0% found this document useful (0 votes)
9 views

assignment

The document is an assignment on computer communication networks, containing multiple-choice questions, true/false statements, and fill-in-the-blank exercises. It covers topics such as propagation methods, transmission media, OSI model layers, error detection techniques, and IP address assignments. Additionally, it includes explanations and calculations related to networking concepts and error detection methods like checksum and parity checks.

Uploaded by

SRIJANA PULAMI
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

assignment

The document is an assignment on computer communication networks, containing multiple-choice questions, true/false statements, and fill-in-the-blank exercises. It covers topics such as propagation methods, transmission media, OSI model layers, error detection techniques, and IP address assignments. Additionally, it includes explanations and calculations related to networking concepts and error detection methods like checksum and parity checks.

Uploaded by

SRIJANA PULAMI
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

5/16/2023 ASSIGNMENT 01

COMPUTER COMMUNICATION
NETWORK

Srijana Pulami(02210225)
COLLAGE OF SCIENCE AND TECHNOLOGY
Question No. 1
Direction: Choose the most appropriate answer.
1.1 Signals with a frequency above 30 MHz use ____ propagation.
a) Ground c) Line-of-sight
b) Sky d) None of the above

1.2 Which transmission media provides the highest transmission speed in a network?
a) Coaxial cable c) Optical fiber
b) Twisted pair cable d) Electrical cable

1.3 Which scheme/strategy is suitable to establish the communication between the access point
(AP) and the infrastructure of LANs?
a) Wired c) Both a & b
b) Wireless d) Cannot predict

1.4 Which ARQ mechanism deals with the transmission of only damaged or lost frames despite
the other multiple frames by increasing the efficiency & its utility in noisy channels?
a) Go-Back-N ARQ c) Stop-and-Wait ARQ
b) Selective Repeat ARQ d) All of the above

Question No.2
Direction: State whether the following statements are true or false with T or F respectively.

2.1 The device operation at the Data Link layer is Gateway. F


2.2 Bridge allows devices on one network to communicate with devices on another
network. F
2.3 The TV and its Remote controller are an example of both Simplex and Half Duplex. T
2.4 Two types of transmission modes are guided and unguided. F

Question No.3
Direction: Fill in the blank with the most appropriate word.
3.1 The Vertical Redundancy Check for data 110110011 is 1101100110
3.2 The Physical Addressing happens at Data Link layer of the OSI model.
3.3 The process of each machine that communicates at a given layer is called peer-to-peer
process.
3.4 The OSI layer which is responsible for the source-to-destination delivery of packet is
Network layer.

1|Page
Question No. 4
4.1 Explain Computer Network and list any two networking goals.
Answer:
Interconnections of computers and other hardware components by transmission media
either guided transmission or unguided transmission media.
Networking Goals:
1. Resource Sharing
2. High Reliability
3. Cost Reduction
4. Improve Performance

4.2 In data communication, the header and trailer are appended in OSI Model. What are the
header and Trailer?
Answer:
In data communication, both the header and trailer are components that are added to a
message or data packet at different layers of the OSI (Open Systems Interconnection)
model. These components serve specific purposes in the transmission and reception of data.
1. Header: The header is the portion of a data packet or message that is added at the
beginning of the data at each layer of the OSI model. It contains control information
necessary for the proper transmission and delivery of the data. The specific contents
and structure of the header vary depending on the layer of the OSI model.
2. Trailer: The trailer is the part of a data packet or message that is added at the end of
the data at certain layers of the OSI model. It typically contains additional control
information or error checking data to ensure data integrity during transmission and
reception.

4.3 When was International Standard Organization (ISO) established? Why Standardization
was needed?
Answer:
The International Standard Organization was established in 1947. Standardization was
needed for interoperability due to the emergence of different hardware and software
vendors. With each passing day, new hardware and software are being launched.

4.4 Discuss Byte-stuffing and Bit-Stuffing.


Answer:
n both byte-stuffing and bit-stuffing techniques, extra bits are inserted into the data section
of a frame when certain patterns or characters conflict with control signals.

Byte-stuffing involves adding one extra byte, often referred to as the escape character
(ESC), to the data stream. When the receiver detects an ESC character, it removes it and
treats the following character as regular data.

On the other hand, in bit-stuffing, a zero bit is inserted after every five consecutive ones in
the data stream. This ensures that the pattern used for control signals, such as the flag, is
not mistakenly interpreted as data

2|Page
4.5 Differentiate OSI and TCP/IP models. Why TCP/IP model was developed?
Answer:
After the Internet ban was lifted, hundreds of universities and government agencies were
connected. When satellite and radio networks were added later, the existing protocols had
trouble interworking with them. Therefore, TCP/IP reference model was developed to
create a network that can survive in any conditions.

4.6 What is transmission mode? Discuss anyone of the transmission modes.


Answer [0.25 marks each]
Transmission Mode is used to define the direction of signal flow between two linked
devices.
Three types of transmission modes:
1 Simplex
2 Half-Duplex
3 Full-Duplex

Simples
The flow of the signal between devices are unidirectional (as on a one-way street). One device
can only transmit and other can only receive. Example: Key board and Monitor.

4.7 Assume 17 devices are arranged in a mesh topology. How many cables are needed? How
many ports are needed for each device?
Answer [0.25 marks each]
If 17 devices are arranged in a mesh topology, then number of cables needed in a mesh
topology are:
Cables in Mesh= n (n-1)/2
= 17(17-1)/2
=17x16/2
=272/2
=136 cables

Number of ports = n-1


=17-1
=16 ports
If 17 devices are connected in a mesh topology, the number of ports required in each
device is 16 and the number of cables required is 136.

3|Page
Question No.5
5.1 Consider the data word 1001000 1100101 1001100 1001100 1101111 is sent with 2-D
parity check. Illustrate how this error detection technique is applied in sending through
the unreliable link. Identify what word has been sent, and what word is received if the
fourth bit from the last byte is altered.
Answer
a b c d e f g h i j k l m

97 98 99 100 101 102 103 104 105 106 107 108 109

n o p q r s t u v w x y z

110 111 112 113 114 115 116 117 118 119 120 121 122

A B C D E F G H I J K L M

65 66 67 68 69 70 71 72 73 74 75 76 77

N O P Q R S T U V W X Y Z

78 79 80 81 82 83 84 85 86 87 88 89 90

2-D parity check:

Sender Site

1 0 0 1 0 0 0 0

1 1 0 0 1 0 1 0

1 0 0 1 1 0 0 1

1 0 0 1 1 0 0 1

1 1 0 1 1 1 1 0

1 0 0 0 0 1 0 0

Data sent through unreliable link 10010000 11001010 10011001 10011001 11011110
10000100

64 32 16 8 4 2 1 Dec Character

1 0 0 1 0 0 0 72 H

1 1 0 0 1 0 1 101 e

4|Page
1 0 0 1 1 0 0 76 L

1 0 0 1 1 0 0 76 L

1 1 0 1 1 1 1 111 o

The word sent is “HeLLo”

Receiver site
When the fourth bit from the last byte is altered
1 0 0 1 0 0 0 0

1 1 0 0 1 0 1 0

1 0 0 1 1 0 0 1

1 0 0 1 1 0 0 1

1 1 0 0 1 1 1 0

1 0 0 0 0 1 0 0

64 32 16 8 4 2 1 Dec Character

1 0 0 1 0 0 0 72 H

1 1 0 0 1 0 1 101 e

1 0 0 1 1 0 0 76 L

1 0 0 1 1 0 0 76 L

1 1 0 0 1 1 1 103 g

5.2 How checksum error detection technique is implemented if a sender sends ASCII
character data items ABCD through the unreliable link to the receiver with checksum.
Illustrate this technique with the following requirement.
a) Calculate the checksum at the sender.
b) Write down the data and checksum sent through the link.
c) Calculate checksum at the receiver by assuming no error.
d) Calculate checksum error if a second bit from character A is change.

A 65 1 0 0 0 0 0 1
B 66 1 0 0 0 0 1 0
C 67 1 0 0 0 0 1 1
D 68 1 0 0 0 1 0 0

5|Page
1 0 0 0 0 0 1
1 0 0 0 0 1 0
1 0 0 0 0 1 1
1 0 0 0 1 0 0
1 0 0 0 1 0 1 0 sum
1
0 0 0 1 0 1 1 Wrap sum
1 1 1 0 1 0 0 checksum

a) The checksum at the sender is 1110100


b) Data and the checksum sent through the link is 1000001 1000010 1000100 1000100
1110100

c) Checksum at the receiver assuming no error


1 0 0 0 0 0 1
1 0 0 0 0 1 0
1 0 0 0 0 1 1
1 0 0 0 1 0 0
1 1 1 0 1 0 0
1 1 1 1 1 1 1 0 sum
1
1 1 1 1 1 1 1 Wrap sum
0 0 0 0 0 0 0 checksum

Checksum is zero at the receiver site. Hence no error

d) Checksum error if a second bit from character A is changed


1 1 0 0 0 0 1
1 0 0 0 0 1 0
1 0 0 0 0 1 1
1 0 0 0 1 0 0
1 1 1 0 1 0 0
1 0 0 1 1 1 1 0 sum
1
0 0 1 1 1 1 1 Wrap sum
1 1 0 0 0 0 0 checksum

Checksum is non-zero. Thus, there is an error.

6|Page
Question No.6
6.1. What is the range of assignable IP addresses for a subnet containing an IP address of
172.16.1.10 /19?
Answer:
IP address: 10101100.00010000.00000001.00001010
Subnet mask: 11111111.11111111.11100000.00000000 (19 ones followed by 13 zeros)
First address:
( 32-19) = 13
13 bits converted to 0’s from right most
First address: 172.16.0.0
Last address: 172.16.0.31.255(After converting 13 bits to 1’s)
No. of useable address: 2^13-2=8190
The range for usable address is from Ip address 172.16.0.1-172.16.31.254

6.2. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which
two of the following IP addresses are assignable IP addresses that reside in that
subnet?
IP address: 192.168.4.0
Subnet Mask: 11111111.1111111.11111111.11000000(26 ones followed by 6 1’s)
First address: 192.168.4.0
Last address: 192.168.4.63
The assignable IP address reside in the range of 192.168.4.1-192.168.4.63
6.3. A host in your network has been assigned an IP address of 192.168.181.182 /25. What
is the subnet to which the host belongs?
Answer:
IP address: 11000000.10101000.10110101.10110110
Subnet mask: 11111111.11111111.11111111.10000000 (25 ones followed by 7 zeros)
Performing the "AND" operation:
Network address: 11000000.10101000.10110101.10000000 (192.168.181.128)
Therefore, the subnet to which the host with the IP address 192.168.181.182/25
belongs is 192.168.181.128/25.

6.4. You are working with a Class B network with the private IP address of 172.16.0.0 /16.
You need to maximize the number of broadcast domains, where each broadcast domain
can accommodate 1000 hosts. What subnet mask should you use?
Answer:
To determine how many host bits are required to support 1000 hosts, we can create a
table from the following formula: Number of Hosts = 2h – 2, where h is the number of
host bits From this formula, we can create the following table:
1 Host Bit => 0 Hosts
2 Host Bits => 2 Hosts
3 Host Bits => 6 Hosts
4 Host Bits => 14 Hosts

7|Page
5 Host Bits => 30 Hosts
6 Host Bits => 62 Hosts
7 Host Bits => 126 Hosts
8 Host Bits => 254 Hosts
9 Host Bits => 510 Hosts
10 Host Bits => 1022 Hosts

This table tells us that a subnet with 10 host bits will accommodate the requirement of 1000
hosts. 10 host bits, then we have a 22-bit subnet mask (i.e. 32 – 10 = 22).
6.5. What is the directed broadcast address of a subnet containing an IP address of 172.16.1.10
/19?
Answer:
n= 19
Broadcast address = 32-n
= 32-19
= 13
00000001.0001010 =00011111.11111111
Broadcast Address = 172.16.31.255
6.6. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet
mask. How many subnets can be created by using this subnet mask?
Answer:
IP address: 192.168.10.0 it follows under class C (/24)
Number of subnet = 2^s where s= no. of borrowed bits
No. of borrowed bit = network subnet mask – actual subnet mask
= 28-24
=4
Therefore, No. of subnet mask= 2^4
= 16
6.7. Given a subnet of 172.16.56.0 /21, identify which of the following IP addresses belong
to this subnet.
Answer:
we have a 21-bit subnet mask, which is written in binary as:
11111111 11111111 11111000 00000000
A 21-bit subnet mask can be written in dotted decimal notation as: 255.255.248.0 Since
the third octet is the interesting octet, the decimal value in the interesting octet is 248.
32-21= 11(bits)
172.16.56.0>>>> 172.16.00111000.00000000
First address: 172.16.56.0
172.16.56.0>>>> 172.16.00111111.11111111
Last address:172.16.63.255
Therefore, the address which follows inside range 172.16.56.1-172.16.63.254 belongs
to subnet of 172.16.56.0/21

8|Page
6.8. What is the subnet address of the IP address 192.168.5.55 with a subnet mask of
255.255.255.224?
Answer:
Converting the IP address and subnet mask to binary:
IP address: 11000000.10101000.00000101.00110111
Subnet mask: 11111111.11111111.11111111.11100000
Performing the "AND" operation:
Subnet address: 11000000.10101000.00000101.00100000 (192.168.5.32)

Therefore, the subnet address for the IP address 192.168.5.55 with a subnet mask of
255.255.255.224 is 192.168.5.32.
6.9. You are working for a company that will be using the 192.168.1.0 /24 private IP
address space for IP addressing inside their organization. They have multiple
geographical locations and want to carve up the 192.168.1.0 /24 address space into
subnets. Their largest subnet will need 13 hosts. What subnet mask should you use to
accommodate at least 13 hosts per subnet, while maximizing the number of subnets
that can be created?
Answer:
To accommodate at least 13 hosts per subnet while maximizing the number of subnets
that can be created, we can use the formula (2^N) - 2 to calculate the number of hosts
per subnet.
1 Host Bit: 21 – 2 = 0
2 Host Bits: 22 – 2 = 2
3 Host Bits: 23 – 2 = 6
4 Host Bits: 24 – 2 = 14
5 Host Bits: 25 – 2 = 30
From above, we need at least 5 host bits for each subnet. To determine the subnet mask,
we take the original network mask of /24 and add 5 host bits, resulting in a subnet mask
of /29.
Therefore, to accommodate at least 13 hosts per subnet while maximizing the number
of subnets that can be created, we should use a subnet mask of 255.255.255.248 (/29)
for the 192.168.1.0/24 private IP address space.
6.10. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit
subnet mask. How many assignable addresses are available in each of the subnets?
Answer:
IP address: 192.168.10.0
n= 28
No. of assignable address = 2^(32-n) – 2
= 2^4-2
= 16-2
= 14
Hence, in this scenario, each subnet has 14 assignable IP addresses.

9|Page
6.11. An IP address of 192.168.0.100 /27 belongs to which of the following
subnets?
Answer:
IP address: 11000000.10101000.00000000.01100100
Subnet mask: 11111111.11111111.11111111.11100000 (27 ones followed by 5
zeros)

Performing the "AND" operation:

Network address: 11000000.10101000.00000000.01100000 (192.168.0.96)

Therefore, the IP address 192.168.0.100/27 belongs to the subnet with the network
address 192.168.0.96/27.

6.12. What subnet mask should be used to subnet the 192.168.10.0 network to
support the number of subnets and IP addresses per subnet shown in the following
topology?

Answer:
Required subnet = 4
2^n >= 4
2^n >= 2^2
n = 2(n here is the borrowed bits)
IP address: 192.168.10.0
Subnet mask: 255.255.255.00000000(change / borrow 2bits for network )
255.255.255.11000000
255.255.255.192
No. of host/assignable address = 2^n-2
= 2^6-2
= 62(this satisfies the 50 IP addresses condition)
Therefore, we can use subnet mask of 255.255.255.19

10 | P a g e
11 | P a g e

You might also like