Sunteți pe pagina 1din 15

COMPUTER

NETWORKS
ASSIGNME
NT

September 11

2009

SUBMITTED TO: MR NKOSINATHI MPOFU

NAMES:
1.KEALEBOGA
THOBOLO
CIS08-199
2.IRENE MOLEFI
CIS08-169

1. Botswana tool operates two machine shops, one in Gabane and another in
Broadhurst.The Company wants the two locations to share a single
database so that managers at each facility can exchange work orders and
monitor inventory on demand. Users need some control over resources but
the company also wants some faxing and dial-up services at each location.
a) Would you choose a peer-peer network, a sever-based network or a
combination of both? Why? [2]
Server-based network because;

provides an excellent solution for the problem of multiple logins

centralized user accounts, security, and access controls simplify


network administration

b) What kind of specialized servers do you need to install at Botswana tool?


[8]
Communication servers
Application servers
Domain controllers/Directory Servers
Fax Servers
Mail servers
File servers
print servers
Web servers
2. In this question, you are to examine the network of any lab at BAC and
answer the questions which follow. (You should justify your answers)
a) Which physical topology or topologies are in use?
Extended star topology- It uses networking devices to prevent attenuation
and send signals that exceeds the maximum distance allowed by a simple
star topology. You can add repeaters to send the signals over a greater
distance. A repeater takes in weaken signals and amplifies them, and then
sends them back onto the network.

b) What type of media is being used?


UTP (Unshielded Twisted Pair) It is used in computer networking at BAC due to
its low cost, easy installation and maintenance. UTP cables provide transmission
speed from 4 Mbps to 100 Mbps, depending on the type and category of the cable
used.
c) Which logical topology or topologies are in use?
Shared topology
d) How the lab in question is linked to other labs?
Local area network (LAN) - All computers/workstations in BAC are connected on the
LAN and communicate with one another. Each computer has its own resources but is
allowed to access other devices on the LAN, provided it has the necessary permissions.
This allows users to share data, share expensive resources like printers and scanners,
and communicate via email and instant messaging..
e) Draw a rough sketch showing the physical layout of the nodes in the labs?
[2 each]
network server

lab 1- switch or hub connecting

Lab 3,switch/hub and its computers

3. During the design of most real world network, you will discover that using
more than one type of medium is common. Identify and explain any three reasons
why more than one network type of medium is used [10]
Signal regeneration- As signals are transmitted during communication the
signal energy becomes too weak (or distorted) to be considered usable, so
using more than one type of medium equipment available will extend the
distance for transmitting a signal by regenerating the signal.
Transmission rates-using more than one medium increases the rate at
which data signals are moved but if the data transmission rate beyond what
the network's components can handle could potentially cause those errors to
appear
Security and resistance to interference-Data signals can be secured well if
multiple medium is used.
4. As a network administrator for a growing ISP,you want to make a efficient use
of your network addresses IANA assigned to you is class C network address
197.14.88.0. You have decided to that you will use the address in this class C
network to satisfy the IP address requirements of 16 corporate customers who
require between 10 and 14 addresses each.
a) What will be the subnet mask to fulfill this requirement? Justify your answer
[2]
255

255

1111111 1

255

. 11111111

11111111

2n =16
n=4 (number of bits borrowed)
1

0
20
21
22
23
24

0
.11110000

25
26
27
Subnet mask =27 +26 + 25 + 24+ 23+ 22+ 21
=128+64+32+16+0+0+0+0
=240
Subnet mask

=255.255.255.240

b)How many usable hosts will be there per subnet? [2]


Hosts=2n 2
=24 2
=14
c) List the first four sub network addresses that the mask will create [2]
Network address: 197.14.88.0
197.14.88.0------SubnetID
197.14.88.1-14 ------Usable Hosts

Subnet 1

197.14.88.16-----BroadcastingID

197.14.88.16--------SubnetID
197.14.88.17-30-------Usable host

Subnet 2

197.14.88.31---------BroadcastingID

197.14.88.32-------SubnetID
197.14.88.33-46-----Usable Hosts
197.24.88.47-------BroadcastingID

Subnet 3

197.14.88.48-------SubnetID
197.14.88.49-62----Usable Hosts

Subnet 4

197.14.88.63----BradcastingID
d )What are the advantages of sub netting? [2]
Charles M. Kozierok says;
Flexibility: The number of subnets and number of hosts per subnet can be
customized for each organization. Each can decide on its own subnet structure and
change it as required.

No Need To Request New IP Addresses: Organizations don't have to constantly


requisition more IP addresses, as they would in the workaround of using multiple
small Class C blocks.

Subnet also divides the bigger network into smaller individual networks and
it becomes easy to handle the smaller networks than to handle one huge
network
Sub netting allows you to take a block of IP addresses or an entire network
block and divide it up into smaller network blocks. This is helpful if you
manage a network and have to divide up a Class C network among different
locations. Sub netting can also be useful in setting up virtual LANs (VLANS),
which allow you to isolate certain systems to a specific part of your network.

5. Explain in full the functions of each of the layers of the OSI model? [10]
According to
Grant Wilson Edmonton;
The Open System Interconnection (OSI)
Is a model of communication in which the system is composed of a stack of seven
layers?
This model was developed as an acid to defining the scope of formal standards
relevant to particular aspects of communication.
The reference model contains seven layers, which are usually illustrated as a stack
and numbered from the top down.
(LAYER 7) APPLICATION LAYER
FUNCTIONS;
Defines interface to user processes for communication and data transfer.
Provides standardized services such as virtual terminal, file and job transfer and
operations.
This layer supports application and end user processes.
This layer provides application service for file transfer; email and other network
software services.
Telenet, FTP NetBIOS-based applications exist entirely on the application level.
used for applications specifically written to run over the network
allows access to network services that support applications;
directly represents the services that directly support user applications
handles network access, flow control and error recovery Example apps are file
transfer, e-mail,

(LAYER 6)PRESENTATION LAYER


FUNCTIONS;
Mask the difference of data formats between dissimilar systems.
Specifies architecture-independent data transfer format.

provides independence from differences in data presentation (e.g.


encryption) by translating from application to network format, and vice
versa.
The presentation layer works to transform data into the form that the
application layer can accept.
all different formats from all sources are made into a common uniform
format that the rest of the OSI model can understand
responsible for protocol conversion, character conversion, data encryption
/ decryption, expanding graphics commands, data compression
sets standards for different systems to provide seamless communication
from multiple protocol stacks
(LAYER 5) SESSION LAYER
FUNCTIONS;
Manages user session and dialogue
Control establishment and termination of logic links between users.
Reports upper layer errors
This layer establishes, manages and terminates connections between
applications. This session layer set up, coordinates and terminates connections,
exchanges and dialogues between the applications at each end. It deals with
session and connection coordinator.
establishes, maintains and ends sessions across the network
responsible for name recognition (identification) so only the designated parties
can participate in the session
provides synchronization services by planning check points in the data stream =>
if session fails, only data after the most recent checkpoint need be transmitted
manages who can transmit data at a certain time and for how long
Examples are interactive login and file transfer connections, the session would
connect and re-connect if there was an interruption; recognize names in sessions
and register names in history

(LAYER 4)TRANSPORT LAYER


FUNCTIONS;
Manages end to end message delivery in network
Provides reliable and sequential packet delivery through error recovery and
flow control mechanisms

Provides connectionless oriented packet delivery.


manages the flow control of data between parties across the network
divides streams of data into chunks or packets; the transport layer of the
receiving computer reassembles the message from packets
provides error-checking to guarantee error-free data delivery, with on losses
or duplications
provides acknowledgment of successful transmissions; requests
retransmission if some packets dont arrive error-free

(LAYER 3) NETWORK LAYER


FUNCTIONS;
Determines how data is transferred between network devices.
Routes packets according to unique network device addresses
Provides flow and congestion control to prevent network resource depletion
provides switching and routing technologies creating logical paths, known as
virtual circuit, for transmitting data from node to node.

(LAYER 2)DATA LINK LAYER


FUNCTIONS;
It clarifies procedures for operating the communication links.
turns packets into raw bits (100101) and at the receiving end turns bits into
packets.
handles data frames between the Network and Physical layers
he receiving end packages raw data from the Physical layer into data frames
for delivery to the Network layer
responsible for error-free transfer of frames to other computer via the Physical
Layer
This layer defines the methods used to transmit and receive data on the
network. It consists of the wiring, the devices use to connect the NIC to the
wiring, the signaling involved to transmit / receive data and the ability to
detect signaling errors on the network media

(LAYER 1)PHYSICAL LAYER


FUNCTIONS;
transmits raw bit stream over physical cable
defines cables, cards, and physical aspects

defines NIC attachments to hardware, how cable is attached to NIC


defines techniques to transfer bit stream to cable

6. Compare and contrast the OSI model from the internet model. [10]
SIMILARITIES
According to Pearson Education;
Both models have a lower layer that connects the upper layers to the actual
physical network. In the OSI reference model, the lower layer (Layer 1) is
called the physical layer. In the original TCP/IP model, the lower layer was
called the host-to-network layer.
Both models have an application, a transport, and a network/Internet layer
DIFFERENCES
OSI Model Reference
Service, interface and
protocol are not clearly
Service, interface defined. For example, the
only real services offered
and protocol
by the Internet layer are
- Send IP Packet
- Receive IP Packet

Functionalities

Because models were


invented before
protocols, functionalities
put in each layer are not
very optimized.

TCP/IP Model Reference


Protocols in the OSI
model are better hidden
and can be replaced
relatively easily as the
technology changes,
which is one of the main
objective of layered
protocols.
In this case, the protocols
have been invented
before models, so the
functionalities are
perfectly described.

Seven layers, Network


(Internet), Transport and
Numbers of layers
Application layers being
similar to TCP/IP

Connectionless/
Connectionoriented
communication

Both connectionless and


connection-oriented
communications are
supported in the network
layer, but only
connection-oriented
communication in the
transport layer.

Only four layers.

Only one mode in the


network layer
(connectionless) but both
modes in the transport
layer are supported,
giving the users a choice.

7. Describe how the following devices work, stating clearly the situation where
they are used. [4 each]
Bradley Mitchell says;
a) Switch (found at the data link layer)
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN) Technically, network switches operate at layer two
(Data Link Layer) of the OSI model.
Unlike hubs, network switches are capable of inspecting data packet as they are
received, determining the source and destination device of each packet, and forwarding
them appropriately. By delivering messages only to the connected device intended, a
network switch conserves network bandwidth and offers generally better performance
than a hub.
A situation where they might be used is, say users are on a 100Mbps Ethernet network
via a switch. Each user can realize a bandwidth of 100Mbps and don't have to compete
for the bandwidth the way computers do on a network via a hub because each port on
the switch has a dedicated 100Mbps. This is why switches are rapidly replacing hubs.
Inexpensive switches are even available to accommodate small networks and home
network market

b) Router (found at the network layer)

Routers are physical devices that join multiple wired or wireless networks together.
Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates
at the network layer of the OSI model.
Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being
the most common OSI network layer protocol. An IP router such as a DSL or cable
modem broadband router joins the home's local area network (LAN) to the wide area
network (WAN) of the Internet.
By maintaining configuration information in a piece of storage called the routing table,
wired or wireless routers also have the ability to filter traffic, either incoming or outgoing,
based on the IP addresses of senders and receivers. Some routers allow the home
networker to update the routing table from a Web browser interface. Broadband routers
combine the functions of a router with those of a network switch and a firewall in a
single unit.
e.g by a routing table or packet forwarding protocol. In operation, the routers distinguish
data packets according to network protocols and forwards traffic according to networklevel addresses utilizing information that the routers exchange among themselves to
find the best path between network segments.

c) Bridge (found at the data link layer)


A bridge device filters data traffic at a network boundary. Bridges reduce the amount of
traffic on a LAN by dividing it into two segments.
In the following figure, a bridge is used to connect two segment segment 1 and segment
2.

Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet
bridge, for example, inspects each incoming Ethernet frame - including the source and
destination MAC addresses, and sometimes the frame size - in making individual
forwarding decisions.
Bridges serve a similar function as switches, that also operate at Layer 2. Traditional
bridges, though, support one network boundary, whereas switches usually offer four or
more hardware ports. Switches are sometimes called "multi-port bridges" for this
reason.
Bridges use two methods to resolve the network segment that a MAC address belongs
to;
Transparent bridging-This method uses a forwarding database to send frames
across network segments.
Source route bridging- With source route bridging two frame types are used in
order to find the route to the destination network segment.

e) Repeater (found at the physical layer)


As signals travel along a network cable (or any other medium of transmission), they
degrade and become distorted in a process that is called attenuation. If a cable is long
enough, the attenuation will finally make a signal unrecognizable by the receiver.
A Repeater enables signals to travel longer distances over a network. Repeaters work
at the OSI's Physical layer. A repeater regenerates the received signals and then
retransmits the regenerated (or conditioned) signals on other segments.

To pass data through the repeater in a usable fashion from one segment to the next, the
packets and the Logical Link Control (LLC) protocols must be the same on the each
segment. This means that a repeater will not enable communication, for example,
between an 802.3 segment (Ethernet) and an 802.5 segment (Token Ring). That is, they
cannot translate an Ethernet packet into a Token Ring packet. In other words, repeaters
do not translate anything.

f) Hub (found at the physical layer)


According to Cathy Spearmon;
One of the most commonly used networking hardware devices are hubs. However,
the inexpensive switch is rapidly replacing the hub. Anyway, hubs serve as central
connection points for local area networks (LANs) that typically embrace the star
topology.
The basic hub contains no active electronics and cannot be used to extend a LAN
past its cabling distance specifications. Yet, hubs organize your cables and relay
data signals to all computers that exist on your LAN.
Hubs are used on networks where twisted-pair cabling is used. The ports, which are
available on the hub, provide connection points for the devices on the network.
Computers and devices are connected to the hub via network cables to individual
ports. In cases where a LAN outgrows the size of its hub, a new hub can be
attached by daisy-chaining them together using a short connection cable, which is
often referred to as a rattail.
Hubs come in many different shapes and sizes and are available in a wide range of
prices. The more ports available on the hub, the more expensive the hub. Also, hubs
that support faster varieties of Ethernet, for example Fast Ethernet, will also cost
more.
Types of hubs
Passive
Active
Intelligent

REFERENCING
1.

http//www.exforsys.com/tutorials/networking/subnetting.html

2.

. http://en.wikipedia.org/wiki/Client-server

3.

http://www.bellaonline.com/articles/art27562.asp

4.

.http://www.tutorialsweb.com/networking/repeaters-routers-bridgesgateways.htm Web design by AnandSoft

5.

http://compnetworking.about.com/cs/internetworking/g/bldef_repeater.htm by
Bradley Mitchell ,DATE ACCESED:01 SEPTEMBER 2009

6.

http://www.ciscopress.com/articles/article.asp?p=31731&seqNum=2 by
Pearson Education;

7.

http://www.et.put.poznan.pl/tcpip/architecture/archi_diff.htm
8.

http://www.tcpipguide.com/free/t_IPSubnetAddressingOverviewMotivationand
Advantages-2.htm
Version Date: September 20, 2005 Charles M. Kozierok. All Rights Reserved.

S-ar putea să vă placă și