Professional Documents
Culture Documents
Sr Question
1
The research team chose to follow an approach known as _____ that became the basis for data networks and
The research team chose to follow an approach known as _____ that became the basis for data networks and
What was the main motivation in early computer networks that were large and expensive?
Early computer networks were designed to permit sharing of expensive, _____ resources
In twisted Pair Cables how do twists change the electrical properties of the wire?
20 First, they limit the EM energy the wire emits: So they help prevent electric currents on the wire from radiatin
Second, they make the pair of wires less susceptible to EM energy:They help prevent signals on other wires f
21 Most NWs do not send data as continuous streams of bits. But instead divides data into small blocks called _
23 Conceptually, a NW that permits many sources to take turns accessing a shared resource is said to be providin
24
How does dividing data into small packets ensures that all sources receive prompt service
because it prohibits one source from gaining exclusive access for an arbitrarily long time
27 ________ on NW can permanentely damage NW equipment , changes the signal or completely destroy a si
What are the effects of Interference on NW
1 cause permanent damage to NW equipment (lightening)
28 2 changes the signal
3 completely destroy a signal
4 create the opposite effect i.e although the sender does not transmit anything, a receiver might interpret the
30
Two facts motivate the use of packets. List any one giving reason
First, a sender and receiver need to coordinate transmission to ensure that data arrives correctly:
31 Dividing the data into small blocks helps a sender and receiver determine which blocks arrive intact and whic
Second, communication circuits and the associated modem hardware are expensive
multiple computers can share connections and HW to reduce cost
32 All computers attached to an Ethernet participate in a distributed coordination scheme called ____
33
34
35
36
37 Early Communication systems had communication channel for connecting exactly two computers and were a
38 The best example of Bus Topology used today is ___
39 Localtalk uses ___ form of CSMA
40 Ring Toplogy uses ______ scheme for NW sharing
Disadvantages of Point-to-Point NW
43 if more than two hosts need to communicate with one another?
the number of connections grows quickly as the size of the set increases
If shared communication reduces cost why is it not used for long distance communication as well? Give atlea
Because in sharing medium communication is required for Coordination and the time required depends on d
44
Shared NW with long delays are inefficient because they spend more time coordinating use of the shared me
Providing a high BW channel over long distances is significantly more expensive than providing the same B
If shared communication reduces cost why is it not used for long distance communication as well?
Because in sharing medium communication is required for Coordination and the time required depends on d
45
Shared NW with long delays are inefficient because they spend more time coordinating use of the shared me
Providing a high BW channel over long distances is significantly more expensive than providing the same B
51
57 In CSMA/CD, to guarantee that a collision has time to reach all stations before they stop transmitting what is
In CSMA/CD after a collision has occurred and if the computers begin to transmit as soon as the ether becom
To avoid multiple collisions, each computer needs to delay after a collision before attempting to retransmit
58 A maximum delay d forces each computer to choose a random delay less than d
When a computer chooses a delay at random it will select a value that differs from any of the values chosen
The computer that chooses the smallest delay will proceed to send a frame and the NW will return to normal
Hows doea a ring topology ensures that exactly one token exists on a token ring ?
A token gives a host permission to send one frame.
64
Before it can send a frame, the host must wait for the token to arrive
When a token arrives, temporarily removes from the ring and uses the ring to transmit
How does Token Ring scheme guarantees fair access:
65 as token passes around, each one will have an opportunity to use
if a host does not have any data to send it the passes the token on without delay
When a frame is transmitted across a LAN, the electrical signals carrying the bits reach all stations. How can
68 attached stations receive a copy of all signals?
Each station on the LAN is assigned a unique numeric value called a physical address, Hardware Address o
69 When a sender transmits a frame across the LAN, the sender includes ___ Address of the intended recipient
70 Each frame includes two addresses ?
71 Why is the sender address included in frame ?
80 The IEEE addressing scheme supports three types of addresses that correspond to three types of packet delive
81 Based on the Packet Delivery, Ethernet LAN addresses can be broken down into two subcategories. List them
84 When a packet is framed for transport and is being forwarded to a single destination, destination address on a
85 ___ and Broadcast addresses are both classified as group addresses
86
In case of multicasting, the tricky part of dealing with host groups and hardware addresses is performed by __
problems
90 Most LAN technologies define a frame to consist of two parts. List them
An Ethernet frame begins with a header that contains three fields. List and Explain
The 64-bit preamble - alternating 1s and 0s that allow the receiver's hardware to synchronize with the incom
93
The first two fields of the header contain HW Address i.e. Destination Address and Source Address
The third field of the header consists of a 16-bit Ethernet frame type
94 0800h in the Frame Type field specifies that data in the frame is for ___
95 To read packets, analyzer software places the computer's network interface hardware into ____ mode
96 What happens when analyser software is put into promicuous mode ?
97 A computer CPU does not process individual bits on the NW. Who Does that
98 Most NICs contain Direct Memory Access (DMA) circuit. How does it help?
How is NW packet handled in a computer?
To receive a packet,
the CPU allocates buffer space in memory
99
and then instructs the NIC to read the next incoming packet into buffer
the NIC waits for a frame to cross the network
makes a copy of the frame and process it
100The original Ethernet wiring scheme was informally called ___ or ___
The ___ handles the digital aspects of the communication, e.g. address recognition and error detection and __
converting bits into voltages, etc.
101
Ethernet specifies a minimum distance separation between two transceivers, so when there are several compu
between multiple connections
102
103if a carrier signal is present on the network, the multiplexor reports the carrier to ____
104A second generation of Ethernet wiring uses a thinner more flexible ___ cable than the original thick wiring
107An electronic device serves as the center of the NW is known as ___ or ___
108The connection uses UTP wiring with ___ connectors
109A connection in a hub is called ___
As per the Topology Paradox, how does twisted pair Ethernet function physically & logically?
110Physically, twisted pair Ethernet uses a star topology
Logically, twisted pair Ethernet functions like a bus
Is Ethernet a bus topology, or does the topology depend on the wiring? Explain the Topology Paradox
A twisted pair Ethernet forms a classic star where each computer has a dedicated connection to the central hu
111
Physically, twisted pair Ethernet uses a star topology
Logically, twisted pair Ethernet functions like a bus
112Because physically, twisted pair Ethernet uses a star topology and Logically, twisted pair Ethernet functions
114Of the fast Ethernet standards ____ is by far the most common and is supported by the vast majority of Ether
115100BASE-TX - 100 Mbit/s used Cateory ___ UTP cable and is most popular LAN cabling this days
116100BASE-FX is a version of Fast Ethernet over _____
117100Base-FX uses a 1300 nm near-infrared (NIR) light wavelength transmitted via two strands of optical fiber
118List 2 connectors options for 100BaseFX
1191000BASE-T (also known as IEEE 802.3ab) is a standard for gigabit Ethernet over copper wiring must use C
120_____ is a fiber optic gigabit Ethernet for distance capability between 220 metres and 550 metres using multi
____ is a fiber optic gigabit Ethernet standard specified in IEEE 802.3 Clause 38 which uses a long waveleng
over single-mode fiber.
121
127802.11a used ___ channels in which ___ are used for data ___ for synchronisation
128802.11a gave speed upto ____
129____ is used to tackle the 2 main issues hiden terminal and expose station in wireless
130Distribute Coordination Function (DCF) used ___ or ___ method to tackle the problem of hiden terminal and
131Virtual carrier sensing uses additional ACKs, Carrier Sense, and Binary Exponential Backoff (BEB) per ____
132Wireless communication quality between two nodes can be unequal due to ___
133IEEE ___ deals with bluetooth standard
134In Bluetooth, Slave nodes need to be within __ meters of the master node.
135In Bluetooth, Piconet uses centralized ____ division Multiplexing.
136What was the cause for rise in demand for Wireless LAN?
141In wired Ethernet (802.3) you could seize the channel i.e. take the full control of the medium. But it is not po
152While original V 1.0 of bluetooth is a complete specification from application layer to physical layer, 802.15
153Communication in bluetooth is only possible between ____ and ____nodes
The Bluetooth 802.15 specification not only creates competition for other wireless technologies, namely 802.
other.
154
157To overcome distance limitations, some LAN technologies allow two LANs to be joined together with a devi
158_____ Limitation is the fundamental part of LAN designs.
159When designing a NW technology, we choose a combination of ____, _____ and _____achieved at a low co
160To help save expense, LAN technologies usually use a ______ communication medium such as a shared bus
161As a consequence of using a shared medium, a LAN design must include a mechanism that guarantees each s
162The two most popular access mechanisms, CSMA / CD and ______, each take time proportional to the size o
163To ensure that delays do not become significant a LAN technology works with a fixed maximum _____ leng
164_____ has low delay and high bandwidth
165Repeaters are part of the Ethernet standard, which specifies that the network will not operate correctly if mor
166Like a Repeater, ____ is an electronic device that connects 2 LAN segments.
167Two LAN segments connected by a ____ behave like a single LAN
168The most valuable function a bridge performs is ____
How is the interconnections among switches and the capacity of each connection chosen?
169to accommodate the expected traffic
to provide redundancy in case of failure
170To ensure that all stations attached to a LAN receive a sufficiently ____signal, we should calculate the maxim
171A repeater is usually an analog ____ device that continuously monitors electrical signals on each LAN
172When a frame arrives on a segment, the bridge extracts and checks ____ address and takes one of the two de
173Most bridges are called ____ OR ____ bridge - Because they learn the locations of computers automatically
174To learn the locations of computers automatically the bridges uses ___ address information in the frames tha
175In bridging between multiple locations, Filtering at both sites is performed because of ___ constraints
176Bridges HW used with long-distance connections must perform ____i .e. saving a copy of each frame in mem
177The bridges perform a computation known as the _____ algorithm to decide which bridges will not forward
178DST allows a bridge to determine whether forwarding will introduce a ____
When a frame arrives on a segment, the bridge extracts and checks destination address and takes one of the t
1. If the bridge knows that the destination computer is attached to the same segment over which the frame arr
183
the bridge can discard the frame
2. If the destination does not lie on the segment over which the frame arrived the bridge must send a copy of
Most bridges are called adaptive or learning bridge - Because they learn the locations of computers automat
1841. a bridge uses source address information in the frames that arrives
2. When a frame arrives, the bridge extracts the physical source address from the frame header and adds it to
If a computer did not send any frames a bridge could not detect its location. So how will bridge learn the segm
Computers do not usually remain silent
185
1. A host usually emits at least one frame when the system first boots
2. Furthermore, computer communication is usually bidirectional, a computer that receives a frame usually se
Two methods are popular for a bridged NW to span long distances and each involves a long-distance point-to
187First uses a leased serial line to connect the sites - more common because it is less expensive
Second uses a leased satellite channel - because it permits communication across an arbitrary distance
190The Software used to compute the entries for a Routing Table for shortest path computation is known as ___
191A switch usually has multiple I/O connectors, making it possible to connect multiple computers
192As per the routing in WAN, the relationship between graph theory and NW is strong. A machine attached to a
What are the key issue that separates WAN technologies from LAN technologies?
1. Scalability - a WAN must be able to grow as needed to connect many sites
193
2. it can deliver reasonable performance for large size NW
3. provides sufficient capacity to permit the computers to communicate simultaneously
In WAN addressing, the simplest hierarchical scheme partitions an address into two parts. List them.
the first part identifies a PS and the second part identifies a computer attached to that PS
201
203
204A PS does not keep complete information about how to reach all possible destinations. A switch simply send
205In next hop forwarding, a PS usually assigns each interface a small integer, ____
What is source independence in Next-hop forwarding?
Next-hop forwarding depends only on the destination known as source independence
206
What are benifits of using only one part of a two-part hierarchical address?
Using only one part of a two-part hierarchical address has two practical consequences
210
1. First, the computation time required to forward a packet can be reduced
2. Second, the entire RT can be shortened to contain one entry per destination PS instead of one entry per des
The SW to compute the entries for a RT represents the NW as a graph, known as ______ Algorithm, which f
the other nodes in the graph.
221
Dijkstra's Algorithm uses weight (i, j) as a function that returns the weight of the edge from node i to node
exists from node i to node j
225
227One of the best-known algorithms for distributed route computation is ____ algorithm
229
Like a Distance Vector Algorith, an Shortest Path First algorithm can adapt to HW failures. What is the adva
SPF has the advantage that all computations can be carried out simultaneously
230
1. After the status of a link changes, all PS receive a status message, and each switch begins computing its RT
2. In contrast, a DVA it requires a PS to update its RT before sending a message to another PS
231What is a network protocol?A set of rules that specify the format of messages and the appropriate actions req
232A set of rules that specify the format of messages and the appropriate actions required for each message is kn
What is the advantage of dividing a protocol in to sub-pieces?
233Makes easier to design, analyze, implement, and test
increases flexibility because it allows subsets of protocols
What needs to be considered when dividing a protocol design into sub-pieces?
The division must be chosen carefully to
234To ensure the resulting system is efficient and effective
To avoid duplication of effort, they can share data structures and information
To handle all possible HW failures or other exceptional condition
235
236One of the most important tools in a plan for Protocol Design is called a ____ model
237Layering model describes one way the communication problem can be divided into sub-pieces called ____
List all the 7 layers of OSI model and functionality defined at each layer
Layer 1 Physical:
Basic NW HW, specification of LAN HW
Layer 2 Data Link
How to organize data into frames and how to transmit frames
Layer 3 NW
How addresses are assigned and how packets are forwarded
238Layer 4 Transport
How to handle details of reliable transfer
Layer 5 Session
How to establish a communication session with a remote system
Layer 6 Presentation
How to represent/match data
Layer 7 Application
How particular application uses a NW
239Layering models provide a simple explanation of the ____ among the complex HW and protocol component
What were the issues in protocol stacks created by several vendors and had to be replaced with TCP/IP proto
240They had few common issues
1. mostly incompatible - protocols from a given stack cannot interact with protocols from another
List the protocol stack and their developer which are now replaced by TCP / IP
Novell - Netware
Banyan - VINES
241
Apple - Appletalk
Digital - DECNET
IBM - SNA
242Usually, each layer places additional information in a ____ before sending data to a lower layer
248
252
253____ occurs when a computer sends faster than the destination can absorb it, so data is lost
254Several techniques are available to handle data overrun and collectively, the techniques are known as ____me
How does a stop-and-go system work in flow control.
255A sender waits after transmitting each packet for an ACK
When the receiver is ready for another packet, the receiver sends a control message, usually a form of ACK
256To obtain high throughput rates with flow control, we can use _____
258If congestion in network persists, a PS will run out of memory and begin discarding packets. Furthermore, if
List the two approaches for dealing with congetion
2591. Arrange for PS to inform senders when congestion occurs
2. Use packet loss as an estimate of congestion
In protocol design, why details must be chosen carefully? Explaing with supporting example.
small design errors can result in incorrect operation, unnecessary packets, or delays
260
Ex: sequence # should be chosen so that they are not reused frequently, but small enough to avoid wasting un
Similarly, a higher-level protocol can cause excessive overhead if the protocol chooses a non-optimal messag
261____ technologies are designed to provide high-speed communication across short distances
262___ technologies are designed to provide communication across large areas
Why cannot extension techniques such as bridging be used with heterogeneous network technologies ?
2651. each technology uses its own packet format and addressing scheme
2. a frame created for one network technology cannot be transmitted on a network that uses a different techno
266Despite the incompatibilities among network technologies, researchers have devised a scheme that provides u
267The basic component used to connect heterogeneous networks is a _____
What can a router connect?
two LANs
268
a LAN and a WAN
or two WANs
What does the exact details of internet topology chosen be dependent on?
The exact details of internet topology to be chosen often depend on the following
1. bandwidth of the physical networks
2702. expected traffic
3. organization's reliability requirements
4. cost
5. performance of available router hardware
What details are hidden by the Internet software in general
1. physical network connections
271
2. physical addresses
3. routing information
272We say that an internet is a ____ network system because Users/application programs are not supposed to be
273Several protocols have been proposed for use with internets but ____ Internet Protocol suite is the most wide
List 5 Layers of TCP / IP reference model from top to bottom.
1. Application
2. Transport
274
3. Internet
4. Network Interface
5. Physical
275____ computer to refer to a computer that connects to the Internet and runs applications
276The addressing scheme IP version 4 is also known as ____
When sending a packet across the Internet, what should senders protocol software must specify at the minim
279its own 32-bit IP address (the source address)
and the address of the intended recipient (the destination address)
List and explain the 2 parts of IP address.
IP addressis divided into two parts:
A prefix
identifies the physical network to which the host is attached
280
Each network in the Internet is assigned a unique network number
A suffix
identifies a specific computer (host/node) on the network
Each computer on a given network is assigned a unique suffix
IP addressis divided into two parts: A ___ which identifies the physical network to which the host is attached
network
281
282The original classful IP addressing divided the IP address space into___primary classes, each class has a diffe
283The first ___ bits of an IP address determined the class to which the address belonged. It specifies how the re
List the binary values for first 4 bits for class A and B
0000,1000
List the binary values for first 4 bits for class A B and C
285
0000,1000,1100
284
286Notation that has been accepted is to express each 8-bit section of a 32-bit number as a decimal value and use
287dotted decimal addresses range is from ___ to ____
288Equivalent Dotted Decimal / Binary Representation for
a. 10000001 00110100 00000110 00000000 - 129.52.6.0
b. 11000000 00000101 00110000 00000011 - 192.5.48.3
289c. 00001010 00000010 00000000 00100101 - 10.2.0.37
d. 11000000 10101000 00000001 00001010 - 192.168.1.10
e. 00001110 10001011 01111001 01101101 - 14.139.121.109
How many bits are used in suffix i.e. for hosts in class A, B and C?
290
24, 16, and 8
As the Internet grew, the original classful addressing scheme became a limitation. Two mechanisms were inv
What are they?
293
Subnet addressing
Classless addressing
What did the two mechanisms do to overcome the limitation of classful addressing scheme.
1. instead of having three distinct address classes, it allowed the division between prefix/suffix on an arbitrary
294
296The classless and subnet addressing schemes mark the boundary, using a 32-bit value known as an address m
Consider the mask needed for the example. It has 26 bits of 1s followed by 6 bits of 0s. In dotted decimal, th
297192.5.42.59?
192.5.42.59/26
298
299
303Suppose you have a network 192.168.1.0/24. Network ID is 192.168.1.0 (All 0s in Suffix) Hosts = 192.168.1
Limited broadcast
1. Limited broadcast refers to a broadcast on a directly-connected network:
informally, we say that the broadcast is limited to a single wire
304
2. Limited broadcast is used during system startup by a computer that does not yet know the network number
3. IP reserves the address consisting of 32-bits of 1s refer to limited broadcast
4. Thus, IP will broadcast any packet sent to the all-1s address across the local network
Loopback address
1. Loopback address used to test network applications
2. It is used for preliminary debugging after a network application has been created
3. A programmer must have two application programs that are intended to communicate across a network
4. Each application includes the code needed to interact with TCP/IP
5. Instead of executing each program on a separate computer, the programmer runs both programs on a single
communicating
306
6. When one application sends data to another data travels down the protocol stack to the IP software then for
7. A programmer can test the program logic quickly without needing two computers and without sending pac
8. IP reserves the network prefix 127/8 for use with loopback
9.
10. During loopback testing no packets ever leave a computer
the IP software forwards packets from one application to another
11. The loopback address never appears in a packet traveling across a network
312
314