Documente Academic
Documente Profesional
Documente Cultură
23
May/June - 2012
Set-4
Solutions
COMPUTER NETWORKS
( Information Technology )
Time: 3 Hours
Max. Marks: 75
Answer any FIVE Questions
All Questions carry equal marks
---
1.
(a)
Define analog signal, digital signal. Explain the advantages of a digital signal over an analog signal.
(Unit-I, Topic No. I.7)
(b)
Explain the functions of a physical layer in ISO-OSI model. [11+4] (Unit-I, Topic No. I.4)
(a)
Compare transparent and source routing bridges. (Unit-V, Topic No. 5.1)
(b)
Explain the working of 2-layer/ 3-layer switches. [5+10] (Unit-V, Topic No. 5.1)
3.
Explain the working of a datagram network with a suitable example. [15] (Unit-II, Topic No. 2.5)
4.
(a)
Describe the functions of the two FTP connections. (Unit-VIII, Topic No. 8.4)
(b)
(c)
How does storing a file differ from retrieving a file? What kind of file types can FTP transfer? [5+4+6]
(Unit-VIII, Topic No. 8.4)
(a)
Write short technical notes on usefulness of hamming distance for error detection and correction.
(Unit-III, Topic No. 3.2)
(b)
What is a linear block code? Explain. [10+5] (Unit-III, Topic No. 3.2)
(a)
5.
6.
(i)
FF02::0
(ii) FEC0::24A2
(iii) FE80::12
(iv) FE79::14. (Unit-VI, Topic No. 6.1)
(b)
(ii) The site local address in which the node identifier is 0::124/48. [7+8] (Unit-VI, Topic No. 6.1)
7.
(a)
We have a pure ALOHA network with 100 stations. If frame duration (Tfr) = 1s, what is the number of frames/
second each station can send to achieve the maximum efficiency? (Unit-IV, Topic No. 4.1)
(b)
In a CSMA/CD network with a data rate of 10 Mbps, the maximum distance between any station pair is found
to be 2500 m for the correct operation of the collision detection process. What should be the maximum distance
if we increase the data rate to,
(i)
100 Mbps
(ii) 1 Gbps
(iii) 10 Gbps. (Unit-IV, Topic No. 4.1)
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.
S.24
(c)
100 Mbps
(ii) 1 Gbps
(iii) 10 Gbps. [15] (Unit-IV, Topic No. 4.1)
8.
(a)
Compare the UDP header and the TCP header. List the fields in the TCP header that are missing from UDP
header. Give the reason for their absence. (Unit-VII, Topic No. 7.2)
(b)
UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the
boundaries of its message, which protocol should be used, TCP or UDP? Justify your answer. [10+5]
(Unit-VII, Topic No. 7.2)
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.
S.25
(a)
Define analog signal, digital signal. Explain the advantages of a digital signal over an analog
signal.
Answer :
For answer refer Dec.-11, Set-2, Q1(b).
(b)
Answer :
The functionalities of physical layer are as follows,
1.
Defining Characteristics
Physical layer is responsible for defining the characteristics of those interfaces which lie between the transmission
medium (along with its type) and the devices.
2.
Representing Bits
Physical layer is responsible for enconding of bits into electrical or optical signals.
3.
Physical layer is responsible for defining the transmission rate that specifies the number of bits transmitted per
second.
4.
Synchronizing Bits
Physical layer aims at synchronizing the bits sent and received between the sender and receiver.
Connecting Devices
Physical layer is responsible for connecting devices to the media. There are two types of configuration. Physical
layer deals with,
(i)
Point-to-point Configuration
In this type of configuration, connection of two devices is done using a dedicated link.
(ii)
Multipoint Configuration
In this type of configuration , a single device is linked between various devices.
6.
Layer is responsible for topology, which describes the way in which devices are connected to form a network. The
various types of topologies include mesh topology, ring topology, bus topology, star topology and hybrid topology.
7.
Physical layer is responsible for defining the transmission mode (direction of transmission) between any two devices.
The transmission modes are broadly into three categories.
(i)
Simplex mode
(ii)
Half-duplex mode
(iii)
Full-duplex mode.
(i)
Simplex Mode
In this type of transmission mode, data is transmitted in single direction.
S.26
Q2
(a)
Answer :
The difference between the transparent bridges and source routing bridges are given below.
Issue
Orientation
Transparency
Transparent Bridge
products.
Configuration
topology.
Routing
trace only.
Locating
bridges.
Complexity
the topology.
the destination.
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.
S.27
Answer :
Two-layer Switch
A two-layer switch is a bridge that contains multiple ports. It operates at physical layer and data link layer of the OSI
model. It can connect few LANs using lesser number of ports.
However, if many ports are used than each independent station can be assigned a unique port by this switch and this
assignment of port eliminates competition for traffic.
Characteristics of Two-layer Switch
1.
2.
It is capable of transfering the framer soon after checking the header for MAC addresses.
3.
Three-layer Switch
A three-layer switch is a router that forwards data packets using hardware. The forwarding involves,
(a)
A route lookup
(b)
(c)
Checksum recalculation
(d)
Different types of routing protocols such as Open Shortest Port First (OSPF) and Routing Information Protocol (RIP)
are used for routing packets and building routing tables. These tables are used to decide the route for data packets.
Characteristics of three-layers Switch
1.
2.
It performs faster table lookup as well as packet forwarding by using switching fibric.
Q3.
Answer :
For answer refer Unit-II, Q22.
Q4.
(a)
Answer :
S.28
(b)
Answer :
(a)
FF02::0
(ii) FEC0::24A2
(iii) FE80::12
(iv) FE79::14.
May/June-12, Set-4, Q6(a) M[7]
Answer :
(i)
FF02::0
FF02::0 is a type of link local address.
File Storage
A file is stored by the clients on a servers (that is
remotely situated) current directory by using STOR (put)
command. This STOR command causes the server to
recognize and accept data or files being transferred and to
store the data. If the file transferred does not exists on the
server then a new file is created. On the other hand, if the file
already exists with the same name, then its contents are
replaced by the new files content.
(ii)
(iii)
FE80::12
FE80::12 is a multicast (permanent link local) type of
address.
(iv)
FE79::14
FE79::14 is a type of loop back address.
(b)
FEC0::24A2
FEC0::24A2 is a type of site local address.
File Retrieval
(ii)
Answer :
Answer :
(i)
(a)
Answer :
(c)
Q5.
(i)
(ii)
Q7.
(a)
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.
S.29
1000 bits
= 1 ms
1M bps
(c)
(b)
100 Mbps
(ii) 1 Gbps
(iii) 10 Gbps.
Answer :
25
= 2.5 m.
10
100 Mbps
(ii) 1 Gbps
(iii) 10 Gbps.
May/June-12, Set-4, Q7(c)
Answer :
(i)
100 Mbps
100 Mbps
(ii)
(i)
only).
would be
(ii)
2500
= 250 m.
10
1 Gbps
For answer refer Dec.-11, Set-2, Q5(a).
(iii)
10 Gbps
For answer refer Dec.-11, Set-2, Q5(a) (First paragraph
only).
(iii)
1 Gbps
10 Gbps
(a)
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.
S.30
Answer :
UDP Header
For answer refer Unit-VII, Q5.
TCP Header
For answer refer Unit-VII, Q10.
The fields that are present in a header but not UDP header are as follows,
1.
Sequence number
2.
3.
Acknowledgment number
Header length
4.
5.
Reserved field
Control fields
6.
7.
Window size
Urgent pointer
8.
Option.
(b)
Answer :
Message Boundary Preservation
User Datagram Protocol (UDP) preserves the boundaries of the messages whereas, Transmission Control Protocol
(TCP) does not preserve the messages boundaries.
When a client sends a message of (For example, 200 bytes and then 300 bytes).
Then, the boundaries of these two messages are preserved in UDP. The UDP does not combine these two messages.
It transfer the messages in their original format and therefore the application is not forced to split the message at receivers
end.
300 bytes
200 bytes
300 bytes
200 bytes
UDP
Sender
Receiver
300 bytes
200 bytes
300 bytes
200 bytes
TCP
Sender
Receiver