Professional Documents
Culture Documents
Program: BSCS
Student Signature:
Page 1 of 8
PART A
1. Draw the OSI and TCP/IP Models, side by side to show the relevant layers of both
Protocol Stacks.
APPLICATION LAYER
SESSION LAYER
Page 2 of 8
PART B
Ans: 1. Accuracy
2. Delivery
3.Time
3. Define Topology and write down its types (names only for different Topologies).
5. Which Layers in TCP/IP model attach header and Trailer with the payload?
Ans: In TCP/IP model header and trailer is attached in DATA LINK Layer.
PART C
Page 3 of 8
1. Routing Information Protocol (RIP) is an Interior routing protocol, which uses
distance vector routing. It uses Bellman-Ford algorithm for calculating the routing
table.
Write down the RIP routing table updating algorithm (Bellman-Ford algorithm).
2. Open Shortest Path First (OSPF) is an Interior routing protocol, which uses link state
routing. It uses Dijkstra’s Algorithm for calculating the routing table.
Write down the OSPF routing table updating algorithm (Dijkstra’s Algorithm).
Page 4 of 8
while Q is not empty:
u ← vertex in Q with min dist[u]
remove u from Q
PART D
2. Cut-through:
Read destination address and start transmitting . Without
waiting for the entire message is received
3. Fragment-free
Read the first 64 byte segment (contains the header)
Layer 2 bridging Operation Modes:
2. Describe how LAN switches use and populate the MAC address table.
Page 5 of 8
3. What is the benefit(s) of Redundant Topology? What are the problems introduced by
Redundant Topology? What is/are the solutions available to deal with those problems
in Redundant Topology?
ANS: Benefits:
Redundant topology eliminates single points of failure.
Provide Backup path.
Problems:
1) Broadcast Storm:
A switch forwards out the broadcast frame, generated by another device, to all its
ports. If no loop avoidance schemes are applied then the switches will flood
broadcasts endlessly throughout the network which consumes all the available
bandwidth. This phenomenon is called broadcast storm.
Solution:
Identify the source
Research the process that’s broadcasting
Separate the network into smaller broadcast domains
2) Multiple copies:
A device can receive multiple copies of the same frame if a frame arrives from
different network segments at the same time.
Solution:
• To overcome this problem, Spanning tree must be enabled on the switches.
Page 6 of 8
STP (Spanning Tree Protocol):
The Spanning Tree Protocol (STP) is responsible for identifying links in the network and
shutting down the redundant ones, preventing possible network loops.
Operations:
In STP, all switches in the network exchange BPDU messages between them to agree upon the
root bridge. Once they elect the root bridge, every switch has to determine which of its ports will
If more than one link connects to the root bridge, then one is elected as the forwarding port
Link Speed Cost (Revised IEEE spec) Cost (previous IEEE spec)
10Gbps 2 1
1 Gbps 4 1
100 Mbps 19 10
10 Mbps 100 100
6. Draw the Spanning-Tree Port States showing how Spanning-tree transits each port
through several different states.
Page 7 of 8
1. The root bridge needs to be elected. Two fields combined together identify the
root bridge: MAC address and Priority value. Without manual configuration all
switches have the same priority therefore it is up to the MAC address to decide upon
the root bridge. The switch with the lowest MAC address value is elected as the root
bridge. In the diagram above Switch C is the elected root bridge.
2. Once the root bridge is elected, each switch needs to identify a single root port -
the port closest to the route bridge. This port will always be in the forwarding state.
By default all ports of the route bridge are in the forwarding state. Moreover, one port
per segment (called designated port) is allowed to be in the forwarding state.
3. We have 2 ports on switch A and two ports on switch B that belong to the same
segment. Therefore, two of them need to be blocked to avoid loops. Since switch B
has higher MAC address value (hence lower priority), its designated ports need to be
blocked.
ANS: 1.Scalability
2.Security
3.Redundancy
4.Performance
5. Maintainability
8. What are the three Layers in the Hierarchical Network Design Model?
ANS: The hierarchical network model uses three layers. These are
the Core, Distribution, and Access layers
Page 8 of 8