Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

 

Computer Network 
Assignment-I 
 

By Gagandeep Kaur (180230060) 


Submitted to:- Ms. Manjot Kaur 
 

   

 
 

Question 1:- Explain the following terms 


briefly:- 

i) Network Topology

In every local area network (LAN), there are vital designated nodes that are necessary
for its continued upkeep. The nodes that keep a local area network running may include
things such as computers, routers, and other technologies; this is the concept of
network topology.

In total, there are four distinct categories: ring, star, mesh and bus.

Ring Topology

Ring topology describes a system in which every device in the network has a direct
connection to a pair of different devices in an arrangement that forms an enclosed
circle. Out of all of the different topologies, the ring topology system is one of the more
affordable variations​.

Ring topology tends to provide a high bandwidth threshold and reach distance, and
different variations of ring topology have different directions of signal transference; for
example, in the token ring variation, the signal only travels in a single direction.


 

Star Topology

In the star topology mode, a central server is employed as the unifying hub for each of
the system’s devices. Rather than a continuous loop, each of the data nodes
simultaneously deliver their data into the central nexus from their respective directions
at once. While the star system is one of the more relatively easy topologies to install
and get running, users should be aware of the fact that there is a real risk of possible
overload due to the high demand of data capacity in the central server.

Mesh Topology

Much like the ring topology, mesh topologies have different variations within the
topology subcategory. There are full mesh topologies in which each of the devices has
a direct connection with all of the others, and in the partial mesh, only a portion of the
topologies are connected to one another. In the partial topology model, devices are
generally connected to those in which the highest volume of data is exchanged between
the two.

Bus Topology

Out of all of the different topology types, the bus is the most frequently used of all. The
bus topology is an essential component of a LAN’s Ethernet connection, in which it


 

serves as the central cable to which all of the network’s devices connect. The bus, also
referred to as the network’s backbone, is applicable to networks of all sizes; however,

it’s common for the bus topology to be most easily applied to smaller networks than
larger ones.

Hybrid Topologies

Though different topologies may suit different users with varying levels of efficiency,
they aren’t necessarily mutually exclusive. It’s possible for multiple topology types to be
combined into hybrid forms with multiple data exchange pathways.

ii) OSI model


Each layer of the OSI model handles a specific job and communicates with the layers
above and below itself. DDoS attacks target specific layers of a network connection;
application layer attacks target layer 7 and protocol layer attacks target layers 3 and 4.

The Open Systems Interconnection (OSI) model is a conceptual model created by the
International Organization for Standardization which enables diverse communication
systems to communicate using standard protocols. In plain English, the OSI provides a


 

standard for different computer systems to be able to communicate with each other.

The OSI model can be seen as a universal language for computer networking. It’s
based on the concept of splitting up a communication system into seven abstract layers,
each one stacked upon the last.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top - it’s what
most users see. In the OSI model, this is the layer that is the “closest to the end user”.
Applications that work at Layer 7 are the ones that users interact with directly. A web
browser (Google Chrome, Firefox, Safari, etc.) or other app - Skype, Outlook, Office -
are examples of Layer 7 applications.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation
at the application layer. In general, it represents the preparation or translation of
application format to network format, or from network formatting to application format. In
other words, the layer “presents” data for the application or the network. A good


 

example of this is encryption and decryption of data for secure transmission - this
happens at Layer 6.

Layer 5 - Session

When two devices, computers or servers need to “speak” with one another, a session
needs to be created, and this is done at the Session Layer. Functions at this layer
involve setup, coordination (how long should a system wait for a response, for example)
and termination between the applications at each end of the session.

Layer 4 – Transport

The Transport Layer deals with the coordination of the data transfer between end
systems and hosts. How much data to send, at what rate, where it goes, etc. The best
known example of the Transport Layer is the Transmission Control Protocol (TCP),
which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and
UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network
Layer.

Layer 3 - Network

Here at the Network Layer is where you’ll find most of the router functionality that most
networking professionals care about and love. In its most basic sense, this layer is
responsible for packet forwarding, including routing through different routers. You might
know that your Boston computer wants to connect to a server in California, but there are
millions of different paths to take. Routers at this layer help do this efficiently.

Layer 2 – Data Link

The Data Link Layer provides node-to-node data transfer (between two directly
connected nodes), and also handles error correction from the physical layer. Two
sublayers exist here as well - the Media Access Control (MAC) layer and the Logical
Link Control (LLC) layer. In the networking world, most switches operate at Layer 2.

Layer 1 - Physical

At the bottom of our OSI bean dip we have the Physical Layer, which represents the
electrical and physical representation of the system. This can include everything from
the cable type, radio frequency link (as in an 802.11 wireless systems), as well as the
layout of pins, voltages and other physical requirements. When a networking problem
occurs, many networking pros go right to the physical layer to check that all of the


 

cables are properly connected and that the power plug hasn’t been pulled from the
router, switch or computer

iii) Distributed Processing

Distributed data processing is a computer-networking method in which multiple


computers across different locations share computer-processing capability. This is in
contrast to a single, centralized server managing and providing processing capability to
all connected systems. Computers that comprise the distributed data-processing
network are located at different locations but interconnected by means of wireless or
satellite links.

Techniques of Distributed Processing

● Centralised
● Decentralised
● Paralleled
● Open distributed processing
 


 

Question 2:- Write various categories of


computer network in detail.
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data, and
applications.

A computer network can be categorized by their size. A computer network is mainly of


three types:

● LAN(Local Area Network)

● MAN(Metropolitan Area Network)

● WAN(Wide Area Network)

LAN(Local Area Network)

● Local Area Network is a group of computers connected to each other in a small


area such as a building, office.

● LAN is used for connecting two or more personal computers through a


communication medium such as twisted pair, coaxial cable, etc.

● It is less costly as it is built with inexpensive hardware such as hubs, network


adapters, and ethernet cables.

● The data is transferred at an extremely faster rate in Local Area Network.


 

● Local Area Network provides higher security.

MAN(Metropolitan Area Network)

● A metropolitan area network is a network that covers a larger geographic area by


interconnecting a different LAN to form a larger network.

● Government agencies use MAN to connect to the citizens and private industries.

● In MAN, various LANs are connected to each other through a telephone


exchange line.

● The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.

● It has a higher range than Local Area Network(LAN).


 

WAN(Wide Area Network)

● A Wide Area Network is a network that extends over a large geographical area
such as states or countries.

● A Wide Area Network is quite a bigger network than the LAN.

● A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.

● The internet is one of the biggest WANs in the world.

● A Wide Area Network is widely used in the field of Business, government, and
education.


 

Question 3:- Discuss design issues during


computer network establishment.
A number of design issues exist for the layer to layer approach of computer networks.
Some of the main design issues are as follows −

10 
 

Reliability

Network channels and components may be unreliable, resulting in loss of bits while data
transfer. So, an important design issue is to make sure that the information transferred
is not distorted.

Scalability

Networks are continuously evolving. The sizes are continually increasing leading to
congestion. Also, when new technologies are applied to the added components, it may
lead to incompatibility issues. Hence, the design should be done so that the networks
are scalable and can accommodate such additions and alterations.

Addressing

At a particular time, innumerable messages are being transferred between large


numbers of computers. So, a naming or addressing system should exist so that each
layer can identify the sender and receivers of each message.

Error Control

Unreliable channels introduce a number of errors in the data streams that are
communicated. So, the layers need to agree upon common error detection and error
correction methods so as to protect data packets while they are transferred.

Flow Control

If the rate at which data is produced by the sender is higher than the rate at which data
is received by the receiver, there are chances of overflowing the receiver. So, a proper
flow control mechanism needs to be implemented.

Resource Allocation

11 
 

Computer networks provide services in the form of network resources to the end users.
The main design issue is to allocate and deallocate resources to processes. The
allocation/deallocation should occur so that minimal interference among the hosts
occurs and there is optimal usage of the resources.

Statistical Multiplexing

It is not feasible to allocate a dedicated path for each message while it is being
transferred from the source to the destination. So, the data channel needs to be
multiplexed, so as to allocate a fraction of the bandwidth or time to each host.

Routing

There may be multiple paths from the source to the destination. Routing involves
choosing an optimal path among all possible paths, in terms of cost and time. There are
several routing algorithms that are used in network systems.

Security

A major factor of data communication is to defend it against threats like eavesdropping


and surreptitious alteration of messages. So, there should be adequate mechanisms to
prevent unauthorized access to data through authentication and cryptography

12 
 

Question 4:- Difference between guided


and unguided media.

S.N
GUIDED MEDIA UNGUIDED MEDIA
O.

The signal energy propagates The signal energy propagates


1.
through wires in guided media. through air in unguided media.

Unguided media is generally


Guided media is used for point to
2. suited for radio broadcasting in
point communication.
all directions.

Continuous network topologies


Discrete network topologies are
3. are formed by the unguided
formed by the guided media.
media.

Signals are in the form of voltage, Signals are in the form of

4. current or photons in the guided electromagnetic waves in

media. unguided media.

13 
 

Examples of guided media are Examples of unguided media

5. twisted pair wires, coaxial cables, are microwave or radio links

optical fiber cables. and infrared light.

By adding more wires, the It is not possible to obtain

6. transmission capacity can be additional capacity in unguided

increased in guided media. media.

Thank You 

14 

You might also like