0% found this document useful (0 votes)
3 views

Computer communication & network

The document provides an overview of computer networks, including definitions, types (LAN, MAN, WAN), network topology, and network interface cards (NICs). It also discusses CDMA technology, its advantages and disadvantages, and different data transmission methods such as unicasting, anycasting, multicasting, and broadcasting. Additionally, it compares hubs, switches, and routers, and explains Ethernet, segments, and subnets.

Uploaded by

tokeye5819
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer communication & network

The document provides an overview of computer networks, including definitions, types (LAN, MAN, WAN), network topology, and network interface cards (NICs). It also discusses CDMA technology, its advantages and disadvantages, and different data transmission methods such as unicasting, anycasting, multicasting, and broadcasting. Additionally, it compares hubs, switches, and routers, and explains Ethernet, segments, and subnets.

Uploaded by

tokeye5819
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA

ENROLLMENT NO:

1. What is Network? Types of Network?

ANS: A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

Types of Computer Network

There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)

1. Local Area Network (LAN)

1. Local area network is a group of computers connected with each other in a small

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

places such as school, hospital, apartment etc.


2. LAN is secure because there is no outside connection with the local area network
thus the data which is shared is safe on the local area network and can’t be
accessed outside.

3. LAN due to their small size are considerably faster, their speed can range
anywhere from 100 to 100Mbps.

4. LANs are not limited to wire connection; there is a new evolution to the LANs that
allows local area network to work on a wireless connection.

2. Metropolitan Area Network (MAN)

MAN network covers larger area by connections LANs to a larger network of


computers. In Metropolitan area network various Local area networks are connected
with each other through telephone lines. The size of the Metropolitan area network is
larger than LANs and smaller than WANs(wide area networks), a MANs covers the
larger area of a city or town.

3. Wide area network (WAN)

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Wide area network provides long distance transmission of data. The size of the WAN
is larger than LAN and MAN. A WAN can cover country, continent or even a whole
world. Internet connection is an example of WAN. Other examples of WAN are
mobile broadband connections such as 3G, 4G etc.

2. What is Network Topology?


ANS:
Network topology is the arrangement of the elements (links, notes, etc.) of a
communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command
and control radio networks, industrial fieldbuses and computer networks.
Network topology is the topological structure of a network and may be depicted
physically or logically. It is an application of wherein cosmography medicating
devices are modelled as nodes and the connections between the devices are
modelled as links or lines between the nodes. Physical topology is the placement
of the various components of a network (e.g., device location and cable installation),
illustrates how data flows within a network. Distances between nodes, physical
interconnections, transmission, or signal types may differ between two different
networks, yet their logical topologies may be identical. A network’s physical topology
is a particular concern of the physical layer of the OSI model.
Examples of network topologies are found in local area network (LAN), a common
computer network installation. Any given node in the LAN has one or more physical
links to other devices in the network; graphically mapping these links results in a
geometric shape that can be used to describe the physical topology of the network.
A wide variety of physical topologies have been used in LANs,
including ring, bus, mesh and star. Conversely, mapping the data flow between the
components determines the logical topology of the network. In comparison, controller
area network, common in vehicles, are primarily distributed control system networks

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

of one or more controllers interconnected with sensors and actuators over,


invariably, a physical bus topology.

Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.

Physical topology is the geometric representation of all the nodes in a network.

3. What is NIC? Types of NIC?

ANS:

Network Interface Card (NIC) is a hardware component that is present on the


computer. It is used to connect different networking devices such as computers
and servers to share data over the connected network. It provides functionality such
as support for I/O interrupt, Direct Memory Access (DMA) interfaces, partitioning,
and data transmission.

NIC is important for us to establish a wired or wireless connection over the network.

Types of Network Interface Cards -

There are the following two types of NICs

1. Ethernet NIC

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Ethernet NIC was developed by Robert Metcalf in 1980. It is made by Ethernet


cables. This type of NIC is most widely used in the LAN, MAN, and WAN networks.

Example: TP-LINK TG-3468 Gigabit PCI Express Network Adapter.

2. Wireless Networks NIC

It is a wireless network that allows us to connect the devices without using the
cables. These types of NICs are used to design a Wi-Fi connection.

Example: Intel 3160 Dual-Band Wireless Adapter

4. What is CDMA? Describe the Centralized Methods in CDMA?

ANS:- Code-division multiple access (CDMA) is a channel access method used by


various radio communication technologies. CDMA is an example of multiple
accesses, where several transmitters can send information simultaneously over a
single communication channel. ... CDMA is used as the access method in many
mobile phone standards.

Centralized Methods:

 The band used in CDMA is 824 MHz to 894 MHz (50 MHz + 20 MHz
separation).
 Frequency channel is divided into code channels.
 1.25 MHz of FDMA channel is divided into 64 code channels.

5. What are the Advantages of CDMA? What are the Disadvantages of Code
Division Multiple Access?
ANS:
Benefits or advantages of CDMA

Following are the benefits or advantages of CDMA:

In CDMA signal to be transmitted spread across the wide bandwidth due to


spreading. Hence CDMA is robust against fading and noisy environment.

As the transmitted information is below the noise floor, it is difficult to intrude the
CDMA spectrum. Moreover it is difficult for hackers to decipher the CDMA code used

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

over traffic channel. Hence CDMA is more secure system.

CDMA allows use of entire bandwidth simultaneously and hence there is no limit on
number of subscribers per cell unlike TDMA and FDMA access schemes. This
depends on number of codes supported by the CDMA compliant base station.
Moreover it is easy to add users.

During the handover between the cells, due to soft handoff feature initially
connection is being established with new cell and hence it minimizes chances of call
drop or disconnection.

CDMA networks can interoperate with other cellular networks such as GSM/LTE.
Hence nationwide roaming is possible without any issues.

Drawbacks or disadvantages of CDMA

Following are the disadvantages of CDMA:

In CDMA, orthogonal codes are used by mobile subscribers. Orthogonality between


the codes need to be maintained in order to recover the data. The subscribers which
are farthest from BS will incur more attenuation and hence will lose the orthogonality
and hence it will be difficult to recover the data.

CDMA uses soft handoff. In this type of handoff, mobile needs to establish
connection with the new target cell before disconnecting itself from serving cell. This
procedure it more complex compare to the hard handoff type.

Precision code synchronization is needed to recover the original baseband signal.

Increase in number of users will decrease the overall Quds.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Near far problem is encountered in CDMA system. This requires close control of
transmit powers of CDMA handsets. This helps farthest CDMA Phone to transmit at
higher power compare to CDMA phone which is closer in order to maintain good
SNR at BS (Base station).

Self-Jamming is observed in CDMA system due to loss of orthogonality of PN codes


or spreading sequences of different subscribers.

6. What are Unicasting, Any casting, Multicasting and Broadcasting?


ANS:

1. Unicasting
Unicasting is the most commonly used data transmission type on the internet. In
Unicasting, the data traffic flows from a single source node to a single destination
node on the network. It is a 'one-to-one' type of data transmission between the
sender and receiver. In other words, we can say that a single station is sending
information to another station on the network. The below-mentioned diagram best
describes unicasting:

It can be best implemented in computer-to-computer or server-to-server or client-


to-server kind of communications. SMTP (Simple Mail Transfer Protocol) protocol

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

can be used for unicasting an email on the internet. Similarly, FTP (File Transfer
Protocol) can be used for unicasting a particular file from one computer to another
on the network. Some other protocols like HTTP (Hyper Text Mark-up Language),
Telnet, etc. can also be used for unicasting on the network.

2. Any casting
Any cast is a one-to-nearest kind of transmission in which a single source
sends a message to the nearest destination(among multiple possible
destinations). It can only be implemented using IPv6 addressing. IPv4 addressing
cannot be used for any casting. In Any casting, a single IPv6 address is assigned
to multiple devices in the network. Any casting is described in the below-mentioned
diagram.

Any casting is mainly used by Routers. The Any cast address is an address that
can be assigned to a group of devices on the network (mostly routers). In the
above diagram, all the devices with green shade have the same any cast address.
But the data is received by only one device, which is in dark green shade (because
it was the first one to receive the message).

For Example, if we search something on the internet, the request is fulfilled by the
nearest source using any casting. In Any cast, the data is delivered to only one
destination randomly (based on its distance from the source). In other words, the
traffic is received by the nearest receiver amongst multiple receivers having the
same IP and any cast address. Protocols like '6to4', etc. can be used for any

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

casting data packets in the network. The scope of any casting is within the whole
network.

3. Multicasting
Multicast is a kind of transmission type in which a single source
communicates a message to a group of devices. It is a kind of one-to-multiple
transmission. All the devices which are interested in receiving the messages will
have to first join the multicast group. Multicasting is described in the below-
mentioned diagram:

Multicasting is used in an IP Multicast group in the network. The IP multicast group


consists of all the devices which are interested in receiving the multicast traffic. The
source need not be a member of that group. Multicasting is always done using a
single source. Also, a multicast address can never be the source address.

Multicasting uses a class-D type of address (to connect multiple destination nodes
for multicasting). If a sender multicasts some data on a destination address, all the
devices that are connected to that destination IP Multicast group will receive that
data. The IPv6 address uses a prefix 'FF00:/8' for multicasting the messages.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

4. Broadcasting
Broadcasting is a transmission type in which the data traffic flows from a
single source to all the devices on the network. It sends the information to
every device at once. The same data is received by everyone, making it efficient for
wide-spreading the message with all nodes. Broadcasting is an IPv4 specific data
transmission type. The below-mentioned diagram best describes broadcasting.

In broadcasting, every node has a look at the sent data and information in the
network. HTTP (Hyper Text Transfer Protocol) can be used for broadcasting.

For example, whenever we connect to the internet through HTTP, we broadcast


requests to all devices asking about the DHCP server. It has a limited domain. The
messages can be broadcasted within the broadcast domain, which is a local
subnet.

7. Differences between Hub, Switch and Router?

ANS:

1. Hub: - A hub is basically a multiport repeater. A hub connects multiple wires


coming from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, collision domain of all hosts connected through

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Hub remains one. Also, they do not have the intelligence to find out best path for data
packets which leads to inefficiencies and wastage.

Types of Hub

 Active Hub: - These are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. It serves both as a
repeater as well as wiring centre. These are used to extend the maximum
distance between nodes.

 Passive Hub: - These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.

 Intelligent Hub: - It work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.

2. Switch: -
A switch is a multiport bridge with a buffer and a design that can boost its efficiency
(a large number of ports imply less traffic) and performance. A switch is a data link
layer device. The switch can perform error checking before forwarding data that
makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to correct port only. In other words, switch divides collision
domain of hosts, but broadcast domain remains same.

3. Routers: -
A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which
they make decisions on routing the data packets. Router divide broadcast domains of
hosts connected through it.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

8. What is Ethernet? What is a “segment”? What is a “subnet”?


ANS:-
ETHERNET:
Ethernet is a technology that connects wired local area networks (LANs) and enables
the device to communicate with each other through a protocol which is the common
network language. This LAN is a network of computers and other electronic devices
which covers a small area in your places like in the office, house, room or building.
Unlike LAN, wide area network (WAN) covers much larger geographical areas.
Furthermore, Ethernet is a protocol that controls the processes on how the data is
transmitted through LAN. It also indicates how the network devices can transmit and
format data packets so that the other network devices in the same area network
segment can be able to receive, process and recognize them.

SEGMENT:
A segment is a component of a business that generates its own revenues and
creates its own product, product lines, or service offerings. Segments typically have
discrete associated costs and operations. Segments are also referred to as
"business segments."

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Usually, if a unit of a business can be separated or lifted out of the company as a


whole and remain self-sufficient, it satisfies the criteria of being classified as a
business segment. Financial information should be available for each separate
segment's activities and performance.

Traditionally, each individual segment is periodically reviewed by the company's


management before a decision can be made regarding the amount of capital that
will be allotted to it for a particular operating period.

SUBNET:

Every device has an IP address with two pieces: the client or host address and the
server or network address. IP addresses are either configured by a DHCP server or
manually configured (static IP addresses). The subnet mask splits the IP address
into the host and network addresses, thereby defining which part of the IP address
belongs to the device and which part belongs to the network.

The device called a gateway or default gateway connects local devices to other
networks. This means that when a local device wants to send information to a device
at an IP address on another network, it first sends its packets to the gateway, which
then forwards the data on to its destination outside of the local network.

9. Why must the MAC address to be unique?

ANS:-

The IEEE manages MAC addresses. The hardware identification addresses that the
IEEE distributes are unique. That makes the probability of matching MAC addresses
zero.

On the other hand, some hardware MAC addresses are programmable, which
makes them spoof able. This means that it is possible for two machines in the same
network to have the same MAC address.

To actually calculate the probability that two or more computers in the same network
share the same MAC address, look up 'selection with and without replacement' in an
introductory Combinatory or Probability and Statistics textbook and follow the
procedures outlined in the book.

10. List the layers of OSI? What are the responsibilities of Data Link Layer?

The 7 Layers of the OSI Model

1. Physical Layer

2. Data Link Layer

3. Network Layer

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Data link layer transforms the physical layer, a raw transmission facility to a reliable link. It is
responsible for moving frames from one hop (node) to the next i.e. Hop-to-Hop delivery.

For effective data communication between two directly connected transmitting and receiving
stations the data link layer has to carry out a number of specific functions as follows:

1. Services provided to the network layer:


A well-defined service interface to the network layer on source machine to the
network layer on destination machine.
2. Frame synchronisation:
The source machine sends data in blocks called frames to the destination machine.
The starting and ending of each frame should be recognised by the destination
machine.

3. Flow control:
The source machine must not send data frames at a rate faster than the destination
machine can accept them.

4. Error control:
The errors made in bits during transmission from source to destination machines
must be detected and corrected.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

5. Addressing:
On a multipoint line, such as many machines connected together (LAN), the identity
of the individual machines must be specified while transmitting the data frames.

6. Control and data on same link:


The data and control information is combined in a frame and transmitted from the
source to destination machine. The destination machine must be able to recognise
control information from the data being transmitted.

7. Link Management:
The initiation, maintenance and termination of the link between the source and
destination are required for effective exchange of data. It requires co-ordination and
co-operation among stations. Protocols or procedures are required for the link
management.

11. What is the difference between TCP and UDP?

ANS:-
As we know that both TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol) are the most widely used Internet protocols among which TCP is
connection oriented − once a connection is established, data can be sent
bidirectional. UDP is a simpler, connectionless Internet protocol. Multiple messages
are sent as packets in chunks using UDP. Now on the basis of features of attributes
we can distinguish between TCP and UDP
Following are the important differences between TCP and UDP.

Sr. Key TCP (Transmission UDP (User Datagram


No. Control Protocol) Protocol)

1 Definition It is a communications It is same as the TCP


protocol, using which the protocol except this doesn’t
data is transmitted guarantee the error-checking
between systems over the and data recovery.
network. If you use this protocol, the
In this, the data is data will be sent
transmitted into the form continuously, irrespective of
of packets. the issues in the receiving
It includes error-checking,
guarantees the delivery

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Sr. Key TCP (Transmission UDP (User Datagram


No. Control Protocol) Protocol)

and preserves the order of end.


the data packets.

2 Design TCP is a connection UDP is a connection less


oriented protocol. protocol.

3 Reliable As TCP provides error While on other hand UDP


checking support and also does provided only basic
guarantees delivery of error checking support using
data to the destination checksum so the delivery of
router this make it more data to the destination
reliable as compared to cannot be guaranteed in
UDP. UDP as compared to that in
case of TCP.

4 Data In TCP the data is On other hand there is no


transmission transmitted in a particular sequencing of data in UDP
sequence which means in order to implement
that packets arrive in- ordering it has to be
order at the receiver. managed by the application
layer.

5 Performance TCP is slower and less On other hand UDP is faster


efficient in performance as and more efficient than TCP.
compared to UDP. Also
TCP is heavy-weight as
compared to UDP.

6 Retransmission Retransmission of data On other hand


packets is possible in TCP retransmission of packets is
in case packet get lost or not possible in UDP.
need to resend.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

12. What is Cryptography ?

ANS:-

Cryptography:-

Cryptography is a method of protecting information and communications through the


use of codes, so that only those for whom the information is intended can read and
process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy"
stands for "writing."

In computer science, cryptography refers to secure information and communication


techniques derived from mathematical concepts and a set of rule-based calculations
called algorithms, to transform messages in ways that are hard to decipher. These
deterministic algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on the internet, and confidential
communications such as credit card transactions and email.

Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It
includes techniques such as microdots, merging words with images, and other ways
to hide information in storage or transit. However, in today's computer-centric world,
cryptography is most often associated with scrambling plaintext (ordinary text,
sometimes referred to as clear text) into cipher text (a process called encryption),
then back again (known as decryption). Individuals who practice this field are known
as cryptographers.

Procedures and protocols that meet some or all of the above criteria are known as
cryptosystems. Cryptosystems are often thought to refer only to mathematical
procedures and computer programs; however, they also include the regulation of
human behavior, such as choosing hard-to-guess passwords, logging off unused
systems, and not discussing sensitive procedures with outsiders.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

Cryptographic algorithms
Cryptosystems use a set of procedures known as cryptographic algorithms, or
ciphers, to encrypt and decrypt messages to secure communications among
computer systems, devices such as smartphones, and applications. A cipher suite
uses one algorithm for encryption, another algorithm for message authentication,
and another for key exchange. This process, embedded in protocols and written in
software that runs on operating systems and networked computer systems, involves
public and private key generation for data encryption/decryption, digital signing and
verification for message authentication, and key exchange.

BCA(INFOSYS) PAGE NO:1


COMPUTER COMMUNICATION & NETWORK NAME: BHAVDEEP VADADORIYA
ENROLLMENT NO:

13. What is Digital Signature?

ANS:-
Digital signatures are the public-key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed
messages. They are used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital
data. This binding can be independently verified by receiver as well as any third
party.
Digital signature is a cryptographic value that is calculated from the data and a
secret key known only by the signer.
In real world, the receiver of message needs assurance that the message belongs
to the sender and he should not be able to repudiate the origination of that
message. This requirement is very crucial in business applications, since likelihood
of a dispute over exchanged data is very high.

Model of Digital Signature

As mentioned earlier, the digital signature scheme is based on public key


cryptography. The model of digital signature scheme is depicted in the following
illustration −

BCA(INFOSYS) PAGE NO:1

You might also like