Computer Networks
Computer Networks
Questions
Part A
Explain the role of a router in a computer network.
6. There is more fault tolerance in LAN. While there is less fault tolerance in WAN.
LAN covers small area i.e. within the While WAN covers large geographical
8.
building. area.
Part A
*Scenario*: A multinational company has offices in several countries
and wants to ensure secure communication between its offices over
the public internet. Each office has its local network that needs to be
integrated into a single, secure network accessible to employees
worldwide.
2.Troubleshooting: By breaking down the networking process into layers, the OSI
model allows network administrators to isolate and troubleshoot issues more
effectively. Problems can be identified and addressed at the specific layer where they
occur.
3.Modular Design: The OSI model's layered approach allows for modular design
and development. Each layer can be developed independently, and new technologies
can be integrated without affecting the entire system.
Part B
OSI Model Layers and Their PDUs
Network switches are essential in a LAN for directing data traffic between connected
devices. They ensure that data reaches the correct destination without unnecessary
delays or collisions, enhancing network efficiency.
Frame Forwarding: Switches receive data frames, inspect their destination MAC
addresses, and forward them to the correct port based on their MAC address table,
ensuring that data reaches the intended device.
Learning MAC Addresses: Switches learn and store MAC addresses of devices
connected to each port. Unknown frames are initially broadcasted to all ports until
the switch learns the correct destination.
Part B
•VLAN Support: Advanced switches allow for VLANs, which segment the
network into logical groups, enhancing security and reducing congestion.
Part B
Your organization is planning to upgrade its network infrastructure
and is considering different network technologies. Ethernet is one of
the options being evaluated. The goal is to choose a technology that
balances performance, cost, and future scalability.
3. Transport Layer
Function: The Transport Layer ensures reliable data transfer
between devices. It manages error detection, data flow control, and
retransmission of lost packets. The two main protocols in this layer
are TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).
Example: When sending an email, TCP ensures that all data packets
are delivered accurately and in the correct order. If a packet is lost,
TCP will retransmit it, ensuring that the complete message reaches
its destination. UDP, on the other hand, is used for applications
where speed is more critical than reliability, such as streaming video.
4. Application Layer
Function: The Application Layer provides network services directly to end-user
applications. It includes protocols that support various functions like email
(SMTP), web browsing (HTTP/HTTPS), file transfer (FTP), and more.
Example: When you type a URL into a web browser, the HTTP protocol (within
the Application Layer) handles the request to load the webpage. The browser
then displays the website content, which has been transmitted over the
network.
The data then moves to the Transport Layer, where it is broken into segments
(or datagrams in the case of UDP), and necessary control information (like
sequence numbers for TCP) is added.
Next, the data enters the Internet Layer, where it is encapsulated into packets
and assigned IP addresses for routing across networks.
Finally, the data reaches the Network Interface Layer, where it is converted into
frames and physically transmitted over the network medium.
Part C
A company is experiencing issues with data being transmitted too quickly over the
network, causing packet loss. Describe how you would implement flow control
techniques to manage the rate of data transmission and ensure reliable
communication. Also, explain how error control methods can help detect and correct
any data that is lost or corrupted during transmission.
1. Implementation: The sender transmits one data packet and waits for an
acknowledgment from the receiver before sending the next packet. This
method ensures that data is sent at a pace the receiver can handle,
preventing network congestion and packet loss.
How It Helps: This technique allows for a balance between efficient data transfer
and network stability. By adjusting the window size, the sender can control the rate
of data flow, ensuring that the network remains stable and data is less likely to be
lost.
How It Helps: This method ensures that lost packets are detected and resent,
maintaining data integrity even if some packets are lost due to network issues.
Part C
Checksum:
Implementation: A checksum is added to each packet, representing a
calculated value based on the packet’s contents. Upon receiving a packet, the
receiver calculates its checksum and compares it to the transmitted one. If
they don't match, the packet is considered corrupted, and the receiver
requests a retransmission.
How It Helps: Checksums help detect any corruption that occurs during
transmission, ensuring that only accurate data is received. Corrupted packets
are identified and can be corrected by requesting a retransmission, which is
crucial for reliable communication.
Conclusion: