Computer Networks Assignment-1
Computer Networks Assignment-1
Computer Networks Assignment-1
ASSIGNMENT-1
1) A student attaches a laptop to campus network and requests/receive a web page from
www.google.com, Assess the sequence of operations carried out with the help of the different
protocols used in application, transport, network and link layer.
Application Layer:
Student typically type a web address URL (Uniform resource locator) in a Web browser.
Web browser uses something called HTTP (Hypertext Transfer Protocol) which is an
Application layer protocol.
Student tells their browser to fetch a page from URL.
Browser makes an HTTPS request to URL
To fetch the required web page, it passes the request to its HTTP protocol handler, that is
Layer 7 of the OSI model, the Application layer.
Session Layer:
HTTP protocol handler at Layer 7 recognizes that the request is for a secure document, it
passes the request to the TLS library at Layer 5 and 6 of the OSI model. These layers are
called the Session and Presentation layers.
In order to open a secure channel, the TLS library needs to establish a connection to the
destination
It passes a connection request to TCP which lives at Layer 4 of the OSI model, the
Transport layer
Transport Layer:
The TCP handler receives the connection request. Then, it creates a packet with the
“SYN” flag set — the first part of the three-way handshake with the remote server to
establish a connection.
It provides logical communication between application processes running on different
hosts within a layered architecture of protocols and other network components.
After the TCP handler has created a packet to initiate a connection, it passes the packet
down to IP which lives at OSI Layer 3, also called the Network Layer.
Network Layer:
The network layer receives the packet and adds the correct IP information to its header.
That informs the internet routers how to route the packet to its destination IP address.
Now that the network layer has a routable packet, it passes it down to Layer 2, the Data-
Link layer.
Data Link Layer:
The data-link layer adds the router’s MAC address as the local destination address,
allowing the router to send the packet out to the Internet.
In order for the packet to get onto the basic networking transmission technologies of the
network, it is then passed to OSI Layer 1 or the Physical Layer to complete the task.
2) Compare the telephone network and the internet, What are similatities? What are the
differences?
Similarities:
Differences:
The telephone network will be able to But in case of internet the connection is
connect to internet network using a dial made to the network using a broadband
up connection and a dial up modem, modem and hence the data rate will be
but the data rate will be very low. very high.
3) For n devices in network, what is the number of cable links required for a mesh, ring, bus and
star topologies?
Mesh Topology
This network connection allows all the computers to be linked to the internet. This
specific topology uses the most cables, however it is the system that is less likely to fail or
experience any faults. Due to the fact that the computers have about 3 cables running out of
them, if a failure does occur in one cable, it won't completely lose the network.
Ring Topology
The ring topology is self-explanatory in the sense that the cables are managed in a ring
shape. The cables connect to each computer which allows the signals to go through each
device. It is not likely that it will obtain any problems during its function. However, if there
are any problems with the cables then the whole system will go down and no computers will
be able to connect to the network.
Bus topology
With the bus topology, information sent through is not renewed or resent from device to
device. Due to this, the computers are safe from crashing down if one of the network fails.
However, a problem with this is that when there is an issue with the cables, it cannot be
easily identified.
Star topology
This is the only system that uses a central hub to connect to all the computers. The cables
provided will travel from each computer to the hub and the network will be powered from the
central device.
4) Give comparsion between different wireless technologies.
Governing Body Bluetooth Infrared Data NFC Wi-Fi Alliance ZigBee Alliance
Frequency Band 2.4 GHz 875 nm +- 13.56 2.4 GHz, 5 MHz 868/915 MHz,
Number of RF 79 50 1 14 1/10, 16
Channels
Nodes
point
Data Protection 16-bit CRC 16-bit CRC 32-bit 32-bit CRC 16-bit CRC
CRC
5) Suppose we want to transmit the message 11001001 and protect it from errors using the crc
polynomial x^3+1. Use polynomial long division to determine the message that should be
transmitted.