ACN Notes
ACN Notes
Note: The answers given for the reference. Students have to attempt and give the answer
of the question in context as that of in question paper.
Question Marks
Calculate the sub-network address if the destination address is 2
200.45.34.56 and the subnet mask is 255.255.248.0?
Solution:
11001000 00101101 00100010 00111000
11111111 11111111 11111000 00000000
__________________________________
11001000 00101101 00100000 00000000
The sub network address is 200.45.32.0.
Draw proper labeled diagram of IPv4 header format. : 2
Solution:
Page 1 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Binary Notation : 01110101 10010101 00011101 11101010
Dotted-decimal notation
Dotted-decimal notation
Hexadecimal Notation
0111 0101 1001 0101 0001 1101 1110 1010
75 95 1D EA
Hexadecimal Notation
OR
Page 2 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Categorize class of addresses and port address in given CIDR /n classless 2
notation: 64.32.16.8 /27 140.11.36.22 / 8
Solution:
i) 64.32.16.8/27 : 64 is in range 0-127 hence its class A address and port address
is 27
ii) 140.11.36.22 / 8 140 is in range 128-191 hence its class B address and port
address is 8
Give classification of ICMP messages. Enlist Error messages name and type. 2
Solution:
ICMP MESSAGES
ICMP messages are divided into two broad categories:
Query Messages.
Error-Reporting Messages
The error-reporting messages report problems that a router or a
host(destination) may encounter when it processes an IP packet.
The query messages, which occur in pairs, help a host or a network
manager get specific information from a router or another host.
For example, nodes can discover their neighbors.
Also, hosts can discover and learn about routers on their network and
routers can help a node redirect its messages.
List of the ICMP messages in each category.
5 Redirection
OR
Page 3 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
DATA
Page 4 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
The header has a 20 bytes fixed part and a variable length optional part.
It is transmitted in big endian order. (on little endian machines, software
conversion is required).
Define : 2
i) Static (non-adaptive) routing Algorithm:
ii) Dynamic (adaptive) routing Algorithm
Solution:
• Static (non-adaptive) routing Algorithm: determines the initial paths. The
pre-calculated paths are loaded to the router table . it is suitable for small
network.
• Dynamic (adaptive) routing Algorithm changes their routing decision if there
is change in topology, traffic. Each router continuously checks the network
status by communicating with neighbors. It is complex.
State functions of any two VPN protocols.: 2
Solution: Write functions of any two protocols given below…..
1. Internet Protocol Security or IPSec:
IPSec is used to secure Internet communication across an IP network.
Secures Internet Protocol communication by authenticating the session
and encrypts each data packet during the connection.
IPSec operates in two modes, Transport mode and Tunneling mode, to
protect data transfer between two different networks.
The transport mode encrypts the message in the data packet and
the tunneling mode encrypts the entire data packet.
Also used with other security protocols to enhance the security system.
2. Layer 2 Tunneling Protocol (L2TP):
is a tunneling protocol that is usually combined with another VPN
security protocol like IPSec to create a highly secure VPN connection.
creates a tunnel between two L2TP connection points and
IPSec protocol encrypts the data and handles secure communication
between the tunnel.
3. Point – to – Point Tunneling Protocol (PPTP):
creates a tunnel and encapsulates the data packet.
It uses a Point-to-Point Protocol (PPP) to encrypt the data between the
connection.
is one of the most widely used VPN protocol and
has been in use since the time of Windows 95. Apart from Windows,
PPTP is also supported on Mac and Linux.
4. Secure Sockets Layer (SSL) and Transport Layer Security (TLS):
SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
create a VPN connection where the web browser acts as the client and
user access is restricted to specific applications instead of entire
Page 5 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
network.
is most commonly used by online shopping websites and service
providers.
Web browsers switch to SSL with ease and with almost no action
required from the user, since web browsers come integrated with SSL
and TLS. SSL connections have https in the beginning of the URL
instead of http.
Give any two advantages of Network address translation. 2
Solution: (ANY TWO of the following.)
Dynamic Translation (IP Masquerading )
• Also called Network Address and Port Translation (NAPT)
• Individual hosts inside the Firewall are identified based on of each
connection flowing through the firewall.
• Since a connection doesn’t exist until an internal host requests a
connection through the firewall to an external host, and most Firewalls
only open ports only for the addressed host only that host can route
back into the internal network
• IP Source routing could route back in; but, most Firewalls block incoming
source
routed packets
• NAT only prevents external hosts from making connections to internal
hosts.
• Some protocols won’t work; protocols that rely on separate connections back
into the local network
• Theoretical max of 216 connections, actual is much less
Static Translation
• Map a range of external address to the same size block of internal addresses
– Firewall just does a simple translation of each address
• Port forwarding - map a specific port to come through the Firewall rather than
all ports;
• useful to expose a specific service on the internal network to the public
network
12. Explain following debugging tool in networking in datagram 2
transmission. Give one example each:
Tracert
Ping
Solution:
Page 6 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Page 7 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
of192.168.1.254, let's say a network switch, followed by the destination, 192.168.1.1,
the router.
tracert www.google.com
Page 8 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
When the mobile host sends a packet to the remote host, there is no
inefficiency; the communication is local.
However, when the remote host sends a packet to the mobile host,
the packet crosses the Internet twice.
Since a computer usually communicates with other local computers
(principle of locality), the inefficiency from double crossing is
significant.
State concept of Mobile IP and Explain any one phase involved in mobile IP. 4
Solution:
• Mobile IP:
• Mobile communication has received a lot of attention in the last decade. The
interest in mobile communication on the Internet means that the IP protocol,
originally designed for stationary devices, must be enhanced to allow the use
of mobile computers –(uses Mobile IP) , computers that move from one
network to another.
Objectives:
Addressing issues related to a mobile host and the need fora care-of
address.
Two agents involved in mobile IP communication,
• The home agent and
• The foreign agent, and how they communicate.
Three phases of communication between a mobile host and a
remote host: (ANY ONE of the following phases can be given)
• Agent Discovery: During the agent discovery phase, the Home Agent and
Foreign Agent advertise their services on the network by using the ICMP
Page 9 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Router Discovery Protocol (IRDP). The Mobile Node listens to these
advertisements to determine if it is connected to its home network or foreign
network.
If a Mobile Node determines that it is connected to a foreign network,
it acquires a care-of address. Two types of care-of addresses exist:
Care-of address acquired from a Foreign Agent Co-located care-of
address
When the Mobile Node hears a Foreign Agent advertisement and
detects that it has moved outside of its home network, it begins
registration.
• Registration
The Mobile Node is configured with the IP address and mobility
security association (which includes the shared key) of its Home
Agent. In addition, the Mobile Node is configured with either its home
IP address, or another user identifier, such as a Network Access
Identifier.
• Data Transfer. associated request is in its pending list as well as proper
authentication of the Home Agent. If the registration reply is not valid, the
Mobile Node discards the reply. If a valid registration reply specifies that the
registration is accepted, the Mobile Node is confirmed that the mobility agents
are aware of its roaming. In the co-located care-of address case, it adds a
tunnel to the Home Agent. Subsequently, it sends all packets to the Foreign
Agent.
• a successful Mobile IP registration sets up the routing mechanism for
transporting packets to and from the Mobile Node as it roams.
Explain following with respect to IPv6: 4
• Auto-configuration
• Renumbering
Solution:
Auto-configuration Stateless Address Configuration (IP Address, Default Router
Address) is performed for each interface separately,
Routers sends periodic Router Advertisement Node gets prefix information from the
Router advertisement and generates the complete address using its MAC address
Global Address=Link Prefix + EUI 64 Address
Router Address is the Default Gateway
MAC address: 00:0E:0C:31:C8:1F 00:0E:0C:31:C8:1F
EUI 64 Address: 20E:0CFF:FE31:C81F 20E:FF:0C31:FEC8:1F
Possible Steps in auto-configuring:
Link-Local Address Generation
Link-Local Address Uniqueness Test:
Link-Local Address Assignment:
Router Contact:
Router Direction:
Page 10 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Global Address Configuration
Renumbering:
Renumbering of devices is a method related to auto-
configuration.
Like host configuration, it can be implemented using protocols like
DHCP, through the use of IP address “leases” that expire after a period
of time.
IPv6, networks can be renumbered by having routers specify an
expiration interval for network prefixes when auto-configuration is done.
Later, they can send a new prefix to tell devices to regenerate their IP
addresses. Devices can actually maintain the old “deprecated” address
for a while and then move over to the new address.
A similar technique was also defined for renumbering router addresses,
in RFC 2894. It uses special ICMPv6 messages .
Moving to another ISP required changing all IP addresses
Draw and explain IPv6 Header 4
Solution:
Describe concept of neighbor discovery protocol state it’s any four features. 4
Page 11 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Solution:
Neighbor Discovery: IPv6 nodes which share the same physical medium
(link) use Neighbor Discovery (NDP) to:
• Discover their mutual presence
• Determine link-layer addresses of their neighbors
(equivalent to ARP)
• Find routers
• Maintain neighbors’ reachability information
• Uses Multicast Address
Protocol features:
• Router discovery
• Prefix(es) discovery
• Parameters discovery (link MTU, Max Hop Limit, ...)
• Address auto-configuration
• Address resolution
• Next Hop determination
• Neighbor Unreachability Detection
• Duplicate Address Detection
• Redirect
State importance of IP Fragmentation. Describe it with proper example. 4
Solution:
IP Fragmentation Packet fragmentation is done to allow packet transfer over
networks with certain Maximum Transfer Unit (MTU). If application data is
bigger than MTU supported by the network then packet must be fragmented
before they are transmitted over the network. If the packet is bigger than MTU
size supported by the network and fragmentation is not allowed, then routers
must drop the packet. To avoid this, many protocols support Path MTU
(PMTU) discovery and fragment the data accordingly to avoid packets from
being dropped. Apart from that, some protocols support data fragmentation to
improve performance in noisy environment / in presence of narrow band
interference.
Example:
Suppose we have a physical layer that can transmit a maximum of 660 bytes.
And, suppose IP wants to send 1460 bytes of data. So, the IP datagram is a total
of 1480 bytes, including the 20 byte IP header:
Page 12 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Second Packet
Bytes -----20 640
IP Header First 640 bytes of data
In that packet, "fragment flag" is 1, offset is 80. The offset is 80 because (80 * 8)
is 640, so the offset of that data is 640 byes into the packet.
Note: all other fields of the IP header are identical to the first packet (except the
checksum)
Third Packet
Bytes -----20 640
IP Header First 640 bytes of data
In that packet, "fragment flag" is 0, offset is 160. The offset is 160 because (160
* 8) is 1280, so the offset of that data is 1280 byes into the packet.
Note: all other fields of the IP header are identical to the first packet except the
checksum.
IMPORTANT: The routers see 3 separate packets. The final destination
reassembles the packet before passing the packet to the upper layers.
Enlist any four advantages of IPv6 over IPv4: 2
Solution:
Advantages of IPv6 over IPv4 (any Four )
Larger address space Allows billions of devices to be
interconnected, mean no forced Network Address Translators
Allow coherent end-to-end packet delivery
Improve the potential for use of end-to-end security tools for
encryption and authentication
IPv6 is “more secure” than V4
Better header format
New options
Allowance for extension
Only IPv6 supports mobility
IPv6 offers “bundled” QoS - Quality of service (QoS) refers to any
technology that manages data traffic to reduce packet loss, latency
and jitter on the network. QoS controls and manages
network resources by setting priorities for specific types of data on
the network. (Packet-based and stream-based QoS)
Support for resource allocation
Support for more security
Support for mobility
There are 90 RFCs (Request for Comments) that describe aspects of
IPv6
Page 13 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Only V6 offers plug and play auto-configuration
IPv6 allows rapid renumbering
Explain any one of the following option with its format Also state its one 4
example of implementation
Record-Route Option
A strict-source-route option
Loose-Source-Route Option
timestamp option
Solution:
Explain any one of the following in detail
Fig.: The format of the record route option: Both the code and length fields have
been described
Page 14 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Home Agent
The home agent is usually a router attached to the home network of the mobile
host.
The home agent acts on behalf of the mobile host when a remote host sends a
packet to the mobile host.
The home agent receives the packet and sends it to the foreign agent.
Foreign Agent
The foreign agent is usually a router attached to the foreign network.
The foreign agent receives and delivers packets sent by the home agent to the
mobile host.
The mobile host can also act as a foreign agent.
In other words, the mobile host and the foreign agent can be the same.
However, to do this, a mobile host must be able to receive a care-of address by
itself, which can be done through the use of DHCP.
In addition, the mobile host needs the necessary software to allow it to
communicate with the home agent and to have two addresses:
its home address and
its care-of address.
This dual addressing must be transparent to the application programs.
When the mobile host acts as a foreign agent, the care-of address is called a co-
located care-of address.
Page 15 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
The advantage of using a co-located care-of address is that the mobile host can move
to any network without worrying about the availability of a foreign agent.
The disadvantage is that the mobile host needs extra software to act as its own
foreign agent.
Page 16 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Checksum Concept
Page 17 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Checksum in one’s complement arithmetic
The checksum
How to compute a checksum?
o Put a 0 in the checksum field.
o Add each 16-bit value together.
o Add in any carry
o Inverse the bits and put that in the checksum field.
To check the checksum:
o Add each 16-bit value together (including the checksum).
o Add in carry.
o Inverse the bits.
o The result must be 0.
Remember, only the bits in the header are calculated in the IP checksum.
Example:
Consider the following IP header, with source IP address of 146.149.186.20 and
destination address of 169.124.21.149. All values are given in hex:
45 00 00 6c
92 cc 00 00
38 06 00 00
92 95 ba 14
a9 7c 15 95
So, first add all 16-bit values So, we get: 5ce8 + 1 = 5ce9.
together, adding in the carry each 5ce9
time: + a97c
4500 ----
+ 006c 10665 <---Again, we have a carry
---- here! So, remove the leftmost bit
456c and add it back in. So, we get: 0665
+ 92cc + 1 = 0666.
---- 0666
d838 + 1595
+ 0000 ----
---- 1bfb
d838 Now we have to inverse the bits.
+ 3806 1bfb = 0001 1011 1111 1011
---- inverse bits: 1110 0100 0000 0100
1103e <---But, we have a carry = e404
here! So, remove the leftmost bit So, the checksum is e404. So, the IP
Page 18 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
and add it back in. So, we get: header we send looks like:
103e + 1 = 103f. 45 00 00 6c
103f 92 cc 00 00
+ 0000 38 06 e4 04
---- 92 95 ba 14
103f a9 7c 15 95
+ 9295 As an exercise, please act as the
---- receiver, compute the checksum on
a2d4 that packet, and make sure the result
+ ba14 is 0!
----
15ce8 <---Again, we have a carry
here! So, remove the leftmost bit
and add it back in.
Draw mobile IP architecture with proper labels. And explain its functioning. 4
Solution:
Mobile Hosts
When a host moves from one network to another, the IP addressing structure
needs to be modified.
Several solutions have been proposed.
Changing the Address:
One simple solution is to let the mobile host change its address as it goes to the new
network. The host can use DHCP to obtain a new address to associate it with the new
network.
This approach has several drawbacks.
First, the configuration files would need to be changed.
Page 19 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
Second, each time the computer moves from one network to another, it must be
rebooted.
Third, the DNS tables need to be revised so that every other host in the Internet
is aware of the change.
Fourth, if the host roams from one network to another during a transmission, the
data exchange will be interrupted.
This is because the ports and IP addresses of the client and the server must
remain constant for the duration of the connection
Two Addresses:
The approach that is more feasible is the use of two addresses.
The host has its original address, called the Home address, and
A temporary address, called the care-of address.
The home address is permanent; it associates the host to its home network,
the network that is the permanent home of the host.
The care-of address is temporary. When a host moves from one network to
another, the care-of address changes; it is associated with the foreign network, the
network to which the host moves.
When a mobile host visits a foreign network, it receives its care-of address during
the agent discovery and registration phase
AGENTS
To make the change of address transparent to the rest of the Internet requires a
home Agent and a Foreign Agent.
Figure shows the position of a home agent relative to the home network and a
foreign agent relative to the foreign network.
We have shown the home and the foreign agents as routers, but we need to
emphasize that their specific function as an agent is performed in the
application layer. In other words, they are both routers and hosts.
Home Agent
The home agent is usually a router attached to the home network of the mobile
host.
The home agent acts on behalf of the mobile host when a remote host sends a
Page 20 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
packet to the mobile host.
The home agent receives the packet and sends it to the foreign agent.
Foreign Agent
The foreign agent is usually a router attached to the foreign network.
The foreign agent receives and delivers packets sent by the home agent to the
mobile host.
The mobile host can also act as a foreign agent.
In other words, the mobile host and the foreign agent can be the same.
However, to do this, a mobile host must be able to receive a care-of address by
itself, which can be done through the use of DHCP.
In addition, the mobile host needs the necessary software to allow it to
communicate with the home agent and to have two addresses:
its home address and
its care-of address.
This dual addressing must be transparent to the application programs.
When the mobile host acts as a foreign agent, the care-of address is called a co-
located care-of address.
Page 21 of 22
Computer Engineering- CO5I (A-B)
Question Bank for Chapter1-2-3.1-3.2 (Year 2019-20)
Advanced Computer Networks (22520)
Question Marks
audio/video streaming broadcasts) to multiple recipients. Using multicast, a
source can send a single copy of data to a single multicast address, which is then
distributed to an entire group of recipients.
Page 22 of 22