Professional Documents
Culture Documents
Cat 2 Exam Notes - CN Part A-3,4
Cat 2 Exam Notes - CN Part A-3,4
NETWORK LAYER
PART – A
The following are metrics used in determining the best path for a routing protocol:
Bandwidth – Throughput speed in bits per second
Cost – An arbitrary value assigned by an administrator for the intersecting of
networks
Delay – Network latency caused by such factors as distance or congestion
Hop Count – The number of routers (hops) a packets passes through to its destination
Load – Measurement of traffic that flows through a router
MTU (Maximum Transmission Unit) – The largest unit size allowed to be transmitted
on all routes from source to destination
Reliability – Represents the amount of network downtime, that is, how reliable a
network path is?
Ticks – Measurement of delay, where is tick is 1/18 of a second. A tick is used as
part of the routing protocol IPX RIP
(a) 110.34.56.45
Class A
(b) 212.208.63.23
Class C
8. Discover the network address in a class A subnet with the IP address of one of the
hosts as 25.34.12.56 and mask 255.255.0.0?
Subnet address = IP address of system logical and with bnet mask Given IP address is
25.34.12.56 and subnet mask is 255.255.0.0 Then subnet address is calculated by
9. Demonstrate the need for sub netting?
Subnetting is breaking up a single network into smaller networks. To do this, you add
more bits (more numbers) to the subnet mask. Traditionally, we are used to seeing subnet
masks that look like 255.0.0.0, 255.255.0.0, or 255.255.255.0.
12. Analyze how routers differentiate the incoming unicast, multicast and broadcast IP
packets
14. Can you relate the two different classes of routing protocol?
17. Recommend the benefits of Open Shortest Path First (OSPF) protocol?
OSPF ADVANTAGES:
Authentication
Support for hierarchy within a single routing domain
Multiple same-cost paths and
Integrated support for unicast and multicast routing.
18. Determine the two major mechanisms defined to help transition from IPv4 to IPv6.
The two major mechanisms defined to help transition from IPv4 to IPv6:
Dual Stack Routers
Tunneling
DUAL STACK ROUTERS:
In dual-stack router, A router’s interface is attached with IPv4 and IPv6 addresses
configured are used in order to transition from IPv4 to IPv6.
TUNNELING:
Tunneling is used as a medium to communicate the transit network with the
different IP versions.
19. Test whether the following IPv6 address notations are correct.
(a) ::0F53:6382:AB00:67DB:BB27:7332
(b) 7803:42F2:::88EC:D4BA:B75D:11CD
(a) ::0F53:6382:AB00:67DB:BB27:7332
x The given IPv6 address notation ::0F53:6382:AB00:67DB:BB27:7332 is valid.
(b)7803:42F2:::88EC:D4BA:B75D:11CD
The given IPv6 address notation 7803:42F2:::88EC:D4BA:B75D:11CD is invalid.
Two or more block of zeroes can be represented only by two ::
But in the above address there mentioned three ::: by this IPV6 is proved to be invalid.
4. TRANSPORT LAYER
PART – A
TCP UDP
It is a communications protocol, using It is same as the TCP protocol except this
which the data is transmitted between doesn’t guarantee the error-checking and
systems over the network. data recovery. the data will be sent
continuously, irrespective of the issues in
the receiving end.
TCP is a connection oriented protocol. UDP is a connection less protocol
In TCP the data is transmitted in a particular On other hand there is no sequencing of data
sequence which means that packets arrive in UDP in order to implement ordering it
in-order at the receiver. has to be managed by the application layer.
TCP is slower and less efficient in On other hand UDP is faster and more
performance as compared to UDP. Also efficient than TCP.
TCP is heavy-weight as compared to UDP.
Retransmission of data packets is possible On other hand retransmission of packets is
in TCP in case packet get lost or need to not possible in UDP.
resend
15. Classify the advantages of connection oriented services over connectionless services
ADVANTAGES:
16. Suppose a TCP connection is transferring a file of 5000 bytes. The first byte is
numbered 10001.What are the sequence numbers for each segment if data are sent in
three segments, each carrying 1000 bytes.
18. Formulate what will happen if Congestion Control is not implemented in a Network