SlideShare una empresa de Scribd logo
1 de 6
COMPUTER NETWORKS
BSc IT semester 2
Name: Muhama Mark
BT0072
Roll: 1210000081
Qn 1. Write about different network structures in use.
In any network there exists a collection of machines varying uses or application programs
called hosts. The hosts are connected by a communication subnet or just subnet. There are two
distinct components knows as transmission lines and switching elements. These two components
are most in wide area networks. The transmission lines move bits between machines and
examples are channel, trunks and circuits.
Interface message processor is another name given to switching elements. Here each host is
connected to one or many interface message processors and all traffic from a host goes through
its interface message processor (IMP). There are basically two types of designs for
communication subnets.
Broadcast channels; broadcasting is the transmission of a message from one end or source and
receiving information to the rest of the system most local area networks and a small portion of
wide area networks are of this type (broadcasting). In a local area network, the interface message
processor is reduced to a single chip embedded inside the host or node so that there is always one
host per interface message processor whereas in a wide area network, there might be many hosts
sharing one interface message processor. Broadcasting systems do have a single communication
channel shared by all other machines or hosts on the network. Broadcasting systems also support
transmission to a subnet of machines and this is known as multicasting where a message is sent
to a group of hosts on the network.
Point to point channels; point to point is a connection between two peer machines. The network
contains numerous cables or leased telephone lines; each of the numerous cables or leased
telephone lines connects a pair of interface message processors. It two interface message
processors that do not share a cable with to communicate, they must do this indirectly, via other
IMPs. A subnet using this principle is called point to point, store and forward, or packet switched
subnet
When a point to point subnet is used, an important design issue is what the IMP interconnection
topology should look like. Locale network have a symmetric topology, whereas wide area
networks have asymmetric topology.
Qn 2. Describe the architecture and usage of ISDN.
ISDN refers to integrated service digital network. It’s a protocol that combines digital
telephony and data transport services. This has enabled the transmission of audio, video, and text
over existing telephone lines.
The user access is the most paid area by the standards organization. There’s a common physical
interface defined to be usable for telephone, computer terminal, and video text as well as DTE-
DCE connection. A number of protocols are needed for exchange of control information between
user device and the network.
Twisted pair cables are used to provide full duplex digital communication link.
The central office connects numerous ISDN subscriber loop signals to the IDN and provides
subscriber access to dedicated lines, packet switched networks among others. Even multiplexed
access via digital PBX and LAN must also be accounted for.
Usage of integrated service digital network is as follows;
Supplementary service; these services provide additional functionality to the bearer and
teleservices and examples of supplementary services are;
Call waiting; a service whereby someone on the telephone is notified of an incoming call and is
able to place the first call on hold while answering, Reverse charging, Message handling;
Bearer service; these services provide the means to transfer information (voice, data and video)
between users without the network manipulating the content of that information. The network
does not need to process the information and therefore does not change the content. Bearer
services belong to the first three layers of the OSI model and are well defined in the ISDN
standard.
Tele services; here, the network may change or process the contents of the data, these services’
correspond to the layers 4-7 of the OSI model i.e.; transport layer, session layer, presentation
layer and application layer. Teleservices rely on the facilities of the bearer services and are to be
aware of details of the process. Teleservices include telephony which is simply a collective term
for all types of voice equipment that are designed to allow interactive communication between
two points, teletex, videotext, telex and
Conferencing; the world is more connected than ever. With the creation of high-speed Internet,
businesses can conduct meetings over long distances and this has become the norm. This form of
long-distance communication has become known as conferencing, and it is a vital part of today's
global communications strategy.
Qn 3. Explain the concept of framing in Data Link Layer and its importance in
dataCommunication.
Data transmission in the physical layer means moving bits in the form of a signal from the
source to destination. The physical layer provides bit synchronization to ensure that the sender
and receiver use the same bit durations and timing. The data link layer packs bits which have
been moved by the Physical Layer, into frames, so that each frame is distinguishable from
another whiles being transmitted to destination.
Framing in the data link layer separates a message from one source to a destination, or from
other messages to other destinations, by adding a sender address and a destination address. The
destination address defines where the packet is to go; the sender address helps the recipient
acknowledge the receipt.
A message is divided into small frames, if an error exists in one of the frames, only that frame
will be retransmitted but not the whole frame as it is when the message is not broken down.
Variable size framing; here frame sizes are not fixed but vary and we need to find a way of
defining the beginning and ending of a frame. Variable size framing is most used in local area
networks than in other networks. We employ two approaches in variable size framing and these
are bit oriented approach and character oriented approach.
Character oriented protocols; Data to be carried are 8 bit characters from a
Coding system (ex: ASCII). The data link layer translates layers raw bit stream into discrete
messages called frames. It’s because the physical layer just accepts a raw bit stream and to
deliver it to destination. This bit stream is not guaranteed to be error free. The number of bits
received may be less than, equal to, or more than the number of bits transmitted. They may also
have different values. It is up to the data link layer to detect and if necessary correct errors. If not
correct at least detect errors and take proper action like ask for retransmission etc. The usual
approach of data link layer is to break the bit stream up into discrete frames and then for the
purpose of error detection or correction, it uses some coding technique that finds some checksum
for each frame. When a frame arrives at the destination, the checksum is recomputed,ifit’s
different from the one contained in the frame, an error has occurred and takes steps to deal with
it
Fixed size framing; in fixed-size framing, there is no need for defining the boundaries of the
frames. The size itself can be used as a delimiter. All this is importance work of data link layer.
Qn 4. Differentiate Noisy and Noiseless channels in Data Communication.
Noise is unwanted signal that is inserted between transmission and reception. What the
source sends is not what the destination receives due to the unwanted signal interfering between
the transmissions of data. Some types of noises are explained below.
Cross talk; Crosstalk is an effect that occurs between neighbor pairs of wires. The electrical
current flowing through one wire will create an electromagnetic field which is captured by the
neighbor wire
Thermal noise; Generated by the thermal agitation of electrons in conductors and it is a function
of temperature. The thermal noise is present in all electronic circuits and transmission media.
Generally, it is mathematically described as a “white noise”.
Impulse;these are irregular pulses or spikes e.g. external electromagnetic interference such as
lightening and it’s an important source of errors for the digital signals.
A channel is a path that data uses in its transmission from source to destination and such channel
include cables.
Therefore a noisy channel is a path that contains other signals other than the original signal sent
by the source and reality we will always have noisy channels as introduced by ClaudeShannon a
formula called the Shannon capacity used for determining he theoretical highest data rate of a
noisy channel
Capacity = bandwidth*log2(1+SNR) where SNR is signal to noise ratio.
We have 3 protocols that we use here
Go back N Automatic Repeat request
Several frames are sent before receiving an acknowledgment from the sender. A copy is kept at
the source until the acknowledgement arrives. Each frame sent is given a sequence number.
Sliding window protocol;this is an abstract concept.it deals with a range of sequence that is a
concern of the sender and receiver. Send sliding window is the range concerned with the sender
and receive sliding window is the range concerned with the receiver.
Stop and wait automatic repeat request
Error control mechanisms are added to the stop and wait protocol. To detect and correct
corrupted frames, we add redundancy bits to the data frame.
Noiseless channel is a channel or path that data uses for its safe transmission from source to
destination without any noise or interference, basically the data reaches the destination as clear
as it was sent without any interference.
The formula for a noiseless channel is known as nyquist bit rate formula which defines the
theoretical maximum bit rate
Bitrate = 2*bandwidth*log2L.
In noiseless channel we have two protocols that we use
Simplest protocol; this is has no error control or flow control and it is unidirectional, data
frames travel in only one direction. Here the receiver can never be overwhelmed with incoming
frames and can handle any frame it receives no matter what size.
Stop and wait protocol. This protocol has flow control. This protocol works in a way that the
source sends a frame and waits for an auxiliary ACK which is a confirmation from the recipient
that it has received the frame. It’s still unidirectional protocol but the auxiliary ACK travels the
opposite side
Qn 5. Explain Connection states and POP3 commands and responses.
POP3 refers for post office protocol version 3. This is an electronic mail protocol with both
client (sender/receiver) and server functions. POP3 supports basic functions for electronic mail
retrieval.
POP3 uses a well-known port 110 and establishes a TCP connection to the server. And the
communication between the client and server passes through three distinct states.
The server first sends a greeting massage to the client. The next state is the authenticate state
where the client authenticates itself to the server. It can use both user id and password, AUTH or
APOP.
After successful authentication, transaction state is next where the client can accesses the
mailbox. With POP3, mail is downloaded from the server to the client and then deleted on the
server. Since email messages are downloaded to the client and removed from the server, this
means that there is not a centralized location where email messages are kept. This makes the
POP3 protocol undesirable in a centralized backup solution for a small business.
Commands and responses of POP3 protocol.
Commands are sent and in turn responses are expected and such responses start with a status
indicator +OK for success and –ERR for failure. A response can be up to 512 characters long.
Some of the commands are listed below.
During authorization, we have the following commands
USER name uses username for authentication,
PASS password uses password for authentication,
APOP name digest; the name and message digest 5 (MD5) to be used for authentication
QUIT; this is used for terminating the process.
AUTH mechanism; this states the authentication / encryption mechanism to be used
During transaction, we have commands like
STAT used to retrieve the number of messages and the total size of the message,
DELEmsg to delete message and number message,
RSET to cancel any previous delete commands among others,
NOOP means do nothing and the server return a positive response,
RETR msg to retrieve message number message.
Qn 6. Explain the two modes of IP Security.
Internet protocol security is a collection of protocols that provide security for a packet at the
network level or 3 layer of the OSI model. It has two modes namely tunnel and transport modes.
Tunnel mode. IPsec protects the entire packet. It takes the entire packet and applies IPsec
security methods then adds a new IP header. This new has different information than the original
IP header. Tunneling is used to carry traffic of one protocol over the network of a different
protocol. Tunneling is useful when computer workers at home are connecting to a central
computer location.The packets are protected by AH, ESP, or both.
AH is a short form of authentication header and tunnel mode is used when both side of the
security association are gateways like between routers, firewalls. A merit of the tunnel mode is
that the encapsulated IP datagram is totally protected and another possibility of using private
addresses because data is always given another IP header other than the original in a sense that
the encapsulated that can include a private IP address but extra processor power is needed to
operate the tunnel mode of IPsec.
ESP is an acronym of encapsulating security pay load. This is used as a mechanism for integrity
check, authentication and encryption to the IP datagrams.Its working is like the way
Authentication header works in the tunnel mode.
Transport mode. In this mode of security protection is given to what is delivered from the
transport layer to the network layer. The network payload is protected by the transport mode but
not the IP header. The IPsec header and trailer are added to the packet coming from the transport
layer and the IP header is added later to the information. This method is commonly used when
there’s need for host to host or site to site protection of data. Both the sending host and receiving
host use IPsec for encrypting and decrypting the information.
Authentication header also can be applied in transport mode. Here the authentication header is
inserted immediately after the IP header. As known transport mode is used by hosts and not
gateways. This mode reduces the processing power but it changeable fields are not authenticated.
Using ESP in transport mode, the ESP is inserted immediately after the IP header. Neither
authentication nor encryption is provided for the IP header. False packets might be delivered for
processing making it a de merit.

Más contenido relacionado

La actualidad más candente

Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti dokePranoti Doke
 
1834902142 somaya akter
1834902142 somaya akter1834902142 somaya akter
1834902142 somaya aktersomayaakter
 
Unit 3_CND Physical Layer_MODEMS_Pranoti Doke
Unit 3_CND Physical Layer_MODEMS_Pranoti DokeUnit 3_CND Physical Layer_MODEMS_Pranoti Doke
Unit 3_CND Physical Layer_MODEMS_Pranoti DokePranoti Doke
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Nazmun Nahar
 
1834902142(error detection and correction)
1834902142(error detection and correction)1834902142(error detection and correction)
1834902142(error detection and correction)somayaakter
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switchingSneha Dalvi
 
Computer network notes
Computer network notesComputer network notes
Computer network notesLakshmiSamivel
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layerDeepak John
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
somaya akter 1834902142
somaya akter 1834902142somaya akter 1834902142
somaya akter 1834902142somayaakter
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topologySweta Kumari Barnwal
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 

La actualidad más candente (20)

Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti doke
 
1834902142 somaya akter
1834902142 somaya akter1834902142 somaya akter
1834902142 somaya akter
 
Unit 3_CND Physical Layer_MODEMS_Pranoti Doke
Unit 3_CND Physical Layer_MODEMS_Pranoti DokeUnit 3_CND Physical Layer_MODEMS_Pranoti Doke
Unit 3_CND Physical Layer_MODEMS_Pranoti Doke
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
 
Wan notes
Wan notesWan notes
Wan notes
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
1834902142(error detection and correction)
1834902142(error detection and correction)1834902142(error detection and correction)
1834902142(error detection and correction)
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
Computer network notes
Computer network notesComputer network notes
Computer network notes
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Assignment3
Assignment3Assignment3
Assignment3
 
Assignment 02
Assignment 02Assignment 02
Assignment 02
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Data communications
Data communicationsData communications
Data communications
 
Unit 5 : Transport Layer
Unit 5 : Transport LayerUnit 5 : Transport Layer
Unit 5 : Transport Layer
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
somaya akter 1834902142
somaya akter 1834902142somaya akter 1834902142
somaya akter 1834902142
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 

Destacado

Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesGaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesAura Palermo
 
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Aura Palermo
 
iPad Settings Project
iPad Settings ProjectiPad Settings Project
iPad Settings Projectvinsonlp
 
Technical communication
Technical communicationTechnical communication
Technical communicationMark Muhama
 
New features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformNew features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformSysMech
 

Destacado (9)

Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesGaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
 
Pp abby
Pp abbyPp abby
Pp abby
 
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
 
iPad Settings Project
iPad Settings ProjectiPad Settings Project
iPad Settings Project
 
áLbum de fotografías
áLbum de fotografíasáLbum de fotografías
áLbum de fotografías
 
Udl
UdlUdl
Udl
 
Architecture
ArchitectureArchitecture
Architecture
 
Technical communication
Technical communicationTechnical communication
Technical communication
 
New features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformNew features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platform
 

Similar a Network

Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesKaran Kumar
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Communication systems 2010
Communication systems 2010Communication systems 2010
Communication systems 2010greg robertson
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
Data Communication & Networks
Data Communication & NetworksData Communication & Networks
Data Communication & NetworksMiXvideos
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2MR Z
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Sreedhar Chowdam
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxgurjardeep68
 
Data communications
Data communicationsData communications
Data communicationsAshwini
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramayaAbdii Rashid
 

Similar a Network (20)

computer network basics
computer network basicscomputer network basics
computer network basics
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Bt0072
Bt0072Bt0072
Bt0072
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Communication systems 2010
Communication systems 2010Communication systems 2010
Communication systems 2010
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
Data Communication & Networks
Data Communication & NetworksData Communication & Networks
Data Communication & Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Communicationsystems2
Communicationsystems2Communicationsystems2
Communicationsystems2
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptxUnit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
Unit dsffffdgdigigjgkjxclvjxcvxcvxciofjgerioutsiosrut1.pptx
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Data communications
Data communicationsData communications
Data communications
 
Chapter 1 introduction haramaya
Chapter 1 introduction haramayaChapter 1 introduction haramaya
Chapter 1 introduction haramaya
 

Último

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Network

  • 1. COMPUTER NETWORKS BSc IT semester 2 Name: Muhama Mark BT0072 Roll: 1210000081 Qn 1. Write about different network structures in use. In any network there exists a collection of machines varying uses or application programs called hosts. The hosts are connected by a communication subnet or just subnet. There are two distinct components knows as transmission lines and switching elements. These two components are most in wide area networks. The transmission lines move bits between machines and examples are channel, trunks and circuits. Interface message processor is another name given to switching elements. Here each host is connected to one or many interface message processors and all traffic from a host goes through its interface message processor (IMP). There are basically two types of designs for communication subnets. Broadcast channels; broadcasting is the transmission of a message from one end or source and receiving information to the rest of the system most local area networks and a small portion of wide area networks are of this type (broadcasting). In a local area network, the interface message processor is reduced to a single chip embedded inside the host or node so that there is always one host per interface message processor whereas in a wide area network, there might be many hosts sharing one interface message processor. Broadcasting systems do have a single communication channel shared by all other machines or hosts on the network. Broadcasting systems also support transmission to a subnet of machines and this is known as multicasting where a message is sent to a group of hosts on the network. Point to point channels; point to point is a connection between two peer machines. The network contains numerous cables or leased telephone lines; each of the numerous cables or leased telephone lines connects a pair of interface message processors. It two interface message processors that do not share a cable with to communicate, they must do this indirectly, via other IMPs. A subnet using this principle is called point to point, store and forward, or packet switched subnet When a point to point subnet is used, an important design issue is what the IMP interconnection topology should look like. Locale network have a symmetric topology, whereas wide area networks have asymmetric topology. Qn 2. Describe the architecture and usage of ISDN. ISDN refers to integrated service digital network. It’s a protocol that combines digital telephony and data transport services. This has enabled the transmission of audio, video, and text over existing telephone lines. The user access is the most paid area by the standards organization. There’s a common physical interface defined to be usable for telephone, computer terminal, and video text as well as DTE- DCE connection. A number of protocols are needed for exchange of control information between user device and the network.
  • 2. Twisted pair cables are used to provide full duplex digital communication link. The central office connects numerous ISDN subscriber loop signals to the IDN and provides subscriber access to dedicated lines, packet switched networks among others. Even multiplexed access via digital PBX and LAN must also be accounted for. Usage of integrated service digital network is as follows; Supplementary service; these services provide additional functionality to the bearer and teleservices and examples of supplementary services are; Call waiting; a service whereby someone on the telephone is notified of an incoming call and is able to place the first call on hold while answering, Reverse charging, Message handling; Bearer service; these services provide the means to transfer information (voice, data and video) between users without the network manipulating the content of that information. The network does not need to process the information and therefore does not change the content. Bearer services belong to the first three layers of the OSI model and are well defined in the ISDN standard. Tele services; here, the network may change or process the contents of the data, these services’ correspond to the layers 4-7 of the OSI model i.e.; transport layer, session layer, presentation layer and application layer. Teleservices rely on the facilities of the bearer services and are to be aware of details of the process. Teleservices include telephony which is simply a collective term for all types of voice equipment that are designed to allow interactive communication between two points, teletex, videotext, telex and Conferencing; the world is more connected than ever. With the creation of high-speed Internet, businesses can conduct meetings over long distances and this has become the norm. This form of long-distance communication has become known as conferencing, and it is a vital part of today's global communications strategy. Qn 3. Explain the concept of framing in Data Link Layer and its importance in dataCommunication. Data transmission in the physical layer means moving bits in the form of a signal from the source to destination. The physical layer provides bit synchronization to ensure that the sender and receiver use the same bit durations and timing. The data link layer packs bits which have been moved by the Physical Layer, into frames, so that each frame is distinguishable from another whiles being transmitted to destination. Framing in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address. The destination address defines where the packet is to go; the sender address helps the recipient acknowledge the receipt. A message is divided into small frames, if an error exists in one of the frames, only that frame will be retransmitted but not the whole frame as it is when the message is not broken down.
  • 3. Variable size framing; here frame sizes are not fixed but vary and we need to find a way of defining the beginning and ending of a frame. Variable size framing is most used in local area networks than in other networks. We employ two approaches in variable size framing and these are bit oriented approach and character oriented approach. Character oriented protocols; Data to be carried are 8 bit characters from a Coding system (ex: ASCII). The data link layer translates layers raw bit stream into discrete messages called frames. It’s because the physical layer just accepts a raw bit stream and to deliver it to destination. This bit stream is not guaranteed to be error free. The number of bits received may be less than, equal to, or more than the number of bits transmitted. They may also have different values. It is up to the data link layer to detect and if necessary correct errors. If not correct at least detect errors and take proper action like ask for retransmission etc. The usual approach of data link layer is to break the bit stream up into discrete frames and then for the purpose of error detection or correction, it uses some coding technique that finds some checksum for each frame. When a frame arrives at the destination, the checksum is recomputed,ifit’s different from the one contained in the frame, an error has occurred and takes steps to deal with it Fixed size framing; in fixed-size framing, there is no need for defining the boundaries of the frames. The size itself can be used as a delimiter. All this is importance work of data link layer. Qn 4. Differentiate Noisy and Noiseless channels in Data Communication. Noise is unwanted signal that is inserted between transmission and reception. What the source sends is not what the destination receives due to the unwanted signal interfering between the transmissions of data. Some types of noises are explained below. Cross talk; Crosstalk is an effect that occurs between neighbor pairs of wires. The electrical current flowing through one wire will create an electromagnetic field which is captured by the neighbor wire Thermal noise; Generated by the thermal agitation of electrons in conductors and it is a function of temperature. The thermal noise is present in all electronic circuits and transmission media. Generally, it is mathematically described as a “white noise”. Impulse;these are irregular pulses or spikes e.g. external electromagnetic interference such as lightening and it’s an important source of errors for the digital signals. A channel is a path that data uses in its transmission from source to destination and such channel include cables. Therefore a noisy channel is a path that contains other signals other than the original signal sent by the source and reality we will always have noisy channels as introduced by ClaudeShannon a formula called the Shannon capacity used for determining he theoretical highest data rate of a noisy channel Capacity = bandwidth*log2(1+SNR) where SNR is signal to noise ratio. We have 3 protocols that we use here Go back N Automatic Repeat request
  • 4. Several frames are sent before receiving an acknowledgment from the sender. A copy is kept at the source until the acknowledgement arrives. Each frame sent is given a sequence number. Sliding window protocol;this is an abstract concept.it deals with a range of sequence that is a concern of the sender and receiver. Send sliding window is the range concerned with the sender and receive sliding window is the range concerned with the receiver. Stop and wait automatic repeat request Error control mechanisms are added to the stop and wait protocol. To detect and correct corrupted frames, we add redundancy bits to the data frame. Noiseless channel is a channel or path that data uses for its safe transmission from source to destination without any noise or interference, basically the data reaches the destination as clear as it was sent without any interference. The formula for a noiseless channel is known as nyquist bit rate formula which defines the theoretical maximum bit rate Bitrate = 2*bandwidth*log2L. In noiseless channel we have two protocols that we use Simplest protocol; this is has no error control or flow control and it is unidirectional, data frames travel in only one direction. Here the receiver can never be overwhelmed with incoming frames and can handle any frame it receives no matter what size. Stop and wait protocol. This protocol has flow control. This protocol works in a way that the source sends a frame and waits for an auxiliary ACK which is a confirmation from the recipient that it has received the frame. It’s still unidirectional protocol but the auxiliary ACK travels the opposite side Qn 5. Explain Connection states and POP3 commands and responses. POP3 refers for post office protocol version 3. This is an electronic mail protocol with both client (sender/receiver) and server functions. POP3 supports basic functions for electronic mail retrieval. POP3 uses a well-known port 110 and establishes a TCP connection to the server. And the communication between the client and server passes through three distinct states. The server first sends a greeting massage to the client. The next state is the authenticate state where the client authenticates itself to the server. It can use both user id and password, AUTH or APOP. After successful authentication, transaction state is next where the client can accesses the mailbox. With POP3, mail is downloaded from the server to the client and then deleted on the server. Since email messages are downloaded to the client and removed from the server, this means that there is not a centralized location where email messages are kept. This makes the POP3 protocol undesirable in a centralized backup solution for a small business. Commands and responses of POP3 protocol.
  • 5. Commands are sent and in turn responses are expected and such responses start with a status indicator +OK for success and –ERR for failure. A response can be up to 512 characters long. Some of the commands are listed below. During authorization, we have the following commands USER name uses username for authentication, PASS password uses password for authentication, APOP name digest; the name and message digest 5 (MD5) to be used for authentication QUIT; this is used for terminating the process. AUTH mechanism; this states the authentication / encryption mechanism to be used During transaction, we have commands like STAT used to retrieve the number of messages and the total size of the message, DELEmsg to delete message and number message, RSET to cancel any previous delete commands among others, NOOP means do nothing and the server return a positive response, RETR msg to retrieve message number message. Qn 6. Explain the two modes of IP Security. Internet protocol security is a collection of protocols that provide security for a packet at the network level or 3 layer of the OSI model. It has two modes namely tunnel and transport modes. Tunnel mode. IPsec protects the entire packet. It takes the entire packet and applies IPsec security methods then adds a new IP header. This new has different information than the original IP header. Tunneling is used to carry traffic of one protocol over the network of a different protocol. Tunneling is useful when computer workers at home are connecting to a central computer location.The packets are protected by AH, ESP, or both. AH is a short form of authentication header and tunnel mode is used when both side of the security association are gateways like between routers, firewalls. A merit of the tunnel mode is that the encapsulated IP datagram is totally protected and another possibility of using private addresses because data is always given another IP header other than the original in a sense that the encapsulated that can include a private IP address but extra processor power is needed to operate the tunnel mode of IPsec. ESP is an acronym of encapsulating security pay load. This is used as a mechanism for integrity check, authentication and encryption to the IP datagrams.Its working is like the way Authentication header works in the tunnel mode. Transport mode. In this mode of security protection is given to what is delivered from the transport layer to the network layer. The network payload is protected by the transport mode but not the IP header. The IPsec header and trailer are added to the packet coming from the transport layer and the IP header is added later to the information. This method is commonly used when there’s need for host to host or site to site protection of data. Both the sending host and receiving host use IPsec for encrypting and decrypting the information.
  • 6. Authentication header also can be applied in transport mode. Here the authentication header is inserted immediately after the IP header. As known transport mode is used by hosts and not gateways. This mode reduces the processing power but it changeable fields are not authenticated. Using ESP in transport mode, the ESP is inserted immediately after the IP header. Neither authentication nor encryption is provided for the IP header. False packets might be delivered for processing making it a de merit.