Computer Networks Model 1
Computer Networks Model 1
17.
(a) Differentiate between centralized and decentralized network layout.
(b) Write a note on ICMP.
18.
(a) Write a note on unguided transmission media.
(b) Calculate the check sum for the set of numbers 7, 11, 12,0,6
19.
(a) Derive Shannon channel capacity for noisy channel.
(b) Calculate the odd parity bit for the following group of data bits
i. 10011001
ii. 00001111
iii.01010010
iv. 01101010
20.
(a) Explain different types multiple access protocol
(b) Explain distance vector routing algorithm with an example.
21.
(a) Describe each of the following
i. SYN-ACKSYN
ii. SYN
iii.ACK
(b) Explain the importance of QOS.
22.
(a) Explain the working of SMTP.
(b) Explain network application architecture.
1. What is the necessity of computer networks:
Computer networks are essential for various reasons, including:
Resource Sharing: Allows sharing of hardware, software, and data
resources among connected devices.
Reliability: Enhances reliability through redundant paths, reducing
the risk of system failure.
Communication: Facilitates efficient communication through email,
messaging, and collaborative tools.
Remote Access: Enables remote access to data and applications,
fostering flexibility and mobility.
Cost Efficiency: Allows cost-effective resource utilization, especially
for shared resources.
2. Write a note on the Internet:
The Internet is a global network connecting millions of private, public,
academic, business, and government networks. Key features include:
World Wide Web (WWW): A system of interconnected hypertext
documents and multimedia content.
Email: Electronic mail communication.
Social Media: Platforms for social interaction and content sharing.
Search Engines: Tools for finding information.
E-commerce: Online buying and selling of goods and services.
3. Write the difference between UTP and STP:
UTP (Unshielded Twisted Pair):
No shielding around the twisted pairs of copper wires.
Less expensive and more flexible.
Commonly used in Ethernet networks.
STP (Shielded Twisted Pair):
Each pair of wires is wrapped in a metallic foil for shielding.
Offers better protection against electromagnetic interference (EMI).
Typically used in environments with higher interference risks.
4. What are the services provided by the data link layer:
The data link layer provides services such as:
Encapsulation: Frames data for transmission over the physical layer.
Addressing: Adds source and destination MAC addresses to frames.
Error Detection and Correction: Ensures data integrity through error
checking.
Flow Control: Manages the flow of data between sender and receiver.
Access Control: Coordinates access to the physical medium.
5. Compute odd parity and even parity for the data 11010011:
Odd Parity: The number of 1s, including the parity bit, is odd.
Original Data: 11010011
Odd Parity: 110100111 (appending a 1 to make it odd)
Even Parity: The number of 1s, including the parity bit, is even.
Original Data: 11010011
Even Parity: 110100110 (appending a 0 to make it even)
6. What is static and dynamic routing:
Static Routing: Routing configured manually by a network administrator. The
routing table is set and does not change automatically. Suitable for small
networks with a stable topology.
Dynamic Routing: Routing determined dynamically by routers exchanging
information. Routing tables are updated automatically based on network
conditions. Suitable for large networks or those with changing topologies.
7. Abbreviate ARP, UDP, SMTP, FTP:
ARP: Address Resolution Protocol
UDP: User Datagram Protocol
SMTP: Simple Mail Transfer Protocol
FTP: File Transfer Protocol
8. Mention the advantages of TCP:
Reliability: Ensures reliable and error-free data delivery.
Connection-oriented: Establishes a connection before data transfer, ensuring
a reliable link.
Flow Control: Manages data flow between sender and receiver to prevent
congestion.
Error Detection and Correction: Detects and corrects errors in transmitted
data.
9. Define NBT:
NBT: NetBIOS over TCP/IP. It is a protocol that allows NetBIOS
communication over a TCP/IP network. NetBIOS provides naming, session,
and datagram services used by applications for communication.
10. Mention the types of switching:
Circuit Switching: Establishes a dedicated communication path between two
devices for the entire duration of the conversation.
Packet Switching: Divides data into packets and sends them independently
to the destination. Common in modern networks like the Internet.
13. What is coaxial cable? Write about various types of coaxial cable:
Coaxial Cable:
Description: Consists of a central conductor, insulating layer, metallic shield,
and outer insulating layer.
Types:
Thinnet (10BASE2): Used in older Ethernet networks, with a thinner
diameter.
Thicknet (10BASE5): Used in older Ethernet networks, with a thicker
diameter.
RG-6 and RG-59: Commonly used for cable television (CATV) and
broadband Internet.
RG-11: Used for long-distance cable runs, providing lower signal loss.
14. Explain the various error detection techniques:
Parity Bit: Adds a single bit to the data to make the total number of ones either even
(even parity) or odd (odd parity).
Checksum: Involves adding a checksum value to the data, which is calculated based
on the content. Any change in the data can be detected by recalculating the
checksum.
Cyclic Redundancy Check (CRC): Uses polynomial division to generate a remainder
(CRC code) that is appended to the data. Changes in the data can be detected by
recalculating the CRC.
Hash Function: Generates a fixed-size hash value based on the data content. Any
change in the data results in a different hash value.
Datagram:
Connection: Connectionless communication.
Routing: Each packet is routed independently.
Overhead: Lower overhead, as no connection setup is required.
Example: Internet Protocol (IP).
Virtual Circuit:
Connection: Connection-oriented communication.
Routing: Established connection guides the routing of all packets.
Overhead: Higher overhead due to connection setup and maintenance.
Example: Asynchronous Transfer Mode (ATM).
18. (b) Calculate the checksum for the set of numbers 7, 11, 12, 0, 6:
Checksum Calculation:
Sum of the numbers: 7 + 11 + 12 + 0 + 6 = 36
Checksum: 256 - (Sum % 256) = 256 - (36 % 256) = 256 - 36 = 220
19. (b) Calculate the odd parity bit for the following group of data bits:
i. 10011001:
Odd parity bit calculation: 1 (bit count is odd)
ii. 00001111:
Odd parity bit calculation: 0 (bit count is even)
iii. 01010010:
Odd parity bit calculation: 1 (bit count is odd)
iv. 01101010:
Odd parity bit calculation: 0 (bit count is even)
|-------------|----------|------|
|A |A |0 |
|B |B |∞ |
|C |C |∞ |
|D |D |∞ |
Routers exchange tables, update their own, and continue until convergence.
i. SYN-ACK-SYN:
Part of the three-way handshake in TCP.
SYN: Initiates a connection request.
SYN-ACK: Indicates acknowledgment and agreement to establish a
connection.
SYN: Acknowledges the acknowledgment, completing the connection setup.
ii. SYN:
TCP packet with the SYN (synchronize) flag set.
Initiates the connection setup process.
iii. ACK:
TCP packet with the ACK (acknowledge) flag set.
Acknowledges the receipt of data or confirms the establishment of a
connection.