cau hoi on tap thi hoc ky mang 1

Upload: anh-tan

Post on 03-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    1/14

    1

    1. Question(1.0 mark):Identify and explain briefly the five components of a datacommunications system.

    Five components of data communications system are:

    Message: is the information (data) to be communicated. The message can be text,

    numbers, pictures, audio and video.

    Sender: is a device that sends the data message. It can be computer, workstation,

    telephone handset, video camera, and so on.

    Receiver: is a device that receives the data message. It can be computer, workstation,

    telephone handset, television, and so on.

    Transmission medium: is the physical path which a message travels from the sender to

    the receiver. Some examples of transmission media include twisted-pair wire, coaxialcable, fiber-optic cable, and radio wave.

    Protocol: is a set of rules that govern data communications. It presents an agreement

    between the communicating devices.

    2. Question(1.0 mark):Distinguish simplex, half-duplex and full-duplex transmissionmode.

    Simplex: the communication is unidirectional (theo mt hng), as on a one-way street.

    Only one of the two devices on a link can transmit; the other can only receive.

    Half-Duplex: each station can both transmit and receive, but not at the same time. This

    means, when one station is the transmitter, the other one must be the receiver and vice

    versa.

    Full-Duplex: both stations can transmit and receive simultaneously.In this mode,

    signals going in one direction share the capacity of the link with signals going in the

    other direction.

    3. Question(1.0 mark):Distinguish unicast, multicast and broadcast communicationsUnicast: is communication where a piece of information is sent from one point to the

    another point. In this case, there is just one sender, and one receiver.

    Multicast: is communication where a piece of information is sent from one or more

    point to a set of other points. In this case, there is one or more sender and the

    information is distributed to a set of receivers.

    Broadcast: is communication where a piece of information is sent from one point to all

    the other points. In this case, there is just one sender, but the information is sent to allconnected receivers.

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    2/14

    2

    4. Question(1.0 mark):Describe briefly the differences between three technicalterms: (channel) bandwidth, transmission rate, throughput ?

    Bandwidth:

    In networking, we use the term bandwidth in two context:

    - The first, bandwidth in hertz, refers to the range of frequencies in a compositesignal or the range of frequencies that a channel can pass.

    - The second, bandwidth in bits per second, refers to the speed of bit transmissionin a channel or link.In this case, bandwidth refers to the data-carrying capacity of

    a network or data transmission medium. It indicates the maximum amount of

    data that can pass from a point to another in a unit of time. The bandwidth of a

    channel is unchanged. For example, we say we have a slow 9.6Kps dial-up line.

    Throughput:

    Throughput is the measure how fast we can actually send data through a network.

    Throughput is never a constant, it fluctuates and is obviously lower than the bandwidth

    of the channel.

    Transmission rate:

    Transmission Rate is the total amount of data that can be sent from one place to another

    in a given period of time.

    5. Question(1.0 mark):Name the four basic network topologies and illustrate themby figures.

    Mesh: Ring

    Star Bus

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    3/14

    3

    6. Question(1.0 mark):What are the differences between physical, logical, port andspecific address?

    Physical address:

    - It is also known as link address, is the address of a node as defined by its LAN orWAN.It is used by Data Link layer to deliver data from one node to another within

    the same network.It is generally the MAC address and is the lowest-level address.

    - The size and format vary depending on the network (it changes from hop to hop).Most local-area networks use a 48-bit (6-byte) physical address written as 12

    hexadecimal digits; every byte is seperated by a colon, as shown as:

    07:01:02:01:2C:4B

    Logical address:

    - Is address at the Network layer and generally IP address.- A logical address in the Internet is currently a 32-bit address that can uniquely

    define a host connected to the Internet. It remains the same from hop to hop. An

    example of logical address is shown as: 200.100.50.100

    Port address:

    - Is address at Transport layer, used to identify the particular application running onthe destination machine.

    - It remains the same from hop to hop.- A port address in TCP/IP is 16 bits in length.Specific address:

    - Is address at the Application layer and is user-friendly address. For example, theemail address ([email protected])and the Universal Resource Locator (URL)

    (vnu.edu.vn)

    7. Question (1.0 mark): List the roles of the data link layer in the TCP/IP model.- Framing: the data layer divides the stream of bits received from the network layer

    into manageable data units called frame.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    4/14

    4

    - Physical addressing: if frames are to be distributed to different systems on thenetwork, the data link layer adds a header to the frame to define the sender and/or

    receiver of the frame.

    - Flow control: if the rate at which the data are absorbed by the receiver is less thanthe rate at which data are produced in the sender, the data link layer imposes (tc

    ng, cng ng)a flow control mechanisms to avoid overwhelming (trn, ln t)the receiver.

    - Error control: the data link layer adds reliability to the physical layer by addingmechanisms to detect and retransmit damaged or lost frames. It also uses a

    mechanism to recognize duplicate frames.

    - Access control: when two or more devices are connected to the same link, data linklayer protocols are necessary to determine which device has control over the link at

    any given time.

    8. Question (1.0 mark)What are the responsibilities of the network layer in theTCP/IP model.

    - Logical addressing: If a packet passes the network boundary, we need anotheraddressing system to help distinguish the source and destination systems. Address

    in this case is logical address.

    - Creating a connection between the source computer and the destination com-puter, and routing the packet through possible routes. The communication atthe Network layer is host-to-host. However, there are several routers from the

    source to the destination, the routers in the path are responsible for choosing the

    best route for each packet.

    - Defining the format of the packet.The Network layer in the Internet include theInternet Protocol (IP), that defines the format of the packet, called a datagram.

    9. Question (1.0 mark)What are the responsibilities of the transport layer in theTCP/IP model.

    - Process-to-process delivery of the entire message. A process is an applicationprogram running on the host. The Transport layer ensures that the whole message

    arrives intact (nguyn vn) and in order, overseeing both error control and flowcontrol at the source-to-destination level.

    - Service-point addressing. Computers often run several programs at the same time.For this reason, source-to-destination delivery means delivery from a specific

    process (running program) on one computer to a specific process on the other. The

    transport layer must therefore include a type of address called a service-point

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    5/14

    5

    address (or port address). The transport layer gets the entire message to the correct

    process on that computer.

    - Segmentation and reassembly. A message is divided into transmittable segmentswith each segment containing a sequence of number. These numbers enable the

    transport layer to resemble the message correctly.

    - Connection control. Transport layer can control the delivery segments to thetransport layer at the destination machine through either connectionless or

    connection oriented.

    - Flow control. Unlike the data link layer, flow control at transport layer is per-formed end to end rather than across a single link.

    - Error control. Unlike that data link layer, error control at transport layer is per-formed process-to-process rather than across a single link. Error correction is

    usually achived through retransmission.

    10. Question (1.0 mark)What are the responsibilities of the application layer in theTCP/IP model.

    - Network virtual terminal.A network virtual terminal is a software version of aphysical terminal, and it allows a user to log on to a remote host.

    - File transfer, access, and management. This application allows a user to accessfile in a remote host, to retrieve (phc hi) files from a remote computer for use inthe local computer, and to manage or control files in a remote computer locally.

    - Mail services. This application provides the basis for e-mail forwarding andstorage.

    - Directory services. This application provides distributed database sources andaccess for global information about various objects and services.

    11. Question (1.0 mark):What are the differences between propagation delay andtransmission delay?

    Propagation delaymeasures the time required for a bit to travel from the source to the

    destination. The propagation delay is calculated by dividing the distance by the

    propagation speed:

    distancepropagation delay

    propagation speed

    Transmission delayis the time required for transmission of a message symbol depends

    on the size of the message and the bandwidth of the channel:

    message sizetransmission delay

    bandwidth

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    6/14

    6

    12. Question (1.0 mark):What are multiplexing and its major goal?Multiplexing is the set of techniques that allows the simultaneous transmission of

    multiple signal across a single data link.

    The major goal of Multiplexing is to share an expensive resource.

    13. Question (1.0 mark):Why doesstatistical TDM have higher bandwidth efficiencythan synchronous TDM?.

    Because in statistical TDM, slots are dramatically allocated. Only when an input line

    has a slots worth of data to send is it given a slot in the output frame. Therefore, thenumber of slots in each frame is less than the number of input lines. In synchronous

    TDM, however, if a source does not have data to send, the corresponding slot in the

    output frame is empty. Thus, the number of slots in each frame is always equal to thenumber of input lines.

    14. Question (1.0 mark):Discuss the efficiency of circuit switching and packetswitching?

    Circuit switching:

    The circuit-switching networks are not as efficient as the packet-switching network

    because resources are allocated during the entire duration of the connection. Therefore,these resources are unavailable to other connections.

    Moreover, since the route from one point to another is decided before communication is

    started, the communication remains on the same route from the beginning to the end of

    process even if that route is not the most efficient one.

    Packet switching:

    The efficiency of the packet switching network is better than that of the circuit

    switching network because resources are allocated only when there are packets to be

    transferred. Therefore, these resources can be shared to other connections.

    Moreover, each packet are allowed to find its way to the destination by the most

    efficient route possible.

    15. Question (1.0 mark): Why is ATM so called virtual-circuit switching?Because ATM uses two types of connection: Permanent virtual-circuit connection

    (PVC), and Switch virtual-circuit connection (SVC).

    16. Question (1.0 mark):What are the roles of MAC sublayer?

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    7/14

    7

    - Frame delimiting and recognition- To perform the control of access to media.- It performs the unique addressing to stations directly connected to LAN.- Detection of error

    17. Question (1.0 mark):Why are random access protocols also known as contentionprotocols?

    In random access method, no rules specify (quy nh) which station should send next.Stations competes with one another to access the medium. This is why this method is

    also known as contention method(phng php u tranh).

    18. Question (1.0 mark):Why does slotted-ALOHA provide better performance thanpure-ALOHA ?Because

    In pure ALOHA, the stations transmit frames whenever they have data to send. When

    two or more stations transmit simultaneously, there is a collision and the frames are

    distroyed.

    In slotted ALOHA, however, the time of the shared channel is divided into discrete

    intervals called slots. If any station is not able to place the frame onto the channel at the

    beginning of the slot, the station has to wait until the beginning of the next time slot. By

    this method, slotted ALOHA can reduce the chances of collision so it provide better

    performance than the pure ALOHA.

    http://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-aloha

    19. Question (1.0 mark):Distinguish the major differences of CSMA/CD andCSMA/CA.

    The major differences between CSMA/CD and CSMA/CA are:

    - CSMA/CD is typically used in wired networks while CSMA/CA is used inwireless networks.

    - CSMA/CD is standardized in IEEE 802.3 and CSMA/CA is standardized inIEEE 802.11.

    - CSMA/CD takes effect after a collision while CSMA/CA acts to preventcollisions before they happen.

    - CSMA/CA reduces the possibility of a collision while CSMA/CD onlyminimizes the recovery time.

    http://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-alohahttp://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-alohahttp://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-aloha
  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    8/14

    8

    http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-

    csma-cd/

    http://www.differencebetween.com/difference-between-csma-cd-and-vs-csma-ca/#ixzz32E2EAe55

    20. Question (1.0 mark):What are Clear-to-Send (CTS) and Request-to-Send (RTS)of wireless LAN designed for ?

    CTS and RTS of wireless LAN are designed for reducing frame collision

    http://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTS

    21. Question (1.0 mark):Why is ATM called a asynchronous network ?ATM uses statistical (asynchronous) time-division multiplexing,that is why it iscalled

    Asynchronous Transfer Mode

    22. Question (1.0 mark):Explain why connection at ATM layer is considered asconnection-oriented mode.

    Because in ATM, a virtual circuit must be established between two endpoints before the

    actual data exchange begins.

    23. Question (1.0 mark):Why is an IPv4 address considered unique and universal?Ipv4 address is uniquebecause each address is defined one, and only one connectiontwo the Internet.

    Ipv4 address is universalbecause each addressing system must be accepted by any host

    that wants to be connected to the Internet.

    24. Question (1.0 mark):How to distinguish IPv4address classes in the classfuladdressing method? How many classes are there ?

    In the classful addressing method, there are 5 classes: A, B, C, D and E.

    The distinction of these five classes bases on their first bits (if the address is given in

    binary notation) as follow:

    - If the first bit is 0, it defines class A.- Class B always starts with two bits 10.- The first three bits of class C is always 110.- The first four bits of class D is always 1110.- And 1111 is the first four bits of class E.

    http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-csma-cd/http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-csma-cd/http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-csma-cd/http://www.differencebetween.com/difference-between-csma-cd-and-vs-csma-ca/#ixzz32E2EAe55http://www.differencebetween.com/difference-between-csma-cd-and-vs-csma-ca/#ixzz32E2EAe55http://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://en.wikipedia.org/wiki/IEEE_802.11_RTS/CTShttp://www.differencebetween.com/difference-between-csma-cd-and-vs-csma-ca/#ixzz32E2EAe55http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-csma-cd/http://www.differencebetween.net/technology/protocols-formats/difference-between-csma-ca-and-csma-cd/
  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    9/14

    9

    25. Question (1.0 mark):What are the problems of classful addressing ?The problem of classful addressing is that each class is devided into a fixed number of

    blocks with each block having a fixed size as shown in the table below:

    Since the addresses were not distributed properly, resulting in no more addresses

    available for organizations and individuals that needed to be connected to the Internet.

    To understand the problem, let us think about class A. This class can be assigned to

    only 128 very large organizations in the world but each needs to have a single network

    with 16,777,216 nodes.A block in class A address is too large for almost any

    organizations. This means most of the address in class A were wasted (unused). Class B

    addresses were designed for midsize organizations, but many of the addresses in this

    class also remained unused. A block in class C is probably too small for many

    organizations. Class E were almost never used, wasting the whole class.

    26. Question (1.0 mark):Describe briefly the classless addressing method.In classless addressing, when an entity, small or large, needs to be connected to the

    Internet, it is granted a block (range) of addresses. The size of the block varies based on

    the nature and size of the entity.

    Restrictions:

    1. The addresses in a block must be contiguous, one after another.2. The number of addresses in a block must be a power of 2 (1, 2, 4, 8,...)3. The first address must be evenly divisible by the number of addresses.

    27. Question (1.0 mark):List address sets for private networks. Are they unique?

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    10/14

    1

    They are unique inside the organization, but they are not unique globally.

    28. Question (1.0 mark):What is NAT?Network Address Translation or NAT is technology that allows a private network to use

    a set of private addresses for internal communication and a set of global Internetaddresses for externalcommunication.

    29. Question (1.0 mark):By using a figure, describe briefly how NAT operates.

    The figure above shows a NAT implementation. As the figure shows, the private

    network uses private addresses.The router that connects the network to the global

    address uses one private address and one global address. The private network is

    invisible to the rest of the Internet; the rest of the Internet sees only the NAT router with

    the address 200.24.5.8.

    30. Question (1.0 mark):Explain why communication at the network layer in Internetis connectionless.

    Because in connectionless service, the network layer protocol treats each packet

    independently, with each packet having no relationship to any other packet. The packets

    in a message may or may not travel the same path to their destination. This type service

    is used in the datagram approach to packet switching. The Internet has chosen this of

    service the network layer.

    The reason for this decision is that the Internet is made of so many heterogeneous

    networks that it is almost impossible to create a connection from the source to

    destination without knowing the nature of the networks in advance.

    31. Question (1.0 mark):Explain why IPv4 is considered as an unreliable andconnectionless datagram protocol (a best-effort delivery service)?

    Ipv4 is considered as an unreliable and connectionless datagram protocol because it

    provides no error control or flow control (except for error detection on the header).

    IPv4 is also a connectionless protocol for a packet-switching network, each datagram ishandled independently, and each datagram can follow a different route to the

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    11/14

    1

    destination. The datagrams sent by the same source to the same destination could arrive

    out of order.

    32. Question (1.0 mark):What is the role of the Address Resolution Protocol.The Address Resolution Protocol (ARP) is used toglue the network and data-link layersin mapping network-layer addresses to link-layeraddresses. (19.1)

    33. Question (1.0 mark):What are RIP, OSPF, BGP?- The Routing Information Protocol (RIP) is an intradomain routing protocol used

    inside an autonomous system. It is a very simple based on distance vector

    routing.

    - The Open Shortest Path First or OSPF protocol is an intradomain routingprotocol based on link state routing. Its domain is also an autonomous system.

    - Border Gateway Protocol (BGP) is an interdomain routing protocol using pathvector routing.

    34. Question (1.0 mark):What is distance vector routing?Distance vector routing is routing method in which each router sends its neighbors a list

    ofnetworks it can reach and the distance to each network.

    35. Question (1.0 mark):What is link state routing?Link state routing is a routing method in which each router shares its knowledge of

    charges in its neighborhood with all other routers.

    36. Question (1.0 mark):Inshortest path slectionalgorithm, what does shortest pathmean?

    There are many ways for a packet to go to node B from node A. There may be some

    intermediate node from A to B such as node C, D, ... The distance between two adjacent

    nodes is called cost, or weight.The shortest path from A to B is the one whose

    cumulative cost, or weight is smallest.

    37. Question (1.0 mark):Explain why UDP is considered as connectionless transportlayer protocol.

    Because the packets (user datagrams) are sent from one party to another with no need

    for connection establishment or connection release. This means that each user datagramcan travel on a different path. The packets are not numbered, they may be delayed or

    lost or may arrive out of sequence.

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    12/14

    1

    38. Question (1.0 mark):Explain why UDP is not a reliable transport protocol.Because, there is no flow control and error control mechanism in UDP.

    39. Question (1.0 mark):Explain why TCP is considered as connection-orientedtransport layer protocol.

    Because if two TCPs want to send data to each other, they have to establish the

    connection between them before sending data.

    40. Question (1.0 mark):List some reasons causing congestion in networks.Congestion results from applications sending more data than the network devices (e.g.,

    routers and switches) can accommodate (chac), thus causing the buffers on suchdevices to fill up and possibly overflow. A buffer is a portion of a device's memory that

    is set aside as a temporary holding place for data that is being sent to or received from

    another device. This can result in delayed or lost packets, thus causing applications to

    retransmit the data, thereby adding more traffic and further increasing the congestion.

    41. Question (1.0 mark):Briefly describe how Slow Start algorithm operates for TCPcongestion control?

    The slow-start algorithmis based on the idea that the size of the congestion

    window(cwnd) starts with one maximum segment size(MSS), but it increases one MSS

    eachtime an acknowledgment arrives. This algorithm starts slowly but grows

    exponentially.

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    13/14

    1

    (RTT: Round-time trip)

    Start cwnd = 1 = 20After 1 RTT cwnd = cwnd + 1 = 1 + 1 = 2 = 21After 2 RTT

    cwnd = cwnd + 2 = 2 + 2 = 4 = 2

    2

    After 3 RTT cwnd = cwnd+ 4 = 4 + 4 = 8 = 23

    42. Question (1.0 mark):Briefly describe how Congestion Avoidance algorithmoperates for TCP congestion control?

    Congrestion Avoidance algorithm increases the cwnd (congestion window) additively

    until congestion is detected. In this algorithm, each time the whole window of

    segments is acknowledged, the size of the congesstion window is increased by 1.

    (RTT: Round-trip time)

    Start cwnd = iAfter 1 RTT cwnd = i + 1After 2 RTT cwnd = i + 2After 3 RTT cwnd = i + 3

  • 8/12/2019 Cau Hoi on Tap Thi Hoc Ky Mang 1

    14/14

    1

    43. Question (1.0 mark):Distinguish traffic parameters such as average data rate, peakdata rate and maximum burst size.

    - Average data rate is the number of bits sent during a period of time divided by thenumber of second in that period.

    amount of dataAverage data ratetime

    - Peak data rate: the maximum data rate of the traffic.- Maximum burst size: refers to the maximum length of the time the traffic is

    generated at the peak rate.

    44. Question (1.0 mark):For best-effort traffic, which performance metric (delay,throughput) is more important. Why ?

    Throughput. Because for best-effort traffic, we want to transmit data as much aspossible but not care much about whether the data are delay or not.