Chapter 1 Yearwise Marking
Chapter 1 Yearwise Marking
[2]
Ans: A computer network is a group of computer systems and other computing hardware devices
that are linked together through communication channels to facilitate communication and
resource-sharing among a wide range of users. Most common computer networks are Local area
network (LAN), Metropolitan area network (MAN), Wide area network (WAN).
Network protocols are sets of established rules that dictate how to format, transmit and receive
data so computer network devices from servers and routers to endpoints can communicate
regardless of the differences in their underlying infrastructures, designs or standards.Standardized
network protocols provide a common language for network devices. Without them, computers
wouldn't know how to engage with each other.
And a network interface is a software or hardware interface between two pieces of equipment or
protocol layers in a computer network.A network interface will usually have some form of network
address. This may consist of a node identifier and a port number or may be a unique node ID in its
own right.Network interfaces provide standardized functions such as passing messages,
connecting and disconnecting, etc.
Explain in which level of OSI layer following tasks are done. [.5 marks for each ]
Explain five instances of how network are a part of your life today. Through we have
MAC address. Why do we use IP address to represent the host in network? Explain
your answer [5+3]
Solution: Networking allows us to meet like-minded individuals who have a mutual desire
to give value to the other person. Networking can happen in the workplace, at school, at
the gym or at a networking event. According to the Faced Squared article written by
greatbusinessschools.org, “People who got the most results from their networking efforts
participate more in "face-to-face" casual contact networks." Of that 72% of those surveyed
said they were influenced by looks and handshakes alone.
Here are three reasons why networking is important in your everyday life.
Personal Growth: Networking can help you in not only your business ventures but
your personal life as well. You gain skills on how to network, build confidence and
obtain a different perspective on your career path. Networking is also a great way to
build lifelong friendships!
Networking is not just something people do, its a lifestyle and those that are most
successful have adapted to and mastered this lifestyle. Great networks don't grow on
trees; you must initiate, build and nourish them to have long lasting relationships.
Mac address cannot be changed. These address are assigned only during the
manufacture of hardware. Due to this the network become less secured using it.
You are assigned to design a network infrastructure for a 3 star-hotel. Recommend a network
solution with hardware and software in current trend that can be used in the hotel. Make
necessary assumptions and justify your recommendation with logical arguments where
possible. [8]
A network must be able to meet certain criteria, these are mentioned below:
1. Performance
2. Reliability
3. Scalability
Performance
It can be measured in following ways:
Transit time: It is the time taken to travel a message from one device to another.
Response time: It is defined as the time elapsed between enquiry and response.
Other ways to measure performance are:
1. Efficiency of software
2. Number of users
3. Capability of connected hardware
Reliability
It decides the frequency at which network failure takes place. More the failure are, less is the
network reliability.
Security
It refers to the protection of data from the unauthorized user or access. While travelling through
network, data passes many layers of network, and data can be traced if attempted. Hence security
is also a very important characteristic for Networks.
Properties of Good Network
Interpersonal Communication: We can communicate with each other efficiently and easily
example emails, chat rooms, video conferencing etc.
Resources can be shared: We can use the resources provided by network such as printers
etc.
Sharing files, data: Authorized users are allowed to share the files on the network.
Components of a Network
A computer network comprises the following components:
A minimum of at least 2 computers.
Cables that connect the computer to each other’s, although wireless communication is
becoming more common.
A network device on each computer (this is called a network interface card or NIC).
A 'Switch' used to switch the data from one point to another. Hubs are outdated and are
little used for new installations.
Network operating system software
The first computer networks were designed with hardware as the main concern and the software
as an afterthought. This strategy no longer works due to the advent of software revolution. To
reduce the design complexity, most networks are organized as a series or hierarchy of layers or
levels. The numbers of layers, the name of each layer, the contents of each layer and the function
of each layer differ from network to network. Layer n on one machine communicates with the
layer n on another machine on the network using some rules known as the layer n protocol. A
protocol is an agreement between the communicating parties on how the communication is to
proceed. The entities comprising the corresponding layers on two communicating machines over
the network are called peers. In reality, no data is transferred from layer n on any two machines.
Instead, each data and control information is passed to the layer below. Additional information
including protocol control information may be appended by each layer to data as it travels from
higher to lower layers in the form of layer headers. Below layer 1 is the physical medium through
which actual communication occurs over communication channels. Network Software is needed
to ease the transaction of data through the different hierarchy of protocols between these different
layers efficiently.
What are the reason for using layered protocols [3,2]
The reasons for using layered protocols is because it simplifies the design process as the function
of each layers and their interaction are well defined. Some of the reasons are listed below:-
What are headers and trails and how do they get added and removed? [5, 4]
Headers and trailers are control data added at the beginning and the end of each data unit at each
layer of the sender and removed at the corresponding layers of the receiver. They provide source
and destination addresses, synchronization points, information for error detection
Adding:
An obvious technique is to allocate memory that can hold what exists plus the piece to be added
and to copy each into its proper place. A variation on that is to allocate a block of memory and to
place each layer’s content in the block such that there is room at the beginning for headers that
will be added later lower in the stack
Removing:
Removing without copying is easy. One-layer passes content to the one above as a pointer or two.
One pointer can point to a status data area followed by content. With two pointers, one can point
to the incoming content, while the other points to status information about the information flow.
COMAPAISON
Basic There is a specific server and specific Clients and server are not
and server.
Service The client request for service and server Each node can request for services and
Data The data is stored in a centralized server. Each peer has its own data.
Server When several clients request for the As the services are provided by several
implement. implement.
Stability Client-Server is more stable and scalable. Peer-to Peer suffers if the number of
Change: When changes are made to one layer, the impact on the other layers is minimized. If the
model consists of a single, all-encompassing layer, any change affects the entire model.
Design: A layered model defines each layer separately. As long as the interconnections between
layers remain constant, protocol designers can specialize in one area (layer) without worrying
about how any new implementations affect other layers.
Learning: The layered approach reduces a very complex set of topics, activities, and actions into
several smaller, interrelated groupings. This makes learning and understanding the actions of
each layer and the model generally much easier.
Troubleshooting: The protocols, actions, and data contained in each layer of the model relate
only to the purpose of that layer. This enables troubleshooting efforts to be pinpointed on the
layer that carries out the suspected cause of the problem.
Error Control
Unreliable channels introduce a number of errors in the data streams that are communicated. So,
the layers need to agree upon common error detection and error correction methods so as to protect
data packets while they are transferred.
Resource Allocation
Computer networks provide services in the form of network resources to the end users. The main
design issue is to allocate and deallocate resources to processes. The allocation/deallocation should
occur so that minimal interference among the hosts occurs and there is optimal usage of the
resources.
Routing
There may be multiple paths from the source to the destination. Routing involves choosing an
optimal path among all possible paths, in terms of cost and time. There are several routing
algorithms that are used in network systems.
Security
A major factor of data communication is to defend it against threats like eavesdropping and
surreptitious alteration of messages. So, there should be adequate mechanisms to prevent
unauthorized access to data through authentication and cryptography.
There are five types of service primitives for implementing connection oriented service:-
Draw the architecture for Client/Server network model. Explain in details about P2P
network model with supportive examples.[4]
Ans: The architecture of Client-Server model is given below:
Fig: client-server model architecture
P2P network model:
Peer-to-peer (P2P) is a decentralized communications model in which each party has the same
capabilities and either party can initiate a communication session. Unlike the client/server model,
in which the client makes a service request and the server fulfills the request, the P2P network
model allows each node to function as both a client and server. In its simplest form, a peer-to-peer
(P2P) network is created when two or more PCs are connected and share resources without going
through a separate server computer. Most P2P programs are focused on media sharing. Peer-to-
peer is a feature of, for example, decentralized crypto currency block chains.
It uses a technology called fast packet in which error checking does not occur in any intermediate
node of the transmission but done at the ends. It makes it more efficient than X.25, and a higher
process speed achieved (it can transmit over 2,044 Mbps).Another advantage is that you need less
powerful switching centers (nodes) and with less memory capacity than those needed by X25 (each
X25 switching center uses the receive-store-check-relay method, while Frame Relay does not need
checking or correcting errors).
If the traffic is hefty, with a large number of small packages, its performance is more excellent
than X25.
o Frame relay operates at a high speed (1.544 Mbps to 44.376 Mbps).Frame relay
operates only in the physical and data link layers. So it can be easily used in
Internet.
It allows the bursty data.
It has a large frame size of 9000 bytes. So it can accommodate all local area network
frame sizes.
Frame relay can only detect errors (at the data link layer). But there is no flow control or
error control.