Академический Документы
Профессиональный Документы
Культура Документы
1)a) What do you mean by data rate and signal rate? An analog signal
has a bit rate of 16 kbps and a baud rate of 1000 baud. How many
data element are carried by each signal element? How many signal
element do we need?
Ans: Data rate: The data rate defines the number of data elements
(bits) sent in Is. The unit is bits per second (bps).
Signal Rate: The signal rate is the number of signal elements sent in Is.
The unit is the baud.
The data rate is sometimes called the bit rate; the signal rate is
sometimes called the pulse rate, the modulation rate, or the baud rate.
One goal in data communications is to increase the data rate while
decreasing the signal rate. Increasing the data rate increases the speed
of transmission; decreasing the signal rate decreases the bandwidth
requirement.
We can formulate the relationship between data rate and signal rate as
S =c x N x 1/r baud
where N is the data rate (bps); c is the case factor, which varies for each
case; S is the number of signal elements; and r is the previously defined
factor.
Given, S = 1000, N =16 kbps = 16000 bps, and r and L are unknown. We
find first the value of r and then the value of L
S = N x 1/r
Or, r = N/S = 16000/1000 =16 bps/baud
r = log2L
1)b) Briefly describe the binary frequency shift keying (BFSK) with
necessary figure. We have an available bandwidth of 100 kHz which
spans from 200 to 300 kHz. What should be the carrier frequency and
the bit rate if we modulated our data by using FSK with d=1?
One way to think about binary FSK (or BFSK) is to consider two carrier
frequencies. In Figure 5.6, we have selected two carrier frequencies, f1
and f2. We use the first carrier if the data element is 0; we use the
second if the data element is 1. However, note that this is an unrealistic
example used only for demonstration purposes. Normally the carrier
frequencies are very high, and the difference between them is very
small.
As Figure 5.6 shows, the middle of one bandwidth is f1 and the middle
of the other is f2. Both f1 and f2 are Δf
apart from the midpoint between the two bands. The difference
between the two frequencies is 2 Δf Bandwidth for BFSK Figure 5.6 also
shows the bandwidth of FSK. Again the carrier signals are only simple
sine waves, but the modulation creates a nonperiodic composite signal
with continuous frequencies. We can think of FSK as two ASK signals,
each with its own carrier frequency Cil or f2). If the difference between
the two frequencies is 2 Δf, then the required bandwidth is
B=(l+d)xS+2 Δf
Amplitude Modulation
Ans:
Ans:
2)d) Distinguish between synchronous TDM and statistical TDM
Ans:
The simplest PSK is binary PSK, in which we have only two signal
elements, one with a phase of 0°, and the other with a phase of 180°.
Figure 5.9 gives a conceptual view of PSK. Binary PSK is as simple as
binary ASK with one big advantage-it is less
3)b) You need to send data 2 bits at a time at a bit rate of 4Mbps. The
carrier frequency is 10 MHz. Calculate the number of levels (Different
frequencies),The baud rates, and the bandwidth.
Ans: We can have L =22 =4. The baud rate is S =4Mbps/2 =2000 Mbaud.
This means that the carrier frequencies must be 2 MHz apart (2 Δf =2
MHz). The bandwidth is B =4 x 2000 =8000.
3)c) Describe the setup phase of virtual circuit network with necessary
figure.
Setup Phase In the setup phase, a switch creates an entry for a virtual
circuit. For example, suppose source A needs to create a virtual circuit
to B. Two steps are required: the setup request and the
acknowledgment.
Setup Request A setup request frame is sent from the source to the
destination. Figure 8.14 shows the process. a. Source A sends a setup
frame to switch 1. b. Switch 1 receives the setup request frame. It
knows that a frame going from A to B goes out through port 3. How the
switch has obtained this information is a point covered in future
chapters. The switch, in the setup phase, acts as a packet switch; it has
a routing table which is different from the switching table. For the
moment, assume that it knows the output port. The switch creates an
entry in its table for this virtual circuit, but it is only able to fill three of
the four columns. The switch assigns the incoming port (1) and chooses
an available incoming VCI (14) and the outgoing port (3). It does not yet
know the outgoing VCI, which will be found during the
acknowledgment step. The switch then forwards the frame through
port 3 to switch 2. c. Switch 2 receives the setup request frame. The
same events happen here as at switch 1; three columns of the table are
completed: in this case, incoming port (l), incoming VCI (66), and
outgoing port (2). d. Switch 3 receives the setup request frame. Again,
three columns are completed: incoming port (2), incoming VCI (22), and
outgoing port (3). e. Destination B receives the setup frame, and if it is
ready to receive frames from A, it assigns a VCI to the incoming frames
that come from A, in this case 77. This VCI lets the destination know
that the frames come from A, and not other sources. Acknowledgment
A special frame, called the acknowledgment frame, completes the
entries in the switching tables.
Ans: Error
A condition when the receiver’s information does not matches with the
sender’s information. During transmission, digital signals suffer from
noise that can introduce errors in the binary bits travelling from sender
to receiver. That means a 0 bit may change to 1 or a 1 bit may change
to 0.
i) d(010,011) = 1
ii) d(10101,11010) = 4
4)c) How CRC checker know that the receiver data unit is undamaged?
Show the conversion “data word to codeword” in CRC encoder.
A remainder indicates that the data unit has been damaged in transit
and therefore must be rejected.
Encoder
Let us take a closer look at the encoder. The encoder takes the
dataword and augments it with n - k number of as. It then divides the
augmented dataword by the divisor, as shown in Figure 10.15
The process of modulo-2 binary division is the same as the familiar
division process we use for decimal numbers. However, as mentioned
at the beginning of the chapter, in this case addition and subtraction
are the same. We use the XOR operation to do both. As in decimal
division, the process is done step by step. In each step, a copy of the
divisor is XORed with the 4 bits of the dividend. The result of the XOR
operation (remainder) is 3 bits (in this case), which is used for the next
step after 1 extra bit is pulled down to make it 4 bits long. There is one
important point we need to remember in this type of division. If the
leftmost bit of the dividend (or the part used in each step) is 0, the step
cannot use the regular divisor; we need to use an all-Os divisor. When
there are no bits left to pull down, we have a result. The 3-bit
remainder forms the check bits (r2' rl' and ro). They are appended to
the dataword to create the codeword.
4)d) Why window size is half of sequence number in selective repeat
ARQ? Briefly describe Go-Back-N windowing protocol with proper
figure.
If the windows size is greater than half the sequence number space,
then if an ACK is lost, the sender may send new packets that the
receiver believes are retransmissions.
For example, if our sequence number range is 0-3 and the window size
is 3, this situation can occur.
A -> 0 -> B
A -> 1 -> B
A -> 2 -> B
A -> 1 -> B
A -> 2 -> B
After the lost packet, B now expects the next packets to have sequence
numbers 3, 0, and 1.
What Is Multicast?
What Is Broadcast?
Multicast vs Unicast
The basic difference is that, in unicast, there is only one sender and one
receiver, while there is a single sender but multiple receivers in
multicast. When we want to send the message to a number of people,
we’d better choose multicast transmission since it can utilize the
bandwidth more efficiently.
Multicast vs Broadcast
Unicast vs Broadcast
The process of data transmission is different. Unicast only sends the
data to one receiver, but broadcast sends the same data to all receivers
connected in one LAN. Moreover, if you want to share some private or
unique information with another person, you must use unicast network
but not the broadcast.
Utilized
Bandwidth Wasted Wasted
efficiently
Group
No Yes No
management
From the table, we can see that multicast is the most efficient method
for data transmitting. To meet the market demand, almost all FS
network switches have multicast function.
Ans:
ESS BSS
ESS has 2 or more access point and BSS has only one access point to
Support mobility between AP's by using connect wireless node, so not Support
mobile IP mobility
More users than the Basic Service Set BSS,is the smallest building block of a
(BSS) WLAN
5)d) What is the hidden station problem? How do you solve it?
Ans:
Hidden Station:
Hidden terminal problem occurs when two nodes that are outside
each other’s range performs simultaneous transmission to a node
that is within the range of each of them resulting in a collision.
That means the data from both parties A and C will be lost during
the collision.
Hidden nodes mean increased probability of collision at receiver
end.
http://www.ques10.com/p/19445/explain-in-short-how-hidden-
station-problem-is-avo/
Ans: Basic Service Set: IEEE 802.11 defines the basic service set (BSS) as
the building block of a wireless LAN. A basic service set is made of
stationary or mobile wireless stations and an optional central base
station, known as the access point (AP).
Radio Layer
• The radio layer moves data from master to slave or vice versa.
• It is a low power system that uses 2.4 GHz ISM band in a range of 10
meters.
• Bluetooth hops 1600 times per second, i.e. each device changes its
modulation frequency 1600 times per second.
• In order to change bits into a signal, it uses a version of FSK called
GFSK i.e. FSK with Gaussian bandwidth filtering.
Baseband Layer
• Master and slave stations communicate with each other using time
slots.
• The master in each piconet defines the time slot of 625 µsec.
• If the piconet has only no slave; the master uses even numbered slots
(0, 2, 4, ...) and the slave uses odd-numbered slots (1, 3, 5, .... ). Both
master and slave communicate in half duplex mode. In slot 0, master
sends & secondary receives; in slot 1, secondary sends and primary
receives.
• If piconet has more than one slave, the master uses even numbered
slots. The slave sends in the next odd-numbered slot if the packet in the
previous slot was addressed to it.
• Thus ACL link is used where correct delivery is preferred over fast
delivery.
• The ACL can achieve a maximum data rate of 721 kbps by using one,
three or more slots.
• sco is used for real time data such as sound. It is used where fast
delivery is preferred over accurate delivery.
• In an sco link, a physical link is created between the master and slave
by reserving specific slots at regular intervals.
• A slave can have three sco links with the master and can send data at
64 Kbps.
• The ACL link uses L2CAP for data exchange but sco channel does not
use it.
2. Multiplexing
• At the sender site, it accepts data from one of the upper layer
protocols frames them and deliver them to the Baseband layer.
Ans: Repeaters:
Bridge:
Like a hub, a modern bridge has multiple ports, usually enough for
4 to 48 input lines of a certain type. Unlike in a hub, each port is
isolated to be its own collision domain.
The bridge only outputs the frame on the port where it is needed
and can forward multiple frames at the same time.
Router:
The software in a router are the operating system and the routing
protocol. Management software can also be used.
http://www.ques10.com/p/9660/i-repeater-ii-switches-iii-hubs-iv-
router-v-brid-1/
Ans: The frequency reuse factor is the rate at which the same
frequency can be used in the network. It is 1/K (or K according to some
books) where K is the number of cells which cannot use the same
frequencies for transmission.
7)a) Discuss why data link layer is divided into two sub layers. List and
categorize the media access control protocols.
Ans: The data link layer functionality is usually split it into logical sub-
layers, the upper sub-layer, termed as LLC, that interacts with the
network layer above and the lower sub-layer, termed as MAC, that
interacts with the physical layer below, as shown in the diagram given
below:
Upper and Lower sub-layers of Data Link Layer
https://techdifferences.com/difference-between-flow-control-and-
error-control.html
7)c) Why we need only two sequence number (0 and 1) in stop and
wait automatic repeat request? Explain
Ans: We need only two sequence number (0 and 1) in stop and wait
automatic repeat request. Because –
7)d) Which type of orbit does a GEO satellite have? Explain your
answer.
Ans: A GEO satellite has an equatorial orbit since the satellite needs to
remain fixed at a certain spot above the earth.
Ans: For any system, during its functioning, there is always a difference
in the values of its input and output. The processing of the system
results in an error, which is the difference of those values.
The difference between an input value and its quantized value is called
a Quantization Error.
3)b) Write the constellation diagram for ASK, BPSK, QPSK and 4 –
QAM
Ans:
This one bit is sent by comparing the present sample value with
the previous sample value and the result whether the amplitude
is to be increased or decreased is transmitted.
Sample and hold circuit will sample the analog input signal into
Pulse amplitude modulated (PAM) signal.
The PAM signal and the DAC output are compared in the
comparator, which implies that the sampled signal is compared
against the previous sample to increase or decrease the
amplitude of the DM signal.
The Up-down counter is incremented or decremented depending
on whether the previous sample is larger or smaller than the
current sample.
The Delta PCM signal is fed to the up/down counter which works
at the same sample rate as transmitter.
This signal is then allowed to pass through a low pass filter which
will filter out the high frequency components from the signal and
thus produce the original analog signal.
5)c) On a fiber optic channel, we choose error detection method, not
error correction. Why? Given a frame 10101011011 and generator :
1001. If the receiver received 10101011011010, is it accurate
reception? Discuss it using CRC method.
Ans:
If a frame is
damaged, then the stations wait for a random amount of type and
retransmits the frame till it transmits successfully. The waiting time of
the each station must be random and it must not be same just to avoid
the collision of the frames again and again. The throughput of the Pure
ALOHA is maximized when the frames are of uniform length. The
formula to calculate the throughput of the Pure ALOHA is S-=G*e^-2G,
the throughput is maximum when G=1/2 which is 18% of the total
transmitted data frames.
Conclusion:
The Slotted ALOHA is somewhat better than the Pure ALOHA. As the
probability of collision is less in Slotted ALOHA as compared to Pure
ALOHA because the station waits for the next time slot to begin which
let the frame in a previous time slot to pass and avoids the collision
between the frames.
https://techdifferences.com/difference-between-pure-aloha-and-
slotted-aloha.html
1. Reservation
2. Polling
3. Token Passing
Reservation
The stations which have reserved their slots transfer their frames
in that order.
The following figure shows a situation with five stations and a five slot
reservation frame. In the first interval, only stations 1, 3, and 4 have
made reservations. In the second interval, only station 1 has made a
reservation.
Polling
Token Passing
In token passing scheme, the stations are connected logically to
each other in form of ring and access of stations is governed by
tokens.
After sending a frame, each station must wait for all N stations
(including itself) to send the token to their neighbors and the
other N – 1 stations to send a frame, if they have one.