0% found this document useful (0 votes)
658 views111 pages

Computer Network Organizer - Modified

Uploaded by

Souvik Paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
658 views111 pages

Computer Network Organizer - Modified

Uploaded by

Souvik Paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
a Be STE ae OPULAR PUBLICATIONS 2 OVERVIEW OF DATA COMMUNICATION 2 i a AND NETWORKING : i. 5 i Multiple Choice Type Questions i 4. Ahubis a ‘ . -[WBUT 2013, 2016] a) router > b) bridge c) repeater d) all of these of Answer: (c) : : - a ms. Z te 4 “4 ad 2. Repeaters function in the as layer [WBUT 2014] of a) data link b) physic: ¢) network d) transport * Answer: (b) * 3. Which address cannot be changed? ; a) Hardware address b) logical address. © * [WBUT 2014] ¢) both (a) and (b) d) none of this Answer: (a) : Pe : 4.A______ is a device that forwards packets between networks by processing | the routing information included in the packet. [WBUT 2015] 4 a) bridge _ b) firewall ©) router 4) switch 4 . Answer: (c) : s Ge . 5. Which transmission media has the highest transmission speed in a network? i a) coaxial cable b) twisted paircable- [WBUT 2015] ©) optical fiber 4) electrical cable ft Answer: (c) : a wis F 6. Which of this is not a network edge device? : _ [WBUT 2015] : ape. ‘b) smartphone c) servers. |, d) switeh ] | Answer: (d) ke 3 é l 7. The total number of links required to connéct.n devices using Mesh topology is ce a) 2" b) n(n ¥1)/2 (WBUT 2016) : e) n(n=1)/2 d) i ; Answer: (c) a x Lg 3 8. WDM methodology is Popularly used for > IWBUT 2017]... ‘ a) twisted pair cable b) coaxial cable is ¢).optical fibre >, d) wireless transmission Q Answer: (c) it é : id a : y CNET-F"-2 i Fs i in wa ns, hich transmission takes place in both gis 30 Ime, Is upiex °* _ gy Half duplex omMMunIe, a) ne qmuni ) Simpen® diragth cation ¢) Four wire circuit to of a network [weuT 2017] b) Full Duplex Time Re d) Data Travelling time bit stream 0001110101: 4 [WBUT 2013, 2016]. 4 ae so : RZ i “ ‘Manchester. ; Hoyt ont af = a ii) : t : Dittevential it Manchester iealae e184 ota} 2. What is Bit Rate? What is Baud Rate? (weur 2013, 2014] An analog signal carries’4 bits in each signal unit. If 1000 signal res ‘second, find the baud rate and bit rate. ignal units are sent per CNET-EE-3 “x= 10 og rat x [Oo ratio= 100g 2)= 10nlog2=3n eB - X= 10 og ratio= 10 log (10%) = 10k og 10= f0k dB ; 1's) transmitted in one te is a Measure eof the number of data bits (that's O's ind bat A figure of 2400 bits pe secind 1 ‘means 2400 zeros or ones can te tragsmitted in, ‘ene second, hence the abbreviation bps’. « Baud rate by definition means the number of times a signal in @ communications channe| changes tate For example, a 400 baud rate means tha the channel can ae states up 0 240 ties per second. a Parts: There 100 ial nis rset pe sd And each signal caries bits, as wen = ( Bitrte=No, ois per secnd= 4] O00bi/se.=4O00bie, Abs, Wier Badrte= = No. of signal unis pr send = 100bitsbic.= tp va 28 of fi " cable over twisted pair and Coaxial : anit down the advantages of fibre-optic oe ne Answer: : Oplcal tres cable wth numerous seni : Lightweight : as Immune to noise f Low attenuation : Tolerates data rates on the order of 100 Migs . Bandit fom tes of megan ee eet oeneande fibre) +) Suppose that a signal has 2" times the power as a cise signal that is added to it Find the SNR in ack. “ 5 beled) Answer: : + lop? : x= 10log 10= 10 dB i The lito, you needa value fornork, itd elds » 4. How does Manchester ‘encoding differ from sitet /Manchester encoding? “WBUT 2014, 2016) Sie th dfrences between Manchest and Differential Manchester encoding Schemes with an example, eur 2015), Answer: Asinple example ofa Pe Layer protocl iste Manchest eneaing techique tse on copeabled loa ret networks (LANG). hs isa scronous poco, because iis aso the ich” ofan elect timer Each nay bi is acted 4 " fixed slice of time, At the middle of that time slice; if the voltage na from low to CNET-EE-4 4h ii isis he ‘ie Ofte gs ‘ olov tn i hay tei os 8 os eal cig SH i est it ty a0 : 20.7 ade Exits Seka pt sgl tg: si ea tna in aa cs tl, ie Matte js ff aie fag tay ca et tie uae a ea) 0 Mane Excl stant ‘Avataiono “eth fet ei ce ie ih a en i Fenn ioe, TE Ta Alan hE die il Mace Eng Dia i isso Fades ge aoe fe "pie odie i” channels? stmt _ ae ba amas : aay dss el ba ww arma dans i800 es ne x éa)vhaisTO. ; hein dap cits oH SPM ps ona the bitrates 480 bps wat is the baud rat Aner a) Timéivisn mile (TOM) 2 nd of puting mule cata steam it singe ipa ty sep he ital ‘nto many Segments, veoch having’ a Ven) short en Eh inn aura see esting ed based ov He ‘ining, om ee ‘i 1) Te sli ics AEPSK wih points 45 dees oat Since 21=8 3 si sited instil i Te, baad is $0/3= 1600 bud. dies oe in 2 ol dai whereas iil adress has” cx, eine bani ami {wBUT 208) CNET-EES 1. Postal jbal domain , | : Battle.net service, POPULAR PUBLICATIONS DA Physica i Si i M of the NIC card which ical ad is a 48-bit flat address burned into the RO! ; 2 A TMET device stake OSI model. This is divided into 24-bit veiidor code and 24-bit i is is uni : hanged. address. This is unique for each system and cannot be chang ; in Topeal address is 2 32-bit address assigned to each system in a network. This works in Layer-3 of OSI Model. This would be generally the IP address. : : ii) Physical address also called MAC address. It is present on Network interface cad. It won't change. ‘ : Logical addressing is used when a packet passes n/w'boundary. Band Width: : . ; 3 Bandwidth (computing) or digital bandwidth: a rate of data transfer, througtiput or bit rate, measured in bits per second $7 iE : af ; ith (signal proces h:-a measure of the width of a range of Bandwidth (signal processing) or analog bandwidt -frequencies, measured in hertz. _ 3 i 8. Explain Client Server Model. What is the Idea of web based e-mail, [WBUT 2017] Answer: 5 oo Se The client-server model describes how a server provides resources and services to one or j more clients. Examples of servers include web servers, mail’ servers, and file servers. Each of these servers provides resources to client devices, such as desktop computers, laptops, tablets, and smart phones. Most servers have a one-to-many relationship ‘with clients, meaning a single server can provide resources to multiple clients at one time. When a client requests. a cormection to a server, the server can either accept or reject the connection. If the connection is accepted, the ‘server éstablishes and maintains a connection with the client over a. specific protocol. For example, an email client may ; Tequest an SMTP connection to a’mail server in order to Send a message. The SMTP application on the mail server will then request authentication from the client, such’as the email address and password. If these credentials match an account on the mail server, the server will send the email to the intended recipient. ae Online multiplayer gaming also uses the client-server model. One example is Blizzard's which hosts’ online-games for World of Warcraft, StarCraft, Overwatch, and others. When players open a Blizzard application, the game client automatically connects to a Battle.net server. Once players Jog in to Battle.net, they can see who else is online, chat with other players, and play matches with’ or against other While Internet servers typically provide connections to multiple clients at a time, each Physical machine can only handle so much traffic. Therefore, popular online services distribute clients across multiple physical servers, using a technique called distributed Computing, In most cases, it does not matter which specific machine users are connected to, since the servers all provide the same service. : 7 CNET-EE-6 ‘ji . e : Client-Server Model ese are UST p Web based e-mail: Webmail are web-based email account gotmail, GMail accounts that aré operated from a website. Examples ieee ‘an internet Mail. “ they have access at email or Webmail llowsthe users to access their emails a5 107%, ee reat connection anda web browse, This also means tat ue draft a new email offline. tion. What . ". ¥ . odulation: 70171 Pei r «nd Frequency ™ weuT 2 istinguish between Amplitude modulator rode fibres?- the difference between Single mode and Answer: xt § [+ Amplitude Modulation Tn AM, a radio wave-known as the “carrier” or “carrier wave" is modulated in amplitude. by the signal, that is to be transmitted. ‘The frequency and phase remain the samme. (OR) Up to 1200 bits per second. [ remain the same, ____s "AM radio ranges from 535 to 1705 KHz “| bits per second. M radi from 88 to y Modulation "AM stands for Amplitude Modulation Frequenc} EM stands for interference thal in AM. “AMChas poorer sound quality compared “with FM, but is cheaper and canbe ‘transmitted over long distances. It has a lower bandwidth so it can have more FM is less prone to i However, FM signal physical barriers. FM h quality due to higher bandwidth. Is are impacted by as_ better. sound: stations available in any frequency range. CNET-EE-7 POPULAR PUBLICATIONS { 2" part: \ E Single mode Multimode cal Coating | Coane } ites very Straight Paths Glass + * Multiple Paths Sia, Goting Glas Coe : Claldine Glass Coe = BS Misom — =5#Hinms FS ra = a Mirae Small Core * Larger Core than Single-Mode Cable Co + Less Dispersion microns or greater) * Suited for Long- Distance Applications | * Allows Greater Dispersion and thereforg (Upto~3km) Loss of Signal fl * Uses Lasers as the Light Source Often |* Used for Long-Distance Application, but within Campus Backbones for] shorter than Single-Mede (Upto ~2km) Distances of several Thousand meters | « Uses LEDs as the Light Source Often, within LANs or Distances of a Couple Hundred Meters with a Campus Network Pee 1 in computer : ig the [WBUT 2014, 2016) There are four basic types of Guided Media: © Open Wire 5 Twisted Pair * Coaxial Cable + Optical Fiber Open Wire i - | Open Wire is traditionally used to describe the electrical wire strung along power poles, There is a single wire strung between poles. No shielding or protection from noise interference is used. This media is susceptible to a large degree of noise and interference and consequently not acceptable for data transmission except for short distances under 20 ft : Twisted Pair The wires in Twisted Pair cabling are twisted together in pairs. Each pair would consist. of a wire used for the positive data signal and a wire used for the negative data signal. ‘Any noise that appears on one wire of the pair would occur on the other wire. Because, | the wires are opposite polarities, they are 180 degrees out of phase and the noise CNET-EE-8 = = PPearin, SYSteMs that yen te ect lat ancels 5 r¢ most © he degreg Se a balance Tl ou, Twisted Pair cables a il UMS pep lution pe method of transmission sfcally OY Oc fath pe resin inererence is determine’ ese interferer iste pairs, PV morgen ots per fet re ‘a idis wove” around th ion, a foil or wire braid Coaxial Cab eg axial ¢, % sult Sh Cable co «eld inside a9 IS" ive With the MSiStS af tye : ris ‘ rect! 0 Cor in nductot "1 ing, P' coating ther conductor wo ductors. The inner Eom 4” An jnsulati fl ie et can alled a jacket equen around it providing 4 $7 ield protects (PE ctor ctor fh overs the outer conductor. ThE OUT SIT He qutel CON ner .ctOr ftom, ida! (it ng il sits. The dane betwee nats il * conductor plis the type of material used gs for © in the cable ee aia ‘Typical mpd Saal the mt ca eps mr hernt TNE! ST gata rates excellent te trangia tthe impedance characteristics ofthe cable allows hi ‘red than Twisted Pair able: Optical Fit 7 re : Optical Fi : jes in the visti ee Consists ft ls fibres tat can cary information * frequentie a strand ‘ta Specirum and beyond. The typical optical fibre consists of a 8 ea he Sig ld ts Care, Around he Coe oneriacentic ye OF BSS ally yea Coders 62.5 rons (1 ier = 10-8 meee coats c ‘ladding Cladding has a di a diamete i § + of 125 microns, Coating the cladding iy ‘consisting ‘ Sorssing ofa, iti called the Jacket. Data i ans ‘G0 continuous total internal reflection. The eee fibre ire uade-off between capacity and cost ACEI sive, its heazerthacopper At ler transmission capaci its mor Fiber Number of | One air fables are ed Cable ee Single cables required | * gle Cable #$ M Electrical medi Tomination medium Is oe ‘mediums | Ejegrical medium is used ied Nowe | Nebeinmayis | Notseimmuniyis | Noise immunity low moderate. Conmuniction | Communication speed sed - munication speed IS. Speed | speedis low nearly 4 | moderate, nearly 500 a Te Gbps Mbps: Mbps ore Bandwidth |) LO™ Bandwidth, Comparatively high Very High bandwidth, | 3 MHz bandwidth, 330MHz: 2GHz } Dine | Ceram dee | —Coversmall dance, |” Covet Targe distance, | 21010 km. 110 10 km 10 to 100km f Usedin LAN, TE Used in Cable TV, i Usage Lines Used in Cable TY? __| Used in WANMAN ete CNET-EE-9 POPULAR PUBLICATIONS _b) What Is OS! reference model? : “DWBUT 2014) Answer: The Open Systems Interconnection Reference Model (OSI Model or ‘OSI Reference Model for short) is a layered abstract description for communications and computer . network protocol design, developed ‘as part of the Open Systems Interconnection initiative: It is also called the OSI seven layer model. The OSI model divides the functions of a protocol into a series of seven layers (listed as decreasing “distance” from the application software): Physical Layer a Data Link Layer Network Layer Transport Layer Session Layet Presentation Layer Application-Layer aA ee ferences betweeri OSI and TCP/IP model, [weUT 2014) - ‘OR, 1¢ differences of OSI reference model from Toe reference model? ; WBUT 2018) Answer: & Below we describe similarities and differences between the OSI and TCPAP models. Similarities The main similarities between the two models include the followin © ‘They share similar architecture — Both of the models share a similar architecture. This can be illustrated by the fact that both of them are constructed with layers. ¢ They share a common application’ layer - Both of the models share a common “application layer". However in practice this layer’ includes different services depending upon eac model. «Both models have «-mparable transport’and network layers ~ This can be illustrated by the fact that whatever functions are performed between the presentation and network layer of the OSI model similar functions. are performed at the ‘Transport layer of the TCP/IP model. «Knowledge of the both models is required by networking professionals — According to article obtained from the intemet networking professionals “need to know both models”. ** Both models assume that packets are switched — Basically this means that individual packets may take differing paths in order o reach the same destination. : Differences - ‘The main differences between the two models are as follows: * TCP/IP Protocols are considered to be standards around which the intemet has » developed, The OSI model however is a “generic, potocoFindependent standard”, CNET-EE-10 ~ intitive. I Itiative. It is also called the OSI seven layer model. tay i : pplication TCPIP combing aon and sesion ayers De ess OSI data lnk and physical layers it0 Nye to the fief , vot layer, 2 More simpler model and this mainly fe IP is consi .. jg mainly due," elol because ren sidered to be i . This is ma as deve three CP teas amare eile me ch the intern as in ores 4 » networks ne ttly exis erediabitiy due to this COP is idan’ "Ot Usually but around the OSt model © po ae TcPAP only at it fact i 1b e' Pt 3 5 Buidance too}, * The OS} mod : e Tayery Mel nsists of 7 architectural layers where™® th nes tions perto! ut OS! reference model mentioning the {°° pyBUT 2018). Answer: ce The m Fs iy ‘os Referen Sia Systems Interconnection. Reference Mode! (OSI Model oF oF computer eto) 8 ayered abstract description for communications a nection Mork protocol design, developed as part of the Open S¥stems i jisted a5 mee model divides the functions of a protocol into a series of seven layers ( Pheer S istnce” fom the application software): sf ona (Layer) Fe I Model, Layer conveys the bit stream - electricalimpulse, light o ough the network at the electrical aid mechanical level. It provi bles, ¢ naa of sending and receiving data on a carrier, including defining CaP cal. layer. physical aspects Fast Eee, RS232, and ATM. are protocols” wth-PIY components, 2 < .- cignal—~-- vr radio signa! re the hardware’. es js.and furnishes in the physical ded into two sul the Logical Link Control (LLC) the network gains access to the Is frame synchronization, flow Data Link (Layer 2) ‘At OSI Model, Layer 2, data packets are encoded an transmission protcol knoivledge and management ani layer; flow control and frame synchronization. The data layers: The Media. Access Control (MAC) layer and layer. The MAC: sub layer controls how a computer on data and permission to transmit it. The LLC layer control control and error checking ~ link layer is divi Network (Layer3). > ac Wee Layer 3 provides switching and routing technologies, creating logical paths, known a5 Virtual circuits for transmitting data from node to node. Routing and forwarding are functions ofthis layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing, ; ; 4 Layer 3 Network examples inclide AppleTalk DDP, IP, IPX. : CNET-EE-I1 i UBLICATIONS ae ‘Trinsport (Layer 4) i . (051 Model, Layer 4; provides transparent transfer of data between ond systems, or hosts, and is responsible for end-to-end error recovery and flow control, It ensures complete datg transfer. Mo ‘Layer 4 Transport examples inelude SPX, TCP, UDP session (Layer 5) This layer establishes, manages and terminates connections between applications. ‘The session layer sets up, coordinates, and terminates conversations, exchanges, ang » dialogues between the applications at each end, It'deals with session and: connection, coordination. é Le ot! Tg Layer 5 Session examples include NFS, NetBios names, RPC, SQL ay Presentation (Layer 6) ss “ : M This layer provides independence from differences in’ data representation (ep: encryption) by translating from application to ‘network format, ‘and vice versa,’ The Presentation layer works to transform data into the: form that the application layer can _Aecept. This layer formats and encrypts data 6 be sent across a network, providing ~~ freedom fom’ compatility problems. is sometimes called th syntax layer ; ‘Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF; GIF; PICT, 4 JPEG, MPEG, MIDI. agin SET ad Application (Layer 7) ~ ae hele OSI Model, Layer 7, supports application, and end-user. processes, Communication partners are identified, quality of service is identified, user authentication and privacy are Gonsidered, and any. constrains on data syntax aré identified Everything at this layer is ~ 4 application-specific: This layer provides aplication services or fle transfers, e-mail, and) other network software services. Telnet and FTP are applications that exist entirely inthe 7° | application level. Tiered application architectures ae part of ths layer, i 3. a) What are the ditections of data flow? Explain with suitable examples, i ! b) How do we measure the performance of a computer network? Explain, ‘i ¢) Discuss in detail different topologies for computer networks, 1 =) What is throughput? - Se | e) Di “DWBUT 2015] Answer: 2a j | ) Network devices use three transmission modes (methods) to exchange data, simplex, » half duplex, and full duplex. i ; ¥ + Simplex transmission ‘is like @ one-way street where traffic moves. in only one ,” direction. Simplex mode is a one-way-only transmission, which means that data can flow only in one direction from the sending device to the receiving device, Figure 1-7 illustrates simplex transmission, ° é ‘© Half-duplex transmission is like'the center lane on some three-lane roads, It is a single lane in which traffic can move in one direction or the othef, but not in both’ * CNET-EE-12 , “gn because directions at the same time al-duplex mode limits date transmission 3 and (7% device must ake tums using the line. Therefor, data can ow from A missio™ ach BUoA, but notat the sane fae, Figure I ilustates halfduples tan" apc, Coa Fllluplextransmisiog i ike 9 major Highway with 190 lacs 9 ie me lane sccommnadtn ac guing in oposite, diets: PAPE ides accommodates two-way simultaneous transmissio™ which eee fiow wo’? Send and receive atthe same time. In fullduplex mode, ait Eo ee and B (o A atthe same time, Figure 1-9 illustrates full-duplex 5) Measures of computer network performance are common pains (tos) This Many can eset either an actual data rate OF # theor lable network idth. th Modem tials ce ed large numbers of bits per second. Instead a ilo! 10,000 oF 100,000 bps, networks normally express these quantities in term megabits and gigabits, ‘The following equation ilusirate the mathematics behind these terms, . ‘I kbps= I kilobit per second = 1,000 bits per second ,000 Kbps ety <_* 1 Gbps= 1,000 Mbps ‘ fd, sara network speed can also be expressed in unt abbreviated as "Bps" with a capital 'B ae i : Use of these ume is Stoney discouraged in networking to avoid confusior bits per second standard: « : ad =8 KBS °°! ’. © FKBps=1:kBps = | kilobyte per second = 8,000 bits per second” ° "ot, Final he consent aed for neering the capacity of computer disks and memory ‘might appear similar at first to those for networks. , . Data storage. capacity is nonmally measured in units of kilobytes, mepabyies me sieabytes. In this nor etwork style of usage,‘ represents @ multiplier of 1,024 an represents a multiplier of 1,000 units of capacity. : The following equations define the mathematics behind these terms: 1 © 1KB=1,024 bytes © 1 KB=1,000 bytes © TMB=1,024KB #1 GB=1,024 MB «) Below five devices aranged in different network topology i) Mesh, : os per cate of bits PO ly stated in fig Kimit yoting Fiobits ts of bytes per second, n with the Number ofcable=10 i ‘ Each node is connected through a four cable. If one connection fails, the entire system does not halt ; » CNET-EE-13 POPULAR PUBLICATIONS , iy Sar Number of cable = 4 oa fone connection fails all other links remains active, ii Be, ‘Number of cable = 1 : 7 - Ifthe connection fails, the entire network goes down, £8 07s Deets one ps Bp. oes ie Number of cable = 5 ae } Ifone connection fails, the ring can disable the entire network: es 4d) Throughput is a measure of how many units of informatién a'system can process in a given amount of time. It is applied broadly to systems ranging from various aspects of computer and network systems to organizations. Related measures of system productivity include, the speed with which some specific’ workload can be completed, and response time, the amount of time between a single interactive user request and receipt of the response, 2 Babs, odie ©) The Intemet is a network of LAN’s that uses the IP protocol’at the network layer and covers the entire world. The Intranet is similar, i.e,;it is also a network of networks driven by the IP protocol. However, all the networks of the Intranet belong to the same organization. oe ‘An extranet is a private network’ that uses Intemet technology,’and the’ public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other business¢s. a 4. Explain TCPNP and/ADSL aa “[WBUT 2017] Answer: ee Soe 1" Part: “ ae OE ee ¥ L ‘TCP/IP: TCPAP means Transmission Control Protocol and Internet ‘Protocol. It is the network model used in the current Internet architectureas well. Protocols are’set of rules _ Which govern every possible communication over'a network. These protocols describe the.movement of data between the source and destination or the internet. They also offer CNET-EE-14 _ simple naming and addressing sehemes. It contains four layer OSI model. The layers are: Process/Application Layer 2. Host-to-Host/Transport Layer 3. Internet Layer ea 4. Network Access/Link Layer OSI Model TCP/IP Model [Application Layee ——y [Presentation Layer _—| come in the isi! antike sever 7°" * , | Application Layer Presentation ‘Session Layer ‘Transport Layer spon Layee Tntemet Layer ‘Network Layer Data Link Layer . ‘Network Access Layer Physical Layer Layer 1: Network-Access Layer als ee 3. Varies from host to host and network to network. Layer 2: Internet layer “ internetwork layer is called a internet layer. ie DARED Layer 3: Transport Layer i 2° Furictions such as multiplexing, segmenting ot splitting on 3. 4. 5. 6. Layer 4: Application Layer The TCPAP specifications descril Lowest layer of the all: : : to the host, so that the packets ci Protocol is uséd to connect Selection of a packet swi itching network which is based. an be sent over it na connectionless whole architecture to; . Its the layer which holds the ether ce dependently to the destination. ‘Tt helps the packet to travel in .. Order inwhich packets are received is di IP (Internet Protocol) is used inthis layer. 5. Tite various functions performed by the o, Delivering IP packets ©. Performing routing - 0 Avoiding congestion It decides if data transmission should be transport layer. The applications can read and write to the transport layer. fflerent from the way they are sent. Internet Layer are: oY: on parallel path or single path. ae in the data is done: by. Transport layer adds header information to the data. ne Transport layer breaks the message (data) into small units so that they are handled more efficiently by the network layer. Transport layer also arrange the packets to be sent, in sequence. ibed a lot of applications that were at the top of the : protocol stack, Some of them were TELNET, FTP, SMTP, DNS etc. CNET-EE-15 a Circuit Switching QaM. ' : [WBUT 2015] q Twisted Pair Cables “BUT 2015] Answer: ” & a) Circuit Switching: ai ¥ einer is a Wo-way communication protocol which allows connecting {0 a remote machine and run applications on it. ; FIP (File Transfer Protocol) is a protocol that allows File transfer amongst computer users connected over a network, Itis reliable, simple and efficient, , SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail between a source and destination, directed via a route, * 4, DNS (Domain Name Server) resolves an IP address into a textual ondtess for Hosts connected over a network. 5, It allows peer entitiés to carry conversation. 4 6. ‘It defines two end-to-end protocols: TCP and UDP «9 TCP (Transmission Control Protocol): It is a reliable “connection- oriented Protocol which handles byte-stream from source to destination’ without error ahd vo, _ flow’control. i © UDP (User-Datagram Protocol): It is an unreliable connection-less protocol that - | does not want TCPs, sequencing and flow control. Eg: One shot request-eply 4 » Kind of service. 2 Part: vf - opis ot fee | ADSL: Agmmetric digital subscriber line (ADSL) is a type of DSL: broadband Communications technology t used for connecting to the Internet. ADSL:allows more’ data'to be sent over existing copper telephone’ lines (POTS), when compared to traditional modem lines, A.’ special filter, called microfilter, is installed on’a subscriber's telephone line to allow : both ADSL and regular vaice (telephone) services to be used at tie same time, ADSL Tequires a special ADSL modem and, subscribers must be in close-geographical locations to the providers central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to.640 = when’ sending data (known as the upstream rate). f 5. List the layers of TCP model. Describe the function of each of the Layers with necessary diagram. How does the layer of TCP correlate with the OS! model? = QWBUT 2017] Answer: Refer to Question No. 1 a Par) of Long Answer Type Questions 6. Write short notes on the folowing: i [WeuT 2013] When ‘we or our computer places a telephone call, th itching équipment within the.‘ telephones system seeks out a physical “copper? Cineludng fibre and radio) path all the CNET-EE-! 16 ; ., called way from our tel et sei technique i uaa telephone to th icr's telephone. ‘This tec iq res! sitchin nds sho schemata in Fi (Fash of (Pr gs th carr withing offend ofl oe =) 7 wis eae erring omg coming lit te th ses throug ‘swil ig lines and three outgoing lines. When # call pass “he line on which th call ¢ 3 Physical connection is (conceptually) established Bt fi ms yecause f ines. the dotted Himes. ese, because Pars ich rowave links OM “145 ‘and on ofthe output nes, shown byte ‘The model shown in the: figure is highly simplified of O°” copper” path between the two telephones may, in Fach be microwire once a call thousands of calls are multiplexed. Nevertheless, the basic idea is, vals Ong unl been set up, a dedicated path between both ends exists and will continu the calli finished, i dtoend path pefore ‘An important property of circuit switching isthe need t0 set up an en att of inging any data can be sen, The elapsed time between the ‘end of dialing and Pe > im can easily be 10'sec, more on long distance or international calls. put ote that . iterval, the telephone system is hunting for 8 COPPCT path, as shown in FE YO aye before data transmission ean even begin, the call request signal must Late (ee way to the deitinaion, and be acknowledged. For many computer applicalio'™ " point-of-sale credit verification), long setup times are undesirable. Long. Lone. distance” distance office sh Trunk Trunk visto ample of Connection Over Public Circuit Switching Network ulation which is widely used’ * mmunications. It is widely such as. PSK, b) Quadrature ‘Amplitude Modulation: Quadrature Amplitude Modulation o QAM is a form of od for modulating data signals onto a carrer used for radio co used because. it offers advantages over other forms of data modulation s although many forms of data modulation operate alongside each other. ’ ers shifted in’ Quadrature Amplitude Modulation, QAM is a signal in which two carr phasé by 90 degrees are modulated and the resultant output consists of both amplitude Fd phase variation. In view of the fact that both amplitude and phase variations are,» present itmay also be considered asa mixture of amplitude and phase modulation. ‘A motivition for the use of quadrature amplitude modulation comes from the fact that a straight amplitude modulated signal, i.e. double sideband even with a suppressed carrier CNET-EE-17 “ocupies 'wwite the bandwidth of the modulating signal. This is very wasteful of the available frequerrcy: spectrum. QAM restores: the balance by placing two independent double sideband suppressed carrier signals in the sanie spectrum as one ordinary double sideband supréssed cattier'signal... > ° . ¢) Twisted Pair Cables: Refer to Question No. 1(a) of Long Answer Type Questions. - ].}What is the purpose of Guard Bands? [MODEL QUESTION) bj What is the relationship between FOM and WDM? c) In FDM, suppose there are 3 signal sources each having bandwidth 300 MHz, - find the minimum bandwidth of the path if 10 MHz guard bands are used. d) What is the drawback of synchronous TDM that leads to the concept of asynchronous TDM? 8 : ¢) Explain bit stuffing and interleaving in TOM. - Answer: a) Guard. band is a narrow part of the radio spectrum between radio bands, for the purpose of preventing interference. 3 i Itis.a narrow frequency range used to separate two wider frequency ranges to ensure that both can transmit simultaneously without interfeting each’, other. It-is used ini TDM/TDMA/FDM/FDMA. It may be used in both wired and wireless. communications, _ ‘0 that adjacent frequency bands onthe same media can avoid interference: b) fam: totil frequency bands are divided into several users" « . eg: television broad casting © Q i 4 vwdi: total wave length is divided in to number of users e.g: optical networking se i ©) For3 signals we require at least 2 guard bands. - ‘= maximum bandwidth =3 x 300 +2 x 10= 920 MHz.» / tomHe |. WOMHz Tf wt tt @) Disadvantages: af One drawback of the TDM approach; as discussed earlier, is that many of the time slot in the frame are wasted. It is because, if a particular terminal has no data to transmit at patticular instant of time, an empty time slot will be transmitted. An efficient alternative to this synchronous TDM is statistical TDM, also known as asynchronous TDM. It dynamically allocates the time slots on demand to separate input channels, thus saving CNET-EEA8 commen eee ny ve mai the ¢hanne qiPtcity. As with Synchronous TDM, statistical multiplexers al8° ter seats the input rit 2 buffer associated to each of them. During the input, the mule a receiving. end see Olecting data until the frame is filled and send ANY i i and distributes the dat appropriate bus fee demultiplexer receives the frame i ; . ission 12 inserting bits in data in order to break up a bit pattern that may cause the trans ine to go out of synchronization. For example, in T1 lines, timing is ‘maintained iby ote ig 2 change from 0.t0 1. If too many zero bits are transmitted consecutively, th he rec Fimay lose synchronization because too much time has passed with nn cing VON Therefore, in long strings of zeros, a set of bits that begins with a 1 and functi “ming signal is "stuffed* into the stream of zeros at certain intervals. e CNET-EE-19 * . popULAR PUBLICATIONS PHYSICALLEVEL: : Multiple Choice Type Questions 4. PPP isa... sa Oriented protocol. [WBUT 2013) .a) phase _ bpbit e ¢) byte d) none of these. Answer: (c) . : ‘ 2. What network topology implements at least two paths to and from each node? | . . [WBUT 2014) | a)bus b) ring c)mesh —* ‘d) star. ' ‘Answer: (b) 3 . b 4. Inthis topology there is a central controller or hub [WBUT 2015) } a) star b) mesh ) ring d)bus- : Answer: (a) i 4, The topology with highest reliability is : IWBUT 2017] ke a)bus topology b) startopology _c)ring topology _ 4) mesh topology i “Answer: (4) a §.Protocols are ©. WBUT 2017] a) agreement on how. communication components and DTEs are to communicate 184 F ') logical communication channels used for transferring data ©) physical communication channels used for transferring data d) none of these ; Answer: (2) 4. Whats transmission impairment? How many types of transmission impairments are three? Discuss them. +. WBUT 2013] Discuss about the different types of transmission impairments. :. » [WBUT 2015] Answer: if. Transmission Impairments is a condition that causes information to. be-lost in a signal. _ The following are some aspects of transmission impairments: (1).Atténuation, Signals loose power in.time, (2) Dispersion. Signals tend to: spread as they travel, with the amount of spreading dependent onthe frequency. (3) Delay distortion, Due to velocity of = propagation that varies with frequency. Thus, various‘frequency components of a signal ative at the receiver at different times. (4) Noise; sources. from Thermal, Intermodulation, Crosstalk. (CNET-EE-20 “switching for re-drranging received packets to get back the transmitted stream: 2. We have a ine have a channol with a 4MHz bandwidth. The SNR fer the ch Is the bit rato ar Auawee! Ind signal level? First, we use the Shannon formula to find the Upper Nirmit. ms IC = Blog, (1+ SNR) * log, 64 = 6 Mbps| we 2 (1+ SNR) = 10" fog, (1+ 63) = 10" 1OB: ance ‘The Shannon formula giver as @ Mbps, the upper limit. For beter Perfor 49 find ‘choose something lovee Mos for example. Then we use the Nyquist Form". the number of signal levels. 7 3 [4 Mbps = 2x1 MHizxlog, LL ss , : 2016) 3, Write down the advantages and disadvantages of mesh t9P0105Y- (weuT nswer: v" ii she ar eens te Gy ana ton ta commend voce er EGY, oe Communication path between any pair is dedicated and unhampered by the ‘£2! 2 rest of the network. jes when a link Be Disadvantage: Requires much more cabling. Also, fallback strategies when Q down, is not very well-defined : oS fein 2 2 *qweut 20171 4 What are the drawbacks of:mesh topology? ; inswer: ‘Refer to Question No. 3(2"4 Part) of Short Answer Type Questions. : “[MODEL.QUESTION] witching and packet switching. 5. Differentiate circuit 5 Answer: i Circuit switching e Packet switching ane Circuit switching establishes _ fixed | Packet switching is a Communication in bandwidth circui/channel between nodes | which packet are routed between node and terminals before ‘the. users ~may | over data links shared with other traffic. communicate 2. ie 2 In each network .node, packets are : queued in buffered, resulting in variable > =| delay. . Wy iru sitchng te prtered over packet Switching case of 224 time or [MODEL QUESTION] Circuit switching is faster than packet switching since during communication, the channel always remains established. Because of this, there is no overhead in circuit switching to either packetize data or use-other means to guarantee delivery of the data.’ In circuit switching, the data bits arrive at the receiver in the same order they were transmitted. The same-can not be assured in packet switching. This leads to more computation in packet While packet. switching can not overcome the speed disadvantage; it can-overcome the “guaranteed. delivery” and “in-order” delivery of data using protocols. Several protocol CNET-EE-21 . POPULAR PUBLICATIONS ers Hike sequencing numbering. and ACK mech rol at diferent layers (mostly used in transport and rie evaranted it-order deliver For example, TCP ae I ' protocol 4.2) Whats composite signal? [MODEL QUESTIO ithmic forms. What is the actual reason behind this? 5) We measure decibel in logart uppose transmiseion channels become virtually error-free, ls the data link layer fii ieeded? Explain, anisms using sliding windows dataclink layers) can be used fo hives this using a complicated yA Composite Signal isa sigmal which actually carries multiple other signals that are 3 a related{o eachother. On the most common examples of a compe.-e signal ig the | ‘eamposite video" signal that is fed to an analog television set. Composite vides, is gual available in standard formats such as NTSC, PAL, and SECAM. It is composite of three source signals called Y, U and V (together: teferred to as YUN) with syne pulses. \ Y represents 'the brightness or luminance’ of the picture: and includes ‘synchronizing pulses, so that by itself it could be displayed as.a monochrome picture. U arid V represent hue and saturation or chrominance. | jo The desi (48s oar nitof measurement hat exprésses the magnitude of 2 physieal quantity (usualy power or neni) relative toa specified or implied 2 et level. Since it expresses rato of two quantities with he samme uni, it i dimensionless unit. ee SRE ae eet large’ range of. ! “ine The use of the decibel has a number of merits: fi The decibel's logarithmic nature, means that 2 very : represented by convehient number, in a’similar manner. to, allows one to clearly visualize huge changes of some quantity, 4 The mathematical properies of logarithms mean that the overall decibel gain,of @ multi- component system (such as consecutive amplifiers) can be calculated simply by summing the decibel gains -of the individual ‘components, rather than needing to multiply amplification factors. i eo P 4 sy ‘The human perception of; for example, sound or. light, is, oughly speaking, such that a doubling of actual intensity causes perceived intensity to always increase by the same asiounl,iespecive ofthe origina, level. The, decibels logarithmic scale, in which a doubling of power of intensity always causes an increase of approximately: 3. dB, corresponds to'this perception. he i iccke «) Even if the transmission channels become error free, there would still be a need for the data link layer. The data link layer is responsible for breaking up the data it receives from a higher layer into frames and decide upon the most appropriate time to put such a frame on the network through the physical layér. Address management of network interfaces is CNET-EE-22 ratios, can’ be notation. This errors Also the responsibility ofthe data link layer. In other words, the absence OF Siac HN Network possibly does away with the LLC functionality but ‘ME, jyer oe, Fesponsibilties remain. Without the MAC layer functionalities, the netwOrle 7 exarmP, . become independent ‘of the physical nature of the transmission medium (1) Suld rites @ data fink layer, an IP layer, for Ethernet (CSMA/CD proto lifferent from the IP Jayer for WLAN (CSMA/CA)- ; essa? Qf circult switching. msTl0! een rovide communication ae thing and packet switchin! col 2 Dist switchi ing techniques are employed to pt ‘two computers. These are: Circuit switching, message switchi ket swt ew Cireuit Switching: in this technique, first the complete physical connection BET 4, th computers is established and then data are transmitted from the source COMPU Ching destination computer. That is, when a computer places a telephone cal. the evict sender tel of itching in the telephone system seeks out a physical copper path regent sender telephone to the receiver's telephone. The important property of HIS SM ata technique is to setup an end-to-end path (connection) between computer before can be sent, i eit Message Switching: In this technique, the source computer sends data or the mes aoe the switching office first, which stores the data in its buffer. It then looks for a free 1or another switching office and then sends the daia to this office. This process is cont until the data are delivered to the destination computers. Owing to its working pFinc'P © it is also known as store.and forward. That is, store first (in switching office), forwal Jater, ong jump at a time. Ht Packet Switching: With message switching, there is no limit on-block size, in ponies packet sivitching places a tight upper limit on block size. A fixed size of packet whic! can be transmitted across the network is specified. Another point of its difference from message switching is that data packets are stored on the disk in-message switching. whereas in packet switching, all the packets of fixed size are stored in main memory: This improves the performance as the access time (time taken to access a data packet) is reduced, thus, the throughput (measure of performance) of the network is improved. 3, a) Find the NRZ-1, Manchester and Differential Manchester encoding for the binary Data 100110111. z b) Suppose that a signal has‘2" times the power as a noise Signal that is added to it. Find the SNR (Signal to Noise Ratio) in decibels. [MODEL QUESTION] 3 5 ott b : 5 : g oe . = ae lal 3 i SB Z 4 ol oe ; # : we 3 2 : pe aa ling = : 3 : 0 2 g = a 7 in. ieee of i - rai — : H)SNR en a ose DATA LINK LAYER = ype 9 1. Flow control in Os! reference niodel is performed in b) network layer ¢) application layer * a) data link layer ©) session layor Answer: (a) 2. Checksum is used for a) error detection ¢) error enca ‘Answer: (a) erreulatlon 3. Which channel access method Is used in IEEE 802.5 network? ¢) token ring a) CSMACD ~ 'b) token bus Answer: (by 4. The hamming code is used for a) error detection ©) error encapsulation Answer: (d) b) error correction 4) both (a) and (b) sn pweuT 2013} [weurT 2013, 207 a b)errorcorrection d) both (a) and (b) put 20141 4) all of these [weurT 2014] 5. Which channel access method is used in Ethernet network? [WBUT 2014, 2016] a) CSMA/CD Answer: (a) b).token bus 6. Which one of the following task is not done by data link layer? ‘¢) flow control a) framing Answer: (d) b) error control 7. Flow control is the responsibi » a) Data link layer ¢) Both of these Answer: (c) ies of the_ 8. For stop-and-wait flow control, for acknowledgements are needed? a)n b) 2n Answer: (a) 4. What Is the minimum window size re and how? ¢) token ring Short Answer Type <) all of these [WBUT 2015] 4) channel coding [wBuT 2016] b) Transport layer. d) none of these n° data packets sent, how many [WBUT 2017] @) n+l e)n ective-repeat ARQ protocol [WBUT 2013] CNET-EE-25 _POPULAR PUBLICATIONS Answer? The size of the sending and receiving windows must be equal and half the maximum sequence number (assuming that sequence numbers are nunibered from 0 to.n=1) to avoid miscommunication in all cases of packets being dropped. To understand this, consider the case when all ACKs are destroyed... ‘ If the receiving window is larger than half the maximum sequence number, some, bly even all, of the packages that are'resent after timeouts are duplicates that are not Prornized as such. The sender moves its window for every packet that is acknowledged. stuffing in HDLC? Why bit [WBUT 2013, 2016, 2017] 2. What .n by Data transparency? What is Bi stuffing ded? Answer: : 1" Part: : : con The data transfer rate (DTR) is the arfount of digital data that is moved from one place another in a given time. to 2 & 3" Part: 2 as. tse > HDLC frames can be transmitted over'synchronous or asynchronous links: Those links have no mechanism to mark the beginning or end of a frame, so the beginning and end of cach frame has to be identified. This is done by using a frame delimiter, or flag, which is a unique sequence of bits that is guaranteed not to be scen inside a frame. This sequence is DIIII110’, or, in hexadecimal notation, 7E. Each frame begins and ends with a frame delimiter. A frame delimiter at the end of a frame may also mark the’start of the next frame. A sequence of 7 or more consecutive I-bits within a ftame will cause, the frame to beaborted. = : < 3. Applying CRC algorithm, determine the check gum and the transmitted frame for-~ the bit stream 11010111 and for the generator polynomial x+x7+1. [WBUT 2013] Answe Frame: 11010] 11 : Generator G(x) of degree 3, x? +x? +1: 1101 " T(x) is the frame with 3 attached 0-bits:'110101 11000 te ge Divide T(x) by G(x) by using XOR, 1101[11010111000[1000010 ; : puIONs 0000 ie O1lo x ie at : 1101 os oe. = 000110» Remainder The remainder R(x) = 110., The Transferred frame: 11010111 110 CNET-EE-26 nso ror in - for @! dotecnt ite bit block of 1 is to be set using hamming oy occ 8" bit Position ron ‘ow the receiver corrects an error neu 72 Answer; position Ne et patty bis of poson 1,2, 4 8 and 16 from the left the Fe most gore Thus we have PiP,0P311P,0101011P3. 417) So, P,=001818080@0@101=0(ie, Ex-or of bits 3, 5, 7,9, 11, 13,15 am (ie. Ex-or of bits 3, 6, 7, 10, 11, 14 and 15) (Ex-or of bits 5,6, 7, 12,13, 14 and 15) P.=0@180@169101=0(Ex-or ofits 9, 10, 11, 12, 13, 14 and 15) Pe=1° Bit17)° So, transmitted code is 01001 110010101111 _JfSixth bit fom right has error, the received data is 01001 110010001111 . In receiver, we calculate P, ~ Ps again try calculating the parity as in the transmit and the ex-or with the received parity bit. 2 * P=0 ; so 2 Pale od i Pale 3 Reo ; : « This gives 01100, =12-the position from left as the position of this erroneous ter side bit. So, the received data can be corrected to 01001 1100101111, whichis the same as the transmitted code. Stripping off the parity bits, we get the transmitted data word. 4 . ‘6, What isthe difference between Flow Control & Error Control, [WBUT 2016] Answer: Flow control and Error control are the:contr6l mechanism at data link layer and transport layer. Whenever the sends the data to the receiver these two mechanisms helps in proper delivering of the reliable data to the receiver: The main difference between the. flow control and error control is that the flow control observes the proper flow of the data from _ sender to receiver, on the other hand, the error control observes that the data delivered to the receiver is error free anditeliable. Let's study the difference between Flow control and Basis for comp: control Error control Basis Flow control is meant for the | Error eontrol is meant for delivering proper transmission of the data | the error-free data to the receiver: from sender to the receiver. “Approach Feedback-based flow control_| Parity checking, Cyclic Redundancy and rate-based flow control are | Code (CRC) and checksum are the the approaches to, achieve the | approaches to detect the erfor in data. proper flow control, Hamming code, Binary Convolution codes, Reed-Solomon code, Low- (CNET-EE-27 POPULAR PUBLICATIONS © 5 Basis for comparison | Flow control Error control Density Parity Check codes are the + s approaches to correct the error in data, a f Impact Avoid overninning of receivers | Detects and correct the error occurred : buffer the data loss. inthe data. 6. Given a 10 bit sequence 1010011110 and a divisor of 1011. Find the CRC. e [WBUT 2016) Kt Answer: Z . 1 Since divisor is 1101, we append from 0-s to the data and divide. 100100011 ‘i 3 101 1[1010 0111100000 : a toll : ¢ 1o1l : 1011 , y 100. rg 1011 x i 4 - Mle. - 4 ee oe oie 1011 ; ‘ WoI0.s Bs : } 3 . Aon * Remainder» 0010 A =. Data with CRC is 10100111 100010 mee cuss the function of data link Layer. $ Answei 4 , Functioris of data link layer: ; i). Converting the frames to bits and vice versa. ‘ Error detection by CRC check. ) flow control iv) Sensing and collision dete reception of frames. [WBUT 2017] | | i [ ° s sion and is responsible for ~. 1.) Explain GRC code with an example, 2 bd iweurT 2014) Answers.” Ort i » A cyclic redundancy check (CRC) or polynomial code checksum is a hash function designed to detect accidental changes to raw computer data and is commonly used in . CNET-EE-28 tiga ey vile clas Sore eis uch hard dk dvs. a cnc-nabed et 2h block o a ited-length binary sequence, known a the CRC code or just ag of ried he 824 sed srs tam both topeer. When a book one Celtel eH the clean; ifthe new CRC dos not match the action sik ie, thn the block contains a data error and the device may take ©" ‘ta 18 ass 4S rereading ot requesting the block be sent again, otherwise the ¢T" ued ob ero fe , ; the dat oe Pong the CRC arm, here we demin te ansited fame Tol : We tt be erator polynomial’ +2 +1. (cnc highest power of generator polynotia is 00. 3) to get 110101110 1201)" 2204 ott10 og(i0000 10 1 Lo 5 1, 001 © Remainder r 7 at 0, transite strings 1101011101 (re te ese eng is gin ddd by 101, we get remand 00 seen low: * 1001) 1010 00.011 41 (0210112 j 1001 ‘ , 000 € Remainder \ b) How does a single bit error differ from a burst error? (WBUT 2014) CNET-BE-29 ‘POPIKAR PUMLICATIONS : Answers 7 There are two main types of errors in transmissions: 1. Single bit error 2. Burst error Ge] (Sas terre Ceasnesor] Single bit error: \ means only one bit of data unit is changed from 1 t6 O'or from 0 to-1 as shown in fig. PREP rT fe] mse . . - Bere a on Reseed ‘Single Bit Error Single bit error can happen in parallel transmission where all the data bits aré transmitted using separate wires. Single “bit errors are the least likely type of error in serial transmission." Burst Error: It means two or more bits in data unit are changed from 1 to 0 from 0 to 1 as shown in fig.” : 3 oes 2. GRE EREPEEE Pree GC IeT ToD J pst sene [--[ eeretanscs wy beret ror TLa] +] daarcceives Ini.burst error, it is not necessary that only consecutive bits are changed. The length of. burst error is tneasured from first changed bit to last changed bit. As shown in Fig. length ‘of burst error is 8, although some bits are unchanged in between. Burst error is most Tikely to occur in a serial transmission. The noise occurring for a longer duration affects multiple bits. The number of bits affected depends on the data rate & duration of noise. For e.g. if data rate is 1 kbps, a noise of 1/100 second can affect 10 bits. 5. 2. Discuss In detail about different framing techniques. [WBUT 2015} ‘Answer: : ‘A point-to-point connection’ between two computers or devices consists of a wire in which data is transmitted as a stream of bits. However, these bits must be framed into discernible blocks of information. Framing is a function of the data link layer. It provides a way for a sender to transmit a Set of bits that are meaningful to the receiver. Ethernet, ‘CNET-EE-30 cae conder for ae at their © in he 5° ‘ologies have thelr « technologies Mave token-ring, frame relay, and other data link 19Ye% eed a i onan fT ga way ‘There are three different types of framing, 2° 9 hich Ps sees yn erie tell the receiver where the block of data begins an ends: mally stored a5 alpharye Of « Byiecoriented framing: Computer 2ata 15. MTs pies (I byte) This OP that 2 irtaricnted framineedeuith a combination O° ger style of fram framing differentiates one byte from another. Mis an “amples of byte was used in the terminal/mainframe enter pase framing include IBM's BISYNC protoco Sy ler to trans™l © Bit-oriented framing: This ype oF framing-allows the ed Stlog of bits ar oneTime. IBM's SDLC.(SYBEHEBNON HDL (Highevel Data Link Control) are examplce © Most LANS use bitoriented framing. There is usual mum frame 5 es. TI For example, Ethernet has a maximum fa size of 1,526 byt and end ofa frame is signaled with a special bit sequence Oe a If no data is being transmitted, this same sequence is conti iene : the end systems remain synchronized. Beat al fe yeposes Fe" &° ‘Clock-based framing?’ In a clock-based systers 2 stisrof a tive eereeat2 used to maintain a constant bit rate and keep the digital i eee system in stream, SONET (Synchronous Optical Network) '$ 6 sneer clock’ which all the clocks in the network ‘are synchronized ee eal zie reference-SONET frames are then positioned within the clocl — 4 yr tet tae o yetho! tail how an error could. be détected using the:Gheéksum ™ jetection. ! i fat do you mean by flow control problem? te c) What is an ARQ? Discuss about the-different- operations Wait ARQ. i | Answer: a) A checksum is a simple type of redundanc Ervors frequently occur in data when itis written to a di or otherwise manipulated. The errors are typically. ‘very Sm, jncorrect bit, but even such'small errors can greatly affect ‘the ed by Stop & form rere et WBUT 2015] make it useless. ? In its simplest fort, a checksum is created ‘by calculatirig the other block of data using some algorithm and storing the’ aults Wi » ata is retrieved from memory or received at the other'énd of d nietwoi is calculated and compared with the existing checksum. match does not necessarily mean the absence of er was not able to detect any. ‘Among the types of errors that cannot reordering of the bytes, inserting or deleting 2 cancel each other out. Fortunately, however, “be detected ‘by si jero-value these errors éan. Be, i (CRC). “Althoug! sophisticated methods, such as cyclic redundancy “checks CNET-EE-31 » POPULAR PUBLICATIONS: techniques have the disadvantage of requiring greater system resources (in the form of processor time and" bandwidth), this has| become an increasingly unimportant ponsideration in recent years as a result of the continued increases in processor speed and bandwidth. by Flow control is the mechanism that ensures the rate at which a sender. is transmitting is in proportion with the receiver’s receiving capabilities. ae : Flow contro! is utilized in data communications to manage the flow of, data/packets among two different nodes. especially in cases where the sending device can send data much faster than the receiver can digest. ) I" Part: ‘Automatic: repeat request (ARQ) ‘When the receiver detects an error in a packet, it autom: a protocol for érror’control in data transmission, ally requests the transmitter to resend the packet. ae 2" Part: ‘Stop-and-wait ARQ is a. method used to serid information between two connected devices. It ensures that information is not lost due to dropped packets and that packets are fcccived-in the correct order. It is the simplest kind of automatic repeat-request (ARQ) method stop-and-wait ARQ sender sends one frame at a time; it is a special case of the general sliding window protocol with both transmit and, receive, window sizes equal to 1. ‘Afier sending each frame, the sender doesn't send any further frames until it receives an the receiver sends an acknowledgement (ACK) signal. After receiving a good frame, ACK. if the ACK does not reach the sender before a certain time, known as the timeout, the seridersends the same frame again. Propagation time: $ ACK trans 4 miision time “Tiene-out faves Frame 0 tosis | Nectransai 4. a) ise ' 2 wat doyeunt tedentmade of operation pafomed by HOLC: ©) What is b; Y data transparency and bit stuffing in HOLC? 20 Answer; ‘Wldth-dolay product? i pweuT 7 2) te Hbuc Protocol is a general purpose data link control protocol caPal a 1B a range of modes of operation. The two most prevalent modes are: aU © best-effort or datagram servic: In tis mode, the packets are cared fee the meh 29d a bestetfort delivery is performed (ie. there is no guarantee that oe Fonte bythe fame will be delivered) The link layer doesnot provide a Toe Ot os frames, This mode is used for point-to-point links carrying a noc Fallon gh elf uses ‘datagram packets (eg, (P). The contol field of HOU serving aes field arid isthe second pat ofall HDLC frames. The bee Ice is provided through.the use of U (un-numbered) frames consisting of a $1 byte withthe value of 0x03, : F * The Asynchronous Balanced Mode (ABM): Tis provies aieliable data point to" deta lnk service and may be used to provide a service which suppor either 2 datagram or reliable network protocol, In this mode, the packets are carried numbered Tames, which ‘are acknowledged by.the receiver using mumberes erbervisory frames. Error recovery (e.g. checkpoint or go-back-n error, recovery) #8 employed to ensure a well-ordered and reliable low of frames. 2 ple of b) Refer 10 Question No. 2.0f Short Answer Type Questions. ©) The'Bandwidth Delay Produet, or BDP for short determines the amount of.data that ~ can be in transit in the nétwork. It is the product of the available bandwidth and the lateney, or RTT. BDP is a very important concept in’a Window based protocol such as TCP. It lays an especially important role in high-spéed /high-latency networks, such as most broadband intemet connections. It is one of the most important factors of tweaking | TCP in order to tune systems to the type of network used. The BDP simply states that: BDP (bits) = total_available_bandwidth (bit/sec) x round.trip_time (sec) of since RWIN/BDP is usualy in bytes, and latency is measured in milliseconds: BDP (bytes) = total_available_bandwidth (KBytes/sec) x round: trip_time (ms) the basic difference between CSMA and CSMA/CD? _...WBUT 2016] do you mean by back off factor in case of CSMAICD protocol?” * 4) What is the working operation of stop and wait ARQ for lost acknowledgement? ) Selective Repeat ARQ of the window size must be at most 2/2, Explain it. Answer: a) CSMAICD is a protocol that cain detect collision where as CSMA. is unable to detect it. b) If-a collision is detected, the transmitting station stops sending the frame data and sends a 32-bit "jam scquerice’. If the’ collision is detected very early in the frame transmission, the transmiting station will complete sending of the frame preamble before CNET-EE-33 POPULAR PUBLICATIONS starting transmission of the jam sequence. The sequence jam is transmitted to ensure that the length of the collision is sufficient to be noticed by the other transmitting stations. ‘Aner sending the jam sequence the transmitting station waits a random period of time Chosen using a random number generator before starting the transmission process over The: probability of a repeated from step | above. This process is called "backofT". collision is reduced by having the colliding stations wait a random period of time before ° + If the sender receives a damaged ACK, it discards it. + When the timer of the sender expires, the sender retransmits fram: = Receiver has already received frame 1 and expecting to receive frame 0.(R=0), Therefore it discards the sgegnd copv of frame kL me - oi Ga ‘ A : D S=1 nocoud © set ; : seo Tne ne | @) Steae + Ribas PEE] /—~Sxe . s / eLya a PEPE) 7 : rune out [EE}2T3] BE] teow [STS brrBion. - Z [Erroneously | ecole Sin é ae cite SrA reves windows must be at moa one-half of 2 hee sire of) Wha Hl by Figcompae window sie of wih wit oy ON exng 3 adall ACK ae a sender sends dupcatof ame Oona he Ist fame cto rective fase (part of the window), so accepts frame 0» 3°" StMrame ofthe next Cycle ~an error, 8. Write short not | '28 on the following: aut 2018) a) Hamming Cod my 4) Go tacky "ARQ iweur201 Answer: 4) Hamming Code: ashi m 7 ionship Hamming code can be applied to data units of any length and uses the relations! between the data bits ‘and redundant bits as discussed, Yow ¢ Po TE 6 45 ge a Ce CoC Wee Redundant bits * ee anaes ie kame Ss g Basic approach for eror detection by using Hamming code is as follows: tl * To-cach group of m information bits k party bité are added to form (m+k) code as shown in above figure. Tae toeation of each ofthe (m+) igs is assigned a decimal val ee ek parity bits are placed in positions 1,2, wal positions.-K parity cl are performed on selected digits ofeach codeword. ‘EE + At the receiving end the parity bits are fecalculated. The Secimal value of parity bits provides the bit-position in emo, ifany. CNET-EE-35 dy dy dy fe Gh fe Gilelt Te[o FAS]; Data 1010 (Jo T Tete T=To) Adding, . ‘ 1 (PoP TOTATe] -Adaings, [Eo Tole TsT9] -Adaingr, i j 4 TJo [1 [o[oT 110) Data sent corrupted TLALAST OL 110) Received Data ¥ t 11 B 2, Eyror position =6 CC, C, ~ 1.7.0: és [iToTsToFoT1 1] corrected data ‘ Figure _- Use of Haniming code for error correction for a ‘Abit data Figure above shows how hamming code is used for correction for 4-bit numbers (Gidsd2di) with the help of three redundant bits (s.r). For the example data 1010, first ri (0) is calculated considering the parity of the bit positions, 1, 3, 5.and 7. Then the parity bits ris calculated considering bit positions 2, 3, 6 and 7. Finally, the parity bits rs is calculated corisidering bit positions 4, 5, 6 and 7 as shown. Tf any corruption occurs in any of the transmitted code 1010010, the bit position in error can be found out by calculating rsrari at the receiving end. For example, if the received code word is 1110010, the recalculated value of rarart is 110, which indicates that bit position in error is 6, the decimal value of 110. 5 ' - , b) Go back-N ARQ: | © Receiver sends Ack for the correctly received frame «An Acknowledgement field has a meaning of “next expected sequence number” (Example: Ack 2 means “next expected packet sequence number is 2 and all . packets up to'2(0, 1) are received) ‘ * Sender keeps on sending frames (limited to the Window size) and receiver keeps on acknowledging. a | © When a frame is damaged, receiver sends a Reject control packet (Nak) : : CNET-EE-36 e Sendet poes b-. ith “tae Oo the Rejected frame and sends al te frames startin One even if those frames are already sent to the receiver "Sender's by <1'8 buffer size = Wit i , Resse dee iad sie tan Gorba-S ARQ ia i Bit stuffing needed in the control field of HDLC data frame? riefly discuss the Token management using priority in IEEE 602.5. x [MODEL QUESTION] Answer: 5 4) HDLC frames canbe transmitted dver synchronous or asynchronous links. Those Tinks have no mechanism mark the beginning or end of fame, othe beginning and end of each frame has to be identified, This is done by using a frame delimiter, or flag, which is unique sequence ofits that is guaranteed not to be seen inside a frame. This sequence is 01111110, of, in hexadecimal notation, 7. Each frame begins and ends with 2 frame delimiter A frame deliniter atthe end of a frame may also mark the start of the next frame, A sequence of7 or more consecutive I-bits within a frame will cause the frame t0 be aborted. rechnology created by IBM to ized a copper coaxial cable to shared printers etc.) to the b) Token Bus'was a 4 Mbps Local Area Networking t connect their terminals to IBM mainframes. Token bus util connect multiple end stations (terminals, wokstations, mainframe, The coaxial cable served as @ common ‘communication bus and a token was treated by the Token Bus protocol to manage or arbitrate’ acces to the bus. Any station that holds te token packet has permission to tansmit data. The station releases the token when it is done communicating or when a higher priority device needs to transmit (such J the mainffame), This keeps two ot more device from transmitting information on the bus at the same time and accidentally destroying the transmitted data. ‘Token Bus suffered fom tvo limitations, Any filure in the bus caused all the devices beyond the failure to be unable to communicate with the rest of the network. Second, CNET-EE-37 — POPULAR PUBLICATIONS: adding more stations to the bus was somewhat difficult. Any new station that was improperly attached was unlikely to be able to communicate and all devices beyond it were also affected. Thus, token bus networks were seen as somewhat unreliable and difficult to expand and upgrade. ‘ F CNET-EE-38 MEDIUM ACCESS SUB LAYER Multiple Choice Type Questions 1 i . When host knows its IP address but not its physical address, I.c20 fod a 20161 a) RARP RP a) IGMP Answer). b)ICMP _ OAT yyeral 2. A network which is used for sharing data, software and hardware among 6017] users owning microcomputers is called [we a) WAN DUAN )MAN d) VAN Answer: (b) 1 3. What is the minimum size of a IP packet? : wou a a) 16 byte b) 10 byte * ¢) 20 byte 6) 32 Answer: (¢) : inthe Random-access method there is no collision.) A yes ond a) ALOHA b) CSMA//CD c) CSMA/CA i) Token-passing ‘Answer: (4) . 5, The t-persistent CSMA CD can be considered as a special case of p-persistert approach with p equal to [MODEL QUEST! a) 04 b) 0.8 1.0 d) None of these Answer: (c) 6, IEEE 802.5 standard is [MODEL QUESTION] a)Token Ring —_b) Token Bus ¢) LLC d) FDDQ ‘Answer: (2) 7. How much channel throughput of slotted ALOHA will be in comparison 10 pure Aloha? : [MODEL QUESTION] a) Same b) Double c) Three times’ _d) None of these Answer: (b) 8. Inwhich OSI layers does FDDI protocol operate? |ODEL QUESTION] a) Physical b) Datalink, -,_c) Network d) (a) & (b) both Answer: (b) 4 2 9. PPP i8 8 sevssnsnser Ofiented protocol. [MODEL QUESTION] a)phase—' ” b) bit ©) byte d) none of these Answer: (c) CNET-EE-39 Answer: (¢) POPULAR PUBLICATIONS 40. Which of the following network architectures does not use the token passin accoss method? 3 [MODEL QUESTION} a) IEEE 802.4 b) FODI «) CSMaIcD @) IEEES02,5 Short Answer Type Questions an by MAC and LLC? Explain. [WBUT 2014) : In any broadcast network, the stations must ensure that only. ‘one station transmits at a time on the shared communication channel. 7 The protocol that determines who can transimit on a broadcast channel are called Medium Access Control (MAC) protocol. ‘The MAC protocols are implemented in the MAC sublayer which is the lowet sublayer of the data link layer. The higher portion of the data ink layer is often called Logical Link Control ac. : x * f reneoonk Liner He Shes h a ‘ ae | tosiesttine =] s ‘ - : Zs | “Convo! , f + "BS Pitetiam access Fie, 3 . : * 2 38 * Control : a i fa ge TF [epee fe “Layer 2 uses Logical Link Control (LLC) to communicate with the upper-level “layers. Layer 2 uses Media Access, Control macy, to decide which computer ‘will transmit. LLC ‘serves to communicate upward ‘to Network ayer, independent of. the - specific LAN technology used and Upper layer. MAC serves to access and communicate downward to the technology-specific Physical layer. 8 CNET-EE-40 (ur 2016)" \S OF appropriates size, Of for arandom time iteor idle. When n rt netial Sequence called “Resuet to "0 Send (CTs) als fra short while Rank a transmits frames Or ae 4 Feceiver in turn to send Feeds: wence. Orily upon receiv, * OF else, it agai = Only iving aC TS does the station 3.-Find Ssio) ; ne ; Cus for average deta id and slo} HA. Compa rorman s t ted ACB mpare their pe; formances as well, Per second. Als distribution with mean G Per frame time, j P() = Gk ed ; y Thus; P(No frames Now, throughput = Hence, S = GP(0) ? Collision happens if anothér frame is This is P(0) = e?¢ : Solving for S we get _ : Maninud throughput occurs at G = 0.5, where $= 1/2e = 0.184 CNET-EE-41 Eenerated in frame duration) = ¢© G * P(transmission is successful) Senerated during twice the time duration of a frame. POPULAR PUBLICATIONS Inlotted ALOHA, we need to check for coll n of frame because po new frame can start within that time (collision can happen at the beginning only). Thig jves Us: i S=Gere a) Pure Aloha is a Continuous time system whereas Slotted ALOHA js discrete time Comparisor system. 7 by Pure ALOHA doesn't check whether the channel is busy before transmission. Slotted ALOHA send the data at the beginning of timeslot. Pure ALOHA not in to time. Slotted ALOHA divided in to time Poe [WBUT 2017} 4. Explain . What is its usage? - Answer: : CSMA/CD is a modification of pure Carrier sensé multiple access (CSMA). CSMA/CD used to improve CSMA performance by terminating transmission as soon as.a collision detected, thus reducing the probability of a second collision on retry. ‘cause all transmitters to back off by randorn intervals, A jam signal is sent which wi reducing the probability of a collision when the first retry is attempted. CSMA/CD is a layer 2 access method, not a protocol of the OSI model. “There fs data from.” user to send i Recovered ‘Collision recovery ‘subalgoritn Nor Recovered We 4 "Frame transmission failed + ‘(loo many collisions) So) Frame transmitted ‘successfully = (CNET-EE-42 6, Discuss the pri Angwhet® Princes of o A wireless L, it | area network, someti uP AN (or WLAN, for wireless 1Oca HO Tmobile user CANO 1 Be LAWN, for local i is ie ates le stwork) is one In 4 E -a wireless network) (radio) connection. The Cae us! local area network (LAN} a wireless of ‘standards ally ii args far wireless LANs. oa on Ethemet protocol and CSMAJCA (carrie sense multiple AC8° iv atent for path sharing and include an encryption method: the es algorithm, cute a relatively low-cost wire High-bandwidth allocation for wireless will make possible Fel" made in ur Pe classrooms in the United Sexes A similar frequency allocation has °° 8. whe Hospitals and ‘businesses are also expected to install wireless ie existing LANs are not already in place. 3 jer can Using technology from ie Seance Networks, Ltd., a wireless a Lath TA) card rade to fit on a Personal Computer Memory Card Industry Association for a laptop or notebook computer. - a is .on Point to Point and Multi-Point tc nection? jODEL QuesTiON] nce betwe: +, 6. Explain the di to another in 3 ‘are examples sts Answer: ee en A point to point cornection is one in which data can flow from one point to unidirectional or bidirectional manner, A telephone connection or RS 252 of point to multi-point connections*In a point to multi-point connections: ae simultaneously cSinected,to each other ii.one.or more shared data PR Mts. 1, Connection, for example a bus connection as in Ethemet, allows one simultaneously send data to all hosts (broadcast) or ‘a subset of hosts (multicast). \ 7. What are the basic differences between Pure ALOHA and Se ALOHA TION] ‘Answer: LA : " 1) Pure Aloha is a Continuous’ time’ system whereas Slotted“ system, ‘ - a ae 2) Pure ALOHA doesnit check whether the channél is busy before transmission. Slotted ALOHA send the data at the beginning of timeslot. $ 3) Pure aloha not divided in to time. Slotted aloha divided in to time ‘Aloha is discrete time 8. a) Differentiate between FHSS and DSSS spread spectrum. [MODEL QUESTION] b) Why address field is always set to all 1's in PPP frame format? “Sh Answer: $ a) FHSS (Frequency-hopping spread spectrum) is typically used. by wireless mobile devices such as blue tooth and wireless phones. The transmission: distance of FHSS is shorter and not very ‘reliable. DSSS is used by, wireless immobile devices. The transmission speed of DSSS is faster than FHSS and is more reliable. CNET-EE-43 by The address field of PPP header indicates which recipient receives the frame. Now Bhp being @ point-to-point protocol, there can be only one recipient, Henge the address frust always be all Tos. a 9, Why is CSMA/CD not implemented In WLAN? “[MODEL QUESTION) Answer: ee -_ AtWineless LAN: a transmitter never gets to know whether its data got corrupted while D. That is: it never can detect collision. Henée, CSMA/CD, which is based on fon detection, is based on collision detection, is not used in WLAN: [MODEL QUESTION} 40. i) Why bit stuffing is needed in HDLC frame? the purpose of the jam signal in CSMA/CD7 Answer: ) Bit stuffing is the provide signaling information to a receiver. + remove or disregard the stuffed bits. “ oe ss For example. the timing or bit rate of T-carrier system signals is constantly synchronized | bomeen any terminal device and an adjacent repeater or.between any two repeaters. The Ponchronization is achieved by detecting the transition in polarity for 1.bits in’ the data ; ein Int signaling uses bipolar signaling, where each successive bit with a value of 1 ifopresented by voltage with a reverse polarity from: the previous bit. Bits with a value iO ure represented by a no-voltage time slot). If more than 15 bits in arow are sent with SO valuc, this “lull” in 1 bits that the system depends on for synchronization may be long: aOugh for two end points to become out of synchronization. To handle this situation (the SEquence of more than 150 bits), the signal is “stuffed” With a short, unique bit pattern Gen includes some 1 bits) that is recognized as “a. synchronization ‘pattern. ‘The receiving end removes the stuffed bits and restores the bi In anotkcr example of bit stuffing,-a standard HDLC packet begins and ends with T1106. To make sure this sequence doesn’t appear again before the end of the packet, inserted after every five consecutive 1s. Stuffing is defined by some to include bit padding, which is the addition of bits to'a Bae eufacion to make the transmission unit conform to.a standard size, but is distinct from bit robbing. a type of in-band signaling: ~ : ’ sertion of éne or more bits into a-transmission unit as a way to | + ‘The receiver knows how to detect and! |” im access control protocol requires carrier Sense and + there is no collision it'-stops i) Acnetwork-in which the mediu Where a station always starts transmission by sending-a jam'signal; With jam signals. from. other stations, it begins sending: data; otherwise, \ransmission and then tries again later. 2 CDMA technology. [WBUT 2014] rmat. Why padding is required? CNETF-EE-44. 00 > TTT ROE b) Ethemet traffic is. tre Answer 4) In celular for Matite Con mere are two main competing network technologi Ore of the baye stions (GSM) and Code Division Mulile Access (CDMA) ral Lransmiters 19 gong oN°eP'S in data communication is the idea of allowine °° o6l, cept # sain This allows sey. information simultaneously over a single communication © Called mulpten; tt share a band of frequencies (see bandwidih), This Om Scheme (Where COMA employs spread-spectrum technology and a special © "Multiplexed ones oct 2"smitter is assigned code) to allow multiple: users tO MA) ‘divide, the same Physical channel. By contrast, time division multiple oA) divides by “eee BY time, while frequency-division multiple, access (FDM “modulated gueney, CDMA js ia. form of spread-spectrum signaling, since Communizated, . “8t2! has much higher data bandwidth than the data i ransported in units of a frame, where each frame has a definit® ‘ingen The form of the frame is in the figure below. a feamble [Dest Addr [Sre Addr [Type [Data crc] The Preamble Field (8 bytes, 64 bits) is used ‘for synchronization. The first ae ates Contain the bit pattern 10101010 and the eighth contain the pattern 11. : eee ‘Address specifies the Etliemet address of the destination station, 48- ¢. » Source’Address specifies Ethemet address ofthe source station, 48-bits” eS . Type field specifies the type of data encapsulated, e.g. IP, ARP, RARP, etc, | its ads 2G i : “Data Field carries 46-1500 bytes of data. If data length is lower than 46 bytes, it Must be padded'to 46 bytes, . be. *" CRC or Cyclical Redundancy Check, used for error detection ° ‘The reason why there is an upper limit to the length of the data field, is fairly obvious — so that each station gets a fair chance with the channel. The lower limit, and the reason for padding in case that limit is not met, is as follows: De : Suppose a station at one extreme of serids a very short frame. Before this frame reaches the other extreme, another station starts transmitting since it saw that the channel was free. This of course leads to collision but the fact that collision happens must travel back to the first station for it to realize that and that must happen’ before it has finished with transmitting the frame. Thus the minimum frame size is of duration. twice the time. signal takes to travel from one end of the network to the other, which is roughly 5 micro- seconds on a |, Km long cable. 802.3 standard therefore specifies that the minimum data length is 46 bytes which must be padded up if not present, & CP in case of 2. Explain in detail the concept of connection establishment using L( PPP, 3 ies [WBUT 2015] © CNET-EE-45

You might also like