0% found this document useful (0 votes)
357 views5 pages

Data Communication and Computer Network Assignment PDF

The document is an assignment submission for a course on data communication and computer networks. It includes the student's name, department, batch, and ID number, as well as the submission deadline. The document then lists 8 questions about topics relating to data communication and computer networks, and provides responses to each question. These topics include the characteristics of effective data communication, criteria for effective and efficient computer networks, factors that influence network configuration, differences between network types, network topology, drawing a sample network topology, comparing the OSI and TCP/IP models, and why OSI uses a layered approach.

Uploaded by

eyasu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
357 views5 pages

Data Communication and Computer Network Assignment PDF

The document is an assignment submission for a course on data communication and computer networks. It includes the student's name, department, batch, and ID number, as well as the submission deadline. The document then lists 8 questions about topics relating to data communication and computer networks, and provides responses to each question. These topics include the characteristics of effective data communication, criteria for effective and efficient computer networks, factors that influence network configuration, differences between network types, network topology, drawing a sample network topology, comparing the OSI and TCP/IP models, and why OSI uses a layered approach.

Uploaded by

eyasu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

Assignment on Data Communication and

Computer Networks

Full Name:- Eyasu Kebede

Department:- Computer science

Batch:- CCS1R1N6/11

ID no:- UU74819R

Submission deadline:-Sunday Nov 30/2020


1. Explain the fundamental characteristics on which the effectiveness of data
communication depends on.

The effectiveness of a data communications system depends on four fundamental


characteristics: delivery, accuracy, timeliness, and jitter.

1. Delivery:
The primary task of a data communication system is to deliver or transfer data from
sender to receiver, which are the 2 components of the 5 components of data
communication system. The system must deliver data to the exact destination. No
other receiver should receive the data. This characteristics includes the security of the
system, that is, the protection of data.

2. Accuracy:
The data communication system must deliver data to the receiver without being
altered or damaged. The receiver should receive the exact same data which was sent
by the sender. The protocol might require to alter the sent data to protect and optimize
the process. However, the protocol should also reverse and restore the data back to its
original form before representing it to the receiver. The accuracy must be maintained.

3. Timeliness:
The system must maintain timeliness. It must deliver data in a timely manner. Delayed
delivery can make the data useless to the receiver. Data must be delivered as they are
produced, in the order they are produced and without any significant delay.

4. Jitter:
Jitter refers to the variation of packet arrival time. Data is sent as packets, that is, a
chunk of the whole data is sent in each turn. These packets get re-joined back in the
target device to represent the complete data as it is. Each packet is sent with a
predefined delay or acceptable amount of delay. If packets are sent without
maintaining the predefined delay then an uneven quality in the data might result.

2. Describe the criteria necessary for the effectiveness and efficiency of Computer
Network.

To be considered effective and efficient, a network must meet a number of criteria. The
most important of these are performance, reliability, and security.

Performance:

Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an enquiry and a response.

The performance of a network depends on a number of factors, including the number of


users, the type of transmission medium, the capabilities of the connected hardware, and the
efficiency of the software.
Reliability:

In addition to accuracy of delivery, network reliability is measured frequency of failure, the


time it takes a link to recover from a failure, and the network’s robustness in a catastrophe.

Security:

Network security issues include protecting data from unauthorized access and viruses.

3. List and explain factors that can influence either to implement a peer-to-peer or server-
based network configuration

o Size of the organization.


o Level of security required.
o Type of business.
o Level of administrative support available.
o Amount of network traffic.
o Needs of the network users.
o Network budget.

4.Based on the geographical coverage Computer Networks are classified as PAN, LAN,MAN,
and WAN. Discuss the difference points between these Computer Network types apart
their geographical coverage.

What is PAN (Personal Area Network):-PAN is a computer network formed around a


person. It generally consists of a computer, mobile, or personal digital assistant.

What is LAN(Large area Network):-A Local Area Network (LAN) is a group of computer
and peripheral devices which are connected in a limited area such as school, laboratory,
home, and office building.

What is WAN(Wide area Network):-WAN (Wide Area Network) is another important


computer network that which is spread across a large geographical area. WAN network
system could be a connection of a LAN which connects with other LAN's using telephone
lines and radio waves.

What is MAN(Metropolitan Area Network):-A Metropolitan Area Network or MAN is


consisting of a computer network across an entire city, college campus, or a small region.

5. What is network topology? How does the logical topology differ from the physical
topology?

Network topology:- is the arrangement of the elements (links, nodes, etc.) of a


communication network.
A physical network topology diagram shows the structure of how devices are
connected physically inside a network. A logical network topology diagram shows the
logical method of communication used by the devices inside the network for network
communication. Physical topology specifies the layout how devices are physically
connected in the network. Instead, logical topology specifies the manner in which
data travels between devices in the network.

Physical topology shows how a network looks physically, but logical topology shows
the fashion in which data is circulated inside the network.

6. A company contains two star topology network. The first topology contains a
printer and three pc of them one act as a Sever; the next topology contains four
PC. The company wants to establish LAN network topology using a hubs in
which the two topology linked through the hub. Draw a network topology for
the given scenario above.

7. Explain the similarities and difference between OSI reference model and TCP/IP
Network model.

similarities between OSI Reference Model and TCP/IP Reference Model.

1. Both have layered architecture.


2. Layers provide similar functionalities.
3. Both are protocol stack.
4. Both are reference models.
Differences between OSI reference model and TCP/IP Network model.

OSI is a generic, protocol independent standard, acting as a communication


gateway between the network and end user. ... TCP/IP model is based on standard
protocols around which the Internet has developed. It is a communication protocol,
which allows connection of hosts over a network.

8. Why OSI reference model has developed a layered approach network models?

The main function of this layer is to make sure data transfer is error-free from one
node to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address. Data
Link Layer is divided into two sub layers : Logical Link Control (LLC)

You might also like