Design of computer network
Design of computer network
The base station periodically Sends owt frames. Each frame contains time slots. The first one for
downstream Traffic then comes a grand time used by the stations to switch direction Finally we have
slots for upstream Traffic.
Q2-The L2CAP layer has three major Functions Mention And Describes Them?
1-it accepts Packets Of up to 64KB From The upper layers and breaks them into Frames for Transaction
802.11: 1-deals With mobility 2- use half Duplex communication 3-Low frequency range (2.4Gh³) 4-
Support of real time traffic 5- Limited graphical area 6- Designed to be mobile Ethernet
802.16: 1-deals with buildings 2-use Full-duplex communication 3- High frequency range 4- Support of
applications 5- Large graphical area 6- Designed to be Wireless
Intercom profile – services discovery – Headset profile - LAN Access Profile - Fax Profile – Serial port
profile - Generic Access Profile
2- Services discovery: Used by devices to deliver what services other devices have to offer
3-Headset profile: Provides Hands-free voice communications between the headset are its base station
1-Protocal version: Which allows tow version of the protocol to operate at the same time in the same
Cells 2- Type: data , Control, or Management 3- Subtype filed: RTS or CTS 4-5 : To Ds and from Ds bits
indicates the frame is going or coming from the intercool distribution system 6-MF bit: more fragments
will follow 7- Retry bit: makes a retransmission of a frame seat earlier 8-Awer Management bit: Used by
base station to put the receiver into sleep stake or take it owt of sleep state 9- More bit: The Sender has
additional frames for reactive 10- Wbit: The frame body has been enclosed using WEP 11- O bit: Tells
the receiver that a sequence of frames with this bit on result be processed strictly in order
Q6-Explain Wavelength Divisions multiple access protocol?
To Allow multiple transactions at the same time each station is assigned tow channels A arrow Channel is
provided as a control Channel to signal the Station and a Wide Channel is provided so the station can
output data frames
Where N from data and last one from status each station has 2 transmitter and 2 receiver 1-Fixed-Wave
length receiver from listening to its own control Channel 2-A tunable transmitter from sending on other
stations control Channel 3- A Fixed-Wavelength transmitter for outputting data Farm 4- A tunable
receiver for selecting a data transmitter to listen
1-The Radio Layer moves the bits from master to slave or vice versa 2-it is allow-power system with a
range of to meters operating in 2.4GHZ ESM band 3- The band is divided into channels, each 1 hz 4-
modulation is frequency shift Keying, with 1 bit per Hz giving a gross data rate of 1Mbps,bwt much of
this spectrum is consumed by overhead 5-FHSS is used with 1600 hops/sec and devell time of 625Msec
Q8-The 802.11 Standard specific five transactions Techniques allowed in the physical layer mention
them?
is used only by a station that has just received a bad or unknown frame to report the bad frame
is a media access control method that was widely used in Early Ethernet technology/LANs when there
used to be shared Bus Topology and each node ( Computers) was connected by Coaxial Cables.
Congestion control: is applied in network and transport layer – Triggered when network routers or links
become overloaded with excessive traffic – Found in TCP/IP protocols to manage congestion in networks
like the internet.
Flow Control : Found in protocols like TCP to adjust the sender’s data rate based on the receiver’s
readiness. – is typically used in data link layer – Prevents the receiver’s buffer from overflowing
bitmap is an array of bits that specify the color of each pixel in a rectangular array of pixels. The number
of bits devoted to an individual pixel determines the number of colors that can be assigned to that pixel.
Q13-explain random early detection congestion control ?
Random Early Detection (RED) is a scheme used to detect congestion in computer networks by setting
minimum and maximum thresholds for the number of packets allowed to queue at a router, along with
monitoring the queue length and flow response to congestion notifications
Congestion Control in Datagram Subnets: Congestion control in data-gram and sub-nets : Some
congestion Control approaches which can be used in the datagram Subnet (and also in virtual circuit
subnets) are given under.
The Binary Exponential Back off Algorithm prevents packet collisions during simultaneous access by
randomizing moments at stations attempting to access the wireless channels.
Hidden terminal problem. This problem arises when a node is unaware of another on-going transmission
between a couple of nodes and attempt to communicate (including RTS/CTS/control frames and data
frames) which leads to collisions with the on-going transmission.
Is the amount of time in microseconds required for a wireless interface to process a received frame and
to respond with a response frame.
Admission Control Decision refers to the process of determining whether a new access request can be
accepted based on the availability of network resources and Quality of Service (QoS) requirements,
balancing between QoS levels and resource utilization.
It is a carrier sense multiple access based on media access protocol to sense the traffic on a channel (idle
or busy) before transmitting the data. It means that if the channel is idle, the station can send data to the
channel. Otherwise, it must wait until the channel becomes idle.
The basic topology of an IEEE 802.16 network includes two entities that participate in the wireless link:
Base Stations (BS) and Subscriber Stations (SS), The BS is the central node, responsible to coordinate
communications and provide connectivity to the SSs.
The Logical Link Control and Adaptation Protocol (L2CAP) is a layer in the Bluetooth stack that provides
crucial services for communication between Bluetooth devices.
Q22- What are the main phases of network design per the top-down network design approach?
Q23- What are the main phases of network design per the PDIOO approach?
Q25- What are some typical business goals for organizations today?
• Increase revenue • Reduce operating costs • Improve communications
• Shorten product development cycle • Expand into worldwide markets
• Build partnerships with other companies • Offer better customer support or new customer services
Q26- What are some typical technical goals for organizations today?
• Adaptability • Affordability
Bandwidth is the data carrying capacity of a circuit (Usually specified in bits per second). Throughput is
the quantity of error free data transmitted per unit of time (Measured in bps, Bps, or packets per second
(pps)).
Security: Implementing strong encryption can slow down data transfer rates.
Reliability: Ensuring high reliability through error correction can slow down data transmission.
Affordability: Increasing bandwidth can improve efficiency but often comes with higher costs.
Q30- What factors will help you decide if the existing internetwork is in good enough shape to
Support new enhancements?
Q31-Why should you characterize the logical structure of an internetwork and not just the Physical
structure?
Because it reveals how data flows, supports efficient troubleshooting and management, enables
Scalability, and enhances security.
Q32-What architectural and environmental factors should you consider for a new wireless
Installation?