Computer Networks 2
Computer Networks 2
KHARAR, PUNJAB
COMPUTER NETWORKS
ASSIGNMENT – II
BTCS 504 – 18
B. TECH 5TH SEMESTER
2023-24
1. Message: This is the data or information that needs to be transmitted from one
point to another. It can be in the form of text, voice, video, or any other digital
content.
2. Sender: The sender is the device or system that initiates the communication
process. It is responsible for creating, encoding, and transmitting the message.
3. Receiver: The receiver is the device or system that receives the message, decodes
it, and presents it to the intended recipient.
4. Transmission Medium: This is the physical or logical pathway through which the
message is transmitted from the sender to the receiver. Transmission mediums can
be wired (e.g., copper cables, fiber optics) or wireless (e.g., radio waves,
microwaves).
5. Protocol: A protocol is a set of rules and conventions that govern the format and
timing of data transmission. It ensures that the sender and receiver can understand
and interpret the message correctly. Common network protocols include TCP/IP
(Transmission Control Protocol/Internet Protocol) for the internet and HTTP
(Hypertext Transfer Protocol) for the web.
6. Modem: Short for modulator-demodulator, a modem converts digital data from a
computer into analog signals for transmission over analog communication lines
and vice versa. Modems are commonly used for internet connections over
telephone lines or cable systems.
7. Multiplexers and Demultiplexers: These devices are used to combine multiple
data streams into a single channel for transmission (multiplexing) and then split
them back into their original streams at the receiving end (demultiplexing).
8. Switches and Routers: Switches and routers are networking devices that help
route data within a local area network (LAN) or wide area network (WAN).
Switches operate at the data link layer and are used for local traffic, while routers
operate at the network layer and handle routing data between different networks.
9. Network Interface Cards (NICs): NICs are hardware components in computers
that connect them to a network. They enable devices to transmit and receive data
over a network.
10. Firewalls: Firewalls are security devices or software that monitor and control
incoming and outgoing network traffic, ensuring the security and privacy of data
being transmitted.
Question 2: Write A Short Note On
a. Transmission Media
Transmission media, in the context of data communication, are the physical or logical
pathways through which data is transmitted from one device to another. They serve as
the channels that enable the exchange of information between sender and receiver in a
data communication system. There are various types of transmission media, each with
its own characteristics, advantages, and limitations. Here's an overview of common
transmission media:
2. Coaxial Cable:
- Coaxial cables consist of a central conductor, an insulating layer, a metallic shield,
and an outer insulating layer.
- They are used in cable television (CATV) systems, as well as for high-speed data
transmission in some network setups.
- Coaxial cables offer better shielding and higher bandwidth than twisted pair cables
but are more expensive.
5. Satellite Communication:
- Satellite communication uses geostationary or low-earth orbit satellites to relay data
between ground stations.
- It is essential for long-distance communication, such as global television broadcasts
and remote areas with limited terrestrial infrastructure.
- Satellite communication is known for its coverage but introduces latency due to
signal travel to and from space.
b. OSI model
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes
and describes the functions of a telecommunication or networking system. It divides the
process of network communication into seven distinct layers, each responsible for specific
tasks and functions. The OSI model was developed by the International Organization for
Standardization (ISO) to promote interoperability between different networking technologies
and systems. Here's a brief overview of each of the seven OSI model layers:
1. Physical Layer (Layer 1):
- The physical layer deals with the actual transmission and reception of raw data bits over a
physical medium, such as cables, wireless signals, or optical fibers.
- It defines the physical characteristics of the transmission medium, like voltage levels, data
rates, and signal encoding.
1. Framing: The Data Link Layer encapsulates the network layer's packets into frames.
Frames are smaller, fixed-size units of data that include control information, such as
source and destination addresses, frame synchronization, and error-checking codes.
Framing allows devices to distinguish the beginning and end of each frame in a data
stream.
2. Addressing: Each device on a local network is assigned a unique Media Access
Control (MAC) address. The Data Link Layer uses these MAC addresses to specify
the source and destination of the frames. MAC addresses are typically burned into a
device's network interface card (NIC) and are used to identify devices at the local
network level.
3. Error Detection and Correction: The Data Link Layer is responsible for ensuring
data integrity during transmission. It performs error detection by including checksums
or cyclic redundancy checks (CRC) in the frame. If errors are detected in a received
frame, it can request retransmission or perform some level of error correction,
depending on the specific protocol used.
4. Flow Control: Flow control mechanisms prevent the sender from overwhelming the
receiver with data. This can be important when data transmission speeds do not match
the capabilities of the receiving device. Flow control mechanisms may include
acknowledgments, sliding window protocols, or other techniques to manage the rate
of data transmission.
5. Media Access Control (MAC): The MAC sublayer of the Data Link Layer is
responsible for controlling access to the shared communication medium in LANs. It
defines rules for how devices contend for access to the network. Protocols like
Ethernet use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) or
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to manage
access to the network.
6. Logical Link Control (LLC): The LLC sublayer is responsible for error recovery
and flow control. It provides an interface between the Data Link Layer and the
Network Layer, ensuring that the correct network layer protocol is encapsulated in the
frame.
Common data link layer protocols include Ethernet, Wi-Fi (802.11), and Point-to-Point
Protocol (PPP). These protocols define the specific rules and formats for framing, addressing,
error detection, and flow control, and they are used in various types of LANs and WANs.
Security: Since the signal appears as noise over a wide frequency range, it is
challenging for unauthorized users to intercept or decipher the transmitted data. This
enhances communication security, making it suitable for military and secure
communication applications.
Resistance to Interference: Spread spectrum signals are less affected by narrowband
interference and jamming, which makes them highly robust in noisy or congested
communication environments.
Multiple Access: CDMA technology enables multiple users to communicate
simultaneously on the same frequency without excessive interference. This is a
fundamental feature of modern mobile communication systems.
Robustness: Spread spectrum technology is known for its resilience to fading,
multipath propagation, and other signal impairments, making it suitable for wireless
communication where signal quality can vary.
Privacy: The use of unique spreading codes for different communication links offers
a level of privacy, as each code is only known to the communicating parties.
One of the most well-known applications of spread spectrum technology is in Code Division
Multiple Access (CDMA) cellular networks, including 3G and 4G mobile systems.
Additionally, spread spectrum is used in wireless local area networks (e.g., Wi-Fi), satellite
communication, and secure military communication systems, where reliability, security, and
resistance to interference are critical requirements.