Set-1
1. Discuss the advantages and disadvantages of synchronous and asynchronous transmission.
Ans:1
2. Describe the ISO-OSI reference model and discuss the importance of every layer.
Ans:2
Ans:3
1. Fourier analysis: In 19th century, the French mathematician Fourier proved that any periodic function of time g (t) with period T can be constructed by summing a number of cosines and sins. (3.1)
(a)
binary
signal
(b-e)
Successive
approximation
Any transmission facility cannot pass all the harmonics and hence few of the harmonics are diminished and distorted. The bandwidth is restricted to low frequencies consisting of 1, 2, 4, and 8 harmonics and then transmitted. Figure 3.1(b) to 3.1(e) shows the spectra and reconstructed functions for these band-limited signals. Limiting the bandwidth limits the data rate even for perfect channels. However complex coding schemes that use several voltage levels do exist and can achieve higher data rates. 3. Maximum data rate of a channel In communications, it is not really the amount of noise that concerns us, but rather the amount of noise compared to the level of the desired signal. That is, it is the ratio of signal to noise power that is important, rather than the noise power alone. This Signal-to-Noise Ratio (SNR), usually expressed in decibel (dB), is one of the most important specifications of any communication system. If an arbitrary signal is passed through the Low pass filter of bandwidth H, the filtered signal can be completely reconstructed by making only 2H samples per second. Maximum data rate = 2H.log2 (V) bits per second. For a noisy channel with bandwidth is again H, knowing signal to noise ratio S/N, the maximum data rate according to Shannon is given as Maximum data rate = H.log2 (1+S/N) bits per second.
4. Explain what all facilities FTP offers beyond the transfer function?
Ans:4 a) Interactive Access: It provides an interactive interface that allows humans to easily interact with remote servers.
Ans:5
Echo Request and Echo Reply message format: The echo request contains an optional data area. The echo reply contains the copy of the data sent in the request message. The field OPTIONALDATA is a variable length that contains data to be returned to the original sender. An echo reply always returns exactly the same data as ws to receive in the request. Field IDENTIFIER and SEQUENCE NUMBER are used by the sender to match replies to requests. The value of the TYPE field specifies whether it is echo request when equal to 8 or echo reply when equal to 0. 6. In what conditions is ARP protocol used? Explain Ans:6 ARP protocol In computer networking, the Address Resolution Protocol (ARP) is the standard method for finding a hosts hardware address when only its network layer address is known. ARP is primarily used to translate IP addresses to Ethernet MAC addresses. It is also used for IP over other LAN technologies, such as Token Ring, FDDI, or IEEE 802.11, and for IP over ATM. ARP is used in four cases of two hosts communicating: 1. When two hosts are on the same network and one desires to send a packet to the other 2. When two hosts are on different networks and must use a gateway/router to reach the other host 3. When a router needs to forward a packet for one host through another router 4. When a router needs to forward a packet from one host to the destination host on the same network The first case is used when two hosts are on the same physical network. That is, they can directly communicate without going through a router. The last three cases are the most used over the Internet as two computers on the internet are typically separated by more than 3 hops. Imagine computer A sends a packet to computer D and there are two routers, B & C, between them. Case 2 covers A sending to B; case 3 covers B sending to C; and case 4 covers C sending to D. ARP is defined in RFC 826. It is a current Internet Standard, STD 37.
Set-2
1.Discuss the physical description of the different transmission medium. Ans: Physical description of the different transmission medium. A) Twisted pair They are least expensive and most widely used. They are easier to work with but limited in terms of data rate and distance. It consists of insulated cu wires arranged in regular spiral pattern . cm. the thickness of wires may be 0.40.9mm.twisted pair can be used for both analog and digital transmission. For analog signals, amplifiers are required about everyn5-6km. It commonly used telephone network and is the workhouse for communication. b) Coaxial cable Coaxial cable consists of two conductors but constructed to permit it to operate over a wider range frequency. It consists of hollow outer cylindrical conductor that surrounds a single inner wire conductor. the outer conductor is covered with a jacket or shield. The physical description of coaxial cable has a diameter of from 1 to 2.5 cm. because Of its shielded, concentric construction .coaxial cable can be used over long distance And support more stations on a shared line than twisted pair. c) Optical fiber An optical fiber has a cylindrical shape and consists of three concentric section; the core, the cladding and the jacket. The core is the inner most section and consists of one or more very thin strands, made of glass or plastic. The core has diameter in the range of 8 to 100 cm. various glasses and plastics can be used to make optical fibers. 2. Describe the following Medium Access Control Sub Layers Multiple access protocols A) Pure ALOHA Ans: Pure ALOHA : The ALOHA network was created at the University of Hawaii in 1970 under the leadership of Norman Abramson. The Aloha protocol is an OSI layer 2 protocol for LAN networks with broadcast topology. The first version of the protocol was basic: If you have data to send, send the data If the message collides with another transmission, try resending later The Aloha protocol is an OSI layer 2 protocol used for LAN. A user is assumed to be always in two states: typing or waiting. The station transmits a frame and checks the channel to see f it was successful. If so the user sees the B) Slotted ALOHA
Noise:
Noise is a third impairment. It can be define as unwanted energy from sources other than the transmitter. Thermal noise is caused by the random motion of the electrons in a wire and is unavoidable. Consider a signal as shown in figure 3.5, to which a noise shown in figure 3.6, is added may be in the channel.
Figure 3.7: Signal + Noise At the receiver, the signal is recovered from the received signal and is shown in figure 3.7. That is signals are reconstructed by sampling. Increased data rate implies "shorter" bits with higher sensitivity to noise Source of Noise Thermal: Agitates the electrons in conductors, and is a function of the temperature. It is often referred to as white noise, because it affects uniformly the different frequencies. Intermodulation:
Ans:4
Non-repudiation: Non-repudiation, or more specifically non-repudiation of origin, is an important aspect of digital signatures. By this property an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature. It deals with signatures. Not denying or reneging. Digital signatures and certificates provide nonrepudiation because they guarantee the authenticity of a document or message. As a result, the sending parties cannot deny that they sent it (they cannot repudiate it). Nonrepudiation can also be used to ensure that an e-mail message was opened. Example: how does one prove that the order was placed by the customer. Cryptanalysis: The main constraint on cryptography is the ability of the code to perform the necessary transformation. From the top-secret military files, to the protection of private notes between friends, various entities over the years have found themselves in need of disguises for their transmissions for many different reasons. This practice of disguising or scrambling messages is called encryption. In cryptography, a digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the users secret or private key, and one for verifying signatures which involves the users public key. The output of the signature process is called the "digital signature." 5. Explain mask-address pair used in update message. Discuss importance of path attributes. Ans: Update message The BGP peers after establishing a TCP connection sends OPEN message and acknowledge then. Then use UPDATE message to advertise new destinations that are reachable or withdraw previous advertisement when a destination has become unreachable. Each UPDATE message is divided into two parts:
The header contains control information for the user agents. It is structured into fields such as summary, sender, receiver, and other information about the e-mail. Body: The body is entirely for human recipient. The message itself as unstructured text; sometimes containing a signature block at the end 2 Header format The header is separated from the body by a blank line. Envelopes and messages are illustrated in figure 8.1.
Fig. 8.1: E-mail envelopes and messages The message header fields that are used in an example of figure 8.1. consists of following fields From: The e-mail address, and optionally name, of the sender of the message. To: one or more e-mail addresses, and optionally name, of the receivers of the message. Subject: A brief summary of the contents of the message. Date: The local time and date when the message was originally sent.