Computer Net Note
Computer Net Note
403
In a ring topology, every device has exactly two neighboring devices for
communication purpose. It is called a ring topology as its formation is like a ring. In this
topology, every computer is connected to another computer. Here, the last node is
combined with a first one. This topology uses token to pass the information from one
computer to another. In this topology, all the messages travel through a ring in the same
direction.
In the star topology, all the computers connect with the help of a hub. This cable is
called a central node, and all other nodes are connected using this central node. It is
most popular on LAN networks as they are inexpensive and easy to install.
Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of the
standard topologies. A hybrid topology is always produced when two different basic
network topologies are connected.
Mr. 403
v. Mesh Topology
The mesh topology has a unique network design in which each computer on the
network connects to every other. It is develops a P2P (point-to-point) connection
between all the devices of the network. It offers a high level of redundancy, so even if
one network cable fails, still data has an alternative path to reach its destination.
It is also referred to as Wired or Bounded transmission media. They are the cables that
are tangible or have physical existence and are limited by the physical geography. There
are 3 major types of Guided Media:
a. Twisted Pair Cable
It consists of 2 separately insulated conductor wires wound about each other.
Generally, several such pairs are bundled together in a protective sheath. They are
the most widely used Transmission Media. Twisted Pair is of two types,
Unshielded Twisted Pair and Shielded Twisted Pair.
b. Coaxial Cable
It has an outer plastic covering containing 2 parallel conductors each having a
separate insulated protection cover. The coaxial cable transmits information in two
modes: Baseband mode(dedicated cable bandwidth) and Broadband mode(cable
bandwidth is split into separate ranges).
c. Optical Fiber Cable
It uses the concept of reflection of light through a core made up of glass or plastic.
The core is surrounded by a less dense glass or plastic covering called the
cladding. It is used for the transmission of large volumes of data.
ii. Wireless or Unguided Media or Unbound Transmission Media
It is also referred to as Wireless or Unbounded transmission media. These media are
not bounded by physical geography and No physical medium is required for the
transmission of electromagnetic signals. There are 3 types of Signals transmitted
through unguided media:
a. Radiowaves
These are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range: 3KHz – 1GHz.
b. Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need to be
properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range: 1GHz – 300GHz.
c. Infrared
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range: 300GHz – 400THz.
It gives the guarantee of reliability. It does not give the guarantee of reliability.
Here, packets follow the same route. Here, packets do not follow the same route.
Connection-oriented Services requires a Connection-less Service requires a
bandwidth of high range. bandwidth of low range.
5. What is connection oriented service? Explain features of TCP with its header format.
A connection-oriented service is a technique used to transport data at the session layer.
Unlike its opposite, connnectionless service, connection-oriented service requires that a
session connection be established between the sender and receiver, analogous to a phone
call. A connection-oriented service can be a circuit-switched connection or a virtual circuit
connection in a packet-switched network.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet
protocol suite. It originated in the initial network implementation in which it complemented
the Internet Protocol (IP). Features of TCP are:
i. TCP is reliable protocol.
ii. TCP ensures that the data reaches intended destination in the same order it was sent.
iii. TCP is connection oriented.
iv. TCP provides error-checking and recovery mechanism.
v. TCP provides end-to-end communication.
vi. TCP provides flow control and quality of service.
vii. TCP operates in Client/Server point-to-point mode.
The length of TCP header is minimum 20 bytes long and maximum 60 bytes.
a. Source Port (16-bits): It identifies source port of the application process on the sending
device.
b. Destination Port (16-bits): It identifies destination port of the application process on the
receiving device.
Mr. 403
Channel Allocation means to allocate the available channels to the cells in a cellular
system. When a user wants to make a call request then by using channel allocation
strategies their requests are fulfilled. Channel Allocation Strategies are designed in such a
way that there is efficient use of frequencies, time slots and bandwidth. Different channel
allocation method are:
CSMA-CA CSMA-CD
CSMA/CA is part of the IEEE 802.11 CSMA/CD is part of the IEEE 802.3
standard. standard.
10. Explain about circuit switching and packet switching with a diagram.
OR,
Explain with illustration packet switching, circuit switching and virtual circuits.
Circuit switching is a switching method where an end-to-end path is created between two
stations within a network before starting the data transfer. Circuit switching method has a
fixed data rate and both the subscribers need to operate at this fixed rate. Circuit switching
is the simplest method of data communication where dedicated physical connections are
established between two individual senders and receiver. To create these dedicated
connections, a set of switches are connected by physical links. Circuit switching is
connection-oriented and has three phases: Circuit establishment, Transferring the data and
circuit disconnect.
Mr. 403
11. Explain the merits of circuit switching over packet switching? Explain with example.
OR,
Differentiate between circuit switching and packet switching.
In circuit switching, each data unit know In Packet switching, each data unit just
the entire path address which is provided know the final destination address
by the source. intermediate path is decided by the
routers.
Delay between data units is uniform. Delay between data units is not uniform.
12. What do you mean by framing? Describe various framing methods used in data link
layer.
Framing is a point-to-point connection between two computers or devices consists of a
wire in which data is transmitted as a stream of bits. A frame is a digital data
transmission unit in computer networking and telecommunication. A frame typically
includes frame synchronization features consisting of a sequence of bits or symbols that
indicate to the receiver the beginning and end of the payload data within the stream of
symbols or bits it receives.
Various framing methods used in data link layer are:
i. Fixed Size Framing
Here the size of the frame is fixed and so the frame length acts as delimiter of the frame.
Consequently, it does not require additional boundary bits to identify the start and end
of the frame. Example − ATM cells.
Mr. 403
13. What do you mean by error detection and correction? Explain with example how
checksum helps in error detection.
Error detection means detection or identification of errors. These errors may cause due to
noise or any other impairments during transmission from transmitter to the receiver, in
communication system. It is class of technique for detecting garbled i.e. unclear and
distorted data or message.
Error correction means correction or solving or fixing of errors. It simply means
reconstruction and rehabilitation of original data that is error-free. But error correction
method is very costly and is very hard.
For error detection by checksums, data is divided into fixed sized frames or segments.
i. Sender’s End
The sender adds the segments using 1’s complement arithmetic to get the sum. It then
complements the sum to get the checksum and sends it along with the data frames.
The receiver adds the incoming segments along with the checksum using 1’s
complement arithmetic to get the sum and then complements it.
If the result is zero, the received frames are accepted; otherwise they are discarded.
Example: Suppose that the sender wants to send 4 frames each of 8 bits, where the frames
are 11001100, 10101010, 11110000 and 11000011.
The sender adds the bits using 1s complement arithmetic. While adding two numbers using
1s complement arithmetic, if there is a carry over, it is added to the sum.
After adding all the 4 frames, the sender complements the sum to get the checksum,
11010011, and sends it along with the data frames.
The receiver performs 1s complement arithmetic sum of all the frames including the
checksum. The result is complemented and found to be 0. Hence, the receiver assumes that
no error has occurred.
Mr. 403
15. What are the two most popular routing algorithms? Explain any one to calculate the
routing table.
Routing is a process which is performed by layer 3 (or network layer) devices in order to
deliver the packet by choosing an optimal path from one network to another. The two
most popular routing algorithms are:
i. Distance Vector Routing Algorithm
A distance-vector routing protocol in data networks is a dynamic algorithm which
determines the best route for data packets based on distance. Distance-vector routing
protocols measure the distance by the number of routers a packet has to pass, one router
counts as one hop. It uses UDP (User datagram protocol) for transportation.
16. What is routing algorithm? Explain about distance vector routing algorithm.
A routing algorithm is a set of step-by-step operations used to direct Internet traffic
efficiently. When a packet of data leaves its source, there are many different paths it can
take to its destination. The routing algorithm is used to determine mathematically the best
path to take.
A distance-vector routing protocol in data networks is a dynamic algorithm which
determines the best route for data packets based on distance. Distance-vector routing
protocols measure the distance by the number of routers a packet has to pass, one router
counts as one hop. It uses UDP (User datagram protocol) for transportation. The three key
points to understand it are:
i. Share the gained knowledge about the entire network.
ii. Share information only to their neighbors.
iii.Share information in regular interval and when there is a change.
18. Differentiate between distance vector routing protocol and link state routing protocol.
The utilization of CPU and memory is The utilization of CPU and memory is
lower. higher.
The convergence time is slow, and it The convergence time is fast, and it is
usually suffers from count to infinity more reliable.
problem.
Distance vector doesn’t have hierarchical Link state routing can have a
Mr. 403
19. What is data communication? How does synchronous transmission differ from
asynchronous transmission? Explain.
Or,
Differentiate between synchronous transmission and asynchronous transmission.
Data communications refers to the transmission of this digital data between two or more
computers and a computer network or data network is a telecommunications network that
allows computers to exchange data. The physical connection between networked computing
devices is established using either cable media or wireless media. The best-known
computer network is the Internet.
Synchronous transmission differ from asynchronous transmission by the following points:
i. In synchronous transmission, data is sent in form of blocks or frames but in
asynchronous transmission, data is sent in form of byte or character.
ii. Synchronous transmission is fast but asynchronous transmission is slow.
iii. Synchronous transmission is costly but asynchronous transmission is economical.
iv. In synchronous transmission, time interval of transmission is constant but in
asynchronous transmission, time interval of transmission is random.
v. In synchronous transmission, there is no gap present between data but in asynchronous
transmission, there is gap present between data.
vi. Efficient use of transmission line is done in synchronous transmission while in
asynchronous transmission, transmission line remains empty during gap in character
transmission.
vii. Synchronous transmission needs precisely synchronized clocks for the information of
new bytes but asynchronous transmission have no need of synchronized clocks as parity
bit is used in this transmission for information of new bytes.
OR,
20. Differentiate between TCP & UDP. Why UDP protocol is best suited for many
applications? List out the reasons.
TCP is comparatively slower than UDP. UDP is faster, simpler and more efficient
than TCP.
TCP has a (20-80) bytes variable length UDP has a 8 bytes fixed length header.
header.
TCP is heavy-weight. UDP is lightweight.
TCP doesn’t supports Broadcasting. UDP supports Broadcasting.
TCP is used by HTTP, HTTPs, FTP, UDP is used by DNS, DHCP, TFTP,
SMTP and Telnet. SNMP, RIP, and VoIP.
UDP (User Datagram Protocol) is a communications protocol that is primarily used for
establishing low-latency and loss-tolerating connections between applications on the
internet. It speeds up transmissions by enabling the transfer of data before an agreement is
provided by the receiving party.
i. It allows packets to be dropped and received in a different order than they were
transmitted, making it suitable for real-time applications where latency might be a
concern.
Mr. 403
ii. It can be used for transaction-based protocols, such as DNS or Network Time Protocol
(NTP).
iii. It can be used where a large number of clients are connected and where real-time error
correction isn't necessary, such as gaming, voice or video conferencing, and streaming
media.
21. What is sliding window and error control in data link layer? Explain the techniques to
control the errors by ARQ.
A sliding window protocol is a feature of packet-based data transmission protocols. Sliding
window protocols are used where reliable in-order delivery of packets is required, such as
in the data link layer (OSI layer 2) as well as in the Transmission Control Protocol (TCP).
Error Control in the data link layer is a process of detecting and retransmitting the data
which has been lost or corrupted during the transmission of data. Any reliable system
must have a mechanism for detecting and correcting such errors. Error detection and
correction occur at both the transport layer and the data link layer.
In this protocol, if any frame is lost or corrupted then all the frames since the last
frame that was acknowledged are sent once again. The sender's window size is N but
the receivers window size is only one.
In this ARQ, if any frame is lost or corrupted then only that frame is sent again which
has a negative acknowledgement. The sender’s window size and the receiver’s
window size is the same here.
22. What are the design issues for layers? Explain OSI reference model with diagram.
How different layers are interrelated to each other.
The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks. The following are the design issues for the layers:
Mr. 403
i. Reliability
ii. Addressing
iii. Error Control
iv. Flow Control
v. Multiplexing and De-multiplexing
vi. Scalability
vii. Routing
viii. Confidentiality and Integrity
The open system interconnection (OSI) reference model is used for communication
between two or more heterogeneous computer system and makes a common general system
for all networking system at that time. It is just a framework designed for the computer
communication with 7 layers of operations, each have services, protocols and interface. The
first four layers are for the Kernel implementation and other three layers are for Application
implementation. The OSI is not popular due to the bad technology (extra layers) and bad
politics.
Each layer provides a service to the layer above it in the protocol specification. Each layer
communicates some information with the same layer's software or hardware on other
computers. In some cases, the other computer is connected to the same media; in other
cases, the other computer is on the other end of the network. When sending data, the
higher layers expect the lower layers to help deliver the data.
i. Physical Layer
The physical layer is responsible for movements of individual bits from one hop (node)
to the next. The physical layer transmits bits over medium; provides mechanical and
electrical specifications. Other responsibilities are:
a. Physical characteristics of interfaces and medium
b. Representation of bits
c. Define data rate or transmission rate
d. Synchronization of bits
e. Line configuration
f. Define the physical topology
g. Transmission mode
The network layer is responsible for the delivery of individual packets or datagram from
the source host (physical device) to the destination host (physical device), called host to
host delivery. Other responsibilities are:
a. Logical addressing (IP)
b. Routing
v. Session Layer
The session layer is the network dialog controller. It establishes, manage, and terminate
sessions among communicating systems. Other responsibilities are:
a. Dialog control
b. Synchronization
AES, DES, IDEA, Blowfish, RC5 and RC6 are block ciphers. RC4 is stream cipher.
DES
In “modern” computing, DES was the first standardized cipher for securing electronic
communications, and is used in variations (e.g. 2-key or 3-key 3DES). The original DES is
not used anymore as it is considered too “weak”, due to the processing power of modern
computers.
AES
The most commonly used symmetric algorithm is the Advanced Encryption Standard
(AES), which was originally known as Rijndael. This is the standard set by the U.S.
National Institute of Standards and Technology in 2001 for the encryption of electronic data
announced in U.S. FIPS PUB 197.
24. What is network security? Differentiate between private key cryptography and public
key cryptography.
Network security is any activity designed to protect the usability and integrity of
your network and data. It includes both hardware and software technologies. It targets a
variety of threats. It stops them from entering or spreading on your network. Network
security consists of the policies, processes and practices adopted to prevent, detect and
monitor unauthorized access, misuse, modification, or denial of a computer network and
network-accessible resources.[1] Network security involves the authorization of access to
data in a network, which is controlled by the network administrator.
The key is kept as a secret. One of the two keys is kept as a secret.
It is symmetrical because there is only one It is asymmetrical because there are two
key that is called secret key. types of keys: Private and public key.
Here, sender and receiver need to share the Here, sender and receiver does not need to
same key. share the same key.
Mr. 403
25. What do you mean by network security? What are the different types of firewall used
in networks?
Network security is any activity designed to protect the usability and integrity of
your network and data. It includes both hardware and software technologies. It targets a
variety of threats. It stops them from entering or spreading on your network.
A firewall is a type of cyber security tool that is used to filter traffic on a network. Firewalls
can be used to separate network nodes from external traffic sources, internal traffic sources,
or even specific applications. Firewalls can be software, hardware, or cloud-based, with
each type of firewall having its own unique pros and cons. Different types of firewall used
in networks are:
i. Packet-filtering Firewalls
A packet-filtering firewall is a fast solution that doesn’t require a lot of resources.
However, it isn’t the safest.
v. Next-Generation Firewalls
The next-generation firewall is a security device that combines a number of functions of
other firewalls.
Software firewalls include any type of firewall that is installed on a local device rather
than a separate piece of hardware (or a cloud server).
Hardware firewalls use a physical appliance that acts in a manner similar to a traffic
router to intercept data packets and traffic requests before they're connected to the
network's servers.
26. What is physical and port addressing? Explain elements of transport layer.
Mr. 403
Physical addressing is used at Data Link Layer. A physical address refers to either a
memory location, identified in the form of a binary number, or a media access control
(MAC) address. It is also known as a binary address or a real address.
There are many application running on the computer. Each application run with a port
number (logically) on the computer. This port number for application is decided by the
kernel of the operating system. This port number is called port addressing.
The transport layer is responsible to provide process-to-process message delivery and error
recovery. Other responsibilities are:
i. Service-point addressing (Port addressing)
From one process or running program to another.
v. Error control
It performed process-to-process rather than across a single link.
A switch is a data link layer networking device which connects devices in a network and uses
packet switching to send and receive data over the network. Like a hub, a switch also has
many ports, to which computers are plugged in. However, when a data frame arrives at any
port of a network switch, it examines the destination address and sends the frame to the
corresponding device(s). Thus, it supports both unicast and multicast communications.
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of source and destination. It is also used
for interconnecting two LANs working on the same protocol. It has a single input and
single output port, thus making it a 2 port device.
Mr. 403
A router is hardware device designed to receive, analyze and move incoming packets to
another network. It may also be used to convert the packets to another network
interface, drop them, and perform other actions relating to a network.
relation to other computers on the local network. Routers are found at the boundary of a
LAN, connecting them to the larger WAN.
In guided media, transmitted data travels In unguided media, transmitted data travels
through cabling system that has a fixed through free space in form of
path. electromagnetic signal.
ii. Client requests contain a name which is converted into an IP address known as a forward
DNS lookups while requests containing an IP address which is converted into a name
known as reverse DNS lookups.
iii. DNS implements a distributed database to store the name of all the hosts available on the
internet.
iv. If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP address
of a hostname. If DNS server does not contain the IP address associated with a hostname,
then it forwards the request to another DNS server. If IP address has arrived at the
resolver, which in turn completes the request over the internet protocol.
having heavy loads and high speeds. Since it is a data link layer protocol, data is transmitted
in frames. It is also known as RFC 1661.
PPP is a byte - oriented protocol where each field of the frame is composed of one or more
bytes. The fields of a PPP frame are:
i. Flag: 1 byte that marks the beginning and the end of the frame. The bit pattern of the flag
is 01111110.
ii. Address: 1 byte which is set to 11111111 in case of broadcast.
iii. Control: 1 byte set to a constant value of 11000000.
iv. Protocol: 1 or 2 bytes that define the type of data contained in the payload field.
v. Payload: This carries the data from the network layer. The maximum length of the
payload field is 1500 bytes. However, this may be negotiated between the endpoints of
communication.
vi. FCS: It is a 2 byte or 4 bytes frame check sequence for error detection. The standard code
used is CRC (cyclic redundancy code)
32. What do you mean by congestion in network? How congestion occurs in network?
Network congestion in data networking is the reduced quality of service that occurs when
a network node or link is carrying more data than it can handle. Congestion control refers to
the mechanisms and techniques to control the congestion and keep the load below the
capacity.
Congestion in a network may occur if the load on the network-the number of packets sent to
the network-is greater than the capacity of the network-the number of packets a network
can handle. Congestion can occur due to the following causes:
Every network has a specific level of capacity that it’s able to handle. This capacity puts
a limit on how much bandwidth and traffic your network can deal with before it begins
to affect performance.
33. Describe Leaky Bucket and Token Bucket used in congestion control.
A state occurring in network layer when the message traffic is so heavy that it slows down
network response time. There are two congestion control algorithm as:
unit of data is sent, the counter is decremented by 1. When the counter is zero, the host
cannot send data.
34. Explain bandwidth? Why higher bandwidth cause faster network connection. Explain
with example.
In computing, bandwidth is the maximum rate of data transfer across a given path.
Bandwidth is often mistaken for internet speed when it's actually the volume of information
that can be sent over a connection in a measured amount of time, calculated in megabits per
second (Mbps).
The more bandwidth a computer has, the faster it can send and receive information.
Bandwidth is a measure of how much data can be transferred from one point in a network
to another within a specific amount of time. Your actual bandwidth will often be less than
your maximum bandwidth because of network congestion and other external factors.
Having a higher bandwidth means you will be able to achieve a higher data transfer rate
which in turn leads to shorter download times. This is especially significant when
downloading large files. Here's a look at how long it takes to download the 383 MB
Maple Story game client.
A media access control address (MAC address) is a unique identifier assigned to a network
interface controller (NIC) for use as a network address in communications within a network
segment.
MAC address is necessary because network cards each have a unique MAC address.
Packets that are sent on the ethernet are always coming from a MAC address and sent to a
MAC address. If a network adapter is receiving a packet, it is comparing the packet’s
destination MAC address to the adapter’s own MAC address. If the addresses match, the
packet is processed, otherwise it is discarded.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used
on Internet Protocol (IP) local area networks. A DHCP server must be present on the
network. A device connected to the network requests an IP address from the DHCP server
using the DHCP protocol.
Mr. 403
37. What is analog and digital transmission? Explain its importance in communication.
An analog or analogue transmission is also referred as analog signal. It is a continuous
signal in which one time-varying quantity represents another time-based variable. These
kind of signals works with physical values and natural phenomena such as earthquake,
frequency, volcano, speed of wind, weight, lighting, etc. Its importance in communication
are:
A digital signal is a signal that is used to represent data as a sequence of separate values at
any point in time. It can only take on one of a fixed number of values. This type of signal
represents a real number within a constant range of values. Its importance in communication
are:
38. List out the advantages of digital transmission over analog transmission.
vi. The signal is un-altered as the pulse needs a high disturbance to alter its properties,
which is very difficult.
vii. Signal processing functions such as encryption and compression are employed in digital
circuits to maintain the secrecy of the information.
viii. The probability of error occurrence is reduced by employing error detecting and error
correcting codes.
HTTPS HTTP
It is hypertext transfer protocol with secure. It is hypertext transfer protocol.
It is designed to prevent hackers from It is less secure as the data can be
accessing critical information. It is secure vulnerable to hackers.
against such attacks.
HTTPS scrambles the data before HTTP does not scramble the data to be
transmission. transmitted.
It operates using HTTP but uses encrypted It operates at TCP/IP level.
TLS/SSL connection.
HTTPS website requires SSL certificate HTTP website do not need SSL and also
and use data encryption. doesn't use data encryption.
HTTPS helps to improve search ranking. HTTP does not improve search rankings.