Unit 2


Media access control - Ethernet (802.3) - Wireless LANs – 802.11 – Bluetooth - Switching and bridging – Basic Internetworking (IP, CIDR, ARP, DHCP,ICMP ) 65 I

Part A

# Question
1 Reproduce the term Orthogonal Frequency Division Multiplexing
2 Explain CSMA protocol
3 Show that in what way FDDI is advantageous over a basic token ring
4 Classify the functions of Bridges
5 Differentiate between Connectionless and Connection Oriented duplex.
6 Illustrate the role of VCI
7 Generalize the term Virtual Circuit Switching in detailRemembering
8 Explain hop by hop flow control.
9 Analyzing the need for Exponential backoff.
10 Specify the types of errors handled by the ICMP messages
11 Construct Spanning tree.
12 Find the class of each address.
13 What is TTL and MTU?
14 Draw the sketch of IPv4 packet header
15 Summarize the various classes of IP addressing
16 Simplify the benefits of subnetting a network
17 List the difference between Circuit switching and packet switching
18 Define ARP
19 Give the advantages of DHCP
20 Draw the general format of ICMP message

Part B

# Question
1 (i) D efine the internet protocol and its packet format with a neat sketch. (8) (ii)Recall the difference between various global addressing classes in IP with an examples.
2 (W8)h a t i s C S M A/CD? How does it work? Distinguish between 1-persistent and non-persistent CSMA
3 Tel l about the Bluetooth Technology. List out the applications and limitations of Bluetooth Technology.
4 (L1i6s)t the MAC sub layer protocol and frame structure of I EEE 802.11.
5 (i)Co mpareWirednetworksandWirelessnetworks. (8) (ii).ExplaintheoperationofTokenRingLAN.
6 (D8e)m onstrate theneedforsubnettingandclassless addressingschemeswithexamples. (16)
7 (i) S ummarize with example how CIDR addresses the two scaling concerns in the internet. (10) (ii) Illustrate the need for ICMP? Mention any four ICMP
8 (i)Ch oose a protocol used in mapping of logical address to physical address. Give a detailed note on its operation, packet format and the situations when the ARP services are used. (12) (ii)Applying the fragmentation and reassembly process
9 Examine about standard ETHERNET and Gigabit (4) Ethernet.
10 Insp ect how MAC protocol operates on a token ring. (4)
11 (1i)6E)v aluating the IP addressing methods. (8)
12 (i)D iscuss the MAC layer functions of IEEE 802.11 (8) (ii)Build key requirements of wireless LAN