Beruflich Dokumente
Kultur Dokumente
Distinguishnunicast,
multicast
and
broadcast
a. Unicast: In unicast communication, there is one source and one destination. The
relationship between the source and the destination is one-to-one. In unicasting,
the router forwards the received packet through only one of its interfaces.
b. Multicast: In multicast communication, there is one source and a group of
destinations. The relationship is one-to-many. Inmulticasting, the router may
forward the received packet through several of its interfaces.
c. Broadcast: In broadcast communication, the relationship between the source and
the destination isone-to-all. There is only one source, but all the other hosts are
the destinations.
4. Question (1.0 mark): Describe briefly the differences between three technical
terms: (channel) bandwidth, transmission rate, throughput?
a. Bandwidth: The difference between the highest and the lowest frequencies of a
composite signal. It also measures the information-carrying capacity of a line or a
network
b. Transmission rate: The number of bits sent per second.
c. Throughput: The number of bits that can pass through a point in one second
5. Question (1.0 mark): Name the four basic network topologies and illustrate
them by figures: mesh, star, bus, and ring
6. Question (1.0 mark): What are the differences between physical, logical, port
and specific address? (83, )
Physical address:
It is also known as link address, is the address of a node as defined by its LAN or
WAN. It is used by Data Link layer to deliver data from one node to another within
the same network. It is generally the MAC address and is the lowest-level address.
The size and format vary depending on the network (it changes from hop to hop).
Most local-area networks use a 48-bit (6-byte) physical address written as 12
hexadecimal digits; every byte is seperated by a colon, as shown as:
07:01:02:01:2C:4B
Logical address:
Is address at the Network layer and generally IP address.
A logical address in the Internet is currently a 32-bit address that can uniquely
define a host connected to the Internet. It remains the same from hop to hop. An
example of logical address is shown as: 200.100.50.100
Port address:
Is address at Transport layer, used to identify the particular application running
on the destination machine.
It remains the same from hop to hop.
A port address in TCP/IP is 16 bits in length.
Specific address:
Is address at the Application layer and is user-friendly address. For example, the
email address (someone@vnu.edu.vn) and the Universal Resource Locator (URL)
(vnu.edu.vn)
7. Question (1.0 mark): List the roles of the data link layer in the TCP/IP model.
Role: transform the physical layer (a raw transmission facility) to a link responsible
for node-to-node communications.
Specific responsibilities of the data link layer include framing, addressing, flow
control, error control, and media access control
8. Question (1.0 mark): What are the responsibilities of the network layer in the
TCP/IP model.
The network layer is responsible for the delivery of individual packets from the
source host to the destination host.
9. Question (1.0 mark): What are the responsibilities of the transport layer in
the TCP/IP model.
The transport layer is responsible for process-to-process delivery the delivery of a
packet, part of a message, from one process to another.
10. Question (1.0 mark): What are the responsibilities of the application layer in
the TCP/IP model.
The application layer is responsible for providing services to the user.
3
Such as electronic mail, file access and transfer, access to system resources, surfing
the world wide web, and network management.
11. Question (1.0 mark): What are the differences between propagation delay and
transmission delay?
Propagation time measures the time required for a bit to travel from the sourceto the
destination
12. Question (1.0 mark): What are multiplexing and its major goal?
Multiplexing is the set of techniques that allows the simultaneous transmission of
multiple signals across a single data link.
Major goal: When the bandwidth of a link is greater than the bandwidth needs of the
devices connected to it, the bandwidthis wasted. With multiplexing technique, the link
can be shared.
13. Question (1.0 mark): Why does statistical TDM have higher bandwidth
efficiency than synchronous TDM?
Because: In synchronous TDM, each input has a served slot in the output frame. This
can be inefficient if some input lines have no data to send. In statistical time-division
multiplexing, slots are dynamically allocated to improve bandwidth efficiency. Only
when an input line has a slot's worth of data to send it is given a slot in the output
frame
14. Question (1.0 mark): Discuss the efficiency of circuit switching and packet
switching?
Circuit switching ensure the connection but waste resource.
Packet switching uses the resource efficiency but less guarantee connection
15. Question (1.0 mark): Why is ATM so called virtual-circuit switching?
ATM is a cell-switched network. A cell is a small data unit of fixed size. ATM uses
switches to route the cell from a source end point to the destination end point. Cell
networks are based on virtual circuits. A transmission path is divided into several
virtual paths. A virtual path (VP) provides a connection or a set of connections
between two switches.
16. Question (1.0 mark): What are the roles of MAC sublayer?
The MAC sublayer uses MAC protocols to ensure that signals sent from different
stations across the same channel don't collide
17. Question (1.0 mark): Why are random access protocols also known as
contention protocols?
In random access method, no rules specify (quy nh) which station should send
next. Stations competes with one another to access the medium. This is why this
method is also known as contention method (phng php u tranh).
18. Question (1.0 mark): Why does slotted-ALOHA provide better performance
than pure- ALOHA ?
Because: Pure ALOHA, the station sends a frame whenever it has a frame to send, not
divided into time; while slotted-ALOHA the time divided into time slot and a station
which started at the beginning of this slot has already finished sending its frame.
19. Question (1.0 mark): Distinguish the major difference of CSMA/CD and
CSMA/CA.
CSMA/CD: Carrier Sense Multiple Access Collision Detection
CSMA/CA: Carrier Sense Multiple Access Collision Avoidance
CSMA CD takes effect after a collision while CSMA CA takes effect before a collision.
CSMA CA reduces the possibility of a collision while CSMA CD only minimizes the
recovery time.
CSMA CD is typically used in wired networks while CSMA CA is used mostly in
wireless networks.
20. Question (1.0 mark): What are Clear-to-Send (CTS) and Request-to-Send
(RTS) of wireless LAN designed for?
CTS and RTS are designed for controlling and detecting collision. Before sending a
frame, the source station sends a control frame called the request to send (RTS). After
the destination station receive the RTS, it will send a control frame called the clear to
send (CTS), to the source station. This control frame indicates that the destination
station is ready to receive data.
21. Question (1.0 mark): Why is ATM called a asynchronous network?
Because ATM uses asynchronous time-division multiplexing to multiplex cells corning
from different channels. It uses fixed-size slots. ATM multiplexers fill a slot with a cel
lfrom any input channel that has a cell; the slot is empty if none of the channels has a
cell to send.
22. Question (1.0 mark): Explain why connection at ATM layer is considered as
connection-oriented mode.
Connection at ATM layer is considered as connection-oriented mode because: a
station that wishes to send cells to another station must first establish a connection
and, after all the cells are sent, terminate the connection
23. Question (1.0 mark): Why is an IPv4 address considered unique and
universal?
IPv4 addresses are unique.They are unique in the sense that each address defines one,
and only one, connection to the Internet. Two devices on the Internet can never have
the same address at the same time.
TheIPv4 addresses are universal in the sense that the addressing system must be
accepted by any host that wants to be connected to the Internet.
24. Question (1.0 mark): How to distinguish IPv4address classes in the classful
addressing method? How many classes are there?
25. Question (1.0 mark): What are the problems of classful addressing?
One problem with classful addressing is that each class is divided into a fixed number
of blocks with each block having a fixed size.
A large part of the available addresses were wasted.
They are unique inside the organization, but they are not unique globally.
28. Question (1.0 mark): What is NAT?
Network Address Translation (NAT): A technology that allows a private network to
use a set of private addresses for internal communication and a set of global Internet
addresses for external communication.
29. Question (1.0 mark): By using a figure, describe briefly how NAT operates.
NAT enables a user to have a large set of addresses internally and one address, or a
small set of addresses, externally.
As Figure19.10 shows, the private network uses private addresses. The router that
connects the network to the global address uses one private address and one global
address. The private network is transparent to the rest of the Internet; the rest of the
Internet sees only the NAT router with the address 200.24.5.8
30. Question (1.0 mark): Explain why communication at the network layer in
Internet is connectionless.
Because: the Internet is made of so many heterogeneous networks that it is almost
impossible to create a connection from the source to the destination without knowing
the nature of the networks in advance.
31. Question (1.0 mark): Explain why IPv4 is considered as an unreliable and
connectionless datagram protocol (a best-effort delivery service) ?
The Address Resolution Protocol (ARP) is used to glue the network and data-link
layers in mapping network-layer addresses to link-layer addresses. (19.1)
33. Question (1.0 mark): What are RIP, OSPF, BGP?
RIP: Routing Information Protocol: A routing protocol based on the distance vector
Routing algorithm.
OSPF: Open Shortest Path First: An interior routing protocol based on link state
routing
BPG: Border Gateway Protocol: An interautonomous system routing protocol based
on path vector routing
34. Question (1.0 mark): What is distance vector routing?
Distance vector routing: A routing method in which each router sends its neighbors a
list of networks it can reach and the distance to that network
There are many ways for a packet to go to node B from node A. There may be some
intermediate node from A to B such as node C, D, ... The distance between two
adjacent nodes is called cost, or weight. The shortest path from A to B is the one
whose cumulative cost is smallest.
37. Question (1.0 mark): Explain why UDP is considered as connectionless
transport layer protocol.
The User Datagram Protocol (UDP) is called a connectionless, unreliable transport
protocol. It does not add any thing to the services of IP except to provide process-to
process communication instead of host-to-host communication. Also, it performs very
limited error checking
It is an unreliable (but fast) protocol that does not contain error detection or
correction, and is not a reliable delivery mechanism.
38. Question (1.0 mark): Explain why UDP is not a reliable transport protocol.
UDP is a very simple protocol. There is no flow control, and hence no window mechanism. The receiver may overflow with incoming messages. -There is no error control
mechanism in UDP except for the checksum. This means that the sender does not
know if a message has been lost or duplicated. -Since UDP is a connectionless
protocol, it does not provide congestion control
39. Question (1.0 mark): Explain why TCP is considered as connection-oriented
transport layer protocol.
Because: It add connection-oriented featuresto the services of IP. TCP creates a
stream-oriented environment in which it accepts the responsibility of delivering the
bytes in order to the other site.
40. Question (1.0 mark): List some reasons causing congestion in networks.
Congestion in a network occurs because routers and switches have queues-buffers
that hold the packets before and after processing
If the rate of packet arrival is higher than the packet processing rate, the input queues
become longer and longer.
9
If the packet departure rate is less than the packet processing rate, the output queues
become longer and longer.
41. Question (1.0 mark): Briefly describe how Slow Start algorithm operates for
TCP congestion control?
This algorithm is based on the idea that the size of the congestion window (cwnd)
starts with one maximum segment size (MSS). The MSS is determined during
connection establishment by using an option of the same name. The size of the window
increases one MSS each time an acknowledgment is received. the window starts
slowly,but grows exponentially until it reaches a threshold.
42. Question (1.0 mark): Briefly describe how Congestion Avoidance algorithm
operates for TCP congestion control?
Undergoes an additive increase instead of an exponential one.When the size of the
congestion window reaches the slow-start threshold, the slow-start phase stops and
the additive phase begins. In this algorithm, eachtime the whole window of segments
is acknowledged(oneround), the size of the congestion window is increased by 1 until
congestion is detected.
43. Question (1.0 mark): Distinguish traffic parameters such as average data rate,
peak data rate and maximum burst size.
The average data rate is the number of bits sent during a period of time. It indicates
the average bandwidth needed by the traffic.
The peak data rate defines the maximum data rate of the traffic. It indicates the peak
bandwidth that the network needs for traffic to pass through without changing its data
flow.
The maximum burst size normally refers to the maximum length of time the traffic is
generated at the peak rate.
44. Question (1.0 mark): For best-effort traffic, which metric (delay, throughput)
is more important. Why ?