You are on page 1of 12

KINGDOM OF SAUDI ARABIA | JAZAN UNIVERSITY

COLLEGE OF COMPUTER SCIENCE & INFORMATION SYSTEMS

ASSIGNMENT: 2022-2023

Academic Year 1443-44 H Semester 3

Course with Data Communication and Computer


Section
code Network / ITEC – 251

Type of Max.
20 Marks
Assignment Marks

Date of
Deadline 30/04/2023
Announcement

Student Name Student ID

ASSIGNMENT PROBLEM STATEMENT

Instructions:

· Students should answer all the questions. Questions are from unit-1, unit-2, unit-3, and
unit-4 examples alongside exercises (textbook).

· Students should mention their Name, University Registration, and Section Number.

· Students should solve it by hand, take its snapshot and add it in MS Word.

· Students should submit the assignment via Blackboard only. No email, no WhatsApp.

· Two attempts are given for submission of your assignment.

· Submit your assignment copy only in Microsoft Word format. (***.doc, .docx)
Ques.1)

a) Assume six devices are arranged in a mesh topology. How many cables are needed?
How many ports are needed for each device? [ Marks = 3 ]

In a mesh topology, each device is connected to every other device in the network, creating a
fully interconnected network.

For N devices in a mesh topology, the total number of cables needed can be calculated using
the formula:

Total cables = N * (N-1)

In this case, with six devices (N = 6), the total number of cables needed would be:

Total cables = 6 * (6-1) = 6 * 5 = 30 cables

As for the number of ports needed for each device, in a mesh topology, each device requires
one port for every other device it is directly connected to. Since each device in the network
needs to connect with five other devices (since N-1=5), each device would require 5 ports.

b) For each of the following four networks, discuss the consequences if a connection
fails. [ Marks = 2 ]

i. Five devices arranged in a mesh topology

ii. Five devices arranged in a star topology (not counting the hub)

iii. Five devices arranged in a bus topology

iv. Five devices arranged in a ring topology

i.Mesh Topology:

In a mesh topology with five devices, where each device is directly connected to every other
device, the consequences of a connection failure would generally be minimal. Since there are
multiple redundant paths available between devices, if one connection fails, the network can
still function and communicate through alternative paths. The failure of a single connection
may result in slightly increased latency or a temporary disruption in communication between
some devices, but the overall network would remain functional.

ii.Star Topology:

In a star topology with five devices, where all devices are connected to a central hub, the
consequences of a connection failure would depend on which connection fails. If one of the
devices loses its connection to the central hub, only that particular device would be affected
and lose connectivity with the rest of the network. However, the other devices would still be
able to communicate with each other via the central hub. If the central hub itself fails, then the
entire network would be affected, and all devices would lose connectivity with each other.
iii.Bus Topology:

In a bus topology with five devices, where all devices are connected to a single communication
bus, the consequences of a connection failure would depend on where the failure occurs. If a
device's connection to the bus fails, that particular device would lose connectivity with the rest
of the network. However, the other devices would still be able to communicate with each other
through the bus. If the bus itself fails, then the entire network would be affected, and all
devices would lose connectivity with each other.

iv.Ring Topology:

In a ring topology with five devices, where devices are connected in a circular loop, the
consequences of a connection failure would depend on where the failure occurs. If a
connection between two devices fails, the devices on either side of the failed connection would
lose connectivity with each other, resulting in a network split. The rest of the devices in the ring
would still be able to communicate with each other. However, if the connection between two
adjacent devices fails, it would cause a complete network failure, as the ring would be broken,
and no devices would be able to communicate with each other.
Ques.2)

a) What are headers and trailers, and how do they get added and removed? [ Marks = 2 ]

Headers and trailers are added and removed at different points in the data transmission
process, depending on the specific protocol being used. Here's a general overview of how
headers and trailers are added and removed in a typical data transmission process:

Header Addition: When data is transmitted over a network, it is divided into smaller chunks
called packets. Before the data packets are sent over the network, a header is added to the
beginning of each packet. The header contains information about the packet, such as the
source and destination addresses, protocol type, and other relevant details. The header is
typically added at the network layer of the OSI (Open Systems Interconnection) model or the
Internet layer of the TCP/IP model.

Trailer Addition: In some protocols, a trailer may also be added to the end of the data packet.
The trailer contains additional information, such as error detection or correction codes, which
are used to ensure the integrity of the data during transmission. The trailer is typically added at
the data link layer of the OSI model or the link layer of the TCP/IP model.

Header and Trailer Removal: When the data packets reach their destination, the headers and
trailers are removed from the packets. The recipient device reads the information in the
headers and trailers to determine how to process the data packets. Once the headers and
trailers have been processed, the original data is extracted from the packets for further use.

b) How do the layers of the Internet model correlate to the layers of the OSI model? [
Marks = 3 ]

The OSI (Open Systems Interconnection) model and the Internet model, also known as the
TCP/IP (Transmission Control Protocol/Internet Protocol) model, are two different conceptual
models used to understand how data is transmitted over networks. Although they are not
exactly the same, there are correlations between the layers of these two models. Here's a
general comparison between the layers of the OSI model and the Internet model:

OSI Model: Physical Layer

Internet Model: Network Access Layer

The Physical Layer in the OSI model is responsible for the physical transmission of data over
the network, including the electrical, optical, and mechanical aspects of the network. In the
Internet model, this layer is referred to as the Network Access Layer, which deals with the
physical and data link aspects of network communication, such as encoding, framing, and
media access control.
OSI Model: Data Link Layer

Internet Model: Network Access Layer

The Data Link Layer in the OSI model provides reliable point-to-point communication between
devices on the same network segment, and it includes protocols such as Ethernet. In the
Internet model, the functionalities of the Data Link Layer are included in the Network Access
Layer, which deals with the data link protocols and technologies used to connect devices to
the local network, such as Ethernet, Wi-Fi, and DSL.

OSI Model: Network Layer

Internet Model: Internet Layer

The Network Layer in the OSI model is responsible for routing packets across different
networks, establishing logical connections, and addressing. In the Internet model, these
functionalities are included in the Internet Layer, which is responsible for IP addressing, packet
routing, and fragmentation.

OSI Model: Transport Layer

Internet Model: Transport Layer

The Transport Layer in both the OSI model and the Internet model is responsible for reliable
end-to-end communication between applications on different devices. This layer ensures that
data is delivered in the correct order and without errors. In the Internet model, common
protocols at this layer are TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).

OSI Model: Session Layer

Internet Model: Not Applicable

The Session Layer in the OSI model manages the communication sessions between
applications, including establishing, maintaining, and terminating sessions. The Internet model
does not have a specific Session Layer, as these functionalities are typically handled by the
application layer protocols or directly by the application itself.
OSI Model: Presentation Layer

Internet Model: Not Applicable

The Presentation Layer in the OSI model is responsible for data formatting, encryption, and
decryption. It ensures that data is presented in a format that can be understood by the
receiving application. The Internet model does not have a specific Presentation Layer, as these
functionalities are typically handled by the application layer protocols or directly by the
application itself.

OSI Model: Application Layer

Internet Model: Application Layer

The Application Layer in both the OSI model and the Internet model is responsible for
providing communication services to applications, enabling them to exchange data across
networks. This layer includes protocols such as HTTP (Hypertext Transfer Protocol), SMTP
(Simple Mail Transfer Protocol), and FTP (File Transfer Protocol).

It's worth noting that the OSI model is a theoretical model, while the Internet model is a
practical implementation of networking protocols. The Internet model is widely used in today's
networks, including the Internet itself, while the OSI model is mainly used for educational and
reference purposes. However, the two models are often used interchangeably to discuss
network communication and understanding the correlations between their layers can help in
comprehending how data is transmitted over networks.
Ques.3)

a) The period of a signal is 100 ms. What is its frequency in kilohertz? [ Marks = 1 ]

Frequency (in Hz) = 1 / (100 ms / 1000)

Frequency (in Hz) = 1 / 0.1

Frequency (in Hz) = 10 Hz

Frequency (in kHz) = 10 Hz / 1000

Frequency (in kHz) = 0.01 kHz

b) If a periodic signal is decomposed into five sine waves with frequencies of 100, 300,
500, 700, and 900 Hz, what is its bandwidth? Draw the spectrum, assuming all
components have a maximum amplitude of 10 V. [ Marks
=2]

The bandwidth is 900-100 = 800 Hz.


c) The power of a signal is 10 mW and the power of the noise is 1 /lW; what are the
values of SNR and SNRdB? [ Marks = 2 ]
Ques.4)

a) Find the netid and the hostid of the following IP addresses: [ Marks = 1 ]

i. 114.34.2.8

ii. 132.56.8.6

iii. 208.34.54.12

iv. 192.168.178.136

i.IP address: 114.34.2.8

Class: Class A

Default Subnet Mask: 255.0.0.0

NetID: 114

HostID: 34.2.8

ii.IP address: 132.56.8.6

Class: Class B

Default Subnet Mask: 255.255.0.0

NetID: 132.56

HostID: 8.6

iii.IP address: 208.34.54.12

Class: Class C

Default Subnet Mask: 255.255.255.0

NetID: 208.34.54

HostID: 12

iv.IP address: 192.168.178.136

Class: Class C

Default Subnet Mask: 255.255.255.0

NetID: 192.168.178

HostID: 136
b) Find the class of the following IP addresses. [ Marks = 2 ]
i. 208.34.54.12
ii. 238.34.2.1
iii. 114.34.2.8
iv. 129.14.6.8

IP address: 208.34.54.12

Class: Class C

IP address: 238.34.2.1

Class: Class D

IP address: 114.34.2.8

Class: Class A

IP address: 129.14.6.8

Class: Class B
c) An organization is granted the block 16.0.0.0/8. The administrator wants to create 500
fixed length subnets. [ Marks = 2 ]
i. Find the subnet mask.
ii. Find the number of addresses in each subnet.
iii. Find the first and last addresses in subnet 1.
iv. Find the first and last addresses in subnet 500.

i. The given block of IP addresses is 16.0.0.0/8. The /8 indicates that the subnet
mask has 8 bits set to 1, which corresponds to the first octet of the subnet
mask. To create 500 fixed length subnets, we need to borrow enough bits from
the host portion of the IP address to accommodate 500 subnets.

To determine the required subnet mask, we need to find the smallest power of 2
that is equal to or greater than 500. In this case, 2^9 = 512, which is greater than
500. So we need to borrow 9 bits from the host portion of the IP address to
create 500 subnets.

Subnet Mask: 255.255.255.128

ii. The number of addresses in each subnet can be calculated by subtracting 2


from the total number of possible addresses in the subnet, as the first and last
IP addresses in each subnet are reserved. So:Number of addresses in each
subnet = 2^(32 - 9) - 2 = 2^23 - 2 = 8,388,606

iii. For subnet 1, the first and last addresses can be calculated as follows:

First address in subnet 1: 16.0.0.1

Last address in subnet 1: 16.0.0.126

iv. For subnet 500, the first and last addresses can be calculated as follows:

First address in subnet 500: 16.3.245.1

Last address in subnet 500: 16.3.245.126


Name of the Course Ms. Ayasha Siddiqua Signature
Teacher

You might also like