Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
5 views9 pages

Tutorial 3

Networking Tutorial

Uploaded by

mrtbsekati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views9 pages

Tutorial 3

Networking Tutorial

Uploaded by

mrtbsekati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CSI374 Tutorial Revision 3: Week 10-12

Network layer Tutorial Revision

1.What is the function of the address resolution protocol (ARP)?


2.ARP request is broadcast and ARP reply is _______.
3.What does DHCP issue to the client?
4.What is DHCP is used for?
5. What are the functions of The DHCP server?
6.During error reporting, ICMP always reports error messages to which
node? Source or Destination?
7.Which of these is not a type of error-reporting message?
A. Destination unreachable
B. Source quench
C. Router error
D. Time exceeded
8. The TTL field has value 13. How many routers (max) can process this
datagram?
9. What should be the flag value M to indicate the last fragment?
10. Which field helps to check rearrangement of the fragments in IPv4?
11. If the value in protocol field is 2, which protocol should be used in IPv4
header?
12. Which one fields of an IP header cannot be modified by a typical IP
router?
13. What is the size of the header checksum field in IPv4 header (in
bytes)?
14. Name the fields that are related to fragmentation and reassembly of
an IPv4 datagram?
15. A router receives an IPv4 packet with the flag values D=0 and needs
to do fragmentation because of smaller MTU on the outgoing
interface. What does the router do?

//NAT and IPv6 Tutorial Revision

1.What is The maximum number that IPv4 addresses can have?


2. What are the limitations of IPv4 addresses?
3.Which of the following is incorrect about Network Address Translation
(NAT)?
A. NAT is a process in which one or more local IP address is translated
into one or more Global IP
address and vice versa.
B. NAT results in switching path delays.
C. Certain applications will not function while NAT is enabled
D. Routers will do NAT translations without configuration.

4. What is the other name for Port Address Translation (PAT)?

1 DrTM
CSI374 Tutorial Revision 3: Week 10-12

5.In _________ type of NAT, one or more private IP addresses can be


mapped to one public IP address.
A. Static NAT
B. Dynamic NAT
C. PAT
Explanation
Port Address Translation (PAT) is an extension of Network Address
Translation (NAT) that permits multiple devices on a LAN to be mapped
to a single public IP address to conserve IP addresses.
D. None of the above
Answer is C and is explained for your understanding.

6.Which of the following is incorrect about NAT?


A. NAT does not conserve IPv4 addresses.
B. Static NAT creates a fixed translation of private addresses to public
addresses
C. Static NAT allows the user to configure one-to-one translations.
D. NAT helps to reuse private IP addresses
7. What is the fixed base header length of an IPv6 datagram?
8. The traffic class field of IPv6 is similar to which field in the IPv4 header?
9. What are the type of addresses supported by IPv6?
10. Which field determines the lifetime of IPv6 datagram?
11. What is the size of an IP address in IPv6?
12. Which of the following is incorrect about IPv6 header format?
A. Version field is of 4 bits.
B. Flow Label field is of 20 bits.
C. Next Header field is of 16 bits.
D. Payload length field is of 16 bits
13. Which of the following is NOT correct about IPv6 address?
A. IPv6 supports real time applications.
B. IPv6 has increased address space when compared to IPv4.
C. IPv6 cannot be routed on IPv4 networks.
D. IPv6 has improved packet handling.
14. Which of the following is an incorrect IPv6 address?
A. 2001::1
B. FE80:0000:0000:0:0123:4567:89AB:CDEF:1010
C. 2003:DEAD:CAFE:cafe:ab33:46:abab:62
D. 2003:dead:bef:4dad:ab33:46:abab:62
NB: Explanation
An IPv6 address has 8 hextets represented in hexa-decimal. Hextet is
used to refer to a segment of 16 bits or four hexadecimals and IPv6
addresses can be written in either lowercase or uppercase. (::) is used to
represent contiguous 0s.

2 DrTM
CSI374 Tutorial Revision 3: Week 10-12

15. Which of the following is an incorrect IPv6 address?


A. FE80:FE80::1
B. 2001::CAFE
C. 2001:0DB8::ABCD::1234
D. 2001:DB8:0:0:ABCD: :100
NB: Explanation
(::) is used to represent contiguous 0s but it can appear only once in a
valid IPv6 address.

16. List the functions/services offered by the network layer?


17. In ______________ routing, the routing tables are updated periodically
and the routing tables are not manually updated by the network
administrator.

//Application layer and security


1. The Protocol Data Unit (PDU) for the application layer in the Internet
stack is known as?
2. Which protocol resolves the internet names?
3. Identify the correct order in which the following actions take place in
an interaction between a web browser and a web server.
1. The web browser requests a web page using HTTP.
2. The web browser establishes a TCP connection with the web server.
3. The web server sends the requested web page using HTTP.
4. The web browser resolves the domain name using DNS.

A. 4, 2, 1, 3
B. 1, 2, 3, 4
C. 4, 1, 2, 3
D. 2, 4, 1, 3

5. Which application-level protocol in which a manager control a set of


agents?
A. HTML
B. TCP
C. SNMP
D. SCTP

NB: Explanation for SNMP. Also check how others function.


SNMP stands for Simple Network Management Protocol. SNMP is an
Internet Standard protocol for collecting and organizing information
about managed devices on IP networks and for modifying that
information to change device behavior. SNMP follows Agent-Manager

3 DrTM
CSI374 Tutorial Revision 3: Week 10-12

model. Devices that typically support SNMP include cable modems,


routers, switches, servers, workstations, printers, and more. It is an
application-level protocol in which a SNMP manager stations control a
set of SNMP agents.
6. Which of the following features has been enhanced in SNMPv3 when
compared to SNMPv2?
A. Management
B. Integration
C. Classification
D. Security

NB: Explanation for above


SNMPv3 has introduced new cryptographic security features such as
confidentiality, authentication, and integrity. Confidentiality in SNMPv3
ensures data packets are encrypted and also ensures privacy.
Authentication in SNMPv3 ensures that the message is coming from a
reliable source. Integrity feature in SNMPv3 prevents unauthorized
modification of data packets. Hence option (d) is correct.

7. Which of the following is true about HTTP and HTTPS?


(i) HTTP is unsecured while HTTPS is secured.
(ii) HTTP sends data over port 80 while HTTPS uses port 443.
(iii) No SSL certificates are required for HTTP, with HTTPS it is required that
we have an SSL certificate and it is signed by a Certificate Authority
(CA).

A. (i) only
B. (i) and (iii) only
C. (i) and (ii) only
D. (i), (ii) and (iii)

8. List the E-mail protocols?


9. Consider different activities related to email: Identify the application-
level protocol used in each activity below?
m1: Send an email from a mail client to a mail server
m2: Download an email from mailbox server to a mail client
m3: Checking email in a web browser

10. Which transport layer protocol is used to support electronic mail?


11. The port numbers of the application layer protocols HTTP and HTTPS
are ______ and ______respectively.

//Network Security

1. Define Cryptography in full?


2. Which cryptographic type uses same key for encryption and
decryption?

4 DrTM
CSI374 Tutorial Revision 3: Week 10-12

3. Which cryptographic type uses unique keys for encryption and


decryption?
4. Describe Ciphertext and Plaintext ?
5. In security, CIA stands for

NB: Explanation for your understanding


Confidentiality, Integrity and Availability, also known as the CIA triad, is a
model designed to guide policies for information security within an
organization. The model is also sometimes referred to as the AIC triad
(availability, integrity and confidentiality) to avoid confusion with the Central
Intelligence Agency. The elements of the triad are considered the three most
crucial components of security. Hence option (a) is correct.

6.List the private and public key encryption algorithms?

//TTL solved Problems

Question 1

Network layer solved questions

Question 1:

5 DrTM
CSI374 Tutorial Revision 3: Week 10-12

//Fragmentation and MTU

6 DrTM
CSI374 Tutorial Revision 3: Week 10-12

//Extra questions on NAT and IPv6

7 DrTM
CSI374 Tutorial Revision 3: Week 10-12

Check the solution on solved questions.

//Ethernet

8 DrTM
CSI374 Tutorial Revision 3: Week 10-12

Consider that the link capacity of a channel is 512kbps and the round trip
delay time is 1000ms. What will be the Bandwidth Delay Product for this
channel?

//Flow control, Please check other solved questions from the notes.

9 DrTM

You might also like