0% found this document useful (0 votes)
11 views

Computer Network Note

Uploaded by

Garima Paudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Computer Network Note

Uploaded by

Garima Paudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Unit - 1

Compare star, bus, ring and mesh topology

Feature/Topol
ogy Star Bus Ring Mesh
Basic All nodes connect Nodes are Nodes are Every node is
Description to a central hub connected to a connected in a connected to
or switch. single cable. closed loop. every other
node.
Configuration Easy to install Simple to Moderate Complex and
and manage. implement. complexity. costly to
implement and
manage.
Cost Moderate; Low; minimal Moderate; High; requires
requires more cable required. requires more the most cable
cable than bus cable than bus. and network
but less than interfaces.
mesh.
Scalability Easy to add or It is easy to Adding or Highly scalable
remove nodes connect or removing but cost and
without affecting remove nodes requires complexity
the network. devices in this network increase.
network downtime.
without
affecting any
other device.

Fault Tolerance High; failure of Low; a break Moderate; a Very high; the
one node doesn't in the main break in the network
affect the rest, cable stops the loop can be remains
but hub/switch entire bypassed if the operational
failure downs network. system even if multiple
network. supports it. connections fail.
Performance High Performance Consistent as Superior; no
performance, as decreases as data travels in bottlenecks, but
failure of one one direction,
node does not more nodes but can be overkill for
affect others. are added. slow. small networks.
Use Case Common in home Used in small Used in some Ideal for
networks and networks high-speed or networks where
small businesses. where high real-time reliability is
speeds are not systems. critical, like
critical. military or
research
networks.

Define Intranet.
An intranet is a private network used by a company or organization to securely share
information, operational systems, or computing services only among its members. Think of
it as a "private internet" for a specific group of people.

A simple example of an intranet could be the internal website of a school. This website is
accessible only to students, teachers, and staff. It provides schedules, materials for classes,
internal news, and forums for discussion, all within a secure network that can't be accessed
by people outside the school.

which network model is used for connecting devices within


office and why? Explain with neat diagram along with
advantages and disadvantages
The network model commonly used for connecting devices within an office is the Local
Area Network (LAN). A LAN is designed to interconnect computers and digital devices
within a limited geographical area such as an office, a building, or a campus, facilitating
communication, data sharing, resource sharing (like printers), and internet access among
devices.
Advantages of LAN
• High Speed: LANs offer high data transfer speeds, typically ranging from 100Mbps
to 10Gbps, which is ideal for file sharing and real-time collaboration.
• Resource Sharing: Devices on a LAN can share resources like printers, scanners,
and storage devices, reducing costs.
• Low Latency: Since the network covers a small area, the data transmission latency
is minimal, enhancing efficiency.
• Security: Compared to wider networks, LANs are easier to secure because they are
confined to a controlled environment.
• Cost-Effective: Setting up a LAN is relatively inexpensive compared to wide area
network (WAN) setups. Maintenance costs are also lower.

Disadvantages of LAN
• Limited Coverage: LANs are restricted to a small geographical area, limiting their
use to single buildings or campuses.
• Infrastructure Costs: Initial setup requires investment in infrastructure, such as
switches, routers, cabling, and network management software.
• Maintenance: Requires ongoing maintenance and technical support to manage
network issues, updates, and security.
• Security Risks: While more secure than broader networks, LANs are still
vulnerable to internal threats and unauthorized access if not properly secured.
• Limited scalability
• May experience congestion and network performance issues with increased
usage.

Difference between Client-Server and Peer-to-Peer Network:

S Client-Server Network Peer-to-Peer Network


.
N
O

In Client-Server Network, Clients and


1 In Peer-to-Peer Network, Clients and
server are differentiated, Specific
. server are not differentiated.
server and clients are present.
2 Client-Server Network focuses on While Peer-to-Peer Network focuses on
. information sharing. connectivity.

3 In Client-Server Network, Centralized While in Peer-to-Peer Network, Each


. server is used to store the data. peer has its own data.

In Client-Server Network, Server While in Peer-to-Peer Network, Each


4
respond the services which is request and every node can do both request
.
by Client. and respond for the services.

5 Client-Server Network are costlier While Peer-to-Peer Network are less


. than Peer-to-Peer Network. costlier than Client-Server Network.

6 Client-Server Network are more stable While Peer-to-Peer Network are less
. than Peer-to-Peer Network. stable if number of peer is increase.

While Peer-to-Peer Network is


7 Client-Server Network is used for both
generally suited for small networks
. small and large networks.
with fewer than 10 computers.

Explain the different types of network model.


Define converged networks
Converged networks refer to the integration of multiple types of communication and
networking technologies into a single network that can carry various types of traffic, such
as voice, data, and video. This convergence allows for the use of a single infrastructure to
provide multiple services, resulting in improved efficiency, reduced costs, and simplified
management compared to operating separate networks for each type of service.

Applications of Computer Network

You are assigned to design a network infrastructure for your


college. Recommend a network solution with hardware and
software in current trend that can be used in the college. Make
necessary assumption and justify your recommendation with
logical argument where possible.

Designing a network infrastructure for a college involves considering various factors,


including the size of the college, the number of students and staff, the types of applications
that will be used (e.g., learning management systems, administrative systems, video
conferencing tools), and future scalability. Below, I'll outline a recommended network
solution that incorporates current trends in networking technology, making assumptions
where necessary for a hypothetical medium-sized college with approximately 5,000
students and 500 staff members.

Assumptions:
• The college campus includes multiple buildings, including academic buildings,
administrative buildings, dormitories, and recreational facilities.
• The college requires both wired and wireless connectivity.
• The college intends to support online learning platforms, cloud-based services, and
multimedia content.
• There is a need for high security to protect student and staff data.

Network Solution:
Hardware:
• Core and Distribution Switches: Deploy high-capacity, enterprise-grade switches in the
core and distribution layers to handle the large volume of traffic. Cisco Catalyst 9000 series
switches are recommended for their scalability, security features, and support for software-
defined networking (SDN).
• Access Switches: Use stackable access switches in each building to connect end devices.
The Aruba 2930M Switch Series would be suitable for providing high performance,
security, and ease of use.
• Wireless Access Points (WAPs): Deploy Wi-Fi 6 (802.11ax) access points across the
campus to ensure high-density, high-speed wireless access. Aruba's 500 Series Campus
Access Points would offer robust performance and advanced features like Adaptive Radio
Management.
• Firewalls and Security Appliances: Implement next-generation firewalls (NGFWs) at the
network perimeter. Fortinet FortiGate offers comprehensive security features, including
intrusion prevention, web filtering, and malware protection.
• Network Management and Monitoring Tools: Deploy hardware for running network
management and monitoring software, such as SolarWinds Network Performance Monitor,
for real-time visibility and management of the network's performance and security.
Software:
• Network Operating System (NOS): Use Cisco IOS XE for core and distribution switches
and ArubaOS for access switches and WAPs, providing advanced features and security.
• SDN Controller: Cisco DNA Center for managing the network infrastructure through a
centralized interface, facilitating automation, and ensuring policy consistency across the
network.
• Security Software: Implement security solutions like Cisco Umbrella for DNS-layer
security and FortiGuard services for ongoing threat intelligence and protection.
• Cloud-based Services: Utilize Microsoft Azure or Amazon Web Services (AWS) for hosting
college applications, databases, and storage, providing flexibility, scalability, and disaster
recovery options.

Justification:
• Scalability and Flexibility: The recommended solution is designed to scale with
the college's growth. SDN and cloud services offer the flexibility to easily adjust
resources as demands change.
• High Performance: Wi-Fi 6 technology and enterprise-grade switches ensure high-
speed connectivity necessary for multimedia content and online platforms.
• Security: Advanced security features in NGFWs, SDN policies, and cloud services
ensure the protection of sensitive data against evolving threats.
• Manageability: Centralized network management and monitoring tools enable
efficient operations, quick troubleshooting, and enhanced visibility into network
performance.
This network infrastructure design balances performance, security, and scalability to meet
the current and future needs of a college environment. It incorporates the latest in
networking technology trends to provide a robust, secure, and flexible platform for
education and administration.

Q. Explain gigabit ethernet with help of below parameters: MAC sublayer, full duplex
mode, half duplex mode, topology and implementation and coding
Gigabit Ethernet is a high-speed networking technology that operates at a data rate of 1 gigabit per
second (Gbps), or 1000 megabits per second (Mbps). It is an evolution of the original Ethernet standard
and is designed to provide faster data transfer rates.

• MAC Sublayer (Media Access Control):


o The MAC sublayer is responsible for controlling access to the physical network medium. It manages the
addressing of devices on the network through MAC addresses, which are unique identifiers assigned to
each network interface card (NIC).
o Gigabit Ethernet uses a frame format defined by the IEEE 802.3 standard. The MAC sublayer handles the
encapsulation and de-encapsulation of data into and from Ethernet frames.
• Full Duplex Mode:
o In full duplex mode, communication can occur in both directions simultaneously. This means that
devices can send and receive data at the same time, doubling the potential data transfer rate.
o Gigabit Ethernet typically operates in full duplex mode, allowing for efficient and high-speed
bidirectional communication.
• Half Duplex Mode:
o Half duplex mode allows communication in only one direction at a time. Devices must take turns
transmitting and receiving data.
o While older Ethernet standards, such as 10BASE-T and 100BASE-T, often used half duplex mode, Gigabit
Ethernet is primarily designed for full duplex operation due to its higher data rates and the need for
efficient bidirectional communication.
• Topology:
o Gigabit Ethernet supports various topologies, including star, bus, and ring configurations. However, the
most common deployment is in a star topology, where each device is connected to a central switch or
hub.
o The star topology is preferred because it offers better performance, scalability, and fault isolation
compared to bus or ring topologies.
• Implementation and Coding:
o Gigabit Ethernet can be implemented using various physical media, such as twisted pair cables (e.g., Cat
5e or Cat 6), fiber optics, or even copper coaxial cables.
o When it comes to coding, Gigabit Ethernet uses a technique called 8B/10B encoding, where 8 bits of data
are encoded into a 10-bit symbol. This encoding scheme provides DC balance and helps in clock
recovery, ensuring reliable data transmission.

Difference Between IPv4 and IPv6


IPv4 IPv6

IPv4 has a 32-bit address length IPv6 has a 128-bit address length

It Supports Manual and DHCP address It supports Auto and renumbering


configuration address configuration
In IPv4 end to end, connection integrity is In IPv6 end-to-end, connection
Unachievable integrity is Achievable

The address space of IPv6 is quite


It can generate 4.29×10 address space
9
large it can produce 3.4×1038
address space

The Security feature is dependent on the IPSEC is an inbuilt security feature


application in the IPv6 protocol

Address representation of IPv4 is in Address Representation of IPv6 is


decimal in hexadecimal

Fragmentation performed by Sender and In IPv6 fragmentation is performed


forwarding routers only by the sender

In IPv6 packet flow identification


In IPv4 Packet flow identification is not
are Available and uses the flow
available
label field in the header

In IPv6 checksum field is not


In IPv4 checksum field is available
available

In IPv6 multicast and anycast


It has a broadcast Message Transmission
message transmission scheme is
Scheme
available

In IPv6 Encryption and


In IPv4 Encryption and Authentication
Authentication are provided
facility not provided
IPv6 has a header of 40 bytes fixed
IPv4 has a header of 20-60 bytes.

Not all IPv6 can be converted to


IPv4 can be converted to IPv6
IPv4

IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are
separated by addresses dot (.) separated by a colon (:)

IPv4’s IP addresses are divided into five


IPv6 does not have any classes of
different classes. Class A , Class B, Class
the IP address.
C, Class D , Class E.

IPv4 supports VLSM(Variable Length


IPv6 does not support VLSM.
subnet mask).

Example of IPv6:
Example of IPv4: 66.94.29.13 2001:0000:3238:DFE1:0063:0000:
0000:FEFB

You might also like