You are on page 1of 84

DIPLOMA IN INFORMATION TECHNOLOGY

(YEAR 2)

SAQA ID CREDITS
24419 10

SYSTEM SOFTWARE201
(SEMESTER 1)

Study Guide

In terms of the Copyright Act, no 98 of 1978, no part of this manual may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying, recording or by any other
information storage and retrieval system without permission in writing from the proprietor.

1|P a g e
System Software201

CONTENTS:
CONTENTS: ............................................................................................................................................................. 2

INTRODUCTION TO THIS MODULE ........................................................................................................................ 4

INTRODUCTION ....................................................................................................................................................... 4
CONTENTS AND STRUCTURE ...................................................................................................................................... 5
SECTION 1: Network and Storage……………………………………………………………………………10
SECTION 2: Protocols………………………………………………………………………………………..30
SECTION 3: Wins and Host Names…………………………………………………………………………..58
SECTION 4: Remote Connectivity……………………………………………………………………………72

SECTION ONE: NETWORK AND STORAGE: INTRODUCTION ............................................................................... 10

1.1 LEARNING OUTCOMES ............................................................................................................................... 11


1.2 READING ..................................................................................................................................................... 11
1.3 TYPES OF NETWORKS ................................................................................................................................. 12
1.4 RAID ............................................................................................................................................................ 15
1.5 BACKUP STRATEGIES .................................................................................................................................. 18
1.6 FRAMES ...................................................................................................................................................... 19
1.7 EXERCISES ................................................................................................................................................... 21

SECTION TWO: PROTOCOLS................................................................................................................................. 30

2.1 LEARNING OUTCOMES ............................................................................................................................... 31


2.2 READING ..................................................................................................................................................... 31
2.3 INTRODUCTION .......................................................................................................................................... 32
2.4 TCP/IP PROTOCOL SUIT .............................................................................................................................. 33
2.5 DHCP........................................................................................................................................................... 41
2.6 NETBIOS ...................................................................................................................................................... 44
2.7 EXERCISES ................................................................................................................................................... 48

SECTION THREE: WINS AND HOSTS ..................................................................................................................... 58

3.1 LEARNING OUTCOMES ............................................................................................................................... 59


3.2 READING ..................................................................................................................................................... 59
3.3 INTRODUCTION .......................................................................................................................................... 60
3.4 WINS ........................................................................................................................................................... 60
3.5 HOST NAMES .............................................................................................................................................. 61
3.6 HOST FILES .................................................................................................................................................. 62
3.6 EXERCISES ................................................................................................................................................... 64

SECTION FOUR: REMOTE CONNECTIVITY ............................................................................................................ 72

3.1 LEARNING OUTCOMES ............................................................................................................................... 73


3.2 READING ..................................................................................................................................................... 73
3.3 INTRODUCTION .......................................................................................................................................... 74
3.4 SERIAL LINE INTERNET PROTOCOL ............................................................................................................. 74
3.5 PIONT TO PIONT PROTOCOL ...................................................................................................................... 74
3.6 EXERCISES .................................................................................................................................................. 75
3.6 VOCABULARY LIST ...................................................................................................................................... 81

2|P a g e
System Software201

Prescribed Text Book: There is no specific prescribed Textbook to be used in conjunction with this
Manual but one of the following Textbooks can be used to complement this manual or a Textbook of
your choice:

 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking


and the OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.

 Computer Networks and Internets (6th Edition)


 Jan 12, 2014 by Douglas E. Comer

 Introduction to Computer Networking: Your First Steps into How the Internet
and Networks Work (Computer Networking Series Book 5)

3|P a g e
System Software201

INTRODUCTION TO THIS MODULE

The broad aims of this module are to:



Have knowledge of different types of networks and differentiate between
client/server networks and peer to peer networks


Have knowledge of RAID and its functions


Be able to explain and implement the various backup strategies


Have knowledge of frames and the various frame standards


Have knowledge of the TCP/IP protocol suite


Have knowledge of the Dynamic Host Configuration Protocol (DHCP)


Have knowledge of the NetBios and Wins services 


Have an understanding of Host names and Host files


Have knowledge of the Domain Name Servers(DNS)


Have knowledge of Remote connectivity

This course is an introduction. It is therefore impossible to fully describe all aspects of building a
successful functional network.

Instead this course focuses on the basic components of building a simple network architectures by
introducing a student to basic technologies and basic terminologies used in the field of IT.

4|P a g e
System Software201

Contents and Structure

Section 1: Network and Storage

This chapter helps a learner to understand different types of networks in deeper


details while also exposing a learner into deeper knowledge about backup
strategies available that could be implemented in order to safely backup
important data. This chapter introduces a learner into knowledge about frames
and how frames could be used in network architecture.

Section 2: Protocols

This chapter helps a learner to understand TCP/IP protocol suit together with its
layers and their functions in deeper details while also exposing a learner into
deeper knowledge about DHCP available as one of the most important
protocols in network architecture. This chapter introduces a learner into
knowledge about NETBIOS and how NETBIOS could be used in network
architecture.

Berea College of Technology

5|P a g e
System Software201

Section 3: Wins and Host


This chapter helps a learner to understand WINS in deeper details while also
exposing a learner into deeper knowledge about host names available that
could be implemented and also exposes a learner into knowledge about host
files stored in a particular network. This chapter introduces a learner into
knowledge about domain name servers (DNS) and how DNS could be used in
network architecture.

Section 4: Remote Connectivity

This chapter helps a learner to understand different types of internet protocols


on any network in deeper details while also exposing a learner into deeper
knowledge about point to point protocol which is a data link protocol used to
establish connection between two nodes. This chapter introduces a learner into
knowledge about asynchronous and synchronous circuits in any network.

6|P a g e
The following are important Course Book Notations.

Refer to the prescribed text book Attempt the following questions and
chapters and pages specified. research further if you could not
answer the questions.

Learning Outcomes Read/Research and write additional


notes. Make sure you use the
prescribed textbook and useful
Internet websites to write additional
notes.

Important Concepts Test Your Knowledge

Solution to Test Your Knowledge


Questions

Case Study

Berea College of Technology

7|P a g e
System Software201

READING

This manual has been designed to be read in conjunction with the following textbooks:

 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.

 Computer Networks and Internets (6th Edition)


 Jan 12, 2014 by Douglas E. Comer

 Introduction to Computer Networking: Your First Steps into How the Internet and
Networks Work (Computer Networking Series Book 5)

Recommended Reading:
network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html

Introduction to computer networks:


https://www.studytonight.com/cpp/introduction-to-cpp.php

There are many websites that teaches and seek to improve network skills by
providing lecture videos as well as course material online such as:

starting from basic(video)


https://www.youtube.com/watch?v=uRJeYKVMfxA

https://www.youtube.com/watch?v=55zroizjnvo

8|P a g e
System Software201

SECTION ONE: NETWORK AND STORAGE

Contents

SECTION ONE: NETWORK AND STORAGE:


1.1 LEARNING OUTCOMES

1.2 READING

1.3 TYPES OF NETWORKS

1.4 RAID

1.5 BACKUP STRATEGIES

1.6 FRAMES

1.7 EXERCISES

9|P a g e
Berea College of Technology

System Software201

1.1 LEARNING OUTCOMES


Have knowledge of different types of networks and differentiate between client/server
networks and peer to peer networks


Have knowledge of RAID and its functions


Be able to explain and implement the various backup strategies


Have knowledge of frames and the various frame standards

10 | P a g e
Introduction

Computer networking is an engineering discipline that aims to study and analyze the
communication process among various computing devices or computer systems that are
linked, or networked, together to exchange information and share resources.
Computer networking depends on the theoretical application and practical implementation
of fields like computer engineering, computer sciences, information technology and
telecommunication.

TYPES OF NETWORKS

There are two types of networks:

Client/Server Networks

Client/server networks consist of two kinds of computer. The clients are usually computer
workstations sitting on the desks of employees in an organisation. The servers are usually
more powerful computers and are held in a central location or locations within an
organization

11 | P a g e
Peer-to-peer Networks

Peer-to-peer networks have workstations connected to each other but do not have
servers. Files can be shared between workstations, and a printer connected to one
workstation can be accessed by another workstation. Peer-to peer networks are often
much simpler to set up than client/server networks. However, they lack some of the
advantages normally associated with networks such as centrally managed security and
ease of backing up files. Peer-to-peer networks would really only be set up among a few
 computers within an office or single room.

RAID

Stands for Redundant Array of Inexpensive Disks (as named by the


inventor), or alternatively Redundant Array of Independent Disks (a
less relative name, and thus now the generally accepted one) — is a
technology that employs the simultaneous use of two or more hard disk drives to achieve
greater levels of performance, reliability, and/or larger data volume sizes.

The phrase "RAID" is an umbrella term for computer data storage schemes that can divide
and replicate data among multiple hard disk drives. RAID's various designs all involve two
key design goals: increased data reliability and increased input/output performance. When
several physical disks are set up to use RAID technology, they are said to be in a RAID
array. This array distributes data across several disks, but the array is seen by the
computer user and operating system as one single disk.

12 | P a g e
RAID systems with redundancy continue working without interruption when one, or
sometimes more, disks of the array fail, although they are vulnerable to further failures.
When the bad disk is replaced by a new one the array is rebuilt while the system continues

13 | P a g e
to operate normally. Some systems have to be shut down when removing or adding a drive;
others support hot swapping, allowing drives to be replaced without powering down.

RAID with hot-swap drives is often used in high availability systems, where it is important
that the system keeps running as much of the time as possible.

RAID is not a good alternative to backing up data. Data may become damaged or destroyed
without harm to the drive(s) on which it is stored. For example, part of the data may be
overwritten by a system malfunction; a file may be damaged or deleted by user error or
malice and not noticed for days or weeks; and of course the entire array is at risk of
catastrophes such as theft, flood, and fire.

LEVEL Description Minimum number of disks Image


Striped set without
parity/[NonRedundant
Array]. Provides improved
performance and
additional storage but no
fault tolerance. Any disk
failure destroys the array,
which becomes more
likely with more disks in
the array. A single disk
failure destroys the entire
array because when data
is written to a RAID 0
drive, the data is broken
into fragments. The
number of fragments is
dictated by the number of
RAID 0 2
disks in the array. The
fragments are written to
their respective disks
simultaneously on the
same sector. This allows
smaller sections of the
entire chunk of data to be
read off the drive in
parallel, giving this type of
arrangement huge
bandwidth. RAID 0 does
not implement error
checking so any error is
unrecoverable. More disks
in the array means higher
bandwidth, but greater risk
of data loss.

14 | P a g e
Redundancy through Hamming
code. Disks are synchronised and
striped in very small stripes, often in
RAID 2 single bytes/words. Hamming codes 3
error correction is calculated across
corresponding bits on disks, and is
stored on multiple parity disks.

Striped set with dedicated parity/Bit


interleaved parity. This mechanism

provides an improved performance and


fault tolerance similar to RAID 5, but
with a dedicated parity disk rather than
RAID 3 rotated parity stripes. The single parity 3
disk is a bottle-neck for writing since
every write requires updating the parity
data. One minor benefit is the dedicated
parity disk allows the parity drive to
fail and operation will continue without
parity or performance penalty.

Block level parity. Identical to RAID


3, but does block-level striping instead

of byte-level striping. In this setup, files


can be distributed between multiple
disks. Each disk operates independently
RAID 4 which allows I/O requests to be 3
performed in parallel, though data
transfer speeds can suffer due to the
type of parity. The error detection is
achieved through dedicated parity and
is stored in a separate, single disk unit.

15 | P a g e
Striped set with distributed parity.
Distributed parity requires all drives but

one to be present to operate; drive


RAID 5 failure requires replacement, but the 3
array is not destroyed by a single drive
failure.

Striped set with dual distributed


Parity. Provides fault tolerance from
two drive failures; array continues to
operate with up to two failed drives.
This makes larger RAID groups more

practical, especially for high


availability systems. This becomes
increasingly important because large-
RAID 6 capacity drives lengthen the time
needed to recover from the failure of a 4
single drive. Single parity RAID levels
are vulnerable to data loss until the
failed drive is rebuilt: the larger the
drive, the longer the rebuild will take.
Dual parity gives time to rebuild the
array without the data being at risk if
one drive, but no more, fails before the
rebuild is complete.

16 | P a g e
Backup Strategies

A differential database backup


Records only the data that has changed since the last full database backup. This full
backup is called the differential base. Differential database backups are smaller and faster
than full database backups. This saves backup time at the cost of increased complexity.
For large databases, differential backups can occur at shorter intervals than database
backups. This reduces the work-loss exposure.
Differential database backups are especially useful if a subset of a database is modified
more frequently than the rest of the database. In these cases, differential database
backups enable you back up frequently without the overhead of full database backups.

Full backup
Is the starting point for all other backups and contains all the data in the folders and files
that are selected to be backed up. Because the full backup stores all files and folders,
frequent full backups result in faster and simpler restore operations. The amount of time it
takes to run full backups often prevents us from using this backup type. Full backups are
often restricted to a weekly or monthly schedule, although the increasing speed and
capacity of backup media is making overnight full backups a more realistic proposition. Full
backups, if you have the time to perform them, offer the best solution in data protection. In
effect, a single backup can provide the ability to completely restore all backed-up files.

Incremental backup
Incremental backup stores all files changed since the last FULL, DIFFERENTIAL OR
INCREMENTAL backup. The advantage of an incremental backup is that it takes the
least time to complete. During a restore operation, each incremental backup is
processed, which could result in a lengthy restore job. Incremental backup provides a
faster method of backing up data than repeatedly running full backups. During an
incremental backup only the files changed since the most recent backup are included.
That is where it gets its name: each backup is an increment since the most recent
backup.

Backup Strategies Compared


BACKUP TYPICAL ALL OR SOME DATA COM- MAJOR
SCHEME MEDIUM DATA? PRESSED? ADVANTAGE
Full backup Tape All Yes Simple
Differential Tape Some Yes Saves time
Incremental Tape Some Yes Very fast
Mirror Disk All No Simple, fast
Snapshots Disk Some No Very fast
Efficient media
Continuous Disk Some No
use

17 | P a g e
FRAME TYPES

What are frames?


A frame can be defined as the unit of data transferred across the network, defined at
the datalink (network access) layer of the protocol stack.

What are packets?


A packet can be defined as the unit of data at any layer of the protocol stack, prior to, or
after transmission.

IEEE 802
IEEE 802 refers to a family of IEEE standards(Institute of Electrical and Electronics
Engineers) dealing with local area networks and metropolitan area networks. More
specifically, the IEEE 802 standards are restricted to networks carrying variable-size
packets.

IEEE 802.1 Bridging (networking) and Network Management


IEEE 802.2 Logical link control (inactive)
IEEE 802.3 Ethernet
IEEE 802.4 Token bus (disbanded)
IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)
IEEE 802.6 Metropolitan Area Networks (disbanded)

1. IEEE
802.7 Broadband LAN using Coaxial Cable (disbanded)
2. IEEE 802.8 Fiber Optic TAG (disbanded)
3. IEEE 802.9 Integrated Services LAN (disbanded)
4. IEEE 802.10 Interoperable LAN Security (disbanded)
5. IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification)
6. IEEE 802.12 demand priority (disbanded)
 IEEE 802.13 Not Used
8. IEEE 802.14 Cable modems (disbanded)
9. IEEE 802.15 Wireless PAN
IEEE 802.15.1 (Bluetooth certification)
IEEE 802.15.4 (ZigBee certification)
IEEE 802.16 Broadband Wireless Access (WiMAX certification)
IEEE 802.16e (Mobile) Broadband Wireless Access
IEEE 802.17 Resilient packet ring
IEEE 802.18 Radio Regulatory TAG
IEEE 802.19 Coexistence TAG
IEEE 802.20 Mobile Broadband Wireless Access
IEEE 802.21 Media Independent Handoff
IEEE 802.22 Wireless Regional Area Network


18 | P a g e
Recommended Additional Reading
 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.


Recommended Digital Engagement and Activities

network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html

Introduction to computer networks:


https://www.studytonight.com/cpp/introduction-to-cpp.php

There are many websites that teaches and seek to improve network skills by
providing lecture videos as well as course material online such as:

starting from basic(video)


https://www.youtube.com/watch?v=uRJeYKVMfxA

https://www.youtube.com/watch?v=55zroizjnvo

19 | P a g e
Revision Exercise

Task 1:

This set of multiple choice SAN storage questions and answers focuses on RAID technology
and various levels of RAID.

1. Which of the following is correct about hardware RAID controllers?


a) Volume management is performed by the server
b) Volume management is performed by controller card
c) Dedicated cache memory decreases server write performance
d) Parity calculation by the server and cache memory in the RAID controller increases read
and write performance

2. Which RAID type doesn’t use parity for data protection?


a) RAID 1
b) RAID 4
c) RAID 6
d) RAID 5

3. Which one of these is characteristic of RAID 5?


a) Distributed parity
b) No Parity
c) All parity in a single disk
d) Double Parity

4. What is the unique characteristic of RAID 6 (Choose one)?


a) Distributed Parity
b) Striping
c) Two independent distributed parity
d) Mirroring

5. Which of the following combinations can support RAID 05?


a) 2 sets with 3 disks each
b) 3 sets with 2 disks each
c) 2 sets with 4 disks each

20 | P a g e
d) 4 sets with 1 disk each

6. What is the minimum number of disks required for RAID1?


a) 1
b) 2
c) 4
d) 5

7. Which of the following raid levels provides maximum usable disk space?
a) RAID 1
b) RAID 0
c) RAID 5
d) RAID 6

8. Can you help decide on the RAID level to use – we are a media house and we use lot of
graphics/video applications – we need large throughputs for videos to get played without any
jitter and since we are in publishing business we can’t afford downtimes.
Even if there is any downtime we would like our data to be quickly reconstructed and enable
us to continue without work in less time
a) Raid 5
b) Raid 10
c) Raid 6
d) Raid 01

9. The mean time to failure of a single disk is 200000 hrs. If an array of disks is using 5 such
disks, the mttf of the array is
a) 200000 hrs
b) 40000 hrs
c) 1000000 hrs
d) Can not be determined

10. An array of disks is more likely to fail compared to a single disk. How is it that RAID
arrays still manage to provide more data protection compared to a single disk?
a) Using either mirroring or striping
b) Using either mirroring or parity
c) Using better quality disks
d) Using dedicated hardware

11. Network in which every computer is capable of playing role of client, server or both at
same time is called

21 | P a g e
A. peer-to-peer network
B. local area network
C. dedicated server network
D. wide area network

Answer

12. In peer-to-peer network, each computer in a network is referred as

A. server
B. client
C. peer
D. sender

TASK2

1. Central Computer which is powerful than other computers in the network is called as __________.

a. Client

b. Server

c. Hub

d. Switch

2. Machine that places the request to access the data is generally called as __________.

a. Server Machine

b. Client Machine

c. Request Machine

d. None of the above

3. The applications of the Client and Server Model are

a. World Wide Web

b. Network Printing

22 | P a g e
c. Email

d. All of the above

4. The client–server model is an approach to computer network programming developed at __________.

a. AT&T Bell Lab

b. Xerox PARC

c. Intel Lab

d. None of the above

5. File transfer protocol (FTP) is built on _________architecture

a. Peer to peer

b. Client server

c. Both a and b

d. None of the above

6. The time taken by a packet to travel from client to server and then back to the client is called ____

a. STT

b. RTT

c. PTT

d. Total time

7. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.

a. 2

23 | P a g e
b. 1

c. 4

d. 3

8. The first line of HTTP request message is called ____.

a. Request line

b. Header line

c. Status line

d. Entery line

9. FTP is built on _____ architecture.

a. Client-server

b. P2P

c. Both of the above

d. None of the above

10. An RPC (remote procedure call) is initiated by the

a. server

b. client

c. both (a) and (b)

d. none of the mentioned

TASK 3:

24 | P a g e
1. ________ is a virtual-circuit wide-area network that was designed in response to demands for a new type o
early 1990s.

a. X.25

b. Frame Relay

c. ATM

d. none of the above

2. Frame Relay provides ________.

a. PVCs

b. SVCs

c. either (a) or (b)

d. neither (a) nor (b)

3. VCIs in Frame Relay are called ______.

a. PVC

b. SVC

c. DLCIs

d. none of the above

4. In Frame Relay, when a _____ is selected, the corresponding table entry is recorded for all switches by the

a. PVC

b. SVC

c. either (a) or (b)

d. neither (a) nor (b)

25 | P a g e
5. In Frame Relay, when ______ is selected, it requires establishing and terminating phases

a. a PVC

b. an SVC

c. either (a) or (b)

d. neither (a) nor (b)

6. Frame Relay has _______.

a. only the physical layer

b. only the data link

c. the physical and data link layers

d. the physical, data link, and network layers

7. At the data link layer, Frame Relay uses a protocol that supports _____control.

a. flow

b. error

c. either (a) or (b)

d. neither (a) nor (b)

8. In Frame Relay, an address can be ________ bytes.

a. only 2

b. 2 to 3

c. 2 to 4

d. 4 to 8

26 | P a g e
9. In Frame Relay, the EA field defines the number of bytes; it is _____ in the last byte of the address.

a. 0

b. 1

c. 2

d. 3

10. To handle frames arriving from other protocols, Frame Relay uses a device called a _________.

a. VOFR

b. FRAD

c. MUX

d. none of the above

27 | P a g e
Overall impression (each out of 10):
 Professionalism: .................................................................................................
 Easy to read: ................................................................
 Efficient algorithm: ............................................................................
 Correctness: .............................................................................................
 Reusability: ...............................................................................
 Instructions followed: .....................................................................................
 Suitable meaningful variable names: ......................................................................

28 | P a g e
System Software201

SECTION TWO: PROTOCOLS

CONTENTS

SECTION TWO: COMMUNICATION MEDIA


LEARNING OUTCOMES

READING

INTRODUCTION

TCP/IP PROTOCOL SUIT

DHCP

NETBIOS

EXERCISES

Berea College of Technology


29 | P a g e
System Software201

2.1 LEARNING OUTCOMES


Have an understanding of various networking protocols mainly the TCP/IP protocol.


Have an understanding of the various networking topologies and devices used to
create them

Have knowledge of the various network sizes, namely: LAN, WAN, MAN etc.


Have knowledge of the TCP/IP protocol suite


Have knowledge of the Dynamic Host Configuration Protocol (DHCP)


Have knowledge of the NetBios and Wins services 


30 | P a g e
Introduction
The Internet Protocol (IP) is the method or protocol by
which data is sent from one computer to another on the Internet.
Each computer (known as a host) on the Internet has at least
one IP address that uniquely identifies it from all other computers
on the Internet.

When you send or receive data (for example, an e-mail note or a


Web page), the message gets divided into little chunks called packets. Each of these
packets contains both the sender's Internet address and the receiver's address.
Any packet is sent first to a gateway computer that understands a small part of the Internet.
The gateway computer reads the destination address and forwards the packet to an
adjacent gateway that in turn reads the destination address and so forth across the Internet
until one gateway recognizes the packet as belonging to a computer within its immediate
neighborhood or domain. That gateway then forwards the packet directly to the computer
whose address is specified.

Because a message is divided into a number of packets, each packet can, if necessary, be
sent by a different route across the Internet. Packets can arrive in a different order than the
order they were sent in. The Internet Protocol just delivers them. It's up to another protocol,
the Transmission Control Protocol (TCP) to put them back in the right order.

IP is a connectionless protocol, which means that there is no continuing connection


between the end points that are communicating. Each packet that travels through the
Internet is treated as an independent unit of data without any relation to any other unit of
data. (The reason the packets do get put in the right order is because of TCP, the
connection-oriented protocol that keeps track of the packet sequence in a message.) In the
Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking
Layer.

The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP
Version 6 (IPv6) is also beginning to be supported. IPv6 provides for much longer

31 | P a g e
addresses and therefore for the possibility of many more Internet users. IPv6 includes the
capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4
packets.

 TCP/IP PROTOCOL

The Internet Protocol Suite (commonly TCP/IP) is the set of communications protocols
used for the Internet and other similar networks. It is named from two of the most important
protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP),
which were the first two networking protocols defined in this standard. Today's IP
networking represents a synthesis of several developments that began to evolve in the
1960s and 1970s, namely the Internet and LANs (Local Area Networks), which, together
with the invention of the World Wide Web by Tim Berners-Lee in 1989, have revolutionized
computing.

The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers.
Each layer solves a set of problems involving the transmission of data, and provides a well-
defined service to the upper layer protocols based on using services from some lower
layers. Upper layers are logically closer to the user and deal with more abstract data,
relying on lower layer protocols to translate data into forms that can eventually be
physically transmitted.

The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these are
the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.

32 | P a g e
Common terms and concepts in TCP/IP are defined as follows:

 Node Any device, including routers and hosts, which runs an implementation of IP.

 Router A node that can forward IP packets not explicitly addressed to itself. On an
IPv6 network, a router also typically advertises its presence and host configuration
information.

 Host A node that cannot forward IP packets not explicitly addressed to itself (a non-
router). A host is typically the source and the destination of IP traffic. A host silently
discards traffic that it receives but that is not explicitly addressed to itself.

 Upper-layer protocol A protocol above IP that uses IP as its transport. Examples
include Internet layer protocols such as the Internet Control Message Protocol (ICMP)
and Transport layer protocols such as the Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP). (However, Application layer protocols that use TCP
and UDP as their transports are not considered upper-layer protocols.

 LAN segment A portion of a subnet consisting of a single medium that is bounded by
bridges or Layer 2 switches.

 Subnet One or more LAN segments that are bounded by routers and use the same
IP address prefix. Other terms for subnet are network segment and link.

 Network Two or more subnets connected by routers. Another term for network is
internetwork.

 Neighbor A node connected to the same subnet as another node.

 Interface The representation of a physical or logical attachment of a node to a
subnet. An example of a physical interface is a network adapter. An example of a
logical interface is a tunnel interface that is used to send IPv6 packets across an IPv4
network.

 Address An identifier that can be used as the source or destination of IP packets and
that is assigned at the Internet layer to an interface or set of interfaces. 

Layers in the Internet Protocol Suite


33 | P a g e
The concept of layers

The TCP/IP suite uses encapsulation to provide abstraction of protocols and services.
Such encapsulation usually is aligned with the division of the protocol suite into layers of
general functionality. Generally an application (the highest level of the model) uses a set of
protocols to send its data down the layers, being further encapsulated at each level.

The major functional groups of protocols and methods are the Application Layer, the
Transport Layer, the Internet Layer, and the Link Layer (RFC 1122). It should be noted
that this model was not intended to be a rigid reference model into which new protocols
have to fit in order to be accepted as a standard.

The Application Layer is the seventh level of the seven-layer OSI model, and the top
layer of the TCP/IP model. It interfaces directly to and performs common application
services for the application processes; it also issues requests to the Presentation Layer
(OSI).

34 | P a g e
In computer networking, the Transport Layer is a group of methods and protocols within a
layered architecture of network components, within which it is responsible for encapsulating
application data blocks into datagrams (packets) suitable for transfer to the network
infrastructure for transmission to the destination host, or managing the reverse transaction
by abstracting network datagrams and delivering them to an application. Such protocol are
also referred to as "transport protocols". Transport layers are contained in both, the TCP/IP
model (RFC 1122),which is the foundation of the Internet, and the Open Systems
Interconnection (OSI) model of general networking. The definitions of the Transport Layer
are slightly different in these two models

The Internet Layer is a group of internetworking methods in the TCP/IP protocol suite
which is the foundation of the Internet (RFC 1122). It is the group of methods, protocols,
and specifications which are used to transport datagrams (packets) from the originating
host across network boundaries, if necessary, to the destination host specified by a
network address (IP address) which is defined for this purpose by the Internet Protocol (IP).
The Internet Layer derives its name from its function of forming an "internet"
(uncapitalized), or facilitating "internetworking", which is the concept of connecting multiple
networks with each other through gateways. Internet Layer protocols use IP-based packets.

Link Layer is a term used in the general classification (layering) of internetworking


methods used in the TCP/IP suite of protocols used for the Internet (RFC 1122). It is the
group of methods, protocols, and specifications that is closest to the physical network
components used to connect hosts or nodes in the network, which it implicitly includes. In
general it is the suite of methods that operate only on the link between adjacent network
nodes of a Local area network segment or a wide area network. This layer is therefore
often referred to as a lower level layer

35 | P a g e
The following table provides some examples of the protocols grouped in their
respective layers.

Application DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC, NNTP, POP3,
SIP, SMTP, SNMP, SSH, TELNET, ECHO, RTP, PNRP, rlogin, ENRP

Transport TCP, UDP, DCCP, SCTP, IL, RUDP, RSVP

Internet IP (IPv4, IPv6) ICMP, IGMP, and ICMPv6

Link ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP

IP address

An Internet Protocol (IP) address is a numerical identification (logical address) that is


assigned to devices participating in a computer network utilizing the Internet Protocol for
communication between its nodes.

IP is an address of a computer or other network device on a network using IP or TCP/IP


. For example, the number "166.70.10.23" is an example of such an address. These
addresses are similar to addresses used on houses and help data reach its appropriate
destination on a network.

There are five classes of available IP ranges: Class A, Class B, Class C, Class D and
Class E, while only A, B and C are commonly used. Each class allows for a range of
valid IP addresses. Below is a listing of these addresses.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved.

TCP/IP PORTS

A number assigned to user sessions and server applications in an IP network. The port
number resides in the TCP or UDP header of the packet

36 | P a g e
Some commonly used Ports are:
42 nameserv, WINS 110 POP3
1 tcpmux 43 whois, nickname 111 Sun RPC
3 49 TACACS, Login Portmapper
4 Host Protocol 113 identd/auth
50 RMCP, re-mail-ck 115 sftp
5 rje
53 DNS 116
7 echo
57 MTP 117 uucp
9 discard
59 NFILE 118
11 systat
63 whois++ 119 NNTP
13 daytime
66 sql*net 120 CFDP
15 netstat
67 bootps 123 NTP
17 qotd
68 bootpd/dhcp 124 SecureID
18 send/rwp
69 Trivial File 129 PWDGEN
19 chargen
Transfer Protocol
133 statsrv
20 ftp-data (tftp)
135 loc-srv/epmap
21 ftp 70 Gopher
22 ssh, pcAnywhere 137 netbios-ns
79 finger
23 Telnet 138 netbios-
80 www-http
dgm (UDP)
25 SMTP 87
139 NetBIOS
27 ETRN 88 Kerberos, WWW
143 IMAP
29 msg-icp 95 supdup
144 NewS
31 msg-auth 96 DIXIE
150
33 dsp 98 linuxconf
152 BFTP
37 time 101 HOSTNAME
153 SGMP
38 RAP 102 ISO, X.400, ITOT 156
39 rlp 105 cso
161 SNMP
40 106 poppassd
41 109 POP2

37 | P a g e
TCP/IP utilities

To assist with the management of TCP/IP, there are three types of TCP/IP-based utilities:
 Connectivity utilities that you can use to interact with and use resources on a variety
of Microsoft® and non-Microsoft hosts, such as UNIX systems.
  Diagnostic utilities that you can use to detect and resolve networking problems.
 TCP/IP server software that provides printing and publishing services to
TCP/IP-based Microsoft Windows® clients.

The following tables describe the TCP/IP-based utilities.

Connectivity utilities

Utility Description

Ftp Transfers files of any size between computers running Windows Server 2003
operating systems and any computer running File Transfer protocol (FTP)
server software. For more information, see Ftp.

Lpr Sends print jobs to remote UNIX printers managed by Line Printer Daemon
(LPD) print server software. For more information, see Lpr.

Rcp Copies files between computers running Windows Server 2003 operating
systems and computers running Remote Copy protocol (RCP) server software.
For more information, see Rcp.

Rexec Executes processes on remote computers. For more information, see Rexec.

Rsh Runs commands on a computer running Remote Shell (RSH) server software.
For more information, see Rsh.

Telnet Uses terminal-based login to remotely access network devices that are running
Telnet server software. For more information, see Telnet.

Tftp Transfers small files between computers running Windows Server 2003
operating systems and computers running Trivial File Transfer protocol (TFTP)
server software. For more information, see Tftp.

38 | P a g e
Diagnostic utilities

Utility Description

Arp Displays and modifies the Address Resolution protocol (ARP) cache. This
cache is a local table used to resolve IP addresses to media access control
addresses used on the local network. For more information, see Arp and
Address Resolution Protocol (ARP).

Hostname Returns the host name of the local computer. For more information, see
Hostname.

Ipconfig Displays the current TCP/IP configuration. Also used to manually release
and renew TCP/IP configurations assigned by a DHCP server. For more
information, see Ipconfig and Command-line utilities.

Lpq Obtains print queue status information from computers running Line Printer
Daemon (LPD) print server software. For more information, see Lpq.

Nbtstat Displays the local NetBIOS name table, a table of NetBIOS names
registered by local programs, and the NetBIOS name cache, a local cache
listing of NetBIOS computer names that have been resolved to IP
addresses. For more information, see Nbtstat and Release and refresh
NetBIOS names by using the nbtstat command.

Netsh Displays and administers TCP/IP protocol settings on the local computer or
a remote computer. For more information, see Netsh commands for
Interface IP.

Netstat Displays TCP/IP protocol session information. For more information, see
Netstat.

Nslookup Checks records, domain host aliases, domain host services, and operating
system information by querying DNS servers. For more information, see
Nslookup and Verify DNS registration for domain controllers using the
nslookup command.

39 | P a g e
Ping Verifies configurations and tests IP connectivity. For more information, see
Ping and Test a TCP/IP configuration by using the ping command.

Route Displays or modifies the local routing table. For more information, see
Route.

Tracert Traces the route a packet takes to a destination. For more information, see
Tracert and Trace a path by using the tracert command.

Pathping Traces the route a packet takes to a destination and displays information
on packet losses for each router in the path. Pathping can also be used to
troubleshoot Quality of Service (QoS) connectivity. For more information,
see Using the pathping command.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked devices


(clients) to obtain the parameters necessary for operation in an Internet Protocol network.
This protocol reduces system administration workload, allowing devices to be added to the
network with little or no manual configuration.

Basic protocol operation

The Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP


addresses, subnet masks, default gateway, and other IP parameters.

40 | P a g e
When a DHCP-configured client (be it a computer or any other network-aware device)
connects to a network, the DHCP client sends a broadcast query requesting necessary
information from a DHCP server. The DHCP server manages a pool of IP addresses and
information about client configuration parameters such as the default gateway, the domain
name, the DNS servers, other servers such as time servers, and so forth. Upon receipt of a
valid request the server will assign the computer an IP address, a lease (the length of time
for which the allocation is valid), and other IP configuration parameters, such as the subnet
mask and the default gateway. The query is typically initiated immediately after booting and
must be completed before the client can initiate IP-based communication with other hosts.

DHCP provides three modes for allocating IP addresses.

The best-known mode is dynamic, in which the client is provided a "lease" on an IP


address for a period of time. Depending on the stability of the network, this could range
from hours (a wireless network at an airport) to months (for desktops in a wired lab). At any
time before the lease expires, the DHCP client can request renewal of the lease on the
current IP address. A properly-functioning client will use the renewal mechanism to
maintain the same IP address throughout its connection to a single network, otherwise it
may risk losing its lease while still connected, thus disrupting network connectivity while it
renegotiates with the server for its original or a new IP address.

The two other modes for allocation of IP addresses are automatic (also known as DHCP
Reservation), in which the address is permanently assigned to a client, and manual, in
which the address is selected by the client (manually by the user or any other means) and
the DHCP protocol messages are used to inform the server that the address has been
allocated.

The automatic and manual methods are generally used when finer-grained control over IP
address is required (typical of tight firewall setups), although typically a firewall will allow
access to the range of IP addresses that can be dynamically allocated by the DHCP server.

The process of address allocation is known as ROSA. Request, Offer, Send, Accept

41 | P a g e
IP address allocation

Depending on implementation, the DHCP server may have three methods of allocating IP-
addresses, plus a fourth mode of operation ("manual") in which the client (rather than the
DHCP server) assigns an IP address. (WARNING--the terminology below differs from the
terminology above in Basic protocol operation):

dynamic allocation: A network administrator assigns a range of IP addresses to


DHCP, and each client computer on the LAN has its IP software configured to
request an IP address from the DHCP server during network initialization. The
request-and-grant process uses a lease concept with a controllable time period,
allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not
renewed (dynamic re-use of IP addresses).

 automatic allocation: The DHCP server permanently assigns a free IP address to a


requesting client from the range defined by the administrator. This is like dynamic
allocation, but the DHCP server keeps a table of past IP address assignments, so
that it can preferentially assign to a client the same IP address that the client
previously had.

static allocation: The DHCP server allocates an IP address based on a table with
MAC address/IP address pairs, which are manually filled in (perhaps by a network
administrator). Only requesting clients with a MAC address listed in this table will be
allocated an IP address. This feature (which is not supported by all routers) is
variously called "Static DHCP Assignment" (by DD-WRT), "fixed-address" (by the
dhcpd documentation), "DHCP reservation" or "Static DHCP" (by Cisco/Linksys),
and "IP reservation" or "MAC/IP binding" (by various other router manufacturers).

 manual allocation: The DHCP server does not assign the IP address; instead, the
client is configured with a user-specified static IP address.

42 | P a g e
NetBIOS

NetBIOS is an acronym for Network Basic Input/Output System. The NetBIOS API
allows applications on separate computers to communicate over a local area network. In
modern networks, it normally runs over TCP/IP (NetBIOS over TCP/IP, or NBT), giving
each computer in the network both a NetBIOS name and an IP address corresponding to a
(possibly different) host name. Older operating systems ran NetBIOS over IPX/SPX or
IEEE 802.2 (NBF). NetBIOS provides services related to the session layer of the OSI
model.

NetBIOS name

The NetBIOS name is specified when Windows networking is installed/configured. In order


to connect to a computer running TCP/IP via its NetBIOS name, the name must be
resolved to a network address. Today this is usually an IP address (the NetBIOS name-IP
address resolution is often done by either broadcasts or a WINS Server — NetBIOS Name
Server). A computer's NetBIOS name is often the same as that computer's host name (see
below), although truncated to 15 characters, but it may also be completely different.
NetBIOS names can include almost any combination of alphanumeric characters except for
spaces and the following characters:
\/:*?";|
The Windows LMHOSTS file provides a NetBIOS name resolution method that can be
used for small networks that do not use a WINS server.

Host name

A Windows machine's NetBIOS name is not to be confused with the computer's host name.
Generally a computer running TCP/IP (whether it's a Windows machine or not) has a host
name (also sometimes called a machine name or a DNS name). Generally the host name
of a Windows computer is based on the NetBIOS name plus the Primary DNS Suffix, which
are both set in the System Control Panel.

Node types

The node type of a networked computer relates to the way it resolves NetBIOS names to
IP addresses. There are four node types.
 B-node: 0x01 Broadcast
 P-node: 0x02 Peer (WINS only)
 M-node: 0x04 Mixed (broadcast, then WINS)
 H-node: 0x08 Hybrid (WINS, then broadcast)
43 | P a g e
The node type in use is displayed by opening a command line and typing ipconfig /all. A
Windows computer registry may also be configured in such a way as to display "unknown"
for the node type.

44 | P a g e
NETBIOS PROVIDES THREE DISTINCT SERVICES:
 Name service for name registration and resolution
 Session service for connection-oriented communication
vi. Datagram distribution service for connectionless communication

Services
NetBIOS provides three distinct services:
 Name service for name registration and resolution.
 Session service for connection-oriented communication.
3. Datagram distribution service for connectionless communication.

Name service
In order to start Sessions or distribute Datagrams, an application must register its
NetBIOS name using the Name service.

The name service primitives offered by NetBIOS are:


 Add Name — registers a NetBIOS name.
 Add Group Name — registers a NetBIOS "group" name.
 Delete Name — un-registers a NetBIOS name or group name.
 Find Name — looks up a NetBIOS name on the network.

45 | P a g e
Recommended Additional Reading
 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.


Recommended Digital Engagement and Activities

network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html

Introduction to computer networks:


https://www.studytonight.com/cpp/introduction-to-cpp.php

There are many websites that teaches and seek to improve network skills by
providing lecture videos as well as course material online such as:

starting from basic(video)


https://www.youtube.com/watch?v=uRJeYKVMfxA

https://www.youtube.com/watch?v=55zroizjnvo

46 | P a g e
Revision Exercise

TASK 1:
What is the use of Ping command?

a. To test a device on the network is reachable


b. To test a hard disk fault
c. To test a bug in a Application
d. To test a Pinter Quality

2. What is the maximum header size of an IP packet?

a. 32 bytes

b. 64 bytes

c. 30 bytes

d. 60 bytes

3. What do you mean by broadcasting in Networking?

a. It means addressing a packet to all machine

b. It means addressing a packet to some machine

c. It means addressing a packet to a particular machine

d. It means addressing a packet to except a particular machine

4. Which of the following is reliable communication protocol?

a. TCP

b. IP

47 | P a g e
c. UDP

d. All of the above

5. DHCP Server provides _____ to the client.

a. Protocol

b. IP Address

c. MAC Address

d. Network Address

6. Controlling access to a network by analyzing the incoming and outgoing packets is called

a. IP Filtering

b. Data Filtering

c. Packet Filtering

d. Firewall Filtering

7. This is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities that ca
Ethernet networks.

a. NAT

b. RAID

c. iSCSI

d. NIC

8. This is the telecommunication protocol that all computers must use to be part of the Internet.

a. Internet Protocol

48 | P a g e
b. FTP

c. Border Gateway Protocol

d. DHCP

9. This is one of two protocols that let a network administrator supervise and distribute IP addresses from a ce
sends a new IP address when a computer is plugged into a different place in the network.

a. DHCP

b. TCPMAN

c. TCP

d. UDP

10. ______________ allow many devices to share limited address space on a network.

a. Multiple addressing

b. Port addressing

c. Dynamic addressing

d. None of the above

TASK 2:
MCQ: Connector that is used for connecting cable to networking devices is called

A. subscriber channel (SC)


B. straight-tip (ST)
C. MT-RJ
D. None of them

Answer

MCQ: Most common unshielded twisted pair connector is

A. RJ-45
B. RG-59
C. RG-58
D. RG-ll

49 | P a g e
Answer

MCQ: A signal that is result of a conversion of data from another form is known as

A. transmission medium
B. data
C. information
D. communication

Answer

MCQ: Wireless transmission is divided into

A. 3 broad groups
B. 6 broad groups
C. 9 broad groups
D. 8 broad groups

Answer

MCQ: Omni directional waves are propagated in

A. one direction
B. all directions
C. depends on situation
D. both a and c

Answer

MCQ: In multimode propagation, term step index refers to the

A. index of refraction
B. sudden change of signal
C. index of density
D. index of light rays

Answer

MCQ: Unshielded Twisted-Pair cables are used in

A. telephone lines
B. DSL lines
C. LAN
D. All of the above

Answer

MCQ: Infrared waves, that can be used for short range communication have frequencies
between

A. 300 GHz to 700 THz


B. 300 GHz to 800 THz
50 | P a g e
C. 300 GHz to 100 THz
D. 300 GHz to 400 THz

Answer

MCQ: How many modes are currently in used for propagating light along optical channels

A. one mode
B. two modes
C. three modes
D. five modes

Answer

MCQ: Term that is used to measure of thickness of wire is

A. decibels
B. hertz
C. gauge
D. diameter

Answer
MCQ: Microwaves are used for

A. short-range communication
B. multicast communications
C. unicast communication
D. long range communication

Answer

MCQ: Fast Ethernet uses

A. Free space
B. Twisted pair cable
C. fiber optic cable
D. Coaxial cable

Answer

MCQ: In electromagnetic spectrum for wireless communication, reserved range for Radio
waves and microwaves is known as

A. ground propagation
B. sky propagation
C. line-of-sight propagation
D. None

Answer

MCQ: 7/125 is fiber type used in propagation mode:


51 | P a g e
A. single mode
B. multimode
C. multimode, step index
D. multimode, graded index

Answer

MCQ: Long-distance communication using electric signals was started with invention of
telegraph by Morse in

A. 19th century
B. 18th century
C. 20th century
D. middle of 18 and 19 century

Answer

MCQ: Super High frequency (SHF) is used in

A. FM radio
B. satellite communication
C. AM radio
D. cellular phones

Answer

MCQ: Range of middle frequency is

A. 3-30 kHz
B. 900KHz-300 kHz
C. 3khz-30 MHz
D. 300 kHz-3 MHz

MCQ: Field of MAC frame that alerts receiver and enables it to synchronize is known as

A. SFD
B. preamble
C. source address
D. destination address

Answer

MCQ: Maximum length of 1000BaseSX is

A. 550 m
B. 25 m
C. 100 m
D. 5000 m

52 | P a g e
Answer

MCQ: 1000Base-LX has used two wires for long wave are

A. STP Cable
B. UTP Cable
C. Fiber Optic
D. Coaxial Cable

Answer

MCQ: Protocol Data Unit (PDU) is similar to

A. LLC
B. HDLC
C. MAC
D. DSAP

Answer

MCQ: Terms that control flow and errors in full duplex switched Ethernet is called

A. LLC Sub layer


B. MAC Sub layer
C. LLC Control Layer
D. MAC Control Layer

Answer

MCQ: In 10Base2, cable is

A. Thick
B. Thin
C. Twisted Pair
D. None of the above

Answer

MCQ: Preamble contains

A. 6 Bytes
B. 4 Bytes
C. 2 Bytes
D. 7 Bytes

Answer

MCQ: Maximum length of optical fiber in 10BaseF is

A. 100 meter
B. 185 meters
C. 500 meter
53 | P a g e
D. 2000 meter

Answer

MCQ: A destination address can be

A. Unicast
B. multicast
C. broadcast
D. all of the above

Answer

MCQ: In Ethernet frame, both destination and sender addresses are of length

A. 1 Byte
B. 2 Bytes
C. 4 Bytes
D. 6 Bytes

Answer

MCQ: In 100BaseT4 total number of wires are

A. 2
B. 4
C. 6
D. 8

Answer

MCQ: Original Ethernet was created in

A. 1980
B. 1976
C. 1960
D. 1967

Answer

MCQ: Ethernet frame contains

A. 3 Fields
B. 5 Fields
C. 7 Fields
D. 9 Fields

Answer

MCQ: Computer Society of IEEE started a project named project 802 in

A. 1970
54 | P a g e
B. 1975
C. 1980
D. 1985

Answer

MCQ: NIC stand for

A. Network Interface Card


B. National Internet code
C. Network Isolated card
D. Network international code

Answer

MCQ: A source address is always a

A. Unicast
B. Multicast
C. Broadcast
D. None of the above

Answer

MCQ: In gigabit Ethernet three or more stations are connected by

A. Ring Topology
B. Bus Topology
C. Star Topology
D. Mesh Topology

Answer

MCQ: Term that is used to set standards to enable intercommunication among equipment
from a variety of manufacturers is called

A. Project 802
B. Project 8802
C. Project 2088
D. Project 208

Answer

MCQ: In 10Base5, maximum length of coaxial cable is

A. 10 meter
B. 250 meter
C. 500 meter
D. 5000 meter

Answer

55 | P a g e
MCQ: IEEE Standard was adopted by the

A. ISO
B. ANSI
C. OSI
D. None of the above

Overall impression (each out of 10):


 Professionalism: .................................................................................................
 Easy to read: ................................................................
 Efficient algorithm: ............................................................................
 Correctness: .............................................................................................
 Reusability: ...............................................................................
 Instructions followed: .....................................................................................
 Suitable meaningful variable names: ......................................................................

Answer

Answer

56 | P a g e
SECTION THREE: WINS AND HOSTS
CONTENTS

SECTION THREE: NETWORK ARCHITECTURE

LEARNING OUTCOMES ....................................................................................... 42

READING............................................................................................................... 43

INTRODUCTION ................................................................................................... 44

WINS AND HOST NAMES .................................................................................... 47

HOST FILES AND DNS ......................................................................................... 50

....................... 51

EXERCISES...................................................................................................................................... 25

57 | P a g e
System Software201

3.1 LEARNING OUTCOMES


Have knowledge of the NetBios and Wins services 


Have an understanding of Host names and Host files


Have knowledge of the Domain Name Servers(DNS)

 Have knowledge of Remote connectivity

58 | P a g e
System Software201

INTRODUCTION

WINDOWS INTERNET NAME SERVICE


Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name
Service (NBNS), a name server and service for NetBIOS computer names. Effectively
WINS is to NetBIOS names, what DNS is to domain names — a central mapping of host
names to network addresses. Like DNS it is broken into two parts, a Server Service (that
manages the encoded Jet Database, server to server replication, service requests (query &
registraton, renewals, de-registration), and conflicts) and a TCP/IP Client component which
manages the client's registration, renewal of names and takes care of queries.

Overview of WINS

Unlike DNS the mappings are dynamically updated (e.g. at workstation boot), so that when
a client needs to contact another computer on the network it can get its up-to-date IP
address which may be issued by a DHCP server, aside from this the WINS functionality
provides a way of keeping the client names unique on the network.

Networks normally have more than one WINS server and each WINS server should be in
push/pull replication; where more than two WINS servers are required the best practice
replication model is the hub and spoke, thus the WINS design is not central but distributed.
Each WINS server holds a full copy of every other related WINS system's records. There is
no hierarchy in WINS (unlike DNS), but like DNS its database can be queried for the
address to contact rather than broadcasting a request for which address to contact. The
system therefore reduces broadcast traffic on the network, however replication traffic can
add to WAN/LAN traffic, although this can be set to replicate in non-busy periods. By
design any WINS client can register any name with any WINS server. This makes the
system prone to abuse or unreliable through poor administration.

All WINS clients should be configured to use a primary WINS server and a different
secondary WINS server. The secondary would normally be the hub server, The setting of
which WINS servers to use is either in the DHCP scope options or a per client hard coded
value.

As of Windows 2000, DNS provides the favored alternative to WINS, as part of Active
Directory.
In theory, if DNS is available, WINS is only necessary if pre-Windows 2000 clients or
servers need to resolve names. In reality, especially in large enterprise environments,
applications such as SMS 2003 with its use of the 1A record, SQL Server 2000 for use of
named pipes, and Exchange Server 2000 and 2003 often require WINS for full functionality.

The WINS server from Microsoft is only available as a service to run on the Windows
Server family of operating systems. The WINS client from Microsoft is common across all
its operating systems including DOS. Note that WINS clients can be devices such as IP
phones, and printers.
59 | P a g e
HOST NAME

What is a host name?


A host name is assigned to a computer to identify a host in a TCP/IP network. The host
name can be described as being the alias that is assigned to a node, to identify it.

A few characteristics of host names are listed below:


 Host names are assigned to computers by administrators.

 The host name specified for a computer does not need to correspond to the
Windows 2000 or Windows Server 2003 computer name or NetBIOS computer
name.

 More than one host name can be assigned to the same host.

 
 The maximum length of a host name is 255 characters.
 
 The host name can consist of both alphabetic characters and numeric characters.

 A host name can be defined in a number of ways. The more common methods used

are:
o A nickname: This is an alias to an IP address which individuals can assign and
 utilize.
o A domain name: This is a set structured name that adheres to Internet
standards.

WinSock applications utilize the IP address of the host name for a connection to be
established. Name resolution is not needed if the IP addresses are used to establish
connections. However, because host names are simpler to remember than IP an address,
the host name is typically used instead of the IP addresses. This is especially evident with
TCP/IP applications.

When the host name is used, and not the IP address, the host name has to be resolved to
an IP address for IP communication to occur. This is known as host name resolution. A
host name must match to an IP address that is located in a DNS server database, or in a
Hosts file.

Host Name Resolution in Windows


Each network needs a mechanism that can resolve host names to IP addresses. Name
resolution has to occur whenever the host name is used to connect to a computer and not
the IP addresses. For instance, when a server name is used to access a resource, the
computer resolves that name to an IP address. Host name resolution resolves the host
name to an IP address. This has to occur so that the IP address can be resolved to the
hardware address for TCP/IP based communication to occur.

60 | P a g e
Name resolution mechanisms:
 LMHOSTS files

 Network broadcasts
 NetBIOS name cache
 Windows Internet Naming Service (WINS)
 Active Directory service

The common methods used to resolve host names are listed below:

 NetBIOS name resolution: This is the process of mapping the NetBIOS name of the
computer to an IP address. With NetBIOS, communication occurs between NetBIOS
hosts via name discovery, name registration, and name release.

 HOSTS file: This is a text file that includes the host names to IP addresses
mappings. The HOSTS file is stored locally.

 DNS server: DNS resolves host names and fully qualified domain names (FQDNs)
to IP addresses in TCP/IP networks. The DNS server manages a database of host
name to IP address mappings. This is the primary method used for name resolution
in Windows Server 2003.

61 | P a g e
Recommended Additional Reading
 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.


Recommended Digital Engagement and Activities

network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html

Introduction to computer networks:


https://www.studytonight.com/cpp/introduction-to-cpp.php

There are many websites that teaches and seek to improve network skills by
providing lecture videos as well as course material online such as:

starting from basic(video)


https://www.youtube.com/watch?v=uRJeYKVMfxA

https://www.youtube.com/watch?v=55zroizjnvo

62 | P a g e
Revision Exercise
TASK 1:
Which of the following devices translates hostnames into IP addresses?

a.

b.

c.

d.

2. The ____ translates internet domain and host names to IP address.

a. domain name system

b. routing information protocol

c. network time protocol

d. internet relay chat

3. What does a DNS client called?

a. DNS handler

b. DNS resolver

c. DNS updater

d. None of the above

4. The entire hostname has a maximum of

a. 255 characters

63 | P a g e
b. 127 characters

c. 63 characters

d. 31 characters

5. Servers handle requests for other domains

a. directly

b. by contacting remote DNS server

c. it is not possible

d. none of the mentioned

6. DNS database contains

a. name server records

b. hostname-to-address records

c. hostname aliases

d. all of the mentioned

7. If a server has no clue about where to find the address for a hostname then

a. server asks to the root server

b. server asks to its adjcent server

c. request is not processed

d. none of the mentioned

8. Which one of the following allows client to update their DNS entry as their IP address change?

64 | P a g e
a. dynamic DNS

b. mail transfer agent

c. authoritative name server

d. none of the mentioned

9. Wildcard domain names start with label

a. @

b. *

c. &

d. #

10. The right to use a domain name is delegated by domain name registers which are accredited by

a. internet architecture board

b. internet society

c. internet research task force

d. internet corporation for assigned names and numbers

Task 2:

MCQ: In version field of IPv4 header, when machine is using some other version of IPv4
then datagram is

A. Discarded
B. Accepted
C. Interpreted
D. Interpreted incorrectly

Answer

MCQ: Network layer at source is responsible for creating a packet from data coming from
another

A. Station
B. Link
65 | P a g e
C. Node
D. Protocol

Answer

MCQ: Header of datagram in IPv4 has

A. 0 to 20 bytes
B. 20 to 40 bytes
C. 20 to 60 bytes
D. 20 to 80 bytes

Answer

MCQ: In IPv4 layer, datagram is of

A. Fixed length
B. Variable length
C. Global length
D. 0 length

Answer
MCQ: In IPv4, service type of service in header field, first 3 bits are called

A. Type of service
B. Code bits
C. Sync bits
D. Precedence bits

Answer

Size and format of physical addresses vary depending on the

A. Receiver
B. Message
C. Sender
D. Network

Answer

MCQ: ICMP Stands for

A. Internet Connect Message Protocol


B. Internet Control Message Protocol
C. International Connect Message Protocol
D. International Control Message Protocol

Answer

MCQ: Transmission Control Protocol/Internet Networking Protocol have

66 | P a g e
A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers

Answer

MCQ: Parameter that is normally achieved through a trailer added to end of frame is

A. Access Control
B. Flow Control
C. Error Control
D. Physical addressing.

Answer
MCQ: Packets of data that is transported by IP is called

A. datagrams
B. Frames
C. Segments
D. Encapsulate message

Answer

MCQ: Application layer provides basis for

A. Email services
B. Frame Division
C. File Making
D. None of the above

Answer

MCQ: Trailer is added only at

A. Physical Layer
B. Data Link Layer
C. transport Layer
D. Network LAYER

Answer

MCQ: 0'th layer of OSI model is

A. Physical layer
B. Application layer
C. Presentation layer
D. Hardware

67 | P a g e
Answer
MCQ: Segmentation and reassembly is responsibility of

A. 7th Layer
B. 6th Layer
C. 5th Layer
D. 4th layer

Answer

MCQ: Port address is also known as

A. Service point address


B. Receiver point address
C. Sender point address
D. Both B & C

MCQ: In encapsulation, data portion of a packet at level N - 1 carries whole packet from
level

A. N
B. N+1
C. N+2
D. N+3

Answer

MCQ: Physical layer is responsible for

A. Node to node communication


B. Peer to peer communication
C. Hop to hop communication
D. both a and c

Answer
MCQ: OSI model deals with physical, data link, network, transport, session and

A. Presentation layer
B. Application layer
C. both a and b
D. None of Above

Answer

MCQ: A 16-bit port address represents

A. One single number


B. four chunks of numbers
C. two numbers
68 | P a g e
D. both b and c

Answer

MCQ: Logical Addresses are

A. 16bit long
B. 32bit long
C. 64bit long
D. 128bit long

MCQ: Error Control and Flow Control are responsibilities of

A. data link and network Layers


B. data link and Physical Layer
C. Application and Presentation Layer
D. data link and Transport Layer

Answer
MCQ: Both TCP and SCTP protocols are

A. Connection less
B. connection oriented
C. start but no ending
D. None of Above

Answer

MCQ: Layer that is in between of session and application layer is

A. Network
B. Transport
C. Presentation
D. Data link

Answer

MCQ: In transport layer, message is divided into transmittable

A. packets
B. bits
C. Segments
D. frames

Answer

MCQ: Layer that are used to deal with mechanical and electrical specifications are

A. Physical Layer
B. Data Link Layer
69 | P a g e
C. Network Layer
D. Transport Layer

Overall impression (each out of 10):


 Professionalism: .................................................................................................
 Easy to read: ................................................................
 Efficient algorithm: ............................................................................
 Correctness: .............................................................................................
 Reusability: ...............................................................................
 Instructions followed: .....................................................................................
 Suitable meaningful variable names: ......................................................................

Answer
Berea College of Technology

70 | P a g e
System Software201

SECTION FOUR: REMOTE CONNECTIVITY

CONTENTS

SECTION FOUR: REMOTE CONNECTIVITY

4.1 LEARNING OUTCOMES

4.2 READING

4.3 INTRODUCTION

4.4 SERIAL LINE INTERNET PROTOCOL

4.5 PIONT-TO-PIONT PROTOCOL

4.6 VOCABULARY LIST

4.7 EXERCISES

71 | P a g e
System Software201

4.1 LEARNING OUTCOMES

 describe the components of a computer, their role and function and discuss how cpu,
memory, storage and network resources are leveraged by systems software; articulate
the various forms of virtualization; (Systems - Theory)

 manage multiple operating systems, systems software, network services and security
and demonstrate analytical skills in identifying and troubleshooting networking, security
and performance issues; (Managing Systems - Applied)

 identify core networking and infrastructure components and the roles they serve; and
given requirements and constraints, design an IT infrastructure including devices,
topologies, protocols, systems software, management and security; (IT Infrastructure -
Theory)

 analyze business requirements, research, develop and integrate solutions for enterprise
IT requirements; balance business, technical and security requirements and constraints.;
integrate operating systems, services, network devices, and security controls to meet the
requirements; (Developing Infrastructure Solutions - Applied)

72 | P a g e
System Sofware201

Introduction
Remote access is the ability to access a computer or
a network remotely through a network connection.
Remote access enables users to access the systems
they need when they are not physically able to
connect directly; in other words, users access
systems remotely by using a telecommunications or
internet connection. People at branch offices,
telecommuters and people who are traveling may
need access to their companies' networks.

REMOTE CONNECTIVITY

Serial Line Internet Protocol


The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of the Internet
Protocol designed to work over serial ports and modem connections. On PCs, SLIP has
been largely replaced by the Point-to-Point Protocol (PPP), which is better engineered, has
more features and does not require its IP address configuration to be set before it is
established. On microcontrollers, however, SLIP is still the preferred way of encapsulating
IP packets due to its very small overhead. A version of SLIP with header compression is
called CSLIP (Compressed SLIP). SLIP is also currently used in the BlueCore Serial
Protocol for communication between Bluetooth modules and host computers.

POINT-TO-POINT PROTOCOL
In networking, the Point-to-Point Protocol, or PPP, is a data link protocol commonly used to
establish a direct connection between two nodes over serial cable, phone line, trunk line,
cellular telephone, specialized radio links, or fiber optic links. Most Internet service
providers use PPP for customers' dial-up access to the Internet. Two common
encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) or Point-to-
Point Protocol over ATM (PPPoA), are used in a similar role with Digital Subscriber Line
(DSL) Internet service.

is commonly used to act as a data link layer protocol for connection over synchronous and
asynchronous circuits, where it has largely superseded the older, non-standard Serial Line
Internet Protocol (SLIP), and telephone company mandated standards (such as Link
Access Protocol, Balanced (LAPB) in the X.25 protocol suite). PPP was designed to work
with numerous network layer protocols, including Internet Protocol (IP), Novell's
Internetwork Packet Exchange (IPX), NBF and AppleTalk.

73 | P a g e
VOCABULARY LIST

10Base2 - Ethernet specification for thin coaxial cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 185 meters per segment.

10Base5 - Ethernet specification for thick coaxial cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 500 meters per segment.

10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per second)
with a distance limit of 2000 meters per segment.

10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits signals at
10 Mbps (megabits per second) with a distance limit of 100 meters per segment.

100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 100
Mbps (megabits per second) with a distance limit of 100 meters per segment.

1000BaseTX -Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 1 Gbps
(gigabits per second) with a distance limitation of 220 meters per segment.

Asynchronous Transfer Mode (ATM) - A network protocol that transmits data at a speed of 155 Mbps and
higher. It is most often used to interconnect two or more local area networks.

AppleTalk - Apple Computer's network protocol originally designed to run over LocalTalk networks, but can
also run on Ethernet and Token Ring.

AUI Connector (Attachment Unit Interface) - A 15 pin connector found on Ethernet cards that can be used for
attaching coaxial, fiber optic, or twisted pair cable.

Backbone - A cable to which multiple nodes or workstations are attached.

Bit - Binary digit in the binary numbering system. Its value can be 0 or 1. In an 8-bit character scheme, it
takes 8 bits to make a byte (character) of data.

BNC Connector (Bayone-Neill-Concelman) - Standard connector used to connect 10Base2 coaxial cable.

Bridge - Devices that connect and pass packets between two network segments that use the same
communications protocol.

Byte - an 8-bit long binary value, which originally mapped to text character values (between 0 and 255
decimal). For example, a decimal value of 65, represented in a binary byte is "01000001" and represents the
capital letter "A". A byte also is the atomic value of data storage, so a megabyte is the amount of memory
required to store a million bytes.

Cable - Transmission medium of copper wire or optical fiber wrapped in a protective cover.

Client/Server - A networking system in which one or more file servers (Server) provide services; such as
network management, application and centralized data storage for workstations (Clients).

CSMA/CA - Carrier Sense Multiple Access Collision Avoidance is a network access method in which each
device signals its intent to transmit before it actually does so. This prevents other devices from sending

74 | P a g e
information, thus preventing collisions from occurring between signals from two or more devices. This is the
access method used by LocalTalk.

CSMA/CD - Carrier Sense Multiple Access Collision Detection is a network access method in which devices
that are ready to transmit data first check the channel for a carrier. If no carrier is sensed, a device can
transmit. If two devices transmit at once, a collision occurs and each computer backs off and waits a random
amount of time before attempting to retransmit. This is the access method used by Ethernet.

Coaxial Cable - Cable consisting of a single copper conductor in the center surrounded by a plastic layer for
insulation and a braided metal outer shield.

Concentrator - A device that provides a central connection point for cables from workstations, servers, and
peripherals. Most concentrators contain the ability to amplify the electrical signal they receive.

DIN - A plug and socket connector consisting of a circular pattern of pins in a metal sleeve. This type of
connector is commonly seen on keyboards.

Dumb Terminal - Refers to devices that are designed to communicate exclusively with a host (main frame)
computer. It receives all screen layouts from the host computer and sends all keyboard entry to the host. It
cannot function without the host computer.

E-mail - An electronic mail message sent from a host computer to a remote computer.

End User - Refers to the human executing applications on the workstation.

Ethernet - A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel and Digital
Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps
(megabits per second).

Expansion Slot - Area in a computer that accepts additional input/output boards to increase the capability of
the computer.

Fast Ethernet - An Ethernet standard that supports 100 Mbps using category 5 twisted pair or fiber optic
cable.

Fiber Distributed Data Interface (FDDI) - A network protocol that is used primarily to interconnect two or
more local area networks, often over large distances.

Fiber Optic Cable - A cable, consisting of a center glass core surrounded by layers of plastic, that transmits
data using light rather than electricity. It has the ability to carry more information over much longer distances.

File Server - A computer connected to the network that contains primary files/applications and shares them
as requested with the other computers on the network. If the file server is dedicated for that purpose only, it is
connected to a client/server network. An example of a legacy client/server network is Novell Netware. All the
computers connected to a peer-to-peer network are capable of being the file server. Most modern operating
systems can operate as servers or as clients, greying the distinction in the server architecture.

Firewall - A security device which inspects traffic entering and leaving a network, and allows or disallows the
traffic, depending on rules describing acceptable use of the network, by filtering out unwanted packets. The
firewall is usually positioned as the gateway device to another network, such as the internet. Many routers
now contain firewalls. A personal firewall is usually software that runs on a workstation or server to filter
unwanted traffic at the individual machine.

75 | P a g e
Gigabit Ethernet - An Ethernet protocol that raises the transmission rates to 1 Gbps (gigabits per second).
Most school, corporate, and household networks provide gigabit ethernet to the workstations via cabled
connections.

Gigabyte (GB) - One billion bytes of information. One thousand megabytes.

Hub - A hardware device that contains multiple independent but connected modules of network and
internetwork equipment. Hubs can be active (where they repeat signals sent through them) or passive (where
they do not repeat but merely split signals sent through them).

Infrared - Electromagnetic waves whose frequency range is above that of microwaves, but below that of the
visible spectrum.

Intranet - Network internal to an organization that uses Internet protocols.

Internet - A global network of networks used to exchange information using the TCP/IP protocol. It allows for
electronic mail and the accessing ad retrieval of information from remote sources.

LAN (Local Area Network) - A network connecting computers in a relatively small area such as a building.

Linear Bus - A network topology in which each node attaches directly to a common cable.

LocalTalk - Apple Corporation proprietary protocol that uses CSMA/CA media access scheme and supports
transmissions at speeds of 230 Kbps (Kilobits per second).

MAN (Metropolitan Area Network) - A network connecting computers over a large geographical area, such as
a city or school district.

MAU (Multistation Access Unit) - A Token Ring wiring hub.

Modem (Modulator/Demodulator) - Devices that convert digital and analog signals. Modems allow computer
data (digital) to be transmitted over voice-grade telephone lines (analog).

Multiplexer - A device that allows multiple logical signals to be transmitted simultaneously across a single
physical channel.

Network Modem - A modem connected to a Local Area Network (LAN) that is accessible from any
workstation on the network.

Network Interface Card (NIC) - A board that provides network communication capabilities to and from a
computer.

Network Operating System (NOS) - Operating system designed to pass information and communicate
between more than one computer. Examples include Linux/Unix and Windows Server.

Node - End point of a network connection. Nodes include any device attached to a network such as file
servers, printers, or workstations.

Node Devices - Any computer or peripheral that is connected to the network.

PCMCIA - (later versions were PCMCIA2 and PC Card) An expansion slot found in many laptop computers.
Largely replaced by USB in the 2000-2010 period.

76 | P a g e
Peer-to-Peer Network - A network in which resources and files are shared without a centralized
management source.

Physical Topology - The physical layout of the network; how the cables are arranged; and how the
computers are connected.

Point-to-Point - A direct link between two objects in a network.

Ports - A connection point for a cable.

Protocol -A formal description of a set of rules and conventions that govern how devices on a network
exchange information.

RAID (Redundant Array of Inexpensive Disks) - A configuration of multiple disks designed to preserve data
after a disk casualty.

RAM (Random Access Memory) - The working memory of a computer where data and programs are
temporarily stored. RAM only holds information when the computer is on.

Repeater - A device used in a network to strengthen a signal as it is passed along the network cable.

RJ-45 - Standard connectors used for unshielded twisted-pair cable.

Router -A device that routes information between interconnected networks. It can select the best path to
route a message, as well as translate information from one network to another. Many routers now contain
firewalls. Home routers can contain firewall, router, switching (for cabled connections), and a wireless access
point.

SCSI (Small Computer Serial Interface) - An interface controller that allows several peripherals to be
connected to the same port on a computer.

Segment - Refers to a section of cable on a network. In Ethernet networks, two types of segments are
defined. A populated or trunk segment is a network cable that has one or more nodes attached to it. A link
segment is a cable that connects a computer to an interconnecting device, such as a repeater or
concentrator, or connects a interconnecting device to another interconnecting device.

Sneaker-Net - Refers to a manual method of sharing files in which a file is copied from a computer to a floppy
disk, transported to a second computer by a person physically walking (apparently wearing sneakers) to the
second computer, and manually transferring the file from floppy disk to the second computer.

Speed of Data Transfer - The rate at which information travels through a network, usually measured in
megabits per second.

Star Topology - LAN topology in which each node on a network is connected directly to a central network
hub or concentrator.

Star-Wired Ring - Network topology that connects network devices (such as computers and printers) in a
complete circle.

Switch - A "intelligent" type of hub, in that it sends packets only to the intended ports, rather than all
computers on the network.

77 | P a g e
Tape Back-Up - A common server or network peripheral which allows copying data and programs
from a computer system to magnetic tape. On tape, data is stored sequentially. When retrieving data,
the tape is searched from the beginning of tape until the data is found.

Terminator - A device that provides electrical resistance at the end of a transmission line. Its function
is to absorb signals on the line, thereby keeping them from bouncing back and being received again
by the network.

Thicknet - A thick coaxial cable that is used with a 10Base5 Ethernet LAN.

Thinnet - A thin coaxial cable that is used with a 10Base2 Ethernet LAN.

Token - A special packet that contains data and acts as a messenger or carrier between each
computer and device on a ring topology. Each computer must wait for the messenger to stop at its
node before it can send data over the network.

Token Ring - A network protocol developed by IBM in which computers access the network through
token-passing. Usually uses a star-wired ring topology.

Topology - There are two types of topology: physical and logical. The physical topology of a network
refers to the configuration of cables, computers, and other peripherals. Logical topology is the method
used to pass the information between workstations. Issues involving logical topologies are discussed
on the Protocol chapter

Transceiver (Transmitter/Receiver) - A Device that receives and sends signals over a medium. In
networks, it is generally used to allow for the connection between two different types of cable
connectors, such as AUI and RJ-45.

Tree Topology - LAN topology similar to linear bus topology, except that tree networks can contain
branches with multiple nodes.

78 | P a g e
Recommended Additional Reading
 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking and the
OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.


Recommended Digital Engagement and Activities

network tutorials:
http://www.ntu.edu.sg/home/ehchua/programming/cpp/cp0_introduction.html

Introduction to computer networks:


https://www.studytonight.com/cpp/introduction-to-cpp.php

There are many websites that teaches and seek to improve network skills by
providing lecture videos as well as course material online such as:

starting from basic(video)


https://www.youtube.com/watch?v=uRJeYKVMfxA

https://www.youtube.com/watch?v=55zroizjnvo

79 | P a g e
Revision Exercise

Exercise 1

MCQ: An applet is a program written in Java on the

A. Web
B. Server
C. Domain
D. Client

Answer

MCQ: To let client know about type of document sent, a CGI program creates

A. Body
B. Header
C. Borders
D. Footer

Answer

MCQ: Hyper Text Transfer Protocol (HTTP) support

A. Proxy Domain
B. Proxy Documents
C. Proxy Server
D. Proxy IP

Answer

MCQ: To create Web Pages we use a term, called

A. TCP/IP
B. WWW
C. HTML
D. FTP

Answer

MCQ: A browser can retrieve and run an HTML file that has embedded address of

A. Applets
B. Language
C. HTML
D. HTTP

80 | P a g e
Answer

MCQ: Nontextual information such as digitized photos or graphic images is not a physical
part of an

A. WebPage
B. WebData
C. HTML
D. Web-document

Answer

MCQ: Documents in WWW can be grouped into three broad categories

A. Static, double, active


B. Stateless, dynamic, archive
C. Static, domain, architecture
D. Static, dynamic, active

Answer

MCQ: To use proxy server, client must be configured to access proxy instead of the

A. Proxy Server
B. Target Server
C. Domain Server
D. Original Server

Answer

MCQ: Protocol is client/server program used to retrieve the

A. IP
B. Header
C. Document
D. Cache

Answer

MCQ: Language used for writing active documents is

A. C++
B. Perl
C. java
D. Php

Answer

MCQ: Documents that are created and stored in a server as a Fixed Content are called

A. Static Documents
B. Stateless Document
81 | P a g e
C. Active Documents
D. Dynamic Documents

Answer

MCQ: In Hypertext transaction, formats of request and response messages are

A. Different
B. Similar
C. Constant
D. Active

Answer

MCQ: In Hypertext Transaction, term CONNECT is used for

A. Connection Generation
B. Reserved Connection
C. Connection termination
D. Active Connection

Answer

MCQ: In WWW and HTTP. a technology that creates and handles dynamic documents is
called

A. Common Gateway Interface


B. Common Gateway Integrate
C. Common Gateway IP
D. Common Gateway Internet

Answer

MCQ: A program or a script to be run at client site are called

A. Web Documents
B. HyperLink Documents
C. Static Documents
D. Active Documents

Answer

MCQ: In World Wide Web (WWW), an electronic store (e-commerce) can use a cookie for
its

A. Client Shopper
B. Server Usage
C. Server Data
D. Client Data

Answer

82 | P a g e
MCQ: HTTP uses a TCP connection to

A. Establishment of servers connection


B. Transfer whole database
C. Client server connections
D. Transfer files

Answer

MCQ: In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using

A. Web-based connection
B. Domain
C. TELNET
D. Linear Connection

Answer

MCQ: HTML stands for

A. Hypertext Markup Locator


B. Hypertext Markup Language
C. Hypertext Mixed Language
D. Hypertext Markup Lines

Answer
MCQ: A Web page is made up of two parts

A. Header and Footer


B. Text and Number
C. Document and Body
D. Head and Body

Answer

Overall impression (each out of 10):


1. Professionalism:
.................................................................................................
2. Easy to read: ................................................................
3. Efficient algorithm:
............................................................................
4. Correctness:
.............................................................................................
5. Reusability: ...............................................................................
6. Instructions followed:
.....................................................................................
83 | P a g e
7. Suitable meaningful variable names:
......................................................................

REFERENCES

 Stalling W., Operating systems, 3rd Edition

 Tanenbaum A., Computer Networks, 4th Edition, Pearson Press.

 Widjaja, I., Communication Networks, 2nd Edition, McGraw Hill

 Computer Networking: Beginner’s guide for Mastering Computer Networking


and the OSI Model (Computer Networking Series Book 1)

 Computer Networks: A Systems Approach (The Morgan Kaufmann Series in


Networking)
 Mar 25, 2011 by Larry L. Peterson and Bruce S. Davie.

 Computer Networks and Internets (6th Edition)


 Jan 12, 2014 by Douglas E. Comer

 Introduction to Computer Networking: Your First Steps into How the Internet
and Networks Work (Computer Networking Series Book 5)

84 | P a g e

You might also like