Assignment 1,2
Assignment 1,2
1. Resource Sharing:
3. Cost Efficiency:
o Networks allow multiple users to share expensive hardware
like servers, printers, and storage devices. It reduces the need
for individual resources for each computer.
4. Improved Communication:
5. Scalability:
6. Remote Access:
o Users can access the network from remote locations (via VPN
or other remote access technologies), enabling work from
anywhere and making global business easier.
Types:
2. Switch
Types:
3. Router
Description: A router is a device that connects multiple networks,
like a local area network (LAN) to the Internet or other wide area
networks (WANs).
Types:
4. Modem
Types:
6. Firewall
Types:
Types:
8. Hub
9. Repeater
10. Bridge
Description: A bridge is a device used to divide a large network
into smaller, more manageable segments.
11. Gateway
Use Cases: Mobile networks and satellite systems used for global
communication and data transfer.
1. Bus Topology
Characteristics:
Advantages:
Disadvantages:
Characteristics:
o Each device has its own direct connection to the central hub.
Advantages:
Disadvantages:
3. Ring Topology
Characteristics:
Advantages:
Disadvantages:
o A failure in any cable or device breaks the entire network.
4. Mesh Topology
Types:
Advantages:
Disadvantages:
5. Tree Topology
Characteristics:
o The network branches out from a single root node, like a tree.
Advantages:
Disadvantages:
6. Hybrid Topology
Characteristics:
Advantages:
Disadvantages:
7. Point-to-Point Topology
Characteristics:
Disadvantages:
How it Works:
Use Cases:
o Radio and TV broadcasting: Different stations operate on
different frequencies.
Advantages:
Disadvantages:
Types:
How it Works:
o When the time slot for one signal ends, the next signal uses
the channel for its time slot, and this cycle repeats.
Use Cases:
Advantages:
o Simple to implement and manage.
Disadvantages:
How it Works:
Types:
Use Cases:
Advantages:
How it Works:
Use Cases:
o GPS systems.
Advantages:
Disadvantages:
Question 1: Define the term Error and its types in Computer Network.
In computer networks, Error refers to any alteration or distortion in the
data during transmission. When data is transmitted from one device to
another, it may get corrupted due to various reasons such as interference,
noise, or signal degradation. An error occurs when the received data
differs from the sent data. Errors can result in corrupted packets, data
loss, or even system failure in some cases.
There are two primary types of errors that occur in computer networks:
1. Single-Bit Error
1. Random Errors
2. Systematic Errors
3. Forward Error
4. Backward Error
Definition: Backward errors involve the detection of errors followed
by a request for the data to be retransmitted. This happens when
the error detection mechanism identifies a problem.
Definition:
High-Level Data Link Control (HDLC) is a bit-oriented protocol for
communication over point-to-point and multipoint links. It is used to
provide reliable communication between nodes in a computer network
and ensures proper synchronization, error detection, and flow control.
HDLC operates at the data link layer (Layer 2) of the OSI model.
Modes of Operation:
Advantages:
Applications:
2. ALOHA
Definition:
ALOHA is a simple network protocol for managing communication
between nodes in a shared medium (such as radio frequencies or a
network channel). It was originally developed at the University of Hawaii
for radio-based communication systems. ALOHA is the foundation of
random access methods, where multiple users share the same
communication channel.
Pure ALOHA
Slotted ALOHA
Pure ALOHA
Slotted ALOHA
Advantages:
Disadvantages:
Applications:
Forms the basis for Wi-Fi (IEEE 802.11) and other wireless
networking technologies, where random access is essential.
Working of CSMA:
Types of CSMA:
How it Works:
Advantages:
Disadvantages:
Applications:
How it Works:
Advantages:
Disadvantages:
Applications:
3. Non-Persistent CSMA
How it Works:
Advantages:
Disadvantages:
Applications:
4. 1-Persistent CSMA
Advantages:
Disadvantages:
Applications:
5. P-Persistent CSMA
How it Works:
Advantages:
Disadvantages:
Applications:
Ethernet IEEE 802.3 and IEEE 802.5 are two widely recognized
standards for networking, each defining different methods for local area
network (LAN) access. While IEEE 802.3 defines Ethernet standards, IEEE
802.5 specifies the Token Ring protocol. Here’s a detailed explanation of
both:
Definition: IEEE 802.5 defines the Token Ring protocol, which was
once a popular LAN technology, particularly in IBM networks. Unlike
Ethernet, Token Ring uses a different access method based on
token-passing.
o 4 Mbps
o 16 Mbps
A. ALOHA
Types:
o Pure ALOHA: Devices transmit whenever they have data. If a
collision occurs, devices wait a random amount of time before
retransmitting. Pure ALOHA has a maximum channel efficiency
of about 18.4%.
Variants:
C. Non-Persistent CSMA
D. 1-Persistent CSMA
E. P-Persistent CSMA
A. Token Ring
B. Polling
D. Reservation Protocols
1. Network Type: The choice of protocol may differ for wired and
wireless networks due to the different challenges each presents.
2. Traffic Load: High traffic networks may benefit from controlled
access protocols to minimize collisions, while low traffic networks
may perform well with random access methods.
Advantages:
Disadvantages: