Data Communication & Networking
Data Communication & Networking
Published by :
Think Tanks
Biyani Group of Colleges
While every effort is taken to avoid errors or omissions in this Publication, any
mistake or omission that may have crept in is not intentional. It may be taken note of
that neither the publisher nor the author will be responsible for any damage or loss of
any kind arising to anyone in any manner on account of such errors and omissions.
Preface
am glad to present this book, especially designed to serve the needs of the
students. The book has been written keeping in mind the general weakness in
understanding the fundamental concepts of the topics. The book is self-explanatory and
adopts the Teach Yourself style. It is based on question-answer pattern. The language
of book is quite easy and understandable based on scientific approach.
This book covers basic concepts related to the microbial understandings about
diversity, structure, economic aspects, bacterial and viral reproduction etc.
Any further improvement in the contents of the book by making corrections,
omission and inclusion is keen to be achieved based on suggestions from the readers
for which the author shall be obliged.
I acknowledge special thanks to Mr. Rajeev Biyani, Chairman & Dr. Sanjay Biyani,
Director (Acad.) Biyani Group of Colleges, who are the backbones and main concept
provider and also have been constant source of motivation throughout this Endeavour.
They played an active role in coordinating the various stages of this Endeavour and
spearheaded the publishing work.
I look forward to receiving valuable suggestions from professors of various
educational institutions, other faculty members and students for improvement of the
quality of the book. The reader may feel free to send in their comments and suggestions
to the under mentioned address.
Author
Syllabus
Data Communication
Modulation [Principles of Modulation, AM and FM Modular Circuits, Pulse Code
Modulation, Basebeand Modulation, M-ary Pulse Modulation waveforms, Duobinary
signaling and decoding. Digital Band-pass Modulation] Demodulation [Basics of
Demodulation and detection, signals and Noise, Detection of Binary Signal in Gaussain
Noise, Demodulation of shaped Pulses, Digital Signal in Gaussain Noise, Demodulation
of shaped Pulses, Digital Band Pass Demodulation], Data Transsion [Basic Concepts.
Data Communication Systems, Serial Data formats. encoded data formats, error
detection and correction], information about microwave [Electromagnetic spectrum,
Serial Data formats, encoded data formats, error detection and correction], information
about microwave in Communications, FM Microwave Radio Repeaters, [Satellite,
Geosynchronous Satellites, Look angles, Orbital classifications, Spacing and Frequency
allocation, Multiple accessing, Channel Capacity.] and optical fiber communication
[Basic concept of light propagation, Fiber Cables, Optical fiber versus Metallic cable
facilities, Light sources, Optical Detectors, Fiber cable losses, wave division
multiplexing, fiber distributed data interface the fiber channel, SONET]. ISDN [ISDN
services, subscriber access to ISDN, B Channels, D Channels, H channels, ISDN services,
subscriber access to ISDN, B Channels, D Channels, H channels, ISDN layers,
Broadband ISDNI, DSL [Digital Subscriber Lines : HDSL, VDSL,SDSI, IDSL].
Network Technologies
Section A
Network Architecture, Configuring Network, Network Strategies, Networks Types :
LAN, MAN and WAN [Basic Concepts, Line Configuration, Topology, Transmission
Mode, Identify Key Components of Network, Categories of Network, Differentiating
between LAN, MAN, WANS and Internet].
Section B
The OSI Model, The Physical Layer (Bandwidth Limited Signals, Transmission Media,
Wireless Transmission), The Data link Layer, Error Detection and Correction, Data Link
Protocols, The Medium Access Sub-layer, The Channel Allocation Problem, Multiple
Access Protocol, IEE Standard 802 for LANs and MANs, Bridges, The Network Layer
Routing Algorithm, Congestion Control Algorithm, Internet Working, The Transport
Layer, The Application Layer, MAC Protocols for High Speeds LANs.
Section C
Introduction to TCP/IP [Understand the TCP/IP Protocol Suite, its History and
Modification Processes, Compare TCP/IP to the Open Systems Interconnection (OSI)
Reference Model, Examine a Number of TCP/IP Applications such as FTP, Telnet, DNS,
DHCP, Boot, etc.]
Content
S.No.
Name of Topic
1.
Modulation
1.1
Principles of Modulation
1.2
Types of Modulation
1.3
Base-band M-aray Pam Transmission
1.4
Band-pass Modulation
1.5
Duo Binary Signaling and Decoding
2.
Demodulation
2.1
Basic of Demodulation
2.2
Types of Demodulation
2.3
Signal in Demodulation
2.4
Noise in Demodulation
3.
4.
Microwaves
4.1
Characteristics of Microwaves
4.2
Uses of Microwaves
4.3
Types of Microwave Communication System
5.
Satellite
5.1
Orbits
5.2
Orbital Classification
5.3
Look Angles
5.4
Artificial Satellite
S.No.
Name of Topic
5.5
5.6
5.7
Geo-Synchronous Satellites
Spacing and Frequency Allocation
Channel Capacity
6.
7.
ISDN
7.1
7.2
7.3
7.4
7.5
Basic concept
Features of ISDN
ISDN Services
Broadband ISDN
B , D ,H Channels
8.
9.
Network Architecture
1.2
Configuring Network
1.3
Network Strategies
1.4
1.5
Components of Network
1.6
Categories of Network
1.7
10.
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
Bridges
Introduction to TCP/IP
3.1
3.2
3.3
3.4
Chapter-1
Modulation
Q.1
What is Moudulation?
Amplitude Modulation
(ii)
Frequency Modulation
(iii)
Phase Modulation
(i)
(ii)
Disadvantages :
(ii)
(i)
(ii)
(i)
Disadvantages :
(iii)
Q.3
(i)
(ii)
Ans.: The bandwidth of an information signal is simply the difference between the
highest and lowest frequencies contained in the information and the bandwidth
of the communication channel is the difference between the highest and lowest
frequencies that channel will allow to pass through it called bandpass.
The bandwidth of a communication channel must be sufficiently large to pass all
significant information frequencies.
Q.4
Ans.: In the base-band binary PAM system Figure the pulse amplitude modulator
produces binary pulses, that is, pulse with one of two possible amplitudes levels.
On the other hand, in a base-band of M-ary PAM system, the pulse-amplitude
modulator produces one of M possible amplitude levels, with M>2. This form of
pulse modulation is illustrated in Figure for the case of quaternary (M = 4)
system and the binary data sequence 0010110111. The waveform shown in Figure
is based on the electrical representation for each of the four possible debits (pairs
of bits) is shown in Figure.
In M-ary system, the information source emits a sequence of symbols from an
alphabet that consists of M symbols. Each amplitude level at the pulse-amplitude
modulator output corresponds to a distinct symbol, so that there are M distinct
amplitude levels to be transmitted. Consider then an M-ary PAM system with a
signal alphabet that contains M equally likely and statistically independent
symbols, with the symbol duration denoted by t seconds. We refer to 1\T as the
signaling rate of the system, which is expressed in symbols per second or bauds.
It is informative to relate the signaling rate of this system to that of an equivalent
binary PAM system, which is expresses in symbols per second or bauds. It is
informative to relate the signaling rate of this system to that of an equivalent
binary PAM system for which the value of M is 2 and the successive binary
symbols 1 and are equally likely and statistically independent, with the duration
of either symbol denoted by Tb seconds. Under the conditions described here, the
binary PAM system produces information at the rate 1\T b bits per seconds. We
also observe that in the case of quaternary PAM system, for example, the four
possible symbols may be identified with the debits 00, 01, 10 and 11. We thus see
that each symbol represents 2 bits of information, and 1 baud is equal to 2 bits
per second. We may generalize this result by stating that in an M-ary PAM
system, 1 baud is equal to log 2M bits per second, and the symbol duration T of
the M-ary PAM system is therefore, in a given channel bandwidth, we find that
by using an M-ary PAM system, we are able to transmit information at a rate that
is log2M faster than the corresponding binary PAM system. However, to realize
the same average probability of symbol error, and M-ary PAM system requires
more transmitted power. Specifically, we find that for M much larger than 2 and
an average probability of symbol error small compared to 1, the transmitted
power must be increased by a factor of M2/log2M, compared to a binary PAM
system as T=Tblog2M.
Binary
Data
0
+3
+1
t
-1
-3
T=2Tb
Digit
Amplitude
00
-3
01
-1
11
+1
10
+3
In a base band M-ary system first of all, the sequence of symbols emitted by he
information source is converted into an M-level PAM pulse train is shaped by a
transmit filter and then transmitted over the communication channel, which
corrupts the signal waveform with both noise and distortion. The received signal
is passed through a receive filter and then sampled at an appropriate rate in
synchronism with the transmitter. Each sample is compared with preset
threshold values (also called slicing levels), and a decision is made as to which
symbol was transmitted. We therefore, find that the designs of the pulse
amplitude modulator and the decision-making device in M-ary PAM are more
complex than those in a binary PAM system. Inter-symbol interference, noise
and imperfect synchronization cause errors to appear at the receive output. The
transmit and receive filters are designed to minimize these errors.
Q.5
Ans.: Dou implies doubling of the transmission capacity of a straight binary system.
This particular form of correlative-level coding is also called class I partial
response.
Consider a binary input sequence bk consisting of uncorrelated binary symbols 1
and 0, each having duration Tb. As before, this sequence is applied to a pulseamplitude modulator producing a sequence of short pulse whose amplitude A k
is defined by
+1
Ak
if symbol bk is 1
Eq.(3.1)
-1
if symbol bk is 0
Eq.(3.2)
Eq.(3.3)
It is apparent that if ck is received without error and if also the previous estimate
ak-1 at time t = (k-1)Tb corresponds to a correct decision ,then the current estimate
a k will be correct too. The technique of using a stored estimate of the previous
symbol is called decision feedback. However, a major drawback of this detection
procedure is that once errors are made they tend to prototype through the output
because a decision on the current input ak depends on the correction of the
decision made on the previous input Ak-1.
A practical means of avoiding the error propagation is to use precoding before the
duo binary coding, the preceding operation performed on the binary data
sequence bk converts it into another binary sequence Dk defined by
D k = bk + dk-1
Eq.(3.4)
Where the symbol denotes module-two addition of the binary digits bk and dk-1.
This addition is equivalent to a two point EXCLUSIVE OR operation, which is
performed as follows :
Symbol 1 if either symbol bk or symbol dk-1 is 1
Dk
Eq.(3.5)
Symbol 0
otherwise
Eq.(3.6)
if data symbol bk is 1
Eq.(3.7)
2
if data symbol b k is 0
From (3.7) we deduce the following decision rule for detecting the original
binary sequence {b k } from {ck} :
If
ck < 1 ,
say symbol b k is 1
If
ck > 1
say symbol b k is 0
Input binary
Output Three
(dk)
(ak)
Pulse
amplitude
modulator
(dk-1)
Delay
Tb
Level sequence
Duo binary
coder
(ck)
Sample at
t = KTb
Precoder
When ck =1, he receiver simply makes a random guess in favour of symbol 1 or
0. A useful feature of this detector is that no knowledge of any input sample
other than the present one is required.
Chapter-2
Demodulation
Q.1
Ans.: Demodulation is the act of removing the modulation from an analog signal to
get the original baseband signal back. Demodulation is necessary because the
receiver system receives a modulated signal with specific characteristics and it
needs to turn it to base-band.
There are several ways of demodulation depending on what parameters of the
base-band signal are transmitted in the carrier signal, such as amplitude,
frequency or phase. For example, if we have a signal modulated with a linear
modulation, like AM (Amplitude Modulated), we can use a synchronous
detector. On the other hand, if we have a signal modulated with an angular
modulation, we must use an FM (Frequency Modulated) demodulator or a PM
(Phase Modulated) demodulator. There are different kinds of circuits that make
these functions.
An example of a demodulation system is a modem, which receives a telephone
signal (electrical signal) and turns this signal from the wire net into a binary
signal for the computer.
Q.2
ii)
Ans.: A signal is a codified message, that is, the sequence of states in a communication
channel that encodes a message. In a communication system, a transmitter encodes
a message into a signal, which is carried to a receiver by the communications
channel.
Electric signal can be in analog or digital form.
Analog Signal : In analog signal, the amplitude changes countinously with
respect to time with no breaks or discontinuities .
Ex- Any music system conveys the songs in the analog form. Cassettes are
recorded using analog recording system and playing the music gives you the
analog sound waves.
Amplitude
Time
Digital Signal : It is described as discrete. Their amplitude maintains a constant
level for a prescribed period of time and then it changes to another level.
Digital signals are digital representations of discrete-time signals, which are
often derived from analog signals.
-
All binary signals are digital but all digital signal are not necessarily a binary
signal.
Amplitude
Time
Types of Digital signal : 1) Low level, 2) High level, 3) Rising Edge, and 4)
Falling Edge.
Q.4
Ans.: Electrical noise : Noise is defined as any undesirable electrical energy that falls
within the passband of the signal.
For ex- In audio recording,any unwanted electrical signals that fallss within the
audio frequency band will interface with the music and tharefore are considered
noise.
Types of Electrical Noise :
(1)
(2)
Thermal Noise
Correlated Noise : It is correlated to the signal and can not be present an a circuit
unless there is a signal. It is produecd by non linear amplification and inter
modulation distortion.
In data communication, all circuits are non-linear and they produce non-linear
distortion.
Inter modulation distortion is the generation of unwanted sum and difference
frequencies produced when two or more signals are amplified in a non-linear
device.
Impulse Noise : It is the high amplitude peaks of short duration in the total noise
spectrum.
It consist of sudden burst of irregular shaped pulses that generally last between a
few mili seconds and several miliseconds.
Common source are electric motor, appliances etc.
Chapter-3
Ans.: The test prepared on a PC is usually stored and then transmitted over a
communication channel (e.g. a telephone channel) with a single character being
sent at a time. This form of data transmission is called asychronous transmission,
as opposed to synchronous transmission, in which a sequence of encoded
characters is sent over the channel. Encoded characters produced by a mixture of
asynchronous and synchronous terminals are combined by means of data
multipexers. The multiplexed stream of data so formed is then applied to a
Simplex
(2)
Half-Duplex
(3)
Full-Duplex
Ans.: Data communication is the exchange of data between two devices via some form
of transmission medium such as wire cable. The effectiveness of a data
communication system depends on three fundamental characterstics :
Q.5
(1)
Delivery : The system must deliver data to the correct destination. Data
must be received by the intended device or user and only by that device or
user.
(2)
(3)
(2)
Sender : The sender is the device that sends the data message.
(3)
Q.6
(4)
(5)
Ans.: Data can be corrupted during transmission. For reliable communication errors
must be detected and corrected.
Some of the error detection process are :
Redundancy : One error detection mechanism would be to send every data unit
twice. The receiving device would then be able to do-bit-for-bit comparison
between the two versions of the data. Any discrepancy would indicate an error,
and an appropriate correction mechanism could be set in place .It would also be
insupportably slow. Instead of repeating the entire data system, a shorter group
of bits may be appended to the end of each unit. This technique is called
redundancy because the extra bits are redundant to the information, they are
discarded as soon as the accuracy of the transmission has been determined.
Three types of redundancy checks are common in data communications : Parity,
Cycle Redundancy Check (CRC) and Checksum.
Detection
Methods
Parity Check
Cyclic
Redundancy
Check
Checksum
Detection Methods
Parity Check :
(1)
Simple Parity Check : In this technique, a redundant bit called a parity bit
is added to every data unit so that the total number of 1s is the unit
(including the parity bit) becomes even(or odd).
(2)
Two-dimensional Parity Check : A better approach is the Twodimensional parity check. In this method a block of bits is organized in a
table .First we calculate the parity bit for each data unit. Then we organize
them into a table.
Chapter-4
Microwaves
Q.1
Ans.:
Q.2
(1)
(2)
Ans.: Microwave Link : The maturity of radio frequency technology has permited the
use of a microwave link as the major trunk channel for long distance
communication.
(1)
Q.3
(2)
(3)
(4)
(5)
(6)
Terrestrial
(2)
Satellite
(ii)
(iii)
(iv)
(v)
(vi)
Q.4
(i)
Frequency Range : Satellite links operate in the low giga hertz range 4-6
GHz and 11-14 GHz .
(ii)
(iii)
(iv)
(v)
2)
3)
4)
5)
Remote Sensing :
6)
Radar uses microwave radiation to detect the range, speed, and other
characteristics of remote objects, automatic door openers
7)
A Gunn diode oscillator and waveguide are used as a motion detector for
automatic door openers.
8)
9)
Microwave imaging.
Navigation :
10)
Power :
11)
12)
13)
14)
Chapter-5
Satellite
Q.1
Ans.: An artificial satellite needs to have an orbit, the path in which it travels around
the earth. The orbit can be Equatorial, Inclined or Polar.
Earth
Orbit
Equatorial-Orbit Satellite
Orbit
Inclined-Orbit Satellite
Earth
Orbit
Polar-orbit satellite
The Period of a satellite, the time required for a satellite to make a complete trip
around the earth, is determined by Keplers law, which defines the period as a
function of the distance of the satellite from the center of the earth.
Period=C * Distance 1. 5
Here C is a constant approximately equal to1/100. The period is in seconds and
the distance in kilometers.
Q.2
Ans.: Based on the location of the orbit, satellites can be divided into three categories :
GEO, MEO & LEO.
Satellites
GEO
MEO
LEO
Satellite Categories
GEO Satellites : Line of sight propagation requires that the sending and
receiving antennas be locked onto each others location at all times. For this
reason, a satellite that moves faster or slower than the earths rotation is useful
only for short period of time. To ensure constant communication, the satellite
must move at the same speed as the earth so that it seems to remain fixed above
a certain spot. Such satellites are called geosynchronous.
MEO Satellites : Medium-Earth orbit (MEO) satellites are positioned between
the two van Allen belts. A satellite at this orbit takes approximately 6 hours to
circle the earth.
GPS : One example of MEO satellite system is Global Positioning System
(GPS).
LEO Satellite : Low-Earth Orbit (LEO) satellites have polar orbits. The altitude
is between 500 to 200 km, with a rotation period of 90 to 120 min. The satellite
has a speed of 20,000 to 25,000 km/h. Because LEO satellites are close to the
earth, the round-trip time propagation delay is normally less than 20 ms, which
is acceptable for audio communication.
Q.3
Satellite
W
El
El
El - Angle of Elevation
Az - Angle of azimuth
Az
Ans.: Astronomical Satellites are satellites used for observation of distant planets,
galaxies, and other outer space objects.
Biosatellites are satellites designed to carry living organisms, generally for
scientific experimentation.
Communications Satellites are satellites stationed in space for the purpose of
telecommunications.
Miniaturized Satellites are satellites of unusually low weights and small sizes.
New classifications are used to categorize these satellites: minisatellite (500
200 kg), microsatellite (below 200 kg), nanosatellite (below 10 kg).
Navigational Satellites are satellites which use radio time signals transmitted to
enable mobile receivers on the ground to determine their exact location.
Reconnaissance Satellites are Earth observation satellite or communications
satellite deployed for military or intelligence applications. Little is known about
the full power of these satellites, as governments who operate them usually keep
information pertaining to their reconnaissance satellites classified.
Earth Observation Satellites are satellites intended for non-military uses such as
environmental monitoring, meteorology, map making etc.)
Space Stations are man-made structures that are designed for human beings to
live on in outer space.
Tether Satellites are satellites which are connected to another satellite by a thin
cable called a tether.
Weather Satellites are primarily used to monitor Earth's weather and climate.
Q.5
Ans.: The Satellite that are placed in geostationary orbit are called Geo-Synchronous
Satellite.
For the orbit to be geostationary it has to satisfy two requirements. First the orbit
in Geo-synchronous which requires the satellite to beat an altitude of 22,300
miles. Second the satellite is placed in orbit directly above the equator . Viewed
from earth, a satellite in geo-stationary orbit appears to be stationary in the sky.
Consequently, an earth station does not have to track the satellite; rather it
merely has to point its antenna along a fixed direction, pointing toward the
Q.6
Ans.: Spacing and Frequency Allocation : There are well defined frequency bands
allocated for satellite use , the exact frequency allocations depending on the type
of services .The frequency band also differ depending on the geographic region
of the earth in which the earth stations are located. Frequency allocations are
made through the International Telecommunication Unit (ITU). The most widely
used bands at present are the C band and the Ku band. Uplink transmissions in
the C band are normally at 6 GHz and downlink transmission normally at 4
GHz. The band is sometimes referred to as the 6/4 GHz band. For each band, the
bandwidth available is 500 MHz.
For each band the higher frequency range is used for the uplink. The reason is
that losses tend to be greater at higher frequency and it is much easier to increase
the power from an earth station rather than from a satellite to compensate for it.
To make the most of the available bandwidth, polarization discrimination is
used.
Q.7
Ans.: The word transponder is coined from transmitter-responder and it refers to the
equipment channel through the satellite that connects the receive antenna with
the transmit antenna.
The transponder itself is not a single unit of equipment, but consists of some
units that are common to all transponder channels and others that can be
identified with a particular channel. The transponder amplified the uplink
signals received and transmit to downlink signals.
Chapter-6
Ans.: Optic fiber is the newest from of bounded media. This media is superior in data
handling and security. The fiber optic cable transmits light signals rather than
electrical signals. It is far more effective than the other network transmission
media.
Each fiber has an inner core of glass or plastic that conducts light. There are two
types of light sources for which fiber cables are available. These are :
(i)
(ii)
Electrical
to Light
Wave
Converter
Light to
Electrical
Wave
Q.2
Ans.: Fiber optic cable has many advantages over copper wire as a transmission media
these are :
Q.4
(a)
It can handle much higher bandwidth than copper. Due to the low
attenuation, repeaters are needed only about every 30 km on fiber lines,
versus about every 5 km for copper.
(b)
(c)
(d)
Fiber does not leak light and are quit difficult to tap.
(b)
(c)
Q.5
User of
information
Source
encoder
Electrical
components
Source
Decoder
Source
encoder
Optical
components
Source
Decoder
Transmitter
Optical
fiber
Receiver
in radians defines the numerical aperture of the optical fiber .During the course
of propagation along the fiber, a light pulse also suffers fiber loss .
At the receiver, the optical detector converts the pulses of optical power
emerging from the fiber into electrical pulses. The choice of optical detector and
its associated circuitry determines the receiver sensitivity.
It is apparent that a light wave transmission link differs from its metallic wire
or coaxial cable counterpart in that power, rather than current, propagates
through the optical fiber waveguide.
In the design of a light wave transmission link, two separate factors have to be
considered; Transmission bandwidth and signal losses.
Q.7
Ans.: For fiber optic channels, a variation of frequency division multiplexing is used.
It is called WDM (Wavelength Division Multiplexing). In the given fig. four
fibers come together at an optical combiner, each with its energy present at a
different wavelength. The four beams are combined onto a single shared fiber for
transmission to a distant destination. At the far end, the beam is split up over as
many fibers as there were on the input side. Each output fiber contains a short,
specially-constructed core that filters out all but one wavelength.
The resulting signals can be routed to their destination or recombined in
different ways for additional multiplexed transport.
Fiber 1
Fiber 2
Spectrum
Spectrum
Power
Power
Power
Fiber 3
Fiber 4
Spectrum
Spectrum
Power
Fiber 5
Spectrum on the shared fiber
Power
Fiber1
Fiber2
1+2+3+4
Combiner
4
Splitter
Fiber3
Fiber4
Q.8
1
Long-haul shared filter
Ans.: FDDI is ring based network and it is implemented without hubs. FDDI uses
fiber-optic cables to implement very fast, reliable networks .FDDI uses
multimode fibers because the additional expenses of single mode fiber is not
needed for networks running at only 1000 Mbps. It also uses LEDs rather than
lasers.
The FDDI cabling consists of two fiber rings, one transmitting clockwise and
another transmitting counterclockwise. If either one breaks at the same point the
two rings can be joined into a single ring.
Token Bus
Computer
Token Ring
Bridge
Ethernet
FDDI Ring
Chapter-7
ISDN
Q.1
What is ISDN?
Ans.: ISDN is a set of protocol that combines digital telephony and data transport
services. The whole idea is to digitize the telephone network to permit the
transmission of audio, video and text over existing telephone lines.
The goal of ISDN is to form a wide area network that provides universal end-toend connectivity over digital media.
Q.2
Q.3
(i)
(ii)
(iii)
(iv)
(v)
Ans.: The ISDN provides fully integrated digital services to users. These services fall
into the following three categories :
(1)
Bearer Services
(2)
Tele Services
(3)
Supplementary Services
Interactive
(ii)
Distributive
Interactive Services : Interactive services are those services which need two way
transfer between either two subscribes or between a subscriber and a service
provider.
Distributive Services : Distributive services are of simplex communication from
which is sent from a service provider to subscribers. The subscriber does not
have to transmit a request each time a service is desired. These services can be
without or with user control.
Q.5
Ans.: Basic Rate Interface (BRI) : The entry level interface to ISDN is the Basic Rate
Interface (BRI) is a 144 kbit/s service delivered over a pair of standard telephone copper
wires. The 144 kbit/s rate is broken down into two 64 kbit/s data channels ('B' channels)
and one 16 kbit/s signalling channel ('D' channel).
The Interface specifies three different network interfaces :
Ans.: ISDN standard defines three channel types ,each with a different transmission
rate : Bearer Channel, Data Channel, and Hybrid Channel.
Channel Rates
Channel
Bearer (B)
Data (D)
Hybrid (H)
Data Rates
64
16, 64
384, 1536, 1920
Chapter-8
What is HDSL?
Ans.: The high-bit-rate digital subscriber line (HDSL) was designed as an alternative to
the T-1 line (1.544 Mbps). The T-1 line uses alternate mark inversion (AMI)
encoding, which is very susceptible to attenuation at high frequencies. This limits
the length of a T-1 line to 3200 ft (1 km). For longer distances, a repeater is
necessary, which means increased costs.
HDSL is less susceptible to attenuation. A data rate of 1.544 Mbps (sometimes up
to 2 Mbps) can be achieved without repeaters up to a distance of 12000 ft (3.86
km). HDCL uses two twisted pairs (one pair for each direction) to achieve fullduplex transmission.
Q.2
What is SDSL?
Ans.: The symmetric digital subscriber line (SDSL) is a one twisted-pair version of
HDSL. It provides full-duplex symmetric communication supporting up to 768
kbps in each direction. SDSL, which provides symmetric communication, can be
considered an alternative to ADSL. Although this meets the needs of most
residential
subscribers,
it
is
not
suitable
for businesses that send and receive data in large volumes in both directions.
Q.3
What is VDSL?
Ans.: The very high-bit-rate digital subscriber line (VDSL), an alternative approach
that is similar to ADSL, uses coaxial, fiber-optic, or twisted-pair cable for short
distances. The modulating technique is DMT. It provides a range of bit rate (25 to
Chapter-9
Ans.: A network consists of two or more computers that are linked in order to share
resources such as printers and CD-ROMs, exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
Computer network can be classified on the basis of following features :
By Scale : Computer networks may be classified according to the scale :
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
By Connection Method : Computer networks can also be classified
Bus Network
Star Network
Ring Network
Mesh Network
Star-Bus Network
Tree or Hierarchical Topology Network
Q.2.
Ans.: To share data and network resources among the computers in a network is
known as networking. Computer networking is a core part of the whole
information technology field because without it computers can never
communicate with each other locally and remotely. Just imagine that if you work
in a bank or in a corporate office and all the computers in your office are without
networking. How difficult it would be for you and for the other employees of
your office to communications, shares data such as word documents, financial
reports, clients feedback, graphical reports and other important work with the
other employees.
Q.3.
another country and that often uses transmission facilities provided by common
carriers, such as telephone companies.
Any network whose communications links cross metropolitan, regional, or
national boundaries. Or, less formally, a network that uses routers and public
communications links. Contrast with local area networks (LANs) or metropolitan
area networks (MANs) which are usually limited to a room, building, campus or
specific metropolitan area respectively. The largest and most well-known
example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so that
users and computers in one location can communicate with users and computers
in other locations. Many WANs are built for one particular organization and are
private. Others, built by Internet service providers, provide connections from an
organization's LAN to the Internet. WANs are often built using leased lines. At
each end of the leased line, a router connects to the LAN on one side and a hub
within the WAN on the other. Leased lines can be very expensive. Network
protocols including TCP/IP deliver transport and addressing functions.
Several options are available for WAN connectivity.Transmission rate usually
range from 1200 bits/second to 6 Mbit/s, although some connections such as
ATM and Leased lines can reach speeds greater than 156 Mbit/s. Typical
communication links used in WANs are telephone lines, microwave links &
satellite channels.
Metropolitan Area Network : Metropolitan area networks, or MANs, are large
computer networks usually spanning a city. They typically use wireless
infrastructure or Optical fiber connections to link their sites.
A Metropolitan Area Network is a network that connects two or more Local Area
Networks or Campus Area Networks together but does not extend beyond the
boundaries of the immediate town, city, or metropolitan area. Multiple routers,
switches & hubs are connected to create a MAN.
According to IEEE, A MAN is optimized for a larger geographical area than a
LAN, ranging from several blocks of buildings to entire cities. MANs can also
depend on communications channels of moderate-to-high data rates. A MAN
might be owned and operated by a single organization, but it usually will be
used by many individuals and organizations. MANs might also be owned and
operated as public utilities. They will often provide means for internetworking of
local networks. Metropolitan area networks can span up to 50km, devices used
are modem and wire/cable.
Q.4.
What is Internetworking?
Ans.: When two or more networks or network segments are connected using devices
such as a router then it is called as internetworking. Any interconnection among
or between public, private, commercial, industrial, or governmental networks
may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol. There
are three variants of internetwork, depending on who administers and who
participates in them :
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. If
connected to the Internet, the intranet or extranet is normally protected from
being accessed from the Internet without proper authorization. The Internet is
not considered to be a part of the intranet or extranet, although it may serve as a
portal for access to portions of an extranet.
Intranet : An intranet is a set of interconnected networks, using the Internet
Protocol and uses IP-based tools such as web browsers and ftp tools, that is
under the control of a single administrative entity. That administrative entity
closes the intranet to the rest of the world, and allows only specific users. Most
commonly, an intranet is the internal network of a company or other enterprise.
A large intranet will typically have its own web server to provide users with
browseable information.
Extranet : An extranet is a network or internetwork that is limited in scope to a
single organisation or entity but which also has limited connections to the
networks of one or more other usually, but not necessarily, trusted organizations
or entities .Technically, an extranet may also be categorized as a MAN, WAN, or
other type of network, although, by definition, an extranet cannot consist of a
single LAN; it must have at least one connection with an external network.
Internet : A specific internetwork, consisting of a worldwide interconnection of
governmental, academic, public, and private networks based upon the Advanced
Research Projects Agency Network (ARPANET) developed by ARPA of the U.S.
Department of Defense also home to the World Wide Web (WWW) and
referred to as the 'Internet' with a capital 'I' to distinguish it from other generic
internetworks. Participants in the Internet, or their service providers, use IP
Addresses obtained from address registries that control assignments.
Q.5.
Ans.: All networks are made up of basic hardware building blocks to interconnect
network nodes, such as Network Interface Cards (NICs), Bridges, Hubs,
Switches, and Routers. In addition, some method of connecting these building
blocks is required like communication media. Followings are the basic hardware
components for computer network:
Network Interface Card : A network card, network adapter or NIC (network
interface card) is a piece of computer hardware designed to allow computers to
communicate over a computer network. It provides physical access to a
networking medium and often provides a low-level addressing system through
the use of MAC addresses. It allows users to connect to each other either by
using cables or wirelessly.
Repeater : A repeater is an electronic device that receives a signal and
retransmits it at a higher level or higher power, or onto the other side of an
obstruction, so that the signal can cover longer distances without degradation. In
most twisted pair Ethernet configurations, repeaters are required for cable runs
longer than 100 meters.
Hub : A hub contains multiple ports. When a packet arrives at one port, it is
copied to all the ports of the hub. When the packets are copied, the destination
address in the frame does not change to a broadcast address. It does this in a
rudimentary way; it simply copies the data to all of the Nodes connected to the
hub.
If the hub fails to work, the communication between the computers stops till the
hub again starts working. Hub broadcasts the data to its every port, and then
finding the destined computer, the data sent toward it. Hub broadcasts the data
to its every port, and then finding the destined computer, the data sent toward it.
Bridge : A network bridge connects multiple network segments at the data link
layer of the OSI model. Bridges do not promiscuously copy traffic to all ports, as
a hub do, but learns which MAC addresses are reachable through specific ports.
Once the bridge associates a port and an address, it will send traffic for that
address only to that port. Bridges do send broadcasts to all ports except the one
on which the broadcast was received.
Bridges learn the association of ports and addresses by examining the source
address of frames that it sees on various ports. Once a frame arrives through a
port, its source address is stored and the bridge assumes that MAC address is
associated with that port. The first time that a previously unknown destination
address is seen, the bridge will forward the frame to all ports other than the one
on which the frame arrived.
Switch : A switch normally has numerous ports with the intention that most or
all of the network be connected directly to a switch, or another switch that is in
turn connected to a switch.
Ans.: Peer-to-Peer Network Model : In the peer to peer network model we simply use
the same Workgroup for all the computers and a unique name for each
computer.
Additionally, we will have to give a unique IP address of the same class A, B, or
C for all the computers in our network and its related subnet mask e.g. if we
decide to use class A IP address for our three computers in our Peer-to-Peer
network then our IP address/Subnet mask settings can be as follows.
Computer Name IP Address Subnet Mask Workgroup
PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwork
Please note that the above example is for only illustration purpose so we can
choose any IP address, computer name and workgroup name of our interest.
For doing this right click on My Computer and then click Properties then go to
the Network Identification section and set these.
In a peer to peer network all computers acts as a client because there is not
centralized server. Peer to peer network is used where not security is required in
the network.
Client/Server Network Model : In the client/server network model a computer
plays a centralized role and is known as a server. All other computers in the
network are known as clients. All client computers access the server
simultaneously for files, database, docs, spreadsheets, web pages and resources
like input/output devices and others. In other words, all the client computes
(2)
(3)
Q.7.
Ans.: Network topology is the study of the arrangement or mapping of the devices of
a network, especially the physical and logical interconnections between nodes.
Classification of Network Topologies : There are two basic categories of network
topologies :
Physical Topology
Logical Topology
Physical Topology : The mapping of the nodes of a network and the physical
connections between them i.e., the layout of wiring, cables, the locations of
nodes, and the interconnections between the nodes and the cabling or wiring
system referred as physical topology
Logical Topology : The mapping of the apparent connections between the nodes
of a network, as evidenced by the path that data appears to take when traveling
between the nodes.
Types of the Topologies :
Bus
Star
Ring
Mesh
o
Tree
Hybrid
Bus : The type of network topology in which all of the nodes of the network are
connected to a common transmission medium which has exactly two endpoints
;this is the 'bus', which is also commonly referred to as the backbone, or trunk
all data that is transmitted between nodes in the network is transmitted over this
common transmission medium and is able to be received by all nodes in the
network virtually simultaneously.
Bus topology
Advantages :
Easy to connect a computer or peripheral to a bus.
Requires less cable length than a star topology.
Disadvantages :
Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
Star : The type of network
topology in which each of
the
nodes of the network is
connected to a central node
with a
point-to-point link in a 'hub'
and
'spoke' fashion, the central
node
being the 'hub' and the
nodes
that are attached to the
central node being the
'spokes'. All data that is
transmitted between nodes
in the
network is transmitted to
this
central node, which is
Star Topology
usually some type of device
that
then retransmits the data to some or all of the other nodes in the network,
although the central node may also be a simple common connection point
without any active device to repeat the signals.
Advantages :
Easy to install and wire.
No disruptions to the network then connecting or removing devices.
Easy to detect faults and to remove parts.
Disadvantages :
Requires more cable length than a linear topology.
If the hub or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the
concentrators.
Ring : The type of network topology in which each of the nodes of the network is
connected to two other nodes in the network and with the first and last nodes
being connected to each other, forming a ring all data that is transmitted
between nodes in the network travels from one node to the next node in a
circular manner and the data
generally flows in a single direction
only.
Dual-ring : The type of network
topology in which each of the nodes
of the
network is connected to two other
nodes in the network, with two
connections to each of these nodes,
and
with the first and last nodes being
connected to each other with two
connections, forming a double ring
the
data flows in opposite directions Ring Topology
around the two rings, although,
generally, only one of the rings
carries data during normal operation, and the two rings are independent unless
there is a failure or break in one of the rings, at which time the two rings are
joined to enable the flow of data to continue using a segment of the second ring
to bypass the fault in the primary ring.
Advantages :
Very orderly network where every device has access to the token and the
opportunity to transmit
Performs better than a star topology under heavy network load
Does not require network server to manage the connectivity between the
computers
Disadvantages :
One malfunctioning workstation or bad port can create problems for the
entire network
Moves, adds and changes of devices can affect the network
A Mesh Topology
each
be
from
other
Receiver
(a) Simplex
Sender
Receiver
(b) Half Duplex
Sender
Receiver
(c) Full Duplex
Transmission Modes
Q.9.
Ans.: Apart from determining valid paths between sources and destinations within an
interconnection network, a switching technique is needed that specifies how
messages are to be fragmented before passing them to the network and how the
resources along the path are to be allocated. Furthermore, a switching technique
gives preconditions to be fulfilled before a fragment can be moved on to the next
network component.
Following are the different switching techniques :
Circuit Switching : In circuit switching when a
connection is established, the origin-node
identifies the first intermediate node (node A) in
path to the end-node and sends it a
communication request signal. After the first
intermediate node receives this signal the process
repeated as many times as needed to reach the
node. Afterwards, the end-node sends a
communication acknowledge signal to the originnode through all the intermediate nodes that have
used in the communication request. Then, a full
duplex transmission line, that it is going to be kept
the whole communication, is set-up between the
origin-node and the end-node. To release the Circuit Switching
communication the origin-node sends a
communication end signal to the end-node. In
Following figure shows that a connection in a
node circuit switching network
the
is
end-
been
for
four-
node
This
a
(A,
Client-Server Network
Advantages of Client/Server Network :
Centralized - Resources and data security are controlled through the
server.
Scalability - Any or all elements can be replaced individually as needs
increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components: client/network/server, work together.
Accessibility - Server can be accessed remotely and across multiple
platforms.
Disadvantages of Client/Server Network:
Expense - Requires initial investment in dedicated server.
Maintenance - Large networks will require a staff to ensure efficient
operation.
Dependence - When server goes down, operations will cease across the
network
Chapter-10
Layer 7 Application Layer : The application layer serves as the window for
users and application processes to access network services. The application layer
makes the interface between the program that is sending or is receiving data and
the protocol stack. When you download or send e-mails, your e-mail program
contacts this layer. This layer provides network services to the end-users like
Mail, ftp, telnet, DNS.
Function of Application Layer :
Resource sharing and device redirection.
Remote file access.
Remote printer access.
Inter-process communication.
Network management.
Directory services.
Electronic messaging (such as mail).
Network virtual terminals.
Protocols used at application layer are FTP, DNS, SNMP, SMTP, FINGER,
TELNET.
Layer 6 Presentation Layer : Presentation layer is also called translation layer.
The presentation layer presents the data into a uniform format and masks the
difference of data format between two dissimilar systems
The presentation layer formats the data to be presented to the application layer.
It can be viewed as the translator for the network. This layer may translate data
from a format used by the application layer into a common format at the sending
station, and then translate the common format to a format known to the
application
layer
at
the
receiving
station.
Presentation layer provides :
Character code translation: for example, ASCII to EBCDIC.
Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
Data compression: reduces the number of bits that need to be transmitted
on the network.
Data encryption: encrypt data for security purposes. For example,
password encryption.
Layer 5 - Session : The session protocol defines the format of the data sent over
the connections. Session layer establish and manages the session between the two
users at different ends in a network. Session layer also manages who can transfer
the data in a certain amount of time and for how long. The examples of session
layers and the interactive logins and file transfer sessions. Session layer reconnect
the session if it disconnects. It also reports and logs and upper layer errors.
The session layer allows session establishment between processes running on
different stations. It provides:
Session establishment, maintenance and termination: allows two
application processes on different machines to establish, use and
terminate a connection, called a session.
Session support: performs the functions that allow these processes to
communicate over the network, performing security, name recognition,
logging and so on.
Protocols : The protocols that work on the session layer are NetBIOS, Mail Slots,
Names Pipes, RPC.
Layer 4 - Transport : Transport layer manages end to end message delivery in a
network and also provides the error checking and hence guarantees that no
duplication or errors are occurring in the data transfers across the network.
Transport layer also provides the acknowledgement of the successful data
transmission and retransmits the data if no error free data was transferred.
The transport layer ensures that messages are delivered error-free, in sequence,
and with no losses or duplications. It relieves the higher layer protocols from any
concern with the transfer of data between them and their peers.
The size and complexity of a transport protocol depends on the type of service it
can get from the network layer. For a reliable network layer with virtual circuit
capability, a minimal transport layer is required. If the network layer is
unreliable and/or only supports datagrams, the transport protocol should
include extensive error detection and recovery.
The transport layer provides :
Message segmentation: accepts a message from the (session) layer above
it, splits the message into smaller units (if not already small enough), and
passes the smaller units down to the network layer. The transport layer at
the destination station reassembles the message.
Message acknowledgment: provides reliable end-to-end message delivery
with acknowledgments.
Message traffic control: tells the transmitting station to "back-off" when no
message buffers are available.
In the network layer and the layers below, peer protocols exist between a node
and its immediate neighbor, but the neighbor may be a node through which data
is routed, not the destination station. The source and destination stations may be
separated by many intermediate systems.
Protocols : These protocols work on the network layer IP, ICMP, ARP, RIP, OSI,
IPX and OSPF.
Layer 2 - Data Link layer : The data link layer provides error-free transfer of data
frames from one node to another over the physical layer, allowing layers above it
to assume virtually error-free transmission over the link.
Data Link layer defines the format of data on the network. A network data
frame, packet, includes checksum, source and destination address, and data. The
data link layer handles the physical and logical connections to the packet's
destination, using a network interface.
This layer gets the data packets send by the network layer and convert them into
frames that will be sent out to the network media, adding the physical address of
the network card of your computer, the physical address of the network card of
the destination, control data and a checksum data, also known as CRC. The
frame created by this layer is sent to the physical layer, where the frame will be
converted into an electrical signal to do this, the data link layer provides :
Link Establishment and Termination : Establishes and terminates the
logical link between two nodes.
Frame Traffic Control : Tells the transmitting node to "back-off" when no
frame buffers are available.
Frame Sequencing : Transmits/receives frames sequentially.
Frame Acknowledgment : Provides/expects frame acknowledgments.
Detects and recovers from errors that occur in the physical layer by
retransmitting non-acknowledged frames and handling duplicate frame
receipt.
Frame Delimiting : Creates and recognizes frame boundaries.
Frame Error Checking : Checks received frames for integrity.
Media Access Management : determines when the node "has the right" to
use the physical medium.
Layer 1 Physical : The physical layer, the lowest layer of the OSI model, is
concerned with the transmission and reception of the unstructured raw bit
stream over a physical medium. It describes the electrical/optical, mechanical,
and functional interfaces to the physical medium, and carries the signals for all of
the higher layers. Physical layer defines and cables, network cards and physical
aspects. It also provides the interface between network and network
communication devices.
This layer gets the frames sent by the Data Link layer and converts them into
signals compatible with the transmission media. If a metallic cable is used, then it
will convert data into electrical signals; if a fiber optical cable is used, then it will
convert data into luminous signals; if a wireless network is used, then it will
convert data into electromagnetic signals; and so on. When receiving data, this
layer will get the signal received and convert it into 0s and 1s and send them to
the Data Link layer, which will put the frame back together and check for its
integrity.
Physical layer provides :
Data Encoding : Modifies the simple digital signal pattern (1s and 0s) used by
the PC to better accommodate the characteristics of the physical medium, and to
aid in bit and frame synchronization. It determines:
What signal state represents a binary 1.
How the receiving station knows when a "bit-time" starts.
How the receiving station delimits a frame.
Physical Medium Attachment, Accommodating Various Possibilities in the
Medium :
Will an external transceiver (MAU) be used to connect to the medium?
How many pins do the connectors have and what is each pin used for?
Transmission Technique : determines whether the encoded bits will be
transmitted by baseband (digital) or broadband (analog) signaling.
Physical Medium Transmission : transmits bits as electrical or optical signals
appropriate for the physical medium, and determines:
What physical medium options can be used.
How many volts/db should be used to represent a given signal state,
using a given physical medium.
Protocols used at physical layer are ISDN, IEEE 802 and IEEE 802.2.
Q.2.
Ans.: Congestion is a situation in which too many packets are present in a part of the
subnet, performance degrades. In other words when too much traffic is offered,
congestion sets in and performance degrades sharply
Factors causing Congestion :
The input traffic rate exceeds the capacity of the output lines.
The routers are too slow to perform bookkeeping tasks (queuing buffers,
updating tables, etc.).
The routers' buffer is too limited.
The Leaky Bucket Algorithm : The leaky bucket algorithm is commonly used
congestion control algorithm. In this algorithm following steps are used to
control the congestion:
Each host is connected to the network by an interface containing a leaky
bucket - a finite internal queue.
The outflow is at a constant rate when there is any packet in the bucket
and zero when the bucket is empty.
If a packet arrives at the bucket when it is full, the packet is discarded.
Q.3.
Ans.: Routing is the process of selecting paths in a network along which to send data
on physical traffic. In different network operating system the network layer
perform the function of routing. In TCP/IP the IP protocol is the ability to form
connections between different physical networks. A system that performs this
function is called an IP router. This type of device attaches to two or more
physical networks and forwards packets between the networks. When sending
data to a remote destination, a host passes packet to a local router. The router
forwards the packet toward the final destination. They travel from one router to
another until they reach a router connected to the destinations LAN segment.
Each router along the end-to-end path selects the next hop device used to reach
the destination. The next hop represents the next device along the path to reach
the destination. It is located on a physical network connected to this intermediate
system. Because this physical network differs from the one on which the system
originally received the datagram, the intermediate host has forwarded (that is,
routed) the packets from one physical network to another.
There are two types of routing algorithm :
Static
Dynamic
Static Routing : Static routing uses preprogrammed definitions representing
paths through the network. Static routing is manually performed by the network
administrator. The administrator is responsible for discovering and propagating
routes through the network. These definitions are manually programmed in
every routing device in the environment. After a device has been configured, it
simply forwards packets out the predetermined ports. There is no
communication between routers regarding the current topology of the network.
In small networks with minimal redundancy, this process is relatively simple to
administer.
Dynamic Routing : Dynamic routing algorithms allow routers to automatically
discover and maintain awareness of the paths through the network. This
automatic discovery can use a number of currently available dynamic routing
protocols.
Following are the routing algorithms for networks :
Distance Vector Algorithm
Link State Algorithm
Path Vector Algorithm
Hybrid Algorithm
Distance Vector Routing : Distance vector algorithms use the Bellman-Ford
algorithm. Distance vector algorithms are examples of dynamic routing
protocols. Algorithms allow each device in the network to automatically build
and maintain a local routing table or matrix. Routing table contains list of
destinations, the total cost to each, and the next hop to send data to get there.
This approach assigns a number, the cost, to each of the links between each node
in the network. Nodes will send information from point A to point B via the path
that results in the lowest total cost i.e. the sum of the costs of the links between
the nodes used.
The algorithm operates in a very simple manner. When a node first starts, it only
knows of its immediate neighbours, and the direct cost involved in reaching
them. The routing table from the each node, on a regular basis, sends its own
information to each neighbouring node with current idea of the total cost to get
to all the destinations it knows of. The neighbouring node(s) examine this
information, and compare it to what they already 'know'; anything which
represents an improvement on what they already have, they insert in their own
routing table(s). Over time, all the nodes in the network will discover the best
next hop for all destinations, and the best total cost.
The main advantage of distance vector algorithms is that they are typically easy
to implement and debug. They are very useful in small networks with limited
redundancy.
When one of the nodes involved goes down, those nodes which used it as their
next hop for certain destinations discard those entries, and create new routingtable information. They then pass this information to all adjacent nodes, which
then repeat the process. Eventually all the nodes in the network receive the
updated information, and will then discover new paths to all the destinations
which they can still "reach".
Link State Routing : A link state is the description of an interface on a router and
its relationship to neighboring routers.
When applying link-state algorithms, each node uses as its fundamental data a
map of the network in the form of a graph. To produce this, each node floods the
entire network with information about what other nodes it can connect to, and
each node then independently assembles this information into a map. Using this
map, each router then independently determines the least-cost path from itself to
every other node using a standard shortest paths algorithm such as Dijkstra's
algorithm. The result is a tree rooted at the current node such that the path
through the tree from the root to any other node is the least-cost path to that
node. This tree then serves to construct the routing table, which specifies the best
next hop to get from the current node to any other node.
Shortest-Path First (SPF) Algorithm : The SPF algorithm is used to process the
information in the topology database. It provides a tree-representation of the
network. The device running the SPF algorithm is the root of the tree. The output
of the algorithm is the list of shortest-paths to each destination network. Because
each router is processing the same set of LSAs, each router creates an identical
link state database. However, because each device occupies a different place in
the network topology, the application of the SPF algorithm produces a different
tree for each router.
Path Vector Routing : Distance vector and link state routing are both intradomain routing protocols. They are used inside an autonomous system, but not
between autonomous systems. Both of these routing protocols become
intractable in large networks and cannot be used in Inter-domain routing.
Distance vector routing is subject to instability if there are more than few hops in
the domain. Link state routing needs huge amount of resources to calculate
routing tables. It also creates heavy traffic because of flooding.
Path vector routing is used for inter-domain routing. It is similar to Distance
vector routing. In path vector routing we assume there is one node (there can be
many) in each autonomous system which acts on behalf of the entire
autonomous system. This node is called the speaker node. The speaker node
creates a routing table and sends information to its neighboring speaker nodes in
Ans.: External electromagnetic signals can cause incorrect delivery of data. By this,
data can be received incorrectly, data can be lost or unwanted data can be
generated. Any of these problems are called transmission errors.
Q.5.
Ans.: Error detection and correction has great practical importance in maintaining
data (information) integrity across noisy channels and less-than-reliable storage
media.
Error Correction : Send additional information so incorrect data can be corrected
and accepted. Error correction is the additional ability to reconstruct the original,
error-free data.
There are two basic ways to design the channel code and protocol for an error
correcting system :
Forward Error Correction (FEC) : The transmitter encodes the data with
an error-correcting code (ECC) and sends the coded message. The receiver
never sends any messages back to the transmitter. The receiver decodes
what it receives into the "most likely" data. The codes are designed so that
it would take an "unreasonable" amount of noise to trick the receiver into
misinterpreting the data.
notation here . . .
k is the length of the message we want to send, i.e., the number of
information bits.
n is the total length of the message we will end up sending the
information bits followed by the check bits. Peterson and Brown call this a
code polynomial.
n-k is the number of check bits. It is also the degree of the generating
polynomial. The basic (mathematical) idea is that we're going to pick the
n-k check digits in such a way that the code polynomial is divisible by the
generating polynomial. Then we send the data, and at the other end we
look to see whether it's still divisible by the generating polynomial; if it's
not then we know we have an error, if it is, we hope there was no error.
The way we calculate a CRC is we establish some predefined n-k+1 bit number P
(called the Polynomial, for reasons relating to the fact that modulo-2 arithmetic is
a special case of polynomial arithmetic). Now we append n-k 0's to our message,
and divide the result by P using modulo-2 arithmetic. The remainder is called the
Frame Check Sequence. Now we ship off the message with the remainder
appended in place of the 0's. The receiver can either recompute the FCS or see if
it gets the same answer, or it can just divide the whole message (including the
FCS) by P and see if it gets a remainder of 0.
As an example, let's set a 5-bit polynomial of 11001, and compute the CRC of a 16
bit message :
--------------------11001)10011101010101100000
11001
----1010101010101100000
11001
----110001010101100000
11001
----00011010101100000
11001
-----
0011101100000
11001
----100100000
11001
----10110000
11001
----1111000
11001
----11100
11001
----0101
In division dont bother to keep track of the quotient; we don't care about the
quotient. Our only goal here is to get the remainder (0101), which is the FCS.
CRC's can actually be computed in hardware using a shift register and some
number of exclusive-or gates.
Q.6.
Ans.: The Media Access Control (MAC) data communication protocol sub-layer, also
known as the Medium Access Control, is a sub-layer of the data link layer
specified in the seven-layer OSI model. The medium access layer was made
necessary by systems that share a common communications medium. Typically
these are local area networks. In LAN nodes uses the same communication
channel for transmission. The MAC sub-layer has two primary responsibilities:
Data encapsulation, including frame assembly before transmission, and
frame parsing/error detection during and after reception.
Media access control, including initiation of frame transmission and
recovery from transmission failure.
Following Protocols are used by Medium Access Layer :
ALOHA : ALOHA is a system for coordinating and arbitrating access to a
shared communication channel. It was developed in the 1970s at the
University of Hawaii. The original system used terrestrial radio
broadcasting, but the system has been implemented in satellite
communication systems. A shared communication system like ALOHA
half-duplex and full-duplex modes. In the half duplex mode, data are
transmitted using the popular Carrier-Sense Multiple Access/Collision
Detection (CSMA/CD) protocol on a shared medium. The main
disadvantages of the half-duplex are the efficiency and distance limitation,
in which the link distance is limited by the minimum MAC frame size.
This restriction reduces the efficiency drastically for high-rate
transmission. Therefore, the carrier extension technique is used to ensure
the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a
reasonable link distance.
Four data rates are currently defined for operation over optical fiber and
twisted-pair cables :
10 Mbps - 10Base-T Ethernet (IEEE 802.3)
100 Mbps - Fast Ethernet (IEEE 802.3u)
1000 Mbps - Gigabit Ethernet (IEEE 802.3z)
10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae).
The Ethernet System consists of three basic elements :
(1)
(2)
(3)
As with all IEEE 802 protocols, the ISO data link layer is divided into two
IEEE 802 sub-layers, the Media Access Control (MAC) sub-layer and the
MAC-client sub-layer. The IEEE 802.3 physical layer corresponds to the
ISO physical layer.
Each Ethernet-equipped computer operates independently of all other
stations on the network: there is no central controller. All stations attached
to an Ethernet are connected to a shared signaling system, also called the
medium. To send data a station first listens to the channel, and when the
channel is idle the station transmits its data in the form of an Ethernet
frame, or packet.
After each frame transmission, all stations on the network must contend
equally for the next frame transmission opportunity. Access to the shared
channel is determined by the medium access control (MAC) mechanism
connector. Token ring was popular for an extended period in the late
1980s and 1990s, especially in IBM legacy system environments. IBM
developed the technology and provided extensive support for connections
to SNA systems. More recently, Ethernet, Fast Ethernet, and Gigabit
Ethernet technologies have pushed token ring and other LAN
technologies to the sidelines.
Q.7. Describe the different Transmission Media.
Ans.: The first layer (physical layer) of the OSI Seven layer model is dedicated to the
transmission media. Due to the variety of transmission media and network
wiring methods, selecting the most appropriate media can be confusing - what is
the optimal cost-effective solution???
When choosing the transmission media, what are the factors to be considered?
Transmission Rate
Distances
Cost and Ease of Installation
Resistance to Environmental Conditions
There are two types of transmission media :
Guided
Unguided
Guided Media :
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair
Coaxial Cable
Optical Fiber
Unshielded Twisted Pair (UTP) : UTP is the copper media, inherited from
telephony, which is being used for increasingly higher data rates, and is rapidly
becoming the de facto standard for horizontal wiring, the connection between,
and including, the outlet and the termination in the communication closet. A
Twisted Pair is a pair of copper wires, with diameters of 0.4-0.8 mm, twisted
together and wrapped with a plastic coating. The twisting increases the electrical
noise immunity, and reduces the bit error rate (BER) of the data transmission. A
UTP cable contains from 2 to 4200 twisted pairs.
UTP is a very flexible, low cost media, and can be used for either voice or data
communications. Its greatest disadvantage is the limited bandwidth, which
restricts long distance transmission with low error rates.
Shielded Twisted Pair (STP) : STP is heavier and more difficult to manufacture,
but it can greatly improve the signaling rate in a given transmission scheme
Twisting provides cancellation of magnetically induced fields and currents on a
pair of conductors. Magnetic fields arise around other heavy current-carrying
conductors and around large electric motors. Various grades of copper cables are
available, with Grade 5
being the best and most
expensive.
Grade 5 copper, appropriate
for
use
in
100-Mbps
Shielded Twisted Pair
applications,
has
more
twists per inch than lower grades. More twists per inch means more linear feet of
copper wire used to make up a cable run, and more copper means more money.
Shielding provides a means to reflect or absorb electric fields that are present
around cables. Shielding comes in a variety of forms from copper braiding or
copper meshes to aluminized.
Mylar tape wrapped around
conductor and again around
twisted pair.
each
the
Optical Fiber
Unguided Media : Transmission media then looking at analysis of using them
unguided transmission media is data signals that flow through the air. They are
not guided or bound to a channel to follow.
Following are unguided media used for data communication :
Radio Transmission
Microwave
Satellite Communication
.
Ionospheric propagation bounces off of the Earths ionospheric layer in the upper
atmosphere. It is sometimes called double hop propagation. It operates in the
frequency range of 30 - 85 MHz. Because it depends on the Earths ionosphere, it
changes with the weather and time of day. The signal bounces off of the
ionosphere and back to earth. Ham radios operate in this range.
Ionospheric propagation
Line of sight propagation transmits exactly in the line of sight. The receive station
must be in the view of the transmit station. It is sometimes called space waves or
tropospheric propagation. It is limited by the curvature of the Earth for groundbased stations (100 km, from horizon to horizon). Reflected waves can cause
problems. Examples of line of sight propagation are: FM radio, microwave and
satellite.
Line of sight
Radio Frequencies : The frequency spectrum operates from 0 Hz (DC) to gamma
rays (1019 Hz). Radio frequencies are in the range of 300 kHz to 10 GHz. We are
seeing an emerging technology called wireless LANs. Some use radio frequencies
to connect the workstations together, some use infrared technology.
Microwave : Microwave transmission is line of sight transmission. The transmit
station must be in visible contact with the receive station. This sets a limit on the
distance between stations depending on the local geography. Typically the line
of sight due to the Earths curvature is only 50 km to the horizon! Repeater
stations must be placed so the data signal can hop, skip and jump across the
country.
Microwave Transmission
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows
them to carry large quantities of data due to their large bandwidth.
Advantages :
(a)
(b)
They can carry high quantities of information due to their high operating
frequencies.
(c)
Low cost land purchase: each tower occupies only a small area.
(d)
Disadvantages :
(a)
(b)
(c)
(d)
Satellite : Satellites are transponders (units that receive on one frequency and
retransmit on another) that are set in geostationary orbits directly over the
equator. These geostationary orbits are 36,000 km from the Earths surface. At
this point, the gravitational pull of the Earth and the centrifugal force of Earths
rotation are balanced and cancel each other out. Centrifugal force is the
rotational f0000000orce placed on the satellite that wants to fling it out into space.
The
uplink is
the
transmitter of data to the satellite. The downlink is the receiver of data. Uplinks
and downlinks are also called Earth stations because they are located on the
Earth. The footprint is the shadow that the satellite can transmit to, the shadow
being the area that can receive the satellites transmitted signal.
Q.8.
Ans.: In communications, the transmission of a unit of data from one node to another
node takes place. It is responsible for ensuring that the bits received are the same
as the bits sent. Following are the major categories of transmission :
Q.9.
Control (LLC). This sublayer multiplexes protocols running atop the data
link layer, and optionally provides flow control, acknowledgment, and
error recovery. The LLC provides addressing and control of the data link.
It specifies which mechanisms are to be used for addressing stations over
the transmission medium and for controlling the data exchanged between
the originator and recipient machines.
Media Access Control Sublayer : The sublayer below it is Media Access Control
(MAC). Sometimes this refers to the sublayer that determines who is allowed to
access the media at any one time. Other times it refers to a frame structure with
MAC addresses inside. There are generally two forms of media access control:
distributed and centralized. Both of these may be compared to communication
between people:
The Media Access Control sublayer also determines where one frame of data
ends and the next one starts. There are four means of doing that: a time based,
character counting, byte stuffing and bit stuffing.
Chapter-11
Introduction to TCP/IP
Q.1.
TCP/IP is a family of protocols. A few provide "low- level" functions needed for
many applications. These include IP, TCP, and UDP. Others are protocols for
doing specific tasks, e.g. transferring files between computers, sending mail, or
finding out who is logged in on another computer. Initially TCP/IP was used
mostly between minicomputers or mainframes. These machines had their own
disks, and generally were self- contained.
Application Layer : The application layer is provided by the program
that uses TCP/IP for communication. An application is a user
process cooperating with another process usually on a different host (there is
also a benefit to application communication within a single host). Examples of
applications include Telnet and the File Transfer Protocol (FTP).
Transport Layer : The transport layer provides the end-to-end data transfer by
delivering data from an application to its remote peer. Multiple applications can
be supported simultaneously. The most-used transport layer protocol is the
Transmission Control Protocol (TCP), which provides connection-oriented
reliable data delivery, duplicate data suppression, congestion control, and flow
control.
Q.2.
TCP
B)
IP
C)
FTP
D)
TELNET
E)
DNS
F)
DHCP
G)
BOOTS
Ans.: A)
TCP : TCP is responsible for verifying the correct delivery of data from
client to server. Data can be lost in the intermediate network. TCP adds
support to detect errors or lost data and to trigger retransmission until the
data is correctly and completely received.
The Transmission Control Protocol (TCP) is one of the core protocols of
the Internet protocol suite. TCP provides reliable, in-order delivery of a
stream of bytes, making it suitable for applications like file transfer and email. It is so important in the Internet protocol suite that sometimes the
entire suite is referred to as "TCP/IP." TCP manages a large fraction of the
individual conversations between Internet hosts, for example between
web servers and web clients. It is also responsible for controlling the size
and rate at which messages are exchanged between the server and the
client.
TCP consists of a set of rules, the protocol, that are used with the Internet
Protocol, the IP, to send data in a form of message units between
computers over the Internet. At the same time that the IP takes care of
handling the actual delivery of the data, the TCP takes care of keeping
track of the individual units of data packets that a message is divided
into for efficient routing through the net. For example, when an HTML file
is sent to you from a web server, the TCP program layer of that server
takes the file as a stream of bytes and divides it into packets, numbers the
packets, and then forwards them individually to the IP program layer.
Even though every packet has the same destination IP address, they can
get routed differently through the network. When the client program in
your computer gets them, the TCP stack (implementation) reassembles the
individual packets and ensures they are correctly ordered as it streams
them to an application.
IP Packet Format
The following discussion describes the IP packet fields illustrated in :
FlagsConsists of a 3-bit field of which the two low-order (leastsignificant) bits control fragmentation. The low-order bit specifies
whether the packet can be fragmented. The middle bit specifies
whether the packet is the last fragment in a series of fragmented
packets. The third or high-order bit is not used.
IP address
IP Address Classes : IP addressing supports five different address classes:
A, B, C, D, and E. only classes A, B, and C are available for commercial
use. The left-most (high-order) bits indicate the network class. It provides
reference information about the five IP address classes.
Reference Information about the Five IP Address Classes :
IP
Address
Class
Format
Purpose
HighOrder
Bit(s)
Address Range
No. Bits
Network/
Host
Max.
Hosts
N.H.H.H
Few large
organizations
1.0.0.0 to
126.0.0.0
7/24
16777214
(224 - 2)
N.N.H.H
Medium-size
organizations
1, 0
128.1.0.0 to
191.254.0.0
14/16
65534
(216 - 2)
N.N.N.H
Relatively
small
organizations
1, 1, 0
192.0.1.0 to
223.255.254.0
21/8
254
(28 - 2)
N/A
Multicast
groups
1, 1, 1, 0
224.0.0.0 to
239.255.255.255
N/A (not
for
commercial
use)
N/A
(RFC 1112)
IP
Address
Class
Format
Purpose
HighOrder
Bit(s)
Address Range
No. Bits
Network/
Host
Max.
Hosts
N/A
Experimental
1, 1, 1, 1
240.0.0.0 to
254.255.255.255
N/A
N/A
The class of address can be determined easily by examining the first octet
of the address and mapping that value to a class range in the following
table. In an IP address of 172.31.1.2, for example, the first octet is 172.
Because 172 fall between 128 and 191, 172.31.1.2 is a Class B address.
Following table describe a range of possible values exists for the first octet
of each address class.
C)
File Transfer Protocol (FTP) : Transferring data from one host to another
is one of the most frequently used operations. Both the need to upload
data: transfer data from a client to a server and download data: retrieve
data from a server to a client, are addressed by FTP. Additionally, FTP
provides security and authentication measures to prevent unauthorized
access to data.
It allows a user on any computer to get files from another computer, or to
send files to another computer. Security is handled by requiring the user
to specify a user name and password for the other computer. Provisions
are made for handling file transfer between machines with different
character set, end of line conventions, etc. This is not quite the same thing
as more recent "network file system" or "netbios" protocols. Rather, FTP is
a utility that you run any time you want to access a file on another system.
You use it to copy the file to your own system. You then work with the
local copy.
FTP uses TCP as transport protocol to provide reliable end-to-end
connections and implements two types of connections in managing data
transfers. The FTP client initiates the first connection, referred to as the
control connection. It is on this port that an FTP server listens for and
accepts new connections. The control connection is used for all of the
control commands a client user uses to log on to the server, manipulate
files, and terminate a session. This is also the connection across which the
FTP server will send messages to the client in response to these control
commands. The second connection used by FTP is referred to as the data
connection. It is across this connection that FTP transfers the data. FTP
only opens a data connection when a client issues a command requiring a
data transfer, such as a request to retrieve a file, or to view a list of the files
available. Therefore, it is possible for an entire FTP session to open and
close without a data connection ever having been opened. Unlike the
control connection, in which commands and replies can flow both from
the client to the server and from the server to the client, the data
connection is unidirectional. FTP can transfer data only from the client to
the server, or from the server to the client, but not both. Also, unlike the
control connection, the data connection can be initiated from either the
client or the server. Data connections initiated by the server are active,
while those initiated by the client are passive.
The client FTP application is built with a protocol interpreter (PI), a data
transfer process (DTP), and a user interface. The server FTP application
typically only consists of a PI and DTP.
equipment and OSs with a TCP/IP stack support some kind of TELNET
service server for their remote configuration including ones based on
Windows NT.
TELNET is a client-server protocol, based on a reliable connectionoriented transport. Typically this protocol used to establish a connection
to TCP port 23, where a getty-equivalent program (telnetd) is listening,
although TELNET predates.
E)
(1)
(2)
(3)
(4)
embedded systems.
characters. The whole domain name does not exceed a total length of 253
characters
A hostname refers to a domain name that has one or more associated IP
addresses; ie: the 'www.example.com' and 'example.com' domains are
both hostnames, however, the 'com' domain is not.
F)
(2)
1. The device used for splits data into frames and then combines frames into data in frame
relay is termed as
a. FRAD(Frame Relay And Disassembly)
b. Framing
c. Both a & b
d. Slipping Window Protocol
2. The Error controls involves
a. Sequencing of control frame
b. Sending of control frame
c. Both a & b
d. None of these
3. During communication, a channel that is noisy may causes
a.
b.
c.
d.
e.
a.
b.
c.
d.
Header
Trailer
Both a & b
None of these
a.
b.
c.
d.
Stop ARQ
Wait ARQ
Go back-N ARQ
Both a & b
a.
b.
c.
d.
easy to Implement
Does not call for congestion
Both a & b
None of these
a.
b.
c.
d.
Stop ARQ
Wait ARQ
Go back-N ARQ
Both a & b
a.
b.
c.
d.
PAR
PER
PRA
DAR
15. Another important issue in the design if the data link is to control the rate of data
transmission between _____________
a. Source and destination host
b. Two source and destination host
c. Three source and destination host
d. None of these
16. Which one is the important protocol used by the data link layer
a. Sliding protocol
a.
b.
c.
d.
Window
Sending window
Stop and wait ARQ
Sliding window
18. Which protocol is for data transmission and is bi-directional, used in the data link layer
that corresponds to layer 2 of OSI model
a.
b.
c.
d.
Sending window
Sliding window protocol
Stop and wait ARQ
Sliding window
19. Sliding window protocol keeps record of frame sequences sent and acknowledged when
communication takes place between ____________
a.
b.
c.
d.
Users
Two users
More users
None of these
a.
b.
c.
d.
FTP
PPP
OSI
PAR
e.
22. Sliding window protocol works on _________ in which there is simultaneous two-way
communication
a.
b.
c.
d.
no duplex
half duplex
full duplex
single duplex
e.
23. Sliding window protocol makes use of two types of frames namely
a.
b.
c.
d.
Data frame
Acknowledgement frame
Both a & b
None of these
24. Another improvement is done over this stop and wait type protocol by use of ________
a.
b.
c.
d.
Back
Piggybacking
Piggy
None of these
25. A technique in which acknowledgement is temporarily delayed and then hooked onto
next outgoing frame is known as
a.
b.
c.
d.
e.
Back
Piggybacking
Piggy
None of these
a.
b.
c.
d.
Go back n
Selective repeat
Selective reject
All of these
a.
b.
c.
d.
A wait approach
A stop approach
Both a & b
None of these
a.
b.
c.
d.
Bit-oriented
Byte-oriented
Both a & b
None of these
e.
30. HDLC provides
a.
b.
c.
d.
Switched protocol
Non- Switched protocol
Both a & b
None of these
a. ADCCP
b. SDLC
c. ISO
d. OSI
a.
b.
c.
d.
ADCCP
SDLC
ISO
FRAD
33. Which is another subset of HDLC that finds use in packet switched networks of ITU-TS
X.25
a. ADCCP
b. SDLC
c. LAP-B(Link Access Protocol-Balanced)
d. None of these
34. In HDLC three types of stations are specified by the data link layer
a.
b.
c.
d.
Primary Station
Secondary Station
Combined Station
All of these
a.
b.
c.
d.
Response
Responses frame
Both a & b
None of these
a.
b.
c.
d.
Frame
Stop and wait ARQ
HDLC
Frame relay
38. A configuration has at least two combined stations in which every station has equal and
complimentary responsibility known as __________________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
39. Balanced configurations find use only in the such cases as given below
a. Operation: Full or half duplex
b. Network: Point to Point
c. Both a & b
d. None of these
40. A configuration has one primary station and at least one secondary station , and it exists
as one station exercises control over other stations known as ________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
41. Symmetrical configurations comprises of _________________________
a.
b.
c.
d.
Two independent
Unbalanced stations
Connected point to point
All of these
e.
42. Logically, every station is considered as __________ stations
a.
b.
c.
d.
e.
1
2
3
4
43. The protocol and data are totally independent, this property known as ____________
a.
b.
c.
d.
Transmission
Transparency
Transparent
Transport
a.
b.
c.
d.
Data loss
Data duplication
Data corruption
All of these
45. How many modes of operations are defined for the HDLC protocol
a.
b.
c.
d.
2
3
4
5
46. Three modes of operations are defined for the HDLC protocol
a. Normal Response Mode(NRM)
b. Asynchronous Response Mode(ARM)
c. Synchronous Balanced Mode(ABM)
d. All of these
47. In primary station initializes links for controlling the data flow between ___________
a. Primary and secondary stations
b. Error control
c. Logical disconnection of the second stations
d. All of these
48. The ABM mode is suitable only to __________ environment
a.
b.
c.
d.
Point
Point-to-point
First-to-end-point
None of these
a.
b.
c.
d.
Three fields
Four fields
Five fields
Six fields
e.
50. A special eight-bit sequence ________ is referred to as a flag
a.
b.
c.
d.
01111111
01111110
11101110
11101110
51. In the HDLC protocol, every frame consists of __________ with a flag
a.
b.
c.
d.
Starts
End
Both a & b
None of these
52. A 8-bit address is used when the total number of stations exceeds _______
a.
b.
c.
d.
64
128
256
None of these
a.
b.
c.
d.
Long
Empty
Full
Both a & b
54. The HDLC procedure uses a flag synchronous system, these are
a. Bit order of transmission (information frame)
b. Bit order of transmission (supervisor frame)
c. Both a & b
d. None of these
55. FCS (frame check sequence) is a _______ sequence for error control
a.
b.
c.
d.
4bit
16bit
32bit
64bit
a.
b.
c.
d.
SLIP
X.25
Both a & b
None of these
e.
58. PPP was designed to work with layer 3 network layer protocols including ___________
a.
b.
c.
d.
IP
IPX
Apple talk
All of these
a.
b.
c.
d.
HDLC
PPP
IP
IPX
61. RAS has an important role in the proliferation of Internet based services in the form of
_________________
a.
b.
c.
d.
VoIP
Data over IP
Both a & b
None of these
62. Which is opening new challenges in the development of RAS where VoIP enabled RAS
are the need of time
a. Voice convergence
b. Data convergence
c. Voice and data convergence
d. None of these
63. Remote access is possible through an __________________
a. Internet service provider
b. Dial up connection through desktop
c. Notebook over regular telephone lines
d. Dedicated line
e. All of these
64. A remote access server also known as ____________________
a.
b.
c.
d.
Communication
Communication server
Layer
None of these
a. Enterprise
b. Infrastructure
c. Both a & b
d. None of these
a.
b.
c.
d.
DTE
DCE
Both a & b
None of these
a.
b.
c.
d.
RS232C
RS-423
Both a & b
None of these
e.
70. In PPP, the default maximum length of the information field is ________
a.
b.
c.
d.
1000bytes
1500bytes
2000bytes
2500bytes
e.
71. The protocols that are differentiate PPP from HDLC are the
a.
b.
c.
d.
a.
b.
c.
d.
IP
IPX
AppleTalk
All of these
a. NCP
b. LCP
a.
b.
c.
d.
One-way encryption
Two- way encryption
Three- way encryption
Four- way encryption
84. The technology which is useful for creating Virtual Private Networks (VPNs) has been
developed by
a. Microsoft Corporation
b. U.S. Robotics
c. Several remote access vendor companies, known as PPTP forum
d. All of these
85. PPTP means
a. Point-to-Point Tunneling Protocol
b. Point-to-Point Termination Protocol
c. Private-to-Private termination protocol
d. Private-to-Private Tunneling Protocol
86. The PPTP is used to ensure that message transmitted from one VPN node to another are
a.
b.
c.
d.
Not secure
Secure
Networks
IPX
a.
b.
c.
d.
e.
ADSL
Dialup POTS
ISDN
Other service
All of these
90. Which is a platform on which Internet service providers(ISP) and other service providers
enables their user to access the various internet based services
a.
b.
c.
d.
RAS
TCP
ARQ
SLIP
118
Glossory
AAL -- ATM Adaptation Layer. The standards layer that allows multiple
appliations to have data converted to and from the ATM cell. A protocol used
that translates higher layer services into the size and format of an ATM cell.
Advanced Data Communications Control Procedure (ADCCP) -- ANSI
counterpart to HDLC. One of more than 20 protocols transported by FastComm
FRADs.
Advanced Intelligent Network (AIN) -- Carrier offering more than 'pipes' to
users.
Advanced Peer-to-Peer Networking (APPN) -- IBM SNA facility that provides
distributed processing based on Type 2.1 network nodes and Logical Unit (LU)
6.2.
Advanced Program-to-Program Communications (APPC) -- Implementation of
SNA LU 6.2 sessions that permits personal computers in an SNA network to
communicate in real time with the mainframe host and other networks.
Allowed Cell Rate -- An ABR service parameter, ACR is the current rate in
cells/sec at which a source is allowed to send.
American National Standards Institute (ANSI) -- The coordinating body for
voluntary standards groups within the United States. ANSI is a member of the
International Organization for Standardization (ISO).
American Standard Code for Information Interchange (ASCII) -- This is the code
that most computers use to represent displayable characters. An ASCII file is a
straightforward text file without special control characters.
ANSI T1.403.T1E1 -- The performance-monitoring, data-link, and networkinterface requirements for ESF CSUs as defined by the Exchange Carriers
Standards Association. T1.403 specifies automatic performance reports
transmitted to the network once per second via the data link. (In an E1
environment, Performance Monitor is the equivalent of T1.403).
Application Program Interface (API) -- Means of communication between
programs to give one program transparent access to another.
Asymmetrical Digital Subscriber Line (ASDL) -- A new standard for transmitting
at speeds up to 7 Mbps over a single copper pair.
Asynchronous Balance Mode (ABM) -- A communication mode used in HDLC
that allows either of two workstations in a peer-oriented point-to-point
configuration to initiate a data transfer.
Asynchronous Time Division (ATD) -- ETSI proposal for pure cell relay, without
SONET
or
other framing.
Asynchronous Time Division Multiplexing -- A multiplexing technique in which
a transmission capability is organized in a priori unassigned time slots. The time
slots are assigned to cells upon request of each application's instantaneous real
need.
Asynchronous Transfer Mode (ATM) -- (1) The CCITT standard for cell relay
wherein information for multiple types of services (voice, video, data) is
conveyed in small, fixed-size cells. ATM is a connection-oriented technology
used in both LAN and WAN environments. (2) A fast-packet switching
technology allowing free allocation of capacity to each channel. The SONET
synchronous payload envelope is a variation of ATM. (3) ATM is an international
ISDN high speed, high-volume, packet switching transmission protocol
standard. ATM currently accommodates transmission speeds from 64 Kbps to
622 Mbps.
Automatic Number Identification (ANI) -- A charge number parameter that is
normally included in the Initial Address Message to the succeeding carrier for
billing purposes.
Automatic Repeat Request (ARQ) -- A feature that automatically initiates a
request for retransmission when an error in transmission is detected.
120
Available Bit Rate (ABR) -- A class of service in which the ATM network makes
its "best effort" to meet traffic bit rate requirements.
B Channel -- In ISDN, a full-duplex, 64 Kbps channel for sending data.
B-ICI Signaling ATM Adaptation Layer (B-ICI SAAL) -- A signaling layer that
permits the transfer of connection control signaling and ensures reliable delivery
of the protocol message. The SAAL is divided into a Service Specific part and a
Common part (AAL5).
B-ISDN Inter-Carrier Interface (B-ICI) -- An ATM Forum defined specification for
the interface between public ATM networks to support user services across
multiple public carriers.
Backward Explicit Congestion Notification (BECN) -- A bit in the frame relay
header. The bit is set by a congested network node in any frame which is
traveling in the reverse direction of the congestion. (In frame relay, a node can be
congested in one direction of frame flow but not in the other.)
Bandwidth -- (1) Measure of the information capacity of a transmission channel.
(2) The difference between the highest and lowest frequencies of a band that can
be passed by a transmission medium without undue distortion, such as the AM
band 535 to 1705 kilohertz.
Baseband -- Transmission scheme in which the entire bandwidth, or datacarrying capacity, of a medium (such as a coaxial cable) is used to carry a single
digital pulse, or signal, between multiple users. Because digital signals are not
modulated, only one kind of data can be transmitted at a time. Contrast with
broadband.
Basic Rate Interface (BRI) -- ISDN standards and specifications for provision of
low-speed ISDN services. Supports two "B" channels of 64 Kbps each and one
"D" channel of 16 Kbps on a single wire pair.
Baud (Bite at Unit Density) -- A measure of the speed of transmission of data;
number of elements transmitted per second.
122
124
Committed Information Rate (CIR) -- The transport speed the frame relay
network will maintain between service locations.
Common Channel Signaling -- A method of signaling in which signaling
information relating to a multiplicity of circuits, or relating to a function for
network management, is conveyed over a single channel by addressed messages.
Common Management Interface Protocol (CMIP) -- An ITU-TSS standard for the
message formats and procedures used to exchange management information in
order to operate, administer, maintain, and provision a network.
Common Part Convergence Sublayer-Service Data Unit (CPCS-SDU) -- Protocol
data unit to be delivered to the receiving AAL layer by the destination CP
convergence sublayer.
Common Protocol Convergence Sublayer (CPCS) -- Pads PDU to N x 48 bytes,
maps control bits, adds FCS in preparation for SAR.
Competitive Access Provider (CAP) -- -Alternative to LEC for local loop to IXC
or for dial tone. A company that builds and operates communication networks in
metropolitan areas and provides its customers with an alternative to the local
telephone company.
Competitive Local Exchange Carrier (CLEC) -- A company that builds and
operates communication networks in metropolitan areas and provides its
customers with an alternative to the local telephone company.
Computer Telephony Integration (CTI) -- The name given to the merger of
traditional telecommunications (PBX) equipment with computers and computer
applications. The use of Caller ID to automatically retrieve customer information
from a database is an example of a CTI application.
Connection Admission Control (CAC) -- The function of an ATM network that
determines the acceptability of a virtual circuit connection request and
determines the route through the network for such connections.
126
128
130
Edge
Device
obtains
distribution protocol.
forwarding
descriptions
using
the
route
Electronic Data Interchange (EDI) -- (1) Method for passing orders, invoices, and
other transactions electronically between locations or organizations. (2) The
exchange of structured transactional information between autonomous
computers.
Electronic Funds Transfer (EFT) -- An electronic system that transfers money and
records financial transactions, replacing the use of paper.
Electronic Industries Association (EIA) -- A group that specifies electrical
transmission standards.
Emulated Local Area (ELAN) -- A logical network initiated by using the
mechanisms defined by LAN Emulation. This could include ATM and legacy
attached end stations.
Encapsulation
-The
wrapping
of
data
particular
protocol
header.
For
example,
data
is
wrapped
in
a
specific
Ethernet
before network transit.
in
a
Ethernet
header
Encryption
-Applying
a
specific
algorithm
to
data
in order to alter the data's appearance and prevent other devices from reading
information. Decryption applies the algorithm in reverse to restore the data to its
original form.
End System to Intermediate System Protocol (ES-IS) -- The OSI protocol by which
end systems such as network personal computers announce themselves to
intermediate systems such as hubs.
Error Free Seconds (EFS) -- A unit used to specify the error of performance of T
carrier systems, usually expressed as EFS per hour, day, or week. This method
gives a better indication of the distribution of bit errors than a simple bit error
rate (BER).
ES-IS -- End system to Intermediate system protocol. The OSI protocol used for
router detection and address resolution.
Ethernet -- A baseband LAN specification invented by Xerox Corporation and
developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet
networks operate at 10 Mbps using CSMA/CD to run over coaxial cable.
Ethernet is similar to a series of standards produced by IEEE referred to as IEEE
802.3.
Excess Burst (Be) -- Transient capacity above CIR in FR net.
Explicit Forward Congestion Indicator (EFCI) -- A bit in the PTI field of the ATM
cell header. The bit is set by a congested network node in any cell passing
through the node.
Explorer Super Frame (ESF) -- Frame sent out by a networked device in a source
route bridging environment to determine the optimal route to another
networked device.
Extended Binary Coded Decimal Interexchange Code (EBCDIC) -- Usually
pronounced Eb-suh-dick. The character code used by most mainframe
computers. Each character is composed of eight bits, as opposed to ASCII, which
is composed of seven bits.
Extended Industry Standard Architecture (EISA) -- A standard bus interface,
commonly used by PCs and some UNIX workstations and servers.
Extended Superframe (EF) -- An Extended Superframe consists of 24 frames of
193 bits each (4632 bits total). In each frame, one "F bit" is followed by 24 8-bit
bytes. The 8 Kbps of F-bit overhead is divided into 2 Kbps for framing, 2 Kbps of
CRC-6 code for logic error checking, and a 4 Kbps Data Link for maintenance
communications. As in the Superframe (D4) format, 1.536 Mbps is the available
bandwidth for user information.
Exterior Gateway Protocol (EGP) -- The service by which gateways exchange
information about what systems they can reach; generally, an exterior gateway
protocol is any internetworking protocol for passing routing information
between autonomous systems.
132
Case Study
1.)
2.)
3.) Which characteristics of an analog signal are changed to represent the digital
signal in each of the following digital-to-analog conversions?
a.) ASK
b.) FSK
c.) PSK
d.) QAM
4.) Two channels, one with a bit rate of 150 kbps and another with a bit rate of
140 kbps , are to be multiplexed using pulse stuffing TDM with no
synchronization bits. Answer the following questions:
a.) What is the size of a frame in bits?
b.) What is the frame rate?
c.) What is the duration of a frame?
d.) What is data rate?
134
M.Sc.(INFORMATION TECHNOLOGY)
(FIRST SEMESTER)EXAMINATION, 2012
(Held in February 2013)
(New Scheme)
DATA COMMUNICATION AND COMPUTER
NETWORKS
PAPER: T-103
TIME ALLOWED: THREE HOURS
Maximum Marks80
(1) No supplementary answer-book will be given to any candidate. Hence the
candidates should write the answers precisely in the Main answer-book only.
(2) All the parts of question should be answered at one place in the answer-book.
One complete question should not be answered at different places in the answer
book.
1.
Differentiate between (any two) :(a) Digital data and Analog data transmission
(b) Coaxial cable and Twisted pair
(c) Asynchronous and Synchronous transmission.
2.
3.
4.
5.
6.
7.
8.
9.
136
M.Sc.(Information Technology)
(FIRST SEMESTER)EXAMINATION, 2011
(New Scheme)
DATA COMMUNICATION AND COMPUTER NETWORK
PAPER: T-103
TIME ALLOWED: THREE HOURS
Maximum Marks80
Note:(1) No supplementary answer-book will be given to any candidate. Hence the
candidates should write the answers precisely in the Main answer-book only.
(2) All the parts of question should be answered at one place in the answer-book.
One complete question should not be answered at different places in the answer
book.
1.
2
3.
4.
5.
6.
7.
8.
9.
----------------------------------
138
Bibliography
1.) Data Communications and Networking by Behrouz A. Forouzan.
2.) Data Comms & Networks by Achyut S Godbole
3.) Computer Networks by Andrew S. Tanenbaum
4.) Data And Computer Communications, 8/E by Stallings