CN Tutorial 2 Soln
CN Tutorial 2 Soln
2)
Many network vendors and suppliers exist, each with its own ideas of how things should be done.
Without coordination, there would be complete chaos, and users would get nothing done. The only
way out is to agree on some network standards. Not only do good standards allow different
computers to communicate, but they also increase the market for products adhering to the
standards.
The formal standardization process has three stages: specification, identification of choices, and
acceptance. The specification stage consists of developing a nomenclature and identifying the
problems to be addressed. In the identification of choices stage, those working on the standard
identify the various solutions and choose the optimum solution from among the alternatives.
Acceptance, which is the most difficult stage, consists of defining the solution and getting recognized
industry leaders to agree on a single, uniform solution.
3) Pdf page 70
4)
TCP/IP includes an Internet addressing scheme that allows users and applications to identify a
specific network or host with which to communicate.
An Internet address works like a postal address, allowing data to be routed to the chosen
destination. TCP/IP provides standards for assigning addresses to networks, subnetworks, hosts, and
sockets, and for using special addresses for broadcasts and local loopback.
Internet addresses are made up of a network address and a host (or local) address. This two-part
address allows a sender to specify the network as well as a specific host on the network. A unique,
official network address is assigned to each network when it connects to other Internet networks.
However, if a local network is not going to connect to other Internet networks, it can be assigned
any network address that is convenient for local use.
The Internet addressing scheme consists of Internet Protocol (IP) addresses and two special cases of
IP addresses: broadcast addresses and loopback addresses.
5) Pdf page 65
6) Pdf page 69
8) Same answer as Q5
The formal standardization process has three stages: specification, identification of choices, and
acceptance. The specification stage consists of developing a nomenclature and identifying the
problems to be addressed. In the identification of choices stage, those working on the standard
identify the various solutions and choose the optimum solution from among the alternatives.
Acceptance, which is the most difficult stage, consists of defining the solution and getting recognized
industry leaders to agree on a single, uniform solution.
10)
Servers −Servers are high-configuration computers that manage the resources of the network. The
network operating system is typically installed in the server and so they give user accesses to the
network resources. Servers can be of various kinds: file servers, database servers, print servers etc.
Clients − Clients are computers that request and receive service from the servers to access and use
the network resources.
Peers − Peers are computers that provide as well as receive services from other peers in a
workgroup network.
Transmission Media − Transmission media are the channels through which data is transferred from
one device to another in a network. Transmission media may be guided media like coaxial cable,
fibre optic cables etc; or maybe unguided media like microwaves, infra-red waves etc.
a. Routers
b. Bridges
c. Hubs
d. Repeaters
e. Gateways
f. Switches
14) The exchange of data between two devices through a transmission medium is called Data
Communication. The data is exchanged in the form of 0's and 1's. The transmission medium used is
wire cable. For data communication to occur, the communication device must be a part of a
communication system.
15)
A network must be able to meet a certain number of criteria. The most important of these are
Transit time : It is the time taken to travel a message from one device to another.
Response time : It is defined as the time elapsed between enquiry and response.
Other ways to measure performance are :
1. Efficiency of software
2. Number of users
It decides the frequency at which network failure take place. More the failures are, less is the
network's reliability.
It refers to the protection of data from any unauthorised user or access. While travelling through
network, data passes many layers of network, and data can be traced if attempted. Hence security is
16)
17)
https://www.tutorialspoint.com/data_communication_computer_network/computer_network_mo
dels.htm
https://www.javatpoint.com/computer-network-models
18)
19)
Same as Q15
20)
The variation (i.e., standard deviation) in the delay or packet arrival times is called jitter.
21)
22)
Information today comes in different forms such as text, numbers, images, audio, and video.
Text:
In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is).
Different sets of bit patterns have been designed to represent text symbols. Each set is called a
code, and the process of representing symbols is called coding. Today, the prevalent coding
system is called Unicode, which uses 32 bits to represent a symbol or character used in any
language in the world. The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes the first 127 characters in
Unicode and is also referred to as Basic Latin.
Numbers:
Numbers are also represented by bit patterns. However, a code such as ASCII is not used
to represent numbers; the number is directly converted to a binary number to simplify
mathematical operations. Appendix B discusses several different numbering systems.
Images:
Images are also represented by bit patterns. In its simplest form, an image is composed of
a matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel
depends on the resolution. For example, an image can be divided into 1000 pixels or 10,000
pixels. In the second case, there is a better representation of the image (better resolution), but
more memory is needed to store the image. After an image is divided into pixels, each pixel is
assigned a bit pattern. The size and the value of the pattern depend on the image.
Audio:
Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete. Even when we use a
microphone to change voice or music to an electric signal, we create a continuous signal.
Video:
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images,
each a discrete entity, arranged to convey the idea of motion.
23)
A network service provider (NSP) is a business entity that provides or sells services such as network
access and bandwidth by allowing access into its backbone infrastructure or access to its network
access points (NAP), which consequently also means access to the Internet.
24)
25)
26)
27)
28)
Diagrams in answer 7
29)
Many network vendors and suppliers exist, each with its own ideas of how things should be done.
Without coordination, there would be complete chaos, and users would get nothing done. The only
way out is to agree on some network standards. Not only do good standards allow different
computers to communicate, but they also increase the market for products adhering to the
standards.
The formal standardization process has three stages: specification, identification of choices, and
acceptance. The specification stage consists of developing a nomenclature and identifying the
problems to be addressed. In the identification of choices stage, those working on the standard
identify the various solutions and choose the optimum solution from among the alternatives.
Acceptance, which is the most difficult stage, consists of defining the solution and getting recognized
industry leaders to agree on a single, uniform solution.
30)
31)
Performance can be measured in many ways, including transit time and response
time.Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an inquiry and a response. The performance
of a network depends on a number of factors, including the number of users, the type of
transmission medium, the capabilities of the connected hardware, and the efficiency of the
software. Performance is often evaluated by two networking metrics: throughput and delay. We
often need more throughput and less delay. However, these two criteria are often contradictory.
If we try to send more data to the network, we may increase throughput but we increase the delay
because of traffic congestion in the network.
32)
LAN:
It is also called LAN and designed for small physical areas such as an office, group of buildings or a
factory. LANs are used widely as it is easy to design and to troubleshoot. Personal computers and
workstations are connected to each other through LANs. We can use different types of topologies
through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network among each
other while it can also be as complex as interconnecting an entire building.
Example:
MAN:
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and uses the
similar technology as LAN. It is designed to extend over the entire city. It can be means to connecting
a
number of LANs into a larger network or it can be a single cable. It is mainly hold and operated by
single private company or a public company.
Example:
33)
MAN might not be owned by one While WAN also might not be owned by one
2. organization. organization.
MAN’s design and maintenance is difficult While WAN’s design and maintenance is also
5. than LAN. difficult than LAN as well MAN.
There is less noise and error in MAN in While there is more noise and error in WAN than
6. comparison of WAN. LAN and MAN.
MAN covers more area than LAN but less While WAN covers very huge area than LAN and
7. than WAN. MAN.
6.Communication
Without a doubt, the internet is the most powerful medium of communication at present. It
connects people across different parts of the world free and fast.
7. Digital Transactions
The internet facilitates internet banking, mobile banking, and e-wallets. Since all digital transactions
are stored in a database, it helps the government to track income tax details or income reports in
the ITR. It is also great for small businesses who are potentially looking at florida business banking
services, or ones closer depending on the location of their business, so they can do everything
remotely that can help them with keeping it running.
8. Money Management
The internet can also be used to manage money. Now there are many websites, applications, and
other tools that help us in daily transactions, transfers, management, budget, etc. With the growing
popularity of digital currency, it could be said that the internet is the necessity of this century.
Cryptocurrency is one of the major platforms for trading digital assets or digital money through
blockchain technology. If you want to learn more about how to invest in crypto, you can check out
Bitcoin Prime review or other similar blogs.
https://www.klientsolutech.com/uses-of-internet-in-our-daily-life-everyday-internet/
35)
Through logical address the system identify a network (source to destination). after identifying the
network physical address is used to identify the host on that network. The port address is used to
identify the particular application running on the destination machine.
Logical Address: An IP address of the system is called logical address. This address is the combnation
of Net ID and Host ID. This address is used by network layer to identify a particular network (source
to destination) among the networks. This address can be changed by changing the host position on
the network. So it is called logical address.
Physical address: Each system having a NIC(Network Interface Card) through which two systems
physically connected with each other with cables. The address of the NIC is called Physical address or
mac address. This is specified by the mmanufacturer company of the card. This address is used by
data link layer.
Port Address: There are many application running on the computer. Each application run with a port
no.(logically) on the computer. This port no. for application is decided by the Kernal of the OS. This
port no. is called port address.