Unit 1
Unit 1
Ans.
REQUIREMENT OF PROTOCOLS
Network protocols are sets of rules for exchanging information. This exchange
usually occurs much like a dialog between two computers. The exchange often begins
with the client sending a signal to the server, providing key information about what
kind of data is being requested.
Without a set of rules, computers would not have the capability of "talking" to each
other across the Internet. Certain protocols help computers identify themselves on the
Internet.
Standardization
The primary reason for standards is to ensure that hardware and software produced by
different vendors can work together. Without networking standards, it would be
difficult—if not impossible—to develop networks that easily share information.
Standards also mean that customers are not locked into one vendor. They can buy
hardware and software from any vendor whose equipment meets the standard. In this
way, standards help to promote more competition and hold down prices.
The use of standards makes it much easier to develop software and hardware that link
different networks because software and hardware can be developed one layer at a
time.
Process of standardization
There are two types of standards: formal and de facto. A formal standard is developed
by an official industry or government body. For example, there are formal standards
for applications such as Web browsers (e.g., HTTP, HTML), for network layer
software (e.g., IP), data link layer software (e.g., Ethernet IEEE 802.3), and for
physical hardware (e.g., V.90 modems). Formal standards typically take several years
to develop, during which time technology changes, making them less useful.
De facto standards are those that emerge in the marketplace and are supported
by several vendors but have no official standing. For example, Microsoft
Windows is a product of one company and has not been formally recognized
by any standards organization, yet it is a de facto standard. In the
communications industry, de facto standards often become formal standards
once they have been widely accepted.
The formal standardization process has three stages: specification,
identification of choices, and acceptance. The specification stage consists of
developing a nomenclature and identifying the problems to be addressed. In
the identification of choices stage, those working on the standard identify the
various solutions and choose the optimum solution from among the
alternatives. Acceptance, which is the most difficult stage, consists of
defining the solution and getting recognized industry leaders to agree on a
single, uniform solution. As with many other organizational processes that
have the potential to influence the sales of hardware and software, standards-
making processes are not immune to corporate politics and the influence of
national governments.
Ans.
The model is called the OSI (Open Systems Interconnection) Model because it deals
with connecting open systems—that is, systems that are open for communication with
other systems.
1. Data Link layer - The data link layer is responsible for moving frames from one
hop (node) to the next.
2. Network layer - The network layer is responsible for the delivery of individual
packets from the source host to the destination host.
3. Transport layer - The transport layer is responsible for the delivery of a message
from one process to another.
5. Application layer - The application layer is responsible for providing services to the
user.
Q.4) Explain addressing with respect to TCP/IP. Explain each in detail. (10
marks)
Ans.
CP/IP includes an Internet addressing scheme that allows users and applications to
identify a specific network or host to communicate with. An Internet address works
like a postal address, allowing data to be routed to the chosen destination. TCP/IP
provides standards for assigning addresses to networks, sub networks, hosts, and
sockets, and for using special addresses for broadcasts and local loop back.
Four levels of addresses are used in an internet employing the TCP/IP protocols:
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Physical Address: A physical address is a binary number in the form of logical high
and low states on an address busthat corresponds to a particular cell of primary
storage(also called main memory), or to a particular register in a memory-mapped
I/O(input/output) device
Logical Addresses: A logical address is the address at which an item (memory cell,
storage element, network host) appears to reside from the perspective of an executing
application program. A logical address may be different from the physical address due
to the operation of an address translator or mapping function. In a computer with
virtual memory that incorporates memory management, the physical address differs
from the virtual address so a memory management unit (MMU) translates the virtual
address into a physical address, enabling each running process to "think" that it has all
the primary storage to itself.
Port Addresses: A port address is a way to identify a specific process to which an
Internet or other network message is to be forwarded when it arrives at a server. For
the Transmission Control Protocol and the User Datagram Protocol, a port number is
a 16-bit integer that is put in the header appended to a message unit.
Specific Addresses: In the TCP/UDP/SCTP services it is also possible to set the
parameter for a specific IP or Fully Qualified Domain Name address. The IP/FQDN
field refers to the destination address of the traffic, not the source. This means for
example, that you can set up a custom service that will describe in a policy the TCP
traffic over port 80 going to the web site example.com, but you cannot set up a service
that describes the TCP traffic over port 80 that is coming from the computer with the
address 192.168.29.59
Q5) Explain ISO - OSI Reference Model with neat diagram. (10 marks)
Ans.
The International Organization for Standardization (ISO) is a multinational body
dedicated to worldwide agreement on international standards. Almost three-fourths of
the countries in the world are represented in the ISO. An ISO standard that covers all
aspects of network communications is the Open Systems Interconnection (OSI)
model.
An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. The purpose of the OSI
model is to show how to facilitate communication between different systems without
requiring changes to the logic of the underlying hardware and software. The OSI
model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable. The OSI model was intended to
be the basis for the creation of the protocols in the OSI stack.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate
but related layers, each of which defines a part of the process of moving information
across a network.
Network communication is divided into seven layers. Layers 1-4 are considered the
lower layers, and mostly concern themselves with moving data around. Layers 5-7,
the upper layers, contain application-level data. Networks operate on one basic
principle: "pass it on." Each layer takes care of a very specific job, and then passes the
data onto the next layer. In the OSI model, control is passed from one layer to the
next, starting at the application layer (Layer 7) in one station, and proceeding to the
bottom layer, over the channel to the next station and back up the hierarchy. The OSI
model takes the task of inter-networking and divides that up into what is referred to as
a vertical stack that consists of the following 7 layers:
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication
partners are identified, quality of service is identified, user authentication and privacy
are considered, and any constraints on data syntax are identified. Everything at this
layer is application-specific. This layer provides application services for file transfers,
e-mail, and other network software services. Telnet and FTP are applications that
exist entirely in the application level. Tiered application architectures are part of this
layer.
Ex: WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can
accept. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax layer.
Ex: encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Ex: NFS, NetBios names, RPC, SQL.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end systems, or
hosts, and is responsible for end-to-end error recovery and flow control. It ensures
complete data transfer.
Ex: SPX, TCP, UDP.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, inter-networking, error handling,
congestion control and packet sequencing.
Ex: AppleTalk DDP, IP, IPX.
Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes
transmission protocol knowledge and management and handles errors in the physical
layer, flow control and frame synchronization. The data link layer is divided into two
sub layers: The Media Access Control (MAC) layer and the Logical Link
Control(LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls frame
synchronization, flow control and error checking.
Ex: PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal
— through the network at the electrical and mechanical level. It provides the
hardware means of sending and receiving data on a carrier, including defining cables,
cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.
Q.6) Explain TCP/IP model with neat diagram. (10 marks)
Ans. The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the
layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The
original TCP/IP protocol suite was defined as having four layers:
(1) host-to-network
(2) internet
(3) transport
(4) application
The first four layers provide physical standards, network interfaces, inter-networking,
and transport functions that corresponding to the first four layers of the OSI model.
The three topmost layers in the OSI model are represented in TCP/IP by a single layer
called the application layer.
TCP/IP reference model:
Ans:
A network topology is the arrangement of a network, including its nodes and
connecting lines. There are two ways of defining network geometry: the physical
topology and the logical (or signal) topology. The physical topology of a network is
the actual geometric layout of workstations. There are several common physical
topologies, as given below:
Mesh:
In the mesh topology, each workstation is connected directly to each of the others. In
the partial mesh topology, some workstations are connected to all the others, and
some are connected only to those other nodes with which they exchange the most
(1) Physical layer: The physical layer is responsible for movements of individual bits
from one hop (node) to the next.
(2) Data link layer: The data link layer is responsible for moving frames from one hop
(node) to the next.
(3) Network layer: The network layer is responsible for the delivery of individual
packets from the source host to the destination host.
(4) Transport layer: The transport layer is responsible for the delivery of a message
from one process to another
(5) Session layer: The session layer is responsible for dialog control and
synchronization.
(7) Application layer: The application layer is responsible for providing services to
the user.
Summary of Layers:
Ans.
Standardisation is the process of implementing and developing technical standards
based on the consensus of different parties that include firms, users, interest groups,
standards organizations and government. Standardization can help to maximize
compatibility, interoperability, safety, repeatability, or quality. It can also facilitate
commoditization of formerly custom processes.
The process of standardization can itself be standardized. There are four levels of
standardization: compatibility, interchangeability, commonality and reference. These
standardization processes create compatibility, similarity, measurement and symbol
standards.
There are typically four different techniques for standardization:
Simplification or variety control
Codification
Value engineering
Statistical process control
Types of standardization process:
Emergence as de facto standard: tradition, market domination, etc.
Written by a Standards organization:
in a closed consensus process: Restricted membership and often having
formal procedures for due-process among voting members
in a full consensus process: usually open to all interested and qualified parties
and with formal procedures for due-process considerations
Written by a government or regulatory body
Written by a corporation, union, trade association, etc.
There are many different standards used in networking today. Each standard usually
covers one layer in a network. For a network to operate, many different standards
must be used simultaneously. The sender of a message must use one standard at the
application layer, another one at the transport layer, another one at the network layer,
another one at the data link layer, and another one at the physical layer. Each layer
and each standard is different, but all must work together to send and receive
messages.
Q.10) Explain briefly how the layers of the Internet Model correlate to the layers
of the OSI Model with the help of appropriate diagrams. (10 marks)
Ans.
The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the
layers in the TCP/IP protocol suite do not exactly match those in the OSI model.
The original TCP/IP protocol suite was defined as having four layers:
A. host-to-network
B. internet
C. transport
D. application
Ans.
Ring topology, each device has a dedicated point to point connection with only the
two devices on either side of it. A signal is passed along the ring in one direction ,
from device to device, until it reaches its destination. Each device in the ring
incorporates a repeater. When a device receives a signal intended for another device,
its repeater regenerates the bits and passes them along.
Tree topology combines characteristics of linear bus and star topologies. It consists of
groups of star-configured workstations connected to a linear bus backbone cable.For
example, tree topologies are frequently used to organize the computers in a
corporate network, or the information in a database.
Ans.
Computer networks share common devices, functions, and features including servers,
clients, transmission media, shared data, shared printers and other hardware and
software resources, network interface card(NIC), local operating system(LOS), and
the network operating system (NOS). The basic hardware components of computer
networks are:
Servers
Clients
Transmission Media
Shared data
Shared printers and other peripherals
Network Interface Card
Local Operating System
Network Operating System
Hub
Switch
Router
LAN
Cable
Ans.
The Network allows computers to connect and communicate with different computers
via any medium. LAN, MAN and WAN are the three major types of the network
designed to operate over the area they cover. There are some similarities and
dissimilarities between them. One of the major differences is the geographical area
they cover, i.e. LAN covers the smallest area; MAN covers an area larger than LAN
and WAN comprises the largest of all.
There are other types of Computer Networks also, like :
● PAN (Personal Area Network)
● SAN (Storage Area Network)
● EPN (Enterprise Private Network)
● VPN (Virtual Private Network)
Ans.
Data communication is the exchange of data between two devices via some form of
transmission medium like a wire or cable or other. For data communications to occur,
the communicating devices must be part of a communication system made up of a
combination of hardware (physical equipment) and software (programs).
Ans.
A network must be able to meet a certain number of criteria to serve a particular
situation. The most important of these are performance, reliability, and security.
Performance depends on various factors; e.g. the number of simultaneous users, the
number of connected computers — and their traffic profiles. Given these factors, we
can design a network to meet the performance criteria. If network traffic increases
beyond the designed capacity, performance will deteriorate.
Q.16) Give an example for the simplex, half duplex and full duplex transmission
modes. (2 marks)
Ans.
Simplex:
In simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit; the other can only receive.
Keyboards and traditional monitors are examples of simplex devices. The keyboard
can only introduce input; the monitor can only accept output. The simplex mode can
use the entire capacity of the channel to send data in one direction.
Half Duplex:
The half-duplex mode is used in cases where there is no need for communication in
both directions at the same time; the entire capacity of the channel can be utilized for
each direction.
Walkie-talkies and CB radios are both half-duplex systems.
Full-Duplex:
In full-duplex mode, both stations can transmit and receive simultaneously
One common example of full-duplex communication is the telephone network. When
two people are communicating by a telephone line, both can talk and listen the same
time.
Q.17) Discuss about network models. (2 marks)
Ans.
A network model is a database model that is designed as a flexible approach to
representing objects and their relationships. A unique feature of the network model is
its schema, which is viewed as a graph where relationship types are arcs and object
types are nodes. Unlike other database models, the network model's schema is not
confined to be a lattice or hierarchy; the hierarchical tree is replaced by a graph,
which allows for more basic connections with the nodes.
Ans.
A network must be able to meet certain criteria, these are mentioned below:
(1) Performance
(2) Reliability
(3) Security
Ans.
Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. Jitter is an undesirable effect caused by the
inherent tendencies of TCP/IP networks and components. Playback may experience
gaps while waiting for the arrival of variable delayed packets. For example, let us
assume that video packets are sent every 30 m/s. If some of the packets arrive with
30-ms delay and others with 40-ms delay, an uneven quality in the video is the result.
Q.21) Define Internetworking. (2 marks)
Ans.
Connecting several networks together using internetworking devices such as routers
and gateways. Internetwork (internet) is a network of networks.
Internetworking is the practice of connecting a computer network with other networks
through the use of gateways that provide a common method of routing information
packets between the networks. Internetworking is a combination of the words inter
("between") and networking; not internet-working or international-network.
The smallest amount of effort to create an internet (an internetwork, not the Internet),
is to have two LANs of computers connected to each other via a router. Simply using
either a switch or a hub to connect two local area networks together doesn't imply
internetworking; it just expands the original LAN.
Ans.
There are three types of data representation is of two types namely, analog and digital.
Analog data is continuous and can take infinite set of values. In the diagram, the data
takes a wide set of voltage values at different points of time. Examples of analog data
are audio from a speaker, video output from a camera etc.
Digital data is discrete and not continuous. It cannot take an infinite set of values and
it only takes finite set of values. In the diagram above the data takes only two voltage
values (+v and –v) at different points of time. Examples of digital data include Text
files (finite set of characters), binary representation (in 0s & 1s), bitmap file, digitally
converted audio, video data, digital images etc.
Q.23) What are NSPs? (2 marks)
Ans.
Stands for “Network Service Provider” is a business or organization that
sells bandwidth or network access by providing direct Internet backbone access
to providers and usually access to its network access points (NAPs). For such a
reason, network service providers are sometimes referred to as backbone
providers or internet providers.
Network service providers may consist of telecommunications companies, data
carriers, wireless communications providers, Internet service providers, and cable
television operators offering high-speed Internet access.
Ans.
Internet:
The Internet is a global network that establishes a connection and provides
transmission between various computers. It uses both wired and wireless mode of
communication to send and receive any information such as data, audio, video, etc.
Here, data travels through “fibre optic cables”, which are owned by telephone
companies. Nowadays everyone uses the Internet for acquiring information,
communication, and transferring data over the network. It is a public network using
which computers can connect and relay to each other. It provides an excellent source
of information to the user. The origins of the Internet date back to research
commissioned by the federal government of the United States in the 1960s to build
robust, fault-tolerant communication with computer networks. The primary precursor
network, the ARPANET, initially served as a backbone for interconnection of
regional academic and military networks in the 1980s. The funding of the National
Science Foundation Network as a new backbone in the 1980s, as well as private
funding for other commercial extensions, led to worldwide participation in the
development of new networking technologies, and the merger of many networks.
Intranet:
An intranet is a private network accessible only to an organization's staff. Often, a
wide range of information and services are available on an organization's internal
intranet that are unavailable to the public, unlike the Internet. A company-wide
intranet can constitute an important focal point of internal communication and
collaboration, and provide a single starting point to access internal and external
resources. In its simplest form, an intranet is established with the technologies
for local area networks (LANs) and wide area networks (WANs). Many modern
intranets have search engines, user profiles, blogs, mobile apps with notifications, and
events planning within their infrastructure.
Internet Intranet
Connects different network of computers It is a part of Internet which is privately
together. owned by a particular firm.
Anyone can access the Internet. Accessible only by the organization
members, having login details.
Is not as safe as compared to Intranet. Safer compared to Internet.
Unlimited number of users. Limited number of users.
Have large number of visitors’ traffic. Very less number of visitors’ traffic.
Network type is public. Network type is private.
Unlimited information is provided and Limited, and circulates among the
can be viewed by everyone. members of an organization.
Ans.
TCP/IP
TCP/IP is the most commonly used network protocol worldwide and all nodes
connected to the Internet use it. TCP/IP consists of the 3 main protocols TCP
(Transmission Control Protocol), UDP (User Data Protocol) and IP (Internet
Protocol). UDP is a less important protocol using the lower-level Protocol IP as well.
For more details, have a look at ``Computer Networks'' by Andrew Tanenbaum.
Ans.
Standards — a set of rules that formally specify how communication should proceed
in a particular domain for a particular purpose. Standards include communication
protocols and, when appropriate, physical characteristics of devices and media.
Protocol — an agreed method of transaction, communication, and exchange between
hardware and/or software agents. The protocol defines how each agent must behave,
including the timing, format and content of messages that it sends and receives, in
order to communicate effectively with other agents using the same protocol.
A protocol is a series of prescribed steps to be taken, usually in order to allow for the
coordinated action of multiple parties. In the world of computers, protocols are used
to allow different computers and/or software applications to work and communicate
with one another. Because computer protocols are usually formalized, many people
consider protocols to be standards. However, such is not actually the case. Standards
are simply agreed-upon models for comparison, such as the meter and the gram. In
the world of computers, standards are often used to define syntactic or other rule sets,
and occasionally protocols, that are used as a basis for comparison. Some good
examples include ANSI SQL, used to compare derivations of the SQL database query
language, and ANSI C, used to compare derivations of the C programming language.
Ans.
When two or more networks are connected, they become an internetwork, or internet.
For example, assume that an organization has to offices, one on the east coast and the
other on the west coast. The establishment office on the west has a bus topology
LAN; the newly opened office on the east coast has a star topology LAN. The
president of the company lives somewhere in the middle and needs to have a control
over the company from her home.
To create a backbone WAN for connecting these three entities a switched WAN has
been leased. To connect the LANs to this switched WAN, however, three point-to-
point WANs are required. These point-to-point WANs can be high-speed DSL line
offered by a telephone company or a cable modem line offered by a cable TV
provider is as shown below:
A heterogeneous network made of four WANs and two LANs
Q.28) With suitable diagram explain the difference between BUS and TREE
Topology. (6 marks)
Ans.
In the picture above, if the main cable or trunk between each of the two star
topology networks were to fail, those networks would be unable to communicate
with each other. However, computers on the same star topology would still be
able to communicate.
Q.29) What is standardization? Why is it necessary? List and explain the
standardization bodies clearly, state the process of standardization with its
advantages and disadvantages. (6 marks)
Ans.
Standards are essential in creating and maintaining an open and competitive market
for equipment manufacturers and in guaranteeing national and international
interoperability of data and telecommunication technology and processes. Standards
provide guidelines to manufacturers, vendors, government agencies, and other service
providers to ensure the kind of inter-connectivity necessary in today's marketplace
and in international communications.
Data communication standards fall into two categories: de facto and de jure.
1) De facto (meaning "by fact" or "by convention"): Standards that have not
been approved by an organized body but have been adopted as standards
through widespread use are de facto standards. De facto standards are often
established originally by manufacturers who seek to define the functionality
of a new product or technology.
2) De jure (meaning "by law" or "by regulation"): Those standards that have
been legislated by an officially recognized body are de jure standards.
Standards Organization:
1) Standards are developed through the cooperation of standards creation,
committees, forums, and government regulatory agencies (FCC).
Ans.
Modem: The term modem is a composite word that refers to the two functional
entities that make up the device: a signal modulator and a signal demodulator. A
modulator creates a bandpass analog signal from binary data. A demodulator recovers
the binary data from the modulated signal.
Router: a device which forwards data packets to the appropriate parts of a computer
network.
Switch: A switch, in the context of networking is a high-speed device that receives
incoming data packets and redirects them to their destination on a local area network
(LAN). A LAN switch operates at the data link layer (Layer 2) or the network layer of
the OSI Model and, as such it can support all types of packet protocols.
LAN: A local area network (LAN) is usually privately owned and connects some
hosts in a single office, building, or campus.
WAN: A wide area network (WAN) is also an interconnection of devices capable of
communication.
However, there are some differences between a LAN and a WAN. A LAN is normally
limited in size, spanning an office, a building, or a campus; a WAN has a wider
geographical span, spanning a town, a state, a country, or even the world. A LAN
interconnects hosts; a WAN interconnects connecting devices such as switches,
routers, or modems.
Q.31) Explain different criteria for evaluating the performance of a computer
network. (6 marks)
Ans.
A network must meet a number of criteria. The most important of these are a
performance, reliability and security.
Performance:
Performance can be measured in many ways, including transit time and responsive time.
Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an enquiry and a response.
The performance of a network depends on a number of factors, including the number of
users, the type of transmission medium, the capabilities of the connected hardware, and
the efficiency of the software.
Number of users:
Having a large number of concurrent users can slow response time in a network not
designed to coordinate heavy traffic loads. The design of a given network is based on an
assessment of the average number of users that will be communicating at any one time. In
peak load periods, however, the actual number of users can exceed the average and
thereby decrease performance. How a network responds to loading is measure of its
performance.
Software:
The software used to process data at the sender, receiver, and intermediate nodes affects
network performance. Moving a message from node to node through a network requires
processing to transform the raw data into transmittable signals, to route these signals to
the proper destination, to ensure error-free delivery, and to recast the signals into a form
the receiver can use. The software that provides these services affects both the speed and
the reliability of a network link. Well-designed software can speed the process and make
transmission more effective and efficient.
Ans.
MAN (Metropolitan Area Network) WAN (Wide Area Network)
1. MAN is privately owned and networks 1. Two types of WAN: switched WAN
normally covers the area inside a town and point-to-point WAN.
or a city.
2. MAN is a network with a size between 2. WAN size may comprise a country, a
a LAN and a WAN. continent, or even the whole world.
3. It is designed for customers who need a 3. WAN provides long distance
high-speed connectivity. transmission of data, image, audio, and
video information.
4. Speeds of MAN ranges in terms of 4. Speeds of WAN ranges from few kilo
Mbps. bits per second (Kbps) to megabits per
second (Mbps).
5. Moderate 5. Low
6. It covers relatively large region such as 6. It spans large locality and connects
cities, towns. countries together. Example Internet
7. Limited coverage, about up to 100 7. Unlimited (usually in 1000Km) range,
miles (or 200 km) uses repeater and other connectivity for
range extension
8. Locally installed and based on common 8. Locally installed and based on common
carrier e.g. twisted pair, fibre optic carrier e.g. twisted pair wires, fibre,
cable etc. coaxial cable, wireless including
wireless and cellular network based.
9. Example of a MAN is the part of the 9. Example of a switched WAN is the
telephone company network that can asynchronous transfer mode (ATM)
provide a high-speed DSL line to the network. Point-to-point WAN is dial-up
customer. Another example is the cable line that connects a home computer to
TV network in a city. the Internet
Q.34) List and Explain the role of the internet today. (6 marks)
Ans.
The Internet has revolutionized many aspects of our daily lives. It has affected the
way we do business as well as the way we spend our leisure time. The Internet is a
communication system that has brought a wealth of information to our fingertips and
organized it for our use.
Q.35) What is the difference between port address, logical address and physical
address? (6 marks)
Ans.
Through logical address the system identify a network (source to destination). after
identifying the network physical address is used to identify the host on that network.
The port address is used to identify the particular application running on the
destination machine.
Logical Address: An IP address of the system is called logical address. This address is
the combination of Net ID and Host ID. This address is used by network layer to
identify a particular network (source to destination) among the networks. This address
can be changed by changing the host position on the network. So it is called logical
address.
Physical address: Each system having a NIC (Network Interface Card) through which
two systems physically connected with each other with cables. The address of the NIC
is called Physical address or mac address. This is specified by the manufacturer
company of the card. This address is used by data link layer.
Port Address: There are many application running on the computer. Each application
run with a port no.(logically) on the computer. This port no. for application is decided
by the Kernal of the OS. This port no. is called port address.