CS2 TPS-2
CS2 TPS-2
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
/ Cha pte r(2) l_n str uc tio n Se t and
Programming of 8085
I Probable marks : 43
I
Scope of the syllabus :-
• Addressing modes in 8085
.. fi:?gramming model of 8085
• Instruction Set and
• Programming of 8085
• Study of instruction set :
instructions.
• Data transfer, Arithmetic, Logic,' Branching, Stack, 1/0 and machin e control
• Assembly language program ming based on instructions.
addressing
Q. 1 What do you mean by addressing modes of a microprocessor ? Enlist the
modes in 8085.
Ans.:
ying one operands
(1) · Addressing mode of a IlllLa.1processor is the variou s forma ts of specif
r or it can
(direc_tly, indirectly etc). The operan d can be data (8 or 16 bit), addres s, registe
be implicit.
uses one
(2) Every microproces-'lr has its own set of instruc tions. Each of these instruc tions
of the addres sing modes. ·
:
(3) The microprocessor 8085 has five addres sing mode_s, which are given below
i) Direct addres sing
ii) · Register addres sing
iii) Immed iate addres sing
iv) Register indirect addres sing
v) Implie d addres sing
D.ata cr1ie.1:nory - - - - - -
405\l ...,0_ 0 _0_0_0_0_0_1_ ~ 1°1 1 1~1 1 1-1 1 1-11 1
S Z AC P CY
~ L Fla gs
-->;btt>r f
--- ~-'(.)_ __}_ _SO _
H Lpl'(.li r
&-fort!' O JX' I atmn After operation
ln th t> ,;t,·en t'X<lmpl~, the H L register pai r points to mem ory loca tion 4050 H . T he data in
th .i s Jo canon (t(X)U OOOl )i 11, Hum .tddt>d to tne n mt~nts o f the accumulator (l l 11 111 l )i.
Tile su1n IS Sh.l r ~ in a<.'Cu.mulato r and appropria t.e flags are also set dnd reset based on
the .re51uJt.
U) J.m:med i~te addrt>i~h1g mod~ ; tl\l.11l"h :!OOI.))
1) Jn 1mrn00Ja f~ addres.~uig tlw d a ta a pp~ars immediately aft.er opcode of ins tnicti(,n i.n
p rograui rnl"mtJr}'
2) ·n11."lt' clfC >;.:-nH,l ll r 2 or ) r yt<: iH'-lrucfoms.
Accumulator ~
·~ O O 1o
I OO ~ ---~~ / ~ L_o_o_Q_!__0_l_Q_O_...I Accumulato r
CADI08=:>
Opcode
Program
m emory C6H ~ 1°1°1 -11 1-111-1°1
4050 0000 1000 S Z AC P CY
data Flags
Before operation After operation
In the example, MPU fetches the opcode (C6) from program memory and after decoding
it. MPU finds the immediate data (0000 lOOO)z in the next consecutive program memory
location. This data is added to the contents of the accumulator and result is placed in the
accumulator.
Q. 4 What do you understand by register indirect and implicit addressing modes ?
Explain with suitable example. List the names of any four instructions which make
accumulator content clear. . «•IIJunijj
Ans. : Register indirect addressing : Please refer to Q. 3 (I).
Implicit addressing: Please refer to Q. 3 (II).
Following four instructions make accumulator content clear :
(1) ANI OOH (2) XRA A · (3) SUB A (4) MVI A, OOH
Q. 6 What are the groups in which instructions in 8085 are classified? i•S•M
Ans. : The instructions in 8085 can be classified into following five groups, depending upon
their function :
1) Data transfer group 2) Arithmetic group
3) Logical group 4) Branching group
5) Machine control group
1) Data Transfer Group :
This group of instruction copies data from a location called source to another location
called a destination without modifying the content of source. These instructions move
data between registers or between memory locations and regjs ters. For eg. MOV,
MVletc.
2) Arithmetic Group :
The instruction of this group performs arithmetic operations such as ad dition,
subtraction, increment or decrement etc. on d ata in registers or memory . For eg. ADD,
SUU, fNR, OCR etc.
3) Logical Group :
The logical group instructions perform logical operations such as AND, OR, XOR,
complement etc. generally with the accumulator.
4) Branching Group :
The branching group instructions allow programmer to change the sequence of
execution of program either conditionally or unconditionally.
For e.g. JMP, JC, JZ etc.
5) Machine Control Group : · .
These instructions control machine operations such as Halt, Interrupt
For e.g. NOP, HLT.
Q. 9 Explain PCHL Instruction of micro-processor 8085 and justify the stateme nt that
it is
equival ent to 3 byte uncond itional jump instruct ion. !•tJl@j t)j
Ans. : For only Explanation of PHCL Please refer Q. B(b), Pg. No. 2-6.
In PCHL progra~ _counter is loas{eq \,\{i U1 _memol'y ad_dress stored in HL _pair,.. ln JMP
a1dr_ess y r~gram _c~unter is loaded_ with memory address specified in instruction.
Workin g of both instruct ion is same i.e. load PC ,-vith 1nemory -address hence PCI IL
is
equival ent to uncondi tiona l jump
A dd re~itn~
G n,u p ttr,1nchln~ r:r, 111p
Hytr9 ,'\ by h'S
Fla1,; No-tw
-1 r1
tm l l:i tr,m ~fo rt't·d 1nH .'\1.ndJthm ally to llw 1rw111urv l~ 1,·MliH1 1 whor
Co mm ent : Th,• ~)n
,n.
add r~,s 111o sptx-lfit'd in tht- imi tructh
(4} ConcHtio na l It.imp : v If ,tw
..t:.t.!J}dl th 111 l.1 tru, 1. l'lit:•
ctk ,n~ . thr• /m np 1~ tak N, nnl
1n com:Utinnal jum p in~tru
dlth,n~ fU't 1 ltk Hlvt•n lwlow .
ron d1tl,,n ,d jum p in~tructlon~ nnd con
i) JN Z n('fdr Jum p on not i t•ro (Z ~ 0)
1i) JZ "'dctr Jump cil\ ~,•ft,
(Z 1) i;;
Q. 13 Exp lain the use of stac k and stac k pain ter regi
ster in Inte l 8085 . 49 ii
Ans .:
is used for tem pora ry stor age of En..:a:-:-
1) The stac k is a part of Read / Writ e mem ory that
.
inior ma tion duri ng the exec utio n of a prog ram
te resu lts and the retu rn add.i..'""ESS fr: 2-..'-c'
2) The b inar y info rmat ion is basi cally the imm edia
o f subr outi ne prog ram s:
micr opro cess or.
3) The stac k is shar ed by the prog ram mer and the
ents of a regi steI pair by usin g F~.'~-:'.-:
4) The prog ram mer can stor e and retri eve the cont
and POP instr uctio ns.
es the cont ents of the pn~ ram C\.)t:f i:-£
5} Simi larly, the micr opro cess or auto mati cally stor
whe n subr outi ne is calle d.
ial mem o.rv poin ter ~ ca.He--.1 :.:~
6J The stac k is imp leme nted with the help of spec ·
0
j(' f \ } - n ::; H
Q. 15 Accumulator contains data E3H. What will be the content of accumulator after
stepwise execution of each of following instructions ?
•&•0M*
t1
(i) ANI 58 H (ii) RRC (iii) CMA
Ans. : (i) ANI 58 H : Logically ANDed 58 H with [A]
Before execution: [A] = E3H '
Instruction : ANI 58 H
E3 H = 11100011
AND 58 H = 01011000
01000000 =40H
After execution [A] = 40 H
(ii) RRC : Rotate accumulator right by one bit.
Before execution : [A]= 40 H = 010000000
Instruction : RRC
After execution [A]= 0 0 100 0 0 0 = 20 H
and [Cy ] = 0 H
[A] = 20 H
(iii) CMA : Complement the contents of accumula tor
Before execution : (A J = 20 H :::: 0 0 1 00 0 0 0
In struction : CMA
After execution : (AJ = 1 1 0 1 1 11 1 :;:; DFH ' A] :::: DFH
1
Q. 16 The accumulator in 8085 contains the data BSH and register B contains dat.i 40 H.
What will be the content of accum u lator after execution of each of tht! following
instructions independe ntl y ? (l\1,ufh 1002)
(a) RLC (b) ORI 2'J H (d AN A B
Ans.:
(a) RLC: Rotate accum ulator left throug h carry.
Before execu tion: (A] = B8H = 10111000
Instru ction : RLC
After execu tion: (A]= 0 1 1 1 0 0 0 1 = 71 H
:. [Al= 71 Hand [Cy]= 1 H
(b) ORI 29 H: Logica lly ORed 29 H with [A]
Before execu tion: [A)= B8H = 10111000
Instru ction ORI 29 H
B8H = 1 0 1 1 1 0 0 0
OR 29 H = 0 0 1 0 1 0 0 1
1 0 1 1 1 0 0 1 = B9H
After execut ion : [A] = B9H
(c) ANA B: Logically AND [Reg. B] with [A]
Before execut ion: [A]= B8H = 1011 100 0
[Reg. B] = 40 H = 0 1 0 0 0 0 0 0
Instruc tion : ANA B
1011 1000
AND 0100 0000
0000 0000 =00H
After execut ion:
[A] = 00 H
execution of
Q. 17 The accumulator contains the data A4H. What will be its conten ts after
follow ing instructions indepe ndentl y. iiiBNiS!
i) XRI 08H ii) CMA iii) SUB A
Ans.:
Accumulator = A4 H
= 1010 0100
0 XRI 08 H:
Logically Ex-ORed 08H with conten ts of accum ulator.
Before execut ion: [A)= A4 H
Instru ction: XRI 08 H
A4 H = 10100100
XOR OB H = 0 0 0 010 0 O
1010 1100
= ACH
After execu tion: lAJ = ACH
ii) CMA :
Complement the accumulator
Before execution : [A] = A4 H
=10100100 '
Instruction : CMA
After execution :
[A] = 01011011
= SBH
i.e. [A] = SB H
iii} SUB A:
Subtract accumulator from itseU.
Before execution : [A] = A4 H
Instruction : SUB A
[A] : A4 H =10100100
2's complement of A4 = 0 1 0 111 0 0
+ [A] : A4 = 1 0 1 0 0 1 0 0
IT] 00000000
complement carry .J..
0 00000000
Result [A] = 00 H
Q. 18 The accumulator of 8085 contains data 43H. What will be its co.n tents after the
execution of follo~g instructions independently ?
0 0 1 1 1 1 1 0 = 3E H
So after execu tion of instru ction I
{A) = 3E H
(ii) ADI C5H :
This instru ction adds the data CSH to th e con tent of accu mula tor i.e. 45H.
(AJ ; 451-f = 0 1 00 0 1 O 1
+CSH == ll...OOO 1 O 1
~
0 0 0 0 1 O 1 o = OA H
After execut-ion, fA] ::; Oooo 1 o 1 0
= OAH
Q. 20 Accumulator of 8085 contains data 56 H. What will be the contents after the
execution of following instruction independently. ('.\larch 200'.i)
(iii) INR A : This instruction increments the c<;mtents of accumulatqr by one and result
stored in the accumulator itself.
Before execution :
[A] = 56 H = 0 10101 1 0
[A] = 56 H = 0 101011 0
+ 01H = 0 0 0 0 0 0 U1
0 1 0 1 0 l 1 l = 57 H
After execution : IA] = 57 H
Q. 21 If ACC contains data BCH, register C contains ADH. What will be the content of
accumulator after execution of each of the following iruJtructions independently?
(i) SUB C (ii) CMA (iii) XRA C -
Ans. : Accumulator = BCH = 1 O1111 0 O
(i) SUB C : Subtract contents of register C from accumulator.
Before execution :
[A] = BCH = 1 0 111 1 0 0 .
[C] = ADH = 1 0 1 0 1 1 0 1
Instruction : SUB C
[A]= BCH = 1 0 11 1 1 0 0
Q. 22 The accumulator of 8085 proces..!lor et>nt•ins delta tUU-.t and regll ter fl c-uf\l'flin- iJ~ ft ,
What will be the content of a{-eumulator after e~~rution nf e4tr h of the f'ollowh1 0
instruction indepe.ndentJy ? l~l.111 h J tll ll
(i) ORI FOH (ii) ANA B um XtU O.FH
Ans.:
Accu:mulator A= B 8 H =10111000
(i) ORI F0 H - logically OR ed FO H with [A]
B8 H = 10 11 1000
ORI F0 H = 11 11 0000
11 11 1000 = F 8 H
After execution [A]= F 8 H
(ii) ANA B - Logically AND (Reg B) with [A]
B8 H = 10 11 1000
AND B-44 H = 0100 0100
00 00 0000 = 00 H
After execution [A]= 00 H
(iii) XRI OF H - Logically Ex-ored OF H with [A]
BBH = 10111000
XRI OF H = 00001111
10 11 0111 = B 7 H
After execution [A] = B7 H
Q. 23 If Accumulator -Contains the Data 23H and B Register Contains 35H. What will bt
the contents of Accumulator. After execution of each of the following instruction
independently : . fMMiJljj
(i) XRA (ii) ANI FOH (iii) CPI OAH
Ans.:
A = 23 H = ·0010 0011
B = 35 H = 0011 0101
(i) XRA B - Ex.ored reg. B with contents of A.
23 H = 0010 0011
XOR with 35 H = 0011 0101
= 00010110
---
1 6
A = 16H
2 0
A= 20 H
A reg.
(ill ) CP IOA H - Co mp are OA H wit h
A = 23 Hf - Bef ore exe cut ion
ain s
Wh ile com pai rin g Ac rum ula tor rem
Un cha nge d hen ce A = _2 3 H
G9 H. Wh at are the
and Re gis ter B con ten ts are
Accumulator contents are B81{
Q. 24
tor an aF iag reg iste r aft er exe cut ion of ins ~c tio ns AN A B . .... ,
contents of Accumula t
. (;\l arc h 20] . I)
SU B B independenUy. '
Ans.:
(A) = BBH = 10111000
(B) = C9 H = 11001001
ula tor
'1) ANAB : Logically AN D wit h Ac cum
10. ll 1000
110 010 01
~q~q1lOO0
A 88H '=
Fla gs ➔ S =1, Z =0, AC = 0, P ~
i,
CY = O
cum ula tor
(2) SUB B : Sub tra ct B Reg. fro m Ac
B = llOO 1001
l's com ple me nt of B = 0011 011
0
+ 1 + 1
2's com ple me nt of B 0011 0111
Ad d A wit h 2's com ple me nt of B
001 101 11
+ 1011 1000
@) 111 011 11
Res ult ➔ A = EF H
Fla gs - , S = 1, Z = 0, AC == o, p = 0,
CY = 1
Q. 25 For the following instructions, write the addressing mode, instruction group and
the length of,the rnstruction (in terms of bytes). (if)a•fijj
(i) LHLD ABCDH (ii) LDAX B
Q . 26 The following instructions are intended to clear ten (10) memory locations starting
from th-e memory address 0009H. Explain why a large memory bl-0ek will be erased
or cleared and the program will stay in an infinite loop. Nfli•@l
LXI H, 0009H
LoopMVI M,OOH
DCXH
JNZLoop
HLT
Ans.:
(1) In given loop, large memory block will be erased or cleared and the program will stay in
an infinite loop.
(2) In the given loop, the sequence is repeated by the instruction JNZ Gump on No zero)
until the count becomes zero. However, the instruction DCX does not set the zero flag.
Therefore, the instruction JNZ would be unable to recognize when the count has
reached zero and the program would remain in a continuous loop.
Q. 28 What ue different addressing modes ? Which type of addressin_g mode is used for
following instructions ? MIQ@jj
(i) XCHG (ii) XRI (iii) SUB M (iv) CMC
Am. : Ref-erQ.l and appendix.
Q. 29 ldecntify the addressing modes of the following instructions and justify your
.mswer. W LOA 2000 H (ii) LDAX B (iii) STC (iv) ADC 0
Ant. : Ri:~e~~ ~ . 0 : to_~nd addressing mode and re.fer Q 2_to justif221nsw!::r·
Q. 30 Describe fo llowing instTuctfons of 8085 microprocessor. ~ 4ii111iiiiii@
iiiiiw!i,
ti} XCHG (ii) RA R (i ii) ADC R
Ans. : Ple~ refer appendix.
After execution :
[A] = 45 H = 0 1 0 0 0 1 0 1
[E] = 45 H = 0 1 0 0 0 1 0 1
[A] = 45H
Q. 35 The accumulator contains 05H and register B contains 08H. What will be the effect of
'SUB B' instruction on flags ? Explain it with diagram. (March 2010)
Ans-: ACC = 05 H = 0000 0101
B = 08 H = 0000 1000
After execution of SUB B _
Accumulator contains 2's compliment of magnitude of result
i.e. ACC = 11111101 = FDH
Mentioning the status of carry flag
Q. 36 Differentiate DAD and ADD Instruction of 8085 Micro-Processor
lt•&►·Mill
Ans.:
DAD ADD
1. In this lll!3truction contents of register In this instruction register r or content of
pair rp are added to the contents of memory location whose address is stored in
HL pair & result is placed in register H-L pair is added with content of
Hand L. accumulator and result is placed in
accumulator.
2. Only carry flags in affected. All flags are affected.
3. Register pairs BC, DE are used. Only register A, B, C, D, H, E, Lare used.
4. Used for 16 bit addition Used for 8 bit addition
Q. 37
.
Differentiate between PUSH and POP. CllNP111 NI
Ans.:
PUSH . POP
1. The contents of the higher order register The contents of the memory location
of register pair rp are moved to memory whose address is specified by the stack
location whose address is one less than pointer are moved to low order register
the content of stack pointer. of register pair rp.
2. The contents of the low order register of The contents of the memory location,
register pair rp are moved to the whose address is one more than the
memory location whose address is two content of stack pointer are moved to
less than the content of stack pointer. high order register of register pair rp.
3. In this instruction, stack pointer is In this instruction, stack pointer is
decremented by two. incremented by two.
4. Let [SP] = D01 5, [BJ = 25 H and Let [SP] = 2001 H
(CJ= 55 H (2001] = 10 H, [2002] =20 H
After execution of PUSH B After execu tion of POP H
ID014J = 25 H [H] ;:: 20H, [L] = lOH
[D013] = SSH and [SP] = 0013 H [SPJ =2003 H
An_s. :
Acc umula tor = B7H
= 10 1 1 0 11 1
(i ) O RI 58 H
Log jcal ly OR ed 58H " i th [A)
0 11 l
Be fore Exe cuti on [A] = B7H =10 11
B7H = 1 0 1 1 0 1 1 l
OR SSH = 0 10 1 100 0
l l l l l l l l =FF H
Q. 40 The accumulator in 8085 Micro-processor contains th~ data 78H and register D
contains data 33H. What will be the content of accumulator after execution of each
of the following instructions independently. lt•HIDOd)
(i) SUB D · (ii) AND D (iii) CMA
Ans,:
Accumulator = A =78 H = 0111 1111
D = 33H = 0011 0011
(ii) SUB D (Subtract D from Accumulator)
is complement of D = 1100 1100
' + 1 + 1
= (] 01001100
Q.41 The accumulator in 8085 microprocfssor contains data 71H register E contains data
39H. What will be the contents of accumulator in Hexadecimal after execution of the
( l\ t.1rd1 2tl I :"I
following instructions independently ?
(i) ADD E (ii) ORA E (iii) RRC
Ans.: (i) AAH, (ii) 79H, (iii) B8H
the conten
Q. 42 Accumulator contai ns data A4H and Register E contains data 69H write
ing instructt ts
of Accum ulator in hex digits after execution of each of the follow
indep enden tly :
Ans.:
(i) ANA E = 20 H ·(ii) CMP E = A4H (iii) ORA = EDH
will be the
Q. 43 The· registers A and c of 8085 contains the cJata E2H and 47H. What
the following
conten ts of Accumulator in Hex digits after execution of each of
instru ctions indep enden tly?
IMfil@lfM!)
(i) SUB C (ii) XRA C (iii) ADD C
Ans.:
(i) SUB C = 9BH
(ii) XRA C = ASH
(iii) . ADD C = 29 H Cy = 1
will be the
Q. 44 Accumulator contain data 45H and register B contain data 82H. What
y.
result in Accumulator after execution of each instruction indepe ndentl
m XRA B <m ADI 54H (iii) NI sm aw"d
Ans.:
(i) XRA B Accumulator = 45H
regB = 82H
Ace = 45H = 0100 0101
B = 82H = 1000 001,0
1100 0111
B 7
XRAB = B7H
(ii) ADI 54H Ace= 45H = 0100 0101
54H = 54H = 0101 0100
-1001 1001
9 9
ADI54H = 99H
(iii) ANI 57H Ace = 45H = 0100 0101
57H = 57H = 0lDl 0111
0100 0101
4 5
ANI57H = 45H
(!\larch 2019)
Q. 46 Give any two instructions of followin g address ing modes :
(i) Immedi ate (ii) Register Indirect (iii) Registe r
Ans.:
(i) Immediate - ADI 05H I MVI B, 04H
(ii) Register Indirect - ADD M / MOV M, D
(iii) Register - MOV A, B / ADD C
(i) CMPC It's CMP means subtraction of A-C. But after subtrac tion Accumu lator content
remains unchang ed. Means after CMPC.
A= AAH
(ii) ANAC
A = AAH = 1010 1010
C = SSH = 0101 0101
logical AND operation = 0000 0000
.. ANAC = OOH Accumu lator Content
All lessons of Computer Science 1& 2 pdf are given in the website www.tpspoint.com
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
Welcome to tpspoint.com
Assembly Language Programing ( PART 2)
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
Thank You for visiting
tpspoint.com
Welcome to tpspoint.com
Assembly Language Programing ( PART 3)
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
https://tpspoint.com/
Thank You for visiting
tpspoint.com
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
visit tpspoint.com for all chapters
f Ch ap ter (3) Introduction to INTEL
X-86 Family
Probable marks : 4
Scop e of the syllabus :-
• - Intro ducti on to adva nced micro proce ssors
utes of the X-86 farn.il
• Intro ducti on to X-86 famil y and study of majo r attrib
proce ssors .
• Prog ramm ing mode l of X-86 famil y of micro proce ssors .
byte I
AH AL
BH BL
CH CL
DH DL
SP
BP
SI
DI
-------------------------------------
Fig. 3.1
-- 5.
It has ex ternal mat h co-p rocessor.
It w as · evol ved in 1989-SX and
l991 -DX vers ion .
It has Inte rnal mat h co-p roce ssor.
It was evolved in 1993 .
-
Q. 5
~
tffifi@"'-
Compa re any four attribu tes of 486 DX with Pentiu m Processor.
Ans.:
Attrib utes 80486 DX Pentiu m
Data bus It is 32 bit microprocessor. It is 64 bit microprocessor. ----
Opera ting speed (MHz) Clock frequency 25-50.MHz Clock frequency 50 - 100 rnB--;
Introd uction date It was evolve d in 1991. It was evolve d in 1993. ---
~
Q. 6 Compa re any four attributes of 80386 & Pentiu m processor. (Oct. 12; March 191
Ans.:
Attrib ute 80386 Pentium -
It is 32 bit microprocessor It is 64 bit microprocesso;-
(1)
(2)
Data bus
Instruc tion cache It has 16 byte cache memor y It has 8 Kbyte cache -
(3) Data cache It's data cache is 256 bytes It's data cache is 8 Kbyte
(4) Math co-processor It has externa l co-processor It has interna l co-processor
(5) Interna l data word size Word size is 16 bit
.I. ,:'• •
Word size is 32 bits
(6) Introdu ction data It was introd ~ced u{ 1985 Introdu ced in 1993
(7) Operat ing speed in MHz 16-50M Hz 50-lO0 MHz
List the advanced microprocessors of INTEL X-86 family and mention
three
Q. 7
\ attributes of any one of them. ( 1 ~§ _" 1
lt•EN D
Ans.: List of INTEL X-86 microprocessors family :
;:::::=-_:::=-4 !,,-- J~ 3~
• 8086
' ' ) ( ' ) ('
-➔ L.t --"-J _"l , l ,
• 80286
4·- L1 \(,
~
•
•
80386
,80486 -
'
• INTEL PENTIUM I
'
,
• PENTI UMil
• PENTIUM III
PENTIUM IV
•
For w riting attributes of anyone of above please refer Q. No. 3.
Explain the advantages of the pentiu m processor with respect to the
followin g
Q. 8
featur es:
1) Dual pipelin ing 2) On-chip caches
9
3) Branch predic tion 4) 64-bit data bus (Mar. 06, 10, 20, Oct. 08, 10, Jul t l
Ans.:
1) Dua] pipelin ing : .,
m processor,
The use of super scalar architecture incorporates a dual-p ipelini ng in pentiu
a
which lets pentiu m to process more than one instruction per clo~k cycle and achieve
high level of p erform ance.
2) On-chip caches:
The data and ccx:ie on-chip caches 'improves the processing speed oi the pentium
processor.
3) Branch prediction : MftiNm)
i) The advantage of branch prediction is that, using it, the pentium makes ;m
educated guess where the next instruction follo\ving a conditional instruction will
be.
ii) This prevents the instruction cache from running dry during conditional
instruction.
4) 64-bit data bus :
i) P~ntium has 64 bit data bus which allows higher speed of data transfer to it.
ii) The data transfer speed of pentium is twice as fast as a processor with 32-bit data
bus.
Q.9 Compare any four attributes of 80286 and Pentium microprocessor. OR
State four differentiating features among any two X86 family micro.ressors.
tfoBMiliN•i 1111•18E@tbl
Ans.:
Attributes 80286 Pentium
Database It is a 16-bit microprocessor. It is a 64-bit microprocessor.
Address bus
-~ . -~~ --
\ Address bus is ,24-bit hence \
r--
~ d~esf bus is 32-bit hence can
I
ECX CH CL Count(CX)
~neral EDX DH DL Data (DX)'
Purpose
Registers ESI SI Source Index
EDI DI Destination Index
EBP BP Base pointer
FS J Instruction pointer
f.:IP IP
E Flag Plag H I Flag L Flag register
I
4) The programming model of 32-bit version of X-86 family consists of 3 register groups._ .
5) The first group contains eig_ht general purpose registers called EAX, EBX, ECX, EDX,
ESI, EDI, ESP and EBP registers. Where E tells us that these registers have extented
length. Each register can be addressed in 1, 8, 16 or 32-bit models. These registers are
used to store data during computations.
....,,,,,
rP5 Computer Science - II 3-8 Intro. to INTEL X-86 Family
6) The second group of registers is the segment group. This group consists of code
segment, stack segment and four data segment registers. The data segment registers are
DS, ES, FS and GS. These are 16-bit registers. These registers manage operation with
external memory. Address computations and data movements are performed here.
i):___Th_e_thir_._d_se_t-:o:--f:-r_egis=·:--:-te_r_s_co_ns_is_ts_o_f_Ins_tru_c_ti_o_n_P_o_in_t_e_r__:_(I_.P_..:_)_an_d_fl_a-=.g_r_egis=--·-t_e_r_.--:---;-
Q. 13 Draw neat labelled diagram and explain the :e_ros:!_amming_model of 16-bitversion
of X-86 family with register set. «•M•►l&fiiJmNJuujm@.mn,i:u
AnS-:
1) The 8088 and 8086 defines basic programming model for X-86 family.
2) The 16-bit version for programming model is used in 16-bit microprocessors of X-86
family i.e. in 8088, 8086 and 80286.
3) The 16-bit version of programming model of X-86 family is shown in the following
figure.
15 87 0
Accumulator
AX AH AL
Base Index
BX BH BL
Count
General
ex CH CL
Data
Purpose DX DH DL
Registers SI Source index
DI Destination index
BP Base pointer
· SP Stack pointer
cs Code segments ,
Segment ss Stack segments
register DS
\.
ES } Data segments
rn
Program.ming model of 16-bit version of X-86 family
Instruction pointer
Flag register
4) As shown in above figure the programming model of 16-bit version of X-86 family
consists of three register groups.
5) The first group contains 8-general purpose registers called A, B, C, D, SI, DI, SP and BP
registers. AL, BL, .... indicates lower bytes and AH, BH, .... indicates higher bytes. The
full 16-bit registers are referred as AX, BX, CX and DX, w here X stands for extended SI,
DI, BP, SP registers are always treated as 16-bit regis ters. These are pointer registers
because they are used to point locations within a segment.
Probable marks: 11
What is microcontroller ? Explain in short. (Oct. 2004,2010, June 2016, March 2018
Q.1
OR
Ans.
microprocessor, of
1) A microcontroller is a complete microprocessor system, consisting
limited amount of ROM or EPROM, RAM and I/0 ports, built on a single integrated
circuit.
standard microprocessor, ROM or EPROM, RAM, parallel 1/0 ports, timer, a clock,
serial ports.
A microcontroller is more complex than a microprocessor because it consists of many
5)
1/0 components.
6) eg.Intel's 8048, 8051
Q.2 Define microcontroller. State any four advantages of the same over microproceso
based system. Mar. 02, 05, Oct. 05, 10, 19;July 1
ns.
system.
Q.4 Draw an architectural block diagram of 8051 and explainit Oct -20
ELE
PEH
uonijsu
Ans.
As shown in the internal block diagram of 8051, there are 32 pins for four 6
1)
bidirectional ports.
In addition to these 32 pins, 8 pins are provided to connect clock crystal, timing a
2)
control signals and power supply.
The 8051 has 22 special function registers which are not part of 128 bytes ot RAM. They
11)
to F8H. These registers are used for their intended
Occupy memory space from 80H
purpose.
memory can be expanded by an
additional 60k bytes, making it
12) The 4k byte program
b4k bytes program memory. The data memory can also be expanded to b4k bytes
used to change
Q.6 Give the main features of 8048 microcontroller.
List all microcontrollers of 8051 family and state one feature of each.
Mar.2010,2011, Oct.02, Oct.04;March 18
Ans.: 8051 is a second generation microcontroller.
8048, 8049, 8050
The 8048, 8049 and 8050 all have identical
intel's first microcontroller was 8048.
)
architectures with the exception of memory size.
in each case, the memory doubles. 8048 supports 1K byte of internal memory. 804
2
of internal memory and 8050 supports 4K bytes of internal
supports 2k bytes
memory
8048 has 64 bytes internal RAM, including 32 bytes of register/memory location
The 8049 and 8050 have a total of 128 and 256 bytes of RAM respectively.
4) These microcontrollers are low cost products and hence are very popular.
8052
1) 8052 is a simple expansion of 8051
2) 8052 has 8K bytes of onboard ROM and 256 bytes of onboard RAM
3) 8052 allows programmers to write larger programs and that can use more data
5) The 8052 also has one extra l6-b1t counter-timer. This counter-timer gives moe
flexibility.
The technology is
better options for wireless network. There are expanding o r k
three basic tvpes of wireless
Wireless LAN 2. Extended LAN 3. Mobile new
computing.
For Advantages of Wireless Media l'lease refer
: Chapter 5 Q.3, Pg. No. 5-2.
Science II
TPSComputer 5-2 Networking Technology
What is a
Transmission Medium ? What are the advantages of wireless
Q.3 transmission ?
(Oct.2004; July 18)
Ans.: Transmission medium : Refer Q. No.1.
Ans.
(a) Bandwidth: (March 2020
(1) Bandwidth is the measure of the capacity of a medium to transmit data.
(2) Data transmission rates is number of bits transmitted per second.
(3) Bandwidth of a cable depends on cable length.
(4) A short cable can have greater bandwidth than a long cable so for all cable designs,
maximum lengths for cable runs are specified.
(5) Beyond these limits the highest frequency signals can deteriorate and error occurs
in data signals.
(b) Band usage: (March 2009
(1) The bandwidth is shared so that maximum usage is obtained.
There are two transmission modes, base band and broad band transmissions.
(2)
Base band devotes the entire capacity of the medium to one communication
(3)
channel.
Broad band enables two or more çommunication channels to share the bandwidth
(4)
of communication medium.
Base band is most common mode of operation. Most local area networks (LAN)
(5)
function in base band mode. In base band, signaling can be anolog or digital.
(6) Thebase band and broad band transmission modes are shown in following figure
Band
width
UUUU W W
medium.
Networking
TPS Computer Science - II
5-3
is absorbed and,
Technology
medium, part of the signal mak the
(2 As signals pass through the
signal weak. falls below
when signal strength certainn limits,
1
Installation requirement:
Before installation, prepare actual physical layout of network and then estimae
(a) cable and cost of installation.
For almost all media, the cost of installation exceeds than the cost of the able tself.
(b)
Bandwidth:
v Attenuation:
a
of how much a signal weakens as it travels through
Attenuation is a measure
(a)
mediumn.
is absorbed and makes the
b) As signals pass through the medium, part of the signal
signal weak.
WAN?
Ans.
interconnected collection of
autonomous computers or system
(1)
Computer network is an
r e s o u r c e s controlling
services.
of sharing
ofcomputers capable
network are :
4 T h e main advantages of computer
a) Network provides resource sharing.
information and software.
b) provides exchange of
other machine if one machine fails in the
c) Itprovides high reliability by using
air and traffic control.
network like military banking,
able itselr.
(b) For almost all media, the cost of installation exceeds than the cost of the
i Bandwidth:
v)Attenuation: a
weakens as it travels through
Attenuation is a measure of how much a signal
(a)
medium.
and makes the
the medium, part of the signal is absorbed
(b) As signals pass through
signal weak.
(EMID:
(March 2020)
interference
vi) Immunity from electromagnetic noise that distorts
interference consist of outside electromagnetic
(a) Electromagnetic
the signal in a medium. to decode the
signals and makes difficult for computers
b) EMI is interfering the
signal. LAN and
networks ? Distinguish between
the advantages of computer 17, 18)
Q.7
(March 2003,06,11, 19, Oct.2005, July
What are
WAN?
follows :
The differences between WAN and LAN are
as
(3)
LAN
WAN
is groun
A LAN (Local Area Network)
a
1 A WAN (Wide Area Network) is the
interconnection of LAN or MAN can | of computersrinterconnected within a
area such as room, building or a
be located entirely within a state, small
country or around the world. campus.
Data transfer speed is comparatively
2. Data transfer rate is comparatively
slower such as in Kbits/sec. 10 million high such as thousand bits per second to
Insulator
Jacket
Outer (protective plastic covering)
conductor (shield)
Center
conductor
Co-axial cable
(3) The components
of co-axial cable are as follows
(a) A center conductor is solid
a copper wire or stranded wire.
(b) An outer conductor form a tube
surrounding the inner conductor. This conductor 1s
made up of braided wires, metallic foil or both. The
shield. This serves as a ground and outer conductor is called as
protects inner conductor from EMI.
(c) Aninsulator layer keeps outer conductor
spaced evenly from the inner conductor
(d) A plastic jacket protects cable from
damage.
II Networking Technology
Science 5-6
TPS Computer
Disadvantages:
(1) relatively more expensive than Twisted Pair but less than
It is
fiber optic cable.
(2) Bandwidth capacity is comparatively less than fiber optic cable.
Conductors
Insulating
jackets
Twisted pair cablee
TPS Computer Science - II 5-7 Networking Technology
lt consists of two or more strands of copper wire twisted together.
(3)
4) his twisting reduces the sensitivity of the cable to EMI (electromagnetic interferena
nce)
and also reduces the tendency of the cable to radiate radio frequency noise.
(1) Shielded Twisted pair cable consist of one or more twisted pai
pairs of cables enclosed
foil wrap and woven copper shielding.
TPS Computer Science - II 5-8 Networking Technology
2) Following fig. shows IBM type 1 of shielded twisted pair cable:
Jacket
Two Shield
twisted pairs
(3) The shield is connected to the ground portion of the electronic device to which cable is
connected. Ground portion is electrical reference
point.
(4) A properly grounded shield prevents signals from getting into or out of the cable.
(5) The characteristics of shielded Twisted cable are
pair given below:
) Cost: The cost of STP cable is more than that of co-axial or UTP cable. Its cost is less
than that of thick co-axial or fibre
optic cable.
(ii) Installation : The installations required for STP cable depends upon the type of
network. As per the type of network, different connectors are used.
(ii) Capacity: STP cable has a theoretical capacity of 500 MBPS. Practically it is around
155 MBPS with 100 meter cable run. The most common data rate for STP cable is
16 MBPS.
iv) Attenuation : All Twisted pair cables have attenuations. This limits the length of
cable. 100 meter limit is most common.
(v) EMI characteristics: The shield in STP cable results in good EMI characteristics.
STP cable has low sensitivity towards electromagnetic interference.
Q.12 Write a short note on unshielded twisted pair cable with its characteristics.
(Mar. 2002)
Ans.
(1)UTP consists of a number of twisted pair with plastic jacket.
(2) It is commonly used in telephone systems. Now-a-days UTP cable is being used in LAN
instead of co-axial cable.
(3) AUTP cable is shown in following figure:
(4
9The characteristics of Unshielded Twisted pair cable are given below:
(i) Cost: UTP cable is cheaper than any other cable. The cost of
category 5 twisted pair
cable is high.
(ii) Installation: UTP cable is easy to install. The equipments required are also low
cost. UTP system can be easily reconfigured.
Science - II
T P SC o m p u t e r
5-10
Networking Technology
TheThe fibr optic cable is used in
This cable have
optical transmission
extremely high bandwidth. It has system.
) several kilometers.
zero sensitivity to EMI and
runs ovcs
ver
The characteristics of fibre
9 optic cable are given
(i) Cost: The cost of fibre
optic cable is
below:
pair cable. more than that of co-axial cable and Iwistea
i) Installation Fibre optic cable
:
minimum bend radius. They may requires skilled installa tion. Every cable has
not be stretched. get damaged if bent sharply Fibre
optic cable can
Q.16 Compare the characteristics of fibre optic cable and co-axial cable. Mention at least
points. (March 2002, Oct. 2005)
three
Ans.
1 optic cable. Fibre optic cables are
than that of fibre
LOst: Cost of co-axial cable is less
2)
expensive. and easier than that of fibre optic
stallation : Installation of co-axial cable is cheaper
cable.
3) cable is 10 MBPS, while that
data transmission capacity of co-axial
Cay
pacity: In general
ot fibre optic cable is 100 MBPS
5-11
Networking Technolo
TPS Computer Science - II
cable has serno
4) EMI : Co-axial cable is less
sensitive to EMI, while fibre optic no
sensitivity to
EMI. attenuation is very less
5) Attenuation: It is m o r e in co-axial
cable. In optic fibre,
Twisted pair cable. Mention
atleast three npoints.
cable with
Q.17 Compare the co-axial (Oct. 2003, 2010, March 200
Ans.
Coaxial Cable
Twisted Pair Cable
It is a hallow cable with a solid copper at #hhe
(1) It consists of a pair of wires or one or
more pairs of two twisted copper wires center of the cable surrounded by plasi
insulation. from
Relatively expensive i.e. twice or thrice than
(2) This is inexpensive medium.
twisted pair.
(4) Attenuation is more than coaxial cable. Attenuation is less than twisted pair cable.
(5) Bandwidth capacity is from 1 to Bandwidth capacity is from 500 Mbps upto
100 Mbps upto 100 mtrs. 100 mtrs.
(6) They can be used only for short It is commonly used in network.
distance communication.
Q. 18 Compare the characteristics of Fiber-Optic and Co-axial Cable. Mention at least
three points.
Ans:
(March2008;July 18)
Fiber-Optic Co-axial Cable
i) This Cable has no sensitivity to EMI
| i) EMI effect is minimum
ii) Optical fibre cable can transmit
ii) Bandwidth capacity is form 500 mbps
100mbps for several kilometers.
upto 100 mbps
ii) Optical fibre are expansive. i) Co-axial cable are less
expensive.
Q.19 Compare any four attributes of
Ans.:
Coaxial thicknet Cable with UTP cable. June 2016
II|
TPS Computer 5-12 Networking Technology
0 .2 0 Explain the
tollowing wireless media in detail, OR State and
networking media. Explain any two wireless media. explain difterent
Oct. 2005)
Ans.
( Radio waves
(1) Radio waves are
easy to
generate. They can travel long distance and can
buildings easily. Hence, radio waves are widely used peneurate
for both indoor and
purposes. Outabo
(2) Radiowaves omnidirectional i.e. the waves travel in all directions, in the ree
are
space so that there is no need to place the receiver or transmitter along a direct line
of sight.
(3) Radio communication have variety of frequency ranges that
wave
are utilised for
various communication applications.
(4) As radiowaves covers large distance, interfare between users is a problem. For th1s
reason government license is necessary to transmit radiowaves.
(5) Radio communication having major drawback that it may be disturbed by rains,
bounce back from obstacles. It offers low bandwidth for data communication.
(1I) Microwaves:
(1) Microwaves travels in straight lines and therefore narrowly focused, concentrating
all the energy into beam.
(2) For microwaves transmitting and receiving antennas should be accurately alligned.
This directionality allows multiple transmitters linear in a row to communicate
with multiple receivers linear in a row without interference.
(3) Since, microwaves travels in straight lines, for longer distances periodic repeaters
are necessary.
(4) Unlike radiowaves, at lower frequency microwaves can not penetrate buildings.
(IT) Infrared and millimeter waves:
(1) Unguided infrared and millimeter waves are widely used for short range
communication.
Q.21 State four LAN wireless transmission methods. Explain any two of them. (Oct. 2003)
Ans.:
** Wireless LAN can use one of the transmission method:
transmission
(a) i n intrared
100 feet.
(6) This is limited within
bandwidth can
be supported.
(c) Upto 10 Mbps transmissiOn.
infrared
(a)Remote control of TV uses
(ii) Laser
are used.
transmission LASER rays
(a) In laser
are in straight of sight
(b) This receiver and transmitter
WAN transmission.
( C T h i s can be used for LAN and
5-14
0.23
Q. 23 What is topology ? Explain BUS topology in detail.
(Oct. 2006, 2007, 2009, 2010, March 2011)
Ans.
Topology reters to the way in which network of computers is connected.
(1)
(2) Nodes in the network are physically interconnected in some configuration to provide
efficient communication. This configuration is called as topology.
devices that make
3) A topology defines the arrangement of nodes, cables and connectivity
up the network.
BUS topology:
In BUS physical topology, all the devices are connected to a common shared cable
(1) a
O
PC
PC Server
reflecting back.
10 MBPS.
is ethernet at
(7) for BUS topology
Onmonly used implementation
*
(8) Advantages:
) The bus system is much faster.
branches to form
arnother topology.
i) The bus topology can be extended with sub
other node's communication.
(11) Breakdown of any failure rnode does not affect
(a) Bus topology is widely used in LAN network.
Q.24 Explain RING topology. Give its advantages and disadvantages.
(March 09,18, July 2019
Ans.
(1) RING topologies are wired in a circle. Each node is connected to its neighbours on either
side, and the data transmits along the ring in one direction only.
(2) Each device incorporates a receiver and a transmitter and serves as a repeater that
passes the signal onto the next device in the ring.
R- Receiver
T-Transmitter
R
PO
PC
PC
II
Computer
TPS 5-16 Networking Technology
Advantages:
Disadvantages:
8)
Costly wiring is required for RING topology.
)Expensive adapter cards.
(i) Difficult connections.
0.25 Explain in short, STAR topology.
March 2006, 11, 18, 19, Oct. 2007;July 2019)
Ans.
(1) In a STAR topology all the workstations are connected to central hub.
(2) The hub receives signal froma workstation and routes it to the proper destination.
() STAR physical topology is often implemented to implement BUS or RING logical
topology.
(4) A STAR topology is shown in following figure:
PC
PC
HUB ROUTER
PC
PC
PC
5) Advantages
)
Adding a new workstation is easier than that in BUS or RING topology.
5-18
(March2003, 2005, Oct. 2008; March 2017; June 2016; July 2017
Ans.
(1) Ethernet is a local area network technology, with networks tradionally operating within
single building.
(2) Atmost, Ethernet devices can have a few hundred meters of cable between themn.
Modern technology allows Ethermet to span upto 10 kms.
(3) Ethernet devices are connected to a common shared medium that provides the path
along which the electronic signals will travel. Historically, this medium was co-axial
cable. But, now-a-days twisted pair cable or fibre optic cable are also used.
(4) Ethernet network transmit data in small units called frames.
(5) Each frame must contain source address as well as destination address, which identifies
receipant and sender of message. The address will uniquely identify node. No two
Ethernet devices can have same address.
(6) Ethernet network is as shown in following figure.
File
Computer Server Computer
A C
Computer Computer
B D
R
R
R-Receiver
T-Transmitter
PO R
PC PC
i) Token passing:
1) Token passing utilizes a frame called a token, which circulates around the network.
2) A computer that needs to transmit must wait until it receives the token.
3) When computer receives token, it is permitted to transmit.
4) When computer completes transmitting, it is passes the token frame to the next
station or token ring network.
Q.34 Discuss access methods of networking. OR Discuss any two access methods of
networking? (March 2003, 2020, Oct. 2009)
OR Explain the following access methods brief.Oct.2002, 04, 08, March 2006, 18
i) Contention (ii) Token passing
Explain in brief Token passing and Polling' access. methods (Mar.10;July 17, 18
Ans.
(1) An access method is a set of rules governing how the network nodes share the
transmission medium.
(2) There are three most important types of media access methods:
(A) Contention (B) Polling () Token pasing
(3) Contention:
a) In contention, any computer in the network can transmit at any time (first come
first served).
attempt to transmit at the same
b) This system breaks down when two computeres
time. This is a case of collision.
used. Here each computer listens
c) To avoid collision, carrier sensing mechanism is
to the network before attempting to transmit.
If network is busy, it waits until
network quiets down.
to the network as they transmit. If
d) In carrier detection, computers continue to listen
that interteres with the signal it is sending, it stops
computer detects another signal to
wait random amount of time and attempt
transmitting. Both computers then
transmit.
Networking lechno
TPS Computer Science - Il
5-21
access
control od
method
fechnolog
on LANs.
onIA
media
most popular
e) Contension methods are
Collision
-- -
(4) Polling
a) In polling based systems, there is a device (called controller or master devicel
a) to
poll other devices on the network to see whether they are ready to either transmit
t
or receive data.
b) This access method is not widely used on network because the polling itself can
cause a fair amount of network traffic.
(5) Token passing :
a) Token passing utilizes a frame called a token, which circulates around the network
b) A computer that needs to transmit must wait until it receives the token.
c) When computer receives token, it is permitted to transmit.
d) When computer completes transmitting, it is passes the token frame to the next
station or token ring network.
Q.35 Explain the following terms with respect to cabling
(A) 10 BASE 2 (B) 10 BASE 5
(C) 10 BASET (D) 10 BASE FL
Ans.
(A) 10 BASE 2:
(i) This uses thinnet of co-axial cables.
(i) Each network connects
directly to the network cable with a
(i) The minimum cable distance between T-connector.
clients must be 1.5 feet.
(iv) The T connector must be
connected
(vThe entire network cabeling scheme directly
to the network
adapter.
cannot exceed 925 meters
(B) 10 BASE 5: This uses thicke net
co axial cable.
-
(3035 feet).
i) BASE 5 uses an external
10
transreceiver to attach to the
(i) The minimum cable distance network adapter caard.
between transceivers is 2.5
(ii) The maximum network metres.
segment length is 500 meter
iv) The entire network
cabling scheme cannot (1640 feet)
exceed 2500 meters.
(8200 fee
TPS Computer Science II
-
5-22
Networking Technology
(C) 10 BASET:
() This uses UTP cable.
i) The maximum number of
computers on a LAN is 1024
(i) The cabling should be UTP category 3, 4 and 5. STP cable can also be used.
(iv) The cable segment length (hub to transceiver) is 100 meters (328 feet)
D) 10 BASE FL:
Protocols
0.36 What is meant by protocol ? Explain the concept of TCP/IP protocol.
(March 2004, 08, 11, Oct. 2003, 04; June 2016; March 2018,July 2019)
Ans.:
(2) Internet protocols are called TCP/IP (Transmission Control Protocol/Internet Protocol)
protocols. This protocol do not belong any one company and technology is available to
everybody.
(3) TCP/IP protocol use three types of addresses for network addressing:
(a) Hardware or physical address is used by the data link and physical layers.
(b) Internet protocol address provides logical node identification. This address is
unique address assigned by administrator expressed in four parts dotted notation.
e.g. 123.144.131.21
9.37 Explain modem in detail. (March 2006, 2010, Oct 2010; March 2017)
Ans.
(1) Computers store digital data,telephone lines can only transfer analog data. If a
while
then it must convert digital
computer is to be connected to internet through telephone,
data to analog data before transmitting the computer signals.
(2) form is called modulation and reconverting it to
Converting one signal form to another
original form is called as demodulation.
internet.
3) odem is modulator/demodulator. Modem is used
to connect computer to
Modems convert digital data to analog data and vice-a-versa.
Networkking Techne
5-23
TPS Computer Science - II
Demodulation . Computer
Computer Modulation Analog data
Demodulation
Modulation
LL
Digital Telephone lines
Modem Digital
data Modem data
Hubs
(1) In some network topologies,
mostly ARCNET based star
used.
topologies, device
ae a hup
Computer. Science II-
TPS
5-24
Hub is a Networking Technology
(2) connecting
device in which
cables can be connected without
wires tocentralise network traffic through solderug
(3) It manages the a
single
cabling in the network and sends connecting point.
the network. signal to the other or
components
Figure shows a network
inter-connected with hub.
HUB
in place of router.
ID Repeater
(Oct 2010, March 2018, 19
extend.
(1) A repeater is a mostly used in Ethernet to
hardware unit
to another.
and amplifies the signal from one Ethernet segment
(2) Arepeater reshapes
Figure shows network with repeaters
Repeater
Weak
Amplified
signal signal
to attach
repeater is used
and a
vertical up in the
building backbone cable.
A backbone cable the office to the
runs
each floor of
running in between them, if
an Ethernet segment more than two repeaters
(2)
ethernet
Routers can use network address to assist
network address
is called as routing. Routers
jiverng
packets according to logical
routing. to determine most efficient na
intelligent. They can use algorithms for
3) Routers are
network.
sending a packet to any given LANs into smaller segments.
(4) Routers can also be used to divide large, busy network (WAN).
LAN to wide area
(5) Routers are also employed to connect
(6) Routers are oftwo types
1. Static routers Dynamic routers
2.
Static routers do not determine paths, but you need to specify them. Dynamic rotter
havecapacity to determine paths (routes).
Write the functions of each of the following devices in short:
Q.41
(March 2008, 2011 Oct.2003, 2004,2005, 2007, 200
) Modem (ii) Repeater
(ii) Hub (iv) Routers
Ans.: (i) Modem:
(a) Modem means modulator / demodulator.
(b) It is used to connect computer to internet.
() Modem convert digital data to analog data and vice-a-versa.
ii) Hub
(a) Hub is a connecting device in which cables can be connected to centralize network
traffic through a single connecting point.
(b It manages the cabling in the network and sends signal to the other componentso
the network.
(iii) Repeater:
(a) A repeater reshapes and amplifies the signal from one network to
(iv) Routers another.
(a) Routers are internetwork
similar or dissimilar LANs.connectivity
devices used to connect two
topol cally
(b) Routers use algorithm to determine most
efficient path for sending a
given network. packet any
Q. 42 Explain the following terms
(a) Modem (March 2003
(b) Hub (c) Repeater
Ans.: Please refer Q. 36.
Q.43 Give atleast two
advantages and one
media. disadvantage of wireless media
l aover cable
ov 2014
March
Ans.: Advantages of wireless media:
(1) Communication can reach rural and hilly area.
(2) High data rate transmission by using
large bandwidth.
Science II
5-26 Networking Technology
TPSComputer
sadvantages
of wireless media
skilled labour require to install. This increases cost of network.
) disturb the signal.
EMI and outside noise
(2
Explain CP/IP protocol in detail. (March 2019)
.44
Ans. :
A node address
is the address of the entity of device on the Logical network
network.
address is the segment on the network to which node is attached.
network
TCP/IP uses numbering scheme. This number is IP address. All devices on
in value
need a unique IP address. An IP address is a set of four numbers, they can range
between 0 to 255. Each number is separated by period.