You are on page 1of 29

COMPUTER NETWORK ASSIGNMENT 1

Name: NITHESH SAI KANNE


Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

1) Define Computer Network and Classify different types of


Network topologies with its merits and demerits.
Answer:
Definition: A computer network is a set of devices connected through links. A
node can be computer, printer, or any other device capable of sending or
receiving the data. The links connecting the nodes are known as communication
channels.

Types of Network topologies:

a) Mesh Topology: In mesh topology, every device is connected to another


device via particular channel.

Every device is connected with another via dedicated channels. These channels are known
as links. 

 If suppose, N number of devices are connected with each other in mesh topology, then total
number of ports that is required by each device is N-1. In the Figure 1, there are 5 devices
connected to each other, hence total number of ports required is 4.
 If suppose, N number of devices are connected with each other in mesh topology, then total
number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In the Figure 1,
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

there are 5 devices connected to each other, hence total number of links required is 5*4/2 =
10.

Advantages of this topology: 


 
 It is robust.
 Fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
 Provides security and privacy.

Problems with this topology: 


 
 Installation and configuration is difficult.
 Cost of cables are high as bulk wiring is required, hence suitable for less number
of devices.
 Cost of maintenance is high.

b) Star Topology: In star topology, all the devices are connected to a single hub
through a cable. This hub is the central node and all others nodes are connected to
the central node. The hub can be passive in nature i.e. not intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as active
hubs. Active hubs have repeaters in them. 

 
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

A star topology having four systems connected to single point of connection i.e. hub. 
Advantages of this topology: 

 If N devices are connected to each other in star topology, then the number of
cables required to connect them is N. So, it is easy to set up.
 Each device requires only 1 port i.e. to connect to the hub.

Problems with this topology: 


 
 If the concentrator (hub) on which the whole topology relies fails, the whole
system will crash down.
 Cost of installation is high.
 Performance is based on the single concentrator i.e. hub.

c) Bus Topology: Bus topology is a network type in which every computer and
network device is connected to single cable. It transmits the data from one end to
another in single direction. No bi-directional feature is in bus topology. 

A bus topology with shared backbone cable. The nodes are connected to the
channel via drop lines. 

Advantages of this topology: 


 
 If N devices are connected to each other in bus topology, then the number of
cables required to connect them is which is known as backbone cable and N
drop lines are required.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

 Cost of the cable is less as compared to other topology, but it is used to build
small networks.

Problems with this topology: 


 
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid
this, various protocols are used in MAC layer known as Pure Aloha, Slotted
Aloha, CSMA/CD etc.
 

d) Ring Topology: In this topology, it forms a ring connecting devices with its
exactly two neighboring devices.

 A number of repeaters are used for Ring topology with a large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the
100th node. Hence to prevent data loss repeaters are used in the network.
The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
 
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

A ring topology comprises of 4 stations connected with each forming a ring. 


The following operations takes place in ring topology are: 
1. One station is known as monitor station which takes all the responsibility to
perform the operations.
2. To transmit the data, station has to hold the token. After the transmission is done,
the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the
token just after the transmitting the data and Delay token release releases the token
after the acknowledgement is received from the receiver.

Advantages of this topology: 


 
 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Problems with this topology: 


 
 Troubleshooting is difficult in this topology.
 Addition of stations in between or removal of stations can disturb the whole
topology.
 

e) Tree Topology: This topology is the variation of Star topology. This topology has
hierarchical flow of data. 

In this the various secondary hubs are connected to the central hub which contains the
repeater. In this data flow from top to bottom i.e from the central hub to secondary and
then to the devices or from bottom to top i.e. devices to secondary hub and then to the
central hub. 

Advantages of this topology: 


 
 It allows more devices to be attached to a single central hub thus it increases the
distance that is travel by the signal to come to the devices.
 It allows the network to get isolate and also prioritize from different computers.

Problems with this topology: 


 
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

 If the central hub gets fails the entire system fails.


 The cost is high because of cabling.

2) Explain ISO/OSI Reference model with neat diagram.


Answer:
ISO stands for International organization of Standardization. This is called a model
for Open System Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a
complete communication system. They are:

1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer

Below we have the complete representation of the OSI model, showcasing all the layers
and how they communicate with each other.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Feature of OSI Model

1. Big picture of communication over network is understandable through this OSI


model.
2. We see how hardware and software work together.
3. We can understand new technologies as they are developed.
4. Troubleshooting is easier by separate networks.
5. Can be used to compare basic functional relationships on different networks.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Principles of OSI Reference Model

The OSI reference model has 7 layers. The principles that were applied to arrive at the
seven layers can be briefly summarized as follows:

1. A layer should be created where a different abstraction is needed.


2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across
the interfaces.

6. The number of layers should be large enough that distinct functions need not be
thrown together in the same layer out of necessity and small enough that
architecture does not become unwieldly.
7. Following are the functions performed by each layer of the OSI model. This is
just an introduction; we will cover each layer in details in the coming tutorials.

OSI Model Layer 1: The Physical Layer

1. Physical Layer is the lowest layer of the OSI Model.


2. It activates, maintains and deactivates the physical connection.
3. It is responsible for transmission and reception of the unstructured raw data over
network.
4. Voltages and data rates needed for transmission is defined in the physical layer.
5. It converts the digital/analog bits into electrical signal or optical signals.
6. Data encoding is also done in this layer.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

OSI Model Layer 2: Data Link Layer

1. Data link layer synchronizes the information which is to be transmitted over the


physical layer.
2. The main function of this layer is to make sure data transfer is error free from
one node to another, over the physical layer.
3. Transmitting and receiving data frames sequentially is managed by this layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also
handled by this layer.
5. This layer establishes a logical layer between two nodes and also manages the
Frame traffic control over the network. It signals the transmitting node to stop,
when the frame buffers are full.

OSI Model Layer 3: The Network Layer

1. Network Layer routes the signal through different channels from one node to
other.
2. It acts as a network controller. It manages the Subnet traffic.
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and assembles the incoming
packets into messages for higher levels.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

OSI Model Layer 4: Transport Layer

1. Transport Layer decides if data transmission should be on parallel path or single


path.
2. Functions such as Multiplexing, Segmenting or Splitting on the data are done by
this layer
3. It receives messages from the Session layer above it, convert the message into
smaller units and passes it on to the Network layer.
4. Transport layer can be very complex, depending upon the network requirements.

Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.

OSI Model Layer 5: The Session Layer

1. Session Layer manages and synchronize the conversation between two different


applications.
2. Transfer of data from source to destination session layer streams of data are

marked and are resynchronized properly, so that the ends of the messages are
not cut prematurely and data loss is avoided .

OSI Model Layer 6: The Presentation Layer

1. Presentation Layer takes care that the data is sent in such a way that the
receiver will understand the information (data) and will be able to use the data.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

2. While receiving the data, presentation layer transforms the data to be ready for
the application layer.
3. Languages(syntax) can be different of the two communicating systems. Under
this condition presentation layer plays a role of translator.
4. It performs Data compression, Data encryption, Data conversion etc.

OSI Model Layer 7: Application Layer

1. Application Layer is the topmost layer.


2. Transferring of files disturbing the results to the user is also done in this layer.
Mail services, directory services, network resource etc. are services provided by
application layer.
3. This layer mainly holds application programs to act upon the received and to be
sent data.

3. Differentiate between OSI Model and TCP/IP Model.

Answer:

BASIS FOR
TCP/IP MODEL OSI MODEL
COMPARISON

Expands To Transmission Control Open system


COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

BASIS FOR
TCP/IP MODEL OSI MODEL
COMPARISON

Protocol/ Internet Protocol Interconnect

Meaning It is a client server model It is a theoretical model

used for transmission of which is used for

data over the internet. computing system.

Number Of Layers 4 Layers 7 Layers

Developed by Department of Defense ISO (International

(DoD) Standard Organization)

Tangible Yes No

Usage Mostly used Never used

Obeys Horizontal approach Vertical approach


COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Differences between OSI and TCP / IP Reference Models


 OSI model is a generic model that is based upon functionalities of each layer.
TCP/IP model is a protocol-oriented standard.
 OSI model distinguishes the three concepts, namely, services, interfaces, and
protocols. TCP/IP does not have a clear distinction between these three.
 OSI model gives guidelines on how communication needs to be done, while
TCP/IP protocols layout standards on which the Internet was developed. So,
TCP/IP is a more practical model.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

 In OSI, the model was developed first and then the protocols in each layer were
developed. In the TCP/IP suite, the protocols were developed first and then the
model was developed.
 The OSI has seven layers while the TCP/IP has four layers.

4. What is Transmission media? Explain Guided media and


unguided Transmission media.
Answer:
In data communication terminology, a transmission medium is a physical path between
the transmitter and the receiver i.e. it is the channel through which data is sent from one
place to another. Transmission Media is broadly classified into the following types: 
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

1. Guided Media: 
It is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links. 

Features: 
 High Speed
 Secure
 Used for comparatively shorter distances

There are 3 major types of Guided Media: 


(i) Twisted Pair Cable – 
It consists of 2 separately insulated conductor wires wound about each other.
Generally, several such pairs are bundled together in a protective sheath. They are the
most widely used Transmission Media. Twisted Pair is of two types: 
 
1. Unshielded Twisted Pair (UTP): 
This type of cable has the ability to block interference and does not depend on a
physical shield for this purpose. It is used for telephonic applications. 
Advantages: 
 Least expensive
 Easy to install
 High speed capacity
 Susceptible to external interference
 Lower capacity and performance in comparison to STP
 Short distance transmission due to attenuation.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

2. Shielded Twisted Pair (STP): 


This type of cable consists of a special jacket to block external interference. It is
used in fast-data-rate Ethernet and in voice and data channels of telephone lines. 

Advantages: 
 Better performance at a higher data rate in comparison to UTP
 Eliminates crosstalk
 Comparatively faster
 Comparatively difficult to install and manufacture
 More expensive
 Bulky

(ii) Coaxial Cable – 


It has an outer plastic covering containing 2 parallel conductors each having a separate
insulated protection cover. Coaxial cable transmits information in two modes: Baseband
mode (dedicated cable bandwidth) and Broadband mode (cable bandwidth is split into
separate ranges). Cable TVs and analog television networks widely use Coaxial
cables. 

Advantages: 
 High Bandwidth
 Better noise Immunity
 Easy to install and expand
 Inexpensive

Disadvantages: 
 Single cable failure can disrupt the entire network

(iii) Optical Fiber Cable – 

It uses the concept of reflection of light through a core made up of glass or plastic. The
core is surrounded by a less dense glass or plastic covering called the cladding. It is
used for transmission of large volumes of data. 
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division
Multiplexer) supports two modes, namely unidirectional and bidirectional mode.
Advantages: 
 Increased capacity and bandwidth
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

 Light weight
 Less signal attenuation
 Immunity to electromagnetic interference
 Resistance to corrosive materials

Disadvantages: 
 Difficult to install and maintain
 High cost
 Fragile

2. Unguided Media: 
It is also referred to as Wireless or Unbounded transmission media. No physical
medium is required for the transmission of electromagnetic signals. 
Features: 
 
 Signal is broadcasted through air
 Less Secure
 Used for larger distances

There are 3 major types of Unguided Media: 


(i) Radio waves – 
These are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM
radios and cordless phones use Radio waves for transmission. 
Further Categorized as (i) Terrestrial and (ii) Satellite. 
(ii) Microwaves – 
It is a line of sight transmission i.e. the sending and receiving antennas need to be
properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. These
are majorly used for mobile phone communication and television distribution. 

(iii) Infrared – 
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency
Range:300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer,
etc.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

5. Differentiate among LAN, MAN and WAN.  

Answer:
LAN, MAN and WAN are types of network.

LAN - Local Area Network


A Local Area Network (LAN) is a private network that connects computers and devices
within a limited area like a residence, an office, a building or a campus. On a small
scale, LANs are used to connect personal computers to printers. However, LANs can
also extend to a few kilometers when used by companies, where a large number of
computers share a variety of resources like hardware (e.g. printers, scanners,
audiovisual devices etc.), software (e.g. application programs) and data.

MAN - Metropolitan Area Network


A Metropolitan Area Network (MAN) is a larger network than LAN. It often covers
multiple cities or towns. It is quiet expensive and a single organization may not have
own it.

WAN - Wide Area Network


A Wide Area Network (WAN) is a much larger network than LAN and MAN. It often
covers multiple countries or cotenants. It is quiet expensive and a single organization
may not have own it. Satellite is used to manage WAN.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

6. Illustrate bandwidth utilization techniques.


Answer:
i. Frequency division multiplexing (FDM): it is a technique of multiplexing
which means combining more than one signal over a shared medium. In FDM, signals
of different frequencies are combined for concurrent transmission.

Concept and Process


COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

In FDM, the total bandwidth is divided to a set of frequency bands that do not overlap.
Each of these bands is a carrier of a different signal that is generated and modulated by
one of the sending devices. The frequency bands are separated from one another by
strips of unused frequencies called the guard bands, to prevent overlapping of signals.
The modulated signals are combined together using a multiplexer (MUX) in the sending
end. The combined signal is transmitted over the communication channel, thus allowing
multiple independent data streams to be transmitted simultaneously. At the receiving
end, the individual signals are extracted from the combined signal by the process of
demultiplexing (DEMUX).

Example
The following diagram conceptually represents multiplexing using FDM. It has 4
frequency bands, each of which can carry signal from 1 sender to 1 receiver. Each of
the 4 senders is allocated a frequency band. The four frequency bands are multiplexed
and sent via the communication channel. At the receiving end, a demultiplexer
regenerates the original four signals as outputs.

Uses and Applications


It allows sharing of a single transmission medium like a copper cable or a fiber optic
cable, among multiple independent signals generated by multiple users.
FDM has been popularly used to multiplex calls in telephone networks. It can also be
used in cellular networks, wireless networks and for satellite communications.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

ii. Wavelength division multiplexing (WDM ) is a technique of multiplexing


multiple optical carrier signals through a single optical fiber channel by varying the
wavelengths of laser lights. WDM allows communication in both the directions in the
fiber cable.

Concept and Process


In WDM, the optical signals from different sources or (transponders) are combined by a
multiplexer, which is essentially an optical combiner. They are combined so that their
wavelengths are different.
The combined signal is transmitted via a single optical fiber strand. At the receiving end,
a demultiplexer splits the incoming beam into its components and each of the beams is
send to the corresponding receivers.

Example
The following diagram conceptually represents multiplexing using WDM. It has 4 optical
signals having 4 different wavelengths. Each of the four senders generates data
streams of a particular wavelength. The optical combiner multiplexes the signals and
transmits them over a single long-haul fiber channel. At the receiving end, the splitter
demultiplexes the signal into the original 4 data streams.

Iii. Time division multiplexing (FDM): is a technique of multiplexing, where the


users are allowed the total available bandwidth on time sharing basis. Here the time
domain is divided into several recurrent slots of fixed length, and each signal is allotted
a time slot on a round-robin basis.

Concept and Process


COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

In TDM, the data flow of each input stream is divided into units. One unit may be 1 bit, 1
byte, or a block of few bytes. Each input unit is allotted an input time slot. One input unit
corresponds to one output unit and is allotted an output time slot. During transmission,
one unit of each of the input streams is allotted one-time slot, periodically, in a
sequence, on a rotational basis. This system is popularly called round-robin system.

Example
Consider a system having four input streams, A, B, C and D. Each of the data streams
is divided into units which are allocated time slots in the round – robin manner. Hence,
the time slot 1 is allotted to A, slot 2 is allotted to B, slot 3 is allotted to C, slot 4 is
allotted to D, slot 5 is allocated to A again, and this goes on till the data in all the
streams are transmitted.

Uses and Applications


It is widely used in telephone and cellular networks.

Statistical Time Division Multiplexing (STDM)


In STDM, the time slots are dynamically allocated to the slots according to demand.
The multiplexer checks each input stream in a round – robin manner and allocates a
slot to an input line only if data is present there, otherwise, it skips to the next stream
and checks it.

7. Explain about Circuit Switching, Packet Switching methods


(Datagram networks, Virtual Circuit networks)
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Answer:
Switching: A network consists of many switching devices. In order to connect
multiple devices, one solution could be to have a point to point connection in between
pair of devices. But this increases the number of connections. The other solution could
be to have a central device and connect every device to each other via the central
device which is generally known as Star Topology. Both these methods are wasteful
and impractical for very large network. The other topology also cannot be used at this
stage. Hence a better solution for this situation is SWITCHING. A switched network is
made up of a series of interconnected nodes called switches.

Circuit Switching: Circuit Switching is generally used in the public networks. It


come into existence for handling voice traffic in addition to digital data. However digital
data handling by the use of circuit switching methods are proved to be inefficient. The
network for Circuit Switching is shown in figure.

 Here the network connection allows the electrical current and the associated voice
with it to flow in between the two respective users. The end to end communication
was established during the duration of call.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

 In circuit switching the routing decision is made when the path is set up across the
given network. After the link has been sets in between the sender and the receiver
then the information is forwarded continuously over the provided link.
 In Circuit Switching a dedicated link/path is established across the sender and the
receiver which is maintained for the entire duration of conversation.

Packet Switching: In Packet Switching, messages are broken up into packets


and each of which includes a header with source, destination and intermediate node
address information. Individual Packets in packet switching technique take different
routes to reach their respective destination. 
 Independent routing of packets is done in this case for following reasons:
 Bandwidth is reduced by the splitting of data onto different routes for a busy circuit.
 For a certain link in the network, the link goes down during transmission the
remaining packet can be sent through another route.

  The major advantage of Packet switching is that they are used for performing data
rate conversion.
 When traversing the network switches, routers or the other network nodes then the
packets are buffered in the queue, resulting in variable delay and throughput
depending on the network’s capacity and the traffic load on network.
 Packet switching contrasts with another principal networking paradigm, circuit
switching, a method which sets up a limited number of dedicated connections of
constant bit rate and constant delay between nodes for exclusive use during the
communication session.
  In cases where traffic fees are charged, for example in cellular communication,
packet switching is characterized by a fee per unit of information transmitted.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

Datagram Networks:

1. It is a connection-less service. There is no need for reservation of resources as


there is no dedicated path for a connection session.
2. All packets are free to use any available path. As a result, intermediate routers
calculate routes on the go due to dynamically changing routing tables on routers.
3. Since every packet is free to choose any path, all packets must be associated with
a header with proper information about the source and the upper layer data.
4. The connection-less property makes data packets reach the destination in any
order, which means that they can potentially be received out of order at the
receiver’s end.
5. Datagram networks are not as reliable as Virtual Circuits.
6. The major drawback of Datagram Packet switching is that a packet can only be
forwarded if resources such as the buffer, CPU and bandwidth are available.
Otherwise, the packet will be discarded.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

7. But it is always easy and cost-efficient to implement datagram networks as there is


no extra headache of reserving resources and making a dedicated each time an
application has to communicate.
8. It is generally used by the IP network, which is used for Data services like Internet.

Virtual Circuits:
1. It is connection-oriented, meaning that there is a reservation of resources like
buffers, CPU, bandwidth, etc. for the time in which the newly setup VC is going to
be used by a data transfer session.
2. The first sent packet reserves resources at each server along the path.
Subsequent packets will follow the same path as the first sent packet for the
connection time.
3. Since all the packets are going to follow the same path, a global header is
required. Only the first packet of the connection requires a global header, the
remaining packets generally don’t require global headers.
4. Since all packets follow a specific path, packets are received in-order at the
destination.
5. Virtual Circuit Switching ensures that all packets successfully reach the
Destination. No packet will be discarded due to unavailability of resources.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

6. From the above points, it can be concluded that Virtual Circuits are a highly
reliable method of data transfer.
7. The issue with virtual circuits is that each time a new connection is set up,
resources and extra information have to be reserved at every router along the
path, which becomes problematic if many clients are trying to reserve a routers
resource simultaneously.
8. It is used by the ATM (Asynchronous Transfer Mode) Network, specifically for
Telephone calls.
COMPUTER NETWORK ASSIGNMENT 1
Name: NITHESH SAI KANNE
Roll Number:18R11A0515
Date: 13th August,2020
Class: CSE-3A

SOURCE:
 https://www.tutorialspoint.com/computer_fundamentals/computer_networking.htm
 https://www.javatpoint.com/computer-network-tutorial
https://www.geeksforgeeks.org/computer-network-tutorials/

You might also like