Sunteți pe pagina 1din 9

Computer Networks #2 Class XI Compiled by Wasim Anjum

Farooqi (M.Ed., M.C.S)

Computer Networks
Class XI (Chapter # 2)

Q.1. Fill in the blanks

i) A Network is in an interconnection between two or more computers so that they


can communicate with each other.
ii) A Server based network provides centralized security to ensure that resources are
not accessed by unauthorized users.
iii) In a Peer network, every computer is capable of playing the role of client, server or
both at the same time.
iv) A WAN spans a large physical area, connecting several sites of an organization
across cities, countries and continents.
v) ------- is the software that supports computing.
vi) The network configuration or the way in which the nodes of a network are
interconnected is called---------------.
vii) A network ------- is a language and set of rules that nodes agree to use to
communicates over a network
viii) The ------ layer of OSI model decides which physical path-way the data should take
on network conditions

Q.2. What is a computer networks? Explain.

Ans. A computer network is an interconnection between two or more computers so that they
communicate with each other. A network is made up of collection of computers and the
connection between them that allow information exchange to take place.

Form of Connection

• Cable
• Wireless
• Satellite

Q.3. Distinguish between dedicated server networks and peer-to-peer


networks.

Ans. Dedicated server networks


In networks if each computer acts as either a server or client computers on the
networks than this type of network is called dedicated server networks. In this network
server are not used for client computer. Dedicated networks tend to be big networks. They
can be small as two computers. As a network increases in both size and traffic, e can add more
servers to handle the external load.

Main features of Dedicated Server Networks.


• Strong central security
• Central file sharing
• Ability to pool available hardware and software
• Ability to save expensive equipment
• Optimize dedicated server are faster then peers
• Less intrusive security Just password and login required
Pakistan International School Riyadh May 10, 2010 Page
#1/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
• Freeing of user from the task of managing and sharing of resources
• Easy manage ability of large users
• Central organization to avoid lost of data

Drawbacks of Dedicated Server Networks


• Expensive dedicated network server
• Expensive network operating system
• Dedicated network administrator

Peer- TO-Peer Networks

In peer-to-peer networks, every computer can acts as a client, server or both at the same
time. In this type of networks, each computer is referred to as peer or peer computer. Son
each peer computer can share files and printers with other computer and it can also access
other shared resources on the network. Large peer-to-peer networks become difficult to
manage.

Main features of Peer-to-Peer Networks.

• Additional load on computer because of resource sharing.


• Inability of peers to handle as many networks handle as server.
• Lack of central organization
• No central point of storage for file archiving
• Requirement that user administration their own computer
• Weak and intrusive security
• Lack of central management

Q.4. Distinguish between LAN and WAN.

Ans. A LAN interconnects computers, terminals and peripheral devices within a geographical
area such as office building or university campus and provides high-speed communication.

A WAN interconnects widely separated computers and terminals together and it may
operate nationwide or worldwide. Normally public transmission media such as telephone
lines, coaxial cables or optics or fiber are used in WANs

S.N Local Area Network Wide Area Network


o
1 Covers small geographical area. Covers large or wide geographical area
Normally computers are directly No physical cable or wire is used and
connected through physical cable data is sent and received transmission.
2
although wires LAN are also Through microwave system or satellite.
available
Ethernet card is used for data Modem card is used for data
3
transmission transmission.
Data transmission speed is very Data transmission speed is slow.
4
high
Its installation and Its installation and configuration cost is
5
configuration cost is less than WAN greater than LAN.
Pakistan International School Riyadh May 10, 2010 Page
#2/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)

Q.5. Explain the purpose of networking.

Ans. It allows the multiple users to access and share program and data simultaneously.
It allows multiple users to share peripheral devices, such as printers and hard disks.
It allows sending e-mails along with files.
It allows the users to communicate via teleconferencing and video-conferencing.

Q.6. Define network topology and briefly explain its ways.

Ans. In networking, the term topology is the way of connecting nodes or devices on a network.
In other words, a topology represents the shape of networks. Network topology can be
divided into the following basic types.

Bus topology

In Bus networks, all nodes are connected to a common communication medium or central
single cable. This single cable is called BUS. The devices or nodes are attached with the central
cable through interface connector. The central cable is the backbone cable, which functions
as shared communication medium. In bus network, node sends a broadcast message onto
central cable with address of destination computer. Only the destination node accepts and
processes the message.

Main features of Bus Network

Easy to setup and configure


Less cabling required
Best for few dozen (limited) of node
If backbone fails then entire network fails.
Difficult fault tolerance

Star topology

In a star networks, each node or device directly connected to a central connection point
HUB. The central connection may be an actual HUB or a switch. Typically nodes or devices are
connected to the HUB with unshielded twisted pair (UTP) Ethernet. Star topology is most
commonly used in LAN.

Pakistan International School Riyadh May 10, 2010 Page


#3/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
Main features of Star Network

It is easy to install , maintain, modify .and maintain new computers


If any node(computer) or cable fails, other nodes are not affected
A star network generally requires more cable as compared to bus topology. So it
become more costly
If HUB fails the entire network will fail.
Many star networks requires a device at the central point to switch network traffic

Ring topology
In ring network, each node is connected
The ring network is shaped just like a ring. It is made up of an unbroken circle of network
nodes. Essentially each node is directly connected to its immediate neighbors. Data on the
network flows in one direction around the ring, traveling from one node to the next along the
way.

Main features of Ring topology

It is like a circular bus


Every computer given equal access to the token, no one computer monopolize the
network
Fair sharing of the network allows to network degrade as more user are added.
Failure one computer on the ring can affect the where network
Difficult to trouble shoot ring network
Adding or removing computer disrupt the network
Tree topology

Mesh topology

Q.7. Explain TCP/IP protocol.


As with all other communications protocol, TCP/IP is composed of layers:

IP - is responsible for moving packet of data from node to node. IP forwards each packet
based on a four byte destination address (the IP number). The Internet authorities assign
ranges of numbers to different organizations. The organizations assign groups of
their numbers to departments. IP operates on gateway machines that move data from
department to organization to region and then around the world.
TCP - is responsible for verifying the correct delivery of data from client to server. Data
can be lost in the intermediate network. TCP adds support to detect errors or lost data and to
trigger retransmission until the data is correctly and completely received.
Sockets - is a name given to the package of subroutines that provide access to TCP/IP on
most systems
TCP/IP software is popular on large networks because it works and is available for
practically in all computers.
Pakistan International School Riyadh May 10, 2010 Page
#4/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
TCP and IP perform primarily what the OSI model terms Iayer-3 (Network) and layer-4
(Transport) functions.
Particularly important is the capability to communicate and to order data among two or
more different computer systems.

Q.8. Explain X.25 protocol.

Ans. X.25 protocol defines how communication devices such as routers package and route
data over a connecting circuit.
X.25 data packaging and routing can be used over any satellite or Integrated Services
Digital Network (ISDN) communication circuits.
X.25 can also be used over any type of point-to-point circuits but the protocol is better
known for its packet- switching capabilities

Q.9. Explain circuit switching and packet switching techniques used in data
communication.

In telecommunications, a Circuit Switching network is one that establishes a dedicated


circuit (or channel) between nodes and terminals before the users may communicate.
Each circuit that is dedicated cannot be used by other callers until the circuit is
released and a new connection is set up. Even if no actual communication is taking place
in a dedicated circuit then, that channel still remains unavailable to other users. Channels
that are available for new calls to be set up are said to be idle

Early telephone systems are a suitable example of circuit switching. The subscriber would
ask the operator to connect them to another subscriber, whether on the same exchange or
via an inter-exchange link and another operator. In any case, the end result was a physical
electrical connection between the two subscribers' telephones for the duration of the call.
The copper wire used for the connection could not be used to carry other calls at the same
time, even if the subscribers were in fact not talking and the line was silent.

In later years it became possible to multiplex multiple connections over the same physical
conductor, but nonetheless each channel on the multiplexed link was either dedicated to
one call at a time, or it was idle between calls. Circuit switching can be relatively
inefficient because capacity is wasted on connections which are set up but are not in
continuous use (however momentarily). On the other hand, the connection is immediately
available and capacity is guaranteed until the call is disconnected.

Circuit switching contrasts with packet switching which splits traffic data (for instance,
digital representation of sound, or computer data) into chunks, called packets that
are routed over a shared network. Packet networks do not require a circuit to be
established and allow many pairs of nodes to communicate almost simultaneously over
the same channel. Each packet is individually addressed precluding the need for a
dedicated path to help the packet find its way to its destination.

Packet routing

Packets are routed to their destination as determined by a routing algorithm. The routing
algorithm can create paths based on various metrics and desirable qualities of the
routing path. For example, low latency may be of paramount concern and everything else
is secondary, or a minimum hop count.
Pakistan International School Riyadh May 10, 2010 Page
#5/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
It's also entirely possible to have to weigh the various metrics against each other. For
example, reducing the hop count could increase the latency to an unacceptable limit and
some kind of balance would need to be found. For multi-parameter optimization,
some form of optimization may be needed.

Once a route is determined for a packet it is entirely possible that the route may change
for the next packet, thus leading to a case where packets from the same source headed
to the same destination could be routed differently.

Packet switching influenced the development of the Actor model of concurrent


computation in which messages sent to the same address may be delivered in an order
different from the order in which they were sent.

Packet switching in the networks

The most well-known use of the packet switching is the internet. The internet uses the
internet protocol suite over a variety of data link layer protocols. For example, Ethernet
and Frame relay are very common. Newer mobile phone technologies (e.g., GPRS, I-mode)
also use packet switching.

X.25 is a notable use of packet switching in that, despite being based on packet switching
methods, it provided 'Virtual Circuits' to the user. In 1978, X.25 was used to provide the first
international and commercial packet switching network, the International Packet Switched
Service (IPSS).

Packet switching is also called connectionless networking because no connections are


established.

Asynchronous Transfer Mode (ATM) is a hybrid technology, which uses cell relay instead of
packet switching.

Fast packet switching is a packet switching technique that increases the throughput by
eliminating overhead.

Circuit Switched Network

Each connection through a circuit switched network results in a physical communication


channel being set up through the network from the calling to the called subscriber
equipment. This connection is used exclusively by the two subscribers for the duration of
the call.
e.g. telephone network.
In the context of data transmission, a feature of a circuit switched connection is that
Circuit Switched Network effectively provides a fixed data, rate channel at which both

Pakistan International School Riyadh May 10, 2010 Page


#6/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
subscribers must operate. Also, before any data can be transmitted over such a
connection, a connection must be set up or established through the network. Currently,
the time required to set up a call through the telephone network can be relative!}' long,
owing to the type of equipment used in each exchange. Normally, therefore, when
transmitting data, a connection is established and kept open for the duration of the
communication. However, the widespread introduction of new computer-controlled
switching exchanges, couples with the adoption of digital transmission throughout the
network, means that the setup time of a connection through the telephone network is
rapidly becoming much shorter. Furthermore, the extension of digital transmission to the
subscriber's computer means that a high rate switched transmission path will be available
for data transmission. This path then can be used for transmitting data without using
modems. The resulting digital Public Switched Telephone Network (PSTN) can also be
regarded as a Circuit Switched Data Network (CSDN) or Integrated Services Digital
Network (ISDN) since such networks can support both digitized voice and data. Although
the connection setup time associated with an all-digital circuit switched network is
relatively fast, the resulting connection still provides only a path with a fixed data rate for
both transmission and reception.

Packed Switched Network (store-and-forward)


In packet switched network, two communication subscribers can operate at different data
rates, since the rate at which data is passed at two interfaces to the network is separately
regulated by each subscriber's equipment.
No physical connections are established through the network with a packet switched
network. Instead, all data to be transmitted is first assembled into one or more message
units, called packets. These packets include both the source and destination network
addresses. They are then passed by the source computer to its local Packet Switching.
Exchange (PSE). On receipt of each packet, the exchange first stores the packet and then
inspects the
destination address it contains. Each PSE contains a routing directory specifying the
outgoing links' transmission paths to be used for each network address. The PSE forwards
the packet on the appropriate link at the maximum available bit rate. This mode is often
referred to as packet store-and-forward.
A number of packets may arrive simultaneously at a PSE on different incoming links and
each may require forwarding on the same outgoing link. If a number of particularly long
packets are waiting to be transmitted on the same link, other packets may experience
unpredictable long delays. To prevent this and to ensure that the network has a reliably
fast transit time, a maximum length is allowed for each packet. These packets are
reassembled into a single message by the corresponding transport protocol at the
destination.X.25 protocol describes a method of encapsulating and handling packets with
high reliability. Several companies manage networks of special computerized switches
spread across the nation and across the world that connect together with high-speed data
communication lines and use X.25. These companies sell their networks' data handling
and transmission capabilities to subscribers under several pricing schemes. National
telephone companies in many countries offer X.25 services, sometimes at lower rates than
leased line or dial-up lines.

Q.10. What is Metropolitan Area Network (MAN)? Metropolitan Area Network

A metropolitan area network (MAN) is a communication network system that covers a


geographical area of a single city. Usually, MAN connects more than one LANs in a city or
town and covers a smaller geographical area than a WAN. Mobile phones (cellular)
systems are often MANs.
Pakistan International School Riyadh May 10, 2010 Page
#7/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)

Q.11. Describe the components of LAN

Ans. i) Communication Media

Data travels from one node to another through communication media. LAN does not use
telephone line for this purpose. In low cost LANs, the nodes are connected with twisted
wire pairs, but many LANs, use coaxial cable or fiber optical cable, which are both
more expensive and faster, some LANs, use wireless transmission media in which data is
communicated through the air or space, using radio signals or infrared signals, instead of
cables. Wireless networks are easy to set up and configure, but they have slower
transmission rates and limited distance between nodes.

ii) Network-Interface Card (NIC)

A network interface card is used to connect a computer to other computer in the local
area networks. It is a circuit board that is installed inside the computer’s internal
expansion slots.

iii) Bridge

A bridge is an electronic device that connects two similar networks and the data flow
between them. A bridge recognizes the message on a network and passes on those addresses
to nodes in other networks.

iv) Gateway

A gateway is also an electronic devices or system (Collection of hard ware and software)
that connects two networks and translates information from one to the other. It enables a
computer or node to communicate with a computer on other different networks.

v) Router

Router is a communication device that connects two or more networks is called router and
transmits data to the correct destination on the network. It uses the routing protocols.

Describe the Layers of OSI Model

The brief description about seven layers of OSI model is given below.
Application Layer
This layer of OSI model provides network services to user applications. It is responsible for
exchanging information between programs running on the machine, such as an e-mail
programs, and other services running on a network such as a print server or another computer's
application.
Presentation Layer
This layer of OSI model performs data transformations to provide a common interface for
user applications. It means that data is translated between the formats the network
requires and the format the computers of the end-users expect.
Session Layer
This layer of OSI model establishes maintains and manages connections between devices,
so that they can talk to each other. These connections are called sessions.
Transport Layer
Pakistan International School Riyadh May 10, 2010 Page
#8/9
Computer Networks #2 Class XI Compiled by Wasim Anjum
Farooqi (M.Ed., M.C.S)
This layer of OSI model is responsible for breaking the data into segments, establishing an
end-to-end logical connection between machines, and providing for error handling.
Network Layer
The Network layer of OSI model is responsible for establishing, maintaining, and
terminating connections of networks. It means that the function of the network layer is to
manage communication between computers/terminals.
Data link Layer
This layer of OSI model is responsible for the reliability of the physical link established at
physical layer. This layer provides for the error free transfer of data from one computer to
another.
Physical Layer
This layer of OSI model specifies how data is processed into bits and physically transferred
over medium, such as cables. It's responsible for activating and maintaining the physical link
between systems.

What is meant by network protocol? Also write the name of LAN's protocols?
All machine-base communications must follow certain set of rules for exchange of data
between nodes connected to a network. The rules to send and receive data are called
protocols. These rules are defined in the network software. The most common and popular
LAN network protocols are:
(i) Ethernet
(ii) Token Ring
(iii) ARC net

************ Wish You Best of Luck ***********

Pakistan International School Riyadh May 10, 2010 Page


#9/9

S-ar putea să vă placă și