0% found this document useful (0 votes)
84 views

Pundra University of Science & Technology: Assignment

The document provides information about an assignment for a computer networking course. It includes questions about IP addresses and their versions, OSI and TCP/IP models, packetizing and framing, how collisions occur in a network, and why network design follows a layered model. The questions are answered in detail explaining IP address formats and bits used, the purpose and layers of OSI and TCP/IP, what information is included in packets, how collisions can happen when multiple devices attempt transmission, and how layered models help reduce complexity in network design.

Uploaded by

Jahid Hasan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Pundra University of Science & Technology: Assignment

The document provides information about an assignment for a computer networking course. It includes questions about IP addresses and their versions, OSI and TCP/IP models, packetizing and framing, how collisions occur in a network, and why network design follows a layered model. The questions are answered in detail explaining IP address formats and bits used, the purpose and layers of OSI and TCP/IP, what information is included in packets, how collisions can happen when multiple devices attempt transmission, and how layered models help reduce complexity in network design.

Uploaded by

Jahid Hasan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

PUNDRA UNIVERSITY OF SCIENCE &

TECHNOLOGY
Dept. OF ELECTRICAL & ELECTRONICS ENGINEERING

ASSIGNMENT
Course name: Computer Networking
Course code: CSE-333

1. What is an IP address? What are the versions it has? Write down the
number of bits used in each of these in dotted decimal expression with an
example.

IP address:An Internet Protocol address (IP address) is a numerical label


assigned to each device connectedto a computer network that uses the Internet
Protocol for communication.An IP address serves two main functions: host or
network interface identification and location addressing.
VISION:
• ‘IP’ stands for ‘Internet Protocol’. There are two versions of IP that
currently coexist in the global Internet: IP version 4 (IPv4) and IP version 6
(IPv6).
• IP address stands for internet protocol address; it is an identifying number
that is associated with a specific computer or computer network. When
connected to the internet, the IP address allows the computers to send and
receive information.
• IP addresses are made up of binary values and drive the routing of all data
over the Internet. IPv4 addresses are 32 bits long, and IPv6 addresses 128
bits long.

The number of bits used in each of these in dotted decimal expression


An IPv4 address has 32 bits. For purposes of
representation, the bits may be divided into four
octets written in decimal numbers, ranging from 0
to 255, concatenated as a character string with full
stop delimiters between each number.
For example, the address of
the loopback interface, usually assigned the host
name localhost , is 127.0.0.1. It consists of the four octets, written in binary
notation: 01111111, 00000000, 00000000, and 00000001. The 32-bit number is
represented in hexadecimal notation as 0x7F000001.

An Internet Protocol Version 6 address (IPv6


address) is a numeric label that is used to
identify a network interface of a computer or
a network node participating in
an IPv6 computer network, and locate it in the
network. IP addresses are included in the packet
header to indicate the source and the destination
of each packet. The IP address of the destination
is used to make decisions about routing IP
packets to other networks.
IPv6 is the successor to the first addressing infrastructure of the Internet, Internet
Protocol version 4 (IPv4). In contrast to IPv4, which defined an IP address as a
32-bit value, IPv6 addresses have a size of 128 bits. Therefore, IPv6 has a vastly
enlarged address space.

2.What are OSI and TCP/IP? Explain briefly how it helps to build up the
network. Why it is so important? Write names of the devices which are used
to connect the networks.

OSI model is a generic model that is based upon functionalities of each


layer. TCP/IP model is a protocol-oriented standard. ... OSI model gives
guidelines on how communication needs to be done, while TCP/IP protocols
layout standards on which the Internet was developed. So, TCP/IP is a more
practical model.
TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols used to interconnect network devices on the internet.
TCP/IP can also be used as a communications protocol in a private computer
network (an intranet or extranet).

Important of OSI and TCP/IP up for network


● The OSI model is now considered the primary Architectural model for
inter-computer communications.
● The OSI model describes how information or data makes its way from
application programmes (such as spreadsheets) through a network medium
(such as wire) to another application programme located on another
network.
● The OSI reference model divides the problem of moving information
between computers over a network medium into SEVEN smaller and more
manageable problems.
● This separation into smaller more manageable functions is known as
layering.

The functionality of the TCP IP model is divided into four layers, and each
includes specific protocols.
TCP/IP is a layered server architecture system in which each layer is defined
according to a specific function to perform. All these four TCP/IP layers work
collaboratively to transmit the data from one layer to another.

● Application Layer
● Transport Layer
● Internet Layer
● Network Interface

3. What is meant by Packetizing/Framing? What types of main information are


put in the packets?

A method of transmitting data from a spacecraft. ... During a downlink, a flow of


data known as a packet comes from one instrument followed by a packet from
others, in no particular order. The packets, with identifications of their
measurements, are put tightly into a structure of frames for the downlink.
Different communications protocols use different conventions for distinguishing
between the elements of a packet and for formatting the user data. For example,
in Point-to-Point Protocol, the packet is formatted in 8-bit bytes, and special
characters are used to delimit the different elements. Other protocols,
like Ethernet, establish the start of the header and data elements by their location
relative to the start of the packet. Some protocols format the information at
a bit level instead of a byte level.
The process of encapsulating the data received from upper layers of the network
(also called as payload) in a network layer packet at the source and decapsulating
the payload from the network layer packet at the destination is known as
packetizing. 
The source host adds a header that contains the source and destination address
and some other relevant information required by the network layer protocol to the
payload received from the upper layer protocol, and delivers the packet to the
data link layer. 
The destination host receives the network layer packet from its data link layer,
decapsulates the packet, and delivers the payload to the corresponding upper
layer protocol. The routers in the path are not allowed to change either the source
or the destination address. The routers in the path are not allowed to decapsulate
the packets they receive unless they need to be fragmented. 

4.How collisions may occur? Draw the sketch for showing and explain in
short on how it occurs.

• When devices attempt to use a medium simultaneously, frame collisions


occur.
• By using Data-link protocols or using packet flow control.
• Data-link protocols specify how devices detect and recover from such
collisions, and provide mechanisms to reduce or prevent them.
• Flow control: Flow control refers to a set of procedures used to restrict the
amount of data that the sender can send before waiting for
acknowledgment.
When devices attempt to use a medium
simultaneously, frame collisions occur.
• By using Data-link protocols or using
packet flow control.
• Data-link protocols specify how devices detect and recover from such
collisions, and provide mechanisms to reduce or prevent them.
• Flow control: Flow control refers to a set of procedures used to restrict the
amount of data that the sender can send before waiting for
acknowledgment.

5. Why design of a Net Work should follow certain layered Network model?
Name the two different main layers that are followed? Using blocks answer
by drawing of each.

The most important layer is the Network layer. It delivers packets end-to-end


across the Internet from the source to the destination. The Network hands the
datagram to the Link Layer below, telling it to send the datagram over the first
link. In other words, the Link Layer is providing a service to the Network Layer.

● The process of breaking up the functions


or tasks of networking into layers reduces
complexity.
● Each layer provides a service to the layer
above it in the protocol specification.
● Each layer communicates with the same
layer’s software or hardware on other
computers.
● The lower 4 layers (transport, network, data link and physical —Layers 4,
3, 2, and 1) are concerned with the flow of data from end to end through the
network.
● The upper four layers of the OSI model (application, presentation and
session—Layers 7, 6 and 5) are orientated more toward services to the
applications.

● Data is Encapsulated with the necessary protocol information as it moves


down the layers before network transit.

You might also like