TUTORIAL SHEET-1 (Solution) : Kcs-603: Computer Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

SHRI RAMSWAROOP MEMORIAL COLLEGE OF ENGINEERING & MANAGEMENT

B.Tech. [SEM VI (CSE-61,62 & 65)]


TUTORIAL SHEET-1(Solution)
(Session: 2021-22)

KCS-603: COMPUTER NETWORKS


Unit no and Name: 1, Introductory CO1: Explain basic concepts, OSI reference
Conceptsand Physical Layer model, services and role of each layer of OSI
model and TCP/IP, networks devices and
transmission media, Analog and digital data
transmission.
Subjective Questions: - BL
Goals and applications of networks, Categories of networks, Organization of the Internet

1 Briefly explain the five components of data communication. 2


Five components of data communication are: Message, Sender, Receiver, Transmission medium and Protocol.

1. Message: The message is the information (data) to be communicated. Popular forms of


information include text, numbers, pictures, audio, and video.

2. Sender: The sender is the device that sends the data message. It can be a computer, workstation,
telephone handset, video camera, and so on.

3. Receiver: The receiver is the device that receives the message. It can be a computer, workstation,
telephone handset, television, and so on.

4. Transmission medium: The transmission medium is the physical path by which a message travels
from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.

5. Protocol: A protocol is a set of rules that govern data communications. It represents an agreement
between the communicating devices.
2 Describe the various goals and applications of computer networks. 3

The main goals of computer networks are as follows −

Resource Sharing: The main goal of the computer network is Resource Sharing. It is to create all the
programs, data and hardware accessible to anyone on the network without considering the resource’s physical
area and the client.

Saving Money: The second goal of a computer network is saving money. Small computers have a much
excellent value proportion than higher ones. Mainframes are approximately a method ten times quicker than
the quickest single-chip microprocessors, but they cost a huge number of times more.

High Reliability: The third goal is to support high reliability by acquiring a different authority of supply. For
example, all files can be recreated on a few machines, and thus if one of them is nonexistent, the additional
copies could be available.

Improve Performance: The fourth goal of a computer network is to improve accessibility and the performance
of the system. A system’s performance can be improved by inserting one or more processors into it as its
workload grows.

Communication Medium: The fifth goal of the computer network offers a powerful communication medium.
The different user on the network can immediately identify a document that has been refreshed on a network.
Various applications are:

Access to remote information


Person to person communication
Interactive entertainment
E-commerce
3 Write short notes on LAN, MAN and WAN. 2
A LAN (local area network) is a group of computers and network devices connected together,
usually within the same building. By definition, the connections must be high speed and relatively
inexpensive (e.g., token ring or Ethernet).
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the
same city or town.
A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location,
although it might be confined within the bounds of a state or country. A WAN connects several
LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the
public. The technology is high speed and relatively expensive. The Internet is an example of a
worldwide public WAN.

4 Define computer networks? Discuss various types of transmission mode in computer network.
A computer network is a system that connects numerous independent computers in order to share information
(data) and resources. The integration of computers and other different devices allows users to communicate
more easily.
A computer network is a collection of two or more computer systems that are linked together. A network
connection can be established using either cable or wireless media. Hardware and software are used to connect
computers and tools in any network.

 The way in which data is transmitted from one device to another device is known as transmission
mode.
 The transmission mode is also known as the communication mode.
 Each communication channel has a direction associated with it, and transmission media provide the
direction. Therefore, the transmission mode is also known as a directional mode.
 The transmission mode is defined in the physical layer.

The Transmission mode is divided into three categories:

 Simplex mode: One way communication only


 Half-duplex mode: One way communication at a time

Full-duplex mode: Two way communication at a time


ISP, Network structure and architecture (layering principles, services, protocols and standards)

5 Explain point to point connection and peer to peer connection with diagram. 2
Point-to-point connection refers to a communications connection between two nodes or endpoints. An
example is a telephone call, in which one telephone is connected with one other, and what is said by one caller
can only be heard by the other.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or
workloads between peers. Peers are equally privileged, equipotent participants in the application. They are

said to form a peer-to-peer network of nodes.

6 Discuss the important differences between MAC address and IP address. 3


The main difference between MAC and IP address is that MAC Address is used to ensure the physical
address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to
uniquely identify the connection of the network with that device takes part in a network.
7 Explain backbone network. Differentiate between Bus Backbone and Star Backbone Networks. 2

The OSI reference model, TCP/IP protocol suite, Network devices and components.

8 Which OSI layer handles: - Framing, Routing, Segmentation, Encryption and Decryption. 2

9 What is TCP/IP Model? Explain the functions and protocols and services of each layer? Compare it 3
with OSI Model.

10 Amplifier, Router, Gateway, Hub and Repeater all these devices are found in which OSI layer and 3
also explain their use.
Amplifier, Hub and Repeater work at physical layer.
An electronic amplifier is a device that is used to increase the power, current, or voltage of a signal.
Amplifiers are used in music equipment, electronic devices such as television and radio receivers, audio
equipment, and computers to increase the amplitude of a signal.
A hub is a physical layer networking device which is used to connect multiple devices in a network. They
are generally used to connect computers in a LAN. A hub has many ports in it.
A repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend
transmissions so that the signal can cover longer distances or be received on the other side of an
obstruction.
Router work at Network layer.
A router helps you connect multiple devices to the Internet, and connect the devices to each other. Also,
you can use routers to create local networks of devices. These local networks are useful if you want to share
files among devices or allow employees to share software tools.
Gateway work at Session layer.
A gateway is a network node used in telecommunications that connects two networks with different
transmission protocols together. Gateways serve as an entry and exit point for a network as all data must
pass through or communicate with the gateway prior to being routed.
Network topology design, Types of connections, Transmission media, Signal transmission and
encoding
11 What is the significance of twisting in twisted pair cable? What are the different categories of a 3
twisted pair cable?
The twisting is necessary to minimize electromagnetic radiation and resist external interference. It also
helps to limit interference with other adjacent twisted pairs (cross-talk). In theory, the more twists per meter a
cable has, the better the isolation.

The different categories of a twisted pair cable are: UTP and STP.

12 How many types of topologies are used in a network? Explain with diagram. 3
Types of topologies are used in a network:
1. Mesh Topology
2. Star Topology

3. Bus Topology
4. Ring Topology
5. Hybrid Topology
In mesh topology each device is connected to every other device on the network through a dedicated point-to-
point link. When we say dedicated it means that the link only carries data for the two connected devices only.
Let’s say we have n devices in the network then each device must be connected with (n-1) devices of the
network. Number of links in a mesh topology of n devices would be n(n-1)/2.
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology,
star topology doesn’t allow direct communication between devices, a device must have to communicate
through hub. If one device wants to send data to other device, it has to first send the data to hub and then the
hub transmit that data to the designated device.
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines.
There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over
the main cable, there is a limit of drop lines and the distance a main cable can have.
In ring topology each device is connected with the two devices on either side of it. There are two dedicated
point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is
known as ring topology. If a device wants to send data to another device then it sends the data in one direction,
each device in ring topology has a repeater, if the received data is intended for other device then repeater
forwards this data until the intended device receives it.
A combination of two or more topology is known as hybrid topology. For example a combination of star and
mesh topology is known as hybrid topology.

Network performance and transmission impairments, Switching techniques and multiplexing.


13 What is a Point-to-Point Network? In a network that contains two servers and twenty workstations, 2
where is the best place to install an Anti-virus program?

14 How many types of delays are there in a network? Explain them. 3

15 Find a maximum bit rate for a noiseless channel with a bandwidth of 5000Hz transmitting a signal 3
with 16 signal levels.
C=2xBxlog2L
C=2*5000*log216
C=2*5000*4
C=40bits/sec.

Supplementary Questions: BL
ISP, The OSI reference model, TCP/IP protocol suite, Network devices and components, Network
topology design.
Q1. A disadvantage of a broadcast subnet is the capacity wasted when multiple hosts attempt 5
to access the channel at the same time. As a simplistic example, suppose that
time is divided into discrete slots, with each of the n hosts attempting to use the channel
with probability p during each slot. What fraction of the slots will be wasted due
to collisions?

Transmission media, Signal transmission and encoding, Switching techniques and multiplexing.

Q2. Given a bandwidth of 10,000 Hz (1000 to 11,000 Hz), draw the full-duplex ASK diagram of the
system. Find the carriers and the bandwidths in each direction. Assume there is no gap between 4
the bands in the two directions.

Short Answer type questions: - BL


Goals and applications of networks, Categories of networks, Organization of the Internet
1 What is the need of network? 1
2 How communication takes place between layers of networking model? 2
ISP, Network structure and architecture (layering principles, services, protocols and standards)
3 What is ISDN? Explain its types. 1
4 What are the functions of a network administrator? 1
The OSI reference model, TCP/IP protocol suite, Network devices and components.
5 What are the two reasons for using layered protocol? 1

6 What is TCP three-Way Handshake? 2


Network topology design, Types of connections, Transmission media, Signal transmission and
encoding
7 What is difference between baseband and broadband transmission? 2
8 Name the factors that govern the selection of a topology for a network. 1
Network performance and transmission impairments, Switching techniques and multiplexing.
9 Define multiplexing in networking? 1
10 What are hubs? What are its types? 1

MULTIPLE CHOICE QUESTIONS


https://forms.gle/gHXJewDfbsMftmx69

CROSSWORD-PUZZLE BL
1

ACROSS: DOWN:

2 Twisting of wires in twisted pair cable helps to 1 unwanted energy from source other than the
reduce the effect transmitter.
5 A set of rules that governs data communication 3 Communication between a computer and a
7 Topology in which, if there are n devices in a keyboard involves transmission.
network, each device has n-1 ports for cables. 4 The loss in signal power as light travels down the
8 Category 4 UTP cable offers data rates up to Mbps fiber is called
9 A single channel is shared by multiple signals by 6 This layer is responsible for process to process
10 twisted pair cables are very cheap and easy to delivery
install, but they are badly affected by the noise 11 the process of converting binary data, sequence of
interference. bits to a digital signal.
12 ISDN integrates speech and data on. lines 13 The first Network
15 To achieve longer distances, the analog 14 a multilevel modulation in which four phase shift
transmission system includes that are used for representing four different symbols.
boost the energy of the signal.
References:-

TEXT BOOKS:
Ref. [ID] Authors Book Title Publisher/Press Year of Publication
Data Communications and
[T1] Behrouz A. Forouzan McGraw-Hill 2006
Networking
[T2] Andrew S. Tanenbaum Computer Networks Pearson Education 2001
[T3] Anuranjan Misra Computer Networks ACME Learning 2010
REFERENCE BOOKS:
Ref. [ID] Authors Book Title Publisher/Press Year of Publication
D. Comer
[R1] “Computer Networks and Internets” Pearson. 2015
ONLINE/DIGITALREFERENCES:
Ref. [ID] Source Name Source Hyperlink
[D1] Lecture notes https://examupdates.in/computer-network-notes/

Signature of the Faculty: Signature of the HOD:


(With Date) (With Date)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy