0% found this document useful (0 votes)
254 views9 pages

Model Answer Paper 22520 Summer 2024 - Model-Answer-Paper-22520-Summer-2024

The document is an answer sheet for the 22520 Summer 2024 question paper, covering topics such as networking protocols, IPv4 and IPv6 addressing, and routing methods. It includes detailed explanations of various protocols like TCP, UDP, SMTP, and SCTP, along with their functionalities and packet formats. Additionally, it discusses the architecture of email systems, the need for DNS, and the transition methods from IPv4 to IPv6.

Uploaded by

tidyqovy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
254 views9 pages

Model Answer Paper 22520 Summer 2024 - Model-Answer-Paper-22520-Summer-2024

The document is an answer sheet for the 22520 Summer 2024 question paper, covering topics such as networking protocols, IPv4 and IPv6 addressing, and routing methods. It includes detailed explanations of various protocols like TCP, UDP, SMTP, and SCTP, along with their functionalities and packet formats. Additionally, it discusses the architecture of email systems, the need for DNS, and the transition methods from IPv4 to IPv6.

Uploaded by

tidyqovy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Model Answer Paper 22520 Summer 2024

Clustering and cloud computing (Wainganga College of Engineering and Management)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Jane Doe ([email protected])
Answer Sheet for 22520
Summer 2024 Question
Paper
Below is the complete answer sheet for the 22520 Summer 2024 question paper, addressing all questions in the
specified order. Answers are concise, accurate, and aligned with the marking scheme.

Question 1: Attempt any FIVE of the


following (10 Marks, 2 marks each)
(a) State the difference between IPv4 and IPv6 (any TWO).
1. Address Length: IPv4 uses 32-bit addresses (e.g., 192.168.1.1), supporting ~4.3 billion addresses. IPv6 uses
128-bit addresses (e.g., 2001:0db8::1), supporting ~340 undecillion addresses.
2. Header Complexity: IPv4 headers are variable length with options, increasing complexity. IPv6 headers are fixed
at 40 bytes with optional extensions, improving routing efficiency.

(b) Draw IPv6 packet format.


The IPv6 packet format includes:

Version (4 bits): Set to 6.


Traffic Class (8 bits): For QoS.
Flow Label (20 bits): Identifies packet flows.
Payload Length (16 bits): Size of payload.
Next Header (8 bits): Type of next header (e.g., TCP).
Hop Limit (8 bits): Decremented by routers; discarded if zero.
Source Address (128 bits): Sender’s address.
Destination Address (128 bits): Receiver’s address.
Extension Headers (optional): For routing, fragmentation, etc.

Downloaded by Jane Doe ([email protected])


[Version | Traffic Class | Flow Label]
[Payload Length | Next Header | Hop Limit]
[Source Address (128 bits)]
[Destination Address (128 bits)]
[Extension Headers (if any)]
[Payload]

(c) State the need of domain name system.


The Domain Name System (DNS) is needed to:

Convert human-readable domain names (e.g., www.example.com (http://www.example.com)) to IP addresses


(e.g., 192.0.2.1) for network communication.
Simplify internet navigation by eliminating the need to memorize numerical IP addresses.

(d) Enlist applications of UDP (any TWO).


1. DNS: Uses UDP for fast, lightweight domain name resolution.
2. Streaming Media: Used in video/audio streaming (e.g., RTP) for low-latency delivery.

(e) State the transmission modes of FTP.


FTP supports:

1. ASCII Mode: For text files, adjusts line endings (e.g., CR/LF for Windows, LF for Unix).
2. Binary Mode: For non-text files (e.g., images), transfers data without modification.

(f) Define virtual private network.


A Virtual Private Network (VPN) creates a secure, encrypted connection over a public network (e.g., the internet),
allowing private data exchange as if devices were on a private network.

(g) Define Inter-domain and Intra-domain routing.


Inter-domain Routing: Routing between different autonomous systems (ASes) using protocols like BGP to
exchange routes across organizations.
Intra-domain Routing: Routing within a single autonomous system using protocols like OSPF or RIP to manage
internal network paths.

Question 2: Attempt any THREE of the


following (12 Marks, 4 marks each)

Downloaded by Jane Doe ([email protected])


(a) Differentiate between TCP and UDP.
Feature TCP UDP
Connection Connection-oriented (handshake) Connectionless
Reliability Ensures delivery via retransmission No delivery guarantee
Ordering Maintains packet order No order guarantee
Use Case Web, email, file transfer Streaming, DNS, VoIP

(b) Explain ICMP protocol with its header format.


ICMP (Internet Control Message Protocol) is used for error reporting and diagnostics (e.g., ping, traceroute) in IP
networks.

Header Format:
Type (8 bits): Message type (e.g., 8 for Echo Request, 0 for Echo Reply).
Code (8 bits): Subtype for the message.
Checksum (16 bits): For error-checking.
Rest of Header: Varies (e.g., Identifier, Sequence Number for ping).
Data: Optional payload.
Example Use: Ping sends Echo Request; destination responds with Echo Reply.

(c) Describe SMTP with suitable diagram.


SMTP (Simple Mail Transfer Protocol) sends emails between servers on port 25.

Process:
1. Sender’s client connects to SMTP server.
2. SMTP server relays email to recipient’s server.
3. Recipient retrieves email via POP3/IMAP.
Diagram:

Sender’s Client -> SMTP Server -> Recipient’s SMTP Server -> Recipient (via POP3/IMAP)

(d) Explain IPv4 addressing format with its classes.


IPv4 Addressing: 32-bit address, written as four decimal octets (e.g., 192.168.1.1).

Classes:
Class A: 1.0.0.0–126.0.0.0, 1st octet (0xxxxxxx), 16M hosts/network.
Class B: 128.0.0.0–191.255.0.0, 1st octet (10xxxxxx), 65K hosts/network.
Class C: 192.0.0.0–223.255.255.0, 1st octet (110xxxxx), 254 hosts/network.
Class D: 224.0.0.0–239.255.255.255, for multicast.
Class E: 240.0.0.0–255.255.255.255, reserved.
Format: Network portion (identifies network) + Host portion (identifies device).

Downloaded by Jane Doe ([email protected])


Question 3: Attempt any THREE of the
following (12 Marks, 4 marks each)
(a) Compare between link state routing and distance vector
routing.
Feature Link State Routing Distance Vector Routing
Algorithm Dijkstra’s algorithm Bellman-Ford algorithm
Information Shared Full network topology Distance to neighbors
Convergence Faster, loop-free Slower, prone to routing loops
Example Protocol OSPF RIP

(b) Explain addressing scheme of IPv6.


IPv6 uses 128-bit addresses, written as eight groups of four hexadecimal digits (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Types:
Unicast: Single device.
Multicast: Group of devices.
Anycast: Nearest device in a group.
Abbreviation: Omit leading zeros; replace consecutive zeros with “::” (once).
Structure: First 64 bits (network prefix), last 64 bits (interface ID).

(c) Explain the working of TELNET.


TELNET enables remote login to a device over TCP (port 23).

Working:
1. Client initiates TCP connection to server.
2. Server prompts for authentication (username/password).
3. Client sends commands; server executes and returns output.
4. Session ends when client logs out.
Use: Remote management of devices (e.g., routers).

(d) Describe the packet format of SCTP.


SCTP (Stream Control Transmission Protocol) packet format:

Common Header:
Source Port (16 bits): Sender’s port.
Destination Port (16 bits): Receiver’s port.

Downloaded by Jane Doe ([email protected])


Verification Tag (32 bits): Ensures correct association.
Checksum (32 bits): For error detection.
Chunks: Variable-length data/control units (e.g., DATA, INIT, SACK).
Chunk Type (8 bits): Identifies chunk (e.g., 0 for DATA).
Flags (8 bits): Chunk-specific flags.
Length (16 bits): Chunk size.
Chunk Data: Payload or control info.
Supports multistreaming and multihoming.

Question 4: Attempt any THREE of the


following (12 Marks, 4 marks each)
(a) Explain architecture of E-mail system.
The email system includes:

1. User Agent (UA): Email client (e.g., Outlook) for composing/reading emails.
2. Message Transfer Agent (MTA): SMTP servers relay emails.
3. Message Access Agent (MAA): POP3/IMAP servers for email retrieval.

Flow:
Sender’s UA -> Sender’s MTA -> Recipient’s MTA -> Recipient’s MAA -> Recipient’s UA.

(b) Compare dynamic routing and static routing.


Feature Dynamic Routing Static Routing
Configuration Automatic via protocols Manual route entries
Scalability Scales for large networks Best for small networks
Adaptability Adjusts to topology changes No adaptation
Example OSPF, RIP Fixed route tables

(c) Describe HTTP response message format.


HTTP Response:

Status Line: HTTP/1.1 200 OK (version, status code, reason phrase).


Headers: Key-value pairs (e.g., Content-Type: text/html, Content-Length: 123).
Blank Line: Separates headers from body.
Body: Optional data (e.g., HTML, JSON).

(d) Explain TCP connection establishment using three-way


handshake mechanism.

Downloaded by Jane Doe ([email protected])


TCP Three-Way Handshake:

1. SYN: Client sends SYN segment with initial sequence number (e.g., Seq=x).
2. SYN-ACK: Server responds with SYN-ACK, acknowledging client’s SYN (Ack=x+1) and sending its sequence
number (Seq=y).
3. ACK: Client acknowledges server’s SYN (Ack=y+1).

Establishes reliable connection over TCP.

(e) Distinguish between SMTP and POP3 protocol.


Feature SMTP POP3
Function Sends emails Retrieves emails
Port 25 110
Operation Pushes email to servers Pulls email from server
Scope Server-to-server Client-to-server

Question 5: Attempt any TWO of the


following (12 Marks, 6 marks each)
(a) Explain association establishment process in SCTP.
SCTP Association Establishment (four-way handshake):

1. INIT: Client sends INIT chunk with proposed parameters.


2. INIT-ACK: Server responds with INIT-ACK, including a cookie to prevent attacks.
3. COOKIE-ECHO: Client sends cookie back to server.
4. COOKIE-ACK: Server confirms association.

Ensures security and supports multihoming/multistreaming.

(b) State the need of:


1. Sequence Control: Ensures packets are delivered in order for accurate data reconstruction.
2. Error Control: Detects (via checksums) and corrects errors (via retransmission) for reliable delivery.
3. Flow Control: Regulates data rate (e.g., sliding window) to prevent receiver overload.

(c) Explain different transition methods of IPv4 to IPv6.


1. Dual Stack: Devices run both IPv4 and IPv6, allowing gradual transition.
2. Tunneling: IPv6 packets are encapsulated in IPv4 packets to traverse IPv4 networks (e.g., 6to4, Teredo).
3. Translation: Converts IPv6 packets to IPv4 (e.g., NAT64) for compatibility with IPv4-only devices.

Downloaded by Jane Doe ([email protected])


Question 6: Attempt any TWO of the
following (12 Marks, 6 marks each)
(a) Explain any 3 Intra-domain routing protocols.
1. RIP (Routing Information Protocol):
Distance-vector protocol.
Uses hop count (max 15 hops).
Suitable for small networks.
2. OSPF (Open Shortest Path First):
Link-state protocol.
Uses Dijkstra’s algorithm for shortest paths.
Scales for large networks.
3. EIGRP (Enhanced Interior Gateway Routing Protocol):
Advanced distance-vector protocol.
Uses bandwidth/delay metrics.
Fast convergence, Cisco-specific.

(b) For the given IP addresses:


(1) 121.33.43.131

Class: Class A (first octet 1-126).


Host Address: 33.43.131.
Network Address: 121.0.0.0.
Number of Hosts: 2^24 - 2 = 16,777,214.

(2) 15.15.15.15

Class: Class A (first octet 1-126).


Host Address: 15.15.15.
Network Address: 15.0.0.0.
Number of Hosts: 2^24 - 2 = 16,777,214.

(3) 198.22.5.36

Class: Class C (first octet 192-223).


Host Address: 36.
Network Address: 198.22.5.0.
Number of Hosts: 2^8 - 2 = 254.

(4) 126.120.10.80

Class: Class A (first octet 1-126).

Downloaded by Jane Doe ([email protected])


Host Address: 120.10.80.
Network Address: 126.0.0.0.
Number of Hosts: 2^24 - 2 = 16,777,214.

(c)
(i) Explain remote login protocol - SSH.

SSH (Secure Shell):

Provides secure remote login over an untrusted network (port 22).


Working:
1. Client initiates TCP connection to server.
2. Server authenticates using keys or password.
3. Encrypted session established for command execution.
Use: Securely manage servers/routers, unlike insecure TELNET.

(ii) Describe the DHCP operation.

DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically:

1. Discover: Client broadcasts DHCPDISCOVER to find DHCP server.


2. Offer: Server responds with DHCPOFFER, proposing an IP address.
3. Request: Client broadcasts DHCPREQUEST to accept the offer.
4. Acknowledge: Server sends DHCPACK to confirm the IP lease.

Automates IP configuration, reducing manual setup.

This completes the answer sheet for all questions in the 22520 Summer 2024 question paper, following the instructions
and marking scheme.

Downloaded by Jane Doe ([email protected])

You might also like