Friday, January 2, 2026

📘 PAPER 6 – DATA COMMUNICATION & NETWORKS (UNIT 2 – DATA LINK LAYER & MEDIUM ACCESS CONTROL) university of allahabad

 

🔴 UNIT 2 – DATA LINK LAYER & MEDIUM ACCESS CONTROL


1️⃣ Data Link Layer – Introduction

✅ Definition

The Data Link Layer is the second layer of the OSI model.
It is responsible for reliable data transfer between two directly connected nodes.


✅ Main Functions

✔ Framing
✔ Error control
✔ Flow control
✔ Access control
✔ Physical addressing


2️⃣ Framing

🔹 Definition

Framing divides the data stream into manageable units called frames.


🔹 Methods of Framing

1. Character Count

  • Frame size specified in header
    ❌ Error-prone


2. Byte Stuffing

  • Special character added to data
    ✔ Used in HDLC


3. Bit Stuffing

  • Extra bit inserted after 5 consecutive 1s
    ✔ Used in modern networks


3️⃣ Error Detection Techniques


🔹 1. Parity Check

  • Adds 1 parity bit

  • Detects single-bit error


🔹 2. Checksum

  • Sum of data bits

  • Used in TCP/IP


🔹 3. Cyclic Redundancy Check (CRC)

  • Most powerful method

  • Uses polynomial division

✔ Highly reliable
✔ Widely used


4️⃣ Error Control

Error control ensures reliable data delivery.

Methods:

✔ Error detection
✔ Error correction
✔ Retransmission


5️⃣ Flow Control

Definition:

Controls the amount of data sent to avoid receiver overflow.


Methods:

  1. Stop-and-Wait

  2. Sliding Window


6️⃣ Sliding Window Protocol

Types:


🔹 1. Stop-and-Wait ARQ

  • Send one frame

  • Wait for ACK

  • Simple but slow


🔹 2. Go-Back-N ARQ

  • Sends multiple frames

  • Retransmits all frames after error


🔹 3. Selective Repeat ARQ

  • Retransmits only erroneous frame

  • Efficient but complex


7️⃣ Medium Access Control (MAC)

Definition:

MAC controls who can transmit data on shared medium.


8️⃣ Channel Allocation Methods


🔹 1. Static Channel Allocation

  • Fixed bandwidth

  • Inefficient for bursty traffic


🔹 2. Dynamic Channel Allocation

  • Bandwidth allocated as needed

  • Used in LANs


9️⃣ Multiple Access Protocols


🔹 ALOHA Protocol

Types:

  1. Pure ALOHA

  2. Slotted ALOHA


Pure ALOHA

  • Send anytime

  • High collision

  • Low efficiency (~18%)


Slotted ALOHA

  • Time divided into slots

  • Higher efficiency (~36%)


🔹 CSMA (Carrier Sense Multiple Access)

Types:

1️⃣ CSMA/CD (Collision Detection)

  • Used in Ethernet

  • Detects collision and stops transmission


2️⃣ CSMA/CA (Collision Avoidance)

  • Used in Wi-Fi

  • Avoids collision before transmitting


1️⃣0️⃣ IEEE Standards

StandardDescription
IEEE 802.3Ethernet
IEEE 802.11Wi-Fi
IEEE 802.5Token Ring
IEEE 802.15Bluetooth

1️⃣1️⃣ Data Link Layer Protocols

✔ HDLC
✔ PPP
✔ Ethernet


📌 EXAM IMPORTANT QUESTIONS (UNIT 2)

✔ Explain Data Link Layer
✔ Framing techniques
✔ Sliding Window Protocol
✔ ALOHA vs CSMA
✔ Error detection methods
✔ CRC explanation

📘 PAPER 6 – DATA COMMUNICATION & NETWORKS (UNIT 1 – INTRODUCTION & PHYSICAL LAYER) university of allahabad

 

📘 PAPER 6 – DATA COMMUNICATION & NETWORKS

🔴 UNIT 1 – INTRODUCTION & PHYSICAL LAYER


1️⃣ Introduction to Data Communication

✅ Definition

Data Communication is the process of transferring data from one device to another using a transmission medium.


Components of Data Communication

  1. Sender

  2. Receiver

  3. Message

  4. Transmission Medium

  5. Protocol


Characteristics of Data Communication

Delivery
Accuracy
Timeliness
Jitter-free communication


2️⃣ Goals of Computer Networks

Resource sharing
✔ Communication
Reliability
Cost reduction
Scalability


3️⃣ Network Structure & Architecture

Network Architecture:

Defines how network is designed and how devices communicate.


4️⃣ OSI Reference Model

OSI has 7 Layers

LayerNameFunction
7ApplicationUser interface
6PresentationEncryption
5SessionSession control
4TransportReliable delivery
3NetworkRouting
2Data LinkFraming
1PhysicalTransmission

👉 Exam Tip:

Remember as:
A-P-S-T-N-D-P


5️⃣ Services Provided by OSI Model

✔ Data transmission
✔ Error control
✔ Flow control
✔ Connection management


6️⃣ Network Topologies

🔹 1. Bus Topology

  • Single cable

  • Low cost

  • Difficult troubleshooting


🔹 2. Star Topology

  • Central hub

  • Easy maintenance

  • High reliability


🔹 3. Ring Topology

  • Circular connection

  • Data flows in one direction


🔹 4. Mesh Topology

  • Each node connected to every other

  • High cost

  • Highly reliable


7️⃣ Network Design

Network Design Factors:

✔ Delay
✔ Bandwidth
✔ Cost
✔ Reliability


8️⃣ Physical Layer

Functions:

✔ Bit transmission
✔ Electrical specifications
✔ Data rate control


9️⃣ Transmission Media


🔹 Guided Media

1. Twisted Pair Cable

  • UTP

  • STP
    ✔ Cheap
    ❌ Noise sensitive


2. Coaxial Cable

✔ Better shielding
✔ Used in cable TV


3. Optical Fiber

✔ High speed
✔ Long distance
✔ Secure


🔹 Unguided Media

✔ Radio waves
✔ Microwave
✔ Infrared


🔟 Switching Techniques


🔹 Circuit Switching

  • Dedicated path

  • Used in telephone network


🔹 Packet Switching

  • Data divided into packets

  • Used in Internet


🔹 Message Switching

  • Store and forward technique

  • Not used now


📌 EXAM IMPORTANT QUESTIONS (UNIT 1)

✔ OSI model with diagram
✔ Transmission media
✔ Network topology
✔ Switching techniques
✔ Physical layer functions

📘 PAPER 5 – OPERATING SYSTEM (UNIT 5 – SHELL PROGRAMMING & FILTER COMMANDS) university of allahabad

 

🔴 UNIT 5 – SHELL PROGRAMMING & FILTER COMMANDS


🟢 1. Introduction to Shell

✅ What is a Shell?

A Shell is a command-line interpreter that:

  • Accepts user commands

  • Executes them

  • Acts as an interface between user and OS


🔹 Types of Shells in Linux

ShellDescription
shBourne shell
bashBourne Again Shell (most used)
cshC shell
kshKorn shell
zshAdvanced shell

👉 Bash is most commonly used.


🟢 2. Shell Programming

✅ Definition

Shell programming is writing a script to automate tasks using shell commands.


🔹 Advantages

✔ Saves time
✔ Automates tasks
✔ Easy to write
✔ Used in system administration


🟢 3. Structure of Shell Script

#!/bin/bash echo "Hello World"

Explanation:

  • #!/bin/bash → Shebang line

  • echo → Print output


🔹 Running a Shell Script

chmod +x file.sh ./file.sh

🟢 4. Variables in Shell

User Defined Variable

name="Amit" echo $name

System Variables

$HOME $USER $PATH

🟢 5. Read Command

echo "Enter name:" read name echo "Hello $name"

🟢 6. Conditional Statements


🔹 if Statement

if [ $a -gt $b ] then echo "A is greater" fi

🔹 if-else

if [ $a -eq $b ] then echo "Equal" else echo "Not equal" fi

🔹 Case Statement

case $choice in 1) echo "One";; 2) echo "Two";; *) echo "Invalid";; esac

🟢 7. Looping Statements


🔹 for Loop

for i in 1 2 3 do echo $i done

🔹 while Loop

i=1 while [ $i -le 5 ] do echo $i i=$((i+1)) done

🟢 8. Command Line Arguments

echo "File name: $0" echo "First arg: $1" echo "Second arg: $2"

🟢 9. Filter Commands

Filter commands process text input and give output.


🔹 1. grep

Search text in file

grep "hello" file.txt

🔹 2. sed

Stream editor (search & replace)

sed 's/old/new/' file.txt

🔹 3. awk

Used for report generation

awk '{print $1}' file.txt

🔹 4. cut

Extract columns

cut -d ":" -f1 file.txt

🔹 5. sort

Sort data

sort file.txt

🔹 6. uniq

Remove duplicate lines

uniq file.txt

🟢 10. Pipes

Used to connect commands.

ls | grep ".txt"

🟢 11. Shell Keywords

KeywordUse
ifCondition
thenExecution
fiEnd if
forLoop
doLoop start
doneLoop end

🟢 12. Shell Script Example

Program: Check Even or Odd

echo "Enter number:" read n if [ $((n % 2)) -eq 0 ] then echo "Even" else echo "Odd" fi

📌 IMPORTANT EXAM QUESTIONS (UNIT 5)

Explain shell scripting
Write shell program for even/odd
Explain grep, sed, awk
✔ Explain pipes & filters
Write notes on shell variables
Explain case statement

📘 PAPER 5 – OPERATING SYSTEM (UNIT 4 – UNIX & LINUX COMMANDS) university of allahabad

 

🔴 UNIT 4 – UNIX & LINUX COMMANDS


1️⃣ Introduction to UNIX / Linux

✅ UNIX

UNIX is a multi-user, multitasking operating system developed at AT&T Bell Labs.

✅ Linux

Linux is an open-source UNIX-based operating system.


🔹 Features of Linux

✔ Open source
✔ Secure
✔ Portable
✔ Multi-user
✔ Multitasking


2️⃣ Linux File System Structure

DirectoryPurpose
/Root directory
/binSystem commands
/etcConfiguration files
/homeUser files
/usrUser programs
/varVariable files
/tmpTemporary files

3️⃣ Basic Linux Commands


📁 Directory Commands

CommandDescription
pwdShow current directory
lsList files
cdChange directory
mkdirCreate directory
rmdirRemove empty directory

📄 File Commands

CommandDescription
touchCreate file
catView file
cpCopy file
mvMove/rename file
rmDelete file
fileFile type

📘 Viewing Files

CommandUse
moreView page by page
lessScrollable view
headFirst 10 lines
tailLast 10 lines

4️⃣ File Permission Commands

Permission Types:

SymbolMeaning
rRead
wWrite
xExecute

Example:

-rwxr-xr--

Change Permission:

chmod 755 file.txt

5️⃣ Disk Related Commands

CommandDescription
dfDisk free space
duDisk usage
mountMount disk
umountUnmount disk

6️⃣ Process Management Commands

CommandFunction
psShow running processes
topReal-time process
killKill process
niceSet priority
sleepDelay execution

7️⃣ Input / Output Redirection

Symbols:

SymbolUse
>Output redirect
>>Append
<Input redirect
``

Example:

ls > file.txt cat file.txt | grep abc

8️⃣ Background Processing

command &

9️⃣ Process Scheduling Commands

CommandPurpose
atSchedule job
cronRepeated jobs
crontabCron table

🔹 Example Cron Job:

* * * * * echo "Hello"

🔟 File Editing Commands

Editors:

✔ vi
✔ vim
✔ nano


vi Editor Modes:

  1. Command mode

  2. Insert mode

  3. Exit mode


Important vi Commands:

CommandFunction
iInsert
:wSave
:qQuit
:wqSave & quit
ddDelete line

📌 EXAM IMPORTANT QUESTIONS (UNIT 4)

✔ Explain Linux file system
✔ Explain Linux commands
✔ File permission in Linux
✔ Explain I/O redirection
✔ Explain process management commands
✔ Explain cron & at

📘 PAPER 5 – OPERATING SYSTEM (UNIT 3 – FILE SYSTEM & I/O MANAGEMENT) university of allahabad

 

🔴 UNIT 3 – FILE SYSTEM & I/O MANAGEMENT


1️⃣ File System – Introduction

✅ What is a File?

A file is a collection of related information stored on secondary storage.

✅ File System

The file system is a method used by the OS to:

  • Store files

  • Retrieve files

  • Organize data efficiently


2️⃣ File Attributes

Each file has the following attributes:

AttributeDescription
NameFile name
TypeFile extension
SizeFile size
LocationDisk location
ProtectionAccess rights
Time & DateCreation/modification time

3️⃣ File Operations

Common file operations:

✔ Create
✔ Open
✔ Read
✔ Write
✔ Close
✔ Delete


4️⃣ File Access Methods


🔹 1. Sequential Access

  • Data accessed sequentially

  • Example: Text file

✔ Simple
❌ Slow for random access


🔹 2. Direct Access

✔ Fast
✔ Efficient


🔹 3. Indexed Access

  • Uses index to locate data

  • Combination of sequential & direct


5️⃣ Directory Structure

Types of Directory Structures:


🔹 1. Single Level Directory


🔹 2. Two-Level Directory

  • Separate directories for each user


🔹 3. Tree Structure Directory


🔹 4. Acyclic Graph Directory

  • Shared files

  • No cycles


6️⃣ File Allocation Methods


🔹 1. Contiguous Allocation

✔ Fast access
❌ External fragmentation


🔹 2. Linked Allocation

✔ No fragmentation
❌ Slow access


🔹 3. Indexed Allocation

✔ Fast access
✔ No fragmentation


7️⃣ Free Space Management

Methods used to manage free disk space:

Bit vector
Linked list
Grouping
Counting


8️⃣ Disk Scheduling

Purpose:

Reduce disk access time


🔹 Disk Scheduling Algorithms


1️⃣ FCFS (First Come First Serve)

✔ Simple
❌ High seek time


2️⃣ SSTF (Shortest Seek Time First)

✔ Better than FCFS
❌ Starvation possible


3️⃣ SCAN (Elevator Algorithm)

✔ Moves in one direction
✔ Reduces starvation


4️⃣ C-SCAN

✔ Uniform wait time
✔ Used in modern OS


9️⃣ I/O Management

I/O System Responsibilities:

✔ Device communication
✔ Error handling
✔ Buffering
✔ Spooling


🔹 I/O Techniques

1. Programmed I/O

CPU controls I/O
❌ Slow


2. Interrupt Driven I/O

CPU works during I/O
✔ Better performance


3. Direct Memory Access (DMA)

  • Data transferred directly to memory

  • CPU not involved

✔ Fastest
✔ Efficient


🔟 Protection & Security


🔹 Protection

Ensures controlled access to resources.

🔹 Security

Prevents unauthorized access.


Protection Mechanisms:

✔ Passwords
Access control lists
Encryption


📌 EXAM IMPORTANT QUESTIONS (UNIT 3)

✔ Explain file allocation methods
✔ Disk scheduling algorithms
✔ Explain DMA
File access methods
Directory structure
✔ Difference between FCFS and SSTF

📘 PAPER 5 – OPERATING SYSTEM ( UNIT 2 – MEMORY MANAGEMENT) university of allahabad

 

🔴 UNIT 2 – MEMORY MANAGEMENT


1️⃣ Memory Management – Introduction

✅ Definition

Memory management is the function of the OS that:

  • Allocates memory to processes

  • Deallocates memory after use

  • Manages primary and secondary memory efficiently


2️⃣ Memory Management Requirements

Relocation
Protection
Sharing
Logical organization
Physical organization


3️⃣ Memory Management Techniques


🔹 1. Multiprogramming with Fixed Partitions

Concept:

  • Memory is divided into fixed-size partitions

  • One process per partition

Advantages:

✔ Simple
✔ Easy implementation

Disadvantages:

Internal fragmentation
❌ Wastage of memory


🔹 2. Multiprogramming with Variable Partitions

Concept:

  • Memory allocated as per process size

  • No fixed partitions

Advantages:

✔ Less internal fragmentation

Disadvantages:

External fragmentation


4️⃣ Memory Allocation Strategies


🔹 First Fit

Allocates first available memory block

✔ Fast
❌ Fragmentation


🔹 Best Fit

Allocates smallest possible block

✔ Less wastage
❌ Slow


🔹 Worst Fit

Allocates largest block

❌ Poor utilization


5️⃣ Swapping

Definition:

Process is temporarily moved from main memory to disk.

Purpose:

✔ Free memory
✔ Improve multiprogramming


6️⃣ Virtual Memory

Definition:

Virtual memory allows execution of processes even if:

  • Entire program is not in memory

Uses:
✔ Secondary memory
Demand paging


7️⃣ Paging

Concept:

  • Memory divided into pages

  • Physical memory divided into frames

Address Format:


Advantages:

✔ No external fragmentation
✔ Easy memory management


Disadvantages:

❌ Internal fragmentation


8️⃣ Segmentation

Concept:

Memory divided based on logical units:

  • Code

  • Data

  • Stack

Address Format:

Segment number | Offset

Advantages:

✔ Logical view
✔ Better protection

Disadvantages:

❌ External fragmentation


9️⃣ Paging vs Segmentation

PagingSegmentation
Fixed sizeVariable size
No external fragmentationExternal fragmentation
Hardware basedLogical view
FastFlexible

🔟 Virtual Memory Techniques


🔹 Demand Paging

Pages loaded only when needed.


🔹 Page Fault

Occurs when required page is not in memory.


🔹 Page Replacement Algorithms

1. FIFO

Oldest page removed

2. LRU

Least recently used page removed

3. Optimal

Replaces page not used for longest time (best but impractical)


1️⃣1️⃣ Thrashing

Definition:

System spends more time paging than executing.


Causes:

  • High degree of multiprogramming

  • Insufficient memory


Prevention:

✔ Reduce multiprogramming
✔ Increase RAM
✔ Use good page replacement


📌 EXAM IMPORTANT QUESTIONS (UNIT 2)

✔ Explain paging and segmentation
✔ Difference between paging & segmentation
✔ Explain virtual memory
✔ Explain page replacement algorithms
✔ What is thrashing?
✔ Explain memory allocation strategies

How we can get higher marks in semester exam

 Here we talk about how to get higher marks in exams or test paper. Now we have to remember that the test and exams are follow the pattern b...