17 EC 3085 Data Networks Protocols Test 1 Key
17 EC 3085 Data Networks Protocols Test 1 Key
Test 1 Key
1. An alternative to a LAN is simply a big timesharing system with terminals for all users.
Give two advantages of a client-server system using a LAN 3M
Server is a computer program in a machine which is used to serve other computers that
contains data about particulat stream in an organization. A System which contains a server program
is called as server system. The system which request for any data to the server are called as clients
1M
In client-server system using LAN the clients can be far apart from the server where in a big
timesharing system terminals can be in the range of the same building.
The client is not limited to using the big timesharing system. It can use different servers eg. the
VPN server for remote workigna and the WWW server for web 2M
2. What is the maximum bit rate achievable in a V.32 standard modem if the baud rate is 1200
and no error correction is used? 3M
At a rate of 1,200 baud, giving an effective bit rate of 6000 (i.e 5* 1200= 6000) 2M
3. A bit string, 0111101111101111110, needs to be transmitted at the data link layer. What is the
string actually transmitted after bit stuffing? 3M
In Bit Stuffing, each frame begins and ends with a special bit pattern called a flag byte 01111110. At
Sender side whenever data link layer encounters five consecutive ones in the data stream, it
automatically stuffs a 0 bit into the outgoing stream. when receiver sees five consecutive incoming
ones followed by a 0 bit, it automatically destuffs the 0 bit before sending the data to the network
layer. 1M
2. The receiver receives the message and perfrms the same summing method and compares the sum
and transmitted sum
3. If both sums are equal then there is no error during tranmission of data
4. If the both sums are not equal then there is error during the transmission of data
As we are asked for 4-bit checksum, so divide the data into 4 bit words and add all.
5. A bit stream 10011101 is transmitted using the standard CRC method described in the text.
The generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose that the
third bit from the left is inverted during transmission. Show that this error is detected at the
receiver’s end. Give an example of bit errors in the bit string transmitted that will not be
detected by the receiver. 5M
Dividing the message by generator after appending three zeros to the frame as below.
6. Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose
propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto
data frames. The headers are very short. Three-bit sequence numbers are used. What is the
maximum achievable channel utilization for Stop-and-wait? 5M
Let t=0 denote the start of transmission. Att=1msec, the first frame has been fully transmitted. 1M
Att=271msec, the first frame has fully arrived. Att=272msec, the frame acknowledging the first one
has been fully sent. 1M
Att=542msec, the acknowledgement bearing frame has fully arrived. Thus, the cycle is 542msec. A
total of kframes are sent in 542msec, for an efficiency of k/542. 1M
7. Consider the delay of pure ALOHA versus slotted ALOHA at low load. Which one is less?
Explain your answer. 5M
Slotted means the transmission media is time divided between all users of that media. 1M
If the "low load" means only one user, or just a few users with very short transmissions, then
throuput in a non slotted environment is optimum. As the number of users in a communications
environment increases and the message lengths increase, a slotted transmission media becomes
more desirable. In an unslotted environment message collisions are frequent and add to the delay as
load increases. 2M
Slotted ALOHA divides time into discrete intervals and each interval corresponds to a frame of
data. It requires users to agree on slot boundaries. It does not allow a system to transmit any time.
1M
Statistically pure ALOHA is supposed to be less efficient than slotted ALOHA, that means, at
normal load or when collisions occur in a contention channel. However, if the load is low, then pure
ALOHA is supposed to be as efficient as slotted ALOHA But if we consider the delay of sending
the packet in a slotted time as in the slotted ALOHA protocol, then we can say that slotted
ALOHA’s delay is more than the one in pure ALOHA protocol, which send the packet immediately.
Instead the system has to wait for the beginning if the next slot. 1M
7. Name the advantages of optical fiber over twisted-pair and coaxial cable. 5M
1. Greater Bandwidth: Copper cables were originally designed for voice transmission and have a
limited bandwidth. Fiber optic cables provide more bandwidth for carrying more data than copper
cables of the same diameter. 1M
2. Faster Speeds: Fiber optic cables have a core that carries light to transmit data. This allows fiber
optic cables to carry signals at speeds that are only about 31 percent slower than the speed of
light—faster than Cat5 or Cat6 copper cables. 1M
3. Longer Distances:Fiber optic cables can carry signals much farther than the typical 328-foot
limitation for copper cables. For example, some 10 Gbps singlemode fiber cables can carry signals
almost 25 miles. The actual distance depends on the type of cable, the wavelength and the network.
1M
4. Better Reliability:Fiber is immune to temperature changes, severe weather and moisture, all of
which can hamper the connectivity of copper cable. Plus, fiber does not carry electric current, so it’s
not bothered by electromagnetic interference (EMI) that can interrupt data transmission. It also does
not present a fire hazard like old or worn copper cables can. 1M
5. Thinner and Sturdier: Compared to copper cables, fiber optic cables are thinner and lighter in
weight. Fiber can withstand more pull pressure than copper and is less prone to damage and
breakage. 1M
9. We have 14 sources, each creating 500 8-bit characters per second. Since only some of these
sources are active at any moment, we use statistical TDM to combine these sources using
character interleaving. Each frame carries 6 slots at a time, but we need to add four-bit
addresses to each slot. Answer the following questions:
a. What is the size of an output frame in bits?
b. What is the output frame rate?
c. What is the duration of an output frame?
d. What is the output data rate? 9M
10. Figure shows a multiplexer in a synchronous TDM system. Each output slot is only 10 bits
long (3 bits taken from each input plus 1 framing bit). What is the output stream? The bits
arrive at the multiplexer as shown by the arrows. 9M
A token ring LAN is physically wired as a star topology but configured as a ring topology. 1M
Systems in the LAN are arranged in a logical ring; each system receives data frames from its
logical predecessor on the ring and sends them to its logical successor. The network may be an
actual ring, with cabling connecting each node directly to its neighbors, but more often is a star,
with the ring existing only logically in the wiring closet within the "multiaccess unit" to which all
the hosts connect. 2M
Operation :
1. Empty information frames are continuously circulated on the ring, along with frames containing
actual data; any node receiving an empty frame and having nothing to send simply forwards the
empty frame. 1M
2. When a computer has a message to send, it waits for an empty frame. When it has one, it does the
following: 1M
a) Inserts a token indicating that it is sending data in the frame
b) Inserts the data it wants to transmit into the payload section of the frame.
c) Sets a destination identifier on the frame.
3. When a computer receives a frame containing data (indicated by the token) it knows it cannot
transmit data of its own and so it does the following: 2M
a) If it is not the sender or the destination, it simply retransmits the frame, sending it to the next
host in the ring.
b) If it is the destination for the message, it copies the message from the frame and clears the
token to indicate receipt.
c) If it is the sender it sees that the message has been received, removes the message payload
from the frame and sends the empty frame around the ring.