image

Solution of Assignment Synopsis & Project Dissertation Report


Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!

PRODUCT DETAILS

Online-Typing-and-Filling

Title Name Amity Solved Assignment MSC IT 2nd Sem for Networking Fundamentals
University AMITY
Service Type Assignment
Course Msc-IT
Semester Semester-II Course: Msc-IT
Short Name or Subject Code Networking Fundamentals
Commerce line item Type Semester-II Course: Msc-IT
Product Assignment of Msc-IT Semester-II (AMITY)
Price

PRICE INR

Click to View Price
Download File (Purchase the product for download...!!!)

Solved Assignment


  Questions :-

                                                                                                                                                   Networking Fundamentals

 

Assignment A :

1 .

Identify the five components of a data communication system.

 

2 .

What are the various popular communication tools?

 

3 .

What is the difference between local and remote log-in in TELNET?

 

4 .

Explain why ftp does not have a message format?

 

5 .

The following is a dump of a TCP header in hexadecimal format.
05320017 00000001 00000000 500207FF 00000000
a) What is the source port number?
b) What is the destination port number?
c) What is the sequence number?
d) What is the acknowledgment number?
e) What is the length of the header?
f) What is the type of the segment?
g) What is the window size?

 

6 .

Explain why most of the addresses in class A are wasted. Explain why a medium size or large-size corporation does not

 want a block of class C addresses.

 

 

 

Assignment B :

Case Study :

 

1.

How many multicast addresses can be supported for the IPv4 protocol in Ethernet. How many multicast addresses

 can be supported for the IPv4 protocol. What is the size of address space lost when we transform a multicast IPv4

address to an Ethernet multicast address? 

2. Name the advantages of optical fiber over twisted-pair and coaxial cable.

3. How does sky propagation differ from line-of-sight propagation?

 

 

 

Assignment-C

 

1) Put the following in the correct order, from high to low: session (a), presentation (b), physical (c), data link (d), network (e), application (f), transport (g).

  1. a) c, d, e, g, a, b, f
  2. b) f, a, b, g, d, e, c
  3. c) f, b, g, a, e, d, c
  4. d) f, b, a, g, e, d, c

 

 

2) The _________ layer provides for hardware addressing.

  1. a) Transport
  2. b) Network
  3. c) Data link
  4. d) Physical

 

 

3) Which component of the data link layer for IEEE specifies network protocols?

  1. a) LLC
  2. b) MAC
  3. c) 802.5
  4. d) 802.3

 

 

4) The network layer solves all of the following problems except ___________.

  1. a) Broadcast problems
  2. b) Conversion between media types
  3. c) Hierarchy through the use of physical addresses
  4. d) Collision problems

 

 

5) Connection multiplexing is done through the use of a ________ number.

  1. a) Socket
  2. b) Hardware
  3. c) Network
  4. d) Session

 

 

6) Reliable connections go through a three-way handshake. Place the following in the correct order:

ACK (1), SYN, (2), SYN/ACK (3).

  1. a) 2, 1, 3
  2. b) 3, 2, 1
  3. c) 2, 3, 1
  4. d) 1, 2, 3

 

 

7) _________ describe(s) users working from home.

  1. a) SOHO
  2. b) Branch office
  3. c) Regional office
  4. d) Corporate office

 

 

8) _________ has a physical star topology but a logical ring topology

  1. a) Ethernet
  2. b) FDDI
  3. c) Token Ring
  4. d) FDDI and Token Ring

 

 

 

9) A _________ uses Gigabit Ethernet as a media type

  1. WAN
  2. LAN
  3. MAN
  4. LAN and MAN

 

 

10) The TCP/IP protocol stack has ________ layers.

  1. a) 4
  2. b) 5
  3. c) 6
  4. d) 7

 

 

11) A Class A address has _________ host bits.

  1. a) 8
  2. b) 16
  3. c) 20
  4. d) 24

 

 

12) 191.75.39.24 is a Class __________ address.

  1. a) A
  2. b) B
  3. c) C
  4. d) None of the above

 

 

13) Which of the following is a valid subnet mask value?

  1. a) 255.0.255.255
  2. b) 0.0.0.255
  3. c) 255.255.254.0
  4. d) 255.255.255.256

 

 

14) You are given a Class C network with 25 bits of networking. How many subnets do you have?

  1. a) 1
  2. b) 2
  3. c) 3
  4. d) 4

 

 

 

15) You are given a Class B network with a subnet mask of 255.255.255.192. How many host  addresses are there on each subnet?

  1. a) 30
  2. b) 62
  3. c) 126
  4. d) 254

 

 

16) You are given the following addressing information: 192.168.37.192/25. What type of address is this?

  1. a) Network
  2. b) Directed broadcast
  3. c) Host

 

 

17) When choosing a networking product, you should consider all of the following except _______.

  1. a) Ease of installation and support
  2. b) Product features and functions
  3. c) Backplane capacity
  4. d) Amount of memory

 

 

18) When connecting a router to a PC, use a __________ cable.

  1. Crossover
  2. Straight-through
  3. Rollover

 

 

 

19) With _________ switching, the switch reads the destination MAC address of the frame and immediately starts forwarding the frame.

  1. Store-and-forward
  2. Cut-through
  3. Fragment-free
  4. Runtless

 

 

20) Which type of traffic is sent to a group of devices?

  1. Multicast
  2. Unicast
  3. Broadcast
  4. Groupcast

 

 

21) What subnet mask would you use to set up a default route?

  1. 0.0.0.0
  2. 255.255.255.255
  3. Depends on the type of network number
  4. None of these answers

 

 

22) When choosing a dynamic routing protocol, which of the following should not be considered?

  1. Metrics used
  2. How routing information is shared
  3. How routing information is processed
  4. Number of PCs in the network

 

23) A routing protocol will use a(n) _________ to determine which path is the best path.

  1. Administrative distance
  2. Metric
  3. Hop count
  4. cost

 

 

24) Which type of routing protocol uses the Shortest Path First algorithm?

  1. Distance vector
  2. Link state
  3. Hybrid

 

 

25) What command activates the IP routing process?

  1. router
  2. enable
  3. network
  4. no shutdown

 

 

26) RIP has a maximum hop count of ____________ hops.

  1. 10
  2. 15
  3. 16
  4. 100

 

 

27) Which of the following is false concerning OSPF?

  1. It provides a loop-free topology.
  2. It is a classful protocol and allows for a hierarchical design.
  3. It requires more memory and processing cycles than distance vector protocols.
  4. It is complex to configure and difficult to troubleshoot.

 

 

28) The OSPF process ID is __________.

  1. Locally significant and is the router ID
  2. Globally significant and must be configured on every router
  3. Locally significant
  4. OSPF doesn’t use a process ID, but an AS number

 

 

29) An OSPF’s router ID is based on __________.

  1. The lowest IP address on its loopback interface, if configured, or the lowest IP address on its active interfaces
  2. The highest IP address on its loopback interface, if configured, or the highest IP address on its active interfaces
  3. The highest IP address on its active interfaces, if configured, or the highest IP address on its loopback interfaces
  4. The lowest IP address on its active interfaces, if configured, or the lowest IP address on its loopback interfaces

 

 

30) You are given a Class C network, 192.168.1.0/24. You need one network with 120 hosts and three networks with 60 hosts. What subnet mask values would you use?

  1. 255.255.255.128 and 255.255.255.192
  2. 255.255.255.128
  3. 255.255.255.192

D. None of these

 

 

31) Which of the following is a private address?

  1. 192.169.7.17
  2. 172.32.28.39
  3. 10.1.256.8
  4. 172.16.255.89

 

 

32) Which of the following reasons might you need to use address translation?

  1. You have to use public addressing because your ISP didn’t assign you enough private addresses.
  2. You are using private addresses but have changed ISPs, and your new ISP won’t support these private addresses.
  3. You want to assign the same IP address to multiple machines so that users on the Internet see this offered service as a single logical computer.
  4. You are merging two companies that use different address spaces.

 

 

33): As the data moves from the Upper to Lower Layers, headers are

  1. Added
  2. Subtracted
  3. Rearranged
  4. Modified

 

 

34): In communication satellite, multiple repeaters are known as

  1. detector
  2. modulator
  3. stations
  4. transponders

 

 

35): While transmitting odd-parity coded symbols, the number of zeros in each symbol is

  1. odd
  2. even
  3. a and b both
  4. unknown

 

 

36): Which type of network provides customers with limited access to corporate data such as inventory,Parts lists, and orders?

  1. intranet
  2. Extranet
  3. Internetwork
  4. Internet

 

 

37): An example of an analog communication method is

  1. laser beam
  2. microwave
  3. voice grade telephone line
  4. all of the above

 

 

38): Physical Layer is located in which layer of OSI

  1. Layer 5
  2. Layer 3
  3. Layer1
  4. Layer4

 

 

39): Physical Layer can only communicate with

  1. Application Layer
  2. Data link Layer
  3. Transport Layer
  4. Network Layer

 

 

40): The Calculated value used by the Data Link Layer for error detections is

  1. Checksum
  2. Parity
  3. CRC
  4. The Data Link layer does not implement error detection

 

  Answers :-

Only after macking the payment you would be able to see the answer...!!!

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

October 09, 2016
This was nice in buy
I recommend a website that was really helpful throughout your session.

March 19, 2017
Some day ago
This was nice in buy
This was good in buy . I found all the answer correct and meaningful and had scored good marks
Back to top