logo

Networking: Functions of Network Layer, Components of LAN, Error Checking, Framing, Access Methods, Codes for Error Detection and Correction

   

Added on  2023-06-09

33 Pages9025 Words178 Views
Running head: NETWORKING
NETWORKING

1
NETWORKING
General
Answers to question number 1
The network layer provides the means of transferring variable-length network packets from a
source to a destination host via one or more networks. Within the service layering semantics
of the OSI network architecture, the network layer responds to service requests from the
transport layer and issues service requests to the data link layer.
Functions of the network layer include:
Connectionless communication
For example, IP is connectionless, in that a data packet can travel from a sender to a recipient
without the recipient having to send an acknowledgement. Connection-oriented protocols
exist at other, higher layers of the OSI model.
Host addressing
Every host in the network must have a unique address that determines where it is. This
address is normally assigned from a hierarchical system. For example, you can be "Fred
Murphy" to people in your house, "Fred Murphy, 1 Main Street" to Dubliners, or "Fred
Murphy, 1 Main Street, Dublin" to people in Ireland, or "Fred Murphy, 1 Main Street,
Dublin, Ireland" to people anywhere in the world. On the Internet, addresses are known as IP
addresses.
Message forwarding
Since many networks are partitioned into subnetworks and connect to other networks for
wide-area communications, networks use specialized hosts, called gateways or routers, to
forward packets between networks.

2
NETWORKING
Answer to question number 2
A host (also known as "network host") is a computer or other device that communicates with
other hosts on a network. Hosts on a network include clients and servers -- that send or
receive data, services or applications.
The router forwards data packets along networks. It is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at
gateways, the places where two or more networks connect. Routers use headers and
forwarding tables to determine the best path for forwarding the packets, and they use
protocols to communicate with each other and configure the best route between any two
hosts.
In networks the switch is the device that filters and forwards packets between LAN segments.
Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of
the OSI Reference Model and therefore support any packet protocol. LANs that use switches
to join segments are called switched LANs or, in the case of Ethernet networks, switched
Ethernet LANs.
Answer to question number 3
A protocol is a set of rules and guidelines for communicating data. Rules are defined for each
step and process during communication between two or more computers. Networks have to
follow these rules to successfully transmit data.
Answer to question number 4
Data communication networks can affect businesses by being the foundations for distributed
systems in which information system applications are divided among a network of
computers. Data communication networks facilitate more efficient use of computers and

3
NETWORKING
improve the day-to-day control of a business by providing faster information flow. They also
provide message transfer services to allow computer users to talk to one another via
electronic mail.
Answer to question number 5
Scalability is an attribute that describes the ability of a process, network, software or
organization to grow and manage increased demand. A system, business or software that is
described as scalable has an advantage because it is more adaptable to the changing needs or
demands of its users or clients.
Compatibility is the capacity for two systems to work together without having to be altered to
do so. Compatible software applications use the same data formats. For example, if word
processor applications are compatible, the user should be able to open their document files in
either product.
Heterogeneous computing environments are a reality today. Users purchase systems from
many vendors to implement the solutions they need. Standardization and clear interfaces are
critical to a heterogeneous environment, enabling users to develop strategies for
communicating throughout their network.
Local Area Network
Answer to question number 1
A Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet, Fire wire, or USB connections. A switch is a control unit
that turns the flow of electricity on or off in a circuit. It may also be used to route information
patterns in streaming electronic data sent over networks. In the context of a network, a switch

4
NETWORKING
is a computer networking device that connects network segments. Hence a switch is better
than a Hub.
Answer to question number 2
A logical topology is how devices appear connected to the user. A physical topology is how
they are actually interconnected with wires and cables. For example, in a shared Ethernet
network that uses hubs rather than switches, the logical topology appears as if every node is
connected to a common bus that runs from node to node. However, its physical topology is a
star, in which every node on the network connects to a central hub.
Answer to question number 3
A broadcast domain is a logical division of a computer network, in which all nodes can reach
each other by broadcast at the data link layer. A broadcast domain can be within the same
LAN segment or it can be bridged to other LAN segments. ... Routers and other higher-layer
devices form boundaries between broadcast domains.
Answer to question number 4
A collision domain is a network segment connected by a shared medium or through repeaters
where data packets may collide with one another while being sent. The collision domain
applies particularly in wireless networks, but also affected early versions of Ethernet.
Answer to question number 5
The basic components of a wired LAN are the NICs, circuits, access points, and network
operating systems - The network interface card (NIC) allows the computer to be physically
connected to the network cable, which provides the physical layer connection among the
computers in the network The circuits are the cables that connect devices together. In a LAN,
these cables are generally twisted pair from the client to the hub or server. Outside the

5
NETWORKING
building, fiber optic is generally used. Network hubs and switches serve two purposes. First,
they provide an easy way to connect network cables. Network cables can be directly
connected by splicing two cables together. Second, many hubs and switches act as repeaters
or amplifiers. Signals can travel only so far in a network cables before they attenuate and can
no longer be recognized.
Answer to question number 6
A network interface card (NIC) is a circuit board or card that is installed in a computer so that
it can be connected to a network. A network interface card provides the computer with a
dedicated, full-time connection to a network.
Answer to question number 7
A Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet, Fire wire, or USB connections. A switch is a control unit
that turns the flow of electricity on or off in a circuit. It may also be used to route information
patterns in streaming electronic data sent over networks. In the context of a network, a switch
is a computer networking device that connects network segments. Hence a switch is better
than a Hub. In a shared Ethernet network that uses hubs rather than switches, the logical
topology appears as if every node is connected to a common bus that runs from node to node.
However, its physical topology is a star, in which every node on the network connects to a
central hub.
Answer to question number 8
Carrier Sense Multiple Access with Collision Detection is a type of protocol for networks that
helps to triage transmissions and control network traffic. collision detection is the process by
which a node determines that a collision has occurred. Collisions occur with most networks,

6
NETWORKING
so a protocol is required to recover from such events. Ethernet uses CSMA/CDas its collision
detection and recovery system.
Answer to question number 9
The correctness of a distributed algorithm is expressed through safety and liveness properties.
These properties can be defined as sets of histories (traces). More specifically, a safety
property is defined as a prefix-closed and limit-closed set of well-formed histories. Whereas,
a liveness property is defined as a set of histories that permits any finite well-formed history,
i.e., for every finite history there exists a continuation of that history in the liveness property.
Answer to question number 10
A three-way handshake is a method used in a TCP/IP network to create a connection between
a local host/client and server. It is a three-step method that requires both the client and server
to exchange SYN and ACK (acknowledgment) packets before actual data communication
begins.
Data link layer
Answer to question number 1
One of the issues which must be faced in any system is the problem of errors. We make an
assumption - which is often justified - that a digital bit pattern remains constant in time and
therefore information does not “decay away’. Error-checking is a device we use to confirm
our prejudices or alert us to a failure in the system. Virtually all forms of error checking
involve adding something to the digital pattern. This increases the number of possible
patterns (adding one bit to a pattern doubles the number of possibilities) If we then place
rules on valid patterns we can arrange things so that valid patterns do not become other valid
patterns through small errors. Parity is the simplest form of error checking. It adds one bit to

7
NETWORKING
the pattern and then requires that the modulo-2 sum of all the bits of the pattern and the parity
bit have a defined answer. The answer is 0 for even parity and 1 for odd parity. An alternative
way of making the same statement is that odd(even) parity constrains there to be an
odd(even) number of “1"s in the pattern plus parity bit. A CRC check can catch all single,
and a large number of other, errors. It is not prone to the “bursting” problem above. It is used
extensively in disk systems, communication systems and other places where a check on a
pattern has to be maintained.
Answer to question number 2
Token passing. On a local area network, token passing is a channel access method where a
signal called a token is passed between nodes to authorize that node to communicate. ... Some
types of token passing schemes do not need to explicitly send a token between systems
because the process of "passing the token" is implicit.
Answer to question number 3
Damaged frame

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Management Information and Computer Networking
|7
|1386
|51

Networking Protocol and OSI Reference Model Quiz
|4
|558
|488

Data Communication and Network Routing: Assignment
|7
|1937
|48

Understanding OSI Model, TCP, ARP and Network Design Topology
|3
|1210
|66

Understanding Network Components: Servers, Switches, Routers, and LAN Cables
|53
|3138
|62

Computer Networks Technologies: History, Present and Future
|9
|1657
|342