Вы находитесь на странице: 1из 12

ASSIGNMENT DRIVE SUMMER DRIVE 2014

PROGRAM MBADS (SEM 3) SUBJECT CODE & NAME MI0035- COMPUTER NETWORKS
BK ID B1481 CREDIT 4 MARKS 60

Qno1 Write short notes on


a. LAN
b. Analog and digital data transmission
A a. LAN 2
b. Analog and digital data transmission 3
c. High level data link control 5.
Answer a) Local Area Network (LAN):
Local Area Network (LAN) is a small computer network, in which two or more computers are directly
connected within a single building or office. It is a small privately owned network, covering a distance of
up to 10km that helps to connect personal computers or workstations to share information and resources.
LANs use transmission cables to connect the computing devices with the help of physical media. LANs
consist of two broadcast networks namely Bus topology and Ring topology.
LAN consists of the following characteristics. It:
Covers smaller area.

Shares the transmission media to all the connected devices.

Allows each device in the network to communicate with other device in the network.

Transmits data at very high rates.

Provides transmission capacity of more than 1 Mbps.

(b) Analog and digital data transmission:


The data is transmitted as an electric signal from one system to another. This electric signal can be in
digital form or analog form. There is a major difference between the analog signals and digital signals.
In analog signals, there is continuous variation in transmission power concerning sound, light, and radio
waves. The digital signals provide distinct set of values within a specified range.
Analog signals are measured in terms of Volts and frequency in Hertz (Hz). The digital signals will be in
binary form. When the data in the digital form is sent over an analog form, the data is transformed from
the digital form to analog form. This technique is known as modulation.

The conversion of data from the digital form to analog form is known as demodulation. The device that
performs this conversion process is the modem.
Digital transmission allows only binary content. These signals are transmitted at the limited distance.
Hence, digital transmission implements repeaters that achieve transmission of signals at longer distance.
These repeaters receive the digital signals and retransmit it at higher powers such that signals recover at
greater distance.
(c) High Level Data Link Control:
The High Level Data Link Control (HDLC) protocol is a bit oriented protocol for communication over
point-to-point and multipoint links.
The two main functions of HDLC are as follows:
Link management.

Transfer of data.

The High Level Data Link Protocol provides two common modes that can be used in different
configuration.
They are:
Normal Response Mode (NRM): Normal Response Mode of HDLC defines the set of procedures
that are to be used with unbalanced configuration3. In this mode, we have one primary station
and multiple secondary stations. A primary station can only send the commands. A secondary
station can only respond to the command sent by the primary station. This mode is used for both
point-to-point and multiple links.
Asynchronous Balanced Mode (ABM): Here, the configuration is balanced. Each station can act as
both primary and secondary station. This mode is used for point-to-point links.
HDLC frame format:
HDLC frame is predefined in order to accommodate the various data transfer modes.

Flag field: Each frame contains two 8-bit flags. It has a bit pattern 7E (that is 01111110) which
identifies both the beginning and the end of a frame. It serves as a synchronisation pattern for
the receiver.
Address field: The frame has a field which can store only one address, either address of primary
station or address of secondary stations. There is only one primary station and multiple

secondary stations. So, the address field contains the address of the secondary station. This field
can be 1 byte or several bytes long depending on the needs of the network.
Control field: Frame contains 8 or 16-bit control field. This field is used for error control and flow
control.
Information field: It contains the information regarding the users data. The length of this field
can vary from one network to another.
FCS field: The frame check sequence (FCS) is the field which detects the error. It is 2-byte or 4byte long.

Qno2 Videoconferencing is used to conduct meetings with the people who are located in far
distance. Videoconferencing is an example of which type of computer networks? Explain in
detail the different types of networks with example.
(Identifying the correct type 2
List the different types of networks2
Explaining the types) 6
Answer - Videoconferencing is an example of Wide Area Network (WAN). Wide Area Network (WAN)
covers a greater distance, usually a country or a continent. Basically, WAN is connected by the subnet,
which includes components such as transmission lines and switching elements. You can also form a WAN
by connecting several LANs that are spread all over the world. The WAN facilitates transmission of data in
the form of voice, image, and video. However, the data transmission rates is slower when compare to
LANs. Examples of WAN include banking networks, military networks, stock brokerage networks, and so
on. Internet is considered as the largest WAN.
TYPES OF NETWORKS
A computer network is considered as a set of computing devices that are interconnected in a
network. There are links, also called as communication channels, that connects these devices. On the basis
of size, functions, physical architecture, and the distance it covers, we can divide computer network into
three types:

Local Area Network (LAN).


Metropolitan Area Network (MAN).
Wide Area Network (WAN).

Explaining the types - Local Area Network (LAN) Local Area Network (LAN) is a small computer
network, in which two or more computers are directly connected within a single building or office. It is a
small privately owned network, covering a distance of up to 10km that helps to connect personal
computers or workstations to share information and resources.
LAN consists of the following characteristics. It:

Covers smaller area.


Shares the transmission media to all the connected devices.
Allows each device in the network to communicate with other device in the network.
Transmits data at very high rates.
Provides transmission capacity of more than 1 Mbps.
Contains limited number of workstations.
Provides less errors and delays.

Permits access to other LAN and WAN.

Metropolitan Area Network (MAN)


Metropolitan Area Network (MAN) is considered as an extended LAN, where in, it covers a city. It can
span up to a 50kms, providing connectivity within a campus. It interconnects region larger than a Local
Area Network (LAN), however, smaller than a Wide Area Network (WAN).
MAN consists of following characteristics. It:

Provides data transfers rate from 34 to 150 Mbps.


Provides high-speed connections using Fiber Optic Cable that supports both data as well as voice
transfer.
Consists of just one or two cables with no switching elements.

The development of high speed wireless Internet has resulted in development of another standardise
MAN called as IEEE 802.16.1
Wide Area Network (WAN)
Wide Area Network (WAN) covers a greater distance, usually a country or a continent. Basically, WAN is
connected by the subnet, which includes components such as transmission lines and switching elements.
Transmission lines include copper wires, fibre optic cables or even radio waves. Switching elements
include electronic devices such as routers, switches, hubs that connect these transmission lines. Data or
the information arrived at any of these switching elements are directed to the relevant destination through
these transmission lines.
WAN consists of following characteristics. It:

Builds a network of single LAN segments by connecting multiple LANs using an Ethernet
technology.
Transmits data at the rate up to 2-10 Mbps.
Contains collection of hosts or machines that are installed with user programs.
Uses communication subnet to transfer message from host to host.

Some WANs use satellite system, where router has an antenna to transmit the data.
As the broadcast system is widely used, the satellite system of the WAN is the most useful concept in
present technology.

Qno3 A protocol helps in establishing the communication between two systems. Protocols
are mainly divided into asynchronous and synchronous protocols. List and describe in
detail the different types of protocols that are classified under the two main protocols.
(list and correct differentiating of protocols under the two main types 5
Explanation) 5
ANSWER Listing and correct differentiating of protocols under the two main types:
A protocol helps in establishing the communication between two systems.
A protocol is set of rules that govern how data is sent from one point to another point or how two or more
communicating parties can interact with each other. The main purpose of protocols is to provide some

type of communication service. There are many protocols which are widely accepted in data
communications. While communicating with each other, both sender and receiver must use the same set
of protocols.
Asynchronous protocols
Asynchronous transmission is a data transfer method in which a collection of data is sent together,
spaced by varying time intervals. Each data character is preceded by a start-bit and is followed by an endbit to inform the receiver where the character begins and ends.
Synchronous protocol
Synchronous transmission is a data transfer method in which continuous stream of data is sent along
with timing signals to ensure that the sender and the receiver are synchronised with one another. The
data is sent in packets spaced by fixed time intervals

EXPLANATION Asynchronous protocols are the communication protocols which are used in asynchronous
transmission. An asynchronous protocol sends data to the sender and the receiver by packing it in an
envelope. This envelope helps in transmitting the data from the sender to the receiver via a
communication channel. The communication channel creates the envelope, which is used by receiver to
obtain the data.
There are various asynchronous protocols. They are as follows:

File Transfer Protocols (FTP): In file transfer protocol, data is divided into small packets.
Each packet is sent over a network to reach the destination. On receiving the packet the receiver
has to send an acknowledgement to the sender.
Simple Mail Transfer Protocol (SMTP): This protocol is an internet standard protocol for
transmitting e-mails across the network. In this, a sender communicates with a receiver by
supplying the data over a reliable transmission channel. In this method, the sender does not wait
for the receiver to send the acknowledgement or the feedback, it continues to send e-mails.
Post Office Protocol (POP): This protocol is used by a local receiver to retrieve an e-mail from the
remote sender over TCP/IP connection. Traditionally, this protocol did not support encryption.
Many versions of POP are now available. A recent version, called POP3, supports many
authentication methods to provide the security. This is being used in most of the web mail
services like yahoo, gmail and so on.
Internet Message Access Protocol (IMAP): Both POP and IMAP serves the same purpose. IMAP
is also an Internet standard protocol for e-mail retrieval. E-mail clients using IMAP usually leave
messages on the server until the user deletes those messages. Thus, permitting multiple clients to
manage the same mailbox. This is another characteristic of IMAP.
Other asynchronous protocols include World Wide Web.

There are two types of synchronous transmission.


They are:

Character oriented: In this, information is encoded as characters. Binary synchronous is an


example of character oriented.

Bit oriented: In bit oriented, information is encoded using bits. This is more complex than the
character oriented. High level data link control (HDLC) is an example of bit oriented.

HDLC will be discussed in detail in later section of this unit. A synchronous protocol is a communication
protocol that controls synchronous transmission.

Q no 4. Integrated Services for Digital Network (ISDN) is a set of communication standards


for simultaneous digital transmission of voice, video, data, and other network services
over the traditional circuits of the public switched telephone network. It was first defined
in 1988 in the CCITT red book. Explain the different types of ISDN with their features and
advantages for each one of them.
(Explaining Two different types 2
Features of both of them 4
Advantages of both of them) 4
Answer The ISDN Interface has three types of service. They are Basic Rate Interface
(BRI), Primary Rate Interface (PRI), and Broadband ISDN (BISDN). The main difference
between BRI and PRI is the number of ISDN channels it offers.
Basic rate interface
BRI consists of two 64Kbps B channel and one 16Kbps D channel. We can find BRI interface in
residential services and in smaller applications. It gives you a better, effective, and inexpensive service. It
is most popular in Europe than in North America and it is known by the name INS64 in Japan.
Let us now discuss the important features of ISDN BRI service, which include:

Simultaneous data, voice, and video transmission: It carries voice, data, and video signals or data
simultaneously. Since ISDN line consists of eight channels, it is capable of accessing multiple
services simultaneously.
Complete digital service: It gives complete digital telecommunications network architecture in
detail. That is, the entire network must consist of digital equipment including all facilities.
Large amount of functionality features: It supports a wide range of practical and useful features.
Security: Access of secure internet, intranet, and extranet provides security to the user. ISDN is
used for the back up of the services like Frame Relay to protect and ensure against outages or high
volume congestion.
Speed: Since ISDN is digital, the speed of the voice calls is high with excellent call quality.
Connection times and consumption costs are very low because of the high speed of data
transmission.
Reliable network: The errors will be very less because of digital transmission and it reduces the
risk of re-transmissions, and provides reliable network. Overall, it saves the time and results in
increased productivity.
Let us now see some of the advantages of ISDN BRI which include:

High efficiency because of simultaneous transmission of data, voice, and video.


Improved customer service facility for the company because it allows the user to receive multiple
calls over a single line.
Accurate transmission of data and high speed because it operates over a digital network.

High speed and flexible in communicating from remote locations.


Less expensive because it does not require special cabling facility.

Primary Rate Interface [PRI]


According to North American and Japanese standard, PRI consists of 23 64Kbps B channels and one
64Kbps D channel, which uses a T1 (T-carrier) line. According to Europe or rest of the world, PRI consists
of 30 B channels and one D channel which uses an E1 (E-carrier) line. A T1 line helps to access
1.544Mbps data service and an E1 line helps to access 2.048Mbps data service. It is used for larger
applications.
Let us discuss the important features of ISDN PRI service. The following are the features of ISDN PRI. It:

Can be used in pairs for larger connections.


Provides backup signalling channel (D channel). That is, a dual PRI (for T1 line) will have 46 B
channels and two D channels in which, one D channel is used for backup. This concept is applied
for E1 line too and also both can have more than two PRIs. Generally, more than two D channels
are not provided when more than two PRIs are added.
Provides call-by-call service.
Provides facilities like Data and Toll-Free support, calling line blocking, and calling line ID.
Provides 64Kbps clear channel.

Following are the advantages of ISDN PRI service:

We can obtain larger bandwidth over non-shared lines.


We can get wide range of features at an acceptable cost.
It gives more importance for traffic through data or toll free support.

Qno5
ABC company is an internet service provider. The main goal of ABC is to provide 24 X7X365 storage
capacity, storage management and internet service to the customers. It now needs a solution that will
eliminate downtime. Downtime is nothing but the time during which a computer or computer system is
down, or inoperative due to hardware or software failure. We also need the flexibility in quick response to
both the development in customer base and additional capacity and service demands of the customers.
ABC company took the help of network storage infrastructure software provider to achieve their goals by
providing support for end to end redundancy and bondless scalability.
By creating a scalable storage network with the ability to confidentially deliver the 24X7X365 reliability,
and speed that outsourcing customers demand, it has enabled the ISP/SSP to attract and retain customers
and substantially build its business. As the same time, the solution has effectively lowered ABC companys
total cost of ownership for its entire storage solution: the IP Stor/CNP union has enabled a painless,
flexible cost effective, scalable solution. The complementary IP Stor/CNT solution has allowed to its
customers easily and cost- effectively.
a. What were the problem which ABC Company was facing before consulting network storage
infrastructure software provider?
b. What were the benefits of implementing a scalable storage network?
c. List the different classes of ISPs and their applications

a. Mentioning the problems faced by ABC company after reading the SLM
b. Listing the benefits
c. Listing the different classes of ISP and their applications

Answer
a/The company main goal was to provide 24 X7X365 storage capacity, storage management and internet
service to the customers. The company was facing the below problems.
The time during which a computer or computer system is down, or inoperative due to hardware or
software failure. This in together call down time.. It now needs a solution that will eliminate downtime.
We also need the flexibility in quick response to both the development in customer base and
additional capacity and service demands of the customers.
b/Benefits - By creating a scalable storage network with the ability to confidentially deliver the
24X7X365 reliability, and speed that outsourcing customers demand, it has enabled the ISP/SSP to
attract and retain customers and substantially build its business. As the same time, the solution has
effectively lowered ABC companys total cost of ownership for its entire storage solution: the IP Stor/CNP
union has enabled a painless, flexible cost effective, scalable solution. The complementary IP Stor/CNT
solution has allowed to its customers easily and cost- effectively.

c/ISP provides internet email accounts to users to communicate with each other by
sending or receiving electronic messages through their respective ISPs. It also provides
services like remotely storing data source on behalf oftheir customers, and it also provides
other unique services to particular ISPs.
End user to ISP connection
ISP enables consumers to connect to their network by providing wide range of technologies. The services
like dial- up, cable modem, DSL (usually ADSL, Asymmetric Digital Subscriber Line), broadband are
applicable for the users and small scale businesses.
ISP interconnection
ISPs pay to other efficient upstream ISPs just as we pay to them for internet access. Upstream ISPs are
usually having larger network compared to contracting ISPs. It also allows contracting ISP to access the
part of the internet that itself has no access to. If the ISPs do not require upstream ISPs, then that ISPs are
known as Tier 1 ISP.
Peering
Multiple ISPs can be interconnected with each other at peering points or Internet exchange points (IXs).
This allows routing of data between each network. It will not charge one another for the transmission of
data.
Virtual ISP
The Virtual ISP (VISP) purchases services from other ISPs. This ISP allows the VISPs customers to access
the internet through services and basic facilities that are owned and operated by the ISP.
Free ISP

Free ISPs are the ISPs that provide free service. Till now we have discussed the concept of ISP. Let us now
look into some of the best internet service providers in India.
Qno6 How are the different topologies of computer networks arranged? Explain the working of each of
them.
A listing the different topologies with examples 2
explanation

diagrams 4

Answer - Networks have become a vital part of todays world. The idea of connecting several computers
together has not changed over the years. However, the way in which these computers are connected has
changed. The pattern in which computers or devices in a network are connected is called network
topology. It may sound simple to start connecting wires randomly and call it a network, but the
importance of these network topologies is realised when you have to build a large network. In this unit, we
will discuss the different network topologies. We can give the following list of topologies
Network Topologies - A network topology is the pattern in which computers, printers, and other
devices are connected in a network. It describes the different layout of wires, devices, and routing paths.
There are two types of network topologies, namely physical topology and logical topology.

Physical topology: It indicates the physical design of a network including the devices, location,
and cable installation.
Logical topology: It refers to the methods by which data is actually transferred in a network as
opposed to its physical design. It is the way that the signals act on the network media, or the
manner in which the data passes through the network from one device to another, without regard
to the physical interconnection of devices.

Bus topology
In bus topology, all the network devices are connected to a single cable. This cable acts as a common
backbone to connect all the devices. Communication between the devices in the network takes place
through the same cable.here we can give the below figure -

There are two types of bus topology. They are as follows:


Linear bus: In this type of topology, all of the nodes of the network are connected to a common
transmission medium, which has exactly two endpoints.
Distributed bus: In this type of network topology, all of the nodes of the network are connected to a
common transmission medium, which has more than two endpoints.
Ring topology
In this topology, devices in the network are connected from one to another, to form a ring. The devices are
connected in a closed loop configuration. In such a topology, data passes through one or more
intermediate nodes.

Star topology
The star topology follows a different pattern than the bus topology or ring topology. In star topology, all
devices revolve around a central device called hub, which will be discussed later in this unit.

Tree topology
Tree topology is also known as hierarchical topology, as it follows a hierarchical pattern. This type of
network has a central root node, which is atthe top level of the hierarchy. Several other nodes that are at a
lower level in the hierarchy are connected to the central node with a point-to-point link between each of
the second level nodes.

The following are few points that must be kept in mind while using a tree topology:

A network that is based on the tree topology must have at least three levels in the
hierarchy of the tree.
A network that is based on the tree topology and with a branching factor of 1 is regarded
as a physical linear topology.
In a network based on the tree topology, the total number of point-to- point links will be
one less than the total number of nodes in the network.

Mesh topology

Mesh topology is based on the concept of routes. Mesh topology is quite different from other
topologies because messages sent on a mesh topologycan take any possible path from source to
destination. Some Wide Area Networks (WAN), most notably the Internet, uses mesh routing.can take
any possible path from source to destination. Some Wide Area Networks (WAN), most notably the
Internet, uses mesh routing.This topology is used when there a small number of nodes to be
interconnected. However, the fully connected mesh topology is usually too expensive and complex for
practical networks. They are usually used for backbone networks.
Partially meshed: We say that a network topology is partially meshed when few devices in
the network are interconnected to the other devices in that network.Here only few devices are connected
in a fully mesh topology and others are connected to only one or two devices in the network. This topology
reduces redundancy.
The figure depicts a typical fully meshed network topology.

Вам также может понравиться