Computer Networks Assignment-1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

COMPUTER NETWORKS

ASSIGNMENT-1
1) A student attaches a laptop to campus network and requests/receive a web page from
www.google.com, Assess the sequence of operations carried out with the help of the different
protocols used in application, transport, network and link layer.

Application Layer:

When Student Launches a site in the browser

 Student typically type a web address URL (Uniform resource locator) in a Web browser.
 Web browser uses something called HTTP (Hypertext Transfer Protocol) which is an
Application layer protocol.
 Student tells their browser to fetch a page from URL.
 Browser makes an HTTPS request to URL
 To fetch the required web page, it passes the request to its HTTP protocol handler, that is
Layer 7 of the OSI model, the Application layer.

Session Layer:

 HTTP protocol handler at Layer 7 recognizes that the request is for a secure document, it
passes the request to the TLS library at Layer 5 and 6 of the OSI model. These layers are
called the Session and Presentation layers.
 In order to open a secure channel, the TLS library needs to establish a connection to the
destination
 It passes a connection request to TCP which lives at Layer 4 of the OSI model, the
Transport layer

Transport Layer:

 The TCP handler receives the connection request. Then, it creates a packet with the
“SYN” flag set — the first part of the three-way handshake with the remote server to
establish a connection.
 It provides logical communication between application processes running on different
hosts within a layered architecture of protocols and other network components.
 After the TCP handler has created a packet to initiate a connection, it passes the packet
down to IP which lives at OSI Layer 3, also called the Network Layer.

Network Layer:

 The network layer receives the packet and adds the correct IP information to its header.
That informs the internet routers how to route the packet to its destination IP address.
 Now that the network layer has a routable packet, it passes it down to Layer 2, the Data-
Link layer.
Data Link Layer:

 The data-link layer adds the router’s MAC address as the local destination address,
allowing the router to send the packet out to the Internet.
 In order for the packet to get onto the basic networking transmission technologies of the
network, it is then passed to OSI Layer 1 or the Physical Layer to complete the task.

2) Compare the telephone network and the internet, What are similatities? What are the
differences?

Similarities:

 End Nodes & Intermediate Nodes Are Electronic Devices.


 Actual node to node Communication is using electrical voltage and Current.
 Use Telecommunication Links.
 Intermediate Network with routing intelligences needed
 End – End Telecommunication (Physical) Path Needed
 Each one node requires Unique number/address

Differences:

Telephone Network Internet

 A telephone network is a connection  The Internet is a connectionless packet


oriented circuit switched network. This switched network. This means that
means that a connection must be packets can be sent without following
established between the two endpoints. an established connection and
Bandwidth is reserved for this circuit. bandwidth can be shared with other
users.
 In a telephone network, there is a  In case of Internet there is no dedicated
dedicated connection established connection but the all authorized users
between the two end users and it is a are connected to the network using a
fixed line also the it has got a fixed unique IP and the cost will be
monthly rental for the connection but dependent on the data downloads being
call charges are extra based on the made.
duration of the call and region(local or
STD).
 Telephone network can only give one  Internet can have one-to-many
to one connection only using a connections through any channel which
dedicated channel in the network. is free at that point of time.

 In case of Telephone networks the  In case of internet the billing will be


billing is done based on the duration of mainly on the usage of the data in bits
the call and area of calling. per second.

 The telephone network will be able to  But in case of internet the connection is
connect to internet network using a dial made to the network using a broadband
up connection and a dial up modem, modem and hence the data rate will be
but the data rate will be very low. very high.

3) For n devices in network, what is the number of cable links required for a mesh, ring, bus and
star topologies?

o n(n-1)/2 cable link are required for mesh topology.


o n for ring topology.
o n-1 cable link for bus topology.
o n cable link for star topology.

Mesh Topology

This network connection allows all the computers to be linked to the internet. This
specific topology uses the most cables, however it is the system that is less likely to fail or
experience any faults. Due to the fact that the computers have about 3 cables running out of
them, if a failure does occur in one cable, it won't completely lose the network.

Ring Topology

The ring topology is self-explanatory in the sense that the cables are managed in a ring
shape. The cables connect to each computer which allows the signals to go through each
device. It is not likely that it will obtain any problems during its function. However, if there
are any problems with the cables then the whole system will go down and no computers will
be able to connect to the network.

Bus topology

With the bus topology, information sent through is not renewed or resent from device to
device. Due to this, the computers are safe from crashing down if one of the network fails.
However, a problem with this is that when there is an issue with the cables, it cannot be
easily identified.

Star topology

This is the only system that uses a central hub to connect to all the computers. The cables
provided will travel from each computer to the hub and the network will be powered from the
central device.
4) Give comparsion between different wireless technologies.

Standard Bluetooth Infrared NFC Wi-Fi ZigBee

Governing Body Bluetooth Infrared Data NFC Wi-Fi Alliance ZigBee Alliance

SIG Association Forum

IEEE 802.15.1 802.11 802.2 802.11a/b/g 802.15.4


Specification

Frequency Band 2.4 GHz 875 nm +- 13.56 2.4 GHz, 5 MHz 868/915 MHz,

MHz 2.4 GHz

Standard Range 1-100m 0.2-1m < 0.2 m 100m 10-100m

Number of RF 79 50 1 14 1/10, 16

Channels

Max number of 8 2 2 2007 >65000

Nodes

Data Transfer 3 Mbit/s 4 Mbit/s 424 54 Mbit/s 250 Kbit/s


Rate
Kbit/s

BPSK, QPSK, BPSK (+ ASK),


Modulation type COFDM,
GFSK pulse ASK O-QPSK
CCK, M-QAM

Spreading FHSS PPM NA DSSS, CCK, DSSS


OFDM

Basic Cell Piconet Point to Point Point to BSS Star

point

Encryption E0 stream NA AES RC4 stream cipher AES block


method
cipher (WEP), AES cipher
block cipher
Authentication Shared secret NA In-built WPA2 CBC-MAC

Data Protection 16-bit CRC 16-bit CRC 32-bit 32-bit CRC 16-bit CRC

CRC

5) Suppose we want to transmit the message 11001001 and protect it from errors using the crc
polynomial x^3+1. Use polynomial long division to determine the message that should be
transmitted.

You might also like