Sunteți pe pagina 1din 5

Difference between connectionless and connection-oriented protocol?

1. In connectionless communication there is no need to establish connection between source (sender) and destination (receiver ). But in
connection-oriented communication connection must established before data transfer.

2.Connection-oriented communication is more reliable then connectionless communication.

3.In connection-oriented communication information can be resend if there is an error in receiver side ( missing data, corrupt data etc.
).But in connectionless communication it is not possible because the destination does not inform the source about data is received or not.

4. Connection-oriented communication have higher overhead and and place greater demands on bandwidth. But in connectionless
communication requires far less overhead than connection-oriented communication.

Connection oriented : TCP, SCTP

Example1: SMTP (Electronic Mail)

Example2: HTTP / FTP (Web Browser / Applications)

Example3: SSH / Telnet (Remote Access)

Connection Less : UDp

Example1: DNS (Resolve Address)

Example2: Video Conference

Example3: DHCP (Ip Assignments)

Difference between tcp & udp.


2 reasons for using layered protocols and one possible disadvantage.

1. Protocol layering is a common technique to simplify networking designs by dividing them into functional layers, and assigning protocols
to perform each layer's task.

For example, it is common to separate the functions of data delivery and connection management into separate layers, and ther efore
separate protocols. Thus, one protocol is designed to perform data delivery, and another protocol, layered above the first, per forms
connection management. The data delivery protocol is fairly simple and knows nothing of connection management. The connection
management protocol is also fairly simple, since it doesn't need to concern itself with data delivery.

2. Protocol layering produces simple protocols, each with a few well defined tasks. These protocols can then be assembled into a useful
whole. Individual protocols can also be removed or replaced as needed for particular applications.

The most important layered protocol designs are the Internets original DoD model, and the OSI Seven Layer Model. The modern I nternet
represents a fusion of both models.

The main disadvantages of layered systems consist primarily of


overhead both in computation and in message headers caused by the
abstraction barriers between layers. Because a message often has to
pass through many (10 or more) protocol layers the overhead of these
boundaries is often more than the actual computation being done.

Difference between active and passive hubs.

three criteria for effectiveness of data communication sys.

1. Delivery:
The system must deliver data to the exact destination. Data must not be received by other devices than the target device.

2. Accuracy:
The system must deliver data to the destination in a way that the target device receives the data accurately. If the protocol needs
to alter the while in transmission, it must alter it back to its original form before representing it to the target device. The accuracy
must be maintained.

3. Timeliness:
The system must deliver data in timely manner. Data delivered late can become useless. Data must be delivered as they are
produced, in the order they are produced and without any significant delay.

4. Jitter:
Jitter refers to the variation of packet arrival time. Data is sent as packets, that is, a fixed amount of the whole data is sent in each
to turn. These packets get joined back in the target device to represent the complete data as it is. Each packet is sent with a
predefined delay or acceptable amount delay. If packets are sent without maintaining the predefined delay then an uneven quality
in the data might result.

What is network? Criteria necessary for effective and efficient network.

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or
allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satel lites, or
infrared light beams.

Performance:
Performance can be measured in many ways, including transit time and response time. Transit time is the amount of time
required for a message to travel from one device to another. Response time is the elapsed time between an enquiry and a
response.

The performance of a network depends on a number of factors, including the number of users, the type of transmission
medium, the capabilities of the connected hardware, and the efficiency of the software.

Reliability:

In addition to accuracy of delivery, network reliability is measured frequency of failure, the time it takes a link to recover fr om a
failure, and the network’s robustness in a catastrophe.

Security:

Network security issues include protecting data from unauthorized access and viruses.

Types of network.

https://www.javatpoint.com/types-of-computer-network
what is meant by data communication?

Data communications (DC) is the process of using computing and communication technologies to transfer data from one place
to another, and vice versa. It enables the movement of electronic or digital data between two or more nodes, regardless of
geographical location, technological medium or data contents.

Data communications incorporates several techniques and technologies with the primary objective of enabling any form of
electronic communication. These technologies include telecommunications, computer networking and radio/satellite
communication. Data communication usually requires existence of a transportation or communication medium between the
nodes wanting to communicate with each other, such as copper wire, fiber optic cables or wireless signals.

For example, a common example of data communications is a computer connected to the Internet via a Wi-Fi connection,
which uses a wireless medium to send and receive data from one or more remote servers.

Write the factors of that determine whether a communication system is LAN, MAN and WAN

LAN : Local area network is a network that are connected with some computer.That can be small office

MAN : A Metropoliton network covers layer coverage than LAN and is usually used for connecting a city rather than single organization.

WAN : A wide area network is collection of networks or many LANs. The perfect example of WAN is internet which connects thousands
and millions of networks.

What is protocols and why standards are needed?

A protocol is a set of rules and guidelines for communicating data. Rules are defined for each step and process during
communication between two or more computers. Networks have to follow these rules to successfully transmit data.

Standards are needed to create and maintain an open and competitive market for manufacturers to coordinate protocol rules, and thus
guarantee compatibility of data communication technologies.

For n devices in a n/w what is no. of cable links required for a mesh topology?

‘cable link’ are required for mesh, n-1 cable link for bus, n for ring, and n cable link for ‘star topology’ .
Assume six devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device?

Ans: Cables needed (6*5)/2 = 15 and,Each device needs to be connected to 5 other devices. So, each device needs to have 5 ports. Six

devices times five ports equals 30 total ports.


Group the OSI layers by function?

The seven layers of the OSI model belonging to three subgroups.

Physical, data link and network layers are the network support layers; they deal

with the physical aspects of moving data from one device to another.

Session, presentation and application layers are the user support layers; they

allow interoperability among unrelated software systems.

The transport layer ensures end-to-end reliable data transmission.

What are header and trailers and how do they get added and removed?

Each layer in the sending machine adds its own information to the message it

receives from the layer just above it and passes the whole package to the layer

just below it. This information is added in the form of headers or trailers. Headers

are added to the message at the layers 6,5,4,3 and 2. A trailer is added at layer

2. At the receiving machine, the headers or trailers attached to the data unit at the

corresponding sending layers are removed, and actions appropriate to that layer

are taken.

Types of topology .

From book or video.

What are social issues with comp n/w .

• People shares their thoughts and opinions about politics, religion, or sex on social media like facebook, twitter, whatsup, etc,
are many times deeply offensive to some people.

• Many other parties are involved in the tussle over content. For instance, pirated software, music and movies fueled the massive
growth of peer-to-peer networks, which did not please the copyright holders, who have threatened (and sometimes taken)
legal action.

• Computer networks make it very easy to communicate. They also make it easy for the people who run the network to snoop
(spy) on the traffic. This sets up conflicts over issues such as employee rights versus employer rights.

• Another conflict is centered around government versus citizen’s rights. The FBI has installed systems at many Internet service
providers to snoop on all incoming and outgoing email for nuggets of interest and to find information about illegal activities.

• The private sector does snooping by profiling users. For example, small files called cookies that Web browsers store on users’
computers allow companies to track users’ activities in cyberspace and may also allow credit card numbers, social security
numbers, and other confidential information to leak all over the Internet.

• Companies that provide Web-based services may maintain large amounts of personal information about their users that allows
them to study user activities directly. For example, Google can read your email and show you advertisements based on your
interests if you use its email service, Gmail.

• As part of the process of providing service to your mobile device the network operators learn where you are at different times
of day and to track your movements.

• Electronic junk mail (spam) has become a part of life because spammers have collected millions of email addresses and would-
be marketers can cheaply send computer-generated messages to them.

• Web pages and email messages containing active content (basically, programs or macros that execute on the receiver’s
machine) can contain viruses that take over your computer.

• Phishing messages masquerade as originating from a trustworthy party, for example, your bank, to try to trick you int o
revealing sensitive information, for example, credit card numbers. Identity theft is becoming a serious problem as thieves
collect enough information about a victim to obtain credit cards and other documents in the victim’s name.
Exp following.

https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/amp/

S-ar putea să vă placă și