Delivery: The System Must Deliver Data To The Correct Destination. Accuracy: The System Must Deliver Data Accurately. Timeliness: The System Must Deliver Data in A Timely Manner
Delivery: The System Must Deliver Data To The Correct Destination. Accuracy: The System Must Deliver Data Accurately. Timeliness: The System Must Deliver Data in A Timely Manner
PART A
UNIT – I
DATA COMMUNICATION
1
9. Distinguish between peer-to-peer relationship and a primary-secondary
relationship.
Peer-to-peer relationship: All the devices share the link equally. Primary-
secondary relationship: One device controls traffic and the others must
transmit through it.
10. Assume 6 devices are arranged in a mesh topology. How many cables are
needed? How many ports are needed for each device?
Number of cables=n (n-1)/2=6(6-1)/2=15
Number of ports per device=n-1=6-1=5
11. Group the OSI layers by function.
The seven layers of the OSI model belonging to three subgroups. Physical, data link
and network layers are the network support layers; they deal with the physical aspects
of moving data from one device to another. Session, presentation and application layers
are the user support layers; they allow interoperability among unrelated software
systems. The transport layer ensures end-to-end reliable data transmission.
12. What are header and trailers and how do they get added and removed?
Each layer in the sending machine adds its own information to the message it
receives from the layer just above it and passes the whole package to the layer just
below it. This information is added in the form of headers or trailers. Headers are added
to the message at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving
machine, the headers or trailers attached to the data unit at the corresponding sending
layers are removed, and actions appropriate to that layer are taken.
13. The transport layer creates a communication between the source and
destination. What are the three events involved in a connection?
Creating a connection involves three steps: connection establishment, data
transfer and connection release.
14. What is the DC component?
Direct current is a zero-frequency signal with constant amplitude.
15. How does NRZ-L differ from NRZ-I?
In the NRZ-L sequence, positive and negative voltages have specific
meanings: positive for 0 and negative for 1. in the NRZ-I sequence, the voltages
are meaningless. Instead, the receiver looks for changes from one level to
another as its basis for recognition of 1s.
16. Using HDB3, encode the bit stream 10000000000100. Assume the number of
1s so far is odd and the first 1 is positive.
1 0 0 0 0 0 0 0 0 0 0 1 0 0
Amplitude
Time
17. What are the functions of a DTE? What are the functions of a DCE?
Data terminal equipment is a device that is an information source or an
information sink. It is connected to a network through a DCE.
2
Data circuit-terminating equipment is a device used as an interface between a
DTE and a network.
18. What does the electrical specification of EIA-232 describe?
The electrical specification of EIA-232 defines that signals other than data
must be sent using OFF as less than -3 volts and ON as greater than +3 volts.
The data must be transmitted using NRZ-L encoding.
19. Discuss the mode for propagating light along optical channels.
There are two modes for propagating light along optical channels, multimode
and single mode.
Multimode: Multiple beams from a light source move through the core in
different paths. Single mode: Fiber with extremely small diameter that limits
beams to a few angles, resulting in an almost horizontal beam.
20. What is refraction?
The phenomenon related to the bending of light when it passes from one
medium to another.
UNIT-II
DATA LINK LAYER
3
called a parity bit, is appended to every data unit so, that the total number of 0’s in
the unit (including the parity bit) becomes even.
7. Write short notes on LRC.
In longitudinal redundancy check (LRC), a block of bits is divided into rows
and a redundant row of bits is added to the whole block.
8. Write short notes on CRC.
The third and most powerful of the redundancy checking techniques is the
cyclic redundancy checks (CRC) CRC is based on binary division. Here a sequence
of redundant bits, called the CRC remainder is appended to the end of data unit.
9. Write short notes on CRC generator.
A CRC generator uses a modulo-2 division.
° In the first step, the 4-bit divisor is subtracted from the
first 4 bit of the
dividend.
° Each bit of the divisor is subtracted from the
corresponding bit of the
dividend without disturbing the next higher bit.
10. Write short notes on CRC checker.
A CRC checker functions exactly like a generator. After receiving the data
appended with the CRC it does the same modulo-2 division. If the remainder is all
0’s the CRC is dropped and the data accepted. Otherwise, the received stream of
bits is discarded and the dates are resent.
11. Give the essential properties for polynomial.
A polynomial should be selected to have at least the following properties.
a) It should not be
b) It should be divisible by(x+1).
12. Define checksum.
The error detection method used by the higher layer protocol is called
checksum. Checksum is based on the concept of redundancy.
13. What are the steps followed in checksum generator?
The sender follows these steps
a) The units are divided into k sections each of n bits.
b) All sections are added together using 2’s complement to get the sum.
c) The sum is complemented and become the checksum.
d) The checksum is sent with the data.
14. List out the steps followed is checksum checker side.
The receiver must follow these steps
a) The unit is divided into k section each of n bits.
b) All sections are added together using 1’s complement to get the sum.
c) The sum is complemented.
d) If the result is zero.
15. Write short notes on error correction.
It is the mechanism to correct the errors and it can be handled in 2 ways.
a) When an error is discovered, the receiver can have the
sender retransmit the entire data unit.
b) A receiver can use an error correcting coder, which
automatically corrects certain errors.
4
16. Mention the types of error correcting methods.
There are 2 error-correcting methods.
a) Single bit error correction
b) Burst error correction.
17. What is the purpose of hamming code?
A hamming code can be designed to correct burst errors of certain lengths.
So the simple strategy used by the hamming code to correct single bit errors must
be redesigned to be applicable for multiple bit correction.
18. Define flow control.
Flow control refers to a set of procedures used to restrict the amount of data.
The sender can send before waiting for acknowledgment.
19. What is a buffer?
Each receiving device has a block of memory called a buffer, reserved for
storing incoming data until they are processed.
20. Mention the categories of flow control.
There are 2 methods have been developed to control flow of data across
communication links.
a) Stop and wait- send one from at a time.
b) Sliding window- send several frames at a time.
UNIT III
NETWORK LAYER
1. What are the network support layers and the user support
layers? Network support layers:
The network support layers are Physical layer, Data link layer and Network layer. These
deals with electrical specifications, physical connection, transport timing and reliability.
User support layers:
The user support layers are: Session layer, Presentation layer, Application layer.
These allow interoperability among unrelated software system.
2. With a neat diagram explain the relationship of IEEE Project to the OSI model?
5
logical address, control information, and data. These functions are handled by the IEEE
802.2 logical link control (LLC) protocol.
4. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains
synchronization, flag, flow and error control specifications necessary to move
information from one place to another, as well as the physical address of the next
station to receive and route a packet.
5. What is protocol data unit?
The data unit in the LLC level is called Protocol Data Unit (PDU). It contains four
fields.
Destination Service Point Address (DSAP)
Source Service Access Point
Control field
Information field
6
Routers relay packets among multiple interconnected networks. They Route
packets from one network to any of a number of potential destination networks on
Internet routers operate in the physical, data link and network layer of OSI model.
14. What is meant by hop count?
The pathway requiring the smallest number of relays, it is called hop-count
routing, in which every link is considered to be of equal length and given the value one.
15. How can the routing be classified?
The routing can be classified as,
Adaptive routing
Non-adaptive routing.
16. What is time-to-live or packet lifetime?
As the time-to-live field is generated, each packet is marked with a lifetime,
usually the number of hops that are allowed before a packet is considered lost and
accordingly, destroyed. The time-to-live determines the lifetime of a packet.
17. What is meant by brouter?
A brouter is a single protocol or multiprotocol router that sometimes act as a
router and sometimes act as a bridge.
18. Write the keys for understanding the distance vector routing.
The three keys for understanding the algorithm are
Knowledge about the whole networks
Routing only to neighbors
Information sharing at regular intervals
19. Write the keys for understanding the link state routing.
The three keys for understanding the algorithm are
Knowledge about the neighborhood.
Routing to all neighbors.
Information sharing when there is a range.
20. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state
routing, cost is a weighted value based on a variety of factors such as security
levels, traffic or the state of the link.
UNIT IV
TRANSPORT LAYER
7
3. What is the difference between network layer delivery and the transport layer
delivery?
Network layer delivery Transport layer delivery
4. What are the four aspects related to the reliable delivery of data?
The four aspects are,
Error control
Sequence control
Loss control
Duplication control
5. What is meant by segment?
At the sending and receiving end of the transmission, TCP divides long
transmissions into smaller data units and packages each into a frame called a segment.
6. What is meant by segmentation?
When the size of the data unit received from the upper layer is too long for
the network layer datagram or data link layer frame to handle, the transport protocol
divides it into smaller usable blocks. The dividing process is called segmentation.
7. What is meant by Concatenation?
The size of the data unit belonging to single sessions are so small that several
can fit together into a single datagram or frame, the transport protocol combines them
into a single data unit. The combining process is called concatenation.
8. What are the types of multiplexing?
The types of multiplexing are,
Upward multiplexing
Downward multiplexing
9. What are the two possible transport services?
Two basic types of transport services
are, Connection service
Connectionless services
10. The transport layer creates the connection between source and
destination. What are the three events involved in the connection?
For security, the transport layer may create a connection between the
two end ports. A connection is a single logical path between the source and
destination that is associated with all packets in a message. Creating a
connection involves three steps:
Connection establishment
Data transfer & Connection release.
12. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a
rate greater than that allowed by network resources.
12. Why the congestion occurs in network?
8
Congestion occurs because the switches in a network have a limited
buffer size to store arrived packets.
13. What is meant by quality of service?
The quality of service defines a set of attributes related to the
performance of the connection. For each connection, the user can request a
particular attribute each service class is associated with a set of attributes.
14. What are the two categories of QoS attributes?
The two main categories
are User Oriented
Network Oriented
15. List out the user related attributes?
User related attributes are
SCR – Sustainable Cell
Rate PCR – Peak Cell Rate
MCR- Minimum Cell Rate
CVDT – Cell Variation Delay Tolerance
16. What are the networks related attributes?
The network related attributes
are, Cell loss ratio (CLR)
Cell transfer delay (CTD)
Cell delay variation (CDV)
Cell error ratio (CER)
17. What is the difference between service point address, logical address
and physical address?
Service point Logical addressing Physical addressing
addressing
The transport layer If a packet passes the If the frames are to be
header includes a type of network boundary we distributed to different
address called a service need another addressing systems on the network,
point address or port to differentiate the source the data link layer adds
address, which makes a and destination systems. the header, which defines
data delivery from a The network layer adds a the source machine’s
specific process on one header, which indicate address and the
computer to a specific the logical address of the destination machine’s
process on another sender and receiver. address.
computer.
9
20. What is LSP?
In link state routing, a small packet containing routing information sent by a
router to all other router by a packet called link state packet.
UNIT – V
APPLICATION LAYER
10
messages from the server, the SMTP client still needed on the desktop to
forward messages from the workstation user to its SMTP mail server.
9. Give the format of HTTP request message.
Request Line
Headers
A Blank Line
Body
(present only in
some messages)
Status Line
Headers
A Blank Line
Body
(present only in
some messages)
11
HTML is a computer language for specifying the contents and format of a
web document. It allows additional text to include codes that define fonts,
layouts, embedded graphics and hypertext links.
13. Define CGI.
CGI is a standard for communication between HTTP servers and
executable programs. It is used in crating dynamic documents.
14. Name four factors needed for a secure network.
Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender’s identity and that an imposter
has not sent the message.
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came
from a specific sender.
15. How is a secret key different from public key?
In secret key, the same key is used by both parties. The sender uses this
key and an encryption algorithm to encrypt data; the receiver uses the same key
and the corresponding decryption algorithm to decrypt the data.
In public key, there are two keys: a private key and a public key. The
private key is kept by the receiver. The public key is announced to the public.
16. What is a digital signature?
Digital signature is a method to authenticate the sender of a message. It is
similar to that of signing transactions documents when you do business with a
bank. In network transactions, you can create an equivalent of an electronic or
digital signature by the way you send data.
17. What are the advantages & disadvantages of public key
encryption? Advantages:
a) Remove the restriction of a shared secret key between two entities. Here each entity
can create a pair of keys, keep the private one, and publicly distribute the other one.
b) The no. of keys needed is reduced tremendously. For one million users to
communicate, only two million keys are needed.
Disadvantage:
If you use large numbers the method to be effective. Calculating the cipher text using
the long keys takes a lot of time. So it is not recommended for large amounts of text.
18. What are the advantages & disadvantages of secret key
encryption? Advantage:
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason
is that the key is usually smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
a) Each pair of users must have a secret key. If N people in world want to use
this method, there needs to be N (N-1)/2 secret keys. For one million people
to communicate, a half-billion secret keys are needed.
b) The distribution of the keys between two parties can be
difficult. 19. Define permutation.
Permutation is transposition in bit level.
Straight permutation: The no. of bits in the input and output are preserved.
Compressed permutation: The no. of bits is reduced (some of the bits are dropped).
Expanded permutation: The no. of bits is increased (some bits are repeated).
12
20. Define substitutional & transpositional encryption.
Substitutional: A character level encryption in which each character is replaced
by another character in the set.
Transpositional: A Character level encryption in which the characters retain
their plaintext but the position of the character changes.
PART B
UNIT I
Data communications
13
₃ Return to zero
₃ Biphase
Manchester
Differential Manchester
₃ Bipolar
₃ Alternate Mark Inversion(AMI)
₃ Bipolar 8-zero substitution(B8ZS)
₃ High-Density Bipolar 3(HDB3)
UNIT II
Data link layer
14
₃ 10 base 5 :Thick Ethernet
₃ 10 base 2 :Thin Ethernet
₃ 10 base T :Twisted-pair Ethernet
₃ 1 base 5 :Star LAN
UNIT III
Network layer
15
₃ Masks with subnetting
₃ Finding the subnetwork address
₃ Boundary level masking
₃ Non-boundary level masking
UNIT IV
Transport layer
16
₃ Leaky bucket
₃ Switch controlling the output rate
₃ Flowchart
UNIT V
Application Layer
17