Sie sind auf Seite 1von 9

ASSIGNMENT

Program : Master of Science {MSc - IT}


Information Technology
Semester : II (Two)


Subject Name

MSI 204

Networking Fundamentals


Student Enrollment Number (SEN)

EL2013-02-MSC0001-3335


Application Registration Number

9999-608-789


Permanent Enrollment Number (PEN)

A1922-813-080 (EL)


Student Name

Mir Mahamood Ali Khan


Assignments Submitted

Assignment A


Assignment B


Assignment C


Pages 2-?? Pages ??? Pages ???





MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
2


Assignment-A
Question 1). Identify the five components of a data communication
system.An identified sender and receiver

An agreed-upon method of communicating (face-to-face), telephone, letter,
photograph. Common language and grammar
An agreed-upon speed and timing of delivery (for example please slow down
so that I can understand you.)
Confirmation requirements (for example is that clear? Yes, thank
you.).

Question 2). What are the various popular communication tools?

Instant messaging is real-time communication between two or more users. It has
expanded to include voice, photo and video sharing, and file transfers. Instant
messaging is also used by customer service centres to assist customers and
friends in communicating with each other.
Blogs are web pages where people can publish their personal opinions and
thoughts about any conceivable topic. Blogs allow unfiltered and unedited
publication of ideas from experts and non experts alike.
Podcasting is an audio-based medium that allows people to deliver their
recordings to a wide audience. The audio file is placed on a website (or blog or
wiki), where others can download it and play the recording on their computers,
laptops and ipods.
Wikis are also publicly created web content. Wiki web pages are created and
edited by groups of people sharing information. The best known example of a wiki
is the Wikipedia, an online encyclopaedia made up of public contributions edited
by the public users. Thousands of people contribute their specialised knowledge to
the Wikipedia, and anyone can access the information at no cost.

Question 3). What is the difference between local and remote log-in in
TELNET?

In local login, a user logs into a local time-sharing program, and types at a
terminal running a terminal emulator. The keystrokes are accepted by the
terminal driver which passes the characters to the operating system that may
assign special meanings to these
characters. These situations do not create any problem in local login because the
terminal emulator and the terminal driver know the exact meaning of each
character, they may create problems in remote login.

In remote login, on the other hand, when a user wants to access an application
program,he or she performs remote login. The user sends keystrokes to the
terminal driver where the local operating system accepts the characters but does
interpret them. They are sent to the telnet client which in turn transforms the
characters to a universal character set called "Network Virtual terminal
characters" and delivers them to the local TCP/IP stack. However, the characters
cannot be passed directly to the operating system because the remote operating
system is designed to receive characters from terminal drivers and not directly
from the telnet server. The solution for this is to add a piece of software called a

MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
3


Pseudoterminal driver, which pretends that the characters are coming from
a terminal. The operating system then passes the characters to appropriate
application programs.

Question 4). Explain why ftp does not have a message format?

Because FTP uses TCP, which allows data to be streamed a byte at a time.
FTP does not have headers. The only response that the client gets from the server
is: <code> <message>

1) The following is a dump of a TCP header in hexadecimal format. 05320017
00000001 00000000 500207FF 00000000

a) What is the source port number?
The source port number: source port is 2 bytes take 05 32 = 1330

b) What is the destination port number?
The destination port number is 2 bytes as destination address 00 17 == 23
(default TCP port)

c) What is the sequence number?
The sequence number is 4 bytes as sequence number 00 00 00 01 ==1

d) What is the acknowledgment number?
The acknowledgment number is next 4 bytes as ack 00 00 00 00 == 0

e) What is the length of the header?
The length of the header is 4 bits as HLEN 5 ==5 -- this indicates number of sets
of 4 bytes which makes the header lenght = 20bytes..

f) What is the type of the segment?
The type of the segment is 6 bits are reserved i.e.0 =0000and 2 bits from hex

g) What is the window size?
The window size is 2 bytes indicate the window length 07 FF == 2047 bytes

Assignment B

Question 1). Explain why most of the addresses in class A are wasted.
Explain why a medium size orlarge-size corporation does not want a
block of class C addresses.

Most addresses in class A are wasted because even though they were originally
designed for large organisations with a large number of attached hosts or routers,
because a block in the class A address is too large for almost any of the
organisations resulting in most of the addresses in class A not being used and
hence being wasted. In class A the first bit is 0 and the first byte in decimal
notation is from 0-127. In class C the first 2 bits are 1 and the third bit is 0,the
first byte is basically between 192-223 this results in a class C address being too
small for an average medium sized or large-sized corporation.


MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
4


Question 2). How many multicast addresses can be supported for the
IPv4 protocol in Ethernet? What is the size of address space lost when we
transform a multicast IPv4 address to an Ethernet multicast address?

The multicast address group for IPV4 is in the range of 224.0.0.0/4 former class D
network (224.0.0.0 to 239.255.255.255).
Since ethernet acts as an imperfect filter,the IP layer has to decide whether to
accept the datagrams data link layer passed to it. The IP layer therefore acts
as a more perfect filter.

Ethernet has a 48-bit destination address field. To avoid a kind of multicast ARP
when mapping multicast IP addresses to Ethernet and FDDI ones, IANA reserved
a range of addresses for multicast. Every Ethernet frame with its destination in
the range 01-00-5e- 00-00-00 to01-00-5e-ff-ff-ff (hexadecimal format) contains
data for a multicast group. The prefix 01-00-5eidentifies the frame as multicast,
the next bit is 0 and so only 23 bits are left to the multicast address. Since IP
multicast groups are 28 bits long, the mapping cannot be one to one.Only the 23
significant bits of the IP multicast group are placed in the frame, and the
remaining 5 higher order bits are ignored, resulting in 32 different multicast
groups being mapped to the same Ethernet/FDDI address.

Question 3). Name the advantages of optical fiber over twisted-pair and
coaxial cable.

1.Optical fibre can carry data for a longer distance (up 40 km with single mode).
2. Optical fiber also has higher transmission speeds than twisted pair or coaxial
cable.
3. Lower attenuation: Attenuation is significantly lower for optical fiber than for
coaxial c able or twisted pair and is constant over a wide range. Optical fibres
carry signals with much less signal energy loss than twisted pair or co-axial cable.
4.Greater capacity: optical fibre can carry a much higher bandwidth e.g upto
2gbps thanco-axial (hundreds of Mbps) and twisted pair (100mbps) and over
greater distances.
3- Fibre optic is also easier for installation engineers to handle.
4-Optical fibre cables are much lighter and thinner than coaxial and twisted pair
cables of the same bandwidth
5- Security Optical fibres are much more difficult to tap information from
undetected; a great advantage for banks and security installations.

6- Fibre optic is also immune to electromagnetic interference from radio signals,
car ignition systems, lightning
7. Optical fibre requires fewer repeaters than twisted pair and co-axial cable
resulting in lower cost and fewer sources of error.
8.Optical fiber is non-conductive and hence immune to high-voltage spikes and
can be used to connect equipment where complete electrical isolation is required
to prevent ground loops.
9.For equivalent bandwidth capability, an optical cable generally has (or can have,
depending on how it is constructed) a much smaller bend radius than a copper
cable.


MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
5


Question 4). How does sky propagation differ from line-of-
sight propagation?

Electromagnetic waves - radio waves - propagate through the air and vacuum by
altering theelectro-magnetic (EM) properties of space. They will be reflected
whenever the EM properties of the space change. Incoming radiation from the sun
partly ionizes some of the air molecules in the upper atmosphere and, for some
frequencies, this will reflect (or
refract) the EM signal. This allows the EM signal to be reflected over long
distances - even around the world - multiple hops. This is the sky propagation
that allows signals to travel all around the world via multiple atmospheric
reflections. This effect is only true for frequencies up to 10MHz or so. varies
naturally, day and night. A related phenomenon affecting the upper atmosphere,
is that incoming meteorites may give temporary ionization tracks for this
reflection/refraction. These have been used for burst transmissions but are not
suitable for broadcast communications. Higher frequencies, 100 MHz or so, on the
other hand are not affected by the ionized layers and require line - of - sight
propagation, from the transmitter to the receiver. Line of site propagation
basically requires both transmitter and receiver to be visible.
Sky wave propagation therefore transmits AM and lower frequencies over much
longer distances by bouncing them off the ionosphere whereas line of sight
propagation is limited to transmitting higher frequency microwaves between
visible transmitter and receiver.

Assignment-C

1). Put the following in the correct order, from high to low: session (a),
presentation (b), physical (c), data link (d), network (e), application (f), transport
(g).
a) c, d, e, g, a, b, f
b) f, a, b, g, d, e, c
c) f, b, g, a, e, d, c
d) f, b, a, g, e, d, c ()

2). The _________ layer provides for hardware addressing.
a) Transport
b) Network
c) Data link ()
d) Physical

3). Which component of the data link layer for IEEE specifies network protocols?
a) LLC ()
b) MAC
c) 802.5
d) 802.3

4). The network layer solves all of the following problems except ___________.
a) Broadcast problems
b) Conversion between media types
c) Hierarchy through the use of physical addresses ()
d) Collision problems

MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
6



5). Connection multiplexing is done through the use of a ________ number.
a) Socket ()
b) Hardware
c) Network
d) Session

6). Reliable connections go through a three-way handshake. Place the following in
the correct order: ACK (1), SYN, (2), SYN/ACK (3).
a) 2, 1, 3
b) 3, 2, 1
c) 2, 3, 1 ()
d) 1, 2, 3

7). _________ describe(s) users working from home.
a) SOHO ()
b) Branch office
c) Regional office
d) Corporate office

8). _________ has a physical star topology but a logical ring topology
a) Ethernet
b) FDDI
c) Token Ring ()
d) FDDI and Token Ring

9). A _________ uses Gigabit Ethernet as a media type
a) WAN
b) LAN
c) MAN
d) LAN and MAN ()

10). The TCP/IP protocol stack has ________ layers.
a) 4
b) 5 ()
c) 6
d) 7

11). A Class A address has _________ host bits.
a) 8
b) 16
c) 20
d) 24 ()

12). 191.75.39.24 is a Class __________ address.
a) A
b) B ()
c) C
d) None of the above

13). Which of the following is a valid subnet mask value?

MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
7


a) 255.0.255.255
b) 0.0.0.255
c) 255.255.254.0 ()
d) 255.255.255.256

14). You are given a Class C network with 25 bits of networking. How many
subnets do you have?
a) 1
b) 2 ()
c) 3
d) 4

15). You are given a Class B network with a subnet mask of 255.255.255.192.
How many host addresses are there on each subnet?
a) 30
b) 62 ()
c) 126
d) 254

16). You are given the following addressing information: 192.168.37.192/25.
What type of address is this?
a) Network
b) Directed broadcast
c) Host ()

17). When choosing a networking product, you should consider all of the following
except _______.
a) Ease of installation and support
b) Product features and functions
c) Backplane capacity
d) Amount of memory ()

18). When connecting a router to a PC, use a __________ cable.
A) Crossover ()
B) Straight-through
C) Rollover

19). With _________ switching, the switch reads the destination MAC address of
the frame and immediately starts forwarding the frame.
a) Store-and-forward
b) Cut-through ()
c) Fragment-free
d) Runtless

20). Which type of traffic is sent to a group of devices?
a) Multicast ()
b) Unicast
c) Broadcast
d) Groupcast

21). What subnet mask would you use to set up a default route?

MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
8


a) 0.0.0.0
b) 255.255.255.255
c) Depends on the type of network number
d) None of these answers ()

22). When choosing a dynamic routing protocol, which of the following should not
be considered?
a) Metrics used
b) How routing information is shared
c) How routing information is processed
d) Number of PCs in the network ()

23). A routing protocol will use a(n) _________ to determine which path is the
best path.
a) Administrative distance
b) Metric ()
c) Hop count
d) Cost

24). Which type of routing protocol uses the Shortest Path First algorithm?
a) Distance vector
b) Link state ()
c) Hybrid

25). What command activates the IP routing process?
a) router
b) enable
c) network ()
d) no shutdown

26). RIP has a maximum hop count of ____________ hops.
A.10
B.15 ()
C.16
D.100

27). Which of the following is false concerning OSPF?
a) It provides a loop-free topology.
b) It is a classful protocol and allows for a hierarchical design ()
c) It requires more memory and processing cycles than distance vector protocols.
d) It is complex to configure and difficult to troubleshoot.

28). The OSPF process ID is __________.
a) Locally significant and is the router ID
b) Globally significant and must be configured on every router
c) Locally significant ()
d) OSPF doesnt use a process ID, but an AS number

29). An OSPFs router ID is based on __________.
a) The lowest IP address on its loopback interface, if configured, or the lowest IP
address on its active interfaces

MSI 204 Networking Fundamentals Assignment |PEN : A1922-813-080(EL)
9


b)The highest IP address on its loopback interface, if configured, or the
highest IP address on its active interfaces ()
c) The highest IP address on its active interfaces, if configured, or the highest IP
address on its loopback interfaces
d) The lowest IP address on its active interfaces, if configured, or the lowest IP
address on its loopback interfaces

30). You are given a Class C network, 192.168.1.0/24. You need one network
with 120 hosts and three networks with 60 hosts. What subnet mask values would
you use?
a)255.255.255.128 and 255.255.255.192
b)255.255.255.128
c) 255.255.255.192
d) None of these ()

31). Which of the following is a private address?
a) 192.169.7.17
b) 172.s32.28.39
c) 10.1.256.8
d) 172.16.255.89 ()

32). Which of the following reasons might you need to use address translation?
a) You have to use public addressing because your ISP didnt assign you
enough private addresses.
b) You are using private addresses but have changed ISPs, and your new ISP
wont support these private addresses.
c) You want to assign the same IP address to multiple machines so that users on
the Internet see this offered service as a single logical computer.
d) You are merging two companies that use different address spaces ()


--- End of Assignment ---

Das könnte Ihnen auch gefallen