Part A Questions With Answers & Part B Questions
Part A Questions With Answers & Part B Questions
com
om
devices via some form of transmission medium (such as a wire cable).
2. What are the three criteria necessary for an effective and efficient network?
The most important criteria are performance, reliability and security.
Performance of the network depends on number of users, type of transmission
medium, the capabilities of the connected h/w and the efficiency of the s/w.
.c
Reliability is measured by frequency of failure, the time it takes a link to recover from the
failure and the network’s robustness in a catastrophe.
Security issues include protecting data from unauthorized access and viruses.
ul
3. What are the three fundamental characteristics determine the effectiveness of the
data communication system?
The effectiveness of the data communication system depends on three fundamental
characteristics:
pa
Delivery: The system must deliver data to the correct destination.
Accuracy: The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
in
4. What are the advantages of distributed processing?
Advantages of distributed processing include security/encapsulation, distributed
databases, faster problem solving, security through redundancy and collaborative
processing.
ej
entities cannot just send bit streams to each other and expect to be understood. For
communication, the entities must agree on a protocol. A protocol is a set of rules that
govern data communication.
w
7. For n devices in a network, what is the number of cable links required for a
w
www.Vidyarthiplus.com Page 2
www.Vidyarthiplus.com
sending them out. A passive hub provides a simple physical connection between
theattached devices.
9. Distinguish between peer-to-peer relationship and a primary-secondary
relationship.
Peer-to-peer relationship: All the devices share the link equally.
Primary-secondary relationship: One device controls traffic and the others must
transmit through it.
om
10. Assume 6 devices are arranged in a mesh topology. How many cables are
needed? How many ports are needed for each device?
Number of cables=n (n-1)/2=6(6-1)/2=15
Number of ports per device=n-1=6-1=5
.c
The seven layers of the OSI model belonging to three subgroups. Physical, data link
and network layers are the network support layers; they deal with the physical aspects
of moving data from one device to another. Session, presentation and application layers are
ul
the user support layers; they allow interoperability among unrelated software systems. The
transport layer ensures end-to-end reliable data transmission.
12. What are header and trailers and how do they get added and removed?
pa
Each layer in the sending machine adds its own information to the message it
receives from the layer just above it and passes the whole package to the layer just
below it. This information is added in the form of headers or trailers. Headers are added to
the message at the layers 6,5,4,3, and 2. A trailer is added at layer2. At the receiving
machine, the headers or trailers attached to the data unit at the corresponding sending layers
in
are removed, and actions appropriate to that layer are taken.
13. The transport layer creates a communication between the source and
ej
In the NRZ-L sequence, positive and negative voltages have specific meanings:
positive for 0 and negative for 1. in the NRZ-I sequence, the voltages are meaningless.
Instead, the receiver looks for changes from one level to another as its basis for
w
recognition of 1s.
17. What are the functions of a DTE? What are the functions of a DCE?
w
www.Vidyarthiplus.com Page 3
www.Vidyarthiplus.com
om
transmitted using NRZ-L encoding.
18. Discuss the mode for propagating light along optical channels.
There are two modes for propagating light along optical channels, multimode and
single mode.
Multimode: Multiple beams from a light source move through the core in different paths.
.c
Single mode: Fiber with extremely small diameter that limits beams to a few angles,
resulting in an almost horizontal beam.
ul
The phenomenon related to the bending of light when it passes from one medium to
another.
pa
20.What are the responsibilities of data link layer?
Specific responsibilities of data link layer include the following.
a) Framing
b) Physical addressing
c) Flow control
d) Error control
in
e) Access control
0 to 1.
It is the error detecting mechanism, which means a shorter group of bits or extra
bits may be appended at the destination of each unit.
www.Vidyarthiplus.com Page 4
www.Vidyarthiplus.com
The most common and least expensive mechanism for error detection is the vertical
redundancy check (VRC) often called a parity check. In this technique a redundant
bit4called a parity bit, is appended to every data unit so, that the total number of 0’s in the
unit(including the parity bit) becomes even.
om
redundant row of bits is added to the whole block.
.c
28. Write short notes on CRC generator.
A CRC generator uses a modulo-2 division.
1)In the first step, the 4-bit divisor is subtracted from the first 4 bit of thedividend.
ul
2) Each bit of the divisor is subtracted from the
corresponding bit of the dividend without disturbing the next higher bit.
www.Vidyarthiplus.com Page 5
www.Vidyarthiplus.com
a) When an error is discovered, the receiver can have the sender retransmit the
entire data unit.
b) A receiver can use an error correcting coder, which automatically corrects
certain errors.
om
There are 2 error-correcting methods.
a) Single bit error correction
b) Burst error correction.
.c
simple strategy used by the hamming code to correct single bit errors must be redesigned to
be applicable for multiple bit correction.
ul
Flow control refers to a set of procedures used to restrict the amount of data. The
sender can send before waiting for acknowledgment.
UNIT II
NETWORK LAYER
.R
1. What are the network support layers and the user support layers?
Network support layers:
The network support layers are Physical layer, Data link layer and Network layer.
w
These deals with electrical specifications, physical connection, transport timing and
reliability.
User support layers:
w
The user support layers are: Session layer, Presentation layer, Application layer.
These allow interoperability among unrelated software system.
2. With a neat diagram explain the relationship of IEEE Project to the OSI model?
w
The IEEE has subdivided the data link layer into two sub layers:
1) Logical link control (LLC)
2)Medium access control (MAC)
LLC is non-architecture specific. The MAC sub layer contains a number of distinct
modules, each carries proprietary information specific to the LAN product being used.
www.Vidyarthiplus.com Page 6
www.Vidyarthiplus.com
The IEEE project 802 models takes the structure of an HDLC frame and divides it
into 2 sets of functions. One set contains the end user portion of the HDLC frame – the
Other layers
Network
Data link
Physical
Other layers
om
Network
Logical Link Control
Media Access Control
Physical
logical address, control information, and data. These functions are handled by the
IEEE802.2 logical link control (LLC) protocol.
.c
4. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains
ul
synchronization, flag, flow and error control specifications necessary to move information
from one place to another, as well as the physical address of the next station to receive and
route a packet.
6. What are headers and trailers and how do they get added and removed?
The control data added to the beginning of a data is called headers. The control data
added to the end of a data is called trailers. At the sending machine, when the message
passes through the layers each layer adds the headers or trailers. At the receiving machine,
.R
each layer removes the data meant for it and passes the rest to the next layer.
across multiple network links. The specific responsibilities of network layer include the
following:
1) Logical addressing.
w
2)Routing.
is made after both computers do handshaking. After the connection, all packets follow the
same route and arrive in sequence.
www.Vidyarthiplus.com Page 7
www.Vidyarthiplus.com
10. What are the two types of implementation formats in virtual circuits?
Virtual circuit transmission is implemented in 2 formats.
1) Switched virtual circuit
2) Permanent virtual circuit.
om
11. What is meant by switched virtual circuit?
Switched virtual circuit format is comparable conceptually to dial-up line in
circuit switching. In this method, a virtual circuit is created whenever it is needed and exits
only for the duration of specific exchange.
.c
12. What is meant by Permanent virtual circuit?
Permanent virtual circuits are comparable to leased lines in circuit switching.
In this method, the same virtual circuit is provided between two uses on a continuous basis.
ul
The circuit is dedicated to the specific uses.
18. Write the keys for understanding the distance vector routing.
w
www.Vidyarthiplus.com Page 8
www.Vidyarthiplus.com
20. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state routing,
cost is a weighted value based on a variety of factors such as security levels, traffic or the
om
state of the link.
.c
application program on one device to an application program on another device. They act
as a link between the upper layer protocols and the services provided by the lower layer.
ul
2. What are the duties of the transport layer?
The services provided by the transport layer
End-to- end delivery
Addressing
Reliable delivery
Flow control
Multiplexing
pa
3. What is the difference between network layer delivery and the transport layer
in
delivery?
Network layer delivery
1) The network layer is responsible for the the source-to-destination delivery of
ej
packet
2) The transport layer is responsible for source-to-destination delivery of the entire
message.
3) Transport layer delivery across multiple network links.
.R
4. What are the four aspects related to the reliable delivery of data?
w
The four aspects are, Error control, Sequence control, Loss control, Duplication
control.
w
www.Vidyarthiplus.com Page 9
www.Vidyarthiplus.com
The size of the data unit belonging to single sessions are so small that several can fit
together into a single datagram or frame, the transport protocol combines them into a single
data unit. The combining process is called concatenation.
om
9. What are the two possible transport services?
Two basic types of transport services are,
Connection service
Connectionless services
.c
10. The transport layer creates the connection between source and destination. What
are the three events involved in the connection?
For security, the transport layer may create a connection between the two end ports. A
connection is a single logical path between the source and destination that is associated
ul
with all packets in a message. Creating a connection involves three steps:
1) Connection establishment
2) Data transfer & Connection release.
Network Oriented
www.Vidyarthiplus.com Page 10
www.Vidyarthiplus.com
om
For other bytes, use the bit-wise AND operator.
.c
In link state routing, a small packet containing routing information sent by a router to
all other router by a packet called link state packet.
ul
UNIT-IV - NETWORK SECURITY
In secret key, the same key is used by both parties. The sender uses this key and
an encryption algorithm to encrypt data; the receiver uses the same key and the
corresponding decryption algorithm to decrypt the data.
In public key, there are two keys: a private key and a public key. The private key
.R
to that of signing transactions documents when you do business with a bank. In network
transactions, you can create an equivalent of an electronic or digital signature by the way
you send data.
w
can create a pair of keys, keep the private one, and publicly distribute the other one.
b) The no. of keys needed is reduced tremendously. For one million users to
communicate, only two million keys are needed.
Disadvantages:
If you use large numbers the method to be effective. Calculating the cipher text using
the long keys takes a lot of time. So it is not recommended for large amounts of text.
www.Vidyarthiplus.com Page 11
www.Vidyarthiplus.com
Disadvantages:
a) Each pair of users must have a secret key. If N people in world want to use this
om
method, there needs to be N (N-1)/2 secret keys. For one million people to communicate, a
half-billion secret keys are needed.
b) The distribution of the keys between two parties can be difficult.
.c
6. Define permutation.
Permutation is transposition in bit level.
Straight permutation: The no. of bits in the input and output are preserved.
Compressed permutation: The no. of bits is reduced (some of the bits are dropped).
ul
Expanded permutation: The no. of bits is increased (some bits are repeated).
Domain Name System can map a name to an address and conversely an address to
name.
Domain name space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior, uses
generic suffixes.
w
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
w
types transferred.
www.Vidyarthiplus.com Page 12
www.Vidyarthiplus.com
om
6. What is the difference between a user agent (UA) and a mail transfer agent
(MTA)?
The UA prepares the message, creates the envelope, and puts the message in
the envelope. The MTA transfers the mail across the Internet.
.c
7. How does MIME enhance SMTP?
MIME is a supplementary protocol that allows non-ASCII data to be sent through
SMTP. MIME transforms non-ASCII data at the sender site to NVT ASCII data and
ul
deliverers it to the client SMTP to be sent through the Internet. The server SMTP at the
receiving side receives the NVT ASCII data and delivers it to MIME to be transform feed
back to the original data.
pa
8. Why is an application such as POP needed for electronic messaging?
Workstations interact with the SMTP host, which receives the mail on behalf of
every host in the organization, to retrieve messages by using a client-server protocol such
as Post Office Protocol, version 3(POP3). Although POP3 is used to download messages
from the server, the SMTP client still needed on the desktop to forward messages from the
in
workstation user to its SMTP mail server.
The documents in the WWW can be grouped into three broad categories: static,
dynamic and active.
Static: Fixed-content documents that are created and stored in a server.
Dynamic: Created by web server whenever a browser requests the document.
.R
document. It allows additional text to include codes that define fonts, layouts, embedded
graphics and hypertext links.
w
www.Vidyarthiplus.com Page 13