Week 3

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Case Study Folder Q3.

Physical topology refers to a network’s physical layout or the pattern, in which its devices
and cabling are organized,
Three basic physical topologies:
• Bus
• Ring
• Star
Logical topology defines the way in which the data is transmitted between computers.
Logical topologies commonly used on LANs are Ethernet and Token Ring.

According to me, token ring is a type of computer network in which all the computers are
arranged (schematically) in a circle. A token, which is a special bit pattern, travels around
the circle. To send a message, a computer catches the token, attaches a message to it, and
then lets it continue to travel around the network.

Case Study Folder Q3.2

Aloha network:-
Developed by Norm Abramson at the Univ. of Hawaii
– the guy had interest in surfing and packet switching
– mountainous islands → land-based network difficult to install
– fully decentralized protocol

To minimize the number of collisions, thereby optimizing network efficiency and


increasing the number of subscribers that can use a given network, a scheme called
slotted Aloha was developed. This system employs signals called beacons that are sent at
precise intervals and tell each source when the channel is clear to send a frame. Further
improvement can be realized by a more sophisticated protocol called Carrier Sense
Multiple Access with Collision Detection (CSMA/CD).
Ethernet network:-

Ethernet is a large, diverse family of frame-based computer networking technologies


that operate at many speeds for local area networks (LANs). The name comes from the
physical concept of the ether. It defines a number of wiring and signaling standards for
the physical layer, through means of network access at the Media Access Control
(MAC)/Data Link Layer, and a common addressing format.

Ethernet has been standardized as IEEE 802.3. The combination of the twisted pair
versions of Ethernet for connecting end systems to the network, along with the fiber optic
versions for site backbones, has become the most widespread wired LAN technology. It
has been in use from the 1990s to the present, largely replacing competing LAN
standards such as coaxial cable Ethernet, token ring, FDDI, and ARCNET. In recent
years, Wi-Fi, the wireless LAN standardized by IEEE 802.11, has been used instead of
Ethernet for many home and small office networks and in addition to Ethernet in larger
installations.

Case Study Folder Q3.3

The OSI, or Open System Interconnection, model defines a networking framework for
implementing protocols in seven layers. Control is passed from one layer to the next,
starting at the application layer in one station, and proceeding to the bottom layer, over
the channel to the next station and back up the hierarchy.

1) Physical Layer:-
This layer conveys the bit stream - electrical impulse, light or
radio signal -- through the network at the electrical and mechanical level. It provides
the hardware means of sending and receiving data on a carrier, including defining
cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.
2) Data-Link Layer:-
At this layer, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided
into two sub layers: The Media Access Control (MAC) layer and the Logical Link
Control (LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls frame
synchronization, flow control and error checking.

3) Network Layer:-
This layer provides switching and routing technologies, creating
logical paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well as addressing,
internetworking, error handling, congestion control and packet sequencing.

4) Transport Layer:-
This layer provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery and flow control. It
ensures complete data transfer.

5) Session Layer:-
This layer establishes, manages and terminates connections
between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It deals
with session and connection coordination.

6) Presentation Layer:-
This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to network format,
and vice versa. The presentation layer works to transform data into the form that the
application layer can accept. This layer formats and encrypts data to be sent across a
network, providing freedom from compatibility problems. It is sometimes called the
syntax layer.

7) Application Layer:-
This layer supports application and end-user processes.
Communication partners are identified, quality of service is identified, user
authentication and privacy are considered, and any constraints on data syntax are
identified. Everything at this layer is application-specific. This layer provides
application services for file transfers, e-mail, and other network software services.
Telnet and FTP are applications that exist entirely in the application level. Tiered
application architectures are part of this layer.

Case Study Folder Q3.4

Difference between router and switch

• Router understand IP head, and switch deal with MAC address


• Router has its own IP address(es), and switch don’t
• Router has an operating system running inside, and allow administrator to login
into the system.
• You (network administrator) must configure routing table to make it works.
• Switch is usually ready to use.
• Router has routing software running inside, including route discovery protocol.
• Routing software know how to deal with different IP packet, such as ICMP and
other IP option functionality. Switches don’t.
• Multiple routers can be connected together as a network.
• You can’t directly multiple switches together to form a large network.
Case Study Folder Q3.5

At which layer of the OSI model do the following protocols operate?

• HTTP:-

• UDP:-

• RARP:-

Case Study Folder Q3.6

This case study is based on smorgon steel company. When smorgon steel abandoned
traditional client/server in computing in favour of critix-driven terminal services it found
that the move to the “simpler” environment brought with it a new set of problems. The
main problem was moving to terminal services reduced application performance listed of
improving accessibility. I think this problem is occurred because they never went through
the 7 OSI model.

According to my suggestion they must have to go through that 7 OSI layer and try to
solve out that problem. They can also use new management software which enables fine-
tuning of the application to improve performance without any new hardware investment.

You might also like