Upload
nickhenry
View
214
Download
0
Embed Size (px)
Citation preview
8/10/2019 GTUanswerkey
1/14
5
G C
E
1) D C, C, F .
.. C C F
1
.
.
.
2 . H . H .
3 A
.
.
.
4 C . E
5. . . E.
6 A . A . A .
7 . . .
2) E .
:
B .
.
.
.
B :
A bus topology connects each computer (node) to a single segment trunk. A trunk is a
communication line, typically coax cable, which is referred to as the bus. The signal travelsfrom one end of the bus to the other. A terminator is required at each end to absorb the signal soit does not reflect back across the bus.
8/10/2019 GTUanswerkey
2/14
, . E
( ) .
,
. ,
.
. A
.
The bus topology is passive. In other words, the computers on the bus simply listen for asignal; they are not responsible for moving the signal along.
A bus topology is normally implemented with coaxial cable.
Advantagesof bus topology:
E
F
Disadvantagesof bus topology:
D /
A ;
Star Topology :-
All of the stations in astar topologyare connected to a central unit called ahub.
8/10/2019 GTUanswerkey
3/14
. E
.
,
. H,
;
.
, .
. (, ,
.)
Star topologies are normally implemented using twisted pair cable, specifically unshieldedtwisted pair (UTP). The star topology is probably the most common form of network topologycurrently in use.
Advantagesof star topology:
E
E
C
Disadvantagesof ring topology:
F
3) E D
o
D :
D:
G D C,E,,,. C
C.
. .F E ..
C A C F E .
.
8/10/2019 GTUanswerkey
4/14
E C 63
.
; , & .
4) E .
(, E. 1947)
() .
.
.
. .
7. A
6.
5.
4.
3.
1.
2. D
8/10/2019 GTUanswerkey
5/14
B , .
- Physical layer is the lowest layer of the OSI model.-
The physical layer is concerned with transmitting raw bits over a communication
channel. It deals with the electrical and mechanical specifications of interface and
transmission media. It also deals with procedures and functions required for transmission.
- Functions of Physical layer:1.
Physical characteristics of interface and Media- The design issue of
physical layer considers the characteristics if interface between devices and
transmission media.2.
Representation of bits- Physical layer encodes the bit stream into electrical
or optical signal.3. Data rate- Physical layer defines the duration of bit which is called the data
rate.
4. Synchronization of bits- physical layer synchronizes the transmission rate
and receiving rate. D
- The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link. It makes the physical layer appear error-free to the network layer.-
Data link layer implements physical addressing.
-
Other responsibilities\functions of data link layer:
1.
Framing- The frames received from network layer is divided into manageable dataunits called frame.
2. Physical addressing- If the frames are to be sent to different systems in the network,
the data link later adds a header to the frame to define the sender and/or receiver.
3. Flow Control- When the rate of data reception is less than the rate of data producedby the sender, the data link layer imposes control mechanism to avoid overwhelming
the receiver.
4. Error control- The data link layer adds reliability to the physical layer by addingmechanisms to detect and retransmit damaged or lost frames. Error control is
normally achieved through a trailer to the end of the frame.
5. Access control- When multiple devices are connected to the same link, data link
layer will determine which device has the control over the link at any given time.
- The network layer is responsible for the source-to destination delivery of the packet,possibly across multiple networks.
- If two systems are connected to the same link, there is usually no need for a network
layer. However if two systems are attached to different networks with connecting devices
8/10/2019 GTUanswerkey
6/14
between the networks, there is often a need for the network layer to accomplish source-
to-destination delivery.-
Functions of Network layer:
1. Logical addressing- The physical addressing implemented by the data link layer
handles the addressing problem locally. When a network passes the network
boundary, an addressing system is needed to distinguish source and destination,network layer performs this function. The network layer adds a header to the packet
coming from the upper later that, among other things, includes the logical the logicaladdresses of the sender and receiver.
2. Routing- Network layer route or switch the packets to its final destination in an
internetwork.
- The transport layer is responsible for process-to-process delivery of the entire message.
- The transport layer ensures that the whole message arrives complete and in order,overseeing both error control and flow control at source-to-destination level.
-
Functions of transport layer:
1.
Service-point/port addressing- computer performs several processessimultaneously. For this reason, source-to-destination delivery means from a specific
process on one computer to a specific process on the other. The transport layer header
must therefore include a type of address called a service-point address. Thus the
transport layer gets the entire message to the correct process of the system.2.
Segmentation and recovery- A message is divided into segments, each segment
contains a sequence number which enables transport layer to resemble at the
destination.3.
Connection control- the transport layer can be either connectionless or connection-
oriented. In connectionless transport each segment is treated as an independent
packet. A connection-oriented transport layer makes connection with transport layerat the destination.
4. Flow Control- transport layer performs flow control in end to end manner rather
across single link as in data link layer.5.
Error Control-trans port layer performs error control in process-to-process manner
rather across a single link as in data link layer. Transport layer ensures error free
transmission.
-
The session layer is the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.- Functions of Session layer
1. Dialog control- Communication between two processes take place in either halfduplex or full duplex mode. The session layer manages dialog control for this
communication.
2. Synchronization- the session layer allows a process to add checkpoints orsynchronization points , to the stream of data.
8/10/2019 GTUanswerkey
7/14
- The presentation layer is concerned with the syntax nd semantics of the information
exchange between two systems.-
Functions of presentation layer
1. Translation- the processes on different systems exchange information. Different
computers use different encoding systems. The presentation layer maintains
interoperability between the two encoding system.2. Encryption- To carry sensitive information, a system must be able to ensure privacy.
Encryption means that the sender transforms the original information to another formand sends the resulting message out over the network. While decryption is the reverse
process.
3. Compression- Data compression reduces the number of bits contained in theinformation. Data Compression becomes particularly important in the transmission of
multimedia such as text, audio, and video. A
-
The application layer enables the user , whether the human or software, to access the
network. It provides user interfaces and support for services such as electronic mail.
Remote file access and transfer, shared database management, and other types ofdistributed information services.
-
Specific services provided by application layer:
1. Network Virtual Terminal- It is the software version of physical terminal that
allows a user to log onto a remote host. To do so, the application creates a softwarecopy of a terminal at the remote host. The remote host believes that it is
communicating with one of its own terminal and allows the user to log on.
2. File transfer, access and management- it allows user to access files in remote hosts,to retrieve files and to manage the files in remote computer.
3. Mail services- E-mail forwarding, storage are the services under this category.
4. Directory services- Directory services include access for global information anddistributed database.
8/10/2019 GTUanswerkey
8/14
5) C =1600H
(/)B =10 (/)
/ = 1
= B (1+/) = 1600 (1+1)
= 1600 / .
(/)B = 10 (/)
20 = 10 (/)
/ =100
= B (1+/)
= 1600 (101) = 1600 (101)/(2)
= 10,654 /
6) E .
1) A: .
A . ,
.
2) D : .
.
3) : , . . :
) ) C ) ) .
8/10/2019 GTUanswerkey
9/14
7) E
: :
A () , , , ,
.
:
E
8/10/2019 GTUanswerkey
10/14
E ,
, , , , , .
E .
Q. 3
Explain Service Primitives
A service is formally specified by a set of primitives (operations) available to a user process toaccess the service. These primitives tell the service to perform some action or report on an action
taken by a peer entity. If the protocol stack is located in the operating system, as it often is, the
primitives are normally system calls. These calls cause a trap to kernel mode, which then turnscontrol of the machine over to the operating system to send the necessary packets.
The set of primitives available depends on the nature of the service being provided. Theprimitives for connection-oriented service are different from those of connectionless service. As
a minimal example of the service primitives that might be provided to implement a reliable byte
stream in a client-server environment, consider the primitives listed here
Five service primitives for implementing a simple connection-oriented service.
Five service primitives for implementing a simple connection-oriented service.
primitive meaning
LISTEN Block waiting for an incoming connection
CONNECT Establish a connection with a waiting peer
RECEIVE Block waiting for an incoming message
SEND Send a message to the peerDISCONNECT Terminate a connection
These primitives might be used as follows. First, the server executes LISTEN to indicate that it isprepared to accept incoming connections. A common way to implement LISTEN is to make it ablocking system call. After executing the primitive, the server process is blocked until a request
for connection appears.
8/10/2019 GTUanswerkey
11/14
Next, the client process executes CONNECT to establish a connection with the server. The
CONNECT call needs to specify who to connect to, so it might have a parameter giving theserver's address. The operating system then typically sends a packet to the peer asking it to
connect, as shown in fig. The client process is suspended until there is a response. When the
packet arrives at the server, it is processed by the operating system there. When the system sees
that the packet is requesting a connection, it checks to see if there is a listener. If so, it does twothings: unblocks the listener and sends back an acknowledgement (2). The arrival of this
acknowledgement then releases the client. At this point the client and server are both running andthey have a connection established. It is important to note that the acknowledgement (2) is
generated by the protocol code itself, not in response to a user-level primitive. If a connection
request arrives and there is no listener, the result is undefined. In some systems the packet maybe queued for a short time in anticipation of a LISTEN.
Packets sent in a simple client-server interaction on a connection-oriented network.
The obvious analogy between this protocol and real life is a customer (client) calling a
company's customer service manager. The service manager starts out by being near the telephone
in case it rings. Then the client places the call. When the manager picks up the phone, theconnection is established.
The next step is for the server to execute RECEIVE to prepare to accept the first request.Normally, the server does this immediately upon being released from the LISTEN, before the
acknowledgement can get back to the client. The RECEIVE call blocks the server.
Then the client executes SEND to transmit its request (3) followed by the execution of
RECEIVE to get the reply.
The arrival of the request packet at the server machine unblocks the server process so it can
process the request. After it has done the work, it uses SEND to return the answer to the client(4). The arrival of this packet unblocks the client, which can now inspect the answer. If the client
has additional requests, it can make them now. If it is done, it can use DISCONNECT to
terminate the connection. Usually, an initial DISCONNECT is a blocking call, suspending the
client and sending a packet to the server saying that the connection is no longer needed (5).When the server gets the packet, it also issues a DISCONNECT of its own, acknowledging the
client and releasing the connection. When the server's packet (6) gets back to the client machine,
the client process is released and the connection is broken. In a nutshell, this is how connection-oriented communication works.
Of course, life is not so simple. Many things can go wrong here. The timing can be wrong (e.g.,the CONNECT is done before the LISTEN), packets can get lost, and much more. We will look
at these issues in great detail later, but for the moment, briefly summarizes how client-server
communication might work over a connection-oriented network.
Given that six packets are required to complete this protocol, one might wonder why a
connectionless protocol is not used instead. The answer is that in a perfect world it could be, in
8/10/2019 GTUanswerkey
12/14
which case only two packets would be needed: one for the request and one for the reply.
However, in the face of large messages in either direction (e.g., a megabyte file), transmissionerrors, and lost packets, the situation changes. If the reply consisted of hundreds of packets, some
of which could be lost during transmission, how would the client know if some pieces were
missing? How would the client know whether the last packet actually received was really the last
packet sent? Suppose that the client wanted a second file. How could it tell packet 1 from thesecond file from a lost packet 1 from the first file that suddenly found its way to the client? In
short, in the real world, a simple request-reply protocol over an unreliable network is ofteninadequate.
c) Define terms:
i) Data rate:
In 1924, Nyquist proved:
1.
If an arbitrary signal has been run through a filter of bandwidth H, the filtered
signal can be completely reconstructed by making only2Hsamples per second.
2. If the signal consists of Vdiscrete levels, then: maximum
data rate =2Hlog2 V bits/sec
A noiseless 3000 Hz telephone line cannot transmit binary (2-level) signals at a rate exceeding6000 bps.
In 1948, Shannon carried Nyquist's work further to extend it to the case of a channel subject to
random noise. His major result is maximum data rate =Hlog2 (1 + S/N) bits/secwhere S/Ndenotes the signal-to-noise power ratio. For a 3000 Hz telephone line with S/N=
30dB, the upper bound data rate is 30,000 bps.
In practice, it is difficult to even approachthe Shannon limit.
ii) Bandwidth:
` A voice grade line(for telephone) has a cutoff frequency near 3000 Hz. If this
type of lines are used for data transmission, we have the following numbers for some commonlyused data rates:
) E A 802.11.
8/10/2019 GTUanswerkey
13/14
The protocols used by all the 802 variants, including Ethernet, have a certain commonality ofstructure. A partial view of the 802.11 protocol stack is given in FIG. The physical layercorresponds to the OSI physical layer fairly well, but the data link layer in all the 802 protocols
is split into two or more sublayers. In 802.11, the MAC (Medium Access Control) sublayer
determines how the channel is allocated, that is, who gets to transmit next. Above it is the LLC
(Logical Link Control) sublayer, whose job it is to hide the differences between the different 802variants and make them indistinguishable as far as the network layer is concerned. We studied
the LLC when examining Ethernet earlier in this chapter and will not repeat that material here.
. Part of the 802.11 protocol stack.
Logical link control
802.11
infrared
802.11
FHSS
802.11
DSSS
802.11a
OFDM
802.11b
HR-DSSS
802.11g
OFDM
The 1997 802.11 standard specifies three transmission techniques allowed in the physical layer.
The infrared method uses much the same technology as television remote controls do. The othertwo use short-range radio, using techniques called FHSS and DSSS. Both of these use a part of
the spectrum that does not require licensing (the 2.4-GHz ISM band). Radio-controlled garage
door openers also use this piece of the spectrum, so your notebook computer may find itself incompetition with your garage door. Cordless telephones and microwave ovens also use this band.All of these techniques operate at 1 or 2 Mbps and at low enough power that they do not conflict
too much. In 1999, two new techniques were introduced to achieve higher bandwidth. These are
called OFDM and HR-DSSS. They operate at up to 54 Mbps and 11 Mbps, respectively. In 2001,a second OFDM modulation was introduced, but in a different frequency band from the first one.
Now we will examine each of them briefly. Technically, these belong to the physical layer and
should have been examined but since they are so closely tied to LANs in general and the 802.11MAC sub layer.
)
E A E.
.
. .
E
A
8/10/2019 GTUanswerkey
14/14
1.
2.
:
: .
B :
1)
:
.
.
2):
.
, , .
3)
:
.
4)
D:
. F
.
5)
D:
.