Question Bank Advanced Computer Networks Q.1 What do you mean by Subnet Masking? The subnet mask is used to determine which portion of the IP address is the network address and which is the host address. This means that the portions of network to host in an IP address can change. The most common subnet mask is 255.255.255.0. The simple explanation is that wherever there is a 255, this indicates that it is the network portion. Wherever there is a 0, this indicates the host portion. Q.2 Define Beacons? Beacon are used to determine their own absolute locations based on GPS or manual configuration. The majority of nodes can then derive their absolute location by combining an estimate of their position relative to the beacons with the absolute location information provided by the beacons. Q.3 Differentiate between TCP and UDP. Transmission Control Protocol (TCP) : 1) Transmission Control Protocol (TCP) is a connection oriented protocol, which means the devices should open a connection before transmitting data and should close the connection gracefully after transmitting the data. 2) Transmission Control Protocol (TCP) assures reliable delivery of data to the destination. 3) Transmission Control Protocol (TCP) protocol provides extensive error checking mechanisms such as flow control and acknowledgment of data. 4) Sequencing of data is a feature of Transmission Control Protocol (TCP). 5) Delivery of data is guaranteed if you are using Transmission Control Protocol (TCP). 6) Transmission Control Protocol (TCP) is comparatively slow because of these extensive error checking mechanisms 7) Multiplexing and De multiplexing is possible in Transmission Control Protocol (TCP) using TCP port numbers. 8) Retransmission of lost packets is possible in Transmission Control Protocol (TCP). User Datagram Protocol (UDP) : 1) User Datagram Protocol (UDP) is Datagram oriented protocol with no overhead for opening, maintaining, and closing a connection. 2) User Datagram Protocol (UDP) is efficient for broadcast/multicast transmission. 3) User Datagram protocol (UDP) has only the basic error checking mechanism using checksums. 4) There is no sequencing of data in User Datagram protocol (UDP) . 5) The delivery of data cannot be guaranteed in User Datagram protocol (UDP) . 6) User Datagram protocol (UDP) is faster, simpler and more efficient than TCP. However, User Datagram protocol (UDP) it is less robust then TCP 7) Multiplexing and De multiplexing is possible in User Datagram Protcol (UDP) using UDP port numbers. 8) There is no retransmission of lost packets in User Datagram Protcol (UDP). Q.4 Explain the main features of OSPF ? • Authentication of routing messages. • Additional hierarchy. • Load balancing. Q. 5 What do you mean by Subnetting ? Subnetting gives us a simple way to reduce the total number of network numbers that are assigned. The idea is to take a single IP network number and allocate the IP address with that network to several physical networks, which are now referred to as subnets. Q.6 Define quality of service? What are the two categories of QoS attributes? The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular attribute each service class is associated with a set of attributes. The two main categories are : • User Oriented • Network Oriented Q.7 Why is SSL important? Secure Socket Layers are critical for protecting private information. Every email sent by us, every website visited by us and every piece of data leaving our computer can be seen by more than just the intended recipient UNLESS IT IS SECURELY ENCRYPTED. SSL is the protocol or standard for internet security, and working without it is akin to leaving our car unlocked in a theft prone area. Q.8 Comment on the security of Public Key Schemes? Security of Public Key Schemes: a. Llike private key schemes, brute force exhaustive search attack is always theoretically possible but keys used are too large (>512bits) . b. Security relies on a large enough difference in difficulty between easy (en/decrypt) and hard (cryptanalyse) problems Q.9 Mention some of the properties of Digital Signatures ? Digital Signature Properties : • must depend on the message signed • must use information unique to sender to prevent both forgery and denial • must be relatively easy to produce • must be relatively easy to recognize & verify • be computationally infeasible to forge Q. 10 What are the key benefits of public key cryptography ? The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for sender and receiver to share secret keys via some secure channel is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. Some examples of public-key cryptosystems are Elgamal, RSA & Diffie-Hellman. Q. 11 Define Cryptanalysis, Cryptanalyst, Cryptology and Cryptosystem? a. Cryptanalysis is the study of mathematical techniques for attempting to defeat cryptographic techniques, and, more generally, information security services. b. Cryptanalyst is someone who engages in cryptanalysis. c. Cryptology is the study of cryptography and cryptanalysis. d. Cryptosystem is a general term referring to a set of cryptographic primitives used to provide information security services. Most often the term is used in conjunction with primitives providing confidentiality, i.e., encryption. Q.12 Briefly explain SNMP ? Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects. Q.13 What is the function of SMTP? The protocol that supports electronic mail on the Internet is called Simple Mail Transfer (SMTP). It is a system for sending messages to other computer users based on e-mail addresses. SMTP provides mail exchange between users on the same or different computers. Q.14 Differentiate between BRI and PRI services offered in ISDN. Basic Rate Interface (BRI) consists of 2B + D channels which stands for 2 Bearer channels having 64 kbps capacity for data and one D channel having 16 kbps capacity for control signalling. Having a separate channel for handshaking and control is called "out of band" signalling. The 2B channels can be bonded together for a single data channel with a 128 kbps transfer rate. Primary Rate Interface (PRI) consists of 23B + D channels which stands for 23 Bearer channels of 64 kbps capacity for data and one D channel of 64 kbps capacity for control signalling. The Bearer channels can be bonded in any combination as required. Q.15 Briefly explain ARP Protocol. Address Resolution Protocol (ARP) belongs to the Network layer. It can be considered as a mechanism for mapping addresses between the Network logical addresses and MAC (Media Access Control) layer physical addresses. For example: the Network layer protocol IP is not aware of 48 bit MAC addresses such as Ethernet. Similarly the MAC layer protocol such as Ethernet does not know anything about 32 bit IP addresses. ARP provides the mechanism to map MAC addresses to IP addresses in a temporary memory space known as the ARP cache. Q.16 How does ARP works ? The basic operation of ARP is as follows : a.) When the IP layer wants to communicate with another device on the network, it checks the ARP cache to see if there is a match with an Ethernet address. b.) If there is no matching entry in the ARP cache, an ARP broadcast datagram is sent out that basically says "Does anybody know whose Ethernet address belongs to this IP address?". c.) The receiving station that has the IP address, responds with an ARP datagram that says "This is my IP address and here is my Ethernet address". d.) The ARP cache is updated and the original IP layer information is then passed on to the MAC layer for processing. Q.17 Briefly explain RARP Protocol. Reverse Address Resolution Protocol (RARP) is the reverse of ARP. It is a mechanism to map MAC addresses to IP addresses. It is used mainly by diskless workstations upon boot-up to find out their IP addresses from a BOOTP server. The BOOTP server contains all of the boot-up configuration files that the workstation needs to boot-up. Q.18 How does RARP works? On NICs (network interface cards) there is an empty DIP socket that is used for holding a Boot PROM. The Boot PROM holds a special software program that tells the workstation that upon powering up, to go and find a BOOTP server. One of the first tasks of the workstation is to find out its IP address. The MAC layer address is burnt into the NIC and is already known. A RARP broadcast datagram is sent out that asks "Does any BOOTP server know what my IP address is?". The BOOTP server will reply with "Here's the IP address that belongs to your MAC address". Once the IP address is known, then the rest of the configuration files can be downloaded and the diskless workstation booted up. Q.19 Explain RMON. RMON is a MIB definition that provides for remote network monitoring and manager to manager communications. This standard defines the information that a device must collect to provide an accurate picture of a network's health. The information that the RMON MIB provides is divided into the following 9 groups: 1. Segment Statistics: Statistics on the attached segment: packets, octets, collisions... 2. History: Data collected by the statistics group for future retrieval and analysis 3. Alarms: Thresholds can be set for certain alarm condition. (Collisions/sec) 4. Events: Thresholds can be set for certain event conditions to trigger certain activities. 5. Host: Statistics can be gathered on individual nodes or hosts on the LAN. 6. Host Top N: Statistics can be gathered on individual nodes over a user-specified time. 7. Traffic Matrix: Shows the amount of traffic and number of errors between any host pair. 8. Packet Capture: Allows capturing of entire packets or individual slices indicating protocols used. 9. Filters: The filter group specifies the criteria that the packet is going to be captured by. Q.20 Define ADSL. Asymmetrical Digital Subscriber Line (ADSL) is a method to use the existing analog local loop lines for digital data transfer to and from the home. It is asymmetrical in that the upstream transfer rate is slower than the downstream data rate. This means that the data transfer from the premise (home) to the CO is a different rate than the data transfer from the CO to the home. References : Introduction to Data Communications By Eugene Blanchard