Computer Networks 1
Computer Networks 1
KHARAR, PUNJAB
COMPUTER NETWORKS
ASSIGNMENT – I
BTCS 504 – 18
B. TECH 5TH SEMESTER
2023-24
Data communication plays a crucial role in various aspects of modern life, enabling the
exchange of information over long distances and forming the foundation for technologies
such as the internet, telecommunication systems, and computer networks. It is essential for
businesses, governments, individuals, and organizations to share data efficiently and securely
for various purposes, from personal communication to complex data-driven processes and
applications.
1. Number of Layers:
OSI Model: The OSI model consists of seven layers, each with a specific function.
These layers are, from the bottom to the top: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
TCP/IP Model: The TCP/IP model has four layers, which are often grouped
differently and are sometimes referred to as a three-layer model with the following
layers: Network Interface, Internet, Transport, and Application.
2. Specific Protocols:
OSI Model: The OSI model doesn't specify particular protocols but provides a
conceptual framework for networking. However, it is not directly tied to specific
protocols used in the real world.
TCP/IP Model: The TCP/IP model, as the name suggests, is closely associated with
the TCP and IP protocols, which are central to the operation of the internet. Other
protocols like UDP, ICMP, and HTTP also fit into the TCP/IP model.
3. Real-World Relevance:
OSI Model: While the OSI model is a theoretical framework, it has limited real-
world implementation. Few networks strictly adhere to all seven OSI layers, and it is
primarily used for educational and reference purposes.
TCP/IP Model: The TCP/IP model is much more closely aligned with the practical
implementation of networks, particularly the internet. It directly reflects the structure
and protocols used in the real world.
4. Layer Functions:
OSI Model: The OSI model defines seven layers, each with a specific function, from
the physical transmission of data (Layer 1) to the user interface and application layer
(Layer 7).
TCP/IP Model: The TCP/IP model's layers are more focused on actual network
communication: Network Interface (similar to OSI Layers 1 and 2), Internet (similar
to OSI Layer 3), Transport (similar to OSI Layer 4), and Application (similar to OSI
Layers 5, 6, and 7).
5. Development History:
OSI Model: The OSI model was developed by the International Organization for
Standardization (ISO) in the 1980s as a theoretical model for networking.
TCP/IP Model: The TCP/IP model predates the OSI model and was developed in the
early days of the ARPANET, the precursor to the internet. It evolved as a practical
approach to networking.
In summary, the OSI model is a conceptual framework that provides a structured way to
understand networking concepts, while the TCP/IP model is more closely aligned with the
actual protocols and architecture of the internet. In practice, the TCP/IP model is more widely
used for understanding and working with real-world networks and the internet.
QUES 6. What Is Multiplexing? Explain Its Types.
Multiplexing is a technique in data communication and networking that allows multiple
signals or data streams to be combined and transmitted over a single communication channel
or medium. This process optimizes the use of available resources and increases the efficiency
of data transmission. Multiplexing is commonly used in various communication technologies
to share bandwidth and accommodate multiple users or data streams. There are several types
of multiplexing, including:
2. Security: One of the primary advantages of spread spectrum is its inherent security.
Without knowledge of the spreading code or hopping sequence, it is difficult for
unauthorized receivers to detect and demodulate the signal effectively.
3. Resistance to Interference: Spread spectrum signals are more robust against various
forms of interference, including narrowband interference and jamming. The
interference appears as noise across the entire bandwidth, making it easier to filter out
or ignore.
4. Multipath Fading Mitigation: Spread spectrum can mitigate the effects of multipath
interference in wireless communication. The spread signal can be received as multiple
delayed and attenuated copies, which can be effectively combined at the receiver to
improve the signal's quality.
1. Guided Media (Wired Media): Guided media use physical cables or wires to
transmit signals. They are more secure and less susceptible to interference compared
to wireless media. Common types of guided media include:
2. Unguided Media (Wireless Media): Unguided media transmit signals through the air
or free space without the use of physical cables. They include:
a. Radio Waves:
Wireless communication through radio frequencies.
Used for AM/FM radio, television, and wireless networking (e.g., Wi-Fi and
Bluetooth).
b. Microwaves:
Utilizes higher-frequency radio waves for communication.
Often used for point-to-point communication links, such as microwave relay
systems.
c. Infrared Waves:
Uses infrared light for short-range communication.
Common in remote controls, IrDA (Infrared Data Association) devices, and
some indoor wireless technologies.
d. Satellite Communication:
Relies on geostationary or low Earth orbit (LEO) satellites to relay signals
between ground stations.
Enables long-distance global communication for television broadcasting,
internet services, and mobile communications.
3. Other Media:
The choice of transmission media depends on factors such as the required bandwidth,
distance, susceptibility to interference, cost, and specific application. In many cases, a
combination of different media types is used within a single network to optimize performance
and reliability. For example, fiber-optic cables may be used for long-distance backbone
connections, while wireless technologies like Wi-Fi or cellular networks provide connectivity
to end-user devices.
QUES 9. Explain The Topology And Its Types With Diagram.
Network topology refers to the physical or logical layout of interconnected devices and nodes
in a computer network. It defines how devices are connected and how data flows within the
network. There are several common network topologies, each with its own advantages and
disadvantages. Here, I'll explain some of the most prevalent network topologies with
diagrams.
1. Bus Topology:
In a bus topology, all devices are connected to a central communication bus (a single cable or
wire). Data is transmitted along the bus, and all devices on the network receive the data. It's a
simple and cost-effective topology but can be prone to disruptions if the main bus fails.
2. Star Topology:
In a star topology, each device is connected directly to a central hub or switch. Data flows
through the hub, and if one device fails, it doesn't affect the rest of the network. Star
topologies are common in Ethernet LANs.
3. Ring Topology:
In a ring topology, each device is connected to exactly two other devices, forming a closed
loop. Data circulates around the ring in one direction. While it's a simple topology, a single
point of failure can disrupt the entire network.
4. Mesh Topology:
Mesh topologies are characterized by every device being interconnected with every other
device. This redundancy ensures high reliability and fault tolerance, but it can be costly and
complex to set up.
5. Tree (Hierarchical) Topology:
Tree topologies combine elements of star and bus topologies. Devices are arranged in a
hierarchical structure, with lower-level branches connecting to higher-level branches. It is
commonly used in large-scale networks.
6. Hybrid Topology:
Hybrid topologies combine two or more different network topologies. For example, you
might have a combination of star and ring topologies to achieve specific performance and
redundancy goals.
Remember that these diagrams provide a simplified visual representation of each topology. In
real-world networks, variations and combinations of these topologies are often used to meet
specific requirements, such as scalability, redundancy, and fault tolerance. The choice of
topology depends on the network's purpose and design goals.