Вы находитесь на странице: 1из 24

Graduate Diploma

Level 7
(Information Technology Strand)
STD711

Networking and Operating System

(NOS-Assignment)
Assignment 2
Final Result: _______________

Stude
nt
Name

Dhiraj Pahuja

Stude
nt ID

TIZ0000262

Stude
nt
Signat
ure
Assess

Tamanna Phogat

Assessor Signature___________________

Nikhil Chaithanya

Pravin
Kumar

TIZ00001UD

TIZ00001U
8

or

Task 1: Define computer network using diagram depicting a


network and why we need it for.
Ans: A computer network is a group of computer systems and other
computing hardware devices that are linked together through
communication channels to facilitate communication and resourcesharing among a wide range of users. Networks are commonly
categorized based on their characteristics.
By using either cable media or wireless media the connections are
established between the nodes. The computer network is best known as
INTERNET.
The devices in the computer network that develop, route and end the
information are known as network nodes.
Two
main
important
technologies
in
computer
telecommunication and computing work together

network

is

Computer Network Diagram

Need of computer network:


Computer network act a vital role while sharing the network and in
communication to support the end users over the network. We cannot
imagine the universe at present without online chating, apps, e-learing
and my other utilities provided by the internet.

1.Hardware Sharing
Users can share devices such as printers, scanners, CD-ROM drives, hard
drives etc. Without computer networks, device sharing is not possible.
2.OperationSharing
Operations are shared done with network, and also proceed to implement
client/server operations.
3.End user communication

Networks allow users to communicate using e-mail, newsgroups, and


video conferencing etc
4.System

gaming

A lot of network games are available, which allow multi-users to play from
different locations.
5.Voice over IP
Voice over Internet Protocol (IP) is a revolutionary change in
telecommunication which allows to send telephone calls (voice data)
using standard Internet Protocol (IP) rather than by traditional PSTN.

Task 2.Describe the following criteria and classify the types of


network based on this classification:
a
b
c
d

Transmission media
Network size
Management method
Topology / connectivity based

Ans. a).

Transmission Media

Transmission media is a pathway that carries the information from


sender to receiver. We use different types of cables or waves to transmit
data. Data is transmitted normally through electrical or electromagnetic
signals.

A few transmission media are mentioned below:


I)Transmission over cable
a.Twisted Pair Cable:
A twisted pair cable is a earliest and the most routine transmission
media.This type of cables are generally utilized as a part of phones and
are additionally called phone wires.These link comprises of copper wires
curved into sets with every wire protected in plastic.
Two types of wires:
Shielded Twisted Pair
Unshielded Twisted Pair
b.Coaxial Cable:
Coaxial cable is also called as Coax, In television cable this coax is used
commonly.Two conductors are presented in coaxial cable .A central
copper wire encompassed by a PVC protection over which a sleeve of
copper lattice is set.Again the metal sleeve is shielded by other shield
with thick PVC metal.These cables are strong enough of transmmiting
data at high level of speed i.e 10mb/s.
C.Fiber-Optic Cable:
Fiber-Optic Cable is a narrow fiber of glass proctected in a case.The
information in the fiber-Optic Cable will transmitted in the form of light in
high speed. The electrical signals are converted into light waves by
sender. Besides the light waves are converted into electrical waves by
receiver.
The disadvantage of this cable is to implement and also very expensive.
ii)Wireless Transmission
Communication Satillite:

Communication Satellite is primarily a microwave location in out space. It


is very useful since satellite communication is visible anywhere.
The main draw back in communication satellite is that it is very costly.
Microwave system:
Microwave System will transmit the data with high level frequency of
radio signals through space. The microwave system have to be on a
straight line because these signals cannot transform obstacles to the
receiver.

b).Network Size
The computer network is classified according to their network size, ie the
duration to whatever physical components are localized, from local area
to the city, country or either the planet. This requires a physical media
and protocols for the operations.so they are defined in three different
types:
a.Wide Area Network(WAN):
A wide area network, or WAN, occupies a very large area, such as an
entire country or the entire world. A WAN can contain multiple smaller
networks, such as LANs or MANs. The Internet is the best-known example
of a public WAN.
Wide
area
network
generally
telecommunication bounds.

well-established

with

hire

b.Local Area Network:


A local area network, or LAN, consists of a computer network at a single
site, typically an individual office building. A LAN is very useful for sharing
resources, such as data storage and printers. LANs can be built with
relatively inexpensive hardware, such as hubs, network adapters and
Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. A LAN typically relies mostly on
wired connections for increased speed and security, but wireless

connections can also be part of a LAN. High speed and relatively low cost
are the defining characteristics of LANs.
c.Metropolitan Area Network:
A metropolitan area network, or MAN, consists of a computer network
across an entire city, college campus or small region. A MAN is larger
than a LAN, which is typically limited to a single building or site.
Depending on the configuration, this type of network can cover an area
from several miles to tens of miles. A MAN is often used to connect
several LANs together to form a bigger network. When this type of
network is specifically designed for a college campus, it is sometimes
referred to as a campus area network, or CAN.

3.Managment method in computer network


A network management system (NMS) is a set of hardware and/or
software tools that allow an IT professional to supervise the individual
components of a network within a larger network management
framework.

There are many types of networks:


Simple Network Managment Protocol(SNMP):
SNMP is an standard internet protocol for handling devices on Internet
protocol networks.
SNMP support devices including switches, printers, modem, and more
organizational attension
FTTP:S
The Hypertext Transfer Protocol (HTTP) is an application convention for
dispersed, community oriented, hypermedia data frameworks. HTTP
is the establishment of information matching for the internet. Hypertext is
organized content that uses consistent connections (hyperlinks) between
hubs containing content.
FTP:
The File Transfer Protocol (FTP) is a standard system convention used to
exchange PC records begins with single host then onto the other host

over a TCP-based system, for example, the Internet. FTP is based on


structural planning and uses different zcontrol and information
associations between the customer and the server.

d).Topologies used in computer network


System Topology is the schematic depiction of a system course of action,
interfacing different nodes(sender and recipient) through lines of
association.
1)Bus Topology
Bus topology is a system sort in where each PC and system gadget is
associated with single link
Components of Bus Topology
1. It transmits information just in one heading.
2. Each gadget is joined with a solitary link
Advantages of Bus Topology
1. It is financially savvy.
2. Link required is slightest contrasted with other system topology.
3. Utilized as a part of little systems.
Limitations of Bus Topology
1. Links falls flat then entire system comes up short.
2. In the event that system activity is substantial or hubs are more the
execution of the system diminishes.
3. Link has a restricted length.
2)Ring Topology
It is called ring topology on the grounds that it frames a ring as every PC
is associated with another PC, with the last one joined with the first.
Precisely two neighbors for every gadget.
Components of Ring topology:
1. Various repeaters are utilized and the transmission is unidirectional.
2. Date is moved in a consecutive way that is a little bit at a time.
Advantages of topology:

Transmitting system is not influenced by high activity or by including


more hubs, as just the hubs having tokens can transmit information.
Shabby to introduce and grow
Limitations of Ring Topology
1. Investigating is troublesome in ring topology.
2. Including or erasing the PCs exasperates the system movement.
3. Disappointment of one PC exasperates the entire system.
3)Star Topology
In this kind of topology every one of the PCs are joined with a solitary
centre through a link. This center point is the focal hub and all others
hubs are associated with the focal hub.
Components of Star Topology
1. Each hub has its own particular devoted association with the center.
2. Goes about as a repeater for information stream.
3. Can be utilized with contorted pair, Optical Fiber or coaxial link.
Advantages of Star Topology
1.
2.
3.
4.

Quick execution with couple of hubs and low system activity.


Centre point can be overhauled effectively.
Simple to investigate.
Simple to setup and change.

Limitations of Star Topology


1. Expense of establishment is high.
2. Costly to utilize.
3. Execution depends on the centre that is it relies on upon its ability.
4) Mesh Topology
It is a point-to-direct association toward different hubs or gadgets.
Activity is conveyed just between two gadgets or hubs to which it is
joined. Cross section has (n-2)/2 physical channels to connection in
gadgets
Sorts of Mesh Topology
Fractional Mesh Topology: In this topology a percentage of the
frameworks are joined in the same manner as cross section topology
however a few gadgets are just associated with a few gadgets.

Full Mesh Topology: Each and every hubs or gadgets are joined with
one another.
5) TREE Topology
It has a root hub and every single other hub are joined with it shaping a
chain of importance. It is likewise called various levelled topology. It
ought to at any rate have three levels to the chain of importance.
6) Hybrid Topology:
It is two unique sorts of topologies which is a blend of two or more
topologies. For instance if in an office in one division ring topology is
utilized and as a part of another star topology is utilized, associating
these topologies will bring about Hybrid Topology (ring topology and star
topology).

TASK 3. Evaluate the type of topology used in LAN and WAN


Ans. WAN TOPOLOGIES:
It is a system relating geological specific areas, which be allowed or not
be allowed to the equivalent system. This topologies are need the two
Local area network combine business-broad topologies construction
section, but to compute a lot of complication by cause of length they
necessity to envelope, the total largest customers they distribute, and
the big rush they regularly hold.
Point to point:
Point-to-point networks see WAN sites connected by high-capacity
network cabling known as backbone. The sites are connected as if in a
line, with each site (other than the ones at the ends of the line) only
linked to the sites directly before and after it. This is a simple topology to
implement, and provides cost benefits in that it requires minimal cabling.
However, it leaves networks vulnerable to failure, as a single fault on the
backbone can bring whole sections of the network down.
WAN end to end topology perfect choice being institution with low
number of areas and the capacity to usage committed routes ,i.e.
constantly accessible carrier between double connection marks that are
rent out from telecommunications worker , that like as an ISP.

RING:
The ring topology is the same as the point-to-point topology, except the
sites at the end of the backbone are connected to each other as well. This
makes ring topology WANs less vulnerable to failure, as traffic can be
routed the opposite way around the ring if a fault is detected on the
network. However, adding new sites to ring topology WANs requires
additional work and cost when compared to point-to-point setups, as
each new site requires two connections instead of one.

STAR:
The star topology sees all sites connected to a central hub, a little like the
spokes of a wheel. WAN hubs use a technology known as a concentrator
router to ensure data is sent to the right destination. This topology allows
for sites to be added to the network easily an important consideration
for business WANs and is not vulnerable to a single cable failure
bringing down the whole network. However, it is entirely dependent on
the concentrator router to be able to run.

MESH:
Like an endeavour wide work, a cross segment WAN topology joins
various direct interconnected centres - for this circumstance,
geographical locations. Since every site is interconnected, data can travel
clearly from its origin to its destination. If one affiliation perseveres
through an issue, switches can occupy data easily and quickly. Cross
section WANs are the most accuse tolerant kind of WAN plan for the
grounds that they give different courses to data to take after between
any two core interests.
One weakness to a cross segment WAN is the cost; partner every centre
on a framework to each diverse includes leasing a broad number of gave
circuits. With greater .To decrease costs, you may realize a fragmented
cross area, in which essential WAN centre points are clearly
interconnected and assistant centres are related through star or ring

topologies. Fragmented cross area WANs are more sensible, and thusly
more typical in today's business world, than full-work WANs.

TIERED:
A tiered WAN sees many smaller star-type WANs linked together by
concentrator routers. This provides the scalability benefits of the star
WAN while reducing the network's dependency on individual pieces of
network hardware. If one of the routers fails, traffic can be rerouted to
avoid the affected area. Some tiered networks also include direct links
between sites, known as meshing. The principle downside to tiered and
meshed networks is complexity they can involve a lot of links and
require a lot of management.

LAN topologies:
Four different type of topologies

Star
Ring
Bus
Tree

STAR:
Total stations are similitude by connection to a fundamental issue,
generally speaking a wiring focus point or other device working in a
relative limit. A couple of particular connection sorts can be used for this
point-to-point association, for instance, ensured wound pair (STP),
unshielded bended pair (UTP), and fibre-optic cabling. Remote media can
in like manner be used for exchanges joins.

The benefit of the star topology is that no connection piece is a lone


motivation behind disillusionment influencing the entire framework. This
looks into better organization of the LAN. In case one of the connections
develops an issue, only that LAN-joined station is impacted; each and
every other station stay operational. The damage of a star (focus point
and-talked) topology is the central focus point device. This central focus
point is a lone reason for frustration in that if it fails, each joined station is
out of organization. These central focus focuses, or concentrators, have
changed consistently. Today, it is ordinary to send focuses with certain
reiteration. Such overabundance is planned to separate an inadequate or
failed
section,
for
instance,
power
supply.

Ring topology:
Not in the least like the star (focus point and-talked) topology, a ring
topology has no end centers. The repeater for this circumstance is a
component of the LAN-joined station's framework interface card (NIC).
Since each NIC in a LAN-annexed station is a repeater, each LAN station
will reiterate any sign that is on the framework, paying little regard to
whether it is headed for that particular station. If a LAN-joined station's
NIC fails to perform this repeater work, the entire framework could dive.
The NIC controller is prepared for seeing and dealing with the flawed
repeater and can pull itself off the ring, allowing the ring to offset and
continue working. Token Ring (IEEE 802.5) best addresses a ring topology.
Notwithstanding the way that the physical cabling is thought to be a star
topology, Token Ring is a ring in predictable topology, as appeared by the

going with figures. Yet physical topology is a physical layer trademark,


the media access methodology used at the data association layer
chooses the sensible topology. Token Ring portrays a rational ring and
debate, as Ethernet describes a steady transport. Despite when affixed to
an inside, when one Ethernet contraption transmits, everyone hears the
transmission, basically pretty much as on a vehicle.

Bus topology:
Now and again implied as straight transport topology, Bus is an essential
layout that uses a singular length of connection, generally called the
medium, with particularly joined LAN stations. All stations share this
connection section. Every station on this segment sees transmissions
from one another station on the connection partition; this is known as a
broadcast medium. The LAN association stations are sure endpoints to
the connection section and are known as transport framework end
centres. This single connection section fits being a lone reason for
dissatisfaction. If the connection is broken, no LAN station will have
accessibility or the ability to transmit and get. This single connection
section fits being a lone motivation behind frustration. If the connection is
broken, no LAN station will have accessibility or the ability to transmit
and get.

Tree topology:
The tree topology is a sensible expansion of the vehicle topology and
could be depicted as different interconnected transport frameworks. The
physical (connection) plant is known as an extending tree with all stations
associated with it. The tree begins at the root, the peak point, and
reaches out to the framework endpoints. This topology allows a
framework to expand logically with one and just element data route
between any two framework endpoints. A tree topology framework is one
that does not use hovers in its topology. An example of a tree topology
framework is a traversed or traded framework running the spreading over
tree estimation, ordinarily found with Ethernet frameworks. The
intersection tree estimation cripples hovers in what may somehow be an
orbited topology. Navigating tree reaches out through the framework and
certifications that emerge dynamic path exists between any two LANassociated stations

Task 4 Using diagrams provide details of each layers and their


functionality in relevant model and compare OSI Reference Model
with TCP/IP Model.
ANS. OSI MODEL LAYERS
International Standards Organization/Open System Interconnection
(ISO/OSI) model is a standard reference model for correspondence
between two end clients in a system. It can be useful to have an essential
comprehension of how your system functions with a specific end goal to
investigate future issues.
The layers are in two gatherings. The upper four layers are utilized at
whatever point a message goes from or to a client. The lower three layers
are utilized when any message goes through the host PC. Messages
expected for this PC go to the upper layers. Messages bound for some
other host are not left behind to the upper layers but rather are sent to
another host.

OSI Layers

Layer 1-Physical Layer:


This layer transmits bits from one computer to another and regulates the
transmission of a stream of bits over a physical medium. This layer
defines how the cable is attached to the network adapter and what
transmission technique is used to send data over the cable..
Layer 2-Data Link Layer:
This layer package raw bit from the Physical layer into frames (logical,
structures packets for data). It is responsible for transferring frames from
one computer to another, without errors. After sending a frame, it waits
for an acknowledgment from the receiving computer.
Layer 3-Network Layer:
This layer handles the routing of the data, addresses messages and
translates logical addresses and names into physical addresses. It also
determines the route from the source to the destination computer and
manages traffic problems (flow control), such as switching, routing, and
controlling the congestion of data packets.
Layer 4-Transport Layer:
This layer handles error recognition and recovery, manages the end-toend control (for example, determining whether all packets have arrived)
and error-checking. It ensures complete data transfer.
Layer 5-Session Layer:

This layer allows applications on different computers to establish, use,


and end a session/connection. This layer establishes dialog control
between the two computers in a session, regulating which side transmits,
and when and how long it transmits.
Layer 6-Presentation Layer:
This is a layer, usually part of an operating system, that converts
incoming and outgoing data from one presentation format to another (for
example, from a text stream into a popup window with the newly arrived
text). This layer also manages security issues by providing services such
as data encryption and compression. Its sometimes called the syntax
layer.
Layer 7-Application Layer:
This is the layer at which communication partners are identified, quality
of service is identified, user authentication and privacy are considered,
and any constraints on data syntax are identified. (This layer is not the
application itself, although some applications may perform application
layer functions). It represents the services that directly support
applications such as software for file transfers, database access, email,
and network games.

Comparison between OSI and TCP/IP models


OSI(Open
Interconnection)

System TCP/IP(Transmission
Control Protocol / Internet
Protocol)
1. OSI provides layer functioning 1. TCP/IP model is more based
and also defines functions of all on protocols and protocols
the layers.
are not flexible with other
layers.
2. In OSI model the transport 2.
In TCP/IP model the
layer guarantees the delivery of transport layer does not
packets
guarantees
delivery
of
packets.
3. Follows horizontal approach
3. Follows vertical approach.
4. OSI model has a separate 4. TCP/IP does not have a
presentation layer
separate presentation layer
5. OSI is a general model.
5. TCP/IP model can't be
utilized as a part of whatever
other application.
6. Network layer of OSI model 6. The Network layer in
provide both connection oriented TCP/IP
model
provides
and connectionless service.
connectionless service.
7. OSI model has an issue of 7. TCP/IP model does not fit
fitting the conventions in the any convention
model
8. Protocols are hidden in OSI 8. In TCP/IP replacing protocol
model and are easily replaced as is not easy
the technology changes.
9. OSI model defines services, 9. In TCP/IP it is not clearly
interfaces and protocols very separated
its
services,
clearly
and
makes
clear interfaces and protocols.
distinction between them.
10. It has 7 layers
10. It has 4 layers

Task 5. Define and compare the functions of networking devices


a
b
c
d

Switches
Routers
Gateways
Repeaters

ANS. Network devices are parts used to unite PCs or other electronic
gadgets together with the goal that they can share records or assets like
printers or fax machines.
Switches
A switch is a keen gadget that works in the information connection layer.
The term astute alludes to the choice making limit of the Switch. Since it
works in the Data connection layer, it has information of the MAC
locations of the ports in the system.
Consequently, the information must be sent from Computer A to
Computer B, then, the information is exchanged to the Computer B just,
and not to some other PCs joined on the system. Henceforth, it sets up a
connection between the sender and the beneficiary in light of the MAC
addresses.
It is likewise to be noticed that a switch is a protected gadget, in light of
the fact that it sends data just to the craved destinations, furthermore
certain security components, for example, firewalls can be actualized in
the Switches.

Routers
Any PC can be joined with the web through MODEM, which performs the
MODulation and the DEModulation operations. Be that as it may, when
there are more than one PC at home or in an association, and you have a
solitary web association, you require a Router. Switch is a gadget which is
utilized when various gadgets need to join with the Internet utilizing the
same IP.
Any Internet Service Provider (ISP) gives a solitary IP, and particularly for
individual utilize, the IP location is alloted progressively. This is done on
the grounds that, assume, an ISP has 1000 IP addresses, it doesn't imply
that it has 1000 clients. An ISP accept that not all gadgets will be
associated with the web in the meantime. Subsequently, when a client
needs to get to the web, any IP address from the pool of IP locations from
the ISP will be relegated to unite the client to the web.
Gateways
The Gateway gadgets work in the Transport layer or more, where the
diverse system advances are executed. An entryway is important when
there are diverse advances actualized by the distinctive LAN's which are
to be associated together.
In the more regular illustration, we utilize a phone system and web
systems, which deals with diverse advancements. The phone system
takes after the ISDN, and the Internet takes after the IP. Here, two unique
advancements are being utilized. For this situation, the switch neglects to
work, subsequent to the switch can't comprehend the functionalities of
both the systems. Consequently, we require a Gateway, which goes about
as an interpreter in conveying between the two systems.
Repeaters
A repeater is a gadget like the Hub, however has extra components. It
additionally works in the Physical. The repeaters are utilized as a part of
spots where intensification of data sign is essential. In any case, the sort
of enhancement done by the repeater is unique in relation to the
consistent intensification by speakers.
The standard intensifies everything sustained into it. That implies, if the
info sign has commotion actuated into it, both the craved flag and clam
or sign are as one opened up. Be that as it may, on account of a repeater,
it recovers the data flag, and opens up just the attractive sign. Thus, the
clam or segment of the sign is dispensed with.

WAPs(Wireless access point)


In PC organizing, a remote access point (AP) is a gadget that permits
remote or related gauges. The AP more often than not join with a switch
(by means of a wired system) as a standalone gadget, yet it can likewise
be an indispensable segment of the switch itself. An AP is separated from
a hotspot, which is the physical space where the remote administration is
given.

Вам также может понравиться