Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
20 views
12 pages
CH 4. Networking
Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 4 Network - 4
Uploaded by
debjitdutta556
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Ch 4. Networking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
20 views
12 pages
CH 4. Networking
Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 4 Network - 4
Uploaded by
debjitdutta556
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Ch 4. Networking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Ch 4. Networking For Later
You are on page 1
/ 12
Search
Fullscreen
er ‘Rudiments of Computer Science Local Aree Network WaLan? cess Control Schemes: Ethernet and Token Ring 42 LAN A simp stor famed wen several computers are connected together over a small, medium, or large geographic area. When a network is meant for a single person itisknown asa Personal Area Network of PAN. One may form a personal network between @ Typical laptop and a desktop computer LANSetup ‘A Local Area Network or LAN is formed when several computers and other network devices are connected over a small geographic area like an office floor, building, of college campus. A LAN allows computers to exchange information at high speed over a limited area, It is considered «a private network as it usually serves a single organisation, ALLAN spread over a college campus is often called a Campus Area Network or CAN. General Characteristics of a LAN: + Coverage: The area covered by a LAN is small, usually covering an office space. A typical LAN extends from a few metres to several hundred metres. ‘+ Sharing: All connected devices in the network share the same transmission media and have access to common resources like various servers, data files, printers, et. = Topology: Various topologies like Star, Bus, Ring etc. are used to arrange nodes in a LAN. = Connectivity: Usually nodes in a LAN are connected to each other using co-axial, UTP, or fibre optic cables through an NIU, Wireless communication can also be used using an Access Point + Speed: A LAN has high bandwidth in the order of 10-100 Mbps and uses baseband transmission mode for data transmission. + Media Access Control: All nodes in a LAN share the same communication channel. This may lead to collision of data in case multiple nodes transmit at the same time. To prevent this, several schemes like CSMA-CD for Ethernet LANs and token passing for Token Ring LANs are used, = Cost: Cost of setting up @ LAN is usually low as compared to a WAN as itis localised over a smaller geographic area and does not require additional devices that are required in « WAN, = Extended LANs: A large LAN can be divided into smaller physical sections connected by devices like bridges, switches etc. to manage network traffic efficiently. = Example: Ethernet and Token Ring are two important LAN standards. Pat 47 Bob Meta venta the most poplar LAN slander at presente Earn 373 wo s0keror PARC anne company patra tin 1575. By 1885 had Decora an EEE sind. Tang ino acoont bor vwradana wrest era sbout a biion ew Enero pots are shipped every yea Local Area | Network of LAN is formed when several computers and oer ator dvies are connected over 4 sal geographic | areata an ofce | tor, aberatry, | building, or college | campus & Access Point AP) an access pints a device that creates ‘wireless local aes tor, or WLAN, by conecting toa iad router, switch, forhubvinan Etornt cable, and providing a WHFI Signal to esignated are,Part2: Chapter 4 Cee Oo ae Media Acces Conta (MAC) scenes imply te stot rules FystsamConm 7 2. Eel etn canto aman ‘iow manatee st to control which node can access the transmission media like a cable. There are basically two types of MAC schemes: ‘© Contention based: In this scheme all the nodes in a |, (ren tsse ! network try to transmit data and the first node to access the | 5 wie fal fomof sta network media transmits te data first wa er Een * Token Passing: In this scheme only a node in possession ofa special message called a token can transmit data, | Th ern snd sh Contention based MAC shoe wile he Taken Rig std uses the Token-passing based MAC scheme respectively to overcome this problem. (Gp | (Ethernet: IEEE 802.3 Standard ill Ethernet | Etnemet is the most popular LAN protocol and the first LAN architecture for connecting PCS ing LAN. It defines both the types of network cables to be employed and the signal levels anj bandwidth used inthe network. The standard provides 3 high-speed transmission at an economia, Price and presently isthe best network choice. It consists of two components called CSMA/CD ag csua discussed below wreeeesatot ]| Ethernet and the Carrier Sense Multiple Access scheme (CSMA): ich node can Each Ethernet NIU has a unique 48-bit physical address called MAC address (Medis Access access the Control address), pre-assigned to it during manufacture, When a node transmits a message onthe Vents || Ser tag MU message ves al dev an all sos comes ey Htanecaate during | | RetWOFK Copy the message. Each station then checks the destination address of the message fit communicator, ‘matches the station's MAC address then it accepts the message. ‘An Ethernet network ean have up to 1024 nodes on a single segment, Out of these, only one node | can transmit ata given time. Since all stations have equal rights to transmit data, any station can ‘transmit at any time. This may lead to data collisions, when the two transmitted messages collie. Ethemet uses a media-aceess-control scheme called Carrier Sense Multiple Access or CSMA {to minimise data collisions. It deals with how multiple nodes ean access the common carrier cable. In this scheme, before transmitting data a node senses the carrier to see if itis busy transmiting signals. Ifo, the node waits until the channel becomes idle, and then tries to transmit its data ‘+ Ethernet and the Collision Detection scheme (CD): ‘The CSMA scheme though reduces the possibilities of a col ‘aan othe channel andtherbenarena| | occurrence of one. It may so happen that two nodes listen to the ehannel and find it inactive a thei signals thereby transmit their signals simultaneously. This may lead to data collision. To overcome mn but does not eliminate tbe this, when a colision is detected the communication is stopped and the signals are again fe transmitted with a time gap in between, This mechanism of detecting a collision is called Collision Detection or CD. ‘The combined scheme of media access control and collision detection is referred to as the Carrier Sense Multiple Access with Collision Detection scheme or in short CSMACD schene + The combined CSMA/CD protocol for half-duplex Ethernet transmission: The transmitting device checks forthe presence of a signal in the network. This process is kno¥t as carrier sense. Ifthe channel is found busy, then the device waits and continues to moni! the network until the network is free. When the channel becomes inactive, the station immediatelY begins data transmission and at the same time monitors the channel for a collision, 24.2 48‘Rudiments of Computer Science Local Area Network If a collision is det ted, the transmitting station stops [7 -jananjneEnemmcae transmission and sends a’ 32-bit jam sequence (all bits sarees 1 2.Mate pe tence ete hhaving value of 1) to stop other stations from accepting the data. After that the transmitting stations wait for a random | 3 Lecapnassencn' Toone time period and retransmit their data. The probability of a |. snioe 3 repeated collision is reduced by making the stations wait for | * Gi brdfowcr been Eerat sn Tolan igs. < a random period of time, Ethernet networks come in different standards based on cable type and speed as stated below: ‘+ 10BaseS: This uses a bus topology of LAN and transmits data at 10 Mbps speed over a co-axial cable of $00 m maximum length. The scheme uses baseband transmission technology. * 10Base2: This uses a bus topology of LAN and transmits data at 10 Mbps speed over a co-axial cable of 185 m maximum length, The scheme uses baseband transmission technology. * 10BaseT: This uses star topology of LAN and transmits data at 10 Mbps speed using CATS UTP cable of 100 m maximum length. The scheme uses baseband transmission technology. 100BaseTX: This uses star topology of LAN and transmits data at 100 Mbps using CATS UTP cable of 100 m maximum length. The scheme uses baseband transmission technology. ‘+ 1000BaseT: This uses star topology of LAN and transmits data at 1000 Mbps (1 Gbps) using CATS UTP cable of 100:m maximum length, The scheme uses baseband transmission ‘+ 1OBROAD36: It has data transmission speeds of 1OMbps, uses cable television cable, and can ‘un up to 3600m. Itis called broadband as multiple signals ean be transmitted on the same cable. ‘Token Ring : IEEE 802.5 Standard ‘Token Ring is one of the earliest networking standards developed by IBM in the 1960's. The latest speed of Token Ring is 100Mbps. Token-ring networks are unidirectional unlike Ethemet ‘+ Token Ring Operation: Ina Token Ring network, a 3-byte electronic message called token moves around the network from node to node in a logical ring. To transmit data, anode has to first eapture the free token, It then changes it to a busy token and transits the data, called a frame, immediately after the busy token. This mechanism ensures only one node transmits data at any given time, Each node in the network receives the token as it passes through and ehecks if the message's destination address matches its own address. Ifo, it accepts the message and changes the last ‘two bits of the data frame to inform the source that the data was received. The data then continues. ‘around the ring until it reaches the source node. The busy token is then changed toa free token by the source node and placed on the network for other nodes to transmit their data ‘The use of token mechanism guarantees that only the station in possession of the free token cean transmit data, avoiding possibilty ofa colision Differences between Ethernet and Token Ring Protocols Pn 1._Contention based LAN protocol 1 Token based LAN protocol a 2.__Any node can transmit data 2. Only node possessing avoken can anstit data 3, Data transmitted in all directions from source | 3. Data transmitied in single dteotion fom source ‘4._Data collision present | 4. Data collision i absent 5. E,g: Bthemet 10Base2, 10BaseT et. 7 2.4.3 & Different Ethernet Standards i cae f= ae =a oe a — cn ara jee (Baas Token Ring Standard between Ethernet Token Ring| network from any location inside the organisation without a Part 2: Chapter & CEM TIOIe Wireless LAN or WLAN helps users access an organisation’ 1 Whats 2 wes LAN? lps ees an organisation's (QQ 2 Siseary wo avataps ct vies wa 2 physical connection to a network. + Layout: Each computer in the network has @ wireless NIU and can communicate with every ‘ther computer as long as they are in the range of each other. Multiple Access Points can be provided to connect the wireless LAN clients to the wired LAN. ‘+ Transmission Media: Two types of technology are used to transmit information in WLAN, ‘These ate Infrared Technology (IR) and Radio Frequency Technology (RF). IR technology ig suitable for an indoor LAN, while Radio Frequency technology is suitable for operation across ‘opaquelsolid walls * Advantages: * Wireless LAN components ina business can allow mobile employees such as sales people ty remain connected to the company LAN regardless of where they are. ‘+ In hospitals, doctors and nurses can use WLAN facilites to access patient's files from any site in the hospital ‘+ WLAN can also be used in situations where pulling eable for wired network is not possible ot feasible as in older or historic buildings, or in leased office space Ere ens Ina large organisation, there are several departments doing different types of work. For example an engineering firm may have an engineering group, a purchase group, a sales group etc. and ‘moreover these departments may be distributed over different floors of the building. Again a large university may have different departments, based on the different subjects taught and research done. To put all the different workgroups together one can simply put them on the same LAN cable and let them communicate and interact with each other as and when required. This is called a Flat Network. As long as there are a small number of computers connected in this fashion, this may not pose any problem. But the disadvantage with this type of arrangement is that a. Reduced Bandwidth: It quickly uses the limited bandwidth of the LAN cable. Thus, 1 100Mbps Ethemet network will be able to handle a maximum of 10 nodes only if each node bas to have a bandwidth of 1OMbps. ». Increased Collision: It is unnecessary to load the LAN cable serving one department with all the network traffic generated in another department, only because users may sometimes need 10 use some files from the other department, Unnecessary network traffic eauses more collisions and hence will slow down the network performance | Due to the above reasons, it is useful to separate the different workgroups based on their nature of work into several different LAN segments. To maintain connectivity between these sections, they can then be linked with special hardware devices, which have the ability to select and transmit signals meant for specific LAN groups. ‘Thus, messages meant for particular work | group members who share common interests and form the majority of LAN traffic for a particular section, will not pass to the other workgroups. Only those messages, which need to be shared between different work groups (and which are fewer in number the other segment by the in 50udiments of Computer Science This will prevent unnecessarily clogging of the cables and help Proper utilisation of the available bandwidth. The figure shown in the last page indicates the general idea, The two LAN sections LANI and LAN2 located in functionally different locations are connected via an intelligent device. Repeater A repeater is a physical layer device. When transmission lines run over long distances, data signals may get weaker. A repeater is a two-port “tsa TAN segment-2 device that is used to amplify a signal while it travels. ‘across @ network. It has no data filtering capability and is used to simply extend a LAN segment, For example, for a 10BaseS Ethemet network, a maximum length of up to 2,460 m is possible using repeaters, witha total of 300 nodes on a whole, Hub! ‘Ahhub isa physical layer device that provides a common connection point for network devices ina star topology. These are almost obsolete now and replaced by network switches. Hubs are available with 4,8, 16, or 24 ports. Usually, UTP eables of up to 100m length are used to connect the nodes tothe hub. Hubs receive and transmit any data packet they receive over one port to all the remaining ports in the network. It is a passive device and simply forwards the signal without any amplification, However, in case of a faulty connection a hub detects the error and disconnects the faulty node. Without data filtering capability, a network tends to slow down with increase in number of nodes. | Bridge ALLAN bridge is a data-link layer device that consists of two or more ports, where each port connects to a different LAN segment under the same network. It is an active device with data filtering capability and LAN segment LAN enfant 2 selectively passes data signals between two ports. However, the network bandwidth gets shared between the nodes in a given LAN segment. Working of a Bridge: Bridges work by checking the MAC address of the source and destination nodes during @ communication. When a dita packet from a node reaches the bridge, it checks if the source and destination address of the data packet are in the same LAN segment. If so, the data packet is not forwarded across the bridge to another LAN segment. However, ifthe destination node address is on another LAN segment, the bridge forwards the data packet to that segment. In this way bridges filter network data from both segments and thereby reduce data collisions. A bridge works by building ‘an address-table called a bridge table to decide which messages to pass and which to restrict. ‘Switch ALLAN switeh is @ data-link layer device similar to a multi-port bridge and has data filtering capability. Unlike bridges, which | usually connect two LAN segments, switches connect individual ‘nodes under the same network, like a hub. | ots Pon? Pond Port | 517 Part 2: Chapter 4 Ina bridge, all the nodes ina given LAN segment share the network bandwidth, reducing the networ speed. However, in a switch only the communicating nodes share the network bandwidth, | resulting in faster communication, Hence, a switch is faster than a bridge. Working of a Switch: A switch makes a temporary connection between the source bE 2 and the destination ports based on the MAC address ofthese Computer nodes. It then forwards data packets from the source to the Gextnatlon port only anrintstheconnecton when he oq transfer is over. For doing this, the switch uses a switching Compter matrix to rapidly connect and disconnect the ports. The ea diagram on the right shows how the two ports | and 4 are temporarily connected through the switching matrix to transfer data between the connected nodes. Oe | Router etworn- [pH Router | Apart from the physical MAC address, a node in a Router siven network can have a logical address called the IP address It determines the network to which the node is connected. A router isa network layer device used to connect two different networks and works using the network address or IP address ofa node Network.2 ie Cannot CANNebwork2 > saterisanetwork| | Routers can do data filtering based on the IP addresses of the communicating nodes. They can ‘yordnvee cette || also choose the best route for a data packet rom the source network tothe destination network and vs ne ficiently contol network traffic ert nts : tinetetwnts 1) Working of « Rooter: snewore assess | | Whereas switches can only examine and forward packets based IP address of anode | on the MAC address, routers make data forwarding decisions bused on «packet's source and destination IP address. When 2 data packet from a computer reaches the router, itcheck for the location of the destination node by checking the destination vertmtaie || Mae address of eda packet usog is revting table, A rowing abe is |) outing table is used to determine the port number for the IP Seportumpertr || address ofthe data packet to be forwarded te adress || 1¢ he destination is in the same network asthe Source, then i is not forwarded to another jsp network, Otherwise, the router checks the wtwork 10 which the destination address belongs aol forwards the data packet to that particular network. In case of multiple paths to the destination, the router finds the best posible path and forwards the data packet tothe next router along that path ‘Gateway The term Gateway is used to describe @ broad category of network interconnecting devices like router, firewall, server etc. that act as a gate between two networks. These normally act a translators between two networks running totaly incompatible communication protocols (like ‘TCP/IP and IBM's SNA). Ifthe destination newwork differs in protocol standards, a gateway can be used to repackage and sometimes convert the data to suit the destination network. The sifferett uses of gateways are: 1 How dos nce ich Rn 2 vrata oe? 2 ow oer rose tcton? 3 {hats ute abe? ‘ 5 ate of adios dos ae 6 ats gene? 7. Wai delat tera”? + Default Gateways: Some networks can have multiple routers that lead wo other networks ‘Amongst these, one ofthe routers can be selected to serve as the primary path to other networks like the Intemet, This router is called the Default Gateway. P2468 52mona A share messages, 2 Sonn roe bee bp Firewalls: Gateways also serve as Firewalls, which allow 1c Tien eemn nent internal network userstoaccessthe Internet, while blocks the | gens 2 Internet users from accessing the itera nctwork E-mail gateways translate mesrages from one vendor's messoging application (0 Another's so that users with different e-mail applications ean Local Area Network Dees * 2 Gime dence btoun ae Proxy Servers: Gateways may act as proxy servers. These make copies of incoming, and ‘outgoing data packets and then forward thom, instead of passing the packets as Differences between Repeater and Hub Repeater has two ports, One for incoming signal “and another forthe boosted outgoing signal [and ean have 810 24 ports Differences between Hub and Switeh a the. = == ‘model an Used to connect nodes na LAN Star topology than two signals ‘Works inthe Data-Link Layer of OSI mode! Does not have any data filtering capability 2 Does have data filtering capabiliy D 3. Does not require MAC address of nodes. z Uses MAC address of nodes to filter data ee Used to extend a LAN, Differences between Repeater and Bridge 1_Used to separate Wo LAN segments. Es 2. No data filtering takes place across a repeater 3. Does not require MAC address of nodes. 3 Uses MAC adress of odes oe data Differences between ca The network bandwidth gets divided between, |__- the computers in a given LAN segment 3 4 ‘Slower in operation [Eo No switching operation is present ina bridge. | Differences between co 1 Connects two LAN segments in same network 2. Works in the Data-Link layer of OS model _ 3. Functions based on MAC address. Transfers data based on the por information in | the bridge table. [LA switch connects two nodes in a LAN. [2 Works in the Data-Link layer of OSI model [3.0 No translation of data format takes place, Differences between Switch and ( Packet format is not changed. Bridge and Switch Bridge and Router routing table an The full network bandwidth is used for the ‘communicating nodes. AN bridge, Fast-switching mati is used wo connect nodes, Router soni ‘Connect two different LAN networks. yer of OSI model Functions based on IP dks, ‘Transfers data based on the port in 28-7 53 Difference biw Repeater & Hub a Difference biw Hub & Switch a Difference biw Repeater & Bridge a itference bw Bridge & Switch a Difference biw Bridge & Router, a Difference biw Switch & GatewayPart 2: Chapter 4 oe Difference biw Differences between Router and Gateway Router ere Router & Gateway | |_|. Arouterconnectstwo differen LANs | 1, A gateway connects to dissimilar networks, | [72 Works inthe Network layer of OSI model, | 2. Works i the Application layer of OSI model 3._No tarsiation of data format takes place, | 3.—Transltion of data format canbe handled “Packet format snot changed. Packet formats changed. General rules for using Repeaters, Bridges, Switches and Routers: 0/1 some genera desion us for using repeaters, edges, svitches, and routers re given below 80720 Rule [Mnaghernetvon ||" 80/20 Rule: ina given network 80% ofthe network traffic is local. Accordingly, the server which toxotthenetwrk || STs tol the other nodes needs tobe placed inthe segment containing the maximum nodes [tafe is local Hence} | «54-3 Rue: This rule i used for using repeaters to extend networks. As per this, the maximum aa path between two nodes on the network should not be more than 5 segments with 4 repeaters |Gtrernodesneegs || between those segments anda maximum of 3 populated segments tebepeesdinthe || « Fora few computers use «hub to connect them. If there are different LAN segments ina networ Lope peed inte || + Fora few computers use a hub to connect them. I there are diferent LAN segmer work, then use a bridge to filter data across the segments. If number of nodes increase to 40% of full capacity, then use a switch to increase speed. To connect two different networks which may run ‘two different protocols a router isto be used. eis ‘rorkiatons, server; printers and ober nebwork devices are connected overs] inal gonpeph oa Me fle Sur cheat, areal eampes nen wan Lac | Area Network oF LAN ALAN has tanith i the onde of 10-100 Mbps + Themain objective of Media Access Conrl scheme sto liinae data collisions + Etheme isthe mos popular LAN protocol sanded andthe ist LAN architecture for conecing PCS foferm a Lac! Are Newer + Media Access Control shane used by Ethernet isclled Carrier Sense Muliple Access or CSMA + Thecombined scheme of mais aces conel ad collision detonated by Elena refered | {the Curr Seoe Maple Acces with Colson Detston scheme ori soon CSMAICD. | + Tradonlly Ethernet was used oer thick coal abla ealled 10BaseS using Bus Topology + Later standard of Etter! was based on hin conta abe also called 0Bse? using Bus Topology |_| + one atthe mos popular present day Ethernet standards ls the 10BaseT where T denotes twisted pair tcan eter ve shielded Twisted Par (UTP) or Sheed Twisted Pat (STP) cables’ + Token Ring ison ofthe eniest networking standards induced by IBM inthe 1960s | | = tntoken ring architecture only one network node can send information ata given time, Devices | |* Ga MGarStg ncteor cso transmit only if they have the token, Shick na apcen | Saye electron menage and ls pssed from node to mode maving around ins aga ag + Orin Shelded Twisted Pur (STP) cables were recommended fr taken ree’ mocleons Presenlynew ken ing networks an we CaS UTP cabling + Wireless LAN or WLAN technology enables users to aces an organisations network from any Ibction lade he organkationwhout any phyca connection tothe egualentonte ener ach comput inthe sles network has a vtelss NIC and can commutiens with rey ote Compllras longs they aren iherange ofeach ober + Asclsions an occr in an Ethernet network more te numberof devices ina particular LAN mnre vil be the sumber of collsons However, i the whale LAN ls died Inc sect segmens uring opele devices hen cach egmen canbe mde o handle trader oreo inthat segment nly | the maximum nodes 2-48 EtRudiments of Computer Science Local Area Network + Switches operate based on the physical address or MAC address of the different nodes + Routers are more complex and expensive devices than hubs, bridges or switches. Routers separate ‘+ A Router is concerned with the network or logical address (IP or IPX address) of a device + A Gateway describes a broad category of LAN connecting devices. It basically act asa translator * Gateways also serve as Firewalls, which are devices that allow internal network users to access | + Gat servers make copies ofthe incoming and outgoing data packets and forward them tothe other side Qu 2. ‘+A Bridge is used to connect differen network segments together, while passing only certain specified ‘+ Bridges operate based on the physical address or MAC address of the different nodes ‘+ ALLAN Switch is similar to a multi-port Bridge, and can be used to link computers or several LAN When transmibsion lines ron over Tong dstnse, the signal tends to weaken oF attenuate] repeater is basically used to boost or amp‘ify a signal while it travels across a network traffic between them. Hence these work as data filtering devices segments. Whereas Bridges usually connect two network segments, switches on the other hand are used to connect single computers jus ike a network hub, and sometimes anather hub or switch networks into distinct network segments or broadcast areas where networks on either side ofa router ‘maintain their own broadcast and collision domains between two networks running fully incompatible communication protocols (ike TCPAP & IBM's SNA) the internet, while blocks the Internet users from accessing the jetwork ays may also act as proxy servers which handle network traffic in and out ofa network. These Fill in the blanks: (Leach) i) Full form of LANis | ii) MAC stands for | iif) A 3-byte electronic message that circulates in a ring topology network is called a | iv) The main objective of a Media Access Control scheme isto eliminate data | ¥) The full form of CSMA is - a | vi) The CSMA/ mechanism is used in a wired Ethernet network. | Multiple Choice Questions. Select 1 correct option from the 4 options. (each) i) When several workstations, servers, printers and other network devices are connected over | ‘a small geographic area its known as a: i a.MAN b. WAN ©. LAN 4.CAN | ii) The main objective of a Media Access Control scheme in a LAN is to: | a. Find the address of a computer b. Establish connection between two nodes | ©. Check for a connection 4. Eliminate data collisions iii) The most popular LAN protocol standard is: a. Token Ring b. PPP . Bthernet a. TCPAP: iv) Ethernet protocol transfers data across the physical media in a LAN depending upon the: a [Padres b.RAMaddress c. MAC address. ROM address. \)__ An Ethernet network ean have up to how many nodes on a single segment? a.512nodes b.1024 nodes ——_c. 2048 nodes 4. 4096 nodes vi) The Media Access Control scheme used by Ethernet is called: 4. Carrier Sense Media Access b. Carrier Source Multiple Access «Carrier Sense Multiple Assistance d, Carrier Sense Multiple Access vii) The process of detecting a data collision in Ethernet is called scheme. Malton inition b. Collision Detection «. Collision Inhibition 4. Collision Resolution 2.4.9 55Part 2: Chapter 4 sii) ix) x) xi) xii) xiii) xi) x) xvi) xvii) xviii) xii) 24-10 Ifa collision is detected in Ethemet protocol scheme. the transmitting station stops sending the data frame and sends a: a. S-bit jam sequence b. 16-bit jam sequence 4 64-bit jam sequence 1OBase5 bus topology of LAN transmits data over a co-axial cable of maximum length: a 18Smeter——_b. 200 meter ©. 500 meter 4. 100 meter 1OBase2 bus topology of LAN transmits data over a co-axial cable of maximum length a 18Smeter——b. 200 meter ©. $00 meter 4.100 meter 1OBaseT star topology of LAN transmits data using CATS UTP eable of maximum length: a 18Smeter ——b. 200 meter €. 500 meter 4.100 meter Devices in a token ring network can transmit data only if they have @ special 3-byie electronic message called a: a. Check b. Token c. Baton, @. Ring Ina token ring network, after five token is captured by a node itis converted to: active token —_b. used token c.empty token d. busy token ‘The media access control scheme used by a Token Ring network ensures that: 2. All stations can transmit data simultaneously b. A station in possession of the free token can transmit data only ¢. Only two stations can transmit data simultaneously 4. A station can start transmitting data once another station has received the data ‘These can help connect a wireless LAN client to a wired LAN in a wireless network: a. NICs b. Access Points ¢. LAN cards 4. Tokens Which of the following devices cannot be used for filtering data across network segments? a. Bridge ». Router c. Repeater 4. Switch Which of the following devices is used to amplify signal while it travels across a network? 2. Bridge b. Router . Repeater 4. Switch Which of the following devices is used to basically extend a LAN? a. Bridge b. Router c. Repeater 4. Switch Which of the following statements is incorrect for a bridge when used in a LAN? 1. Bridges can be used to join LAN segments with dissimilar media b. A Bridge consists of two or more ports ¢. Bridges can be used to filter data based on the IP address of the data packet 4. Bridges can be used to join LAN segments with dissimilar MAC schemes ALLAN Switch is similar to a: a multi-port hub b. multi-port router. multi-port bridged. multi-port repeater ‘Switches operate based on the of the different nodes: a. Local address b. IP address c. Network address d. MAC address Which of the following statements is incorrect for a Switch as used ina LAN? a. Each port in a switch can connect to a single computer b. Switches are generally used with Ethernet LANs . The full bandwidth of the network is available during a communication using a swite® . Switches divide the bandwidth of the network equally among the network nodes ALLAN switch consists of a that can rapidly connect and disconnect port, a switch board b. switching matrix c. switching gear d, switch segments‘Rudiments of Computer Science Loca Area Network xxiv) Apart from the physical MAC address, a computer in a given network can also have a 4. virtual address b. mechanical address c. logical address d. hypothetical address xxv) A Router works using the network or __ address of a device. 2. virwal ». roaming physical 4. logical xvi) Which of the following statements is incorrect for a Router when used in a network? 4. Routers provide detailed filters based on the source and destination network ', Routers forward data based on the data's source and destination network address «: Routers use the MAC address of a network card to take data forwarding decisions 4. Routers use a routing able for forwarding data packets xxvii) A Gateway acts as a_ between two networks running incompatible ‘communication protocols a filer switch «. connector 4. translator Q3. Short Answer type questions: Veach | ') State any one important characteristic of a LAN. ii) What isthe main purpose of a media access control scheme in a LAN? | iii) Name the most widely used LAN protocol iv) Write the full form of CSMA with connection to a LAN. Y) State isthe purpose of using Ethernet protocol? vi) _ State the purpose of using the collision detection scheme in Ethemet protocol? ‘Write the names of any two implementation schemes of Ethernet protocol, Vili) What isthe maximum cable length used for a 10BaseT network? ix) What isa token in a Token Ring network? ¥)_ What do you mean by a busy token in a Token Ring network? xi) What is the use of a repeater in a network? xii) What isthe use ofa bridge in a LAN? xiii) What isa bridge table? xiv) State one difference between a repeater and a bridge. xv) What type of address is used by a bridge for data filtering? xvi) What is the use of a switch in a LAN? xvii) State one advantage of using a switch over a bridge in @ LAN. | xviii) State one difference between a bridge and a switch xix) What isthe use ofa router in a computer network? xx) _ State one difference between a bridge and a router. xxi) What is the purpose of a routing table ina network? xxii) State one use of a gateway in a computer network. Q4. Long Answer type questions: Teach i) State any four important characteristics of a LAN. What do you mean by the term “data, collision’ with respect to transmission in a LAN? An Ethernet network can accommodate how many nodes in a single segment? 4e2¢1 ii) Explain the working of the Ethemet communication protocol. Name any one Ethernet ‘cabling scheme. 6+ iii) Explain the meaning of the terms CSMA and CD in connection with Ethernet protocol, What is a token? _ 3341 PaattPart 2: Chapter 4 iv) Explain the working of the Token Ring communication protocol. What is the maximum single cable length used for a 10BaseT Ethernet network? orl |v). State four differences between the Ethernet and Token Ring protocol schemes. What is the use ofa token in a Token Ring Network? Name one Ethernet cabling scheme. 42+1 vi) Write a short note on the working of a bridge in a computer network, State any two differences between a bridge and a repeater. What isthe use of a router? 4e2H1 vii) Write a short note on the working of a switch in a computer network. State any two | differences between a bridge and a switeh, What isthe use of a gateway? 4241 | viii) Write a short note on the working of a router in a computer network. State any two differences between a bridge and a router. What is the use of a repeater? 4241 ix) State the significance of the 80-20 rule & 5-4-3 rule for network design. When do you need | to use a switch instead of a bridge to connect nodes in a network? State one use of a gateway. 2224 | SUR CEE Meester e ke tet BM |) Write short note on Router (H.S. 2020] Ans: Pg: P2-4-6 (2) ii) Write short note on Repeater. [H.S. 2019] Ans: Pg: P2-4-5 (2) | ii) The most popular LAN protocol is [HS. 2019] Ans: Pg: P2-4-2 (1) let erro em ere nee tracer | iv) Which of the following devices is basically used to extend a LAN: | [HS. 2019] Ans: Pg: P2-4-5 (1) | (a) Brig, (b)Router ——_(c) Repeater (4) Switch |v) Which of the following network device is used to give direction to any data packet to reach its destination? [H.S. 2017] Ans: Pg: P2-4-6 (1) (a) Hub (b) Repeater (c) Router (4) Bridge | vi) Write down the full form of CSMA / CD. [HLS.2017, 2015] Ans: Pg: P2-4-2 (1) | vii) What is the fumetion of Gateway? {H.S, 2017] Ans P2-4-6(1) ili) What isthe function of Repeater? {HLS. 2017] Ams: Pg: P2-4-5 (1) ix) Write down nwo functions of Router. (HS. 2014] Ans: Pg: P2-4-6 (1+1) xi) Write down two differences between Hub and Switch, (H.S. 2014) Ans: Pg: P2-4-7 (1+1) xii) What are repeater and hub? Differentiate between them. (HS. 2013] Ans: Pg: P2-4-5, Pg: P2-4-7 (2+2) Xx) What is 10baseT? (HS. 2013] Ans: Pg: P2-43 2) xiii) _ Write short notes on the following: i) Gateway i) Bridge (HS. 2012] Ans: Pg P2-4-6, Pg: P2-4-5 (3+3) | xiv) Explain the functions of the following devices: | i)Switeh ii) Router (HS. 2011] Ans: Pg: P2-4-5, Pg: P2-4-6 (2+2) 58
You might also like
Ethernet: 1.0 Abstract
PDF
No ratings yet
Ethernet: 1.0 Abstract
11 pages
MAC2
PDF
No ratings yet
MAC2
36 pages
Lec 2 LAN Technologies
PDF
No ratings yet
Lec 2 LAN Technologies
46 pages
Local Area Networks: 7.1 Objectives
PDF
No ratings yet
Local Area Networks: 7.1 Objectives
66 pages
Unit 3 Comp
PDF
No ratings yet
Unit 3 Comp
18 pages
Computer Networks - Shared Media Access
PDF
No ratings yet
Computer Networks - Shared Media Access
115 pages
1.wired LAN
PDF
No ratings yet
1.wired LAN
43 pages
ComputerNetworks Chapter19
PDF
No ratings yet
ComputerNetworks Chapter19
23 pages
Bec613a MMC Module 5
PDF
No ratings yet
Bec613a MMC Module 5
72 pages
A Set of Network Standards Developed by The IEEE. They Include
PDF
No ratings yet
A Set of Network Standards Developed by The IEEE. They Include
19 pages
Ethernet
PDF
No ratings yet
Ethernet
6 pages
Unit 2 Topic 11-12 IEEE 802.3,802.4,802.5
PDF
No ratings yet
Unit 2 Topic 11-12 IEEE 802.3,802.4,802.5
68 pages
DC 3 TVR
PDF
No ratings yet
DC 3 TVR
28 pages
ch-4 More
PDF
No ratings yet
ch-4 More
146 pages
Lec 03 Data Link Control
PDF
No ratings yet
Lec 03 Data Link Control
22 pages
Ethernet & IEEE Standards: Lecture-9
PDF
No ratings yet
Ethernet & IEEE Standards: Lecture-9
47 pages
Ethernet Networking
PDF
No ratings yet
Ethernet Networking
5 pages
Local Area Networks (LAN) : - Sharing Transmission Media by Computers
PDF
No ratings yet
Local Area Networks (LAN) : - Sharing Transmission Media by Computers
23 pages
Cpe 490 Information System P Y Engineering I: Prof. Hong Man
PDF
No ratings yet
Cpe 490 Information System P Y Engineering I: Prof. Hong Man
31 pages
IEEE 802.3 Standard
PDF
No ratings yet
IEEE 802.3 Standard
111 pages
03 Lan, Wan, Man
PDF
No ratings yet
03 Lan, Wan, Man
110 pages
Local Area Networks Part I
PDF
No ratings yet
Local Area Networks Part I
33 pages
Chapter 4 vN.2
PDF
No ratings yet
Chapter 4 vN.2
29 pages
T8 Ethernet
PDF
No ratings yet
T8 Ethernet
51 pages
LAN (Local Area Network) :: (CITATION Jam10 /L 2057)
PDF
No ratings yet
LAN (Local Area Network) :: (CITATION Jam10 /L 2057)
33 pages
Computer Networks Computer Networks: Taiz University, 2021 Taiz University, 2021
PDF
No ratings yet
Computer Networks Computer Networks: Taiz University, 2021 Taiz University, 2021
54 pages
What Is Ethernet
PDF
No ratings yet
What Is Ethernet
3 pages
Network Sizes and IEEE 802.X Standards
PDF
No ratings yet
Network Sizes and IEEE 802.X Standards
28 pages
Introduction To LAN Protocols PDF
PDF
No ratings yet
Introduction To LAN Protocols PDF
7 pages
Chapter Ethernet
PDF
No ratings yet
Chapter Ethernet
46 pages
Ee 122: Ethernet: Ion Stoica Tas: Junda Liu, DK Moon, David Zats
PDF
No ratings yet
Ee 122: Ethernet: Ion Stoica Tas: Junda Liu, DK Moon, David Zats
39 pages
Introduction To LAN Protocols
PDF
100% (2)
Introduction To LAN Protocols
20 pages
Ch04-Communication Networks
PDF
No ratings yet
Ch04-Communication Networks
80 pages
Chap 5
PDF
No ratings yet
Chap 5
28 pages
Ethernet
PDF
No ratings yet
Ethernet
24 pages
Module 5
PDF
No ratings yet
Module 5
22 pages
Example Netwrkks and Ethernet
PDF
No ratings yet
Example Netwrkks and Ethernet
32 pages
Ethernet: Outline Multiple Access and Ethernet Ethernet Framing CSMA/CD Protocol
PDF
No ratings yet
Ethernet: Outline Multiple Access and Ethernet Ethernet Framing CSMA/CD Protocol
25 pages
Computer Network - Chapter 6
PDF
No ratings yet
Computer Network - Chapter 6
13 pages
Carrier and Traditional Ethernet
PDF
No ratings yet
Carrier and Traditional Ethernet
6 pages
1.1 Ethernet
PDF
No ratings yet
1.1 Ethernet
55 pages
Unit - Iii - PPT-3 Mca-20-14
PDF
No ratings yet
Unit - Iii - PPT-3 Mca-20-14
55 pages
Ethernet: Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD Protocol Exponential Backoff
PDF
No ratings yet
Ethernet: Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD Protocol Exponential Backoff
25 pages
LAN Technologies
PDF
No ratings yet
LAN Technologies
4 pages
ACN - Unit - 1
PDF
No ratings yet
ACN - Unit - 1
46 pages
Local and Wide Area Networks: 5.1. LAN Topologies (Bus, Ring, Star)
PDF
No ratings yet
Local and Wide Area Networks: 5.1. LAN Topologies (Bus, Ring, Star)
54 pages
Ethernet: Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD Protocol Exponential Backoff
PDF
No ratings yet
Ethernet: Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD Protocol Exponential Backoff
25 pages
03 Lan, Wan, Man
PDF
No ratings yet
03 Lan, Wan, Man
122 pages
Ethernet: Oakton Community College CIS 238
PDF
No ratings yet
Ethernet: Oakton Community College CIS 238
16 pages
Local Area Networks: Lans Are Designed To
PDF
No ratings yet
Local Area Networks: Lans Are Designed To
73 pages
Physical and Data Link Layers (1 & 2) : Ethernet (Network Interfce Card)
PDF
No ratings yet
Physical and Data Link Layers (1 & 2) : Ethernet (Network Interfce Card)
50 pages
IT200 Computer Communication and Networking Session 4 - Ethernet and IEEE Standards
PDF
No ratings yet
IT200 Computer Communication and Networking Session 4 - Ethernet and IEEE Standards
26 pages
OSI Model:: Application Cisco
PDF
No ratings yet
OSI Model:: Application Cisco
16 pages
Network. Fall 2024 Lec. 8
PDF
No ratings yet
Network. Fall 2024 Lec. 8
57 pages
Standards and Network Protocols: M.C. Juan Carlos Olivares Rojas
PDF
No ratings yet
Standards and Network Protocols: M.C. Juan Carlos Olivares Rojas
109 pages
Media and Topologies Part 1: Star Hierarchical or Cascading Star
PDF
No ratings yet
Media and Topologies Part 1: Star Hierarchical or Cascading Star
35 pages
Switching Concepts
PDF
No ratings yet
Switching Concepts
95 pages
Class 10 Computer Notes
PDF
No ratings yet
Class 10 Computer Notes
163 pages
Class 10 Mathematics Specimen
PDF
No ratings yet
Class 10 Mathematics Specimen
11 pages
Class 10 Computer Solved 4-7
PDF
No ratings yet
Class 10 Computer Solved 4-7
56 pages
Class 10 Computer Solved 1-3
PDF
No ratings yet
Class 10 Computer Solved 1-3
45 pages
CH 6. Networking
PDF
No ratings yet
CH 6. Networking
22 pages
Class 10 Computer Specimen
PDF
No ratings yet
Class 10 Computer Specimen
15 pages
CH 1. Networking
PDF
No ratings yet
CH 1. Networking
20 pages
CH 7. HTML
PDF
No ratings yet
CH 7. HTML
30 pages
CH 2. Networking
PDF
No ratings yet
CH 2. Networking
14 pages
CH 5. Networking
PDF
No ratings yet
CH 5. Networking
24 pages
CH 3. Networking
PDF
No ratings yet
CH 3. Networking
12 pages