Q. 1. List two differences between Ethernet and Token Ring.
Linear physical topology.
None logical topology.
Ring logical topology.
By token contention.
Q. 2. In sliding window pro
Q. 32. Explain about 802.4 and 8025 IEEE standards.
Ans. 1. IEEE 802.4 or Token Bus : The IEEE 802.4 standard for media access control is known
as token bus. Token bus is a linear or tree shaped cable through which different stations re
Q. 11. Define PN (Pseudo-noice) sequence?
Ans. PN sequence is defined as a coded sequence of I and o with certain auto correlation
Q. 12. Explain the direct sequence spread spectrum (DS-SS) signals?
Ans.In the DS SS, each bit in the original s
Q 39. Diagrammatically explain TCP/IP concept. Compare OSI and TCP/IP architectures.
Discuss TCP/IP applications in detail.
What is the difference between the OSI and TCP!IP reference model?
Description of TCP/IP Model:
Internet Layer: This layer
Q. 7. Discuss the CDMA for direct sequence spread spectrum.
Ans.CDMA works differently in the l)SSS environment. Following fig. shows the working of
CDBA in DSSS environment.
Above fig. shows a configuration in which there are n users, each user, the data
Q 43. Explain the advantages of layered protocols in brief.
Ans. 1. Addressing: For every layer, it is necessary to have a mechanism to identify senders and
receivers. Since there are multiple possible destinations, some form of addressing is required in
Q. 30. What is the routers role in controlling the life time of packet?
Ans. Routers are devices that connect two or more networks. They consist of a combination of
hardware and software.
Routers use logical and physical addressing to connect two or more
Q. 33. Imagine two LAN bridges, both connecting a pair of 802.4 networks. The first bridge
is faced with 1000 512-byte frames are second that must be forwarded.
The second is faced with 200 4096-byte frames per second, which bridge will need faster
Q. 22. Draw the Block diagram of frequency hopping system and explain it briefly?
Ans.Fig. shows the Block diagram of frequency hopping system. For transmission, binary data
are fed into a modulator using some digital - to analog encoding scheme, such as
Q. 32. How much bandwidth is there is 0.1 micron of spectrum at a wavelength of 1
micron? A noiseless 4kHz channel is sampled every 1 m sec. What is maximum data rate?
Step 1: Find bandwidth
Step 2 : Find maximum data rate
If each sample is co
Chapter 1 : Introduction
* A line configuration defines the relationship of communication devices to a communication
* In a point-to-point line configuration, two and only devices are connected by a dedicated
* In a
Q. 13. State the performance parameters of DSSS system.
Ans.Some important performance parameters of a DSSS are as follows
1. Processing gain
2. Probability of errors
3. Jamming margin.
Q. 14. List down the applications of DS-SS systems entercept.
Q 37. How does ATM differ from frame relay? List and briefly define the ATM service
categories. What are the services provided by AAC?
Ans Frame relay Vs ATM
They are virtual circuit based. are NBMA technologies.
They have burst rate features
Q. 20. Explain about physical and data link layer.
Ans. Physical Layer : The physical layer is responsible for sending bits from one computer to
another. The physical layer is not concerned with the meaning of the bits, but if deals with
Data Link Layer
* Transmission errors are usually detected by physical layer of OSI model.
* Transmission errors are usually corrected at the data link layer of OSI model.
* Four common methods of error detection are:
(a) Vertical redundancy check
Q 46. Write the concept of layer protocols and layer interfaces.
Differentiate between protocol layers and protocol interfaces.
Ans. Most networks are organized as a series of layers and levels. To reduce the design
complexity networks are organised as
Q 34. Explain the various layers of TCPIIP model mentioning the protocols used
in each layer.
Describe in brief the architecture of TCPIIP model.
Explain in detail the purpose of each layer of TCP/IP model. Is OSI model used in
Q. 13. Explain the operational concept of FDD1 protocol.
Ans. Fiber Distributed Data Interface (FDDI) is a high performance fiber optic token ring, it is
similar to 802.5 and IBM token rings, except the difference that FDDI runs on fiber, not copper.
Q. 16. Explain how the address field in DQDB header functions on a MAN and LAN.
Ans. Metropolitan Area Network (MAN):
A MAN is basically a bigger version of a LAN and normally uses similar technology. It is
designed to extend over an entire city.
It can b
Q 13. Using the diagram approach, explain the switching technique for packet switching.
Packet switching, messages are broken into packets each of which includes a header with source,
destination and intermediate node address information individual
Q. 21. What is the main use of multiplexing? Explain various ways in which multiplexing
can be done.
Ans. Multiplexing is the process of simultaneously transmitting two or more individual a single
communication channel. Due to multiplexing it is possible
Q. 1. List two important functions of Data Link Layer.
Ans : 1. Functions of the data link layer are synchronization and error control for the information
which is to be transmitted over the physical link.
2. To enable the error detection, it adds error d
Q. 1. Differentiate between 100 Base TX and 100 Base Fx.
Ans. 100 Base Tx and 100 Base Fx are both type of faith Ethernet. 100 Base TX uses two pair of
shielded twisted pair. Its data rate is 100 Mbps. Whereas 100 Base Fx uses 2 pairs of optical fibre
Q. 15: With a neat flow chart give all digital-to-analog methods and explain their relevance
to modems with an Example ?
Ans Flow chart for digital-to analog conversion methods are :
Modem is a composite word that refers to the two functional entities.
Q20. Differentiate between LAN and MAN.
Ans. Difference between LAN and MAN is given below:
Design and mainte
Q 40 Discuss the layer interfaces in detail Compare LAN, WAN and MAN
Differentiate between LAN, MAN and WAN
Ans The transmission technology can be categorized broadly into two types
1 Broadcast Networks
2 Point-to-Point Network
Broadcast networks have
Q.36. Which method is used for error correction at Data Link Layer?
Ans. Hamming codes are used for error correction at data link layer:
Error Correction Code : Hamming codes are error correcting and detecting codes.
The hamming code data is now transmitt
Q 29 Differentiate between the following Peer-to-Peer and Primary-Secondary
Ans. Peer-to-Peer and Primary-Secondary Relationship.
Peer to peer
Peer to peer is a network connection
where the devices share the li
Q.35. Differentiate between connection oriented and connectionless services
UDP (User Datagram Protocol)
Q. 28. Explain the functioning of Go back by n protocol.
Ans. Go back n protocol is a stop and wait protocol in which it was assumed that the
transmission time required for a frame to arrive at the receiver plus the transmission, time for the