You are on page 1of 4

IIMS College

Putalisadak, Kathmandu, Nepal

Name of Course Instructor: Bhagwan Thapa

Course Code: CC217                                     Course Name: Networking

Program Name: B.Sc. (Hons) Computing            Semester: 3rd                          Batch: 9th

Assignment Title: Quiz 1

Max. Marks: ______                Date of Allotment: ___________      Date of

Submission: 2020/09/30

(Write the individual/group members details below):

Name of the Student ID number Contact Number Email Id_____________

Srijan Raj Dahal 1002057677 9840224714 srijanraj2011047@iimscollege.edu.np

Evaluation: ________________________ obtained out of_______________________________

Evaluator’s Comment:
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
____________________________

-------------------------------------------

Evaluator’s Signature & Date


Srijan Raj Dahal

3rd Semester

Date: 2020/11/24

Quiz-10

1. Explain CSMA/CD with figures.


 Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is a media access
control (MAC) protocol. It explains how network devices respond when two
devices attempt to use a data channel simultaneously and encounter a
data collision. The CSMA/CD rules define how long the device should wait if a
collision occurs. The medium is often used by multiple data nodes, so each data
node receives transmissions from each of the other nodes on the medium.

Fig 1: CSMA/CD Process


There are several CSMA access modes: 1-persistent, P-persistent, and O-
persistent. 1-persistent is used in CSMA/CD systems, like Ethernet. This mode
waits for the medium to be idle, then transmits data. P-persistent is used in
CSMA/CA (collision avoidance) systems, like Wi-Fi. This mode waits for the
medium to be idle, and then transmits data with a probability p. If the data node
does not transmit the data (probability 1-p), the sender waits for the medium to be
idle again. Then, it and transmits the data with the same probability p. O-
persistent is used by CobraNet, LonWorks, and the controller area network. This
mode assigns a transmission order to each data node. When the medium becomes
idle, the data node next in line can transmit data. The data node next in line waits
for the medium to be idle again and then transmits its data. After each data node
transmits data, the transmission order is updated to reflect what data nodes have
already transmitted, moving each data node through the queue.

2. Define LAN networks. Discuss Four (4) technologies used in LAN networks.

 LAN network is the interconnection of computers within limited small area such a
school, college, office building, etc.
The four technologies used in LAN networks are as follow:-
i. Ethernet
 Ethernet is most widely used LAN Technology, which is
defined under IEEE standards 802.3. The reason behind its
wide usability is Ethernet is easy to understand, implement,
maintain and allows low-cost network implementation. Also,
Ethernet offers flexibility in terms of topologies which are
allowed. Ethernet generally uses Bus Topology. Ethernet
operates in two layers of the OSI model, Physical Layer, and
Data Link Layer. For Ethernet, the protocol data unit is
Frame since we mainly deal with DLL. In order to handle
collision, the Access control mechanism used in Ethernet is
CSMA/CD.
ii. Token Ring
 Token ring (IEEE 802.5) is a communication protocol in a
local area network (LAN) where all stations are connected
in a ring topology and pass one or more tokens for channel
acquisition. A token is a special frame of 3 bytes that
circulates along the ring of stations. A station can send data
frames only if it holds a token. The tokens are released on
successful receipt of the data frame.
iii. Fiber Distributed Data Interface (FDDI)
 FDDI (Fiber Distributed Data Interface) is a set of ANSI
and ISO standards for data transmission on fiber optic lines
in a local area network (LAN) that can extend in range up
to 200 km (124 miles). The FDDI protocol is based on the
token ring protocol. In addition to being large
geographically, an FDDI local area network can support
thousands of users. FDDI is frequently used on the
backbone for a wide area network (WAN).
iv. Asynchronous Transfer Mode (ATM)
 Asynchronous Transfer Mode (ATM) is an adaptable
technology that can be used in LANs and WANs (Wide-
Area Networks). ATM uses both switching and
multiplexing and it can provide very high bandwidth with
few delays. Instead of using frames like Ethernet uses,
ATM uses 53-byte, fixed-size cells.

You might also like