assignment
assignment
COMPUTER COMMUNICATION
NETWORK
Srijana Pulami(02210225)
COLLAGE OF SCIENCE AND TECHNOLOGY
Question No. 1
Direction: Choose the most appropriate answer.
1.1 Signals with a frequency above 30 MHz use ____ propagation.
a) Ground c) Line-of-sight
b) Sky d) None of the above
1.2 Which transmission media provides the highest transmission speed in a network?
a) Coaxial cable c) Optical fiber
b) Twisted pair cable d) Electrical cable
1.3 Which scheme/strategy is suitable to establish the communication between the access point
(AP) and the infrastructure of LANs?
a) Wired c) Both a & b
b) Wireless d) Cannot predict
1.4 Which ARQ mechanism deals with the transmission of only damaged or lost frames despite
the other multiple frames by increasing the efficiency & its utility in noisy channels?
a) Go-Back-N ARQ c) Stop-and-Wait ARQ
b) Selective Repeat ARQ d) All of the above
Question No.2
Direction: State whether the following statements are true or false with T or F respectively.
Question No.3
Direction: Fill in the blank with the most appropriate word.
3.1 The Vertical Redundancy Check for data 110110011 is 1101100110
3.2 The Physical Addressing happens at Data Link layer of the OSI model.
3.3 The process of each machine that communicates at a given layer is called peer-to-peer
process.
3.4 The OSI layer which is responsible for the source-to-destination delivery of packet is
Network layer.
1|Page
Question No. 4
4.1 Explain Computer Network and list any two networking goals.
Answer:
Interconnections of computers and other hardware components by transmission media
either guided transmission or unguided transmission media.
Networking Goals:
1. Resource Sharing
2. High Reliability
3. Cost Reduction
4. Improve Performance
4.2 In data communication, the header and trailer are appended in OSI Model. What are the
header and Trailer?
Answer:
In data communication, both the header and trailer are components that are added to a
message or data packet at different layers of the OSI (Open Systems Interconnection)
model. These components serve specific purposes in the transmission and reception of data.
1. Header: The header is the portion of a data packet or message that is added at the
beginning of the data at each layer of the OSI model. It contains control information
necessary for the proper transmission and delivery of the data. The specific contents
and structure of the header vary depending on the layer of the OSI model.
2. Trailer: The trailer is the part of a data packet or message that is added at the end of
the data at certain layers of the OSI model. It typically contains additional control
information or error checking data to ensure data integrity during transmission and
reception.
4.3 When was International Standard Organization (ISO) established? Why Standardization
was needed?
Answer:
The International Standard Organization was established in 1947. Standardization was
needed for interoperability due to the emergence of different hardware and software
vendors. With each passing day, new hardware and software are being launched.
Byte-stuffing involves adding one extra byte, often referred to as the escape character
(ESC), to the data stream. When the receiver detects an ESC character, it removes it and
treats the following character as regular data.
On the other hand, in bit-stuffing, a zero bit is inserted after every five consecutive ones in
the data stream. This ensures that the pattern used for control signals, such as the flag, is
not mistakenly interpreted as data
2|Page
4.5 Differentiate OSI and TCP/IP models. Why TCP/IP model was developed?
Answer:
After the Internet ban was lifted, hundreds of universities and government agencies were
connected. When satellite and radio networks were added later, the existing protocols had
trouble interworking with them. Therefore, TCP/IP reference model was developed to
create a network that can survive in any conditions.
Simples
The flow of the signal between devices are unidirectional (as on a one-way street). One device
can only transmit and other can only receive. Example: Key board and Monitor.
4.7 Assume 17 devices are arranged in a mesh topology. How many cables are needed? How
many ports are needed for each device?
Answer [0.25 marks each]
If 17 devices are arranged in a mesh topology, then number of cables needed in a mesh
topology are:
Cables in Mesh= n (n-1)/2
= 17(17-1)/2
=17x16/2
=272/2
=136 cables
3|Page
Question No.5
5.1 Consider the data word 1001000 1100101 1001100 1001100 1101111 is sent with 2-D
parity check. Illustrate how this error detection technique is applied in sending through
the unreliable link. Identify what word has been sent, and what word is received if the
fourth bit from the last byte is altered.
Answer
a b c d e f g h i j k l m
97 98 99 100 101 102 103 104 105 106 107 108 109
n o p q r s t u v w x y z
110 111 112 113 114 115 116 117 118 119 120 121 122
A B C D E F G H I J K L M
65 66 67 68 69 70 71 72 73 74 75 76 77
N O P Q R S T U V W X Y Z
78 79 80 81 82 83 84 85 86 87 88 89 90
Sender Site
1 0 0 1 0 0 0 0
1 1 0 0 1 0 1 0
1 0 0 1 1 0 0 1
1 0 0 1 1 0 0 1
1 1 0 1 1 1 1 0
1 0 0 0 0 1 0 0
Data sent through unreliable link 10010000 11001010 10011001 10011001 11011110
10000100
64 32 16 8 4 2 1 Dec Character
1 0 0 1 0 0 0 72 H
1 1 0 0 1 0 1 101 e
4|Page
1 0 0 1 1 0 0 76 L
1 0 0 1 1 0 0 76 L
1 1 0 1 1 1 1 111 o
Receiver site
When the fourth bit from the last byte is altered
1 0 0 1 0 0 0 0
1 1 0 0 1 0 1 0
1 0 0 1 1 0 0 1
1 0 0 1 1 0 0 1
1 1 0 0 1 1 1 0
1 0 0 0 0 1 0 0
64 32 16 8 4 2 1 Dec Character
1 0 0 1 0 0 0 72 H
1 1 0 0 1 0 1 101 e
1 0 0 1 1 0 0 76 L
1 0 0 1 1 0 0 76 L
1 1 0 0 1 1 1 103 g
5.2 How checksum error detection technique is implemented if a sender sends ASCII
character data items ABCD through the unreliable link to the receiver with checksum.
Illustrate this technique with the following requirement.
a) Calculate the checksum at the sender.
b) Write down the data and checksum sent through the link.
c) Calculate checksum at the receiver by assuming no error.
d) Calculate checksum error if a second bit from character A is change.
A 65 1 0 0 0 0 0 1
B 66 1 0 0 0 0 1 0
C 67 1 0 0 0 0 1 1
D 68 1 0 0 0 1 0 0
5|Page
1 0 0 0 0 0 1
1 0 0 0 0 1 0
1 0 0 0 0 1 1
1 0 0 0 1 0 0
1 0 0 0 1 0 1 0 sum
1
0 0 0 1 0 1 1 Wrap sum
1 1 1 0 1 0 0 checksum
6|Page
Question No.6
6.1. What is the range of assignable IP addresses for a subnet containing an IP address of
172.16.1.10 /19?
Answer:
IP address: 10101100.00010000.00000001.00001010
Subnet mask: 11111111.11111111.11100000.00000000 (19 ones followed by 13 zeros)
First address:
( 32-19) = 13
13 bits converted to 0’s from right most
First address: 172.16.0.0
Last address: 172.16.0.31.255(After converting 13 bits to 1’s)
No. of useable address: 2^13-2=8190
The range for usable address is from Ip address 172.16.0.1-172.16.31.254
6.2. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which
two of the following IP addresses are assignable IP addresses that reside in that
subnet?
IP address: 192.168.4.0
Subnet Mask: 11111111.1111111.11111111.11000000(26 ones followed by 6 1’s)
First address: 192.168.4.0
Last address: 192.168.4.63
The assignable IP address reside in the range of 192.168.4.1-192.168.4.63
6.3. A host in your network has been assigned an IP address of 192.168.181.182 /25. What
is the subnet to which the host belongs?
Answer:
IP address: 11000000.10101000.10110101.10110110
Subnet mask: 11111111.11111111.11111111.10000000 (25 ones followed by 7 zeros)
Performing the "AND" operation:
Network address: 11000000.10101000.10110101.10000000 (192.168.181.128)
Therefore, the subnet to which the host with the IP address 192.168.181.182/25
belongs is 192.168.181.128/25.
6.4. You are working with a Class B network with the private IP address of 172.16.0.0 /16.
You need to maximize the number of broadcast domains, where each broadcast domain
can accommodate 1000 hosts. What subnet mask should you use?
Answer:
To determine how many host bits are required to support 1000 hosts, we can create a
table from the following formula: Number of Hosts = 2h – 2, where h is the number of
host bits From this formula, we can create the following table:
1 Host Bit => 0 Hosts
2 Host Bits => 2 Hosts
3 Host Bits => 6 Hosts
4 Host Bits => 14 Hosts
7|Page
5 Host Bits => 30 Hosts
6 Host Bits => 62 Hosts
7 Host Bits => 126 Hosts
8 Host Bits => 254 Hosts
9 Host Bits => 510 Hosts
10 Host Bits => 1022 Hosts
This table tells us that a subnet with 10 host bits will accommodate the requirement of 1000
hosts. 10 host bits, then we have a 22-bit subnet mask (i.e. 32 – 10 = 22).
6.5. What is the directed broadcast address of a subnet containing an IP address of 172.16.1.10
/19?
Answer:
n= 19
Broadcast address = 32-n
= 32-19
= 13
00000001.0001010 =00011111.11111111
Broadcast Address = 172.16.31.255
6.6. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet
mask. How many subnets can be created by using this subnet mask?
Answer:
IP address: 192.168.10.0 it follows under class C (/24)
Number of subnet = 2^s where s= no. of borrowed bits
No. of borrowed bit = network subnet mask – actual subnet mask
= 28-24
=4
Therefore, No. of subnet mask= 2^4
= 16
6.7. Given a subnet of 172.16.56.0 /21, identify which of the following IP addresses belong
to this subnet.
Answer:
we have a 21-bit subnet mask, which is written in binary as:
11111111 11111111 11111000 00000000
A 21-bit subnet mask can be written in dotted decimal notation as: 255.255.248.0 Since
the third octet is the interesting octet, the decimal value in the interesting octet is 248.
32-21= 11(bits)
172.16.56.0>>>> 172.16.00111000.00000000
First address: 172.16.56.0
172.16.56.0>>>> 172.16.00111111.11111111
Last address:172.16.63.255
Therefore, the address which follows inside range 172.16.56.1-172.16.63.254 belongs
to subnet of 172.16.56.0/21
8|Page
6.8. What is the subnet address of the IP address 192.168.5.55 with a subnet mask of
255.255.255.224?
Answer:
Converting the IP address and subnet mask to binary:
IP address: 11000000.10101000.00000101.00110111
Subnet mask: 11111111.11111111.11111111.11100000
Performing the "AND" operation:
Subnet address: 11000000.10101000.00000101.00100000 (192.168.5.32)
Therefore, the subnet address for the IP address 192.168.5.55 with a subnet mask of
255.255.255.224 is 192.168.5.32.
6.9. You are working for a company that will be using the 192.168.1.0 /24 private IP
address space for IP addressing inside their organization. They have multiple
geographical locations and want to carve up the 192.168.1.0 /24 address space into
subnets. Their largest subnet will need 13 hosts. What subnet mask should you use to
accommodate at least 13 hosts per subnet, while maximizing the number of subnets
that can be created?
Answer:
To accommodate at least 13 hosts per subnet while maximizing the number of subnets
that can be created, we can use the formula (2^N) - 2 to calculate the number of hosts
per subnet.
1 Host Bit: 21 – 2 = 0
2 Host Bits: 22 – 2 = 2
3 Host Bits: 23 – 2 = 6
4 Host Bits: 24 – 2 = 14
5 Host Bits: 25 – 2 = 30
From above, we need at least 5 host bits for each subnet. To determine the subnet mask,
we take the original network mask of /24 and add 5 host bits, resulting in a subnet mask
of /29.
Therefore, to accommodate at least 13 hosts per subnet while maximizing the number
of subnets that can be created, we should use a subnet mask of 255.255.255.248 (/29)
for the 192.168.1.0/24 private IP address space.
6.10. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit
subnet mask. How many assignable addresses are available in each of the subnets?
Answer:
IP address: 192.168.10.0
n= 28
No. of assignable address = 2^(32-n) – 2
= 2^4-2
= 16-2
= 14
Hence, in this scenario, each subnet has 14 assignable IP addresses.
9|Page
6.11. An IP address of 192.168.0.100 /27 belongs to which of the following
subnets?
Answer:
IP address: 11000000.10101000.00000000.01100100
Subnet mask: 11111111.11111111.11111111.11100000 (27 ones followed by 5
zeros)
Therefore, the IP address 192.168.0.100/27 belongs to the subnet with the network
address 192.168.0.96/27.
6.12. What subnet mask should be used to subnet the 192.168.10.0 network to
support the number of subnets and IP addresses per subnet shown in the following
topology?
Answer:
Required subnet = 4
2^n >= 4
2^n >= 2^2
n = 2(n here is the borrowed bits)
IP address: 192.168.10.0
Subnet mask: 255.255.255.00000000(change / borrow 2bits for network )
255.255.255.11000000
255.255.255.192
No. of host/assignable address = 2^n-2
= 2^6-2
= 62(this satisfies the 50 IP addresses condition)
Therefore, we can use subnet mask of 255.255.255.19
10 | P a g e
11 | P a g e