13
1 Q1) Match the following to one or more layers of the OSI model.[3M] Ans: i. Transmission of bit stream across physical medium- Physical Layer ii. Defines frames- Data Link Layer iii. Error Correction & retransmission- Data Link Layer & Transport Layer iv. Reliable process-to-process delivery- Transport layer v. Route selection – Network Layer vi. Provides user services such as e-mail and file transfer- Application Layer Q2) Define FHSS and Explain how it achieves bandwidth spreading [5M] Ans: Frequency Hopping Spread Spectrum (FHSS): Signal is broadcast over seemingly random series of radio frequencies Signal hops from frequency to frequency at fixed intervals Receiver, hopping between frequencies in synchronization with transmitter, picks up message Fig: FHSS Working: Frequency hopping spread spectrum is a Spread Spectrum modulation technique in which the data signal is transmitted over different frequencies. The data signal is hopped from one frequency to another frequency for a specific interval of time. Class: TE Computer Academic Year: 2018-19 SEM:- I Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30 Date: 11/8/2018 Paper Solution

Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

1

Q1) Match the following to one or more layers of the OSI model.[3M]

Ans:

i. Transmission of bit stream across physical medium- Physical Layer

ii. Defines frames- Data Link Layer

iii. Error Correction & retransmission- Data Link Layer & Transport Layer

iv. Reliable process-to-process delivery- Transport layer

v. Route selection – Network Layer

vi. Provides user services such as e-mail and file transfer- Application Layer

Q2) Define FHSS and Explain how it achieves bandwidth spreading [5M]

Ans:

Frequency Hopping Spread Spectrum (FHSS):

Signal is broadcast over seemingly random series of radio frequencies

Signal hops from frequency to frequency at fixed intervals

Receiver, hopping between frequencies in synchronization with transmitter, picks up message

Fig: FHSS

Working:

Frequency hopping spread spectrum is a Spread Spectrum modulation technique in which the data

signal is transmitted over different frequencies. The data signal is hopped from one frequency to

another frequency for a specific interval of time.

Class: TE Computer Academic Year: 2018-19 SEM:- I

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 2: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

2

Pseudo random code generator generates a random number every time which is used to pick a

frequency from frequency table.

Then this frequency is given to Frequency synthesizer.

Modulator modulates original signal using the selected frequency which results to spread signal.

Advantages

Efficient utilization of available bandwidth

Eavesdropper hear only unintelligible blips

Attempts to jam signal on one frequency succeed only at knocking out a few bits

Q1 c) What is three major classes of guided media [2M]

Ans

Three major classes of guided media are as below.

Q 2a) what is difference between a port address, a logical address and a physical address [2M]

Ans:

Logical Address: An IP address of the system is called logical address. This address is the combination of Net ID and Host ID. This address is used by network layer to identify a particular network (source to destination) among the networks. This address can be changed by changing the host position on the network. So it is called logical address.

Guided Media

Twisted Pair Cable

STP

UTP

Coaxial Cable

Fiber Optic Cable

Class: TE Computers Academic Year: 2018-19 SEM:- I

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 3: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

3

Physical address: Each system having a NIC(Network Interface Card) through which two systems physically connected with each other with cables. The address of the NIC is called Physical address or mac address. This is specified by the manufacturer company of the card. This address is used by data link layer.

Port Address: There are many application running on the computer. Each application run with a port no.(logically) on the computer. This port no. for application is decided by the Kernal of the OS. This port no. is called port address.

Q2b)For the bit sequence 10000101111 draw the waveform for [4M]

i. Manchester Encoding

ii. Differential Manchester encoding

Ans: Manchester Encoding

1 0 0 0 0 1 0 1 1 1 1

i. Differential Manchester encoding

1 0 0 0 0 1 0 1 1 1 1

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30ate: 11/8/2018 Paper Solution

Page 4: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

4

Q2 c) Explain in short, various networking devices Bridge,Switch,Router and Access Point[4M]

Ans:

Network Devices

Working

Routers Works at Network Layer They process logical addressing information in the Network header of a packet such as IP Addresses.

Functionality: To connect different network segments. To connect different network protocols such as IP and IPX. To Provide shortest path between sender and receiver.

Bridges Works at Data Link Layer

Functionality: A bridge is a computer networking device that builds the connection with

the other bridge networks which use the same protocol. It works at the Data Link layer of the OSI Model and connects the different

networks together and develops communication between them. It connects two local-area networks; two physical LANs into larger logical

LAN or two segments of the same LAN that use the same protocol. Types of Bridges:

1. Transparent Bridge 2. Source Route Bridge 3. Translational Bridge

Switches Works at Data Link Layer Functionality:

Switches are connected to them through twisted pair cabling. Switch transfers data only to that port which is connected to the

destination device.

Types of Switches: Cut-through transmission: It allows the packets to be forwarded as soon

as they are received. Store and forward: In this switching environment the entire packet are

received and ‘checked’ before being forwarded ahead. Fragment Free: In a fragment free switching environment, a greater part

of the packet is examined so that the switch can determine whether the packet has been caught up in a collision.

Access Point Functionality: Wireless access point (WAP), or more generally just access point (AP), is a

networking hardware device that allows a Wi-Fi device to connect to a wired network.

The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.

An AP is differentiated from a hotspot, which is the physical location where Wi-Fi access to a WLAN is available.

Class: TE Computers Academic Year: 2018-19 SEM:- I

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 5: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

5

Q3 a) Compare & contrast the Go-back-N ARQ protocol with Selective Repeat ARQ. [4M]

Ans:

Basis for Comparison

Go-Back-N Selective Repeat

Basic Retransmits all the frames that sent after the frame which suspects to be damaged or lost.

Retransmits only those frames that are suspected to lost or damaged.

Bandwidth Utilization

If error rate is high, it wastes a lot of bandwidth.

Comparatively less bandwidth is wasted in retransmitting.

Complexity Less complicated. More complex Window size N-1 <= (N+1)/2

Sorting Sorting is not required Required Storing Receiver do not store the frames received

after the damaged frame until the damaged frame is retransmitted.

Receiver stores the frames received after the damaged frame in the buffer until the damaged frame is replaced.

ACK Numbers NAK number refer to the next expected frame number.

NAK number refer to the frame lost.

Q 3b) Explain PPP in detail. [4M]

Ans: PPP provides several services:

PPP defines the format of the frame to be exchanged between devices.

PPP defines how two devices can negotiate the establishment of the link and the exchange of data.

PPP defines how network layer data are encapsulated in the data link frame.

PPP defines how two devices can authenticate each other.

PPP provides multiple network layer services supporting a variety of network layer protocols.

PPP provides connections over multiple links.

PPP provides network address configuration. This is particularly useful when a home user needs a

temporary network address to connect to the Internet.

Framing

PPP is a byte-oriented protocol. Framing is done according to the discussion of byte-oriented protocols at

the beginning of this semester.

Frame Format

Fig: PPP Frame Format

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 6: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

6

Flag: A PPP frame starts and ends with a 1-byte flag with the bit pattern 01111110. Although this

pattern is the same as that used in HDLC, there is a big difference. PPP is a byte-oriented protocol;

HDLC is a bit-oriented protocol. The flag is treated as a byte, as we will explain later.

Address: The address field in this protocol is a constant value and set to 11111111 (broadcast

address). During negotiation, the two parties may agree to omit this byte.

Control: This field is set to the constant value 11000000 (imitating unnumbered frames in HDLC).

As we will discuss later, PPP does not provide any flow control.

Protocol: The protocol field defines what is being carried in the data field: either user data or other

information. This field is by default 2 bytes long, but the two parties can agree to use only 1 byte.

Payload field: This field carries either the user data or other information.

FCS: The frame check sequence (FCS) is simply a 2-byte or 4-byte.

Q3c) what are various design issues of data link layer. [2]

Ans:

Various design issues of data link layer are:

1. Services Provided to the Network Layer : A well-defined serve interface in the network layer. The principle service is transferring data from the network layer on source machine to the network layer on destination machine.

2. Frameing : The source machine send data in blocks called frames to be the destination machine. The starting and ending of each frame should be recognized by the destination machine.

3. Flow Control : The source machine must not be send data frames at a rate faster than the destination machines must be can accepted them.

4. Error Control : The errors mode in bits during transmission from source to destination machines must be detected and corrected.

5. Addressing: On a multipoint line, such as many machine connected together (LAN), the identity of the individual machine must be specified while transmitting the data frames.

Q4a) Explain the working of CRC using the following. Example (Show the complete steps of

division)[4M]

Data bit: 1101110110

Generator Polynomial: x3+x+1

Write the redundant bits that will be sent along with the data bits.Suppose the 2nd bit from the left is

inverted during transmission. Show that error is detected at the receiver’s end.

Ans:

Data word-1101110110 Divisor: x3+x+1-> 1011

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 7: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

7

Sender Side

Augmented bit: no of divisor bits-1= 4-1=3. Append 3 zeros at the end of data word.

______________________________________________________

1011) 1101110110000

1011 ______________ 1101 1011 _____________ 1101

1011

_______________

1100

1011

_______________ 1111

1011

______________ 1001

1011

_____________ 0100

0000

_____________ 1000

1011

___________ 0110

0000

_______________ 1100

1011

_____________ 111 Reminder

Code word= Data word + Remainder(Redundant bits)

Code word= 1101110110111

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 8: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

8

Receiver Side

Codeword received with 2nd bit from left is inverted= 1001110110111 If remainder is non-zero it indicated there is error ______________________________________________________

1011) 1001110110111

1011 ______________ 0101 0000 _____________ 1011

1011

_______________

0000

0000

_______________ 0001

0000

______________ 0011

0000

_____________ 0110

0000

_____________ 1101

1011

___________ 1101

1011

_______________ 1101

1011

_____________ 110 Reminder

As reminder is non-zero it indicates there are errors in received data Q 4b) Explain control field of HDLC w.r.t. I-frame, U-frame and S-frame. [6M] Ans:

There are three frame formats in HDLC: I-frame,S-frame and U-frame. Their control fields differs with each

other.

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 9: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

9

Control field format for the different frame types

Control Field for I-Frames:

I-frames are designed to carry user data from the network layer. In addition, they can include flow and error

control information (piggybacking). The subfields in the control field are used to define these functions.

1. The first bit defines the type. If the first bit of the control field is 0, this means the frame is an I-frame.

2. The next 3 bits, called N(S), define the sequence number of the frame. Note that with 3 bits, we can

define a sequence number between 0 and 7

3. The last 3 bits, called N(R), correspond to the acknowledgment number when piggybacking is used.

4. The single bit between N(S) and N(R) is called the P/F bit. The P/F field is a single bit with a dual

purpose. It has meaning only when it is set (bit = 1) and can mean poll or final. It means poll when the

frame is sent by a primary station to a secondary (when the address field contains the address of the

receiver). It means final when the frame is sent by a secondary to a primary (when the address field

contains the address of the sender).

Control Field for S-Frames:

Supervisory frames are used for flow and error control .

1. If the first 2 bits of the control field is 10, this means the frame is an S-frame.

2. The last 3 bits, called N(R), corresponds to the acknowledgment number (ACK) or negative

acknowledgment number (NAK) depending on the type of S-frame.

3. The 2 bits called code is used to define the type of S-frame itself. With 2 bits, we can have four

types of S-frames, as described below:

Receive ready (RR),. Receive not ready (RNR),. Reject (REJ), Selective reject (SREJ)

Control Field for U-Frames:

Unnumbered frames are used to exchange session management and control information between

connected devices. Unlike S-frames, U-frames contain an information field, but one used for system

management information, not user data. U-frame codes are divided into two sections: a 2-bit prefix before

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 10: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

10

the P/F bit and a 3-bit suffix after the P/F bit. Together, these two segments (5 bits) can be used to create up

to 32 different types of U-frames.

Q5 a) Measurement of a slotted ALOHA channel with an infinite number of users, show that 10 percent of the slots are idle: [5M]

i. What is Channel load? ii. What is throughput iii. Is the channel underload or overload?

Ans:

Measurement of a slotted ALOHA channel with an infinite number of users shown that 10 percent of

the slots are idle.

(a) What is the channel load, G?

Ans: When a slot is idle, there is 0 frame generated in that frame time. Therefore Pr[0]=0.1.

Pr[0]=e-G=0.1; -G=ln(0.1); G=2.303.

(b) What is the throughput?

Ans: S=G*e-G=2.303*0.1=0.2303.

(c) Is the channel underloaded or overloaded?

Ans: When G=1, the slotted Aloha obtains the optimal throughput. G>1, we have too many generated

frame in a slot. It is an overloaded situation. Here we have G=2.303; S=0.2303<Smax=0.368. G>S.

Therefore the channel is overloaded.

Q5 b) Explain 802.3 MAC frame format. [3M]

Ans:

1. Preamble – 8 bytes

Start of Frame Delimiter (802.3).

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 11: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

11

2. Two addresses each 6 bytes – destination + source

First bit of the destination address is 0 for ordinary addresses and 1 for group addresses.

3. Type or Length field.

Depending whether the frame is Ethernet or IEEE 802.3

Ethernet uses a Type field to tell the receiver what to do with the frame.

4. Data Field

Up to 1500 bytes.

Q5 c) Draw flowchart for CSMA/CA [2M]

Ans:

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 12: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

12

Q6a) Explain 802.11 wireless LAN frame format [4M]

Ans:

Protocol Version: zero for 802.11 standard

Type= frame type: data, management, control . Subtype = frame sub-type:

ToDS: When bit is set indicate that destination frame is for DS

FromDS: When bit is set indicate frame coming from DS

Retry: Set in case of retransmission frame

More fragments: Set when frame is followed by other fragment

Power Management bit set when station go Power Save mode (PS)

More Data: When set means that AP have more buffered data for a station in Power Save mode

WEP:When set indicate that in the Frame Body field there are datas need to processed by WEP

algorithm.

Order:When set indicate restrictions for transmission

Q6 b) A Slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-kbps

bandwidth. Find the throughput if the system(all stations together) produces[4M]

i. 1000 frames per second

ii. 500 frames per second

Ans:

The throughput for pure ALOHA is S = G x e-2G

Transmission time of frame = 200 bits / 200 kbps = 1ms

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution

Page 13: Class: TE Computer Academic Year: 2018-19 SEM:- I Subject

Class: TE Computers Academic Year: 2018-19 SEM:- I

13

i. Now, system as taken altogether produces 1000 frames per sec i.e , 1 frame per ms which is

double the load factor of transmission. Now, as load factor G = 1. In this case S = G x e-G or S

=0.368(36.8percent).This means that the throughput is 1000 × 0.368 = 368 frames.

ii. Now, system as taken altogether produces 500 frames per sec i.e , 1/2 frame per ms which

is load factor of transmission. Now, as load factor G = 1/2 , so S= G x e-G =0.303(30.3

%) .This means that the throughput is 500 × 0.303 = 151 frames.

Q6c) What are various common Fast Ethernet implementations?[2M]

Ans:

Subject : Computer Networks Exam: SPPU Aug INSEM Marks:30Date: 11/8/2018 Paper Solution