Documente Academic
Documente Profesional
Documente Cultură
3*4=12
2. Why cables are twisted in unshielded twisted pair? Explain? Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to
Reliability: TCP is connection-oriented protocol. When Reliability: UDP is connectionless protocol. When a file or message send it will get delivered unless you a send a data or message, you don't know if connections fails. If connection lost, the server will it'll get there, it could get lost on the way. There request the lost part. There is no corruption while may be corruption while transferring a message. transferring a message. Ordered: If you send two messages along a Ordered: If you send two messages out, you don't connection, one after the other, you know the first know what order they'll arrive in i.e. no ordered message will get there first. You don't have to worry about data arriving in the wrong order. Heavyweight: - when the low level parts of the TCP Lightweight: No ordering of messages, no "stream" arrive in the wrong order, resend requests tracking connections, etc. It's just fire and forget! have to be sent, and all the out of sequence parts This means it's a lot quicker, and the network have to be put back together, so requires a bit of card / OS have to do very little work to translate work to piece together. the data back from the packets. Streaming: Data is read as a "stream," with nothing Datagrams: Packets are sent individually and are distinguishing where one packet ends and another guaranteed to be whole if they arrive. One packet begins. There may be multiple packets per read call. per one read call. Examples: World Wide Web (Apache TCP port 80), e- Examples: Domain Name System (DNS UDP port mail (SMTP TCP port 25 Postfix MTA), File Transfer 53), streaming media applications such as IPTV or Protocol (FTP port 21) and Secure Shell (OpenSSH movies, Voice over IP (VoIP), Trivial File Transfer port 22) etc. Protocol (TFTP) and online multiplayer games etc
Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.
4.
Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address. There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address system as well.
The most significant protocol at layer 3 (also called the network layer) is the Internet Protocol, or IP.
Class A B C D E Leftmost bits 0xxx 10xx 110x 1110 1111 Start address 0.0.0.0 128.0.0.0 192.0.0.0 224.0.0.0 240.0.0.0 Finish address 127.255.255.255 191.255.255.255 223.255.255.255 239.255.255.255 255.255.255.255
5. Difference b/w bus topology and star topology? Bus topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Star topology Many home networks use the star topology. A star network features a central connection point called a "hub node" that may be a network hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Summary
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations. The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
9. What is a Sample?
In statistics, a sample is a subset of a population that is used to represent the entire group as a whole. When doing research, it is often impractical to survey every member of a particular population because the sheer number of people is simply too large. In order to make inferences about characteristics of a population, researchers can use a random sample 10. What is difference between Half-Duplex and Full-Duplex transmission?
Half-Duplex In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice versa. In a half-duplex transmission, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at the time. Walkie-Talkies is an example of half-duplex. Full-Duplex In full-duplex mode (also called duplex), both stations can transmit and receive simultaneously. In full-duplex mode, signals going in one direction share the capacity of the link with signals going in the other direction. This sharing can occur in two ways: Either the link must contain two physically separate transmission paths, one for sending and the other for receiving; or the capacity of the channel is divided between signals travelling in both directions. One common example of fullduplex communication is the telephone network.
2*14=24
1. What is packet switching? Write three application of packet switching? What is the difference between datagram and virtual switching? Packet switching
Data sent out of sequence Small chunks (packets) of data at a time Packets passed from node to node between source and destination Used for terminal to computer and computer to computer communications
Three application of packet switching X.25 Frame relay ATM TCP/IP datagram virtual switching 7. each packet is on its own and may follow 1. Create a logical path through the subnet its own path and all packets from one connection 8. Each packet treated independently follow this path. 9. Packets can take any practical route 2. Preplanned route established before any 10. Packets may arrive out of order packets sent 11. Packets may go missing 3. Call request and call accept packets 12. Up to receiver to re-order packets and establish connection (handshake) recover from missing packets 4. Each packet contains a virtual circuit identifier instead of destination address 5. No routing decisions required for each packet 6. Not a dedicated path
2. Define TCP/IP layer in sequence and OSI model? TCP/IP has five layers, which are described below in table 2:
Name Application Layer Transport Layer Internet Layer Network Access Layer Physical Layer Description Provides a direct interface applications to communicate with for
Provides a data transfer service that appears to be a point to point link Handles routing the data through one or more networks Handles the logical interface between points in the network Handles the communication at the most primitive level (medium, encoding, etc)
OSI Model The Open System Interconnection (OSI) Model is used to describe networks and network application. There are Seven Layers of OSI Model Layers of the OSI Model 1. 2. 3. 4. 5. 6. 7. Physical (Bits) Data Link (Frames) Network (Packets) Transport (Segment) Session (Dialog units) Presentation (Raw Data) Application (Text, Numbers)
The easiest way to remember the different layers of OSI Model is to use the mnemonic "All people seem to need Data Processing": Please Do not Touch Steves Pet Alligator Physical Layer
V.24
V.35
EIA/TIA-232
EIA/TIA-449
FDDI
802.3
802.5
Ethernet
RJ45
NRZ
NRZI
Data Link Layer Data link layer is responsible for Framing, divides the streams of bits into frames Physical Addressing Frames need to be transmitted to different systems on a network Data Link layer adds a HEADER to Frame Header defines the physical address of sender(Source address) and/or receiver address (Destination address) If frame is intended for a device outside the network, the receiver address is the address of the device that connects one network to the other Error Control, Data link layer adds reliability to physical layer by adding mechanisms to detect and retransmit lost or damaged frames Flow Control Data Link layer imposes Flow Control mechanisms to prevent overwhelming the receiver Examples IEEE 802.2 HDLC ATM IEEE 802.3 Frame Relay PPP 802.5 - Token Ring FDDI
Network Layer Transfers a data packet from node to node within the network. One of the functions of Network layer is to define this route Translating the logical network address and names into their physical address ( MAC address). Responsible for Source-to-Destination delivery
Examples DECnet Packet Layer Protocol (PLP), IBM's Path Control Layer (PCL), Internet Protocol (IP), Datagram Delivery Protocol (DDP), Internetwork Packet Exchange Protocol (IPX): Datagram Delivery Protocol (DDP): Packet Layer Protocol (PLP): Multiprotocol Label Switching (MPLS). The Internetwork Packet Exchange (IPX), VINES Internet Protocol (VIP). Path Control Layer (PCL): VINES Internet Protocol (VIP): X.25's
Transport Layer This layer is responsible for Service point addressing / Port addressing. Connection Control, connection oriented / connectionless Segmentation & Reassembling, It first divides the streams of data into chunks or packets before transmission and then the receiving computer re-assembles the packets. Error Control, It also guarantees error free data delivery without loss or duplications. Flow Control on end systems Examples
Session Layer This layer is responsible for Synchronization Points Dialog Control, it allows the communication between 2 processes to take place in either half duplex or full duplex Establishing the process-to-process communication between the host in the network. Establishing and ending the sessions across the network. The interactive login is an example of services provided by this layer in which the connective are reconnected in case of any interruption Example RPC DECnet SQL SCP NetBIOS names Appletalk ASP
UDP packets, called user datagram, have a fixed-size header of 8 bytes. Figure shows the format of a user datagram. The fields are as follows:
2. Destination port number. This is the port number used by the process running on the destination host. It is also 16 bits long. If the destination host is the server (a client sending a request), the port number, in most cases, is a well-known port number. If the destination host is the client (a server sending a response), the port number, in most cases, is an ephemeral port number. In this case, the server copies the ephemeral port number it has received in the request packet. 3. Length. This is a 16-bit field that defines the total length of the user datagram, header plus data. The 16 bits can define a total length of 0 to 65,535 bytes. However, the total length needs to be much less because a UDP user datagram is stored in an IP datagram with a total length of 65,535 bytes. The length field in a UDP user datagram is actually not necessary. A user datagram is encapsulated in an IP datagram. There is a field in the IP datagram that defines the total length. There is another field in the IP datagram that defines the length of the header. So if we subtract the value of the second field from the first, we can deduce the length of a UDP datagram that is encapsulated in an IP datagram. UDP length = IP length - IP header's length However, the designers of the UDP protocol felt that it was more efficient for the destination UDP to calculate the length of the data from the information provided in the UDP user datagram rather than ask the IP software to supply this information.
The segment consists of a 20- to 60-byte header, followed by data from the application program. The header is 20 bytes if there are no options and up to 60 bytes if it contains options.
Source port address. This is a 16-bit field that defines the port number of the application program in the host that is sending the segment. This serves the same purpose as the source port address in the UDP header. Destination port address. This is a 16-bit field that defines the port number of the application program in the host that is receiving the segment. This serves the same purpose as the destination port address in the UDP header. Sequence number. This 32-bit field defines the number assigned to the first byte of data contained in this segment. As we said before, TCP is a stream transport protocol. To ensure connectivity, each byte to be transmitted is numbered. The sequence number tells the destination which byte in this
Acknowledgment number. This 32-bit field defines the byte number that the receiver of the segment is expecting to receive from the other party. If the receiver of the segment has successfully received byte number x from the other party, it defines x + I as the acknowledgment number. Acknowledgment and data can be piggybacked together. Header length. This 4-bit field indicates the number of 4-byte words in the TCP header. The length of the header can be between 20 and 60 bytes. Therefore, the value of this field can be between 5 (5 x 4 =20) and 15 (15 x 4 =60). Reserved. This is a 6-bit field reserved for future use. Control. This field defines 6 different control bits or flags as shown in Figure. One or more of these bits can be set at a time. These bits enable flow control, connection establishment and termination, connection abortion, and the mode of data transfer in TCP. A brief description of each bit is shown in Flag Description The value of the urgent pointer field is valid. The value of the acknowledgment field is valid. Push the data. Reset the connection. Synchronize sequence numbers during connection. Terminate the connection.
ACK PSH RST SYN FIN
URG
Window size. This field defines the size of the window, in bytes, that the other party must maintain. Note that the length of this field is 16 bits, which means that the maximum size of the window is 65,535 bytes. This value is normally referred to as the receiving window and is determined by the receiver. The sender must obey the dictation of the receiver in this case. Checksum. This 16-bit field contains the checksum. The calculation of the checksum for TCP follows the same procedure as the one described for UDP. However, the inclusion of the checksum in the
Urgent pointer. This l6-bit field, which is valid, only if the urgent flag is set, is used when the segment contains urgent data. It defines the number that must be added to the sequence number to obtain the number of the last urgent byte in the data section of the segment. Options. There can be up to 40 bytes of optional information in the TCP header. 5. What is FDM, TDM and QAM with example?
Time Division Multiplexing works by the multiplexor collecting and storing the incoming transmissions from all of the slow lines connected to it and allocating a time slice on the fast link to each in turn. The messages are sent down the high speed link one after the other. Each transmission when received can be separated according to the time slice allocated. Theoretically, the available speed of the fast link should at least be equal to the total of all of the slow speeds coming into the multiplexor so that its maximum capacity is not exceeded. Two ways of implementing TDM are:
Wave or Wavelength Division Multiplexing (WDM) is used with fibre optic cables. WDM is a technology that closely resembles frequency division multiplexing, but is specifically used to combine lots of Optical Carrier signals into a single optical fibre. The WDM technique relies on a laser that is designed to emit single colours of light. Each of the signals that is to be transmitted is then attached to a laser that will emit a different coloured light beam. All these individual light beams are then sent at the same time. At the receiving end, a device splits the combined colours back into the original individual colours again. QAM (quadrature amplitude modulation) is a method of combining two amplitude-modulated (AM) signals into a single channel, thereby doubling the effective bandwidth. QAM is used with pulse amplitude modulation (PAM) in digital systems, especially inwireless applications. In a QAM signal, there are two carriers, each having the same frequency but differing in phase by 90 degrees (one quarter of a cycle, from which the term quadrature arises). One signal is called the I signal, and the other is called the Q signal. Mathematically, one of the signals can be represented by a sine wave, and the other by a cosine wave. The two modulated carriers are combined at the source for transmission. At the destination, the carriers are separated, the data is extracted from each, and then the data is combined into the original modulating information.