CCN 2021 (Final A Part)
CCN 2021 (Final A Part)
1.
a. A given IP address space is 147.38.0.0/16. The required number of subnets is 400.
Now perform a subnetting operation where you must find the number of subnets,
subnet, usable range, address, and broadcast address.
Answer: MID-2022
HDLC (High-Level Data Link Control) is a synchronous data link layer protocol
used for communication between network devices. HDLC frames are structured
units of data used for transmitting information over a network. There are different
types of HDLC frames, including:
Information Frames (I-Frames): These frames carry user data and control
information for error detection and flow control.
Supervisory Frames (S-Frames): These frames are used for flow and error control,
such as acknowledging received frames or requesting retransmission.
Unnumbered Frames (U-Frames): These frames are used for control purposes,
such as link establishment and disconnection.
Each type of HDLC frame serves a specific purpose in managing the flow of data
and ensuring reliable communication between network devices.
2.
a. What is Authentication? Describe the frame format of IEEE 802.3 along with
frame size.
Answer:
Authentication is the process of verifying the identity of a user or system
attempting to access a network or system. It ensures that only authorized users
or devices are granted access to resources and services, protecting the network
from unauthorized access and potential security threats.
IEEE 802.3, also known as Ethernet, is a widely used standard for wired Ethernet
networks. The frame format of IEEE 802.3 includes the following components:
Start Frame Delimiter (SFD): A specific bit sequence that indicates the end of the
preamble and the start of the frame's data.
Destination MAC Address: The MAC address of the intended recipient of the
frame.
Source MAC Address: The MAC address of the sender of the frame.
Length/Type: Indicates the length of the data field or specifies the type of
protocol data contained in the frame.
Data: The actual payload or data being transmitted.
Frame Check Sequence (FCS): A checksum value used for error detection to
ensure the integrity of the frame during transmission.
The frame size of IEEE 802.3 Ethernet frames can vary between 64 bytes (minimum)
and 1518 bytes (maximum), excluding the preamble and SFD. If the frame size is
less than 64 bytes, it is padded to meet the minimum frame size requirement. The
maximum frame size includes the data, FCS, and other headers.
b. Define Mobile IP. Briefly explain the working principle of DNS resolver.
Answer:
Mobile IP (Internet Protocol) is a protocol that enables mobile devices to maintain
continuous network connectivity while moving between different network
domains. It allows mobile devices, such as smartphones or laptops, to change
their network attachment point without losing ongoing communications, making
it ideal for users who frequently switch between different networks or locations.
1. Domain Name Resolution Request: When a user enters a domain name (e.g.,
www.example.com) in a web browser, the DNS resolver on the user's device initiates
a request to resolve the domain name to its corresponding IP address.
2. Query to DNS Server: The DNS resolver sends a query to a DNS server, either a
recursive resolver or authoritative server, to obtain the IP address associated with
the domain name.
5. Response to User: Once the IP address is obtained, the DNS resolver returns
the result to the user's device, allowing the device to establish a connection to the
desired website or service.
3.
a. What is the Transmission Control Protocol? If user A wants to send an email to
user B, explain the full operation of how user A sends the email, how the email
travels through the channel, and how user B reads the mail.
Answer:
The Transmission Control Protocol (TCP) is a core protocol in the Internet Protocol
suite that provides reliable, connection-oriented communication between devices
on a network. TCP ensures that data packets are delivered in order, without errors,
and with congestion control.
In summary, TCP ensures the reliable transmission of email data between user A
and user B by establishing a connection, sending the email data in packets,
routing the email through the network, and enabling user B to read the email
upon receipt.
The link-state routing algorithm operates on the principle that each router has
complete information about the network topology. Here’s a concise description of
its working principle:
1. Topology Discovery: Each router discovers its immediate neighbors and the
cost of reaching them. This information is collected through "Hello" packets
exchanged between directly connected routers.
2. Link-State Advertisement (LSA): Routers generate Link-State Advertisements,
which contain information about their neighbors and the associated link costs.
These LSAs are flooded throughout the network to ensure all routers have a
consistent view of the topology.
4. Shortest Path Calculation: Using the Dijkstra algorithm, each router calculates
the shortest path to every other router in the network. The shortest path tree is
derived from the topology database.
5. Routing Table Update: The results of the shortest path calculation are used to
update the routing table, which determines the best next hop for each
destination.
4.
a. Classify Gigabit Ethernet. Does an SNMP manager run a client SNMP program
or a server SNMP program?
Answer:
Gigabit Ethernet (GbE) can be classified as follows:
Based on Medium:
● Copper:
○ 1000BASE-T: Cat 5e or higher, up to 100 meters.
○ 1000BASE-CX: Special copper cabling, up to 25 meters.
● Fiber:
○ 1000BASE-SX: Multi-mode fiber, up to 550 meters.
○ 1000BASE-LX: Single-mode fiber, up to 5 kilometers.
○ 1000BASE-LH: Single-mode fiber, up to 10 kilometers or more.
○ 1000BASE-ZX: Single-mode fiber, up to 70 kilometers.
Based on Standards:
The Application Adaptation Layer (AAL) in ATM adapts higher-layer protocols for
ATM transmission. Here's its working principle in short:
● Segmentation: Breaks higher-layer data into 48-byte chunks for ATM cells.
● Reassembly: Combines 48-byte chunks back into original data at the
destination.
● AAL1: For constant bit rate (CBR) services (e.g., voice, video).
● AAL2: For variable bit rate (VBR) services (e.g., compressed voice/video).
● AAL5: For connection-oriented data services (e.g., IP over ATM).
Error Handling: Uses mechanisms like CRC for error detection and ensuring data
integrity.
AAL ensures efficient and reliable transport of various types of traffic over ATM
networks.