Professional Documents
Culture Documents
2 Marks
2 Marks
PART A
Station Station
Reliability
Security
Sol: The physical layer, data link and network layers network support layers
and session, presentation, application layers are user support layer.
Transport layer links network support and user support layers.
Page 1 of 12
5. Write the advantages of Optical fiber over twisted pair and coaxial
cable.
Without requiring regeneration optical signal can run for many miles-less
signal attenuation.
The word modem is a composite word that refers to the two functional entities that make up the device
signal modulator and a signal demodulator.A modulator creates a bandpass analog signal from binary d
and a demodulator recovers the binary data from the modulated signal.
The RS-232 standard defines the voltage levels that correspond to logical one and logical zero levels. V
signals are plus or minus 3 to 15 volts. The range near zero volts is not a valid RS-232 level; logic on
defined as a negative voltage, the signal condition is called marking, and has the functional significance
OFF. Logic zero is positive, the signal condition is spacing, and has the function ON.
Page 2 of 12
Unit - II
Part – A
Piggy backing
2.What are the types of frames available in High level Data Link
Control?
3.List Out the Common Transfer modes that can be used in different
Configurations.
Page 3 of 12
In CSMA/CD the station wishing to transmit first listens to make certain
the link is free, then transmits its data, then listens again. During the
data transmission, the station checks the line for the extremely high
voltages that indicate a collision.
If a collision is detected, the station quits the current transmission and
waits a predetermined amount of time for the line to clear, then sends its
data again.
Page 4 of 12
Ans. Error detection uses the concept of redundancy, that is extra bits are added to
the data unit at the sending end, for detecting transmission errors at the receiving
end. The redundant bits are used to check the accuracy of a data unit. The
redundant bits are added in various ways giving rise to four different methods.
Q10. What is single bit error? And how it differs from a burst error?
Ans. Single bit error: When a single bit in a data unit is changed in the process of
transmission, it is called single bit error. Single bit error can happen in parallel
transmission.
Burst error: When two or more bits in a data unit are changed in the process of
transmission, it is called burst error. Burst error can happen in a serial transmission.
Ans. Hamming code is an error correcting code, which uses redundant bits.
Hamming code can be applied to data units of any length, and uses the relationship
2r ≥ m + r + 1 to calculate the redundant bits (r), where m = number of data bits.
Hamming code can correct single bit error in the process of transmission, a
Hamming code can also be designed to correct burst errors of certain lengths, but
the redundant bits required to make these corrections is much higher than that
required for single bit errors.
Ans. Bluetooth is a low cost, low power, short range, wireless communication
technology. The performance characteristics of a Bluetooth device is as follows,
Page 5 of 12
UNIT III- NETWORK LAYER
PART – A
1. What is the fundamental difference between circuit switching and
packet switching?
In circuit switching, a physical link is dedicated between a source and a
destination. In this case, data can be sent as a stream of bits without the need for
packetizing. In packet switching, data are transmitted in discrete units of potentially
variable-length blocks called packets.
Page 6 of 12
• Class A
• Class B
• Class C
• Class D
• Class E
Address A,B,C are for unicast communication from one source to one
destination. Address in class D are for multicast communication from one source to
a group of destination.
ANS->
The network address is an address that defines the network itself; it cannot
be assigned to a host.
Netid Hostid
Specific All 0s
Page 7 of 12
6. Given an IP address of 193.215.45.198 and a subnet mask of
255.255.255.240
What is the network number?
What is the broadcast address?
How many hosts addresses?
Routing is a key feature of the Internet because it enables messages to pass from one computer to
another and eventually reach the target machine. Each intermediary computer performs routing
by passing along the message to the next computer.
A router is a device that extracts the destination of a packet it receives, selects the best path to
that destination, and forwards data packets to the next device along this path. A router is a device
that forwards data packets along networks.
• Control Plane, in which the router learns the outgoing interface that is most
appropriate for forwarding specific packets to specific destinations,
Page 8 of 12
• Forwarding Plane, which is responsible for the actual process of sending a
packet received on a logical interface to an outbound logical interface.
A distance-vector routing protocol requires that a router informs its neighbors of topology
changes periodically and, in some cases, when a change is detected in the topology of a
network. As the name suggests the DV protocol is based on calculating the direction and
distance to any link in a network. The cost of reaching a destination is performed by using
mathematical calculations such as the metrics of the route
. The link-state protocol is performed by every switching node in the network (i.e. nodes which
are prepared to forward packets; in the Internet, these are called routers). The basic concept of
link-state routing is that every node receives a map of the connectivity of the network, in the
form of a graph showing which nodes are connected to which other nodes.
PART A
Congestion control refers to the techniques and mechanisms that can be either prevents
congestion, before it happens, or remove congestion, after it has happened. It is broadly
classified as open loop congestion control (prevention) and closed loop congestion control
(removal).
2.what are the techniques to improve QoS?
In networking a technique called leaky bucket that can smooth out bursty
traffic. Bursty chunks are stored in a bucket and sent out in an average rate. The
input rate can vary but the output rate remains constant. And also it may drop the
packets if the bucket is full.
Page 9 of 12
4.How can we implement a flow-based model over a connectionless
protocol?
5.What are integrated services and what are the problems associated with
it?
6.What is jitter?
Jitter is a variation in delay for packets belonging to the same flow. For eg., if
4 packets depart at time 0,1,2,3 and arrive at 20,21,22,23 , all have the same
delay, 20 units of time.If 4 packets arrive at 21,23,21,28 they ll have different
delays 21,22,19,24.
At the sender side, there may be several processes that need to send
packets. However, there is one transport layer protocol, at any time, this is a many
to one relationship is multiplexing. At the receiver side the relationship is one to
many and this is demultiplexing.
Page 10 of 12
UNIT V - The Application Layer
Part A
1.What is DNS?
Ans:
1.Generic domains
2.Country domains
3.Inverse domains
3.Define SMTP
Ans: The protocol that supports email on the internet is called SMTP.It is a part of TCP/IP
Protocol suite.
Ans:
1.Composing messages
2.Reading messages
3.Replying messages
4.Forwarding messages
5.Handling mailboxes
Ans:
3.Statelessness
4.Resource metadata
Page 11 of 12
6.What is statelessness of Http protocol?
Ans: Maintaining state across request and response connections significantly increases the initial
interactions in a connection since the identity of each party needs to be established and any saved
state must be retrieved. Http is therefore stateless protocol to ensure that the Internet is scalable
since state is not contained in the Http request/response pairs by default.
7.What is a hypertext?
Ans: A set of documents in which a given document can contain text as well as embedded
reference to other documents.
Ans:
1.Static documents
2.Dynamic documents
3.Active documents
10.Define cryptography
Ans: Cryptography is the science and art of transforming messages to make them secure and
immune to attack.
Page 12 of 12