Upload
anon645200133
View
217
Download
0
Embed Size (px)
Citation preview
8/13/2019 Computer Networks 4 1 May June 13
1/10
QP.1Computer Networks (May/June-2013, R09) JNTU-Hyderabad
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
Code No: 09A70403
Jawaharlal Nehru Technological University Hyderabad
B.Tech. IV Year I Semester ExaminationsMay/June - 2013
COMPUTER NETWORKS
( Common to ECE, EIE, BME, ECM )
Time: 3 Hours Max. Marks: 75
Answer any FIVE Questions
All Questions carry equal marks
- - -
1. (a) Describe the design issues of data link layer of OSI model. (Unit-I, Topic No. 1.4)
(b) Define: protocol, digital signal. [7+8] (Unit-I, Topic No. 1.7)
2. (a) Explain the working of packet switching with an example. (Unit-II, Topic No. 2.5)
(b) What is twisted pair cable? What is the difference between category 3 and category 5 twisted pair cables?
[7+8](Unit-II, Topic No. 2.3)
3. (a) Calculate CRC, if message polynomial (M(x)) = x7+ x5+ 1 and generator polynomial (G(x)) = x3+ 1.
(Unit-III, Topic No. 3.3)
(b) Explain supervisory frame format of HDLC. (Unit-III, Topic No. 3.9)
(c) Describe the working of stop-and-wait ARQ protocol. [15] (Unit-III, Topic No. 3.8)
4. (a) Explain the need for medium access control protocol. Describe the frame format of ethernet.
(Unit-IV, Topic No. 4.5)
(b) List the benefits of a wireless LAN. What is a hidden node in a wireless LAN? [7+8](Unit-IV, Topic No. 4.8)
5. (a) What is a bridge? Explain the working of a spanning tree bridge. (Unit-IV, Topic No. 4.5)
(b) Which is better, a low frequency reuse factor of a high frequency reuse factor? Justify your answer. [7+8]
(Unit-V, Topic No. 5.4)
6. (a) What is UDP? List its uses. (Unit-VII, Topic No. 7.2)
(b) Describe TCP connection establishment using 3-way handshake. [7+8] (Unit-VII, Topic No. 7.2)
7. (a) What is ICMP? Explain its use. (Unit-VI, Topic No. 6.5)
(b) What are the various classes of IPv4 addressing? Give example for each. (Unit-VI, Topic No. 6.1)
(c) Explain integrated services QoS model.[15](Unit-VII, Topic No. 7.8)
8. Write short technical notes on,
(a) DNS (Unit-VIII, Topic No. 8.1)
(b) Multicast routing protocols (Unit-VIII, Topic No. 8.5)
(c) Backbone networks. [15](Unit-V, Topic No. 5.2)
R09Solutions
8/13/2019 Computer Networks 4 1 May June 13
2/10
QP.2 Spectrum ALL-IN-ONE Journal for Engineering Students, 2013
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
SOLUTIONS TO MAY/JUNE-2013, R09, QP
Q1. (a) Describe the design issues of data link layer of OSI model.
Answer : May/June-13, (R09), Q1(a) M[7]
Data link layer have been designed keeping in mind the type of the task that this layer can perform such as,
1. Providing services to the network layer
2. Grouping the bits from the physical layer into frame (formation of frames)
3. Handling with error that occur during transferring of data (error control)
4. Keeping track on the flow of frames (flow control).
1. Providing Services to the Network Layer
Transferring of data to and from the network layer is the main responsibility of the data link layer. It fetches the data from
an entity called process in the network layer and passes it to the data link layer on the destination machine which in turntransmits it to the network layer as shown in figure (a) it shows the virtual transmission, but in actual transmission data transfer
takes place through the physical layer of both source and destination machine as shown in figure (b).
Application
Presentation
Session
Transport
Network
Datalink
Physical
Virtual path for
data transmission
Application
Presentation
Session
Transport
Network
Datalink
Physical
Application
Presentation
Session
Transport
Network
Datalink
Physical Actual path for
data transmission
Application
Presentation
Session
Transport
Network
Datalink
Physical
Application
Presentation
Session
Transport
Network
Datalink
Physical
Virtual path for
data transmission
Application
Presentation
Session
Transport
Network
Datalink
Physical
Application
Presentation
Session
Transport
Network
Datalink
Physical Actual path for
data transmission
Application
Presentation
Session
Transport
Network
Datalink
Physical
Figure (a): Virtual Transmission Figure (b): Actual Transmission
Data Link Layer Services
(i) Unacknowledged connectionless service
(ii) Acknowledged connectionless service
(iii) Acknowledged connection-oriented service.
(i) Unacknowledged Connectionless Service
In this type of service, the source machine does not establish any connection with the destination machine. The
source continuously send the frames without waiting for the acknowledgment from the receiver. The major drawbackof this service is that, the sender will have no knowledge about which frames are being received by the receiver or
which frames are lost due to some transmission impairments like attenuation, noise etc. So, if frames are lost, the
sender does not take any responsibility to recover the lost frames. This service is used when the rate of error is low
or for real time traffic.
(ii) Acknowledged Connectionless Service
Source machine does not establish any connection with the destination machine, but here the source machine
receive feedback from the destination in the form of acknowledgment. This help the sender who have an idea of
which frames are lost or damaged. This service increases the reliability. If the timer expires and still the sender did not
receive the acknowledgments, it assumes that the frame have lost and retransmit the frame.
This type of service is used mainly in the wireless systems.
8/13/2019 Computer Networks 4 1 May June 13
3/10
QP.3Computer Networks (May/June-2013, R09) JNTU-Hyderabad
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
(iii) Acknowledged Connection-oriented Service
As, the name itself specifies that there will be a connection between the source machine and destination. Before
starting the transmission the sender first establishes a connection, and then start transmitting the frames. The
receiver in turn send the positive acknowledgment for correct frames and negative acknowledgment for the lost or
damaged frames. Each frame is given by the sequence number that helps the data link layer to discard any duplicate
frame or acknowledgment. This is most difficult service of the datalink layer.
Steps for making a connection,
(a) Establishing a connection
(b) Transmission of frames
(c) Releasing the connection.
2. Formation of Frames
Grouping the bits together from the physical layer and constructing a frame is called framing. The main responsibility
of the data link layer is to detect and correct the errors. The error arises when the bits on the physical layer get scattered or
grabbled while reaching at the destination. In order to perform this the data link layer creates frames. The frames are createdby adding a header and a trailer to the packet which specify the source and the destination address. Destination address tell
where the frame is to be delivered and the source address used to help the destination in sending the acknowledgment. All
data is not sent as a single frame, because the error recovery process can take long time, instead it is sent by fragmenting the
single frame into number of unequal frames which makes the error detection and correction simpler.
Framing are of two types,
(i) Fixed-size Framing (Static Framing)
The frames are of fixed size specifying the start of frame is not necessary.
(ii) Variable-sizes Framing (Dynamic Framing)
The size of frames changes. Here it is necessary to specify end of the frame.
Framing is done using one of the following four methods,(a) Counting the character
(b) Character stuffing
(c) Bit stuffing
(d) Error control.
(a) Counting the Character
In this method, a field called the header is appended to each frame which specify the character following it i.e., it tells
the number of characters in that frame. Using this header field, destination can easily recognize the start and end of
the frame.
Example
4 1 2 3 4 1 2 3 5 1 2 3 4 7 1 2 3 4 5 6 8 1 2 3 4 5 6 7 4 1 2 3
Character countheader
Character countheader
Character countheader
4 1 2 3 4 1 2 3 5 1 2 3 4 7 1 2 3 4 5 6 8 1 2 3 4 5 6 7 4 1 2 3
Character countheader
Character countheader
Character countheader
In the above example, each header specifies the number of characters following it.
Disadvantages
1. If the bits in the count become corrupted during transmission, the receiver will think that the frame contain
fewer (or more) bits than it actually does.
2. Although check sum will detect the incorrect frames the receiver will have difficulty in resynchronizing the
start of new frame.
8/13/2019 Computer Networks 4 1 May June 13
4/10
QP.4 Spectrum ALL-IN-ONE Journal for Engineering Students, 2013
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
4 1 2 3 4 1 2 3 5 1 2 3 4 5 1 2 3 4 5 6 8 1 2 3 4 5 6 7 4 1 2 3
This becomes thestart of new frame
4 1 2 3 4 1 2 3 5 1 2 3 4 5 1 2 3 4 5 6 8 1 2 3 4 5 6 7 4 1 2 3
This becomes thestart of new frame
(b) Character Stuffing
Character stuffing is a technique of inserting the ASCII character DLE STX (Data Link Escape Start of Text) and DLE
ETX (Data Link Escape End of Text) that mark the start and end of the frame. In certain situations it may also happen
that DLE character may appear in the data section of the frame. In order to avoid the mistake of understanding the
data and the start/end of the frame, the ASCII character DLE is stuffed before each DLE character in the data. Then,
this DLE character is removed after monitoring the data stream on the receiver side. If two DLE DLE follows, then the
receiver think that it is stuffed and therefore it is deleted.
The major disadvantage of character stuffing is that character is the smallest unit that can be operated on, but all the
architectures are not byte-oriented.
Example
DLE STX A B DLE DLE D E DLE DLE DLE ETX
Stuffed character
A B DLE D E DLE Original data
A B DLE D E DLE Data passed to thenetwork layer
Figure: Character Stuffing
(c) Bit Stuffing
Bit-stuffing is same as that of character stuffing but the former one is bit oriented and the later one is byte-oriented.
It is the process of adding an extra-bit in the data-unit of the frame to prevent sequence of bits from looking like a flag.
Basically, bit stuffing is used to differentiate between the flag and data to achieve data transparency. In this process,
the sender add extra 0 bit to the outgoing data stream after the occurrence of five consecutive 1s and the receiver
remove the bit 0. If it is followed after five consecutive 1s.
Example
0111 00111110 111111110 1111110
Original data
0111 001111100 11111 01110 11111010
Stuffed bits
0111 0011111011111111 01111110 data passed to the network layer.
3. Error Control
Error control is a mean for protecting data from errors. The main function of the data link layer is error control.
Basically, there are two steps in the error control,
Error control
Error detection Error correction
Error control
Error detection Error correction
8/13/2019 Computer Networks 4 1 May June 13
5/10
QP.5Computer Networks (May/June-2013, R09) JNTU-Hyderabad
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
Error occur when the bits from the physical layer are
misplaced or grabbled during transmission, or when there is
hardware malfunctioning that result in the lost of frames.
There are different kinds of error.
(a) Single-bit Error
Only a single-bit in the data unit is replaced.
(b) Multiple-bit Error
Two or more non-consecutive bits in the data unit
have changed.
(c) Burst Error
Two or more consecutive bits in the data unit have
changed. Burst error are very difficult to detect.
Methods Adopted for Controlling the Error
(i) Feedback (ii) Timer
(iii) Sequence number.
(i) Feedback
Feedback is nothing but sending either the positive
acknowledgment when the frame is correct or the
negative acknowledgment when the frame is damaged
to the sender. So, that the sender can retransmit the
damaged frame.
(ii) Timer
If the link is noisy, then there is a chance that the
frame could be lost, neither the sender nor the receiverhave the knowledge about the frame. If the timer
expires and still the sender have not received the
acknowledgment then it will retransmit the frame that
is lost.
(iii) Sequence Number
They are used to discard any duplicate frame at both
sender and receiver side i.e., each frame is received
exactly once.
The method that are used for detecting the error are
the CRC, LRC, Check sum.
Method used for Error Correction, Hamming code.
4. Flow Control
Flow control means controlling the overflow of data
on the receiver side. It is used when the receiver is not having
the capacity to process the incoming data or when it doesnt
have enough space in its memory to store the data. Flow
control mechanism is used to control the speed of the sender,
so that it can transmit the data with a speed which is
acceptable by the receiver. If the sender sends the data with
greater speed then the receiver tend to loose the data i.e., it
discards the frame. This situation make the receiver flooded
with the data, due to which it is not able to process the data.
Receiver is overwhelmed when its processing speed is much
slower than the processing speed of sender. There are two
things that are to be considered while transmitting data from
sender to receiver.1. Capacity of link or communication channel.
2. Capacity of the receiver buffer.
If the receiver have a capacity of n, then the sender
should transmit data with the speed which is less than are
equal to n.
(b) Define: protocol, digital signal.
Answer : May/June-13, (R09), Q1(b) M[8]
Protocol
For answer refer Unit-I, Q10.
Digital SignalFor answer refer Unit-I, Q28, Topic: Digital Signal.
Q2. (a) Explain the working of packet switchingwith an example.
Answer : May/June-13, (R09), Q2(a) M[7]
Switching
Switching is a technology that links the intended
machines for data transfer by using the special type of device
called switch. The two different techniques employed by
switching are,
(i) Circuit switching
(ii) Packet switching.
(i) Circuit Switching
In this switching technique, a dedicated line (path) is
established to transmit the data among various devices.
Example: Telephone
Following are few steps of how two devices
communicates with each other by using circuit switching,
(i) Setup a connection
(ii) Transfer of data
(iii) Terminate the connection
(i) Setup a Connection
Before sending any signal or data from one point to
another, a circuit must be established. The figure (1) shows
four switching nodes. Each and every node consist of few
incoming and few outgoing lines. When a telephone user
dials a number, the various switching offices establishes a
connection among themselves. The elapsed time between
the end of dialing a number at one end and start ringing the
bell at the other end is approximately 10 seconds for local
calls, during this time it will establish a copper path i.e.,
Microwave link.
8/13/2019 Computer Networks 4 1 May June 13
6/10
QP.6 Spectrum ALL-IN-ONE Journal for Engineering Students, 2013
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
Switching node
Microwave link
Telephonecaller
Telephonereceiver
Switching node
Microwave link
Telephonecaller
Telephonereceiver
Switching node
Microwave link
Telephonecaller
Telephonereceiver
Figure (1): Circuit Switching Network
(ii) Transfer for Data
Once the connection has been established, the data
can be transferred or transmitted through that connection.
The data can be either in analog or digital form, depending
on the nature of the network used.(iii) Terminating the Connection
Once the transmission of data is completed, then the
connection is dropped or terminated. A typical example of
circuit switching is the telephone conversation between two
telephone devices as shown in the a box figure.
The arrangement of circuit switched network can be
done by using two types of special devices.
(a) Circuit Switch
It is a special type of device where different
machines are arranged in such a way that
depending on the number of inputs given, same
number of outputs are obtained.
Circuitswitch
Input 1
Input 2
Output 1
Output 2
Circuitswitch
Input 1
Input 2
Output 1
Output 2
Figure (2): Circuit Switch
(b) Folded Switch
The arrangement of machines or terminals in
this type of device can be done in such a way
that all the machines are connected to oneanother. Mostly arrangement of telephone can
be done in folded switch.
F.SF.S
Figure (3): Folded Switch
Circuit switching consists of the two main methods,
Space division circuit switching
Time division circuit switching.
(ii) Packet Switching
In this technique messages to be transmitted are
divided into packets. These packets are then transmitted
individually to the destination. This technique can be
employed in two ways,
(a) Datagram packet switching
(b) Virtual circuit packet switching.
(a) Datagram Packet Switching
In this approach packets that has to be transmitted
are independent without maintaining the addresses
of the transmitted packets. The packets can be
transmitted along any rout.Working of Datagram Packet Switching
Suppose as source device-1 wants to send three
datagrams to the destination device-4. When source
transmits the datagrams, they are transmitted
individually. Network assumes that only one packet
is to be transmitted, but actually each datagram will
be transmitted through different routes i.e., there will
be no fixed route for each datagram.
The figure (4) is the example for the above method.
Q
R
P
R
R
P
Q P QR P
QP
Device-2
Device-1
R
R
Q
P
R
P Q
R
R
Q P
QP
Q PR
Receiver
Intermediate
Node
Sender
Q
Q
R
P
R
R
P
Q P QR PQR P
QP
QP
Device-2
Device-1
R
R
Q
P
R
P Q
R
R
Q P
QP
Q PR
Receiver
Intermediate
Node
Sender R
Q
P
R
Q
P
R
P Q
R
R
Q PQ P
QP
QP
Q PR Q PR
Receiver
Intermediate
Node
Sender
Q
Figure (4): Datagram Method
In the figure (4), we can see that each datagram is
transmitted through different nodes with different routes.
(b) Virtual Circuit Packet Switching
In this method the routs along which the packets has
to be transmitted are specified. It employs several
routing methods for specifying the routs such as
fined routing, flooding, adaptive routing and random
routing.
8/13/2019 Computer Networks 4 1 May June 13
7/10
QP.7Computer Networks (May/June-2013, R09) JNTU-Hyderabad
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
Q
R
P
R
P
Q PQR P
QP
Q
R
P
R
P
Q PQR PQR P
QP
QP
Figure (5): Example of a Virtual Circuit Method
(b) What is twisted pair cable? What is the difference between category 3 and category 5 twistedpair cables?
Answer : May/June-13, (R09), Q2(b) M[8]
Twisted Pair Cable
For answer refer Unit-II, Q24, Topic: Physical Description.
Differences between Category-3 and Category-5 Twisted Pair Cables
Category-3 Twisted Pair Cable Category-5 Twisted Pair Cable
1. It is an unshielded twisted pair cable consisting of 1. It is an unshielded twisted pair cable consisting of
4-pair of wires with a maximum data rate of 10 Mbps. 4-pair of wires with a maximum data rate of 100 Mbps.
2. Number of twists are less when compared to 2. Number of twists are relatively more. That is,
category-5. That is, cables of category-3 can be category-5 cables can be twisted 12 times per foot.
twisted only 3 times per foot.
3. Supports the transmission of upto 10 Mbps. 3. Supports the transmission of upto 100 Mbps.
4. Used effectively at lengths of upto 100 mts. 4. Used effectively at lengths of upto 100 Mbps.
5. Maximum frequency is 16 MHz. 5. Maximum frequency is 100 MHz.
6. Can be used in 10 BASE-T networks. 6. Used in 100 BASE-T and 1000 BASE-T networks.
Q3. (a) Calculate CRC, if message polynomial (M(x)) = x7+ x5+ 1 and generator polynomial (G(x)) =x3+ 1.
Answer : May/June-13, (R09), Q3(a)For answer refer Unit-III, Q16.
(b) Explain supervisory frame format of HDLC.
Answer : May/June-13, (R09), Q3(b)For answer refer Unit-III, Q33, Topic: Supervisory Frame (S-Frame).
(c) Describe the working of stop-and-wait ARQ protocol.
Answer : May/June-13, (R09), Q3(c)
For answer refer Unit-III, Q26, Topic: Stop and Wait ARQ.
8/13/2019 Computer Networks 4 1 May June 13
8/10
QP.8 Spectrum ALL-IN-ONE Journal for Engineering Students, 2013
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
Q4. (a) Explain the need for medium access control protocol. Describe the frame format of ethernet.
Answer : May/June-13, (R09), Q4(a) M[7]
Need for Medium Access Control Protocol
Medium access control is one of the two sub-layers of data link layer of OSI model. A MAC protocol is used to
provide an efficient use of the channel capacity by controlling access to the transmission medium. It is even used in
transferring the data packet from one network interface card to the other and vice versa, across a shared channel. MAC
protocols prevents collisions between various stations moving across the same channel.
However, this protocol is specific to the LAN being used like token ring, token bus, etc.
Frame Format of Ethernet
For answer refer Unit-IV, Q21.
(b) List the benefits of a wireless LAN. What is a hidden node in a wireless LAN?
Answer :
May/June-13, (R09), Q4(b) M[8]Benefits of a Wireless LAN
The benefits of wireless LANs are as follows,
1. Fast and easy installations without the use of any physical cables.
2. Convenience in accessing the internet irrespective of the location.
3. Productive for the users who prefer to be connected even while on move i.e., while travelling.
4. Provides scalability in configuring the systems to various topologies so as to meet the change in needs of applications
and installations.
5. Handle and serve various connections at a time using an access point. Access point is nothing but a box used for
setting up a wireless LAN.
6. Low cost when compared to wired hardware. Though the initial investment might be higher than the cost of wired
hardware, but the overall expenses costs much lower.
Hidden Nodes
A set of nodes which are unreachable to other nodes in a wireless network are called hidden nodes. Consider a
physical star topology that has an access point along with the nodes enclosing it in circular fashion. That is, all the nodes
are within the range of access point, but are unable to interact with each other, since they are not connected physically. A
node which is at the far edge of the range of access point, called P, in a wireless network can view the access point. But, it
cannot see the node R which is at the opposite end of the access point range. Such nodes are referred as hidden. When
both of these nodes start sending packets simultaneously to another node Q, the problem occurs. The carrier sensing
multiple access without collisions will not work because PandRare unable to sense the carrier. Therefore, collisions occur
because of which the data gets corrupted at the access point.
This problem can be overcome by handshaking along with CSMA/CA scheme.
Q5. (a) What is a bridge? Explain the working of a spanning tree bridge.
Answer : May/June-13, (R09), Q5(a) M[7]
Bridge
A bridge is an electronic device used to connect multiple LANs. The bridges operate in the data link layer.
Suppose, we have a pair of ethernet LANs and we want to interconnect. One approach is to connect them by using
a repeater, but this would not be a workable solution. An alternative way to connect two LANs is by bridge. With the help
of this bridge device we can forward frames from one ethernet LAN to another. Usually, bridges operate in both the physical
and the data link layers of the OSI model. Bridges can divide a large network into smaller segments.
8/13/2019 Computer Networks 4 1 May June 13
9/10
QP.9Computer Networks (May/June-2013, R09) JNTU-Hyderabad
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
7
6
5
4
32
1
7
6
5
4
32
1
PhysicalLayer
Bridge
7
6
5
4
32
1
7
6
5
4
32
1
PhysicalLayer
Bridge
Figure: A Bridge in the OSI Model
A bridge operates at the data link layer, giving it access to the physical addresses of all stations connected to it.
When a frame enters a bridge, the bridge not only regenerates the signal but also checks the address of its destination and
forwards the new copy only to the address to which it belongs. As a bridge encounter a packet, it reads the address
contained in the frame and compares that address with a table of the stations on both segments. When it finds a match, it
sends the packet to that segment.
Working of Spanning Tree Bridge
Spanning tree bridges are also called as transparent bridges. This bridge run under the promiscous (immoral) mode.
It accepts every frame which is send on all the LANs to which it is connected.
A C
B1
E
D B2
F G
4
LAN2LAN1
LAN3
Bridge
B
A C
B1
E
D B2
F G
4
LAN2LAN1
LAN3
Bridge
B
Figure (1): A Configuration with 4 LANs and Two Bridges
Figure (1) consists of 3 LANs (8 stations) with 2 bridges.
When the frame arrives, the bridge must take decision whether to forward or discard it and after sometime the bridge
must put the frame on another LAN. This decision is made by seeing the destination address in a hash table of the bridge.
The hash table consists of address of all possible destinations and inform which output does LAN belongs to. The
main algorithm used in transparent bridge is backward learning. By seeing the address they can inform which station is
accessible on which LAN.
The routing procedure for an incoming frame depends on the source LAN and the destination LAN, which are as
follows,
(i) If the source and destination stations are on the same LAN then bridge just discards the frame.
(ii) If the source and destination stations are on the different LANs then the bridge must forward the frame.
(iii) Use flooding algorithm, if the destination LAN is not known.
B1
B2 LAN2
1
LAN1
2
B1
B2 LAN2
1
LAN1
2
Figure (2): Parallel Connection of Bridge
In figure (2) two or more bridges can be connected in parallel between the LANs to increase the reliability.
To construct the spanning tree the following steps are implemented,
(i) One bridge will be selected as the root of the tree. The root can be selected when each of the bridge broadcast its
serial number (given by manufacturer). If the serial number is small then that bridge will become the root.
(ii) Construct a tree of shortest paths from the root to every bridge and LAN. This tree is considered as a spanning tree.
(iii) Now, a unique path is developed from every LAN to the root.
8/13/2019 Computer Networks 4 1 May June 13
10/10
QP.10 Spectrum ALL-IN-ONE Journal for Engineering Students, 2013
B.Tech. IV-Year I-Sem. ( JNTU-Hyderabad )
B1 B2
B3 B4
LAN4 LAN5
LAN3LAN2LAN1
B1 B2
B3 B4
LAN4 LAN5
LAN3LAN2LAN1
Figure (3): Spanning Tree, Interconnected LANs
1 2 3
4 5
B4
B2B1
B3
Bridge that is not a part
of spanning tree
1 2 3
4 5
B4
B2B1
B3
Bridge that is not a part
of spanning tree
Figure (4): Spanning Tree
(i) Figure (3) shows, 5 LANs connected by 4 bridges. By
looking at this figure we can construct the spanning
tree.
(ii) In spanning tree only path exists from every LAN to
every other LAN.
(iii) Spanning tree will not allow closed loops which is
shown by a dotted line in figure (4).(b) Which is better, a low frequency reuse
factor of a high frequency reuse factor?Justify your answer.
Answer : May/June-13, (R09), Q5(b) M[8]
Low Frequency Reuse Factor Vs High Frequency Reuse
Factor
In most of the cases neighboring cells are not suppose
to use same set of frequencies to perform communication it
is so because the adjacent cell signal may create interference
for the users who are located near to it. But it is difficult to
implement because of the availability of a limited set offrequencies. Therefore, the frequency reuse principle can
be implemented by using a set of patterns in which
frequencies can be reused.
The reuse factor, here is significantly used in the
capacity of cells. This factor is divided into two parts namely,
low frequency reuse factor and high frequency reuse factor.
The low frequency reuse factor maximizes the capacity of
cells using the interference consideration. These interference
considerations are used for balancing the capacity. Whereas,
high frequency reuse factor lowers the interferences since it
provides much distance among the cells without the use of
other channels. Therefore, it can be said that, a high
frequency reuse factor is much better than the low frequency
reuse factor as the cells that make use of the identical set of
frequencies are separated by more cells.Q6. (a) What is UDP? List its uses.
Answer : May/June-13, (R09), Q6(a) M[7]
UDP
For answer refer Unit-VII, Q6 (only 1stparagraph)
Uses of UDP
For answer refer Unit-VII, Q8.
(b) Describe TCP connection establishmentusing 3-way handshake.
Answer : May/June-13, (R09), Q6(b) M[8]
For answer refer Unit-VII, Q14.
Q7. (a) What is ICMP? Explain its use.
Answer : May/June-13, (R09), Q7(a)
ICMP
For answer refer Unit-VI, Q22, Topic: Internet Control
Message Protocol (ICMP).
Use of ICMP
ICMP is used for two purposes,
(i) To send error reporting messages.
(ii) To relay query messages.
Error Reporting Messages
For answer refer Unit-VI, Q22, Topic: Error Reporting
Messages, Q24.Query Messages
For answer refer Unit-VI, Q22, Topic: Query
Messages, Q25.
(b) What are the various classes of IPv4addressing? Give example for each.
Answer : May/June-13, (R09), Q7(b)
For answer refer Unit-VI, Q5.
(c) Explain integrated services QoS model.
Answer : May/June-13, (R09), Q7(c)
For answer refer Unit-VII, Q35.
Q8. Write short technical notes on,
(a) DNS
(b) Multicast routing protocols
(c) Backbone networks.
Answer : May/June-13, (R09), Q8 M[15]
(a) DNS
For answer refer Unit-VIII, Q1.
(b) Multicast Routing Protocols
For answer refer Unit-VIII, Q20(c).
(c) Backbone Networks
For answer refer Unit-V, Q4, Topic: Backbone Network.