Sunteți pe pagina 1din 8

S.

23

Computer Networks (May/June-2012, Set-4) JNTU-Hyderabad


Code No: 09A51203/R09
III B.Tech. I Semester Examinations

May/June - 2012

Set-4
Solutions

COMPUTER NETWORKS
( Information Technology )

Time: 3 Hours

Max. Marks: 75
Answer any FIVE Questions
All Questions carry equal marks
---

1.

(a)

Define analog signal, digital signal. Explain the advantages of a digital signal over an analog signal.
(Unit-I, Topic No. I.7)

(b)

Explain the functions of a physical layer in ISO-OSI model. [11+4] (Unit-I, Topic No. I.4)

(a)

Compare transparent and source routing bridges. (Unit-V, Topic No. 5.1)

(b)

Explain the working of 2-layer/ 3-layer switches. [5+10] (Unit-V, Topic No. 5.1)

3.

Explain the working of a datagram network with a suitable example. [15] (Unit-II, Topic No. 2.5)

4.

(a)

Describe the functions of the two FTP connections. (Unit-VIII, Topic No. 8.4)

(b)

What is anonymous FTP? (Unit-VIII, Topic No. 8.4)

(c)

How does storing a file differ from retrieving a file? What kind of file types can FTP transfer? [5+4+6]
(Unit-VIII, Topic No. 8.4)

(a)

Write short technical notes on usefulness of hamming distance for error detection and correction.
(Unit-III, Topic No. 3.2)

(b)

What is a linear block code? Explain. [10+5] (Unit-III, Topic No. 3.2)

(a)

What is the type of each of the following addresses?

5.

6.

(i)

FF02::0

(ii) FEC0::24A2
(iii) FE80::12
(iv) FE79::14. (Unit-VI, Topic No. 6.1)
(b)

Show the hexa-decimal colon notation,


(i)

The link local address in which the node identifier is 0::122/48

(ii) The site local address in which the node identifier is 0::124/48. [7+8] (Unit-VI, Topic No. 6.1)
7.

(a)

We have a pure ALOHA network with 100 stations. If frame duration (Tfr) = 1s, what is the number of frames/
second each station can send to achieve the maximum efficiency? (Unit-IV, Topic No. 4.1)

(b)

In a CSMA/CD network with a data rate of 10 Mbps, the maximum distance between any station pair is found
to be 2500 m for the correct operation of the collision detection process. What should be the maximum distance
if we increase the data rate to,
(i)

100 Mbps

(ii) 1 Gbps
(iii) 10 Gbps. (Unit-IV, Topic No. 4.1)
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.24
(c)

Spectrum ALL-IN-ONE Journal for Engineering Students, 2012


In a CSMA/CD network with a data rate of 10 Mbps, the minimum frame size is found to be 512 bits for the
correct operation of the collision detection process. What should be the minimum frame size if we increase the
data rate to,
(i)

100 Mbps

(ii) 1 Gbps
(iii) 10 Gbps. [15] (Unit-IV, Topic No. 4.1)
8.

(a)

Compare the UDP header and the TCP header. List the fields in the TCP header that are missing from UDP
header. Give the reason for their absence. (Unit-VII, Topic No. 7.2)

(b)

UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the
boundaries of its message, which protocol should be used, TCP or UDP? Justify your answer. [10+5]
(Unit-VII, Topic No. 7.2)

WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.25

Computer Networks (May/June-2012, Set-4) JNTU-Hyderabad

SOLUTIONS TO MAY/JUNE-2012, SET-4, QP


Q1.

(a)

Define analog signal, digital signal. Explain the advantages of a digital signal over an analog
signal.

Answer :
For answer refer Dec.-11, Set-2, Q1(b).
(b)

May/June-12, Set-4, Q1(a) M[11]

Explain the functions of a physical layer in ISO-OSI model.


May/June-12, Set-4, Q1(b) M[4]

Answer :
The functionalities of physical layer are as follows,
1.

Defining Characteristics

Physical layer is responsible for defining the characteristics of those interfaces which lie between the transmission
medium (along with its type) and the devices.
2.

Representing Bits
Physical layer is responsible for enconding of bits into electrical or optical signals.

3.

Defining Transmission Rate

Physical layer is responsible for defining the transmission rate that specifies the number of bits transmitted per
second.
4.

Synchronizing Bits
Physical layer aims at synchronizing the bits sent and received between the sender and receiver.

Connecting Devices

Physical layer is responsible for connecting devices to the media. There are two types of configuration. Physical
layer deals with,
(i)

Point-to-point Configuration
In this type of configuration, connection of two devices is done using a dedicated link.

(ii)

Multipoint Configuration
In this type of configuration , a single device is linked between various devices.

6.

Defining Physical Topology

Layer is responsible for topology, which describes the way in which devices are connected to form a network. The
various types of topologies include mesh topology, ring topology, bus topology, star topology and hybrid topology.
7.

Defining Transmission Mode

Physical layer is responsible for defining the transmission mode (direction of transmission) between any two devices.
The transmission modes are broadly into three categories.
(i)

Simplex mode

(ii)

Half-duplex mode

(iii)

Full-duplex mode.
(i)

Simplex Mode
In this type of transmission mode, data is transmitted in single direction.

(ii) Half-duplex Mode


In half-duplex, data is transmitted in both direction but one at a time.
(iii) Full-duplex Mode
In full duplex, data is transmitted simultaneously in both directions.
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.26
Q2

(a)

Spectrum ALL-IN-ONE Journal for Engineering Students, 2012


Compare transparent and source routing bridges.
May/June-12, Set-4, Q2(a) M[5]

Answer :

The difference between the transparent bridges and source routing bridges are given below.
Issue
Orientation

Transparency

Transparent Bridge

Source Routing Bridge

It provides connection less networking.

It provides connection oriented networking.

Its frames takes independent routes to

It uses a discovery frame to find out its route

reach the destination.

and then this route can be follow at next time.

These are completely transparent

These bridges are not transparent, as the

and hidden to the hosts. These bridges

hosts are aware of the bridging strategy and

are well suited with all existing 802

it has to participate in that strategy.

products.
Configuration

It is automatic it does not requires

It is manual. In this, it is the duty of the

network management. Automatically

network manager to install the LAN and

the bridges configure themselves to the

bridge numbers. It is very difficult to detect

topology.

mistakes or bridge numbers from a loop


of frames.

Routing

These bridges uses suboptimal routing

These source routing bridges uses optimal

i.e., they are restricted to use spanning

routing i.e., they are not restricted to use

trace only.

only one route. They also make a good use


of parallel bridges between two LANs to
split the load.

Locating

Backward learning is used to find the

Discovery frames are used to find the

destination. But, the drawback of using

destination. But the drawback of using this

backward learning is that it makes the

frame is that the exponential explosion is

bridges to wait for a frame from a

moderate to large internetworks with parallel

specific node or host to come across

bridges.

to know abut that host.


Failures

Failures can be handled by the bridges.

These are handled by the hosts. Bridges

Bridges can handle whenever a failure

give a failure notice to his connected hosts,

of LAN or any bridge fails, it is auto-

but the hosts are unaware of the problem,

matically handled by the bridges

they dont know if the problem is with the

without noticing to the host.

destination itself or with the current route,


until another discovery frame comes to the
hosts.

Complexity

Transparent bridges puts extra comp-

Source routing bridge puts extra

lexity in the bridges, as the bridges

complexity in the host, as they have

automatically configure themselves to

to send discovery frames to find

the topology.

the destination.

WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.27

Computer Networks (May/June-2012, Set-4) JNTU-Hyderabad


(b)

Explain the working of 2-layer/ 3-layer switches.


May/June-12, Set-4, Q2(b) M[10]

Answer :
Two-layer Switch

A two-layer switch is a bridge that contains multiple ports. It operates at physical layer and data link layer of the OSI
model. It can connect few LANs using lesser number of ports.
However, if many ports are used than each independent station can be assigned a unique port by this switch and this
assignment of port eliminates competition for traffic.
Characteristics of Two-layer Switch
1.

A filters packet based on the address of the MAC frames.

2.

It is capable of transfering the framer soon after checking the header for MAC addresses.

3.

It enhances the network performance.

Three-layer Switch
A three-layer switch is a router that forwards data packets using hardware. The forwarding involves,
(a)

A route lookup

(b)

Decrease in time to link count

(c)

Checksum recalculation

(d)

Forwarding frames to correct output port.

Different types of routing protocols such as Open Shortest Port First (OSPF) and Routing Information Protocol (RIP)
are used for routing packets and building routing tables. These tables are used to decide the route for data packets.
Characteristics of three-layers Switch
1.

It has advanced technical capabilities.

2.

It performs faster table lookup as well as packet forwarding by using switching fibric.

Q3.

Explain the working of a datagram network with a suitable example.


May/June-12, Set-4, Q3 M[15]

Answer :
For answer refer Unit-II, Q22.
Q4.

(a)

Describe the functions of the two FTP connections.

Answer :

May/June-12, Set-4, Q4(a) M[5]

Function of FTP Connections


The control and data transfer processes in client and server machines are connected by the control and data
connections. The data connection is initially opened when commands for file transfer are used and get closed when the file
is transferred whereas the connection remains connected throughout the FTP session. Thus, for a single control connection
which is opened, multiple data connection can be opened and closed during the file transfer process.
Communication Over Control Connection
For answer refer Unit-VIII, Q17, Topic: Communication Over Control Connection.
Communication Over Data Connection
For answer refer Unit-VIII, Q17, Topic: Communication Over Data Connection.
Note: Exclude file type, Data structure and transmission mode from the answer.
WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.28
(b)

Spectrum ALL-IN-ONE Journal for Engineering Students, 2012


What is anonymous FTP?

In general FTP can be used by only authorized users


after going through proper authentication process. However,
certain networks/websites allow the resourcer (files) to be
accessed by public. The mechanism which allows
unregistered users to access files is called anonymous FTP.
An anonymous FTP user can access the files by logging
onto the server using the username anonymous and
password guest.
This mechanism allow large number of users to access
resourcer without going through registration process.
However, the anonymous users are restricted to certain area
to access files.

May/June-12, Set-4, Q4(c) M[6]

File Storage and Retrival in FTP

May/June-12, Set-4, Q5(a) M[10]

For answer refer Unit-III, Q7, Q8.


(b)

What is a linear block code? Explain.


May/June-12, Set-4, Q5(b) M[5]

Answer :

For answer refer Unit-III, Q9.


Q6.

(a)

What is the type of each of the following


addresses?
(i)

FF02::0

(ii) FEC0::24A2
(iii) FE80::12
(iv) FE79::14.
May/June-12, Set-4, Q6(a) M[7]

Answer :
(i)

FF02::0
FF02::0 is a type of link local address.

File Storage
A file is stored by the clients on a servers (that is
remotely situated) current directory by using STOR (put)
command. This STOR command causes the server to
recognize and accept data or files being transferred and to
store the data. If the file transferred does not exists on the
server then a new file is created. On the other hand, if the file
already exists with the same name, then its contents are
replaced by the new files content.

(ii)

(iii)

FTP can transfer different types of files such as,


ASCII File
For answer refer Unit-VIII, Q16, Topic: ASCII
Mode.
Binary/Image Files
For answer refer Unit-VIII, Q16, Topic: Binary/
Image Mode.
(iii) EBCDIC File
For answer refer Unit-VIII, Q16, Topic: EBCDIC
Mode.

FE80::12
FE80::12 is a multicast (permanent link local) type of
address.

(iv)

FE79::14
FE79::14 is a type of loop back address.
(b)

A file is retrieved from the current directory of a host


that is remote to the client, by using RETR (put) command.
This invocation of this command results in establishing a
data connection between host and the client. Thereafter, the
requested file is transferred to the client from the server.
Types of Files Being Transferred

FEC0::24A2
FEC0::24A2 is a type of site local address.

File Retrieval

(ii)

Write short technical notes on usefulness


of hamming distance for error detection
and correction.

Answer :

How does storing a file differ from


retrieving a file? What kind of file types
can FTP transfer?

Answer :

(i)

(a)

May/June-12, Set-4, Q4(b) M[4]

Answer :

(c)

Q5.

Show the hexa-decimai colon notation,


(i)

The link local address in which the


node identifier is 0::122/48

(ii) The site local address in which the


node identifier is 0::124/48.
Answer :

May/June-12, Set-4, Q6(b) M[8]

(i)

FE80 : 0000 : 0000 : 0000 : 000 : 000 : 000 : 0123 or


FE80::123.

(ii)

FEC0 : 0000 : 0000 : 0000 : 0000 : 0000 : 0000 : 0123 or


FEC0::123.

Q7.

(a)

We have a pure ALOHA network with


100 stations. If frame duration (Tfr) = 1s,
what is the number of frames/second
each station can send to achieve the
maximum efficiency?
May/June-12, Set-4, Q7(a)

WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.29

Computer Networks (May/June-2012, Set-4) JNTU-Hyderabad


Answer :
Given that,
(1000 bits)/1 Mbps = 1 ms
Duration of frame (Tfr) =

1000 bits
= 1 ms
1M bps

Assuming that the signal minimum frame size and


number of network device are constant. For every ten fold
increase in transmission rate the distance between the pair
of stations will decrease by ten fold.
Therefore, if 2500 m is the correct distance for 10
Mbps then for 1 Gbps the distance

Number of stations (nsr) = 100

(c)

G = nsr n fsr Tfr


= 100 10 1 ms = 1
In case of pure ALOHA S = G e2G
= 1 e2(1)
~13.53%

(b)

In a CSMA/CD network with a data rate


of 10 Mbps, the maximum distance
between any station pair is found to be
2500 m for the correct operation of the
collision detection process. What should
be the maximum distance if we
increase the data rate to,
(i)

100 Mbps

(ii) 1 Gbps
(iii) 10 Gbps.
Answer :

May/June-12, Set-4, Q7(b)

In a CSMA/CD network with a data rate


of 10 Mbps, the minimum frame size is
found to be 512 bits for the correct
operation of the collision detection
process. What should be the minimum
frame size if we increase the data rate
to,
(i)

Hence, each station can transfer 1.35 frames per


second.

25
= 2.5 m.
10

100 Mbps

(ii) 1 Gbps
(iii) 10 Gbps.
May/June-12, Set-4, Q7(c)

Answer :
(i)

100 Mbps

In a CSMA/CD network, the minimum frame size for


correct operation of collision detection process is 512 bits
for the data transmission rate of 10 mbps. This frame size is
proportional to data rate i.e., when the data rate increases
the frame size must also be increased.
Therefore, for the speed of 10 mbps when 512 bits are
required 5120 bits are needed when the speed is increased
to 100 mbps.

100 Mbps

(ii)

For answer refer Dec.-11, Set-2, Q5(a) (First paragraph

For answer refer May/June-12, Set-4, Q7(c)(i) (First


paragraph only).

Assuming that the signal minimum frame size and


number of network devices are constant. For every ten fold
increase in transmission rate, the distance between the pair
of station will decrease by ten fold.

Therefore, when 512 bits are needed for the data


transmission speed of 10 mbps, minimum frame size of 51200
bits are required when the data speed is increased to 1 Gbps.

Therefore, if 2500 m is the correct distance for 10


Mbps then for 10 10 = 100 Mbps the correct distance

For answer refer May/June-12, Set-4, Q7(c)(i) (First


paragraph only).

(i)
only).

would be
(ii)

2500
= 250 m.
10

1 Gbps
For answer refer Dec.-11, Set-2, Q5(a).

(iii)

10 Gbps
For answer refer Dec.-11, Set-2, Q5(a) (First paragraph

only).

(iii)

1 Gbps

10 Gbps

Therefore, when minimum frame size of 512 bits is


needed for data transfer rate of 10 mbps, 512000 bits frame
size is needed when the data rate is increased to 10 Gbps.
Q8.

(a)

Compare the UDP header and the TCP


header. List the fields in the TCP header
that are missing from UDP header. Give
the reason for their absence.
May/June-12, Set-4, Q8(a) M[10]

WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S.30

Spectrum ALL-IN-ONE Journal for Engineering Students, 2012

Answer :
UDP Header
For answer refer Unit-VII, Q5.
TCP Header
For answer refer Unit-VII, Q10.
The fields that are present in a header but not UDP header are as follows,
1.
Sequence number
2.
3.

Acknowledgment number
Header length

4.
5.

Reserved field
Control fields

6.
7.

Window size
Urgent pointer

8.

Option.

(b)

UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs


to protect the boundaries of its messages, which protocol should be used, TCP or UDP?
Justify your answer.
May/June-12, Set-4, Q8(b) M[5]

Answer :
Message Boundary Preservation

User Datagram Protocol (UDP) preserves the boundaries of the messages whereas, Transmission Control Protocol
(TCP) does not preserve the messages boundaries.
When a client sends a message of (For example, 200 bytes and then 300 bytes).
Then, the boundaries of these two messages are preserved in UDP. The UDP does not combine these two messages.
It transfer the messages in their original format and therefore the application is not forced to split the message at receivers
end.

300 bytes

200 bytes

300 bytes

200 bytes

UDP

Sender

Receiver

Figure (1): UDP Preserving Messages Boundaries


However, TCP does not preserve the boundaries of the messages. It combines the multiple massager in a single stream (200
bytes and 300 bytes in our example). This combination of multiple message forces the application to split the messages at
the receivers end in their original format.

300 bytes

200 bytes

300 bytes

200 bytes

TCP

Sender

Receiver

Figure (2): TCP Combining Messages


WARNING : Xerox/Photocopying of this book is a CRIMINAL act. Anyone found guilty is LIABLE to face LEGAL proceedings.

S-ar putea să vă placă și