Professional Documents
Culture Documents
DEPARTMENT OF MCA
QUESTION BANK
UNIT-II
2. What is ARQ?
The general strategy of using acknowledgements and timeouts to implement reliable
delivery is called automatic repeat request (ARQ).
3. What is the key idea of Stop & Wait Protocol?
After transmitting one frame, the sender waits for an acknowledgment before
transmitting the next frame. If the acknowledgement does not arrive after a certain period of
time, the sender time out and retransmits the original frame.
4. What is CSMA/CD?
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detect. Ethernet
is a multiple access network (shared link) and the carrier sense means that all the nodes
can distinguish between an idle and busy link. collision detect means that a node listens
as it transmits and can therefore detect when a frame it is transmitting has interfered with
a frame transmitted by another node.
5. Write short notes on Ethernet.
Carrier Sense Multiple Access with Collision Detect. Ethernet is a multiple access
network (shared link) and the carrier sense means that all the nodes can distinguish
between an idle and busy link. collision detect means that a node listens as it transmits
and can therefore detect when a frame it is transmitting has interfered with a frame
transmitted by another node.
6. What is transceiver?
Transceiver is a small device directly attached to the tap and detects when the line is
idle and drives the signal when the host is transmitting.
7. What is Repeater?
Repeater propagate the signal from one segment to another
8. What is a Hub?
Hub (MultiWay Repeater) propagates the signal onto a number of segments,
possibly with different types of cable.
9. Write short notes on Ethernet address?
Ethernet host in the world has a unique address. The address belongs to the
adaptor, not the host; it is usually burned into ROM. it has six hexa decimal numbers
separated by colons. Example 8:0:2b:e4:b1:2.
10. Differentiate between Service interface and Peer-to-Peer interface.
Service interface communicate between object in the same network system.
Peer-to-peer interface communicate between object in different systems.
11. Write short notes on promiscuous mode.
In promiscuous mode it delivers all received frames to the host, but this is not the
normal mode.
12. Why Ethernet is called 1 persistent protocol?
Ethernet is said to be a 1 persistent protocol because an adaptor with a frame to
Send transmits with probability 1 whenever a busy line goes idle.
13. What is an exponential back off?
Once an adaptor has detected a collision and stopped its transmission, it waits a
certain amount of time and tries again. Each time it tries to transmit but fails, the adaptor
doubles the amount of time it waits before trying again. This strategy of doubling the
delay interval between each transmission attempt is a general technique known as
exponential back off.
14. What are the advantages of Ethernet?
15. Write short notes on Token Ring.
A number of stations connected by transmission links in a ring topology. Information
flows in one direction along the ring from source to destination and back to source.
Medium access control is provided by a small frame, the token that circulates around the
ring when all stations are idle. Only the station possessing the token is allowed to
transmit at any given time.
16. Write short notes on FDDI.
• FDDI uses a ring topology of multimode or single mode optical fiber transmission
links operating at 100 Mbps to span up to 200 kms and permits up to 500 stations.
• Employs dual counter-rotating rings.
• 16 and 48-bit addresses are allowed.
• In FDDI, token is absorbed by station and released as soon as it completes the
Frame transmission {multi-token operation}.
17. What are the 2 different classes of traffic used in FDDI?
FDDI is designed to handle two types of traffic:
– Synchronous frames that typically have tighter delay requirements (e.g., voice
and video)
– Asynchronous frames have greater delay tolerances (e.g., data traffic)
18. Write short notes on network users.
Network users want the network to provide services that their applications need; e.g.,
guarantee that each message will be delivered in order, without errors, and within a redefined
delay.
19. Write short notes on Network designers.
Network designers want a cost-effective design; e.g., network resources are efficiently
utilized and fairly allocated to users
20. Write short notes on Network Providers.
Network providers want a system that is easy to administer and manage; e.g., faults
can be easily found, system can be hot-swapped,
21. What are the requirements of an efficient Network?
UNIT-III
1.What are the network support layers and the user support layers?
Network support layers:
The network support layers are Physical layer, Data link layer and Network
layer.These deals with electrical specifications, physical connection, transport timing and
reliability.
User support layers:
The user support layers are: Session layer, Presentation layer, Application layer.
These allow interoperability among unrelated software system.
2. With a neat diagram explain the relationship of IEEE Project to the OSI model?
The IEEE has subdivided the data link layer into two sub layers:
* Logical link control (LLC)
* Medium access control (MAC)
LLC is non-architecture specific. The MAC sub layer contains a number of distinct
modules, each carries proprietary information specific to the LAN product being used.
3. What are the functions of LLC?
The IEEE project 802 models takes the structure of an HDLC frame and divides it
into 2 sets of functions. One set contains the end user portion of the HDLC frame – the
Other layers are:
Network
Data link
Physical
Other layers
Network
Logical Link Control
Media Access Control
Physical
logical address, control information, and data. These functions are handled by the IEEE
802.2 logical link control (LLC) protocol.
4. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains synchronization,
flag, flow and error control specifications necessary to move information from one place to
another, as well as the physical address of the next station to receive and route a packet.
5. What is protocol data unit?
The data unit in the LLC level is called Protocol Data Unit (PDU). It contains four fields.
e Access Point
6. What are headers and trailers and how do they get added and removed?
The control data added to the beginning of a data is called headers. The control data
added to the end of a data is called trailers. At the sending machine, when the message
passes through the layers each layer adds the headers or trailers. At the receiving machine,
each layer removes the data meant for it and passes the rest to the next layer.
7. What are the responsibilities of network layer?
The network layer is responsible for the source-to-destination delivery of packet across
multiple network links. The specific responsibilities of network layer include the following:
-adaptive routing.
16. What is time-to-live or packet lifetime?
As the time-to-live field is generated, each packet is marked with a lifetime, usually the
number of hops that are allowed before a packet is considered lost and accordingly,
destroyed. The time-to-live determines the lifetime of a packet.
17. What is meant by brouter?
A brouter is a single protocol or multiprotocol router that sometimes act as a router and
sometimes act as a bridge.
18. Write the keys for understanding the distance vector routing.
The three keys for understanding the algorithm are
ledge about the whole networks
19. Write the keys for understanding the link state routing.
The three keys for understanding the algorithm are
20. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state routing, cost
is a weighted value based on a variety of factors such as security levels, traffic or the state of
the link.
21. What is a Packet Switch?
A packet switch is a device with several inputs and outputs leading to and from the
hosts that the switch interconnects. The core job of a switch is to take packets that arrive on
an input and forward them to the right outputs.
22. Write short notes on Switch Congestion.
If the packet arrival rate exceeds the capacity of the output rate of a switch, the switch
queues the packet. If the switch is over loaded, the packet may be loosed. If it occurs often, the
switch is said to be congested.
44. What are the various types of message errors in the network?
-of-order
45. What are the various types failures that can be occurred in a network?
_ Bit errors (single and bursty)
_ Packet loss
_ Link failure
UNIT-IV
DC component
Synchronization
UNIT-II
UNIT- III
Flow control
Multiplexing
2. Explain socket in detail.
3. Explain UDP
_ User Datagram Protocol(UDP)
_ Source port address
_ Destination port address
_ Total length
_ Checksum
4. Explain TCP
_ Transmission Control Protocol(TCP)
_ Source port address
_ Destination port address
_ Sequence number
_ Acknowledgement number
4. Explain about congestion control.
_ Congestion avoidance
_ BECN
_ FECN
_ Four situations
_ Discarding
5. Explain leaky bucket and token bucket algorithm
_ Leaky bucket algorithm
_ Leaky bucket
_ Switch controlling the output rate
_ Flowchart
6. Explain the duties of transport layer.
End to end delivery
Addressing
Reliable delivery
Error control
Sequence control
Loss control
Duplication control
Flow control
Multiplexing
7. Explain socket in detail.
Introduction
Explanation
Program
8. Explain UDP & TCP.
Frame format of User Datagram Protocol(UDP)
Frame format Transmission Control Protocol(TCP)
9. Explain about congestion control.
Congestion avoidance
BECN
FECN
Four situations
Discarding
10. Explain leaky bucket and token bucket algorithm
Leaky bucket algorithm
Leaky bucket
Switch controlling the output rate
Flowchart
UNIT –V