You are on page 1of 12

Assignment # 1

Subject : Data communication

Submitted By : M.Siddiq khan

Submitted To : Mam Maria Zuraiz

Sub Campus Gomal University Tank

Q.1 what is Data Communication and explain its characteristics?

Ans:- Data Communication

Data communications means the exchange of data between two devices via some form of transmission
medium such as a wire cable.

Characteristics of data Communication

1.Delivery

In data communication, data and information are shared between two devices. When the data is sent
from one end, it should be 100% delivered to the other end to successful data communication.Therefore
the delivery plays an essential role in the field of data communication.

2.Accuracy

In data communication, data and information sent from one computer are received by another
computer is accurate.Therefore accuracy is considered to be one of the significant characteristics of data
communication in the computer system

3. Timeliness:

The system must maintain timeliness. It must deliver data in a timely manner. Delayed delivery can
make the data useless to the receiver. Data must be delivered as they are produced, in the order they
are produced and without any significant delay.

4. Jitter:- Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery
of audio or video packets.
Q.2 what are the Components of Data Communication?

Ans:-

Components of Data Communication

A communication system is made up of the following components:

1.Message:

A message is a piece of information that is to be transmitted from one person to another. It could be a
text file, an audio file, a video file, etc.

2.Sender

The sender is the device that sends the data message. It can be a computer, workstation, telephone
handset, video camera, and so on.

3.Receiver:

The receiver is the device that receives the message. It can be a computer, workstation, telephone
handset, television, and so on.

4.Transmission Medium

The transmission medium is the physical path by which a message travels from sender to receiver. Some
examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio
waves.

5.Protocol

A protocol is a set of rules that govern data communications. It represents an agreement between the
communicating devices. Without a protocol, two devices may be connected but not communicating, just
as a person speaking French cannot be understood by a person who speaks only Japanese.

Q.3 Explain Different Data Flow Direction?

Ans:-Data Flow

Data flow is the flow of data between 2 points. The direction of the data flow can be separated into
three categories:
1.Simplex Data Flow

During simplex communication, data flows in only one direction on the communication medium. It flows
from the source to the destination. Examples of simplex data flow are Radio and Television broadcasts.
They go in one direction from the transmitting site to your home receiver.

2.Half Duplex Data Flow

During half duplex communication, data flows in both directions but only one direction at a time on the
data communication line. The source and destination take turns using the medium. An example of half
duplex communication is a conversation on walkie-talkies. Each person takes a turn talking. If both talk
at once - nothing occurs!

3.Full Duplex Data Flow

During full duplex communication, data flows in both directions simultaneously. Both source and
destination can send data at the same time over the medium. An example of full duplex communication
is communication using a modems. Modems are configured to allow data flow in both directions at the
same time. The source is allowed to send data to the destination while the destination is sending data
back.

Q.4 What is Network and explain characteristics of Networks?

Ans:

1.Performance

Performance can be measured in many ways, including transit time and response time. Transit time is
the amount of time required for a message to travel from one device to another. Response time is the
elapsed time between an inquiry and a response.

2.Reliability

In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it
takes a link to recover from a failure, and the network's robustness in a catastrophe.

3.Security

Network security issues include protecting data from unauthorized access, protecting data from damage
and development, and implementing policies and procedures for recovery from breaches and data
losses.
Q.5 Write about different types of connections.

Ans:-

A Network is nothing but a connection made through connection links between two or more devices.
Devices can be a
computer, printer or any other device that is capable to send and receive data. There are two ways to
connect the devices:
1. Point-to-Point connection
2. Multipoint connection
1. Point-To-Point Connection
It is a protocol which is used as a communication link between two devices. It is simple to establish. The
most common example
for Point-to-Point connection (PPP) is a computer connected by telephone line. We can connect the two
devices by means of a
pair of wires or using a microwave or satellite link.
Example: Point-to-Point connection between remote control and Television for changing the channels.

2. Multipoint Connection
It is also called Multidrop configuration. In this connection two or more devices share a single link.
There are two kinds of Multipoint Connections:
• If the links are used simultaneously between many devices, then it is spatially shared line
configuration.
• If user takes turns while using the link, then it is time shared (temporal) line configuration.

Q.6 Explain different types of topology?

Ans:-

BUS Topology

Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.

RING Topology

It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device.

STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is the
central node and all others nodes are connected to the central node.

MESH Topology

It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each
other. Mesh has n(n-1)/2 physical channels to link n devices.

TREE Topology

It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.

Q.7 Explain Different Types of Notwork?

Ans:-

LAN
• 1. Local area network is a group of computers connected with each other in a small places
such as school, hospital, apartment etc.
2. LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
MAN
• MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs and
smaller than WANs(wide area networks), a MANs covers the larger area of a city or town.
WAN
• Wide area network provides long distance transmission of data. The size of the WAN is larger
than LAN and MAN. A WAN can cover country, continent or even a whole world. Internet
connection is an example of WAN. Other examples of WAN are mobile broadband
connections such as 3G, 4G etc.

Q.8 Write about protocol and Standards.

Protocols:

A protocol is a set of rules that govern data communications. A protocol defines what is communicated,
how it is communicated, and when it is communicated. The key elements of a protocol are syntax,
semantics, and timing

1.Syntax:
The term syntax refers to the structure or format of the data, meaning the order in which they are
presented. For example, a simple protocol might expect the first 8 bits of data to be the address of the
sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the message
itself.

2.Semantics:

The word semantics refers to the meaning of each section of bits. How is a particular pattern to be
interpreted, and what action is to be taken based on that interpretation? For example, does an address
identify the route to be taken or the final destination of the message?

3.Timing:

The term timing refers to two characteristics: when data should be sent and how fast they can be sent.
For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps,
the transmission will overload the receiver and some data will be lost.

Standards:

Standards
“A standard provides a model for development that makes it possible for a product to work
regardless of the individual manufacturer|”

A.De facto:

Standards that have not been approved by an organized body but have been adopted as standards
through widespread use are de facto standards. De facto standards are often established originally by
manufacturers who seek to define the functionality of a new product or technology.

b.De jure
Standards that have been legislated by an officially recognized regulation body Subdivision of De
Facto Standards

Assignment # 2

Q.1 What are the advantages of distributed processing?

Ans:- The advantages of distributed processing include:

1.Reliability 2.Security 3.Collaboration via information sharing

4.Faster processing due to work being distributed among several systems.

Q.2 What are the three criteria necessary for an effective and efficient network?

The three criteria necessary for an effective and efficient network are:

Ans:-

1.Performance

2.Reliability

3.Security

Q.3 What are the advantages of a multipoint connection over a point-to-point connection?

Ans:- The advantages of a multipoint connection over a point-to-point connection are ease of
installation, low cost, reliability. A point to point connection is used for connecting 2 devices, whereas in
a multipoint connection more than 2 devices share the communication link. Therefore, multipoint
connection provides more reliability.It is easier to add more users in a multipoint connection, than
creating individual connections between all users separately. This also leads to low cabling cost and
installation cost.

Q.4 What are the two types of line configuration?

Ans:- There are two types of line configurations: Multipoint and point to point. A multipoint line
configuration connects multiple users, while a point to point connection maintains individual connection
links between all pairs of users.

Q.5 Categorize the four basic topologies in terms of line configuration.

Ans:-There are four basic network topologies - bus, ring, mesh and star.
Multipoint: Bus, Ring. A bus topology consists of a single cable connecting all devices in the network.
Same goes for a ring topology, where a single ring connection is used to connect all devices together.
The devices communicate via the shared cable.

Point to point: Mesh, Star. A mesh topology consists of a network of devices all connected to each other
individually. Same goes for a star topology. Each device is connected to almost every other device in this
network.

Q.6 What is the difference between half-duplex and full-duplex transmission modes?

Ans: In half duplex mode, both stations can transmit and receive, but only one at a time. When one
station sends a message, it cannot receive messages. In full duplex mode, both stations can transmit and
receive messages simultaneously.

Q.7 What are some of the factors that determine whether a communication system is a LAN or WAN?

Ans:-Geographical area spanned by a network determines whether it is a LAN or a WAN. A LAN, or Local
Area Network, spans a relatively smaller area, whereas a WAN, or Wide Area Network, covers a much
larger area. Also, WANs have a higher propagation delay than LANs because of the large distance to be
covered.

Q.8 What is the maximum number of characters or symbols that can be represented by Unicode?

Ans:- Unicode uses 32 bits, so maximum number of characters or symbols is 2^32.

Q.9 Assume six devices are arranged in a mesh topology. How many cables are needed? How many
ports are needed for each device?

Ans:- Let n be the number of connected devices in the network. Now, for mesh topology, we know the
equation is no. of cables = n * (n-1)/2 = 6 * 5 / 2 = 15 cables. Number of devices connected per device =
n-1 = 5, so number of ports per device = 5.

Q.10 For each of the following four networks, discuss the consequences if a connection fails.

a. Five devices arranged in a mesh topology

No major setback to the complete network, if one connection fails, others will continue to work.

b. Five devices arranged in a star topology (not counting the hub)

Connection to that particular device is lost, others can communicate.


c. Five devices arranged in a bus topology

If the backbone connection fails, then all communication is over.

d. Five devices arranged in a ring topology

One failed connection will disable the entire network

Q.11 You have two computers connected by an Ethernet hub at home. Is this a LAN, a MAN, or a WAN?
Explain your reason.

Ans:-LAN, because the geographical area spanned by the network would be very small, connects two
computers locally.

In the ring topology in Figure 1.8, what happens if one of the stations is unplugged?

If one station is unplugged, then the whole system would be disconnected (if no measures are in place
to bypass a station).

In the bus topology in Figure 1.7, what happens if one of the stations is unplugged?

If one of the stations is unplugged, connection to only that station will be affected.

Q.12 Draw a hybrid topology with a star backbone and three ring networks.

Ans:

.13 Draw a hybrid topology with a ring backbone and two bus networks.

Ans:-

Q.14 Performance is inversely related to delay. When you use the Internet, which of the following
applications are more sensitive to delay?

Ans:-

a. Sending an e-mail : Not highly sensitive to delay, once a message is sent, it remains in the inbox for a
while

b. Copying a file : Not very sensitive to delay either.

c. Surfing the Internet : It is sensitive to delay, as it is an interactive application and users demand
immediate results.
Q.15 When a party makes a local telephone call to another party, is this a point-to-point or multipoint
connection? Explain your answer.

Ans:- When a party makes a local telephone call to another party, it will be a point to point connection
because it is a local call between only two parties.

Q.16 Compare the telephone network and the Internet. What are the similarities? What are the
differences?

Ans:- Similarities: 2-way communication, wired/wireless capabilities.

Differences: Internet has file sharing system, voice and video chat, telephone enables only voice
communication. Telephone-circuit switched network, Internet-packet switched network

Assignment #3

Q.1 Suppose a computer sends a frame to another computer on a bus topology LAN. The
physicaldestination address of the frame is corrupted during the transmission. What happens to the
frame? How can the sender be informed about the situation?

Ans: If the corrupted destination address does not match any station address in the network, the packet
is lost. If the corrupted destination address matches one of the stations, the frame is delivered to the
wrong station. In this case, however, the error detection mechanism, available in most data link
protocols, will find the error and discard the frame.

Q.2 Suppose a computer sends a packet at the network layer to another computer somewhere in the
Internet. The logical destination address of the packet is corrupted. What happens to the packet? How
can the source computer be informed of the situation?

Ans: Before using the destination address in an intermediate or the destination node, the packet goes
through error checking that may help the node find the corruption (with a high probability) and discard
the packet. Normally the upper layer protocol will inform the source to resend the packet.

Q.3 Suppose a computer sends a packet at the transport layer to another computer somewhere in the
Internet. There is no process with the destination port address running at the destination computer.
What will happen?

Ans: Most protocols issue a special error message that is sent back to the source in this case

Q.4 If the data link layer can detect errors between hops, why do you think we need another checking
mechanism at the transport layer?
Ans: The errors between the nodes can be detected by the data link layer control, but the error at the
node (between input port and output port) of the node cannot be detected by the data Link layer.

Q.5 What is the relationship between period and frequency?

Ans: The period of a signal is the inverse of its frequency and vice versa, i.e.

T=1/f and f=1/T.

Q.6 Name three types of transmission impairment.

Ans: Three types of transmission impairment are: Attenuation, Distortion, and

Noise.

Q.7 Distinguish between baseband transmission and broadband transmission.

Ans: Baseband transmission means sending a digital or an analog signal without modulation using a low-
pass channel.Broadband transmission means to modulate signal using a band-pass channel.

Q.8 We modulate several voice signals and send them through the air. Is this baseband or broadband
transmission?

Ans: When we modulate several voice signals and send them through the air, here

modulation is involved. That means this is a broadband transmission.

Q.9 List three technique of Digital to digital conversion.

Ans:-How we represent digital data, using data signals.Three methods:

Line coding. block coding. scrambling

Q.10 What is the difference between a signal element and a data element?

Ans :-A data element is the smallest entity that represent a piece of information; this is the bit. A signal
elements is the shortest unit (timewise) of a digital signal. In other words, data elements are what we
need to send; signal element are what we can send.

Q.11 What is the difference between the data rate and signal rate.

Ans:- Data rate – Number of data elements transmitted per second. Signal rate – Number of signa
elements transmitted per second.
Q.12 Compare and contrast PCM and DM

Ans:- Both PCM and DM use sampling to convert an analog signal to a digital signal. PCM finds the value
of the signal amplitude for each sample; DM finds the change between two consecutive samples.

Q.13 What is the difference between serial and parallel transmission?

Ans: - In parallel transmission we send data several bits at a time. In serial transmission we send data
one bit at a time.

Q.14 What is the maximum data rate of a channel with a bandwidth of 200 KHz if we use four levels of
digital signaling.

Ans:- The maximum data rate can be calculated as

Nmax = 2 × B × nb = 2 × 200 KHz × log24 = 800 kbps

Q.15 An analog signal has a bandwidth of 20 KHz. If we sample this signal and send it through a 30 Kbps
channel, what is the SNRdB?

Ans:- We can first calculate the sampling rate (fs) and the number of bits per sample (nb) fmax = 0 + 4 =
4 KHz → fs = 2 × 4 = 8000 sample/s We then calculate the number of bits per sample. → nb = 30000 /
8000 = 3.75 We need to use the next integer nb = 4. The value of SNRdB is SNRdB = 6.02 × nb + 1.72 =
25.8

The End

You might also like