0% found this document useful (0 votes)
21 views7 pages

DCCN Imp Questions Chapter 6

The document contains important questions and answers related to networking concepts, specifically focusing on MAC addresses, CSMA/CD techniques, and various network topologies. It provides definitions, explanations of protocols, and the working principles of devices like bridges, hubs, and switches. Additionally, it discusses the MAC frame format and details the functioning of CSMA/CD in Ethernet networks.

Uploaded by

Deba Comedy Club
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

DCCN Imp Questions Chapter 6

The document contains important questions and answers related to networking concepts, specifically focusing on MAC addresses, CSMA/CD techniques, and various network topologies. It provides definitions, explanations of protocols, and the working principles of devices like bridges, hubs, and switches. Additionally, it discusses the MAC frame format and details the functioning of CSMA/CD in Ethernet networks.

Uploaded by

Deba Comedy Club
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DCCN IMPORTANT QUESTIONS

CHAPTER – 6

SHORT QUESTION:-
1. Define Mac.(2 marks)

Ans:-

• MAC” refers to a Media Access Control address, which is a unique identifier assigned to a network
interface controller (NIC) for use as a network address in communications within a network
segment.
• It allows devices on the same local network to communicate with each other at the data link layer
(Layer 2) of the OSI model.

2. Define CSMA/CD technique.(2 marks)

Ans:-

• CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is a network access method used
in Ethernet networks where nodes check for an idle channel (Carrier Sense) before transmitting
• It can detect collisions that occur when multiple nodes transmit simultaneously (Collision
Detection).

LONG QUESTIONS :-

3. Write short note on:- (Each 4 marks )


• CSMA/CD
• MAC
• Wireless LAN
• Ethernet
• Fiber

Ans:-

• CSMA/CD :
❖ CSMA/CD stands for Carrier Sense Multiple Access/Collision Detection.
❖ Used in traditional Ethernet networks over coaxial cables.
❖ Nodes check if the cable is idle before transmitting (Carrier Sense).
• MAC :
❖ MAC stands for Media Access Control.
❖ Unique 48-bit hardware address assigned to network interfaces.
❖ Used for communication within a local network segment.
❖ MAC addresses are used at the data link layer (Layer 2) of the OSI model.
❖ Allows devices on the same network to communicate directly.
• Wireless LAN :
❖ Wireless Local Area Network (WLAN) connects devices using radio waves
instead of cables.
❖ Uses technologies like Wi-Fi (802.11 standards).
❖ Provides mobility and flexibility in networking.
❖ Common in homes, offices, public hotspots.
• Ethernet :
❖ Ethernet is a family of wired computer networking technologies.
❖ Defines standards for cables, signals, frame formats and protocols.
❖ Originally used coaxial cables, now predominantly twisted pair and fiber optic
cables.
❖ Ethernet speeds range from 10 Mbps to 400 Gbps.
• Fiber :
❖ Fiber refers to fiber optic cables used for data transmission.
❖ Uses light pulses through thin glass or plastic strands to carry signals.
❖ Types include single-mode and multi-mode fibers.
❖ Used in various networks like Ethernet, Fiber Channel Storage Area Networks
(SANs), etc.

4. What is MAC? Describe the MAC frame format.(6 marks)

Ans:-

❖ MAC stands for Media Access Control, which is a sublayer of the Data Link Layer in the OSI model.
❖ The MAC layer is responsible for controlling access to the shared physical media and ensuring
reliable data transfer between devices on the same network segment.
❖ The MAC frame format is the structure of the data frames used for communication at the MAC
layer.

The general MAC frame format consists of the following fields:-


• Preamble: A sequence of bits used for synchronization and signal detection.
• Destination MAC Address: The unique 48-bit address of the receiving device.
• Source MAC Address: The unique 48-bit address of the sending device.
• EtherType/Length: Identifies the upper-layer protocol or the length of the data payload.
• Payload/Data: The actual data being transmitted, typically encapsulating higher-layer
protocols like IP, TCP, or UDP.
• Frame Check Sequence (FCS): A cyclic redundancy check (CRC) used for error detection
and ensuring data integrity.

5. Explain the use of bridge, hub and switch.(6 marks)

Ans:-

• Bridge:
➢ Connects and forwards data between two or more network segments.
➢ Operates at the Data Link Layer (Layer 2) of the OSI model.
➢ Learns MAC addresses and filters/forwards frames based on destination MAC addresses.
• Hub :
➢ A simple device that connects multiple devices in a star topology.
➢ Broadcasts all incoming data to all connected devices (no intelligent forwarding).
• Switch :
➢ A more intelligent device that connects multiple devices in a star topology.
➢ Operates at the Data Link Layer (Layer 2) of the OSI model.
➢ Learns MAC addresses and forwards frames selectively to the intended destination port(s).
➢ Provides dedicated bandwidth to each port, improving performance over hubs.
➢ Supports features like VLANs, Spanning Tree Protocol (STP), link aggregation, etc.
6. Explain the working principle of CSMA/CD in details.(6 marks)

Ans:-

The CSMA/CD (Carrier Sense Multiple Access/Collision Detection) protocol is used in traditional Ethernet
networks to control access to the shared medium and handle collisions.

Explanation working principle:-

• Carrier Sense -
➢ Before transmitting data, a node listens to the network cable to check if another node is already
transmitting (carrier sensing).
➢ If the cable is idle, the node starts transmitting its data frames.
• Multiple Access -
➢ Multiple nodes can access the shared medium (cable) to transmit data.
➢ However, collisions can occur if two or more nodes transmit simultaneously.
• Collision Detection -
➢ While transmitting, the node monitors the signal levels on the cable.
➢ If the node detects a colliding signal (a superimposed signal from another transmitting node), it
immediately stops transmitting and sends a jamming signal to notify all nodes of the collision.
• Collision Handling -
➢ After detecting a collision, the nodes involved wait for a random period of time (back-off period)
before attempting to retransmit.
➢ The back-off period is calculated using a truncated binary exponential back-off algorithm, which
helps reduce the probability of subsequent collisions.
7. Discuss about the different types of topologies with suitable diagram.(10 marks)

Ans:-

I. Bus Topology:-
➢ All nodes are connected to a single cable or backbone called a bus.
➢ Data is transmitted over the entire length of the bus and is received by all nodes.
➢ Termination is required at both ends of the bus to prevent signal reflections.
➢ Example: Traditional Ethernet networks using coaxial cables.

II. Star Topology :-


➢ All nodes are connected directly to a central device, typically a hub or switch.
➢ The central device acts as a relay for data transmission between nodes.
➢ Failure of the central device can disrupt the entire network.
➢ Example: Modern Ethernet networks using switches.

III. Ring Topology :-


➢ Nodes are connected in a closed loop or ring.
➢ Data travels in one direction around the ring, passing through each node.
➢ Each node acts as a repeater, regenerating the signal before passing it to the next node.
➢ Failure of a single node can disrupt the entire network.
➢ Example: Legacy Token Ring networks.

IV. Mesh Topology :-


➢ Each node is directly connected to one or more other nodes, creating a mesh-like
structure.
➢ Data can take multiple paths between nodes, providing redundancy and fault tolerance.
➢ Can be fully meshed (each node connected to all others) or partially meshed.
➢ Commonly used in Wide Area Networks (WANs) and enterprise networks.

V. Tree Topology:-
➢ Hierarchical structure with a root node at the top.
➢ Data flows from the root node to child nodes and vice versa.
➢ Commonly used in Wide Area Networks (WANs) and internet service provider (ISP)
networks.
➢ Failure of a node can affect some parts of the network but not the entire network.

VI. Hybrid Topology :-


➢ It is used when the nodes are free to take any form. It means these can be individuals
such as Ring or Star topology or can be a combination of various types of topologies
seen above.
➢ Each individual topology uses the protocol that has been discussed earlier.

8. Explain the working principle of CSMA/CD in details.(10 marks)

Ans:-

• Carrier Sense:-
✓ Before transmitting data, a node listens to the shared medium (cable) to check if another node is
already transmitting (carrier sensing).
✓ If the medium is idle (no carrier signal detected), the node can begin transmitting its data frames.

• Multiple Access :-
✓ CSMA/CD allows multiple nodes to access the shared medium for data transmission.
✓ However, since the medium is shared, there is a possibility of two or more nodes transmitting
simultaneously, leading to a collision.

• Collision Detection :-
✓ While transmitting, the node continuously monitors the signal levels on the cable by comparing
the signals it is transmitting with the signals it is receiving.
✓ If the node detects a discrepancy, it means that another node has started transmitting
simultaneously, resulting in a collision.
✓ When a collision is detected, the node immediately stops transmitting and sends a jamming
signal to notify all other nodes on the network of the collision.

• Collision Handling :-
✓ After detecting a collision, the nodes involved follow a specific procedure to recover and
retransmit their data:
1) Each node waits for a random amount of time, known as the back-off period, before attempting to
retransmit.
2) The back-off period is calculated using a truncated binary exponential back-off algorithm, where
the initial back-off time is chosen randomly from a fixed range, and the range is doubled after
each subsequent collision.
3) This exponential increase in the back-off range helps reduce the probability of repeated collisions
by spreading out the retransmission attempts of the nodes.
✓ Once the back-off period expires, the node performs carrier sensing again and transmits if the
medium is idle.

You might also like