DCCN IMPORTANT QUESTIONS
CHAPTER – 6
SHORT QUESTION:-
1. Define Mac.(2 marks)
Ans:-
• MAC” refers to a Media Access Control address, which is a unique identifier assigned to a network
interface controller (NIC) for use as a network address in communications within a network
segment.
• It allows devices on the same local network to communicate with each other at the data link layer
(Layer 2) of the OSI model.
2. Define CSMA/CD technique.(2 marks)
Ans:-
• CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is a network access method used
in Ethernet networks where nodes check for an idle channel (Carrier Sense) before transmitting
• It can detect collisions that occur when multiple nodes transmit simultaneously (Collision
Detection).
LONG QUESTIONS :-
3. Write short note on:- (Each 4 marks )
• CSMA/CD
• MAC
• Wireless LAN
• Ethernet
• Fiber
Ans:-
• CSMA/CD :
❖ CSMA/CD stands for Carrier Sense Multiple Access/Collision Detection.
❖ Used in traditional Ethernet networks over coaxial cables.
❖ Nodes check if the cable is idle before transmitting (Carrier Sense).
• MAC :
❖ MAC stands for Media Access Control.
❖ Unique 48-bit hardware address assigned to network interfaces.
❖ Used for communication within a local network segment.
❖ MAC addresses are used at the data link layer (Layer 2) of the OSI model.
❖ Allows devices on the same network to communicate directly.
• Wireless LAN :
❖ Wireless Local Area Network (WLAN) connects devices using radio waves
instead of cables.
❖ Uses technologies like Wi-Fi (802.11 standards).
❖ Provides mobility and flexibility in networking.
❖ Common in homes, offices, public hotspots.
• Ethernet :
❖ Ethernet is a family of wired computer networking technologies.
❖ Defines standards for cables, signals, frame formats and protocols.
❖ Originally used coaxial cables, now predominantly twisted pair and fiber optic
cables.
❖ Ethernet speeds range from 10 Mbps to 400 Gbps.
• Fiber :
❖ Fiber refers to fiber optic cables used for data transmission.
❖ Uses light pulses through thin glass or plastic strands to carry signals.
❖ Types include single-mode and multi-mode fibers.
❖ Used in various networks like Ethernet, Fiber Channel Storage Area Networks
(SANs), etc.
4. What is MAC? Describe the MAC frame format.(6 marks)
Ans:-
❖ MAC stands for Media Access Control, which is a sublayer of the Data Link Layer in the OSI model.
❖ The MAC layer is responsible for controlling access to the shared physical media and ensuring
reliable data transfer between devices on the same network segment.
❖ The MAC frame format is the structure of the data frames used for communication at the MAC
layer.
The general MAC frame format consists of the following fields:-
• Preamble: A sequence of bits used for synchronization and signal detection.
• Destination MAC Address: The unique 48-bit address of the receiving device.
• Source MAC Address: The unique 48-bit address of the sending device.
• EtherType/Length: Identifies the upper-layer protocol or the length of the data payload.
• Payload/Data: The actual data being transmitted, typically encapsulating higher-layer
protocols like IP, TCP, or UDP.
• Frame Check Sequence (FCS): A cyclic redundancy check (CRC) used for error detection
and ensuring data integrity.
5. Explain the use of bridge, hub and switch.(6 marks)
Ans:-
• Bridge:
➢ Connects and forwards data between two or more network segments.
➢ Operates at the Data Link Layer (Layer 2) of the OSI model.
➢ Learns MAC addresses and filters/forwards frames based on destination MAC addresses.
• Hub :
➢ A simple device that connects multiple devices in a star topology.
➢ Broadcasts all incoming data to all connected devices (no intelligent forwarding).
• Switch :
➢ A more intelligent device that connects multiple devices in a star topology.
➢ Operates at the Data Link Layer (Layer 2) of the OSI model.
➢ Learns MAC addresses and forwards frames selectively to the intended destination port(s).
➢ Provides dedicated bandwidth to each port, improving performance over hubs.
➢ Supports features like VLANs, Spanning Tree Protocol (STP), link aggregation, etc.
6. Explain the working principle of CSMA/CD in details.(6 marks)
Ans:-
The CSMA/CD (Carrier Sense Multiple Access/Collision Detection) protocol is used in traditional Ethernet
networks to control access to the shared medium and handle collisions.
Explanation working principle:-
• Carrier Sense -
➢ Before transmitting data, a node listens to the network cable to check if another node is already
transmitting (carrier sensing).
➢ If the cable is idle, the node starts transmitting its data frames.
• Multiple Access -
➢ Multiple nodes can access the shared medium (cable) to transmit data.
➢ However, collisions can occur if two or more nodes transmit simultaneously.
• Collision Detection -
➢ While transmitting, the node monitors the signal levels on the cable.
➢ If the node detects a colliding signal (a superimposed signal from another transmitting node), it
immediately stops transmitting and sends a jamming signal to notify all nodes of the collision.
• Collision Handling -
➢ After detecting a collision, the nodes involved wait for a random period of time (back-off period)
before attempting to retransmit.
➢ The back-off period is calculated using a truncated binary exponential back-off algorithm, which
helps reduce the probability of subsequent collisions.
7. Discuss about the different types of topologies with suitable diagram.(10 marks)
Ans:-
I. Bus Topology:-
➢ All nodes are connected to a single cable or backbone called a bus.
➢ Data is transmitted over the entire length of the bus and is received by all nodes.
➢ Termination is required at both ends of the bus to prevent signal reflections.
➢ Example: Traditional Ethernet networks using coaxial cables.
II. Star Topology :-
➢ All nodes are connected directly to a central device, typically a hub or switch.
➢ The central device acts as a relay for data transmission between nodes.
➢ Failure of the central device can disrupt the entire network.
➢ Example: Modern Ethernet networks using switches.
III. Ring Topology :-
➢ Nodes are connected in a closed loop or ring.
➢ Data travels in one direction around the ring, passing through each node.
➢ Each node acts as a repeater, regenerating the signal before passing it to the next node.
➢ Failure of a single node can disrupt the entire network.
➢ Example: Legacy Token Ring networks.
IV. Mesh Topology :-
➢ Each node is directly connected to one or more other nodes, creating a mesh-like
structure.
➢ Data can take multiple paths between nodes, providing redundancy and fault tolerance.
➢ Can be fully meshed (each node connected to all others) or partially meshed.
➢ Commonly used in Wide Area Networks (WANs) and enterprise networks.
V. Tree Topology:-
➢ Hierarchical structure with a root node at the top.
➢ Data flows from the root node to child nodes and vice versa.
➢ Commonly used in Wide Area Networks (WANs) and internet service provider (ISP)
networks.
➢ Failure of a node can affect some parts of the network but not the entire network.
VI. Hybrid Topology :-
➢ It is used when the nodes are free to take any form. It means these can be individuals
such as Ring or Star topology or can be a combination of various types of topologies
seen above.
➢ Each individual topology uses the protocol that has been discussed earlier.
8. Explain the working principle of CSMA/CD in details.(10 marks)
Ans:-
• Carrier Sense:-
✓ Before transmitting data, a node listens to the shared medium (cable) to check if another node is
already transmitting (carrier sensing).
✓ If the medium is idle (no carrier signal detected), the node can begin transmitting its data frames.
• Multiple Access :-
✓ CSMA/CD allows multiple nodes to access the shared medium for data transmission.
✓ However, since the medium is shared, there is a possibility of two or more nodes transmitting
simultaneously, leading to a collision.
• Collision Detection :-
✓ While transmitting, the node continuously monitors the signal levels on the cable by comparing
the signals it is transmitting with the signals it is receiving.
✓ If the node detects a discrepancy, it means that another node has started transmitting
simultaneously, resulting in a collision.
✓ When a collision is detected, the node immediately stops transmitting and sends a jamming
signal to notify all other nodes on the network of the collision.
• Collision Handling :-
✓ After detecting a collision, the nodes involved follow a specific procedure to recover and
retransmit their data:
1) Each node waits for a random amount of time, known as the back-off period, before attempting to
retransmit.
2) The back-off period is calculated using a truncated binary exponential back-off algorithm, where
the initial back-off time is chosen randomly from a fixed range, and the range is doubled after
each subsequent collision.
3) This exponential increase in the back-off range helps reduce the probability of repeated collisions
by spreading out the retransmission attempts of the nodes.
✓ Once the back-off period expires, the node performs carrier sensing again and transmits if the
medium is idle.