0% found this document useful (0 votes)
15 views6 pages

Unit 3 and 5

The document outlines various concepts related to data-link and transport layers in networking, including the functions of different protocols, error control mechanisms, and flow control techniques. It compares protocols like TCP and UDP, discusses issues like Silly Window Syndrome and Hamming distance, and provides examples of error detection methods. Additionally, it includes exercises and questions related to these topics for further understanding.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Unit 3 and 5

The document outlines various concepts related to data-link and transport layers in networking, including the functions of different protocols, error control mechanisms, and flow control techniques. It compares protocols like TCP and UDP, discusses issues like Silly Window Syndrome and Hamming distance, and provides examples of error detection methods. Additionally, it includes exercises and questions related to these topics for further understanding.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Part - A

1. What is function of data-link layer?


The Data-link layer divides the stream of bits received from the network layer into
manageable units called frames. It adds a header to the frame to define the sender and
receiver of the frame. It provides a flow and error control mechanism.

2. Infer the primary responsibility of Transport layer.


• Process to process communication.
• Responsible for the delivery of the message to the appropriate process.

3. Bit-stuff the following frame payload:


Insert bit `0` after 5 consecutive 1`s.

00011111011001111100100011111011111010000111

4. Compare the bandwidth support provided various Ethernet generations.


• Standard Ethernet (10 Mbps)
• Fast Ethernet (100 Mbps),
• Gigabit Ethernet (1 Gbps),
• Ten-Gigabit Ethernet (10 Gbps)

5. Relate Slotted ALOHA and Pure ALOHA?


• Both Pure ALOHA and Slotted ALOHA are random access protocols.
• In Pure Aloha, any station can transmit data at any time.
• In Slotted Aloha, any station can transmit data only at the beginning of a time
slot.

6. Define hamming distance.


▪ The Hamming distance between two words (of the same size) is the
number of differences between the corresponding bits.
▪ Eg: (d(1011, 1000)➔ 2

7. How does a single-bit error differ from a burst error?


The term single-bit error means that only 1 bit of a given data unit is changed from 1
to 0 or from 0 to 1. The term burst error means that 2 or more bits in the data unit have
changed from 1 to 0 or from 0 to 1.

8. Examine efforts taken by TCP for error control.


• TCP provides reliability using error control.
• Error control in TCP is achieved through the use of three simple tools:
o Checksum
o Acknowledgment
o Time-out.

9. Outline the impact of Silly Window Syndrome.


A serious problem can arise in the sliding window operation when either the
sending application program creates data slowly or the receiving application program
consumes data slowly, or both.

10. How Nagle`s algorithm helps in reduces silly window syndrome.


• It is the solution to silly window syndrome created by the sender.
• Step 1: The sending TCP sends the first piece of data it receives from the
sending application program even if it is only 1 byte.
• Step 2: After sending the first segment, the sending TCP accumulates data in
the output buffer and waits until either the receiving TCP sends an
acknowledgment or until enough data has accumulated to fill a maximum-size
segment. At this time, the sending TCP can send the segment.
• Step 3: Step 2 is repeated for the rest of the transmission. Segment 3 is sent
immediately if an acknowledgment is received for segment 2, or if enough
data have accumulated to fill a maximum-size segment.

11. TCP is connection oriented, reliable protocol. Justify your answer.


• TCP explicitly defines connection establishment, data transfer, and connection
teardown phases to provide a connection-oriented service.
• TCP uses a combination of GBN and SR protocols to provide reliability.

12. Distinguish between Simple and Stop and wait protocol.


Simple protocol:
• Connectionless protocol with neither flow nor error control.
• The transport layer at the sender gets a message from its application layer,
makes a packet out of it, and sends the packet.
• The transport layer at the receiver receives a packet from its network layer,
extracts the message from the packet, and delivers the message to its
application layer.
Stop and wait protocol:
• Connection-oriented protocol which uses both flow and error control.
• Both the sender and the receiver use a sliding window of size 1.
• The sender sends one packet at a time and waits for an acknowledgment
before sending the next one.

13. The content of a UDP header in hexadecimal format is CB84000D001….Identify the


Source and destination port number.

14. Sketch out the TCP segment neatly.


15. Draw the UDP datagram format neatly.

16. Mention any 2 applications of UDP.


• UDP is suitable for a process with internal flow- and error-control
mechanisms. For example, the Trivial File Transfer Protocol (TFTP) process
includes flow and error control. It can easily use UDP.
• UDP is a suitable transport protocol for multicasting. Multicasting capability
is embedded in the UDP software but not in the TCP software.
• UDP is used for management processes such as SNMP.
• UDP is used for some route updating protocols such as Routing Information
Protocol (RIP)
• UDP is normally used for interactive real-time applications that cannot tolerate
uneven delay between sections of a received message

17. Compare cumulative acknowledgement and Selective acknowledgement


Cumulative acknowledgement:
• TCP was originally designed to acknowledge receipt of segments
cumulatively.
• The receiver advertises the next byte it expects to receive, ignoring all
segments received and stored out of order.
• This is sometimes referred to as positive cumulative acknowledgment, or
ACK
Selective acknowledgement:

• A SACK does not replace an ACK, but reports additional information to


the sender.
• A SACK reports a block of bytes that is out of order, and also a block of
bytes that is duplicated, i.e., received more than once.

18. Make use of flow diagram to represent the 3 way handshaking in TCP connection
establishment process.

19. Make use of flow diagram to represent the 3 way handshaking in TCP connection
termination process.

20. Classify the types of protocols present in MAC sub layer to handle the issues related
to broadcasting
21. Identify the type of address
A) 4A:30:10:21:10:1A
B) 71:20:1B:2E:08: EE
c) FF:FF:FF:FF:FF:FF

Part-B

1. Illustrate all the transport layer protocols with a neat flow diagram (CO3, K2)
2. Compare Go Back N and Selective Repeat Protocol (CO3, K4)
3. Compare Go Back N and Stop and Wait Protocol (CO3, K4)
4. With a Scenario demonstrate how the transport layer provides flow control
mechanism . (Co3, K3)
5. Apply error control service in transport layer with neat flow diagrams. Also explain
the role of ACK and Sequence numbers in this error mechanism. (Co3, K3)
6. Outline the phases of TCP connection
7. Given the dataword (eg:1001) and divisor(eg: 1011), show the generation of
codeword using CRC.(Co5,K3)
8. Explain the random access protocols in MAC sublayer (CO5,K2)
9. Compare the various controlled access protocols that helps to minimize congestion in
the network.(Co5, K2)
10. Assume the network address N1 and Link layer address L1 for the source node A and
the network address N2 and link layer address L2 for the destination node B. Show
the ARP request and response packets exchanged to solve the link layer addressing.
(Example :5.17 in text book)
11. Discuss in detail about the error detection and correction process at data-link layer.
12. Illustrate the concepts of multiple access protocols in detail.
13. How CRC and Internet Checksum are used in error detection and correction at data
link level? Explain with example.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy