Vous êtes sur la page 1sur 3

KCG COLLEGE OF TECHNOLOGY KARAPAKKAM, CHENNAI 600 097 B.

Tech Information Technology Third year Fifth Semester CS1302 Computer Networks PART A 1. State the difference between token ring and FDDI. S.NO. TOKEN RING 1 It uses shielded twisted pair cables 2 It uses Manchester encoding 3 4 It supports data rate up to 16Mbps It is implemented as a ring, switch or Multistation Access Unit FDDI It uses fiber optic cable It uses 4B/5B before NRZ-1 for encoding It supports data rate up to 100 Mbps It is implemented as dual ring, nodes with single attachment station and dual attachment station with concentrator.

2. List the types of data frames in FDDI. Synchronous (S-frames) Asynchroumous (A- frames) 3. Define the term SONET. SONET: Synchronous Optical Network, a standard for connecting fiber-optic transmission systems. The standard defines a hierarchy of interface rates that allow data streams at different rates to be multiplexed. With the implementation of SONET, communication carriers throughout the world can interconnect their existing digital carrier and fiber optic system. 4. What is the main purpose of the second ring in FDDI protocol? The main purpose of second ring in FDDI is as follows: Whenever a problem occurs on the primary ring, the secondary can be activated to complete data circuits and maintain service. 5. Describe two advantages of using packet switching for data transmission.

1. It helps in detection of transmission errors, because mechanism such as parity checksum can be used. 2. It gives fair access for a shared connection between many computers because packets are interleaved with others. 3. Packets can be routed independently allowing load balancing on the network. 6. What is the meaning of multiple IP address at a router? Router is a multihomed device. A multihomed device is connected to multiple networks and has an IP addresses for each network to which it is connected. So router has multiple IP addresses. 7. What is IP spoofing? How can a router be used to prevent IP spoofing? In IP spoofing, a sender inserts a false address into the source address field of an IP datagram. The router that is directly attached to, a host, since it knows the IP address, of each of its directly attached neighbors. 8. Give an account of the private addresses. A number of blocks in each class are assigned for private use. They are not used globally. These addresses are used either in isolation or in connection with address translation techniques. Class Net id Blocks A 10.0.0.0 1 B 172.16 to 172.31 16 C 192.1680 to 192.168255 256 9. What is the function of ARP? The purpose of ARP is to map IP address of a host with MAC address.ARP finds the physical address of a host if its IP address is known. 10. Write the difference between a router and a bridge. BRIDGE ROUTER 1. Bridge is a interconnecting device 1. Router is a in network that connects two interconnecting LANs, of same type device in network that connects two 2. It maintains a forwarding table LANs of different that forwards packets to all nodes types connected in the destination 2. It maintains a routing segment. table that directs the packets to the correct destination

11. Where a routing table is maintained? Also state the purpose of maintaining a routing table. Routing table is maintained in a router that contains the route to reach the destination. When a host wants to send a packet to another host, it sends to the nearby router which forwards the packet based on its routing table information to appropriate destination. A routing table can have the entire route for a destination. This routing table is maintained for each host or routers. 12. What is the broadcast and multicast address for Ethernet? A multicast address is an identifier for a group of hosts that have joined a multicast group. It is known as a class D type of IP address. It ranges from 224.0.0.0 to 239.255.255.255. A broadcast address is an IP address that allows information to be sent to all machines on a given subnet rather than a specific machine. Generally the broadcast address is found by taking the bit complement of the subnet mask and then OR-ing it bitwise with the IP address. PART B 1. Explain HDLC in detail. 2. Compare the Ethernet technologies in detail. 3. State the major difference between Distance vector routing and link state routing. Discuss how these routing techniques work. 4. Discuss in detail about subnetting and subnet masking. Explain with examples. 5. How to map logical address into physical address? Explain it with example. 6. Explain in detail about routing, routers, classful and classless addressing.

Vous aimerez peut-être aussi