Computer Network-EE
Computer Network-EE
NETWORK LAYER
Multiple Choice Type Questions
1.If subnet mask is 255.255.252.0 then how many
subnets is available?
2
WBUT 2013]
a) b) 18 c) 4 d) 24
Answer: (c)
3.When host knows its IP address but not its physical address,
it can use
WBUT 2013]
a) RARP b) ICMP c)ARP d) IGMP
Answer: ()
9. ICMP
resides at the same layer as which of the following protocols mentioned
below?
a) TCP
WBUT 2016]
b) UDP c)IP d) ARP
Answer: (c)
CNET-EE-53
POPULAR PUBLICATIONS
CNET-EE-54
COMPUTER NETWORKS
Answer:
1 Part:
Distance Vector Routing
communications methods Protocol (DVRP) is one of two major
that use data packets routing protocols
requires routing hardware sent over Internet Protocol for
to
topology in order to determinereport the distances of various (IP). DVR
the best and most efficient nodes within a network or IP
routes for data packets.
2nd
Part:
Routing Information Protocol
path from end-to-end (RIP) is a dynamic
protocol sed to find the
(source to destination) best route or
metric/hop count algorithm. over a network by
This algorithm is used using a routing
the source to destination, to determine the shortest path
which allows the data from
shortest time. to be delivered at high speed
in the
RIP plays an important
role providing the shortest
node to node. The hop is and best path for data
the step towards the to take from
router, computer or next existing device, which
other device. Once
the length of the hop is
could be a
information is stored in determined, the
a routing table for future
wide area networks and use. RIP is being used in
is generally considered both local and
Exterior-Gateway Protocol to be easily configured and implemented.
between two neighbour a
(EGP) is protocol for
exchanging routing information
gateway hosts (each with
autonomous systems. EGP is its own router) in a network
routing table information.
commonly used between
hosts on the Intermet to exchange
of
The routing table contains
addresses they can reach, a list of known routers,
and a cost metric associated the
the best available route is with the path to each router
chosen. Each router polls so that
120 to 480 seconds and its neighbour at intervals
the neighbour responds by sending between
EGP-2 is the latest version its complete routing table.
of EGP.
4. a) An organization
with a
network administrator wants site address of 145.99.0.0
to create 32 subnets. Whatneeds to be subnetted. The
subnet mask? Design the should be the value of the
b) What do you mean by subnets.
a supernet?
Answer: WBUT 2015]
a) Address of the site is 145.99.0.0
To set 32 subnets we need 6
subnet bits. So the last octet in binary
Here number of hosts per subnet in 2. will be 1111 1100
So Address: 145.99.0.0
Network: 255.255.255.252 30
Network: 145.99.0.0/30
Broadcast: 145.99.0.3
Host Min: 145.99.0.1
Host Max: 145.99.0.2
Hosts/Net: 2
CNET-EE-55
POPULAR PUBLICATIONS
or subnets
Internet Protocol (IP) networks
combining several The new
Supernet is created by interdomain routing (CIDR) prefix.
b)A a single classless collection of the
prefixes of the
into one network with as the supernetting, route
same routing prefix commonly called
combined network has the is
The procedure used to create a supernet
enables organizations to modify their
subnets. summarization. Supernetting by
aggregation or route requirement of network routing devices
minimize the extensive and helps
network size and helps to conserve address space
independent routes. It also processing overheads
combining several information and minimize scheme,
the router to
effectively store routing
supports the CIDR address coding
while matching the
routes. Supernetting
allowing routing table
entries to be reduced.
loop problem is removed in
transparent bridge? How the WBUT 2016]
5. What do you mean by
transparent bridge?
Answer: segments with
more than one network
ITransparent bridges are devices which
Part: connects
transparent bridge is
essentially used to
decisions. A incoming frames
all routing associated port, to filter
other bridges to make their
nodes and port, and to forward
learm the MAC addresses of al the same incoming
addresses are located on
whose destination MACdestination MAC through their associated port.
incoming frames to the
following IP addresses:
i) 19.34.21.5 of
ii) 220.34.8.9 255.255.255.224. Determine the maximum number
c) A network has subnet mask network.
network. Determine the broadcast address of the
WBUT 2013, 2014, 2016
Host in this
Answer:
a) 1" Pat: IPv6 So,
IPv4 are 128 bits (16 bytes) in length.
bytes) in length. So,Addre
Addresses are 32 bits (4 maximum 2128 addresses are possible.
addresses possible.
maximum 232 Hexadecimal number notation, e.g.,
Number notation, e.g., 192.168.10.160 32FE:4201:39A6:0000:0000:0000:1234:ABCD|
Dotted
should be supported IPSec support is not optional
IPSec is optional and
externally
CNET-EE-56
COMPUTER NETWORKS
IPv4
Header does not identify IPv6
packet flow for QoS Header
handling by routers contains Flow Label field,
Identifies pacl:et flow for which
QoS handling by
Both routers and the sending router.
host fragment
packets. Routers do not support packet fragmentation.
Header includes a checksum. Sending host fragments packets.
Header includes options. JHeader does notinclude a checksum.
ARP uses broadcast ARP JOptional data is supported as
request to resolve IP Multicast extension headers.
to MAC/Hardware address. Neighbour Solicitation messages
Broadcast addresses are used resolve IP addresses to
to send traffic to IPv6 MAC addresses.
all nodes on a subnet. uses a link-local scope all-nodes
multicast
Configured either manually address.
or through DHCP. Does
not require manual configuration
DHCP or
Must support a 576-byte
packet size (possibly Must
fragmented). support a 1280-byte packet
size (without
fragmentation).
2d Part:
The IPv6 protocol defines
a set of headers, including
extension headers. The following the basic IPv6 header and
figure shows the fields he IPv6
and the order in which that appear in the IPv6 header
the fields appear.
Version Traffic class
Flow label
Payload length
Next header
Hop limit
Source address
Destination address
CNET-EE-57
POPULAR PUBLICATIONS
address is 255.255.255.255
What is the
difference between
system (AS)?
2. a) What is
autonomous
Explain an Interdomain routing protocol.
WBUT 2013]
AS?
intradomain and Inter domain
Answer: single
1s Part: is the unit of router policy, either a
autonomous system (AS) administrator.(or
On the Internet, an controlled by a common network
networks that is (such as a university,
network or a group of single administrative entity
sometimes
administrators) on behalf of a autonomous system is also
group of division). An unique
enterprise, or a business is assigned a globally
a business domain. An autononious
system
referred to as a routing System Number (ASN).
sometimes called an Autonomous routing information to
each other
number, communicate
autonomous system autonomous system
Networks within an like RIP, OSPF, etc. An
Gateway Protocol (IGP) systems using the Border
Gatewáy
using an Interior autonomous
information with other
shares routing
Protocol (BGP).
Inter-Autonomous System
2nd
Part: Intra-Autonomous System inter-autonomous system
routing
used to An. between
routing protocol is provides routing
An intra-AS routing tables within
protocol administrative
configure and maintain the autonomous systems (that is,
system (AS).
an autonomous domains).
12
10
From
10
Cost to
4 0
From X 12
0 10
5 0
Cost to
4 0
From 12
11
0 3
9 3 0
Cost to
4 0
From X 11
0 2
11 7 0
9 5 2 3
0
CNET-EE-59
POPULAR PUBLICATIONS
WBUT 2013]
b) What is the difference between RIP and OSPF?
RIP uses
Answer: algorithm. OSPF is based on Link state routing.
RIP is based on Bellman Ford uses topological graph
for calculating
shortest route. OSPF
hop count for calculating
in different
shortest path. classless/subnetting (RIP v2) networking
RIP uses classfull (RIP v1) and
versions. OSPF uses both in same version.
node F of the
path from node A to algorithm.
algorithm to find the shortest
c) Apply Dijkstra Do the same for
Bellman-Ford
in figure below. WBUT 2013]
network graph shown 3
6
D-
D (F)F*
E-
B-
Step2: B, D & c, so, it visits the
adjacent nodes.
connected to
As, Node Ais
A-0 C-3
D-2
B-2
Step 3: Then,
are precede such that if d[u]+w{u + v) <d[v]
TakingNode B,
dlv=d[u]+ w(u,v)
CNET-EE-60
COMPUTER NETWORKS
A-0
C-3
F
D-2
(B
B-2 E=7
Step 4:
Taking Node D, from
D not transition possible.
A=0
C-3
Step 5: B-2
Taking E-7
Node A=0
C-3
D-2
CNET-EE-61
POPULAR PUBLICATIONS
can be
designed in a way that a protocol
IPv6 has been emerging technologies or
new
3. Provision for extension: requirements of
extended easily to meet the
. applications.
in IPv6: IPv6 provides a mechanism
Resource Allocation support Flow label enables source to send
Label for resource allocation. mechanism is really
called Flow
request
helpful in real-time
for the
audio and
special handling of a packet.
This
video transmission. confidentiality and packet's integrity encryption and
ensure
5. Security Features: To included in IPv6.
authentication options are
WBUT 2014, 2016]
RARP.
b) DIfferentiate between ARP and
Answer: Protocol)
ARP: (Address Resolutionis sent from one host on a LAN to another, it isThe the 48-bit
device
When an Ethernet frame for which interface the frame is destined.
Ethemet address that determinesthe destination IP address in the IP datagram. Address IP
different forms of addresses: 32-bit
driver software never looks at
mapping between the two provides a dynamic
resolution provides a address the data link uses. ARP
whatever type of use the term
addresses and
address to the corresponding hardware address. We the
mapping from an IP automatically and is normally not a concern of either
dynamic since it happens administrator.
application user or the system
Protocol)
RARP: (Reverse Address Resolution a unique hardware address, assigned by the
manufacturer
on a network has read its
Each system
interface. The principle of RARP is for the diskless system to (a broadcast
of the network the interface card and send an RARP request IP address
hardware address from
unique
network) asking for someone to reply. with the diskless system's
frame on the
(in an RARP reply).
What is its significance in case of
classless
4. a) What is CIDR notation?
addressing? is NAT? [WBUT 2015]
a private address? What
b) What do you mean by
Answer
a) 1" Part: without
Inter Domain Routing (CIDR) is a method for assigning IP addresses
Classless
classes like Class A, Class B or Class C.
using the standard IP address is represented as
IP
A.B.C.D /n, where "/n" is called the to
In CIDR notation, an IP address bits used
network prefix. The IP prefix identifies the number of significant used to
prefix or 192.9.205.22 /18 means, the first 18 bits are
identify a network. For example,
14 bits are used to identify hosts. Common
represent the network and the remaining
prefixes are 8, 16, 24, and 32.
CNET-EE-62
COMPUTER NETWORKS
2nd
Part:
In order to extend the life
completed, it was necessary of
IP version 4
until the newer
to take a new IP version 6 could
sYStem calls for eliminating approach to addressing IPv4 devices. be
the notion This new
classless addressing
scheme sometimes of address classes entirely,
called Classless creating a new
Inter-Domain Routing (CIDR).
b) A private IP address is a
non-Internet facing
IP addresses are provided IP address on
by network devices, an internal network.
such as routers, using Private
translation (NAT). network addressS
Originally it was
thought that IPv4's
4.294,967,296 theoretical 32-bit IP addressing
IP addresses -- system yi: lding
as the Intermet grew it became apparent would be adequate for all purposes wever
and a future system (which that something had to fill
would tum out to be the gap between IPv4
and implerment. Private IP IPv6) that would
addressing and NAT take time to develap
Private IP addressing uses fill that gap with 1
addresses from the the private IP range.
(192.168.0.0- 192.168.255.255). class C range reserved
DHCP or be manually set,
Private addresses can
be assigned by the router
for:NAT
after which those addresses using
through the router. can communicate with
one another
Private IP addresses can
only be guaranteed unique
conflicts. If a directly to an internal network,
connected computer does excepting
even assigning a private not have a static IP address
IP address manually will assigned,
Private IP addresses not enable communication.
cannot be directly contacted
public IP address over the Intermet as a
can. This situation affords computer with a
device communicates an extra layer of security:'A
with the Internet using its network NARB:
to see any incoming public IP address from
if
so, it is directed
data was requested by one
of
an ISP and checks
the private IP-assigned
to that computer; not it is typically compter3. Lfiito
Another benefit of using NAT, forif those discarded.
websites, file and who do tend to have incoming
game servers is the ability rer ie ts like
crash, as the incoming
-
to quickly switch servers in
traffic can all be forwarded he event o a
to a back-up server very easily.
5. a) State
the difference between static
Answer: and dynamic routing. WBUT
2016]8
staticrouting .' ¥
Static routing is when you dynamic routing
statically|Dynamic routing is when
contigure a router to you use a roüting|
send traffic for|protocot such
particular destinations in preconfiguredand/or as OSPF, 1SIS, EIGRP;
directions BGP to figure out what
paths traffic
should take.
b) Describe
any shortest path algorithm.
Answer: [WBUT 2016]
L the
node at which we are starting
be called the initial node. Let the.distance
the distance from the initial node
ne initial distance to Y. Dijkstra's shortest path
of node Y
algorithm will assign
values ard
will try to improve them step by step.
CNET-EE-63
POPULAR PUBLICATIONS
initial node
value: set it to zero för our
. Assign to every node a tentative distance
and to infinity for all other nodes. initial node as current. Create a set of the
2 Mark all nodes unvisited. Set the nodes except the
nodes called the unvisited set consisting of all the
unvisited
initial node.
consider all of its unvisited neighbours and calculate their
3. For the current node, the current node A is marked with
a distance
tentative distances. For example, if
B has length 2, then the distance
connecting it with a neighbour
of 6 and the edge 6+2=8. If this distance is less than the
previously
to B (through A) will be distance. Even though a
tentative distance of B, then overwrite that
recorded "visited" at this time and it
been examined, it is not marked as
neighbour has
remains in the unvisited set. current node, mark
considering all of the neighbours of the
4. When we are done it from the unvisited set. A
visited node
visited and remove
the current node as
will never be checked again. visited (when planning a route
between
node has been marked
5. If the destination tentative distance among the nodes in the
the smallest
two specific nodes) or if planning a complete traversal), then
stop. The
unvisited set is infinity (when
algorithm has finished. with the smallest tentative
distance and
node that is marked
6. Select the unvisited 3.
it as the new "current node" then go back to step
set
following: WBUT 2017
protocol answer the
6. With respect to Ethernet detected?
a) How is collision usually collision?
b) What will the
transmission station do upon frame?
Why is there a minimum limit to the size of the
c)
frames
Answer: nodes transmitting in the same time. The
the result of two This
a) In Ethernet world,impact and collide when they meet on the physiçal media. has
from each machine whenever it
methods allow any device to try to access the medium
contention-based use a Carier
prevent complete "choking" on the media, these methods any
data to send. To process to first detect if the media is transmitting
(CSMA) means
Sense Multiple Access a signal on the media from another computer, it
is
signal in that moment. If there the device attempting to transmit sees that the
media
is talking. When is
that another device short period of time. If no carrier signal
and try again afier a
contention
is in use, it will wait its data. Ethernet and wireless networks use
detected, the device transmits
same
based media access control. fail and two devices will transmit at the
CSMA process will will be
It is possible that the collision. If this occurs, the data sent by both devices
a data
time. This is called resent. As the number of.nodes increases on a share
to be
corrupted and will need collision decreases
probability of successful media access without a collisions
media, the required to correct errors due to these
Additionally, the recovery mechanisms
further diminishes the overall throughput.
CNET-EE-64
COMPUTER NETWORKS
b) CSMA/CD Protocol:
It is used when more than two computers are sharing the same
medium typicaliy
Something that is happening in LAN networks when
computers are connected trough hub.
CSMACD is a practice used for multiple access control protocols. Transimission
will be
taken place by a particular station at a time but when more than one station will
transmit
at the samc time as a result collision car be occurred.
CSMA/CA Protocol:
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
that has been
introduced to get better the CSMA performance. According to that a station will
sense the
transmission medium before sending the frame. CASMA/CA protocol is used in wireless
(802.11) LANs. Moreover, when a station sense collision in case
of CSMA/CA, it first
waits for some timc after that but before packets transmission. it will listen to the channel
for its idleness, if s0 packets transmission will start otherwise it will waits for the medium
to become unoccupied.
Note that above mentioned both CSMA/CD and CSMA/CA protocols are the best
Cxample of Physical Pròtocols.
c)The minimum frame size on Ethernet is so that by the time the beginning of a frame
gets all the way across a maximum-width network, if a collision is detected there on the
far side of the network, there's still enough time for the jam signal (collision
detection
notification) to make it all the way back across the network while the ransmitter is still
transmitting. so that the transmitter will receive the jam signal and know it got collided
with so it will have to retransmit.
Anything below 64 bytes is just considered a runt (a buggy transmission) and ignored.
Runts are not collisions and do not trigger retransmissions.
But this is all pretty much moot as nobody runs hubs anymore, since Gigabit Ethernet
requires switches. So today's networks are always full duplex and CSMAJCD is a thing of
the past
A sender sends the packet (frame) and determine whether it got received by receiver
on the other side of channel or not. It may not be reached there mostly duc to
collisions with other packets in transit.
So therc must be a mechanism by which sender get to know whether a packet is reached
at the receiver or not. To check this, you want the head of the packet to transit from one
end of the wire and back again before the tail of the packet finished transmission. If
there's a transmission anywhere on the wire overlapping. you'tl hear it collide at your
receiver.
rames must be at least 64 bytes long. not includingthe preamble, so, if the data ficld is
shorter than 46 bytes, it must be compensated by the Pad field
CNET-EE-65
POPULAR PUBLICATIONS
Collision
Round Trip
Answer:
a) Socket:
flow across a'
A network socket is an endpoint of an inter-process communication
computers is based on the
computer network. Today, most communication between
Internet Protocol; therefore most network sookets are Internet sockets.
A socket API is an application programming interface (API), usually
provided by the
sockets.
operating system, that allows application programs to control and use network
Intermet socket APls are usually based on the Berkeley sockets standard.
A socket address is the combination of an IP address and a port number,
much like one
particular
end of a telephone connection is the combination of a phone number and a
the
extension. Based on this address, internet sockets deliver incoming data packets to
appropriate application process or thread.
b) BGP:
BGP is a complex, advanced distance Exterior Gateway Protocol (EGP), BGP exchange
routing information between Autonomous Systems (ASs). a
Unlike Interior routing protocols such as RIP, EIGRP, and OSPF that run inside
company's network, BGP uses a different basic algorithm for building a loop-free
topology than any of the above mentioned protocols.
BGP is especially used for exchanging routing information between all of the major
Internet Service Providers (ISPs), as well between larger client sites and their respective
ISPs. And, in some large enterprise networks, BGP is used to interconnect differen
geographical or administrative regions.
BGP is Primarily used to support the complexity of the public Internet; Cisco has added
several clever and useful features to its BGP implementation (BGP 4). Somne of the
primary attributes of BGP is the use of pieces of information about a known route, where
it came from, and how to reach it, A BGP router will also generate an error message iT
CNET-EE-66
COMPUTER NETWORKS
reccivcs a route that is missing these are mandatory attributes. Clients/ Corporate
Networks being connected by BGP.
Intermet
Company B
Autonomous System 2S5
Company A
Autonomous System 5S6
ISP
Autonomous System 10,566
c) RIP:
The Routing Information Protocol (RIP) is one of the most commonly used Interior
Gateway Protocol (IGP) routing protocols on internal networks (and to a lesser extent,
networks connected to the Intermet). which helps routers dynamically adapt to changes of
network connections by communicating information about which networks cach router
Can reach and how far away those networks are.
Although RIP is still actively used, it has largely been made obsolete by routing protocols
such as OSPF and IS-IS.
The routing algorithm used in RIP, the Bellman-Ford algorithm, was first deployed in a
computer network in 1969. as the initial routing algorithm of the ARPANET.
A version
of RIP which supported the Internet Protocol (IP) was later included n the
5erkeley Software Distribution (BSD) of the Unix operating system as the routed
daemon, and various other vendors would implement their own implementations of the
routing protocol. Eventually RFC 1058 was issued to unity the various implementations
under a single stancdard.
RIP is a distance-vector routing protocol, which emplovs the hop count as a routing
etric. The maximunm number of hops allowed with RIP is 15. Each RIP router transmits
ull updates every 30 seconds by defaultL generating large amounts of network traffic in
Ower bandwidth networks. It runs above the network layer: of the Internet protocol suite,
Usng UDP port 520 to carry its data. A mechanism called split horizon with limited
PSon reverse is used to avoid routing loops. Routers of some brands also use a
down mechanism known as heuristics, whose usefulness IS arguable and is not a part
Ot
the standard protocol.
CNET-EE-67
POPULAR PUBLICATIONS
and RIPng.
There are three versions of RIP. RIPv1, RIPv2, do not carry subnet information, lacking
RIPv1 uses classful routing. The routing updates limitation makes it impossible to have
masks. This
Support for variable length subnct
different-sized subnets inside of the same network class. included the ability
was developed in 1994 and
Due to the deficiencies of RIPv1, RIPv2 However to
information. thus supporting Classless Inter-Domain Routing.
to carry subnet Rudimentary plain
backwards compatibility the 15 hop count limit remained.
maintain authèntication was
authentication was added to secure routing updates. Later, MDS
text
defined in RFC 2082.
No. 3(b) of Long Answer Type
Questions.
d) ARP & RARP: Refer to Question
CNET-EE-68
COMPUTER NETWORKS
TRANSPORT LAYER
Multiple Choice Type guestions
1. Process-to-process delivery is the function of ..
a) transport
Answer: (a)
b) network c) physical
.. layer. WBUT 2014]
d) none of these
6. The amount of data that can be carried from one point to another in a given
period of time is WBUT 2017]
a Scope b) Bandwidth c) Limitation d) Capacity
Answer: (b)
CNET-EE-69
POPULAR PUBLICATIONS
acknowledgment, time out and
communication has reached receiver since concepts of
retransmission are not present.
Ordering: same sequence. In
transmissions are sent in a sequence and they are received in the
TCP and delivers
in wrong order, TCP reorders
the event of data segments. arriving sequence may not be maintained when it
application. In the case of UDP, sent message
is absolutely no way of
predicting the orderin which
reaches receiving application. There
message will be received.
Connection: three packets for a socket connection
and
TCP is a heavy weight connection requiring
is a lightweight transport layer
designed
handles congestion control and reliability. UDP
ordering of messages.
atop an IP. There are no tracking connections or
Method of transfer: is transmitted to segment boundaries.
UDP
TCP reads data as a byte stream and message
and on arrival are checked for their
messages are packets which are sent individually
data stream has none.
integrity. Packets have defined boundaries while
WBUT 2014]
2. Indicate QoS in transport layer.
Answer: Service (QoS) refers to the
In packet-switched computer networking. Quality of
a given traffic contract.
probability of the telecommunication network meeting
probability of a packet succeeding in
Sometimes, QoS is used informally to refer to the
example, telephony QoS refers to lack of
passing between two points in the network. For
loudness levels etc.
noise and tones on the circuit, appropriate
for QoS application and the entire Internet
The Internet was not conceived with a need
things that can happen to packets as they
ran on a "best effort" system. However, several
travel from origin to destination: (drop) some packets if they
Dropped packets: The routers might fail to deliver
none, or all of the packets might
arrive when their buffers are already full. Some,
network, and it is impossible to
be dropped, depending on the state of the
ask for this
determine what happened in advance. The receiving application must
in the overall
information to be retransmitted, possibly causing severe delays
transmission.
its destination, becauseit
Delay: It might take a long time for a packet to reach
a less direct route to avoid congestion.
gets held up in long queues, or takes is very
Alternatively, it might follow a fast, direct route. Thus delay
unpredictable.
This
. Jitter: Packets from source will reach the destination with different delays.
of
variation in delay is known as jitter and can seriously affect the quality
streaming audio and/or video.
Out-of-order delivery: When a collection of related packets are routed through
the Internet, different packets may take different routes, each resulting ina
one
different delay. The result is that the packets arive in a different order to the
CNET-EE-70
COMPUTER NETWORKS
3. State the basic differences between TCP and UDP. WBUT 2016]
Answer:
TCP (Transmission Control Protocol) | UDP (User Datagram Protocol)
TCP is a connection-oriented protocol, a | A simpler message-based connectionless
connection can be made from client to | protncal With UDP you send messages
server, and from then on any data can be| (packets) across the network in chunks.
sent along that connection.
Reliable when you send a message along a Unreliable - When you send a message, you
-
TCP socket, you know it will get there don't know if it'll get there, it could get lost on
unless the connection fails completely. If it the way.
gets lost along the way, the server will re-
request the lost part. This means complete
integrity, things don't get corrupted.
Ordered if you send two messages along a Not ordered If you send two messages out,
-
connection, one after the other, you know you don't know what order they'll arrive in.
the first message will get there first. You
don't have to worry about data arriving in
the wrong order.
Heavyweight - when the low level parts of Lightweight - No ordering of messages,
|
nd
the TCP "stream" arrive in the wrong order. tracking connections, etc. I's just fire and
resend requests have to be sent, and all the forget! This means it's a lot quicker, and the
out of sequence parts have to be put back network card / OS have to do very little work
together, so requires a bit of work to piece to translate the data back from the packets.
together.
CNET-EE-71
POPULARPUBLICATIONS
WBUT 2017]
4. Discuss the function of Transport Layer.
Answer:
Functions of Transport Layér: "peer to peer"
is to provide transparent
The purpose of the Transport Layer entity, thus relieving the upper layers
communication. wvith the remote (peer) transport The transport
and cost-cffective data transfer.
from any concern with providing reliable
basic service provided by the Network Layer
layer usually turns the unreliable and very
more powerful one. It provides end-to-end control and information transfer with
into a program.
the quality of service needed by the application
other parameters are needed to give a
Besides bandwidth and latency, which network
5.
characterization of QoS offered by a used for digitized voice traffic?
good [MODEL QUESTION]
CNET-EE-72
COMPUTER NETWORKS
Eor connection-oriented communications,
cach end point must
it can communicatc. The be able to transmit so that
alternative to connection-oriented
connectionless approach, transmission is the
in which data is
sent from one
nrior arrangement. Connectionless end point another without
protocols are usually described to
he end points have no protocol-defincd as statcless because
"conversation" of message way to remember
exchanges. Because where they are in a
connection-oriented protocols are they can keep track
sometimes described as of a conversation,
stateful.
equivalent
is to (a mirror image of) the token bucket
queue. The leaky bucket as a meter the same traftic as conforming
or
parameters vill see
algorithm, and given the same be seen as a special case of
the leaky
nonconforming. The leaky bucket as a queue can
bucket as a meter.
The algorithm allows bursts of up to b bytes, but over the long run the output of
conformant packets is lim ed to the constant rate, r. Nonconformant packets can be
treated in various ways:
dropped
queued for subsequent transmission when sufficient tokens are the bucket
transmitted bur marked as non-conformant and possibly to be dropped
subsequently if the network is overloaded.
b) QoS in transport layer: Refer Question No. 2 of Short Answer Type Questions.
3.a) What is the difference between the flow control and the congestion control?
Justify for the long haul communication, the window flow control is ineffective.
b) Compare reservation based congestion control with permit based congestion
control. [MODEL QUESTION]
CNET-EE-74
cOMPUTER NETWORKS
Answer:
a) Flow control vs. congestion
control:
Flow control means preventing the
droppingbecause it runs out source from sending
of buffer space. This is data that the sink will end up
protocol-just make sure the fairly easy with a sliding
source's window is window
buffer. TCP does this no larger than the free
space in the sink's
by letting the sink
field of the acks. Congestion advertise its free buffer
control means preventing space in the window
from sending data that will end (or trying to prevent) the source
up
This is more complicated, becausegetting dropped by a router bccause its queue is
packets from different ful
paths can converge on the same sources travelling different
queue.
In long haul communication
networks, bandwidth is
memory buffers or processor usually so limited that' calls
cycles be satisfied in for
send/receive a message. Credits much less time than it takes
given to senders can to
tying up more than a small be honoured without necessarily
amount of buffers, typically
reassembled. That is, receivers one for each message being
can "lie" in promising
at the time credits are sent. Nevertheless, buffers which may not be available
by the time buffers
manage to find some. A are needed, the receiver can
common strategy is
receivers, or alternatively, to page to share a buffer pool among many
out inactive buffers.
b) Reservation-Based -the hosts
attempt to reserve network
established. capacity when the flow is
-The routers allocate resources to satisfy
reservations or the flow is rejected.
-The reservation can be receiver-based
(e.g., RSVP) or sender-based.
Permit-Based -The sender's
rate is controlled by the receiver
per second it can absorb. indicating the bits
4. What is congestion?
Why
algorithm for congestion control.does congestion occur? Explain Leaky bucket.
Answer: [MODEL QUESTION]
The leaky bucket is an algorithm
used in packet switched
computer networks and
telecommunic: u networks to check that data transmissions
on bandwidth and burstiness conform to defined limits
(a measure of the unevenness or
flow). The leaky bucket algorithm is variations in the traffic
also used in leaky bucket
when the average or peak rate counters, e.g. to detect
of random or stochastic events or stochastic
exceed defined limits. processes
The Leaky Bucket Algorithm is
based on an analogy of a bucket .that
bottom through which any water it contains has a hole in the
will leak away at a constant
unless it is empty. Water can be added intermittently, rate, until or
i.e. in bursts, but if too
added at once, or it is added at too high an average much is
rate, the water will exceed
capacity of the bucket, which will overflow. the
There are actually two different methods
of applying this analogy described in
literature.These give what appear to be two different the
algorithms, both of which
referred to as the leaky bucket algorithm. This are
has resulted in confusion about
eaky bucket algorithm is and what its properties are. what the
CNET-EE-75
POPULAR PUBLICATIONS
is a counter or variable,
separate from the flow
In one version. the analogue of the bucket i.c. the analógue of
traffic conforms to the limits,
of traftic, and is used only to check that the level of water
traftic and added to so that
it
the water is brought to the bucket by the
indicates confornance to the rate and burstiness limits. This version is
in the bucket versi0n, the trallic passes
here as the leaky bucket as a meter. In the second
referred to analogue of the
bucket, i.e. the traflic is the
through a queue that is the analoguc of the leaky bucket as a
version is referred to here as the
water passing through the bucket. This token bucket
to (a mirror iprage of) the
queue. The leaky bucket as a meter is equivalent conforming
will sec the same trafiic as or
algorithm. and given the same parameters the leaky
be seen as a special case of
nonconforming. The leaky bucket as a queue can
bucket as a meter.
congestion control and flow control?
5. a) What is the difference between
working of leaky bucket algorithm. Give argument why the leaky
b) Explain the large the packet
pet kick independent of how
bucket should allow just one packet [IMODEL QUESTION]
is.
Answer:
a) Congestion control1
Flow Control
transmission|
is a bursty situation over the|The over all packet and data .by this
When here
which packet should be chosen|lover a network path is controlled'
network path and
this mechanism mechaniSm.
and how arethesubject ofresponsibility. Mainly Datalink layer responsibility
though
Mainly Transport Layer every layer governs the data flow in their
own manner.
Repeat ARQ,
Leaky Bucket etc algorithms arej Stop and Wait, Selective
Token bucket,
Routing algorithms are used.
used.
in packet switched computer
networks and
is an algorithm used
b) The leaky bucket limits
networks to check 1hat data transmissions conform to defined
telecommunications traffic
burstiness (a measure of the unevenness or variations in the
on bandwidth and e.g. to detect
bucket algorithm is also used in leaky bucket counters,
flow). The leaky processes
average or peak rate of random or stochastic events or stochastic
when the
exceed defined limits. in the
Algorithm is based on an analogy of a bucket .that has a hole
The Leaky Bucket will leak away at a constant rate, until
or
which any water it contains
bottom through intermittently, i.c. in bursts, but if too much
is
it is empty. Water can be added
unless water will exceed the
added at once, or it is added at too high an average rate, lie
overflow.
capacity of the bucket, which will in the
are actually two different methods of applying this analogy escribed are
There algorithms, bcth of wlich
what appear to be two different
literature .These give ihe
algorithnm. Ths has resulted in confusion about what
referred to as the leaky bucket
its properties are.
leaky bucket algorithm is and what flow
the bucket is a counter or variable, separate from tie
In one version, the analogue of o'
and is used only to check that traffic conforms to the limits, i.e. the analogue
of traffic,
CNET-EE-76
COMPUTER NETWORKS
CNET-EE-77
POPULAR PUBLICATIONS
APPLICATION LAYER
Multiple Choice Type 9uestions
layer service? WBUT 2013, 2016]
1. Which of the following is an application access
b) file transfer and
a) remote login
service d) all of these
c) mail
Answer: (d)
WBUT 2015]
application layer uses the
2. When displaying a web page, the HTTP protocol d) all of these
a) FTP protocol b) SMTP protocol c)
Answer: (c)
layer is called WBUT 2015]
The packet of information at the applicationc) segment
3. d) frame
a) packet b) message
Answer: (b)
[MODEL QUESTION
4. E-mail cannot be sent
TCP/IP
a) if the sending site does not use
TCP/IP
b) if the receiving site does not use
through private networks
c)
d) none of these
Answer: (d)
object identifier. The object
5. objects managed by SNMP are given an
All [MODEL QUESTION]
identifier always starts with c) 1.3.6.1.2.1 d) none of these
a) 0 b) 1.3.2.6.1.1
Answer: (c)
wants to send a message to user B confidentially, the plain text is
6. Ifuser A [MODEL QUESTION
encrypted with the public key of c) the network d) Either A or B
a) A b) B
Answer: (b)
.. can forward or block messages based on the information in
7. A [MODEL QUESTION]
the message itself.
a) proxy firewall ,b) packet filter firewall
c) message digest d) private key
Answer: (b)
CNET-EE-78
COMPUTERNETWORKS
Answer:
1" Part:
Data privacy reiers t0 the
r evolving relationship between
nublic expectation of technology and the legal right
privacy in the collection to,
Drivacy problems and sharing of data.
exist wherever uniquely
are collected identifiable data relating
and stored, in digital form to a person or persons
control can be the root or otherwise. Improper
cause for privacy issues. or non-existent disclosure
2nd
Part: Refer to Question No. 1(6) Long
Answer Type Questions.
2. a)Discuss about the four basic principles
b) What is firewall? of network security. WBUT 2015]
Answer:
a) Four basic principles of network security
are as follows:
Confidentiality - The message
the recipient gets can be
read by anyone else since it was proven not to have been
encoded.
Integrity The message the recipient
gets can be proven not to
changed since it was encoded. have been
Authenticity The message the recipient
-
CNET-EE-79
POPULAR PUBLÍCATIONS
Answer:
be
Part: generated codes that allows information to
Cryptography involves creating written or a format that
is unrecadable for an
Cryptography eonverts data into it back into a
kept secret.
it be transmitted without anyone decoding
unauthorized user. allowing to
the data.
readable format, thus compromising several levels. The
information cannot be read
cryptography on transit and
Intormation security uses maintains its integrity during
The infomation
non-repudiation. This means that neither
decrypt it.
Without a key to in
also aids
while being stored. Cryptographyinformation may claim they did not create or receive it.
the
the creator nor the receiver of
CNET-EE-80
COMPUTER NETWORKS
Bencfits: Without domain
name servers, navigating
Cxtremely cumbersome the Internet would become an
task. Given the millions
track of these by IP number would of websites in existence, keeping
be impossible.
Function: When you type
a name such as www.ehow.com
rcquest irst goes to a DNS server. into a browser, ne
address, it does so. Otherwise, the
If that server can translate
request is forwarded a
the name to an P
.Size: According to Dan Kaminsky, a security researcher, to higher level server.
million DNS servers. About 10 the Internet has about 9
percent are vulnerable
Additional Resources). to malicious attacks (see
Expert Insight: You can learn what DNS
servers are being used in
by using a Windows command. In your own setup
Start/Run type "cmd".
type "ipconfig/all". This will display When a black box appears,
the DNS servers running.
Warning: When DNS servers develop
problems or are maliciousiy hacked,
find yourself on what you thought you may
was the web page wanted
fraudulent sites. but actually redirected to
CNET-EE-81
POPULAR PUBLICATIONS
Desice
Device
Intemediate
Intendiate
Phrsical cammunication
Example:
Choose p=3 and q=
1|
11 =33
Compute n =p * q- 3* 2* 10 =20
Compute o{n) =(p-1)* (9-1)= and e and n are coprime. Let
e= 7
Choose e such that1
<e <p(n) is d = 3 [(3 * 7)
(d * e) % p(n) = 1.One solution
d such that
Compute a value for
1]]
% 20
Public key is (e, n) (7,33)
33)
Private key is (d, n) => (3, c = 2'%33 29
is
The encryption ofm=2
The decryption of
c 29 is m = 29* % 33 2
=
CNET-EE-84
2. What do you understand cOMPUTER NETWORKKS
browser in World Wide Web?by Domain Name Server
(DNS)? Explain
Answer: the function or
Part: WBUT 20171
The Domain Name System
information associated or Domain
Name Server
with domain names (DNS) is a system
the Internet. DNS associates in a distributed that stores
many types of information database on networks,
importantly, it provides such as
the IP address with domain names,
essential component associated with but most
of contemporary Internet the domain name.
DNS is useful for several use. DNS IS an
hard-to-remember IP reasons. Most well known, the
addresses (such DNS makes it possible,
names (such as "microsoft.com") as 207.142.131.206) to attach
Humans to easy-to-remember
and e-mail addresses. Less tak advantage of this when they domain
recognized, the domain recite URLs
people t0 assign authoritative name
names, without needing system makes it possible for
registrar each time. to communicate with
a central
resource
"zone delegation" NS RR ("resource recordss
record")
names the nameserver 2SsoCiated with
authoritative for delegated name
subzone
zone of authority
"delegated subzone" managed by a
name serner
When a system administrator
wants to let another administrator
manage a part of a zone, the tirst
administrator s nameserver
delegates part of the zone to
another nameserver
Domain names are arranged in a tree, and cut into zones, which are served
nameservers. by
The domain name space is a tree of domain names. Each
node or leaf in the tree is
associated with resource records, which hold the information associated
with the
domain name. The tree is divided into zones. A zone is a collection of
connccted nodes
that are authoritatively served by an authoritative DNS nameserver.
A single
nameserver can host several zones.
The information associated with nodes is looked up by a resolver. A
resolver knows how
0communicate with name servers by sending DNS requests, and heeding DNS
CNET-EE-85
-POPULAR PUBLICATIONS
find the
usually entails recursing through several name servers to
responses. Resolving
needed information. communicate with a single name server. These
only
Some resolvers are simple, and can name server to perform the work of
finding
simple resolvers rely on a recursing
information for it. parts (technically labels), separated by
consists of two or more
A domain name usually
dots. For example microsofi.com. top-level domain. (for example, the address
the
The rightmost label conveys
mail.yahoo.com has the top-level domain .org). subdomain of the domain above it. Note
subdivision or
Each label to the left specifies a dependence, not absolute dependence.
For example,
that "subdomain" expresses relative
domain. com and mail.yahoo.com
is a
subdomain of the
yahoo.com comprises a theory. this subdivision can go down to
127
jvahoo.com. In
subdomain of the domain 63 characters, as long as .e
whole domain
label can contain up to
levels deep. and each characters. But in practice some
domain
a total length of 255
name does not exceed
registries have shorter limits than that. IP addresses is called a
hostname. For
or more associated
A domain name that has one domains are both hostnames, but the
com
and mail.yahoo.com
example, the yaho.com
domain is not. DNS servers. Each domain or subdomain has
hierarchical set of
The DNS consists of a that publish information about that. domain and
servers
one or more authoritative DNS "beneath" it. The hierarchy of authoritative DNS servers
domains servers: the
the name servers of any At the top of the hierarchy stand the root
domains.
matches the hierarchy of (resolving) a top-level domain
name.
servers to query when looking up
recursion
An example of theoretical DNS
Where's www.wikipedia.org Root
nameserver 198.41.0.4
204.74.112.1
Try
org.
nameserver 204.74.112.1
DNS Recurser 207.142.131.234"
Try
wikipedia.org.
nameserver 207.142.131.234
I's at xxx.xx.xx.xxx"
CNET-EE-87
POPULAR PUBLICATIONS
d) SMTP: recipients of a
relatively simple. text-based protocol, where one or more is
SMTP is a
cases verified to exist) and then the message text
message are specified (and in most becoming widely used in the carly
25. SMTP started
transferred. SMTP uses TCP port better suited to handle
c-mail transfers
UUCP which was
1980s and gradually replaced connected. SMTP works best
when both
intermittently
between Unix machines that were connected to the network all the
timc.
machines are
the sending and receiving first) mail transfer agents to
implement SMTP.
first (if not the or a server, for
Sendmail was one of the implement SMTP as a client
programs that
Today, there are several Aficrosoft Exchange Server.
example, exim, Postfix. qmail, and and did not deal well with
binary files. Later,
ASCIl
This protocol started out as purely developed to encode binary files for transfer
through
standards such as MIME were
from a remote
SMTP.
that does not allow one to "pull" messages
SMTP is a "push" protocol or IMAP.
demand. To do this a mail client must use POP3
server on
Question No. 4 of Short Answer Type Questions.
e) Cryptography: Refer to
g) SNMP:
In typical SNMP uses, one or
more administrative computers,
task of monitoring or managing called managers, have
a group of hosts or devices the
managed system executes, at on a computer network. Each
all times, a software
reports information via SNMP component called an agent which
to the manager.
SNMP agents expose
management data on the managed
protocol also permits active systems as variables. The
management tasks, such as moditying
configuration through remote and applying a new
modification of these variables.
via SNMP are organized in The variables accessible
hierarchies. An SNMP-managed
key components: network consists of three
Managed device
Agent- software which runs on managed devices
Network management station
A managed device is
(NMS)- software which runs on the manager
a network node that implements an SNMP
unidirectional (read-only) or bidirectional interface that allows
(read and write) access to
information. Managed devices exchange node-specilie node-specific
information with the NMSs.
Sometimes called network elements, the
managed devices can be any
including, but not limited to, routers, access type of device,
servers, switches, bridges, hubs,
elephones, IP video cameras, computer hosts, and IP
printers.
An agent is a network-management software
module that resides on a managed
An agent has local knowledge device.
of management information and translates that information
or
A
from an SNMP-specitic tom.
nework management station (NMS) executes applications that monitor
managed devices. NMSs provide the bulk of the processing and control
and memory resources
CNET-EE-89
POPULAR PUBLICATIONS
on any managed
One or more NMSs may exist
management.
required for netvork
network.
in a data network. Also, explain the security
4. a) State the threats that
can arise
requirements to be met due to the stated threats. a means of secure transfer of
Explain 'public key encryption' system as [MODEL QUESTION
b)
information over a network.
Answer
into any compartmented computer system.
a) Unauthorized entry
through classified computer libraries.
Unauthorized searching/browsing information
manipulation, or denial of access to
destruction,
Unauthorized modification,
for
residing on a computer system. information on any system not explicitly approved
classified
Storing or processing
without, prior
classified processing defeat security or auditing systems,
Attempting to circumvent or administrator, other than as part of a legitimate system
authorization from the system
testing or security research. your computer network.
of rules for the secure operation of
Any other willful violation
keys -- a public key
known to everyone and a
system that uses two to
b) A cryptographic recipient of the message. When John wants
only to the message. Jane
private or secret key known Jane's public key to encrypt the
Jane, he uses
send a secure message to
to decrypt it. private keys are
then uses her private key public key system is that the public and
An important element
to the messages and oly
the public key can be used to encrypt virtually
related in such a way that only can be used to decrypt them. Moreover, it is
key
the corresponding private key if you know the public
key.
the private Hellman.
impossible to deduce
invented in 1976 by Whitfield Diffie and Martin
Public key cryptography
was
called Diffie-Hellman encryption. It is also called
is sometime key (symmetric
For this reason, it because it uses two keys instcad of one
asymmetric encryption
encryption).
CNET-EE-90
COMPUTER NETWORKS
MODERN TOPICS
Multiple Choice Type Questions
1.Blue-tooth uses .. To communicate between
a) Radiowave two devices.
b) Microwave [MODEL QUESTION]
c) Infrared
d) none of these, a separate
technology exists
Answer: (a)
Questions
Long Answer Type
[MODEL QUESTION]
following:
1. Write short notes on the
a) ISDN
b) Cable Modem
c) Bluetooth
d) Wi-Max technology
e) Distributed system
Satellite transmission
f)
Answer switched telephone
circuit
a) ISDN: Network (ISDN) is a type of ordinary
Integrated Services Digital
transmission of voice and data over
allow digital with
network system, designed to quality and higher speeds than available
resulting in better and breaking
telephone copper wires, is set of protocols for establishing
broadly. ISDN a the user. In a
analog systems. More and for advanced call
features for
transmission.
connections,
circuit switched simultaneous voice, video, and text (room)
videoconference, ISDN provides videoconferencing systems and group
desktop
between individual
videoconferencing systems.
B
Configurations B (for "Bearer") and D (for "Delta").
channels,
In ISDN, there are two
types of channels are irntended for
(which may include voice), and D
channels are used for data
data).
can also be used for (BRI) - also Basic rate
signalling and control (but Basic rate interface
access to ISDN. of 64 kbit/s, and one
There are two kinds of B channels, each with bandwidth designated
access (BRA)- consists of 16 kbi/s. Together these three channels can be contains
two
bandwidth of
D channel with a
interface (PRI)- also Primary rate access (PRA)-
rate kbit/s.
as 2B+D. Primary and a D channel with a bandwidth of 64
B channels
a greater number of
In comparison, DSL tends to offer less speed and more variance between service
nackages and prices. Service quality is also far more dependent on your location in
relation to the local ISP.
There are three traditional disadvantages to cable internet:
Users in a neighborhood share the available bandwidth provided by a single
coaxial cable line. Therefore, connection speed can vary depending on how mariy
people are using the service at the same time.
Cable networks using a shared line risk a loss of privacy, especially in light of the
availability of hacking tools for cable modems. This issue is addressed by
encryption and other privacy features specified in the DOCSIS (Data Over Cable
Service Interlace Specitication) standard used by most cable modems.
Many cable Internet providers are reluctant to offer cable modem access without
tying it to a cable television subscription. This has ramifications similar to those
of the lack of naked DSL.
c) Bluetooth
Bluctooth is an industrial specification for wireless personal area networks (PANs).
Bluetooth provides a way to connect and exchange information between devices like
personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital
cameras via a secure, low-cost, globally available short range radio frequency.
Bluetooth is a radio standard primarily designed for low power consumption, with a shor
range (power class dependent: 10 centimeters, 10 meters, 100 meters) and with a low-
cost transceiver microchip in each device.
Bluetooth lets these devices talk to each other when they come in range, even if they are
o in the same room, as long as they are within up to 100 meters of each other,
dependent on the power class of the product. Products are available in one of three power
classes:
Power Power Range
Class (d Bm) (approximate)
(mW)
Class 1
100 mW 20 dBm 100 meters
Class 2 2.5 mW 4 dBm -10 meters
Class 3, ImW 0 dBm -10 cm (! meter max)
Bluetooth Application
Wireless networking between desktops and laptops, or desktops in a confined
Space and where little bandwidth is required
Bluetooth peripherals such as printers, mice and keyboards
CNET-EE-93
POPULAR PUBLICATIONS
CNET-EE-94
COMPUTERNETWORKS
c) Distributed System:
Distributed computing is a field of
computer science that studies distributed systems.
distributed system consists of multiple A
autonomous computers that communicate
a computer network. The computers interact through
with each other in order to achieve a
common goal. A computer program
that runs in a distributed system is
distributed program, and distributed called a
programming is the process of writing
programs. such
Distributed computing also refers to the
use of distributed systems to solve computational
problems. In distributed computing. a problem is
divided into many tasks. each
is solved by one computer. of which
There are two main reasons for using distributed
systems and distribut . computing
First, the very nature of the application may require
the use of a communication network
that connects several computers. For example, data is
produced in one physical location
and it is needed in another location.
Second, there are many cases in which the use
of a single computer would be possible in
principle, but the use of a distributed system is
beneficial for practica! reasons. For
example, it may be more cost-efficient to obtain the
desired level of performance by
using a cluster of several low-end computers, in comparison
with a single high-end
computer. A distributed system can be more reliable than
a non-distributed system, as
there is no single point of failure. Moreover, a distributed
system may be easier to expand
and manage than a monolithic uniprocessor system.
Examples of distributed systems and applications
of distributed computing include the
following:
Telecommunication networks.
Telephone networks and cellular networks.
Computer networks such as the Internet.
.'Wireless sensor networks.
Routing algorithms.
Network applications.
World Wide Web and peer-to-peer networks.
Massively multiplayer online games and virtual reality communities.
Distributed databases and distributed database management systems.
Network file systems.
Distributed information processing systems such as banking systems and airline
reservation systems.
) Satellite transmission:
In Satellite transmission, signal transferring between the sender and receiver is done with
ne help of satellite. n this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite. Then the satellite amplifies the signal and
sent it
Dack to the receiver's antenna present on the earth's surface. So, all the signal
transferring
IS
happening in space. Thus this type of communication s known as space
Communication.
CNET-EE-95
POPULAR PUBLICATIONS
Active and
are commonly used in satellite communication are
Two satellites which
passive satellites.
Satellite
Transmitter
Earth Station
Earth Station
Receiver
Transmitter
CNET-EE-96
QUESTION 2013
Group-A
(Multiple Choice Type Questions)
correct aiternatives for the following
Choose the
i) A hub is a
a) router
b) bridge c) repeater d all of these
a) 2
b) 18 c) 4 d) 24
b) network layer
a) data link layer
c) session layer d) application layer
....Oriented protocal
v)PPP is
a.. b) bit c) byte d) rore o trese
a) phase
Group-B
(Short Answer Type Questions)
protocol and how?
minimum window size required for selective repeat ARa
2. What is the
1.
Type Question No.
Sce Topic: DATA LINK LAVER, Shórt Answer
Group-C
(Long Answer Type Questions)
IPV4 and IPV6, Discuss IPV6 packet format.
7. a) State the difference between
Justihy your answer
b)"TCP and UDP" which one better?
is
Find the net ID and the host ID of the following IP addresses:
c) What is the purpose of subnetting?
i) 19.34.21.5
i) 220.34.6.9 this
255.255.255.224. Determine the maximum number of Host in
d) A network has subnet mask
network.
network. Determine the broadcast address of the
NETWORK LAYER, Long Answer Type Quéstion No. 1.
a), c)& d) See Topie:
b) See Topic: TRANSPORT
LAYER, Short Answer Type Question No. 1.
CNET-EE-98
COMPUTER NETWORKS
8.hat
do you understand by message security? Explain the following terms.
Authentication
) User
management
i) Key
protocols.
i) Security
entication, Integrity and Non-Repudiation be implemented by
Authent
b) How can digital signature?
algorihm with an example
) Explain RSA
LAYER, Long Answer Type Question
Sec Topic: APPLICATION No. 1.
a aWrite down the advantages of Fibre-optic cable over twisted pair and coaxial cables
b) Suppose that a signal has 2 times the power as a noise signal that is added to t. Find the SNR
in decibels.
c) A 12 bit data bit block 011101010111 is to be set using hamming code for eror detection and
correction. Show how the receiver corrects an error that occurs in 6h bit position from right.
d) What is transmission impaiment? How many types of transmission impairments are there?
Discuss them.
a)&b) See Topic: OVERVIEW OF DATA cOMMUNICATION AND NETWORKING. Short
Answer Type Question No. 3.
) See Topie: DATA LINK LAYER, Short Answer Type Question No. 4.
d) Sce Topic: PHYSICAL LEVEL, Short Answer Type Question No. 1.
10. a)What is autonomous system (AS)? What is the difference between intrademan and Inter
domain AS? Explain an Interdomain routing protocol.
b) What is the difference
between RIP and OSPF?
G)Apply Dijkstra algorithm to find the shortest path from node A to node F of the netwok graph
shown in figure below. Do the same for Bellman-Ford algorithm.
CNET-EE-99
POPULARPUBLICATIONS
No. 3{a).
APPLICATION LAY'ER, Long Answer Type Question
a) See Topic: AND
NETWORKING, Long Answer
DATA COMMUNICATION
b) See Topic: OVER\VIEW OF
Type Question No. 6(a) No. 3(b).
Answer Type Question
c) See Topic: APPLICATION LAYER, Long No. 1.
TRANSPORTLAYER, Long Answer Type Question
d) See Topic: No. 7(a).
Long Answer Type Question
c) See Topic: NETWORK LAYER,
QUESTION 2014
GROUP-A
(Multiple Choice Type Question)
1. Answer all questions: .... layer.
function of .
() Process to process delivery the
is none of these
d)
b) network
c)physical
a) transport
in IEEE 802.5 network?
(i) Which channel access method used
is
c) token ring
d) all of these
a) CSMACD b) token bus
.. ayer
(iv) Repeaters function in the... d) transport
c) network
a) data link b) physical
for:
(vii) The hamming code used
is
b) error correction
a) error detection
c) error encapsulation
d) both (a) and (b)
CNET-EE-100
COMPUTER NETWORKS
is:
ix) UDP
a) Connectionless b) connection-oriented
c) both (a) and (b) d) none of these
GROUP-B
(Short Answer Type Question)
2, a) What is the purpose of subnetting? Find the net-ID and the Host-ID of the following IPP
addresses.
i) 19.34.21.5
i) 220.34.8.9
b) A network has subnet mask 255.255.255.224. Determine the maximum number of Host in
this
network. Also determine the broadcast address of this network.
See Topic:NETWORK LAYER, Long Answer Type Question No. 1(b) & (c).
GROUP-C
(Long Answer Type Question)
.a) Explain the operation CDMA
of technology.
D) Difference
between router & bridge?
CNET-EE-101
POPULAR PUBLICATIONS
networks and make a
that are used in computer
discuss about the different guided media
c) Briefly
comparison among them.
d) What is OSI reference model? Qucstion No. (a).
1
error?
9.(a) How does a single bit error differ from a burst
b) State the advantage of IPV over IPV4.
c) Differentiate between ARP and RARP.
a) See Topic: DATA LINK LAYER, Long Answer
Type Question No. 1(b).
b) & c) See Topic: NETWORK LAYER, Long Answer
Type Question No. 3(a) & (b).
vi) When displaying a web page, the application layer uses the
a) FTP protocol b) SMTP protocol c) HTTP protocol d) all of these
x)IPv6
addresses have a sizeo
a) 32 bits b) 64 bits c) 128 bits d) 265 bits
CNET-EE-103
POPULARPUBLICATIONS
GROUP- B
Question)
(Short Answer Type
is 63. What is the bit
with a 1MHz bandwidth. The SNR for the channel
2. a) We have a channel impairments.
different types of transithission
rate and signal level? b) Discuss about the
No. 2.
PlHYSICAL LEVEL, Short Answer Type Question
a) See Topic: 1.
LEVEL, Short Answer Type Question No.
b) See Topic: PHYSICAL
band-pass channels?
3. a)What do you mean by low-pass and Manchester encoding schemes with
differences between Manchester and Differential
b) State the
an example. COMMUNICATION AND NETWORKING,
Short Answer
OF DATA
a) Sec. Topic: OVERVIEW
Type Question No. 5. AND NETWORKING, Short Answer
OVERVIEW OF DATA COMMUNICATION
b) See Topic:
Type Question No. 4.
of 145.99.0.0 needs to be
subnetted. The network
organization with a site address
5. a) An mask? Design
to create 32 subnets. What should be the value of the subnet
administrator wants
the subnets.
b) What do you mean by a
supernet?
No. 4.
LAYER, Short Answer Type Question
See Topic: NETWORK
GROUP C
(Long Answer Type Question)
performed by each layer
in detail about OSI reference model mentioning the functions
7. a) Discuss model?
of OSI reference model from TCP/IP reference
What are the differences
in it.
different framing techniques.
b) Discuss in detail about NETWORKING, Long
1s Topie: OVERVIEW OF DATA COMMUNICATION AND
a) part: See
No. 2.
Answer Type Question
CNET-EE-104
COMPUTER NETWORKS
2nd part: See Topic: OVERVIEW OF
DATA COMMUNICATION
Answer Type Question No. 1(c). AND NETWORKING, Long
CNET-EE-105
POPULAR PUBLICATIONS
Long Answer
OVERVIEW OF DATA COMMUNICATION AND NETWORKING,
a) See Topic:
Type Question No. 6(b) NETWORKING, Long Answer
OVERVIEW OF DATA COMMUNICATION AND
b) See Topic:
Type Question No. 6(c).
e) See Topic: DATA LINK LAYER, Long
Answer Type Question No. 6(a).
G{b).
Long Answer Type Question No.
d) See Topic: DATA LINK LAYER, No. 3(c).
e) See Topic: APPLICATION LAYER,
Long Answer Type Question
QUESTION 20166
Group-A
(Multiple Choice Type Questions)
following:
1. Choose the correct alternatives for the is
n devices using Mesh topology
i) The total number of links required to connect
a) 2 b) n(n+1)/2 c) nn-1)/2 n
d)
ii) A hub is a
c) Repeater d) All of these
a) Router b) Bridge
network 192.168.10.32/28?
v)Which of the following is a valid host for
c) 192.168.10.14 d) 192.168.10.54
a) 192.168.10.39 b) 192.168.10.47
multicast?
vi) Which class of IP addres is reserved for
b) Class B c)Class C d) Class D
a) Class A
in Ethernet network?
vii) Which channel access method is used
b) Token bus c) Token ring d) All of these
a) CSMA/CD
CNET-EE-106
COMPUTER NETWORKS
Group B
3) What is the purpose of subnetting? Find the netid and the hosted of the following IP
addresses.
)19.34.21.5
i) 220.34.8.9
OA network has subnet mask 255.255.255.224. Determine the maxmum or number of Host in
this
network.
AUSO
determine the broadcast address of this network.
dee Topic: NETWORK LAYER, Long Answer Type Question No. I{b) & (¢).
CNET-EE-107
POPULARPUBLICATIONS
6. Briefly discuss about the different guided media that are used in computer networks and make a
comparison among them.
See Topic: OVERVIEW OF DATA COMMUNICATION AND NETWORKING, Long Answer Type
Question No. 1(a).
Group-C
(Long Answer Type Questions)
7. a) State the differences between IPV4 and IPV6.
b) State the difference between static and dynamic routing.
Descibe any shortest path algoithm.
d) Differentiate between ARP and RARP
a) See Topic: NETWORK LAYER. Long Answer Type Question No. 1(a) (1* Part).
b)& c) See Topic: NETrwORK LAYER, Long Answer Type Question No. 5(a) & (b).
d) See Topic: NETWORK LAYER, Long Answer Type Question No. 3(b).
9. a) Find the expressions for average delay and throughput for both pure ALOHA and slotted
ALOHA. Compare their performances as well.
b) What is cryptography? Explain Public & private Key cryptography with example.
c)What is the difference between Flow Control & Error Control.
a) See Topic: MEDIUM ACCESS sUB LAYER, Short Answer Type Question No. 3.
b) See Topic: APPLICATION LAY'ER, Short Answer Type Question No. 3.
c)See Topic: DATA LINK LAYER, Short Answer Type Question No. 5.
CNET-EE-108
COMPUTER NETWORKS.
a) See Topic:
DATA LINK LAYER, Short Answer Type Question No.6.
See Topic: PiIYSICAL LEVEL, Short Answer Type Question No. 3.
See Topic: OVERVIEW OF DATA COMMUNICATION AND NETWORKING, Short Answer
Type Qucs tion No. 3(a).
d) See Topic: NETWORK LAYER, Short Answer Type Question No. 5.
.d) See Topic: APPLICATION LAYER, Long Answer Type Question No. 3(b).
e) See Topic: TRANSPORT LAYER, Long Answer Type Question No. 2(b).
QUESTION 2017
Group-A
(Multiple Choice Type Qucstions)
1. Choose the correct alternativas for any ten of the following
i) WDM methodology is populaly used for
a) twisted pair cable b) coaxial cable
c) optical fibre d) wireless transmission
A network which is used for sharing data, software and hardware among several users owning
microcomputers is called
c) MAN d) VAN
a) WAN b) LAN
ethod of communication in which transmission takes place in both directions, but only in one
direction at a time, is called
a) Simplex b) Full duplex C) Four wire circuit d) Half duplex
CNET-EE-109
POPULAR PUBLICATIONS
v) Protocols are
DTEs are to communicate
a) agreement on how communication components and
b) logical communication channels used for transferring data
c) physical communication channels used for transferring data
d) none of these
CNET-EE-110
COMPUTER NETWORKS
Group-B
(Short Answer Type Questions)
2. Discuss the function of data link and Transport Layer. What are the drawbacks of mesh
topolagy?
1s Part: See Topic: DATA LINK LAYER, Short Answer Type Question No. 7.
2nd Part: See Topic: TRANSPORT LAYER, Short Answer Type
Question No. 4.
2nd Part: See Topic: PHYSICAL LEVEL, Short Answer Type Question No. 4.
4.Explain Client Server Model. What is the Idea of web based e-mail
See Topie: oVERVIEW OF DATA COMMUNICATION AND NETwORKING, Short Answer Type
Question No.8.
Group-C
Long Answer Type Questions)
7. What do you understand by Domain Name Server DNS)? Explain TCP/IP and ADSL Explain
the function of browser in World Wide Web?
"&3 Part: See Topie: APPLICATION LAYER, Long Answer Type Question No. 2.
2 part: See Topic: oVERVIEW OF DATA COMMUNICATION AND NETWORKING, Long
Answer Type Question No. 4.
8. Write short notes on: a) HTTP and FTP, b) SNMP, c) ARP & RARP
a) See Topie: APPLICATION LAYER, Long Answer Type Question No. 3(c) & (.
b) See Topie: APPLICATiON LAYER, Long Answer Type Question No. 3(R).
C) See Topie: NETWORK
LAYER, Long Answer Type Question No. 7(d).
CNET-EE-111
POPULAR PUBLICATIONS
a), b)& c) See Topic: NETWORK LAYER, Long Answer Type Question No. 6.
c) 2 Part: See Topic: NETWORK LAYER, Short Answer Type Question No. 2.
CNET-EE-112
COMPUTER. NETWORKS
etwork Layer 53
Transport Layer 69
pplication Layer 78
Modern Topics 91
NOTE
WBUT course structure and syllabus of 7th Semester has been changed from 2013.
COMPUTER NETwORKS has been introduced as a new subject in present
curriculum. Taking special care of this matter we are providing chapterwise
complete solutions of new University Question Papers along with some model
questions and answers, so that students can get an idea about university questions
patternsS.
POPULARPUBLICATIONS
CNET-FT-2
COMPUTER NETWORKS
9. Method of communication
but only in one direction at in which transmission takes place
a) Simplex a time, is called in both directions,
b) Full duplex WBUT 2017
Answer: (d) c) Four wire circuit
d) Halfduplex
10. The duration of
time it takes to
the other and back is called send a message from
a) Round trip time one end of a network to
c) Circle trip time [WBUT 2017]
b) Full Duplex Time
Answer: (a) d) Data Travelling
time
Data
()
NRZ-I 0
0 0
(i)
Manchester
(ii)
Differential
Manchester
CNET-EE-3
POPULAR PUBLICATIONS
Answer:
1 transmited in one
Part:
the number of data bits,(that's O's and 1's) transmitted in
Bit rate is a measure of means 2400 zeros or ones can be
second
second. A figure ot 2400 bits per
'bps'.
one second, hence the abbreviation times a signal in a
communications channel
the number of channel can change states up
Baud rate by definition means means that the
baud rate
changes state. For example, a 2400
to 2400 times per second.
Manchester Encoding 0
0
Differential Manchester Encoding
5. What do you mean by low-pass and band-pass
Answer: channels? WBUT 2015]
If a channel can carry base band processes, the
channel is called a low-pass channel. it
can carry narrow-band processes, we If
call it a band-pass channel. The low-pass
a model for much channels channellis
as pair of wires or a coaxial cable. For wave
guides and open space radio channels, the band-pass guides. light
channel is the suitable model.
6. a) What is TDM?
b)A constellation diagram consists of eight equally spaced WBUT 2015]
the bit rate is 4800 bps, what is the baud rate? points on a circle. If
Answer:
a) Time-division multiplexing (TDM) is a method of putting
multiple data streams in a
Single signal by separating the signal into many segments,
each having a very
duration. Each individual data stream is reassembled at the receiving end based short
timing. on the
b) The constellation indicates 8-PSK with the points 45 degrees apart. Since 2' =8, 3
Dits are transmitted with each signal unit. Therefore, the baud rate is 4800/3
=1600 baud.
. Physical address operates in a local domain whereas logical
global
address has a
domain. Explain, Define bandwidth of a media. WBUT 2016]
CNET-EE-5
POPULAR PUBLICATIONS
Answer:
into the ROM of the NIC card which
1)A Physical address is a 48-bit flat address burned
is divided into 24-bit vendor code and 24-bit
is a Layerl device of the OSI model. This
be changed.
serial address. This is unique for cach systcm and cannot
A Logical address is a 32- bit address assigned to
each system in a nctwork. This works
IP address.
in Layer-3 of OSI Model. This would be generally the
It is present on Network interface cad.
It
i) Physical address also called MAC address.
won't change.
boundary.
Logical addressing is used when a packet passes n/w
CNET-EE-6
COMPUTERNETWORKS
Client
Client
Client
Server Client
Client Client
*
Client-Server Model
Web based e-mail: Webmail are web-based
accounts that are operated from a website. email accounts. These are usually free email
Mail. Examples include Hotmail, GMail
and Yahoo
Webmail allows the users to access
their emails as long as they have
connection and a web browser. This access to an Internet
also means that the user cannot
draft a new email offline. read an old email or
CNET-EE-7
POPULAR PUBLICATIONS
2n part: Multimode
Single mnode
Polymeric Coating
Coating
Multiple Paths-Sloppy
Glass
Requires very Straight Paths Cladding Glass Core
Glass
Cladding Glass Core 125 Microns = 60 Microns
Open Wire
electrical wire strung along power poles.
Open Wire is traditionally used to describe the
protection from noise
There is a single wire strung between poles. No shielding or interference
interference is used. This media is susceptible to a large degree of noise and
for short distances under 20
and consequently not acceptable for data transmission except
ft
Twisted Pair
in pairs. Each pair would consist
The wires in Twisted Pair cabling are twisted together
for the negative data signal.
of a wire used for the positíve data signal and wire used
a
on the other wire. Because
Any noise that appears on one wire of the pair would occur
of, phase and the noise
the wires are opposite polarities, they are 180 degrees out
CNET-EE-8
COMPUTER NETWORKS
appearing on the wires cancels
itself out. Twisted
svstcms that use a balanccd line Pair cables are most effectively
method of transmission used in
The degree of reduction in noise
interference is determined
urns per foot. Increasing the number specifically by the number
of
To further improve noise rejection,
of turns per foot reduces the noise interference.
a foil or wire braid
pairs. shield is woven around the twisted
Coaxial Cable
Coaxial Cable consists of two
conductors. The inner conductof
with the other conductor woven is held inside an insulator
around it providing a shield.
coating called a jacket covers the An insulating protective
outer conductor. The outer shield
conductor from outside electrical signals. protects the inner
(shield) and inner conductor plus The distance between the outer conductor
the type of material used for
conductor determine the cable properties insulating the inner
or impedance. Typical impedances
cables are 75 ohms for Cable TV, 50 for coaxial
ohms for Ethernet Thinnet and Thicknet.
excellent control of the impedance characteristics The
be transferred than Twisted Pair cable.
of the cable allows higher data rates to
Optical Fibre
Optical Fibre consists of thin glass fibres that
can carry information at frequencies in the
visible light spectrum and beyond. The typical
optical fibre consists of a very narrow
strand of glass called the Core. Around the Core is a
concentric layer of glass called the
Cladding. A typical Core diameter is 62.5 microns (I micron =
10-6 meters). Typically
Cladding has a diameter of 125 microns. Coating the cladding
is a protective coating
consisting of plastic, it is called the Jacket. Data is transmitted
as light waves which
undergo continuous total internal reflection.
The cost of optical fibre is a trade-off between capacity and cost. At higher transmission
capacity, it is cheaper than copper. At lower transmission capacity,
it is more expensive.
Topic Twisted Pair Co-Axial Cable Optical Fiber
Number of One pair of cables are
Single cable is required ngle Cable is required
Cable required
Medium Electrical medium is Illumination medium is
Electrical medium is used
usvd used
Noise Noise immunity iss Noise immunity is
Noise immunity is high
low moderate.
Communication Communication speed is
Communication speed is
Speed speed is low, nearly 4 moderate, nearly 500
high. nearly 2 Gbps
Mbps Mbps
Low Bandwidth, Comparatively high Very High bandwidth
Bandwidth
3 MHz bandwidth, 350MHz 2 GHz
Cover small distance, Cover small distance, Cover large distance,
Distance 2to 10 km I to 10 km 10 to 100Okm
Used in LAN, TI Used in Cable TV,
Usage Used in WAN,MAN etc.
Lines Ethernet Channel
CNET-EE-9
POPULAR PUBLICATIONS
WBUT 2014]
b) What is OSI reference model?
or OSI Reference
Answer:
Interconnection Reference Model (OSI Model
The Open Systems and computer
is a laycred abstract description for communications Interconnection
Model for short) Systems
protocol design. devcloped as part of the Open
network
layer model.
initiative. It is also called the OSI seven into a series of seven
layers (listed as
fiunetions of a protocdl
The OSI model divides the software):
decreasing "distance" from the application
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
model.
differences between OSI and TCP/IP WBUT 2014]
c)Write down the similarities and
OR,
model from TCP/IP reference model?2015]
What are the differences of OsI reference WBUT
Answer: models.
differences between the OSI and TCP/IP
Below we describe similarities and
Similarities
models include the following:
The main similarities between the two architecture.
Both of the models shate a similar
They share similar architecture
-
layers.
both of them are constructed with
This can be illustrated by the fact that common
common application layer Both of the models share a
-
They share a services
this layer includes different
"application layer". However in practice
depending upon eact model. can be illustrated
nparable transport and network layers This presentation and
-
Differences
the two models are as follows:
The main differences between internet has
Protocols are considered to be standards around which the
TCP/1P "generic, protocol-independent standard"
developed. The OSI model however is a
CNET-EE-10
COMPUTER NETWORKS
2. Discuss
in detail about OSI reference model
mentioning the functions performed
by each layer in it. WBUT 2015]
Answer:
The Open Systems Interconnection Referenee Model (OSI Model
or OSI Reference
Model for short) is a layered abstract description for communications
and computer
network protocol design, developed as part of the Open Systems Interconnection
initiative. It is also called the OSI seven layer model.
The OSI model divides the functions of a protocol into a series of seven layers
(listed as
decreasing "distance" from the application software):
Physical (Layer 1)
OSI Model, Layer I conveys the bit stream - electrical impulse, light
or radio signal
through the network at the electrical and mechanical level. lt provides the hardware
means of sending and receiving data on a carrier, including defining cables. cards and
physical aspects. Fast Ethernet, R$232, and ATM are protocols with physical layer
components.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
Tunctions of this layer, as well as addressing, intemetworking, error handling. congestion
control and packet sequencing.
Layer 3 Network examples include AppleTalk DDP, IP, IPX.
CNET-EE-11
POPULAR PUBLICATIONS
hosts,
Transport (Layer 4) transfer of data betwecn end systcms, or
provides transparent ensures complete
OSI Modcl, Layer 4. recovery and flow control. It
end-to-cnd error
and is responsible for
data transfer.
include SPX, TCP, UDP.
Layer 4 Transport examples
applications. The
Session (Layer 5)
and terminates conections bctween
This layer establishes,
manages
terminates conversations, exchanges, and
coordinates, and and connection
session layer sets up. each end. It deals with session
applications at
dialogues between the
coordination. NetBios names, RPC, SQL.
examples include NFS,
Layer 5 Session
Number of cable = 10
Each node is connected through a four cable. If one connection fails,
the entire system
does not halt.
CNET-EE-13
POPULAR PUBLICATIONS
ii) Star
Number of cable = 4
If one connection fails all other links remains active.
ii) Bus
Number of cable = I
If the connection fails, the entire network goes down.
iv) Ring
Number of cable = 5
If one connection fails, the ring can disable the entire network.
e) The Internet is a network of LAN-s that uses the IP protocol at the network layer and
covers the entire world. The Intranet is similar, i.e., it is also a network of networks
driven by the IP protocol. However, all the networks of the Intranet belong to the same
organization.
An extranet is a private .network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or operations
with suppliers, vendors, partners, customers, or other businesses.
CNET-EE-14
COMPUTER NETWORKS
simple naming and addressing
schemes. It contains
OSI model. The layers are: four layers, unlike seven layers
in the
1. Process/Application
Layer
2 Host-to-Host/T ransport
Layer
3. Internet Layer
4. Network Access/Link Layer
TCP/IP Model
OSI Model
Application Layer Application Layer
Presentation Layer
Transport Layer
Session Layer
Internet Layer Transport Layer
Network Layer
Network Access Layer Data Link Layer
Physical Layer
Layer 1: Network Access Layer
1. Lowest layer of the all.
2. Protocol is used to connect
to the host, so that the packets
3. Váries from host to host and network can be sent over it.
to network.
2nd Part:
ADSL: Communications
subscriber line (ADSL) is a type of DSL broadband
Asymmetric digital' be sent over
Internet. ADSL allows more data to
technology used for connecting to the compared to traditional modem lines. A
lines (POTS), when
existing copper telephone telephone line to allow
called a microfilter, is installed on a subscriber's
special filter. time.
ADSL and regular voice (telephone) services to be used at the same
both
special ADSL modem and subscribers must be in close geographical
ADSL requires a Typically this distance
the provider's central office to receive ADSL service.
locations to 1.5 to 9 Mbps when
is within a radius of 2 to 2.5 miles.
ADSL supports data rates of from sending
(known as the downstream rate) and from 16 to 640 Kbps when
receiving data
data (known as the upstream rate).
layers of TCP model. Describe the function of each of the Layers with,
5. List the correlate with the OSI model?
necessary diagram. How does the layer of TCP WBUT 2017]
End office
End office
Local Loop
___iLi
Carrier Joining Carrier
Trunk Trunk Trunk
Digital PBXx
CNET-EE-17
POPULAR PUBLICATIONS
OCcupies twice the bandwidth of the modulating signal. This is very wasteful of the
aj lable irequency spcctrum. QAM restores the balance by placing two independent
double sideband suppressed carrier signals in the same spectrum as one ordinary double
sideband supressed carrier signal.
920 MHz
d) Disadvantages:
One drawback ofthe TDM approach, as discussed earlier, is that many of the time slot in
the frame are wasted. It is because, 11 a particular terminal has no data to transmit at
particular instant of time, an empty time slot will be transmitted. An efficient alternative
to this synchronous TDM is statistical TDM, also known as asynchronous TDM. It
dynamically allocates the time slots on demand to separate input channels, thus saving
CNET-E-18
COMPUTERNETWORKS
the channel capacity.
As with Synchronous
1/0 lines with a buffer associated TDM, statistical multiplexers
to cach of them. also have many
the input bufters, collecting During the input, the multiplexer scans
data
receiving end, the demultiplexer until the frame is filled and send the frame.
receives the frame At the
appropriate buffers. and distributes the data
to the
e) Inserting bits in data in order
to break up a bit pattern
to go out of synchronization. that may cause the transmission
For example, in
a change from 0 to 1. If too TI lines, timing is maintained by detecting
many zero bits are transmitted
end may lose synchronization consecutively, the receiving
because too much
Therefore, in long strings time has passed without sensing
of zeros, a set of bits that voltage
timing signal is "stuffed" into begins with a 1 and functions as
the stream of zeros
at certain intervals.
a
CNET-EE-19
POPULAR PUBLICATIONS
PHYSICAL LEVEL
LMultiple Choice Type Questions
WBUT 2013]
.. Oriented protocol. d) none of these
1. PPP is a b) c) byte
a) phase bit
Answer: (C) each node?
implements at least two paths to and from [WBUT 2014]
2. What network topology d) star
ring c) mesh
a) bus b)
Answer: (b) WBUT 2015]
hub
a central controller orring d) bus
3. In this topology there ismesh c)
a) star b)
Answer: (a) WBUT 20171
4. The topology with
highest reliability is c) ring topology d) mesh topology
topology b) star topology
a) bus
Answer: (d)
WBUT 20171
DTEs are to
5. Protocols are
agreemnent on how communication components and
a)
communicae channels used for transferring data
b) logical communication used for transferring data
c) physical communication channels
d) none of these
Answer: (a)
Answer Type Questions
Short
impairments
impairment? How many types of transmissionWBUT 2013]
1. What is transmission
themn.
are three? Discuss OR, WBUT 2015]
types of transmission impairments.
Discuss about the different
be lost in a signal.
Answer: Impairments is a condition that causes information toAttenuation. Signals
Transmission
are some aspects of transmission impairments: (1) they travel, with the
The following (2) Dispersion. Signals
tend to spread as
velocity of
power in time.
loose dependent on the frequency. (3) Delay distortion. Due to a signal
amount of spreading frequency. Thus, various frequency components ofThermal,
propagation that varies with from
at different times. (4) Noise; sources
receiver
arrive at the Crosstalk.
Intermodulation,
CNET-EE-20
COMPUTER NETWORKS
2. We have a channel with a 1MHz bandwidth.
is the bit rate and signal level? The SNR for the channel is 63. What
WBUT 2015].
Answer:
First, we use the Shannon formula to find
the upper limit.
C= Blog:(1+SNR)=10° log, (1+63) = 10° log.64 = 6 Mbps
Thc Shannon formula gives us 6 Mbps, the
upper limit. For better performance we
choose something lower, 4 Mbps, for example. Then
we use the Nyquist formula to find
the number of signal levels.
4 Mbps=2x1 MHzxlog, L L= 4
3. Write down the advantages and disadvantages of mesh topology. [wBUT 2016
Answer:
Advantages of mesh: Since every end station is connected to every
other directly, the
communication path between any pair is dedicated and unhampered by the traffic in
the
rest of the network.
Disadvantage: Requires much more cabling. Also. fallback strategies when a link goes
down, is not very vell-defined.
CNET-EE-23
POPULAR PUBLICATIONS
Answer:
a)
A/2
2- A/2
CNET-EE-24
COMPUTER NETWORKS
CNET-EE-26
COMPUTER NETWORKS
4. A 12 bit data bit block 011101010111
detection and correction. Show is to be set using hamming code for error
6th bit position how the receiver corrects an error
from right. that occurs in
Answer: WBUT 2013]
We need 5 parity bits
of positions 1,2,4, 8 and 16 from the
being I. Thus we have P,P,0P,||IP,0101011P;1. Ieft- the left most position
So, P=091919009011=0(i.e., Ex-or of bits 3, 5, 7, 9, 11, 13, 15 and 17)
P, = 011S1e011=l(i.e. Ex-or of bits 3, 6, 7, 10, 11, 14
and 15)
P =
1111001e1=0 (Ex-or of bits 5,
6,7, 12, 13, 14 and 15)
P,
=010919001®1 =0(Ex-or ofbits
9, 10, 11,12, 13, 14 and 15)
P =1 (Bit 17)
So, transmitted code is 01001110010101111
If Sixth bit from right has error, the received data is 01001110010001111
In receiver, we calculate Pi Pa again try
-
CNET-EE-27
POPULAR PUBLICATIONS
control
control
Error Check codes are the
Basis for comparison Flow Density Parity error in data.
approaches to correct the
cTOr occurred
reccivers Detects and corect the
Avoid overrunning of
Impact
buffer the data loss.
in thedata.
Find the CRC.
1010011110 and a divisor of 1011. WBUT 2016]
6. Given a 10 bit
sequence
1011
1011
I100
1011
1110
1011
1010
1011
1110
1101
1100
1101
001-Remainder
So, transmitted string is 11010111001
When the received string is again divided
by 1001. we get remainder 000
below: as shown
1001) 1010 00 0 1 1 1 1 (10 1 10 1.1 1
1001
1100
1001
1010
1001
1111
1001
1101
1001
--
1001
1001
000 Remainder
DHow does a single bit error differ from a burst error? WBUT 2014]
CNET-EE-29
POPULARPUBLIGATIONS
Answer:
in transmissions
There are two main types of errors
1. Single bit error
2. Burst error Eror
Burst Error
Single Bit
Types of erors
to 0 or from 0 to
1
changed from I
unit is
Single i error: It means only one bit of data
as shown in fig. OODDD Data Sent
Change bit
Data Received
Data Received
CNET-EE-30
cOMfUTERNETwoRiKS
token ring, frame relay, and
other data link layer
structures. Frames have headers technologies have their own främe
Therc arc three different types
that contain information
such as crror-chécking codes.
tell the receiver where the
of framing, each of which
block of data begins provides a way föfthe señder to
Byte-oriented framing: and ends:
characters that are encodedComputer data is normally stored as alphanumeric
framing differentiates with a combination
one byte from another.
of 8 bits (1 byte). This type of
was used in the terminal/mainframe It is an older style
of framing that
framing include IBM's environment. Examples
BISYNC protocol. of byte-oriented
Bit-oriented framing: This
string of bits at one time. type of framing allows the sender to transmit á'löng"
IBM's SDLC(Synchronous
HDLC (High-level Data Data Link Clntrol) and
Link Control) are examples
Most LANs use bit-oriented of bit-oriented protocols.
framing. There is usually
For example, Ethernet has a a maximum frame size.
maximum frame size.of
and end of a frame is signaled 1.526 bytes. The beginning
with a special bit sequence
If no data is being transmitted. (01111110
this same sequence is continuously for HDLC).
the end systems remain synchronized. transmitted so
Clock-based framing: In a clock-based
used to maintain a constant system, a series of repetitive pulšes
bit rate and keep the digital aré
stream. SONET (Synchronous bits aligned in thë data"
Optical Network) is a synchronous
which al the clocks in system in
the network are synchronized
reference. SONET frames are back
then positioned within the clocked
to a mšteFcl6ekna
3. a) Explain in detail stream.* 2
how an error.could be detected
for error detection. using the Checksum method
b) What do you mean
by flow control problem?
c) What is an ARQ?
Wait ARQ.
Discuss about the different opèratiöns
performed by Stop &
Answer -- WBUT 2015]
a) A checksum is a simple
type of redundancy check that is used
Erors frequently occur in data when to detect errors in data.
it is written to a disk, transmitted across
or otherwise manipulated. a network,
The errors are typically very
incorrect bit, but even such small errors small. for.example. a single,
make it useless. can greatly affect the quality of data..
and even
In its simplest
form, a checksum is created by calculating -
other block of'data using some algorithm the binary yalues in a-packet
and storing the results with ehe or,
or received at the other end of a network. dat, Whe the
data is retrieved from memory
IS calculated
and compared with the existing checksum.A a new checksum
match does not necessarily mean ngn-magh.indieates an.errgrAay
was not able to the absence of errors, but only that
the simple algorjthm,
detect any.
'Among the types of errors that cannot be detected
by simple.checksum algorithms are
reordering of the bytes, inserting
or deleting zero-valued bytes and.
cancel each other out. Fortunately, muljple.errors that
however, these errors can be detected
Sophisticated methods, such with, more
as cyclic redundancy checks (CRC).
Although such
CNET-EE-31
POPULAR PUBLICATIONS
resources (in the form of
disadvantage of requiring greatcr system unimportant
techniques have the become an increasingly
this has
processor time and bandwidth), continued increases in processor speed and
the
consideration in recent years as a result of
bandwidth.
the rate at which a
sender is transmitting is
mechanism that ensures
b) Flow control is the
receiving capabilities.
in proportion with the receiver's manage the flow of
data/packets
communications to
Flow control is utilized in data where the sending device
can send data
especially in cases
among two different nodes.
much faster than the recciver can digest.
frame irans
mission time
Propagation time ACK Irans
CKI niission time
frane
1
ACKO
frane
c
Time-out intenval
Frame lont:
A retranniits
CNET-EE-32
COMPUTER NETWORKS
4. a) Discuss about the
b) What do you mean bydifferent modes of operations performed by HDLC.
c)Whatis bandwidth-delaydata transparency and bit
product? stuffing in HDLC?
Answer: WBUT 2015]
a) The HDLC protocol is
a general purpose data
supporting a range of modes link control protocol capable of
of operation. The two most
The best-clfort or datagram prevalent modes are:
service: In this mode, the packets
frame, and a best-effort are carried in a Ul
delivery is performed (i.e. there
packet carried by the frame will is no guarantee that
be delivered.) The link the
recovery of lost frames. This layer does not provide error
mode is
protocol which itself uses datagram used for point-to-point links carrying a network
packets (e.g. IP). The control field
follows the address field and is of HDLC
the second part of all HDLC frames.
service is provided through the use The best-efftort
of U (un-numbered) frames consisting of a
byte with the value of Ox03. single
The Asynchronous Balanced Mode
(ABM): This provides a reliable data
point data link service and may be used point-to-
to provide a service which supports either
datagram or reliable network protocol. In a
this mode, the packets are carried in
numbered I-frames, which are acknowledged
by
supervisory frames. Error recovery (e.g. checkpoint the receiver using numbered
or go-back-n eor recovery) is
employed to ensure a well-ordered and reliable
flow of framnes.
b) Refer to Question No. 2 of Short Answer Type Questions.
5. a) What is the basic difference between CSMA and CSMAJCD? WBUT 2016]
cWhat do you mean by back offfactor in case of CSMA/CD protocol?
de) What is the working operation of stop and wait ARQ for lostacknowledgement?
Selective Repeat ARA of the window size must be at most 2/2. Explain it.
Answer:
a) CSMA/CD is a protocol that can detect collision where as CSMA is unable to detect it.
b) If a collision is detected, the transmitting station stops sending the frame data and
sends a 32-bit "jam sequence". If the collision is detected very early in the frame
transmission, the transmitting station will complete sending of the frame preamble before
CNET-EE-33
POPULAR PUBLICATIONS
ensure that
transmission of the jam sequence. The sequence jam is transmitted to
starting transmitting stations.
length of the collision is sufficient to be noticed by the other
the time
trans tting station waits a random period of
After sending the jam sequence the process over
using a random number generator before starting the transmission
chosen The probability of a repeated
from step above. This process is called "backoff. random period of time before
1
wait a
collision is reduced by having the colliding stations
retransmitting.
c) it.
it discards
If the sender receives a damaged ACK, retransmits frame 1.
When the timer of the sender expires, the sender
0 (R=0).
Receiver has already received frame and expecting to receive frame
1
1.
Therefore it discards the second codv of frame Receiver
Sender
S= 0 Frame 0 R=0
ACK.
S=1 Frame R=1
--
ACKO
Los R=0
Time-out S=1 FrameI
Expecting frame 0,
ACK 0 frame 1 discarded
S=0
Time Time
Sender Recelver
Frame
0
Sender Recelver
CNET-EF-34
cOMPUTER NETWORKS
Size of the sender and receiver
windows must be at most
window size should be 2 ^m /2 2. one-half 2 m. If m 2,
Fig compares a window size 2 of
of 3. Window size is 3 and all ACKs are lost, of with a window size
sender sends duplicate
ofhe receiver expect to receive frame 0 (part the of frame 0, window
Ist frame ofthe next cycle an error. of window), so accepts frame 0, as the
-
d d d
Redundant bits
Figure Positions of redundancy bits in hamming code
Basic approach for error detection by using Hamming
code is as follows:
To each group of m information bits k parity
bits are added to form (m+k) bit
code as shown in above figure.
Location of each of the (m+k) digits is assigned a decimal
value.
The k parity bits are placed in positions 1, 2,.., 2k-1 positions.-K
parity checks
are performed on selected digits of each codeword.
At the receiving end the parity bits are recalculated. The decimal value
parity bits provides the bit-position in error, if any.
of thek
CNET-EE-35
POPULAR PUBLICATIONS
Position number
Error pos!lion c3 c2 e1
1
7 6 5 4 3 2 o (no error) 0 00
d d d r, d, a 0 01
010
T 1.3,5.7 011
2.3 3,6,7
4, 5, 6,7
100
1
01
110
1
7 6 5 4 3 2 111
d, d, dar di z
Data 1010
1O1EOE
101EDE0 Addingr
101ED10 Adding r
110 11 100 10 Adding r
o0 10 Data sent
10 1corrupted
Rocolvod Data
1110 010
=6
Error position CC
110
1O 110 0l10 cormected data
Figure Use of Hamming code for eror comection for a 4-bit data
corréction for 4-bit numbers
Figure above shows how hamming code is used för
example data 1010,
(dedsdzd) with the help of three redundant bits (rrri). For the 1, 5
3, and 7. Then
first ri (0) is calculated considering the parity of the bit positions,
2, 3, 6 and 7. Finally, the
the parity bits r2 is calculated considering bit positions 7 as shown. If any
parity bits r4 is calculated corisidering bit positions 4, 5, and
6
in error can
corruption occurs in any of the transmitted code 1010010, the bit position
be found out by calculating r32ri at the receiving end. For
example, if the received
code word is 1110010, the recalculated value of rsrzr is 110, which indicates
that bit
position in error is 6, the decimal value of 110.
b) Go back-N ARQ:
Receiver sends Ack for the correctly received frame
An Acknowledgement field has a meaning of "next expected sequence number
(Example: Ack 2 means "next expected packet sequence number is 2 and a
packets up to 2(0, 1) are-received)
keep>
Sender keeps on sending frames (limited to the Window size) and receiver
on acknowledging.
When a frame is damaged, receiver sends a Reject control packet (Nak)
CNET-EE-36
COMPUTER NETWORKS
Sender goes back to the Rejected
rejected one even if those frames frame and sends all the frames starting with the
Sender's buffer size = Window are already sent to the receiver
size
Receivers buffer size = 1
Timeout
frane
0
RRPhil
RR
Jrame
1
frane
a Ci-buck-N ARQ
b) Token Bus was a 4 Mbps Local Area Networking technology created by IBM to
connect their terminals to IBM mainframes. Token bus utilized a copper coaxial cable to
connect multiple end stations (terminals, wokstations, shared printers etc.) to the
mainframe. The coaxial cable served as a common communication bus and a token was
created by the Token Bus protocol to manage or 'arbitrate' access to the bus. Any station
that holds the token packet has permission to transmit data. The station releases the token
when it is done communicating or when a higher priority device needs to transmit (such
as the mainframe). This keeps two or more devices from transmitting information on the
bus at the same time and accidentally destroying the transmitted data.
Token Bus suffered from two limitations. Any tailure in the bus caused all the devices
beyond the failure to be unable to communicate with the rest of the network. Šecond,
CNET-EE-37
POPULARPUBLICATIONS
more stations to the bus was somewhat difficult. Any new station that was
adding communicate and all devices beyond it
improperly attached was unlikely to be able to
seen as somewhat unreliable and
were also affected. Thus, token bus networks were
difficult to expand and upgrade.
CNET-EE-38
COMPUTER NETWORKS
CNET-EE-39
POPULAR PUBLICATIONS
Logical Link
Control
Medium Access
Control
To Physical Layer
upper-level
Layer 2 uses Logical Link Control (LLC) to communicate with the
layers.
will
Layer 2 uses Media Access Control (MAC) to decide which computer
transmit.
LLC serves to communicate upward to Network layer, independent of
the
CNET-EE-40
COMPUTER NETWORKS
START
Assemble Frame
Send RTS
CTS
Received?,
Transmit Frame
Assemble a frame
Phys. Addresses are used
(MAC addresses)
Attempt-1
No
Transmit 1* bit of
the frame Recovered
CNET-EE-42
COMPUTER NETWORKS
5. Discuss the principles
of operation of a
Answer: wireless LAN. [MODEL QUESTION
A wireless LAN (or WLAN,
LAWN, for local area for wireless local
arca network, sometimes
wireless network) is referred to as
local area network (LAN) one in which a mobile
through a wireless user can connect to a
of standards specify the technologies (radio) connection. The IEEE
for wireless LANs. 802.11 802.11 group
Ethernet protocol and CSMA/CA standards use
for path sharing and include (carrier sense multiple access with collision avoidance) he
an encryption method,
algorithm. the Wired Equivalent Privacy
High-bandwidth allocation
for wireless will make
classrooms, in the United States. possible a relatively low-cost
A similar frequency wiring of
Hospitals and businesses allocation has been made in Europe.
are also expected
existing LANs are not already to install wireless LAN
in place. systems where
Using technology from the Symbionics
made to fit on a Personal Computer Networks, Ltd., a wireless LAN
adapter can
for a laptop or notebook
Memory Card Industry Association (PCMCIA) be
computer. card
CNET-EE-43
POPULAR PUBLICATIONS
frame. Now
which recipient receives the
PPP header indicates recipient. Hence the address
b) The address field of be only one
point-to-point protocol, there can
PPP being a
must always be all 1-s. [MODEL QUESTION
implemented in WLAN?
9. Why is CSMA/CD not corrupted while
Answer: know whether its dala got
transmitter never gets to Hence, CSMA/CD,
which is based on
In Wireless LAN, a collision.
can detect in WLAN.
on way. That is, it never collision detection, is not used
collision detection, is based on [MODEL QUESTION]
frame?
10. i) Why bit stuffing is
needed in HDLC CSMAlCD?
ii) What is the purpose of
the jam signal in
Answer: bits into a transmission unit as a way to
insertion of one or more knows how to detect and
i) Bit stuffing is the The receiver
information to a receiver.
provide signaling synchronized
bits.
remove or disregard the stuffed T-carrier system signals is constantly
bit rate of repeaters. The
For example, the timing or adjacent repeater or between any two
and an in the data
between any terminal device detecting the transition in polarity for bits
l
.
The Preamble Field (8 bytes, 64 bits) is used
for synchronization. The first
seven bytes contain the bit pattern 10101010
and the eighth contain the pattem
10101011.
Destination Address specifies the Ethernet address of
bits the destination station, 48-
Source Address specifies Ethernet address of the
Type field specifies the type of data encapsulated,
source station, 48-bits
e.g. IP, ARP, RARP, etc, 16-
bits.
Data Field carries 46-1500 bytes.of data. If data length is
must be padded to 46 bytes.
lower than 46 bytes, it
CRC or Cyclical Redundancy Check, used for error
detection
The reason why there is an upper limit to the length
so that each station gets a fair chance with the of the data field, is fairly obvious
channel. The lower limit, and the reason
for padding in case that limit is not met, is as follows:
Suppose a station at one extreme of sends a very short frame. Before this
the other extreme, another station starts frame reaches
transmitting since it saw that the channel was
free. This of course leads to collision but the
fact that collision happens must travel back
to the first station for it to realize that and
that must happen before it has tinished with
transmitting the frame. Thus the minimum frame size is of duration
signal takes to travel from one end of the netwvork to twice the time a
the other, which is roughly 5 micro-
seconds on a Km long cable. 802.3 standard therefore specifies
1
length is 46 bytes which must be padded up if not present. that the minimum data
Answer:
that negotiate option settings, acknowledgements
PPP starts with LCP configure packets
is an iterative process. One endpoint proposes to a peer the
and rejects. PPP negotiation rejects the proposal, this endpoint
the peer to use. If the peer
ist of PPP options it wants agreement is reached. Figure illustrates
revised one. This continues until an
must send a Link options are
sequence and the LCP packets involved. Link
the PPPnegotiation connection. Each endpoint actively
independent for each direction of a point-to-point
for its receiving direction. Thus, both Host A and Host B begin by
negotiates options the call, since PPp
configure-request packet. It doesn't matter who initiated
sending a
shows negotiations separately in time for
operates peer to peer. Although the diagram
each direction, in practice, these events are intertwined.
1
PPP Connection
(1) Configure-request,
with list of options
(on/off) and values
(2) Configure-reject.
With unacceptable options, or
configure-nak, with altermate
(3) Configure-reques
values
with revised options
and revised values (4) Configure-ack.
Link parameters established
in the direction of Host B to
Host A
(5) Configure-request
(6) Configure-ack,
Link parameters
established in the
direction of Host A to (7)
Host B Establishment state complete.
Transition of Authenticating or networking state
CNET-EE-46
COMPUTER NETWORKS
option omitted in the original
configure-request. The PPP
configure-request must now endpoint originally sending tne
send a revised configure-request
Configure-Reject (code-4) based on this reply.
If the peer doesn't recognize some
options or refuses to accept some
the peer replies with a configure-reject, "do this" options,
unacceptable options. The This reply includes the list of unrecognized or
sender of the original configure-request
revised request based on this reply. must now a
Send
A configure-request LCP
packet embeds multiple PPP options.
changed from their default values Only those that need to be
are included in this packet. When PPP operates
default settings, the configure-request with all
sender doesn't include any options in the
field. A PPP peer responding to a LCP data
configuration request responds with
reject, configure-nak, or contigure-ack. LCP contigure
the point coordinator sends CF-Poll frame to the PCF capable station to permit it to
CNET-EE-47
POPULAR PUBLICATIONS
case the polled stations does not have any frames to send, then it
ransmit a frame. In
must transmit null frame.
How is the
Differentiate between non-persistent and l-persistent CSMA.
a)
chance of collision reduced in CSMA/CD?
in token ring9?
b) How does the receiver acknowledge a frame
ring?7
c) What is the function of wire center in token
d) How a new station is introduced in token bus? [MODEL QUESTION]
e) Describe the frame format in HDLC.
Answer: anyone
first distance to the channel to see if
a) In CSMA. a solution having data to send the
transmitting at that moment. If the channel is busy, the station waits till it finds
else is
free in 1-persistent CSMA, it transmits a
channel idle. If the station finds the channel CSMA, the station does not
with probability 1). In non-persistent
frame (i.e., it transmits busy when it tried to transmit.
continually sense the channel if it found the channel
Instead, it waits for a random period of time before trying
again.
1-persistent CSMA, the transmitting station
In CSMA/CD. which is a special case of
collision, and backs off for a random time.
stops transmitting immediately upon sensing a
the entire frame is not transmitted incase of
This way channel bandwidth is saved because
collision.
patterm called a "token" circulates around an
idle
b) In 802.5 token ring, a special bit
the token to start transmitting. The
network. A transmitting a station must first seize
to zero during transmission. The
frame format keep a bit reserved for ACK, which set to one but also re-adjusts the
is
this bit
destination station ACK-s the frame by setting
checksum.
is that a cable break anywhere kills the entire
c) One problem of any ring network
wire center solves this problem. Through logically a ring, physically each
network A
least two twisted pairs, as shown in
connected to the wire center using at
end station is
Station
the figure.
Cable
Bypass relay
Connector
Wire center
CNET-EE-48
COMPUTER NETWORKS
Inside the wire center there are bypass
relays driven by currents frorm
ring breaks or a station goes down, the station. If the
the relays do not get the drive current
released, carrying the problematic station to and are
be passed.
d) In 802.4 token but is physically linear
or free shaped but logically organized
Just after power on, a station is as-a
methodology for such a station to
not in the ring. The 802.4
standards rin
specify a complex
join the ring. Periodically, the
sOLICIT-SUCCESSOR frame token holder sends a
to solicit bids from stations
bids to enter within a "response window", willing to join. If no station
normal business follows.
station bids, it is included in the ring. If exactly on new
If more than one station bids, there will
collision. The token holder then runs be
an arbitration algorithm that
a RESOLVE-CONTENTION starts with broadcasting
frame.
8
e) Bits 8
20 16
01111110 Address Control Data Checksum 01111110
Fig: Frame format for bit-oriented
The HDLC frame has a starting flag byte protocols
(7EH) followed by an 8-bit Address
a terminal in a multi-terminal ine. The 8-bit to identify
control field is used for sequence numbers,
acknowledgements etc. The data field is
arbitrarily long. After the data is
field based on CRC-CCITT generator a 16-bit CRC
polynomial. The frame ends with
There are three kinds of frames Information, a flag byte.
-
Supervisory and Unnumbered.
5. a) How is CSMA a clear
improvement over ALOHA? How is it
by implementing SMA/CD? further improved
b) Suppose in a CSMA/CD LAN,
the maximum
usecond. If the LAN is operating in 10OMbps, end to end propagation delay is 25.6
length (in bytes) of the LAN? then what will be the minimum frame
Answer: [MODEL QUESTION
a) In both slotted and pure ALOHA,
a node's decision to transmit is made independently
of the activity of the other nodes attached
to the broadcast channel. In particular,
neither pays attention to whether another a node
node happens to be transmitting when it
to transmit,' nor
stops transmitting if another node begins begins
transmission. to interfere with its
Listen before speaking:
If someone else is speaking, wait until they are done.
channel before transmitting a frame To the
if from another node is currently being
transmitted
into the channel, a node
then waits ("backs off") a random amount of time and
Senses the channel. If the channel is then again
sensed to be idle, the node then begins frame
ransmission. Otherwise, the node waits another random
process. amount of time and repeats this
n CSMA, the "listen before speaking" principle is
employed. A node listens to the
nannel before transmitting. If a frame from another node is
d node currently being transmitted,
"backs off" for some (random) time before sensing if the
and so on. channel has become idle
CNET-EE-49
POPULARPUBLICATIONS
additionally checke
employed. A node
"collision-detection" is another
In CSMA/CD, additionally with another frame transmitted by
channel "collides" repeats listening before
speaking.
whether a frame put on the again "backs off" and
channel. In such a case the node
octets.
RTT= S1.2 jusecond = 5120 bits 640
=
bMinimum frame length = (100 Mbps* 51.2 us)
oriented protocols?
between bit oriented and byte [MODEL QUESTION
6. What is the difference
put, you have a flag
Answer: is used to frame the bits sent. Simply transmission
flag and you end the
In bit oriented Protocol, a after the flag
are sent any length.
(OA111110) and the required bits can send any number of bits of
method you
again with a flag. Using this used. Say for example, you want
to
zero insertion method
as a flag.
Another important fact is the cannot do this because it will be interpreted
You stream can be
send the bit string 01111110. 5 consecutive l's as a standard, this bit
However, by adding a zero after as 011111010 and the receiver removes the
zero
the string
send. The transmitter sends
stores the data as 011
11110.
and bits at a
after 5 consecutive l's
oriented protocol) the receiver considers 8
(character communicating
In byte oriented protocol character. This system is used when
relevant ASCIl
time and figures out the which use ASCII characters exclusively. (All the
COP is
with printers and keyboards bits (256 characters). The main disadvantage of
characters can be covered by 8 arbitrary bits. Furthermore, in COP there are special
10 bits, synchronize
that you cannot send 9 or characters, e.g. SYN character which is used to
characters channel control They will
-
CNET-EE-51
POPULAR PUBLICATIONS
The information frame circulates the ring until it reaches the intended destination station,
which copies the information for further processing. The information frame continues to
Circle the ring and is finally removed when it reaches the sending station. The sending
station can check the returning frame to see whether the frame was seen and subsequently
copied by the destination.
Unlike Ethernet CSMA/CD networks, token-passing networks are deterministic, which
means that it is possible to calculate the maximum time that will pass before any end
station will be capable of transmitting. This feature and several reliability features make
Token Ring networks ideal for applications in which delay must be predictable and
robust network operation is important.
The Fiber Distributed-Data Interface (FDDI) also uses the Token Passing protocol.
FDDI:
FDDI (Fiber-Distributed Data Interface) is a standard for data transmission on fiber optic
lines in that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the
token ring protocol. In addition to being large geographically, an FDDI local area network
can support thousands of useTs.
An FDD network contains two token rings, one for possible backup in case the primary ring
fails. The primary ring offers up to 100 Mbps capacity. If the secondary ring is not needed for
backup, it can also cary data, extending capacity to 200 Mbps. The single ring can extend the
maximum distance, a dual ring can extend 100 km (62 miles).
FDDI is a product of American National Standards Committee X3-T9 and conforms to the
open system interconnect (OSI) model of functional layering. It can be used to interconnect
add
LANs using other protocols. FDDI-II is a version of FDDI that adds the capability to
circuit-switched service to the network so that voice signals can also be handled. Work is
underway to connect FDDI networks to the developing Symchronous Optical Network..
alsesNbts)}
CNET-EE-52