Sunteți pe pagina 1din 4

Robert Spann September 16, 2013

COMP 204 Homework 1


Answer the following questions based on your reading of the text book, the module key points, and the instructors presentation this week. 1. [3 points] The textbook lists four examples of popular communications tools: instant messaging, blogs, podcasting, and wikis. Identify at least two other communications tools that network technologies have enabled, provide a general description for each, and a web-link to an example product that implements such a tool. Two other communications tools that network technologies have enabled are e-mail and video conferencing. E-mails are messages electronically distributed from one user to another, or group, over a network. An example of e-mail can be found at the following link: http://office.microsoft.com/en-us/outlook/. Video conferencing allows for multiple locations to communicate with each other through both real time audio and video transmissions. An example of a video conferencing product is found on the following Cisco website: http://www.cisco.com/web/telepresence/index.html.

2. [3 points] A network consists of four elements: protocols, messages, medium, and devices. Alice wants to send a letter from US to her friend Ivan in Russia. Identify the four network elements that are used in this scenario. Also, list the steps that take place in order to carry out this task. The four network elements that are used in this scenario are, of course, protocols, messages, medium, and devices. The protocols would encompass the delivery address, return address, appropriate postage, etc. Messages are the letter to be sent. Medium refers to the means of delivering the letter. Devices refers to the sender and receiver (Dye, McDonald, & Rufi, 2008). In this scenario, Alice (device 0) writes the message. She then, adhering to protocols, places the message into an envelope, fills out the delivery and return addresses, affixes appropriate postage, and places it into the mailbox. The post office, or medium, determines its

destination, and utilizes motor vehicles, airplanes, trains, and individual mail couriers to transport the message to Ivan (device 1).

3.

[3 points] Compare and contrast circuit- and packet-switched networks. What kinds of applications are reasonable for each kind of network? Why? Circuit-switched networks, also known as connection-oriented networks, need a dedicated connection from one device to another for information to be exchanged. While these devices are connected, no other devices may use this connection (Dye, McDonald, & Rufi, 2008). The applications that are reasonable for circuit-switched networks are voice and video communications, such as telephone networks, where packet loss is kept at a minimum. Packet-switched networks break down the message into small bits of data called packets. These packets are sent through the network by the most efficient route to its destination as possible; which can result in packets traveling many different paths. Once at its destination, the packets get reassembled in the correct order to make up the message (Dye, McDonald, & Rufi, 2008). File sharing programs are reasonable for packet-switched networks. This is because of the size of some files being transferred. Since smaller packets are routed over various shared links, it is a more efficient use of bandwidth. Also, if one of the shared links is interrupted, the data packets can be easily rerouted to the destination computer.

4.

[5 points] Priority queuing as a means of ensuring quality of service is a hotly debated political topic in networking and is often discussed under the heading of Network Neutrality. From the perspective of an internet service provider, summarize the arguments against network neutrality. From the perspective of a broadband consumer, summarize the arguments for network neutrality. From the perspective of an internet service provider arguments against network neutrality are that the costs of keeping the net neutral (the large investments by ISPs and continual innovations to the internet) will be passed on to the consumers, bandwidth should be prioritized, and possible unexpected consequences due to regulation (Globalization 101, 2013).

From the perspective of a broadband consumer, the arguments for network neutrality are freedom of speech on the Internet, make sure the preservation of current internet standards, will ensure competition and innovation between service providers, and stifle conflicts of interest that may arise for network providers (Globalization 101, 2013).

5.

[2 points] What is segmentation? What are its advantages and disadvantages? Segmentation is the process wherein messages are broken down into smaller portions that can transported through the network more easily. Advantages to segmentation include multiplexing; a process in which data is sent through a network simultaneously, and the ability for networks to route data more efficiently. The disadvantage to segmentation is the degree of complexity added to the process (Globalization 101, 2013)

6.

[2 points] How are the following three concepts interrelated: LAN, WAN, and internetwork? LAN, WAN, and internetwork are interrelated because they are all networks. LANs connect end users together, WANs connect LANs together, and internetworks connect WANs together (Dye, McDonald, & Rufi, 2008).

7.

[2 points] What would you consider the biggest advantage of architecting the network communications in a layered model? The biggest advantage of architecting the network communications in a layered model is that it allows the various layer technologies to develop separately from the technologies in other layers (Dye, McDonald, & Rufi, 2008).

8.

[5 points] A layered model for computer network communications is typically implemented in high level applications, the operating system's network protocols, and the physical hardware of the device. Such an implementation is typically called a "network stack" because the last data encoding at the sender will correspond to the first data decoding performed at the receiver. Consider an e-mail client sending a message to an e-mail server located on the same Ethernet network. Both machines use TCP/IP to communicate over Ethernet, and the mail client and server

both use the SMTP protocol to talk to the server. Describe the transformation process that the email message goes through as it moves down the stack on the client and then up the stack on the server. The process that an e-mail message goes through as it moves down the stack on the client is encapsulation. It is a process in which control information is added to the data as it passes down the stack. The first layer is the application layer that encompasses the original message. It then moves to the transport layer where the message is broken into manageable segments and prepared for transportation. On the internetwork layer, IP information is added to the data segments in a header. A network header is then added around the data on the network access layer and sent to its destination (Dye, McDonald, & Rufi, 2008). The process that an e-mail message goes through as it moves up the stack on the server is called decapsulation and is the simple reversal of encapsulation. Once the e-mail is received by the server, the network header and IP are removed as it moves up the stack. As the data is obtained, the transport layer arranges the data in its proper order. When all of the data has been obtained, the information is sent to the application layer where it is routed to the receiver's e-mail application (Dye, McDonald, & Rufi, 2008).

References Dye, M., McDonald, R., & Rufi, A. (2008). Network Fundamentals. Cisco Press. Globalization 101. (2013). (T. L. Institute, Producer) Retrieved Sept 21, 2013, from Net Neutrality: http://www.globalization101.org/net-neutrality

S-ar putea să vă placă și