Here Are The Answers For The Questions in The Image
Here Are The Answers For The Questions in The Image
Question 1
(ii) Distinction between Frequency Division Multiplexing (FDM) and Time Division Multiplexing
(TDM):
FDM: Divides the available bandwidth into distinct frequency bands, with each channel
being assigned a specific frequency range for simultaneous transmission.
TDM: Divides time into slots, and each channel is assigned a time slot to transmit signals in
sequential order.
(c) Reasons for using specific hardware devices: (i) Bridge: Connects two or more LAN segments,
enabling communication and managing traffic within the same network. (ii) Router: Connects
multiple networks and directs data packets to their destinations, typically between LANs and the
internet. (iii) NIC (Network Interface Card): Provides the physical interface for a computer to
connect to a network and enables data communication.
Question 2
(a) Explain the terms as used in feedback-based flow control techniques: (i) Stop-and-Wait: A
method where the sender transmits one frame and waits for an acknowledgment before sending the
next frame. (ii) Sliding Window: A technique allowing the sender to send multiple frames before
needing an acknowledgment, with a fixed-size window defining the number of frames allowed in
transmission.
Peer-to-Peer: All nodes are equal, and resources are shared directly between devices
without a central server.
Client-Server: A centralized server manages resources and services while clients request
resources from the server.
(c) (i) Explanation of the term "broadcast": Transmission of data from one source to all devices in
the network. (ii) Two types of wireless transmission media:
Here are the answers for the questions in the second image:
Question 2
1. To secure sensitive data during transmission over untrusted networks like the internet.
Question 3
(a) (i) Two components used as Data Terminating Equipment (DTE) in a computer network:
1. Computers or workstations.
Parity Check: Adds a single parity bit to a data frame to ensure the total number of 1s is
either odd or even. It helps detect single-bit errors.
Cyclic Redundancy Check (CRC): Uses a polynomial algorithm to generate a checksum that is
appended to the data. The receiver uses the same algorithm to verify the integrity of the
data.
(ii) Two circumstances that would necessitate the use of Bluetooth in an office:
1. For short-range wireless communication between devices like keyboards, mice, and printers.
2. To enable file sharing and data transfer between mobile devices and computers.
1. Simplex: Data flows in one direction only (e.g., keyboard input to a computer).
2. Half-Duplex: Data flows in both directions, but only one direction at a time (e.g., walkie-
talkies).
3. Full-Duplex: Data flows in both directions simultaneously (e.g., phone calls).
Question 4
3. macOS Server.
4. Novell NetWare.
(b) (i) The most appropriate network topology for the given setup:
Diagram: (not included but can be described as a central node with lines connecting it to 6
computers, 1 printer, and 2 terminators).
1. Failure of the central hub or switch results in the entire network going down.
Sign-up: The process of registering for an account by providing details like username, email,
and password.
Sign-in: Logging into an existing account using credentials like username and password.
1. Verify compatibility with the computer's operating system and hardware specifications.
(ii) Three advantages of installing software on the computer's hard disk instead of running it from
a DVD:
Question 5
(b) Distinguish between CSMA/CD and token ring media access methods:
CSMA/CD (Carrier Sense Multiple Access with Collision Detection): Used in Ethernet
networks to detect and handle data collisions.
Token Ring: A method where a token circulates in the network, and a device can send data
only when it holds the token, preventing collisions.
(d) Determine transmitted data using a 4-bit checksum system for the given bits:
Let me know if you need help with specific calculations or additional details!