CCN qb3
CCN qb3
CCN qb3
Module 4
1. Explain IPv4 datagram format.
2. Explain Options field in the header of IPv4 datagram format. Mention the two types
of options and briefly explain them
3. Briefly describe how we can defeat the following security attacks
a. packet sniffing b. packet modification c. IP spoofing
4. What is the use of ICMPv4 in traceroute? Explain with a neat diagram
5. Describe the following inefficiency in mobile IP in brief.
a) Double crossing b) Triangle routing
6. Which are the three phases a mobile host goes through to communicate with a remote
host. Explain in brief.
7. Explain the distance vector routing. What are the problems associated with distance
vector routing?
8. Explain Least cost tree using shared link state database with suitable example.
9. With a neat diagram describe areas in an Autonomous system in OSPF
10. Explain path vector routing with an example.
11. With a neat diagram explain general format of ICMP messages
12. Apply link state routing for the given Fig.(a) below and create a least cost tree using
Dijkstra Algorithm (and other similar problems)
13. An IP datagram has arrived with the following partial information in the
header (in hexadecimal): (and other similar problems)
14. Determine if a datagram with the following information is a first fragment, middle
fragment, a last fragment, or the only fragment (no fragmentation)
a. M bit is set to 1 and the value of the offset field is zero.
b. M bit is set to 1 and the value of the offset field is nonzero. (and other similar
problems)
15. Explain the operation of External and Internal Border Gateway Protocol
Module 5