1. For n devices in a network, what is the number of cable
links required for a mesh, ring, bus, and star topology?
Ans: n(n-1)/2 cable link are required for mesh, n for ring,
n-1 cable link for bus, and n cable link for star topology.2, Sketch the Manchester and differential Manchester encoding for the bit stream: 0001110101. (For
differential Manchester. assume the line is initially in the low state)
Manchester
ooo rLLOLOL
JUU ULL
‘Manchester
oootrtrioLro)dt
MUU UU ULpea
fener
Ce Le)
erro tee Rena
occurrence of a specific byte in a data
Se Euan
CED a ECR UE)
Eo ae
er)
A technique used to prevent the occurrence of a
eee ee Erno
inserting an additional bit.
CCE a et eRe ccd
Poe
Eel
Deas
Flag byte (01111110)
Flag bit pattern (01111110)
Insertion
Seen era
Coote Reyes
Extra bitis inserted after each occurrence of the
flag bit pattern.
Come
irre
Ne
Se SE aur)
cee
Less efficient due to the addition of an
ey
en cance aa ee Bo ke
DO cee)
More efficient as only an extra bit is added.
Used in protocols like Ethernet and Token Ring.Pea Roe Oe RP cece Um Rel oe UE slots i Emad
The main problem is that the error goes undetected if one or more bits
of a subunit is damaged and the corresponding bit or bits of a subunit
are damaged and the corresponding bit or bits of opposite value in
second subunit are also damaged. This is because the sum of those
columns remains unchanged. 7 vay 202The main problem with LRC is that, it is not able to detect error if two
bits in a data unit are damaged and two bitsin exactly the same position
in other data unit are also damaged |2 Data link layer:
ii It makes the physical lay.
fae data link layer transforms the physical layer, a raw transmission
facility, to areliable ink andis responsible for node-to-node. delivery.
fer appear error free to the upper layer
(network layer).
From network layer To network layer
TS data] (tsa)
a 7
Frome] [Fram
Data 2 J Data
7] Hi] tink
layer
4
ToIOTOONONIO
From physical layer
4 Framing : The data link layer di on
feom the network lye save divides the stream of bits rece1-6 A (CS/IT-6) Introduction Concepts
iii. Flow control : If the rate at which the data are absorbed by the
receiver is less than the rate produced by the sender, the data link
layer imposes a flow control mechanism to prevent overwhelming
the receiver.
iy. Error control : The data link layer adds reliability to the physical
layer by adding mechanisms to detect and retransmit damaged or
lost frames. It also uses a mechanism to prevent duplication of frames.
v. Access control : When two or more devices are connected to the
same link, data link layer protocols are necessary to determine
which device has control over the link at any given time.ate
(ose
(ate)
Scene Sse Tey
acres
Size of the frame format in IEEE 802.3
oe streaes
Scere ss
Cee ea cd
Scorn
Cay
eee
Err drcey
Scone Er)
ace
a =e g
ce ocris
There is no priority given in this
standard
It supports priorities to
stations
esse ea
Size of the data field is 0 to 1500
ee
Pa tac
Cech eens)
eee ce eee eet To
Eee
eC)
Saree
TOS ag
Sees
‘Throughput & efficiency at
Peers
recs
Ree ee gee
Cee ee Tee cures
ee cues See
Ses
ane ee
Veda)
Coen
frees oe eee cd)
itThe CSMA protocol operates on the principle of carrier sensing. In this
protocol, a station listens to see the presence of transmission (carrier) on the
cable and decides to act accordingly.
Different carrier sense protocols are :
1. CSMA/CA:
a. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is
a network contention protocol used for carrier transmission in
networks using the 802.11 standard.
b. CSMA/CA works to avoid collisions prior to their occurrence.
2 CSMA/CD:
a. Carrier Sense Multiple Access / Collision Detection is a set of rules
which determine how network devices respond when two devices
attempt to use a data channel simultaneously.
b. CSMA/CD protocol works to handles transmissions only after a
collision has taken place.sake wou
8)
Discuss the TCP/IP protocol suite on the basis of protocol layering.
principle. AKTU 2013-14, Marks 05
1. The TCPMP protocol suite consists of five layers : physical, data link
network, transport, and application,
2 The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first
four layers of the OSI model
[Appleton] ana 7
‘Application
SMTP FTP HTTP DNS SNMP TELNET
| al
‘Transport | __SCTP TOP: UDP
Network | [ICMP] [IGMP
P RAR) [ARP
Data link Protocols defined by
underlying networks
— ing network
Fig. 15.1,
3. The three topmost layers in the OST ‘model, however, are represented in
TOPAP by a single layer called the application layer as shown in
Fig. 1.5.1.
4, At the transport layer, ‘TCP/IP defines three protocols ; Transmission
Control Protocol (TCP), User Datagram Protocol (UDP), and Stream
Contro] Transmission Protocol (SCTP).Layers of TCP/IP model :
L
Physical and data link layers :
a. At the physical and data link layers, TOP/IP does not define any
specific protocol.
b. It supports all of the standard and proprietary protocols.
¢. Anetwork ina TCP/IP internetwork can be a Local Area Network
(LAN) or a Wide Area Network (WAN).
Network layer ; At the network layer, TCP/IP uses four supporting
protocols: ARP, RARP, ICMP, and IGMP.
a. Internet Protocol (IP) : It is an unreliable and connectionless
protocol offering a best effort delivery service.
b. Address Resolution Protocol (ARP) : It is used to associate an
IP address with the physical address.1-12A (CS/T-6) Introduction Concepts
°
a
e
Reverse Address Resolution Protocol (RARP) : It allows a
host to discover its internet address when its physical address is
known.
Internet Control Message Protocol (ICMP): It is a mechanism
used by hosts and gateways to send notification of datagram problems
back to the sender.
Internet Group Message Protocol (IGMP) : It is used to facilitate
the simultaneous transmission of a message to a group of recipients
3 Transport layer : Transport layeris represented in TCP/IP by following
three protocols :
a.
b.
c
User Datagram Protocol (UDP) : It is a process-to-process
protocol that adds only port addresses, checksum error control, and
length information to the data from the upper layer.
Transmission Control Protocol (TCP) : It provides full transport
layer services to applications.
Stream Control Transmission Protocol (SCTP) : It provides
support for newer applications such as voice over the internet.
4. Application layer: Many protocols like Simple Mail Transfer Protocol
(SMTP), File Transfer Protocol (FTP), Hyper Text Transfer Protocol
(HTTP), Domain Name System (DNS), Simple Network Management
Protocol (SNMP), Telnet, etc., are defined at application layer.Message transfer client
server or the other way round.sees vey Caen,
Difference between TCP and UDP:
Basis TOP UDP )
Connection |TCP is a connection| UDP is a connectioniess 7
oriented protocol, protocol.
Ordering of/TCP rearranges data| UDP has no inherent
data packets | packets in the specified | order as all packens ne
order, independent of each
other.
Speed of The speed for TCP is| UDP is faster because
transfer slower than UDP. there is no error-checking
for packets,
bs
Reliability |There is _absolute| Thereis no guarantee that
guarantee that the data| the messages or packets
transferred remains intact | sent would reach at all.
and arrives in the same
order in which it was sent,
Header size |TCP header size is 20-| UDP header size is
bytes. 8-bytes.
Error TCP does error checking. | UDP does error checking,
checking but has no recovery
option,Sone eee eeu wUEAa,
2. IPv6 (Internet Protocol Version 6) :
An IPvé6 address is 128-bit long as shown in Fig. 3.21.3.
[+ 128bits = 16-bytes = 32 Hex digits ——+|
16-bits 16-bits
or 2-bytes or 2-bytes
++]
16-bits —_16-bitscomputer Networks 3-23 A (CS/TT-6)
ecimal colon notation :
Hex 56 uses aspecial notation called hexadecimal colon notation. In this,
L the total 128-bits are divided into 8 sections, each one 16-bits or 2-bytes
long. coy
3, The 16-bits or 2-bytes in binary correspond to four hexadecimal digits of
4-bits each. a.
3, Hence, the 128-bits in hexadecimal form will have 8 x 4 = $2 hexadecimal
digits. These are in groups of 4 digits and every group is separated by a
colon as shown in Fig. 3.21.3.
4, InIPv6, about 15% of the address space is initially allocated, the remaining
85% being reserved for future use.