Вы находитесь на странице: 1из 14

CS-2203 B.Tech.

(Fourth Semester) Examination, 2013 Computer Science and Engineering Data Communication and Networks Time Allowed: Three hours Maximum Marks: 60 Note: Section A is compulsory. Choose appropriate answer. In section B solve any two parts from each question. All questions from section B carries equal marks. Section-A 10X2 Quest.1 Choose appropriate answer. 1.Communication between a computer and a keyboard involves ______________ transmission. A) simplex B) half-duplex C) full-duplex D) automatic 2.This was the first network. A) CSNET B) NSFNET C) ANSNET D) ARPANET 3. ARQ stands for _______. A) Automatic repeat quantization B) Automatic repeat request C) Automatic retransmission request D) Acknowledge repeat request 4.Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the ________. A) header B) trailer C) flag D) none of the above 5.In _________, when a source makes a reservation, it needs to define a flow specification. A) Integrated Services B) Differentiated Services C) Connectionless D) Connection-Oriented 6.An IPv4 address consists of _______ bits. A) 4 B) 8 C) 32 D) 64

7. In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it reaches a threshold. A) slow-start B) congestion avoidance C) congestion detection D) none of the above 8.In the _________ algorithm of TCP, the size of the congestion window increases additively until congestion is detected. A) slow-start B) congestion avoidance C) congestion detection D) none of the above 9. The _________ is a standard for specifying any kind of information on the Internet. A) URL B) ULR C) RLU D) none of the above 10.The documents in the WWW can be grouped into ______ broad categories. A) two B) three C) four D) none of the above Section-B Note: Assume data if required. Unit-I 2X4 Quest.2 (A). Explain the functionality of each layer of OSI model. Ans: OSI model has seven layers. Functionality of each layer is follows: 1.Physical Layer The physical layer defines electrical and physical specifications for devices. In particular, it defines the relationship between a device and a transmission medium, such as a copper or fiber optical cable. This includes the layout of pins, voltages, line impedance, cable specifications, signal timing, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more. 1. Physical characteristics of interfaces and media Representation of bits 2. Data rate 3. Synchronization of bits 4. Line configuration (point-to-point or multipoint) 5. Physical topology (mesh, star, ring or bus) 6. Transmission mode ( simplex, half-duplex or duplex) 2. Data Link Layer The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multi-access media, was developed independently of the ISO work in IEEE Project 802. IEEE work assumed sublayer-ing and management functions not required for WAN use. 1. Framing 2. Physical addressing 3. Flow control

4. Error control 5. Access control 3.Network Layer Source-to-destination delivery Responsible from the delivery of packets from the original source to the final destination 1. Logical addressing 2. Routing 4.Transport Layer The transport layer is responsible for the delivery of a message from one process to another. 1. Port addressing 2. Segmentation and reassembly 3. Connection control (Connection-oriented or connection-less) 4. Flow control 5. Error control 5.Session Layer: The session layer is responsible for dialog control and synchronization. 1. Dialog control 2. Synchronization (checkpoints) 6.Presentation Layer: The presentation layer is responsible for translation, compression, and encryption. 1. Translation ( EBCDIC-coded text file_ASCII-coded file) 2. Encryption and Decryption 3. Compression 7.Application Layer The application layer is responsible for providing services to the user. 1. Network virtual terminal (Remote log-in) 2. File transfer and access 3. Mail services 4. Directory services (Distributed Database) 5. Accessing the World Wide Web (B). What is ISDN. Explain the different interfaces of ISDN. Ans: Integrated Services Digital Network: Integrated services digital network provides completely digital network. By which faster data can be accessed. Here there is the mainly two types of channels are used: B-Channel(Bearer Channel): It used to transmit the information of data. Speed of this channel is 64 kbps. D-Channel(Data Channel): It used to transmit control information of the data. Speed of this channel is 16 kbps or 64 kbps.

Two interfaces are: 1.BRI: Basic Rate Interface

2.PRI: Primary Rate Interface

(C). Explain the different types of addresses which are used in the computer network.

Physical Address: Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: 07:01:02:01:2C:4B A node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). As the figure shows, the computer with physical address 10 is the sender, and the computer with physical address 87 is the receiver.

Logical Address: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there. The designers of the Internet Protocol defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address. Ex:192.168.0.2 Port Address: The protocols that primarily use ports are the Transport Layer protocols, such as the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number. The port number, added to a computer's IP address, completes the destination address for a communications session. That is, data packets are routed across the network to a specific destination IP address, and then, upon reaching the destination computer, are further routed to the specific process bound to the destination port number.

Specific Address: A uniform resource locator, abbreviated URL, also known as web address, is a specific character string that constitutes a reference to a resource. In most web browsers, the URL of a web page is displayed on top inside an address bar. An example of a typical URL would be "http://en.example.org/wiki/Main_Page". Unit-II 2X4 Quest.3 (A). Explain different design issues of the Data link layer. Ans: The data link layer has some specific design issues: 1. Providing a well-defined service interface to the network layer. 2. Dealing with transmission errors. 3. Regulating the flow of data so that slow receivers are not swamped by fast senders. To accomplish these goals, the data link layer takes the packets it gets from the network layer and encapsulates them into frames for transmission. Each frame contains a frame header, a payload field for holding the packet, and a frame trailer. The function of the data link layer is to provide services to the network layer. The principal service is transferring data from the network layer on the source machine to the network layer on the destination machine. On the source machine is an entity, call it a process, in the network layer that hands some bits to the data link layer for transmission to the destination. The job of the data link layer is to transmit the bits to the destination machine so they can be handed over to the network layer. 1.Framing To provide service to the network layer, the data link layer must use the service provided to it by the physical layer. What the physical layer does is accept a raw bit stream and attempt to deliver it to the destination. This bit stream is not guaranteed to be error free. The number of bits received may be less than, equal to, or more than the number of bits transmitted, and they may have different values. It is up to the data link layer to detect and, if necessary, correct errors. The usual approach is for the data link layer to break the bit stream up into discrete frames and compute the checksum for each frame. (Checksum algorithms will be discussed later in this

chapter.) When a frame arrives at the destination, the checksum is recomputed. If the newlycomputed checksum is different from the one contained in the frame, the data link layer knows that an error has occurred and takes steps to deal with it (e.g., discarding the bad frame and possibly also sending back an error report). 2. Error Control Having solved the problem of marking the start and end of each frame, we come to the next problem: how to make sure all frames are eventually delivered to the network layer at the destination and in the proper order. Suppose that the sender just kept outputting frames without regard to whether they were arriving properly. This might be fine for unacknowledged connectionless service, but would most certainly not be fine for reliable, connection-oriented service. The usual way to ensure reliable delivery is to provide the sender with some feedback about what is happening at the other end of the line. Typically, the protocol calls for the receiver to send back special control frames bearing positive or negative acknowledgements about the incoming frames. If the sender receives a positive acknowledgement about a frame, it knows the frame has arrived safely. On the other hand, a negative acknowledgement means that something has gone wrong, and the frame must be transmitted again. 3. Flow Control Another important design issue that occurs in the data link layer (and higher layers as well) is what to do with a sender that systematically wants to transmit frames faster than the receiver can accept them. This situation can easily occur when the sender is running on a fast (or lightly loaded) computer and the receiver is running on a slow (or heavily loaded) machine. The sender keeps pumping the frames out at a high rate until the receiver is completely swamped. Even if the transmission is error free, at a certain point the receiver will simply be unable to handle the frames as they arrive and will start to lose some. 4.Access Control The channel access control mechanisms provided by the MAC layer are also known as a multiple access protocol. This makes it possible for several stations connected to the same physical medium to share it. Examples of shared physical media are bus networks, ring networks, hub networks, wireless networks and half-duplex point-to-point links. The multiple access protocol may detect or avoid data packet collisions if a packet mode contention based channel access method is used, or reserve resources to establish a logical channel if a circuit switched or channelization based channel access method is used. The channel access control mechanism relies on a physical layer multiplex scheme. 5. Physical Addressing The local network addresses used in IEEE 802 networks and FDDI networks are called MAC addresses; they are based on the addressing scheme used in early Ethernet implementations. A MAC address is a unique serial number. Once a MAC address has been assigned to a particular network interface (typically at time of manufacture), that device should be uniquely identifiable amongst all other network devices in the world. This guarantees that each device in a network will have a different MAC address (analogous to a street address). This makes it possible for data packets to be delivered to a destination within a subnetwork, i.e. hosts interconnected by some combination of repeaters, hubs, bridges and switches, but not by network layer routers. (B). Define flow control in data link layer. Explain Go-back-N ARQ protocol. Data link laye is what to do with a sender that systematically wants to transmit frames faster than the receiver can accept them. This situation can easily occur when the sender is running on a fast (or lightly loaded) computer and the receiver is running on a slow (or heavily loaded) machine. The sender keeps pumping the frames out at a high rate until the receiver is completely swamped.

Even if the transmission is error free, at a certain point the receiver will simply be unable to handle the frames as they arrive and will start to lose some.

Go-Back-N Protocol: In the Go-Back-N Protocol, instead of sending single frame , multiple frames are tarmsmitted at a time for perfect utilization of bandwidth. In this protocol the sequence numbers are modulo 2m, where m is the size of the sequence number field in bits.

The sender window can slide one or more slots when a valid acknowledgment arrives.

In Go-Back-N ARQ, the size of the send window must be less than 2m; the size of the receiver
window is always 1.

(C). A slotted ALOHA network transmits 200 bits frame using shared channel with 200 kbps bandwidth. Find the throughput if the system produces 500 frames per second. Ans: If the system creates 500 frames per second, this is (1/2) frame per millisecond. The load is (1/2). In this case S = G eG or S = 0.303 (30.3 percent). This means that the throughput is 500 0.0303 = 151. Only 151 frames out of 500 will probably survive.

Unit-III 2X4 Quest.4 (A). In IPv4 datagram, the M bit is 0, the value of header length 5, the value of total length is 200, and the offset value is 200. What is number of the first byte and number of the last byte in this datagram. Is this last fragment, the first fragment or middle? Ans: The first byte number is 200 8 = 1600. The total length is 200 bytes, and the header length is 20 bytes (5 4), which means that there are 180 bytes in this datagram. If the first byte number is 1600, the last byte number must be1779. The M bit is 0 so, this last fragment. (B). Define routing in network. Explain conflict between fairness and optimality. Ans: Routing: The main function of the network layer is routing packets from the source machine to the destination machine. In most subnets, packets will require multiple hops to make the journey. The only notable exception is for broadcast networks, but even here routing is an issue if the source and destination are not on the same network. The algorithms that choose the routes and the data structures that they use are a major area of network layer design. The routing algorithm is that part of the network layer software responsible for deciding which output line an incoming packet should be transmitted on. Stability is also an important goal for the routing algorithm. There exist routing algorithms that never converge to equilibrium, no matter how long they run. A stable algorithm reaches equilibrium and stays there. Fairness and optimality may sound obvioussurely no reasonable person would oppose thembut as it turns out, they are often contradictory goals. As a simple example of this conflict. Suppose that there is enough traffic between A and A', between B and B', and between C and C' to saturate the horizontal links. To maximize the total flow, the X to X' traffic should be shut off altogether. Unfortunately, X and X' may not see it that way. Evidently, some compromise between global efficiency and fairness to individual connections is needed.

Conflict between fairness and optimality Before we can even attempt to find trade-offs between fairness and optimality, we must decide what it is we seek to optimize. Minimizing mean packet delay is an obvious candidate, but so is maximizing total network throughput. Furthermore, these two goals are also in conflict, since operating any queueing system near capacity implies a long queueing delay. As a compromise, many networks attempt to minimize the number of hops a packet must make, because reducing the number of hops tends to improve the delay and also reduce the amount of bandwidth consumed, which tends to improve the throughput as well.

(C). Explain the internetworking challenges in the network. Ans: Internetworking challenges in the network: To construct the networks we face various challenges. We are describing Following challenges: 1.How Networks Differ Networks can differ in many ways. Some of the differences, such as different modulation techniques or frame formats, are in the physical and data link layers, These differences will not concern us here. It is papering over these differences that makes internetworking more difficult than operating within a single network. 2.Tunneling Handling the general case of making two different networks interwork is exceedingly difficult. However, there is a common special case that is manageable. This case is where the source and destination hosts are on the same type of network, but there is a different network in between. As an example, think of an international bank with a TCP/IP-based Ethernet in Paris, a TCP/IP-based Ethernet in London, and a non-IP wide area network. The solution to this problem is a technique called tunneling. To send an IP packet to host 2, host 1 constructs the packet containing the IP address of host 2, inserts it into an Ethernet frame addressed to the Paris multiprotocol router, and puts it on the Ethernet. When the multiprotocol router gets the frame, it removes the IP packet, inserts it in the payload field of the WAN network layer packet, and addresses the latter to the WAN address of the London multiprotocol router. When it gets there, the London router removes the IP packet and sends it to host 2 inside an Ethernet frame. 3.How Networks Can Be Connected Networks can be interconnected by different devices. In the physical layer, networks can be connected by repeaters or hubs, which just move the bits from one network to an identical network. These are mostly analog devices and do not understand anything about digital protocols. 4.Internetwork Routing Routing through an internetwork is similar to routing within a single subnet, but with some added complications. Consider, for example, the internetwork in which five networks are connected by six (possibly multiprotocol) routers. Making a graph model of this situation is complicated by the fact that every router can directly access (i.e., send packets to) every other router connected to any network to which it is connected. 5.Fragmentation Each network imposes some maximum size on its packets. These limits have various causes, among them: 1. Hardware (e.g., the size of an Ethernet frame). 2. Operating system (e.g., all buffers are 512 bytes). 3. Protocols (e.g., the number of bits in the packet length field). 4. Compliance with some (inter)national standard. 5. Desire to reduce error-induced retransmissions to some level.

6. Desire to prevent one packet from occupying the channel too long.

Unit-IV Quest.5 (A). Explain different functions of transport layer. Ans:1.Segmentaion and Reassembly 2.Connnection Control 3.Flow Control 4.Error Control 5.Service Point Addressing

2X4

(B). Explain different types of timers which are used in Transport layer. Ans: 1.Retranmission Timer:The retransmission timer manages retransmission timeouts (RTOs), which occur when a preset interval between the sending of a datagram and the returning acknowledgment is exceeded. The value of the timeout tends to vary, depending on the network type, to compensate for speed differences. If the timer expires, the datagram is retransmitted with an adjusted RTO, which is usually increased exponentially to a maximum preset limit. If the maximum limit is exceeded, connection failure is assumed and error messages are passed back to the upper-layer application. Retrnasmission Timer=2*Round Trip Time(RTT) RTT=2*Propoagation Delay 2.Persistance Timer:The persistence timer handles a fairly rare occurrence. It is conceivable that a receive window will have a value of 0, causing the sending machine to pause transmission. The message to restart sending may be lost, causing an infinite delay. The persistence timer waits a preset time and then sends a 1-byte segment at predetermined intervals to ensure that the receiving machine is still clogged. 3.Keep Alive Timer:Both the keep-alive timer and the idle timer were added to the TCP specifications after their original definition. The keep-alive timer sends an empty packet at regular intervals to ensure that the connection to the other machine is still active. If no response has been received after sending the message, by the time the idle timer has expired, the connection is assumed to be broken. The keep-alive timer value is usually set by an application, with values ranging from 5 to 45 seconds. The idle timer is usually set to 360 seconds. 4.Time Waited Timer:After a TCP connection is closed, it is possible for datagrams that are still making their way through the network to attempt to access the closed port. The quiet timer is intended to prevent the justclosed port from reopening again quickly and receiving these last datagrams. C). What is socket? Explain different types of port number with their ranges. Ans: Socket= IP Address + Port Address A socket address is the combination of an IP address and a port number, much like one end of a telephone connection is the combination of a phone number and a particular extension. Based on this address, internet sockets deliver incoming data packets to the appropriate application process or thread.

1.Well known Port:0-1023 :- The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely used types of network services. 2.Resreved Port: 1024-49151 :- The range of port numbers from 1024 to 49151 are the registered ports. They are assigned by IANA for specific service upon application by a requesting entity. On most systems, registered ports can be used by ordinary users 3.Dyanamic Port:49152-65535 :- The range 4915265535 (215+214 to 216-1) - above the registered ports - contains dynamic or private ports that cannot be registered with IANA.[121] This range is used for custom or temporary purposes and for automatic allocation of ephemeral ports. Unit-V 2X4 Quest.6 Quest. 1 Explain different functions of application layer. Ans: 1.Network Terminal:It works as interface between user and By using the network software user can interact with the network. 2.Remote Login:User can access the remote system by using various application layer software. 3.File Access and Management:-Fila can be accessed and managed by application layer. 4.Directory Services:It maintains the directory of file. 5.Email Services: Application layer provide the functionality of mail service. By using this user can send and recieve the mail. Quest. 2 Explain domain name space in DNS protocol. Ans: Domain Name Type: 1. Flat:- this is continuous sequence of character is given as name. Ex.departmentofcse 2. Hierarchical:-Name is given which is in the form of hierarchical structure. Ex. ggu.ac.in Domain Name Space: 1. Generic Domain:On the basis of behavior of organization mapping has done.

2. Country Domain:On the basis of country name mapping has done.

3. Inverse Domain :It is just opposite, mapping from ip address to name.

Quest. 3 What is World Wide Web? Explain it with proper diagram. Ans. WWW= World Wide Web The World Wide Web is an architectural framework for accessing linked documents spread out over millions of machines all over the Internet. In 10 years, it went from being a way to distribute high-energy physics data to the application that millions of people think of as being ''The Internet.''

Its enormous popularity stems from the fact that it has a colorful graphical interface that is easy for beginners to use, and it provides an enormous wealth of information on almost every conceivable subject, from aardvarks to Zulus. The Web (also known as WWW) began in 1989 at CERN, the European center for nuclear research. CERN has several accelerators at which large teams of scientists from the participating European countries carry out research in particle physics. These teams often have members from half a dozen or more countries. Most experiments are highly complex and require years of advance planning and equipment construction. The Web grew out of the need to have these large teams of internationally dispersed researchers collaborate using a constantly changing collection of reports, blueprints, drawings, photos, and other documents.

Server SITE-1

Server SITE-2

Server SITE-3

Server SITE-4 Distributed System Mechanism

Client Server Mechanism: Client-1

Client-2 Server Client-n

From the users' point of view, the Web consists of a vast, worldwide collection of documents or Web pages, often just called pages for short. Each page may contain links to other pages anywhere in the world. Users can follow a link by clicking on it, which then takes them to the page pointed to. This process can be repeated indefinitely. The idea of having one page point to another, now called hypertext, was invented by a visionary M.I.T. professor of electrical engineering, Vannevar Bush, in 1945, long before the Internet was invented. Pages are viewed with a program called a browser, of which Internet Explorer and Netscape Navigator are two popular ones. The browser fetches the page requested, interprets the text and formatting commands on it, and displays the page, properly formatted, on the screen.

Вам также может понравиться