Advance Computing Networks – Unit Test Answers
Unit – I: Internet Architecture and Network Layer
1. State the concept of fragmentation in IPv4.
Fragmentation in IPv4 occurs when a packet is larger than the Maximum Transmission Unit (MTU)
of a network.
The large packet is divided into smaller fragments so that each fragment can travel through the
network.
Each fragment has its own header, and at the destination, they are reassembled into the original
packet.
2. State the concept of Subnetting in IPv4.
Subnetting is the process of dividing a large IP network into smaller sub-networks (subnets). It
helps in efficient
IP address utilization, reduces broadcast traffic, and improves security and management.
Subnetting is done by
borrowing bits from the host part of an IP address to create more network addresses.
3. Write a short note on:
**(i) Fragmentation** – Process of breaking large IP packets into smaller units to match the MTU of
the underlying network.
**(ii) Extension header** – In IPv6, extension headers are optional headers placed between the
main IPv6 header and the
upper-layer protocol header. They provide additional information like routing, fragmentation, or
security.
4. Write a short note on:
**(i) Broadcast Address** – The highest address in a subnet, used to send a message to all hosts in
that subnet.
Example: for [Link]/24, broadcast = [Link].
**(ii) Network Address** – The first address in a subnet that identifies the network itself, not a host.
Example: for [Link]/24, network = [Link].
5. Differentiate between IPv4 and IPv6 (any 4 points).
| Point | IPv4 | IPv6 |
|------------------|----------------------------------|--------------------------------------|
| Address length | 32-bit (4 bytes) | 128-bit (16 bytes) |
| Address format | Decimal, dotted (e.g. [Link])| Hexadecimal, colon separated (e.g.
[Link]) |
| Header size | 20–60 bytes | Fixed 40 bytes |
| Security | Optional (via IPSec) | Built-in IPSec support |
| Address space | ~4.3 billion addresses | Huge, ~3.4×10^38 addresses |
6. For IP address [Link]
(1) **Class**: Class C (since first octet 193 → between 192–223).
(2) **Network Address**: [Link]
(3) **Last Address**: [Link] (broadcast)
(4) **First Host Address**: [Link]
Unit – II: Routing Protocols
1. State importance of Routing table.
A routing table stores the paths to reach different network destinations. Importance:
- Provides next-hop information for packet delivery.
- Ensures efficient routing of packets.
- Prevents loops and reduces congestion.
- Helps routers make forwarding decisions quickly.
2. Explain Router architecture, routing table, queueing, and switching.
- **Router architecture** – consists of input ports, output ports, switching fabric, and routing
processor.
- **Routing table** – stores network routes and next-hop details.
- **Queueing** – buffers packets when network traffic is high, ensuring fair delivery.
- **Switching** – the process of forwarding packets from input to correct output port.
3. Define:
**(i) Inter-domain routing** – Routing between different autonomous systems (AS). Example: BGP.
**(ii) Intra-domain routing** – Routing within a single autonomous system. Example: RIP, OSPF.
4. Difference between distance vector and link state routing.
| Feature | Distance Vector | Link State |
|-----------------------|-----------------|------------------|
| Information shared | Shares distance (hop count) to networks | Shares complete topology info |
| Algorithm | Bellman-Ford | Dijkstra’s SPF |
| Convergence speed | Slow | Fast |
| Example protocols | RIP | OSPF, IS-IS |
5. Explain ARP Protocol with neat diagram.
- **ARP (Address Resolution Protocol)** maps IP address to MAC address in a local network.
- Working: Host broadcasts ARP request → Target replies with its MAC → Sender stores it in ARP
cache.
(Diagram: Host A → ARP Request → Broadcast → Host B replies with MAC).
6. Explain Reverse ARP (RARP).
RARP is used by a device to discover its own IP address using its MAC address. The request is
sent to a RARP server,
which replies with the corresponding IP. Used by diskless workstations during booting.
7. Explain ICMP message format.
ICMP (Internet Control Message Protocol) is used for error reporting and diagnostics.
**Format:**
- Type (8 bits) → Message type (e.g., Echo request).
- Code (8 bits) → Subtype.
- Checksum (16 bits) → Error detection.
- Rest of header + Data.
8. Explain Border Gateway Protocol (BGPv4).
BGP is an inter-domain routing protocol used on the Internet.
- Path vector protocol.
- Exchanges routing information between Autonomous Systems.
- Uses attributes like AS-PATH, NEXT-HOP.
- Ensures loop-free and policy-based routing.
9. Explain Routing Information Protocol (RIPv2).
- Distance vector routing protocol.
- Uses hop count as metric (max 15 hops).
- Classless, supports CIDR and subnet masks.
- Uses multicast address [Link] for updates.
- Updates sent every 30 seconds.
Unit – III: Transport Layer Protocols
1. State UDP Protocol.
UDP (User Datagram Protocol) is a connectionless, lightweight transport protocol. It provides fast
delivery without
reliability or ordering. Commonly used in video streaming, DNS, VoIP.
2. Explain UDP header format, features, and applications.
**UDP Header (8 bytes):**
- Source Port (16 bits)
- Destination Port (16 bits)
- Length (16 bits)
- Checksum (16 bits)
**Features:**
- Connectionless, no handshaking.
- Low overhead, fast transmission.
- Unreliable (no retransmission).
**Applications:**
- DNS queries, VoIP, video streaming, online gaming.