Cp5201 Network Technologies
Cp5201 Network Technologies
TECHNOLOGY
             Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
                 Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                         Accredited by NAAC                                        1
QUESTION BANK
Subject Code & Name : CP5201 & Network Design and Technologies
PART-A
   1.       What are the three criteria necessary for an effective and efficient network?
            The most important criteria are performance, reliability and security. Performance
        of the network depends on number of users, type of transmission medium, the
        capabilities of the connected h/w and the efficiency of the s/w. Reliability is measured
        by frequency of failure, the time it takes a link to recover from the failure and the
        network’s robustness in a catastrophe. Security issues include protecting data from
        unauthorized access and viruses.
Department of CSE
               TAGORE INSTITUTE OF ENGINEERING AND
                           TECHNOLOGY
           Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
                Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                      Accredited by NAAC                                             2
                 exchanged between protocol peers to implement                 the
                 communication service.
   5.        What is LAN?
             A LAN is a common name used to describe a group of devices that share a
             geographic location.LAN is limited to single building or campus.
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                  Accredited by NAAC                                               3
13. Define Frequency division multiplexing Access?
Frequency division multiple access (FDMA) is an access method in which entails assignments
of different frequency-slices to different users for accessing the same carrier.
17.What is a repeater?
    Repeater is a hardware device used to strengthen signals being transmitted on a network.
18.Define router
            A network layer device that connects networks with different physical media
    and translates between different network architecture.
19.What is a switch?
           A switch is a networking device that manages networked connections between
    devices on a star networks.
21.Advantages of Ethernet
      1.       Inexpensive       2.Easy to install          3.Supports      various      writing
      technologies.
22.Identify the class and default subnet mask of the IP address 217.65.10.7.
    IP Address 217.65.10.7 belongs to Class C. Its subnet mask is 255.255.255.0.
Department of CSE
                TAGORE INSTITUTE OF ENGINEERING AND
                            TECHNOLOGY
             Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
                 Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                        Accredited by NAAC                                           4
        c)    Regulating the flow of data so that slow receivers are not swamped by fast senders.
        strategy used by the hamming code to correct single bit errors must be redesigned to be
        applicable for multiple bit correction.
32. State the major functions performed by the presentation layer of the
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                        Accredited by NAAC                                        5
     ISO OSI model. (Nov Dec 2006)
             Presentation layer is concerned with the format of data exchanged between
     peers, for example, whether an integer is 16, 32, or 64 bits long and whether the most
     significant bit is transmitted first or last, or how a video stream is formatted.
 34. What are the two fundamental ways by which network performance is measured?
            1. Bandwidth
            2. Latency
Part-B
1.Draw the ISO-OSI reference model and explain the functionalities of each layer inDetail.(16)
                                                                                 [DEC- 2011]
2. Discuss in detail about Internet Architecture.                       [APR/MAY-2015,17]
3. Give the TCP/IP network architecture model and discuss the design issues of the same in
   detail. (16)[MAY- 2011]
4. Explain the various network types.(12)
5. (i) Discuss in detail about the network performance Measures.(6)
      (ii) Explain in detail about protocol layering.(6)
6. Discuss in detail about TCP/IP protocol suite.(12)
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                    Accredited by NAAC                                      6
   Fast Ethernet Network was developed as an upgrade to traditional Ethernet
Networking. Fast Ethernet improved traditional Ethernet by increasing transfer rates 10
times, from 10 Megabit to 100 Megabit speed. Gigabit Ethernet Network is an upgrade
on Fast Ethernet Network, offering speeds of 1000 Megabits (1 Gigabit)
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                       Accredited by NAAC                                    7
       stations and an optional central base station, known as the access point (AP).
     An extended service set (ESS) is made up of two or more BSSs with APs. The
       extended service set uses two types of stations: mobile and stationary. The
       mobile stations are normal stations inside a BSS. The stationary stations are AP
       stations that are part of a wired LAN.
  7. What are the MAC sub-layers of IEEE 802.11?
    IEEE 802.11 defines two MAC sublayers: the distributed coordination function
(DCF) and point coordination function (PCF). DCF uses CSMA/CA as the access
method. The point coordination function (PCF) is an optional access method that can
be implemented in an infrastructure network
  8. What is Bluetooth?
   Bluetooth is a wireless LAN technology that connects devices (called gadgets) in
a small area. A Bluetooth LAN is an ad hoc network. Bluetooth technology is the
implementation of a protocol defined by the IEEE 802.15 standard. The standard
defines a wireless personal-area network (PAN) operable in an area the size of a room
or a hall over short distances (using short-wavelength UHF radio waves in the ISM
band from 2.4 to 2.485 GHz).
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                   Accredited by NAAC                                     8
off between energy consumption, latency, piconet size, and throughput. BLE emerges
as a strong low- power wireless technology for single-hop communication use cases
which may contribute to connecting a dramatically large amount of new devices to the
Internet of Things.
Department of CSE
                TAGORE INSTITUTE OF ENGINEERING AND
                            TECHNOLOGY
             Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
                 Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                         Accredited by NAAC                                       9
  16.What are the types of nodes supported by Zigbee?
Zigbee supports three types of nodes called Zigbee Co-ordinator (ZC), Zigbee
Router (ZR) and Zigbee End Device (ZED).The Zigbee Co-ordinator maintains and co-
ordinates the entire network with overall network knowledge. The Zigbee Router (ZR)
works as a router in the network to forward data. The Zigbee End Device (ZED) has
limited functionalities such as sensing and reporting data to the ZR
Part-B
      1.      Explain in detail about IEEE 802.3 MAC sub-layer.
      2.      Illustrate an architecture and MAC layers of IEEE 802.11 with necessary diagrams.
      3.      Explain in detail about the architecture of Bluetooth and its layers.
      4.      Write short notes on 6LoWPAN and Zigbee technologies.
      5.      With neat sketch, explain about IP or IPv4 packet format and its fragmentation.
      6.      Elaborate about Internet Control Message Protocol(ICMP) and its message types.
      7.      Evaluate the addressing in Mobile IP.
 Tele-services
 Bearer Services
               Supplementary services
3.       List the important supplementary services offered by GSM.
 User identification
 Automatic call-back
Department of CSE
              TAGORE INSTITUTE OF ENGINEERING AND
                          TECHNOLOGY
           Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
               Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                 Accredited by NAAC                                              10
4.     What are the subsystems available in GSM Architecture?
             A interface
              o     Makes the connection between the RSS and the NSS
              o     Based on circuit-switched PCM-30 systems (2.048 Mbit/s), carrying up to 30
                    64 kbit/s connections
             O interface
              o     Makes the connection between the RSS and the OSS
              o     Uses the Signalling System No. 7 (SS7) based on X.25 carrying management
                    data to/from the RSS
             Um interface
              o     Makes the connection between the BTS and MS
              o     Contains all the mechanisms necessary for wireless transmission
             Abis interface
              o     Makes the connection between the BTS and BSC
              o     Consists of 16 or 64 kbit/s connections
6. What is RSS?
Department of CSE
              TAGORE INSTITUTE OF ENGINEERING AND
                          TECHNOLOGY
           Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
               Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                 Accredited by NAAC                                      11
8.     Mention the advantages of GSM.
       o      Communication
       o      Total mobility
       o      Worldwide connectivity
       o      High capacity
       o      High transmission quality
       o      Security functions
 Electromagnetic radiation
 an authentication key Ki
 Card-type
 Serial number
Department of CSE
              TAGORE INSTITUTE OF ENGINEERING AND
                          TECHNOLOGY
           Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
               Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                            Accredited by NAAC                                               12
12.    Compare GSM and GPRS with respect to billing system.
             Maintains the virtual circuit upon change of the cell within the GSM network
             PTP Connectionless Network Service (PTP-CLNS)
 Called as multicasting
 Multicast PTM
 Authentication
 Access control
Department of CSE
                TAGORE INSTITUTE OF ENGINEERING AND
                            TECHNOLOGY
             Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
                 Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                        Accredited by NAAC                                    13
               User information confidentiality
20.      Mention the components of UMTS.
 Core Network(CN)
 Deciphering
 Handover control
Part-B
1. Explain GSM services, security and handover procedures.
2. Explain the architecture of GSM.
UNIT IV 4G NETWORKS
Part-A
1.Explain the 4G technology?
4G is the fourth generation of broadband cellular network technology, succeeding 3G, and
preceding 5G. A 4G system must provide capabilities defined by ITU in IMT Advanced.
Potential and current applications include amended mobile web access, IP telephony, gaming
services, high-definition mobile TV, video conferencing, and 3D television.
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                      Accredited by NAAC                                            14
2.Write the Features of 4G Wireless Systems
 The following are some possible features of the 4G systems :
1. Support interactive multimedia, voice, video, wireless internet and other broadband services.
2. High speed, high capacity and low cost per bit.
3. Global mobility, service portability, scalable mobile networks.
4. Seamless switching, variety of services based on Quality of Service (QoS) requirements
5. Better scheduling and call admission control techniques.
6. Ad hoc networks and multi-hop networks.
3G 4G
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                       Accredited by NAAC                                            15
should do " better than best " effort.
8. Networking protocols that adapt dynamically to the changing channel conditions.
9. Seamless roaming and seamless transfer of services
4G introduces a potential inconvenience for those who travel internationally or wish to switch
carriers. In order to make and receive 4G voice calls, the subscriber handset must not only have
a matching frequency band (and in some cases require unlocking), it must also have the
matching
enablement settings for the local carrier and/or country. While a phone purchased from a given
carrier can be expected to work with that carrier, making 4G voice calls on another carrier's
network (including international roaming) may be impossible without a software update specific
to the local carrier and the phone model in question, which may or may not be available
(although fallback to 3G for voice calling may still be possible if a 3G network is available with
a matching frequency band)
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                   Accredited by NAAC                                               16
● Has the advantages of both Ad-hoc and Base stations.
● Mobile nodes communicate with each other using Ad Hoc mode when they are in range, and
use basestation to communicate when they are out of range.
Part-B
   1.    Explain About Network Architecture And Interfaces
   2.    How Mobility Management And Power Optimization Is Done In Networks?
   3.    Write About The 4G Networks And Composite Radio Environment
   4.    Describe About Hybrid 4G Wireless Networks Protocols
   5.    How Channel Modelling Is Done For For 4G –
   6.    Write About The 5G Network.
Part-A
1.Define Software-defined networking (SDN)
The technology is an approach to network management that enables dynamic, programmatically
efficient network configuration in order to improve network performance and monitoring,
making it more like cloud computing than traditional network management.
 SDN is meant to address the fact that the static architecture of traditional networks is
decentralized and complex while current networks require more flexibility and easy
troubleshooting. SDN attempts to centralize network intelligence in one network component by
disassociating the forwarding process of network packets (data plane) from the routing process
(control plane).
 The control plane consists of one or more controllers, which are considered the brain of the
SDN network where the whole intelligence is incorporated. However, the intelligent
centralization has its own drawbacks when it comes to security, scalability and elasticity[1] and
this is the main issue of SDN.
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                       Accredited by NAAC                                          17
Changing traffic patterns
       Within the enterprise data center, traffic patterns have changed significantly. In contrast
       to client-server applications where the bulk of the communication occurs between one
       client and one server, today's applications access different databases and servers,
       creating a flurry of "east-west" machine-to-machine traffic before returning data to the
       end user device in the classic "north-south" traffic pattern. At the same time, users are
       changing network traffic patterns as they push for access to corporate content and
       applications from any type of device (including their own), connecting from anywhere,
       at any time. Finally, many enterprise data centers managers are contemplating a utility
       computing model, which might include a private cloud, public cloud, or some mix of
       both, resulting in additional traffic across the wide area network.
The "consumerization of IT"
       Users are increasingly employing mobile personal devices such as smartphones, tablets,
       and notebooks to access the corporate network. IT is under pressure to accommodate
       these personal devices in a fine-grained manner while protecting corporate data and
       intellectual property and meeting compliance mandates.
The rise of cloud services
       Enterprises have enthusiastically embraced both public and private cloud services,
       resulting in unprecedented growth of these services. Enterprise business units now want
       the agility to access applications, infrastructure, and other IT resources on demand and à
       la carte. To add to the complexity, IT's planning for cloud services must be done in an
       environment of increased security, compliance, and auditing requirements, along with
       business reorganizations, consolidations, and mergers that can change assumptions
       overnight. Providing self-service provisioning, whether in a private or public cloud,
       requires elastic scaling of computing, storage, and network resources, ideally from a
       common viewpoint and with a common suite of tools.
"Big data" means more bandwidth
       Handling today's "big data" or mega datasets requires massive parallel processing on
       thousands of servers, all of which need direct connections to each other. The rise of
       mega datasets is fueling a constant demand for additional network capacity in the data
       center. Operators of hyperscale data center networks face the daunting task of scaling
       the network to previously unimaginable size, maintaining any-to-any connectivity
       without going broke
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                       Accredited by NAAC                                    18
network specific functionalities.[41] Since 3GPP Rel.14, a Control User Plane Separation was
introduced in the Mobile Core Network architectures with the PFCP protocol.
2) b.SD-WAN
An SD-WAN is a Wide Area Network (WAN) managed using the principles of software-
defined networking.[42] The main driver of SD-WAN is to lower WAN costs using more
affordable and commercially available leased lines, as an alternative or partial replacement of
more expensive MPLS lines. Control and management is administered separately from the
hardware with central controllers allowing for easier configuration and administration.
3) c).SD-LAN
An SD-LAN is a Local area network (LAN) built around the principles of software-defined
networking, though there are key differences in topology, network security, application
visibility and control, management and quality of service.
 SD-LAN decouples control management, and data planes to enable a policy driven architecture
for wired and wireless LANs. SD-LANs are characterized by their use of a cloud management
system and wireless connectivity without the presence of a physical controller. [
4) d)Security using the SDN paradigm
SDN architecture may enable, facilitate or enhance network-related security applications due to
the controller's central view of the network, and its capacity to reprogram the data plane at any
time. While security of SDN architecture itself remains an open question that has already been
studied a couple of times in the research community, [46][47][48][49] the following paragraphs only
focus on the security applications made possible or revisited using SDN.
4.What is a VLAN?
A virtual local area network (VLAN) is a logical grouping of ports which is independent of
location. A single VLAN (and the nodes connected in a single VLAN) will behave in the same
way as if it was a separate Layer 3 network. VLAN membership need not be limited to
sequential ports or even ports on the same switch. Figure 4-4 depicts a very common
deployment in which nodes are connected to a switch and the switch is connected to a router.
Looking at the left side, the automatic assumption would be that all of the nodes are on the same
IP network since they all connect to the same router interface.
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                     Accredited by NAAC                                             19
Configuring a switch for multiple VLANs reduces the size of each broadcast domain. Therefore
the amount of overhead traffic is lower which reduces bandwidth competition with data traffic.
Stated another way, a node in a particular VLAN has less broadcast traffic with which to
contend. Since switch forwarding behavior is based on MAC addresses stored in the source
address table, the following rules apply:
       For known unicast destinations, the switch will forward the frame to the destination port
only.
       For unknown unicast destinations, the switch will forward the frame to all active ports
except the originating port. This is called flooding.
       For multicast and broadcast destinations, the switch will forward the frame to all active
ports except the originating port.
        VLANs are supported over all IEEE 802 LAN MAC protocols, over shared media LANs
as well as point-to-point LANs.
        VLANs facilitate easy administration of logical groups of stations that can communicate
as if they were on the same LAN. They also facilitate easier administration of moves, adds, and
changes in members of these groups.
        Traffic between VLANs is restricted. Switches forward unicast, multicast, and broadcast
traffic only on LAN segments that serve the VLAN to which the traffic belongs.
        As far as possible, VLANs maintain compatibility with existing switches and end
stations.
        If all switch ports are configured to transmit and receive untagged frames (frames
to/from non-VLAN aware devices), switches will work in plug-and-play ISO/IEC 15802-3
mode. End stations will be able to communicate throughout the Bridged LAN.
Department of CSE
            TAGORE INSTITUTE OF ENGINEERING AND
                        TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                      Accredited by NAAC                                             20
 Centralized Control
 Overlay Networks
In its simplest form, the control plane provides layer-2 MAC reachability and layer-3 routing
information to network devices that require this information to make packet forwarding
decisions. In the case of firewalls, the control plane would include stateful flow information for
inspection. Control plane functionality can implemented as follows:
• Distributed - Conventional routers and switches operate using distributed protocols for
control, i.e. where each device makes its own decisions about what to do, and communicate
relevant information to other devices for input into their decision making process. For example,
the Spanning Tree Protocol (STP), Fabric Path, and routing protocols such as IS-IS and BGP
provide distributed control of packet forwarding functionality to networking devices.
• Centralized - In this case, a centralized controller provides the necessary information for a
NSX-T Platform
NSX-T creates a network virtualization layer, which is an abstraction between the physical and
virtual networks. You create all virtual networks on top of this layer.
       NSX-T Managers
       NSX-T Edge Nodes
       NSX-T Distributed Routers (DR)
       NSX-T Service Routers (SR)
Department of CSE
             TAGORE INSTITUTE OF ENGINEERING AND
                         TECHNOLOGY
         Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
             Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                Accredited by NAAC                                                    21
      NSX-T Segments (Logical Switches)
These components are distributed in different planes to create communication boundaries and
provide isolation of workload data from system control messages.
Data plane
Workload data
N-VDS virtual switch, distributed routing, and the distributed firewall in NSX-T
The data is carried over designated transport networks in the physical network.
Control plane
Contains messages for network virtualization control. You place the control plane
communication on secure physical networks (VLANs) that are isolated from the transport
networks for the data plane.
The control plane computes the runtime state based on configuration from the management
plane. Control plane propagates topology information reported by the data plane elements, and
pushes stateless configuration to forwarding engines.
Central Control Plane (CCP). The CCP is implemented as a cluster of virtual machines called
CCP nodes. The cluster form factor provides both redundancy and scalability of resources.
The CCP is logically separated from all data plane traffic, that is, a failure in the control plane
does not affect existing data plane operations.
Local Control Plane (LCP). The LCP runs on transport nodes. It is near to the data plane it
controls and is connected to the CCP. The LCP is responsible for programming the forwarding
entries of the data plane.
Management plane
Provides a single API entry point to the system, persists user configuration, handles user
queries, and performs operational tasks on all management, control, and data plane nodes in the
system.
Department of CSE
             TAGORE INSTITUTE OF ENGINEERING AND
                         TECHNOLOGY
          Deviyakurichi-636112, Attur (TK), Salem (DT). Website: www.tagoreiet.ac.in
              Approved by AICTE, New Delhi and Affiliated to Anna University, Chennai
                                      Accredited by NAAC                                            22
For NSX-T, all querying, modifying, and persisting user configuration is in the management
plane. Propagation of that configuration down to the correct subset of data plane elements is in
the control plane. As a result, some data belongs to multiple planes. Each plane uses this data
according to stage of existence. The management plane also queries recent status and statistics
from the control plane, and under certain conditions directly from the data plane.
The management plane is the only source of truth for the logical system because it is the only
entry point for user configuration. You make changes using either a RESTful API or the NSX-T
user interface.
Part-B
   1.    Write about the centralized and distributed control and data planes
   2.    Write about the VLANS and NVGRE
   3.    How the open flow is done in network overlays
   4.    Write about the I/O design of SDN framework
Department of CSE