Ict Chap 2
Ict Chap 2
01. Mr. 'X' connects the office computers installed in a multi-storied building for business through a cable with
a speed of 800 bps. It is difficult to manage its activities. So, to solve the problem, on the advice of a
computer engineer friend, set up a high-speed cable network. [JB’16]
(c) What type of bandwidth is Mr. 'X' using in the stem? -Explain. 3
Answer
c. The bandwidth used by Mr. 'X' is 800 bits per second, which is in the range of 300 to 9600 bits per second.
So, this bandwidth is mainly voice-band.
It is usually used more on land telephones. In this band on telephone lines, information can usually be
transferred at 200-360Hz frequencies. This bandwidth is used in computer data communication transfer from
computer to printer or also used transfer data from card reader to computer.
1
T-02: Transmission Method, Mode and Medium
01. Administrative building, academic building, library building and other buildings of 'A' college are located
at short distances. Currently, computers in each building can communicate with each other over their own
network. The principal now plans to bring all the computers under the same network. [DB’23]
(d) Which transmission medium is best for carrying out the principal's plan at the least cost? Give a logical
explanation. 4
Answer
d. The principal of 'A' college plans to bring all the computers in each building to the same network, connecting
two or more LANs to establish a CAN (Campus Area Network) network.
Cable Media:
1. Its is a high-speed medium.
2. This medium provides high bandwidth frequencies.
3. Cost is quite low through this. Cable prices and related devices are cheap and readily available.
4. Wired transmission mediums are copper wire, optic fiber cable and Ethernet.
5. By using hubs and switches, the area of network coverage can be extended.
6. LAN (Ethernet), MAN is an example of this medium.
7. There are no natural barriers in data transmission, one wire network does not connect to another wire
network so data does not create a barrier in transmission.
8. There is no barrier on transmission.
9. Its service quality is excellent.
Wireless Media:
1. Wireless medium is slower than wire or cable medium. However, some of the latest wireless media etc.
are ensuring data transfer as fast as cable media.
2. Its bandwidth is less than its medium as the frequency spectrum is very weak.
3. This medium is very expensive. The wireless subscriber stations, wireless routers, wireless access points
and adapters used for this are quite expensive and the associated devices are not readily available.
4. Transmission mediums of wireless media are electromagnetic waves, radio waves and infrared.
5. Examples of mediums are WLAN, WPN (Bluetooth), Infrared, Cellular (GSM, CDMA, LTE etc.).
6. Any interference between the receiver and transmitter of a wireless system causes interference in data
transmission. In addition, natural adverse environment, various ions and gases in the air also create
barriers to wireless data transmission.
7. Its service quality is relatively poor. Because wireless equipment is expensive and its data processing
setup is time consuming.
In this case Guided or wired medium is more useful than unguided or wireless network medium.
02. [BB’23]
2
Answer
c. The data transmission mode in figure-1 is simplex transmission mode.
Simplex transmission mode is a communication mode in which data is transmitted in one direction. In this
case the sender and receiver are not specific and interchangeable. An example of simplex transmission is
radio. In this case the data is transmitted from the radio station (transmitter). which receives the radio
(receiver). But data can never be sent from radio to radio station. Examples of simplex mode are published
articles, radio broadcasts, etc.
Apart from radio stations, TV broadcasting is also simplex transmission. Moreover, data transmission from
keyboard, mouse to computer, and data transmission from computer to printer are also examples of simplex
transmission.
d. Data transmission mode in figure-2 is half-duplex transmission mode and data transmission mode in figure-
3 is full-duplex.
In the half-duplex data transmission method, data is exchanged between two data users (devices between
which communication is taking place) using the same medium. Data can be sent in both directions. But since
the medium is the same, data cannot be sent and received simultaneously.
Full-duplex mode is a transmission mode where both sides can receive and transmit data simultaneously.
That is, in this case it is possible to have data flow in both directions simultaneously.
Matter of difference Half-duplex Full-duplex
An end can only receive or transmit data In this method of data transfer, data
Definition at the same time, but cannot receive and can be sent and received
transmit at the same time. simultaneously from both sides.
Bidirectional flow of data is possible but Any direction flow of data is
Data flow
not at the same time. possible at any time.
The sender and recipient are specific at a Both ends act as sender and
Influence
given moment. But interchangeable. receiver simultaneously.
Usage Usage is relatively complex. Relatively easy to use.
Technically rich approach. It uses
four pairs of twisted pair cables,
Technical side Technically poor method.
two pairs for receiving data and two
pairs for sending data.
Example Walkie talkie, web-browser etc. Telephone, mobile etc.
So, it can be said that between half-duplex transmission mode and full-duplex transmission mode, full-
duplex transmission mode is more useful.
03. The ICT teacher told the class that in one method of data transmission, data is transmitted through a wire in
the form of packets consisting of start and stop bits, and in another method, headers and trailers are added
and transmitted with the data frame. The teacher then talked about a technology that can provide internet
services over long distances wirelessly. [CB’23]
(d) Make a comparative analysis between the two methods of data transmission mentioned above. 4
Answer
d. In the stem, the mentioned two methods of data transmission are asynchronous data transmission and
synchronous data transmission.
A data transmission system in which data is transmitted character by character from the sender to the receiver
and the time interval between transmissions is not equal is called asynchronous transmission.
3
Advantages of Asynchronous Data Transmission:
At any time, the sender can send data and the receiver can receive data. No primary storage device (ie: RAM,
Cache, CPU memory etc.) is required for data transmission. Complex circuits are not required. Installation
cost is very low.
Disadvantages of asynchronous data transmission:
Data transmission speed is relatively low. Works at short distances. Less efficient than synchronous
transmission. If data transmission is stopped, the medium is unnecessarily idle, which is costly in the case
of microwave or satellite medium.
The method in which the data is first stored in the primary storage device of the sending station and the data
characters are divided into blocks and the blocks are sent at fixed time intervals is called synchronous data
transmission.
Advantages of synchronous data transmission:
There are no start and stop bits per character, there are no intervals, and transmission is faster because more
data can be transmitted in one large block at once. Used to send data to remote locations.
Disadvantages of Synchronous Data Transmission:
Requires primary storage device. Relatively expensive and quite complex.
So, it can be said that synchronous data transmission is better than asynchronous data transmission.
04. Mr. Didar's office documents are sent to recipients via e-mail as attachments. His office colleagues video
chat through WCDMA standard mobiles. [BB’19]
(c) Explain the transmission mode of sending letters or messages of the stem. 3
Answer
c. The transmission mode for sending messages of the stem is full-duplex and multicast.
Full-duplex data transmission mode involves sending data from both directions at the same time. Either end
can receive data while sending data or transmit while receiving data as needed. In the case of full-duplex in
the figure, B can transmit data to A simultaneously when A transmits data to B. Example-Telephone, mobile.
Again, when sending data from one node in the network in multicast mode, it may not be received by all
nodes in the network. Only all members of a receiver group can receive.
In the stem it is seen that Mr. Didar's office papers are sent through e-mail. It is therefore full-duplex and
multicast.
05. Raj learns from the teacher's discussion in the ICT class that in data communication one method transmits
data character by character and another method transmits data in blocks. He gets wireless internet connection
at his home. As a result, he can use high-speed internet. [JB’19]
(d) Which of the two methods of transmission of the stem is more efficient? Give analyticalfeedback. 4
Answer
d. Similar to question 03(d).
4
06. Mr. "X" sits on the computer and opens a browser software first by writing an address in its address bar and
pressing enter. As a result, a mail service was opened. Then he downloaded an attachment file from the mail
service. [RB’17]
(d) Analyze the data transmission mode and method used in any of the functions of Mr. “X”. 4
Answer
d. The data transmission modes and methods used in some of the purposes of Mr. "X" are as follows:
Function Data Transmission Method Data Delivery Mode Transmission
By bit format Based on bit mode based on data
synchronization flow direction
Entry address od Serial Transmission Asynchronous Unicast Simplex
key-board Transmission
Mail Service Serial Transmission Asynchronous Multicast Half-Duplex
Transmission
File Download Synchronous Synchronous Unicast Simplex
Transmission Transmission
07. Rahat goes to his friend's house to watch the World Cup football match on television. On his way back after
the game, he saw a truck accident on the road. A police officer stood in front of the truck, using a device
that looked like a mobile phone, talking haltingly. At that time Rahat's friend Reza wanted to know on the
mobile phone which country won the game? Rahat answered Germany. [Ctg.B’17]
(c) Analyze what method was being used to transfer data to the device of the police officer in the stem. 3
(d) Are there any differences in the data transmission method between the two devices when watching a
game on Rahat's television and telling a friend the result of the game? Explain in light of stem. 4
Answer
c. The police officer's device was a Torretka or walkie-talkie, which works in half duplex mode.
In this case, data is exchanged using the same medium between two data utilities (devices that are
communicating). Data can be transmitted in both directions. But the medium is the same, sending and
receiving data cannot be done simultaneously. The both party can transfer the data only if one completes the
transmission of data and gives permission to the other party.
Some features of half-duplex transmission-
Special circuit to avoid signal collision: If both police officer and constable want to talk together, signal
collision will occur and signal will be corrupted. To avoid this, special circuits are used in the device.
Two-Phase Role: Both police officers and constables can play the role of sender and receiver. That is, the
roles are interchangeable. However, no one can be the sender and the receiver at the same time.
Push To Talk (PTT): The roles of sender and recipient are exchanged by specific buttons. You have to
push the button to talk.
d. Watching the game on Rahat's television was a broadcast transmission, while a unicast transmission was to
inform friend Reza of the result to a friend.
In unicast systems, data can only be transmitted from one sender to one subscriber. In this case, the demand
for the same data is from multiple recipients on the network, but cannot be transmitted to all at the same
time. It has to be sent to each individually. Because there is 1 sender and 1 recipient, this type of delivery
mode is called one-to-one (1 to 1) or point-to-point mode. Unicast mode can be simplex, half-duplex, full-
duplex. When Rahat called Raju and informed him of the result, no one else was added to the call, the flow
of data was limited to both of them, so it was unicast transmission.
5
On the other hand, broadcast is done when it is necessary to transmit data to all modes (receivers) under the
transmission network. In this method, there is only one sender. But the recipient will be all devices connected
to the network. This delivery mode is also known as one to all. Broadcast transmission is always simplex.
Not only could Rahat watch the game in stem, but anyone could enjoy the game on a particular TV channel
or any other medium, so it was an example of broadcast mode.
08. Zarif and Zayan are students of class XI. To improve the quality of their education they take laptop and
internet connection on the advice of ICT teacher. Since there is no television in the house, sometimes
everyone in the house watches various programs and cricket matches together. After a few days, it was found
that Zarif's results were quite good due to internet connection. But Zayan fell behind. [Din.B’17]
(c) Explain the mode of data exchange used in program and cricket game in light of stem. 3
Answer
c. The transmission mode for exchanging data used in stimulating events and cricket matches was simplex,
and the delivery mode was broadcast.
Simplex transmission mode is a communication mode in which data is transmitted in one direction. In this
case, the sender and receiver are not specific and interchangeable. In other words, he who is the sender is
always the sender. And whoever is the recipient is always the recipient.
On the other hand, broadcast is done when it is necessary to transmit data to all modes (receivers) under the
transmission network. In this method, there is only one sender. But the recipient will be all devices connected
to the network. This delivery mode is also known as one to all. Broadcast transmission is always simplex.
They enjoyed the shows and games they watched together in the house. Their feedback is impossible to
reach the broadcast center directly at that moment. So it's simplex mode. Again, there is no restriction or ban
on anyone watching that cricket game or show, anyone can watch it. So it's broadcast mode.
09. Two friends Salam and Kalam are walking on the road. Beside them a policeman is talking into a device
and signals the other party to speak when finished. Salam is talking and listening to his mother through a
device he carries. Kalam said, “Friend, you have to return home quickly. I heard on my radio this morning
that it might rain today.'' [SB’16]
(c) Explain the data transmission mode of the device used by the police. 3
(d) Analyze and comment on which of the two devices used by Salam and Kalam has a more convenient
data transmission mode. 4
Answer
c. Similar to question 07(c).
d. One of the devices used by Salam and Kalam is Mobile, which works in full duplex mode, while Kalam
hears the news of rain on the radio, which works in simplex mode. Meanwhile, the transmission mode of
the walkie-talkie used by the police is half-duplex.
Their differences are as follows:
Matters of Simplex Half-Duplex Full-duplex
difference
No edge can only receive or send In this way, in the case
One end only transmits data at the same time, but Receive of data transfer from
Definition data and the other end and send cannot simultaneously both sides At the same
only receives data. at the same time. time Data can be sent
and received.
6
Only a one-way flow of While two-way flow of data is Any flow of data is
Data Flow data is possible. possible , it is not possible at the possible at any time.
same time.
The roles of sender and The sender and receiver are Both ends act as sender
Data Flow recipient are specific specific at specific moments but and receiver at the same
and not interchangeable. are interchangeable. time.
It is used in some
Use The use is relatively complex. Relatively easy to use.
specialized fields.
Technically rich method.
It uses four pairs of
It is not possible to twisted cables, two pairs
Technical
confirm the data transfer Technically unenriched approach. of which are used to
aspects
or request a relocation. receive data and two
pairs are used to send
data.
Television, radio, PABX, Walkie-talkies,web-browsers, Telephone, mobile, etc.
Example
keyboard, etc. etc.
Overall, full duplex mode is most useful.
01. The ICT teacher told the class that in one method of data transmission, data is transmitted through a wire in
the form of packets consisting of start and stop bits, and in another method, headers and trailers are added
and transmitted with the data frame. The teacher then talked about a technology that can provide internet
services over long distances wirelessly. [CB’23]
(c) Describe the technology for providing the above wireless internet service indicated in the stem. 3
Answer
c. WiMAX is the technology used to provide wireless internet services mention in the stem.
WiMax stands for Worldwide Interoperability for Microwave Access. It is the latest high-speed broadband
internet protocol service of today. It is also called WMAN. DSL (Digital Subscriber Line) technology
provides high speed internet service. WiMAX (IEEE 802.16) can be of two types. Namely: Fixed WiMAX
and Mobile WiMAX. Mobile WiMAX is used to provide high speed internet connection to portable devices
like smartphones, laptops, tablets. In this case, good network is available in vehicles as well. Fixed WiMAX
on the other hand is used to provide internet connection in residential and commercial areas. Its coverage
area is fixed and large. Wi-Max is a simple solution for deploying broadband internet services in
mountainous regions or areas inaccessible for cable installation. Its coverage is up to 50-90 km. WiMax
generally consists of two main parts – the base station and the receiver. Network interferene or signal noise
is low. Full duplexing mode is used. At the same time it provides multifunctional benefits. Ensures Quality
of Service (QoS).
WiMAX provides VoIP (Voice Over Internet Protocol) and IPTV (Internet Protocol Television) facilities.
Line of Sight is not required.
7
02. For the convenience of the city dwellers, Mr. Mayor established a network for the exchange of information
at the speed of light. As the cost was high, he decided to install another wireless network on the advice of
the engineer. [Din.B’23]
(d) Analyze the feasibility of the network suggested by the engineer. 4
Answer
d. The network recommended by the engineer is a wireless or wireless communication network system.
The method of exchanging information and communicating without using any external wire or cable
connection is called wireless communication system. Some advantages of using wireless instead of optical
fiber are –
• Traditional communication methods with cables have some limitations in distance of cable capacity.
This limitation can be easily overcome by using wireless technology.
• Provides backup communication link in case of common network failure.
• Connects portable or temporary work stations.
• In situations where conventional cabling is difficult or economically impractical, using Wallace
technology is advisable.
• Connects mobile users or networks in remote areas.
03. Mr. Rahim bought a toy airplane for his six-year-old son. He demonstrated the flight of the aircraft using
the remote. On the other hand, his elder son uses internet through cable with laptop. Mr. Rahim uses wireless
internet on his smartphone with the help of a router. [RB’19]
(c) Explain the technology of flying the aircraft of the stem. 3
Answer
c. The technology of the stem aircraft flying is discussed below:
Procedure of flying the aircraft:
Infra-Red technology is the technology that powers the aircraft. Infrared radiation was discovered by
William Herschel in 1800. Electromagnetic radiation which has a wavelength range of 1 micrometer to 1
millimeter is called infrared wave or infrared radiation. The wavelength of this radiation is slightly longer
than the wavelength of visible light but shorter than that of microwaves. They are not visible to the naked
eye. Infrared rays are used in the remote control of all electronic devices including TV, CD player, music
system.
Infrared communication systems have an LED or Light Emitting Diode at the sending end that transmits
infrared signals and converts them into invisible light. At the receiving end there is a photodiode which
detects the invisible light transmitted from the sending end and converts it into an electrical signal with the
help of the receiver's electronic circuit.
04. Raj learns from the teacher's discussion in the ICT class that in data communication one method transmits
data character by character and another method transmits data in blocks. He gets wireless internet connection
at his home. As a result, he can use high-speed internet. [JB’19]
(c) What technology is used in the stem's internet connection system? Explain. 3
Answer
c. The technology used in the stem's data connection system is wireless internet service. In this case, signals
are exchanged in the form of wireless waves without any physical connection of wires or cables.
In wireless media, data is exchanged through electromagnetic radiation. Most electromagnetic radiation
comes from the Sun to Earth through visible light. Light is made up of waves of different frequencies. The
electromagnetic spectrum is the combination of all possible frequencies of electromagnetic radiation.
8
Wireless communication is accomplished through the following three media of electromagnetic spectrum:
• Radio Frequency Communication: Wide-Range Communication.
• Microwave Communication: Medium-Range Communication.
• Infrared-IR: Short-range communication.
Features of using wireless technology:
• Traditional communication systems with cables have some limitations on the distance of the cable
capacity. This limitation can easily be overcome by using wireless technology.
• Provides backup communication link in case of failure of common network.
• Connects to portable or temporary work stations.
• Wireless technology is recommended in situations where conventional cabling is inconvenient or
economically impractical.
• Connects mobile users or networks in remote areas.
In this way, data is exchanged by using wireless media.
05. Mr. Karim's village house is far away from his hometown. He transfers data through wireless internet
technology to laptops, desktops and smartphones at home during his stay in the city. But in the village house
he stays connected to the network by connecting the computer with a twisted pair of wires by paying a fixed
monthly rent to a special company. [Din.B’19]
(c) Explain the technology used by Mr. Karim of the stem in the city. 3
Answer
c. Similar to question 04(c).
06. Mohan, a member of Sabuj Bangla Club, transferred some pictures of the environmental disaster captured
by his mobile phone camera to the laptop through a special protocol of IEEE 802.15 standard. Later, Mohan
used the pictures to send to other members of the club on their mobile phones. [DB, SB, JB, Din.B’18]
(c) Explain the type of network used to transfer images to mentioned laptop of the stem. 3
(d) Compare WiMAX with hotspots used to transmit images to other members of the club. 4
Answer
c. Try yourself.
d. Share it is used to send photos to other members of the club. It uses Wifi network. The comparison of Wi-fi
with WiMAX is shown below –
Wi-fi Wi-Max
(i) Wi-Fi has limited coverage. Inside (i) Wi-Max has a wide coverage area. Covering
coverage the house in about 32 meters about 50 km.
inside and about 100 meters outside.
(ii) Uses unlicensed spectrum to access the (ii) Uses licensed or unlicensed spectrum to access
local area network. the Internet.
(iii) Cost is relatively low. (iii) Cost is relatively high.
(iv) Speed is relatively low. About 10-50 (iv) The speed is very high. Can be 10-100 Mbps
Mbps. depending on distance.
(v) Half duplex mode is used. (v) Full duplex mode is used.
(vi) Quality of service cannot be guaranteed. (vi) Quality of service is guaranteed.
(vii) It is currently known as the IEEE 802.11 (vii) It is known as IEEE 802.16 standard
G standard
Similarities:
(i) Both are used in wireless communication systems.
(ii) Both are alternatives to cable and digital subscriber lines.
(iii) Both use microwaves.
9
07. Nusayba wanted to network the three computers in the three rooms of her flat so that the printer connected
to the computer in her father's room could be used by the whole family. Her father's suggestion for
networking is to use some wired (cable) medium and her mother's suggestion is to use some wireless media.
However, Nusayba occasionally communicates with her mobile phone and her mother's mobile phone using
a technology of IEEE 802.15 standard to transfer information. [DB’17]
(c) Explain the process by which Nusaiba communicates information in the stem. 3
(d) Who do you think Nusaiba should take advice on setting up network in the stem? Justify the answer. 4
Answer
c. The method by which Nusaiba transmits information to the stimulus is Bluetooth.
Structure and Functioning of Bluetooth Network:
In Bluetooth technology, data travels in the radio frequency 2.45 GHz band. The Bluetooth network is also
called Piconet. PicoNet is the basic component of a Bluetooth network. Under the network, it is possible to
communicate with a maximum of 8 devices at any one moment. One of them is Master Device / Node and
the remaining 7 are Slave Device / Node. A piconet can have a total of 255 Slave nodes of which a
maximum of 7 can be active. The rest are inactive. Multiple piconets can be combined with common slave
nodes as well. Together they are called Scatternets . Two slave nodes cannot exchange data with each other.
Slave Node There is a small antenna with which only the masternode can communicate.
Piconet: Piconet is a unit of Bluetooth network. It has a Primary or Master station and a maximum of 7
active Sendaring or Slave stations. Only the master station is connected to the slave station on the piconet.
Scatternet: How many piconets combine together to form a scatternet? In this case, a slave node/station of the
piconet connects to two master stations simultaneously and acts as a bridge, maintaining the communication of
two piconets.
d. Try yourself.
08. ICT based knowledge and technology is advancing people on the path of prosperity. Arif studied ICT and
came to know about a communication medium where moving images can be sent along with sound.
However, the data cannot move in a curved path, so it is necessary to install a tower on a tall building whose
frequency is 300 MHz to 300 GHz. Later it was combined with a newly invented technology, which linked
one continent to another through under the ocean. [BB’17]
(c) Explain the first medium of the stem. 3
Answer
c. The first medium in the stem is Microwave.
Microwaves can be one-way and small signals can be sent in the center direction . Therefore, the transmitter
and receiver antennas must be aligned facing each other. This has the advantage that a pair of transmitter
and receiver antennas can exchange information without colliding with any other antenna.The name
microwave is given because the wavelength at this frequency is very short. Its frequency is much higher
than radio frequency, so it has better performance and speed.
Data is generally transmitted at frequencies of 2 𝐺𝐻𝑧 or higher. The main disadvantage of microwave is that
it does not spread like radio waves. Instead, it goes straight. As a result, the transmitter antenna and receiver
antenna must be facing each other in the same line. In other words, it is important to maintain line of sight
(LOS) in this case.
There should be no obstacle between the transmitter and receiver. This means that such signals cannot
penetrate buildings or any obstacles. If the distance between the transmitter and receiver is large, the antenna
must be raised very high. Another disadvantage of microwave communication is that these frequency waves
are weakened in the rain. This problem is not seen in radio frequency.
10
Characteristics of Microwaves:
• Microwave systems are essentially composed of two transceivers. One is used to transmit signals and
the other is used to receive signals.
• Microwave systems use antennas that are mounted on large buildings or towers so that signals can be
transmitted over long distances without interference.
• Microwaves cannot travel in curved paths.
Microwave Transmission is of two types. These are:
(i) Terrestrial Microwave (ii) Satellite Microwave
Terrestrial Microwave:
Terrestrial microwave transmission is a line-of-sight (LOS) transmission. In this technology, the transmitter
and receiver are mounted on the ground. The transmitter and receiver communicate in line of sight. If there
are no obstacles in the middle, terrestrial microwave transmission signals can travel up to 1 to 50 miles.
Characteristics of Transmission of Terrestrial Microwaves:
• Terrestrial microwave transmission is used in areas where cable is not feasible.
• It is relatively inexpensive for short distances. But it is quite expensive for long distances.
• Installation can be difficult, as line of sight is needed in this case. It is important to ensure that there are
no obstructions between the two antennas.
• Repeaters or relay stations must be installed every 40 to 50 kilometers to overcome obstacles such as
mountains, buildings, and other obstructions.
• Attenuation can occur, depending on the frequency, signal, and antenna size. Fog and rain can also
interfere with signal transmission.
• Microwave transmission is not immune to EMI (electromagnetic interference). As a result, this
transmission can be vulnerable to eavesdropping. However, many microwave transmissions use
encryption to protect data. In addition to EMI, microwave transmission can also be disrupted by
weather conditions.
Satellite Microwave:
Satellites orbit the Earth in space. They orbit due to the Earth's gravitational pull, so they do not need to use
any fuel or energy to stay in space. Satellites use solar power to run their electronic circuits. The Earth rotates
on its axis in 24 hours. If a satellite is also rotated once in 24 hours, it will appear to be stationary in the sky
from the Earth. This type of satellite is called a Geostationary Satellite.
Geostationary satellites cannot be placed at any altitude. To place them, they must be placed in a specific
orbit at an altitude of 34,000 kilometers above the Earth (the formula for determining the altitude of a satellite
𝟑 𝐆𝐌𝐓 𝟐
from the Earth's surface is 𝐡 = √ 𝟒𝛑𝟐
− 𝐑, where R is the gravitational constant, and the exact values of
the Earth's mass and radius yield an actual value of h of 35843.71236799197… km). The basic components
of each satellite are a receiver, a receiver antenna, a transmitter, a transmitter antenna, and power for running
these electrical devices, which is generated by solar panels. The stations located on Earth have powerful
antennas called VSAT (Very Small Aperture Terminal).
Once a geostationary satellite is placed in the sky, a transmitter device on one end of the Earth sends
microwave signals with a frequency of about 600 billion or more vibrations per second to the satellite.
Microwaves can penetrate the Earth's ionosphere. However, after being sent to the satellite, the signal
becomes extremely weak.
The satellite has many transponders. These transponders amplify the weak signal using an amplifier and
convert it into a 400 Hz signal to be sent back to the customer device on Earth. In this way, communication
is possible through two VSATs. The antenna of the VSAT must be placed in such a way that it always points
to the satellite. Because the satellites are located far away, they must emit electromagnetic waves at high
power.
11
The satellite acts as a microwave repeater. In this type of communication system, there are many microwave
transmitters or receivers on Earth. In this type of transmission, the signal is sent to the antenna or satellite
dish through a computer cable in a LAN. The satellite dish then sends that signal beam to the satellite located
on the Earth's axis. The satellite then sends it to another satellite dish on the surface of the Earth. If the
destination satellite dish is on the other side of the Earth or cannot be seen directly from the satellite, the
satellite can send the signal to another satellite. If the second satellite can see the destination satellite dish,
it will deliver the signal to the destination.
Characteristics of Satellite Microwave Transmission:
• Uses a high frequency, which is typically between 11 and 14 GHz.
• A relatively expensive technology. It is typically only used for large networks or for applications where
other technologies are not feasible. However, the expense will be few times more if cable is to be set in
the coverage area given by microwave.
• Complex to install and require specialized skills.
• Can be attenuated by atmospheric conditions, such as fog and rain.
• Can be susceptible to electromagnetic interference (EMI) and eavesdropping.
Uses of Satellite Microwave:
• Allows to communicate to any part of the world at a lower cost and faster speed.
• Can be used to broadcast television programs to a global audience.
• Can be used to communicate quickly in disaster management situations.
• Can be used for long-distance telephone calls between continents.
• Are used to observe the latest weather conditions.
• Satellites are used by GPS (Global Positioning System) to determine the latitude and longitude of any
location.
• Can be used for internal communication in businesses.
Disadvantages of Satellite Microwave:
Satellites are located in space, which is very far from Earth. This requires the use of large antennas, which
can be expensive and difficult to install.
Signals sent from Earth to satellites travel through space at the speed of light. However, even at the speed of
light, it takes time for signals to travel long distances. This can cause a delay in communication, which can
be noticeable in applications such as voice calls.
09. Tarek's home desktop computer is connected to broadband Internet through a telephone line. As the internet
data charges of mobile companies are high, he wants to connect his mobile, tab and laptop to the same
broadband internet at home,
so that he can video call her father through her phone who is living abroad. [JB’17]
(d) Analyze the possible arrangement to use the same broadband internet connection on all the devices of
Tarek. 4
Answer
d. Try Yourself.
12
T-04: The Mobile Generation and Internet
01. The standards used in the case of mobile phones are: - [SB’23]
(i) UMTS (Universal Mobile Telecommunication System)
(ii) LTE (Long Term Evolution)
(iii) MIMO (Multiple Input Multiple Output)
(c) In which generation of mobile phones is the standard mentioned in (i) mentioned above? Explain. 3
(d) Give a comparative analysis of the standards mentioned in (ii) and (iii) among the generations of
mobile phones used in the stem. 4
Answer
c. The standard (i) mentioned in the stem is used in 3rd generation(3G) mobile phones. Following are the
features of 3G technology explained:
1. Both packet switching and circuit switching methods are used for data conversion. However, with the
help of packet switching method, image and voice can be exchanged very quickly.
2. Model addition adds a new dimension to internet usage and data sharing on mobile phones.
3. EDGE (Enhanced Data Rates for Global Evolution) system is implemented. As a result, more data
transfer is possible.
4. Data transfer is of high speed. Data rate is more than 2 Mbps.
5. Mobile banking, e-commerce etc. service activities are possible.
6. In this case GSM, EDGE, UTMS and CDMS 2000 technologies are used.
7. Radio frequency W-CDMA or UMTS standard.
8. Channel access or cell signal encoding methods are TD-SCDMA and TD-CDMA.
9. High spectrum efficiency.
10. International roaming facility is introduced.
d. In the stem the mentioned standard (ii) is LTE 4th generation and standard (iii) is MIMO 5th generation.
The comparative analysis between 4th and 5th generation is as follows-
The main feature of 4th generation is its use of Internet Protocol (IP) based networks instead of packet
switching or circuit switching data transmission. It uses LTE (Long Term Evolution) standard. On the other
hand, the standard used in the 5th generation is 5G NR (New Radio), RAT (Radio Access Technology),
MIMO (Multiple Input Multiple Output) etc. Using MIMO technology can provide up to 10 times the
performance of 4G. The data transfer rate is up to 20Mbps on 4G and 100Mbps on 5G. In the 4th generation,
it is possible to see three-dimensional images, but the quality is not good enough. On the other hand, high
quality 4k video and 3D images can be viewed using 5th generation as a result of improved broadband
connectivity. As a result, virtual reality experience is possible. 5G has very low latency (around 1
millisecond) which is essential for gaming and automated vehicles. 4G can be used directly on the computer
through the USB port. Internet can be accessed easily using internet modem and sim card. IoT (Internet Of
Things) is easy to develop as a large number of devices can be connected together. Security measures are
more advanced in 5G than previous generations. It uses End to end encryption, Authentication protocol etc.
From the above discussion, it is easy to understand that 5G is more advanced and convenient among ii and
iii standard i.e. 4G and 5G.
02. Dolanchapa and his father are talking on mobile phones of different generations. Although the mobile that
Dolanchapa's father used earlier was a little bigger, he could use the Internet with that mobile phone.
Dolanchapa said, currently we can receive some facilities or services worldwide through the Internet.
[RB’19]
(c) Explain the characteristics of the generation of father’s mobile phone as Dolanchapa of the stem. 3
13
Answer
c. Mobile phone is of 2nd generation. Dolanchapa’s father’s. Its features are discussed below:
Features of the 2nd generation:
• This generation uses digital method of radio signal.
• Advances in semiconductor technology and microwave devices enabled digital transmission in mobile
communication.
• Digital modulation is used for better quality audio.
• Cell signal encoding methods are FDMA, TDMA and CDMA.
• Data transfer speed is very high.
• Helps to prevent data fraud.
• Prepaid system is launched first.
• Limited international roaming facility introduced.
• Packet switch network is used for mobile data transfer and core switch network method is used for voice
call switching.
• MMS (Multimedia Message Service) and SMS (SMS-Short Message Service) services are launched.
• Data and voice can be transmitted in GSM mode.
• Transmission is continuous if the user's location changes during a conversation.
• Radio interference caused by transmitters of other mobile service providers in particular.
03. Shanta uses Teletalk SIM in her mobile phone. She can transfer data of three-dimensional environment with
this phone. [SB’19]
(c) Explain the technology of Shanta's mobile phone. 3
(d) Compare the features of Shanta's mobile phone with the first-generation mobile phone. 4
Answer
c. The technology of Shanta's mobile phone is CDMA.
The full form of CDMA is Code Division Multiple Access. CDMA is a significant mobile standard of the
second generation. CDMA is different from TDM (Time Division Multiplexing) and has a higher frequency.
The customer service capacity of such systems is much higher than other cellular systems. For example,
compared to an AMPS (Advanced Mobile Phone System) cell, the capacity of a CDMA cell is 3 to 5 times
and 6 to 7 times higher respectively. In CDMA, more frequency bands are used for voice and data
applications.
In the CDMA system, radio waves are divided into several carriers or channels. Here individual codes are
given for each customer and this code is spread across the entire carrier. It has a bandwidth of 1.25 MHz.
d. The generation of Shanta’s Mobile is the second generation.
First generation mobile systems have the following features-
• This generation uses analog radio signals.
• Cell signal encoding method is FDMA (Frequency Division Multiple Access).
• Mobile phones are smaller in size and lighter in weight as compared to the conventional telephones of
the contemporary era.
• Signal frequency is relatively low.
• The transmission is interrupted if the user's position changes while the conversation is in progress.
• It uses microprocessor and semiconductor technologies.
• There is no radio interference caused by other mobile transmitters in the same area.
14
The second-generation mobile system has the following features-
• This generation uses digital radio signals.
• Advances in semiconductor technology and microwave devices made digital transmission possible in
mobile communications.
• Digital modulation is used for better audio quality.
• Cell signal encoding methods are FDMA, TDMA and CDMA.
• Data transfer speed is very high.
• Helps to prevent data fraud.
• The prepaid system was introduced first.
• Limited international roaming facility was introduced.
• Packet switch network is used for mobile data transfer and core switch network method is used for voice
call switching.
• MMS (Multimedia Message Service) and SMS (SMS Short Message Service) services were launched.
• GSM allows data and voice transmission.
04. Mr. Didar's office documents are sent to recipients via e-mail as attachments. His office colleagues video
chat through WCDMA standard mobiles. [BB’19]
(d) Analyze the mobile generation mentioned in the stem. 4
Answer
d. The mobile technology mentioned in the stem is the third-generation mobile technology. The International
Telecom Union called the third-generation mobile phone a new idea. Its concepts were – (ITU) “Internet
Mobile Communication for the year 2000” International Telecom Union gave birth to new concept of third
generation mobile phone. Its concepts were:
• Voice Quality will be similar to Public Telephone Network.
• Its data rates will be 144 kbps for moving vehicles, 384 kbps for people walking and 2 Mbps for home use.
• Its bandwidth will be 2 Mbps
• Internet connection will be provided. In the stem, Mr. Didar's office colleagues video chat over WCDMA
standard mobiles. which is a feature of 3G technology
• Both packet switching and circuit switching are used in data conversion. However, with the help of
packet switching method, image and voice can be exchanged very quickly.
• Model addition adds a new dimension to internet usage and data sharing on mobile phones.
• EDGE (Enhanced Data Rates for Global Evolution) system is implemented. As a result, more data
transfer is possible.
• High speed data transfer. Data rate is more than 2 Mbps.
• Mobile banking, e-commerce etc. service activities are possible.
• GSM, EDGE, UTMS and CDMS 2000 technologies are used in this case.
• Radio frequency is W-CDMA or UMTS standard
• Channel access or cell signal encoding methods are TD-SCDMA and TD-CDMA
• High spectrum efficiency.
• International roaming facility introduced.
15
There are many advantages of using third generation technology. They are-
1. Voice and data are transferred digitally.
2. Listen to music, watch TV and movies, and download on-demand.
3. Can browse the internet anytime; Games can be played and games can be downloaded on the Internet.
4. Video conference can be done.
5. Internet connection is provided all the time, no need to provide separate internet connection.
6. Bill payment services can be provided through alternative methods. For example, Pay-per-bit, pay-per-
session, flat rate, symmetric bandwidth etc.
So, it can be said that people have been benefited in many ways by the third-generation mobile technology.
05. Tarek's home desktop computer is connected to broadband Internet through a telephone line. As the internet
data charges of mobile companies are high, he wants to connect his mobile, tab and laptop to the same
broadband internet at home, so that he can video call her father through her phone who is living abroad.
[JB’17]
(c) What generation of mobile phone used by Tarek? Write 2 characteristics of mobile phones of this
generation. 3
Answer
c. Similar to question 04(d).
06. A College student Sumaiya is a resident of the village and is enjoying internet facilities including video
phone calls in the college premises. But at special times of the day she does not get the benefits she needs.
After learning about the same problem from friends and drawing the attention of the college authorities, the
principal instructed the ICT teacher to solve the problem quickly in an alternative way. [Ctg.B’16]
(c) Which generation device is Sumaiya using?- Explain. 3
Answer
c. Similar to question 04(d).
01. Scenario-1: In the classroom the teacher shows a type of cable which is made of transparent glass.
[RB’23]
16
Answer
c. The medium mentioned in stimulus scenario-1 is optical fiber.
Fiber optic or optical fiber is a type of technology that can transmit data or information in the form of light
pulses through glass/plastic fibers. Optical fiber, a fiber thinner than a hair that transports information at the
speed of light (3 × 108 ms −1 ). Optical fibers are conductors of electricity. In a range of infrared light
(1300~1500 nm), optical fibers are transparent enough to transmit signals over long distances without
absorption loss through total internal reflection.
Light signals can travel through fiber optics in two ways: laser and LED (Light Emitting Diode).
It has no attenuation and can travel long distances. Fiber optic cable has no EMI so it can be used anywhere.
It can move data at speeds in the Gbps range or higher. Transmission loss is extremely low (less than 0.2dB
per km). Security of transmitted data is ensured. Fiber optic cables are mostly used as the backbone of the
network.
d. The two mediums of data communication in stimulus scenario-2 are Radio Wave and Satellite Microwave.
Advantages of Radio Waves:
Radio waves can pass through obstacles such as mountains and buildings. Its wavelength is longest and is
not absorbed by the atmosphere. So, it has relatively less interference. Radio waves are reflected in the
ionosphere of the atmosphere. So, data transmission can be done anywhere in the world. It is an
electromagnetic wave and does not require a medium. Effective even in adverse environment and hostile
weather conditions.
Disadvantages of Radio Waves:
The frequency of radio waves is low. As a result, more data cannot be transmitted simultaneously. Excessive
radiation of radio waves is harmful to humans, animals and the environment.
Advantages of Satellite Microwave:
Any two ends of the world can be communicated very quickly at low cost. Television channels can broadcast
their various programs worldwide through satellites. Satellite phones can be used for quick communication
in disaster management. Satellite microwave technology can be used for intercontinental long distance
telephone calls.
Disadvantages of Satellite Microwave:
The satellite is very high above the earth so a very large antenna is needed to send the signal there. The
signal sent from Earth is a wireless signal and although it travels at the speed of light, it takes a while to
travel this great distance. This results in slow data transfer. So if you talk on the telephone, the other party
will not hear it immediately, but it will be heard a little later.
So it can be said that Satellite Microwave is better among the two mediums of data communication in stem’s
scenario-2.
02. In the classroom, the teacher discussed his medium used in cable TV. He discussed a type of Internet-based
service in the last class. In this system, the user can meet any demand, big or small, and the bill is determined
based on the amount of usage. [Ctg.B’23]
(c) Discuss the wire method of the stem mentioned above. 3
Answer
c. Co-axial cable is the medium mentioned in the stem.
A solid copper wire passes through the center of the coaxial cable. Plastic foam insulation is wrapped around
this wire. Another conductive wire or wire mesh (Braided Shield) is placed on the insulation. Sometimes
there is also a metallic foil between the shield and the plastic cover. This wire or mesh and metallic foil
together as an outer conductor protects the inner solid copper from electrical interference, so data or signals
can move smoothly. The outer conveyor is covered by a plastic jacket. As this cable is generally not affected
by external electrical interference, its widespread use can be seen.
17
Coaxial cable is easier to install, more secure, less expensive. This enables data to be transmitted over long
distances at high speeds. The transmission loss is relatively less. Data transmission rate depends on cable
length. Data cannot be sent more than 1 km without a repeater. This type of cable is commonly used in cable
TV networks. Coaxial cable is also used for local area networks.
03. Afnan and Safnan are two brothers. Afnan uses a type of cable for data transfer which consists of 4 common
colored (white) wires and Safnan uses a specially made pure glass fiber cable for data transfer. On the other
hand, Afnan's friend Rafsan uses a type of cable for data transfer that is capable of both digital and analog
data transfer and is used in cable TV networks. [SB’23]
(c) Explain the cable used for information sharing by Afnan. 3
(d) Provide a Comparative analysis of cables used by Safnan and Rafsan for data transfer. 4
Answer
c. The cable used by Afnan for data exchange is twisted pair cable.
Twisted pair cable consists of several pairs of cables twisted together through which the data signal flows.
This type of cable is commonly used for telecommunications. The wires are twisted to reduce crosstalk and
other interference. When the wire is twisted, one signal neutralizes the signal of the other. Signal quality
depends on the number of turns per unit length. Twisted pair uses color coding and each wire has an
insulation or covering. These coated wires are twisted. The twisted pair of wires is again wrapped in a plastic
jacket for protection. A total of 4 pairs of wires are usually used in this type of cable. Twisted pairs are color
coded. One of each pair of wires is covered with white plastic code and each white plastic code wire has
four color plastic coded wires of blue, pink, green and brown. Cables are to be connected to connectors
according to this color code. When connecting the wires, connect them on the basis of numbers 1, 2, 3, 4, 5,
6, 7, 8. Conductive material is used between the twisted wires to separate them. Its bandwidth can range
from 10 Mbps to 1Gbps depending on the category. However, the data transfer rate decreases as the distance
increases. Twisted pair cables are generally of two types. Namely- UTP, STP.
d. Safnan uses optical fiber and Rafsan uses coaxial cable for data transfer.
Co-axial cable is a three-layer cable made of copper or copper, a solid copper wire conductor in the center,
a plastic non-conductive layer surrounding it, and a mesh or shield of copper wire around this layer (Braided
Shield). There is also a metallic foil between the shield and the plastic insulating layer. A thick layer of non-
conductive rubber covers this cable. The copper wire mesh and the metallic foil together act as the outer
conductor, keeping it free from all external electrical influences. Fiber optic cables are made of specially
purified glass or plastic or some other transparent medium. It’s made of very fine fibers. The refractive index
of the center part of the fiber optic cable is higher than the refractive index of the outer part. The part which
has high refractive index is called Core, and the part which has low refractive index is called Clad. It is then
covered with a thin plastic wrap.
Both digital and analog data can be transmitted over coaxial cables. Both types of data can also be
transmitted over optical fiber.
Coaxial cables are of two types - Thinnet and Thicknet. Optical fiber also has 2 types of modes - single
mode and multimode fiber.
Data transmission loss of coaxial cable is relatively low and easy to implement. Data transmission is possible
without any loss in fiber optic cables.
Coaxial cable can transfer data up to 500 meters and optical fiber up to 2 km. Coaxial cable is relatively easy
and less expensive to set up a network. Optical fiber on the other hand is expensive.
Cable TV Widely used in the field of networking and in various laboratories in scientific research. Optical
fiber is used to transmit data to remote locations.
18
04. For the convenience of the city dwellers, Mr. Mayor established a network for the exchange of information
at the speed of light. As the cost was high, he decided to install another wireless network on the advice of
the engineer. [Din.B’23]
(c) Describe the network system implemented by Mr. Mayor. 3
Answer
c. The glass network system implemented by Mayor of the stem is made up of optical fibers.
Fiber Optic Cable: Fiber optic cable is made of very fine fibers made of specially purified glass, although
fiber optic cable made of plastic or some other transparent medium is also available for specialized
applications. Fiber optic cable is incredibly transparent in a range of infrared light (1300-1500nm), so signals
can be carried over long distances without significant loss due to absorption. The center part of the fiber
optic cable has a higher refractive index than the outer part. The part which has high refractive index is
called Core, and the part which has low refractive index is called Clad. Due to the difference in refraction,
light can pass through the core without loss through total internal reflection. (However, the process of
trapping light inside the core is different from normal total internal reflection.) Glass fibers used in fiber
optic communications are very fragile and are covered with a thin plastic coating during manufacture.
Covered with Kevlar mesh and polymer coating before use. A number of fibers are bundled together and
covered with a polymer coating when making a cable. A thin metal rod is inserted into the cable to prevent
loss when bending the fiber.
05. Mr. Arif established a network of computers in his multi-storied building with a medium made of multi-
component glass. He decided to use the IEEE 802.16 standard communication system to exchange
information with another building located 10 km away. [BB’19]
(c) Explain the medium used in multi-stored buildings. 3
Answer
c. Similar to question 03(c).
06. Mr. Karim's village house is far away from his hometown. He transfers data through wireless internet
technology to laptops, desktops and smartphones at home during his stay in the city. But in the village house
he stays connected to the network by connecting the computer with a twisted pair of wires by paying a fixed
monthly rent to a special company. [Din.B’19]
(d) Do a comparative analysis of the medium used by Mr. Karim in urban and rural areas for internet
access. 4
Answer
d. Karim used wireless internet in the city and wired internet in the village.
The technology used in the city is wireless media. This is done without any external cable connection.
A method of communicating information without using any external wire or cable connection is called
wireless communication system. With the help of this, different types of communication with each other
such as talking, text messaging, chatting, web browsing on the Internet etc. can be done very easily and
quickly from any part of the world. It includes mobile, portable two-way radio, personal digital assistant
(PDA) and wireless networking. Other examples of wireless technology include GPS units, wireless
computer mice, keyboards, headsets (audio), headphones, radio receivers, satellite television, broadcast
television, and cordless telephones.
On the other hand, the technology that he uses in the village is basically done by him, which is the opposite
of the city. In this case, he mainly uses twisted pair cable.
19
In guided media, electrical signals or light signals flow in a guided path through a solid metallic medium.
Solid media such as copper, aluminum and optical fiber are used as wires or cables. The reason why wires
or cables are called guided media is that electrical signals or light signals can flow through these mediums
only in any directed path.
Wire or cable is an important medium in data communication. Usually, different types of cables are used for
data transfer over short range networking. However, cables are also widely used for high-speed data
communication. There are different types of cables. However, the following cables are widely used -
• Co-axial cable
• Twisted Pair Cables
• Fiber optic cables etc.
From this comparison of the two types of media, it can be said that wireless media is effective for high-
speed networks over long distances, but its media is more effective for short-distance and low-cost
communications.
07. ICT based knowledge and technology is advancing people on the path of prosperity. Arif studied ICT and
came to know about a communication medium where moving images can be sent along with sound.
However, the data cannot move in a curved path, so it is necessary to install a tower on a tall building whose
frequency is 300 MHz to 300 GHz. Later it was combined with a newly invented technology, which linked
one continent to another through under the ocean. [BB’17]
(d) “Second medium is relatively more convenient”––Evaluate rationally. 4
Answer
d. The second medium was fiber optics cable or optical fiber.
Fiber optic cables are highly fine fibers made of specially refined glass, although fiber optic cables made of
plastic or any other transparent medium are also available for specialized purposes. The feature of fiber optic
cable is that it is incredibly transparent in a range of infrared light (1300-1500nm), so the signal can be taken
over long distances without any special loss due to absorption. The refractive index of the center part of the
fiber optic cable is higher than the refractive index of the outer part. The part with a higher refractive index
is called the core, and the part with a lower refractive index is called the clade. Data is transmitted at the
speed of light through full internal reflection due to the difference in refractive index.
08. A video editing firm that previously used network cables for a small number of computers now has to change
the cable to accommodate the increased number of computers and faster speeds. On the other hand, low-
cost computers are networked in such a way that even if one computer fails, the other computers do not stop
working. [CB’17]
(d) What type of network cable is currently used by the firm in which is used and why? Do a comparative
analysis of it. 4
Answer
d. The network cable directed to the stimulus is the twisted pair cable.
The word Twist means twisted or twisted. In a twisted pair cable, several pairs of cables are twisted together
through which the data signal flows. This type of cable is usually used for telecommunications. If the copper
wire is near each other, the signal of one affects the signal of the other, which is called crosstalk. The wires
are twisted to reduce crosstalk and other interference. When the wire is twisted, one signal neutralizes the
signal of another. The signal quality depends on the number of twists in unit length. Color coding is used
in twisted pairs, and each wire has an insulation. These covered wires are twisted or twisted. The twisted
20
wire is wrapped back in a plastic jacket to make it secure. A total of 4 pairs of cables are usually used in
this type of cable. Color codes are used in twisted pairs. One of each pair of wires is covered by a white
plastic code, and each white colored plastic code wire is accompanied by a four-colored plastic coded wire
of blue, pink, green and brown. According to this color code, the cable has to be connected to the connector.
At the time of connecting the wires, the connection has to be given on the basis of 1, 2, 3, 4, 5, 6, 7, 8. Non-
conductive materials are used between the twisted wires to keep them separate. Depending on the category,
its bandwidth can be from 10 Mbps to 1Gbps . However, as the distance increases, the data transfer rate
decreases. Twisted pair cables are generally of two types. Namely: UTP and STP
09. Mr. 'X' connects the office computers installed in a multi-storied building for business through a cable with
a speed of 800 bps. It is difficult to manage its activities. So, to solve the problem, on the advice of a
computer engineer friend, set up a high-speed cable network. [JB’16]
(d) Give Argument in favor of increasing the speed of data movement in light of the stem. 4
Answer
d. Similar to question 04(c).
10. One day none of the computers on the network used in Mr. Rafiq office were working. Investigation revealed
that this happened due to only one computer failure. On the other hand, two computers of the network used
in the office of Mr. Mizan were destroyed, but the other computers were functional. In this case the
computers were connected to a central device. [RB’16]
(c) Describe the type of cable commonly used in the network used in Mr. Rafiq’s office. 3
Answer
c. Similar to question 08(d).
01. Administrative building, academic building, library building and other buildings of 'A' college are located
at short distances. Currently, computers in each building can communicate with each other over their own
network. The principal now plans to bring all the computers under the same network. [DB’23]
(c) Explain the network arrangement of the academic buildings of the said college mentioned in the stem. 3
Answer
c. Devices in each building are connected to each other in a network that is connected to only one building. It
is basically a PAN and LAN network system.
PAN: A network arrangement between devices located within a relatively short distance is called a Personal
Area Network (PAN). PAN distances can typically be up to a few meters. For this, Bluetooth Infrared etc.
technologies and short length cables are used in connecting devices. Its range is from 10m. Upto 20 m.
LAN: A data communication network system established in a small geographical location (eg: educational
institution campus, hospital, shopping mall, bus station, railway station, airport, office-court or home-house)
is called Local Area Network (WLAN). Connecting devices use Wi-Fi technology and UTP Cat-5 and Cat-
6 cables for LAN connectivity. This network installation and maintenance method is not easy and also
expensive.
21
02. [DB’23]
Fig-1 Fig-2
(c) Explain the network topology of Fig-1 in the stem. 3
(d) Which of the topologies shown in Fig-1 and Fig-2 is more convenient in the stem? Justify the answer. 4
Answer
c. The network topology of the figure-1 is bus topology.
Common bus networks typically use a single cable without any electronic devices such as repeaters or
amplifiers to carry signals from one computer to another. So this topology is called passive topology. When
a computer sends a message to another computer, the message is transmitted through the signal cable and
reaches all the computers. Only the computer to which it is sent receives the message and others simply
discard the packet.
Another important thing in bus network is termination. Since the bus is a passive topology, signals can flow freely
from one end to the other. If the ends of the cable are not terminated, the signal will appear to travel from one end
to the other but bounce back. In this way the electrical signal continues to travel and noise will be added to the
next signal. The signal coming back from the edge is called ringing. A resistor called a terminator is used at the
end of the cable to prevent this ringing from occurring. This terminator deadens the electrical signal, so it cannot
be reflected.
d. The topology shown in figure-1 of the amplifier is bus topology. On the other hand, the topology of figure-
2 is star topology.
Termination is important in bus topology. Since the bus is a passive topology, signals can flow freely from
one end to the other. On the other hand, a network in which every computer is connected through a central
device to form a network structure is called star topology. It is also called P2MP (Point to Multi Points)
Between the topologies of Figure-1 and Figure-2 mentioned above, bus topology is more convenient.
Advantages of Bus Topology:
• It is a very simple, low-cost, easy-to-use and easy-to-understand topology for small networks.
• Bus network requires the cables with the shortest lenghts. Which causes reduction in costs.
• The bus network can be extended by connecting another bus to the backbone or bus using BNC barrel
connectors. This allows more computers to join the network.
• Repeaters can be used to extend the bus farther and maintain signal performance.
• If one of the computers in the bus network fails, there is no difficulty in working with the other
computers. It is possible to easily isolate a computer from the network.
• Adding or removing a node (computer, printer, or other device) to the bus network does not disrupt the
operation of the entire network.
Disadvantages of Star Topology:
• When the central hub becomes useless, the entire network breaks down.
• There is possibility of Data Collision.
• Implementation cost is high.
22
03. In the classroom, the teacher discussed his medium used in cable TV. He discussed a type of Internet-based
service in the last class. In this system, the user can meet any demand, big or small, and the bill is determined
based on the amount of usage. [Ctg.B’23]
(d) Give an analytical opinion about the services mentioned by the teacher in the stem. 4
Answer
d. In the stem, the teacher mentions cloud computing services.
Cloud computing is the convenience of storing all important information and using the computer at home
by renting a large and desirable computer with internet connection on a smartphone or computer. Cloud
computing can meet any kind of needs of the user. There are three types of services offered by cloud
computing. namely-
Iaas: Infrastructure as a service: In this case, computer infrastructure or machines are rented. The user
can install the operating system of his choice and run the application software under his own control.
PaaS: Platform as a service: In this case, instead of virtual machines, computing platforms such as
operating systems, databases, web servers, etc. are rented. User can develop his application software at low
cost.
SaaS: Software as a service: The service provider can use the company's software without locating or
installing it on the user's CPU or storage.
One of the features of cloud computing is its Pay As You Go facility. That is, there is no need for the buyer
to make a reservation in advance. When/as long as the user wants and for as much service, he/she will pay
only for that service for that time/period.
From the above discussion, it can be understood that the service mentioned by the teacher of the stem
corresponds to cloud computing. In other words, the teacher referred to cloud computing services.
04. [BB’23]
23
d. Topology in figure-1 is mesh topology and topology in figure-2 is star topology.
Subject Star Mesh
03. If any device is damaged There is no problem if any device other than no problem
the central device is damaged.
05. Privacy and Data Security If you use a hub it doesn't but if you use a less
switch it does.
08. Dependencies of devices Every device is completely dependent on the Every device is
central device. independent
So, it can be said that Mesh Topology is more convenient between Figure-1 Mesh Topology and Figure-2
Star Topology.
05. Read the stem below and answer the questions: [JB’23]
Fig-1 Fig-2
(c) Discuss the role of the D device used in Fig-1 of the stem in this topology. 3
(d) Discuss the comparison of network connecting devices in case of connection between Fig-1 and Fig-2
and select the best one. 4
Answer
c. Fig-1 indicates Star Topology.
A topology in which all the devices are directly connected to a concentrator or central device, but the rest of
the devices are not directly interconnected, is called a star topology. In the figure, three devices X, Y and Z
are connected to the central device D.
Typically, this central device is a hub, or switch. A brief discussion about them is added below:
Hub: Hub is basically used to establish connection between many computers or a server and other
computers. It is a device (node) that broadcasts the data of all devices connected to it, that is, it sends data
sent from any device or computer to all connected devices. The data transmission of the hub is of half duplex
type i.e. it cannot broadcast data from two devices at the same time.
24
Switch: The function of hub and switch is the same, but it is possible to send any information to one or more
specific people in the network connected by the switch, the others connected to that network will not get
access to that information. It divides the network into subnetworks with specific devices and transmits data,
so that the rest do not have access to that data, i.e. signal multicasting is possible which was not possible in
case of hub. In this case, the device is specified by the MAC address of the device connected to the network.
When data arrives at a switch, the destination of the data is first verified and then the data is sent. Hence the
switch is called an “intelligent device”. The switch works in full-duplex mode, meaning that data can be
exchanged between multiple devices at the same time, with little or no chance of data collision like a hub.
So the efficiency of the switch is higher than that of the hub. A switch is more secure than a hub. Unicast,
Multicast, Broadcasting is possible through switch.
d. Fig-1 is Star Topology while Fig-2 is Mesh Topology.
Hubs or switches are used in star topology. In case of wired mesh topology, devices are connected directly
to each other and do not require additional network devices. However, in case of wireless mesh topology,
routers are usually used to make devices associated with the same protocol.
Hub Switch Router
Connects multiple devices to a Connects multiple devices to a Connects multiple networks.
network. network.
Sends data to all devices Can send data to specific Can send data to specific devices
connected to the network. devices on the network. on the network.
Cannot send data to specific
devices separately.
Works in half duplex mode Works in full duplex mode Primarily full duplex
Data filtering is not possible. Performs data filtering and Performs data filtering
amplification.
From the above difference it can be said that switch is better in star topology and router is better in mesh
topology.
And if these two different networks are to be connected to each other, then they should use gateways or
bridges between themselves because the protocols are different. In that case, the hybrid topology will be
formed.
GateWay: GateWay is a network connectivity device. It is also called a WAN device because it combines
two or more networks with different protocols (LAN, MAN, WAN) to form WAN. Adding different
protocols requires translation of the protocols. And for this, PAT or Protocol Address Translation technology,
which is also called Protocol Converter.
25
Features & Advantages:
• Filters data
• Less risk of data collision
• Although working with different protocols, only identifying the target IP and sending data only to him.
• Using PAT
• Faster than a router
Disadvantages:
• The price is exorbitantly high
• The configuration is the most complex
Bridges: Bridges are used to connect networks of different architectures and between multiple LANs. That
is, just as Hub / Switch creates connections between multiple devices, Bridge creates connections between
multiple Hub / Switch . Multiple topologies can be connected through bridges, that is, bridges are needed
in hybrid topology.
06. [Din.B’23]
Fig-1 Fig-2
(c) Analyze the network topology of Figure-1. 3
(d) Which of the topologies shown in figure-1 and figure-2 is convenient? Give your opinion. 4
Answer
c. In stem the network topology of Figure-1 is ring topology. Below is an analysis of the ring topology:
In a ring topology, each node or device is connected to two neighboring devices to form a ring-like structure.
In this, when data is sent from a device, it travels through the cycle device in a specific direction to reach
the destination. Such topologies are used to build high-capacity networks. The advantage of this type of
network is that every computer has equal rights and if the performance of the network decreases due to more
computers it hats applies to everyone. Ring topology is called Active topology. Each computer amplifies
the signal and sends it to the next computer. A ring topology does not require a terminator.
A special type of ring network is the token ring network. It involves token passing. A short message, known
as a token, is circulated on the ring. When a computer is in possession of that token, that computer can send
data over the network. Once the data is sent, the token must be released and it will continue to rotate in the
ring. The computer that needs to send the data will capture the token and send the data.
d. In stem, Figure-1 and Figure-2 are Ring Topology and Mesh Topology respectively. Between the two
topologies mesh topology is more convenient.
Data transmitted in a ring topology is always transmitted in one direction. As a result, when data is sent from
one computer, it has to pass through all the computers or devices to reach the destination computer. Even if
the number of computers in the network increases, its efficiency is not affected much. No server computer
is required on the network. Thus, here quires much less of it.
Ring Topology collapses if one computer in the ring becomes useless. If there is a problem in the ring
network, it becomes difficult to find the fault. Removing a computer from a network ring or adding a
26
computer to it disrupts the network. Increasing the number of computers in the network also increases the
data transmission time. As a result, bandwidth is reduced. Complex control software is used for ring
topology.
On the other hand in mesh topology any two nodes or devices are connected to the processor. It can exchange
signals between any two nodes very quickly. If a computer or connection line goes down, there is no
problem. It provides much more certainty in data communication. Network problems can be solved very
easily.
Network installation and configuration in this topology is quite complex. It receives the maximum number
of wires. Longer length of connection lines leads to higher cost. Moreover, additional links have to be
established in the network, which increases the cost.
From the above analysis we understand that in comparison mesh topology is more convenient as all the
computers connected to the network can be contacted directly.
07. X College has networked computers using multi-component glass media. The college is connected with 'Y'
college which is 40km away by IEEE.802.16 standard communication device. [MB’23]
(d) Explain and analyze the communication device used in connecting 'X' college with 'Y' college. 4
Answer
d. Communication system used in connection of 'X' college with 'Y' college is Wi-MAX and communication
device is router.
Both colleges use IEEE 802.16 standard for communication. It is basically the Wi-MAX network standard.
WAN (Wide Area Network) is formed by joining the LAN (Local Area Network) network of two colleges.
Router is used to connect LAN to WAN. A router is a networking device that exchanges data based on IP
addresses. Through this, a large network can be built by connecting multiple LANs of the same small size
with different configurations. A router can send a signal received on one network to a device on another
network using the shortest distance. When sending data within the network, the router can modify and
process the data according to its needs, so it has its own memory device and processor. Router is also called
Intelligent Device like switch because it works with high efficiency.
WiMax generally consists of two main parts. Namely: base station and receiver. Routers are used to
exchange signals at both locations.
08. [MB’23]
27
Advantages of Tree Topology: Network expansion of tree topology by creating new branches is very
convenient. This network structure is more useful for office management work. It has maximum data
security. Connecting a new node or removing a peripheral terminal does not disrupt the normal operation of
the network.
Disadvantages of Tree Topology: Tree network goes down if root or server computer fails. It’s relatively
complex compared to other topologies. If a device within another topology fails, parts of the network become
unusable (that device and subsequent layers are disconnected from the network).
d. Figure-1 shows bus topology and figure-2 shows star topology.
Subject Bus Star
04. If any device is damaged no problem There is no problem if any device other than the
central device is damaged
06. Privacy and Data Security no If you use a hub it doesn't but if you use a switch it
does
In star topology, the speed is higher and the transmission speed remains normal even if the nodes are
increased. Moreover, it has less traffic and less data collision and noise. So star topology is more useful.
09. X College is a reputed educational institution in Dhaka city. They have five more branches in different
districts of the country. The principal has developed a network system for the smooth running of all the
branches sitting in the main institution. Later, teachers and students were thinking of a service that uses the
Internet to provide low-cost advanced services and pay as much as they use. [DB’19]
(c) What kind of network was established to manage educational institutions and their branches according
to the stem? Describe it. 3
(d) Is it possible to implement the new service that the principal was thinking of according to the stem?
Give analytical opinion. 4
Answer
c. In the stem, LAN is used to manage each branch of the educational institution and MAN is used to manage
various branches. Below are their descriptions:
Description of LAN: A network formed by connecting several computer terminals or other devices within area
of usually 10km or less is called a Local Area Network or LAN (LAN). It is usually used: on school-college
campuses, in a large office building, or in an expensive peripheral device that can be used by many users.
Coaxial cable, UTP cable or optical fiber cable are generally used as transmission media. A maximum of 4
repeater stations can be used on the LAN. As an example of this, Bangladesh University to Engineering and
Technology own computer network can be mentioned.
28
Description of MAN: When a network is formed with some computers located in different parts of a city
or a LAN formed by them, the network is called MAN. It is a network of larger area than LAN. Its
transmission media is usually telephone lines, modems or in some cases microwaves. An example of MAN
can be cited the cable TV network of any city. MAN can also consist of the LAN of an organization's factory,
warehouse, sales center, head office etc. These networks are mainly used in the stem.
d. Similar to question 03(d).
10. Mr. Rahim bought a toy airplane for his six-year-old son. He demonstrated the flight of the aircraft using
the remote. On the other hand, his elder son uses internet through cable with laptop. Mr. Rahim uses wireless
internet on his smartphone with the help of a router. [RB’19]
(d) Analyze the strategic approach of Mr. Rahim and his elder son in using the internet. 4
Answer
d. Mr. Rahim operates the internet through WiFi on the router and his son runs the internet through Ethernet
cable. Their working methods are discussed below:
His son's connection: His son connects directly to the Internet through Ethernet.
Data is exchanged from the server to the Internet through cable.
Mr. Rahim 's Connection: Mr. Rahim communicates through WiFi.
Wi-Fi or Wireless Fidelity is a popular wireless technology that uses radio waves to allow any electronic
device to exchange data through a high-speed Internet connection or computer network. Wi-Fi technology
is faster and less expensive than standard Ethernet and other common wired LAN technologies. Thus, Wi-
Fi connects laptop PCs, PDAs, smart phones, tablets and other devices to Wi-Fi wireless LANs by
connecting Wi-Fi modems for rapidly growing business, public and home networks and easily connect to
the Internet and other networks. Through the discussion we got to know the internet usage strategy of Mr.
Rahim and his son.
11. Dolanchapa and her father are talking on mobile phones of different generations. Although the mobile that
Dolanchapa's father used earlier was a little bigger, she could use the Internet with that mobile phone.
Dolanchapa said, currently we can receive some facilities or services worldwide through the Internet.
[RB’19]
(d) Analyze the technology used by Dolanchapa to take global advantage. 4
Answer
d. The technology used by Dolanchampa to gain worldwide access is the Internet. Internet is a worldwide
computer network. It is an international network made up of numerous smaller or larger networks. The
number of networks connected to the Internet is currently in the millions and the number of connected
computers is over a hundred billion; And these numbers are increasing rapidly.
The early activities of the Internet began with the ARPANET. In 1969, the United States Department of
Defense connected four of the country's universities through an experimental computer network as part of a
research project. The name of this network is ARPANET. Initially, the use of this network was open to
research institutes and universities. But this condition did not last long. It is currently open to all. In 1982,
the term Internet was introduced with the invention of the TCP/IP (Transmission Control Protocol/Internet
Protocol) protocol, which is useful for connecting different networks. Thus, the described technology is
paving the way for services.
29
12. Mr. Habib was sharing information free of cost with his friend sitting next to him in his office. At that time,
when a colleague on the 2nd floor of the office asked him to see the information of a file, he sent it to the
colleague's computer on his own network while sitting in the room on the ground floor. Later, when a foreign
buyer asked for the file, he sent it immediately. [Ctg.B’19]
(c) Describe the technology used by Mr. Habib for information sharing with his friend. 3
(d) Which of the two networks of Mr. Habib is better for sending file information? Give analytical
feedback. 4
Answer
c. The technology used by Mr. Habib for sharing information with friends is Bluetooth.
Bluetooth is a wireless Personal Area Network (PAN) protocol that uses radio waves to exchange data over
short distances. Its distance is usually 1 to 100 meters. Current devices such as laptops, tablets, PDAs, smart
phones etc. have Bluetooth built-in. Moreover, Bluetooth can be activated on any computer with the help of
a USB Bluetooth adapter.
Enthusiastically, Mr. Habib shared the information with his friend sitting next to him. Which is via
Bluetooth. Its data transfer rate is about 1 megabit/s or more. Multiple devices can be connected
simultaneously using Bluetooth. It operates in the radio wave 2400.0 MHz to 2483.5 MHz frequency band.
Structure and working procedure of Bluetooth Network:
In Bluetooth technology, data moves in the radio frequency 2.4 GHz to 2.4835 GHz band. The basic element
of the network that is created with the help of Bluetooth technology is Piconet A piconet can have a master
node and a maximum of 7 active slave nodes at any one time. The slave node has a small antenna that can
transmit signals in the 2.4 GHz band. The master node assigns different time slides to its subordinate slave
nodes and the slave nodes send data accordingly. Thus, Bluetooth is an excellent method of exchanging
information over short distances. Node and maximum of 7 active slaves.
d. In the stem, Habib used both LAN and WAN networks.
A network created by connecting several computers or other devices within a general area of 1km or less is
called a local area network or LAN (LAN). It is usually: in a school college campus, a large office building
or an expensive peripheral device used by many users.
A network that connects several LANs and MANs located at different geographical distances is called a
Wide Area Network or WAN (WAN). Public communication systems such as telephone lines, fiber optic
cables, satellites or microwaves are used as transmission media in these networking systems.
In the stem, Habib uses LAN in his own office but uses WAN to communicate with foreign customers. This
network connects two or more devices wirelessly within a specific area such as home, school, computer,
laboratory or office building. This enables the user to move within a specific coverage area and stay
connected to the network at the same time. A wireless LAN is also capable of connecting to the Internet.
Again, the advantages of WAN include-
Advantages of WAN:
• Data and news can be sent from one place in the world to another in a moment.
• The data can be stored through the memory system and can be sent to the customer within a very short
period of time if needed.
30
• The patient can talk to the doctor from home, see the doctor, inform the doctor about the symptoms and
of the disease by placing his hand on the electronic sensor.
• Students can attend classes without going to college, university; Can ask questions to the teacher or
exchange ideas between the teacher and the students.
• A customer can request the salesman to send his desired product model without visiting the shopping
center. Within a few moments, when the model of the product appears on the customer's video screen, the
customer can request the salesman to send the product of his choice by pressing the remote control button.
Therefore, it can be said that LAN and WAN work in two ways depending on the distance.
However, LAN has many disadvantages as it works over short distances while WAN is expensive but has a
wide range. It can work on a large scale as well as small scale. Therefore, WAN is better than LAN.
13. [SB’19]
Com-3
C2
C4
Server P1 P2
Com-4 Com-2
C1
C3
Switch
Com-5 Com-1 P3 P4
31
Advantages of Wi-Max:
• No “Line-of-Sight” is required between the user and the Wi-Max base station.
• Provides mobile broadband internet connectivity in villages and towns through a variety of devices.
• Wi-Max is a wireless alternative to cable and digital subscriber line to ensure broadband coverage in
any geographical area.
• Provides extensive support in data exchange, telecommunication (Voice Over Internet Protocol-VOIP)
and IP TV service (Triple Play) etc.
• Provides internet connectivity support to businesses as part of continuity plans.
• Smart grids and metering exist.
• Cost is relatively low compared to other networks.
• Spectral efficiency is quite good.
• The Wi-Max has replaced cellular phones with relatively higher overall capacity.
It also has some disadvantages. For example-
Disadvantages of Wi-Max:
• Wi-Max cannot deliver speeds of more than 70 Mbps over distances of more than 50 km. As the
distance increases, the need for additional base stations arises. As a result, the cost increases.
• Performance degrades when there are multiple active users on a single sector.
• Signal problems occur during adverse weather conditions.
• Its maintenance cost is comparatively high.
• Electricity consumption is relatively high due to more electricity requirement.
Therefore, it can be said that his decision is logical.
15. [CB’19]
The computers of a college computer lab are connected in the above pattern.
(c) Explain the type of network of the figure used in the stem, in terms of distance. 3
(d) Which one is the best network topology for sharing data in computers 1, 2, 3 and computers 2,3, 4, 5
in the figure used in the stem? Justify the answer. 4
Answer
c. In terms of distance, the network can be called LAN is Local Area Network. LAN is usually used to create
a network over a very short distance.
Usually, the network created by connecting several computers or other devices within an area of less than
1km is called a local area network or LAN. It is commonly used in: school college campuses, large office
buildings or expensive peripheral devices that can be used by many users. Besides, LAN is used for data
entry, data processing, and electronic mailing system. The topology of LAN is usually star, ring or broadcast
channel method. Co-axial cable, UTP cable or optical fiber cable are usually used as its transmission media.
A LAN created using wireless (LAN) technology is called WLAN or Wireless Local Area Network. This
network connects two or more devices wirelessly within a specific area, such as a home, school, computer
laboratory, or office building. This enables the user to move within a specific coverage area and stay
connected to the network at the same time. Wireless LAN is also able to connect to the Internet. Most
wireless LANs are built based on the IEEE 802.11 standard and are commercially available under the Wi-
Fi brand name.
From this point of view, it can be said that the computers of the computer lab of the above college are
covered by the LAN based on the distance.
d. Similar to question 6(d).
32
16. [Din.B’19]
P
S Q S
Figure−A Figure−B
(c) Explain the new topology if PR and QS are disconnected in Fig-A. 3
(d) Comparatively analyze which of the topologies mentioned in diagram-A and diagram-B of the stem is
advantageous. 4
Answer
c. When PR and QS are disconnected in Figure A, the new topology that results is a ring topology.
In a ring network, computers are connected to each other in a circular path through nodes (points to which
computers are connected are called nodes) to form a network. Any computer on the network sends data or
information (signals) that flows to the next node. Thus, the unidirectional flow of information travels around
the entire circular path and computers connected to different nodes of the circular path can receive the signal
as needed. In such an organization, computers are not directly connected to each other, so no computer on
the network can send signals directly to any other computer. Therefore, if any computer on the network loses
its ability to retransmit the signal, or is damaged or isolated, the entire network becomes useless. In this case
the bad computer needs to be removed and reconnected. Besides, new nodes have to be created to connect
new devices. The new node has to break the ring and join the neighboring nodes.
d. In the stem, figure 'A' is Mesh Topology and 'B' is Hybrid Topology.
In mesh topology all devices are connected to each other. Mesh topology requires (n – 1) number of
n(n−1)
connections for n number of nodes and the number of wires is 2
, the advantages and disadvantages of
mesh topology are as follows:
Advantages of using mesh topology:
(i) Signals can be exchanged between any two nodes at high speed.
(ii) Failure of any computer or connection line does not cause any inconvenience. This means that the
network does not cause major problems.
(iii) It provides much higher assurance in data communication.
(iv) Network problems can be easily solved.
(v) Infrastructure is very strong.
Disadvantages of using mesh topology:
(i) Network installation and configuration in this topology is quite complex.
(ii) Longer length of connection lines leads to higher costs. Moreover, additional links have to be
established in the network, which increases the cost.
Figure B, on the other hand, is a hybrid topology or a mixture of different topologies.
Hybrid Network: The network that is formed by combining star, ring, bus etc. network is called hybrid
network. The Internet is a hybrid network because it includes networks of almost all types of topologies.
The advantages and disadvantages of hybrid networks depend on the topologies used in that network.
33
Advantages of hybrid network:
(i) Network can be further expanded if required.
(ii) Easier to diagnose any network problem.
(iii) The network can remain operational even if a node (computer, printer or any other device) is down.
Disadvantages:
(i) Maintenance is complicated
(ii) Cost is high
From this point of view, both the processes will be much more convenient in daily life. However, hybrids
are more advantageous in comparison.
17. [DB,SB,JB,Din.B’18]
Server P1 P2 Comuter 1 Comuter 2 Comuter 3 Comuter 1 Comuter 2 Comuter 3
P3 P4
Figure-1 Figure -2 Figure -3
(c) Explain the network topology shown in figure-1. 3
(d) Analyze and suggest which one of the network topologies shown in Figure-2 and Figure-3 is more
convenient. 4
Answer
c. Similar to question 02(c).
d. Similar to question 13(d).
18. Sethu thought of networking the four digital devices in their home with a central connecting device. A central
device is used so that if one of the digital devices fails, the whole network system does not go down. But
her brother wanted to set up the network using only network backbone cables to reduce network
implementation costs. [DB’17]
(c) Explain the network in the stem according to geography. 3
(d) Which of the following do you think is more reasonable in the stem to consider implementing a
network organization? Give analytical opinion. 4
Answer
c. Similar to question 09(c).
d. Try yourself.
19. [Ctg.B’17]
(c) Explain the problem in data movement if the ‘E’ device in the stimulus topology is damaged. 3
(d) A, B, C and D are the only four devices of the stimulus. Analyze what steps will be taken to speed data
movement the most. 4
Answer
c. The topology of the stem is the hybrid topology.
Here the devices A, B, C, D and E are connected in ring topology, while F and G devices are connected
to E in star topology. That is, device A has connected A and D directly to the ring network on the one hand,
and on the other hand, this ring network and the accompanying star network have also been connected. Not
only that, F and G are also joined by means of E.
34
So if this device breaks down, first of all, the connection between the ring and the star network will be
disconnected, and F and G will be completely disconnected from the network system. The remaining four
devices, i.e. A, B, C, D – will be connected to the linear or desichen topology and the data movement from
A to D will be slower. Because, if E could have been the data, now it has to be the path. A → E → DA →
B→C→D
d. Connecting the stem to everyone in A, B, C and D, that is, establishing the mesh topology, will maximize
the speed of data movement, because in this case, any device can maintain communication with its desired
device without the need for any other device.
In the case of mesh topology, every computer under the network is directly connected to all other computers.
There are different links or buses between each workstation. So each workstation can directly exchange data
with any workstation. Due to the high number of connections, it becomes difficult to build a network of
mesh topology on a large network. Mesh topology is difficult to install and manage. It takes to make a lot
of connections. As the number of nodes in the network increases, the number of connections also increases.
In this case, we need new (4C2 – 3) T = 3 wires.
20. Superna's office has a network running where 10 computers are directly connected to a single main cable.
Recently she got a huge amount of data processing work. But her office does not have a computer capable
of doing the job. She is worried about completing the work on time as she is unable to procure other
necessary equipment and software due to financial constraints. So, she decided to take online based services.
[SB’17]
(c) Explain the topology of the computer network of Superna's office. 3
(d) Analyze rationally the decision taken by Suparna. 4
Answer
c. The network topology directed to the stem is the bus topology. The main cable to which the devices are
connected directly is called the backbone wire.
Common bus networks typically use a single cable without any electronic devices such as repeaters or
amplifiers to carry signals from one computer to another. So this topology is called passive topology. When
a computer sends a message to another computer, the message is transmitted through the signal cable and
reaches all the computers. Only the computer to which it is sent receives the message and others simply
discard the packet.
Another important thing in bus network is termination. Since the bus is a passive topology, signals can flow
freely from one end to the other. If the ends of the cable are not terminated, the signal will appear to travel
from one end to the other but bounce back. In this way the electrical signal continues to travel and noise will
be added to the next signal. The signal coming back from the end is called ringing. A resistor called a
terminator is used at the end of the cable to prevent this ringing from occurring. This terminator deadens the
electrical signal, so it cannot be reflected.
Advantages of bus topology:
• It is a very simple, low-cost, easy-to-use and easy-to-understand topology for small networks.
• Bus network requires shortest cable length. This results in lower costs.
• The bus network can be expanded by connecting another bus using BNC barrel connectors
to the backbone or bus. This allows more computers to join the network.
• Repeaters can be used to extend the bus further and maintain signal performance.
• If one computer in the bus network fails, there is no difficulty in working with other computers.
It is possible to easily isolate a computer from the network.
• Adding or removing a node (computer, printer or any other device) in the bus network does not disrupt
the operation of the entire network.
35
Disadvantages of using bus topology:
• Performance can be very poor if network usage is high. Only one computer can send messages at a
time. Others have to wait until he finishes sending the message.
• Each barrel weakens the electrical signal. Therefore, expanding the bus using a large number of barrel
connectors results in poor network performance.
• Bus network troubleshooting is difficult. If the cable breaks somewhere in the bus, it cannot be easily
removed. When the bus is destroyed, the entire network becomes unusable.
• High number of computers in the network creates heavy traffic and disrupts data transmission.
• There is no coordination mechanism for data transmission in this topology. Any computer can
transmit data at any time. This wastes a lot of network bandwidth. This arrangement spends more time
on computers interrupting each other than on data transmission.
• Privacy is very low in this topology.sa
d. Suparna's initiative was cloud-based services or cloud computing.
Cloud computing is the ability to sit in the corner of your house and rent a large and desirable computer
with a large and desired facility through internet connection to your own small mobile phone or computer,
storing all the important information and using the computer randomly. Basically, we can get three types of
services due to cloud computing. Namely:
Infrastructure as a Service-IaaS:
Its full form is Infrastructure as a Service. In this case, cloud service providers provide services such as
storage, database, server, networking resources, etc. in the On-Premises Data Center (a set of servers under
private ownership, control and maintenance of the company) as various infrastructure IT components by
renting Virtual Machine (VM) to their clients. . Users can install and use the operating system and software
of their choice in their own space in virtual machines. In this case, organizations use Virtualization or
Hypervisor Layer to give separate and independent access to multiple users on the same machine. Other
infrastructure services provided by IaaS include – Detailed Billing, Log Access, Monitoring, Clustering,
Security, Load Balance, Storage Resilience (Backup, Restore, Recovery, Replication etc.).
A classic example of the IaaS model is AWS (Amazon Web Services)'s Elastic Computing Cloud or EC2,
which runs 1-4 virtual machines on each server and is rented by customers. Also examples of IaaS are
RackSpace, VMware, Azure Virtual Machines, GCE (Google Computer Engine) etc.
Platform as a service – PaaS:
Full form is Platform as a Service. This is mainly for developers. In this case, instead of renting a complete
virtual machine to its user, the service provider rents a computing platform or environment, where the
developers need to create, run, debug, develop and manage the application, only according to the operating
system, storage, Tools, software, middleware, hardware, programming language, execution environment etc.
are provided. It is very useful for software engineers and developers, because in this model a software
developer can create and develop his software at a very low cost.
Generally, PaaS = IaaS + [ Operating System (OS)+ Database MAnagement System (DBMS)].
Specifically the following types of services are included in the PaaS model:
Cloud InfaStructure: Data Center, Storage Space, Network Materials and Servers.
Middlewares: SDK(Software Development Kits), Firmware & OS(Operating Systems), Framework etc.
UI(User Interface): GUI (Graphical User Interface), CLI (Command Line Interface) and API (Application
Programming Interface).
Examples of PaaS models:
Google App Engine, AWS Lambda, MS Azure, SCP, Oracle Cloud, Open Shift etc.
36
Software as a service – SaaS:
The full form of SaaS is Software as a Service. It works on CDM (Cloud Delivery Model). In this case, the
user does not need to install or develop any software by himself. Rather, the user can access the pre-installed
or developed software and database of the cloud service provider. As a result, the user does not have to think
about the location, configuration and maintenance of processing units and storage. In addition, in many cases
the SaaS product itself automatically informs the service company about UBU (User Behavior and Usage),
accordingly the company's software team updates and debugs the product and this is a regular process.
Compared to PaaS and IaaS, it is more cost-effective, customer-focused and customer-friendly.
We talked about Office 365 at the beginning, if you think about it, you will understand here too, but a user
can access and use several application software of Microsoft without any kind of installment, just by logging
in. The software is updated automatically. Hence, it is a classic example of SaaS model. Also some other
examples of this model are: DropBox, GitHub, Big Commerce, Google Workspace, SalesForce,FreshDesk etc.
Also NaaS (Network as a Service), UCaaS (Unified Communication as a Service), CCaaS (Contact Center
as a Service), DbaaS (Data base as a Service), FaaS (Function as a Service), St aaS (Storage as a Service),
Sec aaS (Security as a Service) along with several other services provide cloud computing.
21. [SB’17]
37
23. [DB’16]
38
26. A number of computers are connected through optical fiber using a single hub to the server at Vidya Niketan
College. Later, as the number of computers in the organization increased, initiatives were taken to expand
this system. Besides, by using only two printers and one scanner, the organization is able to use them from
every computer. As a result, the cost in the hardware sector is greatly reduced. [BB’16]
(c) Which network topology is mentioned to in the stem? Explain. 3
Answer
c. Similar to question 23(c).
27. A privileged Principal of a college arranged to set up an ICT lab with 25 new computers. Notice the
following two diagrams for the network setup of the lab: [CB’16]
Figure-1 Figure-2
(c) Explain which network topology is shown in Fig-1. 3
(d) Discuss and compare which topologies are convenient for low-cost lab formation in the stem. 4
Answer
c. Similar to question 23(c).
d. Similar to question 21(d).
28. Observe the network topology diagrams below and answer the questions. [Din.B’16]
39
CQ Knowledge-Based Questions & Sample Answers from Previous Board Exams
In figure- when end A sends data, end B can only receive, not send data. Again B data can only be received,
not sent.
Example: Walkie Talkie, PTT (Push To Talk)
07. What is a router? [BB’23]
Ans: A router is a networking device that exchanges data based on IP addresses. It can be extended by
connecting one or more networks or subnets of the same protocol through routers.
08. What is data transmission method? [BB’23]
Ans: The process of transferring data from one device to another through a format is called a data
transmission method.
09. What is bandwidth? [JB, Din.B, MB’23; Din.B’19]
Ans: The amount of data transferred from one device to another device per unit time is called bandwidth.
10. What is Cloud computing? [JB’23, MB’23; JB,CB’19; JB, Din.B’17; JB’16]
Ans: Cloud computing is the facility or system to use various types of resources such as network, server,
storage, software, hardware programs, services, etc. in exchange for money or rent from the donor
organization as per the demand and need.
11. What is full duplex? [CB’23]
Ans: Data transmission mode in which simultaneous flow of data is possible in both directions, i.e. both
parties can exchange and receive data at the same time, is called Full Duplex Mode.
12. What is Bluetooth? [DB, RB’19]
Ans: Bluetooth is a wireless Personal Area Network (PAN) protocol that uses radio waves to exchange data
over short distances.
13. What is the mode of data transmission? [RB’19, SB’17, BB’16]
Ans: Data transmission mode is the direction of flow when sending data from source to destination in data
communication system.
40
14. What is Roaming? [Ctg.B’19]
Ans: When a mobile phone leaves its own home network to receive the services of another network, it is
called roaming.
15. What is infrared? [SB’19]
Ans: The frequency band of the electromagnetic spectrum from 300 gigahertz (GHz) to 430 terahertz (THz)
is known as infrared waves.
16. What is peer to peer network? [SB’19]
Ans: A network in which all computers simultaneously act as servers or clients following the same protocol
is called a peer-to-peer network.
17. What is multicast transmission? [BB’19]
Ans: In multicast mode, sending data from one node in the network cannot be received by all nodes in the
network. Only all members of a particular group can receive.
18. What is computer network? [BB’19, Ctg.B’17]
Ans: If different computers are connected together by a communication medium to exchange data with each
other, it is called a computer network.
19. What is data communication? [CB, Din.B’19, CB’17, RB’16]
Ans: Data communication is the process of exchanging data from the sender to the receiver through digital
medium.
20. What is router? [DB, SB, JB, Din.B’18, Din.B’17, DB’16]
Ans: A router is a networking device that delivers data packets from source computers to destination
computers within the network.
21. What is synchronous transmission? [DB, SB, JB, Din.B’18]
Ans: In the data transmission method, data is stored in the primary storage device and a block of 80-132
characters is transmitted at equal intervals, which is the synchronous transmission method.
22. What is topology? [RB’17]
Ans: The way in which the physical devices or components of a network such as cables, PCs, routers, etc.
is connected to each other in a network is called topology.
23. What is modem? [Ctg.B, CB’17]
Ans: Modulator + Demodulator = Modem is a network device, which transmits information from one
computer to another computer through telephone lines through modulation and demodulation.
24. What is bridge? [BB’17]
Ans: A bridge is a type of network device that connects multiple networks.
25. What is LAN? [Ctg.B’16]
Ans: Local Area Network i.e., the network system established between the computers located on the same
floor of a specific campus or building or near the same building is called LAN.
26. What is data communication mode? [BB’16]
Ans: The direction of data flow in data transfer from sender to receiver during data communication is called
data transmission mode.
27. What is switch? [CB’16]
Ans: A switch is a network device with many ports, with which computers on the network are centrally
connected to each other. The switch sends data received from the sender to the specified port.
28. What is hotspot? [Din.B’16]
Ans: Hotspot is a type of communication network access point, which provides internet connection to
laptops, PDAs, notebooks, smartphones, computers etc.
41
CQ Comprehensive Questions & Sample Answers from Previous Board Exams
01. “Both the user and the service provider are benefited.”-Explain. [DB’23]
Ans: Cloud computing has been indicated by the statement. Currently there is no limitation for cloud
usage. A user can access the cloud at any time during his subscription.Cloud usage frees users from
location and device limitations. Users can access the cloud, perform computations, update, upload and
download data from anywhere on any device by logging in with sufficient information.
On the one hand, as there is an opportunity to use the software at a cheap price as per the need, their
maintenance and updates are also done automatically. So the customer does not have to worry about this.
Meanwhile, cloud service providers also benefit financially as they rent infrastructure, virtual machines,
drives, software, etc. in exchange for money.
02. Explain the types of networks based on ownership. [DB’23]
Ans: Networks can be classified according to the geographic spread of the components involved, by the
type of control and service provided, or by ownership. Networks can be divided into 2 types on the basis of
ownership. Such as-
(i) Private Network :
A private network is a network that is owned by an organization. It is a controlled network. It has fixed
number of users; not everyone can use this network. Permissions are required to join private networks. Its
security system is very strong. Private networks usually have no traffic. As a result, the delay in data
exchange is less and the transmission speed is higher. PAN, LAN and CAN fall under private networks. For
example: BUET, AIUB etc own network.
(ii) Public Network :
Public networks are networks that are not owned by any organization or organization. However, it is
managed by an organization or organization. Anyone can use this network. But for this usually the user has
to pay some fee or price. It does not specify the number of users. As a result, public networks have high
traffic and relatively low data transfer speeds. WAN or Internet are examples of public networks. Moreover,
mobile phone or telephone network systems, CompuServ, American Online (AOL), Prodigy etc. are also
public networks.
03. Why does asynchronous transmission take more time? Explain. [RB’23]
Ans: Asynchronous transmission takes more time because in this transmission data is transmitted character
by character from the sender to the receiver and the time interval between transmissions is not equal.
In asynchronous transmission the time between sending 2 characters is undefined. Start and stop bits are
required at the beginning and end of the character respectively. In it there is slow speed and less data
transmission. Data is sent character by character. This method is more effective at short distances.
04. “Data can be transmitted in both directions, but not at the same time”—Explain. [Ctg.B’23]
Ans: The term basically refers to Half-Duplex Mode.
Data is exchanged between two data consumers (devices between which communication is taking place)
using the same medium. Data can be sent in both directions. But since the medium is the same, data cannot
be sent and received simultaneously as in Walkie Talkie. Another example of half duplex is the web browser.
When we visit a particular website, we basically send a request to that webserver (in this case we are the
sender). The webserver receives our request (in this case the server is the client). Then the server sends the
data accordingly (sender) and we can see it on the website (receiver). Besides, fax, SMS etc. also works like
half-duplex.
42
05. Explain the objectives of computer networking. [SB’23]
Ans: The main purpose of computer networking is to make information and resources available to a large
number of users by ensuring optimal use of computers and related equipment. Resource share refers to the
following:
Information resource share: making information usable by everyone, from different departments of the
same company to all over the world.
Software resource share: It allows multiple computers on a network to freely use a particular software by
purchasing it once.
Hardware resource share: Hardware (such as printers) like software can be used by all computers on a
network.
06. Explain service model of cloud computing. [SB’23]
Ans: Cloud computing is the storage of all important information by renting a computer with the desired
facilities through internet connection through a device and using that computer as often as you like. Its
service model is 3. They are-
Iaas: Infrastructure as a service: In this case, computer infrastructure or machines are rented. The user
can install the operating system of his choice and run the application software under his own control.
PaaS: Platform as a service: In this case, instead of virtual machines, computing platforms such as
operating systems, databases, web servers, etc. are rented. User can develop his application software at low cost.
SaaS: Software as a service: The service provider can use the company's software without locating or
installing it on the user's CPU or storage.
07. “The privacy and security of cloud computing data is low.” Explain. [BB’23]
Ans: Security in cloud computing is relatively low. Cloud computing is an Internet service that meets the
computing needs of computer users. It is a technology that easily provides more powerful online computing
services in less time. The main problem with using the cloud is that there is no control over the data,
information or programs or applications. Once data is sent to the cloud, users have no way of knowing where
it is being stored or how it is being processed. In the cloud there is a possibility of data privacy breach and
there is also a possibility of data alteration.
08. “Signals can be carried over long distances through fiber optic cables without any significant loss.” –
Explain. [BB’23]
Ans: Signals can be carried over long distances through fiber optic cables without any significant loss.
We are Able to transmit multiple data simultaneously. Transmission loss is extremely low (less than 0.2dB
per km). The security of transmitted data is protected. Electricity does not flow in fiber optic cables. As a
result, the magnetic field cannot influence it. Therefore, optical fiber cables are not prone to electromagnetic
interference (EMI: Electro Magnetic Interference). The environment has no effect on data transfer. Fiber
optic cable does not emit heat to the environment. Fiber optic cable does not have the problem of cross-talk.
Repeaters can be placed far apart.
It is possible to carry signals over long distances through fiber optic cables without any special loss.
43
09. “Data is transmitted in the book form” – Explain. [JB’23]
Ans: The statement refers to synchronous transmission.
Data is transmitted in blocks or packets. In synchronous transmission, the time interval between every two
blocks (ie: few minutes or micro or nano seconds) is fixed. Each block of data is sent as a header information
file at the beginning and a tailer information signal at the end.
10. “With the help of 802.15 technology it is possible to send images from mobile to mobile” – Explain.
[JB’23]
Ans: 802.15 technology is Bluetooth technology. Through this it is possible to send pictures from mobile to mobile.
Bluetooth is a wireless personal area network (WPAN) protocol that uses radio waves to exchange data over
short distances. Its standard IEEE 802.15, range is typically 3-10 meters. Currently, Bluetooth is built-in in
devices such as laptops, tablets, PDAs, smart phones, etc. Its data transfer rate is around 1 megabit/second
or more. Various data, text, images, videos etc. can be shared using Bluetooth.
11. What topology is formed when all computers are connected to all computers in a ring topology –
Explain. [CB’23]
Ans: Connecting all computers to each other in a ring topology results in a mesh topology.
In a ring topology, each computer is connected to 2 computers to form a ring-like structure. Data flow is
unidirectional in this. When data is sent from one computer, it travels through the ring to reach the
destination. By connecting each computer together, they will be able to exchange data directly with each
other. Which is basically mesh topology. In a ring topology, n devices are connected to each other by a total
of n wires. Converting it to mesh topology requires n(n-3)/2 additional wires.
12. Why mesh topology network is most reliable? [CB’23]
Ans: In mesh topology every computer under the network is directly connected to all other computers. It
has a separate link or bus between each workstation. So each workstation can directly exchange data with
any other workstation. Reasons why mesh topology networks are the most reliable:
• Signals can be exchanged between any two nodes at very high speed.
• No problem if a computer or connection line goes down.
• It provides high reliability in data communication.
• Network issues can be resolved very easily.
13. Write the advantages of cloud computing. [Din.B’23]
Ans: Advantages of cloud computing are –
1. Can be used all the time.
2. Data can be uploaded and downloaded from anywhere through the internet.
3. No own hardware is required.
4. There is no need to know how the data will be stored or processed.
5. There are advantages of running applications through any hardware.
6. Operating costs are relatively low.
7. The software is updated automatically.
14. What devices are required to connect networks of different protocols? Explain. [MB’23]
Ans: Gateway: Gateways are used to establish connections between networks with heterogeneous
protocols. It allows data exchange between multiple networks with similar or different protocols.
44
15. Explain the medium of maximum speed. [MB’23]
Ans: The highest speed medium is Fiber Optics Cable or Optical Fiber, which is capable of data transmission
at a bandwidth of slightly more than 100 GHz.
Fiber optic cables are very fine fibers made of specially purified glass or plastic or some other transparent
medium. Signals are sent as total internal reflection of light in fiber optic cables. Fiber optic generally has
three parts. Namely:-
1. Core: Inner dielectric core with a diameter of 8 to 100 microns. Its refractive index is high.
2. Cladding: The outer dielectric covering covering the core is called cladding. Its refractive index is low.
3. Jacket: It usually acts as a cover.
16. Synchronous data transmission is convenient- Explain. [DB’19]
Ans: Synchronous data transmission is more convenient. This is because:
(i) Efficiency of synchronous transmission is relatively higher than asynchronous transmission.
(ii) Its transmission speed is relatively high due to continuous transmission work.
(iii) Start and Stop bits are not required at the beginning and end of each character.
(iv) Time interval is not required after each character.
(v) Takes comparatively less time.
17. Explain the wave used in satellite. [RB’19]
Ans: The wave used in satellite is microwave. It is explained below:
The frequency band of the electromagnetic spectrum from 300MHz to 300GHz is known as microwaves.
Practically, a microwave is a type of electromagnetic wave that has vibrations of about 1 giga second or
more. Data transfer i.e., transfer of data, speech and images etc. provided by computer is possible using
microwave connection. The microwave system basically consists of two transceivers. One of it transmits the
signal and the other receives the signal.
Microwaves cannot travel in curved paths. So, the signal cannot be sent if there is any obstacle between the
sender and the receiver computer. For this reason, microwave antennas are placed on large buildings or
towers. There are two types of microwave communication. Namely- (1) Terrestrial Microwave (2) Satellite
Microwave.
18. Explain the topology in which all computers are connected to all computers. [RB’19]
Ans: In mesh topology, every computer under the network is directly connected to each other.
Advantages of using Mesh Topology:
1. Signals can be exchanged between any two nodes at high speed.
2. There is no problem if a computer or connection line goes down.
3. very big problems are not easily created in the network.
4. It provides much more certainty in data communication.
5. Network problems can be solved very easily.
6. The infrastructure is very strong.
Disadvantages of using mesh topology:
1. Network installation and configuration in this topology is quite complex.
2. Longer length of connection lines leads to higher cost.
Moreover, additional links have to be established in the network, which increases the cost.
45
19. Explain the nonmetallic cable medium. [Ctg.B’19]
Ans: The nonmetallic cable medium is optical fiber. Optical fiber cable is a type of light-conducting cable
made of one or more optical fibers. This optical fiber is a type of fiber made of electrically insulating or
dielectric material that is capable of recording and transporting light. These fibers look thinner than human
hair. Although optical fibers are non-conductors of electricity, they are very efficient in transporting light.
20. Explain the magnetically free cable. [SB’19]
Ans: Fiber optic cable is a non-magnetic (magnetically free) cable. Optical fiber cable is a type of light-
conducting cable made of one or more optical fibers. It transmits light or light signals instead of electrical
signals, allowing data to travel through it at speeds in the gigabyte range or higher. In this, data travels from
the source to the destination by total internal reflection of light.
21. Explain the technical aspects of IEEE 802.16 standard. [SB’19]
Ans: The technology of IEEE 802.16 standard is WiMAX.
The full form of WiMAX is Worldwide Interoperability for Microwave Access. Latest technology providing
wireless internet facility instead of conventional DSL (Digital Subscriber Line) and cable internet. In 1998,
the IFF802.16 group adopted the standard for Wireless Metropolitan Area Network© (WMAN). It is a
wireless protocol that is relatively more standardized and has more security features. The data transmission
rate of this protocol is 70 mbps.
22. Security in cloud computing is relatively low-Explain. [BB’19]
Ans: Security in cloud computing is relatively low. Cloud computing is an Internet service that fulfills the
computing needs of computer users. It is a technology that provides more powerful online computing
services in less time with ease. The main problem with cloud usage is that there is no control over data,
information or programs or applications. Once information is sent to the cloud, users have no way of
knowing where it is being stored or how it is being processed. In the cloud there is a possibility of data
privacy breach and there is also a possibility of data alteration.
23. In which topology the nodes can exchange data with each other at relatively high speed? Explain.
[BB’19]
Ans: In a mesh topology, nodes can exchange data with each other at a
relatively high speed. In mesh topology, every node (computer or device) under
the network is directly connected to each other. The figure shows that any one
computer is directly connected to other computers. Note that if there are n
number of nodes (computers or other devices) in a mesh topology then each Storage Global
Medium
node requires (n - 1) connections and the total number of wires in this network Mesh Network
n(n−1)
will be 2
. Shared Printer
Mesh topology is used in networks where high speed of data transfer is desired and reliability of data
communication is paramount and cost or cost of network deployment is secondary. For example, mesh can
be used in the banking or defense sector.
24. Explain the medium of data transfer in light signals. [JB’19]
Ans: Optical fiber is essentially the transmission of data in light signals.
In this method, the light signal is transmitted through the transparent glass. Usually, the data transfer rate
• Radio Frequency Communication: Wide-Range Communication.
• Microwave Communication: Medium-Range Communication.
• Infrared (Infrared-IR): Short-range communication.
46
Features of using wireless technology:
• Traditional communication systems with cables have some limitations on the distance of the cable
capacity. This limitation can easily be overcome by using wireless technology.
• Provides backup communication link in case of failure of general network.
• Connects to portable or temporary work stations.
• Wireless technology is recommended in situations where conventional cabling is inconvenient or
economically impractical.
• Connects mobile users or networks in remote areas.
In this way data is exchanged by using wireless media.
25. 'Switch is better than hub'– Explain. [CB’19]
Ans: A switch is better than a hub because of greater security and speed using the MAC address.
The intelligence of the hub is relatively low. When a message is sent from one device, it sends the data to
all the related devices. Due to which the security system becomes weak. Switches, on the other hand, store
each device and associated information to itself. As a result, the data is sent to the desired device which
ensures more security hence switch is better than hub.
26. Cloud computing is better for safe data storage- Explain. [Din.B’19]
Ans: Cloud computing is the process of easily renting computer software and data storage along with
network facilities conveniently and according to usage. Cloud computing is much more secure in storing
data. Being under the control of a central server means less risk. Moreover, due to proper security measures,
access to information is not easily possible. Rather, cloud computing is better for storing data safely as there
is an opportunity to use and update hardware and software at low cost.
27. Explain the data transmission mode of mobile phones. [Din.B’19, JB’17, DB’16]
Ans: The data transmission mode in mobile phones is full duplex in which data is exchanged from both
sides simultaneously. In this case either end can take time to transmit data as needed. As a result, data
exchange continues simultaneously.
In the figure, when 'A' sends data to 'B', 'B' can also send data to 'A'. That's how mobile works.
28. Explain the bandwidth of data transfer from keyboard to computer. [DB, SB,JB,Din.B'18]
Ans: Voice Band is used to transfer data from key board to computer. The data speed of this band is up to
9600 bps. It is more commonly used in telephone. However, in computer data communication, this Band
Width is used for transferring data from computer to printer or for transferring data from card reader to
computer. Besides, this band is also used in telephone lines. That is, it transfers data between the computer
and its peripheral parts.
29. Explain that internet can be used with the help of 3rd generation mobile. [DB, SB, JB,Din.B'18]
Ans: 3rd Generation Mobile uses G Internet. G W-CDMA (Wide band Code Division Multiple Access) is
used in 3rd Generation Mobile. The W-CDMA system is currently known as UMTS (Universal Mobile
Telecommunication System). The third generation greatly improved the CDMA I GPRS (General Packet
Radio Service) standard, including high-speed data transfer and multimedia data usage. As a result, DEGE
(Enhanced Data rates for GSM Evolution) mobile technology of maximum data transfer is introduced.
Modern mobile technology HSPA (High Speed Packet Access) is implemented in this generation.
That is, it is able to provide Internet connection in 3G Mobile, the Internet system is quite advanced,
Bandwidth 2 MHz.
47
30. Explain 9600 bps speed. [DB’17]
Ans: bps stands for bits per second. That is, the amount of data that is transferred per second. 9600 bps
means 9600 bps data transfer from one computer to another computer every second. The speed of this data
transfer is also known as bandwidth.
31. Why are fiber optics cable EMI free? [RB’17]
Ans: Fiber optics cable is a type of glass fiber made of dielectric material that transmits light signals by total
internal reflection. And this optical fiber is able to concentrate and transport light.
As optical fibers transport light signals instead of electrical signals, magnetic fields have no effect on them.
Hence it is EMI Free.
32. Why is synchronous transmission costly? [RB’17]
Ans: The method in which the data is first stored in the primary storage device of the sending station and
the data characters are divided into blocks and transmitted one block at a time is called synchronous
transmission.
At the sending station the data is first stored in a primary device such as: used RAM, cache, CPU etc. along
with the sender. And since they are very expensive, synchronous transmission is expensive.
33. Describe the fastest medium of data movement. [Ctg.B’17]
Ans: The fastest medium for data movement is fiber optic cable. Fiber optic generally consists of three parts.
Namely:
1. Core: Inner dielectric core with a diameter of 8 to 100 microns.
2. Cladding: The outer dielectric coating that covers the core is called cladding.
3. Jacket: It generally acts as a covering.
34. Explain the reasons why asynchronous transmission takes more time. [Ctg.B’17]
Ans: A data transmission system in which data is transmitted character by character from the sender to the
receiver and the intervals between characters are not equal is called asynchronous transmission.
Since the data is transmitted character by character. Then the interval between transmission of another
character after transmission is not equal, but different. Since data is transmitted by adding a start bit and one
or two stop bits at the beginning of each character, the amount of data transmitted increases, so this type of
transmission takes more time.
35. Explain the bandwidth of optical fiber. [SB’17]
Ans: The amount of data transferred from one place to another in a single second i.e., the rate of data transfer
is called bandwidth.
The bandwidth of optical fiber is 100 mbps to 2 gbps. That means 100 mbps of data is transferred from one
place to another every second. This data transfer rate is bandwidth which is measured in Bit Per Second.
36. “Free data transfer over short distances” ––Explain. [SB’17, 16]
Ans: Only Bluetooth can transmit data over short distances at no cost.
Bluetooth is a widely known wireless technology for free data exchange over short distances (around 10
meters). Through this Bluetooth technology, a type of network is created which is called Piconet. Currently,
from mobile phones to laptops, tablets, PDFs, medical devices and home entertainment, this technology is
being used without internet.
37. Why is it not possible to talk and listen simultaneously on the walkie-talkie? Explain. [BB’17]
Ans: Half duplex is the mode of data transmission used in walkie-talkie.
This method allows data to be sent in both directions but not simultaneously. Either end can only transmit
data at the same time but sending and receiving cannot be done simultaneously.
48
38. 'Data exchange is possible at the same time'-Explain. [JB’17, JB’16]
Ans: Data exchange is possible at the same time in full duplex mode. In this way, any end can receive data
while sending data or send while receiving data if necessary.
Example: Telephone, Mobile.
49