CCN - I Unit
CCN - I Unit
UNIT-I
2 MARK QUESTIONS:
1. Define computer network.
Ans: A computer network is a set of computers sharing resources located on or provided by
network nodes. The computers use common communication protocols over digital
interconnections to communicate with each other.
The OSI model was developed first, and then The protocols were created first and
protocols were created to fit the network then built the TCP/IP model.
architecture’s needs.
The smallest size of the OSI header is 5 bytes. The smallest size of the TCP/IP header
is 20 bytes.
i. Business Applications:
• Resource Sharing: The goal is to make all programs, equipment (like printers etc), and
especially data, available to anyone on the network without regard to the physical
location of the resource and the user.
• Server-Client model: One can imagine a company's information system as consisting of
one or more databases and some employees who need to access it remotely. In this
model, the data is stored on powerful computers called Servers. Often these are centrally
housed and maintained by a system administrator. In contrast, the employees have
simple machines, called Clients, on their desks, using which they access remote data.
• Communication Medium: A computer network can provide a powerful communication
medium among employees. Virtually every company that has two or more computers
now has e-mail (electronic mail), which employees generally use for a great deal of daily
communication.
• eCommerce: A goal that is starting to become more important in businesses is doing
business with consumers over the Internet. Airlines, bookstores and music vendors have
discovered that many customers like the convenience of shopping from home. This
sector is expected to grow quickly in the future.
The most popular forms are listed in the below figure:
ii. Home Applications:
➢ Access to remove information.
➢ Person to person communication
➢ Interactive entertainment and electronic commerce
Here are the usage of computer network in home application:
1. Internet Connectivity:
Without computer network at home , home user are unable to serve the internet
Computer network provides internet access to have users with remote computer
connection similar to the network use at companies
A user at home can access and interact with information from other people in a different
place , place an order by online and buy products and services with e-commerce
2. Electronic News:
Many newspaper companies have turn part of their work into online- based system.
Eg:- It is sometimes possible to tell newspaper that you have everything correction big
fires, scandals involving celebrities epidemics and also possible to have the elected article
for downloading to your computer.
3. Peer to peer communication:
It is a popular model for accessing information similar to a client –server model that allow
each individual form of a loose growth and communicate with one another
4. Electronic Mailing System:
E-mail is used by millions of people all over the world on a daily basis and its usage is
growing rapidly. The attachment in the e-mail system allows the transfer of text files,
computer file programs, audio, video and other important computer files.
5. Social Networking :
Both adults and teenagers have become addicted to instant messaging.
Social networking application allows sharing of information b/w person to person and
also let people to build strong relationship on the internet one of the most popular site is
facebook , instagram, WhatsApp etc.
6. Internet of things :
Now a day, many consumers’ electronic devices are networked. For example, a person with a
camera that has a wireless network is capable of sending photos to a nearby display for
viewing or storage on the internet through the aid of network.
7. E-commerce:
A computer network allows home shopping enables users to inspect online catalogues from
thousands of companies. Some of these catalogues are interactive showing products from
different view point and personalize configuration.
8. Security system:
A technology called RFID (Radio Frequency Identification ) locates and communication with
items over a distance of up-to several meters RFID tags have no battery and their chips (micro-
controller) have the size of stamp they can be attached to books, passport ,pets ,credit card and
other items at home.
i. Mobile user: Mobile computers, such as laptop and handheld computers, are one of the
fastest-growing segments of the computer industry. Their sales have already overtaken those of
desktop computers. People on the go often want to use their mobile devices to read and send
email, tweet, watch movies, download music, play games, or simply to surf the Web for
information. They want to do all of the things they do at home and in the office. Naturally, they
want to do them from anywhere on land, sea or in the air.
1. Connectivity: the Internet enables many of these mobile uses. Since having a wired
connection is impossible in cars, boats, and airplanes, there is a lot of interest in wireless
networks. Cellular networks operated by the telephone companies are one familiar kind of
wireless network that blankets us with coverage for mobile phones.
2. Wireless hotspots: They are another kind of wireless network for mobile computers. They
have sprung up everywhere that people go, resulting in a patchwork of coverage at cafes,
hotels, airports, schools, trains and planes. Anyone with a laptop computer and a wireless
modem can just turn on their computer on and be connected to the Internet through the
hotspot, as though the computer were plugged into a wired network. Wireless networks are of
great value to fleets of trucks, taxis, delivery vehicles, and repairpersons for keeping in
contact with their home base
3. Short Message Service: It is very profitable since it costs the carrier but a tiny fraction of
one cent to relay a text message, a service for which they charge far more. The long-awaited
convergence of telephones and the Internet has finally arrived, and it will accelerate the
growth of mobile applications.
4. M-commerce: Short text messages from the mobile are used to authorize payments for food
in vending machines, movie tickets, and other small items instead of cash and credit cards.
The charge then appears on the mobile phone bill.
ii. Social issues: The widespread introduction of networking has introduced new social, ethical,
and political problems. A popular feature of many networks are newsgroups or bulletin boards
whereby people can exchange messages with like-minded individuals. As long as the subjects
are restricted to technical topics or hobbies like gardening, not too many problems will arise.
The trouble comes when newsgroups are set up on topics that people actually care about, like
politics, religion, or sex. Views posted to such groups may be deeply offensive to some people.
Furthermore, messages need not be limited to text. High-resolution color photographs and even
short video clips can now easily be transmitted over computer networks. Many people read and
write e-mail at work. Manyemployers have claimed the right to read and possibly censor
employee messages, including messages sent from a home computer after work. Computer
networks offer the potential for sending anonymous messages. In some situations, this
capability may be desirable. For example, it provides a way for students, soldiers, employees,
and citizens to blow the whistle on illegal behavior on the part of professors, officers,
superiors, and politicians without fear of reprisals. Computer networks have also introduced
new kinds of antisocial and criminal behavior. Electronic junk mail (spam) has become a part
of life because people have collected millions of e-mail addresses and sell them on CD-ROMs
to would-be marketers.
ii. MAN (Metropolitan Area Network): is a high-speed network (broadband) that covers
larger geographic area such as city (tens of kilometers) or districts than local area
network (LAN) but smaller than wide area network (WAN) and providing the ability to
integrate multiple services through the transmission of data, voice, and video, on
transmission media such as copper, fiber optics, and microwaves. The term is applied to
the single network such as a cable television network, or it can be a way of connecting a
certain number of LANs in a more extensive network so that resources can share from
LAN to LAN and from device to device.
5. Write a note on WAN.
Ans: A wide area network (WAN) is a computer network that covers a large geographical area
comprising a region, a country, a continent or even the whole world. WAN includes the
technologies to transmit data, image, audio and video information over long distances and among
different LANs and MANs. WANs have a large capacity, connecting a large number of
computers over a large area, and are inherently scalable. Communication links are provided by
public carriers like telephone networks, network providers, cable systems, satellites etc.
Typically, they have low data transfer rate and high propagation delay, i.e.they have low
communication speed.
6. Write a note on LAN.
Ans: LAN (Local Area Network). A LAN is a privately owned network that operates within and
nearby a single building like a home, office or factory. LANs are widely used to connect
personal computers and consumer electronics to let them share resources (e.g., printers) and
exchange information. When LANs are used by companies, they are called enterprise networks.
Wireless LANs are very popular these days, especially in homes, older office buildings,
cafeterias, and other places where it is too much trouble to install cables. In these systems, every
computer has a radio modem and an antenna that it uses to communicate with other computers.
In most cases, each computer talks to a device in the ceiling as shown in Fig. 1-8(a). This device,
called an AP (Access Point), wireless router, or base station, relays packets between the wireless
computers and also between them and the Internet.
The above figure represents communication between Device A and Device B. The data stream
from one device to the other is not sent directly but has to pass through a number of layers. The
layers in the same levels are called peers and have a set of protocols for communication.
Between each adjacent layer is an interface that defines the services that are being offered by a
lower layer to the next higher layer. The dotted arrows depict virtual communication between
peer layers, while the solid arrows represent the physical communications between the adjacent
layers.
Let us consider a situation where Device A wants to send a message to Device B. Device A
passes its information to the highest layer. As soon as a data stream reaches a layer, it performs
some specified functions on it and passes it to the layer below. This continues until the data
stream reaches the lowest layer. Layer 1 passes a bit stream of 0s and 1s to the physical medium
that communicates it to the Layer 1 of the receiving end. Each layer in the receiving end
performs certain functions on the data stream adhering to the protocol with its peer and passes it
to the layer above. This continues until the information reaches the highest layer. The highest
layer then conveys the message to Device B in the same format sent by Device A.
The physical layer, data link layer and the network layer are the network support layers. The
layers manage a physical transfer of data from one device to another. Session layer, presentation
layer, and application layer are the user support layers. These layers allow communication
among unrelated software in dissimilar environments. Transport layer links the two groups.
The main functions of each of the layers are as follows −
• Physical Layer − Its function is to transmit individual bits from one node to
another over a physical medium.
• Data Link Layer − It is responsible for the reliable transfer of data frames from
one node to another connected by the physical layer.
• Network Layer − It manages the delivery of individual data packets from source
to destination through appropriate addressing and routing.
• Transport Layer −It is responsible for delivery of the entire message from the
source host to destination host.
• Session Layer − It establishes sessions between users and offers services like
dialog control and synchronization.
• Presentation Layer − It monitors syntax and semantics of transmitted
information through translation, compression, and encryption.
• Application Layer − It provides high-level APIs (application program interface)
to the users.
12. Explain in brief different layers of TCP/IP reference model.
Ans: TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a set of
conventions or rules and methods that are used to interconnect network devices on the Internet.
The internet protocol suite is commonly known as TCP/IP, as the foundational protocols in the
suite are Transmission Control Protocol and Internet Protocol.
It chooses how the information will be traded over the web through end-to-end
communications that incorporate how the information ought to be organized into bundles
(bundles of data), addressed, sent, and received at the goal.
This communication protocol can also be utilized to interconnect organize devices in a private
network such as an intranet or an extranet. It contains four layers, the layers are:
• Application Layer: An application layer is the topmost layer within the TCP/IP
model. When one application layer protocol needs to communicate with another
application layer, it forwards its information to the transport layer.
• Transport Layer: It is responsible for the reliability, flow control, and correction
of data that is being sent over the network. There are two protocols used in this
layer are User Datagram Protocol and Transmission control protocol.
• Internet/Network Layer: It is the third layer of the TCP/IP Model and also known
as the Network layer. The main responsibility of this layer is to send the packets
from any network, and they arrive at the goal irrespective of the route they take.
• Network Access Layer: It is the lowest layer of the TCP/IP Model. It is the
combination of the Physical Layer and the Data link layer which present in the OSI
Model. Its main responsibility is to the transmission of information over the same
network between two devices.
The OSI model was developed first, and The protocols were created first and then
then protocols were created to fit the built the TCP/IP model.
network architecture’s needs.
The OSI model represents defines It does not mention the services,
administration, interfaces and conventions. interfaces, and protocols.
OSI TCP/IP
The protocols of the OSI model are better The TCP/IP model protocols are not
unseen and can be returned with another hidden, and we cannot fit a new protocol
appropriate protocol quickly. stack in it.
The smallest size of the OSI header is 5 The smallest size of the TCP/IP header is
bytes. 20 bytes.
Protocols are unknown in the OSI model In TCP/IP, returning protocol is not
and are returned while the technology difficult.
modifies.