Mirza M Mobeen F20605043 ASSIGNMENT 02

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

National University of Technology

Computer Science Department


Semester Fall – 2023
ASSIGNMENT - 01
Course: Computer Networks

Submitted To: Submitted By:


Name: Dr Iqbal Name: Mirza M Mobeen
CS Department Reg No: F20605043

TASK
Question No 1 (CLO1)
Enlist devices and protocols associated with each layer of OSI/TCP/IP models

Question No 2.
For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology?
The number of cables for each type of network is:
a. Mesh: n (n – 1) / 2
b. Star: n
c. Ring: n – 1
d. Bus: one backbone and n drop lines.
Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for
each device?

a. Cable links: n (n – 1) / 2 = (6 × 5) / 2 = 15

b. Number of ports: (n – 1) = 5 ports needed per device.

For each of the following four networks, discuss the consequences if a connection fails. a. Five devices arranged in a
mesh topology b. Five devices arranged in a star topology (not counting the hub) c. Five devices arranged in a bus
topology d. Five devices arranged in a ring topology.

a. Mesh topology: If one connection fails, the other connections will still be working.

b. Star topology: The other devices will still be able to send data through the hub; there will be no access to the device
which has the failed connection to the hub.

c. Bus Topology: All transmission stops if the failure is in the bus. If the drop-line fails, only the corresponding device
cannot operate.

d. Ring Topology: The failed connection may disable the whole network unless it is a dual ring or there is a by-pass
mechanism.

. Draw a hybrid topology with a star backbone and three ring networks.

22. Draw a hybrid topology with a ring backbone and two bus networks

. 23. Performance is inversely related to delay. When you use the Internet, which of the following applications are more
sensitive to delay? a. Sending an e-mail

b. Copying a file

c. Surfing the Internet

a. E-mail is not an interactive application. Even if it is delivered immediately, it may stay in the mail-box of the receiver for a
while. It is not sensitive to delay.

b. We normally do not expect a file to be copied immediately. It is not very sensitive to delay.

c. Surfing the Internet is the an application very sensitive to delay. We except to get access to the site we are searching.

24. When a party makes a local telephone call to another party, is this a point-to-point or multipoint connection? Explain
your answer
In this case, the communication is only between a caller and the callee. A dedicated line is established between them. The
connection is point-to-point.

Question No 3

In Figure 2.22, assume that the communication is between a process running at computer A with port address i and a
process running at computer D with port address j. Show the contents of packets and frames at the network, data link,
and transport layer for each hop.

22. Suppose a computer sends a frame to another computer on a bus topology LAN. The physical destination address
ofthe frame is corrupted during the transmission. What happens to the frame? How can the sender be informed about
the situation?

If the corrupted destination address does not match any station address in the network, the packet is lost. If the corrupted
destination address matches one of the stations, the frame is delivered to the wrong station. In this case, however, the
error detection mechanism, available in most data link protocols, will find the error and discard the frame. In both cases,
the source will somehow be informed using one of the data link control mechanisms discussed in Chapter 11

23. Suppose a computer sends a packet at the network layer to another computer somewhere in the Internet. The
logical destination address of the packet is corrupted. What happens to the packet? How can the source computer be
informed of the situation?

Before using the destination address in an intermediate or the destination node, the packet goes through error checking
that may help the node find the corruption (with a high probability) and discard the packet. Normally the upper layer
protocol will inform the source to resend the packet

24. Suppose a computer sends a packet at the transport layer to another computer somewhere in the Internet. There is
no process with the destination port address running at the destination computer. What will happen?

Most protocols issue a special error message that is sent back to the source in this case.

25. If the data link layer can detect errors between hops, why do you think we need another checking mechanism at the
transport layer?

The errors between the nodes can be detected by the data link layer control, but the error at the node (between input port
and output port) of the node cannot be detected by the data link layer.

THE END
THANK YOU

You might also like