0% found this document useful (0 votes)
107 views6 pages

17 EC 3085 Data Networks Protocols Test 1 Key

The document is the key for Test 1 for the course 17 EC 3085 Data Networks & Protocols. It contains answers to 11 questions related to data networking concepts. Specifically: - Question 1 discusses advantages of client-server systems using LANs compared to big timesharing systems. - Question 11 explains how CSMA/CA differs from CSMA/CD in how they handle collisions - CSMA/CA checks if the medium is busy before transmitting but does not deal with collision recovery, while CSMA/CD detects and terminates transmissions after a collision. - The remaining questions cover topics like bit rates for V.32 modems, bit stuffing, checksums, CRC, throughput calculations
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views6 pages

17 EC 3085 Data Networks Protocols Test 1 Key

The document is the key for Test 1 for the course 17 EC 3085 Data Networks & Protocols. It contains answers to 11 questions related to data networking concepts. Specifically: - Question 1 discusses advantages of client-server systems using LANs compared to big timesharing systems. - Question 11 explains how CSMA/CA differs from CSMA/CD in how they handle collisions - CSMA/CA checks if the medium is busy before transmitting but does not deal with collision recovery, while CSMA/CD detects and terminates transmissions after a collision. - The remaining questions cover topics like bit rates for V.32 modems, bit stuffing, checksums, CRC, throughput calculations
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

K LE F

Department of Computer Science and Engineering

17 EC 3085 Data Networks & Protocols

Test 1 Key

1. An alternative to a LAN is simply a big timesharing system with terminals for all users.
Give two advantages of a client-server system using a LAN 3M

Server is a computer program in a machine which is used to serve other computers that
contains data about particulat stream in an organization. A System which contains a server program
is called as server system. The system which request for any data to the server are called as clients
1M
In client-server system using LAN the clients can be far apart from the server where in a big
timesharing system terminals can be in the range of the same building.
The client is not limited to using the big timesharing system. It can use different servers eg. the
VPN server for remote workigna and the WWW server for web 2M

2. What is the maximum bit rate achievable in a V.32 standard modem if the baud rate is 1200
and no error correction is used? 3M

Modem V32 were able to transmit 5 bits per symbol 1M

At a rate of 1,200 baud, giving an effective bit rate of 6000 (i.e 5* 1200= 6000) 2M

3. A bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the
string actually transmitted after bit stuffing? 3M

In Bit Stuffing, each frame begins and ends with a special bit pattern called a flag byte 01111110. At
Sender side whenever data link layer encounters five consecutive ones in the data stream, it
automatically stuffs a 0 bit into the outgoing stream. when receiver sees five consecutive incoming
ones followed by a 0 bit, it automatically destuffs the 0 bit before sending the data to the network
layer. 1M

Data set to be transmitted 0111101111101111110


Separate set whenever encounter 5 consecutive ones 01111011111 011111 10
Data set after bit-stuffing 011110111110 0111110 10 1M
So 011110111110011111010 is the final string after bit-stuffing but the frame to be transmitted has
special bit pattern as well. Therefore the frame is
01111110 011110111110011111010 01111110 1M
4. Suppose that a message 1001 1100 1010 0011 is transmitted using Internet Checksum (4-bit
word). What is the value of the checksum? 3M

The process of Check sum is


1. Add the sum of characters in the message and transmit the message to the receiver

2. The receiver receives the message and perfrms the same summing method and compares the sum
and transmitted sum

3. If both sums are equal then there is no error during tranmission of data

4. If the both sums are not equal then there is error during the transmission of data

For above procedure 1M

As we are asked for 4-bit checksum, so divide the data into 4 bit words and add all.

1001 + 1100 = 0110


1010 + 0110 = 0001
0001 + 0011 = 0100 1M

And checksum will be the complement of 0100 which is 1011 . 1M

5. A bit stream 10011101 is transmitted using the standard CRC method described in the text.
The generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose that the
third bit from the left is inverted during transmission. Show that this error is detected at the
receiver’s end. Give an example of bit errors in the bit string transmitted that will not be
detected by the receiver. 5M

Generator G(x) = x3 + 1 encoded as 1001. As the generator polynomial is of the degree 3 we


append three zeros to the lower end of the frame to be transmitted. Hence after appending the 3
zeros the bit stream is 10011101000. 1M

Dividing the message by generator after appending three zeros to the frame as below.

Actual frame transmitted : 10011101000 – 100 = 10011101100 2M


Now suppose the third bit from the left is garbled and the frame is received as 10111101100. See
below
As we can see remainder is different from zero. Thus, the receiver detects the error and can ask for
are transmission. 2M

6. Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose
propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto
data frames. The headers are very short. Three-bit sequence numbers are used. What is the
maximum achievable channel utilization for Stop-and-wait? 5M

Let t=0 denote the start of transmission. Att=1msec, the first frame has been fully transmitted. 1M
Att=271msec, the first frame has fully arrived. Att=272msec, the frame acknowledging the first one
has been fully sent. 1M
Att=542msec, the acknowledgement bearing frame has fully arrived. Thus, the cycle is 542msec. A
total of kframes are sent in 542msec, for an efficiency of k/542. 1M

H ence k=1, efficiency=1/542=0.18% 2M

7. Consider the delay of pure ALOHA versus slotted ALOHA at low load. Which one is less?
Explain your answer. 5M

Slotted means the transmission media is time divided between all users of that media. 1M

If the "low load" means only one user, or just a few users with very short transmissions, then
throuput in a non slotted environment is optimum. As the number of users in a communications
environment increases and the message lengths increase, a slotted transmission media becomes
more desirable. In an unslotted environment message collisions are frequent and add to the delay as
load increases. 2M

Slotted ALOHA divides time into discrete intervals and each interval corresponds to a frame of
data. It requires users to agree on slot boundaries. It does not allow a system to transmit any time.
1M

Statistically pure ALOHA is supposed to be less efficient than slotted ALOHA, that means, at
normal load or when collisions occur in a contention channel. However, if the load is low, then pure
ALOHA is supposed to be as efficient as slotted ALOHA But if we consider the delay of sending
the packet in a slotted time as in the slotted ALOHA protocol, then we can say that slotted
ALOHA’s delay is more than the one in pure ALOHA protocol, which send the packet immediately.

Instead the system has to wait for the beginning if the next slot. 1M

7. Name the advantages of optical fiber over twisted-pair and coaxial cable. 5M

1. Greater Bandwidth: Copper cables were originally designed for voice transmission and have a
limited bandwidth. Fiber optic cables provide more bandwidth for carrying more data than copper
cables of the same diameter. 1M

2. Faster Speeds: Fiber optic cables have a core that carries light to transmit data. This allows fiber
optic cables to carry signals at speeds that are only about 31 percent slower than the speed of
light—faster than Cat5 or Cat6 copper cables. 1M
3. Longer Distances:Fiber optic cables can carry signals much farther than the typical 328-foot
limitation for copper cables. For example, some 10 Gbps singlemode fiber cables can carry signals
almost 25 miles. The actual distance depends on the type of cable, the wavelength and the network.
1M

4. Better Reliability:Fiber is immune to temperature changes, severe weather and moisture, all of
which can hamper the connectivity of copper cable. Plus, fiber does not carry electric current, so it’s
not bothered by electromagnetic interference (EMI) that can interrupt data transmission. It also does
not present a fire hazard like old or worn copper cables can. 1M
5. Thinner and Sturdier: Compared to copper cables, fiber optic cables are thinner and lighter in
weight. Fiber can withstand more pull pressure than copper and is less prone to damage and
breakage. 1M

9. We have 14 sources, each creating 500 8-bit characters per second. Since only some of these
sources are active at any moment, we use statistical TDM to combine these sources using
character interleaving. Each frame carries 6 slots at a time, but we need to add four-bit
addresses to each slot. Answer the following questions:
a. What is the size of an output frame in bits?
b. What is the output frame rate?
c. What is the duration of an output frame?
d. What is the output data rate? 9M

10. Figure shows a multiplexer in a synchronous TDM system. Each output slot is only 10 bits
long (3 bits taken from each input plus 1 framing bit). What is the output stream? The bits
arrive at the multiplexer as shown by the arrows. 9M

SOLUTIONS FOR PROBLEMS NUMBERED 9 AND 10 WILL BE DISCUSSED


DIRECTLY IN THE CLASS ROOM ONLY

11. How CSMA/CA differs from CSMA/CD. Explain in brief? 9M


Carrier Sense Multiple Access or CSMA is a Media Access Control (MAC) protocol that is
used to control the flow of data in a transmission media so that packets do not get lost and data
integrity is maintained 1M
A collision happens when two transmitters transmit at the same time. The data gets
scrambled, and the receivers would not be able to discern one from the other thereby causing the
information to get lost 1M
CSMA operates by sensing the state of the medium in order to prevent or recover from a
collision 1M
CSMA/CD operates by detecting the occurrence of a collision. Once a collision is detected,
CSMA/ CD immediately terminates the transmission so that the transmitter does not have to waste a
lot of time in continuing. Where as CSMA CA does not deal with the recovery after a collision.
What it does is to check whether the medium is in use. If it is busy, then the transmitter waits until it
is idle before it starts transmitting. This effectively minimizes the possibility of collisions and
makes more efficient use of the medium. 2M
CSMA CD is used mostly in wired installations because it is possible to detect whether a
collision has occurred. With wireless installations, it is not possible for the transmitter to detect
whether a collision has occurred or not. That is why wireless installations often use CSMA CA
instead of CSMA CD. 2M
CSMA CA reduces the possibility of a collision while CSMA CD only minimizes the
recovery time. 2M
12. How a Token Ring LAN does operate? 9M
A token ring is a local area network (LAN) topology where nodes are arranged in a ring
topology. Data passes sequentially between nodes on the network until it returns to the source
station. To prevent congestion and collision, a token ring topology uses a token to ensure that only
one node on the line is used at a time, thereby easily denoting media users of its activity. 2M

A token ring LAN is physically wired as a star topology but configured as a ring topology. 1M

Systems in the LAN are arranged in a logical ring; each system receives data frames from its
logical predecessor on the ring and sends them to its logical successor. The network may be an
actual ring, with cabling connecting each node directly to its neighbors, but more often is a star,
with the ring existing only logically in the wiring closet within the "multiaccess unit" to which all
the hosts connect. 2M
Operation :
1. Empty information frames are continuously circulated on the ring, along with frames containing
actual data; any node receiving an empty frame and having nothing to send simply forwards the
empty frame. 1M
2. When a computer has a message to send, it waits for an empty frame. When it has one, it does the
following: 1M
a) Inserts a token indicating that it is sending data in the frame
b) Inserts the data it wants to transmit into the payload section of the frame.
c) Sets a destination identifier on the frame.
3. When a computer receives a frame containing data (indicated by the token) it knows it cannot
transmit data of its own and so it does the following: 2M
a) If it is not the sender or the destination, it simply retransmits the frame, sending it to the next
host in the ring.
b) If it is the destination for the message, it copies the message from the frame and clears the
token to indicate receipt.
c) If it is the sender it sees that the message has been received, removes the message payload
from the frame and sends the empty frame around the ring.

You might also like