Академический Документы
Профессиональный Документы
Культура Документы
Degree:BS(CS)
NAME:
Roll Number:
Course Code:CS-311
Q2: Compare and contrast byte-oriented and bit-oriented protocols. Which categoryhas been
popular in the past (explain the reason)? Which category is popular now(explain the reason)?
ANSWER
Byte stuffing is used when there is a character with the same pattern as the flag
Byte stuffing is the process of adding 1 extra byte whenever there is a flag or escape character in the
text.
Q3: Compare and contrast byte-stuffing and bit-stuffing. Which technique is used inbyte-oriented
protocols? Which technique is used in bit-oriented protocols?
ANSWER :
Q4: Compare and contrast flow control and error control.
Q5: Compare and contrast the Go-Back-NARQ Protocol with Selective-RepeatARQ.
Q6: Compare and contrast HDLC with PPP. Which one is byte-oriented; which one isbit-oriented?
Q7: Define piggybacking and its usefulness.
Q8: How is the preamble field different from the SFD field?
Q9: What is the purpose of an NIC?
Q10: What is the difference between a unicast, multicast, and broadcast address?
Q11: What are the advantages of dividing an Ethernet LAN with a bridge?
Q12: What is the relationship between a switch and a bridge?
Q13: Why is there no need for CSMA/CD on a full-duplex Ethernet LAN?
Q14: Compare the data rates for Standard Ethernet, Fast Ethernet, Gigabit Ethernet, andTen-Gigabit
Ethernet.
Q15: How is a repeater different from an amplifier?
Q16: What do we mean when we say that a bridge can filter traffic? Why is filteringimportant?
Q17: What is a transparent bridge?
Q18: How does a repeater extend the length of a LAN?
Q19: What is the difference between a forwarding port and a blocking port?
Q20: What is the difference between a bus backbone and a star backbone?
Q21: How does a VLAN provide extra security for a network?
Q:22 What is the basis for membership in a VLAN