Professional Documents
Culture Documents
Study Guide For Computer Network: Department of Computer Science Faculty of Informatics
Study Guide For Computer Network: Department of Computer Science Faculty of Informatics
For
Computer Network
Prepared by
Kalechristos Abebe
215
The study guide of computer network is organized into seven units, with each unit having its
own set of self test problems. The units are selected as, Introduction to data communication
and networking, network models, transmission media, LAN technologies and Multiple
access, WAN technologies and networks security.
For each of the chapters, self test problems are available as those having answer key and
those without answer. All the questions are set to address main areas of the unit mentioned in
the specifics objectives list. Students are advised to try to answer all the questions and check
out answer for those questions with answer key
Questions listed as those without answer key are all subjective types which help the students
to have better understanding of the subject
Unit I
216
Data communications are the transfer of data from one device to another via some form of
transmission medium. A data communications system must transmit data to the correct
destination in an accurate and timely manner. The five components that make up a data
communications system are the message, sender, receiver, medium, and protocol. Text,
numbers, images, audio, and video are different forms of information. Data flow between two
devices can occur in one of three ways: simplex, half-duplex, or full-duplex.
General objective
The general objective of the unit is to help students understand the basic concepts of data
communication and computer networks
Specific 0bjectives
Specific objectives of the unit include:
Define data communication
217
218
219
Answer Key
1. B 2. A 3. B
4. C 5. A 6. A
7. D 8. A 9. B
10.C
11. The five components of a data communication system are:
I. Message: information (data) to be communicated
II. Sender: sender is a device that sends a data message
III. Receiver: Receiver is a device that receives the message
IV. Medium: Transmission medium is a physical path by which message
travels for sender to receiver
V. Protocol: Protocol is a set of rules that governs data communication
12. The advantage of multi point connection over point to point connection is that
multi point connection provides greater efficiency since more than two devices could
share the link
220
Mesh Toplogy: Each device has a dedicated point to point link to every other device
in the network
Advantage
- Robust
- Privacy or security
Disadvantages
Star Toplogy: Each device has a point to point link to a central controller device or
hub Advantage
- Less expensive
- Robust
Advantage
- Ease of installation
Disadvantage
221
Disadvantage
- Unidirectional traffic
15. The three criteria’s needed for efficient and effective network are@
I. Performance :Performance can be measured with transit time and response time of
the network
II. Reliability: is a measure network frequency of failure, time it takes to recover from
failure, and network’s robustness in catastrophe
III. Security: Security issues include protecting data for un authorized access
Unit Two
Network Models
Summary
222
TCP/IP is a five-layer hierarchical protocol suite developed before the OSI model. The
TCP/IP application layer is equivalent to the combined session, presentation, and application
layers of the OSI model. Four levels of addresses are used in an internet following the
TCP/IP protocols: physical (link) addresses, logical (IP) addresses, port addresses, and
specific addresses. The physical address, also known as the link address, is the address of a
node as defined by its LAN or WAN. The IP address uniquely defines a host on the Internet,
The port address identifies a process on a host A specific address is a user-friendly address
General Objective
The general objective of the unit is to understand the network reference model
Specific Objectives
At the end of the unit students are expected to
Understand the concepts of OSI reference model
o Identify layered architecture
o Identify peer-to-peer process
o Indentify encapsulation
o Identify layers in the OSI model
Explain the function of Physical layer
Explain the function of data link layer
Explain the function of network layer
Explain the function of transport layer
Explain the function of session layer
Explain the function of presentation layer
Explain the function of application layer
Understand the concepts of TCP/IP reference model
223
224
225
Answer Key
1. B 2. B 3. B
4. B 5. C 6. D
7. C 8. B 9. C 10. D
226
227
Notice we just added the fourth octet’s lowest and highest values and came up with the
answers. Again, it is the same answer as for a Class C subnet, but we just added the fourth
octet.
Unit 3
Transmission Media
Summary
228
Wireless data are transmitted through ground propagation, sky propagation, and line of-sight
propagation. Wireless waves can be classified as radio waves, microwaves, or infrared waves.
Radio waves are Omni-directional; microwaves are unidirectional. Microwaves are used for
cellular phone, satellite wireless LAN communications. Infrared waves are used for short-
range communications such as those between a PC and a peripheral device. It can also be
used for indoor LANs.
General Objective
The general objective of the unit is to understand use of transmission media at the physical
layer
Specific Objectives
At the end of the unit, students are expected to:
Understand use of guide media
o Explain the working mechanism of twisted pair cable
229
230
231
Unit 4
Local Area Networks and multiple Access
Summary
We can consider the data link layer as two sub layers. The upper sublayer is responsible for
data link control, and the lower sub layer is responsible for resolving access to the shared
media. Many formal protocols have been devised to handle access to a shared link. We
categorize them into three groups: random access protocols, controlled access protocols, and
channelization protocols.
232
General objective
The general objective of the unit is to understand different LAN technologies and multiple
access schemes
Specific objectives
At the end of the unit students are expected to:
Define multiple access
o Explain random access techniques
Explain how carrier sense multiple access (CSMA) works
Explain how carrier sense multiple access with collision detection
(CSMA/CD)works
Explain how carrier sense multiple access with collision
avoidance(CSMA/CA) works
o Explain controlled access techniques
Explain how reservation technique works
Explain how polling technique works
Explain how token passing technique works
o Explain channelization techniques
Explain how Frequency –Division multiple access(FDMA) works
Explain how Time-Division Multiple access(TDMA) works
Explain how Code-Division Multiple access (CDMA) works
Define LAN technologies
o Explain the IEEE standards
Explain functions of data link layer
233
234
235
Answer Key
1. B 5. D 9. D
2. B 6. D 10. C
3. C 7. B
4. C 8. D
11. The basic idea behind CSMA/CD is that a station needs to be able to receive while
transmitting to detect a collision. When there is no collision, the station receives one
signal: its own signal. When there is a collision, the station receives two signals: its
own signal and the signal transmitted by a second station. To distinguish between
these two cases, the received signals in these two cases must be significantly different.
In other words, the signal from the second station needs to add a significant amount of
energy to the one created by the first station.
12. In the token-passing method, the stations in a network are organized in a logical ring.
In other words, for each station, there is a predecessor and a successor. The
236
Unit 5
Connecting LAN’s, Backbone networks, virtual LAN’s
Summary
LANs do not normally operate in isolation. They are connected to one another or to the
Internet. To connect LANs, or segments of LANs, we use connecting devices. Connecting
devices can operate in different layers of the Internet model.
A repeater is a connecting device that operates in the physical layer of the Internet model. A
repeater regenerates a signal, connects segments of a LAN, and has no filtering capability. A
bridge is a connecting device that operates in the physical and data link layers of the Internet
model. A transparent bridge can forward and filter frames and automatically build its
forwarding table. A bridge can use the spanning tree algorithm to create a loop less topology.
A backbone LAN allows several LANs to be connected. A backbone is usually a bus or a
star. A virtual local area network (VLAN) is configured by software, not by physical wiring.
Membership in a VLAN can be based on port numbers, MAC addresses, IP addresses, IP
237
General Objective
To understand the different ways of connecting LAN’s, backbone network and VLAN’s
Specific Objectives
At end of the unit students are expected to:
Understand LAN connecting devices
o Explain the operations of Hubs
Describe Hub operation
Describe Hub features
Describe Peer versus stand alone hubs
Describe intelligent Hubs
Describe multi architecture Hubs
o Explain operations of Switches
Describe operations of switches
Describe two layer switches
Describe three layer switches
o Explain the operations of repeaters
Describe repeaters and network architecture
Describe repeater to repeater connection
o Explain the operations of routers
Describe Route Discovery
Describe Router Operation
Describe Router Groupings
Describe Router Protocols
o Explain operations of bridges
Bridges versus Routers, Brouters, and Repeaters
Protocol Independence of Bridges
Packet Transmission
Types of Bridges
238
239
240
241
12. Static VLANs are the typical way of creating VLANs and the most secure. The switch
port that you assign a VLAN association always maintains that association until an
administrator changes the port assignment. This type of VLAN configuration is easy
to set up and monitor, working well in a network where the movement of users within
the network is controlled. Using network management software to configure the ports
can be helpful but is not mandatory.
242
Unit 6
Wide Area Networks
Summary
To understand WAN technologies, you need to understand the different WAN terms
and connection types that can be used to connect your networks together. This unit
focuses the different WAN terms and connection types typically used by service
providers. Leased line, circuit switching and packet switching are types of
connections to be used. The unit also focuses on different WAN technologies like ,
Distributed Queue Dual Bus (DQDB) ,Synchronous Digital Hierarchy
(SDH),Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM)
General Objective:
To understand different WAN connections and technologies
Specific Objectives:
At the end of the unit students are expected to
Understand the concept of WAN
o Describe WAN connection types
Describe leased line connection
Describe circuit switching
Describe packet switching
Describe WAN technologies
Describe Synchronous Digital Hierarchy (SDH)
Describe Synchronous Optical Network (SONET)
Describe Asynchronous Transfer Mode (ATM)
Frame relay
Describe integrated services digital network(ISDN)
243
244
Answer Key 4. D
1. D 5. C
2. C 6. A
3. B 7. B
245
246
Unit 7
Network Security
Summary
The increase in attacks of message during transmission coincides with an increased
use of the Internet and with increases in the complexity of protocols, applications,
and the Internet itself. Critical infrastructures increasingly rely on the Internet for
operations. Individual users rely on the security of the Internet, email, the Web, and
Web-based applications to a greater extent than ever. Thus, a wide range of
technologies and tools are needed to counter the growing threat. At a basic level,
cryptographic algorithms for confidentiality and authentication assume greater
importance. As well, designers need to focus on Internet-based protocols and the
vulnerabilities of attached operating systems and applications.
Thus network security typically deals applying different cryptographic techniques in
order secure a message selecting different protocols and algorithms to counter
measure attacks
General objective
To understand the different network security techniques
Specific Objectives
At the end of this unit students are expected to :
247
o Access Control
o Data Confidentiality
o Data Integrity
o Nonrepudiation
o Availability Service
o Security Mechanisms
248
a. Cryptography
b. Cryptanalysis
a. Access control
b. Non repudiation
249
a. Plain text
b. Cipher text
c. Cipher
d. Key
e. Encryption
f. Decryption
Answer key
1. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
The goal of the opponent is to obtain information that is being transmitted
Active attacks involve some modification of the data stream or the creation of a false
stream and can be subdivided into four categories: masquerade, replay, modification
of messages, and denial of service
250
Communication
i. block / stream
251
provides
Where
M= input message
Conventional encryption
C = MAC function
• The same algorithm with
K = sharedthe
secret
samekey
key is used for
encryption and
MAC = message authentication code
decryption.
6. • The sender and receiver
Public key encryption
must share the algorithm
and the key • One algorithm is used for
encryption and decryption with a
• One algorithm is used for
pair of keys, one for encryption
encryption and
and one for decryption.
decryption with a pair of
keys, one for encryption • The sender and receiver must
and one for decryption. each have one of the matched
pair of keys (not the same one)
• The sender and receiver
must each have one of 252 • One of the two keys must be kept
the matched pair of
St.keys
Mary’s University College secret.
Faculty of Informatics
(not the same one).
Degree Exit Exam Study Guides
7. RSA encryption and decryption algorithms are stated as follows
253
254
255