CN Model Paper Solution
CN Model Paper Solution
Q. 1 Mcq
Unit-1
1. ___________ is to make all programs, equipments & specially data available
to anyone on a network without regard to the physical location of the resource
& user.
a) High reliability b) Resource-sharing
c) Saving money d) None of these
2. “Interconnected collection of autonomous computers” is known as
_________.
a) Computer network b) Host
c) Subnet d) Server
3. __________ have a single communication channel that is shared by all the
machines on the network.
a) Point-to-Point network. b) People network
c) Broadcast network. d) Specialized network
4. Traditional LANs run at speeds of _____ to _____ Mbps.
a) 20 to 100 b) 10 to 1000
c) 100 to 1000 d) 10 to 100
5. DQDB stands for ______________.
a) Dual Queue Dual Bus
b) Double Queue Double Bus
c) Dual Queue Dual Bits
d) Distributed Queue Dual Bus
CN Model paper solution
Unit-3
1. A ________ is a set of rules that govern data communications.
(a) Layers (b) Network
(c) protocol (d) Communication
2. A set of layers and protocols is called _________________.
(a) network architecture (b) Protocol stack
(c) Computer architecture (d) Layers stack
3. A list of the protocols used by a certain system, one protocol per layer, is called a
_____________.
(a) network architecture (b) protocol stack
(c) Computer architecture (d) Layers stack
4. OSI stands for ______________________________.
(a) Open system interface (b) Organization Standard interface
(c) Open System Interconnection (d) Open Standard Interconnection
13. An artificial satellite needs to have ______ which is the path in which it travels
around the Earth.
(a) Channel (b) Tower
(c) Communication lines (d) Orbit
14. The signal from a satellite is normally aimed at a specific area called ___________.
(a) Channel (b) Tower
(c) Footprint (d) Orbit
Unit-4
(13) A ____ can be used to connect two different networks that use different models.
(A) router (B) switch (C) gateway (D) all of these
• Topology:-
- Topology of network is the geometric representation of the relationship of all the links and
linking devices to one another. Topology may be physical or logical.
- Examples of some basic topologies: mesh, star, bus, and ring.
• Data Rate:- Number of data elements sent from one device to another per second is called
data rate
• Modulation Rate:- No. of signal elements sent per second. Measured in baud. Also known
as pulse rate or signal rate or baud rate.
• Spectrum :- The range of frequencies contained in the electromagnetic radiation including
visible light.
• Bandwidth:- Width of spectrum is called Bandwidth.
• Server:- A server is a physical computer dedicated to run one or more services (as a host),
to serve the needs of the users of other computers on a network.
• Host:- A network host is a computer connected to a computer network.
- A network host may offer information resources, services, and applications to users or
other nodes on the network.
CN Model paper solution
OR
The OSI Model is a method of describing and analysing data communications networks by
breaking the entire set of communication processes into a number of layers. It is a model for
understanding and designing a network architecture that is flexible and robust. The OSI model
describes how data flows from one computer, through a network, to another computer.
Long Questions :
Q. 3 A] What are the advantages and disadvantages of Computer Networks? Explain in detail.
Advantages Of Computer Network :
File Sharing:
The major advantage of a computer network is that is allows file sharing and remote file
access. A person sitting at one workstation of a network can easily see the files present on
the other workstation, provided he is authorized to do so.
Resource Sharing:
A computer network is a system that connects multiple computers to share resources such
as the Internet, printers, and files. One of the most important benefits of a computer
network is resource sharing, which allows multiple users to access and use the same
resources efficiently.
Increased Storage Capacity:
When computers are connected in a network, they can easily share files and storage space,
solving the problem of limited memory. It provides a cost-effective way to expand storage
capacity without upgrading individual computers.
Increased Cost Efficiency:
There are many software available in the market which are costly and take time for
installation. Computer networks resolve this issue as the software can be stored or installed
on a system or a server and can be used by the different workstations.
Speed: Sharing and transferring files within Networks are very fast. Networks provide a very
rapid method for sharing and transferring files.
Data Security and Management: In a business environment, a network allows the
administrators to better manage the company's critical data.
Communication medium: A computer network can provide a powerful communication
medium among people spread widely at different physical locations.
Networking software requires memory space in each of the computer used on the
network. This reduces the memory space available for other programs.
Hardware and Software Management and Administration Costs:
Networking adds another level of complexity to the computer operations. The installation
and management of a network requires for more technical and administrative skills. Some
controls on the part of the user are lost. One may face the situation like entire network
suddenly locking up because one user has made a mistake.
Data Security:
If a network is implemented properly, it is possible to greatly improve the security of
important data. In contrast, a poorly secured network puts critical data at risk, exposing it to
the potential problems associated with hackers, unauthorized access.
B] Explain LAN in detail.
- Local area networks generally called LAN are privately-owned networks within a single
building or campus of up to a few kilometres in size.
- They are widely used to connect personal computers and workstation in company offices
and factories to share resources and exchange information.
LAN networks by three characteristics:
1. Size:
2. Transmission technology:
3. Topology:
Size: LAN is restricted in size, which means that the worst-case transmission time is
bounded and known in advance.
Transmission technology: Transmission technology consisting of a single cable to which all
the machines are attached, like the telephone lines. LAN runs at speeds of 10 to 100 mbps
Topology:
- various topologies are possible for broadcast lan.
CN Model paper solution
- In bus IEEE802.3 popularly called Ethernet, for example is a bus based broadcast network
with operating at 10 to 100 mbps.
- A second type of broadcast system is the ring. IEEE802.5 (IBM token ring), is a popular
ring-based Lan operating at 4 and 16 Mbps.
OR
Q. 3 A] How can we classify computer Network?
2. Point-to-point network
- point-to-point networks consist of many connections between individual pairs of
machines.
- Large networks usually are of point-to-point.
- To go from the source to the destination, a packet on this type of network may have to
first visit one or more intermediate machines.
- Point-to-point networks use routing algorithms to determine the best path when multiple
routes are available.
-
B] Explain WAN in detail.
➢ It is a collection of machines for running user programs these machines call hosts.
➢ The hosts are connected by a communication subnet. The job of the subnet is to carry
messages from host to host. Just as telephone system.
➢ Switching elements: the switching elements are specialized computers (router) used to
connect two or more transmission lines. When data arrive on an incoming line, the
switching elements must choose an outgoing line to forward them.
➢ In fig the collection of communication lines and routers form the subnet that moved
packets from the source host to the destination host
➢ In wan numerous cables or telephone lines, each one connecting a pair of routers. If two
routers do not share a cable it communicates indirectly, via other routers.
➢ When a packet is sent from one router to another via one or more intermediate routers,
the packet is received at each intermediate router in its entirety, stored there until the
required output line is free and then forwarded. A subnet using this principle is called a
point-to-point, store-and-forward or packet-switched subnet. When the packets are small
and all the same size they are called cells.
➢ Wan is a satellite or ground radio system. Each router has an antenna through which it
can send and receive.
CN Model paper solution
➢ One of the wires is used to carry signals to the receiver, and the other is used only as a
ground reference. The receiver uses the difference between the two.
➢ In addition to the signal sent by the sender on one of the wires, interference (noise) and
crosstalk may affect both wires and create unwanted signals.
➢ If the two wires are parallel, the effect of these unwanted signals is not the same in both
wires because they are at different locations relative to the noise or crosstalk sources (e.g.,
one is closer and the other is farther). This results in a difference at the receiver.
➢ By twisting the pairs, a balance is maintained. For example, suppose in one twist, one wire
is closer to the noise source and the other is farther; in the next twist, the reverse is true.
➢ Twisting makes it probable that both wires are equally affected by external influences (Noise
or crosstalk). This means that the receiver, which calculates the difference between the two,
receives no unwanted signals. The unwanted signals are mostly canceled out.Unshielded
Versus Shielded Twisted-Pair Cable
➢ The most common twisted-pair cable used in communications is referred to as unshielded
twisted-pair (UTP).
➢ IBM has also produced a version of twisted-pair cable for its use called shielded twisted-
pair (STP).
Categories:
➢ The Electronic Industries Association (EIA) has developed standards to classify unshielded
twisted-pair cable into seven categories.
➢ Categories are determined by cable quality, with 1 as the lowest and 7 as the highest.
Performance:
➢ A twisted-pair cable can pass a wide range of frequencies.
➢ A twisted-pair cable can increase frequency, the attenuation, measured in decibels per
kilometer (dB/km), sharply increases with frequencies above 100 kHz.
Applications:
➢ Twisted-pair cables are used in telephone lines to provide voice and data channels.
➢ The DSL lines that are used by the telephone companies to provide high-data-rate
connections also use the high-bandwidth capability of unshielded twisted-pair cables.
➢ Local-area networks, such as 10Base-T and 100Base-T, also use twisted-pair cables.
CN Model paper solution
Applications:
→ Coaxial cable was widely used in analog telephone networks where a single coaxial
network could carry 10,000 voice signals.
→ Cable TV networks also use coaxial cables. Cable TV uses RG-59 coaxial cable.
→ Another common application of coaxial cable is in traditional Ethernet LANs.
→ The 10Base-2, or Thin Ethernet, uses RG-58 coaxial cable with BNC connectors the
10Base5, or Thick Ethernet, uses RG-11 (thick coaxial cable)
OR Q. 4
A] Explain Fiber Optic in detail.
• Optical fibers use light to send information through the optical medium.
• It uses the principal of total internal reflection.
• Modulated light transmissions are used to transmit the signal.
• Light travels through the optical media by the way of total internal reflection.
• Modulation scheme used is intensity modulation.
1. Multimode
2. Single mode
• Multimode Fiber can support less bandwidth than Single mode Fiber.
• Single-mode Fiber has a very small core and carries only one beam of light. It can support Gbps data rates over >
100 Km without using repeaters.
• Single and Multimode Fiber
CN Model paper solution
fiber-optic cable :
• A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
• Light travels in a straight line as long as it is moving through a single uniform substance.
• If a ray of light traveling through one substance suddenly enters another substance (of a different
density), the ray changes direction.
Advantages Fiber-optic cable:
1. Higher bandwidth
2. Less signal attenuation
3. Immunity to electromagnetic interference
4. Resistance to corrosive materials
5. Lightweight
6. Greater immunity to tapping:
➢ We consider FDM to be an analog multiplexing technique; however, this does not mean
that FDM cannot be used to combine sources sending digital signals.
➢ A digital signal can be converted to an analog signal before FDM is used to multiplex
them.
➢ FDM is an analog multiplexing technique that combines analog signals.
• Multiplexing Process:
➢ Figure 6.4 is a conceptual illustration of the multiplexing process. Each source generates a
signal of a similar frequency range.
➢ Inside the multiplexer, these similar signals modulate different carrier frequencies (f1, f2,
and f3).
➢ The resulting modulated signals are then combined into a single composite signal that is
sent out over a media link that has enough bandwidth to accommodate it.
• Demultiplexing Process:
➢ The demultiplexer uses a series of filters to decompose the multiplexed signal into its
constituent component signals.
➢ The individual signals are then passed to a demodulator that separates them from their
carriers and passes them to the output lines.
CN Model paper solution
a. Physical Layer
c. Network layer
d. Transport Layer
e. Session Layer
f. Presentation Layer
g. Application Layer
Physical layer
− Framing – divides the stream of bits received from network layer into manageable data
units called frames.
− Physical Addressing – Add a header to the frame to define the physical address of the
source and the destination machines.
− Flow control – Impose a flow control – control rate at which data is transmitted so as not
to flood the receiver (Feedback-based flow control)
− Error Control – Adds mechanisms to detect and retransmit damaged or lost frames. This
is achieved by adding a trailer to the end of a frame
CN Model paper solution
• MEO Satellites
➢ Medium-Earth-orbit (MEO) satellites are positioned between the two Van Allen
belts.
➢ A satellite at this orbit takes approximately 6-8 hours to circle the Earth.
➢ Global Positioning System
➢ One example of a MEO satellite system is the Global Positioning System (GPS),
constructed and operated by the US Department of Defense, orbiting at an
altitude about 18,000 km (11,000 mi) above the Earth.
CN Model paper solution
➢ The system consists of 24 satellites and is used for land, sea, and air navigation to
provide time and locations for vehicles and ships.
➢ GPS uses 24 satellites in six orbits, as shown in Figure 16.17.
➢ The orbits and the locations of the satellites in each orbit are designed in such a
way that, at any time, four satellites are visible from any point on Earth.
➢ A GPS receiver has an almanac that tells the current position of each satellite.
OR
Q. 5 A] Write a note on Protocol Hierarchies.
➢ Most networks are organized as a series of layers or levels, each on built upon the one
below it.
➢ The number of layers, the name of each layer, the contents of each layer, and the
function of each layer differ from network to network.
➢ The rules and conventions used in this conversation are collectively known as the layer n
protocol.
➢ A five- layer network is in fig 1.9. the entities comprising the corresponding layers on
different machines are called PEERS. In other words, it is the peers that communicate
using the protocol.
CN Model paper solution
➢ In reality, no data are directly transferred from layer n on one machine to layer n on
another machine. Each layer passes data and control information to the layer
immediately below it, until the lowest layer is reached.
➢ Below layer 1 is the physical medium through which actual communication occurs. In fig
virtual communication is shown by dotted lines and physical communication by solid
lines.
➢ Each pair of adjacent layers there is an interface. The interface defines which primitive
operations and services the lower layer offers to the upper layer.
➢ Network designers decide how many layers to include in a network and what each one
should do, one of the most important is defining clean interface between the layers.
➢ Data transfer: in some system, data only travel in one direction (simplex communication).
In others they can travel in either direction, but not simultaneously (half-duplex
communication). In still others they travel in both directions at once (full-duplex
communication).
➢ The protocol must also determine how many logical channels the connection correspond
to, and what their priorities are. Many networks provide at least two logical channel per
connection, one for normal data and one for urgent data.
➢ Error control: is an important issue because physical communication circuits are not
perfect. Many error-detecting and error-correcting codes are known, but both ends of the
connection must agree on which one being used. the receiver must have telling the
sender which message have been correctly received and which have not.
➢ Not all communication channel preserve the order of messages sent them. To deal with a
possible loss of sequencing, the protocol must make explicit provision for receiver to allow
the pieces to be put back together properly.
➢ At every level is how to keep a fast sender from swamping a slow receiver with data. Some
kind of feedback from the receiver to sender, either directly or indirectly, about the
receiver current situation.
➢ At several levels is the inability of all processes to accept arbitrarily long messages. This
property leads to mechanisms for disassembling, transmitting, and then reassembling
messages.
➢ There are multiple paths between sources to destination, a route must be chosen.
Sometime this decision must be split over two or more layers.
CN Model paper solution
Ring topology
CN Model paper solution
CN Model paper solution
OR
CN Model paper solution
the end