0% found this document useful (0 votes)
13 views10 pages

QB 3,4,5

The document discusses various networking concepts including checksum calculation using 1's complement, error detection methods, OSI and TCP/IP models, and their applications in real-world scenarios. It explains how layers of the OSI model facilitate reliable data transmission, error handling, and encryption, along with practical examples. Additionally, it covers network topologies, devices, and the design of IP addressing plans for organizational departments.

Uploaded by

Ekta Chainani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

QB 3,4,5

The document discusses various networking concepts including checksum calculation using 1's complement, error detection methods, OSI and TCP/IP models, and their applications in real-world scenarios. It explains how layers of the OSI model facilitate reliable data transmission, error handling, and encryption, along with practical examples. Additionally, it covers network topologies, devices, and the design of IP addressing plans for organizational departments.

Uploaded by

Ekta Chainani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

iven the 8-bit data blocks: 10011001, 11001100, and 11110000, calculate the checksum using 1’s

complement.

A:
Step 1: Add the binary numbers:

diff

CopyEdit

10011001

+ 11001100 = 101100101 (9 bits, carry generated)

Take carry and add to the sum:

diff

CopyEdit

01100101 (lower 8 bits)

+ 1 = 01100110

Add next block:

diff

CopyEdit

01100110

+ 11110000 = 101010110 (9 bits, carry generated)

Add carry:

diff

CopyEdit

01010110 (lower 8 bits)

+ 1 = 01010111

Take 1’s complement:

scss

CopyEdit

01010111 → 10101000 (Checksum)

Final Answer: Checksum = 10101000

2. Q: Explain how a checksum detects errors using an example.

A:
If sender transmits data blocks and a checksum (1’s complement of sum), the receiver adds all
received blocks including the checksum.
If there is no error, the final result will be all 1s (i.e., 11111111).
If the result contains any 0, it means the data is corrupted.

Example:
Data: 01010101, 10101010
Checksum: 11111111
Sum: 01010101 + 10101010 + 11111111 = 111111110 (carry dropped) → 11111111 → No Error

Final Answer: Checksum ensures the final sum is all 1s; any deviation indicates an error.

3. Q: A sender transmits the following 8-bit words: 11001100, 10101010, 11110000. Find the
checksum.

A:
Add first two:

diff

CopyEdit

11001100

+ 10101010 = 101110110 (9 bits) → 01110110 + 1 = 01110111

Add next block:

diff

CopyEdit

01110111

+ 11110000 = 101001111 → 01001111 + 1 = 01010000

1’s complement:

CopyEdit

01010000 → 10101111

Final Answer: Checksum = 10101111

1. Q: Identify which layer of the OSI model is responsible for establishing a reliable connection and
ensuring error-free delivery of data. Give one real-world example.

A:
Layer: Transport Layer
Example: TCP (Transmission Control Protocol) ensures reliable file transfer in applications like email
(SMTP) or file downloads (FTP).
2. Q: A user is accessing a website using a browser. Explain how the layers of the TCP/IP model
come into play during this process.

A:

 Application Layer: HTTP protocol sends request

 Transport Layer: TCP ensures reliable delivery

 Internet Layer: IP addresses route the packets

 Network Access Layer: Frames are transmitted over the physical network

Example: Opening www.google.com involves all these layers.

3. Q: If a file transfer is interrupted due to a network issue, which layer of the OSI model handles
retransmission? Explain briefly.

A:
Layer: Transport Layer
Explanation: It detects lost packets and triggers retransmission to ensure complete and correct
delivery (e.g., via TCP).

4. Q: You are designing a messaging app. Which OSI layers will be most directly involved in
delivering text messages reliably? Justify briefly.

A:

 Transport Layer: Ensures message reliability

 Session Layer: Manages connection between sender and receiver

 Application Layer: Interface for sending/receiving messages

Justification: These layers ensure the message is correctly formed, reliably delivered, and displayed.

5. Q: Compare the OSI and TCP/IP models by mapping the layers where encryption and routing
take place.

A:

 Encryption:

o OSI → Presentation Layer

o TCP/IP → Application Layer

 Routing:

o OSI → Network Layer

o TCP/IP → Internet Layer


Q3: Explain how Stop-and-Wait ARQ handles transmission errors. Illustrate with a scenario.
A:

 Sender sends one frame and waits for ACK.

 If no ACK is received within timeout, it retransmits the frame.

 Example: If Frame 1 is sent and lost ACK, sender waits → timeout → resends Frame 1.

 Suitable for low-speed, reliable links but inefficient for long-delay networks.

Design an IP addressing plan for a company with 4 departments (HR, IT, Sales, Finance) using
subnetting.
A:

 Assume IP block: 192.168.1.0/24 (256 addresses)

 Divide into 4 subnets:

o /26 → 64 addresses per subnet

o HR: 192.168.1.0/26

o IT: 192.168.1.64/26

o Sales: 192.168.1.128/26

o Finance: 192.168.1.192/26

 Subnetting provides traffic isolation and efficient address usage.

Q5: Compare TCP and UDP with examples of real-time and reliable applications.
A:

Feature TCP UDP

Type Connection-oriented Connectionless

Reliable (ACK,
Reliability Unreliable
retransmission)

Email (SMTP), File VoIP, Live


Use Cases
Transfer Streaming

Overhead High (due to control) Low

Conclusion: Use TCP for banking, file transfers; UDP for


real-time audio/video.

Unit 6: Application Layer

Q6: Explain how DNS resolves a domain name to an IP address with a step-by-step process.
A:

1. User enters www.example.com


2. Browser checks local cache

3. Sends query to local DNS server

4. If not found, DNS server queries root DNS → TLD server → Authoritative DNS

5. Authoritative DNS returns IP address

6. Browser connects to the IP to load the website

Let me know if you'd like these in a PDF format, more practice questions, or expanded answers for
8-mark questions!

4o

You said:

for error detection and correction techniques, topologies and networking devices and osi model and
tcp/ip protocol

ChatGPT said:

Here are 4-mark application-level questions with answers for the following DCN topics:

1. Error Detection and Correction Techniques

2. Network Topologies

3. Networking Devices

4. OSI Model

5. TCP/IP Protocol Suite

1. Error Detection and Correction Techniques

Q1: A message “1101011011” is to be transmitted using CRC with the generator polynomial G(x) = x³
+ x + 1. Show how CRC is calculated.
A:
Generator = 1011
Message = 1101011011 (append 000) → 1101011011000
Divide using binary division:

python-repl

CopyEdit

1101 ÷ 1011 → XOR → 0110

... continue division until remainder

Final Remainder = 011

CRC = 011, so transmitted message = 1101011011 011


Q2: Explain how Hamming code can correct a single-bit error with an example.
A:
Message: 1011 → Add parity bits at positions 1, 2, 4 → total 7 bits
Encoded: 0110011 (Hamming(7,4))
Error introduced at bit 3 → Received: 0100011
Check parity bits → Error at position 3
Corrected: 0110011 → Extract data: 1011

🔹 2. Network Topologies

Q3: Compare bus, star, and ring topologies in terms of cost, reliability, and performance. Suggest a
use-case for each.
A:

Topology Cost Reliability Performance Use-case

Bus Low Low (single point) Degrades with load Small office setup

Star Medium High (hub-based) Good Schools, LANs

Ring Medium Medium Predictable Token Ring networks

Conclusion: Use star for scalable, fault-tolerant networks.

🔹 3. Networking Devices

Q4: A company network includes computers in different departments. Choose suitable networking
devices and explain their role.
A:

 Switch: Connects devices within the same LAN (department-wise)

 Router: Connects different LANs, manages IP addressing

 Firewall: Protects network from unauthorized access

 Access Point: Provides wireless connectivity in each department

Diagram (optional): Shows switch in each dept, router at center, firewall at entry point.

🔹 4. OSI Model

Q5: Map the OSI model layers to real-world applications and devices with suitable examples.
A:

OSI Layer Example Function Example Device/Protocol

Application Web browsing HTTP, FTP

Transport Reliable delivery TCP


OSI Layer Example Function Example Device/Protocol

Network Routing of packets IP, Routers

Data Link Frame formation, error detection Switch, MAC address

Physical Bit transmission Cables, Hubs, NIC

Application: Sending an email involves layers from Application to Physical.

🔹 5. TCP/IP Protocol Suite

Q6: Explain how data is transmitted from a source to destination using TCP/IP protocol suite with an
example.
A:

 Application Layer: Email client forms message (SMTP)

 Transport Layer: TCP segments data, adds port info

 Internet Layer: IP assigns logical addresses, routes packet

 Network Access Layer: MAC address used to deliver frame physically

 At destination: reverse process reconstructs the message

Example: Sending an email from alice@example.com to bob@gmail.com

A user uploads a file to a cloud drive. Explain the role of each OSI layer in this process.

Answer:

1. Application Layer – Interface for uploading (e.g., Google Drive).

2. Presentation Layer – Data formatting and encryption (e.g., file compression or TLS).

3. Session Layer – Manages session between user and cloud server.

4. Transport Layer – Breaks file into segments; TCP ensures reliable transfer.

5. Network Layer – Adds source and destination IP addresses for routing.

6. Data Link Layer – Frames the packet and adds MAC addresses.

7. Physical Layer – Transmits bits over physical medium (Wi-Fi, Ethernet).

Q2. Compare OSI and TCP/IP models using a file transfer scenario.

Answer:

Feature OSI Model TCP/IP Model

Layers 7 Layers 4 Layers

File Transfer Application → Transport → ... Application → Transport → ...


Feature OSI Model TCP/IP Model

Layer Mapping App (7,6,5), Trans (4), Net (3) App, Transport, Internet, Link

Use in Practice Theoretical model Practical/used on internet

Example: When uploading a file:

 OSI: FTP (App), TCP (Trans), IP (Net)

 TCP/IP: FTP → TCP → IP → Ethernet

Q3. In a secure banking transaction, identify which OSI layers are involved in encryption, error
control, and data formatting.

Answer:

 Encryption – Presentation Layer (e.g., SSL/TLS).

 Error Control – Data Link Layer (frame-level) & Transport Layer (TCP acknowledgments).

 Data Formatting – Presentation Layer (e.g., converting integers or strings into binary
formats).

Used together, these layers ensure confidentiality, accuracy, and proper data structure for secure
online transactions.

Q4. A mobile app fails to send messages, but the internet is working. At which OSI layer might the
issue exist? Justify.

Answer:

 Likely issue: Application Layer

 Justification:

o Internet access proves that lower layers (Network, Transport) are functioning.

o If only one app is failing, the fault is in app-level logic, service API issues, or port
blocking.

Q5. How does the OSI model help in troubleshooting network issues? Give a practical example.

Answer:

 OSI acts as a layer-by-layer diagnostic tool.

 Example: Website not loading.

1. Application – DNS working? HTTP response?

2. Transport – Port open? TCP handshake?


3. Network – IP ping test?

4. Data Link/Physical – Ethernet cable or Wi-Fi connection?

It narrows down the problem logically from top to bottom.

🔹 TCP/IP Protocol Suite – Application-Level Questions with Answers

Q6. During a video conference, explain how the TCP/IP stack ensures real-time communication.

Answer:

 Application Layer – Uses video/audio codecs (e.g., WebRTC).

 Transport Layer – Uses UDP (faster, less reliable) to avoid delay.

 Internet Layer – Adds IP addresses, handles routing.

 Network Access Layer – Converts to frames and transmits over physical network.

UDP is preferred for low latency even if some packets are lost.

Q7. Trace how data flows through the TCP/IP layers when accessing a website.

Answer:

1. Application Layer – HTTP request is created.

2. Transport Layer – TCP adds port number, segments data.

3. Internet Layer – IP adds source and destination IP addresses.

4. Network Access Layer – Frame is created with MAC address, sent via Ethernet or Wi-Fi.

At destination, the reverse process reconstructs the webpage.

Q8. Compare TCP and UDP with real-world application examples.

Answer:

Feature TCP UDP

Reliability High (ACK, retransmission) Low (no ACK, no retransmit)

Overhead More (connection setup) Less

Use Cases Email, FTP, Web Browsing Video calls, Online Gaming

Conclusion:

 TCP: Used when reliability matters.

 UDP: Used when speed is preferred over accuracy.


Q9. Explain how DNS works in the TCP/IP model. Which layers and protocols are involved?

Answer:

 Application Layer – DNS query is generated.

 Transport Layer – DNS uses UDP port 53 (or TCP for large data).

 Internet Layer – IP routes the packet to DNS server.

 Network Access Layer – Frame is transmitted over the local network.

DNS resolves domain name to IP address to initiate actual connection.

Q10. Design a TCP/IP-based solution for an IoT application needing lightweight, fast communication.

Answer:

 Use UDP for sensor data to reduce overhead.

 Use MQTT protocol over TCP if guaranteed delivery is needed.

 Assign IPv6 addresses to support many devices.

 Example: Smart home system where sensors send temperature data to a central controller.

Justification: UDP/MQTT fits low-power, low-latency requirements of IoT.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy