0% found this document useful (0 votes)
18 views7 pages

CN P1295

The document consists of a series of questions and answers related to computer networking concepts, covering topics such as bandwidth, throughput, jitter, and various protocols. It includes definitions, explanations of protocols like TCP/IP, and details on network layers, addressing, and data link layer functionalities. Additionally, it discusses design issues in data link layers, routing properties, and compares TCP and UDP, as well as IPv4 and IPv6.

Uploaded by

faizanshaikhhere
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

CN P1295

The document consists of a series of questions and answers related to computer networking concepts, covering topics such as bandwidth, throughput, jitter, and various protocols. It includes definitions, explanations of protocols like TCP/IP, and details on network layers, addressing, and data link layer functionalities. Additionally, it discusses design issues in data link layers, routing properties, and compares TCP and UDP, as well as IPv4 and IPv6.

Uploaded by

faizanshaikhhere
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Q1) Attempt any EIGHT of the following (out of TEN).

[8×1=8]
a) Define Bandwidth.
In computer networks, the term bandwidth refers to the speed of data transmissions. It is a
measure of the data that can be transmitted from one point to another in a given amount of time.

b) What is throughput?
The throughput is a measure of how fast we can actually send data through a network.
Throughput is the rate of successful message delivery over a communication channel/medium.

c) What is Jitter?
Jitter is the variance in time delay in milliseconds (ms) between data packets over a network. It
is a disruption in the normal sequence of sending data packets.

d) List the control access protocols.


There are three methods in the controlled access area namely, Reservation, Polling, and Token
passing.

e) Define packetizing.
The network layer receives the data from the upper layers and creates its own packets by
encapsulating these packets. The process is known as packetizing. This packetizing is done by
Internet Protocol (IP) that defines its own packet format.

f) Write IPv6 address space.


The address space of IPv6 contains 2128 addresses as shown below and this address space is
296 times of the IPv4 address, 340,282,366,920,938,463,374,607,431,768,211,456

g) List UDP services.


The general UDP services are Process to Process Communication, Connectionless Services,
Flow Control, Error Control, Congestion Control, Encapsulation and Decapsulation, Queuing,
Multiplexing and Demultiplexing.

h) Write the list of states for TcP.


i) What is full duplex communication?
TCP offers full duplex communication in which data can flow in both directions at the same time.

j) Write the registered ports.


The ports ranging from 1024 to 49151 are not assigned or controlled by IANA. They can be
registered with IANA to avoid duplication.

Q2) Attempt any Four of the following (out of FIVE). [4×2=8]


a) Write a note on BSS.
• BSS is a building block for a Wireless LAN. A BSS is made up of stationary or mobile wireless
station and an optional central base station, known as Access Point (AP).
• The BSS without an AP is a stand-alone network and called as ad hoc architecture. Such
types of networks cannot send data to other BSSs.
• Stations can form a network without the need of AP. Stations can locate one another and
agree to be part of a BSS.
• A BSS with an AP is called an infrastructure network. All stations in such architecture are
communicating through an AP.

b) What are the different layers in the TCP/IP reference model?


TCP/IP stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model was
developed by the U.S. Department of Defense (DoD) to connect multiple networks and preserve
data integrity.
The TCP/IP is a protocol suite (a set of protocols organized in different layers) used in the
Internet today. It is a hierarchical protocol made up of interactive modules, each of which
provides a specific functionality.
The original TCP/IP protocol suite was defined as four software layers built upon the hardware.
Today, however, TCP/IP is thought of as a five-layer model as shown in Fig. 1.47.

c) Write the netid & host ID of IP address: 117. 149. 29.4.

d) What are the two sub layers of data link layer?


Data link layer sends data frames from the Network layer to the Physical layer. The
data link layer divides the stream of bits received from the network layer to manageable data
units called frames.
Data link layer is divided into following two sub layers:
(i) Media Access Control (MAC): The MAC sub layer controls the means by which multiple
devices share the same media channel. This includes contention methods and other media
access details. The MAC layer also provides addressing information for communication between
network devices.
(ii) Logical Link Control (LLC): The LLC sub layer establishes and maintains links between
communicating devices. LLC sublayer provides interface between the media access methods.

e) Write the different control bits or flags in control field of TCP segment.
Pg no 4.31

Q3) Attempt any TWO of the following (out of THREE). [2×4=8]


a) What is the propagation time for a 2.5 Kbyte message if the bandwidth of the network is 1
Gbps? Assume that the distance between the sender and the receiver is 12,000 km and that
light travels at 2.4×10^8 m/s.
Solution:
Propagation time = 12000 × 1000/2.4 × 10^8 = 50 ms
Transmission Time = 2500 × 8 109 = 0.020 ms

b) Write the some important design issues of the data link layer.
The following are the some of the important design issues of the data link layer:
1. Services provided to the Network Layer: The data link layer acts as a service interface to the
network layer. How to provide a well-defined service interface in the network layer on source
machine to the network layer on destination machine.
2. Frame Synchronization/Framing: Frame synchronization is the major issue of data link layer.
The source machine sends data in blocks called frames to be the destination machine. The
starting and ending of each frame should be identified so that the frame can be recognized by
the destination machine. This design issue determines how the bits of the physical layer are
grouped into frames.
3. Flow Control: It deals with how to regulate the flow of frames so that slow receivers are not
swamped by fast senders.
4. Error Control: This design issue deals with transmission errors. It must provide an error
control mechanism to detect and retransmit damaged, duplicate, or lost frames from source to
destination.

c) What are the main properties of routing?


The main properties of routing are:
1. Correctness: The routing should be done properly and correctly so that the packets may
reach their proper destination.
2. Simplicity: The routing should be done in a simple manner so that the overhead is as low as
possible. With increasing complexity of the routing algorithms the overhead also increases.
3. Robustness: Once, a major network becomes operative, it may be expected to run
continuously for years without any failures. The algorithms designed for routing should be robust
enough to handle hardware and software failures and should be able to cope with changes in
the topology and traffic without requiring all jobs in all hosts to be aborted and the network
rebooted every time some router goes down.
4. Stability: The routing algorithms should be stable under all possible circumstances.
5. Fairness: Every node connected to the network should get a fair chance of transmitting their
packets. This is generally done on a first come first serve basis.
6. Optimality: The routing algorithms should be optimal in terms of throughput and minimizing
mean packet delays. Here there is a trade-off and one has to choose depending on his
suitability.
Q4) Attempt any TWO of the following (out of THREE). [2×4=8]
a) Write the difference between TCP & UDP.

b) Explain sliding window in TCP.

c) Write the base header format of IPv6.


• Fig. 3.58 shows the base header with its eight fields of IPv6 datagram.
• The various fields in IPv6 base header format are explained below:
1. Version (4 bits) field specifies the version of Internet Protocol number. For IPv6 it is 6 i.e.
0110.
2. Traffic Class (4 bits) field defines the priority of the packet with respect to traffic congestion.
3. Flow Label (20 bits) field that is designed to provide special handling for a particular flow of
data. The purpose of flow label field is to indicate that the packet belongs to a specific sequence
of packets between source to destination and can be used to prioritized delivery of packets for
services like voice.
4. Payload Length (16 bits) is a field defining the total length of IP datagram including the base
header.
5. Next Header (8 bits) field identifies the type of header immediately following the IPv6 header.
6. Hop Limit (8 bits) field serves the same purpose as the TTL (Time To Live) field in IPv4. The
Hop Limit field shows the maximum number of routers the IPv6 packet can travel.
7. Source Address (128 bits) field identifies the original source of the datagram.
8. Destination Address (128 bits) field identifies the destination of the datagram.

Q5) Attempt any ONE of the following (out of TWO). [1×3=3]


a) Describe bus topology in detail.
• In bus topology, all nodes are connected to a central cable which is called a bus. This bus is
also called Trunk or sometimes it was also referred to as Backbone cable.
• Trunk cable was then connected to the branch cables which were further connected to the
PCs. Every network device communicates with the other device through this Bus.
• Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable.
• A tap is a connector that either splices into the main cable or punctures the sheathing of a
cable to create a contact with the metallic core.
• A node (computer) that wants to send data, it puts the data on the bus which carries it to the
destination node.
• When one computer sends a signal up the wire, all the computers on the network receive the
information, but only one accepts the information.
• The rest regrets the message. One computer can send a message at a time. A computer must
wait until the bus is free before it can transmit.
b) Write the difference between IPv4 and IPv6.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy