Download as pdf
Download as pdf
You are on page 1of 17
1. For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology? Ans: n(n-1)/2 cable link are required for mesh, n for ring, n-1 cable link for bus, and n cable link for star topology. 2, Sketch the Manchester and differential Manchester encoding for the bit stream: 0001110101. (For differential Manchester. assume the line is initially in the low state) Manchester ooo rLLOLOL JUU ULL ‘Manchester oootrtrioLro)dt MUU UU UL pea fener Ce Le) erro tee Rena occurrence of a specific byte in a data Se Euan CED a ECR UE) Eo ae er) A technique used to prevent the occurrence of a eee ee Erno inserting an additional bit. CCE a et eRe ccd Poe Eel Deas Flag byte (01111110) Flag bit pattern (01111110) Insertion Seen era Coote Reyes Extra bitis inserted after each occurrence of the flag bit pattern. Come irre Ne Se SE aur) cee Less efficient due to the addition of an ey en cance aa ee Bo ke DO cee) More efficient as only an extra bit is added. Used in protocols like Ethernet and Token Ring. Pea Roe Oe RP cece Um Rel oe UE slots i Emad The main problem is that the error goes undetected if one or more bits of a subunit is damaged and the corresponding bit or bits of a subunit are damaged and the corresponding bit or bits of opposite value in second subunit are also damaged. This is because the sum of those columns remains unchanged. 7 vay 202 The main problem with LRC is that, it is not able to detect error if two bits in a data unit are damaged and two bitsin exactly the same position in other data unit are also damaged | 2 Data link layer: ii It makes the physical lay. fae data link layer transforms the physical layer, a raw transmission facility, to areliable ink andis responsible for node-to-node. delivery. fer appear error free to the upper layer (network layer). From network layer To network layer TS data] (tsa) a 7 Frome] [Fram Data 2 J Data 7] Hi] tink layer 4 ToIOTOONONIO From physical layer 4 Framing : The data link layer di on feom the network lye save divides the stream of bits rece 1-6 A (CS/IT-6) Introduction Concepts iii. Flow control : If the rate at which the data are absorbed by the receiver is less than the rate produced by the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver. iy. Error control : The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to prevent duplication of frames. v. Access control : When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. ate (ose (ate) Scene Sse Tey acres Size of the frame format in IEEE 802.3 oe streaes Scere ss Cee ea cd Scorn Cay eee Err drcey Scone Er) ace a =e g ce ocris There is no priority given in this standard It supports priorities to stations esse ea Size of the data field is 0 to 1500 ee Pa tac Cech eens) eee ce eee eet To Eee eC) Saree TOS ag Sees ‘Throughput & efficiency at Peers recs Ree ee gee Cee ee Tee cures ee cues See Ses ane ee Veda) Coen frees oe eee cd) it The CSMA protocol operates on the principle of carrier sensing. In this protocol, a station listens to see the presence of transmission (carrier) on the cable and decides to act accordingly. Different carrier sense protocols are : 1. CSMA/CA: a. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is a network contention protocol used for carrier transmission in networks using the 802.11 standard. b. CSMA/CA works to avoid collisions prior to their occurrence. 2 CSMA/CD: a. Carrier Sense Multiple Access / Collision Detection is a set of rules which determine how network devices respond when two devices attempt to use a data channel simultaneously. b. CSMA/CD protocol works to handles transmissions only after a collision has taken place. sake wou 8) Discuss the TCP/IP protocol suite on the basis of protocol layering. principle. AKTU 2013-14, Marks 05 1. The TCPMP protocol suite consists of five layers : physical, data link network, transport, and application, 2 The first four layers provide physical standards, network interface, internetworking, and transport functions that correspond to the first four layers of the OSI model [Appleton] ana 7 ‘Application SMTP FTP HTTP DNS SNMP TELNET | al ‘Transport | __SCTP TOP: UDP Network | [ICMP] [IGMP P RAR) [ARP Data link Protocols defined by underlying networks — ing network Fig. 15.1, 3. The three topmost layers in the OST ‘model, however, are represented in TOPAP by a single layer called the application layer as shown in Fig. 1.5.1. 4, At the transport layer, ‘TCP/IP defines three protocols ; Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Stream Contro] Transmission Protocol (SCTP). Layers of TCP/IP model : L Physical and data link layers : a. At the physical and data link layers, TOP/IP does not define any specific protocol. b. It supports all of the standard and proprietary protocols. ¢. Anetwork ina TCP/IP internetwork can be a Local Area Network (LAN) or a Wide Area Network (WAN). Network layer ; At the network layer, TCP/IP uses four supporting protocols: ARP, RARP, ICMP, and IGMP. a. Internet Protocol (IP) : It is an unreliable and connectionless protocol offering a best effort delivery service. b. Address Resolution Protocol (ARP) : It is used to associate an IP address with the physical address. 1-12A (CS/T-6) Introduction Concepts ° a e Reverse Address Resolution Protocol (RARP) : It allows a host to discover its internet address when its physical address is known. Internet Control Message Protocol (ICMP): It is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. Internet Group Message Protocol (IGMP) : It is used to facilitate the simultaneous transmission of a message to a group of recipients 3 Transport layer : Transport layeris represented in TCP/IP by following three protocols : a. b. c User Datagram Protocol (UDP) : It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. Transmission Control Protocol (TCP) : It provides full transport layer services to applications. Stream Control Transmission Protocol (SCTP) : It provides support for newer applications such as voice over the internet. 4. Application layer: Many protocols like Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), Hyper Text Transfer Protocol (HTTP), Domain Name System (DNS), Simple Network Management Protocol (SNMP), Telnet, etc., are defined at application layer. Message transfer client server or the other way round. sees vey Caen, Difference between TCP and UDP: Basis TOP UDP ) Connection |TCP is a connection| UDP is a connectioniess 7 oriented protocol, protocol. Ordering of/TCP rearranges data| UDP has no inherent data packets | packets in the specified | order as all packens ne order, independent of each other. Speed of The speed for TCP is| UDP is faster because transfer slower than UDP. there is no error-checking for packets, bs Reliability |There is _absolute| Thereis no guarantee that guarantee that the data| the messages or packets transferred remains intact | sent would reach at all. and arrives in the same order in which it was sent, Header size |TCP header size is 20-| UDP header size is bytes. 8-bytes. Error TCP does error checking. | UDP does error checking, checking but has no recovery option, Sone eee eeu wUEAa, 2. IPv6 (Internet Protocol Version 6) : An IPvé6 address is 128-bit long as shown in Fig. 3.21.3. [+ 128bits = 16-bytes = 32 Hex digits ——+| 16-bits 16-bits or 2-bytes or 2-bytes ++] 16-bits —_16-bits computer Networks 3-23 A (CS/TT-6) ecimal colon notation : Hex 56 uses aspecial notation called hexadecimal colon notation. In this, L the total 128-bits are divided into 8 sections, each one 16-bits or 2-bytes long. coy 3, The 16-bits or 2-bytes in binary correspond to four hexadecimal digits of 4-bits each. a. 3, Hence, the 128-bits in hexadecimal form will have 8 x 4 = $2 hexadecimal digits. These are in groups of 4 digits and every group is separated by a colon as shown in Fig. 3.21.3. 4, InIPv6, about 15% of the address space is initially allocated, the remaining 85% being reserved for future use.

You might also like