, including segmentation,
reassembly, and error recovery.

 Session Layer: Establishes, manages, and terminates sessions between applications.


 Presentation Layer: Handles data formatting, encryption, and compression for the application layer.

 Application Layer: Provides network services to applications and enables user interaction with the
network.

b. A protocol is a set of rules and procedures that govern the communication between devices on a network.
The key elements of a protocol include message formats, syntax, semantics, timing, and error handling.

c. The four levels of addresses employed in the TCP/IP internet model are:

 Physical Address: Also known as a MAC address, it is a unique identifier assigned to a network interface
card (NIC) and operates at the data link layer.

 IP Address: Identifies a device on a network and operates at the network layer.

 Port Address: Identifies a specific service or application running on a device and operates at the
transport layer.

 URL (Uniform Resource Locator): Identifies the location of a resource on the internet and operates at
the application layer.

Question 3

a. For the given addresses:

 192.168.1.66/27:

o Subnet Mask: 255.255.255.224

o Subnet Address: 192.168.1.64

o Broadcast Address: 192.168.1.95

o Valid Host Range: 192.168.1.65 to 192.168.1.94

 192.168.1.5/28:

o Subnet Mask: 255.255.255.240

o Subnet Address: 192.168.1.0

o Broadcast Address: 192.168.1.15

o Valid Host Range: 192.168.1.1 to 192.168.1.14

b. To design an IP plan using VLSM for a network of three LANs (LAN 1, LAN 2, and LAN 3) connected with three
serial links (link F, link G, and link H) and the classless IP 192.168.10.0/24, the following steps can be followed:

1. Determine the number of hosts required for each LAN.

2. Assign a subnet to each LAN based on the number of hosts required, using VLSM.

3. Assign IP addresses to each LAN and the serial links, ensuring they are within the assigned subnets.

4. Configure the routing tables on the routers to enable communication between the LANs.

Question 4

a. The function of LLC (Logical Link Control) is to provide a reliable and error-free data link layer protocol. It
handles flow control, error detection, and error recovery.

The function of MAC (Media Access Control) is to control access to the physical medium and manage the
transmission of data frames between network nodes.
b. The 802.3 MAC frame format, also known as Ethernet frame format, consists of the following fields:

 Preamble: Helps in synchronization and signaling the start of a frame.

 Destination MAC Address: Specifies the MAC address of the intended recipient.

 Source MAC Address: Specifies the MAC address of the sender.

 Length/Type: Indicates the length of the data or the type of protocol being used.

 Data: Carries the actual data being transmitted.

 FCS (Frame Check Sequence): Provides error detection.

c. X.25 and Frame Relay are both WAN (Wide Area Network) protocols, but they have some differences:

 X.25: Provides reliable and connection-oriented communication over analog or digital networks. It uses
virtual circuits and supports error detection and correction. It operates at the data link layer.

 Frame Relay: Provides fast and efficient communication over digital networks. It uses virtual circuits but
does not provide error detection or correction. It operates at the data link layer and is more suitable for
high-speed data transmission.

Question 5

a. DNS (Domain Name System) is a hierarchical naming system that translates domain names
(e.g., www.example.com) into IP addresses (e.g., 192.0.2.1). It allows users to access websites using human-
readable domain names instead of IP addresses. For example, when a user enters a domain name in a web
browser, DNS resolves the domain name to the corresponding IP address.

b. The difference between a primary server and a secondary server in DNS is as follows:

 Primary Server: Also known as the master server, it is the authoritative server that holds the original
and up-to-date DNS zone data for a domain. It can make changes to the zone data.

 Secondary Server: Also known as the slave server, it is a backup server that obtains a copy of the DNS
zone data from the primary server. It can respond to DNS queries but cannot make changes to the zone
data.

c. MIME (Multipurpose Internet Mail Extensions) is a standard that extends the capabilities of email to support
different types of content, such as text, images, audio, and video. It allows email clients to encode and decode
non-text attachments and handle different content types. MIME enables the exchange of multimedia content
through email.

d. POP3 (Post Office Protocol version 3) and IMAP4 (Internet Message Access Protocol version 4) are protocols
used for retrieving email from a mail server. They provide different methods for accessing and managing email:

 POP3: Downloads email from the server to the client device and typically deletes the email from the
server. It is suitable for users who access email from a single device.

 IMAP4: Synchronizes email between the server and multiple client devices. It allows users to access and
manage email from different devices while keeping the email stored on the server.

Question 6

a. The role of the HTTP (Hypertext Transfer Protocol) protocol is as follows:

 It is the foundation of data communication for the World Wide Web.

 It defines how web browsers and web servers communicate and exchange data.
 It enables the retrieval and display of web pages, handling requests and responses between clients and
servers.

 It supports various methods, such as GET, POST, PUT, and DELETE, for interacting with web resources.

b. AAL (ATM Adaptation Layer) is a layer in the ATM (Asynchronous Transfer Mode) architecture that adapts
different types of data into cells for transmission over an ATM network. It provides segmentation and
reassembly of data, as well as error control and flow control mechanisms.

c. The transition strategies from IPv4 to IPv6 include:

 Dual Stack: Running both IPv4 and IPv6 protocols simultaneously on network devices to ensure
compatibility during the transition period.

 Tunneling: Encapsulating IPv6 packets within IPv4 packets to transport them over an IPv4 network.

 Translation: Converting IPv6 packets into IPv4 packets and vice versa at network gateways to enable
communication between IPv4 and IPv6 networks.

 Gradual Deployment: Implementing IPv6 gradually by upgrading network devices and infrastructure
over time, while maintaining backward compatibility with IPv4.

Question 7

a. The differences between UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) are as
follows:

 Reliability: UDP is a connectionless protocol that does not guarantee reliable delivery of data. TCP is a
connection-oriented protocol that ensures reliable and ordered delivery of data.

 Ordering: UDP does not guarantee the order of delivery of data packets. TCP ensures that data packets
are delivered in the same order they were sent.

 Flow Control: UDP does not provide flow control mechanisms. TCP uses flow control to manage the rate
of data transmission between sender and receiver.

 Error Checking: UDP provides basic error checking through checksums. TCP provides extensive error
checking and error recovery mechanisms.

 Overhead: UDP has lower overhead compared to TCP, making it faster but less reliable. TCP has higher
overhead due to its reliability mechanisms.

b. The three-way handshake is a method used by TCP to establish a connection between a client and a server. It
involves the following steps:

1. SYN: The client sends a SYN (synchronize) packet to the server, indicating its desire to establish a
connection.

2. SYN-ACK: The server responds with a SYN-ACK (synchronize-acknowledge) packet, acknowledging the
client's request and indicating its readiness to establish a connection.

3. ACK: The client sends an ACK (acknowledge) packet to the server, confirming the establishment of the
connection.

c. MIME (Multipurpose Internet Mail Extensions) is important for email because it allows the inclusion of non-
text content, such as images, audio, and video, in email messages. It enables email clients to handle different
content types and ensures compatibility across different email systems.
d. SMTP (Simple Mail Transfer Protocol) is a Mail Transfer Agent (MTA) responsible for the transmission of email
messages between mail servers. It handles the routing and delivery of email across networks, following a store-
and-forward mechanism. SMTP is used for sending outgoing email from a client to a server or between servers.

You might also like