Professional Documents
Culture Documents
Unit 1 Handout-Cnd
Unit 1 Handout-Cnd
Unit 1 Handout-Cnd
5 Computer Networks Kurose, James F. ; Pearson Education, New D Third Edition, 2011
Ross, Keith W. ISBN : 9788177588781
Sr No Description
1. https://www.youtube.com/watch?v=hAopORgAcbQ
2. nptel.ac.in/courses/106105081/2
3. https./. /www.ics.uci.edu/~magda/Courses/netsys27O/chl_vl.pp
4 nptel.ac.in/courses/106105082/19
5 nptel.ac.in/courses/106105082/17
6 http:I/www.nptel.iitm.ac.inlcourses
7 nptel.ac.in/courses/106106157/52
Unit 1: Fundamentals of Data Communication and network topology
4. Define Protocol.
Standards that are endorsed by these and similar organizations are known as de jure standards. De
facto standards, on the other hand, are technologies, products or methods that are very widely used
although they have no official standing.
6. Define i) Bit rate ii) Baud rate iii) Data transmission rate
signaling rate
In telecommunication, data signaling rate (DSR), also known as gross bit rate, is the
aggregate rate at which data pass a point in the transmission path of a data transmission system. The
DSR is usually expressed in bits per second.
Data rate
The actual rate of data flow i.e. “data transmission rate” is often expressed in terms of the number
of bits transmitted per second (bps).
Bitrate, as the name implies, describes the rate at which bits are transferred from one location to
another. In other words, it measures how much data is transmitted in a given amount of time. Bitrate is
commonly measured in bits per second (bps), kilobits per second (Kbps), or megabits per second
(Mbps).
The baud rate is the rate at which information is transferred in a communication channel. In the
serial port context, "9600 baud" means that the serial port is capable of transferring a maximum of
9600 bits per second.
Isochronous data transfer lies somewhat in between the two other data transmission types. It sends
Asynchronous data over a Synchronous transmission system. In such systems each data source is
given only a fixed time to transmit its data. In that fixed interval of time, that data source can transfer
data at whatever intervals it wants. If it has data which requires less time than the time allotted then it
simply wastes the extra time by staying idle. Otherwise if it has data which requires more time to
transmit than given then it sends the remaining data in its next turn. These systems do not have error
check mechanism because it is not possible to re-transmit the data after an error due to strict timing
conditions.
11. Draw labeled frame format of serial and parallel data transmission.
ANS:
12) Explain with neat labelled diagram the working of star topology. State its any two
advantages.
ANS:
13) Suggest the topology for military application with justification. Give advantages and
disadvantages of that topology.
ANS:
For military applications, a suitable computer network topology is a mesh topology.
Justification:
● The mesh topology is well-suited for military applications due to the following reasons:
● Redundancy and Fault Tolerance: The mesh topology provides multiple paths for data
transmission, ensuring that if one path or node fails, alternative paths can be utilized.
● Flexibility and Scalability: The mesh topology allows for easy expansion and scalability
as new nodes can be added without affecting the existing network infrastructure.
● Enhanced Security: The mesh topology enables the implementation of secure
communication protocols and encryption mechanisms across multiple paths.
14) Draw a diagram and describe the following topologies stating their applications.
i) Hybrid
ii) Bus
ANS:
Hybrid Topology
● A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as Mesh topology, Bus topology, and Ring topology.
● Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their locations
● This topology presents a blend of characteristics of all basic types. In this type, whole
Computer Network is divided into Network Segments. Each Network Segments connects
with Network Backbone
Bus Topology
● Computers and peripherals are called nodes and are each connected to a single cable on
which data can be sent.
● A bus network topology has a terminator on each end. These are needed to ensure that the
network functions correctly.
15)Draw and describe architecture for a network using star topology to establish a
laboratory with 10 computers
ANS:
16)Classify networks on the basis of transmission technologies. 2M
Ans: Classification of networks on the basis of transmission technologies
1. Broadcast Network
2. Point-to-Point Network
17) Explain peer to peer and client server architecture with suitable example.
ANS: Peer to peer architecture:
● The peer to peer computing architecture contains nodes that are equal participants in data
sharing. The nodes interact with each other as required and share resources.
● There is no master or controller or central server in this computer network and computers
join hands to share files, printers and Internet access.
● Peer to peer relationship is suitable for small networks having less than 10 computers on a
single LAN, where each PC acts as an independent workstation and maintaining its own
security that stores data on its own disk but which can share it with all other PCs on the
network.
● Software for peer-to-peer network is included with most modern desktop operating
systems such as Windows and Mac OS.
Example:
BitTorrent
It is a popular example of a peer-to-peer architecture. In BitTorrent, users who want to download
a file are both clients and servers. When a user downloads a file, they simultaneously upload parts
of the file to other users who request it. This decentralized approach allows for efficient
distribution of large files as the burden of serving the file is shared among multiple peers.
Client server architecture
● A Computer networking model where one or more powerful computers (servers) provide
the different computer network services and all other users of computer network (clients)
access those services to perform user’s tasks is known as client/server computer
networking model
● In client server computing, the clients request a resource and the server provides that
resource.
● A server may serve multiple clients at the same time while a client is in contact with only
one server.
Example
Web browsing
When we enter a URL in our browser, it sends a request to the appropriate web server, which then
responds by sending the requested webpage back to your browser. The client (browser) and the
server (web server) interact to enable the browsing experience.