Insem 2017 18 30 Marks CN

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Class: TE Computers Academic Year: 2017-18 SEM:- I

Subject : Computer Networks Exam: INSEM Marks:30


Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q1 a) What are the design issues of layers” Explain it.[5]

Ans:

1. Addressing: Every layer needs a mechanism for identifying senders and receivers. Since a
network normally has many computers, some form of addressing is needed in order to specify a
specific destination.
2. Error control is an important issue because physical communication circuits are not perfect. The
receiver must have some way of telling the sender which messages have been correctly received
and which have not.
3. Flow control : An issue that occurs at every level is how to keep a fast sender from swamping a
slow receiver with data. This subject is called flow control.
4. Multiplexing and Demultiplexing : When it is inconvenient or expensive to set up a separate
connection for each pair of communicating processes, the underlying layer may decide to use the
same connection for multiple, unrelated conversations. As long as this multiplexing and
demultiplexing is done transparently, it can be used by any layer. Multiplexing is needed in the
physical layer, for example, where all the traffic for all connections has to be sent over at most a
few physical circuits.
5. Routing: When there are multiple paths between source and destination, a route must be
chosen.Then a low-level decision might have to made to select one of the available circuits based
on the current traffic load. This topic is called routing.

Q1 b) What are the different network devices? Explain difference between Switch and Hub.[5]

Ans:
List of different network devices:

1. Physical Layer: Repeater, Hub (Active, Passive)


2. Data Link Layer: Switch,Bridge,Brouter
3. Network Layer: Brouter,Router
4. Transport Layer: Transport Gateway
5. Application Layer: Application Gateway.

Difference between Switch and Hub.

Basis for Comparison Hub Switch

Layer Physical layer. Layer 1 devices Data Link Layer. Layer 2

Function To connect a network of personal Allow to connect multiple device


computers together, they can be and port can be manage, Vlan can
joined through a central hub. create security also can apply
Data Transmission Electrical signal or bits Frame (L2 Switch) Frame &
Packet (L3 switch)
Ports 4/12 ports Switch is multi port Bridge. 24/48
ports
Device Type Passive Device (Without Software) Active Device (With Software) &
Networking device
Used in LAN LAN

Transmission Mode Half duplex Half/Full duplex


Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q2 a) what are the transmission techniques used by 802.11 to send a MAC frame from one station
to another? Explain two of them.[5]

Ans:

List of transmission techniques used by 802.11 to send a MAC frame:

1. Asynchronous data service (DCF)


a. CSMA/CA
b. RTS/CTS
2. Time bounded service (PCF)
a. Polling
3. Inter-frame spacing (IFS)
a. DIFS
b. PIFS
c. SIFS

CSMA/CA: When DCF is employed, 802.11 uses a protocol called CSMA/CA (CSMA with Collision
Avoidance). In this protocol, both physical channel sensing and virtual channel sensing are used. In this
method, when a station wants to transmit, it senses the channel. If it is idle, it just starts transmitting. It
does not sense the channel while transmitting but emits its entire frame, which may well be destroyed at
the receiver due to interference there. If the channel is busy, the sender defers until it goes idle and then
starts transmitting. If a collision occurs, the colliding stations wait a random time, using the Ethernet
binary exponential backoff algorithm, and then try again later.

RTS/CTS: The protocol starts when A decides it wants to send data to B. It begins by sending an RTS
frame to B to request permission to send it a frame. When B receives this request, it may decide to grant
permission, in which case it sends a CTS frame back. Upon receipt of the CTS, A now sends its frame and
starts an ACK timer. Upon correct receipt of the data frame, B responds with an ACK frame, terminating
the exchange. If A's ACK timer expires before the ACK gets back to it, the whole protocol is run again.
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q2b) what is Line encoding? Give the Manchester line code and Differential Manchester code for
the bit sequence: 1100110 [5]

Ans:

Manchester Encoding:

1 1 0 0 1 1 0

Differential Manchester Encoding:

1 1 0 0 1 1 0
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q3 a) what is the need of framing? What are the different techniques for framing? Explain any
two.[5]

Ans:
Need of Framing: To provide service to the network layer, the data link layer must use the service
provided to it by the physical layer. What the physical layer does is accept a raw bit stream and attempt to
deliver it to the destination. This bit stream is not guaranteed to be error free. The number of bits received
may be less than, equal to, or more than the number of bits transmitted, and they may have different
values. It is up to the data link layer to detect and, if necessary, correct errors.
The usual approach is for the data link layer to break the bit stream up into discrete frames and
compute the checksum for each frame. When a frame arrives at the destination, the checksum is
recomputed. If the newly-computed checksum is different from the one contained in the frame, the data
link layer knows that an error has occurred and takes steps to deal with it (e.g., discarding the bad frame
and possibly also sending back an error report).

Different Techniques available for Framing:


1. Character count.
2. Flag bytes with byte stuffing.
3. Starting and ending flags, with bit stuffing.
4. Physical layer coding violations.

1) Character Count: The first framing method uses a field in the header to specify the number of
characters in the frame. When the data link layer at the destination sees the character count, it knows
how many characters follow and hence where the end of the frame is. This technique is shown in Fig
below for four frames of sizes 5, 5, 8, and 8 characters, respectively.

2) Flag bytes with byte stuffing: The second framing method gets around the problem of
resynchronization after an error by having each frame start and end with special bytes. In this way, if
the receiver ever loses synchronization, it can just search for the flag byte to find the end of the current
frame. Two consecutive flag bytes indicate the end of one frame and start of the next one.
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q3 b) The data word 1101011011 is to be sent using generator polynomial x4+x+1 , Use CRC to
computer the code word at sender side. [5]

Ans:

Divisor-> x4+x+1 -> 10011


Data Word: 1101011011
Augmented bits = No of Divisor bits -1 ->5-1= 4 ->0000
Augmented word = 11010110110000
Do binary Division of Augmented word by Divisor.

1
______________________________________________________
10011 ) 11010110110000
10011
______________
10011
10011
_____________
00001
00000
_______________
00010
00000
_______________
00101
00000
______________
01011
00000
_____________
10110
10011
_____________
01010
00000
___________
10100
10011
_______________
01110
00000
_____________
1110  Reminder

Codeword= Dataword + Remiander

Codeword= 11010110111110
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q4a) Explain Go back N Sliding Window Protocol with Example. [5]

Ans:

Two basic approaches are available for dealing with errors in the presence of pipelining. One way, called
go back n, is for the receiver simply to discard all subsequent frames, sending no acknowledgements for
the discarded frames. This strategy corresponds to a receive window of size 1. In other words, the data
link layer refuses to accept any frame except the next one it must give to the network layer. If the sender's
window fills up before the timer runs out, the pipeline will begin to empty. Eventually, the sender will time
out and retransmit all unacknowledged frames in order, starting with the damaged or lost one. This
approach can waste a lot of bandwidth if the error rate is high.

In Fig.(a) we see go back n for the case in which the receiver's window is large. Frames 0 and 1 are
correctly received and acknowledged. Frame 2, however, is damaged or lost. The sender, unaware of this
problem, continues to send frames until the timer for frame 2 expires. Then it backs up to frame 2 and
starts all over with it, sending 2, 3, 4, etc. all over again.

Q4 b) Explain bit oriented protocol for communication over point to point and multipoint link.[5]

Ans:

There are two bit oriented protocols for communication

1. HDLC- Point to Point and Multipoint


2. PPP- Only Point to Point

HDLC: (High-level Data Link Control)

It is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the
ARQ mechanisms.
HDLC works in two modes
1. Normal Response Mode - Primary gives command and secondary responds through Response.
a. Point to Point (one Primary & one Secondary Station)
b. Multipoint (one Primary & more than one Secondary Station)
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

2. Asynchronous balanced mode (Every station work as Primary as well as Secondary means
combined mode)

HDLC Frames: There are 3 types of frames in HDLC- Information, Supervisory, and Unnumbered

Q5a) Draw and Explain Frame format of 802.16 standard.[5]

Ans:

802.16 is standard for WiMAX or Wireless MAN. The Frame format and explanation of every
fields is given below.
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

 HT(Header type): For generic frame,HT=0


 EC (Encryption control)
 0 = Payload is not encrypted or payload is not included.
 1 = Payload is encrypted.
 Type : This field identifies the frame type ,whether packing and fragmentation is present.
 CI (CRC indicator)
 1 = CRC is included .
 0 = No CRC is included.
 EKS (Encryption key sequence) : Which encryption key is used.
 Length: Complete length of the frame including header.
 Connection ID: Which connection this frame belongs to.
 Header CRC: Header check sequence. An 8-bit field used to detect errors in the header.Header
check-sum using 100000111.
 ESF(Extended subheader) ESF=0 ,absent:ESF=1.present

Q 5b) Consider building a CSMA/CD network running at 1GBPS over a cable with no repeaters. The
signal speed in the cable is 200000 km/sec. What is the minimum frame size. [5]

Ans: We must keep in mind that in CSMA/CD , for a station to get some surety of successful transmission
the contention interval (time during which the station is transmitting) should have at least 2ι slot width
where ι is time for signal to propagate between two farthest stations ie there must be enough time for the
front of the frame to reach the end of the cable and then for an error message to be sent back to the start
before the entire frame is transmitted.

As a result for a 1 km cable the one way propagation time


= 1/200000
= 5 x 10-6 = 5 μ sec
So for both ways it would be
= 2 x 5μsec = 10 μsec

To make CSMA/CD work, it must be impossible to transmit an entire frame in this interval. At 1 Gbps, all
frames shorter than 10,000 bits can be completely transmitted in under 10 μsec, so the minimum frame is
10,000 bits or 1250 bytes
ie 109 bps x 10 x 10-6 sec = 104 bits
104 bits / 8 = 1250 bytes
Class: TE Computers Academic Year: 2017-18 SEM:- I
Subject : Computer Networks Exam: INSEM Marks:30
Date: 12/8/2017 Paper Solution By: Prof. B.A.Khivsara

Q6 a) State the difference between static and dynamic channel allocation? Give two examples of
each. [5]

Ans:

Static Dynamic
Performs better under heavy traffic Performs better under light/moderate traffic
Low flexibility in channel assignment Flexible channel allocation
Wastage of Bandwidth is more Wastage of Bandwidth is less
No collision can occur Collision can occur when frames collide on each
other.
Example FDM, TDM Example: Pure and Slotted ALOHA, CSMA,WDMA
IN FDM frequency is divided into number of users In Pure ALOHA any station that has a frame can
and in TDM time is divided into number of Users. transmit it at any time, In Slotted ALOHA, time is
divided into slots and station can transmit frames
only at starting of that time slot.

Q6 b) Explain working of CSMA/CA with the help of flow diagram.


Ans:

We need to avoid collisions on wireless


networks because they cannot be detected.
Carrier sense multiple access with collision
avoidance (CSMAlCA) was invented for this
network. Collisions are avoided through the use
of CSMAICA's three strategies:
1. The interframe space,
2. The contention window,
3. Acknowledgments

Note that the channel needs to be sensed before


and after the IFS. The channel also needs to be
sensed during the contention time. For each time
slot of the contention window, the channel is
sensed. If it is found idle, the timer continues; if
the channel is found busy, the timer is stopped
and continues after the timer becomes idle again.

You might also like