CN QB Solution
CN QB Solution
CN QB Solution
Computer Networks
Information Sharing
Using a Computer network, we can share Information over the network, and
it provides Search capabilities such as WWW. Over the network, a single
information can be shared among the many users over the internet.
Communication
Communication includes email, calls, message broadcast, electronic funds
transfer system etc.
Entertainment Industry
In Entertainment industry also uses computer networks widely. Some of the
Entertainment industries are Video on demand, Multiperson real-time
simulation games, movie/TV programs, etc.
Home applications
There are many common uses of the computer network are as home
applications. For example, you can consider user-to-user communication,
access to remote instruction, electronic commerce, and entertainment.
Another way is managing bank accounts, transferring money to some other
banks, paying bills electronically. A computer network arranges a robust
connection mechanism between users.
Mobile users
The rapidly growing sectors in computer applications are mobile devices like
notebook computers and PDAs (personal digital assistants). Here mobile
users/device means portable device. The computer network is widely used in
new-age technology like smartwatches, wearable devices, tablets, online
transactions, purchasing or selling products online, etc.
Social media
Social media is also a great example of a computer network application. It
helps people to share and receive any information related to political, ethical,
and social issues.
Bus Topology
4. Define protocol.
A network protocol is a set of established rules that specify how to format,
send and receive data so that computer network endpoints, including computers,
servers, routers and virtual machines, can communicate despite differences in their
underlying infrastructures, designs or standards.
To successfully send and receive information, devices on both sides of a
communication exchange must accept and follow protocol conventions. In
networking, support for protocols can be built into the software, hardware or both.
Without network protocols, computers and other devices would not know
how to engage with each other. As a result, except for specialty networks built
around a specific architecture, few networks would be able to function, and the
internet as we know it wouldn't exist. Virtually all network end users rely on network
protocols for connectivity.
o Bridge – A bridge operates at the data link layer. A bridge is a repeater, with
add on the functionality of filtering content by reading the MAC addresses of
the source and destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single output port,
thus making it a 2 port device.
o Switch – A switch is a multiport bridge with a buffer and a design that can
boost its efficiency(a large number of ports imply less traffic) and
performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, which makes it very efficient as it
does not forward packets that have errors and forward good packets
selectively to the correct port only. In other words, the switch divides the
collision domain of hosts, but the broadcast domain remains the same.
o Routers – A router is a device like a switch that routes data packets based on
their IP addresses. The router is mainly a Network Layer device. Routers
normally connect LANs and WANs and have a dynamically updating routing
table based on which they make decisions on routing the data packets. The
router divides the broadcast domains of hosts connected through it.
1. Application layer
This is the top layer of TCP/IP protocol suite. This layer includes applications
or processes that use transport layer protocols to deliver the data to destination
computers.
At each layer there are certain protocol options to carry out the task designated to
that particular layer. So, application layer also has various protocols that applications
use to communicate with the second layer, the transport layer. Some of the popular
application layer protocols are :
HTTP (Hypertext transfer protocol)
FTP (File transfer protocol)
SMTP (Simple mail transfer protocol)
SNMP (Simple network management protocol)
2. Transport Layer
This layer provides backbone to data flow between two hosts. This layer
receives data from the application layer above it. There are many protocols that
work at this layer but the two most commonly used protocols at transport layer are
TCP and UDP.
3. Network Layer
This layer is also known as Internet layer. The main purpose of this layer is to
organize or handle the movement of data on network. By movement of data, we
generally mean routing of data over the network. The main protocol used at this
layer is IP. While ICMP(used by popular ‘ping’ command) and IGMP are also used at
this layer.
The data link layer act as a service interface to the network layer. The
principle service is transferring data from network layer on sending
machine to the network layer on destination machine. This transfer also
takes place via DLL (Data link-layer).
Frame synchronization –
The source machine sends data in the form of blocks called frames to
the destination machine. The starting and ending of each frame should
be identified so that the frame can be recognized by the destination
machine.
Flow control –
Flow control is done to prevent the flow of data frame at the receiver
end. The source machine must not send data frames at a rate faster
than the capacity of destination machine to accept them.
Error control –
14.
M(x) = 𝑥 5 + 𝑥 4 + 𝑥
= 𝑥 5 + 𝑥 4 + 0𝑥 3 + 0𝑥 2 + 𝑥 + 0𝑥 0
Binary representation = 110010
110010100
is correct.
Range of Addresses:
In Class C addresses, the range of addresses is determined by the last octet.
The first address in the subnet is the network address itself (221.35.76.0),
and the last address is the broadcast address (221.35.76.255). The range of
usable host addresses falls between these two.
Class: Class C
NetID: 221.35.76
Range of Addresses: 221.35.76.1 to 221.35.76.254 (usable host addresses)
Since you didn't provide a subnet mask, I'll assume you want to find the
network address assuming a default subnet mask based on the IP address
you provided, which appears to be an IPv4 address (based on the format).
Assuming a default subnet mask of /24 (which means the first 24 bits are
used for the network portion), the network address can be found by setting
all host bits to 0. Here's the calculation:
IP address: 134.5.18.87
Subnet mask: 255.255.255.0 (/24)
IP address : 10000110.00000101.00010010.01010111
Subnet mask : 11111111.11111111.11111111.00000000
Network address : 10000110.00000101.00010010.00000000
So, assuming a default subnet mask of /24, the network address for the
given IP address 134.5.18.87 is 134.5.18.0.
iii) Find first address, last address and no. of addresses in block if one of the
address is 75.100.25.35/16
To find the first address, last address, and the number of addresses in the
block for the given IP address and subnet mask (75.100.25.35/16), we need
to determine the range of addresses within the subnet.
The subnet mask "/16" means that the first 16 bits of the IP address are used
for the network portion, and the remaining bits (32 - 16 = 16 bits) are
available for host addresses.
First Address:
The first address in the subnet can be found by setting all host bits to 0:
IP address: 01001011.01100100.00011001.00100011
Subnet mask: 11111111.11111111.00000000.00000000
Network addr: 01001011.01100100.00000000.00000000
Last Address:
The last address in the subnet can be found by setting all host bits to 1:
IP address: 01001011.01100100.00011001.00100011
Subnet mask: 11111111.11111111.00000000.00000000
Broadcast addr: 01001011.01100100.11111111.11111111
So, for the given IP address and subnet mask (75.100.25.35/16), the details
are as follows:
In this technique, each frame has sent from the sequence number. The
sequence numbers are used to find the missing data in the receiver end. The
purpose of the sliding window technique is to avoid duplicate data, so it uses
the sequence number.
Go-Back-N ARQ
Go-Back-N ARQ protocol is also known as Go-Back-N Automatic Repeat Request. It is
a data link layer protocol that uses a sliding window method. In this, if any frame is
corrupted or lost, all subsequent frames have to be sent again.
The size of the sender window is N in this protocol. For example, Go-Back-8, the size
of the sender window, will be 8. The receiver window size is always 1.
If the receiver receives a corrupted frame, it cancels it. The receiver does not accept a
corrupted frame. When the timer expires, the sender sends the correct frame again.
The design of the Go-Back-N ARQ protocol is shown below.
In Data Link Layer, if anyhow frame is lost due to noise, there will be
no attempt made just to detect or determine loss or recovery from it.
This simply means that there will be no error or flow control. An
example can be Ethernet.