Вы находитесь на странице: 1из 3

HW Assignment 8

1- (10 points) Outline major developments in telecommunications technologies.


a. Telegraph in 1837 by Samuel Morse
b. Telegraph cable in 1858 by Cyrus West Field
c. Telephone using telegraphic cable in 1878 by Alexander Graham Bell
d. AT&T company in 1885
e. Electromagnetic wave discovery in 1888 by Hertz
f. Wireless telegraph in 1895 by Marconi

2- (30 points) Define the following terms:


a. Telecommunication
The transfer of information over a distance from the source to the destination using
cable, telegraph, telephone, or broadcasting.
b. Backbone
It is the major part of the network which helps in connecting the pieces of the
network. If it fails, this will impact the whole network
c. Public Network
The network provided for the general public for the use of the internet.
d. Private Network
This is the restricted network only accessible to a set of people (some organizations).
This type of network is more secure.
e. VPN
These are networks that allow users to transmit and receive information through
shared or broadcast networks as if their devices were directly connected to the
private network.
f. Circuit Switching
It is the method used for communication. The two users have a dedicated path of
network assigned to them with full capacity for their communication.
g. Message Switching
This is a store and forward system that accepts a message from the users and stores
it and moves to another destination where the user chooses to send it
h. Packet Switching
The message is divided into several parts which are sent across the network
individually. And they are combined into a meaningful message at the receiving side.
i. Centralized Computing
Centralized computing means computing is done at a central location using
command-line terminals that control the central computer. This type of system
relies totally on the central computer.
j. Distributed Computing
Distributed computing means that computing is done on different devices scattered
in the network. And these computers communicate by exchanging messages.

3- (15 points) Analyze the characteristics of WANs, LANs, and MANs


a. WAN: Wide Area Network is the long chain of complex networks that include MAN
and LANs. These types of networks cover countries and continents. Famous
examples of WANs are 3G and 4G.
b. LAN: Local Area Network is set up at the organization level for the group of
computing devices. It is more secure because it is established for known users.
These networks are small and faster.
c. MAN: Metropolitan Area Network these the combined network of LAN’s. When
more than one LAN is connected it becomes MAN.

4- (18 points) Describe the following network configurations:


a. Ring
Ring network topology is in which the devices are connected in a circular path. Each
device is connected to its adjacent device.
b. Bus
Bus network topology is in which the devices are connected to a single main cable
for the transmission.
c. Star
Star network topology is most used in LANs in which all the devices are connected to
a single central network device.
d. Tree
Tree network topology is the hybrid network topology in which the star topologies
are connected through bus topology.
e. Mesh
Mesh topology is a network topology in which all devices are connected directly.
f. Hybrid
The usage of different types of topologies in a single network configuration produces
a hybrid network.

5- (10 points) Identify the telecommunications standards.


These are the standard rules which govern communication services on the internet. These
services can be wired or wireless.
6- (2 points) What is the main advantage of digital communication over telephony?
Digital communication gives facilities like video and audio which save a lot of time, money,
and effort. The digital communication is fast, easier, and cheaper. It can tolerate noise
interference.
7- (15 points) Research online about the OSI layers and explain what happens in each layer.
Your answer should not exceed 1 page. You need to cite the source and you are not
allowed to copy-paste from the source.

a. Application Layer: The application layer is the OSI layer that is closest to the user. It
provides network services to the user’s applications. It differs from the other layers in that it
does not provide services to any other OSI layer, but rather, only to applications outside the
OSI model. Examples of such applications are spreadsheet programs, word processing
programs, and bank terminal programs. The application layer establishes the availability of
intended communication partners, synchronizes, and establishes agreement on procedures for
error recovery and control of data integrity.
b. Presentation Layer: The presentation layer ensures that the information that the application
layer of one system sends out is readable by the application layer of another system. If
necessary, the presentation layer translates between multiple data formats by using a common
format. Provides encryption and compression of data. Examples: - JPEG, MPEG, ASCII,
EBCDIC, HTML.
c. The Session Layer: The session layer defines how to start, control, and end conversations
(called sessions) between applications. This includes the control and management of multiple
bi-directional messages using dialogue control. It also synchronizes dialogue between two
hosts' presentation layers and manages their data exchange. The session layer offers
provisions for efficient data transfer.
Examples: - SQL, ASP (AppleTalk Session Protocol).
d. Transport Layer: The transport layer regulates information flow to ensure end-to-end
connectivity between host applications reliably and accurately. The transport layer segments
data from the sending host's system and reassembles the data into a data stream on the
receiving host's system. The boundary between the transport layer and the session layer can
be thought of as the boundary between application protocols and data-flow protocols.
Whereas the application, presentation, and session layers are concerned with application
issues, the lower four layers are concerned with data transport issues. Layer 4 protocols
include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
e. Network Layer: Defines the end-to-end delivery of packets. Defines logical addressing so
that any endpoint can be identified. Defines how routing works and how routes are learned so
that the packets can be delivered. The network layer also defines how to fragment a packet
into smaller packets to accommodate different media. Routers operate at Layer 3.
Examples: - IP, IPX, AppleTalk
f. Data Link Layer: The data link layer provides access to the networking media and physical
transmission across the media and this enables the data to locate its intended destination on a
network. The data link layer provides reliable transit of data across a physical link by using
the Media Access Control (MAC) addresses. The data link layer uses the MAC address to
define a hardware or data link address for multiple stations to share the same medium and still
uniquely identify each other. Concerned with network topology, network access, error
notification, ordered delivery of frames, and flow control.
Examples: - Ethernet, Frame Relay, FDDI.
g. Physical Layer: The physical layer deals with the physical characteristics of the transmission
medium. It defines the electrical, mechanical, procedural, and functional specifications for
activating, maintaining, and deactivating the physical link between end systems. Such
characteristics as voltage levels, the timing of voltage changes, physical data rates, maximum
transmission distances, physical connectors, and other similar attributes are defined by
physical layer specifications.
Examples: - EIA/TIA-232, RJ45, NRZ.

References:

 The OSI Model: Understanding the Seven Layers of Computer


Networks(http://ru6.cti.gr/bouras-old/WP_Simoneau_OSIModel.pdf)
 Data and Computer
communication(http://ice.dlut.edu.cn/WangBo/ComputerNetworks/DataandComputer
CommunicationVersion8.pdf)

Вам также может понравиться