0% found this document useful (0 votes)
17 views

Answer Set2

1) The document is a practice test for an Introduction to Computer Networks course, assessing knowledge over topics like network topologies, transmission media, and multiple access protocols. 2) It contains multiple choice and descriptive questions testing understanding of concepts like mesh networks, random access, carrier sense multiple access, and the TCP/IP and OSI reference models. 3) The test has sections on network fundamentals, transmission media, multiple access protocols, and models with questions ranging from defining key terms to explaining concepts in detail.

Uploaded by

Aakarshit Kohli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Answer Set2

1) The document is a practice test for an Introduction to Computer Networks course, assessing knowledge over topics like network topologies, transmission media, and multiple access protocols. 2) It contains multiple choice and descriptive questions testing understanding of concepts like mesh networks, random access, carrier sense multiple access, and the TCP/IP and OSI reference models. 3) The test has sections on network fundamentals, transmission media, multiple access protocols, and models with questions ranging from defining key terms to explaining concepts in detail.

Uploaded by

Aakarshit Kohli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

2023-2024

Sessional Test I–March, 2023

Roll No: ……………… [Total No. of Pages: 2 ]


Programme: B.E Time: 90 minutes
Course Title: Introduction to Computer Networks
Course Code: CS156 Max. Marks: 40

General Instructions:
● Follow the instructions given in each section.
● Do not write anything on the question paper, except your roll no.
● Make sure that you attempt the questions in order.

Answer Key
Section - A
Answer 1: LAN
Answer 2: Codewords
Answer 3: cyclic redundancy check
Answer 4: random access
Answer 5: 4000
Section - B

Ans 6
Network topology refers to the arrangement of computers connected in a network through some physical
medium such as cable, optical fiber etc. Topology generally determines the shape of the network. The various
types of network topologies are as follows:
1-Number of ports: (n – 1) = 5 ports needed per device
2- Mesh Topology
3-
In mesh topology, each computer is connected to every other computer in point-to-point mode as shown in
figure 5. For example, if we have four computers, we must have six links. If we have n computers, we must
have n(n-1)/2 links.
A message can take several possible paths to reach a destination.
Advantages of mesh topology are:
 Message delivery is more reliable.
 Network congestion is minimum due to large number of links.

Ans 7
Ans a) In random access methods, there is no access control (as there is in controlled access methods) and there is no
predefined channels (as in channelization). Each station can transmit when it desires. This liberty may create collision.
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or
through code, between different stations. The common protocols in this category are FDMA, TDMA, and CDMA.

Ans b) Vulnerable time = 2x Tfr = 2 × 1 ms = 2 ms.

Ans 8
Ans a) Signals are usually transmitted over some transmission media that are broadly classified in to two
categories. a.) Guided Media: These are those that provide a conduit from one device to another that include
twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is
1
contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and
transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and
transports signals in the form of light. b.) Unguided Media: This is the wireless media that transport
electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done
through radio communication, satellite communication and cellular telephony.

Ans b) We can mention three advantages of optical fiber cable over twisted-pair and coaxial cables: noise
resistance, less signal attenuation, and higher bandwidth."
Fiber-optic benefits
● Wide frequency band and large transmission capacity
● The transmission loss is low, and the fiber transmission loss does not need to introduce an equalizer, or worry
about the temperature.
● Light weight, small diameter and easy installation.
● Anti-interference ability, the optical fiber is using light to conduct the signal will not be disturbed by the
electromagnetic field.
● High fidelity
● Stable transmission, long service life, and small probability of release failure
● Costs are gradually decreasing

Ans 9
Ans a) Redundancy: The central concept in detecting or correcting errors is redundancy. To be able to detect or
correct errors, we need to send some extra bits with our data. These redundant bits are added by the sender and
removed by the receiver. Their presence allows the receiver to detect or correct corrupted bits.

Ans b) The Hamming distance d(10101, 11110) is 3 because 10101 ⊕ 11110 is 01011 (three 1s) similarly in
ii) d(00000,11110) = 4

Ans 10
Random access protocol Controlled access protocol

1. In a random-access method, there is 1.In this either control authority (in polling)
no control, access is based on contention or other stations (in reservation and token
passing) control the access.

2. Collision exists 2.controlled access method are collision


free.

3. Stations can transmit data 3.only a station can transmit data at a time

Section – C

2
Answer 11:
1. Frequency Division Multiple Access (FDMA): FDMA is a type of channelization protocol. In this bandwidth is
divided into various frequency bands. Each station is allocated with band to send data and that band is reserved
for particular station for all the time which is as follows:

The frequency bands of different stations are separated by small band of unused frequency and that unused
frequency bands are called as guard bands that prevents the interference of stations. It is like access method in data
link layer in which data link layer at each station tells its physical layer to make a band pass signal from the data
passed to it. The signal is created in the allocated band and there is no physical multiplexer at the physical layer.

2. Time Division Multiple Access (TDMA): TDMA is the channelization protocol in which bandwidth of channel is
divided into various stations on the time basis. There is a time slot given to each station, the station can transmit
data during that time slot only which is as follows:

3
Each station must aware of its beginning of time slot and the location of the time slot. TDMA requires synchronization
between different stations. It is type of access method in the data link layer. At each station data link layer tells the
station to use the allocated time slot.

3. Code Division Multiple Access (CDMA): In CDMA, all the stations can transmit data simultaneously. It allows each
station to transmit data over the entire frequency all the time. Multiple simultaneous transmissions are separated
by unique code sequence. Each user is assigned with a unique code sequence.

4
In the above figure, there are 4 stations marked as 1, 2, 3 and 4. Data assigned with respective stations as d 1, d2,
d3 and d4 and the code assigned with respective stations as c1, c2, c3 and c4.

Q12. Explain Carrier Sense Multiple Access Protocol in detail.

Answer 12:

Carrier Sense Multiple Access ensures fewer collisions as the station is required to first sense the medium (for idle or
busy) before transmitting data. If it is idle then it sends data, otherwise it waits till the channel becomes idle.
However there is still chance of collision in CSMA due to propagation delay. For example, if station A wants to send
data, it will first sense the medium.If it finds the channel idle, it will start sending data. However, by the time the first
bit of data is transmitted (delayed due to propagation delay) from station A, if station B requests to send data and
senses the medium it will also find it idle and will also send data. This will result in collision of data from station A and
B.

CSMA access modes:


 1-persistent: The node senses the channel, if idle it sends the data, otherwise it continuously keeps on
checking the medium for being idle and transmits unconditionally (with 1 probability) as soon as the channel
gets idle.
 Non-Persistent: The node senses the channel, if idle it sends the data, otherwise it checks the medium after a
random amount of time (not continuously) and transmits when found idle.

5
 P-persistent: The node senses the medium, if idle it sends the data with p probability. If the data is not
transmitted ((1-p) probability) then it waits for some time and checks the medium again, now if it is found idle
then it send with p probability. This repeat continues until the frame is sent. It is used in Wifi and packet radio
systems.
 O-persistent: Superiority of nodes is decided beforehand and transmission occurs in that order. If the medium
is idle, node waits for its time slot to send data.

Section – D

Q13. Write a detailed note on the TCP/IP reference model. Also compare TCP/IP reference model with OSI reference
model.

Answer:

TCP/IP Reference Model is a four-layered suite of communication protocols. It was developed by the DoD (Department
of Defence) in the 1960s. It is named after the two main protocols that are used in the model, namely, TCP and IP. TCP
stands for Transmission Control Protocol and IP stands for Internet Protocol.
The four layers in the TCP/IP protocol suite are:

 Host-to- Network Layer −It is the lowest layer that is concerned with the physical transmission of data. TCP/IP
does not specifically define any protocol here but supports all the standard protocols.
 Internet Layer −It defines the protocols for logical transmission of data over the network. The main protocol in
this layer is Internet Protocol (IP) and it is supported by the protocols ICMP, IGMP, RARP, and ARP.
 Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols defined here are
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
 Application Layer − This is the topmost layer and defines the interface of host programs with the transport layer
services. This layer includes all high-level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.

The following diagram shows the layers and the protocols in each of the layers −

6
Difference between TCP/IP and OSI Model:

TCP/IP OSI

TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.

TCP/IP has 4 layers. OSI has 7 layers.

TCP/IP is more reliable OSI is less reliable

TCP/IP does not have very strict boundaries. OSI has strict boundaries

TCP/IP follow a horizontal approach. OSI follows a vertical approach.

TCP/IP uses both session and presentation layer


in the application layer itself. OSI uses different session and presentation layers.

TCP/IP developed protocols then model. OSI developed model then protocol.

Transport layer in TCP/IP does not provide In OSI model, transport layer provides assurance delivery of
assurance delivery of packets. packets.

TCP/IP model network layer only provides Connection less and connection oriented both services are
connection less services. provided by network layer in OSI model.

Protocols cannot be replaced easily in TCP/IP While in OSI model, Protocols are better covered and is easy to
model. replace with the change in technology.

7
8

You might also like