logo

Computer Networking Fundamentals: A Comprehensive Guide

   

Added on  2024-06-03

17 Pages3069 Words498 Views
Web Development
 | 
 | 
 | 
Table of Contents
Topic 3.............................................................................................................................................2
Topic 4.............................................................................................................................................6
Topic 5.............................................................................................................................................7
Topic 6...........................................................................................................................................12
Topic 7...........................................................................................................................................14
Topic 8...........................................................................................................................................16
Computer Networking Fundamentals: A Comprehensive Guide_1

Topic 3
Q 1. The Sneaker Net is origins due to the fashion running of footwear called as sneakers among
the people and they wore that footwear at the time of computer network when data is transported
locally by taking the data on floppy disk. So the name Sneaker net is originated.
Q 2. A client is a Consumer of network services.
A server is a Provider of network services.
Q 3. As client is the person who uses the services of network when required but the peers mean
that a person can act as client as well as server depends on the situation or it can act
simultaneously.
Q 4. The peer to peer network is very less ideal than that of campus-sized network because by
increasing in the more system in the network the security, performance and access are being
affected by sharing of the data. In the large network there must be requirement of very strong
distinction between the server and client networking. Only the administrator of the network has
the complete power of accessing the complete network and on the applications while user has
only limited access to the network for the completion of their daily roles.
Q 5.
IaaS: This is the services offered by the big association in which cloud provider is responsible for
managing the hardware, storage, components of networking and servers. It expands as
Infrastructure as a Services. Also, it is responsible for the software that includes operating
system, system, application and many more. It also allows virtualization of software at the time
of requirement. Example Amazon Web server.
SaaS: The provider of cloud provides software applications and user is allowed to access
application software through internet and they can customize their own interface for that
software. Example, email, office and so many more.
Q 6.
SaaS PaaS IaaS
It expands as Software as a It expands as Platform as a It expands as Infrastructure as
Computer Networking Fundamentals: A Comprehensive Guide_2

Service. Services. a Service.
It has remote access from
various devices.
It allows integration with
other services.
It provides complete
infrastructure and virtual
developed environment.
Spreading and scalability cost
over time.
Scalability for the software
which is deployed.
Scalable, Secure, and reliable,
Database infrastructure is
restricted.
Not restricted to the
infrastructure of database.
Not restricted to the database
(User, 2016).
Q 7.
In the TCP/IP connection the structure of Frame of Data Link layer can be given as (Shichao,
2018).
Q 8. In the above question, the frame given above consist of first 7 bytes for the preamble, after
that 1 byte is given for the delimiter and at last 4 bytes are for the storing of the destination MAC
address.
Q 9.
Computer Networking Fundamentals: A Comprehensive Guide_3

The ping program works like the sonar echo-location in which the small data packet contains the
ICMP Echo_Request to the specific system followed by the reply with the Echo_Reply by that
computer in return.
Q 10.
For the above request ping frame, the determination of request should take place. By using the
Wireshark, the Ping request report on the router’s IP address.
So this can be given by,
For Ping: 192.168.0.105
It defines the 74 bytes of the frame.
ICMP header: 8 bytes
IP header: 20 bytes
ICMP payload size: 32 bytes
Ethernet header: 14 bytes
MTU: 8 + 20 + 32+ 14 = 74 bytes.
Q 11. In the ping program, The ICMP is the main protocol that is being used. ICMP (Internet
Control Message Protocol) that protocol which supports the suite on internet protocol. It is
required and used by the various devices on the network (routers) that is for sending the
information message and error message with the data packets. The use of ICMP type 8 protocol
is taken for the request and for the replies the use of ICMP type 0 protocol is being used (Test,
2018).
References:
User, S. (2016). Saas, PaaS, and IaaS Explained. Apriorit. Retrieved 22 May 2018, from
https://www.apriorit.com/white-papers/405-saas-iaas-paas
Shichao, (2018), Chapter 3. Link Layer. Retrieved 22 May 2018, from
https://notes.shichao.io/tcpv1/ch3/
Livinginternet (2018). Internet Ping Command, Test. Retrieved 22 May 2018, from
https://www.livinginternet.com/i/ia_tools_ping.htm
Computer Networking Fundamentals: A Comprehensive Guide_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology (IT) Infrastructure: Assignment
|1
|749
|65

Regional Gardens Cloud Computing Architecture
|11
|919
|76

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|20
|3043
|495

Cloud Computing: Types, Advantages and Disadvantages
|8
|1314
|485

Reasons for MetaSoft to Move to Cloud Computing
|13
|593
|146

Cloud computing impact on business assignment
|19
|1626
|101