Data Communication and Computer Network Assignment PDF
Data Communication and Computer Network Assignment PDF
Computer Networks
Batch:- CCS1R1N6/11
ID no:- UU74819R
1. Delivery:
The primary task of a data communication system is to deliver or transfer data from
sender to receiver, which are the 2 components of the 5 components of data
communication system. The system must deliver data to the exact destination. No
other receiver should receive the data. This characteristics includes the security of the
system, that is, the protection of data.
2. Accuracy:
The data communication system must deliver data to the receiver without being
altered or damaged. The receiver should receive the exact same data which was sent
by the sender. The protocol might require to alter the sent data to protect and optimize
the process. However, the protocol should also reverse and restore the data back to its
original form before representing it to the receiver. The accuracy must be maintained.
3. Timeliness:
The system must maintain timeliness. It must deliver data in a timely manner. Delayed
delivery can make the data useless to the receiver. Data must be delivered as they are
produced, in the order they are produced and without any significant delay.
4. Jitter:
Jitter refers to the variation of packet arrival time. Data is sent as packets, that is, a
chunk of the whole data is sent in each turn. These packets get re-joined back in the
target device to represent the complete data as it is. Each packet is sent with a
predefined delay or acceptable amount of delay. If packets are sent without
maintaining the predefined delay then an uneven quality in the data might result.
2. Describe the criteria necessary for the effectiveness and efficiency of Computer
Network.
To be considered effective and efficient, a network must meet a number of criteria. The
most important of these are performance, reliability, and security.
Performance:
Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to
another. Response time is the elapsed time between an enquiry and a response.
Security:
Network security issues include protecting data from unauthorized access and viruses.
3. List and explain factors that can influence either to implement a peer-to-peer or server-
based network configuration
4.Based on the geographical coverage Computer Networks are classified as PAN, LAN,MAN,
and WAN. Discuss the difference points between these Computer Network types apart
their geographical coverage.
What is LAN(Large area Network):-A Local Area Network (LAN) is a group of computer
and peripheral devices which are connected in a limited area such as school, laboratory,
home, and office building.
5. What is network topology? How does the logical topology differ from the physical
topology?
Physical topology shows how a network looks physically, but logical topology shows
the fashion in which data is circulated inside the network.
6. A company contains two star topology network. The first topology contains a
printer and three pc of them one act as a Sever; the next topology contains four
PC. The company wants to establish LAN network topology using a hubs in
which the two topology linked through the hub. Draw a network topology for
the given scenario above.
7. Explain the similarities and difference between OSI reference model and TCP/IP
Network model.
8. Why OSI reference model has developed a layered approach network models?
The main function of this layer is to make sure data transfer is error-free from one
node to another, over the physical layer. When a packet arrives in a network, it is the
responsibility of DLL to transmit it to the Host using its MAC address. Data
Link Layer is divided into two sub layers : Logical Link Control (LLC)