Cn1dc July 2016 Qp Solution

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

CN1 solved Question Paper 2016

Fifth Semester B.E. Degree Examination, July 2016


Computer Networks - 1
Time: 3 hrs. Max.Marks:100

PART – A

1 a) What is data communication? Explain with neat sketch three types of


communication between the devices considering data flow. (06 M)

“Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable”.

Communication between two devices can be simplex, half-duplex, or full-duplex as shown in


Figure 1.2. Below:

Figure 1.2: Data flow (simplex, half-duplex, and full-duplex)

➢ Simplex:
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of
the two devices on a link can transmit; the other can only receive (see Figure 1.2a).

Example: Keyboards and traditional monitors are examples of simplex devices.

Srivinay, Dept of CSE, SVIT Page 1


CN1 solved Question Paper 2016

➢ Half-Duplex:
In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa (see Figure 1.2b).

In a half-duplex transmission, the entire capacity of a channel is taken over by whichever


of the two devices is transmitting at the time.

Example: Walkie-Talkie.

➢ Full-Duplex:
In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously (see Figure 1.2c).

Example: Telephone network. (Both can talk and listen at the same time)

1 b) With sketch, explain two types of wide area network in use. (04 M)

We see two distinct examples of WANs today: point-to-point WANs and switched WANs.

Point-to-point WANs

• A point-to-point WAN is a network that connects two communicating devices through a


transmission media (cable or air).

Srivinay, Dept of CSE, SVIT Page 2


CN1 solved Question Paper 2016

Switched WAN

 A switched WAN is a network with more than two ends. A switched WAN, as we will see
shortly, is used in the backbone of global communication today.
 We can say that a switched WAN is a combination of several point-to-point WANs that
are connected by switches.

1 d) Give four levels of addresses used in TCP/IP protocol and give its significances. (04 M)
Refer 1(c) July 2015 solved QP

2 a) Define the following:

i. Frequency shift Keying:


In frequency shift keying, the frequency of the carrier signal is varied to represent data.
“The frequency of the modulated signal is constant for the duration of one signal element,
but changes for the next signal element if the data element changes.”
ii. Base band transmission: “Transmission of digital or analog signal without modulation,
using a low-pass channel.”

iii. Broad band transmission:

“Transmission of signals using modulation of a higher frequency signal.” The term implies a
wide-bandwidth data combined from different sources.
iv. SNR:

Srivinay, Dept of CSE, SVIT Page 3


CN1 solved Question Paper 2016
The signal-to-noise ratio is defined as

v. Nyquist bit rate:


For a noiseless channel, the Nyquist bit rate formula defines the theoretical maximum bit rate:

2 b) What is Latency? List out its components.

“The latency or delay defines how long it takes for an entire message to completely arrive
at the destination from the time the first bit is sent out from the source.”
Components:

(problems on the above Refer notes)

2 c) Draw the graph of the NRZ-L, NRZ-I, Manchester, differential Manchester scheme
using each of the following data streams, assuming that the last signa11evel has been
positive.
a. 00000000 b. 11111111 c. 01010101 d. 00110011

Srivinay, Dept of CSE, SVIT Page 4


CN1 solved Question Paper 2016

Srivinay, Dept of CSE, SVIT Page 5


CN1 solved Question Paper 2016

2 d) Give the block diagram of PCM encoder and state the role of each processes.

Pulse Code Modulation (PCM)


The most common technique to change an analog signal to digital data (digitization) is
called pulse code modulation (PCM). A PCM encoder has three processes.
1. The analog signal is sampled.
2. The sampled signal is quantized.
3. The quantized values are encoded as streams of bits.

Sampling:
• The first step in PCM is sampling. The analog signal is sampled every Ts s, where Ts
is the sample interval or period.
• The inverse of the sampling interval is called the sampling rate or sampling
frequency and denoted by fs, where fs = 1/Ts.
• There are three sampling methods-ideal, natural, and flat-top.

Quantization

• The result of sampling is a series of pulses with amplitude values between the
maximum and minimum amplitudes of the signal.
• The set of amplitudes can be infinite with nonintegral values between the two limits.

Srivinay, Dept of CSE, SVIT Page 6


CN1 solved Question Paper 2016

These values cannot be used in the encoding process.


The following are the steps in quantization:
1. We assume that the original analog signal has instantaneous amplitudes between
Vmin and
Vmax.
2. We divide the range into L zones, each of height
(delta). Δ = (Vmax-Vmin)/L
3. We assign quantized values of 0 to L - 1 to the midpoint of each zone.

4. We approximate the value of the sample amplitude to the quantized values.

Encoding:
The last step in PCM is encoding. After each sample is quantized and the number of bits
per sample is decided, each sample can be changed to an nb-bit code word.

3 a) What is multiplexing? Differentiate synchronous TDM with statistical TDM


giving the working of both procedures in brief (06 M)
➢ “Multiplexing is the set of techniques that allow the simultaneous
transmission of multiple signals across a single data link”
Synchronous TDM

“In synchronous TDM, each input connection has an allotment in the output even if it
is not sending data.”

Srivinay, Dept of CSE, SVIT Page 7


CN1 solved Question Paper 2016

• In synchronous TDM, the data flow of each input connection is divided into units, where
each input unit occupies one output time slot. A unit can be 1 bit, one character, or one
block of data.
• Each input unit becomes one output unit and occupies one output time slot.
• However, the duration of an output time slot is n times shorter than the duration of an
input time slot. If an input time slot is T s, the output time slot is T/n s, where n is the
number of connections.
• In synchronous TDM, a round of data units from each input connection is collected into
a frame. If we have n connections, a frame is divided into n time slots and one slot is
allocated for each unit, one for each input line. If the duration of the input unit is T, the
duration of each slot is T/n and the duration of each frame is T.

Statistical TDM
• As we saw in the previous section, in synchronous TDM, each input has a reserved slot
in the output frame.
• This can be inefficient if some input lines have no data to send.
• In statistical time-division multiplexing, slots are dynamically allocated to improve
bandwidth efficiency. Only when an input line has a slot’s worth of data to send is it
given a slot in the output frame.
• The multiplexer checks each input line in round robin fashion; it allocates a slot for an
input line if the line has data to send; otherwise, it skips the line and checks the next
line.

Srivinay, Dept of CSE, SVIT Page 8


CN1 solved Question Paper 2016

➢ Figure above shows a synchronous and a statistical TDM example. In the former, some
slots are empty because the corresponding line does not have data to send.
➢ In the latter, however, no slot is left empty as long as there are data to be sent by any
input line.

3 c) Explain in brief FHSS technique. (06 M)


Frequency Hopping Spread Spectrum (FHSS)
• The frequency hopping spread spectrum (FHSS) technique uses M different carrier
frequencies that are modulated by the source signal.
• At one moment, the signal modulates one carrier frequency; at the next moment, the
signal modulates another carrier frequency. Although the modulation is done using
one carrier frequency at a time, M frequencies are used in the long run.
• The bandwidth occupied by a source after spreading is BpHSS »B.
The general layout for FHSS is shown below:

Srivinay, Dept of CSE, SVIT Page 9


CN1 solved Question Paper 2016

• A pseudorandom code generator, called pseudorandom noise (PN), creates a k-bit


pattern for every hopping period Th.
• The frequency table uses the pattern to find the frequency to be used for this
hopping period and passes it to the frequency synthesizer.
• The frequency synthesizer creates a carrier signal of that frequency, and the source
signal modulates the carrier signal.
• Suppose we have decided to have eight hopping frequencies. This is extremely low
for real applications and is just for illustration. In this case, M is 8 and k is 3. The
pseudorandom code generator will create eight different 3-bit patterns. These are
mapped to eight different frequencies in the frequency table.

The pattern for this station is 101, 111, 001, 000, 010, all, 100. Note that the pattern is
pseudorandom it is repeated after eight hopping’s. This means that at hopping period 1,

Srivinay, Dept of CSE, SVIT Page 10


CN1 solved Question Paper 2016

the pattern is 101. The frequency selected is 700 kHz; the source signal modulates this
carrier frequency. The second k-bit pattern selected is 111, which selects the 900-kHz
carrier; the eighth pattern is 100, the frequency is 600 kHz. After eight hopping’s, the
pattern repeats, starting from 101 again. Figure shows how the signal hops around from
carrier to carrier. We assume the required bandwidth of the original signal is 100 kHz.

4 b) Find codeword, using cyclic redundancy code given generator 1011, data word
1001 and show how it is used to check for error detection in the receiver side. (08 M)
Refer 4(c) Jan 2014 solved QP

5 a) With neat sketch, explain two approaches used in variable size framing.

Character-Oriented Framing:

• In character-oriented (or byte-oriented) framing, data to be carried are 8-bit


characters from a coding system such as ASCII.

• Figure shows the format of a frame in a character-oriented protocol.

➢ Character-oriented framing was popular when only text was exchanged by the data-
link layers. The flag could be selected to be any character not used for text
communication.

➢ Now, however, we send other types of information such as graphs, audio, and video,
any character used for the flag could also be part of the information.

➢ If this happens, the receiver, when it encounters this pattern in the middle of the
data, thinks it has reached the end of the frame.

Srivinay, Dept of CSE, SVIT Page 11


CN1 solved Question Paper 2016

➢ To fix this problem, a byte-stuffing strategy was added to character-oriented


framing.

➢ In byte stuffing (or character stuffing), a special byte is added to the data section of
the frame when there is a character with the same pattern as the flag. The data
section is stuffed with an extra byte. This byte is usually called the escape character
(ESC) and has a predefined bit pattern.

➢ Whenever the receiver encounters the ESC character, it removes it from the data
section and treats the next character as data, not as a delimiting flag.

➢ Figure shows the situation.

Bit-Oriented Framing:

• In bit-oriented framing, the data section of a frame is a sequence of bits to be


interpreted by the upper layer as text, graphic, audio, video, and so on. However, in
addition to headers (and possible trailers), we still need a delimiter to separate one
frame from the other. Most protocols use a special 8-bit pattern flag, 01111110, as the
delimiter to define the beginning and the end of the frame, as shown in Figure below.

➢ This flag can create the same type of problem we saw in the character-oriented
protocols. That is, if the flag pattern appears in the data, we need to somehow
inform the receiver that this is not the end of the frame.

Srivinay, Dept of CSE, SVIT Page 12


CN1 solved Question Paper 2016

➢ We do this by stuffing 1 single bit (instead of 1 byte) to prevent the pattern from
looking like a flag. The strategy is called bit stuffing.

➢ In bit stuffing, if a 0 and five consecutive 1 bits are encountered, an extra 0 is added.
This extra stuffed bit is eventually removed from the data by the receiver.

➢ Note that the extra bit is added after one 0 followed by five 1s regardless of the
value of the next bit. This guarantees that the flag field sequence does not
inadvertently appear in the frame.

5 c) What are the three types of HDLC frames used in HDLC bit oriented protocol?
Explain its significance with its structure. Show how that frames can be used for
exchange of data using piggy backing. (08 M)

Refer 5(b) and 5(c) of January 2015 solved QP

6 a) With flow diagram, explain the working of CSMA/CD (08 M)

Refer 6(a) (ii) Jan 2014 solved QP

6 b) Explain working of CDMA with suitable example. (06 M)

Refer 6(b) (ii) Jan 2015 solved QP

6 c) Give the details of minimum and maximum length of Ethernet frame. With an
example, explain the format of Ethernet addresses. (06 M)

• An Ethernet frame needs to have a minimum length of 512 bits or 64 bytes. Part of this
length is the header and the trailer. If we count 18 bytes of header and trailer (6 bytes of
source address, 6 bytes of destination address, 2 bytes of length or type, and 4 bytes of

Srivinay, Dept of CSE, SVIT Page 13


CN1 solved Question Paper 2016

CRC), then the minimum length of data from the upper layer is 64 - 18 = 46 bytes. If the
upper-layer packet is less than 46 bytes, padding is added to make up the difference.
• The standard defines the maximum length of a frame (without preamble and SFD field)
as 1518 bytes. If we subtract the 18 bytes of header and trailer, the maximum length of
the payload is 1500 bytes. If the upper-layer packet is more than 1500 bytes,
Fragmentation technique is used.

The format of the MAC frame is shown in the figure.

• Preamble. The first field of the 802.3 frame contains 7 bytes (56 bits) of alternating
0s and 1s that alerts the receiving system to the coming frame and enables it to
synchronize its input timing.
• Start frame delimiter (SFD). The second field (1 byte: 10101011) signals the
beginning of the frame. The SFD warns the station or stations that this is the last
chance for synchronization. The last 2 bits is 11 and alerts the receiver that the next
field is the destination address.
• Destination address (DA). The DA field is 6 bytes and contains the physical address
of the destination station or stations to receive the packet.
• Source address (SA). The SA field is also 6 bytes and contains the physical address
of the sender of the packet.
• Length or type. Define upper layer protocol, length: the number of bytes in data
field Data. It is a minimum of 46 and a maximum of 1500 bytes.

Srivinay, Dept of CSE, SVIT Page 14


CN1 solved Question Paper 2016

• CRC. The last field contains error detection information, in this case a CRC-32.

7 a) With neat sketch, explain BSS and ESS

The standard defines two kinds of services: the basic service set (BSS) and the extended
service set (ESS).

Basic Service Set

Figure: Basic service sets (BSSs)


➢ IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN.
➢ A basic service set is made of stationary (not moving) or mobile (moving stations) wireless
stations and an optional central base station, known as the access point (AP).
➢ The BSS without an AP is a stand-alone network and cannot send data to other BSSs. It is
called an ad hoc architecture.
• In this architecture, stations can form a network without the need of an AP; they can
locate one another and agree to be part of a BSS.
➢ A BSS with an AP is referred to as an infrastructure network.

Srivinay, Dept of CSE, SVIT Page 15


CN1 solved Question Paper 2016

Extended Service Set

Figure : Extended service sets (ESSs)

➢ An extended service set (ESS) is made up of two or more BSSs with APs.
➢ In this case, the BSSs are connected through a distribution system, which is usually a wired
LAN. The distribution system connects the APs in the BSSs.
➢ The extended service set uses two types of stations: mobile and stationary. The mobile
stations are normal stations inside a BSS. The stationary stations are AP stations that are part
of a wired LAN.
➢ When BSSs are connected, the stations within reach of one another can communicate without
the use of an AP. However, communication between two stations in two different BSSs
usually occurs via two APs.

7 b) Explain with necessary sketch IEEE 802.11 addressing mechanism (08 M)

Addressing Mechanism
The IEEE 802.11 addressing mechanism specifies four cases, defined by the value of
the two flags in the FC field, To DS and From DS. Each flag can be either 0 or 1, resulting in

Srivinay, Dept of CSE, SVIT Page 16


CN1 solved Question Paper 2016

four different situations. The interpretation of the four addresses (address 1 to address 4)
in the MAC frame depends on the value of these flags, as shown in table below:

Table: Addresses

Figure: Addressing mechanisms

• Case 1: 00 In this case, To DS = 0 and From DS = 0. This means that the frame is not
going to a distribution system (To DS = 0) and is not coming from a distribution system
(From DS =0). The frame is going from one station in a BSS to another without passing
through the distribution system. The ACK frame should be sent to the original sender.
The addresses are shown in figure above.
• Case 2: 01 In this case, To DS = 0 and From DS = 1. This means that the frame is
coming from a distribution system (From DS = 1). The frame is coming from an AP and

Srivinay, Dept of CSE, SVIT Page 17


CN1 solved Question Paper 2016

going to a station. The ACK should be sent to the AP. The addresses are as shown in
figure above.
• Case 3: 10 In this case, To DS =1 and From DS = 0. This means that the frame is going
to a distribution system (To DS = 1). The frame is going from a station to an AP. The ACK
is sent to the original station. The addresses are as shown in figure above.
• Case 4: 11 In this case, To DS =1 and From DS =1. This is the case in which the
distribution system is also wireless. The frame is going from one AP to another AP in a
wireless distribution system. Here, we need four addresses to define the original
sender, the final destination, and two intermediate APs. Figure above shows the
situation.

7 c) Show two types of networks used in Bluetooth. Explain in brief the same (06 M)

Bluetooth defines two types of networks: piconet and scatternet.

Piconets

Figure: Piconet

• A Bluetooth network is called a piconet, or a small net.


• A piconet can have up to eight stations, one of which is called the primary; the rest are called
secondaries.
• All the secondary stations synchronize their clocks and hopping sequence with the primary.
• Piconet can have only one primary station. The communication between the primary and the
secondary can be one-to-one or one-to-many.

Srivinay, Dept of CSE, SVIT Page 18


CN1 solved Question Paper 2016

• Although a piconet can have a maximum of seven secondaries, an additional eight


secondaries can be in the parked state.
• A secondary in a parked state is synchronized with the primary, but cannot take part in
communication until it is moved from the parked state. Because only eight stations can be
active in a piconet, activating a station from the parked state means that an active station
must go to the parked state.

Scatternet
Figure: Scatternet

• Piconets can be
combined to form what
is called a scatternet.
• A secondary
station in one piconet
can be the primary in
another piconet.
• This station can
receive messages from
the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to
secondaries in the second piconet.
• A station can be a member of two piconets.

Srivinay, Dept of CSE, SVIT Page 19


CN1 solved Question Paper 2016

8 b) Give the IPv4 datagram format and brief description of each field (10 M)

 Version (VER): This 4-bit field defines the version of the IPv4 protocol. Currently the
version is 4. However, version 6 (or IPng) may totally replace version 4 in the future.

 Header Length: The 4-bit header length (HLEN) field defines the total length of the
datagram header in 4-byte words. The IPv4 datagram has a variable-length header.
However, to make the value of the header length (number of bytes) fit in a 4-bit header
length, the total length of the header is calculated as 4-byte words. The total length is
divided by 4 and the value is inserted in the field. The receiver needs to multiply the
value of this field by 4 to find the total length.

 Service Type: In the original design of the IP header, this field was referred to as
type of service (TOS), which defined how the datagram should be handled.

 Total Length: This 16-bit field defines the total length (header plus data) of the IP
datagram in bytes. This field helps the receiving device to know when the packet has
completely arrived. To find the length of the data coming from the upper layer, subtract
the header length from the total length. The header length can be found by multiplying
the value in the HLEN field by 4.

Srivinay, Dept of CSE, SVIT Page 20


CN1 solved Question Paper 2016

 Identification, Flags, and Fragmentation Offset: These three fields are related to the
fragmentation of the IP datagram when the size of the datagram is larger than the
underlying network can carry. We discuss the contents and importance of these fields
when we talk about fragmentation in the next section.

 Time-to-live: Due to some malfunctioning of routing protocols a datagram may be


circulating in the Internet, visiting some networks over and over without reaching the
destination. This may create extra traffic in the Internet. The time to-live (TTL) field is
used to control the maximum number of hops (routers) visited by the datagram. When
a source host sends the datagram, it stores a number in this field. Each router that
processes the datagram decrements this number by one. If this value, after being
decremented, is zero, the router discards the datagram.

 Protocol: This 8-bit field defines the higher-level protocol that uses the services of the
IPv4 layer. An IPv4 datagram can encapsulate data from several higher-level protocols
such as TCP, UDP, ICMP, and IGMP. When the payload is encapsulated in a datagram at
the source IP, the corresponding protocol number is inserted in this field; when the
datagram arrives at the destination, the value of this field helps to define to which
protocol the payload should be delivered

 Header checksum: IP is not a reliable protocol; it does not check whether the payload
carried by a datagram is corrupted during the transmission. The datagram header,
however, is added by IP, and its error-checking is the responsibility of IP. Errors in the
IP header can be a disaster.

 Source and Destination Addresses: These 32-bit source and destination address
fields define the IP address of the source and destination respectively. Note that the
value of these fields must remain unchanged during the time the IP datagram travels
from the source host to the destination host.

Srivinay, Dept of CSE, SVIT Page 21


CN1 solved Question Paper 2016

 Options: A datagram header can have up to 40 bytes of options. Options can be used
for network testing and debugging.

No Operation: A no-operation option is a 1-byte option used as a filler between


options.

End of Option: An end-of-option option is a 1-byte option used for padding at the end
of the option field. It, however, can only be used as the last option.

Record Route: A record route option is used to record the Internet routers that handle
the datagram. It can be used for debugging and management purposes.

Strict Source Route: A strict source route option is used by the source to
predetermine a route for the datagram as it travels through the Internet. Dictation of a
route by the source can be useful for several purposes. The sender can choose a route
with a specific type of service, such as minimum delay or maximum throughput.
Alternatively, it may choose a route that is safer or more reliable for the sender's
purpose

Loose Source Route: A loose source route option is similar to the strict source route,
but it is less rigid. Each router in the list must be visited, but the datagram can visit
other routers as well.

Timestamp: A timestamp option is used to record the time of datagram processing by


a router. Knowing the time a datagram is processed can help users and managers track
the behaviour of the routers in the Internet. We can estimate the time it takes for a
datagram to go from one router to another.

Srivinay, Dept of CSE, SVIT Page 22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy