USN 1 P E PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru 100 Department of Computer Science And Engineering SCHEME AND SOLUTION FOR IA TEST- 2 Date : 21-09-2016 Subject & Code : Computer Networks-1 / 10CS55 Name of faculty : Ciji K R Max Marks : 50 Section :B&C Time : 8:30-10:00AM Note: Answer all questions 1.a. What is FDM? Briefly explain its multiplexing and demultiplexing phases with diagrams. 6 Ans: • FDM is an analog technique that can be applied when the b/w of a link (in hertz) is greater than the combined b/ws of the signals to be transmitted • In FDM, the signals generated by each sending device modulate different carrier frequencies • These modulated signals are then combined into a single composite signal that can be transported by the link • Carrier frequencies are separated by sufficient b/w to accommodate the modulated signal • These b/w ranges are the channels through which the various signals travel • Channels can be separated by strips of unused b/w- guard bands- to prevent signals from overlapping Fig: Frequency division multiplexing Fig: FDM-Multiplexing process • Each source generates a signal of a similar frequency range • Inside the multiplexer, these similar signals modulates different carrier frequencies(f1, f2, and f3) • The resulting modulated signals are then combined into a single composite signal that is sent out over a media link that has enough b/w to accommodate it Fig: FDM- Demultiplexing process • The demultiplexer uses a series of filters to decompose the multiplexed signal into its constituent component signals • The individual signals are then passed to a demodulator that separates them from their carriers and pass them to the output lines _________________________________________________________________________________________ 1.b Four 1-kbps connections are multiplexed together. A unit is 1 bit. Find (a) the duration of one bit before multiplexing (b) the transmission rate of the link (c) the duration of a time slot and (d) the duration of a frame Ans: 4 a. The duration of 1 bit before multiplexing is 1 / 1 kbps, or 0.001 s (1 ms). b. The rate of the link is 4 times the rate of a connection, or 4 kbps. c. The duration of each time slot is one-fourth of the duration of each bit before multiplexing, or 1/4 ms or 250 μs. Note that we can also calculate this from the data rate of the link, 4 kbps. The bit duration is the inverse of the data rate, or 1/4 kbps or 250 μs. d. The duration of a frame is always the same as the duration of a unit before multiplexing, or 1 ms. We can also calculate this in another way. Each frame in this case has four time slots. So the duration of a frame is 4 times 250 μs, or 1 ms. _______________________________________________________________________________________ 2.a Differentiate circuit-switched network with packet-switched network. Ans: Fig: Circuit swithed network Fig: Packet switched network 5 Circuit- switched network Packet-switched network Circuit switching takes place at the physical level Packet switching takes place at the network level The actual communication in a circuit-switched network requires 3 phases: connection setup, data transfer and connection teardown In this, only one phase is there called the data transfer phase The resources need to be reserved during the setup phase; the resources remain dedicated for the entire duration of data transfer until the teardown phase. In packet switching, there is no resource allocation for a packet. Resources are allocated on demand. Data transferred between the two stations are not packetized. The data are a continuous flow sent by the source station and received by the destination station Data are packetized and the packets may travel different paths to reach their destination There is no addressing involved during data transfer. There is end-to-end addressing used during the setup phase In datagram networks, each switch (or packet switch) has a routing table which is based on the destination address. The circuit-switched networks are not so efficient because resources are allocated for the entire duration of the connection The efficiency of a datagram network is better than that of a circuit-switched network; resources are allocated only when there are packets to be transferred The delay in this type of n/w is minimal because There is no waiting time at each switch. The total delay is due to the time needed to create the connection, transfer data, and disconnect the circuit There may be greater delay in a datagram n/w than in a circuit-switched network, because each packet may experience a wait at a switch before it is forwarded _______________________________________________________________________________________ 2.b Explain frequency hopping spread spectrum(FHSS) with diagrams 5 Ans: • The FHSS technique uses M different carrier frequencies that are modulated by the source signal • At one moment, the signal modulates one carrier frequency; at the next moment, the signal modulates another carrier frequency • Although the modulation is done with one carrier frequency at a time, M frequencies are used in the long run • The b/w occupied by a source after spreading is BFHSS >>B Fig: FHSS • A pseudorandom code generator called pseudorandom noise(PN), creates a k-bit pattern for every hopping period Th • The frequency table uses the pattern to find the frequency to be used for this hopping period and passes it to the frequency synthesizer • The frequency synthesizer creates a carrier signal of that frequency, and the source signal modulates the carrier signal Fig: Frequency selection in FHSS • If there are many k-bit patterns and the hopping period is short, a sender and receiver can have privacy • If an intruder tries to intercept the transmitted signal, he can only access a small piece of data because he does not know the spreading sequence to quickly adapt herself to the next hop • The scheme also has an antijamming effect • A malicious sender maybe able to send noise to jam the signal for one hopping period(randomly), but not for the whole period Fig: FHSS Cycles __________________________________________________________________________________ 3.a What is TDM? Explain with diagrams. How does statistical TDM overcome the disadvantage of synchronous TDM? 6 Ans: • TDM is a digital process that allows several connections to share the high b/w of a link • Instead of sharing a portion of the b/w as in FDM, time is shared; each connection occupies a portion of the time in the link • The TDM is, in principle, a digital multiplexing technique; digital data from different sources are combined into one time shared link Fig: TDM • In synchronous TDM, the data flow of each input connection is divided into units, where each input occupies one input time slot • A unit can be 1 bit, one character or one block of data • Each input unit becomes one output unit and occupies one output time slot • However, the duration of an output time slot is n times shorter than the duration of an input time slot • If an input time slot is T s, the output time slot is T/n s, where n is the number of connections • In other words, a unit in the output connection has a shorter duration; it travels faster Fig: Synchronous TDM • In synchronous TDM, each input has a reserved slot in the output frame; this can be inefficient if some i/p lines have no data to send • In statistical TDM, slots are dynamically allocated to improve b/w efficiency • Only when an i/p line has a slot’s worth of data to send, it is given a slot in the o/p frame • In statistical multiplexing, the no of slots in each frame is less than the no of i/p lines • The multiplexer checks each i/p line in a round-robin fashion; it allocates a slot for an i/p line if the line has a data to send; otherwise, it skips the line and checks the next line • In statistical TDM, a slot needs to carry data as well as the address of the destination Fig: TDM slot comparison _____________________________________________________________________________________ 3.b What is a virtual circuit network? List five characteristics of the same. 4 Ans: A virtual-circuit network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. Characteristics of VCNs: 1. As in a circuit-switched network, there are setup and teardown phases in addition to the data transfer phase 2. Resources can be allocated during the setup phase, as in a circuit-switched n/w , or on demand as in a datagram n/w 3. As in a datagram n/w, data are packetized, and each packet carries an address in the header, which has the local jurisdiction(it defines what should be the next switch and the channel on which the packet is being carried) 4. As in a circuit-switched n/w, all packets follow the same path established during the connection 5. A VCN is normally implemented in the data-link layer, while a circuit switched n/w is implemented in the physical layer and a datagram n/w in the network layer Fig: Virtual circuit network __________________________________________________________________________________ 4. Explain the working of CSMA/CD with diagrams. 10 • CSMA/CD is Carrier Sense Multiple Access with Collision Detection • The CSMA method does not specify the procedure following a collision; CSMA/CD augments the algorithm to handle the collision • In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If there is a collision, the frame is sent again • Figure shows the collision of the first bit in CSMA/CD • At time t1, station A has executed its persistence procedure and starts sending the bits of its frame • At time t2, station C has not yet sensed the first bit sent by A. Station C executes its persistence procedure and starts sending the bits in its frame, which propagate both to the left and to the right • The collision occurs some time after time t2. • Station C detects a collision at time t3 when it receives the first bit of A’s frame. It immediately aborts the transmission • Station A detects collision at time t4 when it receives the first bit of C’s frame. It also immediately aborts transmission • Station A transmits for the duration t4-t1; C transmits for the duration t3-t2 • For the protocol to work, the length of any frame divided by the bit rate must be more than either of these durations • At time t4, the transmission of A’s frame , though incomplete, is aborted; At time t3, the transmission of C’s frame, though incomplete, is aborted; Fig: Collision of the first bit in CSMA/CD Persistence methods: • The p-persistent method is used if the channel has time slots with a slot duration equal to or grater than the maximum propagation time • The p-persistent method combines the advantages of the other two strategies • It reduces the chance of collision and improves efficiency. In this method, after the station finds the line idle, it follows these steps: 1. With probability p, the station sends its frame 2. With probability q=1-p, the station waits for the beginning of the next time slot and checks the line again a. If the line is idle, it goes to step1 b. If the line is busy, it acts as though a collision has occurred and uses the back-off procedure Fig: Flow diagram for CSMA/CD • Initialize K=0, which is the number of attempts • Apply any of the persistence methods to transmit a frame • In CSMA/CD transmission and collision detection is a continuous process; we do not send the entire frame and then look for a collision; the station transmits and receives continuously and simultaneously(using two different ports); a loop is used to show that transmission is a continuous process • We constantly monitor to detect one of two conditions: either transmission is finished or a collision is detected. Either event stops transmission • When we come out of the loop, if a collision has not been detected, then the transmission is complete; the entire frame is transmitted. Otherwise, a collision has occurred • In case of collision, send a short jamming signal that enforces the collision in case other stations have not yet sensed the collision • Increment K by one. If it’s less than Kmax, then a random number between 0 and 2K-1 is randomly chosen and multiplied by Tp (max propagation time) or Tfr(average time required to send out a frame) to find TB which is the back-off time • Repeat the procedure form the step which applies the persistence method to send the frame • After a maximum number of retransmission attempts Kmax, a station must give up and try later • The value of Kmax is usually chosen as 15 _______________________________________________________________________________________ 5.a A slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system(all stations together) produces a) 1000 frames per second b) 500 frames per second c) 250 frames per second 4 Ans: Solution The frame transmission time is 200/200 kbps or 1 ms. a. If the system creates 1000 frames per second, this is 1 frame per millisecond. The load is 1. In this case S = G× e−G or S = 0.368 (36.8 percent). This means that the throughput is 1000 × 0.0368 = 368 frames. Only 386 frames out of 1000 will probably survive. If the system creates 500 frames per second, this is (1/2) frame per millisecond. The load is (1/2). In this case S = G × e−G or S = 0.303 (30.3 percent). This means that the throughput is 500 × 0.0303 = 151. Only 151 frames out of 500 will probably survive. c. If the system creates 250 frames per second, this is (1/4) frame per millisecond. The load is (1/4). In this case S = G × e −G or S = 0.195 (19.5 percent). This means that the throughput is 250 × 0.195 = 49. Only 49 frames out of 250 will probably survive. ______________________________________________________________________________________ 5.b. Explain any two controlled access methods with neat diagrams. 6 Ans: In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Two controlled access methods are Reservation and Polling. Reservation • • In this method, a station needs to make a reservation before sending data Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval • • • • • If there are N stations in the system, there are exactly N reservation minislots in the reservation frame Each minislot belongs to a station. When a station needs to send a data frame, it makes a reservation in its own minislot The stations that have made reservations can send their data frames after the reservation frame Figure 12.18 shows a situation with 5 stations and a 5 minislot reservation frame In the 1st interval, only stations 1,3 and 4 have made reservations. In the second interval, only station 1 has made a reservation Fig: Reservation access method • • • • • • • • • • • • • • Polling Poling works with topologies in which one device is designated as a primary station and the other devices are secondary stations All data exchanges must be made through the primary device even when the ultimate destination is a secondary device The primary device controls the link; the secondary devices follow its instructions It is up to the primary device to determine which device is allowed to use the channel at a given time. The primary device, therefore, is always the initiator of a session If the primary wants to receive data, it asks the secondaries if they have anything to send; this is called poll function If the primary wants to send data, it tells the seconday to to get ready to receive; this is called the select function The select function is used whenever the primary device has something to send Since the primary controls the link, it knows when the link is available; but doesn’t know whether the target device is ready to receive So the primary must alert the secondary to the upcoming transmission and wait for an ack of the secondary’s ready status Before sending the data, the primary creates and transmits a select(SEL) frame, one field of which includes the address of the intended secondary The poll function is used by the primary device to solicit transmissions from the secondary devices When the primary is ready to receive data, it must ask (poll) each device in turn if it has anything to send When the first secondary is approached, it responds either with an NAK frame if it has nothing to send, or with data(in the form of a data frame) if it has. If the response is negative(NAK), then the primary polls the next secondary in the same manner until it finds one with data to send • When the response is positive(a data frame), the primary reads the frame and returns an ack(ACK frame), verifying its receipt Fig: Select and poll functions in polling access method ******** B.E Semester V
© Copyright 2026 Paperzz