NC Sem 4
NC Sem 4
NC Sem 4
Q.1. Write answers for any two questions from below. (5 marks each – Word
limit – 500)
A.What are the four divisions made in the sliding window?
B.Compare and contrast different types of bridges.
C.What are the different types of compression techniques found in loss less
compression? Explain in brief
.
Q.2. Write short notes on all of the following topics (1 mark each - Word limit -
100)
A.What is distributed database?
B.Session Termination
C.Repeaters
D.ATM
E.Explain SNA.
Answer 1 A)
The sliding window protocol is a flow control method used in computer networks to
manage the flow of data between sender and receiver efficiently. It involves dividing
the data transmission process into four main divisions:
● Data Division: This division involves breaking the data into smaller units or
frames for transmission over the network. The sender assigns sequence
numbers to each frame to ensure accurate sequencing at the receiver's end.
● Acknowledgment Division: In this division, the receiver sends
acknowledgment (ACK) messages to the sender to confirm the successful
receipt of frames. These acknowledgments indicate which frames have been
received correctly and which need to be retransmitted.
● Retransmission Division: If the sender does not receive acknowledgments for
certain frames within a specified time period, it assumes that those frames were
lost or damaged during transmission. In this division, the sender retransmits the
missing frames to ensure reliable delivery of data.
● Out-of-Order Division: In some cases, frames may arrive at the receiver's end
out of order due to network delays or packet reordering. The receiver buffers
out-of-order frames and reassembles them in the correct order before passing
them to the upper layer protocols for further processing.
Bridges are network devices used to connect and manage traffic between two or more
network segments. They operate at the data link layer (Layer 2) of the OSI model and
use MAC addresses to forward data packets.
There are several types of bridges, each with its own characteristics and applications:
●
● Transparent Bridges: Transparent bridges are the most common type of bridge,
operating seamlessly within the network without requiring any configuration.
They learn MAC addresses by examining the source addresses of incoming
frames and maintain a MAC address table to make forwarding decisions.
Transparent bridges are commonly used to segment LANs and improve
network performance.
● Source-Route Bridges (SRB): Source-route bridges use source-routing
algorithms to forward packets based on predefined paths specified in the packet
header. Each packet contains a list of intermediate nodes (bridges) that it must
traverse to reach its destination. SRB bridges are primarily used in token-ring
networks and are less common in modern networking environments.
● Spanning Tree Protocol (STP) Bridges: Spanning tree protocol bridges are used
to prevent network loops and ensure network stability in Ethernet networks.
STP bridges use the Spanning Tree Protocol (STP) to dynamically discover and
disable redundant paths in the network topology, allowing for the creation of a
loop-free spanning tree.
● Wireless Bridges: Wireless bridges connect two or more separate network
segments wirelessly, extending the reach of the network without the need for
physical cables. They use radio signals to tr
● ansmit data between access points or wireless routers, making them ideal for
connecting remote locations or overcoming physical obstacles such as
buildings or terrain.
Answer 2
A. Distributed Database:
A distributed database is a collection of multiple interconnected databases that are
spread across different geographical locations but function as a single unified database
system. In a distributed database, data is stored and managed in a distributed manner,
with each database having its own local control and management while also sharing
data with other databases in the network.
This allows users to access and manipulate data as if it were stored in a single
centralized database, providing advantages such as improved scalability, fault
tolerance, and data availability. Distributed databases are commonly used in
environments where data needs to be accessed and shared across multiple locations or
organizations.
B. Session Termination:
C. Repeaters:
Repeaters are network devices used to regenerate and amplify signals in a network,
extending the reach and coverage of the network by boosting the strength of
transmitted signals. Repeaters operate at the physical layer (Layer 1) of the OSI model
and are primarily used in Ethernet and other wired network technologies. They receive
incoming signals, amplify them to compensate for signal degradation over long cable
lengths, and retransmit the signals to adjacent network segments. Repeaters are
commonly used in network environments where the distance between network devices
exceeds the maximum cable length supported by the network technology.
Q.1. Write answers for any two questions from below. (5 marks each – Word
limit – 500)
A.Explain public key methods. What are the two keys used in it? Explain them.
B.Describe LAN giving an example. What are the distinguishing features of
LAN?
C.Why are data communications established? What are the objectives of data
communications?
Q.2. Write short notes on all of the following topics (1 mark each - Word limit -
100)
A.Define data processing.
B.Explain multipoint configuration.
C.Define FTAM.
D.Explain data link layer.
E.Define information.
Answer 1 A)
Public Key: The public key is made available to anyone who wishes to communicate
securely with the owner of the key. It is used to encrypt data before transmission.
Once encrypted with the public key, the data can only be decrypted by the
corresponding private key. The public key can be freely distributed and shared with
others without compromising the security of the communication.
Answer 1 B)
A Local Area Network (LAN) is a network infrastructure that connects computers and
devices within a limited geographical area, such as a home, office building, school, or
campus. LANs allow users to share resources and communicate with each other
efficiently. They are typically used for local communication and data exchange,
providing high-speed connectivity within a confined area.
Example of LAN:
Imagine a small office with multiple computers, printers, and other devices connected
to a network. These devices are interconnected using Ethernet cables or wireless
connections, forming a LAN within the office premises. Employees within the office
can share files, access shared printers, communicate via email or instant messaging,
and collaborate on projects using the LAN.
Answer 2
A. Data Processing
B. Multipoint Configuration
FTAM is a network protocol used for transferring, accessing, and managing files in
distributed computing environments. It provides standardized procedures and
protocols for file transfer and file management operations between different computer
systems and platforms. FTAM supports functions such as file retrieval, file storage,
file deletion, file attribute modification, and directory navigation. It operates at the
application layer of the OSI model and uses a client-server architecture for
communication between FTAM clients and servers.
D. Data Link Layer
The data link layer is the second layer of the OSI (Open Systems Interconnection)
model, responsible for the reliable transmission of data between adjacent network
nodes over a physical link. It ensures the integrity of data transmission by providing
error detection, error correction, flow control, and framing mechanisms. The data link
layer divides data into frames, adds headers and trailers to each frame for addressing
and error checking, and manages access to the physical transmission medium.
Common protocols operating at the data link layer include Ethernet, Wi-Fi (IEEE
802.11), and Point-to-Point Protocol (PPP).
E. Information:
Information refers to processed and organized data that has meaning and significance
to the recipient. It represents knowledge or understanding derived from data analysis
or interpretation. Information is characterized by its relevance, accuracy, timeliness,
and usefulness in supporting decision-making and problem-solving. It can take
various forms, including text, numbers, images, audio, and video. Information is a
valuable resource in both personal and organizational contexts, driving
communication, innovation, and progress.