UNIT_1_sem asnwers (2)
UNIT_1_sem asnwers (2)
• When satellite and radio networks were added later, the existing protocols had trouble
interworking with them, so a new reference architecture was needed.
• Thus, from nearly the beginning, the ability to connect multiple networks in a
seamless way was one of the major design goals.
• The DoD wanted connections to remain intact as long as the source and destination
machines were functioning, even if some of the machines or transmission lines in
between were suddenly put out of operation.
• TCP stands for Transmission Control Protocol and IP stands for Internet Protocol.
• It is also called a network interface layer or link layer. It can be considered as the
combination of physical layer and data link layer of the OSI model.
• It accepts IP packets from the network layer and encapsulates them into frames.
• It is not really a layer at all, in the normal sense of the term, but rather an interface
between hosts and transmission links. Protocols used in this layer are:
ARPANET:-
• It is world first packet switching Software & core Software came to compose the
global Internet.
SATNET:-
• SATNET, also known as satellite network that formed as an initial segment of the
Internet.
Packet radio
• Packet radio is a digital radio communications mode used to send packets of data.
The Internet layer is responsible for logical transmission of data packets over the
internet.
• It routes each of the data packets independently from the source to the destination,
using the optimal route.
• Address Resolution Protocol, ARP −This protocol maps the logical address or the
Internet address of a host to its physical address, as printed in the network interface
card.
• Reverse Address Resolution Protocol, RARP − This is to find the Internet address of
a host when its physical address is known.
• Internet Control Message Protocol, ICMP − It monitors sending the queries as well
as the error messages.
• Internet Group Message Protocol, IGMP −It allows the transmission of a message to
a group of recipients MKK simultaneously.
• The transport layer is responsible for error-free, end-to-end delivery of data from the
source host to the destination host.
In Transport layer there are two protocols namely, TCP and UDP.
• Stream Control Transmission Protocol, SCTP − It combines the features of both TCP
and UDP. It is message oriented like the UDP, which providing the reliable, connection-
oriented service like TCP. It is used for telephony over the Internet.
• The application layer is the highest abstraction layer of the TCP/IP model that provides
the interfaces and protocols needed by the users. It combines the functionalities of the
session layer, the presentation layer and the application layer of the OSI model.
This layer uses a number of protocols, the main among which are as follows –
• Hyper Text Transfer Protocol, HTTP − It is the underlying protocol for world wide web.
It defines how hypermedia messages are formatted and transmitted.
• File Transfer Protocol, FTP − It is a client-server based protocol for transfer of files
between client and server over the network.
• Simple Mail Transfer Protocol, SMTP − It lays down the rules and semantics for
sending and receiving electronic mails (e-mails).
• There are two types of transmission technology that are in widespread use: broadcast
links and point-to-point links.
• Point-to-point transmission with exactly one sender and exactly one receiver is
sometimes called unicasting.
• Some broadcast systems also support transmission to a subset of the machines, which
known as multicasting.
• PANs (Personal Area Networks) let devices communicate over the range of a person. A
common example is a wireless network that connects a computer with its peripherals.
• Almost every computer has an attached monitor, keyboard, mouse, and printer.
Without using wireless, this connection must be done with cables.
• A LAN is a privately owned network that operates within and nearby a single building
like a home, office or factory.
• When LANs are used by companies, they are called enterprise networks.
• Wireless LANs are very popular these days where it is too much trouble to install
cables.
• In these systems, every computer has a radio modem and an antenna that it uses to
communicate with other computers.
• This device, called an AP (Access Point), wireless router, or base station, relays
packets between the wireless computers and also between them and the Internet.
• There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi.
• Wired LANs use a range of different transmission technologies like copper wires,
optical fiber etc., and LANs are restricted in size
• The topology of many wired LANs is built from point-to-point links. IEEE 802.3,
popularly called Ethernet
Features
• Local Area Network is a group of computers connected to each other in a small area
such as building, office.
• Connecting number of LAN's to form larger network, so that resources can be shared.
• Networks can be up to 5 to 50 km.
• Owned by organization or individual.
• The network that connects these hosts is then called the communication subnet, or
just subnet for short.
• In most WANs, the subnet consists of two distinct components: transmission lines
and switching elements. Transmission lines move bits between machines.
• Switching elements, or just switches, are specialized computers that connect two or
more transmission lines.
– When data arrive on an incoming line, the switching element must choose an
outgoing line on which to forward them.
– These switching computers have been called by the name router (Unfortunately, some
people pronounce it ‘‘rooter’’).
Originally subnet is the collection of routers and communication lines that moves
packets from the source host to the destination host.
• In a WAN, the hosts and subnet are owned and operated by different people.
• The WAN in Fig. is a network that connects offices in Perth, Melbourne, and Brisbane.
Each of these offices contains computers intended for running user (i.e., application)
programs.
Features of WAN
• A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
• A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
• A Wide Area Network is widely used in the field of Business, government, and
education.
NETWORK SOFTWARE
• The first computer networks were designed with the hardware as the main concern
and the software as an afterthought.
• Helps to define locations of data storage and allows users to access that data
• Helps administrators and security system to protect the network from data breaches,
unauthorized access and attacks on a network
• The model is called the ISO OSI (Open Systems Interconnection) Reference Model
because it deals with connecting open systems—that is, systems that are open for
communication with other systems. We will just call it the OSI model for short.
• 3. The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
• 4. The layer boundaries should be chosen to minimize the information flow across the
interfaces.
• 5. The number of layers should be large enough that distinct functions need not be
thrown together in the same layer out of necessity and small enough that the
architecture does not become unwieldy.
The Physical Layer
• The physical layer is concerned with transmitting raw bits over a communication
channel.
• It accomplishes this task by having the sender break up the input data into data
frames (typically a few hundred or a few thousand bytes) and transmit the frames
sequentially.
• If the service is reliable, the receiver confirms correct receipt of each frame by sending
back an acknowledgement frame.
• Another issue is how to keep a fast transmitter from drowning a slow receiver in data.
Some traffic regulation mechanism like Flow control is needed
• Broadcast networks have an additional issue to control access to the shared channel.
A special sublayer of the data link layer, the medium access control sublayer, deals with
this problem.
The Network Layer
• The network layer controls the operation of the subnet.
• A key design issue is determining how packets are routed from source to destination.
• More generally, the quality of service provided (delay, transit time, jitter, etc.) is also a
network layer issue.
• The transport layer also determines what type of service to provide to the session
layer
• token management: preventing two parties from attempting the same critical
operation simultaneously
Connectionless Service
A connection is similar to a postal system, in which each letter takes along different
route paths from the source to the destination address. Connectionless service is used in
the network system to transfer data from one end to another end without creating any
connection. So it does not require establishing a connection before sending the data
from the sender to the receiver. It is not a reliable network service because it does not
guarantee the transfer of data packets to the receiver, and data packets can be received
in any order to the receiver.
Service Primitives
• A service is formally specified by a set of primitives (operations) available to user
processes to access the service.
• These primitives tell the service to perform some action or report on an action taken
by a peer entity.
• The set of primitives available depends on the nature of the service being provided.
• A service is a set of primitives (operations) that a layer provides to the layer above it.
– A service relates to an interface between two layers, with the lower layer being the
service provider and the upper layer being the service user.
• A protocol, in contrast, is a set of rules governing the format and meaning of the
packets, or messages that are exchanged by the peer entities within a layer.
service defines operations that can be performed on an object but does not specify how
these operations are implemented. In contrast, a protocol relates to the implementation
of the service.
5. Explain various network categories based on size of network and
physical structures.
A. Personal Area Networks
• PANs (Personal Area Networks) let devices communicate over the range of a person. A
common example is a wireless network that connects a computer with its peripherals.
• Almost every computer has an attached monitor, keyboard, mouse, and printer.
Without using wireless, this connection must be done with cables.
• When LANs are used by companies, they are called enterprise networks.
• Wireless LANs are very popular these days where it is too much trouble to install
cables.
• In these systems, every computer has a radio modem and an antenna that it uses to
communicate with other computers.
• This device, called an AP (Access Point), wireless router, or base station, relays packets
between the wireless computers and also between them and the Internet.
• There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi.
• The topology of many wired LANs is built from point-to-point links. IEEE 802.3,
popularly called Ethernet
Features
• Local Area Network is a group of computers connected to each other in a small area
such as building, office.
• LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
• Connecting number of LAN's to form larger network, so that resources can be shared.
• The network that connects these hosts is then called the communication subnet, or
just subnet for short.
• In most WANs, the subnet consists of two distinct components: transmission lines and
switching elements. Transmission lines move bits between machines.
• Switching elements, or just switches, are specialized computers that connect two or
more transmission lines.
– When data arrive on an incoming line, the switching element must choose an outgoing
line on which to forward them.
– These switching computers have been called by the name router (Unfortunately, some
people pronounce it ‘‘rooter’’)
Originally subnet is the collection of routers and communication lines that moves
packets from the source host to the destination host.
• In a WAN, the hosts and subnet are owned and operated by different people.
• The WAN in Fig. is a network that connects offices in Perth, Melbourne, and Brisbane.
Each of these offices contains computers intended for running user (i.e., application)
programs.
Features of WAN
• A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
• A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
• A Wide Area Network is widely used in the field of Business, government, and
education.
o Special permissions are assigned to each computer for sharing the resources, but
this can lead to a problem if the computer with the resource is down.
o If one computer stops working but, other computers will not stop working.
o In the case of Peer-To-Peer network, it does not contain the centralized system .
Therefore, it cannot back up the data as the data is different in different locations.
o It has a security issue as the device is managed itself.
Client/Server Network
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central computer
known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to initiate
its communication with the client 2.
2.Bridges
• A bridge is a network device that connects multiple LANs (local area networks)
together to form a larger LAN. The process of aggregating networks is called network
bridging. A bridge connects the different components so that they appear as parts of a
single network. Bridges operate at the data link layer of the OSI model and hence also
referred as Layer 2 switches.
3.Routers
A router is a network layer hardware device that transmits data from one LAN to
another if both networks support the same set of protocols. So a router is typically
connected to at least two LANs and the internet service provider (ISP). It receives its
data in the form of packets, which are data frames with their destination address added.
Router also strengthens the signals before transmitting them. That is why sometimes it
is also called repeater.
4.Gateways
• Gateway is a network device used to connect two or more dissimilar networks. A
gateway usually is a computer with multiple NICs(Network Interface Card) connected to
different networks. A gateway can also be configured completely using software. As
networks connect to a different network through gateways, these gateways are usually
hosts or end points of the network.
• Gateway uses packet switching technique to transmit data from one network to
another. In this way it is similar to a router, the only difference being router can transmit
data only over networks that use same protocols.
5.Hubs
• Hubs are networking devices operating at a physical layer of the OSI model that are
used to connect multiple devices in a network. They are generally used to connect
computers in a LAN.
• A hub has many ports in it. A computer which intends to be connected to the network
is plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to
every other port, without considering whether it is destined for a particular destination
device or not.
8. Explain the different types of Networks
A. Network Topologies
• Logical layout of wires and equipment is called topology.
• The way in which devices are interconnected to form a network is called network
topology.
• Some of the factors that affect choice of topology for a network are
• Cost
• Scalability
• Flexibility
• Reliability
• Ease of installation
• Ease of maintenance
Bus Topology
• It is also called linear bus
Advantages:
• Easy to setup
• Low cost
Disadvantages:
• Slow
• Easy to crash
• If one system effected remaining systems cannot communicate with each other
Star Topology
• A star topology is a topology for a Local Area Network (LAN) in which server is
connected to each node individually.
• Any exchange of data between two nodes must take place through the server.
Advantages
Advantages:
Disadvantages :
• Difficult to remove one or more nodes while keeping the rest of the network intact.
Tree Topology
• Tree topology has a group of star networks connected to a linear bus backbone
cable.
Advantages
Disadvantages
• Insecure network
Mesh Topology
• In this type of topology, a host is connected to one or multiple hosts.
• This topology has hosts in point-to-point connection with every other host
• It provides the most reliable network structure among all network topologies.
Hybrid Topology
It is the combination of two or more different topologies.
Advantages:
• It is extremely flexible
• It is very reliable.
Disadvantages:
• There is a change in the hardware to connect one topology with another topology.
1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
• High Speed
• Secure
It consists of 2 separately insulated conductor wires wound about each other. Generally,
several such pairs are bundled together in a protective sheath. They are the most widely
used Transmission Media.
• Unshielded Twisted Pair (UTP): UTP consists of two insulated copper wires
twisted around one another. This type of cable has the ability to block
interference and does not depend on a physical shield for this purpose. It is used
for telephonic applications.
Least expensive
• Easy to install
• High-speed capacity
Shielded Twisted Pair (STP): This type of cable consists of a special jacket (a
copper braid covering or a foil shield) to block external interference. It is used in
fast-data-rate Ethernet and in voice and data channels of telephone lines.
Advantages of Shielded Twisted Pair
• Eliminates crosstalk
• Comparatively faster
• More expensive
• Bulky
Coaxial Cable
• Coaxial cables have better cut-through resistance so they are more reliable and
durable.
• Lightweight
• High cost
• Fragile
2.Unguided Media
• Less Secure
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM
radios and cordless phones use Radio waves for transmission.
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be
properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. Micro
waves are majorly used for mobile phone communication and television distribution.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency
Range:300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer,
etc.
10. Explain about the Guided & Unguided transmission Media in
Computer Networks?
A. 1. Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
• High Speed
• Secure
It consists of 2 separately insulated conductor wires wound about each other. Generally,
several such pairs are bundled together in a protective sheath. They are the most widely
used Transmission Media.
• Unshielded Twisted Pair (UTP): UTP consists of two insulated copper wires
twisted around one another. This type of cable has the ability to block
interference and does not depend on a physical shield for this purpose. It is used
for telephonic applications.
• Least expensive
• Easy to install
• High-speed capacity
• Eliminates crosstalk
• Comparatively faster
• More expensive
• Bulky
Coaxial Cable
It has an outer plastic covering containing an insulation layer made of PVC or Teflon and
2 parallel conductors each having a separate insulated protection cover. The coaxial
cable transmits information in two modes: Baseband mode(dedicated cable bandwidth)
and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs and
analog television networks widely use Coaxial cables.
Advantages of Coaxial Cable
• Coaxial cables have better cut-through resistance so they are more reliable and
durable.
Optical Fibre Cable uses the concept of refraction of light through a core made up of
glass or plastic. The core is surrounded by a less dense glass or plastic covering called
the cladding. It is used for the transmission of large volumes of data. The cable can be
unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer) supports
two modes, namely unidirectional and bidirectional mode.
Advantages of Optical Fibre Cable
• Lightweight
• High cost
• Fragile
2.Unguided Media
• Less Secure
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM
radios and cordless phones use Radio waves for transmission.
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be
properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. Micro
waves are majorly used for mobile phone communication and television distribution.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency
Range:300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer,
etc.