COMPUTER NETWORK Model Test Paper

Similar documents
INTRODUCTORY COMPUTER

Data Link Layer: Collisions

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

A typical WAN structure includes the following components.

ECE 4450:427/527 - Computer Networks Spring 2017

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.

Multiple-access protocols

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Chapter 6 Medium Access Control Protocols and Local Area Networks

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

CS 455/555 Intro to Networks and Communications. Link Layer

The Link Layer and LANs. Chapter 6: Link layer and LANs

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Data Networks. Lecture 1: Introduction. September 4, 2008

INSTITUTE OF AERONAUTICAL ENGINEERING Autonomous Dundigal, Hyderabad

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Mobile Communications Chapter 3 : Media Access

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Data Link Layer Technologies

2. Modelling of telecommunication systems (part 1)

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

Chapter 12 Multiple Access 12.1

Chapter 5 Link Layer and LANs

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

UNIT- 2 Physical Layer and Overview of PL Switching

Communication Networks - 3 general areas: data communications, networking, protocols

William Stallings Data and Computer Communications 7 th Edition. Chapter 10 Circuit Switching and Packet Switching

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

CSC 4900 Computer Networks: The Link Layer

Data & Computer Communication

Data Link Layer, Part 5. Medium Access Control

Computer network questions for final exam preparation 21/08/2017

Multiple Access Protocols

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Outline: Connecting Many Computers

Medium Access Control

Data Link Layer: Multi Access Protocols

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Link Layer and Ethernet

Links. CS125 - mylinks 1 1/22/14

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

BROADBAND AND HIGH SPEED NETWORKS

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

The MAC layer in wireless networks

COS 140: Foundations of Computer Science

Wireless Medium Access Control Protocols

Network Architecture

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Internet Architecture and Protocol

Link Layer and Ethernet

Subject: Adhoc Networks

Chapter 16 Networking

Internetworking Part 1

CS 4453 Computer Networks Winter

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Medium Access Control

Local Area Networks (LANs) SMU CSE 5344 /

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Data and Computer Communications

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Random Assignment Protocols

Access Technologies! Fabio Martignon

Chapter 10. Circuits Switching and Packet Switching 10-1

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Review of Topology and Access Techniques / Switching Concepts

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

COMP/ELEC 429/556 Introduction to Computer Networks

Data Link Layer, Part 3 Medium Access Control. Preface

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

ST.MOTHER THERESA ENGINEERING COLLEGE

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Protocols for Multiaccess Networks

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

Real-Time (Paradigms) (47)

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

Physical and Data Link layers

Special expressions, phrases, abbreviations and terms of Computer Networks

Data Link Layer -2- Network Access

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book

Introduction to Networking

Transcription:

Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol. Transmission Control Protocol (TCP) 1) Transmission Control Protocol (TCP) is a connection oriented protocol, which means the devices should open a connection before transmitting data and should close the connection gracefully after transmitting the data. 2) Transmission Control Protocol (TCP) assures reliable delivery of data to the destination. 3) Transmission Control Protocol (TCP) protocol provides extensive error checking mechanisms such as flow control and acknowledgment of data. 4) Sequencing of data is a feature of Transmission Control Protocol (TCP). 5) Delivery of data is guaranteed if you are using Transmission Control Protocol (TCP). 6) Transmission Control Protocol (TCP) is comparatively slow because of these extensive error checking mechanisms 7) Multiplexing and Demultiplexing is possible in Transmission Control Protocol (TCP) using TCP port numbers. 8) Retransmission of lost packets is possible in Transmission Control Protocol (TCP). User Datagram Protocol (UDP) 1) User Datagram Protocol (UDP) is Datagram oriented protocol with no overhead for opening a connection (using three-way handshake), maintaining a connection, and closing (terminating) a connection. 2) User Datagram Protocol (UDP) is efficient for broadcast/multicast type of network transmission. 3) User Datagram Protocol (UDP) has only the basic error checking mechanism using checksums. 4) There is no sequencing of data in User Datagram Protocol (UDP). 5) The delivery of data cannot be guaranteed in User Datagram Protocol (UDP). 6) User Datagram Protocol (UDP) is faster, simpler and more efficient than TCP. However, User Datagram Protocol (UDP) it is less robust then TCP 7) Multiplexing and Demultiplexing is possible in User Datagram Protocol (UDP) using UDP port numbers. 8) There is no retransmission of lost packets in User Datagram Protocol (UDP). B) Define the term Connection-oriented communication and Connection less communication.

Connection-oriented communication includes the steps of setting up a call from one computer to another, transmitting/receiving data, and then releasing the call, just like a voice phone call. However, the network connecting the computers is a packet switched network, unlike the phone system's circuit switched network. Connectionless service is typically provided by the TCP. Connectionless communication is just packet switching where no call establishment and release occur. A message is broken into packets, and each packet is transferred separately. Moreover, the packets can travel different route to the destination since there is no connection. Connectionless service is typically provided by the UDP (User Datagram Protocol). C) What is difference between physical and logical topology? A physical topology describes how devices are physically cabled together. A logical topology describes how devices communicate across the physical topology. D) Difference between Distance Vector Routing Protocol and Link State Routing Protocol. Distance Vector Routing: information twork. 1>Max Hop Count 2> Split horizon 3> Route poisoning 4> Hold down Timer Eg. RIP Link State Routing: casted topology loops

E) Explain broadcast network, point to point network and Multipoint networks. Broadcast Network: A computer network which has a single communication channel. A packet sent by one computer is received by all the others computers on the network. In telecommunication and information theory, broadcasting refers to a method of transferring a message to all recipients simultaneously. Broadcasting can be performed as a high level operation in a program, for example broadcasting Message Passing Interface, or it may be a low level networking operation, for example broadcasting on Ethernet. Point to Point Network: A simple Point to Point Network is a permanent link between two endpoints. A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between those two devices. Most point-to-point connections use an actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite links, are also possible. When you change television channels by infrared remote control, you are establishing a point-to-point connection between the remote control and the television's control system. Multipoint Network: A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a timeshared connection. Each unit is of 12.5 marks. Unit- I Ques 6: Compare and contrast FDMA, TDMA and CDMA techniques. In case of FDMA the bandwidth is divided into separate frequency bands. In case of TDMA the bandwidth is timeshared. On the other hand in case of CDMA data from all stations are transmitted simultaneously and are separated based on coding theory. Unlike FDMA, CDMA has soft capacity, which means that there is no hard limit on the number of users. Capacity of FDMA and TDMA is bandwidth limited, whereas the bandwidth of CDMA is interference limited. CDMA offers high capacity in comparison to FDMA and TDMA. CDMA also help to combat multipath fading Ques 7: What is ISDN? Explain types of services provided by ISDN. Integrated Services Digital Network is a set of digital transmission protocols defined by the international standards body for telecommunications, the U-T (previously called the CCT).

These protocols are accepted as standards by virtually every telecommunications carrier all over the world. ISDN complements the traditional telephone system so that a single pair of telephone wires is capable of carrying voice and data simultaneously. It is a fully digital network where all devices and applications present themselves in a digital form. The essential difference between ISDN and the conventional telephone system is that it is digital not analogue. Information travels as bits rather than as waves. In addition, it also allows multiple streams of these bits to occupy the same connection, providing the user with greater versatility of services. ISDN Services: There are two kinds of services provided by ISDN. Network Services: Network Services define how the user and the network interact with each other in order to manage calls. The user can use Network Services to request the network to perform functions such as making and clearing calls, transferring calls to another user, and so on. This activity is known as signaling. For example: setting up calls and disconnecting them Bearer Services: Bearer services carry the call activity that the user is performing at any given moment. This includes voice calls, fax and modem calls, and connections to the Internet. Broadly speaking, there are two forms of bearer service. Structured Data - the information passing over the bearer service is in a format that is understood by the network. Voice is an example of structured data. Because the network knows that the connection carrying voi ce, it can convert the data into an analogue signal in the event that the call is connected to an ordinary analogue phone. Unstructured Data - the format of the information is not understood by the network, but is understood by the two users at either end of the service. Unit-II Ques 8: Define ATM. What are advantages of ATM Network? Asynchronous Transfer Mode, is a high-speed network technology that supports the transportation of voice, data, and video signals over a single stream. ATM combines both circuit and packet switching methods into one flexible technology that makes for simple network processing functions. That digital data is encoded in the form of small fixed size cells (53-byte units) instead of the variable sized packets used by Internet Protocol or Ethernet. This ensures that the packets can be sent quickly and easily. ATM is connection oriented, which means that data sent through the ATM network will always follow the same pre-defined path with the data arriving in the order it was sent. Advantages of ATM Network The high-level benefits delivered through ATM services deployed on ATM technology using international ATM standards can be summarized as follows:

Dynamic bandwidth for bursty traffic meeting application needs and delivering high utilization of networking resources; most applications are or can be viewed as inherently bursty, for example voice is bursty, as both parties are neither speaking at once nor all the time; video is bursty, as the amount of motion and required resolution varies over time. Smaller header with respect to the data to make the efficient u se of bandwidth. Can handle mixed network traffic very efficiently: Variety of packet sizes makes traffic unpredictable. All network equipments should incorporate elaborate software systems to manage the various sizes of packets. ATM handles these problems efficiently with the fixed size cell. Cell network: All data is loaded into identical cells that can be transmitted with complete predictability and uniformity. Unit-III Ques 9: What role the active token monitor performs? Token ring is maintained with the help of active token monitor. Any one of the stations has the capability to act as active token monitor, but at a particular instant only one acts as active token monitor. It monitors various error situations such as multiple token, orphan packet, etc, and takes appropriate action to come out of the error situation. Ques 10: What is the advantage of token passing protocol over CSMA/CD protocol? The CSMA/CD is not a deterministic protocol. A packet may be delivered after many (up to 15) collisions leading to long variable delay. An unfortunate packet may not get delivered at all. This feature makes CSMA/CD protocol unsuitable for real-time applications. On the other hand, token passing protocol is a deterministic approach, which allows a packet to be delivered within a known time frame. It also allows priority to be assigned to packets. These are the two key advantages of token passing protocol over CSMA/CD protocol. Unit-IV Ques 11: What is vulnerable period? How it affects the performance in MAC protocols? The total period of time when collision may occur for a packet is called vulnerable period. Let, all packets have a fixed duration λ. Then vulnerable period is 2λ in pure ALOHA scheme and λ in slotted ALOHA scheme. If vulnerable period is long, probability of the occurrence collision increases leading to reduction in throughput.

Ques 12. How throughput is improved in slotted ALOHA over pure ALOHA? In pure ALOHA vulnerable period is 2λ. So, S/G = e-2g or throughput S = G e-2g, where G is the total number of packets. Maximum value of G = 0.5 or maximum throughput Smax = 1/2e. In slotted ALOHA, vulnerable period is λ and S/G = e-g or throughput S = G e-g. Here, maximum value of G is 1 and maximum throughput Smax = 1/e. Ques 13. What is the parameter a? How does it affect the performance of the CSMA protocol? The efficiency of CSMA scheme depends on propagation delay, which is represented by a parameter a as defined below. propagation delay a = -------------------------------- packet transmission time Smaller the value of propagation delay, lower is the vulnerable period and higher is the efficiency. If propagation delay is zero, collision cannot occur in CSMA scheme. But in practice, there is some delay and depending on the value of a collision occurs. Ques 14. How performance is improved in CSMA/CD protocol compared to CSMA protocol? In CSMA scheme, a station monitors the channel before sending a packet. Whenever a collision is detected, it does not stop transmission leading to some wastage of time. On the other hand, in CSMA/CD scheme, whenever a station detects a collision, it sends a jamming signal by which other station comes to know that a collision occurs. As a result, wastage of time is reduced leading to improvement in performance.