0% found this document useful (0 votes)
24 views4 pages

"The Processes P1 and P3 Need To Send Requests To The Corresponding Server Process Running

Uploaded by

Anjali Tibe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views4 pages

"The Processes P1 and P3 Need To Send Requests To The Corresponding Server Process Running

Uploaded by

Anjali Tibe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Q3) Attempt any TWO of thefollowing (Out of THREE).

(2 x4= 8]
a) Explain Multiplexing &Demultiplexing in transport Layer.
"Multiplexing and demultiplexing are the two very important services that are performed by the
transport layer.

"The transport layer at the source performs multiplexing while the transport layer at the
destination performs demultiplexing as shown in Fig. 4.7.
"Whenever an entity accepts items from more than one source, it is referred to as multiplexing
(many to one); whenever an entity delivers items to more than one source, it is referred to as
demultiplexing (one to many).
" Fig. 4.7 shows communication between a client and two servers. Three client processes are
running at the client site namely, P1, P2, and P3.
"The processes P1 and P3 need to send requests to the corresponding server process running
in a server.
" The client process P2 needs to send a request to the corresponding sever process running at
another server.
" The transport layer at the client site accepts three messages from the three processes and
creates three packets. It acts as a multiplexer.
" The packets 1 and 3 use the same logical channel to reach the transport layer of the first
server.
"When they arrive at the server, the transport layer does the job of a multiplexer and distributes
the messages to two different processes.
"The transport layer at the second server receives packet 2 and delivers it to the corresponding
process.

b) What is Taxonomy for Media Access ProtocolI?


" Media access methods are implemented at the data-link layer. When nodes are connected and
use a common link known as multipoint link or broadcast link, we need a multiple access
protocol to coordinate access to the link.
"A channel access method or multiple access method allows more than two terminals
connected to the same transmission medium to transmit over it and to share its capacity.
" Number of protocols have been divided to handle access to a shared link and categories into
three groups as shown in Fig. 2.13.
Multiple- access
Protocols

Random Access Controlled Access Channelization


Protocols Protocols Protocols

ALOHA Reservation FDMA

4cSMA Polling TDMA

CSMAICD Token Passing CDMA

CSMACA

Fig. 2.13: Taxonomy of Multiple Access Protocols


"Protocols belonging to each group are shown in the Fig. 2.13.
1. Random Access Protocols: In these types of protocols any station can transmit at any time.
Use of the channel is not controlled by any station.
2. Controlled Access Protocols: In controlled access some sort of mechanism is used to decide
which station can transmit.
3. Channelization: In channelization, the available channel bandwidth is shared either in
frequency, time or code.

c) Which are the methods of framing.


There are several methods of framing used in data communication to delineate the boundaries
of data frames within a stream of transmitted bits:

1. **Byte-oriented framing**: Frames are delimited by specific byte values, often using a
start-of-frame (SOF) and end-of-frame (EOF) byte sequence. Common in protocols like HDLC
(High-Level Data Link Control).

2. **Character-oriented framing**: Frames are delimited by specific characters, such as carriage


return (CR) or line feed (LF) characters. Used in protocols like ASCII-based serial
Communication.

3. **Bit-oriented framing**: Frames are delineated by special bit patterns, typically used in
synchronous communication where byte boundaries are not explicitly defined.

4. ""Flag byte framing**: Aflag byte or sequence of bytes (e.g., "01111110" in HDLC) is used to
mark the start and end of frames.

5. **Length count framing**: Frames are prefixed with a field indicating the length of the frame,
allowing the receiver to determine the frame boundaries based on the length field.

Each framing method has its advantages and is chosen based on factors such as efficiency,
ease of implementation, and compatibility with existing systems.

Q4) Attempt any TWO of the following (Out of THREE). (2 x4 = 8]


a) Write note on Circuit Switching.
"Circuit switching takes place at the physical layer of the TCP/IP reference model. Circuit
switched networks consist of a set of switches connected by physical links.
"In a circuit switched network, two nodes communicate with each other over a dedicated
communication path.
"Circuit switching is commonly used technique in telephony, where the caler sendsaspecial
message with the address of the callee (i.e. by dialing a number) to state its destination.
Fig. 2.38 shows the concept of circuit switching. In Fig. 2.38, six different rectangles are
shown. Each rectangle represents a carrier switching office (end office, toll office etc.).
As an example, we have shown every office has three incoming and three outgoing lines.
"When a call passes through a switching office, a physical conceptual temporary connection is
established between the line on which the call came in and one of the output lines, as shown by
dotted lines.

"Once a call has been set up, a dedicated path between both ends exists and will continue to
exist until the call is finished.

Switching offices

Physical copper connection


set up when cal is made

Fig. 2.38: Circuit Switching


b) For the given IP address 205.16.37.39/28 in some block of address, Calculate :
i) Address Mask
i) First Address of block
ii) Last address of block
iv) Number of addresses in the block

c) Write note on UDP


" The User Datagram Protocol (UDP) is the simplest Transport Layer communication protocol in
the TCPIP protocol suite and serves intermediary between the application programs and
the network operations.
" The UDP was designed by David P. Reed in 1980 and formally defined in RFC 768 standard.
"UDP is a connectionless, unreliable Transport Layer protocol.
" UDP does not add anything to the services of IP except to provide process-to-process
communication instead of host-to-host communication. Also, it performs very limited error
checking.
" UDP is powerless protocol. But it is a very simple protocol, using minimum overhead. If a
process wants to send a small message and does not care much about reliability, it can use
UDP.
" UDP is stateless protocol. It is a suitable protocol for streaming applications such as VolP,
multimedia streaming.

Q5) Attempt any ONE of the following (Out of TWO). [1 x 3=3]


a) What is BSS &ESS? Explain in detal.
1. Basic Service Set (BSS):
"BSS is a building block fora Wireless LAN. A BSS is made up of stationary or mobile wireless
station and an optional central base station, known as Access Point (AP).
" The BSS without an AP is a stand-alone network and called as ad hoc architecture. Such
types of networks cannot send data to other BSSs.

Stations can form a network without the need of AP. Stations can locate one another and
agree to be part of a BSS.
"A BSS with an AP is called an infrastructure network. All stations in such architecture are
communicating through an AP.
BSS: Basic Service Set
APiACCess Point

Station Station Station Station

AP

Station Staion Stabon Station

Ad hoc network (BSS without an AP) Infrastructure (8SS with an AP)

is, 2.63: Two Sets of IEEE 802.11 Standard

2. Extended Service Set (ESS):


"An extended service set is made up of two or more BSSs with APs.
" The BSSs are connected througha distribution system, which is a wired LAN., The distribution
system connects the APs in the BSSs.
"ESS uses two types of stations, i.e., mobile and stationary stations. The mobile stations are
the normal stations in the BSS. The stationary stations are AP stations that are part of a wired
LAN.
"Communication between two stations from two different BSSs take place via., two APs. But
when stations are within reach of one another, they can communicate directly, without the use of
AP.

Distnbuton system

Cate

B5 BSS

Fig 2.64 Extended Servdce Set (ESS)


b) Explain TCP/IP Model in detail.
"TCP/IP stands for Transmission Control Protoco/intermet Protocol. The TCP/IP model was
developed by the U.S. Department of Defense (DoD) to connect multiple networks and preserve
data integrity.
"The TCP/IP is the conceptual model and set of communications protocols used on the Internet
and similar computer networks.
" The TCPIP protocol suite establishes the technical foundation of the Internet. TCPIP protocol
suite als0 called the Internet protocol suite.
"The TCPIP is a protocol suite (a set of protocols organized in different layers) used in the
Internet today. It is a hierarchical protocol made up of interactive modules, each of which
provides a specific functionality.
"The term hierarchical means that each upper level protocol is supported by the services
provided by one or more lower level protocols.
"The original TCPIIP protocol suite was defined as four software layers built upon the hardware.
Today, however, TCPIP is thought of as a five-layer model as shown in Fig. 1.47.
Application Application Layer 5

Transport Transport Layer 4

Internet Network Layer 3

Network Interface Data link Layer 2

Hardware Devices Physical Layer 1

(a) Original Layers (four) (b) Layers (five)


Fig. 1.47: Layers in the TCP/P Protocol Suite

You might also like