0% found this document useful (0 votes)
55 views10 pages

DCC PIP On Chapter 3

The document contains questions from a chapter on data communication and networking. It includes 10 multiple choice questions related to topics like IEEE 802 standards, error types, wireless network topologies, CRC calculations, mobile generations, and comparisons of error detection techniques. The document also includes the marking scheme and answers for the questions.

Uploaded by

seemakasture75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views10 pages

DCC PIP On Chapter 3

The document contains questions from a chapter on data communication and networking. It includes 10 multiple choice questions related to topics like IEEE 802 standards, error types, wireless network topologies, CRC calculations, mobile generations, and comparisons of error detection techniques. The document also includes the marking scheme and answers for the questions.

Uploaded by

seemakasture75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

JAYAWANT SHIKSHAN PRASARAK MANDAL’s

Bhivrabai Sawant Polytechnic


(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai)
Gat No. 720 (1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 65335100 Tele fax: - + 91-020-65335100
E-mail: [email protected] Website: www.jspm.edu.in

Computer Engineering Department


Academic Year 2023-2024
PIP Questions on Chapter 3
Course: Data Communication & Networking Course Code: 22414
Semester: IV
Que. Bloom’s Marks Assignment Questions Relevance
No. Level to CO
1 R 2 List IEEE 802 X standards for networks
2 R 2 State types of Errors

3 U 4 Describe various IEEE standards for network topologies.


4 U 6 A system uses CRC on a block of 8 bytes. How many redundant bits are sent per block? What is
the ratio of useful bits to total bits?
COI403.3
5 U 2 Classify mobile generations.
6 U 2 Compare LRC and CRC (Any two points each)

7 U 4 Explain wireless LAN 802.11 architecture.


8 R 6 Describe wireless infrastructure components in detail.
9 A 4 Explain various IEEE communication standards.
10 U 6 Describe Bluetooth architecture technologies.

Sign of Course Coordinator Sign of Module Coordinator Sign of H.O.D.


JAYAWANT SHIKSHAN PRASARAK MANDAL’s

Bhivrabai Sawant Polytechnic


(Approved by AICTE, New Delhi, Govt. of Maharashtra, Affiliated to MSBTE Mumbai)
Gat No. 720 (1&2), Wagholi, Pune-Nagar Road, Pune-412207)
Phone: 020 – 65335100 Tele fax: - + 91-020-65335100
E-mail: [email protected] Website: www.jspm.edu.in

Computer Engineering Department


Academic Year 2021-2022
PIP Chapter 3 Solution
Course: Data Communication & Networking Course Code: 22414 Semester: IV

Que. Bloom’s Relevance


Marks Assignment Questions
No. Level to CO
1 R 2 List IEEE 802 X standards for networks

Marking Scheme 1/2 M each


1. 802.3: Ethernet

2. 802.4:Token Bus
Answer
3. 802.5:Token Ring
COI403.3
4.802.11:Wi Fi(Wireless Fidelity)
2 R 2 State types of Errors
Marking Scheme 1 M for 1 each
1.Bit Error
Answer 2.Burst Error

3 U 4 Describe various IEEE standards for network topologies.


Marking Scheme 1 Mark for 1 standard each
A set of network standards developed by the IEEE. They include:

 IEEE 802.1: Standards related to network management.


 IEEE 802.2: General standard for the data link layer in the OSI Reference Model. The
IEEE divides this layer into two sublayers -- the logical link control (LLC) layer and the
media access control (MAC) layer. The MAC layer varies for different network types and
is defined by standards IEEE
802.3 through IEEE 802.5.
Answer  IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the
basis of the Ethernet standard.
 EEE 802.4: Defines the MAC layer for bus networks that use a token- passing mechanism
(token bus networks).
 IEEE 802.5: Defines the MAC layer for token-ring networks.
 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
IEEE 802.11 Wireless Network Standards: 802.11 is the collection of standards setup for
wireless networking.

4 U 6 A system uses CRC on a block of 8 bytes. How many redundant bits are sent per block?
What is the ratio of useful bits to total bits?
Marking Scheme Description 6 M The student may assume a polynomial or a divisor and do the problem
Answer CRC is one of the most common and powerful error detecting code which can be describe as
follows. The polynomial code also known as CRC with co-efficient of 0s and 1s. In this method
the sender and receiver must agree upon generator polynomial g(x) in advance. Both the high and
low order bits of the generator (divisor) must be 1. To compute the checksum for some frame
(data) with m bits, the frame must be longer than generator polynomial. The idea is to
append
checksum to the end of frame in such a way that the polynomial represented by the checksum
frame is divisible by g(x). When the receiver gets the checksum frame it
tries dividing it by g(x). If there is remainder there has been a transmission error and zero
remainder means no error in the transmission. r is degree of g(x) polynomial.
Step by step procedure:
1. Append a string of r zero bits to the lower order end of data word(m) where r is less than the
number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
= 4 zeros. Now data word contains m+r bits
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 division
3. The remainder obtained after division is the r bit CRC.
4. This CRC will replace the r zeros appended to the data unit to get the code word to be
transmitted.

NOTE: The polynomial code for calculation of redundant bits is not given .hence the data given is
insufficient for calculating redundant bits and the ratio of useful bits to total bits.
5 U 2 Classify mobile generations.
Marking Scheme All generations to be mentioned- 2M
First Generation (1G)
Second Generation (2G)
Answer Third Generation (3G)
Fourth Generation (4G)
Fifth Generation (5G)
6 U 2 Compare LRC and CRC (Any two points each)

Marking Scheme 2 M for any relevant 2 points

LRC VRC
Longitudinal Redundancy Check (LRC)is a Cyclic Redundancy Check (CRC) is one of the most
method in which a block of bits is organized common and powerful error detecting codes in
in table(rows and columns)calculate the which a sequence of redundant bits, called the
parity bit for each column and the set of this CRC is appended to the end of the unit so that the
parity bit is also sending with original data. resulting data unit become exactly divisible by a
Answer From the block of parity we can check the second, predetermined binary number
redundancy
LRC of n bits can easily detect CRC is more powerful than LRC & VRC
A longitudinal redundancy check (LRC) is CRC is based on binary division.
an error-
detection method based on binary addition

7 U 4 Explain wireless LAN 802.11 architecture.


BSS diagram 1M,Explanation 1M, ESS diagram 1M,Explanation 1M
Marking Scheme
Wireless LAN 802.11:

Answer The IEEE 802.11 standard defines the physical layer and media access control (MAC) layer for a
wireless local area network. Wireless LANs transmit and receive data over the atmosphere, using
radio frequency (RF) or infrared optical technology, thereby; eliminating the need for fixed wired
connections.
802.11 Architecture:
The 802.11architecture defines two types of services:

1. Basic services set (BSS)


2. Extended Service Set (ESS)

1. Basic Services Set (BSS)

• The basic services set contain stationary or mobile wireless stations and a Central base station
called access point (AP).
• The use of access point is optional.
• If the access point is not present, it is known as stand-alone network. Such a BSS cannot send
data to other BSSs. This type of architecture is known as adhoc architecture.
• The BSS in which an access point is present is known as an infrastructure network.

2. Extend Service Set (ESS)

An extended service set is created by joining two or more basic service sets (BSS)
Having access points (APs).
These extended networks are created by joining the access points of basic services sets through a
wired LAN known as distribution system.
There are two types of stations in ESS:

(i) Mobile stations: These are normal stations inside a BSS.


(ii) Stationary stations: These are AP stations that are part of a wired LAN.

8 R 4 Describe wireless infrastructure components in detail.


Marking Scheme
Wireless Network Infrastructures
The infrastructure of a wireless network interconnects wireless users and end systems. The
infrastructure might consist of base stations, access controllers, application connectivity software,
and a distribution system. These components enhance wireless communications and fulfill
important functions necessary for specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the wireless
communications signals traveling through the air medium to a wired network? Often referred to
as a distribution system. Therefore, a base station enables users to access a wide range of
network services, such as web browsing, e-mail access, and database applications. A base station
often contains a wireless NIC that implements the same technology in operation by the user's
wireless NIC.
Residential gateways and routers are more advanced forms of base stations that enable additional
network functions.
As show in Figure a base station might support point-to-point or point-to- multipoint
communications.

Base Stations Support Different Configurations

Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming mechanisms in
wireless network standards, companies offer access-control solutions to strengthen wireless
systems. The key component to these solutions is an access controller, which is typically
hardware that resides on the wired portion of the network between the access points and the
protected side of the network. Access controllers provide centralized intelligence behind the
access points to regulate traffic between the open wireless network and important resources. In
some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it takes is a browser
and e-mail software on the client device. Users might lose a wireless connection from time to
time, but the protocols in use for these relatively simple applications are resilient under most
conditions.
Special application connectivity software is necessary as an interface between a user's computer
device and the end system hosting the application's software or database.

Distribution System
A wireless network is seldom entirely free of wires. The distribution system, which often
includes wiring, is generally necessary to tie together the access points, access controllers, and
servers. In most cases, the common Ethernet
comprises the distribution system.

9 A 4 Explain various IEEE communication standards.


Marking Scheme 1 M for 1 standard each

A set of network standards developed by the IEEE. They include:

 IEEE 802.1: Standards related to network management.


 IEEE 802.2: General standard for the data link layer in the OSI Reference Model. The
IEEE divides this layer into two sublayers -- the logical link control (LLC) layer and the
media access control (MAC) layer. The MAC layer varies for different network types and
is defined by standards IEEE 802.3 through IEEE 802.5.
 IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD. This is the
basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a token passing mechanism (token
Answer bus networks).
 IEEE 802.5: Defines the MAC layer for token-ring networks.
 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
IEEE 802.11 Wireless Network Standards: 802.11 is the collection of standards setup for
wireless networking.

10 U 6 Describe Bluetooth architecture technologies.


Piconet 3M (1M diagram, 2M for explanation);
Marking Scheme Scatternet- 3M(1Mdiagram, 2M for explanation

Answer Bluetooth Architecture


Bluetooth architecture defines two types of networks:
1. Piconet
2. Scatternet
1. Piconet
• Piconet is a Bluetooth network that consists of one primary (master) node and seven active
secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within
the distance of 10 meters.
There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be one-to-one or one-to-many.

• All communication is between master and a slave. Salve-slave communication is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked nodes. These
parked nodes are secondary or slave stations and cannot take part in communication until it is
moved from parked state to active state.
2. Scatternet
• Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master. This node is also called bridge
slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets.

You might also like