Syllx Akash CN
Syllx Akash CN
COMPUTER NETWORKS
(CIC-307)/(CIC-313)
Applicable from Batch admitted in Academic
Session 2021-22 Onwards
UNIT I
UNIT II
Data Link Layer: Design issues, Data Link Control and Protocols: Flow and Error
Control, Stop-and-wait ARQ. Sliding window protocol, Go-Back-N ARQ, Selective
Repeat ARQ, HDLG, Point-to —Point Access: PPP Point -to- Point Protocol, PPP Stack,
UNIT III
ICMPV6.
UNIT IV
Transport Layer: Process to Process Delivery: UDP; TCP, congestion control and
Quality of service. Application Layer: Client Server Model, Socket Interface,
Domain
Name System (DNS): Electronic Mail (SMTP), file transfer (FTP), HTTP and WWW.
SYLLABUS
DATA COMMUNICATION & NETWORKING
(ECC-311)
Applicable from Batch Admitted in Academic Session 2021-22 onwards
UNIT I
UNIT H
Data Link Layer: Design issues, D2! \Link Contre] and Protocols Flow end Error
Control, Step-and wait ARQ STidicz »=indow protcce!l, Go-Back-N ARQ. Selective
Repeat ARQ, HDLC, Point to 2Poir:t Aetess: PPP Point —to Point Protece!, PPP Stack.
Medium Access Sub layer: Channe! allocaticn problem. Controlle! Access,
Channebzation/multi ple acrets protecsis, IEEE standard 892 3 & 80? 11 for LANS and
WLAN, high-speed LANs, Token ring. Taken Bus, FDD! based LAN. Network Devices-
repeaters, hubs switches tidges. . (No. of Hours: 11]
UNTT Ul
Network Layer: Design issues, Routing algonthms Cergestion contre] algorithms,
Host to Host Delivery: Internetworking. addreserng arid routing, IP addressing
‘class
full & Classlessi, Subnet, Network Leyer Protocols’ ARP, IPV4, ICMP, IPV6 ad
ICMPV6. {No. of Hours: 11]
UNIT IV
Transport Layer: Process to Process Delivery. UDP; TCP. congestion contre) and
Quality of service.
Application Layer: Client Server Mode!, Socket Interface, Domain Name Syatem
(DNS? Electronic Mail (SMTP), file transfer (FTP), HTTP and WWW.
No. of Hours: 11]
SYLLABUS (2016-17)
-— * aaiieticesdiilinenetiiee es
1. Question No. 1 should be compulsory and cower the entire eyllabus. Thus question
should
have objective or short anawert type questions, It should be of 25 marks.
2. Apart from Question No. 1, rest of the paper shall consists of four units as per
the eyllabus.
Every unit should have two question. However, student may be asked to attempt only
1
question from each unst, Bach question should be of 12.6 marks.
UNIT-I
UNIT-II
Data Link Layer: Design issuee, Data Link Control and Protocols: Flow and Error
Conuol, Stop and-wait ARQ. Sliding window protocol, Go-Back-N ARQ, Selective Repeat
ARQ. HDLC. Point-to-Point Access: PPP Point-to-Point Protocol, PPP Stack.
UNIT-HI
full & Claseless), Subnet, Network Jayer Protocols: ARP, I?’V4, ICMP, IPVG ad
ICMPV6.
{T1, T2, Ri} (No. of Hours: 11)
UNIT-IV
Transport Layer: Process to Procesa Delivery: UDP; TCP, congestion control and
Quality
of service
Application Layer: Client Server Model, Socket Interface, Domain Name System (DNS):
Electronic Mail (SMTP), file transfer (FTP), HTTP and WWW.
(T2, T1, Ri, R4) (No. of Hours: 11)
As per the New Syllabus 2021-22 onwards
(CIC -309)(ECC-311)\/(CIC-313)
UNIT - 1
Q. Refer to Q.3 (a) First Term Examination 2017 (Pg. No. 3-2017).
Q. Refer to Q.4 (a) (c) (e) First Term Examination 2017 (Pg. No. 4,5-2017).
Q. Refer to Q.1 (d) (e) (f) (g) End Term Examination 2017 (Pg. No. 89-2017).
Q. Refer to Q.5 (b) End Term Examination 2017 (Pg. No. 14-2017).
Q. Refer to Q.4 (a) (b) End Term Examination 2017 (Pg. No. 15, 16-2017).
Q. Refer to Q5 (a) End Term Examination 2017 (Pg. No. 17-2017).
Q. Refer to Q.1 (c) (d) (e) First Term Examination 2018 (Pg. No. 3-2018)
Q. Refer to Q.2 (b) (c) First Term Examination 2018 (Pg. No. 6,7-2018).
Q. Refer to Q.4 (a) (b) (c) First Term Examination 2018 (Pg. No. 9,11-2018).
Q. Refer to Q.1 (d) (e) (g) End Term Examination 2018 (Pg. No. 14,15-2018).
Q. Refer to Q.2 (a) (b) End Term Examination 2018 (Pg. No. 16,17-2018).
Q. Refer to Q.3 (b) End Term Examination 2018 (Pg. No. 21-2018).
Q. Refer to Q.4 (a),(b) End Term Examination 2018 (Pg. No. 21,22-2018).
Q. Refer to Q.1 (a), (b), (g) First Term Examination 2019 (Pg. No. 1,2-2019).
Q. Refer to Q.2. First Term Examination 2019 (Pg. No. 2-2019).
Q. Refer to Q.3 (c) First Term Examination 2019 (Pg. No. 5-2019).
Q. Refer to Q.4 (a),(b), (c) First Term Examination 2019 (Pg. No. 5-2019).
Q. Refer to Q.1 (c),(d), (e), (g), G) End Term Exam 2019 (Pg. No. 7,8,9-2019).
Q. Refer to Q.3 (b) End Term Examination.2019 (Pg. No. 11-2019).
Q. Refer to Q.4.(a), (b) End Term Examination 2019 (Pg. No. 12-2019).
Q. Refer to Q.5 (a),(b) End Term Examination 2019 (Pg. No. 13,14-2019).
Q. Refer to Q.7 (a) End Term Examination 2019 (Pg. No. 19-2019).
UNIT - Il
Q. Refer to Q.1 Few Important Question (Pg. No.1).
Q. Refer to Q.1 (b),(c), (e) Second Term Examination 2016 (Pg. No. 7-2016).
Q. Refer to Q.2 (b) Second Term Examination 2016 (Pg. No. 9-2016).
Q. Refer to Q.3 (a), (b) Second Term Examination 2016 (Pg. No. 10,11-2016).
Q. Refer to Q.4 (i),(ii) Second Term Examination 2016 (Pg. No. 11-2016).
Q. Refer to Q.1 (g) End Term Examination 2016 (Pg. No. 14-2016).
Q. Refer to Q.6 (a), (b) End Term Examination 2016 (Pg. No. ,27,28-2016).
Q. Refer to Q.7 (a) End Term Examination 2016 (Pg. No. 29-2016).
Q. Refer to Q.8 (b) End Term Examination 2016 (Pg. No. 30-2016).
Q. Refer to Q.1 (b) End Term Examination 2017 (Pg. No. 8-2017).
Q. Refer to Q.1 (j) End Term Examination 2017 (Pg. No. 11-2017).
Q. Refer to Q.6 (a),(b) End Term Examination 2017 (Pg. No. 19-2017).
Q. Refer to Q.7 (a),(b) End Term Examination 2017 (Pg. No. 19,20-2017).
Q. Refer to Q.8 (b) End Term Examination 2017 (Pg. No. 22-2017).
Q. Refer to Q.9 (a) End Term Examination 2017 (Pg. No. 22-2017).
Q. Refer to Q.1 (c) End Term Examination 2018 (Pg. No. 13-2018).
Q. Refer to Q.5 (a),(b) End Term Examination 2018 (Pg. No. 22,25-2018).
Q. Refer to Q.6 (a),(b) End Term Examination 2018 (Pg. No. 25,2G6-2018).
Q. Refer to Q.7 End Term Examination 2018 (Pg. No. 27-2018).
6. Yi? 11h Sereuter
Q. Refer 19) 4.04), fivi, (wy flecond Term Praw 2616 (Py My I} 20pm)
Q, Refer to 9 (hy, (1, (d), 10) Bnd Toren Exam 2017 (Ps
QI. (a) Explain the correlation between the OSI model and TCPAP model
with a proper diagrammatical] form.
Q.1. (¢) Describe the LAN-based PDDI over a basic token ring in detail.
©.1. (d) Differentiate SMTP & POP protocol.
1. fe) Explain the IPv4 protocol with header format. Also, compare with
IPv6.
Q.1. (f) Explain the High-level Data Link Control (HDLC) protocol used
in computer networks. Discuss its key features, frame structure, and modes
of operation.
UNIT. J
2 (a) What is the OSI reference model? Draw a block diagram and explain
the functioning of cach layer. (7.5)
©.2. (b) (i) Define the transmission modes with a diagram. (2.5)
(i1) Describe the transmission impairment. (2.5)
Q Explain the follow ing terms with proper examples: (2.5 x 5 = 12.5)
(a) Virtual Circuit with diagram
(b) Guided and Unguided Media
‘c) Wavelength
{d) Differentiate Process to Process and Host to Host delivery
(e) Baseband transmission and Broadband transmission
UNIT - Il
QA ‘a) Explain the working of the Go-Back-N ARQ protocol and the
Selective Repeat ARQ protocol Also, compare the Sender and Receiver
Window Sizes of both ARQ. (6.5)
(5. (a) Define the meaning of carrier sense in CSMA. Also, Explain the
CSMA CD and CSMA/CA with the diagram. (6.5)
82022 Fifth Semeater(u Tec) 1)
(6.5)
yY fragments Will be
Sranted also write MF, offsot, and total length value for all?
Q.8. Explain the following: (6.5, 6)
Q.8, (a) What is FTP? How file aro transferred using FTP?
Q.8, (b) Dif ference between UDP and TOP.
Q.9. Attempt any Two: (6.25 x 9)
switching? ‘ (10)
Ans.
Overload may block Overload increases packet Overload may block cal] setup
call setup delay and increases packet delay
Fixed bandwidth Dynamic bandwidth Dynamic bandwidth
No overhead bits after | Overhead bits in Overhead bits in each
call setup each packet packet
Q.1. (6) What factors should be considered in deciding the size of sliding
window?
Ans. By placing limits on the number of packets that can be transmitted or received
at any given time, a sliding window protocol allows an unlimited number of packets
to
be communicated using fixed-size sequence numbers. The term “window” on the
transmitter side represents the logical boundary of the total number of packets yet
to
be acknowledged by the receiver. The receiver informs the transmitter in each
acknowledgment packet the current maximum receiver buffer size (window boundary).
The receiver informs the transmitter in each acknowledgment packet the current
maximum receiver buffer size (window boundary). The TCP header uses a 16 bit field
to
report the receive window size to the sender. Therefore, the largest window that
can be
used is 216 = 64 kilobytes
Q.1. (c) What is the deciding factor in Go back N and Selective Repeat
protocol? ‘
Ans. Deciding factors are bandwidth, complexity of protocol, types of links (noisy
and noisy less), window size, sorting, searching, storing.
Ans. At least three types of error cannot be detected by the current checksum
calculation. First, if two data items are swapped during transmission, the sum and
the
checksum values will not change. Second, if the value of one data item is increased
(intentionally or maliciously) and the value of another one is decreased
(intentionally
or maliciously) the same amount, the sum and the checksum cannot detect these
changes.
Third, if one or more data items is changed in such a way that the change is a
multiple
of 216 — 1, the sum or the checksum cannot detect the changes.
2-2016 Sixth Semester, Data Communication and Networks
Ans. Baseband:
= bapa
¢ The signals are sent on multiple frequencies and allow all the multiple signals
are sent simultaneously in broadband transmission.
Q.2. (a) What is MAC layer? How is it different from Data Link Layer? (5)
Ans. The Media Access Control Layér is one of two sublayers that make up the
Data Link Layer of the OSI model. The MAC layer is responsible for moving data
packets to and from one Network Interface Card (NIC) to another across a shared
channel.
The Data-Link layer is the protocol layer in a program that handles the moving of
data in and out across a physical link in a network. The Data-Link layer is layer 2
in the
Open Systems Interconnect (OSI) mode! for a set of telecommunication protocols. The
Data-Link layer contains two sublayers that are described in the IEEE-802 LAN
standards:
The Data-Link layer ensures that an initial connection has been set up, divides
output data into data frames, and handles the acknowledgements from a receiver that
the data arrived successfully. It also ensures that incoming data has been received
successfully by analyzing bit patterns at special places in the frames.
Q.2. (b) A voice grade channel of the telephone network has a bandwidth of
3.4 kHz. Calculate the information capacity of the telephone channel for a signal-
to-noise ratio of 50dB? (5)
Ans.
C = Blog,(1+S/N)
= 3.4x 10°x Log, (1 + 50)
a = 3400 x 5.66
- = 19244 kbit/s
Q.3. (a) Explain the frame format of IIDLC. (5)
Ans. Refer Q.4. (b) of End Term Examination 2016
[.P University-B.Techi-AB Publisher 2016-3
(3. (b) Show that the hamming code can correct oie bil error in the following
Case:
r = parity bits
23>44+1+4+1
ss
Bit Position
4
P4
(a
ok |
parity | symbol
check
om
ae)
oa
Code word 1 1 0 0 1 0 1
First 1 an 0 = 1
Parity
Bit check
(P,, 3,5, 7)
Seoond _ 1 0 ae A 0 1
parity
Bit
check
(P,, 3,6, 7)
— 1 Fail --]
pass -01
(P,, 5,6, 7)
Ans. A data circuit-terminating equipment (DCE) is a device that sits between the
data terminal equipment (DTE) and a data transmission circuit. It is also called
data
cormmunication(s) equipment and data carrier equipment. Usually, the DTE device is
the terminal (or computer), and the DCE is a modem. ;
Data terminal equipment (DTE) is an end instrument that converts user information
into signals or reconverts received signals. These can also be called tail
circuits. A DTE
device communicates with the data circuit-terminating equipment (DCE). The DTE/
DCE classification was introduced by IBM. ‘
V.35 is a high-speed serial interface designed to support both higher data rates
and
connectivity between DTEs (data-terminal equipment) or DCEs (data-communication
equipment) over digital lines.
4—2016 Sixth Semester, Data Communication and Networks
Ans. Guided media are more commonly known as wired media, or those Media ;
which electrical or optical signals are transmitted through a cables or wires.
Ungui
media are more commonly known as wireless media, in which electromagnetic si
are sent through space with no direction. Both types of media can be used for long.
distance and short-distance communication.
2. Co-axial cabfe
3. Fiber-optic cable
Unguided transmission media:
1. Infrared
2. Microwaves
3. Satellite
Ana. Carrier senso mulliple acceaa (CHMA) ia a media access control (MAC) protixol
in which a nede verifies the absence of other traffic befare trananutting on «
shared
transmission medium, euch as an electrical bua, or a band of the electromagnetic
spectrum
(i) I-persistont CSMA: In this method, station that wants to transmit data
continuously senses the channel to check whether the channel is idle or buay.
* After this time, it again checks the status of the channel and if the channel js
free
it will transmit.
° If tho channel is busy, {t waits a random amount of time and then senses the
channel again.
* In non-persistent CSMA the station does not continuously sense the channel for
the purpose of capturing it when it detects the end of previous transmission.
(iti) p-persiatent CSMA; This method is used when channel has time slots such
that the time slot duration is equal to or greater than the maximum propagation
delay
time.
¢ Whenever a station becomes ready to send, it senses the channel.
¢ With the probability q =/- p, the station then waits for the beginning of the
next
time slot.
e If the next slot is also idle, it either transmits or waits again with
probabilities
p and q.
* This process is repeated till either frame has been transmitted or another
station
has begun transmitting.
—s
ie,
Ans. The FDDI frame format is similar to the format of a Token Ring frame. Th...
one of the areas where FDDI borrows heavily from earlier LAN technolo
Token Ring. FDDI frames can be as large as 4,500 bytes. Figure shows the
of an FDDI data frame and token.
BCs, such a,
frame format
Data frame
'
address Delmiter | status
“SS ay Y oe
~
“ bre a “4
. . ra at
~ af A
We, “3 Pa s
~~ ‘x s Je
s ~ ¢ ¢
s s , -
Se Token si ?
FDDI Frame Fields: The following descriptions summarize the FDDI data frame
and token fields illustrated in Fig.
PreambleyA unique sequence that prepares each station for an upcoming frame.
Start Delimiter: Indicates the beginning of a frame by employing a signaling
pattern
that differentiates it from the rest of the frame.
Frame Control: Indicates the size of the address fields and whether the frame
contains asynchronous or synchronous data, among other control information.
Source Address: Identifies the single station that sent the frame. As with Ethernet
and Token Ring addresses, FDDI source addresses are 6 bytes long.
Data: Contains either information destined for an upper-layer protocol or control
information. oa hotel ; wae
Frame Check Sequence (FCS): Filed by the source station with a calculated cyclic
redundancy check value dependent on frame contents (as with Token Ring and
Ethernet).
The destination address recalculates the value to determine whether the frame was
i i is discarded.
damaged in transit. If so, the frame is
: Bid Delimiter: Contains unique symbols, which cannot be data symbols, that
indicate the end of the frame.
arate Status-—Allows the source station to determine whether an error occured
and whether the frame was recognized and copied by a receiving station.
1.P Umversity4 B-fech+ARB Publisher 2016-7
No identification to the packet flow | The flow level field on the header portion
(Lack of QoS handling). identifies the packet flow and directs to
to router (Efficient QoS handling)
No identification to the packet flow | The flow level field on the header portion
(Lack of Qos handing). identifies the packet flow and directs to
router (Efficient QoS handling)
Clients have approach Dynamic Clients do not have to approach any such
Host Configuration server (DHCS) server as they are permanent adresses.
whenever they connect to an network.
8-2016 Sixth Sembater; Data Communication and Networkg
* It is a traffic shaping mechanism that controls the amount and the rate
traffic sent to the network. ‘
* Aleaky bucket algorithm shapes bursty traffic into fixed rate traffic by ave
the data rate.
* The rate at which the water is poured into the bucket is not fixed and can va
it leaks from the bucket at a constant rate. Thus (as long as water is present in
bue
the rate at which the water leaks does not depend on the rate at which the water is
in, ty
to the bucket. 4
Th,
Tap
a Burst flow
i G——$—. Packers
ine interface oy Ud “gg! Anopme
j low
containing
leaky } |
Bucket
} Bucets
— 3 De << holds
3 | pockets
$ Fined flow *
(constant @ 4——Reguiated
tate) i flow
Network
to) A footy Bucket with woter (b) A leaky Bucket with packets
¢ Also, when the bucket is full, any additional water that enters into the bucket
spills over the sides and is lost.
¢ The same concept can be applied to packets in the network. Consider that data is
coming from the source at variable speeds. Suppose that a source sends data at 12
Mbps for 4 seconds. Then there is no data for 3 seconds. The source again transmits
data at a rate of 10 Mbps for 2 seconds. Thus, in a time span of 9 seconds, 68 Mb
data
has been transmitted.
Ifa leaky bucket algorithm is used, the data flow will be 8 Mbps for 9 seconds.
Thus
constant flow is maintained.
average data rate will be maintained. The host is having no advantage of sitting
idle for
nds. ;
¢ ie overcome this problem, a token bucket algorithm is used. A token bucket
lll
1 P University B Tech}+AB Publisher 2016-9
® Atoken bucket algorithm 18 a modification of leaky bucket in which leaky bucket
contains tokens
¢ In this algorithm, a token(s) are generated at every clock tick. For a packet to
be
transmitted, system must remove token‘s) from the bucket.
* Thus, a token bucket algorithm allows idle hosts to accumulate credit for the
future in form of tokens.
¢ For example, if a system generates 100 tokens in one clock tick and the host is
idle for 100 ticks. The bucket will contain 10,000 tokens.
Now, if the host wants to send bursty data, it can consume all 10,000 tokens at
once
for sending 10,000 cells or bytes.
Thus a host can send bursty data as long as bucket is not empty.
4 \ss
One token added\ (> c—>
per tick ea
No eo
Arrival |
Processor Departure
FIFO Quene
Yes
Discard
Token bucket algoritm
Q.2. (6) Write a note on the various classes of IP address. (5)
pmunicall®
. ata Cor
Semester, Da ' 289 Wi
Sixth -sentifier: So, one address wil] re
s used as th mbe
ther 9 bits are user —aice the nu 0
e would reduce string 18 used for clags C IP addy by
Bq,
10-2016
sformation pre ‘
0
Q.3. (a) Explain the frame format imple message format desl a
Ans. The Address Reso
ocol uses 4 ¥ ,
ee einen The size of the gar rents depend,’
ddress resolution reques SPs hal iven 1e type
a se oe te <a Sear address sizes. which are 61 : Jolie as a network
protocol (usually IPv4) inu z
al rdware ©
se and the type of ha ;
, . specifies these ty
upper layer protocol is running on, The message header SP YPES, AS We}
the size of addresses of each The message
The principal packet structure of ARP packets is shown in the following table Which
_Inthis scenario, th
Jlustrates the case of IPv4 networks running on Ethernet. Int , the pag
es Lhe case ddress (SHA) and target hardware wal
ARP request this field is ignored. In an ARP reply this field is used to indicate
the
address of the host that originated the ARP request,
Ans. (i) This is a Class C network. We require a mask that provides 32 subnets. /
24 has no subnets,
(ii) There are 3 host bits remaining and 23 = 8. Two addresses are not available
hence a maximum of 6 hosts can be used.
(iii) Find the first and last allocatable addresses in subnet 1. The first
allocatable
(ii) ICMP: The Internet Control Message Protocol (ICMP) is a supporting protocol
in the Internet protocol suite. Itis used by network devices, like routers, to send
error
messages and operational information indicating, for example, that a requested
service
is not available or that a host or router could not be reached. ICMP differs from
transport
protocols such as TCP and UDP in that it is not typically used to exchange data
between
systems, nor is it regularly employed by end-user network applications (with the
exception of some diagnostic tools hke ping and traceroute).
(iii) FTP: The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files between a client and server on a computer network.
FTP is built on a client-server model architecture and uses separate control and
data connections between the client and the server. FTP users may authenticate
themselves with a clear-text sign-in protocol, normally in the form of a username
and
password, but can connect anonymously if the server is configured to allow it. For
secure
transmission that protects the username and password, and encrypts the content, FTP
is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is
sometimes
alwo used instead, but is technologically different.
The first FTP client applications were command-line programs developed before
operating systems had graphical user interfaces, and are still shipped with most
Windows, Unix, and Linux operating systems. Many FTP clients and automation
utilities
have since been developed for desktops, servers, mobile devices, and hardware, and
FTP has been incorporated into productivity applications, such as web page editors.
(ic) DNS: The Domain Name System (DNS) is a hierarchical decentralized naming
system for computers, services, or any resource connected to the [nternet.or a
private
network. It associates various infurmation with domain names assigned to each of
the
12-2016 Sixth Semester, Data Communication and Networks
ure readil ‘
The Domain Name System also specifies the technical functionality of the data
service that is at its core. It defines the DNS protocol, a detailed Specification
of
data structures and data communication exchanges used in the DNS, as Part of the
Internet Protocol Suite. Historically, other directory services preceding DNS were
sealable to large or global directories as they were originally based on text
files,
prominently the HOSTS. TXT resolver.
Over
™ prog;
Tge Centra
—_--~~~——
Ql: Why dr woe need eae of Cita ef: sending over a medcum?
«$3
Ses. 1 Totes, ar ees EEE OE, FOE uses addon mag w acheerve beter
senuite seni ese cones af dec
2 Taker ca nes cesced por catees end POO] uses Sher cates
IDO? uses a comed toe prooneel wher Taber Tang uses precoyTeservensn
oe ee
eae aomess. Hemicur ip Sifieeemos ot ume fora med how stepmom Cade hendied
6 Taser Toop mass QRuTT End reseenmon its. Pec the PUTTY omeTenen of the
PICO cog caes a poem cus thet op banned oc a pera bows es the Token Rotation
Eee, or TET
Ams “ne coemice: aecrices ecchastome made! EPO 16R June 19 wns
moitcvnaet fs ite tueds of oealcome emglucemoms sack es remote Wades, malomecsa
“ix h semes T 1 j 1 | Networ ks
aa x ‘
14-2016
conferencing.
end Quality of Service
network resources to provide P
reservation” and “admission control” mechan
and maintain QoS. i
~ tion Protocol (RSVP) to explicitly signal the Qog
devices in the end-to-end path through the
ath can reserve the necessary bandwidth,
Admission Control: Determine whether a new flow can be granted the requested
QoS without impacting existing reservations
Policing: Take action, including possibly dropping packets, when tr affic does not
conform to its specified characteristics .
Queuing and Scheduling: Forward packets according to those QoS requests that
have been granted.
routers and
Circuit switching contrasts with packet switching which divides the data to be
transmitted into packets transmitted through the network independently. In packet
switching, instead of being dedicated to one communication session at a time,
network
links are shared by packets from multiple competing communication sessions,
resulting
in the loss of the quality of service guarantees that are provided by circuit
switching.
Ans. Internet Protocol being a layer-3 protocol (OSI) takes data Segments from
layer-t (Transport) and divides it into packets. IP packet encapsulates data unit
received
from above layer and add to its own header information. ;
(1? Encapsuiation)
meen, See
IP University (HH Teeh/ AL Publisher 2016-15
des, Xai SE |
6 | wee I oa i oe ed Tot Leng
— ee
x rw cocatnestll ill Pncenntscs ii
' ten Lie ston He ‘ OM t
‘ Pe : — Ne 4 we ook tagne “ |
2. menenee
ei Yime to Live [ Pretoce - Header Checksum
— eeinee ee
“ Sitio De La RE aM a BT. —s
uf Somer ata |
ny es a srstnnaaneenaieentitinneethincnniaaineiamaiicinadalidsaiiil ‘ mb
it ) Desbnation Address
@ ‘ " Cvdhe cob han Ue «enn «see sade eee 41
0 Options '
(Image; IP Header)
Fragment Offset: This offset tells the exact position of the fragment in the
original
IP Packet.
Time to Live: To avoid looping in the network, every packet is sent with some TTL
value set, which tells the network how many routers (hops) this packet can cross.
At
each hop, its value is decremented by one and when the value reaches zero, the
packet is
discarded
Protocol: Tells the Network layer at the destination host, to which Protocol this
packet belongs to, i.e. the next level Protocol. For example protocol number of
ICMP is
1, TCP ts 6 and UDP is 17
Header Checksum: This field is used to keep checksum value of entire header
which is then used to check if the packet is received error-free.
Source Address; 32-bit address of the Sender (or source) of the packet.
Destination Address: 52-bit address of the Receiver (or destination) of the packet.
Options: This is optional field, which is used if the value of IHL is greater than
5.
These options may contain values for options such as Security, Record Route, Time
Stamp, etc
16-2016 Sixth Semester, Data Communicabon and Networks
UNIT-I
Q).2. Explain the ISO/OSI Network model with neat diagram. (12.5)
There are n numbers of users who use computer network and are located over thy
world. So to ensure, national and worldwide data communication, systems Must be
developed which are compatible to communicate with each other ISO has developeg
this. ISO etands for International organization of Standardization This is called g
model for Open System Interconnection (OSI) and js commonly known as OSI model.
The ISO-OSI model is a eeven layer architecture It defines seven layers or levels
in
a complete communication system.
— ome.
Sa Oat eee SO
| Arr AO LATon | Mrmanmiane |
z
t
| PROT NTANIOM | ATR | | ortstntanon varia
ny &
} + ihe
| BEASIOM LAER “i | th Oty AYER ]
——
| !
| TRANSPUAT LAYER | FF TRAN SORT vee |
|
| a ] eae ]
:
DATA LIE
| TA UNG | AYER | | ue or at
=. > _
model.
4, Voltages and data rates needed for transmission is defined in the physical
layer.
{
IP. UniversityB.Tech)}-AB Publisher 2016-17
1. Data link Jayer synchronizes the information which is to be transmitted over the
physical layer.
2. The main function of this layer is to make sure data transfer is error free from
one node to another, over the physical layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also handled by
this layer.
5. This layer establishes a logical layer between two nodes ard also manages the
Frame traffic control over the network. It signals the transmitting node to stop,
when
the frame buffers are full.
4. It divides the outgoing messages into packets and assembles the incoming packets
into messages for higher levels.
3. It receives messages from the Session layer above it, convert the message into
smaller units and passes it/on to the Network layer.
4.Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer. :
2. Transfer of data from source to destination session layer streams of data are
marked and are resynchronized properly, so that the ends of the messages are not
cut
prematurely and data loss is avoided.
1. Presentation layer takes care that the data is sent in such a way that the
receiver
will understand the information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready for
the application layer. ie
2. Transferring of files disturbing the results to the user is also done in this
layer.
Mail services, directory services, network resource etc are services provided by
application
layer.
3. This layer mainly holds application programs to act upon the received and to be
sent data.
———————
:
i
i
i
18-2016 Sixth Semester, Data Commuracation and Networks
Ans. In order to transport digital bits of data across carrier waves, enciing
techniques have been developed each with their own pros and cons. This documergy
briefly describes some of the more common techniques.
802.3 Ethernet uses Manchester Phase Encoding (MPE). A data bit ‘1’ from the
level-encoded signal (i.e. that from the digital eireuitry in the host machine
sending
data) is represented by a full cycle of the inverted signal from the master clock
which
matches with the ‘0’ to ‘1’ rise of the phase-encoded signal (linked to the phase
of the
carrier signal which goes out on the wire). i.c.-V in the first half of the signa]
and +V in
the second half.
The data bit ‘0’ from the level-encoded signal is reprezented by a full normal
cycle of
the master clock which gives the ‘1’ to ‘0’ fall.of the phase-encoded signal. ie.
+V in the
first half of the signal and -V in the second half.
ov
(> Sy «4 Se
Vi ee Leu
1’ tt TD ba
WV
Me fasta § Kil
1 0 1 1 0
The above diagram shows graphically how MPE operates. The example at the
bottom of the diagram indicates how the digital bit stream 10110 is encoded.
A transition in the middle of each bit makes it possible to synchronize the sender
and receiver. At any instant the ether can be in one of three states: transmitting
a0 bit
(-0.85¥), transmitting a 1 bit (0.85v) or idle (0 volts). Having a norma} clock -
well as an inverted clock signal leads to regular transitions which means
LP. University4B.Tech-AB Publisher 2916-19
A ‘I’ bit is indicated by making the first half of the signal, equa! to the last
half of
the previous bit's signal i.e no transition at the start of the bit-time. A 0’ bit
is indicated
by making the first half of the signal opposite to the last half of the previous
bit’s signal
i.e. a zero bit ia indicated by a transition at the beginning of the bit-time. In
the middle
of the bit-time there is always a transition, whether from high to low, or low to
high.
Each bit transmitted means a voltage change always occurs in the middle of the bit-
time to ensure clock synchronisation. Token Ring uses DME and this is why a
preamble
is not required in Token Ring, compared to Ethernet which uses Manchester encoding.
Non Return to Zero (NRZ)
NRZ encoding uses 0 volts for a data bit of ‘0’ and a +V yolts for a data bit of
‘1’. The
problem with this is that it is difficult to distinguish a series of ‘1's or ‘0's
due to clock
synchronisation issues. Also, the average DC voltage is. 1/2V 80 there is high
power
output. In addition, the bandwidth is large i.e. from OHz to half the rate because
for every full signal wave, two bits of data can be transmitted (re that with
MPE the data rate equals the bit rate whichis even more inefficient) ie. two bitswf
information are transmitted for every cycle (or hertz).
Afler 50m of cable attenuation the signal amplitude may have been reduced to
100mV giving an induced noise tolerance of 100mV.
With RZ a ‘0’ bit is represented by 0 volts whereas a'‘l’ data bit is represented
by +V
volts for half the cycle and 0,volts for the second half of fhe cycle. This means
that the
average DC voltage is reduced to 1/4V plus there is the added benefit of there
always
being a voltage change even if there are a series of ‘1's. Unfortunately, the
efficiency of
bandwidth usage decreases if there are a series of ‘1's since now a‘1’ uses a whole
cycle.
Non Return to Zero Invertive (NRZ-I)
WV
1) 10110 start at Ov 4
nga 0 se ' 1
2 ei” ge ae” i erage ag care
aatng a eV #¥
1) 10110 start at +V
0
’ 41 ‘ 0 ‘ 1 ‘ 1 + 0 1
Rad
1) 1411 start at Ov
starting at Ov 0 '
' s
ae | Boe ee aie Wien © een, Fer ade
uwing at +V V7
1) 11911 start at +V™
a Py iaiss
‘ 4 7 1 1 1 ' 1 ' 1 ,
ie
3
20-2016 Sixth Semester, Data Communication and Networks
level. If the previous voltage was 0 volts then the ‘I’ bit will be represented
bres
however if the previous voltage was +V volts then the “]’ bit will be vassal Vag
volts. A ‘O’bit is represented by whatever voltage level was used previously That
1%
that only a ‘1’ bit can ‘invert’ the voltage, a ‘0’ bit has no effect on the
voltage it Rita
the same as the previous bit whatever that voltage was. iti.
This can be demonstrated in the following examples for the binary pallerns
and 111)1: i
Note how that a ‘1’ inverts the voltage whilst a ‘0’ leaves it where it is This
that the encoding is different for the same binary pattern depending on the vd
starting point.
The bandwidth usage is minimised with NRZ-I, plus there are frequent Voit
changes required for clock synchronisation.
With fibre there are no issues with power output 80 a higher clock frequency is ¢
whereas with copper NRZ-I would not be acceptable,
4B/5B .
_ 4BY5B encoding is sometimes called ‘Block coding’. To get around this problem, ,
intermediate encoding takes place before the MLT.3 encoding. Each 4-bit ‘nibbi¢,
received data has an extra 5th bit added. if input data is dealt with in 4-bit
nibbs
there are 24 = 16 different bit patterns. With 5-bit ‘packets’ there are 25 = 32
differe
bit patterns. Asa result, the 5-bit patterns can always have two‘l’s in them even
if 6
data is all ‘0's a translation occurs to another of the bit patterns. This enables
cl
synchronisations required for reliable data transfer.
Notice that the clock frequency is 125MHz. The reason for this is due to the 4B
encoding. A 100MHz signal would not have been enough to give us 100Mbps, we need
125MHz clock.
5B/6B
Same idea as 4B/5B but you ean have DC balance (3 zero bits and 3 one bits in ea
group of 6) to prevent polarisation. 5B/6B Encoding is the process of encoding th
scrambled 5-bit data patterns into predetermined 6-bit symbols. This creates,
balanced data pattern, containing equa] numbers of 0’s and 1’s, to provide
guarantee
clock transitions synchronization for receiver circuitry, as well as an even power
valu
on the line.
For 100VG-Any LAN for instance, the clock rate on each wire is 30MHz, therefer
30Mbits per second are transmitted on each pair giving a total data rate of 120Mbau
sec. Since each 6-bits of data on the line represents 5 bits of rea] data due to
the 5B
encoding, the rate of real data being transmitted is 25Mbits/sec on each pair,
giving!
total rate of real data of 100Mbits/sec. For 2-pair STP and fiber, the data rate ®
120Mbits/sec on the transmitting pair, for a real data transmission rate of 1003s
BEC.
8B/6T |
8B/6T means send 8 data bits as six ternary (one of three voltage levels) signals.
3
4 (6/8) wave transitions transitions per bit i.e. the carrier just needs to be
running #3
4 of the speed of the data rate. a
The incoming data stream is split into 8-bit patterns. Each 8-bit data pattero we
two voltage levels 0 volts and V volts is examined. This 8-bit pattern is then con
into a 6-bit pattern but using three voltage levels -V, 0 and V volts, so each 8-
bit part
ee ee RE NT
LP University B Tech AB Publoher 2516-21
nas a uniquo 6T code. For example the bit pattern 0000 0000 (0x00) uses the cade +
20+ and 0000 1110 (OE) uses the code -+0-0+. There are 36 « 729 penaible patterns
symbols) The rules for the symbols are that there must be at least two voltage
Transitions (to maintain clock synchronisation) and the average DC voltage must be
teru (this ts called “DC balance’ that 1s the overall DC voltage is summed up to
Ov, the
+V and -V transitions are evenly balanced either side of OV) hich ktops any
polarisation
on the cable
that the maximum carrier frequency on any single pair is 37.5/3 = 12.5MHz.
3310B
Each octet of data is examined and assigned a 10 bit code group. The data octet ia
split up into the 3 most significant bits and the 5 least significant bits. This is
then
represented as two decimal numbers with the least significant bits first e.g for
the
actet 101 00110 we get the decimal 6.5. 10 bits are used to create this ende group
and
the naming convention follows the format /D6 5/ There are also 12 special code
groups
which follow the naming convention /Kay/.
The 10 bit code groups must either céntain five ones and five zeros, or four ones
and
sIX Zeros, or six ones and four zeros. This ensures that not too many consecutive
ones
and zeros occurs between code groups thereby maintainirig clock synchronisation.
Tao
commas’ are used to aid in bit synchronisation, these ‘coramas’ are the 7 bit
patterns
9011111 (+comma)and 1100000 (-comma).
This uses 10 bits for each 8 bits of data and therefore drops the data rate speed
relative to the line speed, for instance in order to gain a data rate of 1Gbps the
line
speed has to be 10/8.x 1 = 1 25Gbps.
Q.3. (6) Explain in detail the error detection and error corrections. (6.5)
Error detection is most commonly realized using a suitable hash function (or
checksum algorithm). A hash function adds a fixed-length tag to a message, which
enables receivers to verify the delivered message by recomputing the tag and
comparing
it with the one provided.
There exists a vast variety of different hash function designs. However, some are
of
particularly widespread use because of either their simplicity or their suitability
for
etecting certain kinds of errors (e.g., the cyclic redundancy check’s performance
in
tecting burst errors).
v simple scheme that can be used to detect single or any other oda
hain reac etc.) of errors in the output. An even number of flipped hits will bez
parity bit appear correct even though the data is erroneous.
Checksum schemes include parity lfts, check digits, and longitudinal] redunda,,
checks, Some checksum schemes, such as the Damm algorithm, the Lukn algerie
and the Verhoeff algorithm, are specifically designed to detect errors comme
introduced by humans in writing down or remembering identification numbers,
used in digital networks and storage devices such as hard disk drives.
Even parity isa special case o
UNIT-II
Q.4, Explain about the data link protocol architecture with the neat
The data link layer has two sublayers: logical link control (LLC) and media
control (MAC).
LLC provides addressing and control of the data link. It specifies which i 2
are to be used for addressing stations over the transmission medium and for
at any one time (e.g. CSMA/CD). Other times it refers to a frame structure
There are generally two forms of media access control: distributed and
up of people speaking. 1 e. a conversation, we lock for chaes from our fel talkers
ewe
ifany of them appear to be about to speak Iftwo people era at the same time, they
will each pause a random amount cf time aad then attempt to speak again, efectitaly
establishing a long and elaborate game of saying “ns, yoo firit”
Session setup and termination: For reliable services, season contrsl messages
are used by end systems to exchange status informatuon aboot the seanon.
Flow control: A tech que that prevents the sender fom sending more, overfowaug
the receiver with more data than it can handle.
Coemmen Data Link Protocc!s are SDLC (Syachzcaeus Data Link Protece!) , HDLC
(High-level Data Link Control), PPP ( Paimt-to-Peant Protsenl) ete.
and nen-switched protocol. It is a data link controt protecnl, and falls withun
layer 2, the
HDLC specifies the following three types of stations fer data link comtrel:
(a) PRIMARY STATION: Within a network using HDLC as it’s data link protseni,
if a configuration is used in which there is a primary station. 1t is used as the
coutroiling
station on the link. It has the responsibility of controlling all other statielia
om the
Kink‘ usually secondary stations) Despite this impertant aspect ef being om the
ink, the
primary station is also responsible for the organization of data flow oa the bos [t
alse
takes care of error recovery at the data link leveli layer 2 of the OST model
(6) SECONDARY STATION: If the data link protecol being used ws HDLC, anda
primary station is present, a secondary station must also be preset ca the data Lok
The secondary station is under the control of the primary station. It has no abate
or
direct responsibility for controlling the ink. Itis only activated when requested
by tha
primary station. It only responds to the primary station The secondary station's
Games
are called responses. It can only send response frames when requested by the
primary
24-2016 Sixth Semester, Data Communication and Networks
(c) HDLC Operational Modes: HDLC offers three different modes of operation.
These three modes of operations are:
(i) Normal Itesponse Mode. This ia the mode in which the primary station initiates
transfers to the secondary station. The secondary station can only transmit a
response
when, and only when, it is instructed to do so by the primary station. In other
words, the
secondary station must receive expliat permission from the primary station to
transfer
a response. After receiving permission from the pmmary station, the secondary
station |
initiates it’s transmission. This transmission from the secondary station to the
primary
station may be much more than jusban acknowledgment of a frame. It may in fact be
more than one information frame: Once the last frame is transmitted by the
secondary
station, it must wait once again from explicit permission to transfer anything,
from the
primary station. Norma! Response Mode is only used within an unbalanced
configuration.
(ii) Asynchronous Response Mode In this mode, the primary station doesn?
initiate transfers to the secondary station. In fact, the secondary station does
not have ~
to wait to receive explicit permission from the pnmary station to transfer any
frames, —
The frames may be more than just acknowledgment frames. They may contain data, or
control information regarding the status of the secondary station. This mode can
reduce {
overhead on the link, as no frames nced to be transferred in order to give the
secondary —
station permission to initiate a transfer However some limitations do exist. Due to
the -
fact that this mode is Asynchronous, the secondary station must wait until it
detects —
and idJe channel before it can transfer any frames. This is when the ARM link is
operating
at half-duplex. If the ARM link is operating at full-duplex, the secondary station
can ~
transmit at any time. In this mode, the primary station still retains
responsibility for |
error recovery, link setup, and link disconnection.
(iii) Asynchronous Balanced Mode: This mode uses combined stations. There #
no need for permission on the part of any station in this mode. This is because
combi
stations do not require any sort of instructions to perform any task on the link.
Normal Response Mode is used most frequently in multi-point lines, where
primary station controls the link. Asynchronous Response Mode is better for pow
point links, as it reduces overhead. Asynchronous Balanced Mode is not used
today.
The “asynchronous” in both ARM and ABM does not refer to the format of the ¢
on the link. It refers to the fact that any given station can transfer frames WH"
HOLS ales defines three netstat atvciel mates Then Ubree nen operetacnal modes
are’
HDLC frame format: The contents of an HOLE frame ere shown in the following
table
- —
hita
% hits hits
Note that the end flag — frame nay te (hut docs not have ta be) the begunning
(start) flag of the nezt frame
Data ia usually sent in multiples of 6 bits, but only eome variaats require this;
othera thesretically permit data alignmerita on other than &-bit boundariet.
Ifthe receiver's caleulation of the PCS does not match that of the sender's,
indicating
that the frame contains errors, the receiver can either send a negative acknowledge
packet to the sender, or send nothing. After either receiving a negative
acknowledge
packet or timing out waiting for a positive acknowledge packet, the sender can
retranamit the failed frame.
The FCS was implemented because many early communication links had a
relatively high bit error rate, and the FCS could readily be computed by simple,
fast
circuitry or software. More effective forward error correction schemes are now
widely
used by other protocols.
Q.5. (a) Discuss sliding window flow control in data link control? (6)
Ans. The Sliding Window Flow Control: With a simple stup-and-wait protocol,
the sender waits for an acknowledgment after transmitting each frame. As a result,
there is at most a eingle outatanding frame on the channel at any given time, which
may
be far Jexs than the channel's capacity. The network will be empletely idle during
times
that machines delay responses (e.g while machines compute routes or checksums). If
we imagine a network with high transmission delays, the problem becomes clear
a
26-2016 Sixth Semester, Data Communication and Networks 4
Send packat? |
en — gt Receive packet 2
Receive ACK}
——
|
The sender assigns a sequence number to each frame, ranging from 0 up to some
maximum number. At any instant of time, the sender maintains a list of consecutive
sequence numbers corresponding to frames it is permitted to send. This list, termed
the
sending window, represents frames sent but not yet acknowledged. When an
acknowledgment arrives, the lower edge of the window is advanced to the
corresponding
sequence number, thereby allowing the sender to transmit new frames. (Note that
wnen
the atk. sends an acknowledge for frame s, this is understood to mean that all
frame§ up to and including s have been received.)
Since frames currently within the sender’s window may ultimately be lost or |
damaged in transit, the sender must keep all these frames in its memory for
possible |
retransmission. Thus, the sender must have a buffer large enough to hold as many
frames as there are in its window. The sender records the time at which every
packet is
sent. If the sender does not receive an acknowledgment for a packet before the
timeout
period elapses, it retransmits the original frame.
The Receiver’s point of view
HFA-NFE+1< = RWS,
and soit
1P Univervity=B Tech+AB Publisher 2016-27
Q.5. (§) Describe LAN architecture along with Bus andT topologies?
4 (6.5)
Ans. The architecture on which you chouse to base your network is the single most
important deciwen you make when setting up a LAN. The architecture defines the
tpeed of the network, the medium acours control mechanism it uses (fer example,
collision
devecucn toler: paswing, and 6 on), the types of cables you can use, the network
interface
adapters you must buy. and the adapter drivers you install
_ The Institute of Electrical and Electronic Engineers (IEEE) has defined and
documented a vet of standards for the physical charactenstics of both cullision-
detection
and tehen-parsing networks. These standards are known as IEEE 802 3 (Ethernet)
and IEEE 6025 (Token-Ring), respectively. [EEE $02.1] (Wi-Fi) defines wireless
vermane of Ethernet.
The must commen choice today fer new networks is Ethernet (both wired and
wireless In rare cases, you may encuunter a Token-Ring or ARO net network
jo ;O ja
io
ys boon
Above figure cursiieta of two topologies: Bus and Tree toplogy. In bus topology
signal
fee the somuroe as broadeased and it travels to all workstations connected to bus
cable.
Although the mewsace us broadcasted but only the intended recipient, whose MAC
nddress or IP addressmatches, accepts it. If the MAC IP address of machine doesn’t
ates, xvth the intended address, machine discards the signal. tree topology is one
of
thy must common network setups that is similar to a bus topology and a star
topology.
A tree Lopology connects one etar network to other etar networks.
Three major components of LAN are:
2 Network Tepology
UNIT-III
IPv6 addresses are represented as eight groups of four hexadecimal digits with the
groups being separated by colons, for example 2001:0db8:0000:0042:0000:802e:0979.
7334, but methods to abbreviate this full notation exist. :
IPv6 features include:
1. Supports source and destination addresses that are 128 bits (16 bytes) long.
3. Uses Flow Label field to identify packet flow for QoS handling by router.
8. Uses host address (AAAA) resource records in DNS to map host names to IPv6
addresses.
9. Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6
addresses to host names.
Q.6. (6) Discus the various design issues in network layer. (6)
The major components of the system are the carrier’s equipment (routers connected
by transmission lines), shown inside the shaded oval, and the customers’ equipment,
* We have shown F as being outside the oval because it does not belong to the
carrier, but in terms of construction, software, and protocols, it is probably no
different
from the carrier's routers.
* This equipment is used as follows. A host with a packet to send transmitsit tothe
nearest router, either on its own LAN or over a point-to-point link to the carrier.
.
packet is stored there until it has fully arrived so the checksum can be verified.
* Then it is forwarded to the next router along the path until it reaches the 4
destination host, where it is delivered. This mechanism is store-and-forward we
switching.
IP. University-{B.Tech)-AB Publisher 2016-29
——
: PR >
* @| f (3 Process P2
So : sd we
Process P1 Pedal ae
° The network layer provides services to the transport layer at the network layer/
tranaport layer interface. An important question is what kind of services the
network
layer provides to the transport layer.
* The network layer services have been designed with the following goals in mind.
(6) The transport layer should be shielded from the number, type, and topology of
the routers present. Me
(c) The network addresses made available to the transport layer should use a
uniform numbering plan, even across LANs and. WANs.
Two different organizations are possible, depending on the type of service offered.
If
connectionless service is offered, packets are injected into the subnet
individually and
routed independently of each other. No advance setup is needed.
In this context, the packets are frequently called datagrams (in analogy with
telegrams) and the subnet is called a datagram subnet. If connection-oriented
service is
used, a path from the source router to the destination router must be established
before
any data packets can be sent.
ss
s
a Ctthey ,
necessary or is performed in the application, avoiding the overhea
d of such proep
‘ ie
at the network interface level. Time-sensitive applications often use Ubp becagg
dropping packeta is preferable to waiting for delayed packets, which MAY Not be ra
option in a real-time system
UDP Message Format
0 4 i} 1? 16 79 a4 2 y
N N 1 { i j 4
Saute Post Destinatin Pots
Leng Corthian
i ps
I Oata =
Figure ;: UDP Message Format
Different Field of UDP Message
Source Port: The 16-bit port number of the process that originated the UDP
Destination Port: The 16-bit port number of the process that is the ultimate
intended recipient of the message on the destination device. This wil] usually be a
we!l)-
knowr/registered (server) po
Length: The length of the entire UDP datagram, including both header and Data
fields,
t) port
quality of service that occurs when a network node is carrying more data than it
can
handle. Typical effects include
, packet loss or the blocking of new
connections. A consequence of co
e in network throughput.
protocols that use aggressive retransmissions to compensate for packet
loss due to congestion can increase congestion, even after the initial load hag
been
reduced to a level that would not normally have induced network congestion. Such
networks exhibit two stable states under the same level of load. The stable state
with
low‘throughput is known as congestive collapse.
MF “ee eee
eet
(6.5)
which provides high-speed (up to 1 Gbit/s) local area networking over varying wires
(power lines, phone lines and coamal cables).
Among the ways to classify congestion control algorithms are:
1 By type and amount of feedback received from the network: Loss; delay, single-
bit or multi-bot explicit exygmals
Q.9, Explain the SMTP and HTTP. Give their uses, state strengths and
weaknesses. (12.5)
Ans. SMTP ts part of the applicatzondayer of the TCP/IP protocol. Using a process
called “store and forward,” SMTP moves your emailen and across networks. It works
clasely with something called the Mail Transfer Agent (MTA) to send your
communication
to the nght computer and email inbox.
SMTP spells out and directa how our emai! moves from your computer's MTA to an
MTA cn another computer. and even sev cral computers. Using that “store and
forward”
feature mentioned before, the meseace can move in steps from your computer to its
destination At each step, Sityphe Mail Transfer Protocol is doing its job. Lucky
for us,
this all takes place behind the seencs, and we don’t need to understand or operate
SMTP
Atmost all ef yeur onkne activity is made possible through the help of pretocols—
the epecial netwerking-software rules and guidelines that allow your computer to
link
up to networks everywhere so you can shop, read news, send email and more (Your IP
address, which stands fur Internet Protocol, is yust one of many )
The protocols are vital to your networking activity and, fortunately for you, you
don't need to manage, instal] er even think about them They're built in to the
networking
coftware on your computers. Thank goodness fer advanced technology and IT geniuses!
Shl. every ence in a while, you may find yourself having to learn about a pratocol—
pach as your IP address. That's the case with a term that affects every email
you've ever
beat cut in your entre life—Simple Mail Transfer Protocol, or SMTP. Without it,
your
mada would go nowhere.
What is SMTP?
SMTP is part of the application layer of the TCP'1P protocol. Using a proceys
called
*etore and forward,” SMTP moves your email on and across networks. It works closely
with something called the Mail Transfer Agent (MTA) to send your communication to
the right computer and email inbex.
SMTP epetis out and direvts how your email moves from your computer's MTA to an
MTA cn another computer, arc even several computers. Using that “store and forward"
foatare mentvoned before, the message can move in steps from your computer to its
devtination At each step, Simple Maal Transfer Protocol is dowg ita job. Lucky for
us,
thos 2 takes place behund the scenes, and we don’t need to understand or operate
SMTP
a
SMTP at work
SMTP provides those codes, and email server software is designed to up, (
what they mean. As each meesage travels towards its destination, it sometimes pa
through a number of computers as well a their individual MTAs As it does, it's by
stored before it moves on to the next computer in the path. Think of it a3 a letter
Brey
through different hands as it winds its way to the nght mailbox.
the Internet standard for ¢-mail is the Simple Mai] Transport Protocol (Sappp
SMTP is the appheation-level protocol that handles message serviors over TCP
networks SMTP was defined in 1982 by the Internet Engineering Task Force EQ
and is currently specified in RFCs 421 and 822 SMTP uses TCP port 25
Although SMTP is the most prevalent of the e-mail protocols, it lacka some of ¢4
rich features of X 400. A pnmary weakness of standard SMTP is the lack of s upport
fg
non-text messages.
HTTP is short for HyperText Transfer Protocol. HTTP is the underlying proton
used by the World Wide Web and this protocol defines how messages are formatted am
transmitted, and what actions Web servers and browsers should take in Teaponse ti
Various commands. =
Por example, when you enter a URL in your browser, this actually sends an HTT)
command to the Web server directing it to fetch and transmit the requested Web page
The other mainstandard that controls how the World Wide Web works is HTML, whi
covers how Web pages are formatted and displayed.
Advantages of HTTP:
1.Platform independent- Allows Straight cross platform porting.
2. No Runtime support required to run properly.
3. Usable over Firewalls ! Gloval applications possible.
Disadvantages of HTTP:
1. Not optimized for mobile.
2. Only point-to-point communication.
3. (Partly) too complex for simple data.
4. Too verbose.
5. No reliable exchange (Without retry logic).
6. No Push Capabilities. :
smber)
Q.1. (a) What is the difference between guided and unguided media? (2)
Ans. Guided media are more commonly known as wired media, or those media in
which electrical or optical signals are transmitted through a cables or wires.
Unguided
media are more commonly known as wireless media, in which electromagnetic signals
are sent through space with no direction. Both types of media can be used for long-
distance
and short-distance communication.
Ans. Protocol is the special set of rules that end points in a telecommunication
connection use when they communicate. In other words Protocol is an agreed-upon
format for transmitting data between two devices. The protocol determines the
following:
the type of error checking to be used data compression method, if any how the
sending
device will indicate that it has finished sending a message how the receiving
device will
indicate that it has received a message Service is a program, routine, or process
that
performs a specific system function to support other programs, particularly at a
low
(close to the hardware) level.
A service is a program on the computer that provides a function for your software,
such at the NetBIOS service that connects windows workgroup machines, or the DHCP
Client that acquires a network address for your computer when you connect to the
internet. A protocol is a language the computer uses to exchange information. For
example, TCP/IP is used to negotiate connection and transfer data over the
Internet,
and HTTP is a protocol that handles transferring data between WWW servers, and
clients.
Q.1. (c) What is bit stuffing. . (2)
Ans. Bit stuffing is the insertion of one or more bits into a transmission unit as
a
| way to provide signaling information toa receiver. The receiver knows how to
detect and
remove or disregard the stuffed bits.
For example, the timing or bit rate of T-carrier system signals is constantly
synchronized between any terminal device and an adjacent repeater or between any
two repeaters. The synchronization is achieved by detecting the transition in
polarity
for 1 bits in the data stream. (T-1 signalling uses bipolar signaling, where each
successive
bit with a value of 1 is represented by voltage with a reverse polarity from the
previous
bit. Bits with a value of 0 are represented by a no-voltage time slot.) If more
than 15
bits in a row are sent with a 0 value, this “lull” in 1 bits that the system
depends on for
synchronization may be long enough for two end points to become out of
synchronization.
To handle this situation (the sequence of more than 15 0 bits), the signal is
“stuffed”
2-2017 Sixth Semester, Data Communication and Networks
In another example of bit stuffing, a standard HDLC packet begins and ends y.
. wi
01111110. To make sure this sequence doesn't appear again before the end of the
Pack
a0 is inserted after every five consecutive Ls.
Bit stuffing is defined by some to include bit padding, which is the addition ofp.
(
Ans. At least three types of error cannot be detected by the current checksy
calcula
| tion. First, if two data items are swapped during trarlsmission, the sum and t}
: um values will not change. Second, if the value of one data item is increag,
(intentionally or maliciously) and the value of another one is decreased
(intentional
or malicously) the same amount, the'sum and the checksum cannot détect these change
if one or more data items 1s changed in such a way that the change is a multip
of 216-1, the sum or the checksum cannot detect the changes.
Q.1. (e) Which layer is responsible for:
(2
* Dialogue Control ¢ Compression
* Translations
* Flow control
Ans, Session layer,Presentation layer, Presentation layer, Data link and transpor
layer.
(8
a limited resource transmission s
several users. Unlik
In Fixed Channel Allocation or F ixed Channel Assignment (FCA) each cell is given
a predetermined set of frequency channels, F
' —
1.P. University-{B.Tech.}-AB Publisher 2017-3
802. 11h wireless local area network standard. DFS is also mandated in the 5470-
5725
MHz U-NII band for radar avoidance
= 40 Kbps
(ii) 40000 = B*LOG,(1+61)
B =6.7 KHz
Bagr (a) What is the difference between Selective Repeat and Go-back N
i (3)
Ans. Selective Repeat is part of the automatic repeat request (ARQ). With selective
repeat, the sender sends a number of frames specified by a window size even without
the need to wait for individual ACK from the receiver as in Go-Back-NARQ. The
receiver
may selectively reject a single frame, which may be retransmitted alone. this
contrasts
with other forms of ARQ, which must send every frame from that point again. The
receiver accepts out-of-order frames and buffers them. The sender individually
retransmits frames that have timed out.
% %
o SS
vy u
1 E } 31 4 54/64) 71) 84) 24] 91) 10)] 10) ]12)]) 13] 14
Me _S ae
Error Buffered by data lnk layer Messages 2-8 passed
to network layer
ina ——_—>
Deciding factors are bandwidth, complexity of protocol, types of links (noisy and
noisy less), window size, sorting, searching, storing.
Q.3. (b) Show that the hamming code can correct one bit error in the following
case.
Transmitted code is 11101 and the code received at the receiver is 110010100.
Specify which bit has an error and correct it. (5)
Ans. Transmitted code : 11101
received code : 110010190
we know that 2pow r > n¢r+1
where n = code word of length n and r = parity bits
80
ifr =4
then 2 power 4 > +441 r
2power 4= 10
for
a.
}\ we wil] check even parity sy
ade (1120 ag
Ogg the result a.et E244 pay
y_1_110_1
(2) second paruy check on the GER oot ahs
2.§.6,7.10,11, then the corresponding waar 6 be
bit wall be
wi_110_1
cage (111
wigii10_i ;
(4) eaghth parity check oa the piven code (11101) ae will check even panty ony
201911091
The usual purpose of piggybacking is simply to gain free network access rather
than eny malicious intent, but it can slow down data transfer for legitimate users
of the
network Furthermore, a network that is vulnerable to piggybacking for network
access
is equally vulnerable when the purpose 1s data theft, dissemination of viruses, or
some
other ilhat acouity.
It's quite simple to access an unsecured wireless network: All you have to do is
get
into the range of a Wi-Fi hotspot's signal and select your chosen network from the
options
presented However, unauthorized network actess, even to free Wi-Fi, may be illegal.
People have been fined for accessing hot spots from outside businesses, such as
coffee
shops, that provide free Wi-Fi for customers’ use.
To protect your network from piggybacking, ensure that encryption is enabled for
your router. Use Wireless Encryption Protocol (WEP) if that’s your only option, but
if
: sasible use Wireless Protected Access (WPA) or WPA2. Use a strong password for
your
encryption key, consisting of at least 14 characters and mixing letters and
numbers.
Ans. A cable modem is a hardware device that allows your computer to communicate
with an Internet Service Provider over a landline connection. It converts an analog
signal to a digital signal for the purpose of granting access to broadband
Internet. A
cable modem works by connecting a coaxial cable to a jack in the wall and then
a Cat5 (Ethernet) cord from the modem to a computer or a network router. Network
routers are used to share your Internet connection between multiple computers.
The picture is an example of a traditional stand alone cable modem from Motorola,
there are also all in one modems that have a modem and router built into one box.
If
your modem cnly has one coamal cable connection and one Cat5 connection, your modem
+s a stand alone modem and needs a router to share the connection.
Ams. A virtual circuit is a circuit or path between points ina network that appears
to be a discrete, physical path but is actually a managed pool of circuit resources
from
which specific circuits are allocated as needed to meet traffic requirements.
Nate: Q No. 1 is compulsory. Attempt! qny five more questions. Select one question
fny
oooh umat. Assume misang data suitably.
2. HALF DUPLEX Mode: Half-duplex data transmission means that data canb
transm:tted in both directions on a signal carrier, but not at the same time. For
example
on a loca! area network using a technology that has half-duplex transmission, on
workstatzen can send data on the line and then immediately receive data on the lin
from the same direction in which data was just transmitted. Hence half-duple
transmussion implies a bidirectional hne (one that can carry data in both
directions
but data can be sent in only one direction at a time.
Example of half duplex is a walkie- talkie in which message is sent one at a tim
and messages are cnt in both the directions.
3. FULL DUPLEX Mode: In full duplex system we can send data in both direction
26 jt is bidirectional. Data can be sent in both directions simultaneously. We can
sem:
ag we!] as we receive the data.
In fu!) duplex system there can be two lines one for sending the data and the othe
for receiving data.
Q.1. (b) What are the responsibilities of transport layer ? Enlist. (2.5!
Ans. Transport protocols occupy layer 4 of the OSI protocol model. The protocols €
this level provide connection-oriented sessions and reliable data delivery
services. Th
transpart layer ests on top of layer 3 networking services. In the Internet
Protocol suite
TCP provides transport services, while IP provides network services. In Novell's
SPX
IPX protoce] eurte, SPX (Sequenced Packet Exchange) provides transport services,
IPX (Internetwork Packet Exchange) provides network services. Net BIOS is also#
transpert layer protocol, ; om
Transport layer protocols provide delivery guarantees that dre essential for
tranwfers and mission-critical applications. TCP uses JP, but adds the reliability
'
at (he eoet of more overhead and slightly reduced performance. These services OP"
I.P. University-[B.Tech.|-AB Publisher 2017-7
over a “virtual connection” that is established between sender and receiver. When a
session begins, the sender uses a handshaking technique to establish a connection
with
the receiver. During the session, sender and receiver engage in a dialog that
manages
the flow of data to prevent from overflowing the receiver and confirms the receipt
of TCP
segments. A communication session goes like this:
¢ Connection setup and multiplexing: The sender must contact the receiver
before its starts sending data packets. They engage ina three-way handshake
operation
to establish the connection, then start transmitting data. A single computer can
establish
multiple connections with multiple computers at the same time, a feature called
multiplexing (since the packets for these different connections are transmitted
over the
same network connection).
* Flow control mechanisms: While slow start and congestion control are used to
avoid network congestion, flow controls help prevent the sender from overflowing
the
receiver with too much data. These controls are essential because the receiver
drops
packets when it is overloaded and those packets must be retransmitted, potentially
increasing network congestion and reducing system performance. See “Flow-Control
Mechanisms.”
¢ Slow start and congestion control: Once a connection has been made, the
sender starts sending packets, slowly at first so it does not overwhelm the
network. If
congestion is not bad, it picks up the pace. This is‘called “slow start.” Later,
congestion
controls help the sender scale back if the network gets busy.
*Reliability services: These services are used to retransmit corrupt, lost, and
dropped packets. Positive acknowledgements confirm to the sender that the recipient
actually received a packet (failure to transmit this acknowledgement means “resend
the packet”). Sequencing is used to number packets so that packets can be put back
in
order and lost packets can be detected. Error checking detects corrupted packets.
Ans. Physical layer isthe lowest layer of all. It is responsible for sending bits
from
one computer to another: This layer is not concerned with the meaning of the bits
and
deals with the physical connection to the network and with transmission and
reception
of signals.
This layer defines electrical and physical details represented as 0 or a 1, How
many
pins a network will contain, when the data can be transmitted or not and how the
data
would be synchronized.
1. Representation of Bits: Data in this layer consists of stream of bits. The bits
must be encoded into signals for transmission. It defines the type of encoding i.e.
how
0’s and 1’s are changed to signal.
2. Data Rate: This layer defines the rate of transmission which is the number of
bits per second.
4. Interface: The physical layer defines the transmission interface between devices
and transmission medium.
5. Line Configuration: This layer connects devices with the medium: Point to
Fs
7. Transmission Modes: Physical Layer defines the direction of ty B
between two devices: Simplex, Half Duplex, Full Duplex. ADeMiagy
2. Routers - A router is a device like a switch that routes data packets based
their IP addresses. Router is mainly a Network Layer device. Routers normally conng
LANs and WANs together and have a dynamically updating routing table based,
which they make decisions on routing the data packets, Router divide broadcast
domaj
of hosts connected through it.
for amplifiers. Efficiency, linearity and slew rate are some of the other
parameters to!
considered when designing an amplifier circuit.
Q.1. (e) What is the difference between simple bridge and transpare
bridge ? (2.
Ans. A bridge isa type of computer network device that provides interconnecti
with other bridge networks that use the same protocol.
Bridge devices work at the data link layer of the Open System Interconnect (O$
mode], connecting two different networks together and providing communication betwe
them. Bridges are similar to repeaters and hubs in that they broadcast data to eve
node. However, bridges maintain the media access control (MAC) address table as so
as they discover new segments, so subsequent transmissions are sent to only to tl
desired recipient. Bridges are also known as Layer 2 switches.
Ans. Gateway is a device which is used to connect multiple networks and pass
packets from one packet to the other network. Acting as the ‘gateway’ between
differed
networking systems or computer programs, a gateway is a device which forms a lin
between them. It allows the computer programs, either on the same computer of @
different computers to share information across the network through protocols. A
rou!
is also a gateway, since it interprets data from one network protocol to another.
Others such as bridge converts the data into different forms between two networkia
systems. Then a software application converts the data from one format into anotn®
Gateway is a viable tool to translate the data format, although the data itself
rem@”
unchanged. Gateway might be installed in some other device to add its functi
-
LP. University-{B.Tech.}-AB Publisher 2017-9
Q.1. (g) What is the difference between polling and selecting ? (2.5)
While selecting involves the specific links interconnecting nodes At the highest
level, that 1s where the architecture ofthe network is derived. Thus a hierarchy
that
include a backbone as well as LAN’S may be defined. It is possible to permit the
backbone to be a mesh while the local access networks are constrained to be trees.
As
with node selection, the lowest level problem in link selection is determined of
the
specific number and types of links.
Q.1. (h) How do guided media differ from unguided media ? Which one is
more fast ? Give reasons. (2.5)
Ans. The first layer (physical layer) of Communication Networks the OSI Seven
layer model is dedicated to the transmission media. Due to the variety of
transmission
media and network wiring methods, selecting the most appropriate media can be
confusing-what is the optimal cost-effective solution.
When choosing the transmission media, what are the factors to be considered are-
Transmission Rate
° Distances
* Guided
* Unguided
Guided Media:
¢ Coaxial Cable
¢ Optical Fiber
Unguided Media: Transmission media then looking at analysis of using them
unguided transmission media is data signals that flow through the air. They are not
guided or bound to a channel to follow. Following are unguided media used for data
communication:
¢ Radio Transmission
¢ Microwave
¢ Satellite Communication
layer.
~ Speed of transfer) The speed for TCP is slower UDP is faster because there is no
Common Header Source pert, Destinaticn port, ~ Source port, Destination port,
Streaming of Data is read as a byte stream, Packets are sent individually and
Data flow TCP does flew control. TCP UDP does not have an option for
Error checking | TCP does error checking UDP does error checking, but no
recovery options.
Fields 1. Sequence Number, 2. AcK 1. Length
number, 3. Data offest, 2. Source port
4. Reserved, 5. control bit, 3. Destination port
Ans. Non-adaptive or static routing : Router uses a “static routing table” for
sending the data to the destination. Static routing means “every
destination_addresa
Adaptive : Router uses dynamuc routing table to send the packets to the
cestinathon.
Example protocols
RIP
OSPF
[8-IS
IGRP EIGRP.
Adaptive or dynammec routing means, “the routing table is updated with possible
paths.when a packet arrives at a router(or within a particular interval)”
UNIT-I
Q.2.(a) What is ISO-OSI model? Draw a block diagram and explain
functioning of each layer. (8)
There are n numbers of users who use computer network and are located over the
world So to ensure, national and worldwide data communication, systems must be
developed which are compatible to communicate with each other. ISO has developed
this. [SO stands for International organization of Standardization. This is called
a
model for Open System Interconnection (OSI) and is commonly known as OSI model.
The [SO-OSI model is a seven layer architecture It defines seven layers or levels
in
a complete communication system.
T= Aa iadeaneammaasl
network.
4. Voltages and data rates needed for transmission is defined in the physical laye;
this layer
3. It receives messages from the Session layer above it, convert the message into
smalle
4. Transport layer can be very
Transport layer breaks the message (
more efficiently by the network layer.
, Layer 6: The Session Layer:
1. Session layer manages an
applications.
2. Transfer of data from source
marked and are resynchronized properly,
prematurely and data loss is avoided.
will understand the information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready it
2. Transferring of files disturbing the results to the user is also done in this
layer.
Mail services, directory services, network resource ete are services provided by
application
layer.
3. This layer mainly holds application programs to act upon the received and to be
sent data.
1.OSI model distinguishes well between the services, interfaces and protocols.
Q.2.(b) For each of the following four networks, discuss the consequences
if a connection fails, (2)
Ans. Mesh is high redundancy. Only one device would be disconnected if all the
connections were to fail for that device. You can have many connections to other
devices
thats why its less likely to fail. The only cause for failure at this point is
really the
power and if you just don’t have any. Even if one of the connections between two
devices
fail there is no effect on network and they can still communicate through other
channels.
Ans. Star runs to a central device like a switch, so if the switch itself fails
then the
whole network will be disconnected.
Ans. Bus runs in a straight line from one network device to another. So if one gets
disconnect then the all the devices connected down the line get disconnect.
Ans. Ring is like a bus except it connects back onto itself. So if one device fails
they
all fail. The exception is if there is a redundant inside ring like that used in
FDDI (fiber
ring) then if both get disconnect from one device then they all do.
Q.2. (c) Given a remainder of 111, a data unit of 10110011, and a divisor of
1001, is there an error in the data unit. (2.5)
10100111
11
1001] 101100 1
1001b4
T7000
1001¥
T
1
5
1
10)
1001
1001
k N/n nv crossbars
Q.3, (c) Compare tho circuit switching, packet switching and message
Ans. Message switching was the precursor of packet switching, where messages
were routed in their entirety, ono hop at a time.
A mesvage switch is “transactional”, It can store data or change its format and bit
ate, then convert the data back to their original form or an entirely different
form #
he receive end. Message switching multiplexes data from different sources onto®
ommon facility. A message switch is one of the switching technologies.
packet deiev
Pimat tanuttwoths Druemue pentwatith Oierhesd Dynemic bandwicth
SQ rerieaat 10 Dr mt enct pecthet ‘Overbesd bits im each
uber sui sc1g packet
(NyT-0
Q4 «& Deseo siding window Pretocel in dsta link control? (8)
transmission.
Since frames currently within the sender's window may ultimately be loat o
damaged in transit, the sender must keep all these frames in ita memory for
ponaibls
retransmission. Thus, the sender must have u buffer large enough to hold as many
frames as there are in its window. The sender records the time at which every
packet is
sent. If the sender does not receive an acknowledgment for a packet before the
timeout
period elapses, it retransmits the original frame,
action. If s < NFE or #> HFA, then the frame is outside the receiver's window and
soit
is discarded. If NFE <= 8s <= HFA, then the frame is accepted,
acknowledgments are cumulative. When the acknowledgment is nt, the receiver sett
ysa't ased |, IEEE 892.5, and IEEE 802.11, and in some non-IEEE 802 networks such
as
FDDI, ws specified by the IEEE 802.2 standard.
Some non-lEFE 802 protocols can be thought of as being split into MAC and LLC
jgyers. For example, while HDLC epecifies both MAC functions (framing of packets)
sod LLC functions (protocol multiplexing, flow control, detection, and error
control
through 8 retransmussion of dropped packets when indicated), some protocols such as
Cusco HDLC can use HDLC-like packet framing and their own LLC protocol.
Another example of a Data Link Layer which is split between LLC (for flow and
error contrel) and MAC (for multiple access) is the ITU-T G_hn standard, which
provides
tugh-<peed local area networking over existing home wiring (power lines, phone
lines
end coaxial cables).
Q-5.\a) Discuss stop and wait ARQ errorcontrolin Datalink control. (8)
Ans. Aulomatc Repeat request (ARQ), also known as Automatic Repeat Query, is
a2 error-~contrel method for data transmission that uses acknowledgements (messages
semi by the receiver incheating that it has correctly received a data frame or
packet) and
timeouts i specified penods of time allowed to elapse before an acknowledgment is
to be
¢ Step-and-wait ARQ
* Go Back-NARQ
All three protocols usually use some form of sliding window protocol to tell the
transmutter to determine which (if any) packets need to be retransmitted.
These protocols reside in the Data Link or Transport Layers of the OSI model.
Typically the transmitter adds a redundancy check number to the end of each
frame The receiver uses the redundancy check number to check for possible damage.
If
the receiver sees that the frame is good, it sends an ACK If the receiver sees that
the
frame is damaged, the receiver discards it and does not send an ACK—pretending that
the frame was completely lost, not merely damaged.
One problem is when the ACK sent by the receiver is damaged or lost. In this case,
the sender doesn’t receive the ACK, times out, and sends the frame again. Now the
recevver has two copies of the same frame, and doesn't know if the second one is a
ézplisate frame or the next frame of the sequence carrying identica] data.
Ansther problem is when the transmission medium has such a long latency that
the sender's timeout runs out before the frame reaches the receiver. In this case
the
sender resends the same packet. Eventually the receiver gets two copies of the same
a Se
a
bai
frame, and sends an ACK for each one. The sender, waiting for a single ACK feds
. 1
two ACKs, which may cause problems if it assumes that the second ACK is for the Vey
frame in the sequence. Nexy
To avoid these problems, the most common solution is to define a 1 bit Seq uencg
number in the header of the frame. This sequence number alternates (fiom 0 to 1)j
subsequent frames. When the receiver sends an ACK, it includes the sequence numbe
of the next packet it expects. This way, the receiver can detect duplicated frameg
by
checking if the frame sequence numbers alternate. If two subsequent frames have th
same sequence number, they are duplicates, and the second frame is discarded.
Similarly
if two subsequent ACKs reference the same sequence number, they are acknowledging
the same frame. 7
~__ Stop-and-wait ARQ is inefficient compared to other ARQs, because the time
between
packets, if the ACK and the data are received successfully, is twice the transit
time
(assuming the turnaround time can be zero). The throughput on the channel is a
fraction
of what it could be. To solve this problem, one can send more than one packet at a
time
with a larger sequence number and use one ACK for a set. This is what is done in
Go.
Back-N ARQ and the Selective Repeat ARQ.
Q.5. (b) Describe LAN architecture along with bus and tree topologies.
(4.5)
; Ans. The architecture on which you choose to base your network is the single most
important decision you make when setting up.a LAN. The architecture defines the
speed of the network, the medium access control mechanism it uses (for example,
collision
detection, token passing, and 0 on), the types of cables you can use, the network
interface
adapters you must buy, and the adapter drivers you install.
The Institute of Electrical and Plectronic Engineers (IEEE) has defined and
documented a set of standards for the physical characteristics of both collision-
detection
and token-passing networks. These standards are known as IEEE 802.3 (Ethernet)
and IEEE 802.5 (Token-Ring), respectively. IEEE 802.11 (Wi-Fi) defines wireless
versions of Ethernet.
The most common choice today for new networks is Ethernet (both wired and
wireless). In rare cases, you may encounter a Token-Ring or ARC net network.
que 12
{
ST
jt | jc
Lae
|
oc
Above figure consists of two topologies: Bus and Tree toplogy. In bus topology
signe
from the source is broadcasted and it travels to all workstations connected to bus
“a 7
Although the message is broadcasted but only the intended recipient, whose ca
address or IP address matches, accepts it. If the MAC /IP address of machine doesnt
,
match with the intended address, machine discards the signal, tree topology is ve 0
the most common network setups that is similar to a bus topology and a star topo
ogy.
A tree topology connects one star network to other star networks.
ae
IP. University-[B. Tech }-AB Publisher 2017-19
UNIT-III
Q.6. (a) Explain difference between ARP and RARP network layer protocol.
(6)
RARP server on the router to be sent its IP address. Assuming that an entry has
been
set up in the router table, the RARP server will return the IP address to the
machine
which can store it for future use.
198 . ae : 46 ; 237
255 . 256 ; 255 : 192
11000110 01111011 00101110 11101101
and
11111111 11111111 11111111 11000000
11000110 01111011 00101110 11000000
198.123.46.192
Q.7.(a) Discuss the various design issues in network layer. (6)
Ans. The network layer has been designed with the following goals:
The transport layer (that is the host computer) should be shielded from the i
tbe,
type and different topologies of the subnets he uses. That is, all the transpo
want is a communication link, it need not know how that link is made. i:
°Yq
Finally, there is a need for some uniform addressing scheme for network addre
8
. With these goals in mind, two different types of service emerged: Connection or;
nd connectionless. A connection-oriented service is one in which the user ig pre:
liable” end to end connection. To communicate, the user requests a connection od
ses the connection to his hearts content, and then closes the connection. A tele he
all is the classic example of a connection oriented service. —_
In a connection-less service, the user simply bundles his information together, py
n address on it, and then sends it off, in the hope that it will reach its
destinattgl
ere is no guarantee that the bundle will arrive. So - a connection less service ig
on,
eminiscent of the postal system. A letter is sent, that is, put in the post box. It
is the
n the “postal network” where it gets bounced around and hopefully will leave th
etwork in the correct place, that is, in the addressee’s letter box. We can never b
otally sure that the letter will arrive, but we know that there is a high
probability tha
Q.7. (b)Explain the IPv4 protocol with header format. Compare it wit!
E (6.5
Ans.
IPv4 IPv6
The Address Space is 32 bits. The space is 128 bits.
The length of header is)\20 bytes The length of header is 40 y
crucial
Internet protocol security ( IPSec)
with repect to network security
is optional
Ss
LP. University-{B.Tech. LAB Publisher 2017-21
UNIT-IV
Q.8. (a) Explain Transmission Control Protocol with diagram. (8)
Ans.
Bits
8 16 3
pos ;
Source port Destination port
Sequence Number
Ackowledgment Number
Data offset Reserved Code Window
Checksum Urgent pointer
Options Padding
Data
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Data Offset
Reserved
Code
Window
Checksum
Urgent Pointer
Options
a m
Ans. Network congestion in data networking and queueing theory is the re.
quality of service that occurs when a network node is carrying more data than it
handle. Typical effects include queueing delay, packet loss or the blocking of he
connections. A consequence of congestion is that an incremental increase in offered
leads either only to a small increase or even a decrease in network throughput.
1. By type and amount of feedback received from the network: Loss; delay, single
bit or multi-bit explicit signals
modification.
Ans. Sockets are the most commonly used low-level interface to network protocols
[hey have been an integral part of SunOS releases since 1981. A socket is an end
post
)f communication to which a name can be bound_ A socket has a type and one assousz
srocess. Sockets were designed to implement the client-server model for mnter-P’
communication where: :
.
a
The interface to network protocols needs to accommodate server code that waits for
connections and client code that initiates connections.
Sockets make network protocols available, while behaving like UNIX files.
Applications create sockets when they are needed. Sockets work with the close(2),
read(2), write(2), ioctl(2), and fentl(2) interfaces, and the operating system
differentiates
between the file descriptors for files and the file descriptors for sockets.
Ans. SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending
and receiving e-mail. However, since it is limited in its ability to queue messages
at the
receiving end, it is usually used with one of two other protocols, POP3 or IMAP.
that let
the user save messages in a server mailbox and download them periodically from the
server. In other words, users typically use a program that uses SMTP for sending e-
mail
and either POP3 or IMAP for receiving e-mail. On Unix-based systems, sendmail is
the
most widely-used SMTP server for e-mail/A commercial package, Sendmail, includes a
POPS server. Microsoft Exchange includes an SMTP server and can also be set up to
include POP3 support.
Mail
exchanger (MX)
Ans. The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files from one host to another host over a TCP-based network,
such
as the Internet.
FTP is built on a client-server architecture and uses separate control and data
connections between the client and the server. FTP users may authenticate
themselves
using a clear-text sign-in protocol, normally in the form of a username and
Password,
but can connect anonymously if the server is configured to allow it. For secure
transmission that protects the username and password, and encrypts the content, FTP
's often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is
sometimes
also used instead, but is technologically different.
The first FTP client applications were command-line applications developed before
gl ating systems had graphical user interfaces, and are still shipped with most
indows, Unix, and Linux operating systems. Many FTP clients and automation
utilities
——
sic emaiencae:
Sixth Semester, Data Communication and Networks |
24-2017
have since been developed for desktops, servers, mobile devices, and hardw
FTP has been incorporated into productivity applications, such ag Web Page edi
i
FTP Commands
yo
FTP Replies
Data
SS Ga |
a Connection =
HTTP is also used as a generic protocol for communication between user age:
and proxies/gateways to other Internet systems, including those supported by the SM
NNTP, FTP, Gopher, and WAIS protocols. In this way, HTTP allows basic hyperme
access to resources available from diverse applications.
Ans. The W3C is an industry consortium which seeks to promote standards for |
evolution of the Web and interoperability between WWW products by producing
The Consortium is international; jointly hosted by the MIT Laboratory for Comput
Science in the United States and in Europe by INRIA who provide both local supp.
and performing coredevelopment. The W3C was initially established in collaborati
with CERN, where the Web originated.and with support from DARPA and the Europe
Commission.
Organizations may ap
isn’t offered. The W3C has ta
Transfer Protocol daemon or Web server. )
The number 10: At the front of each identifier, 10 denotes the standard data
ransfer speed over these media-ten megabits per second (10Mbps).
The word Base: Short for Baseband, this part of the identifier signifies a type of
etwork that uses only one carrier frequency for signaling and requires all network
tations to share its use.
The segment type or segment length: This part of the identifier can be a digit ora
etter:
Digit: shorthand for how long (in meters) a cable segment may be before attenuation
ets in. For example, a 10Base5 segment can be no more than 500 meters long.
Letter: identifies a specific physical type of cable. For example, the T at the end
of
0BaseT stands for twisted-pair.
The common Fast Ethernet implementations are 100 Base-TX, 100Base-FX, and
00Base-T4.
Q. 1. (b) Explain any two types of netwok topologies giving advantages and
isadvantages of each. (2)
BUS Topology: Bus topology is a network type in which every computer and network
evice is connected to single cable. When it has exactly two endpoints, then it is
alled Linear Bus topology.
Cable End
Drop Line | Drop Line Drop Line
ee EI
SA, Mie, veel
Node 1 Node 2 Node 3
pas Sixth Semester, Data Communication and Computer Netwy k
t
(b) If network trafic is heavy or nodes are more the performance of the ne
decreases.
RING Topology
Ring Topology ‘
tl
rat ‘
Ed
Pe
(a) Transmitting network is not affected by high traffic or by adding more nol
only the nodes having tokens can transmit data.
ps \byte usually escape character ESC)), which has a predefined but pattern is
see to Oe Jata section of the frame when there is a character with the same patter
get Quy Whenever the receiver encounters the ESC character, it removes frem the
il wechon and treats the next character as data, net a flag But problem arises 4
hen
ao atti one or more escape characters followed by a flag. To solve this problem,
— characters that are part of the text are marked by another escape character
the escape character is part of the text, an extra one is added to show that the
ad ore 18 part ef the text.
econ
Bit stuffing -
Mostly fag is a special S-bit pattern "01211110" used to define the beginning and
_T Gg ~
je end of Loe Tame
Probiem ath the flag is same as that was in case of byte stuffing. So, in this
protocol
abst ve do 1s, if we encounter Q and five consecutive 1 bits,an extra 0 is added
after
-hese nts. This extra stuffed bit is removed from the data by the receiver.
The extra bit 1s added after one 0 followed by five 1 bits regardless of the value
cf
spe auxt Sit. Aise, as sender side always knows which sequenee is data and which ts
flag
twill voly add this extra bit in the data sequence not im the flag sequence.
Ans.
FDDI was later extended to FDDI-2 for long distance voice and multimedia
cmmunicatien. Organizations use this medium for voice and video conferences, online
‘ectures, news and ather multimedia.
Q. 2. (a) What is ISO-OSI Refernce Model? Compare and contrast with TCP’
——
Sarai ee ee eee SSO
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Datalink Layer
. Physical Layer
how wo have the complete representation of the OSI model, showing all the lay
d how they communicate with each other.
NOP ewe
r IF
<<: . + Presentator protocat -- Pro
ose == -- Seon pratanal---—-~- SPDU
> - == epee protocot -------- SPOu
_Commuricaton subret proteco!
J hetwons layer host router protocol
‘ a “—
fe Network, hen | Past
i oa bac SD a» aa
| Cata tink layer host-(cuter protocol
a ee ee § -
es De ep. pmo Onda Ue Daan ena Frame
Pye ayer fost: router protocol
oak a ; Ba
- pt-tem OF ---> Phys a4
; | sles: ee ihe. al
°F Laverury 2 Tardis dleaty Bisnis
4 1 aLw
ee wate See WS 19°8 vpanied
1 1d-F
Lia prvaania usat sod tan data
" i Minvcmpitiantore |
a _ iene ;
is O50 crude: the croEmepec: Lager i is TCP? model the ranspert layer |
O85] made haa 2 seperace | & TCPTP cces not have a separate
wt tb Edens tok i
Terworg layer of OS] model provides | & The Necwork layer in TCP!IP model
at mad
“wilees termnce.
ys
€-2018 Sixth Semester, Data Communication and Computer Network
f
& OST model has a problem of fitting | 9 TCP/IP model does not fit any Brats
techno! ay changes. s
ui Osi cate fines services, interfaces | 11. In TCP/IP, services, interfacea aay
and protocols very clearly and protocols are not clearly separate h, |
makesclear distinction between also protocol dependent i
——.
Q. 2. tb) Is PPP a bit a or byte oriented protocol .Give its frame format, «
Ans. Although HDLC is a general protocol that can be used for both POiNt-to-pe,
and multi- point configurations, one of the mast common protocols for point- to-pe,
access is the Point-to-Point Protocol (PPP). Today, millions of Internet users who
ny
to connect their home computers to the server of an Internet service provider use
Pp
The max nity of these users have a traditional modem; they are connected to the
Intery
throuch a telephone hne, which provides the services ‘of the physical layer. PPP
prowg
several services:
2. PPP defines how two devices can negotiate the establishment of the link and
exchance of data
3. PPP defines how network layer data are encapsulated in the data link frame
4. PPP defines how two devices‘can authenticate each other.
2. PPP has a Very simple mechanism for error control. A CRC field is used to dete
srrers Ifthe frame is corrupted, it is silently discarded; the upper-layer protocol
nee
o take care of the problem. Lack of error control and sequence numbering may cau*
acket to be received out of order.
3. PPP does not provide a sophisticated addressing mechanism to handle framet’
rultipaint configuration.
The frame format of PPP resembles HDLC frame. Its various fields are:
7
Fiza Access Control Flag |
1. Flag field: Flag field marks the beginning and end of the PPP frame. Flag byt
O1T11110 (1 byte).
I.P. University-(B.Tech]-Akash Books 2018-7
ress field: This field is of 1 byte and is always 11111111. This address is the
s™ address /-€. all the stations accept this frame.
yr control field: This field is also of 1 byte. This field uses the format of the
U-
ymbered) in HDLC. The value is always 00000011 to show that the frame
(u ‘ s
om of contain any sequence numbers and there is no flow control or error control.
ye rotocol field: This field specifies the kind of packet in the data field i-e-
what
4 arried in data field.
“en field: Its length is variable. If the length is not negotiated using LCP during
get up, 4 default length of 1500 bytes is used. It carries user data or
joe tion.
pet informa
4, FCS field: The frame checks sequence. It is either of 2 bytes or 4 bytes. It
contains
checksum.
4 g.2 (c) What are the maximum throughputs of ALOHA and Slotted ALOHA
yrandom acccss. (2)
Ans. Pure ALOHA and Slotted ALOHA both are the Random Access Protocols, that
-e implemented on the Medium Access Control (MAC) layer, a sublayer of Data Link
gyer. The purpose of the ALOHA protocol is to determine that which competing
station
sgst get the next chance of accessing the multi-access channel at MAC layer. The
main
ference between Pure ALOHA and Slotted ALOHA is that the time in Pure Aloha is
»itinuous whereas, the time in Slotted ALOHA is discrete.
The formula to calculate the throughput of the Pure ALOHA is S-=G*e*-2G, the
soughput is maximum when G=1/2 which is 18% of the total transmitted data frames.
Incontrast to the Pure ALOHA, Slotted ALOHA does not allow to transmit the data
senever the station has the data to be send. The Slotted ALOHA makes the station to
«at till the next time slot begins and allow each data frame to be transmitted in
the
zw time slot.
Synchronization can be achieved in Slotted ALOHA with the help ofa special station
bat emits a pip at the beginning of every time slot as a clock does. The formula to
alculate the throughput of the Slotted ALOHA is S=G*e*-G, the throughput is
saimum when G=1 which is.37% of the total transmitted data frames. In Slotted
\LOHA, 37% of the time slot.is empty, 37% successes and 26% collision.
$
‘
ad p 7 a rei OS f -;
~
se
Caller
ae ; 4
In packet switching, as each packet travels a different path hence, the packet ,.,
oN ae of order ateubne side and later arranged in order. On the other hand
circuit switching the entire message is received as it is as sent from a sender to
Teceive,
Q. 3. (b) Give advantages of optical fiber over twisted pair and Co-axial cable
(3;
Optical fibers are difficult to tap. As they do not radiate electromagnetic enerft
emissions cannot be intercepted. As physically tapping the fiber takes great skill
o @
undetected, fiber is the most secure medium available for carrying sensitive data.
(g) Flexibility
An opneal fiber has greater tensile strength than copper or steel fibers of the ss?
perme me: is flexible, bends easily and resists most corrosive elements that &
copper cable
.. al
a
in) cost materials for glass are plentiful, unlike copper. This means glass can be
rhe . cheaply than copper.
opt me (c) To send data at a data rate of 12 Kbps over a noiseless channel with
Qs ath of 3 KHz; how many signal levels are required? (2)
ee _ 2x Bandwidth x log,(L)
12
iin log,(L)
log,(L) = 2
L = 27 =4 levels,
get. (a) In CRC, if a data word is 4 bits and codeword is 7 bits, how many 0’s
added to the data word to make the dividend? What is the size of the divisor
* the remainder? Explain with an example.
i) Re Dataword = 4 bits
24+3
27
Divisor = 4 bits (It is 1 more than no. of bits (zeros) appended after data word)
Example:
Tit TNOAL
1101)10010 0 0
1104
0 0 14 Remainder
Q. 4. (b) Give flow diagram and explain the working of Go-back -N ARQ.
(3)
Ans, Go-Back-N protocol isa sliding window protocol. Itis a mechanism to detect
contro} the error in datalink layer. During transmission of frames between sender
eh vers ifa frame is damaged, lost, or an acknowledgement is lost then the action
'
np aree ae 4 a ¥
10-2018 Sixth Semester, Data Commumicaton and Computer Neterark
. Sender ae Rece!ver
lyse <a
| 5
ee
———
Data.
il
r ~~ Data X—___Damagedortost |
i stl } we dod
nl —4 ‘
— Data_3.—_ ~ eae -
b UN ts Menard
| ata 4——
a ee Discarded
SY
Resent +—
Data 2
Resent ~Data Py
— r Se 2
eee |
Resent
{ i
Time Tiere
Lost frame
The receiver checks the number on each frame, it receives. If a frame number ts
skipped in a sequence, then the receiver easily detects the loss of a frame as the
newly
received frame is received out of sequence. The receiver sends the NAK for the lost
frame
and then the receiver discards all the frames received after a lost frame. The
receiver
does not send any ACK (acknowledgement) for that discarded frames. After the sender
receives the NAK for the lost frame, it retransmits the lost frame referred by NAK
and
also retransmits all the frames which it has sent after the lost frame.
Lost Acknowledgement
If the sender does not receive any ACK or if the ACK is lost or damaged in between
the transmission. The sender waits for the time to run out and as the time min
outs, the
sender retransmits all the frames for which it has not received the ACK. The sender
—
identifies the loss of ACK with the help of a timer.
The ACK number, like NAK (negative acknowledgement) number, shows the number _
of the frame, that receiver expects to be the next in sequence. The window size of
the |
receiver is ] as the data link layer only require the frame which it has to send
next to
network layer. The sender window size is equal to ‘w’. If the error rate is high, a
lot ef
bandwidth is lost wasted.
LP. University-{B.Tech]-Akash Books 2018-11
= Explain the — — problem in WLAN. (2)
q+ ireless networking, the hidden node problem or hidden station problem
poten a node I visible from a wireless access point (AP), but not from other nodes
oF jcatiN with said An leads to difficulties in media access control.
"go awire eless network, it is likely that the node at the far edge of the access
point’s
a ich is known a8 A, can see the access point, but it is unlikely that the same
can see 3 a node on the opposite end of the access point’s range, B. These nodes
are
cote hidden. The problem is when nodes A and B start to send packets
is aes to the access point. Since node A and B can not sense the carrier, Carrier
ultiple access with collision avoidance (CSMA/CA) does not work, and collisions
@
mu
nse
- sc cramb blin
oe
I, ;
ynction with t
o
. q
RM EXAMINATION (MAY-JUNE. 9,
SIXTH SEMESTER [B.TECH] 4
END TE
Time :3 hrs.
Note: Q. no. lis com pulsory. Attempt any five more questions from the resp n
a W ~
Data communications are the exchange of data between two devices vig ~—
of transmission medium such as a wire cable. For data communications to iy
communicating devices must be part of a communication system made up ‘f
combination of hardware (physical equipment) and software (programs), Th
effectiveness of a data communications system depends on four fundamenty)
characteristics: delivery,accuracy, timeliness, and jitter.
1. Delivery- The system must deliver data to the correct destination. Data mut
be received by the intended device or user and only by that device or user,
2. Accuracy- The system must deliver the data accurately. Data that have bee
altered in transmission and left uncorrected are unusable.
3. Timeliness- The system must deliver data in a timely manner. Data delivered
late are useless, In the case of video and audio, timely delivery means delivering
data
as they are produced, in the same order that they are produced, and without
significant
delay. This kind of delivery is called real-time transmission.
4. Jitter -Jitter refers to the variation in the packet arrival time. It is the
uneven
delay in the delivery of audio or video packets. For example, let us assume that
video
packets are sent every 3D ms. If some of the packets arrive with 3D-ms delay and
othen
with 4D-ms delay, an uneven quality in the video is the result.
Q. 1. (b) State the differences between OSI and TCP/IP models. (5)
Ans. pe
Basis for TCP/IP Model OSI Model
Comparison ene
jaternet Protocol is one of the major protocols in the TCP/IP protocols suite.
ae col works at the network layer of the OSI model and at the Internet layer of
vs uP model. Thus this protocol has the responsibility of identifying hosts based
yh ji Jogical addresses and to route data among them over the underlying network.
” ovides & mechanism to uniquely identify hosts by an IP addressing scheme. IP
ae effort delivery, i.e. it does not guarantee that packets would be delivered to
ae post, but it will do its best to reach the destination. Internet Protocol
version
pe els logical address.
ra rnet Protocol being a layer-3 protocol (OSI) takes data Segments from layer-4
a t) and divides it into packets. IP packet encapsulates data unit received from
(IP Encapsulation)
necess
Ocet 4 13
0 Version IHL oscp EN Total Length
15
ry Identification | Hogs . Fragment Offset
4
Af.
A Time to Live Protocol Header Checksum
12 Source Address
3
a Destination Address
a Maiiiiege 0s ier gt Dh Be Re oe es es See. a1
' ’
2% Options t
Rew ww nw wwe mee we aw we ene ew een eee wee meena ween ewww em wen eee =
[Image: IP Header)
. feed :
fragments contain same identification number. to identify 5 Misg |
Tiging, &&
they belong to- Ip &
° Flags: As required by the network resources, if IP Packet is too la ~
these ‘flags’ tells if they can be fragmented or not. In this 3-bit flag, hn
always set to 0’. &. the My
¢ Fragment Offset: This offset tells the exact position of the ¢,
original IP Packet. "een |,
* Time to Live: To avoid looping in the network, every packet js wens a)
TTL value set, which tells the network how many routers (hops) Ri &,
cross. At each hop, its value is decremented by one and when the ie
zero, the packet is discarded. =
¢ Protocol: Tells the Network layer at the destination host, to which Pry
packet belongs to, i.e. the next level Protocol. For example protogg| Mie
ICMP is 1, TCP is 6 and UDP is 17. BBibes y
* Header Checksum: This field is used to keep checksum value of entire
which is then used to check if the packet is received error-free. head
¢ Source Address: 32-bit address of the Sender (or source) of the packet
¢ Options: This is optional! field. which is used if the value of IHL is greater
ths,
5. These options may contain values for options such as Security, Record Rex,
Q. 1. (d) Can two hosts in different networks have same link lnpenr ell
Explain. F |
Ans. Yes. Link-local addresses, much like MAC addresses, do not cross a router, i
the scope to which duplicate addresses can cause a problem is quite limited.
Linksieall
addresses need to be unique to the broadcast domain, and unique among the link-oat
network addresses reached by the hosts who are members of that broadcast docs
|
but cant create a conflict beyond that as long as the network is following the
rules oft
link-local addresses are supposed to be used.
Q. 1. (e) Define Switch and discuss the need of switching.
Ans. In a network, a switch is a device that channels incoming data from soy
multiple input ports to the specific output port that will take it toward its”
destination.
A Network Switch is a constituent of computer network that connects twone””
can be
slices and/or two network devices (switches or routers) together. Switch can kes!
as a network bridge with multiple ports which helps to process and route P®
encapsulation.
Ul
“A LP University-(B Tech}-Alcagh Boule yO1s-15
3
h
ype HEY tocol, It ie a data link contrel protocol, and falls within lmyer 2. Une
ip .
are of the Open Systems Interface (OST) mudel.
wg boon #0 widely implemented because it supports beth half duplex and full
* munication lines, point 10 point peer to peer) and multi-point networks. and
we of nan awitehed channels. The procedures outlined in HDLC are designed to
a mynenronuss code-transparent data transmission, Other benefits of HDLC ure
ae control information ia always in the same position, and specific bit patterns
we <7 control differ dramatically from those in representing dota, whach reduses
the
at
: of orrore
ae nos ale led to many subsets. Two subsets widely in use are Synchronous Dats
or a pre ;
epic representavion of a HDLC frame with an information field.
a
Flag \
[re Address | Control 0119999990 Fc ring
\.
Ans. Sockets can be named with an address #0 that processes can connect to them.
The socket layer treats an address as an opaque clyect. Applicauons supply and
recerve
addresses AS tagged, vanable-length byte strings.
Addresses always reside in a memory buffer (mbuf) on entry to the socket Inver A
data structure called a sockaddr (see Socket Address Data Structures) can be used
o&
a template for referring to the ident fying tag of each socket address.
_— =
a
' MN€ctiong M (
between the Physical layer and the network layer. This laye; conve ia hi ;
transmission facility provided by the physical layer to a reliable and error fren
ny |
The main functions and the design issues of this layer are uk
Framing
* Error Control
* Flow Control
In the OSI Model, each layer uses the Services of the layer below it and p
Services to the layer above it The data link layer uses the Services offered by the
physi) |
layer.The Primary function of this layer is to Provide a well defined 8Ervice
interface j,
network layer above it.
{__NETWORK LAYER |
(_DATALINK LAYER ]
88 service
- Oriented Service
| a —s
fi.
, Prane Header
‘ Payload field that containe the data packet from network Inyor
» Trailer
Krror Control
The data link layer ensures error free link for data transminsion. The ianues it
enters
owith respect to error control are
Flow Control
The data link layer regulates flow control so that a fust sender does not drown a
low receiver, When the sender senda frames at very high speeds, a slow receiver may
rot be able to handle it. There will be frame losses even if the transmiasion is
error-free.
The two common approuches for flow control are
window protocol with transmit and receive window sizes equal to one and greater
than
She respectively, ... Afler receiving a valid frame, the receiver eenda an ACK,
:
d
eo
14-2038 Sixth Memester, Data Commumention and Compute, Mase
Stop-and-wait ARQ
pL rare ,
“pd
| er
v 9
° Ifacknowledgement does not come in time, the sender aaasumes that etnier
frame or its acknowledgement |s lost in transit. Sender retranemite the frame ant
og
the timeout counter.
Data
fA
a
sae eee
ssscaaed
t
Common
aee channel
tesuasd eve
Data
Silent
Aloha Protocols
FDMA, on the other hand, is an access method in the data link layer. The data link
o make a bandpass signal from the data
\tiplexer at the physical layer. The signals created at each station are
automatically
:dpass-filtered. They are mixed when they are sent to the common channel.
In time-division multiple access (TDMA), the stations share the bandwidth of the
annel in time. Each station is allocated a time slot during which it can send data.
ch station transmits its data in is assigned time slot. The following figure shows
the
ea behind TDMA.
20-2018 Sixth Semester, Data Communication and Computer N
etwo
Tk
Oata
Data
CDMA simply means communication with different codes. CDMA differs from,
because only one channel! occupies the entire bandwidth of the link. It differs
from}
because all stations cansend data simultaneously; there is no timesharing.
Implementation:
Let us assume we have four stations 1, 2, 3, and 4 connected to the same chs
The data from station 1 are dl, from station 2 are d2, and so on. The code assign
the first statiomis c1, to the second is c2, and so on. We assume that the
assigned:
d, 7]
o3 GI
dy Cy d2.%
mmon
dy Cy + G2 Cz + dyCy + yy prs.
Data
dy cy dy.C4
4
LP. University-(B.Tech}-Akash Books 2018-21
’ a6 0 on the channel are the sum of all these terms, as shown in the bor.
p stion that wants to receive data from one of the other three multiplies the
oe ve channel « eo of the sender. For example, suppose stations 1 and 2 are
gat” ach other. Station 2 wants to hear what station | is saying. It multiplies the
- os channel by cl the code of station1. ine .
acsuse cch-cl) is 4, but (c2 . cl), (c3. cl), and (c4 cl) are all 0s, station 2
divides the
py 4 to get the data from station].
gt bY
* 1g « (dl cl+d2.c2+d3.c3+d4_c4).c1
ic dl. cl+ cl. d2. 2+ c1. d3. c3+ cl. d4. cf 4d1
Q.3. (b)What are the advantages of FDDI over a basic token ring. (6.5)
ans. As opposed to Token Ring’s single ring, FDDI, uses two to achieve better
results
sjess chance of failure.
_|na basic Token Ring network, at any instant there is a single active ring monitor
ch supplies the master clock for the ring, whereas in FDDI this approach isn't
ideal
suse of the high data rates. Instead, each ring interface has its own local clock,
and
Unlike the basic Token Ring, which is based on the use of priority and reservation
. the priority operation of the FDDI ring uses a principle that is based on a
parameteT
wn as the Token Rotation Time, or TRT.
.FDDI uses a timed token protocol where Token Ring uses priority/reservation token
ss, leading to differences in frame format and how station traffic is handled
Q. 4. (a) Explain distance vector routing algorithm with the help of a suitable
imple. (6)
Ans. Distance Vector is simple routing protocol which takes routing decision on the
uber of hops between source and destination. A route with less number of hops is
sidered as the best route. Every router advertises its set best routes to other
routers.
imately, all routers build up their network topology based on the advertisements of
r peer routers,
Bellman Ford Basics - Each router maintains a Distance Vector table containing
distance between itself and ALL possible destination nodes. Distances,based on a
sen metric, are computed using information from the neighbors’ distance vectors.
* Intermediate hops
* Distance to itself = 0
.,
22-2018 Sixth Semester, Data Communication and Computer y
Sty
eny
* It discovers that a link to a neighbor has gone down. '
The DV calculation is based on minimizing the cost to each us
Dx(y) = Estimate of least cost from x toy NAtieg ;
C(x,v) = Node x knows cost to each neighbor v |
Hama
‘te
avery 4
2> = 8+r
Putting r = 4 satisfied eq. (2) since 24 > 12. Thus 4 parity bits are rear:
seven data bits to construct the Hamming code and these parity bits will being
first second fourth and eight position. )
So, f—-| =
t Eg sae 5
Dj; Dio Dg Os
tT To be detected
D, Dg Ds Pg Dy Po Ps
occur when the load on the network (i.e. the number of packets sent at
greater than the capacity of the network (i.e. the number of packe |
ding:
as words when too much traffic is offered, congestion sets in and performance
0
wea
ry
Maximum Carrying Perfed
Capacity of subnet
' Desirable
8
& Congested
:
ao
Packet sent :f
Concept of Congestion
Congestion Control refers to techniques and mechanisms that can either prevent
ongestion, before it happens, or remove congestion, after it has happened.
Congestion
ontrol mechanisms are divided into two categories, one category prevents the
congestion
fom happening and the other category removes congestion after it has taken place.
Congestion
control
Open loop
| |
fi | | |
Retransmissi Acknowledgmen
Closed loop
1. Open loop
2. Closed loop
The various methods used for open loop congestion control are;
(a) Retransmission Policy
* The sender retransmits a packet, if it feels that the packet it has sent is lost
or
corrupted.
Cty,
ceives it ma
¥ HOW do,
be
May ue
Backpressure Method
4 LP. University-{B. Tech}-Akash Books 2018-25
i 908.34.54.12
ii. 238.34.2.1
iii. 114.34.2.8
Ans. 0000:0015:0000:0000:0000:0001:0012:1213
The leaky bucket is used to implement traffic policing and traffic shaping in
Ethernet and cellular data networks, The algorithm can also be used to control
metered-
bandwidth Internet connections to prevent going over the allotted bandwidth for a
month,
thereby avoiding extra charges. ;
Suppose we have a bucket in which we are pouring water in a random order but we
have to get water in a fixed rate, for this we will make a hole at the bottom of
the bucket.
It will ensure that water coming out is ina some fixed rate, and also if bucket
will full
we will stop pouring in it.
The input rate cam vary, but the output rate remains constant. Similarly, in
networking, a technique called leaky bucket can smooth out bursty traffic. Bursty
chunks
are stored in the bucket:and sent out at an average rate.
clas
144 12Mb
42 ad
10-44
a-
B® 45) Bursty Flow 67
4-4
: 2-4 2 Mbps
it hasten.
012345678910
Bursty Data
14
1244
10-7
4
re 3 Mbps
274
& LS GA SPS) FD See a a
4& — Fixed Flow 012345678910
Fixed Data
—
Without the leaky bucket, the beginning burst may have hurt the ,,
consuming more bandwidth than is set aside for this host. We can alg, see tk, |
leaky bucket may prevent congestion. thay thy
2. If n is greater than the size of the packet, send the packet and decreme
counter by the packet size. Repeat this step until n is smaller than the Packet ih,
The Microsoft Windows Server 2003 operating system includes a DHCP Serye ,
service, which is an optional networking component. All Windows-based clients
include
the DHCP client as part of TCP/IP, including Windows Server 2003, Microsoft
Windows XP, Windows. 2000, Windows NT 4.0, Windows Millennium Edition (Window |
Me), and Windows 98.
Benefits of DHCP
In Windows Server 2003, the DHCP Server service provides the following benefits
, ie tea wap Foti A baaas iM? watweges by uscy ¥ VAACY relay wget, tos
anti toa taal I, bewite @ LACH eopyes 0 every esl é a
th) The seen pray Wie 122 Ouatomers; wach nents 128 eAdresses.
(0) Dhow Uhl peep hee 128 onlay, omc meade 64 addresens.
freeizn Ihe wads bin bee wold Find oud bow nowy widresece eve wil) availabe
afer harem wll whisstcm. (12.6)
ry
Shepy
F
a
wo hog, ON)
16 © hog, (OO590/16224)
1 «dog, (4) = 16 « 2 hog,
#1642018
fy, @ 189 lop, COGBEIESES) = 16
A, oe Mee hog, GHGE192) « 19 (16 + 2) « 19.
19) 1K €329076
‘Y
NAG RGD 190 190 959 290%
\, G 7)
ry
(8. (e) Whas is FTP. Horm files are transferred using FTP. (6)
Ans, OTP canta for Pile Trenster Proven Lo 2 putehell, FTP is used to transfer
umngted blasted ve prbathy waa VTP batore, eves if you didn’t realze it. If you
have
henwtleated, wonetiana fro the lovertet, each es 9 new version of en spplication,
it is
very yatta teat yo aed FTP Ys Ge ws.
PTY ie alas frequently used ese way to trauafer web peges. PTP allows new web
pages treater by an ttadervtual w shew ap on Ue icternet. PTP essentially transfers
there wat, pags flee i the anopolet eerver w others cen sovess them PTP cen also be
oaed ty doowalosd Dles or programe from the loternet to your computer. When you
dewiitad thaws let, you ere trenslerring them from other servers through FTP.
FTP can allow yoru Ww traneler Olea over eny two computers, as long es they both
have en Leternet conection. You cnn dhare folders that contein data like mumc, Word
Bervssnatns wid peters
Wier: (lee are tearaterd through KTP, une f two actsons it happening - uploading
ot dreticad.ng Upeating invelres Ueselerring Oles from a persona] computer Wo a
28-2018 Sixth Semester, Data Communication and Compute, Sills: e
=
TCP‘|P is basically the language that the Internet uses to Carry ou Conny
Lf you are going to use File Transfer Protocol in order to downloaq files tad, Ny
keep security concerns in mind. Files downloaded from the Internet Poy
that can harm your computer. —_ hav, Sa
One way to use PTP is to go through an FTP client. FTP clients may —~
your computer to download/‘upload files and help you avoid malware and ea. Peas,
chents are pricey, while some are completely free. Using an FTP chent want Boma
a
step for transferring folders, but 1t may make uploading and downloading fij.. a.
Q. 8. (b) Explain the DNS in terms of name space, resource recorg He
server. ing
Ans. Domain Name System he!ps to resolve the host name to
uses a hierarchical naming scheme and distributed database of Ip br addr
associated names “reste Rg
Domain Name System Architecture
The Domain name system comprises of Domain Names, Domain Na
Name Server that have been described below: Srany
Domain Names: Domain Name 1s a symbolic string associated with an [p
There are severa! domain names available; some of them are generic Fuch as rem
ov, net etc, while some country level domain names such 28 au, in, za, us «
F .
| pomain Namo Space: The domain name space refers a hierarchy in tho internet
! ag structure This hierarchy has multiple levels (from 0 to 127), with a root at
the
G on fom i A te “Borg
a: ~~
te colorado ©@
@kin
mana roxy
In the above diagram each subtree represents a domain. Each domain can be
partitioned into sub domains and these can be further partitioned and so on.
Name Server
Name server contains the DNS database. This database comprises of various names
and their corresponding IP addresses. Since it is not possible for a single server
to
maintain entire DNS database, therefore, the information is distributed among many
DNS servers.
Zones
Zone is collection of nodes (sub domains) under the main domain. The server
maintains a database called zone file for every zone.
edu zone
5 °° emu
stanford
CH
berkeley.edy zone
If the domain is not further divided into sub domains then domain and zone refers
to the same thing.
The information about the nodes in the sub domain is stored in the servers at the
lower levels however; the original server keeps reference to these lower levels of
servers
30-2018 Sixth Semester, Data Communication and Computer Network
Following ure the three categories of Name Servers that manages the tins
Name System.
* Root Server “s
¢ Primary Server
° Secondary Server
ROOT SERVER
Root Server is the top level server which consists of the entire DNS tree. It q
‘ontain the information about domains but delegates the authority to the oth. ma
PRIMARY SERVERS
Primary Server stores a file about its zone. It has authority to Create, main
and update the zone file. a,
SECONDARY SERVER
which may be primary or secondary server. The secondary server does not have 4
to create or update a zone file.
wa
FIRST TERM EXAMINATION [FEB. 2019]
SIXTH SEMESTER [B.TECH]
i LS brs: i
The frame is still a unicast frame, since it has a specific destination mac address
its header. The switch doesn’t change any header data in the frame.All the devices
receive the frame will compare the destination mac address in the frame with their
mac address and drops the frame if it doesn't match.
In flooding the switch sends the frame to all because it doesn’t know how to reach
destination.
In broadcasting the host that created the frame itself addressed the frame to
ryone.
Ans. Bit stuffing is the process of inserting non information bits into data to
break
bit patterns to affect the synchronous transmission of information. It is widely
din network and communication protocols, in which bit stuffing is a required part
he transmission process. Bit stuffing is commonly used to bring bit streams up to
mmon transmission rate or to fill frames. Bit stuffing is also used for run-length
ited coding. :
onde
Q.1. (c) Which are of the terms given below are essential in creating &
intaining an open market and guarantee national & international
'Toperability of data & telecommunication technologies & processes. (1)
©) Files
(d) Forums
=; Sessions
4 4
o>] ”
2-201 3y > : :
1p Sixth Semester, Data Communication and Networ,,
ai Q.1. (©) Which of the following ITU-T standard defines the ing, :
a terminal device & packet switching network? Tface
‘ Ans. When bits are transmitted over the computer network, they ay, i
orrupted due to interference and network problem. Below is the differ, Subject u
multiple bit error and burst error: ie, betyet
* Multiple bits error- In the received frame, more than one bits ar
eco
Received 1 1 2 0 [ 04 1, |
ec 0 1 ; i |
Frame |
¢ Burst error “ In the received frame, more than one consecutive bits are corry,
Pted
Sent Frame
Received frame 1° \ | ’
Channel >
Idle
Host B-
r IP. University-{B Tech}—Akash Booke 2019-3
mptions:
nest calulate the window size use value of n as 2.
w gait the missing values,
)é
2 The timeout values for oll three protocols are sufficiently long such that
ih ytive frames and their corresponding ACKs can be received.
; fi a the follow ing questions by assuming a set-up.
0 How many frams has Host A sent in total and how many ACKs has Host B
ee yotal? What are their sequence numbers? Answer this question for all
t
ee rotocols. (10)
» ge which protocol successfully delivers all five daata segments in shortest
vjnterval?
«In stop and wait ARQ. We use sequence numbers to numbers the frames
aot ace nurnber are based on module 2-anthmetiec.
one a K no always announce, in module 2 arithmetic the a@quence number of the next
agit? expected
whereas, In Go Back N protocol the sequence numbers are module 2*, where m is
jn selective re peat ARQ use, the send window, size 19 27-' and the renieve window
ofthe same #176 of aend window ie. (2°!)
af tl
5,
; 2,4,5,6
&, GO Back N = Sequence of framea = « and ACK’S = a
1,293, 495
(ales, “Sida,” (become
2,3,4,5
r
seq = aan Sa & ACK's = 4
2,4,5,6
6 4
Ans,
Core
Distribution
Access
Each layer in the three-tier hierarchical model has a unique role to perform:
Q.3. (b) A channel has a bandwidth of 6 kHz, what is the channel capacity if
signal to noise ratio being 34. For same channel capacity, if signal to noise «
is increased to 68, then, what willbe the new channel bandwidth?
30780 = B*6.12
B = 5029 Hz = 5.29 kHz
30.78 kbp?)
LP, University-(B. Tech -Akanh Hooks 2019-5
fn ag, Single Mode cable is a single Stand of glass fiber with a diametor of 8.3 to
10
that has one mode of tranaminsion, Single Modo Fiber with a relatively narrow
git through which only ono mode will propagate typically 1310nm or 1650nm. It
wn higher bandwidth than multimode fiber, but requires a light source with a narrow
anal width
ian multimode, The amall core and ainglo light-wave virtually eliminate any
jortio” that could result from overlapping light pulues, providing tho least signal
is
a
i hwation and the highest transmission apeods of any fiber cable type.
{ie
gingle-mode optical fiber is an optical fiber in which only the lowest order bound
je can propagate at the wavelength of interest typically 1300 to 1320nm.
m0!
Multimode cable is mado of of glass fibers, with a common diameters in the 50-
_.100 micron range for the light carry component (the moaticommon sizo is 62.5).
POF
4 newer plastic-based cable which promises performance similar to glass cable on
vahort runs, but at a lower cost,
Multimode fiber gives bandwidth at high speeds over medium distances. Light
aves are dispersed into numerous patha, or modes, aa they.travel through the
cable's
a typically 850 or 1300nm. Typical multimode fiber core diameters are 50, 62.5, and
iW micrometers. However, in long cable runs (greater than 3000 feet 914.4 ml),
multiple
saths of light can cause signal distortion at tho receiving end, resulting in an
unclear
Q. 4. (a) Demonstrate that the hamming code can correct one bit error in
he following case. Transmitted code is 11101 and the code received at the
eceiver is 110010100. Specify which bit has error and correct it. (4)
Ans. Refer Q.3. (b) of First Term Examination 2017, (Page No. 3,4-2017)
Q. 4. (b) What kind of error is undetectable by checksum? (2)
Ans, At least three types of error cannot be detected by the current checksum
culation. First, if two data items are swapped during transmission, the sum and the
tecksum values will not change. Second, if the value of one data item is increased
atentionally or maliciously) and the value of another one is decreased
(intentionally
‘maliciously) the same amount, the sum and the checksum cannot detect these
changes.
hird, if one or more data items is changed in such a way that the change is a
multiple
(216-1, the sum or the checksum cannot detect the changes.
tnd if the token is not received then it will generate a new Token.
" duplicnte token appears: Then it will accept the token which is sent first and
“ard the duplicate token,
=
Q.1. (a) What are the key design issues of a data communication network
(2.5)
Ans. A number of design issues exist for the layer to layer approach of computer
networks Some of the main design issues areas follows: .
Flow Control: |{ the rate at which data is produced by the sender is higher than —
the rate at which daté is received by the receiver, there are chances of
overflowing the —
receiver So, a proper flow contre! mechanism needs to be implemented.
1. Delivery: The system must deliver data to the correct destination. Data must » 7
recerved by the intended device or user and only by that device or user. |
2. Accuracy: The syetem must deliver the data accurately. Data that have de" |
aliered in tranemessien and left uncorrected are unusable.
4. Timeliness: The syetem must deliver data in a timely manner. Data det we
late are oxeless Im the case of video and audio, tmely delivery means deliverina
4s they are produced, in the same order that they are produced, and without sage
delay This kind of delivery uw called real-time transmission. Z
3
|.P. UniversityB.Tech}-Akash Books 2019-7
jitter refers to the variation in the packet arrival time. It is the uneven
iter very of audio or video packets. For example, Jet us assume that video
“a ihe out? 3D ms. If some of the packets arrive with 3D-ms delay and others
pias se ag uneven quality in the video is the result.
a gd e receiver waits until its network layer passes in the next data packet.
Ans. Anetwork must be able to meet certain number of criteria. The most important
«Performance, Reliability and Security.
+ Performance: Can be measured by transit time and response time. Transit time
he amount of time required fora message to travel from one device to another.
sponse time is the elapsed time between an inquiry and a response. The performance
snetwork depends on the number of users, the type of transmission medium, the
exities of the connected hardware and the efficiency of the software.
‘Security: This refers to the ability to protect data from unauthorized access
QI. (e) What are the responsibilities of Data Link Layer? (2.5)
~ 1. Framing: Frames are the streams of bits received from the network layer
Manageable data units. This division of stream of bits is done by Data Link Layer.
A Physical Addressing: The Data Link layer adds a header to the frame in order
rhage address of the sender or receiver of the frame, if the frames are to be
te to different systems on the network.
bow cam Control: A flow control meckanism to avoid a fast transmitter from running
i ver by buffering the extra bit is provided by flow control. This prevents traffic
. receiver side.
tie} Control: Error control is achieved by adding a trailer at the end of the
ada, On Of frames are also prevented by using this mechanism. Data Link
mechanism to prevent duplication of frames.
88-2019 Siath Semester, Data Communic ation and Networks
Q.1. (D What are the differences between port address, logical agg.” lin
Physical addreas? "eng, ana
which two systems physically connected with each other with cables. The addrong sri
NIC ia called Physical address or MAC address, This is apecified by the manuf =
company of the card. This address is used by data link layer
nrun with a port no. (logically) on the computer, This port no, for Spplien
is decided by the Kernel of the OS. This port no. is ealled port addrens Ue |
Q.1. (g) Describe bit interval, bitrate and baud rate. (ay |
Ans. Bit rate and Baud rate, these two terms are often used in data communicatj, 7
Bit rate is simply the number of bits (e,, 0's and 1's) transmitted in per unit 4
“a
While Baud rate is the number of signal units tranamitted per unit time that ig ne
re
to represent those bits The crucial difference between bit rate and baud rate that
one
change of state can transfer one bit, or slightly more or less than one bit that
relieg ~~
the modulation technique used. Hence, the given equation defines the relation
between |
the two:
Bit interval: Data can be represent by a digital signal For Example :al cants .
encoded as a positive voltage anda Ocan be encoded as a zero voltage . The bit
interval )
is the time required to send one single bit , This means that the bit rate is
number of
bits sent in one second, usually expressed in bits per seconds (bps),
Q.1. (h) Explain how QoS is provided through integrated services. — (2.5) _
(ii) Flow Specification: While making reservation, resource needs to define the
flow epecification. The flow specification has two parts:
(a) Resource specification: It defines the resources that the flow needs to reser?
For example: Buffer, bandwidth, etc.
(iii) Admit or deny: After receiving the flow specification from an applica the
router decides to admit or deny the service and the decision can be taken bas¢
previous commitments of the router and current availability of the resource:
ACture,
,
(2.5)
the wastage of IP addresses in a block, we
d bits of a classful IP address. We give the
r mask along with it (usually followed by a
umber of subnets: Given bits for mask ~ No. of bits in default mask
I. Post address: AND result of subnet mask and the given IP address
jroadcast address: By putting the host bits as 1 and retaining the network bits
3. ddress
IP aac
yin Faumber of hosts per subnet: 2(32 — Given bits for mask) — 2
4.
first Host ID : Subnet address + 1 (adding one to the binary representation of the
spnet address)
§
(7.5)
Ans. Refer Q.2. (a) First Term Examination 2018. (Page No. 3-2018)
Ans. A data circuit-terminating equipment (DCE) is a device that sits between the
data terminal equipment (DTE) and a data transmission circuit. It is also called
data
ommunication(s) equipment and data carrier equipment. Usually, the DTE device is
the terminal (or computer), and the DCE is a modem.
Data terminal equipment (DTE) is an end instrument that converts user information
into signals or reconverts received signals. These can also be called tail
circuits. A DTE
device communicates with the data circuit-terminating equipment (DCE). The DTE/
DCE classification was introduced by IBM.
V.35 is a high-speed serial interface designed to suppprt both higher data rates
and
smnectivity between DTEs (data-terminal equipment) or DCEs (data-communication
*quipment) over digital lines.
fa transfer from one computer network to another computer network through telephone
Mes. The computer network works in digital mode, while analog technology is used
for
. vd Messages across phone lines. Modulator converts information from digital mode
ay °§ mode at the transmitting end and demodulator converts the same from
at receiving end. The process of converting analog signals of one computer
nto digital signals of another computer network so they can be processed bya
‘omputer is referred to as digitizing.
rk
Treg
—
10-2019 Sixth Semester, Data Communication and Networks
When an analog facility is used for data communication between two digital devices
called Data Terminal Equipment (DTE), modems are used at each end DTE can be a
terminal or a computer
Analog Slynal
Ougrral Figral P J Signa
a Li. —e en e's I 1 fa
bead Tetephone Line —
edu! stianDelodulaton
The modem at the transmitting end converts the digital signal generated by DTE
into an analog signal by modulating a carrier. This modem at the receiving end
demodulates the carrier and hand over the demodulated digital signal to the DTE
The transmission medium between the two modems can be dedicated circuit or a
switched telephone circuit. Ifa switched telephone circuit is used, then tho modems
are
connected to the local telephone exchanges, Whenever data transmission is required
connection between the modems is established through telephone exchanges.
Transmitter
(Modutator) mn > Transmission
Digital Tine medium
To OTE4——44 interface} interface
Receiver
(Demodulator)
Talaphone
—s instrument
Bulding blocks of a modem
Synchronous modems typically consist of four sections, as shown in Fig. (a). The
transmitter, receiver, terminal control and power supply. The transmitter section
of a
synchronous modem typically consists of timing (clock), scrambler, modulator,
digital
to analog converter gnd equalizer circuits. The expanded block diagram is shown in
Fig.
below. The timing circuit provides the basic clocking information for both the
modem
and the data terminal equipment (DTE) that is providing the data to be transmitted.
The internal timing is usually controlled by a crystal oscillator to within about
0.05% of
Transmitter
Public
Telephone Data Terminal
ee | Terminal Equipment
Control
i——| Power
r—|_ Supply
Receiver
yt pulse
é
Data ——___-»
7 Ba H move {e——>
Start bet Stopbit
Data -——
Asynchronous modem
Q3.(b) What is data detection code.? Explain any two with suitable example.
(5)
,ns. Error Detecting Codes: In digital communication system errors are
eqosferred from one communication system to another, along with the data. If these
ors are not detected and corrected, data will be lost, For effective communication,
gta should be transferred with high accuracy ‘This.canbe achieved by first
detecting
ye errors and then correcting them.
Error detection is the process of detecting the errors that are present in the data
cansmitted from transmitter to receiver, in ® communication system. We use some
wjundancy codes to detect these errors, by adding to the data while it is
transmitted
om source (transmitter), These codes are called “Error detecting ccdes”.
Panty Checking
Check Sum
(a) Parity Checking: Parity bit means nothing but an additional bit added to the
jata at the transmitter before transmitting the data. Before adding the parity bit,
aumber of 1’s or zeros is calculated in the data. Based on this calculation of data
an
stra bit is added to the actual information/data. The addition of parity bit to the
data
wil result in the change of data string size.
This means if we have an 8 bit data, then after adding a parity bit to the data
binary
amng it will become a 9 bit binary data string-Parity check is also called as
“Vertical
Redundancy Check (VRC)”.
— is two types of parity bits in error detection, they are:Even parity, Odd
ty
ec Even Parity: If the data has even number of 1's, the parity bit is 0. Ex: data
is
“000001 -> parity bit 0 . Odd number of 1’s, the parity bit is 1. Ex: data is
10010001
> Panty bit 1
ine, Parity: If the data has odd number of 1's, the parity bit is 0, Ex: data is
“101 -> parity bit 0
Qven number of 1’s, the parity bit is 1. Ex: data is 10010101 -> parity bit 1
ery i ee eh ee
12-2019 Sixth Semester, Data Communication and Networks
Note: The counting of data bits will include the parity bit also. |
The circuit which adds a parity bit to the data at transmitter is called “Parity _
generator”. The parity bits are transmitted and they are checked at the receiver.
Ifthe
parity bits sent at the transmitter and the parity bits received at receiver are
notequal
then an error is detected. The circuit which checks the parity at receiver is
called “Parity
checker”
(b) Cyclic Redundancy Check (CRC): A cyclic code is a linear (n, k) block code
with the property that every cyclic shift of a codeword results in another code
word. Here
k indicates the length of the message at transmitter (the number of information
bits).
nis the total length of the message after adding check bits. (actual data and the
check
bits). n, kis the number of check bits. The codes used for cyclic redundancy check
there
by error detection are known as CRC codes (Cyclic redundancy check codes).Cyclic
redundancy-check codes are shortened cyclic codes. These types of codes are used
for
error detection and encoding. They are easily implemented using shift-registers
with
feedback connections. That is why they are widely used for error detection on
digital
communication. CRC codes will provide effective and high level of protection.
CRC Code Generation: Based on the desired number of bit checks, we will add
some zeros (0) to tho actual data. This new binary data sequence is divided by a
new
word of length n + 1, where n is the number of check bits to be added . The
reminder
obtained as a result of this modulo 2- division is added to the dividend bit
sequence to
form the cyclic code. The generated code word is completely divisible by the
divisor that
is used in generation of code. This is transmitted through the transmitter.
Example
Lit
1011 1101000
1011
1100
1011
1110
1011
1010
1011
Each cell is allocated a portion of the total frequency spectrum. As users move
into
agven cell, they are then permitted to utilize the channe) allocated to that cell.
1. Fixed: FCA, fixed channel allocation: manually assigned by the network operator
2. Dynamic:
In Fixed Channel Allocation or Fixed Channel Assignment (FCA) each cell is given
a predetermined set of frequency channels. FCA requires manual frequency planning,
which is an arduous task in TDMA and FDMA based systema, since such systems are
highly sensitive to co-channel interference from nearby cells that are reusing the
same
channel. Another drawback with TDMA and FDMA systems with FCA is that the number
of channels in the cell remains constant irrespective of the number of customers in
that
cell. This results in traffic congestion and some calls being lost when traffic
gets heavy
in some cells, and idle capacity in other cells.
802. 11h wireless local area network standard. DFS is also mandated in the 5470-
5725
MHz U-NII band for radar avoidance.
Q.5. (a) What is ALOHA? Discuss how slotted ALOHA is different from Pure
ALOHA. (6.5)
Aloha is a multiple access protocol at the datalink layer and proposes how
mnultiple
terminals access the medium without interference or collision. In 1972 Roberts
developed
a protocol that would increase the capacity of aloha two fold. The Slotted Aloha
protocol
involves dividing the time interval into discrete slots and each slot interval
corresponds
to the time period of one frame. This method requires synchronization between the
sending nodes to prevent collisions.
Pure ALOHA and Slotted ALOHA both are the Random Access Protocols, that are
implemented on the Medium Access Control (MAC) layer, a sublayer of Data Link
Layer.
The purpose of the ALOHA protocol is to determine that which competing station must
get the next chance of accessing the multi-access channel at MAC layer. The main
difference between Pure ALOHA and Slotted ALOHA is that the time in Pure Aloha is
continuous whereas, the time in Slotted ALOHA is discrete.
ee ee
—— 4 ‘ bs , 9
+@- BE 1p feiwth Skerweetes Late ( waiuudication abd Ped weiga ae
(Prame Trenemiesion The user can ranemit the The user haw ty wast bait wy,
abd ¢ i
tranemithed
|
{
Hl
'
t
|
}--
Time rs ;
EY .
= | lites aD distrete ” ll
| Suorenaful Tranemimein |! The probatality of successful | The probability of
Cusceeagad
| transimdeson of the duta raneiiieswwurn of the date i
frame is frame ia
S = G* e4.2G 8 = GrerG
stcshstcmnnileeaselleommesnanesiions shi ath sasedemmumnnndaciicsil
‘Throughput e The maimum throughpat | be marinus throughs
looowrs at Gs 1/2awhiels eocurs at G «= | which is 7%
} ie La% yao {
Q-5. (b) Explain HDLC frame formate. te ee
Ane. High-Level Data Link Control, ales know as HDL, 10 » bit oriented, Pwitehed
end nep-ewitebed protoce) It is « data link contre! protoonl, and falls within
layer 2 Uw
Date Link Layer, of the Open Systems boter{soeOS1) model ,
HDLC specifies the following three types of stations for data link control
(a) Primary Station: Within a network using HDLC as it’s data link protooul, fa
cunfiguration is used in which there is a pnmary station, it is used as the
controlling
etatuon on the lank. Jt has the responsibility of controlling all other stations on
the
link! usually secondary stanens). Despite this important aspect of being on the
Link, the
primary etatien is also responsible for the organization of data flow on the link.
Jt also
takes care of error recovery at the data link level(Jayer 2 of the OSI model).
(6) Secondary Station: If the data link protocol being used is HDLC, and a pnmary
elation is present, a secondary etation must also be prevent on the data link The
secondary station 1s under the control of the primary station. It has no ability,
or diret
reepunsilulity for controlling the Jink. It is only activated when requested by the
primary
station It only responds to the primary station. The secondary station's frames are
culled responses. It can only send response frames when requested by the primary
Fle tion
J I i a: si
Unij 1 y (B ‘ 1} Akan h
vers t Tert a Books
j Of itee|
tat kh No other stations elf, ani ¢
(a
one oT me
ore ‘
x secondary Stations. The unbalanced
Balanced Configura :
(b) EDO hd tion: The balanced confi a
frwo oF more combined station Bach of th Kuration in an HDLC link consist
responsibility compared to each other Bele stations have equal and complimentary
‘ 1 Re > Ms
1 erm nears Mode: Thai the modMMMMMe ine primary station
iaitia » Necondary station. The secondary stati ly transmit
sponse when, and only wt it j ry station can only tr
9 fe8P y when, it is instructed to do so by the primary station. In
gher words, the secondary station must receive explicit be P ? peered
n to transfer a response. Afte ; icit permission from the primary
gato “sponse. Alter receiving permission from the primary station,
the gooundary station initiates it's transmission. Thistransmission from the
secondary
station to the primary station may be much More than just an acknowledgment of a
frame. It may in fact be more than one information frame. Once the last frame is
transmitted by the secondary station, it must Waitonce again from explicit
permission
to transfer anything, from the primary station. Normal Response Mode is only used
mthin an unbalanced configuration.
(4i) Asynchronous Response Mode: In this mode, the primary station doesn’t
itgtiate transfers to the secondary station. In fact, the secondary station does
not have
to wait to receive explicit permission from the primary station to transfer any
frames.
The frames may be more than just acknowledgment frames. They may contain data, or
control inforraation regarding the status of the secondary station. This mode can
reduce
overhead on the link, aa no frames need to be transferred in order to give the
secondary
station permission to initiate a transfer. However some limitations do exist. Due
to the
fact that this mode is Asynchronous, the secondary station must wait until it
detects
and idie channel before it can transfer any frames. This is when the ARM link is
operating
at half duplex. If the ARM link is operating at full-duplex, the secondary station
can
transmit at any time. In this mode, the primary station still retains
responsibility for
error recovery, link setup, and link disconnection. ; .
(iii) Asynchronous Balanced Mode: This mode uses combined stations. There is
to need for permisaion on the part of any station in this mode. This is because
combined
#ations do not require any sort of instructions to perform any task on the link.
Normal Response Mode is used most frequently in multi-point lines, where the
primary station controls the link. Asynchronous Response Mode is better for pot to
Mint links, as it reduces overhead. Asynchronous Balanced Mode is not used widely
‘day
The “asynchronous” in both ARM
plex operation
are
1 Normal Disconnected Model DM)
2. Aaynchrotious Disconnected Model ADA)
I Initialization Mode(IM)
HDL frame format: The contenta of an HDLC frase are shown it tha fairing
table
TABLE: Frame Format of HDLC
4 bite bite
Note that the end flag of one frame may he (but does not have to be) the beginning
(atart) Nag of the next frame,
Data is usually sent in multiples of 4 bits, but only some varianta require this;
others theoretically permit data alignmenta on other than #-bit boundanes
If the receiver's calculation of the PCS does not match that of the sender's,
indicating
that the frame containa errors, the receiver can either send a negative acknowledge
packet to the sender, or send nothing After either receiving a negative acknowledge
packet or timing out waiting for a positive acknowledge packet, the sender can
retransmit the failed frame.
The FCS was implemented because many early communication links had a
relatively high bit error rate, and the FCS could readily be computed by simple,
fast
circuitry or software. More effective forward error correction schemes are now
widely
used by other protocols.
UNIT-III
Ans. (1) This is a Class C network. We require a mask that provides 32 subneta. /
24 has no subnets,
(ii) There are 3 host bits remaining and 24= 8. Two addresses are not available
hence a mnaximum of 6 hosta can be used,
- eo
ee
IP Uoivermity.4 1 Teth)-Abash Hooke oie iT
i, 37:100
7 . ) Write short notes on ICMp and ICMPyg. -
4 JCMP (Jniternet Control Mezeage Protuenl) is an error-rep rung priarze
jevices hike rouLlers use tg Benerale error Heneeges ty the svurce IV adcrens
prewar problema pre vent delivery ALP packets ICMP creates and senda mceunget
wo mare [P address indicating that a gateway to the Internet that @ router, eT VIO
oO cannot be reached for packet delivery. Any IP network device has the cepellsty
ih receive oF process ICMP Meseages.
won ICMP messages also contain the entire IP header from the onignal meriege,
wend systern knows which packet failed
The ICMP header appears after the IPv4 or IPv6 packet header and is identfied xs
P protocol number 1. The complex protocol contains three fields
2The minor code that contains more information about the type field: and
Error messages : Error messages report errors in the forwarding or delivery of IFA®
~ckets by either the destination node or an intermediate router. The high-order bit
of
“e@-bit Type field for all ICMPv6 error messages is set to 0. Therefore, valid
values for
“# Type field for ICMPv6 error messages are in the range of 0 through 127. ICM P+s6
wed messages include Destination Unreachable, Packet Too Big, Time Exceeded, ond
‘ameter Problem.
Type field for ICMPvG information messages are in the range of 128 through 255.
‘ ICMPy6 informational messages described in RFC 4443 include Echo Pequest and
fhe
> Reply There are additional JCMPv6 informational] messages defined for Mob:le
‘
Wages.
Sa
tet me a “ - = 2 ‘
7 ‘ “+ Semester, Deta Commanataten aad Net worg,
ae oe et
¢ Ohetummetaos. | cureetinacie TM Pv Tppe i
= Pectet Ths Big (CMP Ee Type 2
Fume Eerwedied [CWP 4 Trge 2
& Perasmeter Pouhiem SMPs Type 4
To Expdacc distance vector coaimyg and link state routing
Aas.) Gstanrecertar mating DVR) pretacei requires that @ rouge, indi a,
MOP al hep: chhecge+ gerudeailu Histercally Keown as the cud Preis.
TUILES BigMrceme of cxewn 14 Avilauen-Ford adgomthm at
Eel Ford B % - Lach rveter macntame a Dwtance Vector table con,
Vat Com=amee termes self aad ALL preabie Gestation codes. Distances neg
Tene Te. are nezuted usumg formate from che nevghbors’ chstanc,. reiting a
inflvematics sepa by DW roczer - :
ach router to learn the entire network topology Based on thi« learned topology.
or is the? able to compute its routing table by using a shortest path computation.
es of link state routing protocols —
age -
gf rou
“ tT
eatv
, pink state packet ~ A «mall packet that contains routing information.
pink state database - A collection information gathered from link state packet.
’
calculation of shortest path - To find shortest path, each node need to run the
samo™8 piykstra algonthm. This famous algorithm uses the following steps
yn
step}: The node 1s taken and chosen as a root node of the trée, this creates the
tree
pasingle node, and now set the total cost of each node to some value based on the
wrmation in Link State Database
oe .
step-2: Now the node selects one node, among all the nodes not in the tree like
gructure, which 1s nearest to the root, and adda this to the tree. The shape of the
tree
49 changed
Step-3: After this node ia added to the tree, the cost of all the nedes not in the
tree
seeds to be updated because the paths may have been changed.
Step-4: The node repeats the Step.2. and Step 3 ‘until all the nodes are added in
the tree
the IPvd Addressing system is divided into five classes of IP Addresses. All the
five
classes are identified by the first octet of IP Address.
The first octet referred here is, the left most of all. The octets numbered as
follows
depicting dotted decimal notation of 1P Address “
11000000 .10101000.00000001.10011000
192 : 168 , 1 ‘ 152
4” Octet
The number of networks and the number of hosts per class can be derived by this
ormula-
meno be assigned to hosts, i.e. the first IP of a network is network number and the
last
‘STeserved for Broadcast IP.
fis ts A Address: The first bit of the first octet is always set to 0 (zero). Thus
the
octet ran
4
2) 2G Mats Swrester, Data Commanicatpon and Net wort
OOP00R0)] ~ GLILILII
t = 327
Claw A addresses only rnelude ( starting from Dace ate L2G a cory The 1F renin
127.1 2 x ie reserved for loophack IP addresens
Tht default subnet mask for Claas A IP address i¢ 255.0.09 which Cpe thas
Chass A addresming can have 126 networks (27-2) and 16777214 howta ‘Eady
AS TP address which belongs to clase BD has the firet too bite in the First ortet
ens te
IO,ve
1N9HHNGD - LOUIE
123 - 191
Class B IP Addresses range from 128.0 1.1 to 191 255.08 The detauls SHAE maak
for Clase Bis 295 255.4%
Clase B has 16984 (214) Network addresses dnd G6554 (216-2) Host addrasseg
Class C Address: The first octet of Clase.C IP address has its first 5 bit, tat b,
110, that ts *
11600009 = IMOOLINMN
192 ~ 223
Class C IP addresses range from 198.0 Swt3223 285 255 1. The default wjhees
mask for Class C is 255.255.2565,
Class D Address: Very first fozir bits Othe first octet in Claes D IP addresses gre
Class D has IP address range from 224 0 0 0 to 239 255 255 255 Class D is reserved
for Multicasting. In multicasting data is not destined for a particular host, that
is why
there ts nd need to extract hast address from the IP address, and Claas D does not
have
any submet mask
Class E Address: This [P Class is reserved for experimental purposes only for R&D
or Study. IP addresses in this class ranges from 240.0 0 0 to 255.255 255.254. Like
Claas
D, this class too is net equipped with any subnet mask.
UNIT-IV
Q8.(a) Explain the SMTP and HTTP. Give their uses, strengths and
weaknesses. (7.3)
Ans. SMTP is part of the application layer of the TCP1P protocol. Using a procesa
talled “store and forward,” SMTP moves your email on and acrosa networks It works
cesely with something called the Mail Transfer Agent (MTA) to send your
communication
to the right computer and email inbox.
SMTP spells out and directs how your email moves from your computer's MTA to an
MTA on another computer, and even several computers. Using that “store arid forward
-
gost ETT WE ETR®, Bie Sey cast ality Tiwl tacns wrt) acta) et Al fates ° Gewese wy
Pane ert wae Uh una camtagritions Magenie gesatinscns tos Great savtaetinngy wile
_ae cma iT aw wena: ey sey Lonel gonenmellf agente te lager anon & pesaree-
ee wer Lg ee er) ‘cane wet w Sere ‘Siteee! wtieas eevee y ectncan) pire ve eee
sas ymner ecaman: Te Saaane Mats Decent Pree se STP Wits a. gee
OT ennai
seer
gut? 2 pew v tue Beppe ipyer wf the WOR proven emer e yrvenee tab baet,
ogee ot (ocweed " MTF peeves your etuaet! oT fn Nl weestga Ceemery
ST? provetees ut
gh ¢ numer vom
actu SUNT) a tre mavet prevmient of tie 2omal prvveodie tt latte eotne of Sue
Sl matures oR AU 4 poms weakuen of Samtiet NTP oe toe ieee. of wugport for
Ser Mswmagees.
en Tr ne
ee! Lime Voru Wier Wan ane the gruvucu! Geliue wore meseagen ame fortuatied out
BUS Wat acum Wed Mewes end Srowment nei wae me tempura ty
y ‘ Netwe
22-2019 Sixth Semester Data Commumeation and Networks
ate 4
4.Not Connection Oriented - No network overhead to create and maintain BUS ion
state and information
Disadvantages of HTTP:
4. Tuo verbose,
6. No Push Capabilities
Q.8. (b) Explain user datagram protoco! with neat diagram. (5)
Both UDP:and TGP runoon top of the Internet Protocol (IP) and are sometimes
referred to ag UDP/1P or TCP’1P, But there are important diflerences between the
two
In addition, where TCP provides error and flow control, no such mechanisms are
supported in UDP. UDP is considered a connectionless protocol because it doesn't
require
a virtual circuit to be established before any data transfer occurs.
UDP provides two services not provided by the IP layer. It provides port numbers to
help distinguish different user requests and, optionally, a checksum capability to
verify
that the data arrived intact. F
TCP has emerged as the dominant protocol used for the bulk of internet
connectivity due to its ability to break large data sets into individual packets,
check
for and resend lost packets, and reassemble packets in the correct sequence. Bat
these additional services come at a cost in terms of additional data overhead and
delays called latency.
In centrast, UDP just sends the packets, which means that it has much lower
bandwidth overhead and latency. With UDP, packets may take different paths
between gender and receiver and, as a result, some packets may be lost or rece!
out of order.
‘.” _
elix
user datagram protocol features
: atagram protec hag attr:
qhe uset d th Am) | veo) hag attributes that make i advantageous for use woth
jeation that can tolerate lost data
sf jt allows packets to b
oo i ‘Tye :
ka # Topped and received in a different order than they were
ak 7 nf 4 “ "
qsmitted, maKing it suitable for rea) tune uppheationa whe re latency might be 9
concert.
yi can be used for trane ;
protocol (NTP)
jrcan be used where a large number of clients ure connected and where real-Lmae
eTTor
gprection isn't necessary, such as g ming, vurce or video conferencing and
streaming mea
UDP header composition. UDP uses headers as part of packaging message data
transfer over network connections. UDP headers con.ain a set of parameters called
The User Datagram Protocol header has four fields, each of which is 2 bytes-
They are:
(b) Destination port number, the port the datagram 1s addressed to,
(c) Length, the length in bytes of the UDP header and any encapsulated data: and
(d) Checksum, which is used in error checking. Its use" required in [Pv6 and
optucnal
in Pv4
a. 15. 16 31
Source port Destination port
UDP length Checksum
Q.9. Write a short note on any three of the following: (12.5)
Ans. DNS: The Domain Name System (DNS) is a hierarchical decentralized naming
system for computers, services, or any resource connected to the Internet or a
private
network. It associates various information with domain names assigned to each of
the
participating entities. Most prominently, it translates more readily memorized
domain
names to the numerical IP addresses needed for the purpose of locating and
identifying
computer services and devices with the underlying network protocols. By providing a
worldwide, distributed directory service, the Domain Name System is an essential
component of the functionality of the Internet, and has been in use since the
1980s. It
was created in 1983 by Paul Mockapetris.
Ans. FTP: The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files between a client and server on a computer network.
FTP is built on a client-server model architecture and uses separate contro) and
data connections between the client and the server. I'TP users may authenticate
i pe acai: Pe
Ba Dig rth Sementer Date Commurncetion and Networks
ems) ere 6 ay cheer ad wenn protecul, normally in the form of g Wer Lam.
PenewUrs but cam emer anonymously if the server 1 configured to allow itp. * ®t
Sauer, Lunt priests the username aud paseword, end encrypts the
wes uecuret with SOL/TLE (PTPS) SSH File Transfer Protocel (SFTP) ip uh Pp
tas beet omeerd but up wechualugically diferent ea
The Gra FTP vheut applications were command-line programs developed
MAP ELT rveieme bet prephical user interfaces, and are etal] thu pped “me
Waster Ue and Lens operating eyes Many PTP cheats and automation a
eve ee been developed for desktops, servers, nubile devices, and hardware.
PT? tune teen cuourpureted inte producurity epplications, such as web page editens
G2 a wwe
Ams. WWW: The WSC as an ndustry consoruum which seeks to promote tandardy
for te ew ict uflue Web aud smeroperabibty between WWW products by produc
tecdicetions eutreferencs softwere Although WSC ws funded by industria} membe’
Som vendor -twutre end ce products are freely available to all. .
Toe Commute omterngtiona): yomntly hosted by the MIT Laboratory for Compute
Souenee = Le omed States and io Europe by INRIA who provide both loca} Suppor
but periomiunyp coredievelopment The WC was initially established in collaboration
won CHEN where the Web ongnced end with ecpport from DARPA and the Eurypee,
BEET.”
Orpen mer epp'y for members hap tothe Consortium: individual membership
wit alered The WSC nav tele ower whet wes formerly called the CERN Hypertert
Tremeler Frocvcu caemon or Web server