0% found this document useful (0 votes)
203 views27 pages

DCCN Notes

The document is an assignment submission that includes responses to two questions about layered networks and the OSI model. It provides a high-level overview of the key benefits of layered networks, including efficient use of resources, flexibility to evolve layers independently, and support for multiple transport technologies. It also describes the seven layers of the OSI model and summarizes the main functions of each layer, such as the physical layer establishing physical connections, the transport layer ensuring reliable end-to-end delivery of data, and the network layer handling routing and logical internetworking.

Uploaded by

Faisal Firdous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
203 views27 pages

DCCN Notes

The document is an assignment submission that includes responses to two questions about layered networks and the OSI model. It provides a high-level overview of the key benefits of layered networks, including efficient use of resources, flexibility to evolve layers independently, and support for multiple transport technologies. It also describes the seven layers of the OSI model and summarizes the main functions of each layer, such as the physical layer establishing physical connections, the transport layer ensuring reliable end-to-end delivery of data, and the network layer handling routing and logical internetworking.

Uploaded by

Faisal Firdous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

1|Page DCCN

CENTRAL UNIVERSITY OF JAMMU


DEPARTMENT OF
COMPUTER SCIENCE & INFORMATION TECHNOLOGY

NAME: FAISAL FIRDOUS


ROLL NO: 1100520
ASSIGNMENT OF: DCCN
ASSIGNMENT NO: 1ST

DATE: 10-JAN-2021

SUBMITTED TO: DR YASHWANT SINGH


2|Page DCCN

QNO1 What are the key benefits of layered network?


Following are the key benefits of layered network are:
o Provides efficient use of network resources.
o Relies on proven and stable protocols and design.

o Allow a very flexible re-use of investments in the GSM infrastructure.


o Offers an open and versatile architecture capable of meeting the current and future
demand in a fast changing telecommunications environment.
o Provides and inherent flexibility for coping with growth and/or changing traffic patterns
and traffic mixes.
o Independence between layers allows each layer to evolve independently.
o Provides great transport flexibility and allows different transport technologies, both
existing and new. To be deployed without impacting the control or services/application
layers.
o Allows common transport arrangements for multi-services network.
o Allows access independent and seamless services through a common service/applications
layer.

QNO2 Explain the functionalities of different OSI layers?

o OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical
medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.

Characteristics of OSI Model:

o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues, and
they are implemented only in the software. The application layer is closest to the end
user. Both the end user and the application layer interact with the software applications.
An upper layer refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data link layer
and the physical layer are implemented in hardware and software. The physical layer is
3|Page DCCN

the lowest layer of the OSI model and is closest to the physical medium. The physical
layer is mainly responsible for placing the information on the physical medium.

Functions of the OSI Layers


There are the seven OSI layers. Each layer has different functions. A list of seven layers are
given below:

1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Physical layer

o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.

Functions of a Physical layer:

 Line Configuration: It defines the way how two or more devices can be connected
physically.
 Data Transmission: It defines the transmission mode whether it is simplex, half-duplex
or full-duplex mode between the two devices on the network.
 Topology: It defines the way how network devices are arranged.
 Signals: It determines the type of the signal used for transmitting the information.

Data-Link Layer

 This layer is responsible for the error-free transfer of data frames.


 It defines the format of the data on the network.
 It provides a reliable and efficient communication between two or more devices.
 It is mainly responsible for the unique identification of each device that resides on a local
network.
 It contains two sub-layers:
4|Page DCCN

o Logical Link Control Layer


 It is responsible for transferring the packets to the Network layer of the
receiver that is receiving.
 It identifies the address of the network layer protocol from the header.
 It also provides flow control.
o Media Access Control Layer
 A Media access control layer is a link between the Logical Link Control
layer and the network's physical layer.
 It is used for transferring the packets over the network.

Functions of the Data-link layer

 Framing: The data link layer translates the physical's raw bit stream into packets known
as Frames. The Data link layer adds the header and trailer to the frame. The header which
is added to the frame contains the hardware destination and source address.
 Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
 Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data get corrupted. It ensures that the transmitting station such as a server with higher
processing speed does not exceed the receiving station, with lower processing speed.
 Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
 Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.

Network Layer

 It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
 It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
 The Data link layer is responsible for routing and forwarding the packets.
 Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
 The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.

Functions of Network Layer:

 Internetworking: An internetworking is the main responsibility of the network layer. It


provides a logical connection between different devices.
5|Page DCCN

 Addressing: A Network layer adds the source and destination address to the header of
the frame. Addressing is used to identify the device on the internet.
 Routing: Routing is the major component of the network layer, and it determines the best
optimal path out of the multiple paths from source to the destination.
 Packetizing: A Network Layer receives the packets from the upper layer and converts
them into packets. This process is known as Packetizing. It is achieved by internet
protocol (IP).

Transport Layer

 The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
 The main responsibility of the transport layer is to transfer the data completely.
 It receives the data from the upper layer and converts them into smaller units known as
segments.
 This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.

The two protocols used in this layer are:

 Transmission Control Protocol


o It is a standard protocol that allows the systems to communicate over the internet.
o It establishes and maintains a connection between hosts.
o When data is sent over the TCP connection, then the TCP protocol divides the
data into smaller units known as segments. Each segment travels over the internet
using multiple routes, and they arrive in different orders at the destination. The
transmission control protocol reorders the packets in the correct order at the
receiving end.
 User Datagram Protocol
o User Datagram Protocol is a transport layer protocol.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.

Functions of Transport Layer:

 Service-point addressing: Computers run several programs simultaneously due to this


reason, the transmission of data from source to the destination not only from one
computer to another computer but also from one process to another process. The transport
layer adds the header that contains the address known as a service-point address or port
address. The responsibility of the network layer is to transmit the data from one computer
to another computer and the responsibility of the transport layer is to transmit the
message to the correct process.
 Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned
with a sequence number that uniquely identifies each segment. When the message has
6|Page DCCN

arrived at the destination, then the transport layer reassembles the message based on their
sequence numbers.
 Connection control: Transport layer provides two services Connection-oriented service
and connectionless service. A connectionless service treats each segment as an individual
packet, and they all travel in different routes to reach the destination. A connection-
oriented service makes a connection with the transport layer at the destination machine
before delivering the packets. In connection-oriented service, all the packets travel in the
single route.
 Flow control: The transport layer also responsible for flow control but it is performed
end-to-end rather than across a single link.
 Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer
ensures that message reach at the destination without any error.

Session Layer

 It is a layer 3 in the OSI model.


 The Session layer is used to establish, maintain and synchronizes the interaction between
communicating devices.

Functions of Session layer:

 Dialog control: Session layer acts as a dialog controller that creates a dialog between two
processes or we can say that it allows the communication between two processes which
can be either half-duplex or full-duplex.
 Synchronization: Session layer adds some checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.

Presentation Layer

 A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
 It acts as a data translator for a network.
 This layer is a part of the operating system that converts the data from one presentation
format to another format.
 The Presentation layer is also known as the syntax layer.

Functions of Presentation layer:

 Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding
methods, the presentation layer handles the interoperability between the different
encoding methods. It converts the data from sender-dependent format into a common
7|Page DCCN

format and changes the common format into receiver-dependent format at the receiving
end.
 Encryption: Encryption is needed to maintain privacy. Encryption is a process of
converting the sender-transmitted information into another form and sends the resulting
message over the network.
 Compression: Data compression is a process of compressing the data, i.e., it reduces the
number of bits to be transmitted. Data compression is very important in multimedia such
as text, audio, video.

Application Layer

 An application layer serves as a window for users and application processes to access
network service.
 It handles issues such as network transparency, resource allocation, etc.
 An application layer is not an application, but it performs the application layer functions.
 This layer provides the network services to the end-users.

Functions of Application layer:

 File transfer, access, and management (FTAM): An application layer allows a user to
access the files in a remote computer, to retrieve the files from a computer and to manage
the files in a remote computer.
 Mail services: An application layer provides the facility for email forwarding and
storage.
 Directory services: An application provides the distributed database sources and is used
to provide that global information about various objects.

 An application layer serves as a window for users and application processes to access
network service.
 It handles issues such as network transparency, resource allocation, etc.
 An application layer is not an application, but it performs the application layer functions.
 This layer provides the network services to the end-users.

QNO3 List two advantages and two disadvantages of having


international standards for network protocols?
Advantages of having International Standards

o If all the systems are following the same standard, it becomes easy for everyone
to connection to everyone else. In other words, the international standards provide
easy interconnectivity.
o If any standard is widely used, it gains economies of scale. For example, VLSI
chips etc.
8|Page DCCN

 Disadvantages of having International Standards

o The manufacturers and companies will be bound to follow the same international
standards and so they won’t be able to develop something better of their own.
o Large multinational companies won’t be able to pool everyone in to using their
proprietary protocols and therefore no huge profits.

QNO4 A system has an n-layer protocol hierarchy. Applications generate


messages of length M bytes. At each of the layers, an h-byte header is added.
What fraction of the network bandwidth is filled with headers?

QNO5 How two adjacent layers communicate in a layered network? (or What
do you mean by Service Access Point?

Every layer communicates using it’s transition protocol. e.g. for Transport layer there are TCP
and UDP, for Network layer there is IP and for Datalink layer there is Ethernet.

AT SENDING HOST:

Transport Layer gets it’s payload (data including headers of upper layer) and encapsulates this
data into a TCP or UDP header. This layer communicates in a peer-to-peer fashion with the
9|Page DCCN

Transport layer of receiving host. TCP or UDP header includes “source and destination PORT
numbers”.

Network layer communicates in a hop-to-hop manner. This layer encapsulates the data
(including TCP or UDP header) into IP header. IP header includes “source and destination IP
addresses”. This data is passed to it’s lower layer that is DataLink layer.

DataLink layer encapsulates the data from Network layer into Ethernet header which includes
“source and destination MAC addresses”. This data is transmitted through Physical Layer via
wires.

AT RECEIVING END:

When this data is passed to the DataLink Layer, this layer has the capacity of understanding the
hardware address.

MAC address. If it sees that the MAC belongs to me, it passes the data to Network layer
otherwise it simply discards the frame(data in DataLink layer is called frame).

When data comes to Network layer it sees for destination IP address. If it belongs to this
receiving host, it transmits the data to its upper layer i.e. Transport layer. If destination IP
address is not for this host, router looks for this destination IP in it’s routing table. If it finds
route to this IP it simply routes the packet to that router, otherwise it will discard the packet.

Transport layer snatches the TCP or UDP header and looks for the destination Port number. Data
is then forwarded to the respective ports and an Acknowledgement is sent back to the sending
host that data has reached (in case of TCP because it is reliable protocol).

QNO6 Discuss the design issues for the layers?

A number of design issues exist for the layer to layer approach of computer networks. Some of
the main design issues are as follows −

Reliability

Network channels and components may be unreliable, resulting in loss of bits while data transfer.
So, an important design issue is to make sure that the information transferred is not distorted.

Scalability

Networks are continuously evolving. The sizes are continually increasing leading to congestion.
Also, when new technologies are applied to the added components, it may lead to incompatibility
issues. Hence, the design should be done so that the networks are scalable and can accommodate
such additions and alterations.
10 | P a g e DCCN

Addressing

At a particular time, innumerable messages are being transferred between large numbers of
computers. So, a naming or addressing system should exist so that each layer can identify the
sender and receivers of each message.

Error Control

Unreliable channels introduce a number of errors in the data streams that are communicated. So,
the layers need to agree upon common error detection and error correction methods so as to
protect data packets while they are transferred.

Flow Control

If the rate at which data is produced by the sender is higher than the rate at which data is received
by the receiver, there are chances of overflowing the receiver. So, a proper flow control
mechanism needs to be implemented.

Resource Allocation

Computer networks provide services in the form of network resources to the end users. The main
design issue is to allocate and deallocate resources to processes. The allocation/deallocation
should occur so that minimal interference among the hosts occurs and there is optimal usage of
the resources.

Statistical Multiplexing

It is not feasible to allocate a dedicated path for each message while it is being transferred from
the source to the destination. So, the data channel needs to be multiplexed, so as to allocate a
fraction of the bandwidth or time to each host.

Routing

There may be multiple paths from the source to the destination. Routing involves choosing an
optimal path among all possible paths, in terms of cost and time. There are several routing
algorithms that are used in network systems.

Security

A major factor of data communication is to defend it against threats like eavesdropping and
surreptitious alteration of messages. So, there should be adequate mechanisms to prevent
unauthorized access to data through authentication and cryptography.
11 | P a g e DCCN

QNO7 List two ways in which the OSI reference model and the TCP/IP
reference model are the same. Now list two ways in which they differ.

Similarities between TCP/IP model and OSI model

o Both are the logical models.


o Both define standards for networking.
o Both provide a framework for creating and implementing networking standards and
devices.
o Both divide the network communication process in layers.
o In both models, a single layer defines a particular functionality and set standards for that
functionality only.
o Both models allow a manufacturer to make devices and network components that can
coexist and work with the devices and components made by other manufacturers.
o Both models simplify troubleshooting process by dividing complex functions into simpler
components.
o Instead of defining the already defined standards and protocols, both models referenced
them. For example, the Ethernet standards were already defined by IEEE before creation
of these models. So instead of defining them again both models used them as IEEE
Ethernet standards.

Differences between OSI model and TCP/IP model

o OSI Layer model has seven layers while TCP/IP model has four layers.
o OSI Layer model is no longer used while TCP/IP is still used in computer networking.
o To define the functionality of upper layers, OSI uses three separate layers (application,
presentation and session) while TCP/IP uses a single layer (application).
o Just like upper layers, OSI uses two separate layers (Physical and Data link) to define the
functionality of bottom layers while TCP/IP uses a single layer (Link) for the same.
o To define the routing protocols and standards, OSI uses Network layer while TCP/IP uses
Internet layer.
o In comparison of TCP/IP model, OSI model is well documented and explains standards
and protocols in more details.

QNO8 When a file is transferred between two computers, two


acknowledgement strategies are possible. In the first one, the file is chopped
up into packets, which are individually acknowledged by the receiver, but the
file transfer as a whole is not acknowledged. In the second one, the packets are
12 | P a g e DCCN

not acknowledged individually, but the entire file is acknowledged when it


arrives. Discuss these two approaches.

The TCP/IP stack is responsible for the "chopping up" into packets of the data for transmission
and for their acknowledgment. Depending on the transport protocol that is used (TCP or
UDP) each packet will be acknowledged or not, respectively. The strategy when the file is
chopped up into packets, which are individually acknowledged by the receiver, but the file
transfer as a whole is not acknowledged is good in situations (Applications) that do not need the
whole file to be sent, Web site for example: different parts of the web site can arrive in different
times. The other strategy, in which the packets are not acknowledged individually, but the entire
file is acknowledged when it arrives is suitable for FTP (mail transfer), we need whole mail, not
parts of it. 

QNO9 What is the principal difference between connectionless


communication and connection-oriented communication?

Following are the differences between connection-oriented and connectionless


communication:

 In Connection Oriented communication, connection is established between source and


destination before starting the communication whereas in connection less
communication there is no initial connection established between source and destination
 Connection Oriented communication check whether data is received at receiver end or
not. If any error occurs during sending of data, then it resends it whereas in case
of connectionless communication, there is no means of tracking whether data is
received properly at receiver end or not.
 Connection Oriented communication are reliable because it provides guaranteed
delivery of data whereas connection less communication are not reliable because it does
not provide any data delivery guarantee
 In Connection Oriented communication, packets at destinations are delivered in same
order in which they are sent from source whereas in connectionless communication,
there is no sequential order of received packets, it can be received in random order.
 Connection Oriented communication are slower because it requires connection
establishment initially whereas connection less communication are faster because it
doesn’t need to establish connection before transmission.
13 | P a g e DCCN

QNO10 Two networks each provide reliable connection-oriented service. One


of them offers a reliable byte stream and the other offers a reliable message
stream. Are these identical? If so, why is the distinction made? If not, give an
example of how they differ.

Message and byte streams are different. In a message stream, the network keeps track of message
boundaries. In a byte stream, it does not. For example, suppose a process writes 1024 bytes to a
connection and then a little later writes another 1024 bytes. The receiver then does a read for
2048 bytes. With a message stream, the receiver will get two messages, of 1024 bytes each. With
a byte stream, the message boundaries do not count and the receiver will get the full 2048 bytes
as a single unit. The fact that there were originally two distinct messages is lost.

Qno11 What are the differences between Attenuation Distortion and


Delay Distortion?
Attenuation Distortion: The impairment is caused by the strength of signals that degrades with
distance over a transmission link. Three factors are related to the attenuation which are, The
received signal should have sufficient strength to be intelligently interpreted by a receiver. An
amplifier or a repeater is needed to boost the strength of the signal. A signal should be
maintained at a level higher than the noise so that error will not be generated. Again, an amplifier
or a repeater can be used. Attenuation is an increasing function of frequency, with more
attenuation at higher frequency than at lower frequency. An equalizer can smooth out the effect
of attenuation across frequency bands, and an amplifier can amplify high frequencies more than
low frequencies.
Delay Distortion: Delay distortion is a guided transmission media phenomenon where network
data signals are transmitted via a medium at a certain frequency and speed. Delay distortion
occurs when signal velocity and frequency vary. This means that all signals do not arrive at the
same time, resulting in distortion of the signal. This term is commonly used in fiber optics. The
velocity of propagation of a signal through a guided medium varies with frequencies; it is fast at
the center of the frequency, but it falls off at the two edges of frequencies. Equalization
techniques can be used to smooth out the delay distortion. Delay distortion is a major reason for
the timing jitter problem, where the receiver clock deviates from the incoming signal in a random
fashion so that an incoming signal might arrive earlier or late.
14 | P a g e DCCN

QNO12 Distinguish between time domain and frequency domain


representation of a signal.

There is the difference between time domain and frequency domain are given
below,

Time domain Frequency domain


The advantage is that, they are relatively fast and The advantage is that the frequency domain allows for
requires less memory than inverting the techniques which could be used to determine the
Helmholtz operator. stability of the system.
The frequency domain graph shows how much of the
A time domain graph shows how a signal
signal lies within each given frequency band over a
changes over time.
range of frequencies.
Time domain is the domain for analysis of Frequency domain is the domain for analysis of
mathematical functions or signals with respect to mathematical functions or signals with respect to
time. frequency.
The time domain systems tend to use photon The frequency domain systems are relatively
counting detectors which are slow but highly inexpensive, easy to develop and use and can provide
sensitive. very fast temporal sampling.

QNO13 This elementary problem begins to explore propagation delay and


transmission delay, two central concepts in data networking. Consider two
hosts, Hosts A and B, connected by a single link of rate R bps. Suppose that
the two hosts are separated by m meters, and suppose the propagation speed
15 | P a g e DCCN

along the link is s meters/sec. Host A is to send a packet of size L bits to Host
B.

(a.) Express the propagation delay, dprop in terms of mand s.

dprop = m/s seconds

(b.) Determine the transmission time of the packet, dtrans in terms of


Land R.

dtrans = l/r seconds.

(c.) Ignoring processing and queing delays, obtain an expression for


the end-to-end delay.
dendtoend =(m/s + l/r)seconds.

(d.) Suppose Host A begins to transmit the packet at time t=0. At time
t= dtrans, where is the last bit of the packet?

The bit is just leaving Host A.

(e.) Suppose dprop is greater than dtrans . At time t= dtrans , where is the
first bit of the packet?

The first bit is in the link and has not reached Host B.

(f.) Suppose dprop is less than dtrans . At time t= dtrans , where is the first
bit of the packet?

The first bit has reached HostB.

(g.) Suppose s=2.5*108, L=100bits and R=28 kbps. Find the distance
m so that dprop equals dtrans .

m=L/R*S
m=(100/2.5)×10^8 (28×10^3)= 892.85 KM
16 | P a g e DCCN

QNO14 Why analog-to-analog modulation technique is required?


Explain the possible analog-to-analog modulation techniques?

Analog-to-analog modulation is required to achieve the following goals:


•Use of higher frequency for efficient transmission through a media
•Possibility of sending more than one signal through a media simultaneously through
FDM (Frequency Division Multiplexing) technique.
•Use of smaller antenna size.
Three possible analog-to-analog modulation techniques are:
•Amplitude modulation
•Frequency modulation
•Phase modulation
QNO15 Explain the possible digital-to-analog modulation techniques?
Out of the three digital-to-analog modulation techniques, which one
requires higher bandwidth?

Three possible digital-to-analog modulation techniques are:


•Amplitude Shift Keying (ASK)
•Frequency Shift Keying (FSK)
•Phase Shift Keying (PSK)

For a given transmission bandwidth, higher data rate can be achieved in case of PSK. In
other words, in PSK higher channel capacity is achieved although the signaling rate is
lower.
QNO16 Distinguish between the two basic multiplexing techniques?
Why guard bands are used in FDM and why sync pulse is required in
TDM?
The two basic multiplexing techniques are:
1.Frequency division multiplexing (FDM)
17 | P a g e DCCN

2.Time division multiplexing (TDM)


FDM can be used with analog signals. A number of signals are carried
simultaneously on the same medium by allocating to each signal a different
frequency band. TDM (also known as synchronous time division multiplexing)
can be used with digital signals or analog signals carrying digital data. In TDM,
data from various sources are carried in respective frames. Each frame consists of
a set of time slots, and each source is assigned a time slot per frame.
Guard bands are used in FDM: In FDM, a number of signals are sent
simultaneously on the same medium by allocating separate frequency band or
channel to each signal. Guard bands are used to avoid interference between two
successive channels.
Sync pulse is required in TDM: In TDM, in each frame time slots are pre-
assigned and are fixed for each input sources. In order to identify the beginning of
each frame, a sync pulse is added at the beginning of every frame.
QNO17 How is the wastage of bandwidth in TDM overcome by
statistical-TDM?

It dynamically allocates the time slots on demand to separate input channels, thus saving
the channel capacity. As with Synchronous TDM, statistical multiplexers also have many
I/O lines with a buffer associated to each of them. During the input, the multiplexer scans
the input buffers, collecting data until the frame is filled and send the frame. At the
receiving end, the demultiplexer receives the frame and distributes the data to the
appropriate buffers. In case of statistical TDM, the data in each slot must have an address
part, which identifies the source of data.

QNO18 Four channels are multiplexed using TDM. If each channel


sends 100 bytes is and we multiplex 1 byte per channel, show the frame
traveling on the link, the size of the frame, the duration of a frame, the
frame rate, and the bit rate for the link.
18 | P a g e DCCN

The multiplexer is shown in Figure. Each frame carries 1 byte from each channel; the size
of each frame, therefore, is 4 bytes, or 32 bits. The frame rate is 100 frames per second.
The duration of a frame is therefore 1/100s. The link is carrying 100 frames per second,
and since each frame contains 32 bits, the bit rate is 100×32, or 3200bps.

QNO19 A multiplexer combines four 100-kbps channels using a time


slot of 2 bits. Show the output with four arbitrary inputs. What is the
frame rate? What is the frame duration? What is the bit rate? What is
the bit duration?
Figure shows the output for four arbitrary inputs. The link carries 50,000 frames per
second since each frame contains 2bits per channel. The frame duration is therefore
1/50,000s or 20μs. The frame rate is 50,000 frames per second, and each frame carries
8bits; the bitrate is 50,000×8=400,000 bits or 400kbps.The bit duration is 1/400,000s, or
19 | P a g e DCCN

2.5μs.

QNO20 What is the difference between Frequency Division


Multiplexing and Wave Division Multiplexing?

Wave-division multiplexing (WDM) is conceptually the same as FDM, except that the
multiplexing and demultiplexing involves light signals transmitted through fiber-optic
channels. The idea is the same: we are combining different frequency signals. However,
the difference is that the frequencies are very high
QNO21 What is the essential difference between message switching and
packet switching?
Difference between Message and Packet Switching

 Last Updated : 29 May, 2020

1. Message Switching :
In this technique, the entire message is transmitted without any break from one node to another.
It firstly stores and then forwards information that requires more time. Due to this, the access
time is increased. No direct link is present between the sender and the receiver.
20 | P a g e DCCN

Example of message switching –

2. Packet Switching :
In packet switching, information is transferred in the form of data packets between the sender
and the receiver. These packets are forwarded one by one from the sender to the receiver. Each
packet is associated with a Header. Then, these packets then reassembled into the original
message. This improves the performance as the time require to access the data packet is reduced.
Due to this, the overall performance of the network is improved.
21 | P a g e DCCN

Example of packet switching –

Message Switching Packet Switching


A complete message is passed across a Message is broken into smaller units
network. known as Packets.
In this, computer language used is ASCII,
In packet switching, binary type is used.
baudot, morse.
In message switching there is no limit on Packet switching places a tight upper
block size. limit on block size.
Message exist only in one location in the Parts i.e. packets of the message exist in
network. many places in the network.
Example: Hop-by-hop Telex forwarding and
Example: Frame Relay, IP, and X. 25
UUCP(UNIX-to-UNIX Copy Protocol)
Physical links are allocated dynamically. Virtual links are made simultaneously.
Access time is reduced due to increase in
Packets are stored in main memory.
performance as packets are stored in disk.

QNO22 What are the key differences between datagram and virtual circuit
packet switching?
Both Virtual Circuits and Datagram Networks are the type of connection services which are
used for transmission of information from sender to receiver.
22 | P a g e DCCN

Following are the important differences between Virtual Circuits & Datagram Networks −

Sr.
Key Virtual Circuits Datagram Networks
No.
Virtual Circuit is the connection oriented
On other hand Datagram is the
service in which there is a implementation
connection less service where no
1 Definition of resources like buffers, CPU, bandwidth,
such resources are required for the
etc., used by virtual circuit for a data
data transmission.
transfer session.
In Virtual circuits as all the resources and On other hand in case Datagram
bandwidth get reserved before the network, the path is not fixed as
transmission, the path which is utilized or data packets are free to decide the
2 Path
followed by first data packet would get path on any intermediate router on
fixed and all other data packets will use the the go by dynamically changing
same path and consume same resources. routing tables on routers.
On other hand different headers
As there is same path followed by all the
with information of other data
3 Header data packets, a common and same header
packet is being used in Datagram
is being used by all the packets.
network.
However on other hand Datagram
Virtual Circuit is less complex as
4 Complexity network are more complex as
compared to that of Datagram network.
compared to Virtual circuit.
On other hand Datagram network
Due to fixed path and assurance of fixed
due to dynamic resource allocation
resources, Virtual Circuits are more
5 Reliability and follow dynamic path is more
reliable for data transmission as compared
prone to error and is less reliable
to Datagram network.
than Virtual circuits.
On the other hand Datagram
Virtual circuits are costlier in installation
network are cheaper as compared
and maintenance and are widely used by
Example to the Virtual Circuits and are
6 ATM (Asynchronous Transfer Mode)
and Cost mainly used by IP network, which
Network, which is used for the Telephone
is used for Data services like
calls.
Internet.

QNO23 How the drawback of circuit switching is overcome in message


switching?
Circuit switching is insufficient in terms of resource utilization. It is expensive as compared to
other techniques because of dedicated path requirements. The time required to establish the
connection between the source and destination is high. This means that there is no
communication until the connection is established and the resources are available in Circuit
switching. These drawbacks of Circuit switching of eliminated by message switching.
23 | P a g e DCCN

In message switching, the efficiency is improved as a single channel can now be used
for transferring many messages. The source and the destination don't need to be ready at the
same time. Even if the receiver is not ready the sender can send the message and it can be stored
by the nodes temporarily. The transfer of message is possible also when the transfer rate of the
sender and receiver is different.

QNO24 What are the key differences between circuit switching and virtual
circuit packet switching?

CIRCUIT-SWITCHED NETWORKS

o A circuit-switched network consists of a set of switches connected by physical links. A


connection between two stations is a dedicated path made of one or more links.
However, each connection uses only one dedicated channel on each link.
o Circuit switching takes place at the physical layer.
o Before starting communication, the stations must make a reservation for the resources to
be used during the communication. These resources, such as channels (bandwidth in
FDM and time slots in TDM), switch buffers, switch processing time, and switch
input/output ports, must remain dedicated during the entire duration of data transfer until
the teardown phase.
o Data transferred between the two stations are not packetized (physical layer transfer of
the signal). The data are a continuous flow sent by the source station and received by the
destination station, although there may be periods of silence.
o There is no addressing involved during data transfer. The switches route the data based
on their occupied band (FDM) or time slot (TDM). Of course, there is end-to-end
addressing used during the setup phase.

VIRTUAL-CIRCUIT NETWORKS

o A virtual-circuit network is a cross between a circuit-switched network and a datagram


network.
o As in a circuit-switched network, there are setup and teardown phases in addition to the
data transfer phase.
o Resources can be allocated during the setup phase, as in a circuit-switched network, or on
demand, as in a datagram network.
o As in a datagram network, data are packetized and each packet carries an address in the
header. However, the address in the header has local jurisdiction (it defines what should
be the next switch and the channel on which the packet is being carried), not end-to-end
jurisdiction.
o As in a circuit-switched network, all packets follow the same path established during the
connection.
24 | P a g e DCCN

o A virtual-circuit network is normally implemented in the data link layer, while a


circuit-switched network is implemented in the physical layer and a datagram
network in the network layer.
o The network has switches that allow traffic from sources to destinations. A source or
destination can be a computer, packet switch, bridge, or any other device that connects
other networks

QNO25 How packet size affects the transmission time in a packet switching
network?

In a packet switching network, Transmission Delay is the time taken to put a packet onto link. In
other words, it is simply time required to put data bits on the wire/communication medium. It
depends on length of packet and bandwidth of network. It can be expressed as follows:

Transmission Delay = Packet length / Bandwidth = (L/B) second

QNO26 Design a three stage 200*200 switch (N=200) with k=4 and n=20.

In the first stage we have N/n or 10 crossbars, each of size 20 x 4.

In the second stage, we have 4 crossbars, each of size 10 x 10.

In the third stage, we have 10 crossbars, each of size 4 x 20.

The total number of crosspoints is ( 2kN + k(frac{N}{n})^2), or 2000 crosspoints.

This is 5 percent of the number of crosspoints in a single-stage switch (200 x 200 = 40,000)
25 | P a g e DCCN

QNO27 Redesign the previous three stages, 200*200 switches, using the Clos
criteria with minimum number of cross points?

We let n =(200/2)^0.5, or n = 10.

We calculate k = 2n - 1 = 19.

In the first stage, we have 200 / 10, or 20, crossbars, each with 10 * 19 crosspoints.

In the second stage, we have 19 crossbars, each with 10 * 10 crosspoints.

In the third stage, we have 20 crossbars each with 19 X 10 crosspoints.

The total number of crosspoints is 20(10 x 19) + 19(10 x 10) + 20(19 * 10) = 9500.

If we use a single-stage switch, we need 200 x 200 = 40,000 crosspoints.

The number of crosspoints in this three-stage switch is 24 percent that of a single-stage


switch.
26 | P a g e DCCN

QNO28 Explain the Public switch telephone networks?

A Public Switched Telephone Network, or PSTN for short, refers to a telecommunications


network which allows subscribers at different sites to communicate by voice. The term plain old
telephone service (POTS) is also frequently used. The features of a PSTN are:

 Subscribers can be connected by entering telephone numbers


 The existing connections are primarily used to transmit speech information
 After hanging up the connection is closed and the resources used become available to other
subscribers

The term public switched telephone network is primarily used for public landlines. With
traditional analogue landlines speech is transmitted analogue, a ISDN network transmits speech
information digitally.

The traditional structure of the Public Switched Telephone Network

The traditional public switched telephone network has a strictly hierarchic architecture and a star
structure. The individual subscriber lines are connected to a local exchange, which in turn
communicates with trunk exchanges, main and central exchanges. Lines within a local exchange
typically have the same area code. To call a number outside the local exchange the area code
must be added. International calls require dialing the country code. These start with a double
zero.

Replacing the Public Switched Telephone Network with Voice over IP telephony (VoIP)

Since the introduction of Voice over IP telephony (VoIP), traditional public switched telephone
networks are slowly being replaced. Voice over IP uses the internet for speech communication
and transmits the voice data as individual data packets. Unlike public switched telephone
networks, there is no static connection between the two subscribers, instead data is dynamically
routed over the data network using a virtual connection. Since each data packet has a destination
address, the packets can even be routed differently over the network. On the other end they are
reassembled in the correct order and converted back into analogue speech.

QNO29 Suppose users share a 1 Mbps link. Also suppose each user requires
100 Kbps when transmitting, but each user only transmits 10% of the time.

(a) When circuit-switching is used, how many users can be supported?

Total Bandwidth available=3Mpbs=3000Kbps


One user requirement=150Kbps
So total users that can be supported=3000kbps/150kbps=20Users
27 | P a g e DCCN

(b) For the remainder of this problem, suppose packet-switching is used. Find
the probability that a given user is transmitting.
Probability=1/10
=>0.1
QNO31 Using 5 –bit sequence numbers, what is the maximum size of the send
and the receive windows for each of the following protocols?
a) Stop –and-Wait ARQ

b) Go-Back-N ARQ

c) Selective-Repeat ARQ

Ans:
Max SWS Max RWS

Stop & Wait 1 1

GBN 2^m-1 1

SR 2^(m-1 ) 2^(m-1 )

Stop and wait ARQ: S.W=1, R.W=1

Go back N ARQ: S.W=31, R.W=1

Selective Repeat ARQ: S.W=16, R.W=16

You might also like