0% found this document useful (0 votes)
8 views

Design of computer network

The document discusses various networking concepts including Time Division Duplexing, L2CAP functions, and comparisons between 802.11 and 802.16 standards. It also covers Bluetooth applications, radio layers, congestion control methods, and network design phases. Additionally, it highlights factors affecting network efficiency and the importance of understanding customer business styles.

Uploaded by

huanjir521
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Design of computer network

The document discusses various networking concepts including Time Division Duplexing, L2CAP functions, and comparisons between 802.11 and 802.16 standards. It also covers Bluetooth applications, radio layers, congestion control methods, and network design phases. Additionally, it highlights factors affecting network efficiency and the importance of understanding customer business styles.

Uploaded by

huanjir521
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Q1- Explain in details Time Divisions Duplexing?

The base station periodically Sends owt frames. Each frame contains time slots. The first one for
downstream Traffic then comes a grand time used by the stations to switch direction Finally we have
slots for upstream Traffic.

Q2-The L2CAP layer has three major Functions Mention And Describes Them?

1-it accepts Packets Of up to 64KB From The upper layers and breaks them into Frames for Transaction

2-it handles the multiplexing and demultipleing of multiple Sources.

3-it handles ability of service requirements

Q3-Compare between 802.11 And 802.16 Standard?

802.11: 1-deals With mobility 2- use half Duplex communication 3-Low frequency range (2.4Gh³) 4-
Support of real time traffic 5- Limited graphical area 6- Designed to be mobile Ethernet

802.16: 1-deals with buildings 2-use Full-duplex communication 3- High frequency range 4- Support of
applications 5- Large graphical area 6- Designed to be Wireless

Q4-Mention The Bluetooth application and describe of them?

Intercom profile – services discovery – Headset profile - LAN Access Profile - Fax Profile – Serial port
profile - Generic Access Profile

1-Intercom profile: allows tow telephone to connect as walkie-talkie

2- Services discovery: Used by devices to deliver what services other devices have to offer

3-Headset profile: Provides Hands-free voice communications between the headset are its base station

Q5-describe in details the 802.11 farmer structure?

1-Protocal version: Which allows tow version of the protocol to operate at the same time in the same
Cells 2- Type: data , Control, or Management 3- Subtype filed: RTS or CTS 4-5 : To Ds and from Ds bits
indicates the frame is going or coming from the intercool distribution system 6-MF bit: more fragments
will follow 7- Retry bit: makes a retransmission of a frame seat earlier 8-Awer Management bit: Used by
base station to put the receiver into sleep stake or take it owt of sleep state 9- More bit: The Sender has
additional frames for reactive 10- Wbit: The frame body has been enclosed using WEP 11- O bit: Tells
the receiver that a sequence of frames with this bit on result be processed strictly in order
Q6-Explain Wavelength Divisions multiple access protocol?

To Allow multiple transactions at the same time each station is assigned tow channels A arrow Channel is
provided as a control Channel to signal the Station and a Wide Channel is provided so the station can
output data frames

M>The number of slots In the control channel

N+1> The of slots in the data channel

Where N from data and last one from status each station has 2 transmitter and 2 receiver 1-Fixed-Wave
length receiver from listening to its own control Channel 2-A tunable transmitter from sending on other
stations control Channel 3- A Fixed-Wavelength transmitter for outputting data Farm 4- A tunable
receiver for selecting a data transmitter to listen

Q7-Describe The Bluetooth Radio Layer?

1-The Radio Layer moves the bits from master to slave or vice versa 2-it is allow-power system with a
range of to meters operating in 2.4GHZ ESM band 3- The band is divided into channels, each 1 hz 4-
modulation is frequency shift Keying, with 1 bit per Hz giving a gross data rate of 1Mbps,bwt much of
this spectrum is consumed by overhead 5-FHSS is used with 1600 hops/sec and devell time of 625Msec

Q8-The 802.11 Standard specific five transactions Techniques allowed in the physical layer mention
them?

1-Infrared 2-FHSS 3-DSSS 4-OFDM 5-HR_DSSS

Q9-Define EIFS(Extended interframe Spacing)?

is used only by a station that has just received a bad or unknown frame to report the bad frame

Q10- What is CSMA/CD?

is a media access control method that was widely used in Early Ethernet technology/LANs when there
used to be shared Bus Topology and each node ( Computers) was connected by Coaxial Cables.

Q11-what is the difference between congestion control and flow control?

Congestion control: is applied in network and transport layer – Triggered when network routers or links
become overloaded with excessive traffic – Found in TCP/IP protocols to manage congestion in networks
like the internet.

Flow Control : Found in protocols like TCP to adjust the sender’s data rate based on the receiver’s
readiness. – is typically used in data link layer – Prevents the receiver’s buffer from overflowing

Q12-Explain the basic bit-map method ?

bitmap is an array of bits that specify the color of each pixel in a rectangular array of pixels. The number
of bits devoted to an individual pixel determines the number of colors that can be assigned to that pixel.
Q13-explain random early detection congestion control ?

Random Early Detection (RED) is a scheme used to detect congestion in computer networks by setting
minimum and maximum thresholds for the number of packets allowed to queue at a router, along with
monitoring the queue length and flow response to congestion notifications

Q14-describe congestion control in datagram subnet?

Congestion Control in Datagram Subnets: Congestion control in data-gram and sub-nets : Some
congestion Control approaches which can be used in the datagram Subnet (and also in virtual circuit
subnets) are given under.

Approach-1: Choke Packets : - Approach-2: Load Shedding - Approach-3: Jitter control

Q15-explain binary exponential bakeoff ?

The Binary Exponential Back off Algorithm prevents packet collisions during simultaneous access by
randomizing moments at stations attempting to access the wireless channels.

Q16-what we mean by hidden terminal problem ?

Hidden terminal problem. This problem arises when a node is unaware of another on-going transmission
between a couple of nodes and attempt to communicate (including RTS/CTS/control frames and data
frames) which leads to collisions with the on-going transmission.

Q17- Define SIFS (short interframe Spacing)?

Is the amount of time in microseconds required for a wireless interface to process a received frame and
to respond with a response frame.

Q18-describe admission control techniques ?

Admission Control Decision refers to the process of determining whether a new access request can be
accepted based on the availability of network resources and Quality of Service (QoS) requirements,
balancing between QoS levels and resource utilization.

Q19-Describe the carrier sense multiple access protocol ?

It is a carrier sense multiple access based on media access protocol to sense the traffic on a channel (idle
or busy) before transmitting the data. It means that if the channel is idle, the station can send data to the
channel. Otherwise, it must wait until the channel becomes idle.

Q20-Describe the 802.16 Frame Structure ?

The basic topology of an IEEE 802.16 network includes two entities that participate in the wireless link:
Base Stations (BS) and Subscriber Stations (SS), The BS is the central node, responsible to coordinate
communications and provide connectivity to the SSs.

Q21-What is the standard from of L2CAP?

The Logical Link Control and Adaptation Protocol (L2CAP) is a layer in the Bluetooth stack that provides
crucial services for communication between Bluetooth devices.
Q22- What are the main phases of network design per the top-down network design approach?

1. Analyze requirements. 2. Develop logical design. 3. Develop physical design.

4. Test, optimize, and document.

Q23- What are the main phases of network design per the PDIOO approach?

Plan, Design, Implement, Operate and Optimize (PDIOO)

Q24- Why is it important to understand your customer’s business style?

In order to develop a network design that satisfies the customer’s needs.

Q25- What are some typical business goals for organizations today?
• Increase revenue • Reduce operating costs • Improve communications
• Shorten product development cycle • Expand into worldwide markets
• Build partnerships with other companies • Offer better customer support or new customer services

Q26- What are some typical technical goals for organizations today?

• Scalability • Availability • Performance • Security • Manageability • Usability

• Adaptability • Affordability

Q27- How do bandwidth and throughput differ?

Bandwidth is the data carrying capacity of a circuit (Usually specified in bits per second). Throughput is
the quantity of error free data transmitted per unit of time (Measured in bps, Bps, or packets per second
(pps)).

Q28- How can one improve network efficiency?

By sending larger packets ensuring increased throughput.

Q29- What tradeoffs may be necessary in order to improve network efficiency?

Security: Implementing strong encryption can slow down data transfer rates.

Reliability: Ensuring high reliability through error correction can slow down data transmission.

Affordability: Increasing bandwidth can improve efficiency but often comes with higher costs.

Q30- What factors will help you decide if the existing internetwork is in good enough shape to
Support new enhancements?

• Performance • Availability • Bandwidth utilization • Accuracy • Efficiency

• Response time • Status of major routers, switches, and firewalls

Q31-Why should you characterize the logical structure of an internetwork and not just the Physical
structure?

Because it reveals how data flows, supports efficient troubleshooting and management, enables
Scalability, and enhances security.
Q32-What architectural and environmental factors should you consider for a new wireless
Installation?

• Reflection • Absorption • Refraction • Diffraction

You might also like