CN 2020 Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

1a

The Ethernet is a communication standard that defines the MAC portion of the Data link layer of
wired Ethernet while the token ring is a token passing system in which only one workstation can
talk at a time and the Wi-Fi is a family of wireless networking technologies, based on the IEEE
802.11 family of standards, which are commonly used for local area networking of devices
and Internet access.

Type of Cable

Ethernet started off using coaxial cabling and successfully progressed to twisted pair wiring and
fibre optic wiring. The Ethernet twisted pair utilizes RJ-45 8 pin connectors at either ends of the
cable. The token ring cable specifications called for shielded twisted-pair (STP) cable using a
DB9 connector or a unique square connector called the IBM data connector and later advanced
to UTP using RJ45 connectors. While the WI-FI is generally wireless and makes use of
CSMA/CA Carrier sense multiple Access with Collision Avoidance

Topology

The logical topology of the token ring is a ring and the physical topology is a star, while that of
the Ethernet has a logical topology of a bus and the physical can vary. The WI-FI makes use of a
logical infrastructure topology while the physical topology is an ad-hoc topology.

Data transfer rates

The Ethernet has a range of data transfer rates ranging from 10mbps – 10000mbps depending
on the cable in use, the token ring has a transfer speed of 16 mbps which may sound slow but
was lightning fast for its time while currently WI-FI technology can transmit a range of 300mps to
433mbps

Recommendation

The Ethernet is highly recommended because it’s a solid connection that offers a variety of
advantages, ranging from better speed, high security, lower latency and more reliable
connections.
1. APPLICATION LAYER

This is the end user connection, also known as the user interface. The protocols in this layer form
the basis for various networking services. Protocols include HTTPS, FTP, POP3.

2. PRESENTATION LAYER

This layer receives data from the application layer, it is responsible for code conversion e.g.
ASCII-EBCDIC, format definition, encryption and also compression. Protocols found here include
ZIP, SSL.

3. SESSION LAYER

This layer helps in the management of flow control, the setting up and terminating of connections
which enables sending and receiving of data. Authentication and authorization are also done in
this layer. Protocols here include ASP, duplex.

4. TRANSPORT LAYER

This layer controls the reliability of communication through segmentation, flow control, error
control and multiplexing. It ensures end-to-end connection. Some protocols here include TCP
and UDP.

5. NETWORK LAYER

The functions of this layer include flow control, logical addressing, routing and path determination

6. DATALINK LAYER

This is where physical addressing is done, also error detection and correction. Other functions
include flow control, framing, switching and bridging of connections. Examples of protocols
include FDDI, ATM-

7. PHYSICAL LAYER

This layer is responsible for multiplexing, modulation, cabling and signal conversion. This layer
also include hardware such as hubs and switches. Protocols here are RS23 and RS 422.
Protocols
I. TCP
It is the one that maintains and establishes a network conversation where the
application programs will be able to exchange the data. It operates in the Transport
Layer.

II. HTTPS
This operates in the application layer and has a security feature in the transport
layer, It is used for web surfing and transfer of data on the World Wide Web. The
hypertext is the structured text that makes use of logical links between the nodes
containing the text.

III. IP
It operates in the networking layer and its routing function enables internetworking
and also essentially establishes the internet.

IV. UDP
It’s used for sending short messages that are called datagrams but overall it assumes
error checking and the correction is not required therefore an unreliable,
connectionless protocol. It is relatively fast.
V. SMTP
This is a communication protocol for electronic mail transmission. It is found in the
application layer.
VI. IMAP
This receives the electronic mail from mail server and keeps all devices that have a
connection to it synced.
VII. MAC
This helps to manage the access of the physical network. It provides the data link
layer of the Local Area Network system. It allows multiple devices to be uniquely
identified. It operates in the Data Link layer.
1d)

 Switch
It is a multicast networking device that works under data link layer of OSI
model. The switch sends data in the form of frames and works in full
duplex. Multiple devices can send data at a time. The switch stores and
uses MAC addresses of a device to transfer data, because of this it is
found in the data link layer of the OSI model.

 Hub
It is a simple networking broadcasting device that works under the
physical layer of the OSI model. It connects bunch of computers together
in a network and regenerates signals to all connected nodes. It only
permits one device to send data at a time and because of its
broadcasting nature there is lots of wastage of bandwidth. The hub
sends data in the form of packets and only works in half duplex.

 Router
It is a networking device that works under the network layer of the OSI
model and is used to connect two or more different networks. The router
sends data in the form of packets and works in full duplex. The router
uses IP addresses to transfer data and has a routing algorithm that it
uses to determine the next destination.

 Wireless Access Point


It is found in the data Link layer of the OSI model. They are used to
further extend a network’s existing wireless signal and because of the
physical transmission of the radio waves and addressing, it knows to
send to the MAC address to forward the frames to the correct
destination, it also bridges 802.11 to 802.3.

You might also like