DCC_Prac_1&2&3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

Aim: Configure Peer - to - peer network with at least three hosts.

 Theory Questions:
1. Define protocol.
A protocol is a set of rules and procedures that govern the exchange of data
between two or more entities in a network. It defines the format, timing, and
semantics of the data exchanged, ensuring compatibility and efficient
communication.

2. Give four examples of protocol with its full name.


 TCP/IP (Transmission Control Protocol/Internet Protocol): The
fundamental protocol suite for the internet, responsible for reliable data
transmission and routing.
 HTTP (Hypertext Transfer Protocol): The protocol used for web
communication, defining how web servers and clients communicate to
transfer web pages and resources.
 SMTP (Simple Mail Transfer Protocol): The protocol used for sending
and receiving emails, defining how mail servers exchange email
messages.
 FTP (File Transfer Protocol): The protocol used for transferring files
between computers over a network, defining how files are uploaded
and downloaded.

3. Write the name of layers in TCP/IP?


The TCP/IP model consists of four layers, each with specific functions:
 Application Layer: Provides services directly to users, like HTTP for
web browsing or FTP for file transfer.
 Transport Layer: Handles reliable data transmission, like TCP for
reliable delivery or UDP for faster delivery without error checking.
 Network Layer: Responsible for routing packets across the network,
using IP addresses for addressing and routing.
 Link Layer: Handles physical transmission of data over the network
medium, like Ethernet or Wi-Fi.
4. Give the use of IP address.
An IP address is a unique identifier assigned to a device on a network. It
allows devices to locate and communicate with each other on the internet.
Think of it as a house address for your device in the digital world.

5. Give and explain the address format of IPv4 and IPv6.


 IPv4: Uses 32 bits with four decimal numbers separated by dots, like
192.168.1.1. It has a limited address space and is gradually being
replaced by IPv6.
 IPv6: Uses 128 bits with eight hexadecimal numbers separated by
colons, like 2001:0db8:85a3:0000:0000:8a2e:0370:7334. It has a
significantly larger address space to accommodate the growing number
of devices on the internet.

6. Give the use of network layer in TCP/IP.


The network layer is responsible for routing packets across the network using
IP addresses. It performs functions like:

 Packet forwarding: Routing packets based on their destination IP


address.
 Addressing: Identifying and addressing devices on the network.
 Error handling: Detecting and handling errors during packet
transmission.

7. How 192.168.2.76 is type of class C IP address?


192.168.2.76 is a class C IP address. The first octet (192) falls within the
range of private IP addresses (192.168.0.0 - 192.168.255.255), This means
that the IP address is not accessible from the Internet, it is local and only
accessible within the network. Everyone has the same local address
(192.168.0.0 - 192.168.255.255).
8. Convert the IPv4 address "192.168.2.76" to binary format of 32 bits.

11000000 10101000 00000010 01001100

9. State the meaning of peer.


In a network, a peer is any device that can communicate directly with other
devices without relying on a central server. Each peer has equal capabilities
and responsibilities in the communication process.

10. What is peer to peer network?


A peer-to-peer network is a network where devices communicate directly
with each other, without the need for a central server. Each device acts as
both a client and a server, sharing resources and data directly.

11. How peer to peer is differs from client-server network?

Peer-to-Peer Network Client-Server Network


A distributed application A distributed application structure
architecture that partitions tasks or based on resource or service
workloads between peers providers called servers and
service requesters called clients
Each node can request for Client requests for service and
services and provide services server responds with a service
A decentralized network A centralized network

Reliable as there are multiple Clients depend on the server -


service providing nodes failure in the server will disrupt the
functioning of all clients
Service requesting node does not need Access time for a service is
to wait long higher
Expensive to implement Does not require extensive
hardware to set up the network
Comparatively less stable More stable and secure
12. Give advantages of peer to peer network.
 Cost-effective: No need for expensive central servers,
reducing infrastructure costs.
 Scalability: Can easily expand by adding more peers,
making them suitable for small-scale deployments.
 Decentralization: No single point of failure, leading to
increased resilience and fault tolerance.
 Direct communication: Faster data transfer speeds for local
network applications.
 Privacy: Can offer greater privacy as communication is
directly between peers.

13. Give disadvantages of peer to peer network.


 Performance: Relies on individual device resources, leading to
potential performance bottlenecks.
 Security: More vulnerable to malware and hacking due to lack
of centralized security measures.
 Resource sharing: Requires users to actively share
resources, which may not always be reliable.
 Scalability limitations: Large-scale deployments can
become complex and inefficient.
 Content discovery: Finding specific resources can be
challenging without centralized indexing.

14. State the meaning of DNS server address.


A DNS server address is the network address of a Domain Name System
(DNS) server. This server translates domain names (human-readable
website addresses) into IP addresses (computer-readable network
addresses) that computers can understand. By querying a DNS server,
you can find the correct IP address to connect to a website or online
service.
Aim: Connect computer using given topology with wired media (Star
Topology).
 Theory Questions:

1. What is Network topology?


Network Topology refers to the arrangement of nodes and links in a computer
network. It defines how computers, network devices, and communication links are
organized and interconnected.

2. What is use of physical and logical topology?


 Physical Topology: Describes the physical layout of devices and cables.
 Logical Topology: Describes how data is transmitted between devices
regardless of physical connections.
 Use: Physical topology is essential for understanding the network's physical
layout, while logical topology is crucial for understanding data flow and
communication patterns.

3. Which topology required terminator at both the ends of cable?


Topology requiring terminator at both ends: Bus Topology.

4. State why topology required in laboratory.


Reason: In a laboratory, different network topologies can be implemented to
study their characteristics, performance, and behavior in controlled environments. It
helps in understanding practical aspects of network design.

5. List out names of transmission media and network devices required to form
star topology.
 Transmission Media: Twisted Pair, Fiber Optic.
 Network Devices: Hub, Switch.
6. Give advantage and disadvantage of bus topology.
 Advantages:
Simple and Inexpensive: Bus topology is easy to install and does not require
much cabling. It's cost-effective for small networks.
Easy to Expand: Additional devices can be added without significant
disruption to existing connections.
Efficient Use of Cable: Requires less cable compared to other topologies like
star or mesh.
Centralized Management: The network is easy to manage, as all devices are
connected to a central cable.

 Disadvantages:
Limited Scalability: As more devices are added, the performance of the network
decreases.
Single Point of Failure: If the main cable fails, the entire network is
affected.
Performance Decreases with Traffic: Network performance degrades as the
number of connected devices or the volume of traffic increases.
Difficult Fault Isolation: Identifying and isolating faults in the network can be
challenging.

7. Give advantage and disadvantage of ring topology.


 Advantages:
Equal Data Distribution: Data is evenly distributed among devices,
preventing congestion.
No Collisions in Data Transmission: Devices can transmit data without the
risk of collisions.
Simple to Install and Configure: Ring topology is relatively simple to set up
and configure.
Suitable for Small Networks: Ring topology is effective for small networks with
limited devices.
 Disadvantages:
Difficult to Install and Reconfigure: Adding or removing devices can be
complex and may disrupt the network.
Failure in One Node Affects Entire Network: If one device fails, it can
affect the entire network.
Slower Data Transfer: Data transfer rates can be slower compared to other
topologies.
Not Suitable for Large Networks: Ring topology is not scalable for large
networks.

8. Give advantage and disadvantage of star topology.


 Advantages:
Easy to Install and Manage: Simple to set up and requires less
maintenance.
Fault Isolation: If one device fails, it does not affect the entire network.
Highly Reliable: Failure of one link does not affect other links.
Scalability: Easy to add or remove devices without disrupting the network.
Better Performance: The dedicated link between each device and the central
hub ensures better performance.
Centralized Control: The central hub or switch provides centralized control
and monitoring.

 Disadvantages:
Dependency on Central Device: The entire network relies on the central hub
or switch.
Cost of Implementation: Setting up a star network can be more
expensive, especially for large networks.
Cabling Requirements: Requires more cabling than bus topology.
Single Point of Failure (Central Device): If the central hub fails, the entire
network is affected.
9. Give advantage and disadvantage of mesh topology.
 Advantages:
High Reliability: Multiple paths for data ensure network reliability.
Fault Tolerance: Even if one link or node fails, alternative paths are
available.
High Performance: Can provide high performance and low latency.
Scalability: Easily scalable by adding more devices or connections. Security:
Data transmission can be more secure due to point-to-point connections.
Data Privacy: Limited data visibility to other devices on the network.

 Disadvantages:
High Cost: Implementation can be expensive due to extensive cabling.
Complexity: Installation and configuration can be complex. Maintenance:
Maintenance and troubleshooting can be challenging. Space Requirements:
Requires more physical space for cabling.

10. Give the meaning of extended star topology.


Extended Star Topology is an expansion of the star topology where additional
network devices are connected to the central hub or switch.

11. What is the difference between hub and switch?


HUB SWITCH
Operates at the Physical Layer Operates at the Data Link Layer
(Layer 1) of the OSI model. (Layer 2) of the OSI model.
Forwards incoming data packets to all Forwards data only to the specific device
connected devices (broadcasts). for which the data is intended (selective
forwarding).

Creates a single collision domain for all Creates a separate collision domain for
connected devices. each connected device, reducing the
likelihood of collisions.
Does not differentiate between Can handle simultaneous data
devices; all devices share the same transmission between multiple
bandwidth. devices without affecting each other.
Shares the total bandwidth among all Each port has its dedicated bandwidth,
connected devices. providing more efficient data transfer.

Lacks traffic isolation: all connected Provides traffic isolation between


devices are part of the same devices, enhancing network security.
network segment.
Generally, less expensive than Usually more expensive but
switches. provides better performance and
functionality.

12. Give the use of NIC card. Is it required to connect computers in star topology.
Use: Network Interface Card (NIC) is used to connect computers to a network. It
enables communication between the computer and the network. A Network
Interface Card (NIC) is a hardware component that allows computers to connect to
a network. It plays a crucial role in facilitating communication between a computer
and the network. In a star topology, each computer connects to a central hub or
switch using its NIC. The NIC facilitates the communication between the computer
and the central hub or switch, which then manages the overall communication
within the network. The star topology relies on the use of NICs to establish
connections between individual devices and the central networking equipment.

13. Give the name of command which use to check whatever computer connected
in network or not.
Command: ping or arp -a (Address Resolution Protocol).

14. Which is the best topology to be implemented in laboratory of 20 computers in


terms of cables, money and failure of computer?
Best Topology: Star Topology, as it provides easy management, fault isolation,
and scalability.
15. Write a formula to calculate how many cables are required to connect n
computers in mesh topology?
The formula to calculate the number of cables required for a Mesh Topology
is given by:
Cables= n×(n−1)/2
where:
n is the number of devices (computers, nodes) in the network.
Aim: Create desired standard network cable including Cross cable and test it by
using cable tester.

 Theory Questions:
1. Give the use of transmission media.
Transmission media is used to transmit data from one location to another in a
network. It can be wired or wireless and is essential for communication
between devices in a network.

2. List out types of twisted pair cables.


 Twisted pair cables come in two main types:
Unshielded Twisted Pair (UTP) Shielded
Twisted Pair (STP)

3. What is a use of straight network cable?


A straight network cable is used to connect different types of devices, such as
a computer to a switch or a router. It follows the same pin configuration on
both ends.

4. What is a use of crossover network cable?


A crossover network cable is used to connect similar devices directly, like
connecting two computers without using a switch or a router. It has a
different pin configuration on each end.

5. Give any 2 examples of data terminating equipment.


 Examples of data terminating equipment include:
Network Interface Cards (NICs) Modems

6. Which tool is used to test network cable?


A cable tester is used to test network cables. It helps verify the proper
connections and identify any faults in the cable.
7. State the use of connector and give the name of connector used in laboratory.
Connectors are used to join cables and devices. In a laboratory, common
connectors include RJ-45 connectors used in Ethernet cables.

8. Give the use of Crimping tool.


A crimping tool is used to attach connectors to the ends of network cables. It
crimps the connectors securely onto the cable, ensuring a reliable connection.

9. Give the meaning of TX and RX used for connector.


TX stands for Transmit, and RX stands for Receive. These designations
indicate the direction of data flow in a network connection.

10 .Write the category of UTP/STP cable along with its specifications.


Common categories of UTP/STP cables include Cat 5e, Cat 6, and Cat 6a.
Specifications vary, with higher categories supporting higher data rates and
better performance in terms of crosstalk and attenuation.

11 .If the user want to connect 3 computers to each other then list out which
components required with quantity.
 Components required:
3 computers,1 network switch, straight network cables (or more,
depending on the distance)
12. What is the difference between straight cable and crossed cable
w.r.t order of wires?
In a straight cable, the wire order is the same on both ends, while in a
crossover cable, the wires are crossed, i.e., the transmit (TX) and receive
(RX) pairs are swapped.
13. What is the meaning of RJ?
RJ stands for Registered Jack. It refers to a standardized network interface
connector. Common examples include RJ-45 used in Ethernet.

You might also like