Control System 2MARKS
Control System 2MARKS
PART – A
1. What is mean by data communication? What are its characteristics?
Data communication is the exchange of data (in the form of 1s and 0s) between two devices via
some form of transmission medium (such as a wire cable).
Its characteristics are
1. Delivery
2. Accuracy
3. Timeless
2. Define Computer Network. State major categories of Computer Network.
1. A network is a connection or communication between two or more interconnected
systems.
2. A computer network consists of two or more systems that are linked in order to share
resources, exchange data files or to allow electronic communication.
Types of Network
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
4. Storage Area Network (SAN)
3. Mention the Components of data communication?
1. Sender
2. Receiver
3. Protocol
4. Medium
5. Message
4. What are the Classes of Internet applications?
1. World wide web 2. Email 3.Online shopping network (OSN)
4. Streaming audio, video 5.File sharing 6.Instant message
2 All packets uses different path. All packets use same path.
4. Congestion occurs for per packet. Congestion occurs for per minute.
De-Multiplexing
De-Multiplexing is used to perform De-Multiplexing, Which separates the signal and
send it to the appropriate destination device.
7. Difference between LAN and WAN.
SL.
LAN WAN
NO
1. It covers small area. It covers large geographical area.
2. Transmission speed is high. Transmission speed is low.
3 Easy to design and maintain. Design and maintain is not easy.
4. LAN is broadcasting in nature. WAN is point-to-point in nature.
8. Define Topology. What are the types of topology?
Topology is defined as “a geometrical arrangement of nodes or computer in a network”
Types – Bus , Mesh , Ring , Star and Tree Topology.
9. What parameters used to measure network performance?
1. Bandwidth (throughput)
2. Latency (delay)
10. Define bandwidth and latency or delay?
The bandwidth of a network is defined as the number of bits that can be transmitted
over the network in a certain period of time.
Latency is a measure of how long a single bit takes to propagate from one end of a link
to the other end. It is measured strictly in terms of time.
Latency = Propagation delay + Transmission delay + Queuing delay
11. What is jitter?
Jitter refers to the variation in the packet arrival time, that is, uneven delay in the delivery of
audio or video packets.
Error Correction: Error correction in this similar to error detection, except that a receiver cannot only
detect whether errors have been introduced in the frame but can also determine exactly where in the
frame the errors have occurred.
b) Burst error: Means that 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
21. Define flow control and error control. Mention the categories of flow control.
Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before
waiting for acknowledgment.
There are 2 methods have been developed to control flow of data across
communication links.
Error control is mechanism of retransmission of data by automatic repeat request (ARQ). Error control
involves both error detection and correction.
PART – B
1. With a neat diagram explain in detail about the Network architecture. (Or)
Draw the ISO-OSI reference model and explain the functionalities of each layer in
detail. (Or)
Compare and contrast ISO/OSI Layer and TCP reference model.
ISO defines a common way to connect computer by the architecture called Open System
Interconnection (OSI) architecture.
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
The physical layer coordinates the functions required to transmit a bit stream over a physical
medium.
The physical layer defines the characteristics of the interface between the devices and the
transmission medium.
2. Representation of bits
To transmit the stream of bits, it must be encoded to signals. The physical layer defines the type
of encoding.
4. Synchronization of bits
The sender and receiver must be synchronized at the bit level. Their clocks must be synchronized.
5. Line Configuration
In a point-to-point configuration, two devices are connected together through a dedicated link. In
a multipoint configuration, a link is shared between several devices.
6. Physical Topology
The physical topology defines how devices are connected to make a network. Devices can be
connected using a mesh, bus, star or ring topology.
7. Transmission Mode
The physical layer also defines the direction of transmission between two devices: simplex, half-
duplex or full-duplex.
1. Framing
Divides the stream of bits received into data units called frames.
2. Physical addressing
If frames are to be distributed to different systems on the n/w, data link layer adds a header to the
frame to define the sender and receiver.
3. Flow control
If the rate at which the data are absorbed by the receiver is less than the rate produced in the
sender, the Data link layer imposes a flow control mechanism.
4. Error control
Used for detecting and retransmitting damaged or lost frames and to prevent duplication of
frames. This is achieved through a trailer added at the end of the frame.
5. Access control
Used to determine which device has control over the link at any given time.
2. Routing
The devices which connect various networks called routers are responsible for delivering packets
to final destination.
1. Port addressing
The header in this must therefore include a address called port address. This layer gets the entire
message to the correct process on that computer.
3. Connection control
This can either be connectionless or connection oriented.
The connectionless treats each segment as a individual packet and delivers to the destination. The
connection-oriented makes connection on the destination side before the delivery. After the
delivery the termination will be terminated.
V. Session Layer
This layer establishes, manages and terminates connections between applications.
1. Dialog control
This session allows two systems to enter into a dialog either in half duplex or full duplex.
2. Synchronization
3. Compression
Compression reduces the number of bits contained in the information particularly in text, audio
and video.
Internet Architecture
The Internet architecture, which is also sometimes called the TCP/IP architecture.
Internet Architecture
Application layer
Transport Layer(TCP/UDP)
Sub network
The Internet architecture evolved out of experiences with an earlier packet-switched network
called the ARPANET.
Both the Internet and the ARPANET were funded by the Advanced Research Projects Agency
(ARPA), one of the R&D funding agencies of the U.S. Department of Defense.
They are four layer,
1.Application layer
2.Transport Layer(TCP/UDP)
4.Sub network
I. Application Layer
This layer enables the user to access the n/w. This allows the user to log on to remote user.
1. Perspective
2. Scalable Connectivity
4. Categories Of Network
6. Manageablity
1. PERSPECTIVE
Perspectives of network by people who develop networked application and who manage or
operate network vary. They list their requirements for network as,
i) Application programmer
ii) Network provider
iii) Network designer
1. Application programmer:
2. Network provider:
List the properties of a cost-effective design.
3. Network designer:
2. SCALABLE CONNECTIVITY
i) Links
ii) Nodes
iii) Switched networks
1. Links:
A network consists of two or more computers directly connected by some physical medium .such
as a coaxial cable or an optical fiber. Such a physical medium is called as links. They are two types,
i) Point to point
ii) Multipoint
Point to point
Node Node
Multipoint
More than two specific devices share a single link. The channel is shared by several devices.
Nodes
2. Nodes:
3. Switched networks:
Multiplexing
De-multiplexing
Multiplexing
Multiplexing is the process of transmitting more than one signal simultaneously on a
single path.
3.Statistical multiplexing:
It defines the cost effective way for multiple users to share network resource,
De-Multiplexing
De-Multiplexing is used to perform De-Multiplexing, Which separates the signal and
send it to the appropriate destination device.
4. CATEGORIES OF NETWORK
Request / Reply
Reliability
Request/ Reply:
Reliability:
Failure in network are caused by physical medium or by software that manages the
hardware.
Three general classes of failure:
i) Bit error
ii) Packet error
iii) Node and link level
6. MANAGEABLITY
When network grows, keeping the whole network running correctly and configuring new
devices can be problematic. Management tasks can be automated or can be done by unskilled
personal. Network devices can be plug_and_play.
Framing
Framing in the data link layer separates a message from one source to a destination, or
from other messages to other destinations, by adding a sender address and a destination
address.
Types of Framing
2.Point-to-Point Protocol(PPP)
Data portion of the frame is contained between special sentinel character STX (start of
text) and ETX (end of text)
If ETX appears in data, Escape ETX with a DLE. This is called as Character stuffing.
2. Point-to-Point Protocol(PPP)
This uses sentinels and character stuffing.
The frame payload size can he negotiated, but it is 1500 bytes by default.
Count Field specifies how many bytes are contained in the frame’s body.
Sometime count field will be corrupted during transmission, so the receiver will
accumulate as many bytes as the COUNT field indicates. This is sometimes called a
framing error.
The receiver will then wait until it sees the next SYN character.
In this, frames are viewed as collection of bits. High level data link protocol is used. The
format is
HDLC denotes both the beginning and the end of a frame with the distinguished bit
sequence 01111110.
This sequence might appear anywhere in the body of the frame, it can be avoided by bit
stuffing.
Bit stuffing is the process of adding one extra 0 Whenever they are s five consecutive
1’s in the data, so that the receiver does not mistake the data for a flag. [01111110].
Example
011011111111111111110010
011011111011111011111010010
A form of framing that ensures that all frames are the same size.
It is arranged as nine rows of 90 bytes each, and the first 3 bytes of each row are
overhead, with the rest being available for data.
The first 2 bytes of the frame contain a special bit pattern, and it is these bytes that
enable the receiver to determine where the frame starts.
The receiver looks for the special bit pattern consistently, once in every 810 bytes, since
each frame is 9 x 90 = 810 bytes long.
The STS-N frame can he thought of as consisting of N STS-1 frames, where the bytes
from these frames are interleaved; that is, a byte from the first frame is transmitted,
then a byte from the second frame is transmitted, and so on.
Payload from these STS-1 frames can he linked together to form a larger STS-N payload,
such a link is denoted STS-Nc. One of the bit in overhead is used for this purpose.
One of the things we are not describing due to the complexity of SONET is the detailed
use of all the other overhead bytes.
The overhead bytes of a SONET frame are encoded using NRZ,this is the simple encoding
where 1s are high and 0s are low.
Error Detection
Transmitting node set error-detection bits in the frame and having the receiving node perform an
error check.
Types of errors
There are 2 types of errors
a) Single bit error. b) Burst bit error.
a) Single bit error
The term single bit error means that only one bit of a given data unit (such as byte character/data
unit or packet) is changed from 1 to 0 or from 0 to 1.
b) Burst error
Means that 2 or more bits in the data unit have changed from 1 to 0 from 0 to 1.
Detection
In the error checking process the errors are detected first and then errors are corrected.
Redundancy
o Error detection uses the concept of redundancy, which means adding extra bits
for detecting errors at the destination.
Detection Methods
Detection Methods
Attach a parity bits calculated in the step 3 to the original data and send them to the receiver.
Performance
Two-Dimensional Parity Checks increases the likelihood of detecting burst errors.
A burst errors of more than n bit is also detected by this method.
Sender
Add up all the words that are transmitted and then transmit the result of that sum .The result is
called the checksum.
Receiver
The receiver performs the same calculation on the received data and compares the result with the
received checksum.
If any transmitted data, including the checksum itself, is corrupted, then the results will not
match, so the receiver knows that an error occurred.
Algorithm
u_short
cksum(u_short *buf, int count)
{
register u_long sum = 0;
while (count--)
{
sum += *buf++;
if (sum & 0xFFFF0000)
{
/* carry occurred,so wrap around */
sum &= 0xFFFF;
sum++;
}
}
return ˜ (sum & 0xFFFF);
}
Disadvantages
Doesn’t detect errors efficiently in all cases.
Examples
Addition of -5(0101) and -3(0011) in 1’s complement arithmetic on 4 bit integers.
-5 1010
-3 1100
-------
Carry<- 1 0110 Result
Add carry with result
0110
1
--------
sum 0111 is -8
-------
Sum is complemented and 1000 is the checksum.
Sender
Step1: A string of n 0s is appended to the data unit. The number of n is 1 less then the
number of bits in the predetermined divisor (n+1) bits.
Step2: The newly elongated data unit is divided by the divisor, using binary division.
The reminder is CRC.
Step3: The CRC of n bits derived in step2 replaces the appended 0s at the end of the data
unit.
Receiver
Step1: The appended data unit is arrived at the receiver.
Step2: It is divided by the same divisor. If the remainder is zero, the data is accepted, if
non zero then data is rejected.
Error Correction
Error correction in this similar to error detection, except that a receiver cannot only detect
whether errors have been introduced in the frame but can also determine exactly where in the
frame the errors have occurred.
The two most common error correction methods are.
o Error Correction by Retransmission.
o Forwarded Error Correction (FEC).
6.Write in detail about Flow control mechanism.(or)
Compare Stop and wait ARQ scheme with Sliding window ARQ
scheme. (or)
Discuss in detail about Sliding window protocol in detail. (or)
Explain the techniques of Go Back N with ARQ mechanism.
Flow control
Flow control refers to a set of procedures used to restrict the amount of data. The sender can send
before waiting for acknowledgment.
Error control
Error control is mechanism of retransmission of data by automatic repeat request (ARQ). Error
control involves both error detection and correction.
ARQ
In Error control when an error is detected in an exchange, specified frames are retransmitted.
This process is called Automatic repeat request (ARQ).
Error control in the data link layer is based on ARQ, which means retransmission of data will
occur on three cases,
Normal Operation
Damaged or Lost Frame
Lost Acknowledgment
Two type of ARQ
1. Normal operation
The frames 0 is sent successfully.
The ack 1 is sent back by the receiver to the sender.
The sender sends the next frame, frame 1 and waits for ack 0 and so on.
All the frames are sent successfully and ack are received before the time expires.
2.Lost or Damaged Frame
If the frame sent, is lost in the transmission, then the ack is not sent for that frame.
If the frame is received with error then the frame is discarded and ack is not sent for that frame
when the timer expires the sender retransmit the lost/damaged frame.
3.Lost Acknowledgment
If the ack is lost, then the sender waits for the specified time and assumes that the frame is not
received by the receiver successfully. So it retransmits the data frame.
The receiver has already received the frame which is retransmitted. So the receiver discards the
second copy of the frame and it sends the ack for that frame.
Disadvantages
The sender waits for more time till it receives the ack for each frame.
The transmission medium is not efficiently utilized.
The time taken for sending “n” frame is more.
Sender
First, the sender assigns a sequence number, denoted SeqNum, to each frame.
When an acknowledgment arrives, the sender moves LAR to the right, thereby allowing the
sender to transmit another frame. Also, the sender associates a timer with each frame it transmits,
and it retransmits the frame should the timer expire before an ACK is received.
When a frame with sequence number SeqNum arrives, the receiver takes the following action.
If SeqNum ≤ LFR or SeqNum > LAF, then the frame is outside the receivers window and it is
discarded.
If LFR < SeqNum ≤ LAF, then the frame is within the receivers window and it is accepted.
Now the receiver needs to decide whether or not to send an ACK.
Let SeqNumToAck denote the largest sequence number not yet acknowledged, such that all
frames with sequence numbers less than or equal to SeqNumToAck have been received.
The receiver acknowledges the receipt of SeqNumToAck, even if higher-numbered packets have
been received.
This acknowledgment is said to be cumulative. It then sets LFR = SeqNumToAckand adjusts
LAF = LFR + RWS.
1.Go-Back-N ARQ
In the Go-back-n ARQ technique of error detection and correction, the sender starts
retransmission with the last unacknowledged frame, even if the subsequent frames have arrived
correctly at the receiver.
Operation
1. Normal operation
The sender frames and update the control variable ie. SF, S, SL and receiver updates variable R
shows normal operation.
2.Lost or Damaged Frame
If any frame is lost or damaged the sender sends the next frame sequentially. The receiver
expecting a specified frame (lost frame) discards all other incoming frame. The sender timer
expires and it retransmits from the lost frame.
3.Lost Acknowledgment
The frame is resend if the ack doesn’t reach the sender at time or lost or damaged if the previous
ack are lost but the cumulative ack reaches the sender, then there is no need for retransmission.
In Selective Repeat ARQ retransmits, only the specify damaged or lost frame instead of sending
multiple frames.
Features of Selective Repeat ARQ
1. Sender Sliding window:
Window is a set of frames in buffer waiting for ack. This window keeps on sliding in forward
direction. The window size is fixed 2m/2.
2.Receiver Sliding window:
In the receiver side the size of the window is same as the sender window size.
After the frame is received successfully they receiver sends an ack to the sender.
The receiver window sides to its right side if the frame is received successfully.
Operation
1. Normal operation
Sender sends the frame in the window one by one. After the ack is received the sender window
slides to its right.
2.Lost or Damaged Frame
If frame 2 is lost, frame 3 is sent by the sender sequentially.
The receiver accepts frame 3 if frame 3 is in receiver window and sends and NAK 2 to sender
requesting for the retransmission of frame 2.
3.Lost Acknowledgment
The sender sets a timer when a frame is sent. If NAK or ack is not received in the specified time
the sender retransmit the frame.
4.Negative Acknowledgment
If the frame is damaged or lost the receiver sends on NAK to the sender so that the sender
retransmit the lost or damaged frame.
Advantages
Fewer retransmissions.
Disadvantages
More complexity at sender and receiver.
No cumulative ack.