NC Sem 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

INTERNAL ASSESSMENT 1

Q.1. Write answers for any two questions from below. (5 marks each – Word
limit – 500)
A.What are the four divisions made in the sliding window?
B.Compare and contrast different types of bridges.
C.What are the different types of compression techniques found in loss less
compression? Explain in brief
.
Q.2. Write short notes on all of the following topics (1 mark each - Word limit -
100)
A.What is distributed database?
B.Session Termination
C.Repeaters
D.ATM
E.Explain SNA.

Answer 1 A)

Four Divisions in Sliding Window:

The sliding window protocol is a flow control method used in computer networks to
manage the flow of data between sender and receiver efficiently. It involves dividing
the data transmission process into four main divisions:
● Data Division: This division involves breaking the data into smaller units or
frames for transmission over the network. The sender assigns sequence
numbers to each frame to ensure accurate sequencing at the receiver's end.
● Acknowledgment Division: In this division, the receiver sends
acknowledgment (ACK) messages to the sender to confirm the successful
receipt of frames. These acknowledgments indicate which frames have been
received correctly and which need to be retransmitted.
● Retransmission Division: If the sender does not receive acknowledgments for
certain frames within a specified time period, it assumes that those frames were
lost or damaged during transmission. In this division, the sender retransmits the
missing frames to ensure reliable delivery of data.
● Out-of-Order Division: In some cases, frames may arrive at the receiver's end
out of order due to network delays or packet reordering. The receiver buffers
out-of-order frames and reassembles them in the correct order before passing
them to the upper layer protocols for further processing.

B. Comparison of Different Types of Bridges:

Bridges are network devices used to connect and manage traffic between two or more
network segments. They operate at the data link layer (Layer 2) of the OSI model and
use MAC addresses to forward data packets.

There are several types of bridges, each with its own characteristics and applications:

● Transparent Bridges: Transparent bridges are the most common type of bridge,
operating seamlessly within the network without requiring any configuration.
They learn MAC addresses by examining the source addresses of incoming
frames and maintain a MAC address table to make forwarding decisions.
Transparent bridges are commonly used to segment LANs and improve
network performance.
● Source-Route Bridges (SRB): Source-route bridges use source-routing
algorithms to forward packets based on predefined paths specified in the packet
header. Each packet contains a list of intermediate nodes (bridges) that it must
traverse to reach its destination. SRB bridges are primarily used in token-ring
networks and are less common in modern networking environments.
● Spanning Tree Protocol (STP) Bridges: Spanning tree protocol bridges are used
to prevent network loops and ensure network stability in Ethernet networks.
STP bridges use the Spanning Tree Protocol (STP) to dynamically discover and
disable redundant paths in the network topology, allowing for the creation of a
loop-free spanning tree.
● Wireless Bridges: Wireless bridges connect two or more separate network
segments wirelessly, extending the reach of the network without the need for
physical cables. They use radio signals to tr
● ansmit data between access points or wireless routers, making them ideal for
connecting remote locations or overcoming physical obstacles such as
buildings or terrain.

Answer 2

A. Distributed Database:
A distributed database is a collection of multiple interconnected databases that are
spread across different geographical locations but function as a single unified database
system. In a distributed database, data is stored and managed in a distributed manner,
with each database having its own local control and management while also sharing
data with other databases in the network.

This allows users to access and manipulate data as if it were stored in a single
centralized database, providing advantages such as improved scalability, fault
tolerance, and data availability. Distributed databases are commonly used in
environments where data needs to be accessed and shared across multiple locations or
organizations.

B. Session Termination:

Session termination refers to the process of ending a communication session between


two network devices or endpoints. In networking, sessions are established between
devices to facilitate data exchange, such as in client-server communication or
peer-to-peer communication. Session termination occurs when the communication
session is no longer needed or has completed its intended purpose. This may be
initiated by either party involved in the session or by network protocols and devices.
During session termination, resources allocated for the session are released,
connections are closed, and any necessary cleanup operations are performed to ensure
the proper termination of the session.

C. Repeaters:

Repeaters are network devices used to regenerate and amplify signals in a network,
extending the reach and coverage of the network by boosting the strength of
transmitted signals. Repeaters operate at the physical layer (Layer 1) of the OSI model
and are primarily used in Ethernet and other wired network technologies. They receive
incoming signals, amplify them to compensate for signal degradation over long cable
lengths, and retransmit the signals to adjacent network segments. Repeaters are
commonly used in network environments where the distance between network devices
exceeds the maximum cable length supported by the network technology.

D. ATM (Asynchronous Transfer Mode):

Asynchronous Transfer Mode (ATM) is a high-speed networking technology that uses


fixed-length packets called cells to transmit data over networks. ATM is designed to
support voice, video, and data communications with high bandwidth and low latency,
making it suitable for applications requiring real-time or multimedia transmission.
ATM networks operate at the physical and data link layers of the OSI model and use
virtual circuits to establish connections between network endpoints. ATM was widely
used in the telecommunications industry for backbone networks and high-speed
connections but has been largely replaced by newer technologies such as Ethernet and
IP/MPLS.

E. Systems Network Architecture (SNA):

Systems Network Architecture (SNA) is a networking architecture developed by IBM


for mainframe computer systems in the 1970s and 1980s. SNA defines a set of
protocols and standards for connecting and communicating between IBM mainframe
systems, terminals, and other devices within a network. SNA provides a hierarchical
network model consisting of various layers, including the physical, data link, network,
and session layers, similar to the OSI model. SNA was widely used in enterprise
environments for mission-critical applications such as banking, finance, and airline
reservation systems but has been largely superseded by TCP/IP-based networking
technologies.
INTERNAL ASSESSMENT 2

Q.1. Write answers for any two questions from below. (5 marks each – Word
limit – 500)
A.Explain public key methods. What are the two keys used in it? Explain them.
B.Describe LAN giving an example. What are the distinguishing features of
LAN?
C.Why are data communications established? What are the objectives of data
communications?

Q.2. Write short notes on all of the following topics (1 mark each - Word limit -
100)
A.Define data processing.
B.Explain multipoint configuration.
C.Define FTAM.
D.Explain data link layer.
E.Define information.

Answer 1 A)

Public Key: The public key is made available to anyone who wishes to communicate
securely with the owner of the key. It is used to encrypt data before transmission.
Once encrypted with the public key, the data can only be decrypted by the
corresponding private key. The public key can be freely distributed and shared with
others without compromising the security of the communication.

The most common public key methods include:


● RSA (Rivest-Shamir-Adleman): RSA is one of the earliest and widely used
public key cryptosystems. It uses the mathematical properties of large prime
numbers for encryption and decryption. In RSA, the security of the system
relies on the difficulty of factoring large composite numbers into their prime
factors.
● Elliptic Curve Cryptography (ECC): ECC is a more recent public key
cryptosystem that offers equivalent security to RSA but with shorter key
lengths, making it more efficient in terms of computational resources and
bandwidth. ECC is based on the algebraic structure of elliptic curves over finite
fields.

Answer 1 B)
A Local Area Network (LAN) is a network infrastructure that connects computers and
devices within a limited geographical area, such as a home, office building, school, or
campus. LANs allow users to share resources and communicate with each other
efficiently. They are typically used for local communication and data exchange,
providing high-speed connectivity within a confined area.

Example of LAN:

Imagine a small office with multiple computers, printers, and other devices connected
to a network. These devices are interconnected using Ethernet cables or wireless
connections, forming a LAN within the office premises. Employees within the office
can share files, access shared printers, communicate via email or instant messaging,
and collaborate on projects using the LAN.

Distinguishing Features of LAN:

● Limited Geographic Area: LANs cover a limited geographical area, typically


confined to a single building, floor, or campus. This localized scope ensures
high-speed communication and low latency between devices.
● High Data Transfer Rates: LANs provide high data transfer rates, enabling fast
communication and data exchange between devices. This is achieved through
technologies such as Ethernet, Wi-Fi, and fiber optic cables.
● Ownership and Control: LANs are owned and controlled by a single
organization or entity, such as a business, educational institution, or
government agency. The organization is responsible for setting up, maintaining,
and securing the LAN infrastructure.
● Shared Resources: LANs allow users to share resources such as printers, files,
applications, and internet connections. This promotes collaboration and
efficiency within the local network environment.
● Ease of Management: LANs are relatively easy to set up and manage compared
to larger networks such as wide area networks (WANs) or metropolitan area
networks (MANs). Network administrators can configure and monitor LAN
devices centrally, ensuring smooth operation and troubleshooting.
● Security Measures: LANs implement security measures to protect against
unauthorized access and data breaches. This may include firewalls, access
control lists (ACLs), encryption, authentication mechanisms, and intrusion
detection systems (IDS).
● Scalability: LANs can be easily expanded or scaled up to accommodate
growing network requirements. Additional devices can be connected to the
LAN infrastructure, and network capacity can be increased as needed to
support more users and applications.

Answer 2

A. Data Processing

Data processing refers to the manipulation, transformation, and organization of data to


generate meaningful information. It involves a series of operations performed on raw
data to convert it into a more useful and structured form. Data processing can include
tasks such as data entry, validation, sorting, filtering, calculation, analysis, and
presentation. The ultimate goal of data processing is to extract valuable insights,
support decision-making, and facilitate effective communication.

B. Multipoint Configuration

Multipoint configuration, also known as multipoint connection or multipoint topology,


refers to a network configuration where multiple devices are interconnected in a
shared communication medium. In a multipoint configuration, each device can
communicate directly with multiple other devices in the network without the need for
a central node or server. This setup allows for efficient communication and resource
sharing among multiple endpoints, making it suitable for applications such as video
conferencing, collaborative work environments, and distributed computing.

C. FTAM (File Transfer, Access, and Management)

FTAM is a network protocol used for transferring, accessing, and managing files in
distributed computing environments. It provides standardized procedures and
protocols for file transfer and file management operations between different computer
systems and platforms. FTAM supports functions such as file retrieval, file storage,
file deletion, file attribute modification, and directory navigation. It operates at the
application layer of the OSI model and uses a client-server architecture for
communication between FTAM clients and servers.
D. Data Link Layer

The data link layer is the second layer of the OSI (Open Systems Interconnection)
model, responsible for the reliable transmission of data between adjacent network
nodes over a physical link. It ensures the integrity of data transmission by providing
error detection, error correction, flow control, and framing mechanisms. The data link
layer divides data into frames, adds headers and trailers to each frame for addressing
and error checking, and manages access to the physical transmission medium.
Common protocols operating at the data link layer include Ethernet, Wi-Fi (IEEE
802.11), and Point-to-Point Protocol (PPP).

E. Information:

Information refers to processed and organized data that has meaning and significance
to the recipient. It represents knowledge or understanding derived from data analysis
or interpretation. Information is characterized by its relevance, accuracy, timeliness,
and usefulness in supporting decision-making and problem-solving. It can take
various forms, including text, numbers, images, audio, and video. Information is a
valuable resource in both personal and organizational contexts, driving
communication, innovation, and progress.

You might also like