Académique Documents
Professionnel Documents
Culture Documents
Q4. What are the basic goals and motivations of computer network?
Ans: Some of the basic goals that a computer network should satisfy are:
1) Cost reduction by sharing hardware and software resources.
2) Provide high reliability by having multiple sources of supply.
3) Provide an efficient means of transport for large volumes of data among various
locations.
4) Provide inter process communication among users and processors.
5) Reduction in delay driving data transport.
6) Increase productivity by making it easier to share data amongst users.
7) Repairs, upgrades, expansions, and changes to the network should be performed with
minimal impact on the majority of network users.
8) Standards and protocols should be supported to allow many types of equipment from
different vendors to share the network.
9) Provide centralized or distributed management and allocation of network resources
like host processors, transmission facilities, etc.
Q14. Compare and contrast between Optical Fiber and Copper Wire.
Ans: Optical fiber has the following advantages over copper wire:
i) Optical fiber can handle much higher bandwidths than copper wire. Due to low
attenuation, repeaters are needed only about every 30km on long lines whereas
copper wires require repeaters every 5km, which is substantial saving in cost.
ii) Optical fibers are not affected by power surges, electromagnetic interference, or
power failure. Neither is it affected by corrosive chemicals in the air making it ideal
for harsh factory environments.
iii) Optical fibers is lighter than copper. One thousand twisted pairs 1km long weight
8000kg. Two fibers have more capacity and weight only 100kg, which greatly
reduces the need for expensive mechanical support systems that must be maintained.
iv) Optical fibers do not leak light and are quite difficult to tap. This gives them excellent
security against potential wire trappers.
The disadvantages of optical fibers are
i) Optical is a complex technology requiring skills that most engineers do not posses.
ii) Since optical transmission is inherently unidirectional, two way communications
requires either two fibers or two frequency bands on one fiber.
iii) Fiber interfaces cost more than electrical interfaces.
Q23. What is wirelss LAN? What are the disadvantages of wireless LAN?
Ans: Wireless LAN’s are a system of portable computers that communicate using radio
transmission. Wireless LANs make use of the omni-directional wireless communication.
The main objective of wireless LAN is to provide high speed communication among
computers that are located in relatively close proximity.
The disadvantages of using wireless LAN are:
a) When the receiver is within the range of two active transmitters, the resulting signal
will usually be grabbled and hence useless.
b) In indoor wireless LANs, the presence of walls between the stations has great impact
on the effective range of each station.
Q3. Explain the different ways to encode analog signal to analog information.
Ans: There are three different ways in which analog to analog encoding can be done
which are explained below:
(a) Amplitude Modulation
In this type of modulation the frequency and phase of the carrier or base signal are not
altered. Only the amplitude changes and we can see that the information is contained in
the envelope of the carrier signal. It can be proud / demonstrated that, the bandwidth of
the composite signal is twice that of the highest frequency in the information signal that
modulates the carrier.
(b) Frequency Modulation
Here it is the frequency of the base signal that is altered depending on the information
that is to be sent. The amplitude and phase of the carrier signal are not changed at all. It
can be shown that this results in a bandwidth requirement of 10 times the modulating
signal, centered on the carrier frequency. This method is less susceptible to noise and
gives the best performance of all data encoding types as far as the quality of the
transmitted signal is concerned. Although digital encoding methods may give better
performance over multiple hops because in their case, the original signal can be
accurately reconstructed at each hop, frequency modulation is the best as far as single
hop transmission goes.
(c) Phase Modulation
In phase modulation (PM) the modulating signal leaves the frequency and amplitude of
the carrier signal unchanged but alter its phase. The characteristics of this encoding
technique are similar to FM, but the advantage is that of reduce complexity of equipment.
However, this method is not used in commercial broadcasting.
Q2. What is time division multiplexing? Explain the different types of time
division multiplexing.
Ans: In time division multiplexing, there are four different transmissions occurring
with each being one-fourth of the time slice. This slice should be small enough so that the
slicing is not apparent to the application. So, for a voice transmission a cycle of 100ms
could be sufficient as we would not be able to detect the fact that there are delays. In that
case, each transmission could be allotted a slice of 25ms. At the receiving end, the
transmission has to be reconstructed by dividing up the cycle into the different slices,
taking into account the transmission delays.
There are two types of time division multiplexing which are explained below:
(a) Synchronous Time Division Multiplexing
In this kind of Time Division Multiplexing, the simpler situation is where the time slots
are reserved for each transmission, irrespective of whether it has any data to transit or
not. There, this method can be inefficient because many time slots may have only silence.
But it is a simpler method to implement because the act of multiplexing and de-
multiplexing and de-multiplexing is easier. This kind of TDM is known as Synchronous
TDM.
(b) Statistical Time Division Multiplexing
This is a method where there are more devices than the number of time slots available.
Each input data stream has a buffer associated with it. The multiplexer looks at the buffer
of each device that provides the input data and checks to see if it has enough to fill a
frame. If there are enough the multiplexer sends the frame. Otherwise, it goes to the next,
device in line and checks its input buffer. This cycle is continued indefinitely. At the
receiving end the de-multiplexer decomposes the signal into the different data streams
and sends them to the corresponding output line.
Q3. Explain the different types of errors which occur during transmission over
the network.
Ans: The different types of errors which occur during transmission over the network
are given below:
(a) 1 bit error
1-bit error or single bit error means that only one bit is changed in the data during
transmission from the source to the destination node i.e. either 0 is changed to 1 or 1 is
change to 0. This error will not appear generally in case of serial transmission. But it
might appear in case of parallel transmission.
(b) Burst Error
Burst error means that 2 or more bits of data are altered during transmission from the
source to the destination node. But it is not necessary that error will appear in consecutive
bits. Size of burst error is from the first corrupted bit to the last corrupted bit.
(c) Lost Message or Frame
The sender has sent the frame but that is not received properly, this is known as loss of
frame during transmission. To deal with this type of error, a retransmission of the sent
frame is required by the sender.
Q10. What is stop and wait method? What is the problem with this method?
Ans: Stop and wait flow control is the simplest form of flow control. In this method,
the receiver indicates its readiness to receive data for each frame; the message is broken
into multiple frames. The sender waits for an ACK or acknowledgement after ever frame
for a specified time called time out. It is sent to ensure that the receiver has received the
frame correctly. It will then send the next frame only after the ACK has been received. If
the frame or ACK is lost during transmission, then it has to be transmitted again by the
sender. This retransmission process is known as Automatic Repeat Request (ARQ). Stop
and wait ARQ is one of the simplest methods of flow control.
The problem with stop and wait is that only one frame can be transmitted at a time
and that often leads to inefficient transmission channel till we get the acknowledgement
the sender can not transmit any new packet. During this time, both the sender and the
channel are unutilized.
Q1. What is the response of the Stop and Wait ARQ to:
(a) Normal Operation
If the sender is sending frame 0, then it will wait for ack 1 which will be transmitted by
the receiver with the expectation of the next frame numbered frame1. As it receives
ACK1 in time, it will send frame 1. This process will be continuous till computer data
transmission takes place. This will be successful transmission if ack for all frames ent it
received in time.
(b) When ACK is lost
Here, the sender will receive corrupted ACK1 for frame sent frame 0. It will simply
discard corrupted ACK1 and as the time expires for this ACK, it will retransmit frame 0.
The receiver has already received frame 0 and is expecting frame1, hence it will discard
duplicate copy of frame 0. In this way, the numbering mechanism solves the problem of
duplicate copy of frames. Finally, the receiver has only one correct copy of one frame.
(c) When frame is lost
If the receiver receives corrupted damaged frame1, it will simply discard it and assumes
that the frame was lost on the way. And correspondingly, the sender will not get ACK0 as
frame has been received by the receiver. The sender will be in waiting stage for ACK0
till its time out occurs in the system.
(d) When ACK time out occurs
In this operation, the receiver is not able to send ACK1 for received frame 0 in time due
to some problem at the receiver’s end or network communication. The sender retransmits
frame0 as ACK1 is not received in time. Then, the sender retransmits frame0 as ACK2
time expires. At the receiver end, the receiver discards this frame0 as the duplicate copy
is expecting frame1 but sends the ACK1 once gain corresponding to the copy received
for frame0.
Q3. Explain the different protocols used in Carrier Sense Multiple Access
(CSMA).
Ans: The different protocols used in CSMA are:
(a) 1 – Persistent CSMA
In this protocol a station i.e. who wants to transmit some frame will sense the channel
first, if it is found busy than that some transmission is going on the medium, then this
station will continuously keep sensing that the channel.
(b) Non-Persistent CSMA
To reduce the frequency of the occurrences of collision in the system then, another
version of CSMA that is non-persistent CSMA can be used. Here the station that has
frames to transmit first sense whether the channel is busy or free. If the station finds that
channel to be free it simply transmits its frame. Otherwise it will wait for a random
amount of time and repeat the process after that time span is over.
(c) P-Persistent CSMA
This category of CSMA combines features of the above version of CSMA that is 1-
persistent CSMA and non-persistent CSMA. This version is applicable for the slotted
channel. The station that has frames to transmit senses the channel and if found free then
simply transmits the frame with p probability and with probability 1-p it, defers the
process.
Q5. What are the six reasons pointed out by Tanenbaun for multiple LANs?
Ans: The six reasons pointed out by Tanenbaun for multiple LANs are explained
below:
1) Multiple LANs in organization
Since the goals of the various departments differ, different departments choose different
LANs. But there is a need for interaction so bridges are needed.
2) Geographical Difference
The organization may be geographically spread over several buildings separated by
considerable distances. It may be cheaper to have separate LANs in each building and
connect them with bridges and later link them to run a single cable over the entire site.
3) Load Distribution
It may be necessary to split what is logically a single LAN into separate LANs to
accommodate the load.
4) Long Round Trip Delay
In some situations, a single LAN would be adequate in terms of the load, but the physical
distance between the most distant machines can be great. Even if laying the cable is easy
to do, the network would not work due to the excessively long round trip delay. The only
solution is to partition the LAN and install bridges between the segments.
5) Reliability
By inserting bridges at critical points reliability can be enforced in the network by
isolating a defective mode. Unlike a repeater, which just copies whatever it sees, a bridge
can be programmed to exercise some discretion reading what forwards and what it does
not forward.
6) Security
Security is a very important feature in bridges today, and can control the movement of
sensitive traffic by isolating the different parts of the network.
Q7. What are the difficulties in building bridges between the various 802 LANs?
Ans: The difficulties in building bridges between the various 802 LANs are:
(a) Different Frame Format
Each of the LANs uses a different frame format. As a result, any copying between
different LANs requires reformatting, which takes CPU time, requires a new checksum
calculation and introduces the possibility of undetected errors due to bad bits in the
bridge memory.
(b) Different Data Rates
When forwarding a frame from a fast LAN to a slower one, the bridge will not be able to
get rid of the frames as fast as they come in. Therefore, it has to be buffered.
(c) Different Frame Lengths
When a long frame forwarded onto a LAN, it cannot be accepted due to different frame
length. This is the most serious problem. The only solution is that the frame must be split
or discarded.
(d) Security
Both 802.11 and 802.16 support encryption in the data link layer, but the Ethernet does
not do so. This means that the various encryption services available to the wireless
networks are lost when traffic passes over the Ethernet.
(e) Quality of Services
Ethernet has no concept of quality of service, so traffic from other LANs will lose its
quality of service when passing over the Ethernet.
Q7. Compare and contrast between virtual circuit and datagram subnet.
Ans: Comparison between virtual circuit and datagram subnet are:
(a) Address Machine
Each datagram in datagram subnet contains the full source and destination address. But in
virtual circuit subnet, each datagram contains a small VC number.
(b) Referencing of Circuit Setup
Datagram subnet does not require referencing of circuit setup. But virtual circuit subnet
requires referencing of circuit setup.
(c) State information by a router
In datagram subnet, routers do not hold state information about connection. But in virtual
circuit subnet, each VC requires router table space per connection.
(d) Routing Procedure
In datagram subnet, each datagram is routed independently. But in virtual circuit subnet,
route is selected when VC is set up and all the packets follow all routes.
(e) Effect of Router Failures
In datagram subnet, there is no effect of router failure except the datagram lost during the
crash. But in virtual circuit subnet, all VCs that passed through the failed router are
terminated and the new virtual circuit is established.
(f) Quality of Service
Datagram subnet is difficult while virtual circuit subnet is easy.
(g) Congestion Control Mechanism
Datagram subnet is difficult while virtual circuit subnet is easy.
Q13. What is congestion control? What are the techniques used to manage
congestion?
Ans: Congestion control refers to the network mechanism and techniques used to
control congestion and keep the load below the network capacity.
Some of the basic techniques to manage congestion are:
(a) End System Flow Control
This is not a congestion control scheme. It is a way of preventing the sender from
overrunning the buffers of the receiver.
(b) Network Congestion Control
In this scheme, end systems throttle back in order to avoid congesting the network. The
mechanism is similar to end to end flow controls, but the intention is to reduce congestion
in the network not at the receiver’s end.
(c) Network Based Congestion Avoidance
In this scheme, a router detects that congestion may occur and attempts to slow down
senders before queues become full.
(d) Resource Allocation
This technique involves scheduling the use of physical circuit or other resources, perhaps
for a specific period of time. A virtual circuit built across a series of switches with a
guaranteed bandwidth is a form of resource allocation.
Q14. What is routing? What are the various activities performed by a router?
Ans: Routing is the act of moving data packets in packet switched network, from
source to a destination. A router is a device used to handle the job of routing. It identifies
the address on data passing through it, determines which route the transmission should
take and collects data in packets which are hen sent to their destinations.