0% found this document useful (0 votes)
4 views

Computer Networks Lab Manual

The document is a lab manual for a Computer Networks course at Buddha Institute of Technology, detailing various experiments for students to learn networking concepts. It includes objectives and step-by-step instructions for configuring networking hardware, connecting computers and routers, and implementing different routing techniques. The manual is structured to guide students through practical exercises using RJ-45 connectors, CAT-6 cables, and routers.

Uploaded by

bit22it29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Networks Lab Manual

The document is a lab manual for a Computer Networks course at Buddha Institute of Technology, detailing various experiments for students to learn networking concepts. It includes objectives and step-by-step instructions for configuring networking hardware, connecting computers and routers, and implementing different routing techniques. The manual is structured to guide students through practical exercises using RJ-45 connectors, CAT-6 cables, and routers.

Uploaded by

bit22it29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Buddha Institute of Technology

Department of Computer Science & Engineering /


Information Technology

(Affiliated to Dr. A. P. J. Abdul Kalam Technical University, Lucknow)

Computer Networks

LAB MANUAL

VI semester, Course code: BCS 653

Proposed by :

Mr. Abhishek Shahi

1
List of Experiments

1. To learn and implement handling and configuration of networking hardware like RJ-45
connector, CAT-6 cable, crimping tool, etc.(CO-1)
2. Implement and Configure to connect two or more computers using CAT-6 Cable and RJ-
45 Connector, also implement topology (Bus, Ring, star, bus) using switches and run ping
command.(CO-1)
3. Implement and Configure mode of router, password in router and configure serial
interface (IP).(CO-2)
4. Implement and configure to connect more than two computers using one router and
switch and run ping command.(CO-2)
5. Implement and configure to connect two router using default routing.(CO-2)
6. Implement and configure to connect three routers using default routing.(CO-3)
7. Implement and configure to connect two routers using static routing. (CO-3)
8. Implement and configure to connect three routers using dynamic routing (RIP).(C0-4)
9. Implement and configure to connect two routers using dynamic routing (OSPF). (CO-4)
10. Implement and configure Standard Access Control List in router.(CO-4)

2
Program #1

Objective: To learn and implement handling and configuration of networking hardware


like RJ-45 connector, CAT-6 cable, crimping tool, etc.

RJ-45 connector:-
RJ45 is a type of connector commonly used for Ethernet networking. It looks similar to a
telephone jack, but is slightly wider. Since Ethernet cables have an RJ45 connector on each end,
Ethernet cables are sometimes also called RJ45 cables.
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking interface. The
"45" simply refers to the number of the interface standard. Each RJ45 connector has eight pins,
which means an RJ45 cable contains eight separate wires. If you look closely at the end of an
Ethernet cable, you can actually see the eight wires, which are each a different color. Four of
them are solid colors, while the other four are striped.

CAT-6 cable:-
A Cat 6 cable is used mainly for computer networks reaching a Gb, 1000 Mbps or one Gbps of
data transfer speed (DTR) or higher. Characteristics are as follows:
Consists of four pairs of copper wires, which are all utilized for data transfer
Provides bandwidth of 250 MHz, speed up to 10 Gbps and may be stretched to 100 meters in
length
Provides more enhanced crosstalk and attenuation protection than its previous twisted pair
cable versions.

3
Crimping tool:-
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both of them
in a way that causes them to hold each other. The result of the tool's work is called a crimp. A
good example of crimping is the process of affixing a connector to the end of a cable. For
instance, network cables and phone cables are created using a crimping tool (shown below) to
join the RJ-45 and RJ-11 connectors to both ends of either phone or 6 cable.

How to Crimp Rj45

1. Strip the cable back 1 inch (25 mm) from the end.

2. Untwist and straighten the wires inside of the cable.

3. Arrange the wires into the right order.


4
4. Cut the wires into an even line 1⁄2 inch (13 mm) from sheathing.

5. Insert the wires into the RJ-45 connector.

6. Stick the connector into the crimping part of the tool and squeeze twice.

7. Remove the cable from the tool and check that all of the pins are down.

5
Program #2

Objective: Implement and Configure to connect two or more computers using CAT-6
Cable and RJ-45 Connector, also implement topology (Bus, Ring, star, bus) using switches
and run ping command.

Step 1 – Configure IP Addresses


Usually, if you are using a crossover cable to connect two computers, the computers are not
connected to a LAN network. In this case, you will need to configure static IP addresses for each
computer.

You have to make sure that both computers have IP addresses that are on the same subnet. For
example, if you give one computer an IP address of 192.168.0.1, then you should give the
second computer an IP of 192.168.0.2.

6
Step 2 – Crossover Cable or State Cable

The second thing you need to verify is that you actually have a proper crossover cable. Basically,
there are a few different types of crossover cables, but it’s best to get the standard crossover
cable where the green and orange pairs are swapped and the brown and blue pairs stay in the
same position.

The only pins that need to be crossed are 1,3 and 2,6. So just check your cable on both

end and make sure it matches the diagram.

Step 3 – Local User Accounts


If you’re having problems accessing files both ways, you may have to create a user account on
each computer that has the same name and same password. This helps get past any kind of
Access is Denied errors that may pop up.

Make sure the accounts are administrator accounts also! It’s best to create a new account rather
than rename a current account.

7
Step 4 – Disable Firewalls
Finally, you should disable the firewall on both computers to ensure that none of the file
sharing ports are being blocked. You can do this by going to Control Panel and then Windows
Firewall. Click on Off.

That’s about it! If you follow all these steps, each computer should be able to access the other
properly. You can check the connection by opening a command prompt (click on Start and type
in cmd) and trying to ping the other computer. Just type the word ping followed by the IP
address of the other computer.

8
Program #3
Objective: Implement and Configure mode of router, password and IP in router serial
interface.

Mode of Router-
Router> Enable mode –(router enable)
Router# Privilege mode –(Show command running)
Router(config)# Configure mode –(Config router name, password
and ip)

Router(config-if)# Add IP

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: n

9
Press RETURN to get started!

Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp
gkp(config)#enable password bit
gkp(config)#enable secret ccna
gkp(config)#int Fa 0/0
gkp(config-if)#ip add 10.0.0.1 255.0.0.0
gkp(config-if)#no shut

gkp(config-if)#exit
gkp(config)#exit

gkp#show running-config
gkp>enable
Password:
Password:
gkp#

10
Program #4
Objective: Implement and configure to connect more than two computers using one
router and switch and run ping command.

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: n


Press RETURN to get started!

Router>enable
Router#conf t
Router(config)#hostname gkp
gkp(config)#enable password bit
gkp(config)#enable secret ccna
gkp(config)#int Fa 0/0
gkp(config-if)#ip add 10.0.0.1 255.0.0.0
gkp(config-if)#no shut
gkp(config-if)#exit
gkp(config)#int Fa 0/1
gkp(config-if)#ip add 20.0.0.1 255.0.0.0
gkp(config-if)#no shut

11
Program #5

Objective: Implement and configure to connect two router using default routing.

Router-1:
Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 20.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#exit
gkp1(config)#

gkp1(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.2


gkp1(config)#^Z

12
gkp1#

gkp1#wr

Router-2:
Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 30.0.0.1 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#
gkp2(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1
gkp2(config)#^Z
gkp2#

gkp2#wr

13
Program #6
Objective: Implement and configure to connect three routers using default routing.

Router-1:

Router>enable
Router#config
.
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 30.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#

14
gkp1(config-if)#exit
gkp1(config)#

gkp1(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.2


gkp1(config)#^Z
gkp1#
wr

Router-2:

Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 20.0.0.1 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#

gkp2(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1


gkp2(config)#ip route 0.0.0.0 0.0.0.0 20.0.0.2
gkp2(config)#^Z
gkp2#
wr

Router-3:

Router>enable
Router#config
Router(config)#hostname gkp3
gkp3(config)#
gkp3(config)#int fa 0/0
gkp3(config-if)#ip add 20.0.0.2 255.0.0.0
gkp3(config-if)#no shut

15
gkp3(config-if)#

gkp3(config-if)#exit
gkp3(config)#int fa 0/1
gkp3(config-if)#ip add 40.0.0.1 255.0.0.0
gkp3(config-if)#no shut

gkp3(config-if)#

gkp3(config-if)#exit
gkp3(config)#
gkp3(config)#ip route 0.0.0.0 0.0.0.0 20.0.0.1
gkp3(config)#^Z
gkp3#
wr

16
Program # 7
Objective: Implement and configure to connect two routers using static routing.

Router-1:

Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut
gkp1(config-if)#
gkp1(config-if)#exit
gkp1(config)#

gkp1(config)#ip route 192.168.2.0 255.255.255.0 10.0.0.2


gkp1(config)#^Z
gkp1#
wr

17
Router-2:

Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 192.168.2.1 255.255.255.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#ip route 192.168.1.0 255.255.255.0 10.0.0.1
gkp2(config)#^Z
gkp2#

wr

18
Program # 8
Objective: Implement and configure to connect three routers using dynamic routing (RIP).

Router-1:

Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut

gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#

19
gkp1(config)#route rip
gkp1(config-router)#network 10.0.0.0
gkp1(config-router)#network 192.168.1.0
gkp1(config-router)#^Z
gkp1#
wr

Router-2:

Router>enable
Router#config
Router(config)#int fa 0/0
Router(config-if)#ip add 10.0.0.2 255.0.0.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa 0/1
Router(config-if)#ip add 20.0.0.1 255.0.0.0
Router(config-if)#no shut

Router(config-if)#

Router(config-if)#exit
Router(config)#hostname gkp2
gkp2(config)#

gkp2(config)#route rip
gkp2(config-router)#network 10.0.0.0
gkp2(config-router)#network 20.0.0.0
gkp2(config-router)#^Z
gkp2#
wr
gkp2#

Router-3:

Router>enable
Router#config
Router(config)#hostname gkp3
gkp3(config)#int fa 0/0
gkp3(config-if)#ip add 20.0.0.2 255.0.0.0
gkp3(config-if)#no shut

gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#int fa 0/1
20
gkp3(config-if)#ip add 192.168.2.1 255.255.255.0
gkp3(config-if)#no shut

gkp3(config-if)#
gkp3(config-if)#exit
gkp3(config)#
gkp3(config)#route rip
gkp3(config-router)#network 20.0.0.0
gkp3(config-router)#network 192.168.2.0
gkp3(config-router)#^Z
gkp3#
wr

21
Program # 9
Objective: Implement and configure to connect two routers using dynamic routing (OSPF).

Router-1:

Router>enable
Router#config
Router(config)#hostname gkp1
gkp1(config)#int fa 0/0
gkp1(config-if)#ip add 10.0.0.1 255.0.0.0
gkp1(config-if)#no shut

gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#int fa 0/1
gkp1(config-if)#ip add 192.168.1.1 255.255.255.0
gkp1(config-if)#no shut

gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#
gkp1(config)#route ospf 1
gkp1(config-router)#network 10.0.0.0 0.255.255.255 area 0

22
gkp1(config-router)#network 192.168.1.0 0.0.0.255 area 0
gkp1(config-router)#^Z
gkp1#
wr

Router-2:

Router>enable
Router#config
Router(config)#hostname gkp2
gkp2(config)#int fa 0/0
gkp2(config-if)#ip add 10.0.0.2 255.0.0.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#int fa 0/1
gkp2(config-if)#ip add 192.168.2.1 255.255.255.0
gkp2(config-if)#no shut

gkp2(config-if)#

gkp2(config-if)#exit
gkp2(config)#
gkp2(config)#route ospf 1
gkp2(config-router)#network 10.0.0.0 0.255.255.255 area 0
gkp2(config-router)#network 192.168.2.0 0.0.0.255 area 0
gkp2(config-router)#^Z
gkp2#

23
Program # 10
Objective: Implement and configure Standard Access Control List in router.

Router-1:

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp1
gkp1(config)#
gkp1(config)#interface FastEthernet0/0
gkp1(config-if)#ip address 10.0.0.1 255.0.0.0
gkp1(config-if)#ip address 10.0.0.1 255.0.0.0
gkp1(config-if)#no shutdown
gkp1(config-if)#

gkp1(config-if)#exit
gkp1(config)#interface FastEthernet0/1
gkp1(config-if)#ip address 192.168.1.1 255.255.255.0
gkp1(config-if)#ip address 192.168.1.1 255.255.255.0
gkp1(config-if)#no shutdown
gkp1(config-if)#

24
gkp1(config-if)#exit
gkp1(config)#router rip
gkp1(config-router)#network 10.0.0.0
gkp1(config-router)#network 192.168.1.0
gkp1(config-router)#exit
gkp1(config)#access-list 1 deny 192.168.2.3 0.0.0.0
gkp1(config)#access-list 1 permit any
gkp1(config)#int fa 0/0
gkp1(config-if)#ip access-group 1 in
gkp1(config-if)# ^Z
gkp2#
wr

Router-2:

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname gkp2
gkp2(config)#
gkp2(config)#interface FastEthernet0/0
gkp2(config-if)#ip address 10.0.0.2 255.0.0.0
gkp2(config-if)#ip address 10.0.0.2 255.0.0.0
gkp2(config-if)#no shutdown
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#interface FastEthernet0/1
gkp2(config-if)#ip address 192.168.2.1 255.255.255.0
gkp2(config-if)#ip address 192.168.2.1 255.255.255.0
gkp2(config-if)#no shutdown
gkp2(config-if)#
gkp2(config-if)#exit
gkp2(config)#router rip
gkp2(config-router)#network 10.0.0.0
gkp2(config-router)#network 192.168.2.0
gkp2(config-router)# ^Z
gkp2#

25
Computer Networks Lab Viva Questions with Answers

1. Define a network.
Ans- A network is a collection of networks joined together by physical media linkages.
Recursively, a network is any physical link connecting two or more nodes or any two or more
networks connected by one or more nodes.

2. How do links work?


Ans- Two or more computers connected directly to one another via a physical media, such as a
coaxial cable or optical fibre, can perform work at the lowest level. A link is an example of a
physical medium.

3. Describe a Node.
Ans- A network can be made up of two or more computers that are physically linked together,
such as by coaxial cable or optical fibre. Such physical media is known as a link, and the
computer that connects to it is referred to as a node.

4. What is a router or gateway?


Ans- A node linked to two or more networks is referred to as a gateway or router. In most cases,
it transmits the message from one network to another.

5. Describe the point-to-point link.


Ans- We refer to physical connections as point-to-point links if they can only connect two
nodes.

6. What is multiple access, exactly?


Ans- If two or more nodes share the physical links, it is referred to as multiple accesses.

7. What benefits do distributed processing systems offer?


Ans- Distributed processing systems offer various benefits, including distributed databases,
collaborative processing, encapsulation or security, quicker problem solution, and security
through redundancy.

8. What are the names of the variables that impact the performance of the network?
Ans- Hardware, software, users, and various transmission mediums are all factors.

9. What standards must a network meet to be effective and efficient?


Reliability:

26
Ans- The amount of time it takes a link to recover from a failure, how often failures occur, and
how robust the network is are all indicators of how reliable a system is.
Security:

Security concerns include guarding data from viruses and illegal access.

Performance:

A network's performance can be evaluated in a number of ways, including through metrics like
reaction time and transmit time.

10. Talk about the elements that affect the network's dependability.
Ans- There are mainly two elements that affect the network's dependability:

Frequency of failures;
Network recovery time after a failure.

11. What are the factors that affect the security of the network?
Ans- There are several factors that affect network security, including viruses, unauthorized
access, and many more.

12. What is the protocol?


Ans- A protocol is a collection of guidelines that governs all facets of information
communication.

13. What is the essential component of protocol?


Ans- Key components of the protocol are:

Semantics:

It speaks of the significance of each bit in a segment.

The format and structure of the data, or the manner in which they are presented, make up a
protocol's syntax.

Timing:

It has the following two qualities:

When should the information we send

27
How quickly can data be sent?
14 Discuss the key design issues of a computer network.
Ans- There are various key design issues of a computer network, including:

Support for common services


Cost-effective resource sharing
Performance
Connectivity

15. What are latency and bandwidth?


Ans- Latency and bandwidth are used to gauge the network's performance. The number of
beads that may be transmitted through the network in a specific amount of time is referred to
as the network's bandwidth. In contrast, latency describes the length of time it takes a message
to transit over a network in terms of bits.

16. Talk about routing.


Ans- The act of methodically forwarding a message to a destination node depending on its
address is known as routing in a network.

17. What is a peer-to-peer process?


Ans- Each process that communicates between machines at a specific network layer is known
as a peer-to-peer process.

18. What is the congested switch?


Ans- A switch may receive packets quicker than a card link that can hold them and store them
in memory for a longer amount of time. If this occurs, the switch may eventually run out of
buffer space, forcing some packets from it to be lost in a particular state. The situation of the
network is referred to as the "congested condition of the network".

19. Address the network's semantic gap.


Ans- Understanding the requirement applications and being aware of the technological
constraints might help to define a useful channel. Therefore, the gap between application
characteristics and the underlying technology can be described as the semantic gap in the
network.

20. How long is the round trip?


Ans- The Round-trip time is the amount of time it takes to send a message from one end of a
network to the other and vice versa.

21. Talk about broadcasting, unicasting, and multicasting.

28
Ans- Multicasting is a method by which the message is sent to some subset of other nodes.

Unicasting is a method by which the message is sent from a source to a single destination node.

Finally, broadcasting is a method by which the message is sent to all the nodes in the network.

22. Talk about multiplexing.


Ans-Multiplexing is the process through which numerous signals are sent simultaneously over a
single data channel.

23. Go over the different types of multiplexing.


Ans-There are 3 types of multiplexing, including:

A. Time division multiplexing


B. Frequency division multiplexing
C. Code division multiplexing

24. Talk about FDM.


Ans-FDM is an analogue method that can be used when a link's bandwidth is greater than the
total bandwidth of the signals to be transferred.

25. What is TDM?


Ans-TDM involves digital technology, and it can be used when the transmission medium's data
rate capacity exceeds the data rate needed by the transmitting and receiving devices.

26. Discuss Synchronous TDM.


Ans-The multiplexer always assigns each device the exact same time slot in the synchronous
time division multiplexing technique. The device might or might not have anything to
communicate.

27. What are the OSI layers?


Ans-There are several layers in the OSI Model, including,

Physical layer
Datalink layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer

29
28. Which is the network-supported layer?
Ans-Network-supported layers are,

Network layer
Physical layer
Datalink layer

29. Which is the user-supported layer?


Ans-User-supported layers are,

Application layer
Presentation layer
Session layer

30. Which layer in the OSI stack connects the user-supported and network-supported layers?
Ans-The user-supported layer and the network-supported layer are connected via the transport
layer.

31. Talk about the issues with the physical layer.


Ans-The physical layer coordinates the operations necessary for the transmission of a bit
stream across a physical medium.

Representation of bits
physical characteristics of interfaces and media
data rate
bits synchronization
a line configuration
transmission mode
physical topology

32. Discuss the responsibilities of the data link layer.


Ans-The data link layer transmits information to the physical layer. The data link layer is in
charge of node-to-node distribution and conveys a raw facility to a dependable link.

physical addressing
flow control
framing
error control

30
access control

33. Explain the functions of the network layer.


Ans-Several functions of the network layer are,

The network layer is responsible for routing and logical addressing.


The network layer is in charge of delivering packets from source to destination, maybe through
several networks.

34. Explain the functions of the transport layer.


Ans-The transport layer is in charge of sending the full message from source to destination.
Some other functions of the transport layer are,

Connection control
error control
segmentation and reassembly
service point addressing
flow control

35. Explain the function of the session layer.


Ans-The network dialogue controller is treated as a session layer. It upholds, establishes, and
synchronizes communication between systems.

Synchronization
Dialogue management

36. Explain the responsibilities of the presentation layer role.


Ans-The presentation layer is in charge of sharing information on the syntax and semantics
between two systems. Other functions include translation, encryption, and compression.

37. Describe the responsibility of the application layer.


Ans-The application layer decides whether software or humans will access the network. The
application layer provides user interfaces and supports, like shared database management, e-
mail, and other types of distributed Information Services.

38. What are the two categories of hardware components?


Ans-There are two categories of hardware components, i.e., Nodes and Links.

39. What different kinds of links can be employed to construct a computer network?
Ans-leased lines

31
Cables
last mile links
wireless links

40. What kinds of errors are there?


Ans-There are mainly two types of error, including:

Single bit error: In this error, only one bit in the data unit is altered.
Burst error: two or more data bits will be altered in this error.

41. What is computer network error detection, and what are its methods?
Ans-During transmission, there may be the possibility of corruption of data. For reliable
communication, errors must be deducted and corrected. The concept of redundancy is used by
error detection in a computer network, which means adding extra bits to detect errors at the
destination. There are some common error detection methods which are as follows

Longitudinal redundancy check


Vertical redundancy check
Cyclic redundancy check
Checksum

42. Describe redundancy.


Ans-Redundancy is a method by which we might transmit more information merely for
comparison purposes.

43. What is a vertical redundancy check?


Ans-It is one of the simplest and most prevalent procedures used in mistake detection
techniques. In vertical redundancy check, a parity bit is added to every data unit so that the
total number of 1s becomes even for even parity. It has a single-bit error detection capability
and can only detect burst faults if there are an odd number of overall errors in each data unit.

44. How do you perform a longitudinal redundancy check?


Ans-In the longitudinal redundancy check, bits are broken up into blocks called rows, and a
redundant row of bits is added to the original block. It is capable of detecting burst mistakes.
Let's say two bits in a data unit are broken, and bits in the exact same locations in another data
unit are likewise broken. In that situation, the longitudinal redundancy checker won't pick up
on a mistake. The data unit comes after n data units in the logical redundancy check.

45. What does cyclic redundancy check mean?

32
Ans-It is one of the most powerful redundancy-checking methods. The cyclic redundancy check
is based on binary division.

46. What is the checksum?


Ans-The checksum approach is used by higher layer protocols to assist with error detection.

47. Describe the steps involved in creating the checksum.


Ans-The data is divided into sections
Using 1's complement arithmetic, these sections are added together
Finally, the complement is taken for the final sum. It is the checksum.

48. Describe the data link protocols.


Ans-Data link protocols refer to the set of specifications required to implement the data link
layer. The following are some categories of data link protocols:

A. Asynchronous protocol

B. Synchronous protocol

Character-oriented protocol
Bit oriented protocol

49. What is the difference between error correction and error detection?
Ans-Error detection is easy and simple than error correction, and it is examined for error
detection when any error occurs. Additionally, only the corrupted bits are verified during error
correction. The number of mistakes and the size of the messages is key components in key
correction.

50. Define forward error correction.


Ans-Forward error detection is the method through which the receiver makes an attempt to
understand the message using redundant bits.

33

You might also like