CNND QB Ans
CNND QB Ans
A LAN is a small network confined to a limited geographical area, such as homes, offices, or
schools.
A WAN covers a large geographical area, connecting multiple MANs and LANs.
Comparison Table
Feature LAN MAN WAN
1. Router:
○ Directs data packets between different networks.
○ Uses IP addresses for routing.
○ Example: Home Wi-Fi router.
2. Switch:
○ Connects devices within a LAN and forwards data based on MAC addresses.
○ Example: Network switch in an office.
3. Hub:
○ Broadcasts data to all connected devices, leading to network congestion.
○ Example: Old LAN setups (mostly replaced by switches).
4. Bridge:
○ Connects two or more LAN segments.
○ Filters traffic to improve performance.
5. Modem:
○ Converts digital signals into analog for transmission over telephone lines.
○ Example: DSL modem for broadband internet.
6. Repeater:
○ Amplifies network signals over long distances.
○ Example: Wi-Fi range extenders.
7. Gateway:
○ Acts as an interface between different network protocols.
○ Example: Email gateway for filtering messages.
Thus, network hardware plays a vital role in ensuring smooth, efficient, and reliable
communication.
5. What is OSI Reference Model?
The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes
network communication.
Layers 7 4
Unlike the OSI Model, which has seven layers, the TCP/IP Model consists of four layers:
Number of 7 4
Layers
Thus, the TCP/IP Model is the backbone of modern networking, enabling global
communication across the Internet.
7. Explain Functions of the Network Layer
The Network Layer (Layer 3) of the OSI Model plays a crucial role in routing, logical
addressing, and packet forwarding to ensure that data moves efficiently between different
networks.
Thus, the Network Layer is responsible for delivering data efficiently, making it a crucial
component of modern networks.
8. Which services are provided by the Data
Link Layer?
The Data Link Layer (Layer 2) of the OSI Model is responsible for framing, error detection,
and MAC addressing, ensuring reliable communication between directly connected devices.
1. Framing:
○ Converts raw bits into structured frames before transmission.
○ Defines the start and end of each frame.
2. Error Detection and Correction:
○ Uses techniques like Cyclic Redundancy Check (CRC) to detect transmission
errors.
○ Implements Automatic Repeat Request (ARQ) for retransmission.
3. Flow Control:
○ Ensures that data is sent at a rate that the receiver can handle.
○ Uses mechanisms like Stop-and-Wait and Sliding Window Protocols.
4. MAC (Media Access Control) Addressing:
○ Assigns unique hardware addresses (MAC addresses) to network devices.
○ Ensures data reaches the correct device within a LAN.
5. Access Control (Collision Handling):
○ Determines which device can send data at a given time.
○ Uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) in
Ethernet.
Thus, the Data Link Layer is essential for error-free, efficient communication.
9. Write a Short Note on Switch
A Switch is a network device used to connect multiple devices within a Local Area Network
(LAN). Unlike a hub, which sends data to all devices, a switch directs data only to the intended
recipient.
Features of a Switch
Types of Switches
Thus, a switch is an essential networking device that enhances efficiency and reduces
congestion in modern networks.
Functions of a Repeater
1. Amplifies Weak Signals:
○ Extends the distance a signal can travel without degradation.
2. Operates at the Physical Layer (Layer 1):
○ Works only with raw signals (bits).
○ Does not understand network protocols.
3. Eliminates Signal Attenuation:
○ Boosts the signal strength over long distances.
Types of Repeaters
● If a network cable exceeds 100 meters, a repeater is used to boost the signal.
Network topology refers to the physical or logical arrangement of computers, devices, and
cables in a network. It determines how nodes communicate with each other and how data flows
within the network.
Thus, selecting the right topology depends on network size, performance requirements,
and cost considerations.
Thus, the OSI Model acts as a blueprint for designing and troubleshooting networks.
CRC is an error-detection method used in the Data Link Layer. It adds a checksum to
transmitted data to detect errors.
This confirms that the CRC mechanism successfully ensures error-free transmission.
The Sliding Window Protocol is a flow control mechanism used in the Transport Layer for
efficient data transmission between sender and receiver.
How It Works
1. The sender maintains a window of frames it can send before receiving an
acknowledgment.
2. When an acknowledgment is received, the window slides forward, allowing more
frames to be sent.
3. If an error occurs, retransmission strategies are used.
Comparison: Go-Back-N vs. Selective Repeat
Feature Go-Back-N Selective Repeat
Conclusion
Conclusion
The IPv4 header ensures efficient routing, fragmentation, and error control, making it a
crucial part of network communication.
Types of NAT
Advantages of NAT
Disadvantages of NAT
Conclusion
● Prevents collisions: Since only the device holding the token can send data, there are
no collisions.
● Ensures fair access: Each device gets a turn to transmit, avoiding network
congestion.
● Predictable performance: Ideal for real-time communication and industrial control
systems.
● Token loss: If the token is lost, it must be recreated, causing network delays.
● Slow under low traffic: When no device needs to send data, the token still circulates,
wasting resources.
● Complex setup: Requires special hardware and software to maintain token flow.
Conclusion
Token Passing provides efficient, collision-free communication, making it ideal for networks
that require consistent and fair access control.
Classful IP Addressing
● Does not use fixed classes; instead, uses variable subnet masks (VLSM).
● Allows more efficient IP address allocation.
● Example: 192.168.1.1/27 instead of class-based subnetting.
Conclusion
Packet switching is a method of transmitting data by dividing it into small packets that travel
independently across a network.
Disadvantages
Conclusion
Packet switching is the backbone of the Internet, allowing fast, efficient, and reliable
communication.
20. A bit stream 1101011011 is transmitted
using the CRC method. The polynomial
generator is x⁴ + x + 1.
Step 1: Convert Polynomial to Binary
Step 3: Simulate an Error (Third Bit Inverted) and Check for Errors
Now, let’s simulate an error and check if the receiver can detect it.