MN621 _ Advanced Netw
MN621 _ Advanced Netw
Submitted To:-------------------------------
Prepared By:
Student Name:----------------------------------
Student ID:----------------------------------
Question No 01
a) DoD model:
It is created by the department of defense. It is a simple TCP/IP Protocol with four layers to flow the data on
the network and save its integrity.
Host-to-Host Layer
Internet Layer
It provides end to end connection between two devices and makes the communication process between two
devices by establishing the link and also do sequencing, acknowledgments, and flow controls. TCP and UDP are
the protocols of this layer.
Internet Layer:
Routing and single network interface are provided to upper layers by this layer. It contains the IP and ICMP
protocol. Network addressing and related information is kept here. Fragmentation and reassembling of data
packets are also done here.
On this layer mac addressing is done and also protocols are set for physical data transmission. It also monitors
data exchange between host and network [1].
b) OSI Model:
The open system interconnection (OSI) is a reference model with a complete set of protocols and standards to
be maintained in software and hardware. It was published in 1984. This model contains seven layers.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application Layer:
The last and upper layer of the OSI model is responsible for providing the interface between the user and the
internet. It is used to remote the systems. SSH, FTP, and TFTP are the protocols that run on this layer.
Presentation Layer:
It is working as a translator for the OSI model. The encryption of data is performed here. Also, decrypt the
data for the application layer when it is received from the source.
Session Layer:
The start of the session and end of the session with other devices. It is responsible for the start and end of
communication between two computers. RCPs and NFS are examples of this layer.
Transport Layer:
The data is divided into segments and then send to further processing. Segmentation is done on the transport
layer and also this layer chose the transportation of data between two computers by choosing TCP or UDP
protocols.
Network Layer:
Network addresses are assigned here. It also finds the best path from source to destination. Routing is also
performed here. IP, IPX, and Apple talk are examples. Router work on this layer
Physical addresses are defined here. Switching is performed here. Mac addressing is done here. PPP, HDLC are
examples of this layer
Physical Layer:
It provides the standers to move data on the physical medium. 10 base T, 10 base 100, DCE are a few examples
of protocols runs on this layer [2].
c) RINA Model:
RINA is a built-in Internet infrastructure built on a basic foundation, but it works on single layer of Inter-
Process Communication (IPC) that repeats itself over and over again, the same functions/methods but policies
are configured to operate at various working space levels (e.g., power, delay, loss) Specifically, the scope refers
to the Distributed IPC Facility (DIF) which has a set of IPC processes, which operate on a variety of equipment,
providing coordinated set of flow services [3].
Question No 02
Solution:
In this diagram it is shown that there are 2 source nodes. Which will send the request or data to receiver. The
Source node 1 is connected with the network by connecting with router A. the Source 2 Node is connected
with the Network by Router B. Both these routers are connected to a central switch A. The Receiver 1 is
connected with the network by connecting with router C. The receiver 2 is connected with the network by
connecting with router D.
When Source A send the data it will first go to the Router A and Router A will pass this request/data to Switch
A. Switch A checks the Destination and Send it to the concern receiver Router. If the Reciever1 is going to
receive the data than switch will send this data to router C and if Receiver 2 is going to receive the data than it
will send this to Router D and from where it will reach to the destination node. The IP addresses are assign
manually so the router and switches have source and source and destination addresses in there routing and
switching tables.
Question No 03
Solution:
a) MPLS Diagram
Question No 04
Solution:
The IP is 192.168.59.70
This means that 28 bits are occupied by the network and we have 4 bits for submitting.
Question No 05
Solution:
Question No 06
a) Replace The X
BGP stands for Broader Gateway Protocol. It is a protocol which is used for sharing of routing information
between network domains. BGP sends only unicast messages. It is path vector protocol as it only choose the
path from source to destination.
In the given figure The Router R101 wants to communicate with the router R103. For some reasons the R101 is
not connected with the R103. If he wants to communicate with R103 another router R102 is connected with
the R104 which belongs to same domain of R103 and they both are connected with each other.
Now BGP create the Path for communication from R101 to R103 and that is
R101 sends packet to R102 that will send this unicast packet to R104 and this router will send this packet to
R103. So the communication will take place by the BGP.
Question No 07
Solution:
MST Calculation
A to B =7
A to c = 1
B to E= 4
C to D = 8
MST = 7+1+4+8 = 20
For ABE
7+4 = 11
For ACDE= 1+8+3 = 12
Question No 08
Solution:
Step 1 2 3 4 5
0 ∞ ∞ ∞ ∞ ∞
A 0 ∞ ∞ ∞ ∞ ∞
B 0 1 ∞ 3 4 3
C 0 1 2 3 4 3
D 0 1 2 3 4 3
E 0 1 2 3 4 3
F 0 1 2 3 4 3
A= {B} =1
A= {BC} =2
A= {BCD} =3
A= {FE} =4
A= {F} =3
Question No 09
Solution:
1 2 3 4 5 6 7 8
1 2 1 2 1 2 1 2 1 2 1 2 1 2 1 2
1st 0 0 ∞ 2 ∞ ∞ ∞ 3 ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞
Cycle
Secon 0 0 2 2 ∞ 4 3 2 ∞ 4 ∞ 4 ∞ ∞ ∞ ∞
d Cycle
Third 0 0 2 2 4 4 3 3 4 4 4 4 5 5 5 5
Cycle
Question No 10
Solution:
SD_WAN:
SD-WAN is virtual network which allows the network to connect the users with each other in a secure way. It
uses centrally control function to direct the traffic. It is designed to support on every platform and also those
applications which are specific on some data areas. It maintain high standards for high app performance
Another suggestion of the SD-WAN value is to use ALL available bandwidth, not just the choice between
method A and method B. However, the choice of method should also prioritize critical business applications
over less important applications. Silver Peak's unique tunnel integration creates visual WAN overlap from
multiple visible WAN links. Traffic is transmitted using all available bandwidth available on most links. But if the
link fails, the remaining options keep the system running and your business moving on [4].
Question No 11
Solution:
IoT
Smart meters have been used by many resources around the world, and with the technology available to smart
meter manufacturers and rapidly evolving services over the past few years, there is always the opportunity to
innovate or add new technologies that work better in production.
Bluetooth:
In a given network the person wants to use its watch and other Bluetooth devices to be attached with the
internet.
Fog Computing:
Fog control is the concept of a distributed network that connects these two areas. "Fog provides a lost link to
what data needs to be embedded in the cloud, and what can be analyzed locally, on the margins," explains
Mung Chiang, dean of Purdue University's Engineering College and one of the nation's leading researchers on
fog and edge computing.
Reliability of a network is very important in these days. Resilience means how a network can maintain and
provide the services to the end user with in a malicious attack. How it may have the ability to solve the
problem and if any fault occur than how it may survive in these worse conditions. The network services should
give in a proper way and it will not be stopped under worse conditions. Faults may be occur due to human like
bad configuration. Some are due to large natural disaster, some faults may occur due to physical hardware
failure.
Contrary to popular belief, problem-solving is not always available with your tools; it is usually about your
mind. Many maintenance workers are quick to begin making some adjustments in the machine, such as quickly
replacing things, before they get the first clue as to what is causing the problem. This mindset also introduces
additional problems to the mix, which can lead to problem solving
References