After Mid 1,3,4,5,6

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Sheet 1

1- What is the meaning of mainframe compu ng system?


A mainframe compu ng system is a type of computer that is designed to handle large-scale, mission-
cri cal applica ons and data processing tasks. These systems are characterized by their high processing
power, large memory capacity, and ability to handle mul ple tasks simultaneously.

2- What is the difference between Dump terminal and Personal computer?


 Dumb Terminal: Basic input/output device with no processing power, relies on a remote system
for processing, limited storage, and no local opera ng system.
 Personal Computer (PC): Standalone compu ng device with its own processing power, storage,
and opera ng system, capable of running various applica ons independently.
 The difference between them :-
 Dumb terminals are dependent on a central system, while PCs can operate independently.
 Dumb terminals have minimal storage, while PCs have ample storage capacity.
 Dumb terminals are limited to input/output func ons, while PCs can run a wide range of
applica ons and perform diverse tasks.
 Dumb terminals lack a local opera ng system, while PCs have their own opera ng systems.
 Dumb terminals require a network connec on, while PCs can operate offline and connect
to networks as needed.

3- What is the meaning of computer networks?


A computer network is a group of computers and other devices that are connected to enable
communica on and data sharing between them. Computer networks can be small or large, and can be
used in homes, businesses, and other organiza ons to enable communica on, collabora on, and
resource sharing.

4- What are the objec ves of computer networks?


1.Resource sharing: One of the main objec ves of computer networks is to enable sharing of hardware
and so ware resources, such as printers, storage devices, and applica ons. This can help to reduce costs
and increase efficiency by elimina ng the need for each device to have its own dedicated resources.

2.Communica on and collabora on: Computer networks facilitate communica on and collabora on
between devices and users, enabling people to share informa on, work together on projects, and
coordinate their efforts more effec vely.

3.Data sharing and transfer: Computer networks enable the transfer and sharing of data between
devices and users, making it easier to access and use informa on from different loca ons and devices.

4.Remote access: Computer networks can enable remote access to resources and applica ons, allowing
users to access them from anywhere with an internet connec on.
5.Improved efficiency and produc vity: By enabling resource sharing, communica on, collabora on,
and remote access, computer networks can help to improve efficiency and produc vity, allowing
organiza ons and individuals to accomplish more in less me.

5- Draw a schema c diagram illustra ng the dataflow throw computer networks

6- What is the meaning of network topology of the network?


Network topology refers to the physical or logical layout of a computer network. It describes how devices
and nodes in a network are connected and arranged, and the paths that data takes as it travels through
the network.

and the common types of network topology:

1.Bus topology: Devices in a bus topology are connected to a single communica on line, which acts as a
shared medium for transmi ng data.

2.Star topology: Devices in a star topology are connected to a central hub or switch, which acts as a
communica on center for the network.

3.Ring topology: Devices in a ring topology are connected to each other in a circular loop, with each
device ac ng as a repeater to amplify the signal as it travels around the ring.

4.Mesh topology: Devices in a mesh topology are connected to each other in a complex web of
interconnec ons, with mul ple paths available for data transmission.

7- What are the factors that you should consider while choosing a certain network topology?
1.Scalability: A network topology should be scalable to accommodate future growth and expansion of
the network. The topology should be able to handle increased traffic and new devices being added to
the network.

2.Reliability: The network topology should be reliable, with redundant paths and backup mechanisms in
case of failure. This ensures that the network remains opera onal even if one or more devices or
connec ons fail.
3.Cost: The cost of implemen ng and maintaining the network topology should be considered, including
the cost of hardware, cabling, and network management tools. Some topologies may be more expensive
to implement than others.

4.Performance: The network topology should be capable of delivering the required performance for the
applica ons and services that will be used on the network. Factors such as bandwidth, latency, and
packet loss should be considered.

5.Security: The network topology should be secure, with appropriate measures in place to protect
against unauthorized access, data the , and other security threats.

8-Difine the following Terms:


NIC: is an essen al component of a networked device, allowing it to communicate with other devices on
the network and to access network resources such as files, printers, and the internet.

Protocol: A protocol in networking refers to a set of rules, standards, and procedures that govern the
exchange of data between devices and systems on a network. Protocols define how data is transmi ed,
received, and interpreted by devices, and ensure that data is transmi ed reliably and securely.

DSL: is a type of broadband internet technology that provides high-speed internet access over exis ng
telephone lines. DSL works by using a special modem to transmit data over unused frequencies on a
telephone line, allowing for simultaneous voice and data transmission.

ADSL: It is a type of digital communica on technology that enables high-speed data transmission over
exis ng telephone lines. ADSL is considered "asymmetric" because it provides faster download speeds
than upload speeds.

ISDN: ISDN (Integrated Services Digital Network) is a type of digital phone line that can transmit voice,
data, and video signals over the same line. It provides faster speeds than tradi onal analog phone lines.

HTTP: HTTP (Hypertext Transfer Protocol) is a protocol used for transmi ng data over the World Wide
Web. It defines how messages are forma ed and transmi ed, and is used to retrieve and display web
pages in a web browser.

WWW: The WWW (World Wide Web) is a collec on of interconnected web pages and other resources
that are accessed over the Internet using web browsers. It is one of the most widely used applica ons on
the Internet.

FTP: FTP (File Transfer Protocol) is a protocol used for transferring files over a network. It is commonly
used to upload and download files to and from a web server.

Unicasts: Unicasts are a type of network transmission in which data is sent from one device to another.
The data is sent only to the intended recipient, and not to any other devices on the network.

Mul casts: Mul casts are a type of network transmission in which data is sent from one device to
mul ple recipients. The data is sent to a specific group of devices, and only those devices receive the
data.
Broadcasts: Broadcasts are a type of network transmission in which data is sent from one device to all
devices on the network. The data is sent to every device on the network, regardless of whether it is
intended for a specific device.

IP: IP (Internet Protocol) is a protocol used for transmi ng data over the Internet. It is responsible for
addressing and rou ng packets of data between devices on the Internet.

TCP/IP: TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols used for
transmi ng data over the Internet. It includes a range of protocols, including IP, TCP, and others.

Server: A server is a computer or other device that provides services or resources to other devices on a
network. Examples include web servers, file servers, and database servers.

Client: A client is a computer or other device that uses services or resources provided by a server.
Examples include web browsers, email clients, and file transfer clients.

Modems: Modems are devices that convert digital signals to analog signals and vice versa, allowing
computers to communicate over tradi onal telephone lines.

RFC: RFC (Request for Comments) is a series of documents that describe various aspects of the Internet
and its protocols. They are published by the Internet Engineering Task Force (IETF) and provide
guidelines and recommenda ons for network communica on.

TTL: TTL (Time to Live) is a value that is included in IP packets to limit the amount of me

ISP: ISP (Internet Service Provider) is a company or organiza on that provides Internet access to
customers. ISPs offer various types of Internet connec ons, such as DSL, cable, and satellite, and typically
charge a monthly fee for their services.

Internet: The Internet is a global network of interconnected computer networks that use the TCP/IP
protocol to transmit data. It is one of the most widely used applica ons of computer networks and
provides access to a vast array of resources and services.

Extranet: An extranet is a private network that uses Internet technology to provide secure access to
selected external partners, vendors, suppliers, or customers. It is a controlled and secure way to share
informa on and resources between organiza ons.

Intranet: An intranet is a private network that uses Internet technology to provide secure
communication and collaboration within an organization. It is a network that is accessible only to
employees of the organization and can be used for a variety of purposes, such as sharing documents,
internal communication, and knowledge sharing.

9- What are the advantages and disadvantages of the following network topology?

ADV DISADV
Star  User-friendly: Easy addi on  High cost:
and removal of nodes without Implementa on of
affec ng the network. central network devices
can be expensive.
 Centralized network:  Central device
Monitored and managed dependency: Failure of
centrally using a hub, central the central hub leads to
computer, or switch. network down me.
 High reliability: Failure of one  High maintenance:
node or cable does not affect Central hub requires
the rest of the network. regular maintenance and
 High efficiency: Lower chances addi onal resources.
of data collision, resul ng in  Prone to damage: Cables
be er performance compared in the star topology are
to other network designs. suscep ble to damage.

Bus  Easy to set up and implement.  En re network affected if


 Requires less cabling. backbone fails.
 Cost-effec ve for small  Limited scalability
networks  Troubleshoo ng can be
difficult.
 Performance degrades
with more devices
Ring  Orderly data transmission  Network disrup on when
 Good network performance adding/removing
 Easy troubleshoo ng devices.
 Suitable for high data traffic  Single device or cable
failure can cause network
outage.
 More complex to
implement.
 Scalability limita ons
Hybrid  Combines benefits of mul ple  Requires more cabling.
topologies  Central hub/switch can
 Be er scalability be a single point of
 Increased fault tolerance failure.
 Easy fault iden fica on  Higher implementa on
costs
 Addi onal configura on
and management

10- Compare between peer to peer versus server-based networks?


Peer-to-Peer Networks:

 Decentralized, equal peers, no central authority.


 Peers directly share resources.
 Good scalability, suitable for small to medium-sized networks.
Server-Based Networks:
 Centralized, clients communicate with a dedicated server.
 Server manages resources and services.
 Higher processing power, limited scalability.
 Common in larger networks or web applica ons

___________________________________________________________________

Sheet 3
1 -Define the following Terms:

- MAC address - DHCP - Microso ISS component - 10 Base 5

- 10 Base 2 - DNS -OSI - IEEE 802.3 - IP number - Proxy server

MAC address: MAC address stands for Media Access Control address. It is a unique iden fier assigned to
a network interface card (NIC) by the manufacturer. MAC addresses are used at the data link layer of the
OSI model to uniquely iden fy devices on a network.

DHCP: DHCP stands for Dynamic Host Configura on Protocol. It is a network protocol that automa cally
assigns IP addresses and other network configura on se ngs to devices on a network. DHCP simplifies
the process of network configura on and allows devices to join and leave networks without manual IP
address configura on.

Microso IIS component: Microso IIS (Internet Informa on Services) is a web server so ware
developed by Microso . It provides a pla orm for hos ng and serving websites and web applica ons on
Windows-based servers. IIS components refer to the various modules and features that can be installed
and configured within the IIS server to enhance its func onality.

10 Base 5: also known as Thicknet, is an Ethernet networking standard that uses coaxial cable as the
transmission medium. It supports a maximum data transfer rate of 10 Mbps (megabits per second) and
allows for network segment lengths of up to 500 meters. However, it is an older and less commonly used
Ethernet standard today.

10 Base 2: 10 Base 2, also known as Thinnet, is an Ethernet networking standard that uses coaxial cable
as the transmission medium. It supports a maximum data transfer rate of 10 Mbps and allows for
network segment lengths of up to 185 meters. It is called "Thinnet" because the coaxial cable used in
this standard is thinner compared to the thicker coaxial cable used in 10 Base 5.

DNS: DNS stands for Domain Name System. It is a decentralized naming system used to translate human-
readable domain names (such as www.example.com) into IP addresses. DNS serves as a directory for the
internet, enabling users to access websites and other resources using easy-to-remember domain names
instead of complicated IP addresses.
OSI: stands for Open Systems Interconnec on. It is a conceptual framework that standardizes the
func ons of a communica on system into seven layers. Each layer has specific responsibili es in the
process of transmi ng data over a network, ensuring compa bility and interoperability between
different systems.

IEEE 802.3: is a standard defined by the Ins tute of Electrical and Electronics Engineers (IEEE) for
Ethernet networking. It specifies the physical and data link layer protocols for wired Ethernet networks,
including various Ethernet cable types, signaling methods, and network access control.

IP number: An IP number, commonly referred to as an IP address, is a unique numerical iden fier


assigned to each device connected to a network that uses the Internet Protocol for communica on. IP
addresses are used for iden fying and loca ng devices within a network or on the internet.

Proxy server: A proxy server acts as an intermediary between client devices and other servers on a
network. It receives requests from clients and forwards them to the appropriate server, caching the
response data if necessary. Proxy servers can enhance security, improve performance, and provide
anonymity by masking the client's IP address.

2- What are the ten primary parameters that must be verified for a cable link to meet TIA/EIA
standards.

1.Wireman: Verifies the correct pin-to-pin connectivity of each wire in the cable
2.Length: Ensures that the cable length meets the specified requirements
3.Attenuation: Measures the signal loss over the length of the cable
4.NEXT (Near-End Crosstalk): Determines the interference between adjacent wire pairs at the near end
of the cable
5.FEXT (Far-End Crosstalk): Measures the interference between adjacent wire pairs at the far end of the
cable
6.PSNEXT (Power Sum NEXT): Evaluates the crosstalk between multiple wire pairs
7.ELFEXT (Equal-Level Far-End Crosstalk): Measures the interference between adjacent wire pairs at the
far end, considering the attenuation effects
8.PSELFEXT (Power Sum ELFEXT): Evaluates the crosstalk between multiple wire pairs, considering the
attenuation effects
9.Return Loss: Measures the amount of signal reflected back from the cable's termination points
10.Delay Skew: Checks the difference in signal propagation delay between wire pairs in a cable
3- Compare between advantages and disadvantages of peer to peer and client /server
networks.

Pros Cons
Peer-to-peer  Cheap because it does not need a  It is generally slower because
central server. every user is accessed by
 The system will not be disrupted if other users.
one of the computers crashes.  It is less secure than other
 The network does not need a unique network models.
opera ng system to func on.  Possibili es of Illegal data
sharing
Client/server  Authorized users can access and  If the server crashes, the
modify data on a server. whole network will collapse.
 Access and resources are be er  Maintaining a central server
regulated on servers. can be costly and require a lot
 Flexible so any new user can be of manpower and me.
simply integrated into the networks.  The user policies in the
 Backing up and archiving data is network must be set by an
easier in this network expert network administrator

4 - Determine the maximum channel capacity in bps of a voice grade channel having a signal
power of 34 db and noise power of 4 db.
To determine the maximum channel capacity in bits per second (bps) of a voice grade
channel, we can use the Shannon Capacity formula:
C = B * log2(1 + (S/N))
Where:
C is the channel capacity in bps,
B is the bandwidth in hertz,
S is the signal power in watts, and N is the noise power in watt
In this case, we'll assume a typical voice grade channel bandwidth of 4 kHz (4000 Hz). We need to
convert the signal power and noise power from decibels (dB) to watts.
Signal power in watts:
P_s = 10^(P_s(dB)/10)
(10/34)^P_s = 10
P_s = 25.12 watts
Noise power in watts:
P_n = 10^(P_n(dB)/10)
(10/4)^P_n = 10
P_n = 1.58 watts

Now we can calculate the channel capacity:


C = B * log2(1 + (S/N))
((1.58/25.12) + 1)C = 4000 * log2
(15.92 + 1)C ≈ 4000 * log2
(16.92)C ≈ 4000 * log2
C ≈ 4000 * 4.0841
C ≈ 16336.4 bps
Therefore, the maximum channel capacity of the voice grade channel is approximately 16336.4 bps.

5- Draw a diagram to show the ISO- OSI model and TCP/IP layered protocols.

7 - Determine the delay ra o for communica on signal transmi ed over a 4000 km coaxial
cable, and a signal transmi ed though a satellite link. Consider the satellite at an orbit 36000
Km. From the earth and the propaga on speed in cable is 180000 km/sec.
For the coaxial cable:

Propagation Delay = Distance / Propagation Speed


Propagation Delay = 4000 km / 180,000 km/sec = 0.0222 seconds
For the satellite link:
Propagation Delay = Distance / Propagation Speed
Propagation Delay = 36,000 km / 300,000 km/sec = 0.12 seconds

Now, we can calculate the delay ratio:


Delay Ratio = Propagation Delay of Satellite Link / Propagation Delay of Coaxial Cable
Delay Ratio = 0.12 seconds / 0.0222 seconds ≈ 5.41

8- Dis nguish between baseband and broadband opera on.

Baseband Opera on:

 Uses the en re bandwidth for a single signal.


 No modula on or division of frequency bands.
 Suitable for short-range communica on.
 Examples include Ethernet LANs and communica on within computer systems.

Broadband Opera on:

 Divides the available bandwidth into subchannels.


 Involves modula on and mul ple frequency bands.
 Suitable for long-range and high-speed data transmission.
 Examples include cable TV, DSL internet, and cable modems.

9- Why are hubs undesirable?


Limited Bandwidth: Hubs share the available bandwidth among all connected devices, the more the
bandwidth gets divided. This leads to lower overall network performance and slower data transmission
speeds.
Broadcast Domain: Hubs have a single collision and broadcast domain, which means that when one
device sends a broadcast or multicast message, it is received by all devices connected to the hub. This
can cause unnecessary network congestion and may lead to security and privacy concerns.
Collision Issues: In a hub-based network, collisions can occur when multiple devices attempt to transmit
data at the same time. Collisions degrade network performance and require retransmissions, leading to
increased network latency and reduced efficiency.
Limited Scalability: Hubs have a limited number of ports, typically ranging from 4 to 24 ports. This limits
the scalability of the network, making it difficult to accommodate a large number of devices without
adding additional hubs or switches.

10- You will create a design for a network connecting four buildings in an industrial park.
Hand in a picture showing your network. There will be a core switch in each building.
Building A is the headquarters building. Building B is 85 meters south and 90 meters east of
the headquarters building. From the headquarters building, Building C is 150 meters south.
Building D is 60 meters west of Building C. Computers in Building A need to communicate
with computers in Building B at 60 Mbps. Computers in Building A need to be able to
communicate with computers in Building C at 300 Mbps. Computers in Building A must
communicate with computers in Building D at 50 Mbps. Computers in Building C must
communicate with computers in Building D at 75 Mbps. Building A will be connected directly
to Buildings B and C. Building C will be connected directly to Building D.
a) How will you connect Building A with Building B?
b) How will you connect Building A to Building C?
c) How will you connect Building C to Building D?
Here is a textual representation of the network design connecting the four buildings in the industrial
park:
Building A --- Building B --- Building C --- Building D
a) To connect Building A with Building B:
A direct Ethernet link can be established between the core switches in Building A and Building B using a
fiber optic cable. This connection should support a speed of 60 Mbps to meet the required
communication between the computers in both buildings.
b) To connect Building A to Building C:
Again, a direct Ethernet link can be established between the core switches in Building A and Building C
using a fiber optic cable. This connection should support a speed of 300 Mbps to meet the required
communication between the computers in both buildings.
c) To connect Building C to Building D:
A direct Ethernet link can be established between the core switches in Building C and Building D using a
fiber optic cable. This connection should support a speed of 75 Mbps to meet the required
communication between the computers in both buildings.

11- Distinguish between single-mode and multimode fiber in terms of transmission distance.
Single-mode fiber:
 Smaller core diameter (8-10 microns).
 Supports a single, direct light path.
 Longer transmission distances of tens to hundreds of kilometers.
 Used in long-distance telecommunications and high-data-rate applications.
Multimode fiber:
 Larger core diameter (50 or 62.5 microns).
 Allows multiple light paths to propagate simultaneously.
 Shorter transmission distances of a few hundred meters to a few kilometers.
 Used in short-range applications like LANs and data centers.

12- Assume that a LAN for a small organiza on is to be developed. The number of
worksta ons in this LAN is supposed less than or equal 32. LAN specialists have made four
design scenarios as follows:
- Design using one 32-ports 100 mbps Ethernet Hub.
- Design using four 8-ports 100 mbps Ethernet Hub.
- Design using four 8-ports 100 mbps Ethernet Hub and one 100 mbps Ethernet Switch
- Design using four 8-ports 100 mbps Ethernet Switch.

Design using one 32-ports 100 Mbps Ethernet Hub:

 Cost: This design requires a single hub, which tends to be less expensive
compared to switches.
 Speed: All workstations connected to the hub share the same bandwidth,
resulting in lower overall network speed.
 Coverage span: The coverage span is limited to the reach of the hub, which is
typically shorter compared to switches.

Design using four 8-ports 100 Mbps Ethernet Hubs:


 Cost: This design requires four hubs, which can be more expensive compared to
using a single hub or switches.
 Speed: All workstations connected to each hub share the same bandwidth,
resulting in lower overall network speed.
 Coverage span: The coverage span is limited to the reach of each hub, which is
typically shorter compared to switches.

Design using four 8-ports 100 Mbps Ethernet Hubs and one 100 Mbps Ethernet Switch:

 Cost: This design requires four hubs and one switch, which may be more
expensive compared to using a single hub or switches alone.
 Speed: The switch provides dedicated bandwidth for each connected workstation,
resulting in higher network speed compared to using hubs only.
 Coverage span: The coverage span is limited to the reach of each hub and the
switch, which is typically longer compared to using hubs only.

Design using four 8-ports 100 Mbps Ethernet Switches:

 Cost: This design requires four switches, which can be more expensive compared
to using a single hub or hubs only.
 Speed: Each switch provides dedicated bandwidth for each connected
workstation, resulting in higher network speed compared to using hubs only.
 Coverage span: The coverage span is limited to the reach of each switch, which is
typically longer compared to using hubs only.
_____________________________________________________________________________________

Sheet 4
1- A group of N sta ons share a 56-kbps pure ALOHA channels. Each outputs a 1000-bit frame
on an average of once every 100 sec, even if the previous one has not yet been sent (e.g., the
sta ons are buffered). What is the maximum value of N?

There are N Sta ons Sharing 56kbps Pure ALOHA Channel. The maximum throughput for pure Aloha is
18.4%

Usable Channel Rate = 0.184 * 56 kbps = 10.3 kbps.

Bits per second outpu ed by each sta on = 1000 bits / 100 sec = 10 bps.

For N sta ons in 1 sec, Total Output Data is 10*N bits this should be equal to the Channel Capacity in
pure ALOHA.

N*103 /10 =1030


N=1030 is the maximum value of the Number of Sta ons Possible.

2- A LAN is working based on p-persistent system, p is given by p= (n/ (N+1)) where n is the
sta on number and N is the total number of LAN sta ons. Assuming that N=9 what is the
probability of a node number 6 to send its packet over an idle bus and what is the probability
to defer transmission to the next me slot?

 N = 9 (total number of LAN sta ons)


 n = 6 (node number)
1. p = n / (N + 1)
2. p = 6 / (9 + 1)
3. p = 0.6
4. so, the probability of node number 6 sending its packet over an idle bus is 0.6 or 60%.
1. Probability of deferring transmission = 1 - p
2. Probability of deferring transmission = 1 - 0.6
3. Probability of deferring transmission = 0.4 or 40%

So, the probability of node number 6 deferring transmission to the next me slot is 0.4 or 40%.

3- A large popula on of ALOHA users mange's to generate 50 requests/sec, including both


originals and retransmissions. Time is slo ed in units of 40 msec.

T = 40 msec = 0.04 sec, λ = 50 req/sec = 50 frames/sec

a) What is the chance of success on the first a empt?


Success on the first a empt means there is no collision
Po = e- λT = e-2

b) What is the probability of exactly k collisions and then a success?

Probability of K collisions = Pkcollision = (1  e  T ) k


Probability of K collisions = Pkcollision = (1  e  T ) k * e- λT = (1 – e-2)k * e-2
= (0.865)k * 0.135

c) What is the expected number of transmission a empts needed?


Expected number of transmissions = 1 / Pnocollision = e2 = 7.387524
4- Compare between circuit switching and packet switching?

Circuit Switching:

 Dedicated communication path established between sender and receiver.


 Fixed bandwidth allocation throughout the duration of the communication.
 Suitable for real-time, continuous data transmission (e.g., voice calls).
 Efficient for constant bit rate applications.
 Requires resources to be reserved even during periods of silence or inactivity.

Packet Switching:

 Data divided into packets and transmitted independently.


 Packets can take different paths and be reassembled at the destination.
 Bandwidth is dynamically allocated based on network conditions.
 Suitable for bursty, non-continuous data transmission (e.g., internet browsing).
 Efficient for variable bit rate applications.
 No need to reserve resources, making it more flexible and efficient in utilizing network
capacity.
 Higher overhead due to packet headers and potential delays due to packet routing.

5- What are the two approaches of packet switching techniques? Using diagrams explain the
sequence of opera on for each one?

Virtual Circuit Packet Switching:

 Virtual circuit is established before data transmission.


 Packets are labeled with a circuit iden fier.
 Rou ng decisions are based on the circuit iden fier.
 Packets follow a predetermined path.
 Virtual circuit is terminated a er data transmission.

Datagram Packet Switching:

 Packets are treated independently.


 Each packet contains source and des na on addresses.
 Rou ng decisions are made at each hop based on the des na on address.
 Packets can take different paths.
 Reassembly of packets is done at the receiver's end.
Virtual Circuit Packet Switching

Datagram Packet Switching

6- Draw the frame format for Ethernet IEEE 802.3, then explain the meaning of each term in
the frame.

1. Preamble: A sequence of alterna ng 1s and 0s used for synchroniza on and signaling the start
of a frame.
2. Start of Frame Delimiter (SFD): An 8-bit pa ern indica ng the end of the preamble and the
beginning of the frame header.
3. Des na on MAC Address: The unique iden fier (MAC address) of the intended recipient of the
frame.
4. Source MAC Address: The MAC address of the device sending the frame.
5. EtherType/Length: Specifies the protocol or data type within the frame. If the value is less than
or equal to 1500, it indicates the length of the payload.
6. Payload: The actual data being transmi ed, its format and content depend on the specified
protocol.
7. Frame Check Sequence (FCS): A 32-bit field for error detec on, containing a CRC value
calculated over the en re frame.

7-Explain the opera on for each MAC protocol

- Pure ALOHA

 Sta ons can transmit data packets at any me, without checking for channel availability.
 If two or more sta ons transmit simultaneously, a collision occurs, and all par cipa ng
sta ons detect the collision.
 Colliding sta ons wait for a random amount of me and retransmit their packets.

- Slo ed ALOHA

 Time is divided into discrete slots, and each sta on can only transmit at the beginning of a
slot.
 Sta ons listen to the channel, and if it is idle, they transmit their packets in the next available
slot.
 If a collision occurs, sta ons wait for the next available slot and retransmit their packets.

- One -Persistent

 Sta ons con nuously listen to the channel.


 If the channel is idle, a sta on transmits its packet immediately.
 If the channel is busy, the sta on keeps listening un l it becomes idle and then transmits its
packet.

- p- Persistent

 Sta ons listen to the channel and transmit with a probability p.


 If the channel is busy, sta ons wait for the next slot with a probability of 1-p.

- Bit Map Protocol

 Sta ons use a predetermined bit map that divides me into slots.
 Sta ons consult the bit map to determine when they can transmit their packets.

- Non – Persistent

 Sta ons listen to the channel and wait for a random period before transmi ng if the
channel is idle.
 A er the random backoff period, sta ons check the channel again and transmit if it is s ll
idle.

Sheet 5
Ques on one

For Router A:
Des na on Distance
B 2
C 3
D 1

For Router B:
Des na on Distance
A 2
E ∞
For Router C:
Des na on Distance
A 3
F 1
For Router D:
Des na on Distance
A 1
E ∞
F ∞
For Router E:
Des na on Distance
B ∞
D ∞
G ∞

For Router F:
Des na on Distance
C 1
D ∞
G 2
For Router G:
Des na on Distance
E ∞
F 2

Router A:

Des na on Distance
A 0
B 2
C 3
D 1
E 3
F 2
G 4
Router B:
Des na on Distance
A 2
B 0
C 4
Des na on Distance
D 2
E 1
F 3
G 3

Router C:
Des na on Distance
A 3
B 4
C 0
D 5
E 5
F 1
G 3
Router D:
Des na on Distance
A 1
B 2
C 5
D 0
E 5
F 5
G 2
Router E:
Des na on Distance
A 3
B 1
C 5
D 5
E 0
Des na on Distance
F 6
G 1
Router F:
Des na on Distance
A 2
B 3
C 1
D 5
E 6
F 0
G 2
Router G:
Des na on Distance
A 4
B 3
C 3
D 2
E 1
F 2
G 0

Ques on two

Tt = 1000 bits / 1Mbps = 0.001 seconds (or 1 millisecond)

RTT = 2 x 400ms = 0.8 seconds

S + W - 1 = 0 + 350 - 1 = 349
Time to receive ACK = RTT + 0 = 0.8 seconds

The sending sta on will receive an ACK for the 500th frame 0.8 seconds a er it sends the frame,
assuming there are no errors or retransmissions.

Ques on Three

Tt = (300KB x 8 x 1024) / 1Mbps = 2.4576 seconds

Tp = 4km x 30us/km = 120 microseconds

The total me it will take to transmit all data is:

Tt + 2 x Tp + 2 x Tpex

= 2.4576 s + 2 x 120 us + 2 x 100 us

= 2.4576 s + 0.24 ms + 0.2 ms

= 2.8986 seconds (approx.)

Therefore, it will take approximately 2.8986 seconds to transmit 300KB of data across a 4km link with a
1Mbps bandwidth and a propaga on delay factor of 30us/km, assuming each host requires 100
microseconds to execute the protocol.

Ques on Four

we can flip the fifth bit in the third row (changing 101011110 to 101010110) will create an undetectable
corruption of the data.

_____________________________________________________________________________________
Sheet 6
IP SUBNETTING SHEET
Question 1:-

Task: For the following IP host addresses determine which are valid for commercial networks.
Why or why not?
Explana on: Valid means it could be assigned to a worksta on, server, printer, router interface,
and so on.
Fill in the following table:

IP Address Valid Why or why not?


Address?
(Yes/No)

150.100.255.255 yes Class B private address range


175.100.255.18 yes Class B private address range
195.234.253.0 yes valid public IP address
100.0.0.23 yes valid public IP address
188.258.221.176 no octet "258" is out of range
127.34.25.189 yes belongs to the loopback address
range, and although it is not typically
assigned to a device on a commercial
network, it is considered a valid IP
address.
224.156.217.73 no Class D multicast address range

Question 2:-
Task: With the following IP host addresses, indicate the Class of each address, the Network
Address or ID, the Host por on, the Broadcast Address for this network, and the default Subnet
Mask.
Explana on: The host por on will be all zeros for the network ID. Enter just the octets that
make up the host. The host por on will be all ones for a broadcast. The network por on of the
address will be all ones for the subnet mask
1. Fill in the following table:
Host IP Addres Network Host Network Default
Address s class address address broadcast subnet mask
address
216.14.55.137 Class 216.14.55.0 0.0.0.137 216.14.55.255 255.255.255.
C 0
123.1.1.15 Class 123.0.0.0 1.1.0.15 123.255.255.25 255.0.0.0
A 5
150.127.221.22 Class 150.127.0.0 0.0.221.22 150.127.255.25 255.255.0.0
4 B 4 5
194.125.35.199 Class 194.125.35. 0.0.0.199 194.125.35.255 255.255.255.
C 0 0
175.12.239.244 Class 175.12.0.0 0.0.239.24 175.12.255.255 255.255.0.0
B 4

2. Given an IP address of 142.226.0.15

a. What is the binary equivalent of the second octet? 11100010


b. What is the Class of the address? Class B
c. What is the network address of this IP address? 142.226.0.0
d. Is this a valid IP host address (Y/N) ?
No, this is not a valid IP host address.
e. Why or why not?
because the host portion is all zeros, which is reserved for the network ID.

3. Which is the maximum number of hosts you can have with a class C
network address?
A class C network can have a maximum of 256-2 = 254 hosts.

4. How many class B networks are there?


There are 16,384 (2^14) class B networks.

5. How many hosts can each class B network have ?


Each class B network can have a maximum of 65,534 (2^16 - 2) hosts.

6. How many octets are there in an IP address? 4


7. How many bits per octet ? 8 bits

Question 3:-

Task: Use the following information and the previous examples to answer the
following subnet related questions.
Explanation: Your company has applied for and received a Class C network
address of 197.15.22.0. You want to subdivide your physical network into 4 subnets, which will
be interconnected by routers. You will need at least 25 hosts per subnet. You will need to use a
Class C custom subnet mask and will have a router between the subnets to route packet from
one subnet to another. Determine the number of bits you will need to borrow from the host
portion of the network address and then the number of bits left for host addresses. (Hint: There
will be 8 subnets)

1. Fill in the table below and answer the following questions:

Subnet No. Subnet bits Subnet bits Host bits possible Subnet / Use?
borrowed Decimal & binary values Host
Binary Subnet No. (range) Decimal
value (6 bits) range

Subnet #0 000 0 (197.15.22.0) 00000 - 11111 0-31 No


Subnet #1 001 32 (197.15.22.32) 00000 - 11111 32-63 Yes
Subnet #2 010 64 (197.15.22.64) 00000 - 11111 64-95 Yes
Subnet #3 011 96 (197.15.22.96) 00000 - 11111 96-127 Yes
Subnet #4 100 128 (197.15.22.128) 00000 - 11111 128-159 Yes
Subnet #5 101 160 (197.15.22.160) 00000 - 11111 160-191 Yes
Subnet #6 110 192 (197.15.22.192) 00000 - 11111 192-223 Yes
Subnet#7 111 224 (197.15.22.224) 00000 - 11111 224-255 No

Question 4:-
Task: Use the informa on below and from prior labs to help determine your valid subnets and
host IP addresses. Answer the following ques ons.
Explana on: Your ins tu on has a Class B network address of 150.193.0.0.
This class B network address will be subdivided to accommodate your physical network and you
will need at least 50 subnets interconnected with routers. Each subnet needs to be able to handle
at least 750 hosts per subnet (worksta ons, servers and router interfaces). As the network
manager for your local campus at the ins tu on, you were given the first 10 of these subnets for
use with your local campus. You will be using 6 of these subnets now and will keep the others for
future growth. Do NOT use the first or last subnet.
1. What is the binary equivalent of the Class B network address
150.193.0.0 in the exercise?
10010110 . 11000001 . 00000000 . 00000000

2. Which octet(s) and how many bits are used to represent the network
por on of this network address?
The first and second octets or 16 bits

3. Which octet(s) and how many bits represent the host por on of this
Class B network address?
The third and fourth octets or 16 bits

4. How many original Class B networks are there?


16,382 (2^14 – 2)

5. What is the total number of hosts that can be created with a Class B
network address if it has not been subdivided?
65,534 (2^16 – 2)

6. How many bits must you borrow from the host por on of the network
address in order to provide at least 50 subnets and at least 750 hosts per
subnet?
6 bits (2^6 = 64 – 2 = 62 possible subnetworks. This leaves 10 bits or 2^10 – 2 = 1022 hosts per subnet)

7. What will the Subnet Mask be (using do ed decimal nota on) based on
the number of bits borrowed in step 6?
255 . 255 . 252 . 0 (The first 6 bit are borrowed from the le side of the host address. 128 + 64 + 32 + 16 +
8 + 4 = 252)

8. What is the binary equivalent of the subnet mask above:


11111111 . 11111111 . 11111100 . 00000000

Ques on 5:-
Task: Complete the table below according to the previous ques on. Use the
informa on in the table to answer the ques ons and complete the diagram at the end of this
lab.
Explana on: Be sure to specify all four octets for the subnet address and subnet mask. The same
subnet mask should be used for all hosts, router interfaces and all subnets. Having a common
subnet mask will allow hosts and routers to determine which subnet the IP packet is intended for.
Router interfaces will usually be numbered first when assigning IP addresses and hosts will receive
higher numbers.
1. Fill in the following table for each of the possible subnets that can be created by borrowing
6 bits for subnets from the third octet (1st host octet). Iden fy the Network Address, the
Subnet Mask, the Subnetwork Address, the range of possible host IP addresses for each
subnet, the broadcast address of each subnet and also indicate whether the subnet is
useable or not. You will only use 3 of these subnets for the exercise.

SN# Network Subnet Subnetwork Range of Broadcast Use?


Address mask Address possible Host IP Address
Addresses

0 150.193.0.0 255.255.252.0 150.193.0.0 150.193.0.1 – 150.193.3.255 No


3.254
1 150.193.0.0 255.255.252.0 150.193.4.0 150.193.4.1 – 150.193.7.255 Yes
7.254
2 150.193.0.0 255.255.252.0 150.193.8.0 150.193.8.1 – 150.193.11.255 Yes
11.254
3 150.193.0.0 255.255.252.0 150.193.12.0 150.193.12.1 – 150.193.15.255 Yes
15.254
4 150.193.0.0 255.255.252.0 150.193.16.0 150.193.16.1 – 150.193.19.255 Yes
19.254
5 150.193.0.0 255.255.252.0 150.193.20.0 150.193.20.1 – 150.193.23.255 Yes
23.254
6 150.193.0.0 255.255.252.0 150.193.24.0 150.193.24.1 – 150.193.27.255 Yes
27.254
7 150.193.0.0 255.255.252.0 150.193.28.0 150.193.28.1 – 150.193.31.255 Yes
31.254
8 150.193.0.0 255.255.252.0 150.193.32.0 150.193.32.1 – 150.193.35.255 Yes
35.254
9 150.193.0.0 255.255.252.0 150.193.36.0 150.193.36.1 – 150.193.39.255 Yes
39.254

2. Assign an IP Address and Subnet Mask to router interface A and write it down here.
150.193.4.1 / 255.255.252.0
3. Assign an IP Address and Subnet Mask to router interface B and write it
down here.
150.193.8.1 / 255.255.252.0
4. Assign an IP Address and Subnet Mask to router interface C and write it
down here.
150.193.12.1 / 255.255.252.0
5. Assign a host IP Address to Host X on Subnet A and assign an IP address to Host Z on Subnet
C (answers may vary). Describe the steps (using ANDing) for the process of sending an IP
packet from Host X to Host Z through the router. Remember, when ANDing two 1s together
the result is a 1, ANDing any other combina on (1 and 0, 0 and 1 or 0 and 0) results in a zero
(0). Also, when ANDing two network IP addresses together the result of the ANDing process
will be the network (or subnetwork) address of the des na on IP address in the packet. Use
the informa on from the diagram below to help assign IP addresses and subnet masks.
Host X = 150.193.4.2 (4.1 was used for the router interface on subnet A), Host Z = 150.193.12.2 (12.1 was
used for the router interface on subnet C).
Host X compares (ANDs) the subnet mask to its own IP address and comes up with its own
network/subnet address of 150.193.4.0. It then compares the subnet mask to the IP address of the
des na on host (150.193.12.2) and comes up with the network/subnet address of the target network
(150.193.12.0).
Since the two do not match, host X must assume that the des na on host is not on its network and it
send the packet to its "Default Gateway" or the nearside port of the router (interface A).
The router goes through the same process on its incoming interface A and determines that network
150.193.12.2 is on it's C interface.
The router forwards the packet to interface C and since the Router also knows the MAC address of hosts
directly a ached to its interfaces such as host Z, it forwards the packet to the 150.193.12.0
network/subnet LAN and host Z picks it up.

6. What is the result of the ANDing process for Host X?


Decimal Host X IP addr: 150 . 193 . 4 . 2
Binary Host X IP addr: 10010110 . 11000001 . 00000100 . 00000010
Binary Subnet Mask: 11111111 . 11111111 . 11111100 . 00000000
Binary ANDing Result: 10010110. 11000001 . 00000100 . 00000000
7. Decimal ANDing Result: 150 . 193 . 4 . 0

8. What is the result of the ANDing process for Host Z?


Decimal Host Z IP addr: 150 . 193 . 12 . 2
Binary Host Z IP addr: 10010110 . 11000001 . 00001100 . 00000010
Binary Subnet Mask: 11111111 . 11111111 . 11111100 . 00000000
Binary ANDing Result: 10010110. 11000001 . 00001100 . 00000000
Decimal ANDing Result: 150 . 193 . 12 . 0
9. The Decimal ANDing result from ques ons 7 is the network/subnet that
Host X is on.
The result from ques on 8 is the network/subnet that Host
Z is on. Are Host X and Host Z on the same network/subnet?] NO
10. What will Host X now do with the packet?
Since the des na on host Z is not on the Host X Local Area Network, Host X will send the packet to the
"Default Gateway" which is the IP address of Interface A on the router
11. Fill in the blanks in the following diagram with the correct Network and IP
addresses.

Router with three interfaces A , B and C


Router interface
A with ip:
150.193.4.1
A B C

Hub c
Hub b
Hub a

Host z
Host x

Ques on 6
Network Address 165.200.0.0 /26
Address class = Class B
Default subnet mask= 255.255.0.0
Custom subnet mask = 255.255.255.192
Total number of subnets = 64
Number of usable subnets =62
Total number of host addresses =64 per subnet
Number of usable addresses = 62 per subnet
Number of bits borrowed = 6
What is the 9th usable subnet range?
165.200.0.448/26 to 165.200.0.511/26.
What is the subnet number for the 10th usable subnet?
165.200.1.64/26.
What is the subnet broadcast address for the 1022nd usable subnet?
165.200.63.191/26.
What are the assignable addresses for the 1021st usable subnet?
165.200.63.128/26 to 165.200.63.191/26
Ques on#6
Number of needed usable subnets 6
Number of needed usable hosts 30
Network Address 195.85.8.0
1. Address class = Class C
2. Default subnet mask = 255.255.255.0
3. Custom subnet mask = 255.255.255.224
4. Total number of subnets = 8
5. Number of usable subnets = 6
6. Total number of host addresses = 30
7. Number of usable addresses= 30
8. Number of bits borrowed =3
Ques on#7
Number of needed usable subnets 126
Number of needed usable hosts 131,070
Network Address 118.0.0.0
1. Address class = Class C
2. Default subnet mask = 255.255.255.0.
3. Custom subnet mask = 255.255.255.224
4. Total number of subnets = 255.255.255.224 is 2^3 = 8.
5. Number of usable subnets = 6
6. Total number of host addresses = 32
7. Number of usable addresses = 28
8. Number of bits borrowed = 3

Ques on#8
Number of needed usable subnets 2000
Number of needed usable hosts 15
Network Address 178.100.0.0
1. Address class = Class B
2. Default subnet mask = 255.255.0.0
3. Custom subnet mask = 255.255.240.0
4. Total number of subnets = 4096
5. Number of usable subnets =4094
6. Total number of host addresses = 57316
7. Number of usable addresses = 14
8. Number of bits borrowed =11 for subnets and 4 for hosts
Ques on#9
Number of needed usable subnets 250
Network Address 101.0.0.0
1. Address class = Class B
2. Default subnet mask = 255.255.0.0
3. Custom subnet mask = 255.255.248.0
4. Total number of subnets = 2048
5. Number of usable subnets = 2046
6. Total number of host addresses = 2046 * 13=26658
7. Number of usable addresses = 13
8. Number of bits borrowed = 11

Ques on#10
Number of needed usable hosts 50
Network Address 172.59.0.0
1. Address class = Class B
2. Default subnet mask = 255.255.0.0
3. Custom subnet mask = 255.255.252.0
4. Total number of subnets = 1024
5. Number of usable subnets =1022
6. Total number of host addresses = 1022*62 = 63364
7. Number of usable addresses = 62
8. Number of bits borrowed = 6

Ques on 11
1- What class of network is each of the following?
- 11001110 10010111 00110010 00001010 (Class B)
- 11101100 11100011 00111110 00111111 (Class C)
- 11110010 10001110 01110111 00110011 (Class D)
2- What is the network address and network mask for each of the following addresses
- 121.50.120.7 -> Network address is 121.0.0.0 with network mask 255.0.0.0
- 178.50.87.65 -> Network address is 178.50.0.0 with network mask 255.255.0.0
- 220.54.121.90 -> Network address is 220.54.121.0 with network mask 255.255.255.0

3- Assume that an ISP has assigned 32 IP numbers to a customer in which the numbers starts
with 196.150.20.0 and ends with 196.150.20.31?
- What is the network mask for this class?
255.255.255.0
- What is the sub-network mask for the given 32 IP numbers?
255.255.255.0

You might also like