0% found this document useful (0 votes)
33 views11 pages

DCN Unit-2 Problems-P2

The document contains a series of problems and solutions related to communication networks, focusing on protocols, error correction, MAC addresses, and network performance metrics. Key topics include the maximum window sizes for various protocols, collision detection in CSMA/CD networks, and the characteristics of Bluetooth communication. Additionally, it discusses the implications of link-layer addresses and the functioning of access points in wireless networks.

Uploaded by

Vishnu S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views11 pages

DCN Unit-2 Problems-P2

The document contains a series of problems and solutions related to communication networks, focusing on protocols, error correction, MAC addresses, and network performance metrics. Key topics include the maximum window sizes for various protocols, collision detection in CSMA/CD networks, and the characteristics of Bluetooth communication. Additionally, it discusses the implications of link-layer addresses and the functioning of access points in wireless networks.

Uploaded by

Vishnu S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

UNIT-II C0MMUNICATION NETWORKS -PROBLEMS, BOOK BACK

EXCERCISES (PART-2)
1. Using 5-bit sequence numbers, what is the maximum size of the send and

receive windows for each of the following protocols?

a. Stop-and-Wait

b. Go-Back-N

c. Selective-Repeat

Sol: Stop-And-Wait ARQ send window = 1 , receive window = 1

Go-Back-N ARQ send window, 2m − 1= 25 −1 = 31 , receive window = 1

Selective-Repeat ARQ send window , 2m − 1= 24 = 16 receive window, 2m − 1 = 16

2. A sender sends a series of packets to the same destination using 5-bit sequence
numbers. If the sequence numbers start with 0, what is the sequence number after
sending 100th packet?
Sol:

With 5bit no of sequence no. Possible is 32 ie (0-31)

For frames 1-32 seq no 0-31

For frame 33-64 seq no 0-31

For frame 65-96 seq no 0-31

Now 97 98 99 100

0 1 2 3

So after sending 100 packets sequence no is 4

3. Write the advantage and disadvantage of error correction by receiver, as compared


to error detection.
Sol: In forward error correction, the receiver tries to correct the corrupted codeword; in error
detection by retransmission, the corrupted message is discarded (the sender needs to
retransmit the message)
Following are the benefits or advantages of Forward Error Correction (FEC):
➨It offers high degree of fault tolerance. FEC decreases the Bit Error Rate (BER).
➨It eliminates requirement of back channel. Hence ARQ can be avoided.
➨It can be implemented using simple logic.
➨It is cost efficient technique and can be implemented initially using software and later on
hardware.
➨It delivers fast results based on its algorithm.
➨FEC code can function in real time to detect errors and correct them.

Following are the drawbacks or disadvantages of Forward Error Correction (FEC):


➨It adds data redundancy to the link budget.
➨It is power efficient system but not bandwidth efficient due to overhead usage of the data.

4. In a bus CSMA/CD network with a data rate of 10 Mbps, a collision occurs 20 μs


after the first bit of the frame leaves the sending station. What should the length of the
frame be so that the sender can detect the collision?
Sol:

5. Identify the type of the following MAC destination addresses:


i) 7B:80:14:21:19:1C ii) 56:23:1B:2E:08:FF
iii) FF:FF:FF:FF:FF:FF
Sol: To find the type of the address, The least significant bit of the first byte defines the type
of address. If the bit is ‘0’, the address is unicast. If the bit is ‘1’, the address is multicast.. If
all digits are F’s, the address is broadcast. Therefore, we have the following:

a. This is a multicast address because B in binary is 1011.

b. This is a unicast address because 6 in binary is 0110.

c. This is a broadcast address because all digits are F’s.


6. How is a hub related to a repeater ?
Sol: A hub is a device that operates only in the physical layer. Signals that carry information
within a network can travel a fixed distance before attenuation endangers the integrityof the
data. A repeater receives a signal and, before it becomes too weak or corrupted, regenerates
and retimes the original bit pattern. The repeater then sends the refreshed signal. In a star
topology, a repeater is a multiport device, often called a hub, that can be used to serve as the
connecting point and at the same time function as a repeater. A repeater has no filtering
capability. A hub is a multiport repeater. A hub or a repeater is a physical-layer device. They
do not have a link-layer address and they do not check the link-layer address of the received
frame. They just regenerate the corrupted bits and send them out from every port.
7. A message that is to be transmitted is represented by the polynomial M(x) = x5 + x4 + x
with a generating prime polynomial G(x) = x3 + x2 + 1.
Generate a 3 bit CRC code, C(x) which is to be appended to M(x). Find the Code word .
Sol:

8. Assume the propagation delay in a broadcast network is 12 μs and the frame

transmission time is 8 μs.


a. How long does it take for the first bit to reach the destination?
b. How long does it take for the last bit to reach the destination after the first
bit has arrived?
c. How long is the network involved with this frame (vulnerable to collision)?
Sol:

9. Assume that there are only two stations, A and B, in a bus CSMA/CD network
distance between the two stations is 2000 m and the propagation speed is 2 × 108 m/s. If
station A starts transmitting at time t1:
a. Does the protocol allow station B to start transmitting at time t1 + 8 μs? If
the answer is yes, what will happen?
b. Does the protocol allow station B to start transmitting at time t1 + 11 μs? If
the answer is yes, what will happen?
Sol:
10. What is the spread spectrum technique used by Bluetooth?

Sol: Frequency hopping spreading spectrum is transmission technique, used to transmit radio
signals.

11. What is the modulation technique in the radio layer of Bluetooth? In otherwords,
how are digital data (bits) changed to analog signals (radio waves)?
Sol: The Bluetooth radio interface also uses a modulation technique called
Gaussian Frequency Shift Keying, GFSK. This form of modulation is spectrally efficient and
also enables the use of efficient radio power amplifiers, thereby saving on battery life.

12. A sender sends a series of packets to the same destination using 5-bit sequence
numbers. If the sequence numbers start with 0, what is the sequence number of the
100th packet?
Sol: A five-bit sequence number can create sequence numbers from 0 to 2m-1 . m=5
.therefore 0 to 31.
With 5bit no of sequence no. Possible is 32 ie (0-31)

For frames 1-32 seq no 0-31

For frame 33-64 seq no 0-31

For frame 65-96 seq no 0-31

Now 97 98 99 100

0 1 2 3
100 packets sequence no is 3

13.Create a scenario of stop and wait protocol in which the sender sends three packets.
The first and second packets arrive and are acknowledged. The third packet is delayed
and resent. The duplicate packet is received after the acknowledgment for the original is
sent.
Sol:

14. What MAC protocol is used in the baseband layer of Bluetooth?


Sol: The MAC protocol is used in the baseband layer of Bluetooth is in the form of TDD-
TDMA(Time Division Duplex-Time Division Multiple Access)

15. What is the actual bandwidth used for communication in a Bluetooth network?
Sol: Bluetooth operates at frequencies between 2.402 and 2.480 GHz, or 2.400 and
2.4835 GHz including guard bands 2 MHz wide at the bottom end and 3.5 MHz wide at the
top.This is in the globally unlicensed (but not unregulated) industrial, scientific and medical
(ISM) 2.4 GHz short-range radio frequency band.

16. Is it possible to have two hosts in different networks to have same link layer address?
Explain.

Sol:Yes. Because the link layer address is local .Two hosts in two different networks can
theoretically have the same link-layer address because a link-layer address has only local
jurisdiction. However, the tendency is to avoid this for the future development of the Internet.
Even today, manufacturers of network interface cards (NIC) use different set of link-layer
addresses to make them distinguished.
17. A 128 Kbps pure ALOHA channel is going to be shared among some number of
stations. Each station will send a 512 byte frame on average every 5 seconds.
(a) What is the maximum number of stations this particular network can support?
Sol:

The average amount of data each station is transmitting: 512 × 8 = 4096 bits
4096/ 5 = 819.2 bits/second
We know that , Max channel bandwidth for pure ALOHA is 18.4% of channel bandwidth:
128 Kbps ×18.4% = 23.552 Kbps
23.552 Kbps = 23552 bps
23552/ 819.2 = 28.75 stations
The maximum number of stations is 28
(b) What if this was a slotted ALOHA channel?
Sol:

The average amount of data each station is transmitting: 512 × 8 = 4096 bits
4096 /5 = 819.2 bits/second
We know that , Max channel bandwidth for slotted ALOHA is 36.4% of channel bandwidth:
128 Kbps ×36.4% = 46.592 Kbps
46.592 Kbps = 46592 bps
46592 /819.2 = 56.875 stations
The maximum number of stations is 56
18. Two stations (C and D) are on the same broadcast domain approximately 500
meters apart. There are 3 repeaters inline between the two stations, each with a delay of
5 µs. Suppose C and D transmit 1500 bytes at the same exact time and their frames
collide. C chooses K = 0 and D chooses K = 1 in the exponential backoff protocol.
Assume the transmission speed is 10 Mbps, the channel is CSMA/CD with backoff
intervals that are multiples of 50 µs, the jam signal takes 10 µs to transmit, and the
inter-frame gap is 9.6 µs.
(a) What is the one-way propagation delay between C and D?
Sol:
500 /200000000 = 2.5 × 10−6 s
3 repeaters × 5µs = 15µs
2.5 × 10−6 s + 15 × 10−6 s = 17.5µs
(b) At what point in time is C’s packet delivered to D?
Sol:
Collision Detected at time t = 17.5µs
Jam Signal completely received at time t = 17.5µs × 2 = 35µs + 10µs = 45µs
Since K=0, the backoff interval for C is 0 (K×50µs), C sends immediately after jam signal is
received .
1500 bytes × 8 = 12000 bits to transmit
12000/ 10000000 = 0.0012 s
Therefore C’s packet is delivered to D:
45µs + 9.6µs + 0.0012 s + 17.5µs = 1.27 ms
19. What is the size of an ARP packet when the protocol is IPv4 and the hardware is
Ethernet?
Sol:
ARP fields - hardware type = 16 bits
protocol type = 16 bits
hardware length = 8 bits
protocol length = 8 bits
operation = 16 bits
sender hardware /MAC address = 48 bits
sender IP /protocol address= 32 bits
target hardware/MAC address = 48 bits
target protocol address = 32 bits
2+2+1+1+2+6+4+6+4 = 28 bytes
20. Assume we have an isolated link (not connected to any other link) such as a private
network in a company. Do we still need addresses in both the network layer and the
data-link layer? Explain.
Sol:Each hop (router or host) should know its own link-layer address. The destination link-
layer address is determined by using the Address Resolution Protocol.
21. When we talkabout the broadcast address in a link, do we mean sending a message
to all hosts and routers in the link or to all hosts and routers in the Internet? In other
words, does a broadcast address have a local jurisdiction or a universal jurisdiction?
Explain.
Sol: Broadcast address on data link layer has local jurisdiction and the packet is sent to the
devices only within the network. A broadcast address is an address used to indicate that
information being sent out should be delivered to every client on the local area network.
Broadcasts on the Data Link Layer correspond to MAC addresses. When a MAC address
broadcast is sent out, each network interface card on the local area network will see the
broadcast address and automatically pass the information up to the upper layers of the OSI
model
22. A 2 km, 10-Mbps CSMA/CD network has a propagation speed of 2 /3 c. Data frames
are 1024 bits long, including 32 bits of header overhead. The first bit slot after a
successful transmission is reserved for the receiver to capture the channel in order to
send a 16-bit acknowledgement frame. What is the effective data rate of the channel,
excluding overhead, assuming there are no collisions?
Sol: The effective data rate is simply the amount of data (less overhead) transferred divided
by the total time it takes to transmit the data, including the acknowledgement.
1024 /10000000 = 0.0001024 s
(2 km × 1000)/ 200000000 = 10−5 s
16 /10000000 = 1.6 × 10−6
0.0001024 + 10−5 + 1.6 × 10−6 + 10−5 = 0.000124 s
992 bits /0.000124 s = 8, 000, 000 bps = 8 Mbps
23. Do the MAC addresses used in an 802.3 (Wired Ethernet) and the MAC addresses
used in an 802.11 (Wireless Ethernet) belong to two different address spaces?
Sol: Yes, MAC address is unique therefore they would have two different address spaces for
sending. When sending to or from a wired Ethernet, the frames would be sent through or two
that MAC address. When sending frames to and from the wireless Ethernet, data would be
sent to that address not the wired Ethernet.
24.An AP may connect a wireless network to a wired network. Does the AP need to have
two MAC addresses in this case?
Sol: The address space used by a station in a wired network and a station in a wireless
network can belong to same address space if both the networks are locally connected.
25.An AP in a wireless network plays the same role as a link-layer switch in a wired
network. However, a link-layer switch has no MAC address, but an AP normally needs
a MAC address. Explain the reason.
Sol: In link layer addressing mechanism , only devices in a network which receive and
consume data require MAC addresses for unique identification. A switch in a link layer is
used to connect devices with in the same network. A switch simple forwards a data packet
from source to destination by looking at the source and destination address in the packet
header. A link layer switch maintains a forwarding table consisting of the MAC addresses of
different devices with in the network and the ports to which they are connected to. Therefore
a switch is simple a passing device on the network which forwards data packets. Data packets
are never consumed or used by a switch so the switches do not have MAC addresses.
Maintaining a MAC address for a switch is space consuming and adds extra overhead.
26. In a BSS with no AP (ad hoc network), we have five stations: A, B, C, D, and
E. Station A needs to send a message to station B. Answer the following questions
for the situation where the network is using the DCF protocol:
a. What are the values of the To DS and From DS bits in the frames exchanged?
b. Which station sends the RTS frame and what is (are) the value(s) of the
address field(s) in this frame?
c. Which station sends the CTS frame and what is (are) the value(s) of the
address field(s) in this frame?
d. Which station sends the data frame and what is (are) the value(s) of the
address field(s) in this frame?
e. Which station sends the ACK frame and what is (are) the value(s) of the
address field(s) in this frame?
Sol:
a) To DS =0, From DS =0
b.) station A, with address of station A and station B
c.) station B, with address of station A
d.) station A with address of station B, station A, and BSS ID
e.) station B with address of station A

27.In Figure 15.24, two wireless networks, BSS1 and BSS2, are connected
through a wired distribution system (DS), an Ethernet LAN. Assume station A in BSS1
needs to send a data frame to station C in BSS2. Show the value of addresses in 802.11
and 802.3 frames for three transmissions: from station A to AP1, from AP1 to AP2, and
from AP2 to station C. Note that the communication between AP1 and AP2 occurs in a
wired environment.

Sol:
Station A to AP1 [ 1, 0, AP1, A, C, N/A]
AP1 to AP2: Wired, Source = Station A, Destination = Station C
AP2 to Station C [0, 1, C, AP2, A, N/A]

28. Assume that a frame moves from a wired network using the 802.3 protocol to a
wireless network using the 802.11 protocol. Show how the field values in the 802.11
frame are filled with the values of the 802.3 frame. Assume that the transformation
occurs at the AP that is on the boundary between the two networks.
Sol:
802.3 Destination. ----> 802.11 Address 1
802.3 Source. ----> 802.11 Address 3
802.3 Payload ----> 802.11 Payload
802.3 FCS/CRC ----> 802.11 FCS

29. Assume a frame moves from a wireless network using the 802.11 protocol to a wired
network using the 802.3 protocol. Show how the field values in the 802.3 frame are filled
with the values of the 802.11 frame. Assume that the transformation occurs at the AP
that is on the boundary between the two networks.
Sol:
802.3 Destination. ----> 802.11 Address 1
802.3 Source. ----> 802.11 Address 3
802.3 Payload ----> 802.11 Payload
802.3 FCS/CRC ----> 802.11 FCS

30. What is the reason that Bluetooth is normally called a wireless personal area
network (WPAN) instead of a wireless local area network (WLAN)?
Sol: A wireless LAN is usually used for devices belonging to large
geographical areas. Wireless LAN is more suitable for devices belonging to same building or
same project or floor.
31.Fill in the blanks. The 83.5 MHz bandwidth in Bluetooth is divided
into__79_channels, each of _1_MHz.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy