Data Transmission and Communications Networks Questionnaire
Data Transmission and Communications Networks Questionnaire
Data Transmission and Communications Networks Questionnaire
ENCHARGED JOB
PRESENTED BY:
PUNO – PERU
YEAR 2018 - II
PRACTICAL MATERIAL: Chapter 2 (BASIC CONCEPTS)
Review questions:
MESH: It guarantees that each connection should only carry the data
load of the connected devices, another the mesh topology is robust (if a
link fails, it does not disable the entire system), it also has privacy or
security and finally allows us to find errors more easily.
TREE: Its advantages are generally the same as the star one and it
allows the connection of more devices due to the same fact that it uses
secondary concentrators.
BUS: Simple installation, use of less cable than a mesh or star or tree.
10. Give a formula that indicates the number of cables required for a mesh
network topology.
n(n-1) /2, where n is the number of devices.
12. For a network with n devices, what is the number of cable links required for
a mesh, ring, bus, and star topology?
Mesh: n(n-1)/2
Ring: # devices = # links
Bus: n devices = n+1 links
Star: the hub must have n ports for n devices.
13. What is the difference between a central hub and a secondary hub? What is
the difference between an active hub and a passive hub? How are these two
classes interrelated?
Central hub = active hub.
Secondary hub = active/passive hub.
Active concentrator: contains a repeater, that is, a hardware device that
regenerates the received bit patterns before retransmitting them, thus
amplifying the power and increasing the distance the signal travels.
Passive Hub: Provides only a physical connection between connected
devices.
14. What is the factor that limits the size of a bus network topology? Include
reasoning about connectors in your answer.
15. For each type of network topology, indicate the implications of a single cable
failure.
to. mesh
b. star
c. bus
d. ring
to. simplex
b. half duplex
c. full-duplex
d. automatic
20. In a network with 25 computers, which topology would require the most
extensive cabling?
to. mesh
b. star
c. bus
d. ring
to. mesh
b. star
c. bus
d. ring
to. simplex
b. half duplex
c. full duplex
d. automatic
23. In a topology in……, there are n devices in the network, each device has n-
I ports for cables.
to. mesh
b. star
c. bus
d. ring
25. In a connection__, more than two devices can share a single link.
to. simplex
b. half duplex
c. full duplex
d. semisimplex
to. LAN
b. MAN
c. WAN
d. None of the above
28. BAF Plumbers has a network made up of two workstations and a printer.
This network is probably a__.
to. LAN
b. MAN
c. WAN
d. None of the above
to. mesh
b. ring
c. star
d. None of the above
30. On a link __the only existing traffic is between the two connected devices.
to. secondary
b. primary
c. dedicated
d. None of the above
31. In a mesh topology, the relationship between one device and another is__.
to. mesh
b. tree
c. bus
d. star
34. Security and privacy are not an important issue for devices connected in a
__ topology.
to. mesh
b. tree
c. bus
d. star
EXERCISES:
35. Suppose there are six devices connected with a mesh topology. How many
cables are necessary? How many ports are needed for each device?
42. For each of the following four networks, indicate the consequences of a
connection failure:
to. Five devices connected in a mesh topology: If one connection fails, the other
connections will continue to work.
b. Five devices connected in a star topology (not counting the hub): The other
devices will still be able to send data through the hub; but there will be no
access to the device that has the connection down to the hub.
c. Five devices connected in a bus topology : All transmissions stop if the fault
is on the bus. If the connection line is the one that fails, only the corresponding
device cannot operate.
d. Five devices connected in a ring topology: Connection failure can disable the
entire network unless it is a dual ring or there is a bypass mechanism (switch
capable of bypassing the break).
43. Draw a hybrid topology with a star backbone topology and three ring
networks.
44. Draw a hybrid topology with a ring trunk and two bus networks.
45. Draw a hybrid topology with a bus trunk connecting two trunks in a ring.
Each ring trunk connects three star networks.
46. Draw a hybrid topology with a star trunk connecting two trunk buses. Each
backbone bus connects three ring networks.
47. A network contains four computers. If there are only four pieces of cable in
this network, what topology is used?
A star topology is being used.
48. Relate the following concepts to a network topology (each can be applied to
more than one topology):
49. Suppose two new devices are added to an existing network that has five
devices. If you have a fully connected mesh topology, how many new cable
lines will be necessary? However, if the devices are placed in a ring, how many
cable lines will be necessary?
Number of links= n(n-1) /2=2(2-1) /2= (2*1) /2=1 Link (Mesh Type)
2 Cable lines (Ring Type).
51. When someone makes a local telephone call to another person, are they
using a point-to-point or multipoint line configuration? Explain your answer.
to. A discussion between Lucia and Desi: Full – duplex, since messages are
being sent and received at the same time between sender and receiver.
and. A reversible train line : Half-duplex, as long as the information goes in one
direction, no more can be sent until it reaches its recipient.
3. What is the difference between network level delivery and support level
delivery?
The network layer is responsible for the delivery of packets from source to
destination over multiple network links.
Level 1: Physical
Level 2: Data Link
Level 3: Network
Level 4: Transportation
Level 5: Session
Level 6: Presentation
Level 7: Application
7. How does information get from one OSI level to the next?
Within a machine, each level calls the services of the level just below it. For
example, level 3 uses the services provided by level 2 and provides services to
level 4. Between machines, level x of one machine communicates with level x of
the other. Communication is governed by a series of agreed upon rules and
conventions called protocols.
8. What are headers and tails and how are they added and removed?
The header and tail are control data added to the beginning or end of a data
packet.
Headers are added to data at levels 6, 5, 4, 3, and 2. Queues are usually added
Only at level 2. The headers and queues associated with it at the corresponding
sending levels are removed and the appropriate actions at that level are taken.
The physical, data link, and network levels are the network support levels.
The session, presentation, and application levels are the user support levels
The physical layer coordinates the functions necessary to transmit the flow of
data through a physical medium. Deals with the electrical and mechanical
specifications of the interface and transmission medium.
The physical level is related to the following:
Dithering
Physical addressing
Flow control
Error control
Access control
The network layer is responsible for the delivery of a packet from source to
destination and possibly across multiple networks (links). While the data link
layer oversees packet delivery between two systems on the same network
(links), the network layer ensures that each packet goes from source to
destination, whatever they may be.
Logical addressing
Routing
14. The transport layer creates a connection between the source and destination.
What are the three events involved in the connection?
The services provided by the first three levels (physical, data link and networks)
are not sufficient for some processes. The session level is the network dialogue
controller.
Establishes, maintains and synchronizes the interaction between
communication systems.
Dialog control
Synchronization
Dialog control. The session level allows two systems to establish a dialogue.
It allows communication between two processes to take place in half-duplex
mode (one direction at a time) or full-duplex (both directions at the same time).
For example, the dialogue between a terminal connected to a computer can be
half-duplex.
The presentation level is related to the syntax and semantics of the information
exchanged between two systems.
Translation
Encryption
Comprehension
21. How do the levels of the TCP/IP protocol family relate to the levels of the OSI
model?
TCP/IP, a five-level protocol family developed before the OSI model, is the
protocol family used on the Internet.
22. The ___ model shows how a computer's network functions should be
organized.
to. ITU·T
b. OR IF
c. ISO
d. ANSI
to. three
b. five
and. seven
d. eight
24. The ___ level decides the location of the synchronization points.
to. transportation
b. session
c. presentation
d. application
25. End-to-end delivery of the entire message is the responsibility of the _____
level.
to. grid
b. transport
c. session
d. presentation
26. The ___ level is the level closest to the transmission medium.
to. physical
b. data link
and. network
d. transport
27. At the____ level, the data unit is called a frame.
to. physical
b. dalos link
c. grid
d. transport
28. Data decryption and encryption are the responsibility of the___ level.
to. physical
b. dalos link
c. presentation
d. session
29. Dialogue control is a function of the____ level.
to. transport
b. session
c. presentation
d. application
30. Mail and directory services are available to network users through the____
level.
to. Physical
b. data link
c. transport
d. grid
32. As data packets move from lower to higher levels, the headers are ____.
to. added
b. deleted
c. relocated
d. modified
33. As data packets move from higher to lower levels, the headers are ____.
to. added
b. deleted
c. relocated
d. modified
34. The ____ level is between the network level and the session level.
to. physical
b. data link
c. transport
d. presentation
35. "Level 2 is between the physical level and the _____ level."
to. grid
b. data link
c. transport
d. presentation
36. When data is transmitted from device A to device B, the level 5 header of A is
read by the level ____ header of B.
to. physical
b. transport
c. session
d. presentation
37. At the____ level, translations from one character code to another occur.
to. transport
b. session
c. presentation
d. application
to. physical
b. data link
c. transport
d. presentation
39. The ____ level can use the frame header for error detection.
to. physical
b. data link
c. transport
d. presentation
40. Why was the OSI model developed?
to. programs
b. dialogues
c. protocols
d. bits
42. What level functions constitute a link between the user support levels and the
network support levels?