DCC Epa
DCC Epa
1.(c) 2
1.(f) 2 1.(f) 2
1.(g) 2
Network Topology and 3.(c) 4 3.(c) 4
4 4.(a) 4
Network Devices 6.(c) 6 6.(c) 6
4.(e) 4
Winter- Unit 2 Q1 c Draw neat diagram of twisted pair cable and stae iths type . 2
2023 Q3 b Explain satellite communication wuth the help of neat diagram. 4
Q3 c compare circuit switching and packet switching consider following parameter orientation, flexibity , 4
technology and layer.
Q4 c Describe multiplexing technique. 4
Q5 b Draw and explain fiber-optic cable 6
Summer- Unit 2 Q1 c Stae any two types of ungided media . 2
2023 Q2.b Describe propogation modes in fiber optic cable. 4
Examination Paper Analysis and Solution
Q3 a Describe Satellite Communication with neat diagram. 4
Q4 a Compare FDM TDM(any 4 points each ) 4
Q4 c Describe the principal packet switching teching technique with neat diagram. 4
Q5 c write steps to prepare crossover and straight cble using twisted pair cable. 6
Winter- Unit 2 Q1 e Compare guided and unguided transmission media . 2
2022 Q2 b Explain TDM technice with the help of neat diagram. 4
Q3 e state the physical and transmission characteristics of twisted pair cable along with its applications. 4
Q4 b Draw the neat sketch of fiber optic cable .give the transmission characterstics of fiber optical cable . state 4
its application.
Ans:
• Highly Flexible.
.
Ans:
i)Simplex
ii)Half-Duplex
ÎIÎ)Full-Duplex
Transmission mode refers to the mechanism of transferring of data between two devices connected over a network. It is also called Communication Mode.
These modes direct the direction of flow of information. There are three types of transmission modes. They are:
Simplex Mode
Half duplex Mode
Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices on a link can transmit; the other can only receive.
The simplex mode can use the entire capacity of the channel to send data in one direction. Keyboards, traditional monitors and printers are examples of simplex
devices.
2. half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice
versa. The half-duplex mode is used in cases where there is no need for communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction -for example: Walkie-talkies.
Examination Paper Analysis and Solution
3. full-duplex mode both stations can transmit and receive data simultaneously. The transmission medium sharing can occur in two ways, namely, either the
link must contain two physically separate transmission paths or the capacity of the channel is divided between signals traveling in both directions .One common
example of full-duplex communication is the telephone network. When two people are communicating by a telephone line, both can talk and listen at the same
time.
Q4 Explain wide Area Networks along with its advantages and disadvantages. (W-23) 4 Marks
• WAN is wide area network. WAN is a long-distance communication network that covers a wide geographic area, such as state or country. The most
common example is internet.
• Wide Area Networks (WANs) connect networks in larger geographic areas, such as Maharashtra, India, or the world. Dedicated transoceanic cabling
or satellite uplinks may be used to connect this type of global network.
• Using a WAN, schools in Maharashtra can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two
users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time.
• A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like
the Internet. To users, however, a WAN will not appear to be much different than a LAN.
Examination Paper Analysis and Solution
Ans. A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to
facilitate communication and resource sharing among a wide range of users.
1. Message: A message is a piece of information that is to be transmitted from one person to another. It could be a text file, an audio file, a video file, etc.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile, telephone, laptop, video camera, or workstation, etc.
3. Receiver: It is a device that receives messages. It can be a computer, telephone mobile, workstation, etc.
4. Transmission Medium / Communication Channels: Communication channels are the medium that connect two or more workstations. Workstations can be
connected by either wired media or wireless media.2
5. Set of rules (Protocol): When someone sends the data (The sender), it should be understandable to the receiver also otherwise it is meaningless. For
example, Sonali sends a message to Chetan. If Sonali writes in Hindi and Chetan cannot understand Hindi, it is a meaningless conversation.
Q8 Differentiate any six point between LAN and WAN (S-23) 6 marks
Q 10 . Explain with diagram the process of client server and peer to peer network architecture. . (W-22 ) 6 Marks
Ans. Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on
other computers. However, they do not have a file server or a centralized management source (See figure 8 given below).
• In 17 Network Classifications and Topologies a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources
available on the network. Peer-topeer networks are designed primarily for small to medium local area networks.
• AppleShare and Windows for Workgroups are examples of programs that can function as peer-to-peer network operating systems. Figure 8: Peer to Peer
network.
• The advantages of peer-to-peer over client-server NOSs include: i) No need for a network administrator ii) Network is fast/inexpensive to setup &
maintain iii) Each PC can make backup copies of its data to other PCs for security. By far the easiest type of network to build, peer-to-peer is perfect for
both home and office use.
Client/Server:
• Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The file
servers become the heart of the system, providing access to resources and security.
• Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to
integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location.
Novell Netware and Windows NT Server are examples of client/server network operating system.
Examination Paper Analysis and Solution
One of the wires is used to carry signals to the receiver and the other is used only as ground reference. There are two type of twisted pair
cable:
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)
Q2 Explain satellite communication with the help of neat diagram. (W-22) 4 Marks
1.Satellite is a natural /man-made system which is kept in continuous rotation around the earth in a specific orbit at a specific height above the earth and with
specific speed.
2. In satellite communication, signal transferring between the sender and receiver is done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated microwaves is sent towards the satellite called UPLINK (6 GHz).
4,Then the satellite amplifies the signal and sent it back to the receiver’s antenna present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the
diagram given
Examination Paper Analysis and Solution
As the entire signal transferring is happening in space. Thus, this type of communication is known as space communication. The satellite
does the functions of an antenna and the repeater together.
Q3 compare circuit switching and packet switching consider following parameter orientation, flexibity , technology and layer. (W-23) 4 Marks
Ans.
Sr no. parameter Circuit Switching Message Switching
1 orientation Connection oriented. Connectionless.
2 flexibility Inflexible, because once a path is set all Flexible, because a route is created for each packet to travel to the
parts of a transmission follows the same destination
path.
3 technology Circuit switching can be achieved using two Packet Switching hastwo approaches Datagram Approach and Virtual
technologies, either Space Division Circuit Approach.
Switching or Time- Division Switching.
4 layers Circuit Switching is implemented at Physical Packet Switching is implemented at Network Layer.
Layer.
Time Division Multiplexing: TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the shared channel is divided
among its user by means of time slot. Each user can transmit data within the provided time slot only. Digital signals are divided in frames, equivalent to time
slot i.e. frame of an optimal size which can be transmitted in given time slot. TDM works in synchronized mode. Both ends, i.e. Multiplexer and De- multiplexer
are timely synchronized and both switch to next channel simultaneously.
Examination Paper Analysis and Solution
Ans.
Q10 Describe the principal packet switching teching technique with neat diagram. (S-23) 4 Marks
Q11 write steps to prepare crossover and straight cble using twisted pair cable (S-23) 6 Marks
Ans. In this cable, wires are placed in the same position at both ends. The wire at pin 1 on one end of the cable connects to pin 1 at the other end of the cable.
The wire at pin 2 connects to pin 2 on the other end of the cable; and so on. The following table lists the wire positions of the straight-through cable on both
sides.
Examination Paper Analysis and Solution
Ans
Sr Guided transmission media Unguided transmission media
No.
1 Guided media also called bounded or wired Unguided media also called unbounded or
media. wireless media.
2 Twisted pair wires , Coaxial cable are the Radio and infrared light are the example of
examples of wired media. wireless media.
3 Additional transmission capacity can be It is not possible to obtain additional capacity.
obtained by adding more wires.
4 Installation is costly , time consuming and Installatin need less time and money .
complicated
Q13 Explain TDM technice with the help of neat diagram. (W-22) 4 Marks
Ans
• Time Division Multiplexing: TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the shared channel is
divided among its user by means of time slot. Each user can transmit data within the provided time slot only. Digital signals are divided in frames,
equivalent to time slot i.e. frame of an optimal size which can be transmitted in given time slot. TDM works in synchronized mode. Both ends, i.e.
Multiplexer and De- multiplexer are timely synchronized and both switch to next channel simultaneously.
Examination Paper Analysis and Solution
Q14 state the physical and transmission characteristics of twisted pair cable along with its applications. (W-22) 4 Marks
Ans
Applications:
• telephone lines
• Digital Subscriber Line
• local area networks.
Q15 Draw the neat sketch of fiber optic cable .give the transmission characterstics of fiber optical cable . state its application. (W-22) 4 Marks
Examination Paper Analysis and Solution
Ans
Q. Compare 3G and 4G mobile generation on the basis of data speed, technology, standard and services. (S-23) 4 Marks
Ans.
Aspect 3G 4G
Data Speed Typically, 0.5 to 2 Mbps Up to 100 Mbps (mobile) to 1
Gbps (fixed)
Technology UMTS, HSPA, CDMA2000 LTE, WiMAX
Standard IMT-2000 IMT-Advanced
Services Voice, limited data services High-definition video streaming,
online gaming, video
conferencing, IoT
Applications Email, basic web browsing, Advanced mobile applications,
multimedia streaming IoT devices, augmented reality
Q. The following bit stream is encoded with VRC, LRC and even parity Locate and correct the error if it is present. (S-23) 4 Marks
11000011 11110011
10110010 00001010
Examination Paper Analysis and Solution
00101010 00101011
10100011 00101011
11100001 01001011
Ans.
Original Data –
11000011
10110010
00101010
10100011
11111000
Original Data –
11000011
10110010
00101011
00101011
01001011
Q. Calculate CRC for the frame 110101011 and generator polynomial x4 + x + 1 and write the transmitted frame. (S-23) 6 Marks
Examination Paper Analysis and Solution
Scatternet
• Scatternet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the message to its slaves in other piconet where it is acting as master.
This node is also called bridge slave.
• Thus, a station can be a member of two piconets.
• A station cannot be a master in two piconets.
2G (2nd Generation) :
• Shifted from analog to digital.
• It supported voice and SMS both.
• Supported all 4 sectors of the wireless industry namely Digital cellular, Mobile Data, PCS, WLAN,
• Moderate mobile data service.
• 2G WLAN provided a high data rate & large area coverage.
• Speed:- 64 kbps.
3G (3rd Generation) :
• The Internet system was improved.
• Better system and capacity.
• Offers high-speed wireless internet.
•The connection used was UMTS and WCMA.
• Speed:- 2mbps.
4G (4th Generation) :
• IP-based protocols.
• LTE (Long term evaluation) was mainly for the internet.
• Vo-LTE (Voice over LTE) is for both voice and the internet.
• Freedom and flexibility to select any desired service with reasonable QoS.
• High usability.
• Supports multimedia service at a low transmission cost.
• HD Quality Streaming
. • Speed:-100mbps
.
5G (5th Generation): It is yet to come in many countries but here are some notable points about 5G
. • Higher data rates.
• Connectivity will be more fast and more secure,
Examination Paper Analysis and Solution
• Data Latency will be reduced to a great level.
• Massive network capacity.
• It is 30 times faster than 4G.
• There would be more flexibility in the network.
STAR Topology
RING Topology
Ans. i) STAR Topology
Star topology is a network topology where each individual piece of a network is attached to a central node (often called a hub or switch). The attachment of these
network pieces to the central component is visually represented in a form similar to a star. The hub and hosts, and the transmission lines between them, form a graph
with the topology of a star. Data on a star network passes through the hub before continuing to its destination. The hub manages and controls all functions of the
network. It also acts as a repeater for the data flow.
Examination Paper Analysis and Solution
The star network is one of the most common computer network topologies.
ii) RING Topology
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a
ring. Data travels from node to node, with each node along the way handling every packet. Ring topology refers to a specific kind of network setup in which
devices are connected in a ring and pass information to or from each other according to their adjacent proximity in the ring structure.
Q4Differentiate between Hub and switch. (any four points) (W-23) 4 Marks
Ans
Sr. No HUB SWITCH
1 Hub is operated on Physical layer of OSI model While switch is operated on Data link layer of OSI Model.
2 Hub have 4/12 ports. Switch can have 24 to 48 ports
3 Hub is not an intelligent device that sends message to all While switch is an intelligent device that sends message to selected destination, so it is
ports hence it is comparatively inexpensive. Hub cannot be expensive. Switch can be used as a repeater
used as a repeater
4 Speed of original hub 10Mbps and modern internet hub is Maximum speed is 10Mbps to 100Mbps
100Mbps
Q9 Draw suitable lab with 10 hosts and a wireless printers.List all components in the Layout. (S-23) 6 Marks
Ans
Q12 Explain with neat sketch the working of Router and switch. (W-22) 6 Marks
Ans Router is a device that connects 2 or more networks. It consist of hardware and software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate networks.
2) They accomplish this connection by organizing the large network into logical network called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network address.
Switch:-
Switch : Switch is used to connect the multiple devices together in a LAN segment. Switches are network devices used to connect multiple computers in
which it can direct a transmission to its specific destination. (Unicast the signals). There are two types of switches namely, Layer-2 and Layer-3 switches.
They can be used to connect single or multiple networks. Layer 2 Switches operate in the data link layer (layer 2) using the MAC addresses. Layer 3 Switches
operate in the network layer (layer 3) using the IP address
Examination Paper Analysis and Solution
Physical Layer: OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical
level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.
Data Link Layer: At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and
handles errors in the physical layer, flow control and frame synchronization..
Network Layer: Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Transport Layer: This Layer, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer from source to destination.
Session Layer: This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination
Presentation Layer: This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format,
and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be
sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax & semantics.
Application Layer: This Layer, supports application and end-user processes. Everything at this layer is application-specific. This layer provides application
services for file.
Q3. Explain the function of presentation layer and network layer. (W-23) 4 Marks
Examination Paper Analysis and Solution
Ans Translation: The processes in two systems exchange the information in the form of character strings, numbers and so on. Different computers use different
encoding methods, the presentation layer handles the interoperability between the different encoding methods. It converts the data from sender-dependent
format into a common format and changes the common format into receiver-dependent format at the receiving end.
Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the sender-transmitted information into another form and sends the
resulting message over the network.
Compression: Data compression is a process of compressing the data, i.e., it reduces the number of bits to be transmitted. Data compression is very important
in multimedia such as text, audio, video.
Functions of Network Layer: Internetworking: An internetworking is the main responsibility of the network layer. It provides a logical connection between different
devices.
Addressing: A Network layer adds the source and destination address to the header of the frame. Addressing is used to identify the device on the internet.
Routing: Routing is the major component of the network layer, and it determines the best optimal path out of the multiple paths from source
to the destination.
Packetizing: A Network Layer receives the packets from the upper layer and converts them into packets. This process is known as Packetizing. It is achieved
by internet protocol (IP).
Q4.Describe the various IP address classes with suitable example. (W-23) 4 Marks
Ans An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is
the set of rules governing the format of data sent via the internet or local network. There are different types of IP Address classes Class A, Class B, Class C,
Class D, Class E.
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3 bytes are used to indicate host id. Thus the First Byte in Class A type of IP
address will have a range from 0 to 126.
Example : 10.1.2.1 In this, the first byte ‘10’ has first bit 0, and hence it belongs to class A IP address.
Class B :
Class B IP address format is given below:
Examination Paper Analysis and Solution
n this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of the 2 bytes are used to indicate host id. Thus, the first byte of class B
type of IP address has a range from 128 to 191.
Example : 187.4.5.1 In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:
In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest of the One byte is used to indicate host id. Thus the first byte of the IP
address in class C has range from 192 to 223.
Example : 192.168.1.2 In this the first three bits are 110, which represents the Class C type IP address.
Class D:
Class D IP address format is given below:
If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking standard defines Class D addresses as reserved for multicast. Multicast is a
mechanism for defining groups of nodes and sending IP messages to that group rather than to every node on the LAN (broadcast) or just one other node
(unicast). Multicast is mainly used on research networks. As with Class E, Class D addresses should not be used by ordinary nodes on the Internet. The
range for first byte of class D starts from 224 till 239.
Example: 225.25.2.1 Here, the first 4 bits are 1110.
Class E:
Class E IP address format is given below:
If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum value for reserved address is 240.0.0.0 to 255.255.255.255. These are used
for research work in IP addresses.
Example: 245.5.6.2 Here, the first 5 bits are 11110.
SMTP Model:
Components of SMTP
Mail User Agent (MUA)
Mail Submission Agent (MSA)
Mail Transfer Agent (MTA)
Mail Delivery Agent (MDA)
Working of SMTP
1. Communication between the sender and the receiver: The sender’s user agent prepares the message and sends it to them MTA. The MTA’s responsibility
is to transfer the mail across the network to the receiver’s MTA. To send mail, a system must have a client MTA, and to receive mail, a system must have a
server MTA.
2. Sending Emails:
Examination Paper Analysis and Solution
Mail is sent by a series of request and response messages between the client and the server. The message which is sent across consists of a header and a .
A null line is used to terminate the mail header and everything after the null line is considered the body of the message, which is a sequence of ASCII
characters. The message body contains the actual information read by the receipt.
3. Receiving Emails:
The user agent on the server-side checks the mailboxes at a particular time of intervals. If any information is received, it informs the user
about the mail. When the user tries to read the mail it displays a list of emails with a short description of each mail in the mailbox. By selecting any of the mail
users can view its contents on the terminal. HTTP (Hypertext Transfer Protocol):
The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on.
HTTP is similar to SMTP as the data is transferred between client and server.
The HTTP differs from the SMTP in the way the messages are sent from the client to the server and from server to the client.
SMTP messages are stored and forwarded while HTTP messages are delivered immediately.
HTTP is an application layer protocol.
Features of HTTP:
Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits for a response from the server.
Media independent: HTTP protocol is a media independent as data can be sent as long as both the client and server know how to handle the data content.
Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. HTTP messages are of two types:
request and response. Both the message types follow the same message format. Request Message: The request message is sent by the client that consists
of a request line, headers, and sometimes a body.
Response Message: The response message is sent by the server to the client that consists of a status line, headers, and sometimes a body.
ARP( Address Resolution Protocol):
ARP works at Data link layer in the OSI model. It is responsible to find the hardware address of a host from a known IP address. The ARP’s main task is to
convert the 32-bit IP address (for IPv4) to a 48- bit MAC address. ARP Packet Format The ARP packet format is used for ARP requests and replies and
consists of multiple fields including hardware type, protocol type, hardware and protocol size, operation, sender and target hardware, and IP addresses.
Q12 Compare OSI and TCP/IP network model (any six point each) (S-23) 6 Marks
Ans
Sr No. OSI TCP/IP
1 OSI model provides a clear distinction TCP/IP doesn’t have any clear distinguishing
between interfaces, services, and protocols. points between services, interfaces, and
protocols
Ans
Examination Paper Analysis and Solution
TCP/IP Reference Model is a four-layered suite of communication protocols It is named after the two main protocols that are used in the model, namely, TCP
and IP. TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The four layers in the TCP/IP protocol suite are –
1. Network Access Layer −It is the lowest layer that is concerned with the physical transmission of data. TCP/IP does not specifically define any protocol here
but supports all the standard protocols.
2. Internet Layer −It defines the protocols for logical transmission of data over the network. The main protocol in this layer is Internet Protocol (IP) and it is
supported by the protocols ICMP, IGMP, RARP, and ARP.
3. Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols defined here are Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
4.. Application Layer − This is the topmost layer and defines the interface of host programs with the transport layer services. This layer includes all high-level
protocols like Telnet, DNS, HTTP, FTP, SMTP, etc. The following diagram shows the TCP/IP layers
i)subnetting
ii) supernatting
iii) Masking
Ans
i)subnetting
When a bigger network is divided into smaller networks, in order to maintain security, then that is known as Subnetting. So, maintenance is easier for smaller
networks. In supernetting, Host addresses’s bits are increased. For example, if we consider a class A address, the possible number of hosts is 224 for each
network, it is obvious that it is difficult to maintain such a huge number of hosts, but it would be quite easier to maintain if we divide the network into small parts.
Examination Paper Analysis and Solution
In the above diagram, there are two Subnets. Note: It is a class C IP so, there are 24 bits in the network id part and 8 bits in the host id part. Subnetting for a
network should be done in such a way that it does not affect the network bits. In class C the first 3 octets are network bits so it remains as it is.
ii) Supernetting
Supernetting is the procedure to combine the small networks into larger space. In subnetting, Network addresses’s bits are increased. Supernetting is
implemented via Classless interdomain routing. Example: Suppose we have four small networks with network ID as 201.1.0.0, 201.1.1.0, 201.1.2.0, 201.1.3.0.
The ability to aggregate these networks can be assessed based on the following
1. Contiguous: As we can see that all the four networks are Class C networks. The range of the first network is from 201.1.0.0 to 201.1.0.255. The range of the
second network start from 201.1.1.0. If we add 1 to the last IP address of the first network we get the starting IP address of the second network. Similarly, we
can check that all the networks are contiguous.
2. Same Size: All the networks are of class C.
3. Divisibility: The first IP address should be divisible by the total size of the networks. First IP address binary representation: 11001001.00000001.000000
00.00000000 The last 10 bits are zero. Hence it divisible by the size of the network. Hence, all three conditions are satisfied. These four networks can be
combined to form a supernet. The supernet ID or the network ID for all the four networks will be 201.1.0.0 .
Examination Paper Analysis and Solution
iii) Masking A subnet mask is a 32-bit number which is used to identify the subnet of an IP address. The subnet mask is combination of 1’s and 0’s. 1’s
represents network and subnet ID while 0’s represents the host ID. For the IP address 255.255.255.192, subnet mask is,
11111111.11111111.11111111.11000000