Acn Pyqs Sol
Acn Pyqs Sol
2024
Q1.
Q2.
IP stands for Internet Protocol and v4 stands for Version Four (IPv4). IPv4 was the primary
version brought into action for production within the ARPANET in 1983. IP version four
addresses are 32-bit integers which will be expressed in decimal notation.
Characteristics of IPv4
IPv4 could be a numeric address, and its bits are separated by a dot.
The number of header fields is twelve and the length of the header field is twenty.
IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
Total Length: Length of header + Data (16 bits), which has a minimum value 20 bytes
and the maximum is 65,535 bytes.
Flags: 3 flags of 1 bit each : reserved bit (must be zero), do not fragment flag, more
fragments flag (same order)
Fragment Offset: Represents the number of Data Bytes ahead of the particular
fragment in the particular Datagram. Specified in terms of number of 8 bytes, which
has the maximum value of 65,528 bytes.
Time to live: Datagram’s lifetime (8 bits), It prevents the datagram to loop through
the network by restricting the number of Hops taken by a Packet before delivering to
the Destination.
Header Checksum: 16 bits header checksum for checking errors in the datagram
header
Option: Optional information such as source route, record route. Used by the
Network administrator to check whether a path is working or not.
Q3.
Q4. MACA Protocol and Control Signals
The Multiple Access with Collision Avoidance (MACA) protocol is designed to improve
wireless communication efficiency by addressing the hidden terminal and exposed terminal
problems using control signals. Unlike traditional CSMA (Carrier Sense Multiple Access),
MACA does not rely on carrier sensing but instead uses handshaking between sender and
receiver.
MACA uses three main control signals to coordinate communication between nodes:
3. DATA Transmission
Occurs when two nodes (A and C) are out of each other’s range but both are within range of
a common receiver (B). If A and C transmit simultaneously, collisions occur at B.
Neighboring nodes (e.g., C) overhear CTS and remain silent, preventing collision.
Occurs when a node (B) refrains from transmitting because it detects another transmission
nearby (A → C), even though its own transmission would not cause interference.
B overhears RTS from A but does not hear CTS from C (since C is far).
✅ B can safely send data to another node (e.g., D) without causing interference.
Q.7
1. Sender (A) checks if the busy tone is OFF (i.e., no ongoing transmission).
2. If the channel is free, A starts transmitting data while simultaneously activating the
busy tone.
3. Nearby nodes hear the busy tone and defer their transmissions until the channel is
free.
4. Once the transmission ends, the sender turns off the busy tone, allowing new
transmissions.
1. Single-Channel BTMA
Limitation: Nodes far away may still transmit, leading to hidden terminal problems.
2. Dual-Channel BTMA
Soft reservation is a channel access mechanism used in wireless networks where nodes can
temporarily reserve a communication channel while allowing flexibility for higher-priority
transmissions. Unlike hard reservation, which strictly allocates a channel, soft reservation
permits interruptions based on priority.
🔹 Key Characteristics:
Non-rigid allocation: Allows other users to use the channel if no transmission occurs.
Priority-based access: Higher-priority data can take over the reserved channel.
The SRMA/PA (Soft Reservation Multiple Access with Priority Assignment) protocol is
designed to handle real-time and high-priority data efficiently in wireless networks.
Working Mechanism of SRMA/PA:
o Other nodes recognize this reservation but do not block the channel
completely.
2. Priority Assignment:
3. Transmission Phase:
🔹 Advantage: Ensures critical data (e.g., emergency messages, real-time traffic) gets
priority while maintaining efficient channel utilization.
Q9.
T-MAC (Timeout-MAC) Protocol: Features for Energy Efficiency and Delay Reduction
🔹 Key Goal: Reduce energy consumption by minimizing idle listening while maintaining good
network performance.
Nodes remain active only for a short time and go to sleep if no activity is detected
within a predefined timeout.
If a node detects no incoming data within the timeout period, it sleeps early.
Uses Request to Send (RTS) and Clear to Send (CTS) handshaking to reduce
collisions.
Instead of fixed sleep intervals (as in S-MAC), nodes wake up only when needed.
Nodes stay awake when traffic is high and sleep more in low-traffic periods.
Conclusion
Features of S-MAC (Sensor-MAC) Protocol for Energy Efficiency and Delay Reduction
S-MAC (Sensor-MAC) is a medium access control (MAC) protocol designed specifically for
wireless sensor networks (WSNs). It focuses on energy efficiency while maintaining
reasonable delay performance.
o Nodes listen to the channel for a short period before going back to sleep.
4. Overhearing Avoidance
o Uses Request to Send (RTS) and Clear to Send (CTS) to prevent hidden
terminal problems.
3. Adaptive Listening
📌 Conclusion:
The duty cycle in MAC protocols refers to the fraction of time a node spends in an active
state (listening, transmitting, or receiving) versus a sleep state to conserve energy. Both S-
MAC (Sensor-MAC) and T-MAC (Timeout-MAC) employ periodic sleep schedules but differ
in how they manage active periods and energy efficiency.
Key Features:
Fixed Duty Cycle: Nodes follow a fixed sleep and wake cycle regardless of traffic
conditions.
Energy Efficiency: Reduces idle listening but may introduce delay if packets arrive
when the node is asleep.
1. Listening (Active Period): Nodes wake up and listen for RTS/CTS or data packets.
3. Sleep: After a fixed period, nodes enter a sleep state even if there’s more traffic.
📌 How to Draw:
1. Draw a timeline with periodic active and sleep intervals.
Key Features:
Adaptive Duty Cycle: The active period ends early if no activity is detected (timeout-
based).
1. Listening (Active Period): Similar to S-MAC, but the node waits for traffic only for a
short timeout.
3. Early Sleep: If no activity is detected, the node sleeps earlier than in S-MAC.
📌 How to Draw: