0 ratings0% found this document useful (0 votes) 658 views111 pagesComputer Network Organizer - Modified
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
a Be STE ae
OPULAR PUBLICATIONS
2 OVERVIEW OF DATA COMMUNICATION
2 i
a AND NETWORKING : i.
5 i
Multiple Choice Type Questions i
4. Ahubis a ‘ . -[WBUT 2013, 2016]
a) router > b) bridge c) repeater d) all of these
of Answer: (c) : : - a
ms. Z te 4 “4
ad 2. Repeaters function in the as layer [WBUT 2014]
of a) data link b) physic: ¢) network d) transport
* Answer: (b) *
3. Which address cannot be changed? ;
a) Hardware address b) logical address. © * [WBUT 2014]
¢) both (a) and (b) d) none of this
Answer: (a) : Pe :
4.A______ is a device that forwards packets between networks by processing |
the routing information included in the packet. [WBUT 2015] 4
a) bridge _ b) firewall ©) router 4) switch 4
. Answer: (c) : s Ge
. 5. Which transmission media has the highest transmission speed in a network?
i a) coaxial cable b) twisted paircable- [WBUT 2015]
©) optical fiber 4) electrical cable
ft Answer: (c) : a wis
F 6. Which of this is not a network edge device? : _ [WBUT 2015]
: ape. ‘b) smartphone c) servers. |, d) switeh ]
| Answer: (d)
ke 3 é
l 7. The total number of links required to connéct.n devices using Mesh topology is
ce a) 2" b) n(n ¥1)/2 (WBUT 2016)
: e) n(n=1)/2 d) i ;
Answer: (c) a x Lg
3 8. WDM methodology is Popularly used for > IWBUT 2017]...
‘ a) twisted pair cable b) coaxial cable is
¢).optical fibre >, d) wireless transmission Q
Answer: (c) it é : id
a : y CNET-F"-2 i
Fs iin wa ns,
hich transmission takes place in both gis 30
Ime, Is
upiex °* _ gy Half duplex
omMMunIe,
a) ne qmuni
) Simpen® diragth cation
¢) Four wire circuit
to
of a network
[weuT 2017]
b) Full Duplex Time Re
d) Data Travelling time
bit stream 0001110101:
4 [WBUT 2013, 2016].
4
ae
so
: RZ i
“
‘Manchester. ;
Hoyt ont af =
a ii) : t :
Dittevential it
Manchester iealae
e184 ota}
2. What is Bit Rate? What is Baud Rate? (weur 2013, 2014]
An analog signal carries’4 bits in each signal unit. If 1000 signal res
‘second, find the baud rate and bit rate. ignal units are sent per
CNET-EE-3“x= 10 og rat
x [Oo ratio= 100g 2)= 10nlog2=3n eB
- X= 10 og ratio= 10 log (10%) = 10k og 10= f0k dB
; 1's) transmitted in one
te is a Measure eof the number of data bits (that's O's ind
bat A figure of 2400 bits pe secind 1 ‘means 2400 zeros or ones can te tragsmitted in,
‘ene second, hence the abbreviation bps’. «
Baud rate by definition means the number of times a signal in @ communications channe|
changes tate For example, a 400 baud rate means tha the channel can ae states up
0 240 ties per second.
a Parts:
There 100 ial nis rset pe sd
And each signal caries bits, as wen = (
Bitrte=No, ois per secnd= 4] O00bi/se.=4O00bie, Abs,
Wier Badrte= = No. of signal unis pr send = 100bitsbic.= tp
va 28 of fi " cable over twisted pair and Coaxial
: anit down the advantages of fibre-optic oe ne
Answer: :
Oplcal tres cable wth numerous seni :
Lightweight : as
Immune to noise f
Low attenuation :
Tolerates data rates on the order of 100 Migs .
Bandit fom tes of megan ee eet oeneande fibre)
+) Suppose that a signal has 2" times the power as a cise signal that is added to
it Find the SNR in ack. “ 5 beled)
Answer: : +
lop? :
x= 10log 10= 10 dB i
The lito, you needa value fornork, itd elds
» 4. How does Manchester ‘encoding differ from sitet /Manchester encoding?
“WBUT 2014, 2016)
Sie th dfrences between Manchest and Differential Manchester encoding
Schemes with an example, eur 2015),
Answer:
Asinple example ofa Pe Layer protocl iste Manchest eneaing techique
tse on copeabled loa ret networks (LANG). hs isa scronous poco,
because iis aso the ich” ofan elect timer Each nay bi is acted 4
" fixed slice of time, At the middle of that time slice; if the voltage na from low to
CNET-EE-44h ii
isis he ‘ie
Ofte gs ‘ olov
tn i hay tei os 8 os eal
cig SH i
est it
ty a0 :
20.7 ade Exits
Seka pt sgl tg: si ea
tna in aa cs tl,
ie Matte js ff
aie fag tay ca et tie
uae a ea) 0
Mane Excl
stant
‘Avataiono “eth
fet ei ce ie ih
a en i Fenn ioe, TE
Ta Alan hE die
il Mace Eng Dia i isso
Fades ge aoe fe
"pie odie i”
channels?
stmt _ ae
ba amas :
aay dss el ba ww
arma dans i800 es
ne
x
éa)vhaisTO. ;
hein dap cits oH SPM ps ona
the bitrates 480 bps wat is the baud rat
Aner
a) Timéivisn mile (TOM) 2 nd of puting mule cata steam it
singe ipa ty sep he ital ‘nto many Segments, veoch having’ a Ven) short
en Eh inn aura see esting ed based ov He
‘ining, om ee ‘i
1) Te sli ics AEPSK wih points 45 dees oat Since 21=8 3
si sited instil i Te, baad is $0/3= 1600 bud.
dies oe in 2 ol dai whereas iil adress has”
cx, eine bani ami {wBUT 208)
CNET-EES
1. Postal
jbal domain
,|
:
Battle.net service,
POPULAR PUBLICATIONS
DA Physica i Si i M of the NIC card which
ical ad is a 48-bit flat address burned into the RO! ;
2 A TMET device stake OSI model. This is divided into 24-bit veiidor code and 24-bit
i is is uni : hanged.
address. This is unique for each system and cannot be chang ;
in Topeal address is 2 32-bit address assigned to each system in a network. This works
in Layer-3 of OSI Model. This would be generally the IP address. : :
ii) Physical address also called MAC address. It is present on Network interface cad. It
won't change. ‘ :
Logical addressing is used when a packet passes n/w'boundary.
Band Width: : . ; 3
Bandwidth (computing) or digital bandwidth: a rate of data transfer, througtiput or bit
rate, measured in bits per second $7 iE : af ;
ith (signal proces h:-a measure of the width of a range of
Bandwidth (signal processing) or analog bandwidt
-frequencies, measured in hertz. _ 3 i
8. Explain Client Server Model. What is the Idea of web based e-mail, [WBUT 2017]
Answer: 5 oo Se
The client-server model describes how a server provides resources and services to one or j
more clients. Examples of servers include web servers, mail’ servers, and file servers.
Each of these servers provides resources to client devices, such as desktop computers,
laptops, tablets, and smart phones. Most servers have a one-to-many relationship ‘with
clients, meaning a single server can provide resources to multiple clients at one time.
When a client requests. a cormection to a server, the server can either accept or reject the
connection. If the connection is accepted, the ‘server éstablishes and maintains a
connection with the client over a. specific protocol. For example, an email client may ;
Tequest an SMTP connection to a’mail server in order to Send a message. The SMTP
application on the mail server will then request authentication from the client, such’as the
email address and password. If these credentials match an account on the mail server, the
server will send the email to the intended recipient. ae
Online multiplayer gaming also uses the client-server model. One example is Blizzard's
which hosts’ online-games for World of Warcraft, StarCraft,
Overwatch, and others. When players open a Blizzard application, the game client
automatically connects to a Battle.net server. Once players Jog in to Battle.net, they can
see who else is online, chat with other players, and play matches with’ or against other
While Internet servers typically provide connections to multiple clients at a time, each
Physical machine can only handle so much traffic. Therefore, popular online services
distribute clients across multiple physical servers, using a technique called distributed
Computing, In most cases, it does not matter which specific machine users are connected
to, since the servers all provide the same service. : 7
CNET-EE-6‘ji
. e
: Client-Server Model ese are UST p
Web based e-mail: Webmail are web-based email account gotmail, GMail
accounts that aré operated from a website. Examples ieee ‘an internet
Mail. “ they have access at email or
Webmail llowsthe users to access their emails a5 107%, ee reat
connection anda web browse, This also means tat ue
draft a new email offline. tion. What .
". ¥ . odulation: 70171
Pei r «nd Frequency ™ weuT 2
istinguish between Amplitude modulator rode fibres?-
the difference between Single mode and
Answer: xt §
[+ Amplitude Modulation
Tn AM, a radio wave-known as the
“carrier” or “carrier wave" is modulated in
amplitude. by the signal, that is to be
transmitted. ‘The frequency and phase
remain the samme.
(OR) Up to 1200 bits per second.
[ remain the same, ____s
"AM radio ranges from 535 to 1705 KHz
“| bits per second.
M radi
from 88 to
y Modulation
"AM stands for Amplitude Modulation
Frequenc}
EM stands for
interference thal
in AM.
“AMChas poorer sound quality compared
“with FM, but is cheaper and canbe
‘transmitted over long distances. It has a
lower bandwidth so it can have more
FM is less prone to i
However, FM signal
physical barriers. FM h
quality due to higher bandwidth.
Is are impacted by
as_ better. sound:
stations available in any frequency range.
CNET-EE-7POPULAR PUBLICATIONS
{
2" part: \
E Single mode Multimode
cal Coating |
Coane
} ites very Straight Paths Glass + * Multiple Paths Sia,
Goting Glas Coe : Claldine Glass Coe =
BS Misom — =5#Hinms FS ra = a Mirae
Small Core * Larger Core than Single-Mode Cable Co
+ Less Dispersion microns or greater)
* Suited for Long- Distance Applications | * Allows Greater Dispersion and thereforg
(Upto~3km) Loss of Signal fl
* Uses Lasers as the Light Source Often |* Used for Long-Distance Application, but
within Campus Backbones for] shorter than Single-Mede (Upto ~2km)
Distances of several Thousand meters | « Uses LEDs as the Light Source Often,
within LANs or Distances of a Couple
Hundred Meters with a Campus Network
Pee
1 in computer
: ig the [WBUT 2014, 2016)
There are four basic types of Guided Media:
© Open Wire 5
Twisted Pair
* Coaxial Cable
+ Optical Fiber
Open Wire i - |
Open Wire is traditionally used to describe the electrical wire strung along power poles,
There is a single wire strung between poles. No shielding or protection from noise
interference is used. This media is susceptible to a large degree of noise and interference
and consequently not acceptable for data transmission except for short distances under 20
ft :
Twisted Pair
The wires in Twisted Pair cabling are twisted together in pairs. Each pair would consist.
of a wire used for the positive data signal and a wire used for the negative data signal.
‘Any noise that appears on one wire of the pair would occur on the other wire. Because, |
the wires are opposite polarities, they are 180 degrees out of phase and the noise
CNET-EE-8
= =PPearin,
SYSteMs that yen te ect
lat ancels 5 r¢ most ©
he degreg Se a balance Tl ou, Twisted Pair cables a il
UMS pep lution pe method of transmission sfcally OY Oc
fath pe resin inererence is determine’ ese interferer iste
pairs, PV morgen ots per fet re ‘a idis wove” around th
ion, a foil or wire braid
Coaxial Cab eg
axial ¢, % sult
Sh Cable co «eld inside a9 IS" ive
With the MSiStS af tye : ris ‘ rect!
0 Cor in nductot "1 ing, P'
coating ther conductor wo ductors. The inner Eom 4” An jnsulati fl ie et
can alled a jacket equen around it providing 4 $7 ield protects (PE ctor
ctor fh overs the outer conductor. ThE OUT SIT He qutel CON ner
.ctOr ftom, ida!
(it ng il sits. The dane betwee nats il
* conductor plis the type of material used gs for ©
in the cable ee aia ‘Typical mpd Saal the
mt ca eps mr hernt TNE! ST gata rates
excellent
te trangia tthe impedance characteristics ofthe cable allows hi
‘red than Twisted Pair able:
Optical Fit 7
re :
Optical Fi : jes in the
visti ee Consists ft ls fibres tat can cary information * frequentie a
strand ‘ta Specirum and beyond. The typical optical fibre consists of a 8 ea he
Sig ld ts Care, Around he Coe oneriacentic ye OF BSS ally
yea Coders 62.5 rons (1 ier = 10-8 meee coats
c
‘ladding
Cladding has a di
a diamete i §
+ of 125 microns, Coating the cladding iy
‘consisting ‘
Sorssing ofa, iti called the Jacket. Data i ans
‘G0 continuous total internal reflection.
The
eee fibre ire uade-off between capacity and cost ACEI sive,
its heazerthacopper At ler transmission capaci its mor
Fiber
Number of | One
air fables are ed
Cable ee Single cables required | * gle Cable #$
M Electrical medi Tomination medium Is
oe ‘mediums | Ejegrical medium is used ied
Nowe | Nebeinmayis | Notseimmuniyis | Noise immunity
low moderate.
Conmuniction | Communication speed sed
- munication speed IS.
Speed | speedis low nearly 4 | moderate, nearly 500 a Te Gbps
Mbps: Mbps ore
Bandwidth |) LO™ Bandwidth, Comparatively high Very High bandwidth, |
3 MHz bandwidth, 330MHz: 2GHz }
Dine | Ceram dee | —Coversmall dance, |” Covet Targe distance, |
21010 km. 110 10 km 10 to 100km
f Usedin LAN, TE Used in Cable TV, i
Usage Lines Used in Cable TY? __| Used in WANMAN ete
CNET-EE-9POPULAR PUBLICATIONS
_b) What Is OS! reference model? : “DWBUT 2014)
Answer:
The Open Systems Interconnection Reference Model (OSI Model or ‘OSI Reference
Model for short) is a layered abstract description for communications and computer
. network protocol design, developed ‘as part of the Open Systems Interconnection
initiative: It is also called the OSI seven layer model.
The OSI model divides the functions of a protocol into a series of seven layers (listed as
decreasing “distance” from the application software):
Physical Layer a
Data Link Layer
Network Layer
Transport Layer
Session Layet
Presentation Layer
Application-Layer
aA ee
ferences betweeri OSI and TCP/IP model,
[weUT 2014) -
‘OR,
1¢ differences of OSI reference model from Toe reference model?
; WBUT 2018)
Answer: &
Below we describe similarities and differences between the OSI and TCPAP models.
Similarities
The main similarities between the two models include the followin
© ‘They share similar architecture — Both of the models share a similar architecture.
This can be illustrated by the fact that both of them are constructed with layers.
¢ They share a common application’ layer - Both of the models share a common
“application layer". However in practice this layer’ includes different services
depending upon eac model.
«Both models have «-mparable transport’and network layers ~ This can be illustrated
by the fact that whatever functions are performed between the presentation and
network layer of the OSI model similar functions. are performed at the ‘Transport
layer of the TCP/IP model.
«Knowledge of the both models is required by networking professionals — According
to article obtained from the intemet networking professionals “need to know both
models”.
** Both models assume that packets are switched — Basically this means that individual
packets may take differing paths in order o reach the same destination. :
Differences -
‘The main differences between the two models are as follows:
* TCP/IP Protocols are considered to be standards around which the intemet has »
developed, The OSI model however is a “generic, potocoFindependent standard”,
CNET-EE-10~ intitive. I
Itiative. It is also called the OSI seven layer model.
tay
i : pplication
TCPIP combing aon and sesion ayers De ess
OSI data lnk and physical layers it0 Nye to the fief
, vot layer, 2 More simpler model and this mainly fe
IP is consi .. jg mainly due," elol
because ren sidered to be i . This is ma as deve
three CP teas amare eile me ch the intern as in ores 4
» networks ne ttly exis erediabitiy due to this COP is
idan’ "Ot Usually but around the OSt model © po
ae TcPAP only
at it
fact i
1b
e'
Pt
3
5
Buidance too},
* The OS} mod
: e
Tayery Mel nsists of 7 architectural layers where™® th
nes
tions perto!
ut OS! reference model mentioning the {°° pyBUT 2018).
Answer: ce
The m Fs iy ‘os Referen
Sia Systems Interconnection. Reference Mode! (OSI Model oF oF computer
eto) 8 ayered abstract description for communications a nection
Mork protocol design, developed as part of the Open S¥stems i
jisted a5
mee model divides the functions of a protocol into a series of seven layers (
Pheer S istnce” fom the application software): sf
ona (Layer)
Fe I Model, Layer conveys the bit stream - electricalimpulse, light o
ough the network at the electrical aid mechanical level. It provi bles, ¢
naa of sending and receiving data on a carrier, including defining CaP cal. layer.
physical aspects Fast Eee, RS232, and ATM. are protocols” wth-PIY
components, 2 <
.- cignal—~--
vr radio signa!
re
the hardware’.
es js.and
furnishes
in the physical
ded into two sul
the Logical Link Control (LLC)
the network gains access to the
Is frame synchronization, flow
Data Link (Layer 2)
‘At OSI Model, Layer 2, data packets are encoded an
transmission protcol knoivledge and management ani
layer; flow control and frame synchronization. The data
layers: The Media. Access Control (MAC) layer and
layer. The MAC: sub layer controls how a computer on
data and permission to transmit it. The LLC layer control
control and error checking ~
link layer is divi
Network (Layer3). > ac Wee
Layer 3 provides switching and routing technologies, creating logical paths, known a5
Virtual circuits for transmitting data from node to node. Routing and forwarding are
functions ofthis layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing, ; ; 4
Layer 3 Network examples inclide AppleTalk DDP, IP, IPX.
: CNET-EE-I1i UBLICATIONS
ae
‘Trinsport (Layer 4) i .
(051 Model, Layer 4; provides transparent transfer of data between ond systems, or hosts,
and is responsible for end-to-end error recovery and flow control, It ensures complete
datg transfer. Mo
‘Layer 4 Transport examples inelude SPX, TCP, UDP
session (Layer 5)
This layer establishes, manages and terminates connections between applications. ‘The
session layer sets up, coordinates, and terminates conversations, exchanges, ang
» dialogues between the applications at each end, It'deals with session and: connection,
coordination. é Le ot! Tg
Layer 5 Session examples include NFS, NetBios names, RPC, SQL ay
Presentation (Layer 6) ss “ : M
This layer provides independence from differences in’ data representation (ep:
encryption) by translating from application to ‘network format, ‘and vice versa,’ The
Presentation layer works to transform data into the: form that the application layer can
_Aecept. This layer formats and encrypts data 6 be sent across a network, providing
~~ freedom fom’ compatility problems. is sometimes called th syntax layer ;
‘Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF; GIF; PICT, 4
JPEG, MPEG, MIDI. agin SET ad
Application (Layer 7) ~ ae hele
OSI Model, Layer 7, supports application, and end-user. processes, Communication
partners are identified, quality of service is identified, user authentication and privacy are
Gonsidered, and any. constrains on data syntax aré identified Everything at this layer is ~
4 application-specific: This layer provides aplication services or fle transfers, e-mail, and)
other network software services. Telnet and FTP are applications that exist entirely inthe 7°
| application level. Tiered application architectures ae part of ths layer,
i 3. a) What are the ditections of data flow? Explain with suitable examples, i
! b) How do we measure the performance of a computer network? Explain, ‘i
¢) Discuss in detail different topologies for computer networks, 1
=) What is throughput? - Se |
e) Di “DWBUT 2015]
Answer: 2a j
| ) Network devices use three transmission modes (methods) to exchange data, simplex,
» half duplex, and full duplex. i ; ¥
+ Simplex transmission ‘is like @ one-way street where traffic moves. in only one ,”
direction. Simplex mode is a one-way-only transmission, which means that data can
flow only in one direction from the sending device to the receiving device, Figure 1-7
illustrates simplex transmission, ° é
‘© Half-duplex transmission is like'the center lane on some three-lane roads, It is a
single lane in which traffic can move in one direction or the othef, but not in both’ *
CNET-EE-12, “gn because
directions at the same time al-duplex mode limits date transmission 3 and (7%
device must ake tums using the line. Therefor, data can ow from A missio™ ach
BUoA, but notat the sane fae, Figure I ilustates halfduples tan" apc, Coa
Fllluplextransmisiog i ike 9 major Highway with 190 lacs 9 ie me
lane sccommnadtn ac guing in oposite, diets: PAPE ides
accommodates two-way simultaneous transmissio™ which eee fiow wo’?
Send and receive atthe same time. In fullduplex mode, ait Eo ee
and B (o A atthe same time, Figure 1-9 illustrates full-duplex
5) Measures of computer network performance are common
pains (tos) This Many can eset either an actual data rate OF # theor
lable network idth. th
Modem tials ce ed large numbers of bits per second. Instead a ilo!
10,000 oF 100,000 bps, networks normally express these quantities in term
megabits and gigabits,
‘The following equation ilusirate the mathematics behind these terms,
. ‘I kbps= I kilobit per second = 1,000 bits per second
,000 Kbps ety
<_* 1 Gbps= 1,000 Mbps ‘ fd,
sara network speed can also be expressed in unt
abbreviated as "Bps" with a capital 'B ae i :
Use of these ume is Stoney discouraged in networking to avoid confusior
bits per second standard: « : ad =8 KBS °°!
’. © FKBps=1:kBps = | kilobyte per second = 8,000 bits per second” ° "ot,
Final he consent aed for neering the capacity of computer disks and memory
‘might appear similar at first to those for networks. , .
Data storage. capacity is nonmally measured in units of kilobytes, mepabyies me
sieabytes. In this nor etwork style of usage,‘ represents @ multiplier of 1,024 an
represents a multiplier of 1,000 units of capacity. :
The following equations define the mathematics behind these terms:
1 © 1KB=1,024 bytes
© 1 KB=1,000 bytes
© TMB=1,024KB
#1 GB=1,024 MB
«) Below five devices aranged in different network topology
i) Mesh, :
os per
cate of bits PO
ly stated in fig Kimit
yoting
Fiobits
ts of bytes per second,
n with the
Number ofcable=10 i ‘
Each node is connected through a four cable. If one connection fails, the entire system
does not halt ;
» CNET-EE-13POPULAR PUBLICATIONS
, iy Sar
Number of cable = 4 oa
fone connection fails all other links remains active,
ii Be,
‘Number of cable = 1 : 7
- Ifthe connection fails, the entire network goes down, £8 07s Deets
one ps Bp. oes ie
Number of cable = 5 ae }
Ifone connection fails, the ring can disable the entire network: es
4d) Throughput is a measure of how many units of informatién a'system can process in a
given amount of time. It is applied broadly to systems ranging from various aspects of
computer and network systems to organizations. Related measures of system productivity
include, the speed with which some specific’ workload can be completed, and response
time, the amount of time between a single interactive user request and receipt of the
response, 2 Babs, odie
©) The Intemet is a network of LAN’s that uses the IP protocol’at the network layer and
covers the entire world. The Intranet is similar, i.e,;it is also a network of networks
driven by the IP protocol. However, all the networks of the Intranet belong to the same
organization. oe
‘An extranet is a private network’ that uses Intemet technology,’and the’ public
telecommunication system to securely share part of a business's information or operations
with suppliers, vendors, partners, customers, or other business¢s. a
4. Explain TCPNP and/ADSL aa “[WBUT 2017]
Answer: ee Soe
1" Part: “ ae OE ee ¥ L
‘TCP/IP: TCPAP means Transmission Control Protocol and Internet ‘Protocol. It is the
network model used in the current Internet architectureas well. Protocols are’set of rules
_ Which govern every possible communication over'a network. These protocols describe
the.movement of data between the source and destination or the internet. They also offer
CNET-EE-14 _simple naming and addressing sehemes. It contains four layer
OSI model. The layers are:
Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer ea
4.
Network Access/Link Layer OSI Model
TCP/IP Model [Application Layee ——y
[Presentation Layer _—|
come in the
isi!
antike sever 7°" *
, | Application Layer Presentation
‘Session Layer
‘Transport Layer spon Layee
Tntemet Layer ‘Network Layer
Data Link Layer .
‘Network Access Layer Physical Layer
Layer 1: Network-Access Layer
als
ee
3. Varies from host to host and network to network.
Layer 2: Internet layer
“ internetwork layer is called a internet layer. ie
DARED
Layer 3: Transport Layer
i
2° Furictions such as multiplexing, segmenting ot splitting on
3.
4.
5.
6.
Layer 4: Application Layer
The TCPAP specifications descril
Lowest layer of the all: : :
to the host, so that the packets ci
Protocol is uséd to connect
Selection of a packet swi
itching network which is based.
an be sent over it
na connectionless
whole architecture to;
. Its the layer which holds the ether
ce dependently to the destination.
‘Tt helps the packet to travel in
.. Order inwhich packets are received is di
IP (Internet Protocol) is used inthis layer.
5. Tite various functions performed by the
o, Delivering IP packets
©. Performing routing
- 0 Avoiding congestion
It decides if data transmission should be
transport layer.
The applications can read and write to the transport layer.
fflerent from the way they are sent.
Internet Layer are:
oY:
on parallel path or single path. ae
in the data is done: by.
Transport layer adds header information to the data. ne
Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.
Transport layer also arrange the packets
to be sent, in sequence.
ibed a lot of applications that were at the top of the :
protocol stack, Some of them were TELNET, FTP, SMTP, DNS etc.
CNET-EE-15a Circuit Switching
QaM. ' : [WBUT 2015]
q Twisted Pair Cables “BUT 2015]
Answer: ” &
a) Circuit Switching: ai ¥
einer is a Wo-way communication protocol which allows connecting {0 a remote
machine and run applications on it. ;
FIP (File Transfer Protocol) is a protocol that allows File transfer amongst computer
users connected over a network, Itis reliable, simple and efficient,
, SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport
electronic mail between a source and destination, directed via a route, *
4, DNS (Domain Name Server) resolves an IP address into a textual ondtess for Hosts
connected over a network.
5, It allows peer entitiés to carry conversation. 4
6. ‘It defines two end-to-end protocols: TCP and UDP
«9 TCP (Transmission Control Protocol): It is a reliable “connection- oriented
Protocol which handles byte-stream from source to destination’ without error ahd
vo,
_ flow’control. i
© UDP (User-Datagram Protocol): It is an unreliable connection-less protocol that - |
does not want TCPs, sequencing and flow control. Eg: One shot request-eply 4
» Kind of service.
2 Part: vf - opis ot fee |
ADSL:
Agmmetric digital subscriber line (ADSL) is a type of DSL: broadband Communications
technology t used for connecting to the Internet. ADSL:allows more’ data'to be sent over
existing copper telephone’ lines (POTS), when compared to traditional modem lines, A.’
special filter, called microfilter, is installed on’a subscriber's telephone line to allow :
both ADSL and regular vaice (telephone) services to be used at tie same time,
ADSL Tequires a special ADSL modem and, subscribers must be in close-geographical
locations to the providers central office to receive ADSL service. Typically this distance
is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when
receiving data (known as the downstream rate) and from 16 to.640 = when’ sending
data (known as the upstream rate). f
5. List the layers of TCP model. Describe the function of each of the Layers with
necessary diagram. How does the layer of TCP correlate with the OS! model?
= QWBUT 2017]
Answer:
Refer to Question No. 1 a Par) of Long Answer Type Questions
6. Write short notes on the folowing: i
[WeuT 2013]
When ‘we or our computer places a telephone call, th itching équipment within the.‘
telephones system seeks out a physical “copper? Cineludng fibre and radio) path all the
CNET-EE-! 16; ., called
way from our tel et sei technique i
uaa telephone to th icr's telephone. ‘This tec iq res!
sitchin nds sho schemata in Fi (Fash of (Pr gs th
carr withing offend ofl oe =) 7 wis eae erring omg
coming lit te th ses throug ‘swil
ig lines and three outgoing lines. When # call pass “he line on which th call ¢ 3
Physical connection is (conceptually) established Bt fi ms yecause f
ines.
the dotted Himes. ese, because Pars ich
rowave links OM “145
‘and on ofthe output nes, shown byte
‘The model shown in the: figure is highly simplified of O°”
copper” path between the two telephones may, in Fach be microwire once a call
thousands of calls are multiplexed. Nevertheless, the basic idea is, vals Ong unl
been set up, a dedicated path between both ends exists and will continu
the calli finished, i dtoend path pefore
‘An important property of circuit switching isthe need t0 set up an en att of inging
any data can be sen, The elapsed time between the ‘end of dialing and Pe > im
can easily be 10'sec, more on long distance or international calls. put ote that
. iterval, the telephone system is hunting for 8 COPPCT path, as shown in FE YO aye
before data transmission ean even begin, the call request signal must Late (ee
way to the deitinaion, and be acknowledged. For many computer applicalio'™ "
point-of-sale credit verification), long setup times are undesirable.
Long. Lone.
distance” distance
office
sh Trunk Trunk
visto
ample of Connection Over Public Circuit Switching Network
ulation which is widely used’ *
mmunications. It is widely
such as. PSK,
b) Quadrature ‘Amplitude Modulation:
Quadrature Amplitude Modulation o QAM is a form of od
for modulating data signals onto a carrer used for radio co
used because. it offers advantages over other forms of data modulation s
although many forms of data modulation operate alongside each other. ’
ers shifted in’
Quadrature Amplitude Modulation, QAM is a signal in which two carr
phasé by 90 degrees are modulated and the resultant output consists of both amplitude
Fd phase variation. In view of the fact that both amplitude and phase variations are,»
present itmay also be considered asa mixture of amplitude and phase modulation.
‘A motivition for the use of quadrature amplitude modulation comes from the fact that a
straight amplitude modulated signal, i.e. double sideband even with a suppressed carrier
CNET-EE-17“ocupies 'wwite the bandwidth of the modulating signal. This is very wasteful of the
available frequerrcy: spectrum. QAM restores: the balance by placing two independent
double sideband suppressed carrier signals in the sanie spectrum as one ordinary double
sideband supréssed cattier'signal... > ° .
¢) Twisted Pair Cables:
Refer to Question No. 1(a) of Long Answer Type Questions.
- ].}What is the purpose of Guard Bands? [MODEL QUESTION)
bj What is the relationship between FOM and WDM?
c) In FDM, suppose there are 3 signal sources each having bandwidth 300 MHz, -
find the minimum bandwidth of the path if 10 MHz guard bands are used.
d) What is the drawback of synchronous TDM that leads to the concept of
asynchronous TDM? 8 :
¢) Explain bit stuffing and interleaving in TOM. -
Answer:
a) Guard. band is a narrow part of the radio spectrum between radio bands, for the
purpose of preventing interference. 3 i
Itis.a narrow frequency range used to separate two wider frequency ranges to ensure that
both can transmit simultaneously without interfeting each’, other. It-is used ini
TDM/TDMA/FDM/FDMA. It may be used in both wired and wireless. communications, _
‘0 that adjacent frequency bands onthe same media can avoid interference:
b) fam: totil frequency bands are divided into several users" « .
eg: television broad casting © Q i 4
vwdi: total wave length is divided in to number of users
e.g: optical networking se i
©) For3 signals we require at least 2 guard bands. -
‘= maximum bandwidth =3 x 300 +2 x 10= 920 MHz.» /
tomHe |. WOMHz Tf
wt tt
@) Disadvantages: af
One drawback of the TDM approach; as discussed earlier, is that many of the time slot in
the frame are wasted. It is because, if a particular terminal has no data to transmit at
patticular instant of time, an empty time slot will be transmitted. An efficient alternative
to this synchronous TDM is statistical TDM, also known as asynchronous TDM. It
dynamically allocates the time slots on demand to separate input channels, thus saving
CNET-EEA8commen eee
ny
ve mai
the ¢hanne qiPtcity. As with Synchronous TDM, statistical multiplexers al8° ter seats
the input rit 2 buffer associated to each of them. During the input, the mule a
receiving. end see Olecting data until the frame is filled and send ANY
i i and distributes the dat
appropriate bus fee demultiplexer receives the frame
i ; . ission
12 inserting bits in data in order to break up a bit pattern that may cause the trans ine
to go out of synchronization. For example, in T1 lines, timing is ‘maintained iby ote ig
2 change from 0.t0 1. If too many zero bits are transmitted consecutively, th he rec
Fimay lose synchronization because too much time has passed with nn cing VON
Therefore, in long strings of zeros, a set of bits that begins with a 1 and functi
“ming signal is "stuffed* into the stream of zeros at certain intervals. e
CNET-EE-19* . popULAR PUBLICATIONS
PHYSICALLEVEL:
: Multiple Choice Type Questions
4. PPP isa... sa Oriented protocol. [WBUT 2013)
.a) phase _ bpbit e ¢) byte d) none of these.
Answer: (c) . : ‘
2. What network topology implements at least two paths to and from each node?
| . . [WBUT 2014)
| a)bus b) ring c)mesh —* ‘d) star.
' ‘Answer: (b) 3 .
b 4. Inthis topology there is a central controller or hub [WBUT 2015)
} a) star b) mesh ) ring d)bus-
: Answer: (a) i
4, The topology with highest reliability is : IWBUT 2017]
ke a)bus topology b) startopology _c)ring topology _ 4) mesh topology
i “Answer: (4) a
§.Protocols are ©. WBUT 2017]
a) agreement on how. communication components and DTEs are to
communicate 184 F
') logical communication channels used for transferring data
©) physical communication channels used for transferring data
d) none of these ;
Answer: (2)
4. Whats transmission impairment? How many types of transmission impairments
are three? Discuss them. +. WBUT 2013]
Discuss about the different types of transmission impairments. :. » [WBUT 2015]
Answer: if.
Transmission Impairments is a condition that causes information to. be-lost in a signal.
_ The following are some aspects of transmission impairments: (1).Atténuation, Signals
loose power in.time, (2) Dispersion. Signals tend to: spread as they travel, with the
amount of spreading dependent onthe frequency. (3) Delay distortion, Due to velocity of =
propagation that varies with frequency. Thus, various‘frequency components of a signal
ative at the receiver at different times. (4) Noise; sources. from Thermal,
Intermodulation, Crosstalk.
(CNET-EE-20“switching for re-drranging received packets to get back the transmitted stream:
2. We have a
ine have a channol with a 4MHz bandwidth. The SNR fer the ch
Is the bit rato ar
Auawee! Ind signal level?
First, we use the Shannon formula to find the Upper Nirmit. ms
IC = Blog, (1+ SNR) * log, 64 = 6 Mbps| we
2 (1+ SNR) = 10" fog, (1+ 63) = 10" 1OB: ance
‘The Shannon formula giver as @ Mbps, the upper limit. For beter Perfor 49 find
‘choose something lovee Mos for example. Then we use the Nyquist Form".
the number of signal levels. 7 3
[4 Mbps = 2x1 MHizxlog, LL ss ,
: 2016)
3, Write down the advantages and disadvantages of mesh t9P0105Y- (weuT
nswer: v" ii she
ar eens te Gy ana ton ta commend voce er EGY, oe
Communication path between any pair is dedicated and unhampered by the ‘£2! 2
rest of the network. jes when a link Be
Disadvantage: Requires much more cabling. Also, fallback strategies when Q
down, is not very well-defined : oS fein
2 2 *qweut 20171
4 What are the drawbacks of:mesh topology? ;
inswer:
‘Refer to Question No. 3(2"4 Part) of Short Answer Type Questions.
: “[MODEL.QUESTION]
witching and packet switching.
5. Differentiate circuit 5
Answer: i
Circuit switching
e Packet switching ane
Circuit switching establishes _ fixed | Packet switching is a Communication in
bandwidth circui/channel between nodes | which packet are routed between node
and terminals before ‘the. users ~may | over data links shared with other traffic.
communicate 2. ie 2 In each network .node, packets are
: queued in buffered, resulting in variable
> =| delay.
. Wy iru sitchng te prtered over packet Switching case of 224 time
or [MODEL QUESTION]
Circuit switching is faster than packet switching since during communication, the channel
always remains established. Because of this, there is no overhead in circuit switching to
either packetize data or use-other means to guarantee delivery of the data.’ In circuit
switching, the data bits arrive at the receiver in the same order they were transmitted. The
same-can not be assured in packet switching. This leads to more computation in packet
While packet. switching can not overcome the speed disadvantage; it can-overcome the
“guaranteed. delivery” and “in-order” delivery of data using protocols. Several protocol
CNET-EE-21. POPULAR PUBLICATIONS
ers Hike sequencing numbering. and ACK mech
rol at diferent layers (mostly used in transport and
rie evaranted it-order deliver For example, TCP ae
I '
protocol
4.2) Whats composite signal? [MODEL QUESTIO
ithmic forms. What is the actual reason behind this?
5) We measure decibel in logart
uppose transmiseion channels become virtually error-free, ls the data link layer
fii ieeded? Explain,
anisms using sliding windows
dataclink layers) can be used fo
hives this using a complicated
yA Composite Signal isa sigmal which actually carries multiple other signals that are
3 a related{o eachother. On the most common examples of a compe.-e signal ig the |
‘eamposite video" signal that is fed to an analog television set. Composite vides, is
gual available in standard formats such as NTSC, PAL, and SECAM. It is composite
of three source signals called Y, U and V (together: teferred to as YUN) with syne pulses.
\ Y represents 'the brightness or luminance’ of the picture: and includes ‘synchronizing
pulses, so that by itself it could be displayed as.a monochrome picture. U arid V represent
hue and saturation or chrominance.
|
jo The desi (48s oar nitof measurement hat exprésses the magnitude of
2 physieal quantity (usualy power or neni) relative toa specified or implied
2 et level. Since it expresses rato of two quantities with he samme uni, it i
dimensionless unit. ee SRE ae eet
large’ range of.
! “ine
The use of the decibel has a number of merits:
fi The decibel's logarithmic nature, means that 2 very
: represented by convehient number, in a’similar manner. to,
allows one to clearly visualize huge changes of some quantity, 4
The mathematical properies of logarithms mean that the overall decibel gain,of @ multi-
component system (such as consecutive amplifiers) can be calculated simply by summing
the decibel gains -of the individual ‘components, rather than needing to multiply
amplification factors. i eo P 4 sy
‘The human perception of; for example, sound or. light, is, oughly speaking, such that a
doubling of actual intensity causes perceived intensity to always increase by the same
asiounl,iespecive ofthe origina, level. The, decibels logarithmic scale, in which a
doubling of power of intensity always causes an increase of approximately: 3. dB,
corresponds to'this perception. he i iccke
«) Even if the transmission channels become error free, there would still be a need for the
data link layer. The data link layer is responsible for breaking up the data it receives from
a higher layer into frames and decide upon the most appropriate time to put such a frame
on the network through the physical layér. Address management of network interfaces is
CNET-EE-22
ratios, can’ be
notation. Thiserrors
Also the responsibility ofthe data link layer. In other words, the absence OF Siac HN
Network possibly does away with the LLC functionality but ‘ME, jyer oe,
Fesponsibilties remain. Without the MAC layer functionalities, the netwOrle 7 exarmP,
. become independent ‘of the physical nature of the transmission medium (1) Suld
rites @ data fink layer, an IP layer, for Ethernet (CSMA/CD proto
lifferent from the IP Jayer for WLAN (CSMA/CA)- ; essa?
Qf circult switching. msTl0!
een
rovide communication ae
thing and packet switchin!
col
2 Dist
switchi
ing techniques are employed to pt
‘two computers. These are: Circuit switching, message switchi ket swt ew
Cireuit Switching: in this technique, first the complete physical connection BET 4, th
computers is established and then data are transmitted from the source COMPU Ching
destination computer. That is, when a computer places a telephone cal. the evict
sender tel of itching
in the telephone system seeks out a physical copper path regent
sender telephone to the receiver's telephone. The important property of HIS SM ata
technique is to setup an end-to-end path (connection) between computer before
can be sent, i eit
Message Switching: In this technique, the source computer sends data or the mes aoe
the switching office first, which stores the data in its buffer. It then looks for a free 1or
another switching office and then sends the daia to this office. This process is cont
until the data are delivered to the destination computers. Owing to its working pFinc'P ©
it is also known as store.and forward. That is, store first (in switching office), forwal
Jater, ong jump at a time. Ht
Packet Switching: With message switching, there is no limit on-block size, in ponies
packet sivitching places a tight upper limit on block size. A fixed size of packet whic!
can be transmitted across the network is specified. Another point of its difference from
message switching is that data packets are stored on the disk in-message switching.
whereas in packet switching, all the packets of fixed size are stored in main memory:
This improves the performance as the access time (time taken to access a data packet) is
reduced, thus, the throughput (measure of performance) of the network is improved.
3, a) Find the NRZ-1, Manchester and Differential Manchester encoding for the
binary Data 100110111. z
b) Suppose that a signal has‘2" times the power as a noise Signal that is added to
it. Find the SNR (Signal to Noise Ratio) in decibels. [MODEL QUESTION]3 5
ott b : 5
: g oe
. = ae
lal 3 i SB
Z 4
ol oe ; # : we
3 2 :
pe aa ling = : 3 :
0 2
g = a 7 in.
ieee of i
- rai — :
H)SNRen a
ose
DATA LINK LAYER
= ype 9
1. Flow control in Os! reference niodel is performed in
b) network layer
¢) application layer
* a) data link layer
©) session layor
Answer: (a)
2. Checksum is used for
a) error detection
¢) error enca
‘Answer: (a) erreulatlon
3. Which channel access method Is used in IEEE 802.5 network?
¢) token ring
a) CSMACD ~ 'b) token bus
Answer: (by
4. The hamming code is used for
a) error detection
©) error encapsulation
Answer: (d)
b) error correction
4) both (a) and (b) sn
pweuT 2013}
[weurT 2013, 207 a
b)errorcorrection
d) both (a) and (b)
put 20141
4) all of these
[weurT 2014]
5. Which channel access method is used in Ethernet network? [WBUT 2014, 2016]
a) CSMA/CD
Answer: (a)
b).token bus
6. Which one of the following task is not done by data link layer?
‘¢) flow control
a) framing
Answer: (d)
b) error control
7. Flow control is the responsibi
» a) Data link layer
¢) Both of these
Answer: (c)
ies of the_
8. For stop-and-wait flow control, for
acknowledgements are needed?
a)n b) 2n
Answer: (a)
4. What Is the minimum window size re
and how?
¢) token ring
Short Answer Type
<) all of these
[WBUT 2015]
4) channel coding
[wBuT 2016]
b) Transport layer.
d) none of these
n° data packets sent, how many
[WBUT 2017]
@) n+l
e)n
ective-repeat ARQ protocol
[WBUT 2013]
CNET-EE-25_POPULAR PUBLICATIONS
Answer?
The size of the sending and receiving windows must be equal and half the maximum
sequence number (assuming that sequence numbers are nunibered from 0 to.n=1) to avoid
miscommunication in all cases of packets being dropped. To understand this, consider the
case when all ACKs are destroyed... ‘
If the receiving window is larger than half the maximum sequence number, some,
bly even all, of the packages that are'resent after timeouts are duplicates that are not
Prornized as such. The sender moves its window for every packet that is acknowledged.
stuffing in HDLC? Why bit
[WBUT 2013, 2016, 2017]
2. What .n by Data transparency? What is Bi
stuffing ded?
Answer: :
1" Part: : : con
The data transfer rate (DTR) is the arfount of digital data that is moved from one place
another in a given time.
to
2 & 3" Part: 2 as. tse >
HDLC frames can be transmitted over'synchronous or asynchronous links: Those links
have no mechanism to mark the beginning or end of a frame, so the beginning and end of
cach frame has to be identified. This is done by using a frame delimiter, or flag, which is
a unique sequence of bits that is guaranteed not to be scen inside a frame. This sequence
is DIIII110’, or, in hexadecimal notation, 7E. Each frame begins and ends with a frame
delimiter. A frame delimiter at the end of a frame may also mark the’start of the next
frame. A sequence of 7 or more consecutive I-bits within a ftame will cause, the frame to
beaborted. = : <
3. Applying CRC algorithm, determine the check gum and the transmitted frame for-~
the bit stream 11010111 and for the generator polynomial x+x7+1. [WBUT 2013]
Answe
Frame: 11010] 11 :
Generator G(x) of degree 3, x? +x? +1: 1101 "
T(x) is the frame with 3 attached 0-bits:'110101 11000 te ge
Divide T(x) by G(x) by using XOR,
1101[11010111000[1000010 ;
: puIONs
0000 ie
O1lo x ie at :
1101 os oe. =
000110» Remainder
The remainder R(x) = 110., The Transferred frame: 11010111 110
CNET-EE-26nso
ror
in
- for @!
dotecnt ite bit block of 1 is to be set using hamming oy occ
8" bit Position ron ‘ow the receiver corrects an error neu 72
Answer;
position
Ne et patty bis of poson 1,2, 4 8 and 16 from the left the Fe most
gore Thus we have PiP,0P311P,0101011P3. 417)
So, P,=001818080@0@101=0(ie, Ex-or of bits 3, 5, 7,9, 11, 13,15 am
(ie. Ex-or of bits 3, 6, 7, 10, 11, 14 and 15)
(Ex-or of bits 5,6, 7, 12,13, 14 and 15)
P.=0@180@169101=0(Ex-or ofits 9, 10, 11, 12, 13, 14 and 15)
Pe=1° Bit17)°
So, transmitted code is 01001 110010101111
_JfSixth bit fom right has error, the received data is 01001 110010001111 .
In receiver, we calculate P, ~ Ps again try calculating the parity as in the transmit
and the ex-or with the received parity bit. 2 *
P=0 ;
so 2
Pale od i
Pale 3
Reo ; :
« This gives 01100, =12-the position from left as the position of this erroneous
ter side
bit. So, the
received data can be corrected to 01001 1100101111, whichis the same as the transmitted
code. Stripping off the parity bits, we get the transmitted data word. 4 .
‘6, What isthe difference between Flow Control & Error Control, [WBUT 2016]
Answer:
Flow control and Error control are the:contr6l mechanism at data link layer and transport
layer. Whenever the sends the data to the receiver these two mechanisms helps in proper
delivering of the reliable data to the receiver: The main difference between the. flow
control and error control is that the flow control observes the proper flow of the data from _
sender to receiver, on the other hand, the error control observes that the data delivered to
the receiver is error free anditeliable. Let's study the difference between Flow control and
Basis for comp: control Error control
Basis Flow control is meant for the | Error eontrol is meant for delivering
proper transmission of the data | the error-free data to the receiver:
from sender to the receiver.
“Approach Feedback-based flow control_| Parity checking, Cyclic Redundancy
and rate-based flow control are | Code (CRC) and checksum are the
the approaches to, achieve the | approaches to detect the erfor in data.
proper flow control, Hamming code, Binary Convolution
codes, Reed-Solomon code, Low-
(CNET-EE-27POPULAR PUBLICATIONS © 5
Basis for comparison | Flow control Error control
Density Parity Check codes are the
+ s approaches to correct the error in data, a
f Impact Avoid overninning of receivers | Detects and correct the error occurred
: buffer the data loss. inthe data.
6. Given a 10 bit sequence 1010011110 and a divisor of 1011. Find the CRC.
e [WBUT 2016)
Kt Answer: Z .
1 Since divisor is 1101, we append from 0-s to the data and divide.
100100011 ‘i 3
101 1[1010 0111100000 : a
toll : ¢
1o1l :
1011 , y
100. rg
1011 x
i 4 - Mle. - 4 ee oe oie
1011 ; ‘
WoI0.s Bs : } 3
. Aon
* Remainder» 0010 A
=. Data with CRC is 10100111 100010 mee
cuss the function of data link Layer. $
Answei 4
, Functioris of data link layer: ;
i). Converting the frames to bits and vice versa. ‘
Error detection by CRC check.
) flow control
iv) Sensing and collision dete
reception of frames.
[WBUT 2017]
|
|
i
[ °
s
sion and is responsible for
~. 1.) Explain GRC code with an example, 2 bd iweurT 2014)
Answers.” Ort i
» A cyclic redundancy check (CRC) or polynomial code checksum is a hash function
designed to detect accidental changes to raw computer data and is commonly used in
. CNET-EE-28tiga ey vile
clas Sore eis uch hard dk dvs. a cnc-nabed et
2h block o a ited-length binary sequence, known a the CRC code or just ag of
ried he 824 sed srs tam both topeer. When a book one
Celtel eH the clean; ifthe new CRC dos not match the
action sik ie, thn the block contains a data error and the device may take ©" ‘ta 18
ass 4S rereading ot requesting the block be sent again, otherwise the ¢T"
ued ob ero fe , ;
the dat
oe
Pong the CRC arm, here we demin te ansited fame
Tol :
We tt be erator polynomial’ +2 +1.
(cnc highest power of generator polynotia is
00.
3) to get 110101110
1201)" 2204 ott10 og(i0000 10 1
Lo
5 1, 001 © Remainder r 7 at
0, transite strings 1101011101
(re te ese eng is gin ddd by 101, we get remand 00 seen
low:
* 1001) 1010 00.011 41 (0210112 j
1001 ‘ ,
000 € Remainder \
b) How does a single bit error differ from a burst error? (WBUT 2014)
CNET-BE-29‘POPIKAR PUMLICATIONS :
Answers 7
There are two main types of errors in transmissions:
1. Single bit error
2. Burst error Ge]
(Sas terre Ceasnesor]
Single bit error: \ means only one bit of data unit is changed from 1 t6 O'or from 0 to-1
as shown in fig. PREP rT fe] mse .
. - Bere a on Reseed
‘Single Bit Error
Single bit error can happen in parallel transmission where all the data bits aré transmitted
using separate wires. Single “bit errors are the least likely type of error in serial
transmission."
Burst Error: It means two or more bits in data unit are changed from 1 to 0 from 0 to 1
as shown in fig.” : 3
oes 2. GRE EREPEEE Pree GC IeT ToD J pst sene
[--[ eeretanscs wy beret ror
TLa] +] daarcceives
Ini.burst error, it is not necessary that only consecutive bits are changed. The length of.
burst error is tneasured from first changed bit to last changed bit. As shown in Fig. length
‘of burst error is 8, although some bits are unchanged in between. Burst error is most
Tikely to occur in a serial transmission. The noise occurring for a longer duration affects
multiple bits. The number of bits affected depends on the data rate & duration of noise.
For e.g. if data rate is 1 kbps, a noise of 1/100 second can affect 10 bits. 5.
2. Discuss In detail about different framing techniques. [WBUT 2015}
‘Answer: :
‘A point-to-point connection’ between two computers or devices consists of a wire in
which data is transmitted as a stream of bits. However, these bits must be framed into
discernible blocks of information. Framing is a function of the data link layer. It provides
a way for a sender to transmit a Set of bits that are meaningful to the receiver. Ethernet,
‘CNET-EE-30cae
conder
for ae at
their ©
in
he 5°
‘ologies have thelr
« technologies Mave
token-ring, frame relay, and other data link 19Ye%
eed a i onan fT ga way
‘There are three different types of framing, 2° 9 hich Ps sees yn erie
tell the receiver where the block of data begins an ends: mally stored a5 alpharye Of
« Byiecoriented framing: Computer 2ata 15. MTs pies (I byte) This OP that
2 irtaricnted framineedeuith a combination O° ger style of fram
framing differentiates one byte from another. Mis an “amples of byte
was used in the terminal/mainframe enter pase
framing include IBM's BISYNC protoco Sy ler to trans™l
© Bit-oriented framing: This ype oF framing-allows the ed
Stlog of bits ar oneTime. IBM's SDLC.(SYBEHEBNON
HDL (Highevel Data Link Control) are examplce ©
Most LANS use bitoriented framing. There is usual
mum frame
5 es. TI
For example, Ethernet has a maximum fa size of 1,526 byt
and end ofa frame is signaled with a special bit sequence Oe a
If no data is being transmitted, this same sequence is conti iene :
the end systems remain synchronized. Beat al fe yeposes Fe"
&° ‘Clock-based framing?’ In a clock-based systers 2 stisrof a tive eereeat2
used to maintain a constant bit rate and keep the digital i eee system in
stream, SONET (Synchronous Optical Network) '$ 6 sneer clock’
which all the clocks in the network ‘are synchronized ee eal zie
reference-SONET frames are then positioned within the clocl — 4
yr tet tae o yetho!
tail how an error could. be détected using the:Gheéksum ™
jetection. ! i
fat do you mean by flow control problem? te
c) What is an ARQ? Discuss about the-different- operations
Wait ARQ. i |
Answer:
a) A checksum is a simple type of redundanc
Ervors frequently occur in data when itis written to a di
or otherwise manipulated. The errors are typically. ‘very Sm,
jncorrect bit, but even such'small errors can greatly affect ‘the
ed by Stop &
form
rere et WBUT 2015]
make it useless. ?
In its simplest fort, a checksum is created ‘by calculatirig the
other block of data using some algorithm and storing the’ aults Wi
» ata is retrieved from memory or received at the other'énd of d nietwoi
is calculated and compared with the existing checksum.
match does not necessarily mean the absence of er
was not able to detect any.
‘Among the types of errors that cannot
reordering of the bytes, inserting or deleting 2
cancel each other out. Fortunately, however,
“be detected ‘by si
jero-value
these errors éan. Be, i
(CRC). “Althoug!
sophisticated methods, such as cyclic redundancy “checks
CNET-EE-31 »POPULAR PUBLICATIONS:
techniques have the disadvantage of requiring greater system resources (in the form of
processor time and" bandwidth), this has| become an increasingly unimportant
ponsideration in recent years as a result of the continued increases in processor speed and
bandwidth.
by Flow control is the mechanism that ensures the rate at which a sender. is transmitting is
in proportion with the receiver’s receiving capabilities. ae :
Flow contro! is utilized in data communications to manage the flow of, data/packets
among two different nodes. especially in cases where the sending device can send data
much faster than the receiver can digest.
) I" Part:
‘Automatic: repeat request (ARQ)
‘When the receiver detects an error in a packet, it autom:
a protocol for érror’control in data transmission,
ally requests the transmitter to
resend the packet. ae
2" Part:
‘Stop-and-wait ARQ is a. method used to serid information between two connected
devices. It ensures that information is not lost due to dropped packets and that packets are
fcccived-in the correct order. It is the simplest kind of automatic repeat-request (ARQ)
method stop-and-wait ARQ sender sends one frame at a time; it is a special case of the
general sliding window protocol with both transmit and, receive, window sizes equal to 1.
‘Afier sending each frame, the sender doesn't send any further frames until it receives an
the receiver sends an
acknowledgement (ACK) signal. After receiving a good frame,
ACK. if the ACK does not reach the sender before a certain time, known as the timeout,
the seridersends the same frame again.
Propagation time:
$ ACK trans
4 miision time
“Tiene-out faves
Frame 0 tosis
| Nectransai4. a) ise '
2 wat doyeunt tedentmade of operation pafomed by HOLC:
©) What is b; Y data transparency and bit stuffing in HOLC? 20
Answer; ‘Wldth-dolay product? i pweuT
7
2) te Hbuc Protocol is a general purpose data link control protocol caPal
a 1B a range of modes of operation. The two most prevalent modes are: aU
© best-effort or datagram servic: In tis mode, the packets are cared fee the
meh 29d a bestetfort delivery is performed (ie. there is no guarantee that oe
Fonte bythe fame will be delivered) The link layer doesnot provide a
Toe Ot os frames, This mode is used for point-to-point links carrying a noc
Fallon gh elf uses ‘datagram packets (eg, (P). The contol field of HOU
serving aes field arid isthe second pat ofall HDLC frames. The bee
Ice is provided through.the use of U (un-numbered) frames consisting of a $1
byte withthe value of 0x03, : F
* The Asynchronous Balanced Mode (ABM): Tis provies aieliable data point to"
deta lnk service and may be used to provide a service which suppor either 2
datagram or reliable network protocol, In this mode, the packets are carried
numbered Tames, which ‘are acknowledged by.the receiver using mumberes
erbervisory frames. Error recovery (e.g. checkpoint or go-back-n error, recovery) #8
employed to ensure a well-ordered and reliable low of frames. 2
ple of
b) Refer 10 Question No. 2.0f Short Answer Type Questions.
©) The'Bandwidth Delay Produet, or BDP for short determines the amount of.data that
~ can be in transit in the nétwork. It is the product of the available bandwidth and the
lateney, or RTT. BDP is a very important concept in’a Window based protocol such as
TCP. It lays an especially important role in high-spéed /high-latency networks, such as
most broadband intemet connections. It is one of the most important factors of tweaking |
TCP in order to tune systems to the type of network used.
The BDP simply states that:
BDP (bits) = total_available_bandwidth (bit/sec) x round.trip_time (sec)
of since RWIN/BDP is usualy in bytes, and latency is measured in milliseconds:
BDP (bytes) = total_available_bandwidth (KBytes/sec) x round: trip_time (ms)
the basic difference between CSMA and CSMA/CD? _...WBUT 2016]
do you mean by back off factor in case of CSMAICD protocol?” *
4) What is the working operation of stop and wait ARQ for lost acknowledgement?
) Selective Repeat ARQ of the window size must be at most 2/2, Explain it.
Answer:
a) CSMAICD is a protocol that cain detect collision where as CSMA. is unable to detect it.
b) If-a collision is detected, the transmitting station stops sending the frame data and
sends a 32-bit "jam scquerice’. If the’ collision is detected very early in the frame
transmission, the transmiting station will complete sending of the frame preamble before
CNET-EE-33POPULAR PUBLICATIONS
starting transmission of the jam sequence. The sequence jam is transmitted to ensure that
the length of the collision is sufficient to be noticed by the other transmitting stations.
‘Aner sending the jam sequence the transmitting station waits a random period of time
Chosen using a random number generator before starting the transmission process over
The: probability of a repeated
from step | above. This process is called "backofT".
collision is reduced by having the colliding stations wait a random period of time before
°
+ If the sender receives a damaged ACK, it discards it.
+ When the timer of the sender expires, the sender retransmits fram:
= Receiver has already received frame 1 and expecting to receive frame 0.(R=0),
Therefore it discards the sgegnd copv of frame kL me -
oi Ga ‘
A :
D S=1
nocoud © set ; :
seo
Tne ne |
@)
Steae + Ribas
PEE] /—~Sxe
. s /
eLya a PEPE)
7 :
rune out [EE}2T3] BE] teow [STS brrBion.
- Z [Erroneously |
ecoleSin é
ae cite SrA reves windows must be at moa one-half of 2 hee sire
of) Wha Hl by Figcompae window sie of wih wit oy
ON exng 3 adall ACK ae a sender sends dupcatof ame Oona he
Ist fame cto rective fase (part of the window), so accepts frame 0» 3°"
StMrame ofthe next Cycle ~an error,
8. Write short not
| '28 on the following: aut 2018)
a) Hamming Cod my
4) Go tacky "ARQ iweur201
Answer:
4) Hamming Code: ashi
m 7 ionship
Hamming code can be applied to data units of any length and uses the relations!
between the data bits ‘and redundant bits as discussed,
Yow ¢
Po TE 6 45 ge
a Ce CoC
Wee
Redundant bits
* ee anaes ie kame Ss g
Basic approach for eror detection by using Hamming code is as follows: tl
* To-cach group of m information bits k party bité are added to form (m+k)
code as shown in above figure. Tae
toeation of each ofthe (m+) igs is assigned a decimal val ee
ek parity bits are placed in positions 1,2, wal positions.-K parity cl
are performed on selected digits ofeach codeword. ‘EE
+ At the receiving end the parity bits are fecalculated. The Secimal value of
parity bits provides the bit-position in emo, ifany.
CNET-EE-35dy dy dy fe Gh fe
Gilelt Te[o FAS]; Data 1010
(Jo T Tete T=To) Adding, .
‘ 1
(PoP TOTATe] -Adaings,
[Eo Tole TsT9] -Adaingr, i j 4
TJo [1 [o[oT 110) Data sent
corrupted
TLALAST OL 110) Received Data ¥
t 11
B 2, Eyror position =6 CC, C,
~ 1.7.0:
és [iToTsToFoT1 1] corrected data ‘
Figure _- Use of Haniming code for error correction for a ‘Abit data
Figure above shows how hamming code is used for correction for 4-bit numbers
(Gidsd2di) with the help of three redundant bits (s.r). For the example data 1010,
first ri (0) is calculated considering the parity of the bit positions, 1, 3, 5.and 7. Then
the parity bits ris calculated considering bit positions 2, 3, 6 and 7. Finally, the
parity bits rs is calculated corisidering bit positions 4, 5, 6 and 7 as shown. Tf any
corruption occurs in any of the transmitted code 1010010, the bit position in error can
be found out by calculating rsrari at the receiving end. For example, if the received
code word is 1110010, the recalculated value of rarart is 110, which indicates that bit
position in error is 6, the decimal value of 110. 5 ' - ,
b) Go back-N ARQ:
| © Receiver sends Ack for the correctly received frame
«An Acknowledgement field has a meaning of “next expected sequence number”
(Example: Ack 2 means “next expected packet sequence number is 2 and all
. packets up to'2(0, 1) are received) ‘
* Sender keeps on sending frames (limited to the Window size) and receiver keeps
on acknowledging. a
| © When a frame is damaged, receiver sends a Reject control packet (Nak)
: : CNET-EE-36e
Sendet poes b-. ith
“tae Oo the Rejected frame and sends al te frames startin
One even if those frames are already sent to the receiver
"Sender's by
<1'8 buffer size = Wit i ,
Resse dee iad sie
tan Gorba-S ARQ
ia i Bit stuffing needed in the control field of HDLC data frame?
riefly discuss the Token management using priority in IEEE 602.5.
x [MODEL QUESTION]
Answer: 5
4) HDLC frames canbe transmitted dver synchronous or asynchronous links. Those Tinks
have no mechanism mark the beginning or end of fame, othe beginning and end of
each frame has to be identified, This is done by using a frame delimiter, or flag, which is
unique sequence ofits that is guaranteed not to be seen inside a frame. This sequence
is 01111110, of, in hexadecimal notation, 7. Each frame begins and ends with 2 frame
delimiter A frame deliniter atthe end of a frame may also mark the start of the next
frame, A sequence of7 or more consecutive I-bits within a frame will cause the frame t0
be aborted.
rechnology created by IBM to
ized a copper coaxial cable to
shared printers etc.) to the
b) Token Bus'was a 4 Mbps Local Area Networking t
connect their terminals to IBM mainframes. Token bus util
connect multiple end stations (terminals, wokstations,
mainframe, The coaxial cable served as @ common ‘communication bus and a token was
treated by the Token Bus protocol to manage or arbitrate’ acces to the bus. Any station
that holds te token packet has permission to tansmit data. The station releases the token
when it is done communicating or when a higher priority device needs to transmit (such
J the mainffame), This keeps two ot more device from transmitting information on the
bus at the same time and accidentally destroying the transmitted data.
‘Token Bus suffered fom tvo limitations, Any filure in the bus caused all the devices
beyond the failure to be unable to communicate with the rest of the network. Second,
CNET-EE-37—
POPULAR PUBLICATIONS:
adding more stations to the bus was somewhat difficult. Any new station that was
improperly attached was unlikely to be able to communicate and all devices beyond it
were also affected. Thus, token bus networks were seen as somewhat unreliable and
difficult to expand and upgrade. ‘
F
CNET-EE-38MEDIUM ACCESS SUB LAYER
Multiple Choice Type Questions
1 i .
When host knows its IP address but not its physical address, I.c20 fod a 20161
a) RARP RP a) IGMP
Answer). b)ICMP _ OAT
yyeral
2. A network which is used for sharing data, software and hardware among 6017]
users owning microcomputers is called [we
a) WAN DUAN )MAN d) VAN
Answer: (b)
1
3. What is the minimum size of a IP packet? : wou a
a) 16 byte b) 10 byte * ¢) 20 byte 6) 32
Answer: (¢) :
inthe Random-access method there is no collision.) A yes ond
a) ALOHA b) CSMA//CD c) CSMA/CA i) Token-passing
‘Answer: (4) .
5, The t-persistent CSMA CD can be considered as a special case of p-persistert
approach with p equal to [MODEL QUEST!
a) 04 b) 0.8 1.0 d) None of these
Answer: (c)
6, IEEE 802.5 standard is [MODEL QUESTION]
a)Token Ring —_b) Token Bus ¢) LLC d) FDDQ
‘Answer: (2)
7. How much channel throughput of slotted ALOHA will be in comparison 10 pure
Aloha? : [MODEL QUESTION]
a) Same b) Double c) Three times’ _d) None of these
Answer: (b)
8. Inwhich OSI layers does FDDI protocol operate? |ODEL QUESTION]
a) Physical b) Datalink, -,_c) Network d) (a) & (b) both
Answer: (b) 4 2
9. PPP i8 8 sevssnsnser Ofiented protocol. [MODEL QUESTION]
a)phase—' ” b) bit ©) byte d) none of these
Answer: (c)
CNET-EE-39Answer: (¢)
POPULAR PUBLICATIONS
40. Which of the following network architectures does not use the token passin
accoss method? 3 [MODEL QUESTION}
a) IEEE 802.4 b) FODI «) CSMaIcD @) IEEES02,5
Short Answer Type Questions
an by MAC and LLC? Explain. [WBUT 2014)
: In any broadcast network, the stations must ensure that only. ‘one station transmits
at a time on the shared communication channel. 7
The protocol that determines who can transimit on a broadcast channel are called
Medium Access Control (MAC) protocol.
‘The MAC protocols are implemented in the MAC sublayer which is the lowet
sublayer of the data link layer.
The higher portion of the data ink layer is often called Logical Link Control
ac. : x
* f reneoonk Liner He Shes h
a ‘ ae | tosiesttine =] s ‘
- : Zs | “Convo! ,
f + "BS Pitetiam access Fie, 3 .
: * 2 38 * Control : a i
fa ge TF [epee fe
“Layer 2 uses Logical Link Control (LLC) to communicate with the upper-level
“layers.
Layer 2 uses Media Access, Control macy, to decide which computer ‘will
transmit.
LLC ‘serves to communicate upward ‘to Network ayer, independent of. the
- specific LAN technology used and Upper layer.
MAC serves to access and communicate downward to the technology-specific
Physical layer. 8
CNET-EE-40(ur 2016)"
\S OF appropriates size,
Of for arandom time iteor idle. When
n rt netial Sequence called “Resuet to
"0 Send (CTs) als fra short while Rank a
transmits frames Or ae 4
Feceiver in turn to send
Feeds: wence. Orily upon receiv,
* OF else, it agai = Only iving aC
TS does the station
3.-Find Ssio) ; ne ;
Cus for average deta id
and slo} HA. Compa rorman
s t
ted ACB mpare their pe; formances as well,
Per second. Als
distribution with mean G Per frame time, j
P() = Gk ed ; y
Thus; P(No frames
Now, throughput =
Hence, S = GP(0) ?
Collision happens if anothér frame is
This is P(0) = e?¢ :
Solving for S we get _ :
Maninud throughput occurs at G = 0.5, where $= 1/2e = 0.184
CNET-EE-41
Eenerated in frame duration) = ¢©
G * P(transmission is successful)
Senerated during twice the time duration of a frame.POPULAR PUBLICATIONS
Inlotted ALOHA, we need to check for coll n of frame because
po new frame can start within that time (collision can happen at the beginning only). Thig
jves Us:
i S=Gere
a) Pure Aloha is a Continuous time system whereas Slotted ALOHA js discrete time
Comparisor
system. 7
by Pure ALOHA doesn't check whether the channel is busy before transmission.
Slotted ALOHA send the data at the beginning of timeslot.
Pure ALOHA not in to time. Slotted ALOHA divided in to time Poe
[WBUT 2017}
4. Explain . What is its usage? -
Answer: :
CSMA/CD is a modification of pure Carrier sensé multiple access (CSMA). CSMA/CD
used to improve CSMA performance by terminating transmission as soon as.a collision
detected, thus reducing the probability of a second collision on retry.
‘cause all transmitters to back off by randorn intervals,
A jam signal is sent which wi
reducing the probability of a collision when the first retry is attempted.
CSMA/CD is a layer 2 access method, not a protocol of the OSI model.
“There fs data from.”
user to send i
Recovered
‘Collision recovery
‘subalgoritn
Nor
Recovered
We
4 "Frame transmission failed
+ ‘(loo many collisions)
So) Frame transmitted
‘successfully =
(CNET-EE-426, Discuss the pri
Angwhet® Princes of o
A wireless L, it | area network, someti uP
AN (or WLAN, for wireless 1Oca HO Tmobile user CANO 1 Be
LAWN, for local i is
ie ates le stwork) is one In 4 E
-a wireless network) (radio) connection. The Cae us!
local area network (LAN} a wireless
of ‘standards ally ii args far wireless LANs. oa on
Ethemet protocol and CSMAJCA (carrie sense multiple AC8° iv atent
for path sharing and include an encryption method: the es
algorithm, cute a relatively low-cost wire
High-bandwidth allocation for wireless will make possible Fel" made in ur Pe
classrooms in the United Sexes A similar frequency allocation has °° 8. whe
Hospitals and ‘businesses are also expected to install wireless ie
existing LANs are not already in place. 3 jer can
Using technology from ie Seance Networks, Ltd., a wireless a Lath TA) card
rade to fit on a Personal Computer Memory Card Industry Association
for a laptop or notebook computer. - a is
.on Point to Point and Multi-Point tc
nection?
jODEL QuesTiON]
nce betwe:
+, 6. Explain the di
to another in 3
‘are examples
sts
Answer: ee en
A point to point cornection is one in which data can flow from one point to
unidirectional or bidirectional manner, A telephone connection or RS 252
of point to multi-point connections*In a point to multi-point connections:
ae simultaneously cSinected,to each other ii.one.or more shared data PR Mts. 1,
Connection, for example a bus connection as in Ethemet, allows one
simultaneously send data to all hosts (broadcast) or ‘a subset of hosts (multicast).
\ 7. What are the basic differences between Pure ALOHA and Se ALOHA TION]
‘Answer: LA : "
1) Pure Aloha is a Continuous’ time’ system whereas Slotted“
system, ‘ - a ae
2) Pure ALOHA doesnit check whether the channél is busy before transmission.
Slotted ALOHA send the data at the beginning of timeslot. $
3) Pure aloha not divided in to time. Slotted aloha divided in to time
‘Aloha is discrete time
8. a) Differentiate between FHSS and DSSS spread spectrum. [MODEL QUESTION]
b) Why address field is always set to all 1's in PPP frame format? “Sh
Answer: $
a) FHSS (Frequency-hopping spread spectrum) is typically used. by wireless mobile
devices such as blue tooth and wireless phones. The transmission: distance of FHSS is
shorter and not very ‘reliable. DSSS is used by, wireless immobile devices. The
transmission speed of DSSS is faster than FHSS and is more reliable.
CNET-EE-43by The address field of PPP header indicates which recipient receives the frame. Now
Bhp being @ point-to-point protocol, there can be only one recipient, Henge the address
frust always be all Tos. a
9, Why is CSMA/CD not implemented In WLAN? “[MODEL QUESTION)
Answer: ee
-_ AtWineless LAN: a transmitter never gets to know whether its data got corrupted while
D. That is: it never can detect collision. Henée, CSMA/CD, which is based on
fon detection, is based on collision detection, is not used in WLAN:
[MODEL QUESTION}
40. i) Why bit stuffing is needed in HDLC frame?
the purpose of the jam signal in CSMA/CD7
Answer:
) Bit stuffing is the
provide signaling information to a receiver.
+ remove or disregard the stuffed bits. “ oe ss
For example. the timing or bit rate of T-carrier system signals is constantly synchronized |
bomeen any terminal device and an adjacent repeater or.between any two repeaters. The
Ponchronization is achieved by detecting the transition in polarity for 1.bits in’ the data ;
ein Int signaling uses bipolar signaling, where each successive bit with a value of 1
ifopresented by voltage with a reverse polarity from: the previous bit. Bits with a value
iO ure represented by a no-voltage time slot). If more than 15 bits in arow are sent with
SO valuc, this “lull” in 1 bits that the system depends on for synchronization may be long:
aOugh for two end points to become out of synchronization. To handle this situation (the
SEquence of more than 150 bits), the signal is “stuffed” With a short, unique bit pattern
Gen includes some 1 bits) that is recognized as “a. synchronization ‘pattern. ‘The
receiving end removes the stuffed bits and restores the bi
In anotkcr example of bit stuffing,-a standard HDLC packet begins and ends with
T1106. To make sure this sequence doesn’t appear again before the end of the packet,
inserted after every five consecutive 1s.
Stuffing is defined by some to include bit padding, which is the addition of bits to'a
Bae eufacion to make the transmission unit conform to.a standard size, but is distinct from
bit robbing. a type of in-band signaling: ~ : ’
sertion of éne or more bits into a-transmission unit as a way to | +
‘The receiver knows how to detect and! |”
im access control protocol requires carrier Sense and +
there is no collision
it'-stops
i) Acnetwork-in which the mediu
Where a station always starts transmission by sending-a jam'signal;
With jam signals. from. other stations, it begins sending: data; otherwise,
\ransmission and then tries again later. 2
CDMA technology. [WBUT 2014]
rmat. Why padding is required?
CNETF-EE-44. 00 >TTT ROE
b) Ethemet traffic is. tre
Answer
4) In celular
for Matite Con
mere are two main competing network technologi
Ore of the baye stions (GSM) and Code Division Mulile Access (CDMA) ral
Lransmiters 19 gong oN°eP'S in data communication is the idea of allowine °° o6l,
cept #
sain
This allows sey. information simultaneously over a single communication ©
Called mulpten; tt share a band of frequencies (see bandwidih), This Om
Scheme (Where COMA employs spread-spectrum technology and a special ©
"Multiplexed ones oct 2"smitter is assigned code) to allow multiple: users tO
MA) ‘divide, the same Physical channel. By contrast, time division multiple oA)
divides by “eee BY time, while frequency-division multiple, access (FDM
“modulated gueney, CDMA js ia. form of spread-spectrum signaling, since
Communizated, . “8t2! has much higher data bandwidth than the data
i ransported in units of a frame, where each frame has a definit®
‘ingen The form of the frame is in the figure below. a
feamble [Dest Addr [Sre Addr [Type [Data crc]
The Preamble Field (8 bytes, 64 bits) is used ‘for synchronization. The first
ae ates Contain the bit pattern 10101010 and the eighth contain the pattern
11. :
eee ‘Address specifies the Etliemet address of the destination station, 48-
¢. » Source’Address specifies Ethemet address ofthe source station, 48-bits” eS
. Type field specifies the type of data encapsulated, e.g. IP, ARP, RARP, etc, |
its ads 2G i :
“Data Field carries 46-1500 bytes of data. If data length is lower than 46 bytes, it
Must be padded'to 46 bytes, . be.
*" CRC or Cyclical Redundancy Check, used for error detection °
‘The reason why there is an upper limit to the length of the data field, is fairly obvious —
so that each station gets a fair chance with the channel. The lower limit, and the reason
for padding in case that limit is not met, is as follows: De :
Suppose a station at one extreme of serids a very short frame. Before this frame reaches
the other extreme, another station starts transmitting since it saw that the channel was
free. This of course leads to collision but the fact that collision happens must travel back
to the first station for it to realize that and that must happen’ before it has finished with
transmitting the frame. Thus the minimum frame size is of duration. twice the time.
signal takes to travel from one end of the network to the other, which is roughly 5 micro-
seconds on a |, Km long cable. 802.3 standard therefore specifies that the minimum data
length is 46 bytes which must be padded up if not present, &
CP in case of
2. Explain in detail the concept of connection establishment using L(
PPP, 3 ies [WBUT 2015] ©
CNET-EE-45