Trust Academy
in collaboration with
Midlands State University
Name of course: NETWORK MANAGEMENT
Assignment Number: ONE
Name: DAVID
Surname: KHAUDENI
Registration: PCA156
Date Assignment written: 17 SEPTEMBER 2023
Phone Number:
COMMENTS----------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
-------------------------
Differences between distance-vector and link-state routing protocols:
1. Routing Information Exchange:
Distance-Vector: In distance-vector routing protocols, routers exchange
routing information with their directly connected neighbors. Each router
shares its routing table with its neighbors periodically or upon changes.
Link-State: Link-state routing protocols require routers to exchange complete
topological information about the network. Each router creates a detailed map
of the network by broadcasting link-state advertisements (LSAs) to all routers
in the network.
2. Routing Table Updates:
Distance-Vector: Distance-vector protocols update routing tables by
exchanging partial or complete routing tables with neighboring routers. The
updates are based on the received routing information from neighbors, using
algorithms like Bellman-Ford or RIP.
Link-State: Link-state protocols use the Dijkstra's algorithm to calculate the
shortest path to each network. Each router maintains a consistent and
synchronized copy of the network's link-state database, allowing it to make
more informed routing decisions.
3. Convergence Time:
Distance-Vector: Distance-vector protocols typically have a slower
convergence time compared to link-state protocols. This is because they rely
on periodic updates and the time taken for routing information to propagate
through the network.
Link-State: Link-state protocols converge faster as they have a more
comprehensive view of the network's topology and can calculate the shortest
path directly. Changes in the network topology are quickly detected, and
routers can update their routing tables accordingly.
Consequences of connection failure in different network topologies:
i) Mesh Topology:
If a connection fails in a mesh topology, the impact is limited. Each device in the
mesh has multiple links to other devices, so if one link fails, traffic can be rerouted
through alternative paths. The consequence is a slight increase in latency or a
temporary disruption until the routing protocols reconverge and select alternate paths.
ii) Star Topology:
In a star topology, if a connection fails between a device and the central hub, the
affected device will be isolated from the network. It will lose connectivity to other
devices in the network. However, the remaining devices will continue to function
normally. The consequence is that the isolated device cannot communicate with the
rest of the network until the connection is restored.
iii) Bus Topology:
In a bus topology, if a connection or cable fails, it can disrupt the entire network. A
failed connection can lead to a break in the bus, causing all devices to lose
connectivity. The consequence is a complete network outage until the connection is
repaired or replaced.
iv) Ring Topology:
In a ring topology, if a connection fails, it can disrupt the entire network as well. A
failed connection breaks the ring, causing the network to split into two separate
segments. The consequence is that the devices on one side of the break lose
connectivity with devices on the other side. Communication between devices can only
be restored if the connection is repaired or an alternative path is established.
3.One example of a device on a network that is required to operate all seven layers of
the OSI Reference Model is a network gateway or a router.
4. A protocol architecture, such as TCP/IP, is a systematic framework that defines the
structure and functionality of protocols within a network communication system. It
provides a standardized approach to organizing and implementing protocols, enabling
reliable and efficient communication between networked devices. The architecture
consists of multiple layers, each with specific responsibilities and interactions,
forming a cohesive system for end-to-end connectivity. TCP/IP, for example, is a
widely used protocol architecture that underpins the internet, incorporating protocols
like IP, TCP, and UDP. Overall, a protocol architecture establishes a structured
framework for network communication, ensuring interoperability and facilitating the
development of compatible networking technologies.
ii. How protocol architectures should work?
Protocol architectures provide a structured framework for designing and
implementing communication protocols in a systematic and organized manner. The
most commonly used reference models for protocol architectures are the OSI (Open
Systems Interconnection) model and the TCP/IP (Transmission Control
Protocol/Internet Protocol) model.
The architecture is typically organized into layers, with each layer having specific
functions and responsibilities. These layers are stacked on top of each other, forming
a hierarchical structure. The communication between layers occurs through
encapsulation, where data from the upper layers is wrapped in protocol-specific
formatting and passed down to the lower layers. At each layer, additional header or
trailer information may be added.
iii. Name two examples of protocol architecture’s in networking.
OSI Model
TCP/IP Model
5. State the five Link-state Routing Process performed when a router switches ON
1. Neighbor Discovery
2. Link-state Advertisement
3. Link-state Database Synchronization
4. Shortest Path Calculation
5. Routing Table Construction
6. What is the difference in the service offered to applications by the TCP and UDP
protocols?
TCP UDP
Reliability Unreliability
Connection oriented Connectionless
Flow control and congestion control Low latency
Higher overhead Lower overhead
7. Describe any SEVEN characteristics of thetransport layer UDP
The User Datagram Protocol (UDP) is a transport layer protocol that provides a
connectionless and unreliable service for data transmission. Here are seven
characteristics of the UDP protocol:
1. Connectionless
2. Unreliable
3. Low overhead
4. Datagram-oriented
5. Fast and low latency
6. Broadcast and multicast support
7. Simple and lightweight
8. Briefly explain each of the following concepts:
i) HDMI (High-Definition Multimedia Interface): HDMI is a digital
audio/video interface used for transmitting high-definition audio and video
signals between devices. It is commonly found in consumer electronics such
as televisions, monitors, and home theater system
ii) 10BaseT: 10BaseT is a type of Ethernet networking standard that operates
at a speed of 10 megabits per second (Mbps) and uses twisted pair cables for
data transmission
iii) CSMA/CD (Carrier Sense Multiple Access with Collision Detection):
CSMA/CD is a contention-based media access control method used in
Ethernet networks to handle collisions. It allows multiple devices to share a
common communication medium, such as a coaxial cable or twisted pair
cable.
9. i) Twisted Pair Cable:
Twisted pair cable is a type of copper-based cable composed of pairs of insulated
copper wires twisted together
Twisted pair cables are commonly used for Ethernet networks, telephone systems, and
other data communication applications. They are widely employed in residential,
commercial, and industrial settings for connecting computers, routers, switches,
telephones, and other network devices.
Twisted pair cables have some limitations. They are susceptible to electromagnetic
interference (EMI) and radio frequency interference (RFI) due to their unshielded
nature
ii) Coaxial Cable:
Coaxial cable consists of a central conductor, an insulating layer, a metallic shield,
and an outer insulating layer
Coaxial cables are widely used for television (CATV) distribution, cable internet
services, and other applications that require high-frequency signal
transmissionLimitations: Coaxial cables have some limitations, including their size
and inflexibility. They are thicker and less flexible compared to twisted pair cables,
making them less suitable for applications that require easy installation or routing in
tight spaces. Coaxial cables also have limitations in terms of maximum transmission
distance, as signal degradation can occur over longer distances. Additionally, coaxial
cables are more expensive than twisted pair cables.
iii) Optical Fiber:
Optical fiber is a type of cable that transmits data in the form of light pulses through a
thin strand of glass or plastic fiber
Optical fiber is widely used for high-speed, long-distance data transmission in
telecommunications networks, internet backbone infrastructure, and cable television
systems. While optical fiber offers numerous advantages, it does have a few
limitations. One limitation is the higher cost compared to copper-based cables,
making initial installation expenses higher. Optical fiber cables are also more delicate
and require careful handling during installation
iv) Microwaves:
Microwaves in the context of networking refer to the use of high-frequency
electromagnetic waves for wireless communication. These waves typically fall within
the frequency range of 1 GHz to 300 GHz.
Microwaves are used for point-to-point wireless communication links, primarily in
situations where it is not feasible or cost-effective to lay physical cables
Microwaves have some limitations when used for network communication. They
require line-of-sight propagation, meaning obstacles such as buildings, hills, or trees
can obstruct the signal path.
10. Public and private IPv4 addresses are used in computer networks to identify devices
and enable communication within the network and over the internet
. Public IPv4 Address:
A public IPv4 address is a unique address assigned to a device that is directly
connected to the internet. It is globally routable, meaning it can be used to
communicate with devices on different networks across the internet. Public IPv4
addresses are provided by Internet Service Providers (ISPs) and are globally
registered to ensure uniqueness.
Example: 203.0.113.45
11. Indicate the Protocol Data Unit (PDU) used at each layer of the OSI Layer Model.
The Protocol Data Unit (PDU) is the unit of data that is encapsulated at each layer of
the OSI (Open Systems Interconnection) model. Here are the PDUs used at each
layer:
1. Physical Layer:PDU: Bit
2. Data Link Layer:PDU: Frame
3. Network Layer:PDU: Packet
4. Transport Layer:PDU: Segment (TCP) / Datagram (UDP)
5. Session Layer:PDU: Data
6. Presentation Layer:PDU: Data
7. Application Layer:PDU: Data
12. Explain the key differences between the OSI Layer model and the TCP/IP Reference
model.
The OSI (Open Systems Interconnection) model and the TCP/IP (Transmission
Control Protocol/Internet Protocol) reference model are two different conceptual
frameworks used to understand and describe network protocols and communication.
Here are the key differences between the two models:
1. Number of Layers:
The OSI model consists of seven layers
The TCP/IP model combines some layers of the OSI model and has four layers
2. Layer Naming:
The OSI model has a descriptive and hierarchical approach to layer naming, with each
layer having a distinct name (e.g., Physical, Network, Transport).
The TCP/IP model does not have unique names for each layer
3. Connection-Oriented vs. Connectionless:
The OSI model supports both connection-oriented and connectionless
communication. Transport layer protocols like TCP (Transmission Control Protocol)
provide reliable, connection-oriented communication, while protocols like UDP (User
Datagram Protocol) offer connectionless communication.
The TCP/IP model leans more towards connectionless communication. The Internet
Protocol (IP) at the network layer is connectionless, and the Transport Layer protocols
like TCP and UDP provide both connection-oriented and connectionless
communication.
4. Encapsulation:
- OSI Model: The OSI model emphasizes strict encapsulation, where each layer
encapsulates the PDU (Protocol Data Unit) received from the upper layer and adds its
own header and trailer before passing it down to the lower layer.
- TCP/IP Model: The TCP/IP model also involves encapsulation, but the
encapsulation process is less rigid compared to the OSI model. The headers of
different protocols are often combined or encapsulated together to form a packet or a
segment.
5. Widely Adopted:
The OSI model is primarily a conceptual model and has not been widely implemented
or used in real-world networks.
The TCP/IP model is the foundation of the modern internet and is widely adopted and
implemented. It serves as the basis for the actual protocol suite that powers the
internet.
13. Describe the difference between full-duplex and half-duplex communications.
The difference between full-duplex and half-duplex communications lies in the ability
of a communication channel or device to transmit and receive data simultaneously.
Full-Duplex:
In full-duplex communications, data can be transmitted and received simultaneously
on the same communication channel or device. It allows for bidirectional
communication, where both parties can send and receive data at the same time. This is
achieved by using separate channels or frequencies for the transmit and receive
functions. Full-duplex communication provides a faster and more efficient data
transfer compared to half-duplex.
Half-Duplex:
In half-duplex communications, data can be transmitted in both directions, but not
simultaneously on the same communication channel or device. The communication
channel can only be used for either transmitting or receiving data at any given time,
but not both concurrently. To switch between sending and receiving, there is a need
for a control mechanism or protocol to manage the direction of data flow.