Documente Academic
Documente Profesional
Documente Cultură
8 KHz as the sampling frequency will be double the maximum frequency component for no
aliasing effect, as per the nyquist theorm. as the maximum frequency allowed by the filter is
just 4khz. so the sampling frequency is 8KHz
10Base2 - It is an Ethernet term which means a maximum transfer rate of 10 Megabits per
second that uses baseband signalling, with a contiguous cable segment length of
100 meters and a maximum of 2 segments.
10Base5
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per
second that uses baseband signalling, with 5 continuous segments not exceeding
100 meters per segment.
10BaseT
- It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per
second that uses baseband signalling and twisted pair cabling.
- Sometimes a switch receives the packets faster than they can be accommodated in the
shared link. These packets are stored in the memory for sometime.
- However, after sometime the buffer space will exhaust and some packets will start getting
dropped off.
- The switch is called as congested in this state.
Explain a.) Uni-casting, b.) Multicasting and c.) Broadcasting
a. Physical Layer
b. Data link Layer and
c. Network Layers
Which layers of OSI are referred to as user support layers?
- The Data Link Layer transforms the physical layer to a reliable link.
It takes care of:
a. Node to node delivery.
b. Framing
c. Physical Addressing
d. Flow Control
e. Error Control
f. Access Control
What is NIC?
- Bit stuffing means adding one extra 0 whenever five consecutive 1s follow a 0.
- This is done so that the pattern 0111110 is not mistaken for a flag.
How does dynamic host configuration protocol aid in network administration?
- In a large set up where it is difficult to manually configure the IP address of each system,
dynamic host configuration protocol comes very helpful.
- Using this protocol, the administrator can create a pool of IP addresses which are called
scopes. These can be then dynamically assigned to the systems.
Can you differentiate among encoding, encryption and hashing?
Encoding: Basically encoding is used to protect the integrity of data as it crosses through
communication network to keep its original message upon arriving. It is primarily an insecure
function because it is easily reversible.
Encryption: Encryption is basically designed for confidentiality and data integrity and
reversible only if you have the appropriate key.
Hashing: With hashing the operation is one-way i.e. non-reversible. It takes an input (or
message) and returns a fixed-size string, which is called the hash value.
FIG: TDMA
CDMA differs from FDMA and TDMA because only one channel occupies the entire
bandwidth of the link and also there is no timesharing. In CDMA a code is available for every
station wanting to send the data. In this protocol the assigned codes have two properties.
1. If we multiply each code by another, we get zero.
2. If we multiply each code by itself, we get the number of stations.
So suppose there are three stations and code and data are (c1, d1), (c2, d2), (c3, d3)
respectively. The data that go on the channel are the sum of all these terms. Any
station wanting to receive data from one of the other two, multiplies the data on the channel
by the code of the sender. For example, suppose stations 1 and 2 are talking to each other.
Station 2 wants to hear what station I is saying. It multiplies the data on the channel by cl the
code of station 1.
Because (cl . cl) is 3, but (c2 . cI) and (c3 . cI) are all Zero, station 2 divides the result by 3 to
get the data from station 1.
-Support For Resource Allocation: In IPv6, flow label has been added to enable the source to
request special handling of the packet. This mechanism can be used to support traffic such as
real-time audio and video.
-Support For More Security: The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet.
A 2MB PCM(pulse code modulation) has how many channels?
30 voice channels, 1 signalling channel, & 1 synchronization channel.
What is the difference between TFTP and FTP application layer protocols?
The differences between FTP and TFTP:
FTP is connection oriented, where as TFTP is not.
TFTP uses error checking and flow control, where as TFTP does not cause error checking.
FTP uses TCP as transport protocol, where as TFTP uses UDP as transport protocol.
Authentication is mandatory in FTP, where as authentication is not needed in TFTP.
Just getting and putting application effectively is the design concern of TFTP, where as FTP provides more
control and data connection aspect