Unit3 Question Bank
Unit3 Question Bank
Unit – 3
Question Bank
UNIT – 3
1. Interoperability: Ensure different devices and systems can work together smoothly.
2. Quality: Make sure technology meets high performance and safety levels.
3. Consistency: Provide a consistent way of building systems, so manufacturers can rely
on it.
4. Global Compatibility: Enable systems from different countries and companies to
communicate effectively.
5. Regulatory Compliance: Help businesses meet laws and safety rules.
Case Study: Ethernet (IEEE 802.3)
What is Ethernet?
School of C&IT 1
Computer Networks
Unit – 3
Ethernet, defined by IEEE 802.3, is a standard for connecting computers and devices in a
local area network (LAN). It started with slow speeds in the 1980s but has evolved to handle
much higher speeds (from 10 Mbps to over 100 Gbps).
Why is Ethernet Important?
1. Widely Used: Ethernet is the most common networking technology, used in homes,
offices, and data centers.
2. Growth and Adaptation: It has adapted over time to meet the needs of faster and
larger network
3. Security Issues: Ethernet networks face risks like unauthorized access to data.
Security features like encryption (MACsec) and authentication (802.1X) help protect
the data.
Security in Ethernet:
• MACsec Encryption: Protects data from being read or altered as it travels over
Ethernet.
• 802.1X Authentication: Ensures that only authorized devices can connect to the
network.
• VLANs (Virtual LANs): Helps separate traffic to improve security.
Challenges in Ethernet Security:
• Physical Security: Ethernet cables can be tapped, so encryption is needed to keep
data safe.
• Misconfiguration: If security features aren't set up correctly, networks can remain
vulnerable.
• Old Systems: Many older Ethernet networks don't have modern security, so they may
need upgrades.
Ans:
Aspect IPv4 IPv6
Address Size 32-bit (4 bytes) 128-bit (16 bytes)
Address Format Dotted decimal Hexadecimal, separated by colons (e.g.,
(e.g., 192.168.1.1) 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Total Addresses Approximately 4.3 Approximately 340 undecillion addresses
billion addresses
Header Size 20 bytes 40 bytes
School of C&IT 2
Computer Networks
Unit – 3
• Class A: The first bit of the first octet is always set to 0 (zero). Thus the first octet
ranges from 1 – 127. Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x
only. The IP range 127.x.x.x is reserved for loopback IP addresses. The default subnet
mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can have
126 networks (27-2) and 16777214 hosts (224-2). Designed for very large networks (e.g.,
ISPs or large organizations).
• Class B: An IP address which belongs to class B has the first two bits in the first octet
set to 10. Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet
mask for Class B is 255.255.x.x. Class B has 16384 (214) Network addresses and 65534
(216-2) Host addresses. Designed for medium-sized networks.
• Class C: The first octet of Class C IP address has its first 3 bits set to 110. Class C IP
addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C
School of C&IT 3
Computer Networks
Unit – 3
is 255.255.255.x. Class C gives 2097152 (221) Network addresses and 254 (28-2) Host
addresses. Designed for small networks.
• Class D: The very first four bits of the first octet in Class D IP addresses are set to 1110.
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved
for Multicasting. In multicasting data is not destined for a particular host, that is why
there is no need to extract host address from the IP address, and Class D does not have
any subnet mask. This class is reserved for multicast communication.
• Class E: This IP Class is reserved for experimental purposes only for R&D or Study.
IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this
class too is not equipped with any subnet mask.
IPv4 is considered classic because it was the first version of the Internet Protocol (IP)
address. The class-based addressing system was designed to provide a structured approach to
network addressing, efficiently allocate IP addresses based on network size, simplify routing
and network management and accommodate different network scales (small, medium, large).
However, it had certain drawbacks like inefficient address allocation, address space exhaustion,
rigid network size constraints due to which CIDR was developed in 1993 which addressed
these issues by allowing more precise control over subnetting and optimizing address
allocation. The principles of IPv4 addressing remain a cornerstone of network engineering.
School of C&IT 4
Computer Networks
Unit – 3
School of C&IT 5
Computer Networks
Unit – 3
• Data/Payload: Often includes the header of the original message that caused the
ICMP response, allowing detailed diagnostics.
For example:
• A Destination Unreachable message includes part of the original IP packet that
failed, helping Peer A diagnose what went wrong.
Simple messaging across two peers qualifies as communication, especially when ICMP is used.
ICMP facilitates critical functions such as error reporting, connectivity verification, and
diagnostics. It ensures that devices can exchange meaningful messages to adjust and maintain
network reliability, even in the absence of a direct connection or data transmission.
• These IP addresses are assigned to the devices that need to communicate with the
devices on global internet.
• public IP addresses are assigned t0 routers, which are devices that connect network
together. Router use these addresses to route traffic between different networks.
School of C&IT 6
Computer Networks
Unit – 3
• By using single public IP address for a network ,it reduces the number of attack
surfaces exposed to internet.
2.Private IP addresses:
• these Ips are used to identify devices within a private network such as home or
offices. these are only recognised within local network.
• using private IP addresses ,devices within a network are hidden from the public
internet, making it more difficult for attackers to target specific devices.
School of C&IT 7
Computer Networks
Unit – 3
3. Phase 3: Accounting
Server logs the session activities.
Records are stored for future reference.
School of C&IT 8
Computer Networks
Unit – 3
School of C&IT 9
Computer Networks
Unit – 3
• Limited Compatibility
IPv6 was designed to simplify routing and reduce overhead. Simplified header structure and
no NAT improve performance and increase efficiency in routing. With IPv4, the more complex
NAT configurations often translate into increased latency and inefficiency in the network.
Giving up IPv6 will slow down the development of faster, more efficient Internet
communication. IPv6 natively contains IPsec, which has built-in encryption and authentication.
Communications do not have this inherent feature in IPv4. This means that security is
accomplished with additional protocols. A return to IPv4 would negate any possibility of
integrated features since these are becoming the norm.
The IoT, cloud computing, and mobile networks have several advantages because of the more
rounded address-space provided by IPv6 and its more efficient routing system. This involves
bypassing an intermediary NAT device allowing IPv6 nodes to interconnect directly. If
technologies were to shift back to using IPv4, it would not only constrain the advancement of
such technologies but would also introduce further complexity in making deployments
realistic. Many regions, particularly in developing countries, are expanding their internet
infrastructure and adopting IPv6 directly. This is a trend. These regions are at a disadvantage
due to the potential for IPv4 replacement, which could result in sluggish global internet usage.
The internet's evolution would be negatively affected if IPv6 was completely replaced by
IPva4. The consequences would include increased address deficiency, lower network
performance, weak security, and slow down of technological advancements.
• Distance Vector Routing: Here, routers communicate with neighboring routers and
decide the routing based on distance to destination, like an example, RIP.
• Link State Routing. Each router has complete information about network topology.
Examples of the link-state protocols are: OSPF - "Open shortest path first.".
Advantages of routing algorithm:
Efficient Use of Network Resources:
Dynamic routing algorithms ensure bandwidth usage and reduce congestion by readjusting ro
utes dynamically due to current network conditions.
School of C&IT 10
Computer Networks
Unit – 3
• Fault Tolerance and Reliability: Dynamic routing algorithms can actually detect
link failures and auto-search for alternative paths so that data is delivered to the
receiver.
• Load Balancing:
So there is no bottleneck link when they distribute traffic across several paths.
• necessities of proposing routing algorithms in CN are:
• Evolving Network Architectures:
Traditional routing protocols could not meet new performance demands as the internet
of things (IoT) and 5G network and software-
defined networking (SDN) become prevalent.
• Quality of Service (QoS) Requirements: For example, video streaming and real-
time communication introduce new demands on routing algorithms preferring low
latency and high reliability of routes.
• Energy Efficiency: Energy-efficient routing then becomes an important
consideration in mobile and IoT networks to maximize the lifetime of devices.
• SecurityConcerns:Emerging new security challenges necessitate new algorithms in s
uch things as routing attacks and malicious nodes.
10. With the graph of minimum 7 nodes justify distance vector algorithm or Bellman
ford algorithm.
Ans:
The distance vector algorithm, also known as the bellman ford algorithm, is a routing
algorithm used to compute the shortest paths between nodes in a graph. It is iterative,
distributed, and uses the principle of relaxation to progressively find the shortest paths.
Adjacency Matrix:
School of C&IT 11
Computer Networks
Unit – 3
From/To A B C D E F G
A 0 4 3 ∞ ∞ ∞ ∞
B ∞ 0 ∞ 1 ∞ ∞ ∞
C ∞ ∞ 0 2 5 ∞ ∞
D ∞ ∞ ∞ 0 ∞ 3 ∞
E ∞ ∞ ∞ ∞ 0 1 ∞
F ∞ ∞ ∞ ∞ ∞ 0 2
G ∞ ∞ ∞ ∞ ∞ ∞ 0
Old Updated
Edge New Distance
Distance Node
School of C&IT 12
Computer Networks
Unit – 3
Old Updated
Edge New Distance
Distance Node
G = min(∞, 8 + 2) =
F → G (2) G=∞ G
10
Step2
repeat the relaxation for all edges. No changes occur in this iteration since all distances are
already optimal.
Updated
Edge Old Distance New Distance
Node
B = min(4, 0 + 4) =
A → B (4) B = 4 No Update
4
C = min(3, 0 + 3) =
A → C (3) C = 3 No Update
3
D = min(5, 4 + 1) =
B → D (1) D = 5 No Update
5
D = min(5, 3 + 2) =
C → D (2) D = 5 No Update
5
E = min(8, 3 + 5) =
C → E (5) E = 8 No Update
8
School of C&IT 13
Computer Networks
Unit – 3
Updated
Edge Old Distance New Distance
Node
F = min(8, 5 + 3) =
D → F (3) F = 8 No Update
8
F = min(8, 8 + 1) =
E → F (1) F = 8 No Update
8
G = min(10, 8 + 2)
F → G (2) G = 10 No Update
= 10
A 0
B 4
C 3
D 5
E 8
F 8
G 10
11. Is link state routing protocol an ideal approach for dynamic routing?
Ans:
Yes, the Link State Routing Protocol is often considered an ideal approach for
dynamic routing in many networks, especially large ones
School of C&IT 14
Computer Networks
Unit – 3
Link State Routing is a type of dynamic routing protocol where routers exchange information
about the state of their links (or connections) to other routers. Each router maintains a map
(or a Link State Database) of the network's topology, which it uses to make routing decisions.
It is ideal for dynamic routing
1. Quick Adaptation to Network Changes:
Link State protocols quickly detect changes in the network, like if a link goes down or
a new router is added. When a router detects a change, it immediately sends updated
information (called a "link-state advertisement" or LSA) to all other routers. This
helps the network adapt quickly to failures or changes.
2. Complete Knowledge of the Network:
Each router knows about the entire network topology (not just the next hop like in
Distance Vector). This complete map allows routers to make better routing decisions
because they have a global view of the network.
3. Scalability:
Link State protocols work well in large networks. Unlike Distance Vector protocols,
which can become slow and inefficient in large networks, Link State routing can scale
because each router only sends updates when necessary (not constantly).
4. Reduced Traffic Overhead:
While routers exchange information, they do so selectively and only when there is a
change. This reduces the constant flow of routing updates that can overwhelm the
network, which happens in other protocols like Distance Vector.
5. Faster Convergence:
Link State protocols generally converge faster than Distance Vector protocols. This
means that when there is a network failure, all routers quickly agree on the new best
routes, minimizing downtime and ensuring network reliability.
Examples of Link State Routing Protocols
• OSPF (Open Shortest Path First)
• IS-IS (Intermediate System to Intermediate System)
In short, Link State Routing protocols are great for dynamic routing because they provide a
robust, quick, and scalable way to adapt to network changes, ensuring optimal routing and
network efficiency.
12. What are spanning trees? How are these utilized in providing dynamic routing
under path vector approach?
Ans:
School of C&IT 15
Computer Networks
Unit – 3
• Avoiding Loops: In dynamic routing, loops can occur when multiple paths are used.
Spanning trees remove loops by ensuring only one unique path exists between nodes.
This prevents issues like endless packet forwarding.
• Efficient Route Discovery:A spanning tree ensures that all nodes are connected using
the minimum number of links. This reduces the complexity of route discovery by
eliminating redundant paths and focusing on the essential ones.
• Reducing Overhead:By limiting the number of paths, spanning trees reduce the
amount of routing information exchanged between nodes, saving bandwidth and
computational resources.
• Adapting to Failures:In case of link or node failure, the spanning tree helps the
routing protocol find an alternate path quickly without forming cycles, maintaining
network connectivity.
• Optimized Path Selection:Spanning trees ensure that the best paths are chosen based
on the network's metrics (e.g., hop count, latency, bandwidth).
School of C&IT 16
Computer Networks
Unit – 3
13. Explain routing information protocol / RIP with an example and support
providing tables
Ans:
It is a vector routing protocol that uses the hop count as the routing unit for finding
the most suitable path between the source and the destination.
Hop Count
Hop count is the number of routers that are between the source and the destination in a
network. RIP considers the path with the shortest number of hops as the best path to a remote
network hence placed in the routing table . RIP allows only 15 hops to reach any network. If
the packet does not reach the destination in 15 hop counts then the destination is considered
as unreachable.
Routing Table
Every RIP router maintains a routing table . These tables store the information of all the
destinations that the router knows it can reach. Each router interchange the information of
their routing table to their nearest neighbours. The routers broadcast the routing table
information every 30 seconds to their closest neighbours.
School of C&IT 17
Computer Networks
Unit – 3
Example: If you are the user and you want to reach google.com . There can be many paths
through which you can reach the server of Google. In the example below, the user has three
paths. RIP will count the number of routers required to reach the destination server from each
route. Then it would select that route that has a minimum number of paths.
The route 1 has 2 hop counts, route 2 has 3 hop counts and route 3 has 4 hop counts to
reach the destination server. So, the RIP will choose Route 1.
School of C&IT 18
Computer Networks
Unit – 3
• Hop count as metric: The primary metric used in RIP is the hop count, which
represents the number of routers a packet needs to traverse to reach a destination
network.
• Periodic updates: Routers periodically broadcast their routing table updates to their
neighbours at a set interval, ensuring all routers have the most recent routing
information.
Steps in RIP Algorithm
1. Initialization: Each router initializes its routing table with directly connected
networks.
2. Advertisement: Routers share their routing tables with neighbors at regular intervals.
3. Update:
o Routers update their tables using the Bellman-Ford algorithm:
§ Add the hop count from the advertisement.
§ If the updated route is better, replace the old route.
4. Loop Prevention:
o Maximum hop count: Prevents infinite loops.
o Split horizon: Avoids sending routes back on the interface they were learned.
o Route poisoning: Marks routes as unreachable.
o Hold down timer: Temporarily suppresses updates for failed routes.
School of C&IT 19
Computer Networks
Unit – 3
This diagram shows the format of a Routing Information Protocol (RIP) message, which
routers use to share routing information.
1. Header Fields:
o Command (Com): Indicates if it's a request (1) or response (2).
o Version (Ver): Specifies the RIP version (1 or 2).
o Reserved: Not used; set to 0.
2. Routing Entry (Repeated for Each Route):
o Family: Type of address (e.g., 2 for IPv4).
o Tag: Distinguishes internal and external routes.
o Network Address: The destination network's address.
o Subnet Mask: Subnet mask for the network (RIP v2).
o Next-Hop Address: The next router to reach the destination.
o Distance (Metric): The number of hops to the destination (1–15; 16 means
unreachable).
Each RIP message can carry multiple entries, helping routers update their routing tables.
15. Is OSPF an alternative for RIP? Justify with a real time example. (with
diagram).
Ans:
Ans: Yes, OSPF (Open Shortest Path First) is an effective alternative to RIP (Routing
Information Protocol), particularly in larger and more complex network environments. OSPF
is designed to handle a greater number of routers and subnets, making it more scalable
compared to RIP, which is limited by its maximum hop count of 15. For instance, consider a
large corporate network with multiple branches in different cities, each connected to a central
data center. In this scenario, OSPF would allow each router to share its link-state information
with others in real time, enabling quick updates and efficient routing decisions based on current
network conditions. If a router in one branch fails, OSPF can rapidly recalculate the best path
using Dijkstra’s algorithm, minimizing downtime and packet loss. Conversely, if the same
network were utilizing RIP, the convergence time would be significantly longer, potentially
School of C&IT 20
Computer Networks
Unit – 3
taking up to 30 seconds for the routing tables to update after a link failure, which could lead to
considerable disruptions in network traffic. The diagram below illustrates a central data center
connected to multiple branches, where OSPF facilitates seamless communication and quick
adaptation to changes, while RIP would struggle to maintain optimal paths as the network
grows. Overall, OSPF's ability to efficiently manage routing in dynamic and expansive
networks makes it a superior choice over RIP.
Diagram:
16. Is Border gateway protocol (BGP) based on path vector algorithm? Justify
external BGP and internal BGP under a minimal 10 routers & 6 vectors topology.
Ans:
Yes, BGP is a path-vector routing protocol, and it makes routing decisions based on
paths, network policies, or rule-sets configured by a network administrator.
School of C&IT 21
Computer Networks
Unit – 3
In order for EBGP to work properly, it must be configured correctly. This includes setting up
the correct EBGP configuration parameters such as neighbor addresses, AS number and
authentication methods. It also involves making sure that the proper protocols are in place for
exchanging routing information between autonomous systems. With this in mind, it is
important for network administrators to understand how EBGP works and how to configure it
correctly in order for their networks to function optimally.
• ASes connect through public exchanges (e.g., MAE and IX) using route servers,
reducing the need for direct BGP sessions between all ASes.
• Scalability: Public exchanges and route servers allow multiple ASes to interconnect
efficiently.
• Policy Control: BGP uses vector attributes (e.g., AS-Path, MED) to enforce routing
policies and optimize paths across AS boundaries.
• Redundancy: Stub routers (e.g., AS 60005) connect to multiple transit providers,
ensuring reliable connectivity.
• Direct Peering: Some ASes bypass public exchanges for better performance, as seen
with AS 60003 and AS 60001.
-Internal Border Gateway Protocol (iBGP) is a routing protocol used on the internet for
exchanging routing information between two or more routers within an autonomous system
(AS)—hence the use of the word “Internal.”
School of C&IT 22
Computer Networks
Unit – 3
iBGP is used to propagate routes within a single AS, while BGP is used to propagate routes
between different ASs. iBGP ensures that all routers in an AS have the same view of the
network topology and allows them to communicate with each other effectively.
• In iBGP, a full-mesh connection is required where every router peers with every other
router, which becomes unsustainable in large networks.
• Route reflectors solve this by acting as intermediaries, relaying BGP updates between
clients while maintaining iBGP rules.
• Scalability: The route reflectors reduce the number of required iBGP sessions.
• Reliability: Full-mesh connections between route reflectors ensure redundancy, while
redundant links to clients provide fault tolerance.
Ans:
School of C&IT 23
Computer Networks
Unit – 3
Data Single data stream for all Separate data stream for each
Transmission recipients recipient
Bandwidth
Minimal High
Usage
Setup
Complex Simple
Complexity
18. Justify MOSPF is way better than OSPF with demonstrative example.
Ans:
MOSPF (Multicast Open Shortest Path First) and OSPF (Open Shortest Path First) are
both routing protocols
• MOSPF is one to many and many to many communication it is used in online gaming
,video conferencing etc and OSPF is designed for one to one connection It finds the
shortest path between devices in a network for standard IP traffic
• MOSPF is better than OSPF for multicast traffic because OSPF doesn’t support
multicast and If you try to use OSPF for multicast, you’d need additional protocols like
PIM (Protocol Independent Multicast). MOSPF simplifies the process by integrating
multicast capabilities directly
• Imagine you have a delivery service, and you only deliver packages when someone
places an order. If there’s no order, you don’t send out any delivery trucks.
School of C&IT 24
Computer Networks
Unit – 3
o Similarly, MOSPF doesn’t create or maintain paths for multicast traffic unless
it’s actually needed. If there’s no active multicast traffic, it doesn’t waste time
or resources setting up routes.
• MOSPF sends one copy of a multicast packet and ensures it’s delivered to multiple
recipients efficiently and other side it doesn’t support
• MOSPF has multicast capabilities integrated, meaning it doesn’t need extra protocols
to handle multicast and OSPF needs additional protocols like PIM so MOSPF is better
• MOSPF minimizes router workload by building and maintaining paths only for active
multicast traffic and OSPF paired with other protocols it can add extra processing
demands on routers
School of C&IT 25