Professional Documents
Culture Documents
I Just Collected The Possible Answer You Should Arrange The Answer On Your Way. Any Wrong Answers Founded Inform Me
I Just Collected The Possible Answer You Should Arrange The Answer On Your Way. Any Wrong Answers Founded Inform Me
I Just Collected The Possible Answer You Should Arrange The Answer On Your Way. Any Wrong Answers Founded Inform Me
I just collected the possible answer; you should arrange the answer on your way. Any wrong
answers founded inform me.
Answer: IP is the network layer service implemented by the TCP/IP protocol suite.
IP was designed as a protocol with low overhead. It provides only the functions that are necessary to
deliver a packet from a source to a destination over an interconnected system of networks. The protocol
was not designed to track and manage the flow of packets. These functions, if required, are performed by
other protocols in other layers.
Connectionless - No connection with the destination is established before sending data packets.
Conditional DNS forwarding is a useful feature that avoids the usual recursive nature of DNS resolution
requests, in which DNS must first find DNS servers for .com, then ntfaq.com, and so on. If you have a
large namespace, you might consider using conditional DNS forwarding to speed up resolution requests.
This feature is also useful for connecting two organizations, especially if one organization uses a
nonstandard namespace--for example, savilltech.local--that the typical DNS name-resolution process
would never find.
3. Explain the limits of firewall's security? (3 Marks).
A firewall cannot prevent users or attackers with modems from dialing in to or out of the internal
network, thus bypassing the firewall and its protection completely.
Firewalls cannot enforce your password policy or prevent misuse of passwords. Your password
policy is crucial in this area because it outlines acceptable conduct and sets the ramifications of
noncompliance.
Firewalls are ineffective against nontechnical security risks such as social engineering.
Firewalls cannot stop internal users from accessing websites with malicious code, making user
education critical.
Firewalls cannot protect you from poor decisions.
Firewalls cannot protect you when your security policy is too lax.
Efficient technique for carrying messages that fit within one data packet. Answer: UDP
Medium/ communication channel: twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
1. Assign an IP address to the leftmost interface of the router, given that the subnet part of IP
addresses are 24 bits. (2marks)
Answer: Any address starting with 111.111.111.* is fine (except for * being 111 and 112).
2. Suppose A wants to send an IP datagram to B and knows B’s IP address. Must A also
know B’s MAC address to send the datagram to B? If so, how does A get this info? If not,
explain why not.(2marks)
Answer: Yes, since B is on the same subnet, it will need to know B’s MAC address. This will be done
through the ARP protocol.
3. Suppose A wants to send an IP datagram to C and knows C’s IP address. Must A also
know C’s MAC address to send the datagram to C? If so, how does A get this info? If not,
explain why not.(3marks)
Answer: No, A will forward the frame to the router, and the router will then de-capsulate the
datagram and then re-encapsulate the datagram in a frame to be sent over the right subnet. R will need
to run ARP in this case to get C’s MAC address, but A will not).
4. Suppose that R has a datagram (that was originally sent by A) to send to C. What are the
MAC addresses on the frame that is sent from R to C? What are the IP addresses in the IP
datagram encapsulated within this frame? (3marks)
Answer: source IP: 111.111.111.111, dest IP: 222.222.222.222. source MAC: 1A-23-F9-CD-06-9B
(right interface of R), dest MAC: 49-BD-D2-C7-56-2A (node C).
Describe the role of segments in the transport layer and the two principle ways segments can be marked
for reassembly. (4 Marks).
Then, describe the mechanisms in TCP that manage the interrelationship between window size, data loss
and congestion during a session (6 Marks).
Here, window is the maximum amount of data that can be send before ACK is received.
Answer the following questions, for only student under Faculty of FCIT:
1. Convert “172” decimal to 8-bit binary & convert “10.1.1.0” to decimal (2 Mark).
A host is assigned an IP of “192.168.5.2”. You have to find the its Class, Default Mask, Network IP,
Broadcast IP, First Hosts IP, Last Host IP (4 Mark).
Answer:
Class: C
Answer:
Business students should ignore the above questions and answer the following one:
1. Compare IPv4 versus IPv6 computer networks addressing in term of the following features:
IP header
IPv6 header is much simpler than IPv4 header. The size of IPv6 header is much bigger than that of IPv4
header. IPv4 addresses are 32bit binary numbers and IPv6 addresses are 128 bit binary numbers.
Addressing Range
IPv4: 32 bits long (4 bytes). The total number of IPv4 addresses is 2 32(4 294 967 296)
IPv6: 128 bits long (16 bytes). The number of IPv6 addresses is 2128(3.4* 1038 )
Addressing Type
Autoconfigration& Security
IPv4: You must configure a newly installed system before it can communicate with other systems; that is,
IP addresses and routes must be assigned
IPv6: Configuration is optional, depending on functions required. IPv6 can be used with any Ethernet
adapter and can be run over the loopback interface. IPv6 interfaces are self-configuring using IPv6
stateless autoconfiguration. You can also manually configure the IPv6 interface. So, the system will be
able to communicate with other IPv6 systems that are local and remote, depending on the type of network
and whether an IPv6 router exists.
IP Multicast
Multicast addresses in IPv6 are similar to multicast addresses in IPv4. They are used to communicate with
dynamic groupings of hosts.
Describe what is proposing of using OSI Model, then gave the name of layers.
Answer: OSI is a theoretical model that aims to explain how computers can network together. It allows
different types of network hardware and software to communicate. To help network administrators by
dividing large data exchange process in smaller segments.
Layer 7 - Application
Layer 6 - Presentation
Layer 5 - Session
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data Link
Layer 1 - Physical
Answer:
Find if the given IP address 192.168.10.33/ 26 is valid host, subnet or broadcast
255.255.255.192
Number of subnet
64
Broadcast: 192.168.10.63
Write the subnet, broadcast address, subnet mask and valid host range for the following: