Sei sulla pagina 1di 36

BI TP MNG TRUYN THNG CNG NGHIP

(P DNG CHO SINH VIN NGNH C IN T TRNG HSP K THUT


TP.HCM)

I. Chappter 1

Data Communications and Networking :


Questions and Answers
08:23 NETWORKING

Identify the five components of a data


communications system.
The five components of a data communications system
are:

1. Message
2. Sender
3. Receiver
4. Protocol
5. Medium

What are the advantages of distributed processing?


The advantages of distributed processing include:

1. Reliability
1
2. Security
3. Collaboration via information sharing
4. Faster processing due to work being distributed
among several systems.

What are the three criteria necessary for an effective and


efficient network?
The three criteria necessary for an effective and efficient
network are:

1. Performance
2. Reliability
3. Security

What are the advantages of a multipoint connection over a


point-to-point connection?
The advantages of a multipoint connection over a point-to-
point connection are ease of installation, low cost,
reliability. A point to point connection is used for
connecting 2 devices, whereas in a multipoint connection
more than 2 devices share the communication link.
Therefore, multipoint connection provides more
reliability.It is easier to add more users in a multipoint
connection, than creating individual connections between

2
all users separately. This also leads to low cabling cost and
installation cost.

What are the two types of line configuration?


There are two types of line configurations: Multipoint and
point to point. A multipoint line configuration connects
multiple users, while a point to point connection
maintains individual connection links between all pairs of
users.

Categorize the four basic topologies in terms of line


configuration.
There are four basic network topologies - bus, ring, mesh
and star.
Multipoint: Bus, Ring. A bus topology consists of a single
cable connecting all devices in the network. Same goes for
a ring topology, where a single ring connection is used to
connect all devices together. The devices communicate via
the shared cable.
Point to point: Mesh, Star. A mesh topology consists of a
network of devices all connected to each other
individually. Same goes for a star topology. Each device is
connected to almost every other device in this network.

3
What is the difference between half-duplex and full-duplex
transmission modes?
In half duplex mode, both stations can transmit and
receive, but only one at a time. When one station sends a
message, it cannot receive messages. In full duplex mode,
both stations can transmit and receive messages
simultaneously.

Name the four basic network topologies, and cite an


advantage of each type.
The four basic network topologies include bus, ring, star
and mesh. The advantages of each topology are mentioned
below:
Mesh: Robust, secure, privacy, reduced traffic
Star: Robust, less expensive than mesh
Bus: Easy to install, inexpensive, less cabling
Ring: Easy to install and reconfigure, fault isolation

For n devices in a network, what is the number of cable links


required for a mesh, ring, bus, and star topology?
The number of cable links required by each network
topology are given below. n is the number of devices in the
network.
Mesh: n * (n-1) / 2
4
Ring: n
Bus: n + 1 (n for cables, 1 for backbone)
Star: n

What are some of the factors that determine whether a


communication system is a LAN or WAN?
Geographical area spanned by a network determines
whether it is a LAN or a WAN. A LAN, or Local Area
Network, spans a relatively smaller area, whereas a WAN,
or Wide Area Network, covers a much larger area. Also,
WANs have a higher propagation delay than LANs because
of the large distance to be covered.

What is an internet? What is the Internet?


The internet is a general term for an interconnected
network, while the Internet refers to a specific worldwide
internetwork.

Why are protocols needed?


Protocols are set of rules and standards which are used to
facilitate timely and accurate communication between
multiple devices with different configurations.
5
Why are standards needed?
Standards are needed to create and maintain an open and
competitive market for manufacturers to coordinate
protocol rules, and thus guarantee compatibility of data
communication technologies.

What is the maximum number of characters or symbols that


can be represented by Unicode?
Unicode uses 32 bits, so maximum number of characters
or symbols is 2^32.

A color image uses 16 bits to represent a pixel. What is the


maximum number of different colors that can be
represented?
The maximum number of different colors that can be
represented is 2^16.

Assume six devices are arranged in a mesh topology. How


many cables are needed? How many ports are needed for
each device?

6
Let n be the number of connected devices in the network.
Now, for mesh topology, we know the equation is no. of
cables = n * (n-1)/2 = 6 * 5 / 2 = 15 cables. Number of
devices connected per device = n-1 = 5, so number of ports
per device = 5.

For each of the following four networks, discuss the


consequences if a connection fails.

a. Five devices arranged in a mesh topology


No major setback to the complete network, if one
connection fails, others will continue to work.

b. Five devices arranged in a star topology (not counting the


hub)
Connection to that particular device is lost, others can
communicate.

c. Five devices arranged in a bus topology


If the backbone connection fails, then all communication
is over.
7
d. Five devices arranged in a ring topology
One failed connection will disable the entire network

You have two computers connected by an Ethernet hub at


home. Is this a LAN, a MAN, or a WAN? Explain your
reason.
LAN, because the geographical area spanned by the
network would be very small, connects two computers
locally.

In the ring topology in Figure 1.8, what happens if one of the


stations is unplugged?
If one station is unplugged, then the whole system would
be disconnected (if no measures are in place to bypass a
station).

In the bus topology in Figure 1.7, what happens if one of the


stations is unplugged?
If one of the stations is unplugged, connection to only that
station will be affected.
8
Draw a hybrid topology with a star backbone and three ring
networks.

Draw a hybrid topology with a ring backbone and two bus


networks.

9
10
Performance is inversely related to delay. When you use the
Internet, which of the following applications are more
sensitive to delay?
a. Sending an e-mail : Not highly sensitive to delay, once a
message is sent, it remains in the inbox for a while
b. Copying a file : Not very sensitive to delay either.
c. Surfing the Internet : It is sensitive to delay, as it is an
interactive application and users demand immediate
results.

When a party makes a local telephone call to another party,


is this a point-to-point or multipoint connection? Explain
your answer.
When a party makes a local telephone call to another
party, it will be a point to point connection because it is a
local call between only two parties.

Compare the telephone network and the Internet. What are


the similarities? What are the differences?
Similarities: 2-way communication, wired/wireless
capabilities.
Differences: Internet has file sharing system, voice and
video chat, telephone enables only voice communication.

11
Telephone-circuit switched network, Internet-packet
switched network

1. Identify the five components of a data communications system?

- Repeater

- Gateway

- Bridge

- hub

- switch

2. What are the advantages of distributed processing?

- Mot tn hieu gi i tren ng mang en tat ca cac tram theo


mot

trnh t khong kiem soat c v vay phai gan a ch cho tng


tram.

+V tat ca cac eu co kha nang phat va lang nghe do o so


lng

tram trong mang b gii han. Trong trng hp muon nang so


lng

tram tren mang phai dung bo lap.

+ Trng hp b t hoac b ngan mach th cac tram tren mang


eu

ngng hoat ong

3. What are the three criteria necessary for an effective and efficient network?

- thit b gim st

12
- plc

- cm bin

4.What are the advantages of a multipoint connection over a point-to-point connection?

Lien ket iem iem (point to point link): mot moi noi (lien ket)
ch co hai thiet b tham gia - cac ng truyen rieng biet c
thiet
lap e ket noi cac cap thiet b lai vi nhau

- Lien ket nhieu iem (multipoint): mot moi noi lien ket nhieu
hn
hai thiet b tham gia va viec trao oi d lieu theo bat ky hng
nao.
Bat c nut mang nao cung co the truyen va cung co the
phat

5.What are the two types of line configuration?

Cau truc mach vong tch cc (ring


topology)
Cau truc dang nay cac nut mang phai noi t nut nay en
nut kia tao
thanh mach vong kep kn.
Moi thanh vien eu kiem soat tn hieu. D lieu c truyen t
tram
o en tram ke theo mot quy nh nhat nh, khi d lieu en
tram
cua no th c huy bo.
Cac tram co the xem nh la mot bo khuech ai do o so lng
tram
trong tram nhieu

Cau truc cay (Tree topology): La dang cau truc bao gom cac cau
truc bus, ring, star.
ac trng cua cau truc cay la s phan cap ng dan, chia
cac
ng truc ra thanh cac nhanh
13
Cau truc mang nay thng s dung cac thiet b lien mang nh
repeater, router, bridge va gateway vi muc ch lien ket cac loai
mang khac nhau (se e cap en phan sau)

6.Categorize the four basic topologies in terms of line configuration.

Star, ring, tree,bus

7.What is the difference between half-duplex and full-duplex transmission modes?

+Truyn mt chiu (simplex transmission) d liu ch truyn mt


chiu duy nht trn mt ng truyn
+Truyn hai chiu gin on (half duplex transmission) d liu
truyn hai chiu trn mt ng truyn, ti 1 thi im ch truyn
mt chiu duy nht (hai chiu lun phin)

8.Name the four basic network topologies, and cite an advantage of each type.

Cu 6.

9.For n devices in a network, what is the number of cable links required for a mesh, ring,
bus, and star topology?

10.Why are protocols needed?

14
14.In the ring topology in Figure 1.8, what happens if one of the stations is unplugged?

t 1 ci l i ht

15.In the bus topology in


Figure 1.7, what happens if one ofthe stations is unplugged?

16. What is the relationship between period and frequency?

15
F = 1/T

15.Given the frequencies listed below, calculate the corresponding periods.

a. 24Hz

b. 8 MHz

c. 140 KHz

16.Given the following periods, calculate the corresponding frequencies.

a. 5 s

b. 12 s

c. 220 ns

17. What is the phase shift for the following?

16
a.A sine wave with the maximum amplitude at time zero // pha = pi/2

b.A sine wave with maximum amplitude after 1/4 cycle // phi = 0

c.A sine wave with zero amplitude after 3/4 cycle and increasing // phi = 3pi/2

18. A periodic composite signal with a bandwidth of 2000 Hz is composed of two sine
waves. The first one has a frequency of 100 Hz with a maximum amplitude of 20V;
the second one has a maximum amplitude of 5V. Draw the bandwidth.

17
18
19
20
21
19.Which signal has a wider bandwidth, a sine wave with a frequency of 100 Hz or a sine
wave with a frequency of 200 Hz?

22.What is the bit rate for each of the following signals?

a.A signal in which 1 bit lasts 0.001 s

b.A signal in which 1 bit lasts 2 ms

c.A signal in which 10 bits last 20 s

23.A device is sending out data at the rate of 1000 bps.

a.How long does it take to send out 10 bits?

b.How long does it take to send out a single character (8 bits)?

c.How long does it take to send a file of 100,000 characters?

24.What is the bit rate for the signal in Figure 3.34?

25. Match the following to one or more layers of the OSl model:

a. Communicates directly with user's application program

b. Error correction and retransmission

c. Mechanical, electrical, and functional interface

22
d. Responsibility for carrying frames between adjacent nodes

26. A signal travels from point A to point B. At point A, the signal power is 100 W. At
point B, the power is 90 W. What is the attenuation in decibels?

27. The attenuation of a signal is -10 dB. What is the final signal power if it was
originally 5 W?

28.Signal attenuation within optical fibers, as with metallic conductors, is usually


expressed in the logarithmic unit of the decibel. The decibel, which is used for comparing
two power levels, may be defined for a particular optical wavelength as the ratio of the
input (transmitted) optical power Pi into a fiber to the output (received) optical power Po
from the fiber as:

Pi
Number of decibels (dB ) 10 log10
Po

This logarithmic unit has the advantage that the operations of multiplication and division
reduce to addition and subtraction, while powers and roots reduce to multiplication and
division. However, addition and subtraction require a conversion to numerical values
which may be obtained using the relationship:

Pi
10( dB /10)
Po

In optical fiber communications the attenuation is usually expressed in decibels per unit
length (i.e. dB/km ) following:

Pi
dB .L 10 log10
Po

where dB is the signal attenuation per unit length in decibels which is also referred to as
the fiber loss parameter and L is the fiber length.

When the mean optical power launched into an 8 km length of fiber is 120 W, the mean
optical power at the fiber output is 3 W. Determine:

(a) The overall signal attenuation or loss in decibels through the fiber assuming there are
no connectors or splices;

(b) The signal attenuation per kilometer for the fiber.

23
(c) the overall signal attenuation for a 10 km optical link using the same fiber with splices
at 1 km intervals, each giving an attenuation of 1 dB;

(d) the numerical input/output power ratio in (c).

29. The mean optical power launched into an optical fiber link is 1.5 mW and the fiber
has an attenuation of 0.5 dB/km . Determine the maximum possible link length without
repeaters (assuming lossless connectors) when the minimum mean optical power level
required at the detector is 2 W.

Answers: 57.5 km

30. The numerical input/output mean optical power ratio in a 1 km, length of optical fiber
is found to be 2.5. Calculate the received mean optical power when a mean optical power
of 1 mW is launched into a 5 km length of the fiber (assuming no joints or connectors).

Answers: 10.0 W

31. A 15 km optical fiber link uses fiber with a loss of 1.5 dB/km. The fiber is jointed
every kilometer with connectors which give an attenuation of 0.8 dB each. Determine the
minimum mean optical power which must be launched into the fiber in order to maintain
a mean optical power level of 0.3 W at the detector

Answers: 703 W

24
28. If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of
100,000 bits out of this device?

29. A file contains 2 million bytes. How long does it take to download this file using a
56-Kbps channel? 1-Mbps channel?

30. We want to transmit 1000 characters with each character encoded as 8 bits.

a.Find the number of transmitted bits for synchronous transmission.

b.Find the number of transmitted bits for asynchronous transmission.

c.Find the redundancy percent in each case

32. Draw the graph of the NRZ-L scheme using each of the following data streams,
assuming that the last signa11evel has been positive. From the graphs, guess the
bandwidth for this scheme using the average number of changes in the signal level.
Compare your guess with the corresp.onding entry in Table 4.1.

a. 00000000

b. 11111111

c. 01010101

d. 00110011
25
33. Repeat Exercise 32 for the NRZ-I scheme.

34. Repeat Exercise 32 for the Manchester scheme.

35. Repeat Exercise 33 for the differential Manchester scheme.

1. A frame of 50 bytes is sent over a communication channel. For each of the following
cases, compute the total number of bits transmitted:

a.Asynchronous transmission with one start bit and two stop bits at each byte, and one
start of frame and one end of frame characters.

b.Synchronous transmission with one start of the frame and one end of the frame
characters.

2.For the following data, parity bits are used for one bit error correction. However, CRC
code is also used to make sure only one bit error has occurred in the data.

a.Find the parity bits

b.Compute the CRC using polynomial X^3+x+1

c.Explain how the receiver can estimate if only one or more bits are in error and what it
does in each case.

Data: 10100011

3.Compare 1-persistent and non-persistent medium access control methods. Also explain
how collision detection is combined with each of these methods.

4.A bridge is used to connect three segments of a network. Initially there is no data in the
table of the bridge. Explain:

a.How the bridge can help in increasing the efficiency of the network?

b.How the bridge can fill in its table initially?

c.What should a bridge do when the destination is not in its table?

Analog Transmission

26
1. Explain Different Digital to Analog Conversion Techniques.

2. Explain Analog to Analog Conversion Techniques.

Bandwidth Utilization: Multiplexing and Spreading

1. What is Multiplexing and Explain different types of Multiplexing?

2. Write about Frequency Division Multiplexing.

3. Write about Wavelength Division Multiplexing.

4. Write about Time Division Multiplexing.

5. What are the different spread spectrum techniques?

Transmission medium

1. What is transmission medium? What are the different types of transmission medium?

2. Write about Guided medium.

3. Write about Un-guided medium.

Switching

1. What is Switching and What are the different types of Switching Techniques?

2. Write about Circuit Switched Network.

3. Write about Datagram Network.

4. Write about Virtual Circuit Network.

27
Error Detection and Correction

1. Explain different types of errors in data transmission.

2. Write about Redundancy, Detection versus Correction, Forward Error Correction versus
Retransmission and Coding

3. Write about Block Coding and explain how the errors are detected and corrected using Block
coding?

4. What is Hamming distance and write about minimum Hamming distance?

5. What is meant by linear Block Code and explain Simple Parity-Check Code?

6. Write about Hamming codes.

7. What is cyclic code and explain Cyclic Redundancy Check (CRC) code?

8. Explain about Checksum.

Data Link Control

1. What is framing and explain different framing algorithms?

2. Write about Flow control and Error Control.

3. Write about Simplest Protocol.

4. Write about Stop and Wait protocol.

5. Write about Stop and wait with ARQ protocol.

6. Write about Go-Back-N ARQ protocol.

28
7. Write about Selective Repeat ARQ protocol.

8. Write about Piggybacking protocol.

9. Explain about HDLC Configurations, Transfer Modes and different types of frames.

10. Explain about Control Fields of HDLC frames.

Multiple Access

1. Define Random Access and list three protocols in this category

2. Write about ALOHA Protocols.

3. Write about CSMA protocol

4. Write about CSMA/CD protocol

5. Write about CSMA/CA protocol

6. Define controlled access and list three protocols in this category.

7. Define channelization and list three protocols in this category.

Connecting LANs, Backbone Networks, and Virtual LANs

1. Write about different connecting devices.

2. Write about loop problem in Transparent bridges.

3. Write about Bus Backbone network.

4. Write about Star Backbone network.

29
5. Write about connecting Remote Lans.

Process-to-Process Delivery: UDP, TCP, and SCTP

1. Explain about Process-to-Process Delivery

2. Explain about UDP.

3. Write about TCP services.

4. Write about TCP segment?

5. Write about different steps to create a TCP Connection.

6. Write about Flow Control in TCP.

7. Write about Error Control in TCP.

8. What are the different Services of SCTP?

9. What are the different Features of SCTP?

10. Write about Packet Format in SCTP?

11. How to createAn SCTP Association?

12. Write about Flow Control in SCTP?

13. Write about Error Control in SCTP?

Q.1 Hardware devices like workstations, NIC, media, servers, hubs, nodes and
switches

30
are used to implement a network. Fill in the blanks in each of the following
definitions.

a) A __server________ is a computer that stores the network programs and shared data files that
users can get access to.

b) ____switches________ are collection points for wires that interconnect workstations and
transmit messages out the single port to which the destination station is connected.

c) ____workstations____ are computers used by users to get services form the network.

d) ____hubs or switches__ are collection points for wires that interconnect workstations.

e) ____nodes or routers__ are computing devices that make decisions as to which route a piece of
data will follow next.

f) A __medium_(media)___ is a component used to transfer data in terms of signals in the


network.

g) A ___NIC____________ is a device that provide a computer a dedicated connection to the


network

Q.2 How many Network Interface Cards (NICs) are needed to implement a LAN
with 3 servers, 30 workstations and 4 hubs? Explain why.

Number of
NICs needed: __33_______

Explanation: A NIC is needed for each workstation and for each server
computer. Its the NIC that provides the workstations and the
servers a dedicated connection to the network.

Q.3 Voice communications traditionally use


a. channel switching
b. packet switching
c. both a and b
d. neither a nor b

Q.4 Data communications normally use


a. channel switching
b. packet switching
c. both a and b
d. neither a nor b

31
Q.5 A __Bridge_____ is a connecting device between separate Local Area
Networks.

Q.6 A __Router______ is a connecting device between Local Area Networks and


Wide Area Networks.

Q.7 In Data communications, digital data can be transferred using


digital signals. T F

Q.8 In Data communications, digital data can be transferred using


analog signals. T F

Q.9 In Data communications, analog data can be transferred using


analog signals. T F

Q.10 Usually, when a switch receives a message, it broadcasts the


received message to all the stations that are connected to it.
T F

Q.11 Security is a problem related to Hub operation. Explain.

When a station sends a message, a switch only transmits the message out the port
to which the destination station is attached. But in Hub operation, the hub
broadcasts the message out all ports to all attached devices. So, since all stations
receive the message, it is possible to read other people's messages using software
called "packet sniffers"

Q.12 Exhibit

32
What category of network is illustrated in the exhibit?
a. Local area network
b. Metropolitan area network
c. Broad area network
d. Campus area network

Q.13 Examples of software programs used at the Application layer of the OSI
Reference
model for creating and transmitting messages include.

a. Electronic Spreadsheets
b. Word processing
c. Web browsers
d. None of the above

Q.14 Examples of Network Architecture Models seen in class include:


(Circle all correct answers)

a. OSE Reference Model


b. Internet Model

33
c. Hybrid TCP/IP-OSI Model
d. All of the above

Q.15 Data Link layer deals with data transport issues.


T F

Q.16 Upper layers of the OSI Reference model are implemented


in software and hardware.

T F

Q.17 Session layer deals with data transport issues.


T F

Q.18 One difference between the Internet Model and the OSI Reference
Model is that the Internet model has 5 layers instead of 7.
T F

Q.19 The second lower-layer (layer 2)of the OSI Reference model is the _Data
Link__.

Q.20 The third upper-layer (layer 5) of the OSI Reference model is the
__Session____.

Q.21. Name the two main components of a Network Architecture model.

Answer: Layers
Protocols

In Data networks, an application on the sending computer cannot communicate


directly with an application on the receiving computer. The communication takes
place through Encapsulation/Deencapsulation. Answer the following questions based
on your knowledge of the Encapsulation/Deencapsulation processes when the hybrid
TCP/IP-OSI model is used.
34
Q.22 During Encapsulation/Deencapsulation, at which layer of the hybrid TCP/IP-
OSI model a trailer is usually added to the message?
a. Physical
b. Transport
c. Data Link
d. Application
e. Internet

Q.23 What is called the message created at the Internet layer?


a. frame
b. IP packet
c. TCP segment
d. datagram

Q.24 What is called the message created at the Data-Link layer?


a. a frame
b. an IP packet
c. a TCP segment
d. a datagram

Q.25 Which of the following statement(s) is/are true regarding


Encapsulation/Deencapsulation?

a. No message is created at the Physical layer


b. As soon as a message is created at a layer, it is passed down
to the next lower-layer.
c. During Deencapsulation process, protocol-related information are removed
from the received message and passed down to the next lower-layer.
d. None of the above.

Q.26 In which of these Network configurations the File Server system can be
implemented:
(Circle all correct answers)

a. Microcomputer-to-Mainframe
b. Terminal-to-Mainframe
c. Microcomputer-to-LAN
d. All of the above

Q.27 Client/Server systems are found in: (Circle all correct answers)

35
a. Microcomputer-to-LAN configurations
b. Microcomputer-to-Mainframe configurations
c. Terminal-to-Mainframe configurations
d. Terminal-to-Microcomputer configurations

Q.28. In Client/Server system, the Client could be a terminal and the


server could be a Mainframe.
T F

Q.29. Inquiry/Response applications are typical applications used with


Terminal-to-Mainframe configuration
T F

Q.30. Which of the following are true regarding Client/Server system


a) It is platform independent
b) Heavier processing is done by the client computer
c) The client and the server should have some processing capabilities
d) No processing done by the server
e) All the processing is done by user PC

Q.31. Which of the following are true regarding File Server System
a) It is platform independent
b) The client and the server should have some processing capabilities
c) No processing done by the server
d) All the processing is done by user PC

Q.32. Which of the following configuration is used for the Internet


web service, i.e. for access websites.
a) File Server System access
b) Client/server system
c) Internet access system
d) All of the above

36

Potrebbero piacerti anche