Computer communication & network
Computer communication & network
ENROLLMENT NO:
ANS: A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)
1. Local area network is a group of computers connected with each other in a small
3. LAN due to their small size are considerably faster, their speed can range
anywhere from 100 to 100Mbps.
4. LANs are not limited to wire connection; there is a new evolution to the LANs that
allows local area network to work on a wireless connection.
Wide area network provides long distance transmission of data. The size of the WAN
is larger than LAN and MAN. A WAN can cover country, continent or even a whole
world. Internet connection is an example of WAN. Other examples of WAN are
mobile broadband connections such as 3G, 4G etc.
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
ANS:
NIC is important for us to establish a wired or wireless connection over the network.
1. Ethernet NIC
It is a wireless network that allows us to connect the devices without using the
cables. These types of NICs are used to design a Wi-Fi connection.
Centralized Methods:
The band used in CDMA is 824 MHz to 894 MHz (50 MHz + 20 MHz
separation).
Frequency channel is divided into code channels.
1.25 MHz of FDMA channel is divided into 64 code channels.
5. What are the Advantages of CDMA? What are the Disadvantages of Code
Division Multiple Access?
ANS:
Benefits or advantages of CDMA
As the transmitted information is below the noise floor, it is difficult to intrude the
CDMA spectrum. Moreover it is difficult for hackers to decipher the CDMA code used
CDMA allows use of entire bandwidth simultaneously and hence there is no limit on
number of subscribers per cell unlike TDMA and FDMA access schemes. This
depends on number of codes supported by the CDMA compliant base station.
Moreover it is easy to add users.
During the handover between the cells, due to soft handoff feature initially
connection is being established with new cell and hence it minimizes chances of call
drop or disconnection.
CDMA networks can interoperate with other cellular networks such as GSM/LTE.
Hence nationwide roaming is possible without any issues.
CDMA uses soft handoff. In this type of handoff, mobile needs to establish
connection with the new target cell before disconnecting itself from serving cell. This
procedure it more complex compare to the hard handoff type.
Near far problem is encountered in CDMA system. This requires close control of
transmit powers of CDMA handsets. This helps farthest CDMA Phone to transmit at
higher power compare to CDMA phone which is closer in order to maintain good
SNR at BS (Base station).
1. Unicasting
Unicasting is the most commonly used data transmission type on the internet. In
Unicasting, the data traffic flows from a single source node to a single destination
node on the network. It is a 'one-to-one' type of data transmission between the
sender and receiver. In other words, we can say that a single station is sending
information to another station on the network. The below-mentioned diagram best
describes unicasting:
can be used for unicasting an email on the internet. Similarly, FTP (File Transfer
Protocol) can be used for unicasting a particular file from one computer to another
on the network. Some other protocols like HTTP (Hyper Text Mark-up Language),
Telnet, etc. can also be used for unicasting on the network.
2. Any casting
Any cast is a one-to-nearest kind of transmission in which a single source
sends a message to the nearest destination(among multiple possible
destinations). It can only be implemented using IPv6 addressing. IPv4 addressing
cannot be used for any casting. In Any casting, a single IPv6 address is assigned
to multiple devices in the network. Any casting is described in the below-mentioned
diagram.
Any casting is mainly used by Routers. The Any cast address is an address that
can be assigned to a group of devices on the network (mostly routers). In the
above diagram, all the devices with green shade have the same any cast address.
But the data is received by only one device, which is in dark green shade (because
it was the first one to receive the message).
For Example, if we search something on the internet, the request is fulfilled by the
nearest source using any casting. In Any cast, the data is delivered to only one
destination randomly (based on its distance from the source). In other words, the
traffic is received by the nearest receiver amongst multiple receivers having the
same IP and any cast address. Protocols like '6to4', etc. can be used for any
casting data packets in the network. The scope of any casting is within the whole
network.
3. Multicasting
Multicast is a kind of transmission type in which a single source
communicates a message to a group of devices. It is a kind of one-to-multiple
transmission. All the devices which are interested in receiving the messages will
have to first join the multicast group. Multicasting is described in the below-
mentioned diagram:
Multicasting uses a class-D type of address (to connect multiple destination nodes
for multicasting). If a sender multicasts some data on a destination address, all the
devices that are connected to that destination IP Multicast group will receive that
data. The IPv6 address uses a prefix 'FF00:/8' for multicasting the messages.
4. Broadcasting
Broadcasting is a transmission type in which the data traffic flows from a
single source to all the devices on the network. It sends the information to
every device at once. The same data is received by everyone, making it efficient for
wide-spreading the message with all nodes. Broadcasting is an IPv4 specific data
transmission type. The below-mentioned diagram best describes broadcasting.
In broadcasting, every node has a look at the sent data and information in the
network. HTTP (Hyper Text Transfer Protocol) can be used for broadcasting.
ANS:
Hub remains one. Also, they do not have the intelligence to find out best path for data
packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub: - These are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. It serves both as a
repeater as well as wiring centre. These are used to extend the maximum
distance between nodes.
Passive Hub: - These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub: - It work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
2. Switch: -
A switch is a multiport bridge with a buffer and a design that can boost its efficiency
(a large number of ports imply less traffic) and performance. A switch is a data link
layer device. The switch can perform error checking before forwarding data that
makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to correct port only. In other words, switch divides collision
domain of hosts, but broadcast domain remains same.
3. Routers: -
A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which
they make decisions on routing the data packets. Router divide broadcast domains of
hosts connected through it.
SEGMENT:
A segment is a component of a business that generates its own revenues and
creates its own product, product lines, or service offerings. Segments typically have
discrete associated costs and operations. Segments are also referred to as
"business segments."
SUBNET:
Every device has an IP address with two pieces: the client or host address and the
server or network address. IP addresses are either configured by a DHCP server or
manually configured (static IP addresses). The subnet mask splits the IP address
into the host and network addresses, thereby defining which part of the IP address
belongs to the device and which part belongs to the network.
The device called a gateway or default gateway connects local devices to other
networks. This means that when a local device wants to send information to a device
at an IP address on another network, it first sends its packets to the gateway, which
then forwards the data on to its destination outside of the local network.
ANS:-
The IEEE manages MAC addresses. The hardware identification addresses that the
IEEE distributes are unique. That makes the probability of matching MAC addresses
zero.
On the other hand, some hardware MAC addresses are programmable, which
makes them spoof able. This means that it is possible for two machines in the same
network to have the same MAC address.
To actually calculate the probability that two or more computers in the same network
share the same MAC address, look up 'selection with and without replacement' in an
introductory Combinatory or Probability and Statistics textbook and follow the
procedures outlined in the book.
10. List the layers of OSI? What are the responsibilities of Data Link Layer?
1. Physical Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Data link layer transforms the physical layer, a raw transmission facility to a reliable link. It is
responsible for moving frames from one hop (node) to the next i.e. Hop-to-Hop delivery.
For effective data communication between two directly connected transmitting and receiving
stations the data link layer has to carry out a number of specific functions as follows:
3. Flow control:
The source machine must not send data frames at a rate faster than the destination
machine can accept them.
4. Error control:
The errors made in bits during transmission from source to destination machines
must be detected and corrected.
5. Addressing:
On a multipoint line, such as many machines connected together (LAN), the identity
of the individual machines must be specified while transmitting the data frames.
7. Link Management:
The initiation, maintenance and termination of the link between the source and
destination are required for effective exchange of data. It requires co-ordination and
co-operation among stations. Protocols or procedures are required for the link
management.
ANS:-
As we know that both TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol) are the most widely used Internet protocols among which TCP is
connection oriented − once a connection is established, data can be sent
bidirectional. UDP is a simpler, connectionless Internet protocol. Multiple messages
are sent as packets in chunks using UDP. Now on the basis of features of attributes
we can distinguish between TCP and UDP
Following are the important differences between TCP and UDP.
ANS:-
Cryptography:-
Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It
includes techniques such as microdots, merging words with images, and other ways
to hide information in storage or transit. However, in today's computer-centric world,
cryptography is most often associated with scrambling plaintext (ordinary text,
sometimes referred to as clear text) into cipher text (a process called encryption),
then back again (known as decryption). Individuals who practice this field are known
as cryptographers.
Procedures and protocols that meet some or all of the above criteria are known as
cryptosystems. Cryptosystems are often thought to refer only to mathematical
procedures and computer programs; however, they also include the regulation of
human behavior, such as choosing hard-to-guess passwords, logging off unused
systems, and not discussing sensitive procedures with outsiders.
Cryptographic algorithms
Cryptosystems use a set of procedures known as cryptographic algorithms, or
ciphers, to encrypt and decrypt messages to secure communications among
computer systems, devices such as smartphones, and applications. A cipher suite
uses one algorithm for encryption, another algorithm for message authentication,
and another for key exchange. This process, embedded in protocols and written in
software that runs on operating systems and networked computer systems, involves
public and private key generation for data encryption/decryption, digital signing and
verification for message authentication, and key exchange.
ANS:-
Digital signatures are the public-key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed
messages. They are used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital
data. This binding can be independently verified by receiver as well as any third
party.
Digital signature is a cryptographic value that is calculated from the data and a
secret key known only by the signer.
In real world, the receiver of message needs assurance that the message belongs
to the sender and he should not be able to repudiate the origination of that
message. This requirement is very crucial in business applications, since likelihood
of a dispute over exchanged data is very high.