Professional Documents
Culture Documents
CCN UNIT 3 Question Answers
CCN UNIT 3 Question Answers
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, UNIT-3: Chapter 7
Wireless Networks and Mobile IP
S-1) What are narrowband RF LANs?
Narrowband RF LANs
Narrowband radio frequency (RF) LANs use a very narrow bandwidth. Narrowband RF LANs can
be either licensed or unlicensed. In licensed narrowband RF, a licensed authority assigns the radio
frequency band. Most geographic areas are limited to a few licenses. Adjacent cells use different
frequency bands. The transmissions are encrypted to prevent attacks. The licensed narrowband
LANs guarantee communication without any interference. The unlicensed narrowband RF LANs
use the unlicensed spectrum and peer-to-peer LAN topology.
S-5) and 19) List any 4 major challenges with mobile IP.
The major challenges with mobile IP are
• Mobility. A quality connection is desired for a user while it is mobile with different speeds.
• Registration. A mobile user's address must be identified and registered in different areas.
• Interoperability. A mobile user must interact with other stationary and mobile users.
• Connection reliability. TCP connections must survive in mobility cases.
• Security. A connection must be secured, especially since a wireless connection is less immune
to intrusions
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, S-7) Name any two key factors for efficient delivery of packets in network routing?
For efficient delivery of packets, there are several key factors to consider:
1) Routers with a reasonable amount of buffer space,
2) Links with adequate bandwidth,
3) Actual transmission with minimal error, and
4) The routers’ efficiency in switching a packet to the appropriate outgoing link.
In a multipath routing infrastructure, multiple paths exist between networks. These protocols are
better for performing load balancing. Multipath routing is more complex to configure. In multi-
path algorithms, multiple paths are stored in the routing table.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, S-12) What is OSPF?
Open Shortest Path First [OSPF]
Open Shortest Path First (OSPF) is a link-state routing protocol. OSPF is another Interior Gateway
Protocol. It is designed to be run as an Interior Gateway Protocol (IGP) to a single Autonomous
System (AS).
S-16) Name the protocols which are operated through VoIP network?
Protocols which are operated through VoIP network are:
Signalling protocol and real-time packet-transport protocols
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, • Bandwidth
• Load
• Communication cost
• Reliability
Advantages of Infrared:
• For example, the bandwidth for infrared communication is large and can therefore achieve high
data rates.
• Also, because infrared rays are reflected by lightly colored objects, it is possible to cover the
entire area of the room with reflections from objects.
• Since infrared cannot penetrate through walls and other opaque obstacles, it becomes very
difficult for any adversary to carry out a passive attack or to eavesdrop. Hence, communication
with infrared technology is more secure.
• Also, separate infrared networks can be used in adjacent rooms without any interference effects.
• Finally, equipment for infrared communication is much cheaper than microwave
communication.
Spread-Spectrum LANs
Spread-spectrum LANs operate in industrial, scientific, and medical applications, making use of
multiple adjacent cells, each having a different center frequency within a single band to avoid any
interference. Within each of these cells, a star or peer-to-peer topology can be deployed. If a star
topology is used, a hub as the network center is mounted on the ceiling. This hub, serving as an
interface between the wired and wireless LANs, can be connected to other wired LANs. All users
in the wireless LAN transmit and receive signals from the hub. Thus, the traffic flowing among
users moves through the central hub. Each cell can also deploy a peer-to-peer topology. The spread-
spectrum techniques use three different frequency bands: 902-928 MHz, 2.4 GHz-2.4835 GHz, and
5.725 GHz-5.825 GHz. Higher-frequency ranges offer greater bandwidth capability. However, the
higher-frequency equipment is more expensive.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, L-2) Explain 802.11 physical layer types. (4)
The IEEE 802.11 physical layer is of four types. They are:
5) Direct-sequence spread spectrum (DSSS) uses seven channels, each supporting data rates of 1
Mb/s to 2 Mb/s. The operating frequency range is 2.4 GHz ISM band. DSSS uses three
nonoverlapping channels in the 2.4 GHz ISM band. The 2.4 GHz frequency band used by 802.11
results in interference by certain home appliances, such as microwave ovens and cordless
telephones, which operate in the same band.
6) Frequency-hopping spread spectrum (FHSS) uses a pseudonoise sequence and signal hopping
from one channel to another. This technique makes use of 79 channels. FHSS operates in the
2.4 GHz ISM band and supports data rates of 1 Mb/s to 2 Mb/s.
7) Infrared with an operating range of about 20 meters operates on a broadcast communication
paradigm. A pulse position modulation (PPM) scheme is used.
8) Orthogonal frequency division multiplexing (OFDM), is a multicarrier modulation scheme
whereby the carrier spacing is carefully selected so that each subcarrier is orthogonal to the
other subcarriers. Two signals are orthogonal if they are multiplied together and their integral
over an interval is 0. Orthogonality can be achieved by letting the carrier spacing be equal to the
reciprocal of the useful symbol period. As the subcarriers are orthogonal, the spectrum of each
carrier has a null at the center frequency of each of the other carriers in the system. This results
in no interference between the carriers, allowing them to be spaced as close as possible
L-4) Briefly explain the steps involved in establishing a call between two mobile users in a
cellular network. (6)
The steps involved in establishing a call between two mobile users in a cellular network are as
follows:
1) Mobile unit setup. When the mobile unit is switched on, it searches for the strongest control
channel. The mobile user is assigned a base station with which it operates. A handshake of
messages takes place between the associated MSC (Mobile Switching Center) and the mobile
user through the base station. The MSC registers and authenticates the user through the base
station. If the user moves to a new cell, this step repeats in the new cell.
2) Originated call. When a mobile originates a call, the called number is sent to the base station,
from where it is forwarded to the MSC.
3) Paging. MSC pages specific base stations, based on the called number. The base stations in turn
send a paging message on their set-up channel to locate the called user.
4) Call accepting. When the base station pages all users in its cell, the called user recognizes its
number and responds. The base station then notifies the MSC, which sets up a connection
between the called and calling base-station units.
5) Ongoing call. Once the connection is established, exchange of data and voice occur between
the two communicating mobile units through the base stations and the MSC.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, 6) Handoff. A handoff occurs when a mobile unit moves from one cell to another. The traffic
channel switches to the new base station, using the MSC, as shown in Figure 6.9. This switch
appears seamless to the user, without any interruption of the traffic.
7) Call blocking. When a mobile user originates a call, a busy tone is returned to the user if all the
traffic channels to the base station are busy.
8) Call termination. When one of the users in a mobile conversation hang up, the MSC is informed
of the call termination, and the traffic channels are deallotted at both base stations.
9) Call drop. When a base station cannot maintain a minimum signal level during a call, the call is
dropped. Weak signals may occur because of interference or channel distortions.
L-6) What are the various metrics used for routing algorithm? Explain. (6)
Routing Algorithm Metrics
Routing tables contain information used by switching software to select the best route. Routing
algorithms have used many different metrics to determine the best route. Efficient routing
algorithms select route based on multiple metrics. All the following metrics have been used:
• Path length: Path length is the most common routing metric. Some routing protocols allow
network administrators to assign arbitrary costs to each network link. In this case, path length is
the sum of the costs associated with each link traversed. Other routing protocols define hop
count. Hop-count is a metric that specifies the number of passes through internetworking
products, such as routers, that a packet must pass through in a route from a source to a
destination.
• Delay: Routing delay is the time required to move a packet from source to destination. Delay
depends on many factors, including the bandwidth of intermediate network links, the port
queues (receive and transmit queues that are there in the routers) at each router along the way,
network congestion on all intermediate network links, and the physical distance to be travelled.
• Bandwidth: Bandwidth is the available traffic capacity of a link. Although bandwidth is a rating
of the maximum attainable throughput on a link, routes through links with greater bandwidth do
not necessarily provide better routes than routes through slower links. For example, if a faster
link is busier, the actual time required to send a packet to the destination could be greater.
• Load: Load refers to the degree to which a network resource, such as a router, is busy. Load
can be calculated in a variety of ways, including CPU utilization and packets processed per
second.
• Communication cost: Communication cost is another important metric, especially because
some companies may not care about performance as much as they care about operating
expenditures. Although line delay may be longer, they will send packets over their own lines
rather than through the public lines that cost money for usage time.
• Reliability: Reliability in routing algorithms is the dependability (usually described in terms of
the bit-error rate) of each network link. Some network links might go down more often than
others. After a network fails, certain network links might be repaired more easily or more
quickly than other links. Any reliability factor can be taken into account in the assignment of
the reliability ratings, which are arbitrary numeric values, usually assigned to network links by
network administrators.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, L-7) Write a short note on i) IGP ii) RIP (6)
IGP (Interior gateway Protocols)
In small and slowly changing network the network administrator can establish or modify routes
manually. Administrator keeps a table of networks and updates the table whenever a network is
added or deleted from the autonomous system. The disadvantage of the manual system is obvious;
such systems are neither scalable nor adaptable to changes.
Automated methods must be used to improve reliability and response to failure. To automate the
task this task, interior router (within an autonomous system) usually communicates with one
another, exchanging network routing information from which reachability can be deduced. These
routing methods are called Interior gateway Protocols (IGP) [also called Intra-Domain Routing
Protocols].
RIP is not good when we have an alternative path with the same number of routers, but with a faster
bandwidth. RIP doesn’t understand that as it’s a distance vector and not a link state protocol. A link
state can calculate the fastest link not depending on the hop count, and its limit is 15 hops.
RIP was designed for exchanging information within a limited size network, such as a network of
250 routes or a maximum of 15 hops. A RIP router maintains a routing table and periodically sends
announcements to inform other RIP routers of the networks it can reach.
RIP also announces when it can no longer reach previously reachable networks. RIP version 1 uses
IP broadcast packets for its announcements. A later enhancement, RIP version 2, also allows IP
multicast packets for its announcements.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, • OSPF include Type of Service routing. It can calculate separate routes for each Type of Service
(TOS), for example it can maintain separate routes to a single destination based on hop-count
and high throughput.
• OSPF provides load balancing. When several equal-cost routes to a destination exist, traffic is
distributed equally among them.
• OSPF uses different message formats to distinguish the information acquired from within the
network (internal sources) with that which is acquired from a router outside (external sources).
• Loop-Free routes: OSPF-calculated routes are always loop-free.
• Scalability: With OSPF, an AS can be subdivided into contiguous groups of networks called
areas. Routes within areas can be summarized to minimize route table entries. Areas can be
configured with a default route summarizing all routes outside the AS or outside the area.
L-10) Explain the opening and confirming a BGP connection with a neighbour router. (6)
Opening and Confirming a BGP Connection with a Neighbour Router
After two BGP peers establish a TCP connection, each one sends an OPEN message to the other.
When the TCP connection is established, BGP peers immediately identify themselves to each other
by simultaneously sending open messages, and move into the OpenSent state. The open messages
let the peers agree on various protocol parameters, such as timers, and negotiate shared capabilities.
When each switch receives an open message, it checks all the fields. If it disagrees with the contents
of the open message, it sends a notification message, closes the connection and goes into the Idle
state. If it finds no errors, it moves into the OpenConfirm state and sends back a keep-alive message.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER,
When both switches have received a keep alive message they move into the Establishd state. The
BGP session is now open. BGP sessions typically stay in the Established state most of the time.
They only leave the Established state if an error occurs, or the hold time expires with no contact
from the far end.
If a router disagrees with the contents of the OPEN message, it sends a notification message, closes
the connection and moves into the Idle state.
If both nodes accept the OPEN message they send each other a Keep-alive message, move into the
Established state and start sending Update messages to each other.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, What this basically means is that a connection is established between the two nodes before any data
is transferred. When the term connection is established is used; this means that both nodes know
about each other and have agreed on the exchange of data. The following diagram explains the
procedure of the 3- way handshake:
STEP–1: Node A sends the initial packet to Node B. This packet has the SYN bit enabled. Node B
receives the packet and sees the SYN bit which has a value of “1” (in binary, this means ON) so it
knows that Node A is trying to establish a connection with it.
STEP–2: Assuming Node B has enough resources, it sends a packet back to Node A and with the
SYN and ACK bits enabled. The SYN that Node B sends, at this step, means ‘I want to synchronise
with you’ and the ACK means ‘I acknowledge your previous SYN request’.
STEP–3: Node A sends another packet to Node B and with the ACK bit set (with binary 1); it
effectively tells Node B ‘Yes, I acknowledge your previous request’.
Once the 3-way handshake is complete, the connection is established (virtual circuit) and the data
transfer begins.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, WWW (TCP port 80), E-Mail (SMTP DNS (UDP port 53), Streaming
TCP port 25), FTP (FTP port 21) and applications such as IPTV or movies,
Examples
Secure Shell (OpenSSH port 22) etc. Voice over IP(VoIP), Trivial File
Transfer Protocol (TFTP) etc.
Figure shows an overview of SIP. A call is initiated from a user agent: the user's IP telephone
system, which is similar to a conventional phone. A user agent assists in initiating or terminating a
phone call in VoIP networks. A user agent can be implemented in a standard telephone or in a laptop
with a microphone that runs some software. A user agent is identified using its associated domain.
For example, user1@domain1.com refers to user 1, who is associated with the domain1.com
network.
SIP consists of the following five servers:
1) DNS server. The Domain Name System (DNS) server maps the domain name to an IP address
in the user information database (UID). The UID database contains such user information as
preferences and the services to which it has subscribed. The UID also stores information on the
related IP addresses. Each user is normally configured with more than one DNS server.
2) Location server. This server is responsible for UID management. The location server interacts
with the database during call setup. Each proxy server is normally configured with more than
one location server.
3) Proxy server. The proxy server forwards requests from a user agent to a different location and
handles authorizations by checking whether the caller is authorized to make a particular call.
4) Redirect server. This server performs call forwarding and provides alternative paths for the user
agent.
5) Registrar server. This server is responsible for registering users in the system and updating the
UID that the location server consults. Requests for registration must be authenticated before the
registration is granted.
Adjacency
It is a logical connection between a router and the Designated Router (DR) and Backup Designated
Router (BDR).
Link
A network or router interface assigned to any network. In algorithm, OSPF Link is the same as the
interface.
Interface
An interface is a physical interface on a router. If the link is up the interface is up.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER,
State
It is the functional level of an interface that determines whether or not full adjacencies are allowed
to form over the interface.
Routing table
Routing table is derived from the Shortest Path Tree. Each entry of this table is indexed by a
destination, and contains the destination’s cost and a set of paths (described by its type and next
hop) to use in forwarding packets to the destination.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, Area Border Router
An Area Border Router (ABR) is a router that has interfaces assigned to more than one area. An
interface can only be assigned to one area but a router may have multiple interfaces. If the interfaces
are assigned to different are as then the router is considered an ABR.
Non-Broadcast Multi-Access
NBMA are networks like Frame Relay, X.25 and ATM. While these networks allow for multiple-
access they do not have any broadcast capabilities like Ethernet. Special consideration is required
when configuring an NBMA network with OSPF.
Broadcast (multi-access)
Ethernet allows for broadcast and multi-access. It requires the election of a Designated Router and
a Backup Designated Router.
Point to Point
This configuration eliminates the need for DR and BDR.
Router ID
The Router ID is the highest IP address of all configured Loopback interfaces. It is then used to
represent the router. If there are no loopback interfaces configured the Router ID will use the highest
IP address of any of its configured interfaces.
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, Internet socket address, which is the combination of an Internet host address and
a port number.
Process A process is a program that is running. A process is the active element in a
computer. Terminals, files, and other I/O devices communicate with each other
through processes. Thus, network communications is inter-process
communications (that is, communication between processes).
Protocol A protocol is a set of rules for governing communications at the physical or
logical level. Protocols often use other protocols to provide services. For
example, a connectionlevel protocol uses a transport-level protocol to transport
packets that maintain a connection between two hosts.
Server Server is a computer or process that provides data, services, or resources that can
be accessed by other computers or processes on the network
Figure (b) shows multiple access points being used to extend the connectivity range of the wireless
network. The area of coverage of each access point can be overlapped to adjacent ones to provide
seamless user mobility without interruption. Radio signal levels in a wireless LAN must be
maintained at an optimum value. Normally, a site survey must be conducted for these requirements.
Site surveys can include both indoor and outdoor sites. The surveys are normally needed for power
requirements, placement of access points, RF coverage range, and available bandwidth.
SDM
ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER, SDM COLLEGE, MANGALORE – 03 ARUN F. SEQUEIRA, LECTURER,
Figure (b): Use of multiple access points to extend the range of wireless access
A registration phase involves an exchange of two messages between the mobile host and its home
agent: registration request and registration response. Once a mobile host enters a foreign network,
it listens for agent advertisements and then obtains a foreign address from the foreign network it
has moved to. The host's home-network agent then adds the foreign network address agent to its
home-location database. This is done after the agent authenticates the host through the host's home-
network agent. The host's home-network agent now forwards all calls to the host in the foreign
network. On the Internet, the location management and routing are done through mobile IP.
A mobile host can also register using a collocated foreign address. A collocated foreign address is
a local IP address temporarily assigned to a mobile host without using a foreign agent. In a
collocated foreign addressing, a mobile host receives an assigned temporary foreign address through
its own home network. In the meanwhile, as soon as the mobile host leaves the foreign network, it
also requires to deregister.
*-*-*-*-*-*-*
SDM