Professional Documents
Culture Documents
Transport Layer
The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network layer oversees
source-to-destination delivery of individual packets, it does not recognize any relationship
between those packets.
Transport layer provides services to application layer and takes services from network
layer. The data in the transport layer is referred to as Segments. It is responsible for the End to
End delivery of the complete message. Transport layer also provides the acknowledgement of the
successful data transmission and re-transmits the data if error is found.
• At sender’s side:
Transport layer receives the formatted data from the upper layers, performs Segmentation and
also implements Flow & Error control to ensure proper data transmission. It also adds Source
and Destination port number in its header and forwards the segmented data to the Network
Layer.
Note: The sender need to know the port number associated with the receiver’s application.
Generally this destination port number is configured, either by default or manually. For example,
when a web application makes a request to a web server, it typically uses port number 80,
because this is the default port assigned to web applications. Many applications have default port
assigned.
• At receiver’s side:
Transport Layer reads the port number from its header and forwards the Data which it has
received to the respective application. It also performs sequencing and reassembling of the
segmented data.
Other responsibilities of the transport layer include the following:
Service-point addressing
Computers often run several programs at the same time. For this reason, source-to-
destination delivery means delivery not only from one computer to the next but also from a
specific process (running program) on one computer to a specific process (running program) on
the other. The transport layer header must therefore include a type of address called a service-
point address (or port address). The network layer gets each packet to the correct computer; the
transport layer gets the entire message to the correct process on that computer.
Segmentation and reassembly
A message is divided into transmittable segments, with each segment containing a
sequence number. These numbers enable the transport layer to reassemble the message
correctly upon arriving at the destination and to identify and replace packets that were lost in
transmission.
Connection control
The transport layer can be either connectionless or connection oriented. A connectionless
transport layer treats each segment as an independent packet and delivers it to the transport
layer at the destination machine. A connection oriented transport layer makes a connection with
the transport layer at the destination machine first before delivering the packets. After all the
data are transferred, the connection is terminated.
Flow control
Like the data link layer, the transport layer is responsible for flow control. However, flow
control at this layer is performed end to end rather than across a single link.
Error control
Like the data link layer, the transport layer is responsible for error control. However, error
control at this layer is performed process-to-process rather than across a single link. The sending
transport layer makes sure that the entire message arrives at the receiving transport layer
without error (damage, loss, or duplication). Error correction is usually achieved through
retransmission.
* Data in the Transport Layer is called as Segments.
** Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
Transport Layer is called as Heart of OSI model.
Session Layer
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes. The session layer is the network dialog controller. It establishes,
maintains, and synchronizes the interaction among communicating systems.
Specific responsibilities of the session layer include the following:
Dialog control
The session layer allows two systems to enter into a dialog. It allows the communication
between two processes to take place in either halfduplex (one way at a time) or full-duplex (two
ways at a time) mode.
Synchronization
The session layer allows a process to add checkpoints, or synchronization points, to a
stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash happens during the transmission of page
523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.
**All the above 3 layers are integrated as a single layer in TCP/IP model as “Application
Layer”.
**Implementation of above 3 layers is done by the network application itself. These are
also known as Upper Layers or Software Layers.
Presentation Layer
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems. The presentation layer is responsible for translation,
compression, and encryption.
Specific responsibilities of the presentation layer include the following:
Translation
The processes (running programs) in two systems are usually exchanging information in
the form of character strings, numbers, and so on. The information must be changed to bit
streams before being transmitted. Because different computers use different encoding systems,
the presentation layer is responsible for interoperability between these different encoding
methods. The presentation layer at the sender changes the information from its sender-
dependent format into a common format. The presentation layer at the receiving machine
changes the common format into its receiver-dependent format.
Encryption
To carry sensitive information, a system must be able to ensure privacy. Encryption means
that the sender transforms the original information to another form and sends the resulting
message out over the network. Decryption reverses the original process to transform the
message back to its original form.
Compression
Data compression reduces the number of bits contained in the information. Data
compression becomes particularly important in the transmission of multimedia such as text,
audio, and video.
Application Layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access and
transfer, shared database management, and other types of distributed information services.
Specific services provided by the application layer include the following:
Network virtual terminal
A network virtual terminal is a software version of a physical terminal, and it allows a user
to log on to a remote host. To do so, the application creates a software emulation of a terminal at
the remote host. The user's computer talks to the software terminal which, in turn, talks to the
host, and vice versa. The remote host believes it is communicating with one of its own terminals
and allows the user to log on.
File transfer, access, and management
This application allows a user to access files in a remote host (to make changes or read
data), to retrieve files from a remote computer for use in the local computer, and to manage or
control files in a remote computer locally.
Mail services
This application provides the basis for e-mail forwarding and storage.
Directory services
This application provides distributed database sources and access for global information
about various objects and services.
MCQs
1. OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) None of the mentioned
4. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
12. Which transmission media has the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
13. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
14. The portion of physical layer that interfaces with the media access control sublayer is called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
18. The physical layer translates logical communication requests from the ______ into hardware
specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
21. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
22. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
23. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
24. Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
26. When 2 or more bits in a data unit has been changed during the transmission, the error is
called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
29. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) None of the mentioned
30. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
35. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
37. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
38. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
41. Transport layer aggregates data from different applications into a single stream before
passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
42. Which one of the following is a transport layer protocol used in networking?
a) TCP
b) UDP
c) Both TCP and UDP
d) None of the mentioned
47. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
6. The ………. of TCP/IP protocol is responsible for figuring out how to get data to its destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
8.……… is the protocol that hides the underlying physical network by creating a virtual network
view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
9. To use the services of UDP, we need ……… socket addresses.
A. four
B. two
C. three
D. four
10. Which of the following is not the name of Regional Internet Registries(RIR) to administer the
network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
12.………… addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP
network.
A. Class A
B. Class B
C. Class C
D. Class D
14. ………. messages are never sent in response to datagrams with a broadcast or a multicast
destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
15. TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is number of the ……. byte carried in that segment.
A. first
B. last
C. middle
D. zero
16. ………. is responsible for converting the higher level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
18. ……….. is a process-to-process protocol that adds only port addresses, checksum error control,
and length information to the data from upper layer.
A. TCP
B. UDP
C. IP
D. ARP
26. Which layer will be used while transmitting data using FTP or Telnet
A. Presentation
B. Application
C. Session
D. Transport
28. Telnet
A. allows user to connect client machine
B. transferring files
C. sharing files
D. none of above
29. Which protocol uses window flow system
A. UDP
B. TCP
C. FTP
D. None of above
33. TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
37. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of
data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
38. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment.
a) 10000
b) 10001
c) 12001
d) 11001
39. Bytes of data being transferred in each connection are numbered by TCP. These numbers
starts with a
a) Random number
b) Zero
c) One
d) Sequence of zero’s and one’s
41. The receiver of the data controls the amount of data that are to be sent by the sender is
referred as
a) Flow control
b) Error control
c) Congestion control
d) Error detection
42. Size of TCP segment header ranges between
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
44. The server program tells its TCP that it is ready to accept a connection. This process is called
a) Active open
b) Active close
c) Passive close
d) Passive open
45. The process of, A client that wishes to connect to an open server tells its TCP that it needs to
be connected to that particular server is
a) Active open
b) Active close
c) Passive close
d) Passive open
46. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
47. Size of source and destination port address of TCP header respectively are
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
MCQs:
1. Which of the following cabling techniques is considered best between buildings for
establishing LANs ?
A 10Base5
B 10Base-F
C 10Base2
D None of these
2. For optical fiber used in point to point transmission, the repeater spacing is
A 10-100 km
B 2-10 km
C 1-10 km
D None of these
7.Which of the following topologies cannot be used for a local area network ?
A Star
B Ring
C Bus
D None of the above
8. In a network with 25 computers, which topology would require the most extensive cabling?
A Mesh
B Bus
C Ring
D Star
9. Which device is used to handle carrier detection and collision detection in LANs ?
A Bridge
B Repeater
C Transreceiver
D None of these
10. Which device is used to handle carrier detection and collision detection in LANs ?
A Bridge
B Repeater
C Transreceiver
D None of these
12. For establishing LANs between building, which of the following cabling techniques is
considered best:
A 10Base5
B 10Base2
C 10Base-F
D 10Base-T
15. Which of the following device copies electrical signals from one Ethernet to another?
A Bridge
B Repeater
C Hub
D Passive hub
16. Which of the following items is not used in Local Area Networks (LANs) ?
A Computer
B Modem
C Printer
D Cable
17. Which of the following device is used to connect two systems, especially if the systems use
different protocols ?
A Hub
B Bridge
C Gateway
D Repeater
18. A device that links two homogeneous packet broadcast local networks, is
A Hub
B Bridge
C Repeater
D Gateway
19. Network topology, consisting of modes attached in a ring without a host computer, is known
as
A Star
B Bus
C Ring
D None of the above
22. In a network with 25 computer, which one of the following topologies would require the least
cabling ?
A Mesh topology
B Star topology
C Bus topology
D Ring topology
33. A LAN is a computer network that connects computers within a ____________ (choose two)
a) limited area
b) Building
c) Country
d) across different Cities
35. Normally cables those can be used in LAN are __________ (Choose Two)
a) coaxial cable
b) twisted pair
c) fiber
d) none
38. which Technology is used for collision detect in Local Area Network
a) CSMA/CD
b) CDMA
c) GSM
d) 3G
39. In token networks, a special network frame called a __________is passed around the network
from device to device.
a) token
b) packet
c) none
d) ring
40. A 100-Mbps Ethernet segment is capable of transmitting __________ of data, but only 100 Mbps
can travel in one direction at a time.
a) 200 Mbps
b) 100 Mbps
c) 50 Mbps
d) 90 Mbps
41. A _________ consists of a single packet that is copied and sent to all nodes on the network
a) broadcast
b) unicast
c) multicast
d) none
42. A ____________ is a LAN architecture that consists of a series of computer connected to each
others by one direction ;transmission links to form a single closed loop
a) ring topology
b) bus topology
c) Star
d) vlan
43. A _________is a physical layer device used to connect the media segments of an extended
network
a) router
b) repeater
c) hub
d) Switch
44. Computer network that spans a limited physical area, usually ranging from a small office to a building
is known as
A. LAN
B. WAN
C. MAN
D. PAN
45. Computer network which spans a large physical area, connecting several sites of an organization
across cities, countries and continents is known as
A. LAN
B. MAN
C. WAN
D. PAN
47. 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line
coding.
A) 8B/10B; NRZ
B) 4B/5B; NRZ
C) 8B/10B; MLT-3
D) 4B/5B; MLT-3
49. __________ uses two optical fibers and a short-wave laser source.
A) 1000Base-LX
B) 1000Base-SX
C) 1000Base-T
D) none of the above
51. In Ethernet addressing, if all the bits are 1s, the address is _________.
A) multicast
B) broadcast
C) unicast
D) none of the above
53. Each station on an Ethernet network has a unique _______ address imprinted on its network
interface card (NIC).
A) 48-bit
B) 32-bit
C) 5-byte
D) none of the above
55. In the Ethernet frame, the _______ field contains error detection information.
A) address
B) preamble
C) CRC
D) none of the above
62. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
4. WIRELESS LANS
In computing, Wireless LAN or Wireless Local Area Network is a term to refer to a Local Area
Network that does not need cables to connect the different devices. Instead, radio waves and
IEEE 802.11 are used to communicate. The stations of the wireless network can communicate
directly with each other, we called Ad Hoc network type, or via relay terminals called APs (Access
Points, PA) then it is an infrastructure network. The second type is by far the most common in
business.
There are two types of wireless networks:
• Type networks Ad Hoc, where stations communicate directly;
• Infrastructure type networks where stations communicate through access points.
To communicate, each station must of course be equipped with an adapter WiFi and a
radio antenna (often integrated into the adapter). More and more computer equipment come
with a built-in WiFi adapter. Except not the case, you must buy one and connect it to the station.
The connection is very varied: there are WiFi USB adapters, PCMCIA, PCI, etc.
There are several variations of WiFi. In short, 802.11b and 802.11g are compatible them and both
operate with the radio waves of a frequency of 2.4 GHz. The 802.11b reached a speed of 11 Mb / s
and 802.11g rises to 54 Mb / s. The 802.11a is not compatible with 802.11b and 802.11g, because
it works with the waves a radio frequency of 5 GHz. It can reach 54 Mb / s. The 802.11n allows to
achieve a real flow rate greater than 100 Mb / s. It is capable of operating at 2.4 GHz or 5 GHz and
is compatible with the 802.11b / g and 802.11a. Unfortunately, most 802.11n equipment
available today use only tape 2.4 GHz (and are therefore not compatible with the 802.11a).
Today the WiFi version of the most used is far 802.11g. It should be rapidly overtaken by
802.11n.
The fact that WiFi is originally designed to perform WLAN does not prevent not also be
used in other contexts. For example, a myriad of products, such as electronic organizers (PDAs)
or Personal Data Assistant (PDAs), printers, computer monitors, VCRs or even Hi-Fi, are now
equipped with WiFi connections allowing them to be linked together without any wire. In this
case, the WLAN is used to achieve a WPAN. Conversely, many local authorities do not have access
to top speed (ADSL is not available everywhere) are turning to WiFi to cover a town or towns
with the same wireless network. This can be called Wireless MAN (WMAN).
Finally, companies are deploying wireless networks, called hotspots1 that allow anyone to
connect to the Internet wirelessly slightly across the US and around the world. So one sees now
what might be called WWAN (Wireless Wide Area Networks) based on WiFi technology (WiFi
technology itself, however, carries data over short distances).
802.11 Architecture
The 802.11architecture defines two types of services and three different types of stations
802.11 Services
The two types of services are
1. Basic services set (BSS)
2. Extended Service Set (ESS)
1. Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a central base
station called access point (AP).
• The use of access point is optional.
• If the access point is not present, it is known as stand-alone network. Such a
BSS cannot send data to other BSSs. This type of architecture is known as adhoc
architecture.
• The BSS in which an access point is present is known as an infrastructure network.
2. Extend Service Set (ESS)
• An extended service set is created by joining two or more basic service sets (BSS) having
access points (APs).
• These extended networks are created by joining the access points of basic services sets
through a wired LAN known as distribution system.
• The distribution system can be any IEET LAN.
• There are two types of stations in ESS:
(i) Mobile stations: These are normal stations inside a BSS.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.
• Communication between two stations in two different BSS usually occurs via two APs.
• A mobile station can belong to more than one BSS at the same time.
802.11 Station Types
IEEE 802.11 defines three types of stations on the basis of their mobility in wireless LAN.
These are:
1. No-transition Mobility
2. BSS-transition Mobility
3. ESS-transition Mobility
1. No-transition .Mobility: These types of stations are either stationary i.e. immovable or
move only inside a BSS.
2. BSS-transition mobility: These types of stations can move from one BSS to another but
the movement is limited inside an ESS.
3. ESS-transition mobility: These types of stations can move from one ESS to another.
The communication mayor may not be continuous when a station moves from one ESS to
another ESS.
Physical layer functions
• As we know that physical layer is responsible for converting data stream into signals, the
bits of 802.11 networks can be converted to radio waves or infrared waves.
• These are six different specifications of IEEE 802.11. These implementations, except the
first one, operate in industrial, scientific and medical (ISM) band. These three banks are
unlicensed and their ranges are
1.902-928 MHz
2.2.400-4.835 GHz
3.5.725-5.850 GHz
Benefits of Wireless LANs
People can access the network from where they want; they are no longer limited by the
length of the cable
Some places and vehicles have a Wireless LAN hotspot. This lets people access the internet
even outside their normal work environment, for example in a restaurant or train.
Setting up a wireless LAN can be done with one box called wireless access point or
wireless router. This box can handle many connections at the same time. Wired networks
require cables to be laid. This can be difficult for certain places.
Access points can serve a varying number of computers.
Disadvantages of Wireless LANs
Wireless LANs use radio waves to communicate. Special care needs to be taken to encrypt
information.
The signal is noisier than on wires, and more bandwidth needs to be spent on error
correction.
A typical IEEE 802.11 access point has A range of meters from where devices can connect.
To extend the range more access points are needed.
There are many reliability problems, especially those connected to interference from
other devices.
Wireless LANs are much slower than wired ones; this may not matter for most users
though, because the bottleneck in a home network is usually the speed of the ADSL line or
other Internet connection.
Technologies used
Today, most technologies used for WLANs use Orthogonal Frequency Division Multiplexing.
This means that several frequencies are used at the same time. Signals that are close to each
other, but that belong to different channels do not disturb each other, as they use different coding
schemes. Depending on the material used, it is possible to cover between 30 metres and 100
metres indoors; outdoors, the range is about 100-300m, if there are no obstacles.
MCQs:
1. What is the access point (AP) in wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless devices
itself
d) none of the mentioned
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) None of the mentioned
12. What is the maximum distance running the lowest data rate for 802.11b?
A. About 100 feet
B. About 175 feet
C. About 300 feet
D. About 350 feet
13. What is the maximum distance with maximum data rate for 802.11a?
A. About 65-75 feet
B. About 90-100 feet
C. About 150 feet
D. Over 200 feet
15. You have a Cisco mesh network. What protocol allows multiple APs to connect with many
redundant connections between nodes?
A. LWAPP
B. AWPP
C. STP
D. IEEE
16. What is the maximum data rate for the 802.11g standard?
A. 6Mbps
B. 11Mbps
C. 22Mbps
D. 54Mbps
17. What is the maximum data rate for the 802.11a standard?
A. 6Mbps
B. 11Mbps
C. 22Mbps
D. 54Mbps
21. What is the maximum distance with maximum data rate for 802.11b?
A. About 65-75 feet
B. About 90-100 feet
C. About 150 feet
D. Over 200 feet
22. What is the maximum distance with maximum data rate for 802.11g?
A. About 65-75 feet
B. About 90-100 feet
C. About 150 feet
D. Over 200 feet
23. What is the maximum distance running the lowest data rate for 802.11a?
A. About 100 feet
B. About 175 feet
C. About 300 feet
D. About 350 feet
25. What is the maximum data rate for the 802.11b standard?
A. 6Mbps
B. 11Mbps
C. 22Mbps
D. 54Mbps
26. You are connecting your access point and it is set to root. What does Extended Service Set ID
mean?
A. That you have more than one access point and they are in the same SSID connected
by a distribution system.
B. That you have more than one access point and they are in separate SSIDs connected by a
distribution system.
C. That you have multiple access points, but they are placed physically in different buildings.
D. That you have multiple access points, but one is a repeater access point.
27. Cisco's Unified Wireless Solution provides a mesh solution. What devices do you absolutely
need to purchase to run a Cisco solution?
1. WCS
2. Controller
3. Access point
4. Bridge
A. 1 and 2
B. 2 and 3
C. 1 and 4 only
D. 4 only
30. What is the maximum distance running the lowest data rate for 802.11g?
A. About 100 feet
B. About 175 feet
C. About 300 feet
D. About 350 feet
31. Which label hierarchy exhibits the zero value of S-bit except the last bit with value equal to
unity?
a. Label Push
b. Label Pop
c. Label Stack
d. LSP hierarchy
32. Which scheme/ strategy is suitable to establish the communication between the access point
(AP) and the infrastructure of LANs?
a. Wired
b. Wireless
c. Both a & b
d. Cannot Predict
33. What conclusion can be drawn if the collision is detected in CSMA/CD algorithm while
controlling the access in wireless LANs?
a. Non-reception of frame & necessity of retransmission
b. No necessity of working in duplex mode for the host
c. No necessity to prevent the signal fading
d. All of the above
34. Which among the following represents the building blocks of wireless LANs?
a. BSS
b. ESS
c. Both a & b
d. None of the above
36. Which protocol performs the functional operation of breaking the frames into several cells in
an Asynchronous Transfer Mode (ATM)?
a. Physical Layer
b. ATM Layer
c. ATM Adaptation Layer
d. All of the above
37. Which among the below illustrations represents the variable bit rate type of ATM?
a. Telephony speech without silencer
b. Compressed voice/ video with silence suppression
c. Equivalent sharing of bandwidth between the links
d. All of the above
38. What is/are the functions of Segmentation and Reassembly (SAR) sublayer in an ATM
adaptation layer?
A. Provision of an interface to the application
B. Addition of headers and trailers to data units for cell payload formation
C. Smoothening of an incoming traffic
D. Detection of lost and misinserted cells
a. A ,B & C
b. B,C & D
c. Only B
d. Only C
39. Which among the AAL protocol/s allow/s the CS checksum of about 32 bits?
A. AAL-1
B. AAL-2
C. AAL-3/4
D. AAL-5
a. A & B
b. C & D
c. Only C
d. Only D
41. Frames that are used for initial communication between stations and access points are called
A. Control frames
B. Data frames
C. Beacon Frame
D. Management Frames
48. 4-bit type subfield of baseband layer frame defines type of data coming from the
A. Lower Layer
B. upper layer
C. data link layer
D. Media Access Control layer
5. TOKEN RING
Token Ring local area network (LAN) technology is a communications protocol for local
area networks. It uses a special three-byte frame called a "token" that travels around a logical
"ring" of workstations or servers. This token passing is a channel access method providing
fair access for all stations, and eliminating the collisions of contention-based access methods.
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5 and was fairly
successful, particularly in corporate environments, but gradually eclipsed by the later
versions of Ethernet.
Token Ring access is more deterministic, compared to Ethernet's contention-
based CSMA/CD
Token ring does not inherently support this feature and requires additional software and
hardware to operate on a direct cable connection setup. [11]
Token Ring eliminates collision by the use of a single-use token and early token release to
alleviate the down time.
Token Ring network interface cards contain all of the intelligence required for speed
autodetection, routing and can drive themselves on many Multistation Access Units
(MAUs) that operate without power (most MAUs operate in this fashion, only requiring a
power supply for LEDs).
Multiple identical MAC addresses are supported on Token Ring (a feature used
by S/390 mainframes).
Token Ring was more complex than Ethernet, requiring a specialized processor and
licensed MAC/LLC firmware for each interface. The cost of a Token Ring interface using
the Texas Instruments TMS380C16 MAC and PHY was approximately three times that of
an Ethernet interface using the Intel 82586 MAC and PHY.
IEEE 802.5 Token Ring:
Token ring is the IEEE 802.5 standard for a token-passing ring in Communication
networks. A ring consists of a collection of ring interfaces connected by point-to-point
lines i.e. ring interface of one station is connected to the ring interfaces of its left station as
well as right station. Internally, signals travel around the Communication network from
one station to the next in a ring.
These point-to-point links can be created with twisted pair, coaxial cable or fiber
optics. Each bit arriving at an interface is copied into a 1-bit buffer. In this buffer the bit is
checked and may be modified and is then copied out to the ring again. This copying of bit
in the buffer introduces a 1-bit delay at each interface.
Token Ring is a LAN protocol defined in the IEEE 802.5 where all stations are
connected in a ring and each station can directly hear transmissions only from its
immediate neighbor. Permission to transmit is granted by a message (token) that
circulates around the ring. A token is a special bit pattern (3 bytes long). There is only one
token in the network.
Token-passing networks move a small frame, called a token, around the network.
Possession of the token grants the right to transmit. If a node receiving the token in order
to transmit data, it seizes the token, alters 1 bit of the token (which turns the token into a
start-of-frame sequence), appends the information that it wants to transmit, and sends
this information to the next station on the ring. Since only one station can possess the
token and transmit data at any given time, there are no collisions.
There are two operating modes of ring interfaces. There are listen and transmit. In
listen mode, the input bits are simply copied to output with a delay of 1- bit time. In
transmit mode the connection between input and output is broken by the interface so that
is can insert its own data. The station comes in transmit mode when it captures the token.
The frames are acknowledged by the destination in a very simple manner. The
sender sends frames to receiver with ACK bit 0. The receiver on receiving frames, copies
data into its buffer, verifies the checksum and set the ACK bit to 1. The verified frames
come back to sender, where they are removed from the ring.
The information frame circulates the ring until it reaches the intended destination
station, which copies the information for further processing. The information frame
continues to circle the ring and is finally removed when it reaches the sending station. The
sending station can check the returning frame to see whether the frame was seen and
subsequently copied by the destination.
A station can hold a token for a specific duration of time. During this time, it has to
complete its transmission and regenerates the token in ring. Whenever a station finishes
its transmissions, the other station grabs the token and starts its own transmission.
Priority System
Token Ring networks provide a user-configurable priority system that allows
stations that are designated as having a high-priority to use the network more frequently.
Token Ring frames have two fields that control priority - the priority field, and
the reservation field. Only stations with a priority equal to, or higher than, the value
contained in a token's priority field can acquire the token. Once the token is in use, only
stations with a priority value higher than that of the transmitting station can reserve the
token for the next pass around the network. When the next token is generated, it is set to
the priority of the reserving station. Any station that raises the token's priority level must
restore it to the previous level after use.
Fault Management
One station (it can be any station on the network) is selected to be the active
monitor. The active monitor acts as a central source of timing information for the other
stations on the network, and performs various maintenance functions, including making
sure that there is always a token available on the network. The active monitor also sets
the monitor bit on any data or command frame it encounters on the ring so that, in the
event that a sending device fails after transmitting a frame, the frame can be prevented
from circling the ring endlessly and thereby denying access to the network for other
stations. If the active monitor receives a frame with the monitor bit already set, it removes
the frame from the ring and generates a new token.
The use of a multi station access unit (or wiring center) in a star topology
contributes to network reliability, since these devices can be configured to check for
problems and remove faulty stations from the ring if necessary. A Token Ring algorithm
called beaconing can be used to detect certain types of network fault. When a station
detects a serious problem on the network (a cable break, for example), it transmits
a beacon frame which initiates an auto-reconfiguration process. Stations that receive a
beacon frame perform diagnostic procedures and attempt to reconfigure the network
around the failed areas. Much of this reconfiguration process can be handled internally by
the MSAU. The MSAU contains relays that switch a computer into the ring when it is
turned on, or out of the ring when the computer is powered off. A MSAU has a number of
ports to which network devices can be connected, a ring-out port allowing the unit to be
connected to another MSAU, and a ring-in port that can accept an incoming connection
from another MSAU. A number of MSAUs can thus be connected together in daisy-chain
fashion to create a larger network. The ring-out port of the last MSAU in the chain must be
connected back to the ring-in port of the first MSAU.
Token Frame Fields
The three token frame fields illustrated in Figure 9-3 are summarized in the descriptions
that follow:
Start delimiter - Alerts each station of the arrival of a token (or data/command frame).
This field includes signals that distinguish the byte from the rest of the frame by violating
the encoding scheme used elsewhere in the frame.
Access-control byte - Contains the Priority field (the most significant 3 bits) and the
Reservation field (the least significant 3 bits), as well as a token bit (used to differentiate a
token from a data/command frame) and a monitor bit (used by the active monitor to
determine whether a frame is circling the ring endlessly).
End delimiter - Signals the end of the token or data/command frame. This field also
contains bits to indicate a damaged frame and identify the frame that is the last in a logical
sequence.
Data/Command Frame Fields
Data/command frames have the same three fields as Token Frames, plus several others.
The Data/command frame fields illustrated in Figure 9-3 are described in the following
summaries:
Start delimiter - Alerts each station of the arrival of a token (or data/command frame).
This field includes signals that distinguish the byte from the rest of the frame by violating
the encoding scheme used elsewhere in the frame.
Access-control byte - Contains the Priority field (the most significant 3 bits) and the
Reservation field (the least significant 3 bits), as well as a token bit (used to differentiate a
token from a data/command frame) and a monitor bit (used by the active monitor to
determine whether a frame is circling the ring endlessly).
Frame-control bytes - Indicates whether the frame contains data or control information.
In control frames, this byte specifies the type of control information.
Destination and source addresses - Consists of two 6-byte address fields that identify
the destination and source station addresses.
Data - Indicates that the length of field is limited by the ring token holding time, which
defines the maximum time a station can hold the token.
Frame-check sequence (FCS) - Is filed by the source station with a calculated value
dependent on the frame contents. The destination station recalculates the value to
determine whether the frame was damaged in transit. If so, the frame is discarded.
End Delimiter - Signals the end of the token or data/command frame. The end delimiter
also contains bits to indicate a damaged frame and identify the frame that is the last in a
logical sequence.
Frame Status - Is a 1-byte field terminating a command/data frame. The Frame Status
field includes the address-recognized indicator and frame-copied indicator.
MCQs:
1. IEEE 802.5 is ____________
A Token bus
B Ethernet
C Token ring
D Voice data transmissions
3. Which of the following device copies electrical signals from one Ethernet to another?
A Bridge
B Repeater
C Hub
D Passive hub
5. Token Ring employs this mechanism for detecting and compensating for network faults and multiple
tokens in a Token Ring network.
A. Multicast
B. FDDI
C. Active monitor
D. Ethernet
6. Consider a token ring network with a length of 2 km having 10 stations including a monitoring
station. The propagation speed of the signal is 2 × 108 m/s and the token transmission time is
ignored. If each station is allowed to hold the token for 2 μsec, the minimum time for which the
monitoring station should wait (in μsec)before assuming that the token is lost is _______.
(A) 28 to 30
(B) 20 to 22
(C) 0 to 2
(D) 31 to 33
7. In the diagram shown below L1 is an Ethernet LAN and L2 is a Token-Ring LAN. An IP packet
originates from sender S and traverses to R, as shown. The link within each ISP, and across two
ISPs, are all point to point optical links. The initial value of TTL is 32. The maximum possible
value of TTL field when R receives the datagram is
(A) 25
(B) 24
(C) 26
(D) 28
8. Consider a token ring topology with N stations (numbered 1 to N) running token ring protocol
where the stations are equally spaced. When a station gets the token it is allowed to send one
frame of fixed size. Ring latency is t p, while the transmission time of a frame is t t. All other
latencies can be neglected.
The maximum utilization of the token ring when tt =3 ms, tp = 5 ms, N = 10 is
(A) 0.545
(B) 0.6
(C) 0.857
(D) 0.961
9. Consider a token ring topology with N stations (numbered 1 to N) running token ring protocol
where the stations are equally spaced. When a station gets the token it is allowed to send one
frame of fixed size. Ring latency is t p, while the transmission time of a frame is t t. All other
latencies can be neglected.
The maximum utilization of the token ring when tt = 5 ms, tp = 3 ms, N = 15 is :
(A) 0.545
(B) 0.655
(C) 0.9375
(D) 0.961
10. Consider a 10 Mbps token ring LAN with a ring latency of 400 µs. A host that needs to
transmit seizes the token. Then it sends a frame of 1000 bytes, removes the frame after it has
circulated all around the ring, and finally releases the token. This process is repeated for every
frame. Assuming that only a single host wishes to transmit, the effective data rate is
(A) 1Mbps
(B) 2Mbps
(C) 5Mbps
(D) 6Mbps