Unit 2
Unit 2
2 Marks
1. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains synchronization,
flag, flow and error control specifications necessary to move information from one place to
another, as well as the physical address of the next station to receive and route a packet.
2. What is Ethernet?
Ethernet is a multiple-access network, meaning that a set of nodes send and receive
frames over a shared link.
3. Define Repeater?
A repeater is a device that forwards digital signals, much like an amplifier forwards
analog signals. However, no more than four repeaters may be positioned between any pairs of
hosts, meaning that an Ethernet has a total reach of only 2,500m.
12. What are the three pieces of information in the configuration messages?
1. The ID for the bridge that is sending the message.
2. The ID for what the sending bridge believes to the root bridge.
3. The distance, measured in hops, from the sending bridge to the root bridge.
15. How does a given bridge learn whether it should forward a multicast frame over a
given port?
It learns exactly the same way that a bridge learns whether it should forward a unicast
frame over a particular port- by observing the source addresses that it receives over that port.
Fast Ethernet cards connect to networks at a rate of 100 Mbps while Gigabit network cards can
connect at speeds up to 1000mb/s. The main difference between the two is speed. A fast Ethernet
card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that speed.
However, the existence of FDDIs around made this technology more like a stepping stone to
something better – enter the gigabit card. Gigabit networks are made to run the best at Layer 3
switching meaning it has more route functionality than the 100mbs fast Ethernet.
18. What is the difference between switch and bridge? (NOV/DEC 2012)
Bridge Switch
A bridge is device which operates at the A bridge with more than two interface
data link layer. It may be used to join two (ports)is also known as a switch
LAN segment(A,B),Constructing a larger
LAN
Bridges receive Ethernet frames then A switch, on the other hand ,forward the
forward all frames, like a repeater frame to only the required interfaces
Bridges learns the association between the The switch reduces the number the
system MAC addresses and the interface number of packets on the other LAN
2
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
ports. segments, by sending the packet only
where it need to go.
.
19. Define bridge and switch. (NOV/DEC 2012)
Bridges are software based ,while switches are hardware based
Bridges can only have one spanning –tree instance per bridge, while switches can
have many
Bridges can only have up to 16 ports, whereas a switch can have hundreds.
20. State the difference between token ring and FDDI? (NOV/DEC 2010)
22. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of this
network? (APRIL/MAY 2011)
Throughput= (12,000*10,000)/60=2Mbps.
It is 1/5th of bandwidth.
23. What is the role of VCI?
A virtual channel identifier (VCI) distinguishes virtual channels (also known as circuits) created
in a packet/cell switched network. A VCI has multiple circuits per communication channel and is
primarily used for managing the unique identification of each created circuit.
27. Define ICMP? (Or) Expand ICMP and write the function (May 2016)
Internet Control Message Protocol is a collection of error messages that are sent back to
the source host whenever a router or host is unable to process an IP datagram successfully
33. Give the CIDR notation for class A, B and C. APR/MAY 2011)
4
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Class Binary Dotted-Decimal CID
R
A 11111111 00000000 00000000 00000000 255.0.0.0 /8
B 11111111 11111111 00000000 00000000 255.255.0.0 /16
C 11111111 11111111 11111111 00000000 255.255.255.0 /24
36. What is the need for ARP? (NOV/DEC 2013) (Nov 2015)
In non-persistent CSMA if the medium is busy, there will be a random delay for retransmission.
This reduces the probability of collisions, but wastes the capacity.
47. Identify the class of the following IP address: (a) 110.34.56.45 (b) 212.208.63.23 (Nov 2015)
110.34.56.45 - Class A
6
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
212.208.63.23 - Class C
16 Marks
Multiple-access protocols
CSMA/CD
Token Passing CDMA
CSMA/CA
RANDOM ACCESS
In random access or contention methods, no station is superior to another station and
none is assigned to control over another.
No station permits, or does not permit another station to send.
2. Explain in detail about Ethernet (IEEE 802.3) and its frame format (OR) Explain the
physical properties of Ethernet 802.3 with necessary diagram (NOV 2014)(May,Nov 2015 &
2016)
Introduction:
The IEEE 802.3 standards committee developed a widely used LAN standard called
Ethernet, which covers both the MAC layer and the physical layer.
The Ethernet is a multiple-access network, meaning that a set of nodes send and receive
frames over a shared link.
The IEEE 802.3 standard uses CSMA for controlling media access and the 1-persistent
algorithm explained earlier, although the lost time owing to collisions is very small.
Also, IEEE 802.3 uses a back-off scheme known as binary exponential backoff.
The use of random backoff minimizes subsequent collisions.
This back-off scheme requires a random delay to be doubled after each retransmission.
The user drops the frame after 16 retries.
The combination of the 1-persistent scheme and binary exponential backoff results in an
efficient scheme.
The Ethernet versions have different data rates.
Version 1000BaseSX, carrying 1 Gb/s, and 10GBase-T, carrying 10 Gb/s, hold the most
promise for the future of high-speed LAN development
Physical properties:
An Ethernet segment is implemented on a coaxial cable of up to 500m.
This cable is similar to the type used for cable TV, except that it typically has an
impedance of 50 ohms instead of cable TV’s 75 ohms.
Hosts connect to an Ethernet segment by tapping into it; taps must be at least 2.5 m apart.
A transceiver – a small device directly attached to the tap – detects when the line is idle
and drives the signal when the host is transmitting.
It also receives incoming signals.
8
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The transceiver is, in turn, connected to an Ethernet adaptor, which is plugged into the
host.
Multiple Ethernet segments can be joined together by repeaters.
A repeater is a device that forwards digital signals, much like an amplifier forwards
analog signals.
However, no more than four repeaters may be positioned between any pair of hosts,
meaning that an Ethernet has a total reach of only 2,500 m.
Rather than using a 50-ohm coax cable, an Ethernet can be constructed from a thinner
cable known as 10Base2; the original cable is called 10Base5 (the two cables are
commonly called thin-net and thick-net, respectively).
The “10” in 10Base2 means that the network operates at 10 Mbps, “Base” refers to the
fact that the cable is used in a baseband system, and the “2” means that a given segment
can be no longer than 200 m.
Today, a third cable technology is predominantly used, called 10BaseT, where the “T”
stands for twisted pair.
A 10BaseT segment is usually limited to less than 100 m in length.
Data transmitted by any one host on the Ethernet reaches all the other hosts.
This is the good news.
The bad news is that all these hosts are competing for access to the same link, and as a
consequence, they are said to be in the same collision domain.
9
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Access Protocol:
Preamble is 7 bytes and consists of a pattern of alternating 0s and 1s. This field is
used to provide bit synchronization.
Start of frame consists of a 10101011 pattern and indicates the start of the frame to
the receiver.
Length/Type specifies the frame size, in bytes. The maximum Ethernet frame
Pad is used to increase the frame length to the value required for collision detection to
work.
10
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Frame check sequence is 32-bit CRC for error checking.
11
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
In this method, after the station finds the line idle, it sends its frame immediately (with
probability 1).
This method has the highest chance of collision because two or more stations may find
the line idle and send their frames immediately.
P-Persistent:
The p-persistent method is used if the channel has time slots with a slot duration equal to
or greater than the maximum propagation time.
The p-persistent approach combines the advantages of the other two strategies.
It reduces the chance of collision and improves efficiency.
In this method, after the station finds the line idle it follows these steps:
With probability p, the station sends its frame.
With probability q=1-p, the station waits for the beginning of the next time slot and
checks the line again.
If the line is idle, it goes to step 1.
If the line is busy, it acts as though a collision has occurred and uses the
backoff procedure.
3. Discuss the functioning (Key requirements) of wireless LAN in detail. (May 2015, Nov 2015)
May 2016
Wireless technologies differ from wired links in some important ways, while at the same
time sharing many common properties. Like wired links, issues of bit errors are of great concern
—typically even more so due to the unpredictable noise environment of most wireless links.
Framing and reliability also have to be addressed.
Unlike wired links, power is a big issue for wireless, especially because wireless links are
often used by small mobile devices (like phones and sensors) that have limited access to power
(e.g., a small battery). Furthermore, you can’t go blasting away at arbitrarily high power with a
radio transmitter—there are concerns about interference with other devices and usually
regulations about how much power a device may emit at any given frequency.
12
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Introduction IEEE has defined the specification for the wireless LAN called IEEE 802.11,
which covers the physical and Data Link Layers.
Architecture
A BSS is made of stationary (immobile) or mobile wireless stations and a possible central base
station known as the access point AP.
The BSS without an AP is stand alone network and cannot send data to other BSS. It is called an
ad hoc architecture.
13
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
An ESS is made up of two or more BSS with AP. The BSS are connected through a distribution
system, which is usually a wired LAN.
An ESS uses two types of stations mobile and stationary. The mobile stations are normal
stations inside a BSS. The stationary stations are AP stations that are part of the wired LAN.
When BSS are connected, the network is called an infrastructure network. In this the stations
within reach of one another can communicate without the use of an AP. But communication
between two stations in two different BSS usually occurs via two AP’s.
Station Types
Three qualitatively different levels of mobility in a wireless LAN.
1. No transmission
2. BSS transition
3. ESS transition
1) No transmission:
The first level is no mobility, such as when a receiver must be in a fixed location to receive a
directional transmission form the base station of a single BSS.
2) BSS transition:
It is defined as a station movement from one BSS to another BSS within the same ESS
(Bluetooth).
3) ESS transition
It is defined as a station movement from a BSS in one ESS to a BSS with in another ESS. The
third level is mobility between bases, as is the case with cell phones and Wi-Fi.
4. Discuss IEEE 802.11 (or) WI-FI in detail (or) MAC layer functions in IEEE802.11 (May 2015,
2016)
14
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
802.11 is designed for use in a limited geographical area (homes, office buildings,
campuses), and its primary challenge is to mediate access to a shared communication medium—
in this case, signals propagating through space.
Physical properties
IEEE 802.11 defines the specification for the conversion of bits to a signal in the physical layer.
The IEEE 802.11 physical layer is of four types.
1. Frequency-hopping spread spectrum (FHSS): It is a method in which the sender sends
one carrier frequency for a short amount of time, and then hops to another carrier
frequency for the same amount of time, hops again to still another same amount of time
and so on.
This technique makes use of 79 channels. FHSS operates in the 2.4 GHz ISM band and supports
data rates of 1 Mb/s to 2 Mb/s.
1. If the band width of the original signal is B, the allocated spread spectrum
bandwidth is N X B.
2. The amount of time spent at each sub band is called the dwell time.
2. Direct-sequence spread spectrum (DSSS): It uses seven channels, each supporting data
rates of 1 Mb/s to 2 Mb/s. The operating frequency range is 2.4 GHz ISM band.
In DSSS each bit by the sender is a replaced by the sequence of bits called chip code. To avoid
buffering, the time needed to send one chip code must be the same as the time needed to send
one original bit.
3. IEEE 802.11a: Orthogonal frequency division multiplexing (OFDM): IEEE 802.11a uses
OFDM, which uses 12 orthogonal channels in the 5 GHz range. All the sub bands are
used by one source at a given time. The common data rates are 18 Mbps and 54 Mbps.
4. IEEE 802.11b: High Rate Direct-Sequence spread spectrum (HRDSSS): IEEE 802.11b
operates in the 2.4 GHz band and supports data rates of 5.5 Mb/s to 11 Mb/s. It is similar
to DSSS except for the encoding method which is called complementary code keying
(CCK). CCK encodes four or eight bits to one CCK symbol.
5. IEEE 802.11g: (OFDM): IEEE 802.11g operates at 2.4 GHz and supports even higher
data rates.
Protocol Stack
15
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
IEEE 802.11 provides several key functionalities: reliable data delivery, media access control,
and security features.
The DCF algorithm uses contention resolution, and its sublayer implements the CSMA scheme
for media access control and contention resolution.
Begin DCF Algorithm for Wireless 802.11 MAC – MACA (NOV/DEC 2014)
1. The sender senses the medium for any ongoing traffic.
2. If the medium is idle, the sender waits for a time interval equal to IFS. Then the sender
senses the medium again. If the medium is still idle, the sender transmits the frame
immediately.
1. After the station is found ideal, the station waits for a period of time, called the
distributed inter-frame space (DIFS).
3. The station sends a control frame called the request to send (RTS).After receiving the
RTS and waiting a short period called the short inter-frame space (SIFS), the destination
16
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
station sends a control frame called clear to send (CTS), to the source station. This
control frame indicates that the destination station is ready to receive data.
Two or more stations made try to send RTS frames at the same time, these control frames
may collide. The sender assumes there has been a collision if it has not received CTS
frame from the receiver and it tries again.
4. The source station sends data after waiting an amount of time equal to SIFS.
5. The destination station after waiting for an amount of time equal to SIFS sends and
acknowledgement to show that the frame has been received.
6. When a station sends an RTS frame, it includes the duration of the time that it needs to
occupy the channel. The stations that are affected by this transmission create a timer
called a Network Allocation Vector (NAV) that all shows how much time must pass
before these stations are allowed to check the channel for idleness.
WLAN data transmission collisions can still happen, and MACA for Wireless
(MACAW) is brought to extend the functionality of MACA. It demands nodes to send
acknowledgments after every successful frame transmission. MACAW is commonly used in ad
hoc networks. Moreover, it is the basis of various other MAC protocols found in wireless sensor
networks (WSN)
Collision Avoidance:
A wireless protocol would follow the same algorithm as the Ethernet – wait until the link
becomes idle before transmitting and back off should a collision occur – and to a first
approximation, this is what 802.11 does.
Consider the situation depicted in the below figure, where A and C are both within range
of B but not each other.
17
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Suppose both A and C want to communicate with B and so they each send it a frame.
A and C are unaware of each other since their signals do not carry that far.
These two frames collide with each other at B, but unlike an Ethernet, neither A nor C is
aware of this collision.
A and C are said to be hidden nodes with respect to each other.
A related problem, called the exposed node problem, occurs under the circumstances
illustrated in the below figure, where each of the four nodes is able to send and receive
signals that reach just the nodes to its immediate left and right.
For example, B can exchange frames with A and C but it cannot reach D, while C can
reach B and D but not A.
Distribution system
Some nodes are allowed to roam (e.g., your laptop) and some are connected to a wired
network infrastructure. 802.11 calls these base stations access points (APs), and they are
connected to each other by a so-called distribution system. Figure 2.32 illustrates a distribution
system that connects three access points, each of which services the nodes in some region. Each
access point operates on some channel in the appropriate frequency range, and each AP will
typically be on a different channel than its neighbors
18
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Although two nodes can communicate directly with each other if they are within reach of
each other, the idea behind this configuration is that each node associates itself with one access
point.
For node A to communicate with node E, for example, A first sends a frame to its access
point (AP-1), which forwards the frame across the distribution system to AP-3, which finally
transmits the frame to E. How AP-1 knew to forward the message to AP-3 is beyond the scope of
802.11; it may have used the bridging protocol described in the next chapter (Section 3.1.4).
What 802.11 does specify is how nodes select their access points and, more interestingly, how
this algorithm works in light of nodes moving from one cell to another.
The technique for selecting an AP is called scanning and involves the following four steps:
1. The node sends a Probe frame.
2. All APs within reach reply with a Probe Response frame.
3. The node selects one of the access points and sends that AP an Association Request frame.
4. The AP replies with an Association Response frame.
MAC Frame
The three frame types in IEEE 802.11 are control frames, data-carrying frames, and management
frames.
The frame format for the 802.11 MAC is shown in the below diagram and is described as
follows.
The frame control (FC) field provides information on the type of frame: control
frame, data frame, or management frame.
The addresses field denotes the 6-byte source and destination address fields.
19
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The sequence control (SC) field consists of 4 bits reserved for fragmentation and
reassembly and 12 bits for a sequence number of frames between a particular
transmitter and receiver.
The frame body field contains a MAC service data unit or control information.
The cyclic redundancy check (CRC) field is used for error detection.
Control frames ensure reliable data delivery. The control frames are used for accessing the
channel and acknowledgement frames. It consist of
Management frames are used to monitor and manage communication among various users in the
IEEE 802.11 LAN through access points.
Bluetooth is a more convenient alternative to connecting two devices with a wire. This
means that Bluetooth radios can use quite low power transmission, since transmission power is
one of the main factors affecting bandwidth and range of wireless links. This matches the target
applications for Bluetooth-enabled devices—most of them are battery powered (such as the
ubiquitous phone headset) and hence it is important that they not consume much power
Bluetooth operates in the license-exempt band at 2.45 GHz. Bluetooth links have typical
bandwidths around 1 to 3 Mbps and a range of about 10 m. For this reason, and because the
communicating devices typically belong to one individual or group, Bluetooth is sometimes
categorized as a Personal Area Network (PAN).
Bluetooth is specified by an industry consortium called the Bluetooth Special Interest
Group.
20
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The basic Bluetooth network configuration, called a piconet, consists of a master device
and up to seven slave devices, as shown in Figure 2.35. Any communication is between the
master and a slave; the slaves do not communicate directly with each other. Because slaves have
a simpler role, their Bluetooth hardware and software can be simpler and cheaper.
A slave device can be parked; that is, it is set to an inactive, low-power state. A parked
device cannot communicate on the piconet; it can only be reactivated by the master. A piconet
can have up to 255 parked devices in addition to its active slave devices.
INTRODUCTION
The bridge is designed for interconnecting similar LAN’s.
It has its own processor, memory and two NIC (Network Interface Card) cards to connect
the two portions of a network.
It operates at the physical as well as data link layer.
The main idea of using a bridge is to divide a big network into smaller sub-networks,
called segments
21
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Learning Bridges
The first optimization we can make to a bridge is to observe that it need not forward all
frames that it receives. Consider the bridge in Figure 3.9. Whenever a frame from host A that is
addressed to host B arrives on port 1, there is no need for the bridge to forward the frame out
over port 2.
The idea is for each bridge to inspect the source address in all the frames it receives. Thus, when
host A sends a frame to a host on either side of the bridge, the bridge receives this frame and
records the fact that a frame from host A was just received on port 1. In this way, the bridge can
build a table just like Table 3.4.
Each packet carries a global address, and the bridge decides which output to send a
packet on by looking up that address in a table.
When a bridge first boots, this table is empty; entries are added over time. Also, a timeout
is associated with each entry, and the bridge discards the entry after a specified period of time.
This is to protect against the situation in which a host—and, as a consequence, its LAN address
— is moved from one network to another. Thus, this table is not necessarily complete. Should
the bridge receive a frame that is addressed to a host not currently in the table, it goes ahead and
forwards the frame out on all the other ports. In other words, this table is simply an optimization
that filters out some frames; it is not required for correctness.
Implementation
22
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The code that implements the learning bridge algorithm is quite simple, and we sketch it
here.
Structure BridgeEntry defines a single entry in the bridge’s forwarding table; these are
stored in a Map structure (which supports mapCreate, mapBind, and mapResolve operations) to
enable entries to be efficiently located when packets arrive from sources already in the table.
The constant MAX TTL specifies how long an entry is kept in the table before it is
discarded
This is easy to see in the example depicted in Figure 3.10, where, for example, bridges B1, B4,
and B6 form a loop.
Whatever the cause, bridges must be able to correctly handle loops.
This problem is addressed by having the bridges run a distributed spanning tree algorithm.
If you think of the extended LAN as being represented by a graph that possibly has loops
(cycles), then a spanning tree is a subgraph of this graph that covers (spans) all the vertices but
contains no cycles. That is, a spanning tree keeps all of the vertices of the original graph but
throws out some of the edges. For example, Figure 3.11 shows a cyclic graph on the left and one
of possibly many spanning trees on the right.
The idea of a spanning tree is simple enough: It’s a subset of the actual network topology
that has no loops and that reaches all the LANs in the extended LAN. The hard part is how all of
the bridges coordinate their decisions to arrive at a single view of the spanning tree. After all,
one topology is typically able to be covered by multiple spanning trees. The answer lies in the
spanning tree protocol
23
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The main idea of the spanning tree is for the bridges to select the ports over which they will
forward frames.
Limitations of Bridge
Scalability
Heterogenity
On the issue of scale, it is not realistic to connect more than a few LANs by means of bridges,
where in practice few typically means “tens of.”
24
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
On the issue of heterogeneity, bridges are fairly limited in the kinds of networks they can
interconnect. In particular, bridges make use of the network’s frame header and so can support
only networks that have exactly the same format for addresses.
Advantages of switches
1. Switches divide a network into several isolated channels or collision domains
2. Reduce the possibility of collision
3. Each channel has its own network capasity
Limitations of switches
1. Although contains buffers to accommodate bursts of traffic, can become overwhelmed by
heavy traffic
2. Device cannot detect collision when buffer full
3. Some higher level protocols do not detect error
25
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Address Translation
ARP (Address Resolution Protocol)
Introduction
An internet consists of various types of networks and the connecting devices like routers.
A packet starts from the source host, passes through many physical networks and finally
reaches the destination host.
At the network level, the hosts and routers are recognized by their IP addresses.
IP address
An IP address is an internetwork address. It is a universally unique address.
Every protocol involved in internetworking requires IP addresses.
MAC address
The packets from source to destination hosts pass through physical networks.
At the physical level the IP address is not useful but the hosts and routers are recognized
by their MAC addresses.
A MAC address is a local address. It is unique locally but it is not unique universally.
The IP and MAC address are two different identifiers and both of them are needed
Deliver a packet to a host or a router, we require two levels of addressing namely IP
addressing and MAC addressing.
Most importantly we should be able to map the IP address into a corresponding MAC
address.
26
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
In static mapping a table is created and stored in each machine. This table associates an
IP address with a MAC address.
If a machine knows the IP address of another machine then it can search for the
corresponding MAC address in its table.
The limitation of static mapping is that the MAC addresses can change.
To implement static mapping, the static mapping table needs to be updated periodically.
Dynamic mapping
In dynamic mapping technique a protocol is used for finding the other address when one
type of address is known.
There are two type of dynamic mapping available.
o Address Resolution Protocol (ARP)
o Reverse Address Resolution Protocol (RARP)
The ARP maps IP address to a MAC address whereas the RARP maps a MAC address to
an IP address.
ARP Operation
ARP is used for associating an IP address to its MAC address.
For a LAN, each device has its own physical or station address as its identification. This
address is imprinted on the NIC.
Find the MAC address:
When a router or a host needs to find the MAC address of another host or network the
sequence of events taking place is as follows:
a. The router or a host A who wants to find the MAC address of some other router,
sends an ARP request packet. This packet consists of IP and MAC addresses of
the sender A and the IP address of the receiver (B).
b. This request packet is broadcasted over the network as shown the figure.
c.
d. Every host and router on the network receives and processes the ARP request
packet. But only the intended receiver (B) recognizes its IP address in the request
packet and sends back an ARP response packet.
e. The ARP response packet contains the IP and physical addresses of the receiver
(B). This packet is delivered only to A (unicast) using A’s physical address in the
ARP request packet. This is shown in the following figure.
27
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
OPER (Operation):
It is a 16 bit field which defines the type of packet. The two possible types of packets are:
ARP request (1) and ARP reply (2).
SHA (Sender Hardware Address):
This field is used for defining the physical address of the sender. The length of this field is variable.
SPA (Sender Protocol address):
This field defines the logical address of the sender. The length of this field is variable.
THA (Target hardware address):
It defines the physical address of the target. It is a variable length field. For the ARP request packet,
this field contains all zeros because the sender does not know the receivers physical address.
28
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Dynamic Host Configuration Protocol (DHCP)
Introduction
Dynamic Host Configuration Protocol (DHCP) is a protocol designed to provide
information dynamically.
It is a client-server program.
DHCP is used to assign addresses to a host dynamically.
Basically, DHCP server has two databases.
The first database is addresses to IP addresses.
Transition states
The DHCP client transitions from one state to another depending on the messages it
receives or sends.
The below diagram illustrate DHCP transition state diagram.
Initializing state
When the DHCP client starts first, it is in the initializing state.
29
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The client broadcasts a DHCPDISCOVER message.
Selecting State
After sending DHCPDISCOVER message, the client goes to the selecting state.
Then the servers respond with a DHCPOFFER message.
In these messages, the servers offer an IP address and the lease duration.
The server that sends a DHCPOFFER locks the offered IP address so that it is not
available to any other client.
The client chooses one of the offers and sends a DHCPREQUEST message to the
selected server.
It then goes to the requesting state.
If the client receives no DHCPOFFER message, it tries four times, each with a span of 2
seconds.
If there is no reply to any of these DHCPDISCOVERs, the client sleeps for 5 minutes
before trying again
Requesting State
The client remains in the requesting
state until it receives a DHCPACK
message from the server, which creates
the binding between the client’s
physical address and its IP address.
Bound State
In this state, the client can use the IP
address until the lease time expires.
When 50% of the lease period is
reached, the client sends another
DHCPREQUEST to ask for renewal.
It then goes to the renewing state.
When in the bound state, the client can
also cancel the lease time and go to the
initializing state.
Renewing State
The client remains in the renewing state until one of the two events happens.
It can receive a DHCPACK, which renews the lease agreement.
In this case, the client resets its timer and goes back to the bound state or else if a
DHCPACK is not received and 87.5% of the lease time expires, the client goes to the
rebinding state.
Rebinding State
The client remains in the rebinding state until one of the three events happens.
30
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
If the client receives a DHCPNACK or the lease expires, the client goes back to the
initializing state and tries to get another resets the timer.
10. Discuss in detail about the concepts of ICMP (Nov 2015) May 2016
ICMP (Internet Control Message Protocol)
Introduction
The IP provides unreliable and connectionless datagram delivery.
It was designed this way to make efficient use of network resources.
IP is a best-effort delivery service that delivers a datagram from its original source to
its final destination.
However, it has two deficiencies: lack of error control and lack of assistance
mechanisms.
The ICMP reports errors and sends control messages on behalf of IP.
ICMP does not attempt to make IP a reliable protocol.
It simply attempts to report errors and provide feedback on specific conditions.
ICMP messages are carried as IP packets and are therefore unreliable.
IP also lacks a mechanism for host and management queries.
A host sometimes needs to determine if a router or another host is alive.
And sometimes a network manager needs information from another host or router.
The ICMP has been designed to compensate for the above two deficiencies.
31
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Query messages:
The query message is a group of four different pairs of messages. The messages are
1. Echo request and reply
2. Time stamp request and reply
3. Address mask request and reply
4. Router solicitation and advertisement
11. Explain about IP address in detail. (Or) With a neat sketch explain about IP service
model,packet format,Fragmentation and reassembly (Nov 2016)
Introduction
This is the host to host network layer delivery protocol designed for the internet.
It is an unreliable protocol because it does not provide any error control or flow
control.
IP can only detect the error and discards the packet if it is corrupted.
If IP is to be made more reliable, then it must be paired with a reliable protocol such
as TCP at the transport layer.
Each IP datagram is handled independently and each one can follow a different route
to the destination.
HeaderData
20-60 bytes
20-65536 bytes
Two parts namely the header and data
32
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The header is 20 to 60 bytes in length. It contains the information essential for routing
and delivery.
The other part of the datagram is the data field which is of variable length.
Structure of IP Frame Header (Packet format):
The IP frame header contains routing information and control information associated
with datagram delivery.
(i) Identification: This field identifies the datagram originating from the source host.
When a datagram is fragmented, the value in the identification field is copied into all
fragments. The identification number helps the destination in reassembling the
fragments of the datagram.
(ii) Flags: This is a three bit field. The three bits are shown in the below figure.
This is called as more 3 bit flag field.
33
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Fragmentation bit.
The second bit is called “Do Not Fragment”, bit. If this bit is “1” and the machine should
not fragment the datagram.
But if the value of this bit is 0 then the machine should fragment the datagram if only if
necessary.
The third bit is called as “More Fragments bit”. If it is 1 it means that the datagram is not
the last fragment but if its value is 0 it shows that this is the last or the only fragment.
Time to live:
This is an 8 bit long field which controls the maximum number of router visited by the datagram.
Protocol:
This field defines the higher-level protocol which uses the services of the IP layer. An IP datagram can
encapsulate data from various higher level protocols such as TCP, UDP, ICMP and
IGMP
A checksum in IP packet covers on the header only Since some header fields change, this field is
recomputed and verified at each point that the Internet header is processed.
Source address:
Destination address:
Option:
Options are not required for every datagram. They are used for network testing and debugging.
Addressing:
IP headers contain 32-bit addresses which identify the sending and receiving hosts. These addresses
are used by intermediate routers to select a path through the network for the packet.
34
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Fragmentation:
IP packets may be split, or fragmented, into smaller packets. This permits a large packet to travel
across a network which can only handle smaller packets. IP fragments and reassembles packets
transparently.
Packet timeout:
Each IP packet contains a Time To Live (TTL) field, which is decremented every time a router handles
the packet. If TTL reaches zero, the packet is discarded.
Type of Services:
IP supports traffic prioritization by allowing packets to be labeled with an abstract type of service.
IP ADDRESSES
The identifier used in the network layer of the Internet model to identify each device
connected to the Internet is called the Internet address or IP address.
An IP address is a 32-bit (4-bytes) address that uniquely and universally defines the
connection of a host or a router to the Internet.
IP addresses are unique in the sense that each address defines one, and only one,
connection to the Internet.
Two devices on the Internet can never have the same address at the same time.
However, if a device has two connections on the Internet, via two networks, it has
two IP addresses.
IP addresses are universal in the sense that any host that wants to be connected to
the Internet must accept the addressing system.
There are two common notations to show an IP address: Binary notation and Dotted-
decimal notation.
Binary notation:
In binary notation IP address is displayed as 32 bits. To make the address more readable, one or more
spaces are usually inserted between each byte.
35
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
141.21.53.4
IP ADDRESSING METHODS
Classful Addressing:
Classless addressing:
A new architecture was introduced in the middle of 1990’s, called classless addressing.
1. Classful Addressing
In classful addressing, the IP address space is divided into five classes: Class A, Class B,
Class C, Class D and Class E.
We can find the class of an address when the address is given in binary notation or
dotted-decimal notation.
If the address is given in binary notation, the first few bits can immediately tell us the
class of the address.
If the address is given in dotted-decimal notation, then we need to look only at the first
byte to determine the class of the address.
36
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Class B address from 128.0.0.0 to 191.255.255.255
Addresses in classes A, B and C are for unicast communication, from one source to one
destination.
Addresses in class D are for multicast communication, from one source to a group of
destination. A multicast address is used only in destination addresses.
Addresses in class E are reserved. The original idea was to use them for special purpose.
In classful addressing, an IP address in classes A, B and C is divided into netid and hostid.
These parts are of varying lengths, depending on the class of the address as shown below.
In class A, one byte defines the netid and three bytes defined the hostid.
In class B, two bytes define the netid and two bytes define the hostid.
In class C, three bytes define the netid and one byte defines the hostid.
37
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
i) Delivery to the site
Examples:
1. Find the class for the following IP addresses. (i) 205.55.43.11 and (ii) 100.23.28.65
Solution:
i) 11110111 11110010 10000011 10101010 - Class E (First byte starts with 1111)
ii) 01111111 11110000 01010111 00001100 - Class A (First byte starts with 0)
iii) 246.3.4.10 - No netid and no hostid because 246.3.4.10 is the class E address.
The customers are connected via a dial-up modem, Digital Subscriber Line
(DSL), or cable modem to the ISP.
38
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Classless inter-domain routing (CIDR) is a set of Internet protocol (IP) standards that is used
to create unique identifiers for networks and individual devices. The IP addresses allow
particular information packets to be sent to specific computers
Subnetting has a counterpart, sometimes called supernetting, but more often
called Classless Interdomain Routing or CIDR, pronounced “cider.” CIDR takes the subnetting
idea to its logical conclusion by essentially doing away with address classes altogether. Why
isn’t subnetting alone sufficient? In essence, subnetting only allows us to split a classful address
among multiple subnets, while CIDR allows us to coalesce several classful addresses into a
single “supernet.” This further tackles the address space inefficiency noted above, and does so in
a way that keeps the routing system from being overloaded.
To see how the issues of address space efficiency and scalability of the routing system
are coupled, consider the hypothetical case of a company whose network has 256 hosts on it.
That is slightly too many for a Class C address, so you would be tempted to assign a class B.
However, using up a chunk of address space that could address 65,535 to address 256 hosts has
an efficiency of only 256/65,535 = 0.39%. Even though subnetting can help us to assign
addresses carefully, it does not get around the fact that any organization with more than 255
hosts, or an expectation of eventually having that many, wants a class B address.
The first way you might deal with this issue would be to refuse to give a class B address
to any organization that requests one unless they can show a need for something close to 64K
addresses, and instead giving them an appropriate number of class C addresses to cover the
expected number of hosts. Since we would now be handing out address space in chunks of 256
addresses at a time, we could more accurately match the amount of address space consumed to
the size of the organization. For any organization with at least 256 hosts, we can guarantee an
address utilization of at least 50%, and typically much more.
This solution, however, raises a problem that is at least as serious: excessive storage
requirements at the routers. If a single site has, say, 16 class C network numbers assigned to it,
that means every Internet backbone router needs 16 entries in its routing tables to direct packets
to that site. This is true even if the path to every one of those networks is the same. If we had
assigned a class B address to the site, the same routing information could be stored in one table
entry. However, our address assignment efficiency would then be only 16×255/65,536 = 6.2%.
CIDR, therefore, tries to balance the desire to minimize the number of routes that a router
needs to know against the need to hand out addresses efficiently. To do this, CIDR helps us to
aggregate routes. That is, it lets us use a single entry in a forwarding table to tell us how to reach
a lot of different networks. As noted above it does this by breaking the rigid boundaries between
address classes. To understand how this works, consider our hypothetical organization with 16
class C network numbers.
Instead of handing out 16 addresses at random, we can hand out a block of contiguous
class C addresses. Suppose we assign the class C network numbers from 192.4.16 through
192.4.31. Observe that the top 20 bits of all the addresses in this range are the same (11000000
00000100 0001). Thus, what we have effectively created is a 20-bit network number—something
that is between a class B network number and a class C number in terms of the number of hosts
that it can support.
39
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
In other words, we get both the high address efficiency of handing out addresses in
chunks smaller than a class B network, and a single network prefix that can be used in
forwarding tables. Observe that, for this scheme to work, we need to hand out blocks of class C
addresses that share a common prefix, which means that each block must contain a number of
class C networks that is a power of two.
CIDR requires a new type of notation to represent network numbers, or prefixes as they
are known, because the prefixes can be of any length. The convention is to place a /X after the
prefix, where X is the prefix length in bits. So, for the example above, the 20-bit prefix for all the
networks 192.4.16 through 192.4.31 is represented as 192.4.16/20. By contrast, if we wanted to
represent a single class C network number, which is 24 bits long, we would write it 192.4.16/24.
Today, with CIDR being the norm, it is more common to hear people talk about “slash 24”
prefixes than class C networks. Note that representing a network address in this way is similar to
the hmask, valuei approach used in subnetting, as long as masks consist of contiguous bits
starting from the most significant bit (which in practice is almost always the case).
The ability to aggregate routes at the edge of the network as we have just seen is only the
first step. Imagine an Internet service provider network, whose primary job is to provide Internet
connectivity to a large number of corporations and campuses (customers). If we assign prefixes
to the customers in such a way that many different customer networks connected to the provider
network share a common, shorter address prefix, then we can get even greater aggregation of
routes. Consider the example in Figure 3.22. Assume that eight customers served by the provider
network have each been assigned adjacent 24-bit network prefixes.
Those prefixes all start with the same 21 bits. Since all of the customers are reachable
through the same provider network, it can advertise a single route to all of them by just
advertising the common 21-bit prefix they share. And it can do this even if not all the 24-bit
prefixes have been handed out, as long as the provider ultimately will have the right to hand out
those prefixes to a customer. One way to accomplish that is to assign a portion of address space
to the provider in advance and then to let the network provider assign addresses from that space
to its customers as needed. Note that, in contrast to this simple example, there is no need for all
customer prefixes to be the same length.
40
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Introduction
Fiber distributed data interface (FDDI) is a local area network protocol standardized by
ANSI and the ITU-T.
It supports data rates of 100 Mbps and provides a high-speed. The copper version of
FDDI is known as CDDI.
FDDI operation
Time Registers
FDDI defines three time register to control circulation of the token and distribute link
access opportunities among the nodes equitably.
Synchronous allocation (SA): It indicates the length of time allowed each station for
sending synchronous data.
Target token rotation time (TTRT): Indicates the average time required for a token to
circulate around the ring exactly once.
41
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Absolute maximum time (AMT): holds a value equal to twice the TTRT.
Timers:
Each station contains a set of timers that enable it to compare actual timings with the values
contained in the registers.
Token rotation timer (TRT) – runs continuously and measures the actual time taken
by the token to complete a cycle.
Token holding timer (THT) – it begins running as soon as the token is received. Its
function is to show how much time remains for sending asynchronous frames once
the synchronous frames have been sent.
Station Procedure
THT is set to the difference between TTRT and TRT (THT=TTRT – TRT).
TRT is reset to zero (TRT=0)
The station sends it synchronous data.
The station sends asynchronous data as long as the value of THT is positive.
Frame Format
FDDI layers
42
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Frame Fields:
Start delimiter (SD): the first byte of the field is the frame’s starting flag.
Frame control (FC): the second byte of the frame identifies the frame type.
Addresses: the next two fields are the destination and source address
Data: each data frame can carry upto 4500 bytes of data.
CRC:
End delimiter (ED): consists of half a byte in the data frame or a full byte in the token
frame.
Frame status (FS): it is included in the data / command frame.
Dual Ring:
FDDI ring
43
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
The secondary ring makes FDDI self-healing.
Whenever a problem occurs on the primary ring, the secondary can be activated to
complete data circuits and maintain service.
Nodes connect to one or both rings using a media interface connector (MIC) that can be
either male or female connector.
Both Fast Ethernet and FDDI are high speed LAN technologies, growing from Ethernet and
Token Ring respectively.
In the following, we will compare the two technologies in terms of throughput, latency,
deterministic, configuration, maintenance, compatibility, reliability, cost, user community, and
interconnectivity.
throughput - On shared media LANs such as Fast Ethernet and FDDI, line speed decreases in
proportion to the number of nodes contending for a portion of the total available bandwidth. Now
assume that same amount of hosts on the LAN, even thought Fast Ethernet and FDDI have the
same 100 Mbps throughput, FDDI will ran faster than Fast Ethernet because there collision
detection could reduce the bandwidth by 30-50%. Result from DATA COMM Test Lab [4]
shows that FDDI runs at 96 Mbps (96% efficiency).
latency - FDDI has much higher latency since data frames has to be passed by many hosts in
between. For Ethernet, the latency is relative lower, although it is nondeterministic based on
random wait after detected collision. The test results [5] show that the latency for FDDI products
is about twice as much as their Fast Ethernet comparable counterpart.
deterministic - FDDI is deterministic. But Ethernet is not, because of the wait for a random time
after detecting a collision.
configuration and maintenance - It is less complicated with Ethernet LAN, because of its
simple structure. Adding one more host on Ethernet is much simpler than do it on FDDI.
Ethernet protocol is simple and hosts can be installed on the fly without taking the whole
network down.
44
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
distance - Because of the distance limit, (100m for twisted pair and 2000m for fiber optics), on
Fast Ethernet segment, FDDI is clearly the better choice with a distance up to 100km.
host load - Both Fast Ethernet and FDDI can accept up to about 1000 hosts. For FDDI, more
hosts means potential longer latency. For Fast Ethernet, more hosts mean more collision and
more congestion. Even worse for higher than 60% loading, the overall throughput of Ethernet
could be stalled, because hosts will be busy with detecting collision/waiting, and thus are not
able to transmit.
compatibility - Ethernet users can easily migrate to Fast Ethernet. Applications and higher level
protocols developed on 10Base-T Ethernet will run on 100Base-T Fast Ethernet without
modification, and 100Base-T adaptors are available to switch between the wide used 10 Mbps
ethernet and the 100 Mbps standard.
reliability - Ethernet is simple, has less things to break, and thus is pretty reliable. For FDDI, the
whole LAN could be brought down if one or more hosts in the ring break. The dual ring is only
able to tolerate a single break in the cable.
cost - Fast Ethernet although does not have the technical edge over FDDI in terms of speed, it is
much more easier to configurate and maintain than FDDI. In addition to that, Fast Ethernet
products cost a fraction to what would be for its FDDI counterparts.
users - Ethernet has more users. One of the most important obstacles to the installation of high-
performance networks are users failure to accept the new technology. In the case of Ethernet a
large community of users were convinced to install a commonly agreed type of high performance
network because manufacturers are able to provide standard add on features, which as they are
produced in bulk, have been offer cheaper.
45
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Vulnerable Time
Persistence Methods:
46
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
16. Explain in detail about token ring and its frame format. (May 2015)
Introduction
47
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
TWO KEY FEATURES OF RING NETWORK
A ring network shares two key features with an Ethernet:
o First, it involves a distributed algorithm that controls when each node is allowed
to transmit.
o Second, all nodes typically see all frames, with the node identified in the frame
header as the destination saving a copy of the frame as it flows past.
The word “token” comes from the way access to the shared ring is managed.
The idea is that a token, which is really just a special sequence of bits, circulates around
the ring; each node receives and then forwards the token.
When a node that has a frame to transmit sees the token, it takes the token off the ring
(i.e., it does not forward the special bit pattern) and instead inserts its frame into the ring.
Each node along the way simply forwards the frame, with the destination node saving a
copy and forwarding the message onto the next node on the ring.
When the frame makes its way back around to the sender, this node strips its frame off
the ring (rather than continuing to forward it) and reinserts the token.
In this way, some node downstream will have the opportunity to transmit a frame.
The media access algorithm is fair in the sense that as the token circulates around the
ring; each node gets a chance to transmit. Nodes are serviced in a round-robin fashion.
Ring topology is that any link or node failure would render the whole network useless.
The problem of node failure may be addressed by connecting each station into the ring
using an electromechanical relay.
As long as the station is healthy, the relay is open and the station is included in the ring.
If the station stops providing power, the relay closes and the ring automatically bypasses
the station.
48
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Relay used on a token ring (a) relay open – host active; (b) relay closed – host bypassed
Monitor Station:
49
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
token and maintains a timer equal to the maximum possible token rotation time. This
interval equals
NumStations X THT + RingLatency
Where NumStatins is the number of stations on the ring, and RingLatency is the total
propagation delay of the ring.
If the timer expires without the monitor seeing a token, it creates a new one.
The monitor also checks for corrupted or orphaned frames.
Frame Format:
UNIVERSITY QUESTIONS
16 MARKS
1.Explain and differentiate FDDI and Ethernet (16) (Q.NO. 2,13 & 14)
2.Write short notes on.
(i)Transparent bridges (8) (Q.NO. 6)
(ii)MACA and MACAW (8) (Q.NO. 4)
2 MARKS
50
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
1. What do you understand by CSMA protocol? (Q.NO. 43)
2. List the functions of bridges (Q.NO. 44)
16 MARKS
1. Explain in detail about access method and frame format used in Ethernet and token
ring (16) (Q.NO. 2 & 16 )
2. (i) Discuss the MAC layer functions of IEEE802.11 (8) (Q.NO. 4)
(ii) Briefly define key requirements of wireless LAN (8) (Q.NO. 3)
2 MARKS
1. Define sub-netting. (Q.NO 28)
2. What is the need of ARP? (Q.NO 36)
3. Identify the class of the following IP address: (a) 110.34.56.45 (b) 212.208.63.23 (Q.NO 47)
16 MARKS
1. Write short notes on Ethernet & Wireless LAN (8+8) (Q.NO 2 & 3)
2. Explain in detail ARP, DHCP, ICMP (16) (Q.NO 8, 9 & 10)
16 MARKS
1. Give the comparison between different wireless technologies? Enumerate 802.11 protocol stack in
detail (16) (Q.NO 3 & 4)
2. Write short notes on DHCP & ICMP (8+8) (Q.NO 9 & 10)
2 MARKS
1. What is meant by exponential backoff? (Q.NO 5 )
2. What is scatternet? (Q.NO 46)
3. What is fragmentation and reassembly? (Q.NO 48)
16 MARKS
1. Explain the physical properties of Ethernet 802.3 with necessary diagram of Ethernet
transceiver and adapter (16) (Q.NO 2)
51
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
2. With a neat sketch explain about IP service model,packet format,Fragmentation and
reassembly.(16) (Q.NO 11)
PART- B
52
PREPARED BY: Mr. D. Ramkumar – A.P-CSE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
b) Discuss CIDR
7. Discuss the various aspects of Bridges
8. a) Discuss the functioning (Key requirements) of wireless LAN in detail
b) Discuss Hidden node problem & Exposed node problem
9. Explain and differentiate FDDI and Ethernet
10. Discuss MACA & MACAW
53
PREPARED BY: Mr. D. Ramkumar – A.P-CSE