Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

JIMMA UNIVERSITY

JIMMA INSTITUTE OF TECHNOLOGY


FACULTY OF ELECTRICAL AND COMPUTER ENGINEERING
STREAM OF COMMUNICATION ENGINEERING

ADVANCED COMPUTER NETWORKS ASSIGNMENT-I

GROUP MEMBERS
NAME ID NUMBER
1. HAWI HAILU RU0988/09

2. KITILA TESFA RU2877/09

3. MILIYON WORKU RU1490/09

4. MOTUMA FILE RU4630/09

5. TILAHUN ADUGNA RU2390/09


6. ESRAEL BEKELE 02655/06

INSTRUCTOR:- MR. ARUN

JUNE 19, 2021


JIMMA, ETHIOPIA
ADVANCED COMPUTER NETWORK ASSIGNMENT

ASSIGNMENT I
1. What is the difference between a host and an end system? List several different types of end
systems.

Answer:
Host is a computer connected via Internet whereas End system is those type of computers
connected computer network. The types of end systems are:-
 PCs  PDAs
 Workstations  TVs
 Web servers  Cell Phones and
 email servers Tablets
2. Why are standards important for protocols?
Answer:
The standard protocol is important because it used

 To provide safe, reliable and quality service to the consumers.


 To provide the people to create the systems that interoperates.
 To provide people and organizations with a basis for mutual understanding.
 As tools to facilitate communication, measurement, commerce and manufacturing.

3. List six access technologies. Classify each one as home access, enterprise access, or wide-area
wireless access.

Answer:
The six access technologies are:-

a. Digital Subscriber Line over telephone line


b. Cable internet access
c. Fiber to the home (FTTH)
d. Dial-up modem over telephone line
e. Ethernet
f. Wi-Fi

2
Table 1. The classification of the six-access technology.

Home Access Enterprise Access Wide-area Wireless Access


 Digital Subscriber Line over telephone  Ethernet  Wi-Fi (Third-generation
line  Wi-Fi (3G) wireless and Long-
 Cable internet access Term Evolution (LTE)).
 Fiber to the home (FTTH)
 Dial-up modem over telephone line
 Ethernet
 Wi-Fi

4. Describe the most popular wireless Internet access technologies today. Compare and contrast
them.

Answer:
The two most popular wireless internet access technologies are:
a. Wireless LAN (Local Area Network)
b. Wide-area wireless access network

Table 2. The comparison between LAN and WAN wireless access network.

Wireless LAN Wireless WAN


 Use radio transmissions to send data  Use wireless infrastructure used for
 Users can transmit data within a radius of few cellular telephony to send data.
tens of meters  Users can transmit data within a
 The base station is connected to the wired radius of tens of kilometers of the
Internet and thus connects the users to the base station.
wired Internet  Mainly used by mobile users
 Used for home access, business offices, Example 3G and 4G technologies.
schools, and universities
Example Wi-Fi.

3
5. List five tasks that a layer can perform. Is it possible that one (or more) of these tasks could be
performed by two (or more) layers?
Answer:
The following is the list of five tasks that a layer can perform:

 Flow control
 Error control
 Segmentation and reassembly
 Multiplexing
 Connection setup

Yes, more than one task is performed by two or more layers. For example the flow control and
error control tasks are performed by more than two layers.

 Flow control task:- The network layer and the transport layer perform the flow control
task.
 Error control task:- The error control task is performed by session and transport layers to
detect the error.

6. What are the five layers in the Internet protocol stack? What are the principal responsibilities
of each of these layers?

Answer:
The TCP/IP model is based on a five-layer model for networking. From bottom (the link) to top
(the user application), the five layers in the internet protocol stack are:-

a. Application
b. Transport
c. Network
d. Data link
e. Physical

The principal responsibilities of each layer are:


a. Application layer

4
Used to exchange the packets of information with the application present in the system at the
other end. Some of the protocols that are present in this layer are HTTP, SMTP, and FTP. The
protocols of this layer are distributed over multiple end systems.

b. Transport Layer
To transport the messages of application-layer between two endpoints. The main protocols used
to transport the messages are TCP (Transmission Control Protocol) is a connection-oriented
service provider, guarantees the delivery of messages which provides flow control and UDP
(User Datagram Protocol) is connection less service provider which doesn’t provide flow control
or congestion control.

c. Network Layer
Used to move the packets of data (known as datagrams) between any two hosts in the network.
The service provided by this layer is similar to the postal service. It moves the datagrams and
delivers them based on the destination address and the protocol in this layer is IP (Internet
Protocol) protocol which defines the fields of the datagram.

d. Datalink Layer
Used to move the packets from one node (here node may be a router, a host or any other network
device) to the next node through an optimal route.

e. Physical Layer
Used to move the individual bits within the frame from one node (here node may be a router, a
host or any other network device) to the next node through physical transmission media.
Different physical media require different protocols. The protocol to transfer the bits using
twisted-pair is different from the protocol used in coaxial cable. The bit is moved in different
ways across the links based on the media used.

You might also like