You are on page 1of 1
ee ‘About the Course Unit 2 - Week 0 Assignment 0 ‘Course outine =o =o — Week 0 Assignment 0 Mento ‘Te cue dete for suming ti ssgnment hs oseae Due on 2020-02-26, 23:59 IST. sper ourrecores you have not submits ths essgnment 9) Inthe TCP/IP model, encryption and decryption are functions of a. Datalink Layer b. Network Layer Transport Layer 4. Application Layer a goer ea ‘Accented Aree: ¢ 2 The design issue of Datalink Layer in OSI (Open System Interconnections) Reference Model is a. Framing b. Representation of bits Synchronization of bits 4. Connection costal to, anor isicore. ‘Aeceptes Anewer: 8) Which device uses logical addressing system? eHub ». Switch Bridge 4. Router scot tomar: Which ofthe following transport layer protocols is used to support electronic mail (Email)? SNMP bP ©.TeP dupe te, sneer nico ‘Aecentes Aree: ©) Match the following ovo tists st st = (2) Disk (Thread () cpu (i) Signat (e) Memory ) File System (4) Interrupt (i) Virtual address 2. (a)>U (DPC, (Kil, (6) iv) (b}->40, (@->40v), (>) ses0700 few: 8 Packets ofthe same session may be routed through different paths in a. TCP, but not UDP b.TePand uoP ¢. UDP, but not TCP 4. Neither TCP nor UDP te, near inicoe. sess owes: 7 there is 2 need of 500 subnets and each subnet has 100 usable host. What network willassign Using a class B network address? 13. 255,255.255.252 b, 255.255.255.128 .295.255.255.0 4. 295,255.254.0 ses0700 few: © A Link layer protocol is designed with 1 Gbps (10° bits/second) Bandwidth over a fiber link length ‘of 800 km Aesume that the speed of light inthis medium is 200000 km/ second. What is the propagation delay in the lnk? 2.1 millisecond ses few: ® Inanctwork of LANs connected by bridges, packets ae sent from one LAN to anather through intermediate bridges, Since more than one path may exist between two LANs, packets may have ‘to be routed through multiple bridges. Why is the spanning tree algorithm used fer bridge- routing? 2. For shortest path routing between LANs b. For avoiding loops inthe routing paths «For fault tolerance 4. For minimizing collisions ‘conte Anewors 8) an intemet Service Provider (ISP) has the following chunk of CIDR-basedIP addresses available with it245.248,128.0/20. The ISP wants to give haf ofthis chunk of addresses to Organization A, and a quarter to Organization 8, while retaining the remaining with itself. Which ofthe following is 2 valid allocation of addresses to A and 8? 2. 245.248.136.0/21 and 245.248.128.0/22 , 245.248.128.0/21 and 245.248.128.0/22 .245.248.132.0/22 and 245.248.132.0/21, d. 245.248.136.0/22 and 245,248.132.0/21, ‘econo Anewor 1 point ome 1 point + pom 1 point 1 point 1 point

You might also like