You are on page 1of 7

SEP 2018

Assignment- 1 on
------------------------------------------------------------------------------------------------------------------------------------------------------

Computer Networks (CCNT2544)

Submitted to
Head of Dept. Dr. Abdallah Mahmoud Mousa Altrad
Faculty of Computer and Information Technology

Prepared by
Somon Mohammad Azharul Islam (BP954)
BSc (Hons) in Computer Science
November 11, 2018
1. Explain the functions of computer networks.
2. What is the difference between a LAN, a MAN, and a WAN?
3. List the OSI network Layer. Demonstrate the main function of each later.
4. What is the differences between TCP & UDP?
5. In your view, what is the most efficient and appropriate data network infrastructure
could be deploy for last mile rural area connectivity.

1.Explain the functions of computer networks.

Answer: Actually, computer network has some effective function or features. Switch,
Router, Clients, transmission media, LAN Cable, shared data, shared printers and other
hardware and software resources, network interface card(NIC), local operating system(LOS),
and the network operating system (NOS).

2.What is the difference between a LAN, a MAN, and a WAN?

Answer: The Network allows computers to connect and communicate with different
computers via any medium that connects multiple computer systems with a common link.
Computer networks are categorized into three basic types based on their size, distance
coverage, data transfer speed, and their reach: Local Area Network (LAN), Wide Area
Network (WAN), and Metropolitan Area Network (MAN).

Local Area Network:

This is a group of computers or devices, that are pretty much, close by, usually within the
same building. By definition, the connections must be high speed and relatively inexpensive.
For example,

 A group of students playing “Call of Duty” in the same room (without internet)
 Networking in home, office, school, or group of buildings.
 High speed (1000 mbps)

Metropolitan Area Network:

This is a larger network that usually group of computers or devices, which are inside some
city-sized, geographical area. For example,

 The IUB network.


 Alarm network of city fire department.
 Camera & video cam networks monitored by police departments in Kuala
Lumpur.
 Moderate speed (44 to 155 Mbps)
Wide Area Network:

A WAN in comparison to a MAN, is not restricted to a geographical location, although it


might be confined within the bounds of a state or country. This is a group of computers are
devices, spread out over a huge, country-sized area. The technology is high speed and
relatively expensive. For example,

 A network of all ATM machines, in a country.


 Sensor networks across many weather stations, which measure humidity,
temperature etc. and give to the weather stations across the country.
 Less speed (150 mbps)

3. List the OSI network Layer. Demonstrate the main function of each later.

Answer:

Application:
It’s called as layer 7 of OSI model. It supports application, apps, and end-user
processes. Communication partners are identified; quality of service is identified. This
layer provides application services for file transfers, e-mail, and
other network software services.

Application examples are WWW browsers, NFS, SNMP, Telnet, HTTP, FTP.

Presentation:
It’s called as layer 6 of OSI model. It’s Responsible for data representation on our
screen. It sometimes called the data semantics and syntax layer. This layer does
encryption and decryption of the data.

Presentation examples are encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG,
MPEG, MIDI.
Session:
It’s called as layer 5 of OSI model. This layer establishes, manages and terminates
connections between applications. The session layer sets up, coordinates, and
terminates conversations, exchanges, and dialogues between the applications at each
end. It deals with session and connection coordination.

Session examples are NFS, NetBIOS names, SQL, RPC.

Transport:
It’s called as layer 4 of OSI model. It responsible to provide transparent transfer of
data between end systems, or hosts, and is also responsible for end-to-end error
recovery and flow control. It ensures complete data transfer.
Transport examples are SPX, TCP, UDP.

Network:
It’s called as layer 3 of OSI model. It’s responsible for
switching and routing technologies, creating logical paths, known as virtual circuits
for transmitting data from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control and
packet sequencing.

Network examples are AppleTalk DDP, IP, IPX, TCP/ IP.

Data Link:
It’s called as layer 2 of OSI model. Data packets are encoded and decoded into bits. It
furnishes protocol knowledge and management and handles errors in the physical
layer, flow control and frame synchronization. The data link layer is divided into two
sub layers: The Media Access Control (MAC) layer and the Logical Link
Control(LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls
frame synchronization, flow control and error checking.

Data Link examples are PPP, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame
Relay. 

Physical:
It’s called as layer 1 of OSI model. Electrical signals, light signal, radio signals are
responsible for physical layer. It provides the hardware means of sending and
receiving data on a carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS323 and ATM are protocols with this layer.

4. What is the differences between TCP & UDP?

Transmission Control Protocol: is a connection-oriented protocol, which


means that it requires handshaking to set up end-to-end communications. (3
way handshake which are  SYN,SYN-ACK and ACK ).
Once a connection is set up, user data may be sent bi-directionally over the
connection.
It is  
 Reliable – TCP manages message acknowledgment, retransmission and
timeout. Multiple attempts to deliver the message are made. 
That means If a packet gets lost along the way, the server will re-request the
lost part. 
In TCP, there's either no missing data or in case of multiple timeouts, the
connection is dropped.
    
 Ordered – If two messages are sent over a connection in sequence, the first
message will reach the receiving application first. 
When data segments arrive in the wrong order, TCP buffers delay the out-of-
order data until all data can be properly re-ordered and delivered to the
application.

 Heavyweight – TCP requires three packets to set up a socket connection,


before any user data can be sent. TCP handles reliability and congestion
control.
    

 Streaming – Data is read as a byte stream, no distinguishing indications are


transmitted to signal message (segment) boundaries.

The examples of TCP use are: HTTP, HTTPs, FTP, SMTP, Telnet etc.

User Datagram Protocol: is a simpler message-based connectionless


protocol. Connectionless protocols do not set up a dedicated end-to-end
connection. 
Communication is achieved by transmitting information in one direction from
source to destination without verifying the readiness or state of the receiver.

It is

 Unreliable – When a UDP message is sent, it cannot be known if it will


reach its destination; it could get lost along the way. 
There is no concept of acknowledgment, retransmission, or timeout.
    
 Not ordered – If two messages are sent to the same recipient, the order
in which they arrive cannot be predicted.
    
 Lightweight – There is no ordering of messages, no tracking
connections, etc. It is a small transport layer designed on top of IP.
   
 Datagrams – Packets are sent individually and are checked for
integrity only if they arrive. 
Packets have definite boundaries which are honored upon receipt,
meaning a read operation at the receiver socket will yield an 
entire message as it was originally sent.
    
 No congestion control – UDP itself does not avoid congestion, unless
they implement congestion control measures at the application level.
    
 Broadcasts - being connectionless, UDP can broadcast - sent packets
can be addressed to be receivable by all devices on the subnet.

The examples of UDP: DNS, DHCP, TFTP, SNMP, RIP, VOIP etc.

So as a result TCP first establishes a proper reliable connection and


then the data is transmitted with proper acknowledgment whereas on
the other hand UDP just transmit the data, it doesn't care whether the
recipient is receiving data or not. Even though UDP is faster than TCP,
we use TCP for better services.

5. In your view, what is the most efficient and appropriate data network
infrastructure could be deploy for last mile rural area connectivity.

In my point of view, a Point-to-Point network is the most appropriate data network


infrastructure could be deploying for this condition. A Point-to-Point network comprises
many connections between individual computer systems. It provides data transmission from
one computer system to another, where the data packets traverse through many intermediate
systems on the network. Point to point wide area networks via residential antennas pointing at
central towers gives broadband coverage at a low installed cost, compared to traditional wired
setups. Even during times of even heavy raining, signal is strong enough that, don’t have to
worry about signal loss when streaming video or other activities.

Reference:

https://www.quora.com/

https://www.webopedia.com/quick_ref/OSI_Layers.asp
--------------------------------THE
END-------------------------------

You might also like