32 Networking Questions and Answer
32 Networking Questions and Answer
Solution:
Question 2:
How are errors detected and corrected in X.25 packets?
Solution question2:
In X.25, errors in packets are detected and corrected using the following methods:
Error Detection
CRC (Cyclic Redundancy Check): Each packet includes a checksum (FCS field). The receiver
computes the checksum again and compares it with the received one. If they don't match, an error is
detected.
Error Correction
ARQ (Automatic Retransmission Request): If an error is detected, the receiver sends a NACK
(Negative Acknowledgment) to request the sender to retransmit the corrupted packet.
Sequencing: Each packet has a sequence number, helping the receiver identify lost or out-of-
order packets for retransmission.
Question 3
Explain the steps involved in establishing a virtual circuit (VC) connection
between two DTEs (Data Terminal Equipment) in an X.25 network.
Solution:
Call Request: The initiating DTE sends a request to the network to start the connection.
Call Accept: The network checks and accepts the request, then notifies the initiating DTE.
Circuit Setup: The network sets up a path for communication between the two DTEs.
Data Transfer: Once the connection is made, data is sent between the DTEs.
Call Disconnect: After data transfer, either DTE sends a disconnect message to end the connection.
Question 4
Given:
Steps:
Question 5
Solution:
To determine the most cost-effective option, the company should consider the following:
2.Bonded DSL:
How to Decide:
If the T-1 line cost ($T_month) is close to or lower than Bonded DSL cost ($B_month), and the
company needs guaranteed speed, then choose the T-1 line for reliability.
If Bonded DSL ($B_month) is significantly cheaper and the speed is generally above 1 Mbps, then
choose Bonded DSL but consider the risk of variable speed.
Question6
: A T-3 leased line transmits data packets with a Frame Check Sequence (FCS) for
error detection. The FCS uses a specific polynomial for error checking. How can we
determine if a received packet is corrupted based on the FCS value?
Solution:
Recalculate the CRC: The receiver calculates the CRC for the received packet using the same error-
checking polynomial.
Compare CRC with FCS: The receiver compares the calculated CRC with the FCS value that came
with the packet.
If the calculated CRC matches the FCS, the packet is not corrupted.
If the calculated CRC doesn't match the FCS, the packet is corrupted.
In short, if the CRC doesn't match the FCS, the packet has an error.
Given:
File size = 100 Megabytes (MB) = 100 * 8 = 800 Megabits (Mb) (since 1 byte = 8 bits)
BE is 64 kbps (64 kilobits per second), which is available only when there is excess capacity and isn't
guaranteed.
We’ll assume that the full CIR rate can be used to transfer the file, and any extra burst traffic (above CIR) will
use BE.
So, 400 seconds will be used for transferring the file at the CIR rate.
To calculate the portion of the file that uses BE, we'll consider the total file size and subtract the
portion transmitted at CIR:
First, determine the maximum amount of data that can be transmitted at the CIR rate (2 Mbps).
For 400 seconds (time at CIR), the maximum data transmitted at CIR is:
Since the entire file is 800 Mb, the entire file can be transmitted at the CIR rate, and there’s no need to
use the BE rate in this case.
Final Answer:
Portion using BE: 0% (because the entire file fits within the CIR).
So, the file will be transmitted in 400 seconds using the CIR alone. No BE bandwidth is needed in this case.
Question8:
Solution
Packet size = 1024 bytes = 1024 * 8 = 8192 bits (since 1 byte = 8 bits)
Propagation delay = 20 ms = 0.02 seconds
Transmission time is the time it takes to send the packet over the network, and it is calculated as:
The total time includes both the transmission time and the propagation delay:
Line efficiency is the ratio of the transmission time to the total time:
Final Answer:
Question9:
Question: A Frame Relay network is experiencing congestion. The network has a Discard
Eligibility (DE) bit set for specific traffic types. How does the DE bit influence packet handling
during congestion?
Solution
In a Frame Relay network, the DE (Discard Eligibility) bit helps manage congestion:
DE bit set: This means the packet is low priority and can be dropped if the network is congested.
DE bit not set: This means the packet is high priority and will be kept in the network during
congestion.
During congestion, the network will drop packets with the DE bit set first, keeping high-priority packets
(DE bit not set) to ensure important data gets through.
Question 10:
An ATM network has a total bandwidth of 155 Mbps. It needs to support three
types of traffic:
• Voice calls: Each call requires 64 kbps bandwidth. (Number of calls = V)
• Video conferencing: Each video conference requires 384 kbps bandwidth. (Number
of conferences = C)Page 8 of 16
• Data transfer: The remaining bandwidth is allocated for data transfer.
How can we calculate the effective throughput available for data transfer (T_data)
considering the bandwidth requirements of voice calls and video conferencing?
Solution:
Given:
Voice calls: Each call requires 64 kbps bandwidth. (Let the number of voice calls = V)
Video conferencing: Each video conference requires 384 kbps bandwidth. (Let the number of
conferences = C)
The remaining bandwidth, which will be used for data transfer, is the total bandwidth minus the bandwidth
used by voice calls and video conferences:
Final Formula:
Explanation:
T_data is the bandwidth available for data transfer after accounting for the bandwidth used by voice
calls and video conferences.
Question 11
: An ATM network prioritizes real-time traffic like video conferencing for smooth
operation. How does Cell Delay Variation (CDV) impact the Quality of Service (QoS) for video
conferencing in ATM networks?
Solution:
High CDV causes delays and interruptions, making video conferencing choppy and out-of-sync, which
lowers quality. Low CDV is needed for smooth video calls.
Question 12
A company needs to connect two offices for data transfer. They have two main traffic types:
• Real-time video conferencing requiring low delay and jitter.
• Non-real-time file transfer with a focus on high throughput.
Question: Considering the technical characteristics of ATM, Frame Relay, T1, and X.25,
which network option would be most suitable for this scenario? Why?
Solution:
For this company that needs to connect two offices for video conferencing (real-time, low delay) and file
transfers (high throughput), the best option is ATM (Asynchronous Transfer Mode).
Real-time video conferencing: ATM is great for this because it minimizes delay and jitter, which are
important for smooth video calls.
Non-real-time file transfers: ATM also handles high throughput well, meaning it can send large files
quickly without slowing down.
Traffic management: ATM can handle both types of traffic (video and files) at the same time, making
sure each gets what it needs without interference.
Frame Relay: Not as good for real-time video because it doesn’t guarantee low delay
Question 13:
A company is expecting significant growth in data traffic over the next few years. They need
a network solution that can easily scale to accommodate the increasing traffic volume.
Question: How do ATM, Frame Relay, T1, and X.25 differ in terms of scalability and traffic
management capabilities?
Solution:
Scalability: Very high. It can easily grow with the company's needs and handle a lot of data.
Traffic Management: Great. ATM can prioritize important data (like video calls) and manage traffic
well as the network expands.
Why it's good: ATM is built to handle growth without problems. It adjusts to new demands easily.
2. Frame Relay:
Scalability: Moderate. It can grow, but not as easily as ATM. Adding more traffic can slow it down.
Traffic Management: Basic. It doesn't manage traffic as well as ATM. Some data might get delayed or
slowed down.
Why it's okay: It works for smaller growth, but as traffic increases, it can get less efficient.
3. T1 (1.544 Mbps):
Scalability: Low. It’s limited to 1.5 Mbps, so to increase capacity, you need to add more T1 lines, which is
expensive and slow.
Traffic Management: Very basic. T1 doesn’t have much control over how traffic is managed as it grows.
Why it's not great: T1 is hard to scale and can get expensive as the company grows.
4. X.25:
Scalability: Very low. It’s outdated and not designed for large amounts of modern data.
Traffic Management: Old and slow. X.25 is inefficient for handling modern traffic needs.
Why it's bad: X.25 is too old and slow to handle growth.
Question14
sufficient network capacity to handle the expected load. They have historical traffic data
available. How can they use this data to estimate future traffic volume?
Solution:
There are various methods for traffic forecasting, but here's a simple example using
historical data and a growth factor:
• Gather Historical Data: Collect traffic data over a period (e.g., daily average traffic
volume for the past year).
• Calculate Average Traffic: Calculate the average daily traffic volume (T_avg) for the
historical period.
• Estimate Growth Rate: Analyze historical trends or consider expected user growth
to estimate a growth factor (G).
• Forecast Future Traffic: Apply the formula: Future Traffic (T_future) = T_avg * (1 + G)
Question 15:
Permanent vs. Switched Virtual Circuits Explain the fundamental differences
between permanent virtual circuits (PVCs) and switched virtual circuits (SVCs) in the context
of network communication. Discuss the advantages and disadvantages of each approach,
considering factors such as setup time, flexibility, resource utilization, and cost
Solution:
Fundamental diffrences
It behaves like a dedicated path and does not need to be set up or torn down each time data is sent.
Example: Like a private road between two offices that's always open.
Example: Like calling a friend—each time you talk, you dial a number (set up a connection), and hang up
afterward (tear it down).
Advantages:
Low Setup Time: No need for setup negotiation before data transfer—it's already established.
Disadvantages:
Inflexible: Not ideal if the network topology or usage patterns change frequently.
Wastes Resources: Resources (e.g., bandwidth, memory) are reserved whether or not the circuit is
actively used.
Higher Cost: Ongoing resource commitment can lead to higher operational costs.
Advantages:
Flexible and Scalable: New connections can be set up as needed, adapting to traffic demands.
Efficient Resource Use: Resources are used only when needed, leading to better utilization.
Disadvantages:
Setup Delay: Every new connection requires a setup phase, adding latency.
Question 16:
Why PVC?
Impact:
Use Case: A city uses a network of CCTV cameras continuously streaming video to a central
monitoring center.
Why PVC?
Impact:
Use Case: Field employees connect to the corporate network only occasionally to upload reports.
Why SVC?
Impact:
Efficiency: High, because resources are used only during active sessions.
Use Case: A company uses cloud-based rendering services for video projects only when needed.
Why SVC?
Impact:
Question17:
In Virtual Circuit Switching, a logical path (virtual circuit) is established before any data is sent. All packets
follow this path through the network for the entire session. The connection is established via a signaling process
before data transmission begins
In Datagram Switching, each packet is routed independently without the need for an established path. Each
packet can take a different route based on the current network conditions (such as congestion or link failures).
Advantages of VCS:
Reliable Communication: Since a dedicated path is set up, packets arrive in order and with fewer
chances of packet loss.
Predictable Performance: The established path ensures consistent bandwidth and lower delay during
the session.
Error Control: Reliable error handling mechanisms can be implemented, leading to higher reliability.
Disadvantages of VCS:
Setup Time: Before data transmission, a connection must be established, which can introduce delay.
Resource Utilization: Resources (such as bandwidth and routers) are reserved for the duration of the
session, even if no data is being transmitted.
Less Flexibility: Once a path is established, the network can't easily change routes or handle other
traffic needs dynamically.
Telecommunications: Voice calls over traditional phone networks (like ISDN or ATM) where a
consistent, dedicated connection is important.
VPNs: Virtual Private Networks use VCS to provide secure, reliable connections for sensitive data.
No Setup Delay: No need to establish a connection before sending data, allowing for immediate
transmission.
Flexibility: Packets can take the most optimal route depending on the network's current state, providing
better adaptation to changes in the network.
Efficient Resource Use: Resources are used dynamically, only when packets are transmitted, allowing
for more efficient utilization of network bandwidth.
Unreliable Communication: Packets may arrive out of order, get lost, or experience duplication, as no
dedicated path is set up.
Higher Overhead: Each packet may carry extra routing information, increasing overhead in terms of
data size.
Variable Performance: The delay and bandwidth available can fluctuate, as packets may take different
paths and experience different conditions.
Internet (IP Networks): The Internet Protocol (IP) is based on datagram switching, where each
packet is independently routed.
Streaming Services: For applications like video or audio streaming, where real-time transmission is
less critical, and some packet loss can be tolerated.
Question18 :
Solution:
See which connections are always busy and which ones are used only sometimes.
Make sure your network devices (like routers) can support SVCs.
6. Train Staff
Teach your IT team how to manage and troubleshoot SVCs.
Question19:
Answer:
Signaling is the process used to set up, manage, and end a communication path (called a virtual circuit)
between two devices before they exchange actual data.
It’s like calling someone—you dial their number (setup), talk (data transfer), and hang up (termination). The
"dialing" part is signaling.
2. Path Selection
Routers or switches along the path reserve the needed resources (e.g., bandwidth).
3. Call Acceptance
The destination receives the request and sends back a call accepted signal.
5. Data Transfer
6. Call Termination
Signaling helps virtual circuit networks by setting up a dedicated path before any data is sent. This
ensures that all data packets follow the same route, arrive in order, and don’t get lost along the way. It also
allows the network to reserve resources like bandwidth in advance, which helps avoid delays and congestion.
By confirming the connection before communication starts, signaling reduces errors and makes the whole
process more reliable and efficient. This is especially useful for services like voice or video calls that need a
stable, continuous connection.
Question 20:
Quality of Service (QoS) in Virtual Circuit Networks Discuss the concept of
Quality of Service (QoS) in the context of virtual circuit networks. Explain how QoS
parameters, such as bandwidth allocation, delay, jitter, and packet loss, are managed and
maintained in a virtual circuit environment. Provide examples of applications or services that
heavily rely on QoS in virtual circuit networks and explain how network administrators
ensure consistent performance for these application
Answer:
2. Video Conferencing
3. Online Gaming
Limit Lower Priority Traffic: Control downloads or bulk file transfers that could slow down the
network.
Question 21:
Answer
X.25 is an old but reliable packet-switched network protocol developed in the 1970s. It was designed for
communication over public telephone lines, which were often noisy and unreliable at the time.
X.25 allows devices (like computers or terminals) to send data through a network using virtual circuits, with
error checking and flow control built in to ensure data is delivered correctly.
Before sending data, X.25 sets up a virtual circuit between the sender and receiver.
This can be a Permanent Virtual Circuit (PVC) or a Switched Virtual Circuit (SVC).
Packet Switching:
Error Checking:
Each packet is checked for errors at every step (node) in the network.
Flow Control:
X.25 makes sure the sender doesn’t send data faster than the receiver can handle.
Connection Termination:
Once data transfer is complete, the virtual circuit is closed (for SVCs).
Question 22:
Answer:
Question23:
A T-1 line is a private connection between your business and the internet or another location.
It’s not shared with other users, so it's always available.
Speed:
It provides 1.544 Mbps of speed. This means it can send and receive data at that speed all the
time.
24 Channels:
The T-1 line splits its speed into 24 channels, each carrying 64 kbps. These channels can carry data
(like internet and email) or voice (like phone calls).
Full-Duplex:
It can send and receive data at the same time, so there are no delays when using it.
Question24:
A T-3 leased line is a high-speed, dedicated internet connection that provides 45 Mbps of bandwidth. It’s
often used by larger businesses or organizations that need to transmit large amounts of data, host servers, or
support high-traffic internet services.
Think of it as a super-fast private highway for data, providing a steady and reliable connection.
T-3 lines are typically used in situations where high-speed, reliable connections are critical, such as:
Large businesses or enterprises with multiple locations that need fast communication between them.
Data centers that require large data transmission and quick access to cloud services or other remote
servers.
High-traffic internet services like hosting, video conferencing, or VoIP (Voice over IP).
Backup and disaster recovery systems where speed and reliability are crucial.
Question25:
: What is Frame Relay Networking and How Does it Work?
Frame Relay is a high-performance, wide-area network (WAN) technology used for transmitting data
between multiple locations. It allows businesses to send data over public or private networks efficiently and
with low latency.
Frame Relay works by breaking data into packets and sending them over a shared network. It’s faster and
more cost-effective than older technologies like X.25, but not as fast or reliable as newer technologies like
MPLS or IP-based networks.
Virtual Circuits:
Data travels through virtual circuits (logical paths) that are set up between two points. These
can be permanent (always on) or temporary (created when needed).
Multiplexing:
Multiple virtual circuits can share the same physical connection, making it efficient and cost-
effective.
Each frame can take a different route through the network to reach the destination.
Frame Relay doesn’t fix errors or manage flow control; higher layers like TCP/IP do that.
Question 26:
Benefits and Limitations of Frame Relay Networks
Limitation Explanation
❌ No Built-In Error Correction Relies on other protocols (like TCP) to fix errors.
Not Ideal for Voice/Video May cause delay or jitter if the network is busy.
Old Technology Largely replaced by MPLS, VPNs, and broadband connections.
� Needs Management May require skilled staff to set up and monitor connections.
Not Widely Supported Today Many providers have stopped offering Frame Relay services.
Question 27:
Explain the Concept of Congestion Control in Data Networks.
Answer:
Congestion in a network may occur if the load on the network-the number
of packets sent to the network-is greater than the capacity of the network-
the number of packets a network can handle
Congestion control refers to the mechanisms and techniques to
control the congestion and keep the load below the capacity
Question 28:
: What is Quality of Service (QoS) and Why is it Important in Networks?
Quality of Service (QoS) is a way to manage and prioritize network traffic so that important data—like
voice, video, or real-time applications—gets the speed and attention it needs.
It helps ensure that the network works smoothly and reliably, especially when there is a lot of traffic.
Without QoS, all data is treated equally—even if some applications (like video calls) need more speed or less
delay than others (like emails). QoS makes sure the right data gets through first, improving performance and
user experience.
Question 29:
. Traffic Classification
What it does: Identifies different types of data (like voice, video, or email).
2. Traffic Shaping
What it does: Slows down some data to keep the network smooth.
3. Traffic Policing
Why it helps: Stops one user from using too much bandwidth.
4. Queuing
What it does: Puts data in lines (queues) and sends the most important first.
Why it helps: Voice and video go first, other data like downloads wait.
5. Congestion Avoidance
What it does: Drops low-priority data early when the network gets busy.
Question 30:
Discuss the Role of Quality of Service (QoS) Mechanisms in Congestion
Quality of Service (QoS) mechanisms help prevent and manage congestion by controlling how data moves
through a network, especially when too many users or devices are sending data at the same time.
Question 31:
Compare and Contrast Open-Loop and Closed-Loop Congestion Control
Answer:
Open loop congestion control:
Question 31:
: Evaluate the Impact of Congestion Avoidance Techniques on Network
Performance.
Congestion avoidance techniques help improve network performance by preventing congestion before it
gets too severe. For instance, techniques like Random Early Detection (RED) and TCP congestion control
actively monitor the network and drop packets early if the network is getting overloaded. This approach keeps
the network running smoothly, avoids full congestion, and ensures faster data transmission.
By dropping packets early, these techniques prevent a situation where too many packets are lost at once,
which can slow down the entire network. As a result, real-time applications like voice or video calls, which
need low latency, experience fewer delays and better quality.
Question 32:
Calculating Cell Transmission Time in an ATM Network.
Problem: In an ATM network, the cell length is 53 bytes, including the 5-byte header and
48-byte payload. If the transmission rate is 155.52 Mbps, calculate the time required to
transmit a single ATM cell.
Solution 25: Cell Length = 53 bytes = 53 * 8 bits = 424 bits Transmission Rate = 155.52
Mbps = 155.52 * 10^6 bps
Time = Cell Length / Transmission Rate Time = 424 bits / 155.52 * 10^6 bps ≈ 2.727
microseconds
Therefore, the time required to transmit a single ATM cell is approximately 2.727
microseconds.