Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IPv4: Addresses are 32 bits in length and provides a maximum of 232 addresses. IPv6: Addresses are 128 bits in length and provides a maximum of 2128 addresses. IPv4: Notations used are binary and dotted decimal notation. Eg: 01110101 10010101 00011101 00000010 (Binary notation) 117.149.29.2 (Dotted decimal notation) - 4 byte address Each byte is one octet, ranges from 0 to 255. IPv6: Notations used is Hexadecimal colon notation. Eg: 11 11 11 01 11 10 11 00 128 bits are divided into 8 sections. Each 2 bytes in length. 2 bytes in hexadecimal notation requires 4 hexadecimal digits separated colon FDEC : 0074 : 0000 : 0000 : 0000 : B0FF : 0000 : FFFF
b.) Link state routing algorithm: Each node in the domain has the entire topology of the domain. The list of nodes and links, how they are connected including the type, cost(metric) and condition of the links. The node can use Dijkstras algorithm to build a routing table. This routing table changes dynamically as the topology changes.
over the TCP based network. FTP is an application layer protocol. c.) NCP: Netware Core Protocol. This protocol is used in the products of Novell, Inc. It is used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions. It is a session layer protocol. d.) ARP: Address Resolution Protocol. It is used to associate a logical address with a physical address. It is a data link layer protocol.
e.) RARP: Reverse Address Resolution Protocol. It allows a host to discover its internet
address when it knows only its physical address. It is used when a computer is connected to a network for the first time or when a diskless computer is booted. f.) ICMP:Internet Control Message Protocol. It is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. It is a Network Layer Protocol. g.) IGMP: Internet Group Message Protocol. It is used to facilitate the simultaneous transmission of a message to a group of recipients. It is a Network Layer Protocol. h.) Telnet: is used on Internet or LAN to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. i.) NNTP : Net New Transfer Protocol. It is a TCP/IP protocol used to transfer articles between servers as well as to read and post articles. It is an application layer protocol. j.) SMTP: Simple Mail Transfer Protocol. It is an internet standard for electronic mail transmission across the Internet Protocol Networks. SMTP is used only for sending messages and POP/IMAP is used for receiving the messages.
What is congestion ?
When too many packets are present in the subnet, performance degrades. This situation is called CONGESTION. If all of a sudden, streams of packets begin arriving on 3 or 4 input lines and all need the same output line, a queue will be formed. If there is insufficient memory to hold all of them, packets will be lost.
Retransmission timer: When a segment is sent, a retransmission timer is started. If the segment is acknowledged before the timer expires, the timer is stopped. If, on the other hand, the timer goes off before the acknowledgement comes in, the segment is retransmitted. Persistence timer: It is designed to prevent the following deadlock. The receiver sends an acknowledgement with a window size of 0, telling the sender to wait. Later, the receiver updates the window, but the packet with the update is lost. Now both the sender and the receiver are waiting for each other to do something. When the persistence timer goes off, the sender transmits a probe to the receiver. The response to the probe gives the window size. If it is still zero, the persistence timer is set again and the cycle repeats. If it is nonzero, data can now be sent. Keepalive timer: When a connection has been idle for a long time, the keepalive timer may go off to cause one side to check whether the other side is still there. If it fails to respond, the connection is terminated. The last timer used on each TCP connection is the one used in the TIMED WAIT state while closing. It runs for twice the maximum packet lifetime to make sure that when a connection is closed, all packets created by it have died off.
b.)
c.)
d.)
What is Tunnelling?
Tunneling is a strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4. To pass through this region, the packet must have an IPv4 address. So the IPv6 packet is encapsulated in an IPv4 packet when it enters the region, and it leaves its capsule when it exits the region. It seems as if the IPv6 packet goes through a tunnel at one end and emerges at the other end.
What is ARP?
The Address Resolution Protocol (ARP) is used to associate a logical address with a physical address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or station address, usually imprinted on the network interface card (NIC). ARP is used to find the physical address of the node when its Internet address is known.
(a) Upward multiplexing. (b) Downward multiplexing. Multiplexing can also be useful in the transport layer for another reason. Suppose, for example, that a subnet uses virtual circuits internally and imposes a maximum data rate on each one. If a user needs more bandwidth than one virtual circuit can provide, a way out is to open multiple network connections and distribute the traffic among them on a round-robin basis. This modus operandi is called downward multiplexing.
Adaptive Algorithm : change their routing decisions to reflect changes in the topology,
and usually the traffic as well. Adaptive algorithms differ in where they get their information (e.g., locally, from adjacent routers, or from all routers), when they change the routes, and what metric is used for optimization. These are called dynamic routing.
b)
Name any five well known ports used with UDP? PORT 7 8 11 13 17 PROTOCOL Echo Discard Users Daytime Quote DESCRIPTION Echoes a received datagram back to the sender. Discards any datagram that is received. Active users. Returns the date and the time. Returns a quote of the day.
Returns a string of characters. Domain Name Service Server port to download boostrap information. Client port to download bootsrap information. Trivial File Transfer Protocol Remote Procedure Call Network Time Protocol Simple Network Management Protocol Simple Network Management Protocol(trap)
Name any five well known ports used with TCP? PORT 7 9 11 13 17 19 20 21 23 25 53
67
PROTOCOL Echo Discard Users Daytime Quote Chargen FIP, Data FIP, Control TELNET SMTP DNS
BOOTP
DESCRIPTION Echoes a received datagram back to the sender. Discards any datagram that is received. Active users. Returns the date and the time. Returns a quote of the day. Returns a string of characters. File Transfer Protocol (data connection) File Transfer Protocol (control connection) Tenninal Network Simple Mail Transfer Protocol Domain Name Service
Bootstrap Protocol
79
Finger
Finger
80 111
HTTP RPC
List out the techniques for achieving the good quality of network services.
Overprovisioning Buffering Traffic Shaping The Leaky Bucket Algorithm The Token Bucket Algorithm Resource Reservation Admission Control Proportional Routing Packet Scheduling
Expand
IGMP: The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships. IPX: Internetwork Packet Exchange (IPX) is the OSI-model Network layer protocol in the IPX/SPX protocol stack.The IPX/SPXM protocol stack is supported by Novell's
NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking protocol. Novell derived IPX from Xerox Network Systems' IDP protocol. But IPX was not scalable enough for large networks such as the internet. ICMP : Internet Control Message Protocol. It is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. It is a Network Layer Protocol. MPLS :
6) User Datagram protocol (UDP) is faster, simpler and more efficient than TCP. However, User Datagram protocol (UDP) it is less robust then TCP 7) Multiplexing and Demultiplexing is possible in User Datagram Protcol (UDP) using UDP port numbers. 8) There is no retransmission of lost packets in User Datagram Protcol (UDP).
Describe Internetworking.
The main purpose of internetworking is to interconnect different types of networks that allow the users of different networks to communicate and access the data from any of them.
NNTP stands for Network News Transfer Protocol and works in Application layer.
At the Network Layer TCP/IP supports internetworking protocol (IP). IP in turn uses 4 protocols ARP: Address Resolution Protocol. RARP: Reverse Address Resolution Protocol. ICMP: Internet Control Message Protocol IGMP: Internet Group Message Protocol.
UDP is suitable for a process that requires simple request-response communication with little concern for flow and error control. It is not usually used for a process that needs to send bulk data. UDP is suitable for a process with internal flow and error control mechanisms. For example, the Trivial File Transfer Protocol (TFTP) process includes flow and error control. It can easily use UDP.
UDP is a suitable transport protocol for multicasting. Multicasting capability is embedded in the UDP software but not in the TCP software. UDP is used for management processes such as SNMP UDP is used for some route updating protocols such as Routing Information Protocol (RIP)
Convert the IP address whose hexadecimal representation is C22F1582 to dotted decimal notation.
C2 194 2F 47 15 21 82 130 The dotted decimal notation is 194.47.21.130
Explain MPLS.
Multiprotocol label switching (MPLS) is a mechanism I high-performance telecommunication networks that directs data from one network node to the next base on short path labels.
In a block of address, we know the address of one host is 25.34.12.56/16 a) What is the network address in this block? b) What is the cast address? c) What is the number of addresses in this block?
a.) First/Network address: Convert the host value to binary 25.34.12.56 00011001 00100010 00001100 00111000
b.) Last/Cast address: Convert the host value to binary 25.34.12.56 00011001 00100010 00001100 00111000
Set the rightmost 32-n bits to 1. Here n=16 32-16= 16 00011001 00100010 11111111 11111111
c.) Number of addresses in the block: Find the difference between the first address and the last address or use the formula 232-n
Find the class of the following IP address. a.) 11110111 11110011 10000111 11011101 b.) 10101111 11000000 11110000 00011101 c.) 11011111 10110000 00011111 01011101
Check the first bits of the first byte. If it begins with 0 If it begins with 10 Class A Class B Class C Class D
Class E