Вы находитесь на странице: 1из 4

Assignment # 4

Assigned Date: - 27-05-2020


Submission Date:-31-05-2020

Summer Semester 2020

Degree:BS(CS)

NAME:

Roll Number:

Course Name:Computer Communication & Networks

Course Code:CS-311

Instructor:Assistant Professor Muhammad NamanChaudhry

NFC-Institute of Engineering and Technology, Multan


Assignment no.3 (Theory)

Note: Attempt all questions. Any type of plagiarism strictly prohibited.


If any found, according to institute policy necessary actions will be
taken. At least punishment is carrying zero marks in Sessional.
Q1: Define framing and the reason for its need.
ANSWER:
The data link layer needs to pack bits into frames, so that each frame is distinguishable from
another. Our postal system practices a type of framing. The simple act of inserting a letter into an
envelope separates one piece of information from another; the envelope serves as the delimiter.
Fixed Size Framing:
No need for defining the boundaries of the frames
The size itself can be used as a delimeter
e.g. ATM frames
Variable Size Framing:
There is a need to define the end of a frame and beginning of the next frame
Two approaches used:
Character Oriented Approach
Bit Oriented Approach
A frame in a character-oriented protocol
An 8-bit flag is used at the beginning and end of frame to separate one frame from the next

Q2: Compare and contrast byte-oriented and bit-oriented protocols. Which categoryhas been
popular in the past (explain the reason)? Which category is popular now(explain the reason)?
ANSWER
Byte stuffing is used when there is a character with the same pattern as the flag
Byte stuffing is the process of adding 1 extra byte whenever there is a flag or escape character in the
text.

A frame in a bit-oriented protocol

Q3: Compare and contrast byte-stuffing and bit-stuffing. Which technique is used inbyte-oriented
protocols? Which technique is used in bit-oriented protocols?
ANSWER :
Q4: Compare and contrast flow control and error control.
Q5: Compare and contrast the Go-Back-NARQ Protocol with Selective-RepeatARQ.
Q6: Compare and contrast HDLC with PPP. Which one is byte-oriented; which one isbit-oriented?
Q7: Define piggybacking and its usefulness.
Q8: How is the preamble field different from the SFD field?
Q9: What is the purpose of an NIC?
Q10: What is the difference between a unicast, multicast, and broadcast address?
Q11: What are the advantages of dividing an Ethernet LAN with a bridge?
Q12: What is the relationship between a switch and a bridge?
Q13: Why is there no need for CSMA/CD on a full-duplex Ethernet LAN?
Q14: Compare the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet, andTen-Gigabit
Ethernet.
Q15: How is a repeater different from an amplifier?
Q16: What do we mean when we say that a bridge can filter traffic? Why is filteringimportant?
Q17: What is a transparent bridge?
Q18: How does a repeater extend the length of a LAN?
Q19: What is the difference between a forwarding port and a blocking port?
Q20: What is the difference between a bus backbone and a star backbone?
Q21: How does a VLAN provide extra security for a network?
Q:22 What is the basis for membership in a VLAN

Вам также может понравиться