CN QB
CN QB
Ans:
When several computers are connected together and are able to communicate with one
another, it is called a computer network. Computer networks are designed to share data and
information among the computers of the network. Depending on the operating geographical
area, computer networks are of the three major types, namely LAN, MAN, and WAN.
All the three computer networks are designed for the same purpose, i.e., for sharing
information among the computers. But, they are different in many ways, which we are going
to highlight in this article. Let's start with some basics of LAN, MAN, and WAN.
What is LAN?
LAN represents Local Area Network. LANs are tiny networks within a single construction
or colleges of up to a few kilometers. When two or more computers are attached in a limited
area, i.e., the inside diameter of not more than a few kilometers, then such a network is called
a local area network. Local area network connects various computers in a small
geographical area such a building so that they can share data, resources, programs, tools, etc.
LAN has very high data transmission rate because it connects a very limited number of
computers in a single network. The hardware components like network adapters, hubs,
network cables, etc. required to design LAN are relatively less expensive.
The most common examples of LAN include private computer networks for home, office,
schools, hospitals, colleges, etc.
What is MAN?
MAN represents Metropolitan Area Network. MAN is a huge version of LAN and uses
similar technology. It uses one or two cables but does not include switching components. It
covers an entire city and can be associated with the local cable TV network.
A typical MAN connects two or more computing devices that reside apart but in the same or
different cities. MAN convers comparatively larger geographical area as compared to a LAN.
But, it is very costly as compared to a LAN. The speed of data transmission in MAN is of the
order of Mbps (Mega Bytes per Second). The most common examples of MAN are networks
of telephone companies that provide high speed digital subscriber line to cable TV customers.
What is WAN?
WAN represents Wide Area Network. WAN supports no limit of distance. A WAN offers
long-distance communication of data, voice, pictures and video data over a large
geographical area consisting of a country, a continent or even a planet.
A WAN is basically large connection of various LANs and MANs. A WAN makes use of
telephone lines or radio waves to connect LANs together. A WAN uses a relatively very
expensive and high-speed technology for data communication.
Based on network structure, WANs are of two types, namely Point-to-Point WAN and
Switched WAN. In WANs, satellite links and public switched telephone networks are used
as the communication mediums.
The rate of data transmission in a WAN is comparatively less than a LAN or MAN due to
larger distances and the greater number of computing devices connected in a single network.
The speed of data transmission in WANs typically ranges from a few kbps (kilo bytes per
second) to Mbps (Megabytes per second). One of the major issues that WANs face is the
propagation delay. The most common examples of WANs include the Internet, the network
of bank cash dispensers, etc.
2. Note on ring/ star topology /bus topology with advantages and disadvantages.
Ans:
Ring Topology:
In a ring topology, each device is connected to two other devices, forming a closed loop. The
data is transmitted in one direction around the loop, passing through each device until it
reaches its destination.
Advantages:
Disadvantages:
Star Topology:
In a star topology, all devices are connected to a central hub or switch. The data is transmitted
from the sending device to the hub, which then sends it to the destination device.
Advantages:
Disadvantages:
• If the hub fails, the entire network goes down.
• High traffic volume can cause congestion at the hub.
• Requires more cabling than a bus topology.
Bus Topology:
In a bus topology, all devices are connected to a single cable called a backbone. The data is
transmitted in both directions along the backbone, and each device listens to the data to see if
it's intended for them.
Advantages:
Disadvantages:
Ans:
Digital-to-Analog Conversion:
Digital-to-Analog Conversion (DAC) is the process of converting digital signals into analog
signals. In computer networks, DAC is used to convert digital data from a computer or other
digital device into analog signals that can be transmitted over an analog communication
medium, such as a telephone line or radio waves.
The process of DAC involves sampling the digital signal and then using an analog signal
generator to create an analog waveform that represents the original digital signal. The analog
waveform can then be transmitted over the communication medium.
Digital-to-Digital Conversion:
Digital-to-Digital Conversion (DDC) is the process of converting one digital signal to another
digital signal. In computer networks, DDC is used for various purposes, such as signal
regeneration, data compression, encryption/decryption, and protocol conversion.
The process of DDC involves receiving a digital signal and then processing it to create a new
digital signal that is either identical to the original signal or has been modified according to
the specific requirements. The process of DDC can be performed using various techniques,
such as logic gates, multiplexers, demultiplexers, encoders, and decoders.
Overall, DAC and DDC are essential processes in computer networks that help to ensure the
reliable transmission and efficient processing of digital signals.
4. Explain 1st Scenario for protocol Layering.
Ans:
The first scenario for protocol layering in computer networks is the most basic and essential
layering model, known as the OSI (Open Systems Interconnection) model. The OSI model is
composed of seven layers, each of which serves a specific purpose in the communication
process between two or more networked devices.
1. Physical layer: This layer deals with the physical aspects of the network, such as the
transmission medium (cables, fiber optics, wireless) and the signaling method (analog
or digital). It defines the electrical and mechanical specifications of the network and
how the data is transmitted between devices.
2. Data link layer: This layer is responsible for the reliable transfer of data between
adjacent network nodes, usually over a physical link. It breaks up the data into frames,
adds addressing and error control information, and handles flow control and access
control.
3. Network layer: This layer provides end-to-end routing and logical addressing
functions. It determines the best path for the data to travel between networked devices
and handles congestion control and quality of service (QoS) issues.
4. Transport layer: This layer provides end-to-end reliable data transport services
between processes running on different networked devices. It manages the
segmentation and reassembly of data, as well as flow control and error recovery.
5. Session layer: This layer establishes, maintains, and terminates connections between
applications on different networked devices. It handles authentication and encryption,
as well as session management and synchronization.
6. Presentation layer: This layer deals with the syntax and semantics of the information
exchanged between networked devices. It provides data conversion services such as
compression, encryption, and decryption.
7. Application layer: This layer provides the interface between the network and the
applications that run on networked devices. It supports a wide range of application
services, including file transfer, email, and web browsing.
Each layer in the OSI model communicates only with the layer immediately above or below
it. This allows for easier development, maintenance, and upgrading of individual layers
without affecting the operation of other layers in the network. Additionally, it facilitates
interoperability between different network technologies and equipment from various vendors,
as long as they conform to the same layering model.
5.Two Types of Delay / Two Types of Noise.
Ans:
1. Transmission Delay: This is the time it takes for a packet of data to travel from the
source to the destination. It is determined by the distance between the two devices and
the speed of the medium over which the data is transmitted.
2. Propagation Delay: This is the time it takes for a signal to travel through a medium. It
is determined by the physical characteristics of the medium, such as its length and the
speed at which signals can travel through it.
1. Thermal Noise: This is random electrical noise that is generated by the thermal
motion of electrons in a conductor. It is present in all electronic circuits, including
those used in network devices, and can interfere with the transmission of data.
2. Interference Noise: This is noise that is generated by external sources, such as other
electronic devices or sources of electromagnetic radiation. It can also interfere with
the transmission of data and is more difficult to control than thermal noise.
Ans:
ALOHA is a multiple access protocol for transmission of data via a shared network channel.
It operates in the medium access control sublayer (MAC sublayer) of the open systems
interconnection (OSI) model. Using this protocol, several data streams originating from
multiple nodes are transferred through a multi-point transmission channel.
In ALOHA, each node or station transmits a frame without trying to detect whether the
transmission channel is idle or busy. If the channel is idle, then the frames will be
successfully transmitted. If two frames attempt to occupy the channel simultaneously,
collision of frames will occur and the frames will be discarded. These stations may choose to
retransmit the corrupted frames repeatedly until successful transmission occurs.
Slotted ALOHA
Slotted ALOHA reduces the number of collisions and doubles the capacity of pure ALOHA.
The shared channel is divided into a number of discrete time intervals called slots. A station
can transmit only at the beginning of each slot. However,there can still be collisions if more
than one station tries to transmit at the beginning of the same time slot.
Ans:
Frequency-division multiple access is one among the only multiple access methods. During
this method, the channel bandwidth is subdivided into a variety of sub-channels. This
multiple access method used for voice and data transmission. During this method the general
channel bandwidth is being shared by multiple users, therefore the variety of users can
transmit their information simultaneously. The adjacent frequency bands within the FDMA
spectrum are likely to interfere with one another. Therefore, it’s necessary to incorporate the
guard bands between the adjacent frequency bands. No code words and synchronization are
required. Power efficiency reduced using FDMA, it’s an old and proven system and used for
analog signals.
Advantages of FDMA :
Disadvantages of FDMA :
Ans:
Multiplexing is a technique by which different analog and digital streams of transmission can
be simultaneously processed over a shared link. Multiplexing divides the high capacity
medium into low capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and
light (optical fiber). All mediums are capable of multiplexing.
When multiple senders try to send over a single medium, a device called Multiplexer divides
the physical channel and allocates one to each. On the other end of communication, a De-
multiplexer receives data from a single medium, identifies each, and sends to different
receivers.
When the carrier is frequency, FDM is used. FDM is an analog technology. FDM divides the
spectrum or carrier bandwidth in logical channels and allocates one user to each channel.
Each user can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other. Channels are
separated by guard bands. Guard band is a frequency which is not used by either channel.
Time Division Multiplexing
TDM is applied primarily on digital signals but can be applied on analog signals as well. In
TDM the shared channel is divided among its user by means of time slot. Each user can
transmit data within the provided time slot only. Digital signals are divided in frames,
equivalent to time slot i.e. frame of an optimal size which can be transmitted in given time
slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer are timely
synchronized and both switch to next channel simultaneously.
When channel A transmits its frame at one end,the De-multiplexer provides media to channel
A on the other end.As soon as the channel A’s time slot expires, this side switches to channel
B. On the other end, the De-multiplexer works in a synchronized manner and provides media
to channel B. Signals from different channels travel the path in interleaved manner.
Light has different wavelength (colors). In fiber optic mode, multiple optical carrier signals
are multiplexed into an optical fiber by using different wavelengths. This is an analog
multiplexing technique and is done conceptually in the same manner as FDM but uses light
as signals.
Further, on each wavelength time division multiplexing can be incorporated to accommodate
more data signals.
Multiple data signals can be transmitted over a single frequency by using Code Division
Multiplexing. FDM divides the frequency in smaller channels but CDM allows its users to
full bandwidth and transmit signals all the time using a unique code. CDM uses orthogonal
codes to spread signals.
Each station is assigned with a unique code, called chip. Signals travel with these codes
independently, inside the whole bandwidth.The receiver knows in advance the chip code
signal it has to receive.
Ans:
Packet Switching
• The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
• The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
• Every packet contains some information in its headers such as source address, destination
address and sequence number.
• Packets will travel across the network, taking the shortest path as possible.
• All the packets are reassembled at the receiving end in correct order.
• If any packet is missing or corrupted, then the message will be sent to resend the message.
• If the correct order of the packets is reached, then the acknowledgment message will be
sent.
Circuit Switching
• Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
• In the Circuit Switching Technique, once the connection is established then the dedicated
path will remain to exist until the connection is terminated.
• Circuit switching in a network operates in a similar way as the telephone works.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to
ensure the availability of the dedicated path. After receiving the acknowledgment, dedicated
path transfers the data.
• Circuit switching is used in public telephone network. It is used for voice transmission.
• Fixed data can be transferred at a time in circuit switching technology.
Ans:
A hub repeater is a network device that is used to connect multiple devices in a local area
network (LAN). It is a simple network device that operates at the physical layer (Layer 1) of
the OSI model and its primary function is to regenerate and distribute incoming signals to all
its connected devices.
The hub repeater has multiple ports that allow devices to connect to it through Ethernet
cables. When a device sends a signal to the hub repeater, the signal is received on one port
and is then repeated or broadcasted on all the other ports. This means that every device
connected to the hub repeater receives the signal, regardless of whether it is the intended
recipient or not.
Since the hub repeater does not perform any filtering or addressing, it can lead to network
congestion and collisions, especially in large networks with heavy traffic. As a result, hubs
have largely been replaced by switches which operate at the data link layer (Layer 2) of the
OSI model and can perform packet filtering and forwarding based on MAC addresses.
In summary, a hub repeater is a legacy network device that can connect multiple devices in a
LAN and regenerate signals, but its lack of intelligence and packet filtering capabilities make
it unsuitable for modern high-performance networks.
Ans:
IPv4 is the fourth version of the Internet Protocol (IP) and is widely used for communication
between devices on the internet. It is a connectionless protocol that provides a unique address
to each device connected to the internet.
IPv4 addresses are 32-bit binary numbers that are commonly represented in dotted decimal
notation (for example, 192.168.0.1). The addresses are divided into classes to simplify the
allocation process. The two most commonly used classes of IPv4 addresses are Class A and
Class B addresses.
1. Class A addresses: Class A addresses are used for large networks that require a large
number of IP addresses. The first bit of a Class A address is always set to 0, which
means that the first 8 bits (the first octet) represent the network portion of the address,
and the remaining 24 bits represent the host portion. This allows for up to 126 Class A
networks, each with up to 16,777,214 hosts.
2. Class B addresses: Class B addresses are used for medium-sized networks. The first
two bits of a Class B address are always set to 10, which means that the first 16 bits
(the first two octets) represent the network portion of the address, and the remaining
16 bits represent the host portion. This allows for up to 16,384 Class B networks, each
with up to 65,534 hosts.
Overall, IPv4 has some limitations, including the limited number of unique addresses
available, which has led to the development of IPv6 with a larger address space
Ans:
Routing
• A Router is a process of selecting path along which the data can be transferred from
source to the destination. Routing is performed by a special device known as a router.
• A Router works at the network layer in the OSI model and internet layer in TCP/IP
model
• A router is a networking device that forwards the packet based on the information
available in the packet header and forwarding table.
• The routing algorithms are used for routing the packets. The routing algorithm is
nothing but a software responsible for deciding the optimal path through which packet
can be transmitted.
• The routing protocols use the metric to determine the best path for the packet
delivery. The metric is the standard of measurement such as hop count, bandwidth,
delay, current load on the path, etc. used by the routing algorithm to determine the
optimal path to the destination.
• The routing algorithm initializes and maintains the routing table for the process of
path determination.
Types of Routing
• Static Routing
• Default Routing
• Dynamic Routing
Static Routing
• No Overhead: It has ho overhead on the CPU usage of the router. Therefore, the cheaper
router can be used to obtain static routing.
• Bandwidth: It has not bandwidth usage between the routers.
• Security: It provides security as the system administrator is allowed only to have control
over the routing to a particular network.
• For a large network, it becomes a very difficult task to add each route manually to the
routing table.
• The system administrator should have a good knowledge of a topology as he has to add each
route manually.
Default Routing
• Default Routing is a technique in which a router is configured to send all the packets to the
same hop device, and it doesn't matter whether it belongs to a particular network or not. A
Packet is transmitted to the device for which it is configured in default routing.
• Default Routing is used when networks deal with the single exit point.
• It is also useful when the bulk of transmission networks have to transmit the data to the
same hp device.
• When a specific route is mentioned in the routing table, the router will choose the specific
route rather than the default route. The default route is chosen only when a specific route is
not mentioned in the routing table.
Dynamic Routing
• All the routers must have the same dynamic routing protocol in order to exchange the
routes.
• If the router discovers any change in the condition or topology, then router broadcast this
information to all other routers.
• It is easier to configure.
• It is more effective in selecting the best route in response to the changes in the condition or
topology.
Ans:
The TCP header is a fixed-size section at the beginning of the TCP segment that contains
information about the connection and the data being transferred. The TCP header has the
following fields:
1. Source Port (16 bits): This field identifies the port number of the sending device.
2. Destination Port (16 bits): This field identifies the port number of the receiving
device.
3. Sequence Number (32 bits): This field contains the sequence number of the first byte
of data in the segment.
4. Acknowledgment Number (32 bits): This field contains the sequence number of the
next byte of data that the receiving device expects to receive.
5. Data Offset (4 bits): This field specifies the length of the TCP header in 32-bit words.
6. Reserved (6 bits): These bits are reserved for future use.
7. Flags (6 bits): This field contains six flags that indicate various control information
about the segment, such as whether it contains urgent data, whether it is the last
segment in a sequence, and whether it is an acknowledgment of previously received
data.
8. Window Size (16 bits): This field specifies the size of the receiving device's buffer, in
bytes, that is available for receiving data.
9. Checksum (16 bits): This field contains a checksum value that is used to detect errors
in the segment during transmission.
10. Urgent Pointer (16 bits): This field is used to indicate the location of urgent data in the
segment.
11. Options (variable length): This field is used to provide additional information about
the connection and the data being transferred.
The TCP segment header is an essential part of the TCP protocol, as it provides the necessary
information for establishing and maintaining a reliable connection between two devices and
for ensuring the integrity and accuracy of the data being transferred.
14.Features of UDP.
Ans:
The User Datagram Protocol (UDP) is simplest Transport Layer communication protocol
available of the TCP/IP protocol suite. It involves minimum amount of communication
mechanism. UDP is said to be an unreliable transport protocol but it uses IP services which
provides best effort delivery mechanism.
In UDP, the receiver does not generate an acknowledgement of packet received and in turn,
the sender does not wait for any acknowledgement of packet sent. This shortcoming makes
this protocol unreliable as well as easier on processing.
Requirement of UDP
A question may arise, why do we need an unreliable protocol to transport the data? We
deploy UDP where the acknowledgement packets share significant amount of bandwidth
along with the actual data. For example, in case of video streaming, thousands of packets are
forwarded towards its users. Acknowledging all the packets is troublesome and may contain
huge amount of bandwidth wastage. The best delivery mechanism of underlying IP protocol
ensures best efforts to deliver its packets, but even if some packets in video streaming get
lost, the impact is not calamitous and can be ignored easily. Loss of few packets in video and
voice traffic sometimes goes unnoticed.
Features
• UDP is used when acknowledgement of data does not hold any significance.
• UDP is good protocol for data flowing in one direction.
• UDP is simple and suitable for query based communications.
• UDP is not connection oriented.
• UDP does not provide congestion control mechanism.
• UDP does not guarantee ordered delivery of data.
• UDP is stateless.
• UDP is suitable protocol for streaming applications such as VoIP, multimedia
streaming.
Ans:
Bit rate refers to the number of bits transmitted over a communication channel per unit of
time, usually measured in bits per second (bps). It represents the speed at which data is
transmitted from one point to another in a communication system.
Bit interval, on the other hand, refers to the time duration of one bit. It is the time it takes for
one bit to be transmitted from the sender to the receiver. It is calculated as the inverse of the
bit rate, that is, the duration of one bit interval is equal to one divided by the bit rate.
In communication networks, bit rate and bit interval are important parameters that affect the
overall performance of the system. Higher bit rates mean more data can be transmitted per
unit of time, but also require more bandwidth and may introduce more errors. Longer bit
intervals mean more time is required to transmit data, which may increase latency and reduce
the overall throughput of the system.
16.Data Communications Attenuation.
Ans:
Attenuation can occur due to various factors, including the length of the transmission
medium, the quality of the medium, and the frequency of the signal. In general, the longer the
transmission medium, the greater the attenuation. This is because the signal loses energy as it
travels through the medium.
The quality of the medium can also affect attenuation. For example, a medium with a lot of
interference or noise can cause greater attenuation than a cleaner medium. The frequency of
the signal can also affect attenuation, with higher frequencies experiencing greater
attenuation than lower frequencies.
Ans:
The IP Address cannot be changed. ARP can find the physical address of the node when its
internet address is known. ARP provides a dynamic mapping from an IP address to the
corresponding hardware address.
When one host wants to communicate with another host on the network, it needs to resolve
the IP address of each host to the host's hardware address.
• When a host tries to interact with another host, an ARP request is initiated. If the IP
address is for the local network, the source host checks its ARP cache to find out the
hardware address of the destination computer.
• If the correspondence hardware address is not found, ARP broadcasts the request to
all the local hosts.
• All hosts receive the broadcast and check their own IP address. If no match is
discovered, the request is ignored.
• The destination host that finds the matching IP address sends an ARP reply to the
source host along with its hardware address, thus establishing the communication.
The ARP cache is then updated with the hardware address of the destination host
Ans:
In computer networks, wired media and guided media are two types of transmission media
that are used to transmit data over a communication channel.
Wired media refers to the physical cables or wires that are used to transmit data from one
device to another. This includes copper cables, such as twisted-pair cables used in Ethernet
networks, coaxial cables used in cable TV systems, and fiber-optic cables used in high-speed
networks.
Guided media, on the other hand, refers to the physical channels or pathways that guide the
transmission of data signals. This includes radio waves, microwaves, and infrared signals.
Guided media typically require a transmitter and a receiver to communicate over a specific
frequency range.
In general, wired media are more reliable and provide better quality of transmission than
guided media, especially over long distances. However, guided media are more flexible and
can transmit data wirelessly, making them ideal for mobile and remote applications.