Documente Academic
Documente Profesional
Documente Cultură
NETWORKS
ASSIGNME
NT
September 11
2009
NAMES:
1.KEALEBOGA
THOBOLO
CIS08-199
2.IRENE MOLEFI
CIS08-169
1. Botswana tool operates two machine shops, one in Gabane and another in
Broadhurst.The Company wants the two locations to share a single
database so that managers at each facility can exchange work orders and
monitor inventory on demand. Users need some control over resources but
the company also wants some faxing and dial-up services at each location.
a) Would you choose a peer-peer network, a sever-based network or a
combination of both? Why? [2]
Server-based network because;
3. During the design of most real world network, you will discover that using
more than one type of medium is common. Identify and explain any three reasons
why more than one network type of medium is used [10]
Signal regeneration- As signals are transmitted during communication the
signal energy becomes too weak (or distorted) to be considered usable, so
using more than one type of medium equipment available will extend the
distance for transmitting a signal by regenerating the signal.
Transmission rates-using more than one medium increases the rate at
which data signals are moved but if the data transmission rate beyond what
the network's components can handle could potentially cause those errors to
appear
Security and resistance to interference-Data signals can be secured well if
multiple medium is used.
4. As a network administrator for a growing ISP,you want to make a efficient use
of your network addresses IANA assigned to you is class C network address
197.14.88.0. You have decided to that you will use the address in this class C
network to satisfy the IP address requirements of 16 corporate customers who
require between 10 and 14 addresses each.
a) What will be the subnet mask to fulfill this requirement? Justify your answer
[2]
255
255
1111111 1
255
. 11111111
11111111
2n =16
n=4 (number of bits borrowed)
1
0
20
21
22
23
24
0
.11110000
25
26
27
Subnet mask =27 +26 + 25 + 24+ 23+ 22+ 21
=128+64+32+16+0+0+0+0
=240
Subnet mask
=255.255.255.240
Subnet 1
197.14.88.16-----BroadcastingID
197.14.88.16--------SubnetID
197.14.88.17-30-------Usable host
Subnet 2
197.14.88.31---------BroadcastingID
197.14.88.32-------SubnetID
197.14.88.33-46-----Usable Hosts
197.24.88.47-------BroadcastingID
Subnet 3
197.14.88.48-------SubnetID
197.14.88.49-62----Usable Hosts
Subnet 4
197.14.88.63----BradcastingID
d )What are the advantages of sub netting? [2]
Charles M. Kozierok says;
Flexibility: The number of subnets and number of hosts per subnet can be
customized for each organization. Each can decide on its own subnet structure and
change it as required.
Subnet also divides the bigger network into smaller individual networks and
it becomes easy to handle the smaller networks than to handle one huge
network
Sub netting allows you to take a block of IP addresses or an entire network
block and divide it up into smaller network blocks. This is helpful if you
manage a network and have to divide up a Class C network among different
locations. Sub netting can also be useful in setting up virtual LANs (VLANS),
which allow you to isolate certain systems to a specific part of your network.
5. Explain in full the functions of each of the layers of the OSI model? [10]
According to
Grant Wilson Edmonton;
The Open System Interconnection (OSI)
Is a model of communication in which the system is composed of a stack of seven
layers?
This model was developed as an acid to defining the scope of formal standards
relevant to particular aspects of communication.
The reference model contains seven layers, which are usually illustrated as a stack
and numbered from the top down.
(LAYER 7) APPLICATION LAYER
FUNCTIONS;
Defines interface to user processes for communication and data transfer.
Provides standardized services such as virtual terminal, file and job transfer and
operations.
This layer supports application and end user processes.
This layer provides application service for file transfer; email and other network
software services.
Telenet, FTP NetBIOS-based applications exist entirely on the application level.
used for applications specifically written to run over the network
allows access to network services that support applications;
directly represents the services that directly support user applications
handles network access, flow control and error recovery Example apps are file
transfer, e-mail,
6. Compare and contrast the OSI model from the internet model. [10]
SIMILARITIES
According to Pearson Education;
Both models have a lower layer that connects the upper layers to the actual
physical network. In the OSI reference model, the lower layer (Layer 1) is
called the physical layer. In the original TCP/IP model, the lower layer was
called the host-to-network layer.
Both models have an application, a transport, and a network/Internet layer
DIFFERENCES
OSI Model Reference
Service, interface and
protocol are not clearly
Service, interface defined. For example, the
only real services offered
and protocol
by the Internet layer are
- Send IP Packet
- Receive IP Packet
Functionalities
Connectionless/
Connectionoriented
communication
7. Describe how the following devices work, stating clearly the situation where
they are used. [4 each]
Bradley Mitchell says;
a) Switch (found at the data link layer)
A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN) Technically, network switches operate at layer two
(Data Link Layer) of the OSI model.
Unlike hubs, network switches are capable of inspecting data packet as they are
received, determining the source and destination device of each packet, and forwarding
them appropriately. By delivering messages only to the connected device intended, a
network switch conserves network bandwidth and offers generally better performance
than a hub.
A situation where they might be used is, say users are on a 100Mbps Ethernet network
via a switch. Each user can realize a bandwidth of 100Mbps and don't have to compete
for the bandwidth the way computers do on a network via a hub because each port on
the switch has a dedicated 100Mbps. This is why switches are rapidly replacing hubs.
Inexpensive switches are even available to accommodate small networks and home
network market
Routers are physical devices that join multiple wired or wireless networks together.
Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates
at the network layer of the OSI model.
Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being
the most common OSI network layer protocol. An IP router such as a DSL or cable
modem broadband router joins the home's local area network (LAN) to the wide area
network (WAN) of the Internet.
By maintaining configuration information in a piece of storage called the routing table,
wired or wireless routers also have the ability to filter traffic, either incoming or outgoing,
based on the IP addresses of senders and receivers. Some routers allow the home
networker to update the routing table from a Web browser interface. Broadband routers
combine the functions of a router with those of a network switch and a firewall in a
single unit.
e.g by a routing table or packet forwarding protocol. In operation, the routers distinguish
data packets according to network protocols and forwards traffic according to networklevel addresses utilizing information that the routers exchange among themselves to
find the best path between network segments.
Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet
bridge, for example, inspects each incoming Ethernet frame - including the source and
destination MAC addresses, and sometimes the frame size - in making individual
forwarding decisions.
Bridges serve a similar function as switches, that also operate at Layer 2. Traditional
bridges, though, support one network boundary, whereas switches usually offer four or
more hardware ports. Switches are sometimes called "multi-port bridges" for this
reason.
Bridges use two methods to resolve the network segment that a MAC address belongs
to;
Transparent bridging-This method uses a forwarding database to send frames
across network segments.
Source route bridging- With source route bridging two frame types are used in
order to find the route to the destination network segment.
To pass data through the repeater in a usable fashion from one segment to the next, the
packets and the Logical Link Control (LLC) protocols must be the same on the each
segment. This means that a repeater will not enable communication, for example,
between an 802.3 segment (Ethernet) and an 802.5 segment (Token Ring). That is, they
cannot translate an Ethernet packet into a Token Ring packet. In other words, repeaters
do not translate anything.
REFERENCING
1.
http//www.exforsys.com/tutorials/networking/subnetting.html
2.
. http://en.wikipedia.org/wiki/Client-server
3.
http://www.bellaonline.com/articles/art27562.asp
4.
5.
http://compnetworking.about.com/cs/internetworking/g/bldef_repeater.htm by
Bradley Mitchell ,DATE ACCESED:01 SEPTEMBER 2009
6.
http://www.ciscopress.com/articles/article.asp?p=31731&seqNum=2 by
Pearson Education;
7.
http://www.et.put.poznan.pl/tcpip/architecture/archi_diff.htm
8.
http://www.tcpipguide.com/free/t_IPSubnetAddressingOverviewMotivationand
Advantages-2.htm
Version Date: September 20, 2005 Charles M. Kozierok. All Rights Reserved.