0% found this document useful (0 votes)
38 views

Internet Technology

Circuit switching is inefficient for computer-to-computer traffic as it requires dedicated connections to remain idle between data transfers, while packet switching can efficiently share bandwidth between multiple users. The virtual circuit approach requires less packet header information than datagrams but provides ordered delivery of packets and may be faster for sending a small number of packets. The IP protocol is considered unreliable as it does not guarantee delivery and packets may be lost, arrive out of order, or duplicates generated.

Uploaded by

philip abrahams
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Internet Technology

Circuit switching is inefficient for computer-to-computer traffic as it requires dedicated connections to remain idle between data transfers, while packet switching can efficiently share bandwidth between multiple users. The virtual circuit approach requires less packet header information than datagrams but provides ordered delivery of packets and may be faster for sending a small number of packets. The IP protocol is considered unreliable as it does not guarantee delivery and packets may be lost, arrive out of order, or duplicates generated.

Uploaded by

philip abrahams
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. With respect to speed of data transfer which one of LAN or WAN is faster?

[1 Marks]
Ans: LAN

2. What is the typical speed of a modern Ethernet backbone LAN? [1 Marks]


Ans: 10 Megabits per second (10 Mbps).

3. Why is circuit switching not suitable for computer to computer traffic? [2


marks]
One of the primary reasons why circuit switching is not suitable for
computer-to-computer traffic is that it is inefficient.
It is a connection-oriented method of transmitting data. Data is sent and
received in streams, meaning the line would remain idle in between
transmission spurts.

4. What are the three steps that are required for data communication using
circuit switching? [2 Marks]
1. Circuit establishment (setting up dedicated links between the source and
destination);
2. Data transfer (transmitting the data between the source and destination);
3. Circuit disconnect (removing the dedicated links).

5. With respect to the sharing of links, which one of circuit-switching or packet


switching is more suitable? [1 Marks]
Ans: When it comes to sharing links, packet switching is generally the more
suitable approach due to its ability to efficiently utilize the available bandwidth
and accommodate multiple users simultaneously.
6. Among virtual circuit and datagram, which approach requires less
information in the packet header? [1 Marks]
Ans; datagram switching

7. Which of virtual circuit and datagram makes better utilization of the links? [1
Marks]
Ans: virtual circuit

8. Which of virtual circuit and datagram will guarantee ordered delivery of


packets in the absence of any errors? [1 Marks]
Ans: virtual circuit

9. Under what circumstances will the datagram method of packet delivery prove
useful? [1Marks]
Ans: In situations where there is no need for a persistent connection
between endpoints, or when quick setup and teardown of connections is
required.

10. 5 packets need to be sent from a host A to another host B. which of virtual
circuit or datagram would be faster? [1 Marks]
Ans; virtual circuit

11. If a 1000 byte data message is sent using TFTP. What will be size in bytes
of the corresponding Ethernet packet? [2 Marks]
Ans: Therefore, to transmit a 1000 byte TFTP message over Ethernet, it
will require one Ethernet packet with a payload size of 1000 bytes and an
overall size of 14 + 20 + 8 + 1000 = 1042 bytes.
12. Why is the IP protocol considered unreliable? [3 Marks]
Ans: It is unreliable because it does not guarantee delivery, meaning, it
does not require acknowledgments from the sending host, the receiving
host, or intermediate hosts.
A. packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated

13. List 2 common application that uses UDP. [1 Marks]


Domain name system (DNS) lookup. ...
Streaming and gaming. ...
Swift data transfer. ...
Multicasting. ...
Virtual private networks (VPN) ...
Google QUIC.

14. Which layers in the OSI model are host-to-host layers? [2 marks]
Ans: Transport, session, presentation, application layer

15. What is the responsibility of the Network layer in the OSI model? [2 marks]
Breaking up segments into network packets, and reassembling the packets
on the receiving end.
The network layer is responsible for routing packets from the source host
to the destination host.
16. How many bits are there in the IP address? [1 Marks]
Ans: 32 bits

17. What does the Ethernet address signify well? [2 Marks]


Is the identifying mark that lets a networked computer communicate with
the Internet.
The Ethernet address is used for identification, addressing, and routing of
data packets on a network.
This address is unique to each of the nodes on the LAN and is 6 bytes (48 bits)
long, which is burned on the Ethernet card.

18. What is the basic difference between a bridge and a router? [2 Marks]
Ans: A bridge sees the two networks as a single entity and a router sees two
networks as discrete entities.

19. What does TCP/IP do if the message to be sent is larger than what a single
datagram can
handle? [1 Marks]
Ans: TCP will split it up into several datagrams, and make sure that they
all arrive correctly.

20. What is the purpose of the "Time to live" field in the IP header? [2 Marks]
Ans: The time-to-live (TTL) field in the IP header is used to prevent
packets from endlessly circulating on a network.

G. Abdul-Salaam

You might also like