Answer Set2
Answer Set2
General Instructions:
● Follow the instructions given in each section.
● Do not write anything on the question paper, except your roll no.
● Make sure that you attempt the questions in order.
Answer Key
Section - A
Answer 1: LAN
Answer 2: Codewords
Answer 3: cyclic redundancy check
Answer 4: random access
Answer 5: 4000
Section - B
Ans 6
Network topology refers to the arrangement of computers connected in a network through some physical
medium such as cable, optical fiber etc. Topology generally determines the shape of the network. The various
types of network topologies are as follows:
1-Number of ports: (n – 1) = 5 ports needed per device
2- Mesh Topology
3-
In mesh topology, each computer is connected to every other computer in point-to-point mode as shown in
figure 5. For example, if we have four computers, we must have six links. If we have n computers, we must
have n(n-1)/2 links.
A message can take several possible paths to reach a destination.
Advantages of mesh topology are:
Message delivery is more reliable.
Network congestion is minimum due to large number of links.
Ans 7
Ans a) In random access methods, there is no access control (as there is in controlled access methods) and there is no
predefined channels (as in channelization). Each station can transmit when it desires. This liberty may create collision.
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or
through code, between different stations. The common protocols in this category are FDMA, TDMA, and CDMA.
Ans 8
Ans a) Signals are usually transmitted over some transmission media that are broadly classified in to two
categories. a.) Guided Media: These are those that provide a conduit from one device to another that include
twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is
1
contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and
transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and
transports signals in the form of light. b.) Unguided Media: This is the wireless media that transport
electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done
through radio communication, satellite communication and cellular telephony.
Ans b) We can mention three advantages of optical fiber cable over twisted-pair and coaxial cables: noise
resistance, less signal attenuation, and higher bandwidth."
Fiber-optic benefits
● Wide frequency band and large transmission capacity
● The transmission loss is low, and the fiber transmission loss does not need to introduce an equalizer, or worry
about the temperature.
● Light weight, small diameter and easy installation.
● Anti-interference ability, the optical fiber is using light to conduct the signal will not be disturbed by the
electromagnetic field.
● High fidelity
● Stable transmission, long service life, and small probability of release failure
● Costs are gradually decreasing
Ans 9
Ans a) Redundancy: The central concept in detecting or correcting errors is redundancy. To be able to detect or
correct errors, we need to send some extra bits with our data. These redundant bits are added by the sender and
removed by the receiver. Their presence allows the receiver to detect or correct corrupted bits.
Ans b) The Hamming distance d(10101, 11110) is 3 because 10101 ⊕ 11110 is 01011 (three 1s) similarly in
ii) d(00000,11110) = 4
Ans 10
Random access protocol Controlled access protocol
1. In a random-access method, there is 1.In this either control authority (in polling)
no control, access is based on contention or other stations (in reservation and token
passing) control the access.
3. Stations can transmit data 3.only a station can transmit data at a time
Section – C
2
Answer 11:
1. Frequency Division Multiple Access (FDMA): FDMA is a type of channelization protocol. In this bandwidth is
divided into various frequency bands. Each station is allocated with band to send data and that band is reserved
for particular station for all the time which is as follows:
The frequency bands of different stations are separated by small band of unused frequency and that unused
frequency bands are called as guard bands that prevents the interference of stations. It is like access method in data
link layer in which data link layer at each station tells its physical layer to make a band pass signal from the data
passed to it. The signal is created in the allocated band and there is no physical multiplexer at the physical layer.
2. Time Division Multiple Access (TDMA): TDMA is the channelization protocol in which bandwidth of channel is
divided into various stations on the time basis. There is a time slot given to each station, the station can transmit
data during that time slot only which is as follows:
3
Each station must aware of its beginning of time slot and the location of the time slot. TDMA requires synchronization
between different stations. It is type of access method in the data link layer. At each station data link layer tells the
station to use the allocated time slot.
3. Code Division Multiple Access (CDMA): In CDMA, all the stations can transmit data simultaneously. It allows each
station to transmit data over the entire frequency all the time. Multiple simultaneous transmissions are separated
by unique code sequence. Each user is assigned with a unique code sequence.
4
In the above figure, there are 4 stations marked as 1, 2, 3 and 4. Data assigned with respective stations as d 1, d2,
d3 and d4 and the code assigned with respective stations as c1, c2, c3 and c4.
Answer 12:
Carrier Sense Multiple Access ensures fewer collisions as the station is required to first sense the medium (for idle or
busy) before transmitting data. If it is idle then it sends data, otherwise it waits till the channel becomes idle.
However there is still chance of collision in CSMA due to propagation delay. For example, if station A wants to send
data, it will first sense the medium.If it finds the channel idle, it will start sending data. However, by the time the first
bit of data is transmitted (delayed due to propagation delay) from station A, if station B requests to send data and
senses the medium it will also find it idle and will also send data. This will result in collision of data from station A and
B.
5
P-persistent: The node senses the medium, if idle it sends the data with p probability. If the data is not
transmitted ((1-p) probability) then it waits for some time and checks the medium again, now if it is found idle
then it send with p probability. This repeat continues until the frame is sent. It is used in Wifi and packet radio
systems.
O-persistent: Superiority of nodes is decided beforehand and transmission occurs in that order. If the medium
is idle, node waits for its time slot to send data.
Section – D
Q13. Write a detailed note on the TCP/IP reference model. Also compare TCP/IP reference model with OSI reference
model.
Answer:
TCP/IP Reference Model is a four-layered suite of communication protocols. It was developed by the DoD (Department
of Defence) in the 1960s. It is named after the two main protocols that are used in the model, namely, TCP and IP. TCP
stands for Transmission Control Protocol and IP stands for Internet Protocol.
The four layers in the TCP/IP protocol suite are:
Host-to- Network Layer −It is the lowest layer that is concerned with the physical transmission of data. TCP/IP
does not specifically define any protocol here but supports all the standard protocols.
Internet Layer −It defines the protocols for logical transmission of data over the network. The main protocol in
this layer is Internet Protocol (IP) and it is supported by the protocols ICMP, IGMP, RARP, and ARP.
Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols defined here are
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
Application Layer − This is the topmost layer and defines the interface of host programs with the transport layer
services. This layer includes all high-level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.
The following diagram shows the layers and the protocols in each of the layers −
6
Difference between TCP/IP and OSI Model:
TCP/IP OSI
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP developed protocols then model. OSI developed model then protocol.
Transport layer in TCP/IP does not provide In OSI model, transport layer provides assurance delivery of
assurance delivery of packets. packets.
TCP/IP model network layer only provides Connection less and connection oriented both services are
connection less services. provided by network layer in OSI model.
Protocols cannot be replaced easily in TCP/IP While in OSI model, Protocols are better covered and is easy to
model. replace with the change in technology.
7
8