You are on page 1of 6

Q1 (A) Explain, using an example, how bit stuffing is used to preserve frame boundaries when

transmitting binary data at the Data Link level of the protocol stack?

(B) A bit stream 10011101 is transmitted using the standard CRC method. The generator
polynomial (divisor) is x3 + 1. Show the actual bit string transmitted?

Q1(B)

1
Q2 (A) Refer to the following list. Choose the correct order of data encapsulation when a device
sends information.

1. segments. 2. bits. 3. packets. 4. data. 5. frame.

data segments packets frame bits

(B) Design a three-stage, 400 X 400 switch with k=4 and n=20?

2
2KN+K(N/n)^2

2*4*400+4(400/20)^2=4800

Q3 (A) In what way selective-repeat is better than go-back-N ARQ technique?

(B) For HDLC protocol compare between NRM and ABM

NRM ABM
1 The station configuration is unbalanced. The station configuration is
balanced
2 We have one primary station and Each station can function as a
multiple secondary station primary and a secondary (acting as
peers).
3 A primary station can send commands; Each station can send commands
asecondary station can only respond. and respond.
4 Is used for both point to point and Is used only for point to point link.
multiple point links

3
Q4 (A) Explain CSMA/CD and CSMA/CA protocols used in LAN’s, discuss its advantages
and limitations?

4
(B) Explain the transition phases of the PPP connection?

5
6

You might also like