Solution of Assignment Synopsis & Project Dissertation Report

Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!



Title Name Amity Solved Assignment MSC IT 2nd Sem for Networking Fundamentals
University AMITY
Service Type Assignment
Course Msc-IT
Semester Semester-II Course: Msc-IT
Short Name or Subject Code Networking Fundamentals
Commerce line item Type Semester-II Course: Msc-IT
Product Assignment of Msc-IT Semester-II (AMITY)


Click to View Price
Download Question File
Download Answer File 863487212955.docx (Purchase the product for download...!!!)


                                                                                                                                                   Networking Fundamentals


Assignment A :

1 .

Identify the five components of a data communication system.


2 .

What are the various popular communication tools?


3 .

What is the difference between local and remote log-in in TELNET?


4 .

Explain why ftp does not have a message format?


5 .

The following is a dump of a TCP header in hexadecimal format.
05320017 00000001 00000000 500207FF 00000000
a) What is the source port number?
b) What is the destination port number?
c) What is the sequence number?
d) What is the acknowledgment number?
e) What is the length of the header?
f) What is the type of the segment?
g) What is the window size?


6 .

Explain why most of the addresses in class A are wasted. Explain why a medium size or large-size corporation does not

 want a block of class C addresses.




Assignment B :

Case Study :



How many multicast addresses can be supported for the IPv4 protocol in Ethernet. How many multicast addresses

 can be supported for the IPv4 protocol. What is the size of address space lost when we transform a multicast IPv4

address to an Ethernet multicast address? 

2. Name the advantages of optical fiber over twisted-pair and coaxial cable.

3. How does sky propagation differ from line-of-sight propagation?






1) Put the following in the correct order, from high to low: session (a), presentation (b), physical (c), data link (d), network (e), application (f), transport (g).

  1. a) c, d, e, g, a, b, f
  2. b) f, a, b, g, d, e, c
  3. c) f, b, g, a, e, d, c
  4. d) f, b, a, g, e, d, c



2) The _________ layer provides for hardware addressing.

  1. a) Transport
  2. b) Network
  3. c) Data link
  4. d) Physical



3) Which component of the data link layer for IEEE specifies network protocols?

  1. a) LLC
  2. b) MAC
  3. c) 802.5
  4. d) 802.3



4) The network layer solves all of the following problems except ___________.

  1. a) Broadcast problems
  2. b) Conversion between media types
  3. c) Hierarchy through the use of physical addresses
  4. d) Collision problems



5) Connection multiplexing is done through the use of a ________ number.

  1. a) Socket
  2. b) Hardware
  3. c) Network
  4. d) Session



6) Reliable connections go through a three-way handshake. Place the following in the correct order:

ACK (1), SYN, (2), SYN/ACK (3).

  1. a) 2, 1, 3
  2. b) 3, 2, 1
  3. c) 2, 3, 1
  4. d) 1, 2, 3



7) _________ describe(s) users working from home.

  1. a) SOHO
  2. b) Branch office
  3. c) Regional office
  4. d) Corporate office



8) _________ has a physical star topology but a logical ring topology

  1. a) Ethernet
  2. b) FDDI
  3. c) Token Ring
  4. d) FDDI and Token Ring




9) A _________ uses Gigabit Ethernet as a media type

  1. WAN
  2. LAN
  3. MAN
  4. LAN and MAN



10) The TCP/IP protocol stack has ________ layers.

  1. a) 4
  2. b) 5
  3. c) 6
  4. d) 7



11) A Class A address has _________ host bits.

  1. a) 8
  2. b) 16
  3. c) 20
  4. d) 24



12) is a Class __________ address.

  1. a) A
  2. b) B
  3. c) C
  4. d) None of the above



13) Which of the following is a valid subnet mask value?

  1. a)
  2. b)
  3. c)
  4. d)



14) You are given a Class C network with 25 bits of networking. How many subnets do you have?

  1. a) 1
  2. b) 2
  3. c) 3
  4. d) 4




15) You are given a Class B network with a subnet mask of How many host  addresses are there on each subnet?

  1. a) 30
  2. b) 62
  3. c) 126
  4. d) 254



16) You are given the following addressing information: What type of address is this?

  1. a) Network
  2. b) Directed broadcast
  3. c) Host



17) When choosing a networking product, you should consider all of the following except _______.

  1. a) Ease of installation and support
  2. b) Product features and functions
  3. c) Backplane capacity
  4. d) Amount of memory



18) When connecting a router to a PC, use a __________ cable.

  1. Crossover
  2. Straight-through
  3. Rollover




19) With _________ switching, the switch reads the destination MAC address of the frame and immediately starts forwarding the frame.

  1. Store-and-forward
  2. Cut-through
  3. Fragment-free
  4. Runtless



20) Which type of traffic is sent to a group of devices?

  1. Multicast
  2. Unicast
  3. Broadcast
  4. Groupcast



21) What subnet mask would you use to set up a default route?

  3. Depends on the type of network number
  4. None of these answers



22) When choosing a dynamic routing protocol, which of the following should not be considered?

  1. Metrics used
  2. How routing information is shared
  3. How routing information is processed
  4. Number of PCs in the network


23) A routing protocol will use a(n) _________ to determine which path is the best path.

  1. Administrative distance
  2. Metric
  3. Hop count
  4. cost



24) Which type of routing protocol uses the Shortest Path First algorithm?

  1. Distance vector
  2. Link state
  3. Hybrid



25) What command activates the IP routing process?

  1. router
  2. enable
  3. network
  4. no shutdown



26) RIP has a maximum hop count of ____________ hops.

  1. 10
  2. 15
  3. 16
  4. 100



27) Which of the following is false concerning OSPF?

  1. It provides a loop-free topology.
  2. It is a classful protocol and allows for a hierarchical design.
  3. It requires more memory and processing cycles than distance vector protocols.
  4. It is complex to configure and difficult to troubleshoot.



28) The OSPF process ID is __________.

  1. Locally significant and is the router ID
  2. Globally significant and must be configured on every router
  3. Locally significant
  4. OSPF doesn’t use a process ID, but an AS number



29) An OSPF’s router ID is based on __________.

  1. The lowest IP address on its loopback interface, if configured, or the lowest IP address on its active interfaces
  2. The highest IP address on its loopback interface, if configured, or the highest IP address on its active interfaces
  3. The highest IP address on its active interfaces, if configured, or the highest IP address on its loopback interfaces
  4. The lowest IP address on its active interfaces, if configured, or the lowest IP address on its loopback interfaces



30) You are given a Class C network, You need one network with 120 hosts and three networks with 60 hosts. What subnet mask values would you use?

  1. and

D. None of these



31) Which of the following is a private address?




32) Which of the following reasons might you need to use address translation?

  1. You have to use public addressing because your ISP didn’t assign you enough private addresses.
  2. You are using private addresses but have changed ISPs, and your new ISP won’t support these private addresses.
  3. You want to assign the same IP address to multiple machines so that users on the Internet see this offered service as a single logical computer.
  4. You are merging two companies that use different address spaces.



33): As the data moves from the Upper to Lower Layers, headers are

  1. Added
  2. Subtracted
  3. Rearranged
  4. Modified



34): In communication satellite, multiple repeaters are known as

  1. detector
  2. modulator
  3. stations
  4. transponders



35): While transmitting odd-parity coded symbols, the number of zeros in each symbol is

  1. odd
  2. even
  3. a and b both
  4. unknown



36): Which type of network provides customers with limited access to corporate data such as inventory,Parts lists, and orders?

  1. intranet
  2. Extranet
  3. Internetwork
  4. Internet



37): An example of an analog communication method is

  1. laser beam
  2. microwave
  3. voice grade telephone line
  4. all of the above



38): Physical Layer is located in which layer of OSI

  1. Layer 5
  2. Layer 3
  3. Layer1
  4. Layer4



39): Physical Layer can only communicate with

  1. Application Layer
  2. Data link Layer
  3. Transport Layer
  4. Network Layer



40): The Calculated value used by the Data Link Layer for error detections is

  1. Checksum
  2. Parity
  3. CRC
  4. The Data Link layer does not implement error detection



Only after making the payment you would be able to see the answer...!!!


Average user rating

4.8 / 5

Rating breakdown

80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)
80% Complete (danger)

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

09-Apr, 2018
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.