Professional Documents
Culture Documents
Page 1
for a
mesh and ring topology?
M
e
s
h
t
o
p
o
l
o
g
y
n
(
n
1
)
/
2
R
i
n
g
t
o
p
Page 2
o
l
o
g
y
n
8. What is the difference between a passive and an active hub?
relationship.
Peer-to-peer relationship: All the devices share the link
equally. Primary-secondary relationship: One device
co ntrols traffic and the others must transmit through it.
10. Assume 6 devices are arranged in a mesh topology.
61)/
2=
15
Nu
m
be
r
of
po
rts
pe
r
de
vic
e=
n1=
61=
5
11. Group the OSI layers by function.
Page 5
11 nu u ni
1
Time
Guided
1. Unguided
not
Physical boundary
Transmissio
2. It is a
time?
Propagation time = distance / propagation speed
The time required for a signal or a bit
to travel f rom one point to another is called
Propagation time .
Propagation speed is the
distance, a signal or a bit travel
through a medium in one second.
18. Explain cross talk and what is needed to reduce it?
Page 8
U
N
I
T
I
I
D
A
T
A
L
I
N
K
L
A
Y
E
R
1.
from 1 to 0 or from 0 to 1.
28. Burst error: Means that 2 or more bits in the data unit
have
changed from 1 to 0 from 0 to 1.
29.
What is redundancy?
It is the error detecting mechanism, which
means a shorter group of bits or extra bits may be
app ended at the destination of each unit.
List out the available detection methods.
There are 4 types of redundancy checks are used in data communication.
31. Vertical redundancy checks (VRC).
32. L ongitudinal redundancy checks ( L RC).
33. Cyclic redundancy checks (CRC).
34. Checksum.
30.
35.
36.
37.
complement to get
the sum.
44. The sum is complemented and become the
checksum.
d) The checksum is sent with the data.
14. List out the steps followed is check sum check er side.
The receiver must follow these steps
45. The unit is divided into k section each of n
bits.
46. All sections are added together using 1's
complement to get
the sum.
47. The sum is complemented.
48. If the result is zero.
15. Write short notes on error correction.
It is the mechanism to correct the errors and it can be handled in 2 ways.
49. When an error is discov ered, the receiver
can hav e the
sender retransmit the entire data unit.
50. A receiver can use an er ror correcting coder,
which
automatically corrects certain errors.
Page 12
61. Mention the advantage and disadvantage of stop and wait f low
control.
A
d
v
a
n
t
a
g
e
:
s
i
m
p
l
i
c
i
t
y
D
i
s
a
d
v
a
n
t
a
g
e
:
Page 14
i
n
e
f
f
i
c
i
e
n
c
y
.
62. Define ARQ.
Page 15
Page 17
110.
Page 19
Th
e
f
i
v
e
c
a
t
e
g
o
r
i
e
s
Page 20
o
f
U
f
r
a
m
e
s
a
r
e
M
o
d
e
s
e
t
t
i
n
g
U
n
n
u
m
b
e
r
e
Page 21
d
e
x
c
h
a
n
g
e
D
i
s
c
o
n
n
e
c
t
i
o
n
.
I
n
i
t
i
a
l
i
z
a
t
i
o
Page 22
n
m
o
d
e
.
M
i
s
c
e
l
l
a
n
e
o
u
s
m
o
d
e
Page 23
U
N
I
T
I
I
I
N
E
T
W
O
R
K
L
A
Y
E
R
What are the network support layers and the user support layers?
Network support layers:
The network support layers are Physical layer, Data link layer and
Network layer. These deals with electrical specifications, physical connection,
transport timing and reliability.
User support layers:
The user support layers are: Session layer, Presentation layer,
Application layer. These allow interoperability among un related software
system.
113.
Other layers
Other layers
Netwo
Page 24
rk
Netwo
rk
Logica
l Link
Contro
l
Data link
Media Access Control
Physical Physical
The IEEE has subdivided the data link layer into two sub
layers:
Logical link control (LLC)
Medium access control (MAC)
LLC is non-architecture specific. The MAC sub
layer contains a number
of distinct modules ,each
carries
proprietary
information specific to
the LAN product being
used.
3. What are the functions of LLC ?
The IEEE project 802 model takes the structure
of an HDLC frame and divides it into 2 sets of
functions. One set contains the end user portion
of the HDLC frame - the logical address, control
information, and data. These functions are
handled by the IEEE 802.2 logical link control
(LLC) protocol.
4. What are the functions of MAC?
MAC sub layer resolves the contention for the
shared media. It contains synchronization, flag, flow
and error control specifications necessary to move
information from one place to another, as well as the
Page 25
Page 26
Control field
Information field
115.
What are headers and t railers and how do they get added and rem
oved?
The control data added to the beginning of a data
is called headers. The control data added to the end of a
data is called trailers. At the sendin g machine, wh en the
message passes through the layers each layer adds the
headers or trailers. At the receiving machine, each layer
removes the data meant for it and passes the rest to the
next layer.
What are the responsibilities of network layer?
The network layer is responsible
for the source-to-destination delivery of
packet across multiple network links. The
specific responsibilities of network layer
include the following:
Logical addressing.
Routing.
116.
Page 27
Define Routers.
Routers relay packets among
multiple interconnected networks. They
Route packets from one network to any o
f a number o f p otential destination
networks on internet routers operate in
the physical, data link and network layer
of OSI model.
122.
Page 28
124.
125.
126.
127.
128.
How the pack et cost referred in distance vector and link state
routing?
In distance vector routing, cost refer to hop
129.
Page 29
131.
Page 30
Gateway
23. Define IP address.
IP address is the 3-bit number for representing
a host or system in the network. One portion of the IP
address indicates a networking and the other
represents the host in a network.
24. What is Tok en Bus?
Token Bus is a physical bus that
operates as a logical ring using tokens. Here
stations are logically organized into a ring. A
token is passed among stations. If a station
wants to send data, it must wait and capture the
token. Like Ethernet, station communicates via
a common bus.
What is tok en passing?
Stations may attempt to send data multiple times before a
transmission makes it onto a link. This redundancy may
create delays of indeterminable length if the traffic is
heavy. Token ring resolves this uncertainty by requiring
that stations take turns sending data. Each station may
transmit only during its turn and may send only one frame
during each turn. The mechanism that coordinates this
rotation is called token passing.
132.
Page 32
U
N
I
T
I
V
T
R
A
N
S
P
O
R
T
L
A
Y
E
R
134.
135.
tran
spor
t
laye
r
End
-toend
deli
very
Add
ress
ing
Reli
able
deli
very
Flo
w
cont
rol
Mul
tiple
xing
136. What is the difference between network layer delivery and the
transport
layer delivery?
Network layer delivery Transport layer delivery
The network layer is responsible for
responsible for
the the source-to-destination
of the
delivery of packet
entire message.
across multiple
network links.
137.
What are the four aspects related to the reliable delivery of data?
Page 34
T
h
e
f
o
u
r
a
s
p
e
c
t
s
a
r
e
,
E
r
r
o
r
c
o
n
t
r
o
l
S
e
Page 35
q
u
e
n
c
e
c
o
n
t
r
o
l
L
o
s
s
c
o
n
t
r
o
l
D
u
p
l
i
c
a
t
i
o
n
Page 36
c
o
n
t
r
o
l
138.
139.
Page 37
p
w
a
r
d
m
u
l
t
i
p
l
e
x
i
n
g
D
o
w
n
w
a
r
d
m
u
l
t
i
p
l
e
x
i
n
Page 39
g
141.
s
a
r
e
,
C
o
n
n
e
c
t
i
o
n
s
e
r
v
i
c
e
Connectionless services
The transport layer creates the
connection between source and destination.
What are the three events involved in the
connection?
For security , the transport layer may
create a connection between the two end
ports. A connection is a single logical path
between the source and destination that is
associated with all packets in a message.
Creating a connection involves three steps:
Connection establishment
Data transfer & Connection release.
142.
Page 41
145.
146.
147.
Page 43
e
n
t
e
d
N
e
t
w
o
r
k
O
r
i
e
n
t
e
d
19. List out the user related attributes?
User related attributes are
SCR - Sustainable Cell Rate
PCR - Peak Cell Rate
MCR- Minimum Cell Rate
CVDT - Cell Variation Delay Tolerance
20. What are the network s related att ributes?
The network related attributes are,
C
e
l
l
l
o
s
s
Page 45
r
a
t
i
o
(
C
L
R
)
C
e
l
l
t
r
a
n
s
f
e
r
d
e
l
a
y
(
C
T
D
)
Page 46
C
e
l
l
d
e
l
a
y
v
a
r
i
a
t
i
o
n
(
C
D
V
)
Cell error ratio (CER)
21. What is frame?
A frame consists of one
complete cycle of time slo ts, including one or
more slot dedicated to each sending device.
22. What is interleaving?
The switch moves from device to
device at a constant rate and fixed order. This
process is called interleaving.
Page 47
data
Page 48
Pag
U
N
I
T
V
A
P
P
L
I
C
A
T
I
O
N
L
A
Y
E
R
What is the purpose of Domain Name System?
Domain Name System can map a name to an address
and conv ersely an address to name.
149.
Page 50
155.
Page 52
157.
Request L ine
Headers
A Blank L ine
Body
(
p
r
e
s
e
n
t
o
n
l
y
Page 53
i
n
s
o
m
e
m
e
s
s
a
g
e
s
)
Status L ine
Headers
A Blank L ine
Body
(
p
Page 54
r
e
s
e
n
t
o
n
l
y
i
n
s
o
m
e
m
e
s
s
a
g
e
s
)
Page 55
13 Define CGI .
CGI is a standard for communication between HTTP
servers and executable programs. It is used in crating
dynamic do cuments.
Name four factors needed for a secure network .
Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the sender's
identity and that an imposterhas not sent the message.
Integrity: The data must arrive at the receiver exactly as
it was sent. Non-Reputation: The receiver must able to
prove that a received message came from a specific
sender.
160.
162.
Page 57
Disadvantage:
If you use lar ge numbers the method to be effective.
Calculating the cipher text using the long keys tak es a lot
of time. So it is not recommended for large amounts of
text.
166.What are the adv antages &
disadvantages of secret key
encryption? Advantage:
Secret Key algorithms are efficient: it takes less time to
encrypt a message. The reason is that the key is usually
smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
167. Each pair of users must have a secret key. If N people in w orld w ant to
use this
method, there needs to be N (N-1)/2 secret keys. For
one million people to communicate, a half-billion
secret keys are needed .
168. The distribution of the keys between two parties can be difficult.
169.Define permutation.
Page 58
P
A
R
T
B
U
N
I
T
I
Data communications
171.
n
k
l
a
y
e
r
N
e
t
w
o
r
k
l
a
y
e
r
T
r
a
n
s
p
o
r
t
l
a
y
e
r
Page 60
S
e
s
s
i
o
n
l
a
y
e
r
P
r
e
s
e
n
t
a
t
i
o
n
l
a
y
e
r
A
p
p
l
i
Page 61
c
a
t
i
o
n
l
a
y
e
r
172.
g
y
T
r
e
e
t
o
p
o
l
o
g
y
B
u
s
t
o
p
o
l
o
g
y
R
i
n
g
t
o
p
o
Page 63
l
o
g
y
173.
i
t
a
n
A
r
e
a
N
e
t
w
o
r
k
(
M
A
N
)
Wide Area Netw ork(WAN)
Explain coaxial cable & fiber optics.
Coaxial cable
Coaxial cable standards
C
o
a
x
i
a
l
174.
c
a
b
Page 65
l
e
c
o
n
n
e
c
t
o
r
s
F
i
b
e
r
o
p
t
i
c
s
Propagation modes
Fiber sizes
Cable composition
Light sources for optical cable
Fiber optic conn ectors
Advantages &
disadvantages of optical
fiber
175.
C
c
o
m
p
o
n
e
n
t
S
y
n
c
h
r
o
n
i
z
a
t
i
o
n
Polar
Non return to zero(NRZ)
NRZ-L
N
R
Z
I
R
e
Page 67
t
u
r
n
t
o
z
e
r
o
B
i
p
h
a
s
e
Manchester
Page 68
Differential Manchester
Bipolar
A
l
t
e
r
n
a
t
e
M
a
r
k
I
n
v
e
r
s
i
o
n
(
A
M
I
)
B
i
p
o
l
a
Page 69
r
8
z
e
r
o
s
u
b
s
t
i
t
u
t
i
o
n
(
B
8
Z
S
)
H
i
g
h
D
e
n
s
Page 70
i
t
y
B
i
p
o
l
a
r
3
(
H
D
B
3
)
U
N
I
T
I
I
D
a
t
a
l
i
n
k
Page 71
l
a
y
e
r
176.
n
d
w
a
i
t
A
R
Q
S
l
i
d
i
n
g
w
i
n
d
o
w
A
R
Q
Go back-n
Selective-reject
178.
o
p
a
n
d
w
a
i
t
S
l
i
d
i
n
g
w
i
n
d
o
w
.
179.
o
n
o
u
s
a
l
l
o
c
a
t
i
o
n
(
S
A
)
T
a
r
g
e
t
t
o
k
e
n
r
o
t
a
Page 76
t
i
o
n
t
i
m
e
(
T
T
R
T
)
A
b
s
o
l
u
t
e
m
a
x
i
m
u
m
t
i
m
e
(
Page 77
A
M
T
)
Timers
T
o
k
e
n
r
o
t
a
t
i
o
n
t
i
m
e
r
(
T
R
T
)
T
o
k
e
n
h
o
l
d
i
n
g
Page 78
t
i
m
e
r
(
T
H
T
)
180.
g
E
l
e
c
t
r
i
c
a
l
s
p
e
c
i
f
i
c
a
t
i
o
n
F
r
a
m
e
f
o
r
m
a
t
Page 80
I
m
p
l
e
m
e
n
t
a
t
i
o
n
:
10 base 5 :Thick Ethern et
Page 81
Explain the frame format for tok en ring and tok en bus.
Access method: Token passing
P
r
i
o
r
i
t
y
a
n
d
r
e
s
e
r
v
a
t
i
o
n
T
i
m
e
l
i
m
Page 82
i
t
s
M
o
n
i
t
o
r
s
t
a
t
i
o
n
s
182.
i
o
n
C
o
n
f
i
g
u
r
a
t
i
o
n
s
:
Unbalanced configuration
Symmetrical con figuration
B
a
l
a
n
c
e
d
c
o
n
f
i
g
u
r
Page 84
a
t
i
o
n
M
o
d
e
s
o
f
c
o
m
m
u
n
i
c
a
t
i
o
n
:
Normal Response Mode(NRM)
Asynchronous Response Mode(ARM)
Asynchronous Balanced Mode(ABM)
Frames :
F
l
a
g
Page 85
f
i
e
l
d
A
d
d
r
e
s
s
f
i
e
l
d
C
o
n
t
r
o
l
f
i
e
l
d
I
n
f
o
Page 86
r
m
a
t
i
o
n
f
i
e
l
d
FCS field
UNIT III
Network layer
183.
i
r
t
u
a
l
c
i
r
c
u
i
t
a
p
p
r
o
a
c
h
Sw itched virtual circuit(SV C)
Permanent
virtual circuit(PV C)
Circuit - switched
connection versus virtual
- circuit connection
Path versus route
Dedicated v ersus shared
184.
A sample internet
3. Define routing & explain distance
vector routing and link state routing.
Distance vector routing
S
h
a
r
i
n
g
i
n
f
o
r
m
a
t
i
o
n
R
o
u
t
i
n
g
t
a
b
l
e
Page 89
g
Information sharing
Packet cost
Link state packet
Getting information about neighbors
Initialization
Link state database
185.
g
e
T
r
a
n
s
p
a
r
e
n
t
b
r
i
d
g
e
186.
Explain subnetting
Subnetting
T
h
r
e
e
l
e
v
e
l
s
o
f
Page 92
h
i
e
r
a
r
c
h
y
M
a
s
k
i
n
g
M
a
s
k
s
w
i
t
h
o
u
t
s
u
b
n
e
t
t
Page 93
i
n
g
M
a
s
k
s
w
i
t
h
s
u
b
n
e
t
t
i
n
g
F
i
n
d
i
n
g
t
h
e
Page 94
s
u
b
n
e
t
w
o
r
k
a
d
d
r
e
s
s
B
o
u
n
d
a
r
y
l
e
v
e
l
m
a
s
k
i
n
Page 95
g
N
o
n
b
o
u
n
d
a
r
y
l
e
v
e
l
m
a
s
k
i
n
g
187.
R
o
u
t
e
r
s
Routing concepts
L
e
a
s
t
c
o
s
t
r
o
u
t
i
n
g
N
o
n
a
d
a
p
t
i
v
Page 97
e
r
o
u
t
i
n
g
A
d
a
p
t
i
v
e
r
o
u
t
i
n
g
P
a
c
k
e
t
l
i
f
e
t
Page 98
i
m
e
Gateways
UNIT IV
T
ransport layer 1.
Explain the
duties of
transport layer.
Page 99
E
n
d
t
o
e
n
d
d
e
l
i
v
e
r
y
A
d
d
r
e
s
s
i
n
g
R
e
l
i
a
b
l
e
Page 100
d
e
l
i
v
e
r
y
Error control
Sequence control
Loss control
D
u
p
l
i
c
a
t
i
o
n
c
o
n
t
r
o
l
F
l
o
w
c
o
n
t
r
Page 101
o
l
M
u
l
t
i
p
l
e
x
i
n
g
188.
189.
o
c
o
l
(
U
D
P
)
S
o
u
r
c
e
p
o
r
t
a
d
d
r
e
s
s
D
e
s
t
i
n
a
t
i
Page 103
o
n
p
o
r
t
a
d
d
r
e
s
s
T
o
t
a
l
l
e
n
g
t
h
C
h
e
c
k
s
u
m
T
Page 104
r
a
n
s
m
i
s
s
i
o
n
C
o
n
t
r
o
l
P
r
o
t
o
c
o
l
(
T
C
P
)
S
o
u
r
Page 105
c
e
p
o
r
t
a
d
d
r
e
s
s
D
e
s
t
i
n
a
t
i
o
n
p
o
r
t
a
d
d
r
e
s
Page 106
s
S
e
q
u
e
n
c
e
n
u
m
b
e
r
A
c
k
n
o
w
l
e
d
g
e
m
e
n
t
n
u
m
Page 107
b
e
r
H
e
a
d
e
r
l
e
n
g
t
h
R
e
s
e
r
v
e
d
C
o
n
t
r
o
l
W
i
n
Page 108
d
o
w
s
i
z
e
C
h
e
c
k
s
u
m
U
r
g
e
n
t
p
o
i
n
t
e
r
O
p
t
i
o
Page 109
n
s
a
n
d
p
a
d
d
i
n
g
190.
o
n
s
D
i
s
c
a
r
d
i
n
g
191.
Leaky
b
u
c
k
e
t
a
l
g
o
r
i
t
h
m
L
e
a
Page 111
k
y
b
u
c
k
e
t
S
w
i
t
c
h
c
o
n
t
r
o
l
l
i
n
g
t
h
e
o
u
t
p
u
t
r
a
t
e
Page 112
F
l
o
w
c
h
a
r
t
Page 113
UNIT V
Application Layer
1. Explain the functions of SMTP.
System for sending m essages to other com puter u sers based
on e-m ail
addresses. SMTP provides m ail
exchange between users on the sam
e or different com puters.
User Agent
Mail Transfer Agent
Multipurpose Internet Mail Extensions
Post O ffice Protocol
2.
192.
193.
194.
195.
7.
Page 115