0% found this document useful (0 votes)
15 views

Computer Networks

The document discusses computer networks and networking concepts. It defines what a computer network is and differentiates between LAN and WAN networks. It also explains network protocols, the TCP/IP protocol suite, the OSI model and examples of protocols for each layer of the OSI model. Additionally, it describes the differences between Wi-Fi and cellular networks and how a wireless access point functions in a network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Networks

The document discusses computer networks and networking concepts. It defines what a computer network is and differentiates between LAN and WAN networks. It also explains network protocols, the TCP/IP protocol suite, the OSI model and examples of protocols for each layer of the OSI model. Additionally, it describes the differences between Wi-Fi and cellular networks and how a wireless access point functions in a network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

COMPUTER NETWORK ASSIGNMENT

NAME ; ALFRED SALIM ODHIAMBO


ADMISSION; CIT-221-126/2023
1.What is acomputer network?
A computer network is a collection of interconnected devices that can share information and resources.

2 Differentiate betwwen LAN and WAN?


LAN stands for Local Area Network while WAN stands for Wide Area Network.

A LAN is a network that connects devices within a limited area, such as a home, office, or school.

WAN covers a larger geographic area and connects multiple LANs together. It can span across cities,
countries, or even continents.

3.Explain the concept of network protocols?


A network protocol is a set of rules and conventions that govern how devices communicate and
exchange data over a network. It's like a language that devices use to understand and interact with each
other. These protocols define things like how data is formatted, how it's transmitted, how devices
identify themselves, and how errors are handled.There are many different network protocols, each
serving a specific purpose. For example, the Internet Protocol (IP) is a fundamental protocol used for
addressing and routing data across the internet. Transmission Control Protocol (TCP) is another
important protocol that ensures reliable delivery of data by establishing a connection, breaking data into
packets, and reassembling them at the destination.Other protocols, like Hypertext Transfer Protocol
(HTTP), are used for communication between web browsers and web servers. Simple Mail Transfer
Protocol (SMTP) is used for sending email, and File Transfer Protocol (FTP) is used for transferring files
over a network.These protocols work together to enable devices to communicate and share information
effectively. They ensure that data is transmitted in a consistent and reliable manner, regardless of the
type of device or the network they are connected to .So network protocols are like the rules and
conventions that allow devices to communicate and exchange data on a network. They play a crucial
role in enabling the internet and other networks to function smoothly and securely.

4.What is the significance of the TCP/IP protocol suite?


TCP/IP-stands for Transmission Control Protocol/Internet Protocol.

TCP/IP is like the language that devices use to communicate with each other over the internet. It
provides a set of rules and procedures for data transmission, ensuring that information can be sent and
received accurately and reliably.TCP is responsible for breaking down data into smaller packets, sending
them across the network, and then reassembling them at the destination. It guarantees that the packets
arrive in the correct order and without errors.

IP handles the addressing and routing of these packets. It assigns unique IP addresses to devices and
determines the best path for data to travel from the source to the destination.

The significance of TCP/IP is that it's the foundation of the internet and enables seamless
communication between devices across the globe. It allows us to browse the web, send emails, stream
videos

5.Desccribe the OSI model and its seven layers?


the OSI model It's a framework that helps us understand how network protocols and communication
happen. it stands for Open Systems Interconnection model. It breaks down the process of network
communication into seven layers, each with its own specific function. Below are the layers:

1. Physical Layer: This layer deals with the physical aspects of data transmission, like cables, connectors,
and electrical signals.

2. Data Link Layer: This layer ensures error-free transmission of data between directly connected
devices, like switches or Ethernet cables. It adds reliability by detecting and correcting errors.

3. Network Layer: This layer handles the addressing and routing of data packets across different
networks. It determines the best path for data to travel from the source to the destination.

4. Transport Layer: This layer ensures reliable and orderly delivery of data between end-to-end
connections. It breaks down large data into smaller segments and manages flow control.

5. Session Layer: This layer establishes, manages, and terminates communication sessions between
devices. It helps keep track of conversations and ensures synchronization.

6. Presentation Layer: This layer takes care of data formatting, encryption, and compression. It prepares
data in a way that the receiving device can understand.

7. Application Layer: This layer is where applications and services interact with the network. It provides a
user interface for accessing network resources, like web browsers or email clients.

6.Provide examples of protocols at each layerb of the OSI model?


1. Physical Layer: At this layer, we have protocols like Ethernet, which defines the physical
characteristics of network connections, and USB, which handles connections between computers and
devices.

2. Data Link Layer: Here, protocols like Ethernet (again), Wi-Fi (IEEE 802.11), and Point-to-Point Protocol
(PPP) come into play. They ensure error-free transmission of data between directly connected devices.
3. Network Layer: IP (Internet Protocol) is the star of this layer. It handles the addressing and routing of
packets across different networks. Other examples include Internet Control Message Protocol (ICMP)
and Internet Group Management Protocol (IGMP).

4. Transport Layer: The most well-known protocol here is Transmission Control Protocol (TCP), which
provides reliable and ordered delivery of data. User Datagram Protocol (UDP) is another one, offering
faster but less reliable transmission.

5. Session Layer: While not as widely known, protocols like Remote Procedure Call (RPC) and Session
Initiation Protocol (SIP) operate at this layer. They establish and manage communication sessions
between devices.

6. Presentation Layer: Here, we have protocols like Hypertext Transfer Protocol (HTTP), which defines
how web pages are presented, and Secure Sockets Layer (SSL) or Transport Layer Security (TLS), which
handle encryption and secure communication.

7. Application Layer: This layer is where we interact with applications and services. Examples include
protocols like Simple Mail Transfer Protocol (SMTP) for sending emails, File Transfer Protocol (FTP) for
file transfer, and Domain Name System (DNS) for translating domain names into IP addresses.

7.Explain the difference between WIFI and cellular networks?


Wi-Fi is a wireless networking technology that allows devices to connect to a local area network (LAN) or
the internet using radio waves. It is typically used in homes, offices, cafes, and other places with Wi-Fi
access points. Wi-Fi networks are usually set up using a router connected to an internet service provider.

cellular networks, also known as mobile networks, use cellular towers to provide wireless
communication over a wide area. These networks are operated by mobile service providers and allow
devices like smartphones, tablets, and other mobile devices to connect to the internet from almost
anywhere within the coverage area.

One key difference between Wi-Fi and cellular networks is the range and coverage. Wi-Fi networks have
a limited range, typically within a few hundred feet of the access point, while cellular networks can
cover much larger areas, sometimes spanning miles.

Another difference is the speed and bandwidth. Wi-Fi networks generally offer faster speeds and higher
bandwidth compared to cellular networks. This is because Wi-Fi networks are often connected to high-
speed internet connections, while cellular networks share bandwidth among multiple devices in a given
area.
Additionally, Wi-Fi networks are typically used for local connectivity, allowing devices to connect to each
other and share resources within a specific area. Cellular networks, on the other hand, provide
connectivity on the go, allowing devices to access the internet and communicate while moving between
different locations.

8.How does a wireless access point function in a network?


A wireless access point (WAP) is a device that allows devices to connect to a wired network wirelessly. It
acts as a bridge between the wired network and wireless devices, creating a wireless local area network
(WLAN).

The WAP receives data from devices connected to it wirelessly and forwards it to the wired network.
Similarly, it receives data from the wired network and transmits it wirelessly to the connected devices.
This enables devices like smartphones, laptops, and tablets to access the network and the internet
without the need for physical wired connections.

The WAP typically connects to a router or a switch through an Ethernet cable. It uses radio waves to
communicate with wireless devices, allowing them to send and receive data over the network. The WAP
broadcasts a wireless signal, and devices within its range can connect to it by entering the correct
network password or using other authentication methods.

You might also like