0% found this document useful (0 votes)
26 views17 pages

DCC Unit1 Solutions

Uploaded by

jeyini6818
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views17 pages

DCC Unit1 Solutions

Uploaded by

jeyini6818
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Chapter-1

2 MARKS

1. Define bit rate and baud rate.

Bit rate refers to the number of bits that are transmitted per
unit of time, usually measured in bits per second (bps).
Baud rate, on the other hand, refers to the number of signal or
symbol changes that occur per second in a communication channel.
It is also known as symbols per second and is typically measured
in baud.

2. Define following term:

i) Protocol: A protocol refers to a set of rules and standards


that govern the exchange of data between devices in a network.
It defines the format, timing, sequencing, and error control of
data transmission.

ii) Bandwidth: Bandwidth refers to the capacity of a


communication channel to transmit data. It is typically measured
in hertz (Hz) and represents the range of frequencies that can
be accommodated for transmitting signals. In networking, it is
often used to describe the data transfer rate or the amount of
data that can be transmitted in a fixed amount of time.

3. Define computer network and state applications of computer


network.
A computer network is a collection of interconnected devices,
such as computers, servers, printers, and other hardware, that
are linked together to facilitate communication and resource
sharing.

Applications of computer networks include:


1. Resource Sharing
2. Communication

4. State need of computer network.

The need for a computer network includes:


1. Resource Sharing: Networks allow multiple users to access
shared resources, such as printers, files, and databases,
leading to efficient resource utilization.
2. Communication: Networks enable seamless communication through
email, instant messaging, video conferencing, and other
collaborative tools, enhancing connectivity and collaboration
among users.

4 MARKS

1. Explain components of data communication with neat diagram.

Components of data communication include:

1. Message: The information or data to be communicated from the


source to the destination.

2. Sender: The device that initiates the communication process


by creating and sending the message.
3. Receiver: The device that receives the message sent by the
sender.

4. Transmission Medium: The physical path through which the


message travels from the sender to the receiver. This can
include wired mediums such as cables or optical fibers, as well
as wireless mediums like radio waves or microwaves.

5. Protocol: The set of rules and conventions that govern the


data communication, including formatting, timing, error
checking, and data representation.

6. Encoder and Decoder: These components are responsible for


encoding the message into a format suitable for transmission and
decoding it at the receiving end.

2. Describe various modes of data communication.

The various modes of data communication include:

1. Simplex Mode: In simplex mode, data travels in only one


direction, from the sender to the receiver. The receiver is only
able to receive data and cannot send any back. An example of
this is a keyboard sending data to a computer.

2. Half-Duplex Mode: In half-duplex mode, data can travel in


both directions, but not simultaneously. The communication can
switch between sending and receiving, but not both at the same
time. Walkie-talkies are an example of devices that use half-
duplex mode.

3. Full-Duplex Mode: In full-duplex mode, data can be


transmitted and received simultaneously. This allows for two-way
communication to occur at the same time, such as in a telephone
conversation.

These modes of data communication provide different capabilities


for transmitting and receiving data, and their use depends on
the specific communication requirements of the devices and
systems involved.

3. Explain with diagram client-server and peer to peer network


architecture.

Client-Server Network Architecture:


In a client-server network architecture, multiple clients (such
as computers, smartphones, or other devices) are connected to a
central server. The server provides resources, such as files,
data, or services, to the clients upon request. The clients
initiate requests for resources, and the server responds to
these requests by providing the requested resources. This
architecture is commonly used in enterprise environments and on
the internet.

Peer-to-Peer Network Architecture:


In a peer-to-peer network architecture, all devices in the
network can act as both clients and servers. Each device can
share its resources directly with other devices in the network
without the need for a central server. This architecture is
often used for file sharing, collaborative applications, and
decentralized systems.

4. Consider a computer with 8 computers; which network


architecture should be used peer to peer or client-server?
Justify your answer.

For a network with 8 computers, the Peer-to-Peer Architecture


would be a good choice as the Client-Server Architecture will be
a potential overkill for a small network with limited resource
sharing and communication needs.
Here's a brief justification for Peer-to-Peer Architecture:

Peer-to-Peer Architecture:
- Justification: In a small network with 8 computers, a peer-to-
peer architecture may be suitable if the primary purpose is
simple file sharing and basic resource access. Each computer can
act as both a client and a server, allowing for decentralized
resource sharing and collaboration.
- Benefits: Easy setup, low cost, and no dependency on a central
server for basic file sharing and communication needs.

5. Draw network architecture for client-server network with one


file server, one print server and 5 client connected to it via
network devices.

6. Compare LAN vs MAN vs WAN on basis of speed, congestion,


maintenance and area coverage.

Aspect LAN (Local MAN WAN (Wide Area


Area Network) (Metropolitan Network)
Area Network)
Speed High Moderate to Moderate to
High Low
Congestion Low Moderate High
Maintenance Relatively Moderate Complex
Easy
Area Coverage Small City-wide Global

7. Compare Analog and Digital signal.

Characteristic Analog Signal Digital Signal


Representation Continuous waveform Discrete
representing representation
using binary digits
Nature Variable and Fixed and discrete
continuous
Quality Prone to distortion Less susceptible to
and noise distortion and
noise
Transmission Susceptible to Resistant to
interference and interference and
attenuation attenuation

Chapter-2

2 MARKS

1. Define guided and unguided transmission media.

Guided transmission media refers to the physical medium through


which the signals are transmitted, and the signals are guided
along a specific path. Examples include twisted-pair cables,
coaxial cables, and fiber-optic cables.

Unguided transmission media, on the other hand, does not have a


specific physical path for the signals and instead transmits
signals through the air or space. Examples include wireless
communication technologies such as Wi-Fi, Bluetooth, and
satellite communication.

2. Compare guided and unguided media.

Characteristic Guided Media Unguided Media


Physical Path Signals are guided Signals are not
along a specific guided along a
path specific path
Examples Twisted-pair Wi-Fi, Bluetooth,
cables, coaxial satellite
cables, fiber-optic communication

3. List four unguided media.

Four examples of unguided media are:

1. Radio waves
2. Microwaves
3. Infrared
4. Satellite communication

4. List types of multiplexing.

The types of multiplexing include:

1. Frequency Division Multiplexing (FDM)


2. Time Division Multiplexing (TDM)
3. Wavelength Division Multiplexing (WDM)
4. Code Division Multiplexing (CDM)

4 MARKS

1. Draw neat diagram of twisted pair cable and state its type.
A twisted pair cable consists of a pair of insulated copper
wires twisted together. This twisting helps to reduce
electromagnetic interference from external sources, making it
suitable for transmitting data signals. Twisted pair cables are
commonly used in Ethernet networks for data transmission.

There are two main types of twisted pair cables:


1. Unshielded Twisted Pair (UTP): This type of cable does not
have additional shielding to protect against interference. It is
commonly used in Ethernet networks for connecting devices within
a building.
2. Shielded Twisted Pair (STP): This type of cable has
additional shielding to provide protection against
electromagnetic interference. It is often used in environments
where there are higher levels of interference, such as
industrial settings.

2. Draw neat sketch of fiber optics cable. Give transmission


characteristics of fiber optics cable. State its applications.

A fiber optics cable consists of one or more transparent fibers


made of glass or plastic, each capable of transmitting messages
modulated onto light waves. These fibers are typically encased
in a protective jacket for strength and durability.

Transmission Characteristics of Fiber Optics Cable:


1. High Bandwidth: Fiber optics cables have a high bandwidth,
allowing for the transmission of large amounts of data at high
speeds.
2. Low Attenuation: These cables exhibit low signal loss over
long distances, making them suitable for long-haul
transmissions.
3. Immunity to Electromagnetic Interference: Fiber optics cables
are not susceptible to electromagnetic interference, providing
secure and reliable data transmission.
4. Lightweight and Compact: Fiber optics cables are lightweight
and take up less space compared to traditional copper cables.

Applications of Fiber Optics Cable:


1. Telecommunications: Used for long-distance communication,
including telephone, internet, and cable television services.
2. Data Networking: Commonly used in local area networks (LANs),
wide area networks (WANs), and data centers for high-speed data
transmission.
3. Medical Imaging: Fiber optics cables are utilized in medical
devices for imaging and endoscopy procedures.
4. Military and Aerospace: These cables are used in military and
aerospace applications due to their secure and reliable data
transmission capabilities.

3. Compare UTP and STP on basis of Noise, Ease of handling, Cost


and Speed.

Characteristic UTP (Unshielded STP (Shielded


Twisted Pair) Twisted Pair)
Noise More susceptible to More resistant to
external external
electromagnetic electromagnetic
interference interference due to
additional
shielding
Ease of Handling Easier to handle Slightly less
and install due to flexible and
flexibility and heavier due to the
lighter weight additional
shielding
Cost Generally lower Higher cost due to
cost due to simpler the added shielding
construction and manufacturing
complexity
Speed Typically used for Can support higher
lower-speed speeds and is
applications such suitable for
as Ethernet environments with
higher interference
levels
4. Explain Satellite Communication.

Satellite communication involves the use of artificial


satellites in orbit around the Earth to transmit and receive
signals for various communication purposes. Here's how it works:

1. Satellite Transponders: Satellites are equipped with


transponders, which receive signals from ground stations,
amplify them, and retransmit them back to Earth over a different
frequency.

2. Ground Stations: Ground stations, also known as Earth


stations or satellite dishes, transmit signals to satellites and
receive signals from them. These ground stations are connected
to terrestrial communication networks.

3. Up-link and Down-link: Communication between ground stations


and satellites occurs via two links: the up-link, where signals
are transmitted from Earth to the satellite, and the down-link,
where signals are received by Earth from the satellite.

4. Geostationary Orbits: Many communication satellites are


placed in geostationary orbits, where they orbit the Earth at
the same speed as the Earth's rotation, making them appear
stationary relative to a fixed point on the Earth's surface.
This allows for continuous communication coverage over a
specific region.

5. Applications: Satellite communication is used for various


purposes, including television broadcasting, internet access,
telecommunication services (e.g., telephone calls), weather
forecasting, navigation systems (e.g., GPS), and remote sensing.
Overall, satellite communication provides global coverage and is
particularly useful in areas where terrestrial infrastructure is
limited or impractical.

5. Explain TDM with the help of diagram.

Time Division Multiplexing (TDM) is a method of transmitting


multiple data streams over a common communication channel by
allocating each stream a unique time slot within a predefined
time frame. Here's a brief explanation:

In TDM, data from different sources is interleaved in a time-


dependent manner. Each data stream is allocated a specific time
slot within a recurring time frame. This allows multiple signals
to be transmitted sequentially over the same communication
channel.

For example, in a TDM system with four input streams, each


stream is assigned a time slot within the overall transmission
frame. The diagram would show the time axis divided into
discrete time slots, with each slot representing the duration
allocated to a specific data stream. The data from each source
is transmitted during its designated time slot, and the process
repeats in a cyclic manner.

This method allows for the efficient sharing of the


communication channel among multiple sources, enabling
simultaneous transmission and reception of data from different
inputs.

6. Define multiplexing? Compare FDM and TDM.

Multiplexing is a technique used in communication systems to


combine multiple signals into a single transmission medium for
efficient data transfer.
Characteristic FDM (Frequency TDM (Time Division
Division Multiplexing)
Multiplexing)
Division Technique Divides the Divides the
available frequency transmission
spectrum into channel into time
multiple frequency slots.
bands.
Bandwidth Each signal is Each signal is
Allocation assigned a separate allocated a
frequency band. specific time slot.
Signal Separation Signals are Signals are
separated based on separated based on
their frequency. time.
Synchronization Requires precise Requires precise
frequency time
synchronization synchronization
between sender and between sender and
receiver. receiver.
Efficiency Less efficient for Efficient for
bursty data as bursty data as time
unused frequency slots can be
bands cannot be dynamically
reclaimed. allocated.
Applications Used in analog Commonly used in
communication digital
systems like radio communication
and television systems like
broadcasting. telecommunication
networks.

7. Explain with neat diagram working of circuit switching?

Circuit switching involves the following key steps:

1. Call Setup: When a user initiates a call, the circuit


switching system establishes a dedicated communication path
between the caller and the recipient. This path is created by
reserving the necessary network resources, including physical
links and switching equipment.

2. Dedicated Connection: Once the call setup is complete, a


dedicated circuit is established between the two parties. This
circuit remains exclusively allocated to the communication
session for its entire duration, regardless of whether data is
being transmitted or not.

3. Data Transfer: During the communication session, data is


transmitted in a continuous stream over the dedicated circuit.
This ensures that the transmitted data arrives at the
destination in the same order it was sent, without being
affected by congestion or contention with other users.

4. Call Termination: When the communication session ends, the


dedicated circuit is released, and the network resources that
were allocated for the call are freed up for use by other users.

8. Compare circuit switched and packet switched network.

Aspect Circuit-Switched Packet-Switched


Network Network
Resource Allocation Dedicated resources Shared resources
reserved for entire allocated
duration of call dynamically for
each packet
Data Transmission Continuous stream Data broken into
of data over packets and
dedicated circuit transmitted
independently
Efficiency Less efficient use More efficient use
of network of network
resources resources
Call Setup Overhead Higher call setup Lower call setup
overhead due to overhead due to
dedicated circuits dynamic resource
allocation

Chapter-3

2 MARKS
1. Enlist types of errors.

There are two main types of errors in data communication:

1. Single-bit errors: These errors occur when only one bit in


the data is altered during transmission.

2. Burst errors: Burst errors happen when multiple bits in a


sequence are corrupted during transmission, often caused by
noise or interference affecting consecutive bits.

2. Compare LRC and VRC.

Aspect LRC (Longitudinal VRC (Vertical


Redundancy Check) Redundancy Check)
Scope Checks for errors Checks for errors
within each in the vertical
character or word direction across a
data matrix
Application Typically used for Typically used for
serial data parallel data
transmission transmission

3. Compare LRC and CRC.

Aspect LRC (Longitudinal CRC (Cyclic


Redundancy Check) Redundancy Check)
Error Detection Detects and Detects a variety
corrects single-bit of errors including
errors within each burst errors and
character or word multiple-bit errors
Complexity Simpler to More complex to
implement and implement and
requires less involves higher
computational computational
overhead overhead

4 MARKS

1. Explain LRC with example.

Longitudinal Redundancy Check (LRC) is an error detection


technique used in data communication. It involves adding a
parity bit to each character or word in the data stream to
detect errors. The parity bit is set so that the total number of
1s in the character, including the parity bit, is even or odd,
depending on the parity scheme used.

For example, let's consider a simple 4-bit LRC scheme. Suppose


we have the following 4-bit data words: 1101, 1010, and 1111.

To calculate the LRC for these data words, we can use even
parity. The LRC for each bit position is calculated by counting
the number of 1s in that position across all the data words and
adding a parity bit to make the total number of 1s even.

For the given data:


1101
1010
1111

We calculate the LRC as follows:


LRC for bit 1: 1+1+1 = 3 (odd, so we add a 1 as the parity bit)
LRC for bit 2: 1+0+1 = 2 (even, so we add a 0 as the parity bit)
LRC for bit 3: 0+1+1 = 2 (even, so we add a 0 as the parity bit)
LRC for bit 4: 1+0+1 = 2 (even, so we add a 0 as the parity bit)
So, the LRC for the given data words is 1000.

During transmission, the LRC is recalculated at the receiving


end, and if the recalculated LRC does not match the received
LRC, an error is detected.

2. Explain working of CRC with example.

Cyclic Redundancy Check (CRC) is an error detection technique


used in data communication. It involves generating a fixed-size
check value (the CRC) based on the data to be transmitted. The
CRC is appended to the data and sent along with it. At the
receiving end, the CRC is recalculated, and if the recalculated
CRC does not match the received CRC, an error is detected.

Here's an example of how CRC works using a simple 3-bit CRC


calculation:

Suppose we want to transmit the 4-bit data 1101. We can use a 3-


bit CRC to generate a check value.

1. The data word is left-shifted by the number of bits in the


CRC (3 bits in this case), and zeros are added to the right. So,
1101 becomes 1101000.

2. A divisor, known as the generator polynomial, is chosen.


Let's use the 3-bit polynomial 101.

3. The CRC is calculated by performing a bitwise XOR operation


between the left-shifted data word and the generator polynomial.
The remainder of this division is the CRC.

1101000 (data word)


XOR 101 (generator polynomial)
---------------
011 (CRC)

4. The CRC (011) is appended to the original data, so the


transmitted 7-bit sequence becomes 1101011.

At the receiving end, the received 7-bit sequence is divided by


the same generator polynomial. If the remainder is zero, no
error is detected. If the remainder is non-zero, an error is
detected.

This is a simplified example, but in practical applications,


longer CRCs and more complex generator polynomials are used to
provide stronger error detection capabilities.

You might also like