MPSTME
Computer communication Networks
ASSIGNMENT 1
MBA TECH EXTC SEM VI
NAME- ABHISHEK SINGH ROLL NO. – J061
DATE – 07/02/2019
1. You have two computers connected by an Ethernet hub at home. Is this a
LAN, a MAN, or a WAN? Explain your reason.
Ans. Local area network only (LAN) - your machines are both in the same
building and directly connected via a hub (or switch).
2. When a party makes a local telephone call to another party, is this a
point-to-point or multipoint connection? Explain your answer.
Ans. It is Point-to-Point connection because multipoint connection needs more
than two end points.
3. Performance is inversely related to delay. When you use the Internet,
which of the following applications are more sensitive to delay?
a. Sending an e-mail
b. Copying a file
c. Surfing the Internet
Ans. Sending an email is more sensitive to delay than copying a file and surfing
the internet because E -mailing may be interrupted due to high latency, but can
always assume as soon as the server is performing again, without user
interaction.
4. Why are protocols needed? Why are standards needed?
Ans. When two devices want to successfully communicate, they must agree to
follow some rules about the way they will do it. These are known as protocols.
A communications protocol is the phrase used to describe a set of rules that
communication equipment adhere to when they send data to each other. If two
devices are sending and receiving data but using different rules then the
receiving device will not understand what was sent! A communications protocol
needs to specify a range of things before successful communication can take
place. These include:
o What baud rate will be used.
o What parity checking will be used.
o Whether software or hardware ‘handshaking’ is to be used.
o What character set is to be used.
o How many bits will be used for data.
o How many control bits will be used to control data transfer.
5. Match the following to one or more layers of the OSI model:
a. Route determination - Network Layer
b. Flow control - Transport Layer
c. Interface to transmission media - Physical Layer
d. Provides access for the end user - Application Layer
e. Reliable process-to-process message delivery - Transport Layer
f. Route selection - Network Layer
g. Defines frames - Data Link Layer
h. Provides user services such as e-mail and file transfer- Application
Layer
e. Transmission of bit stream across physical medium -→ Physical Layer
f. Format and code conversion services - Presentation Layer
g. Establishes, manages, and terminates sessions- Session Layer
h. Ensures reliable transmission of data- Transport Layer
i. Provides independence from differences in data representation-
Presentation Layer
j. Communicates directly with user’s application program-Application
Layer
k. Error correction and retransmission- Data Link & Transport Layer
l. Mechanical, electrical, and functional interface- Physical Layer
m. Responsibility for carrying frames between adjacent nodes - Data
Link Layer
n. Log-in and log-out procedures- Session Layer
6. Suppose a computer sends a packet at the network layer to another
computer somewhere in the Internet. The logical destination address of the
packet is corrupted. What happens to the packet? How can the source computer
be informed of the situation?
Ans. Before using the destination address in an intermediate or the destination
node, the packet goes through error checking that may help the node find the
corruption (with a high probability) and discard the packet. Normally the upper
layer protocol will inform the source to resend the packet.
7. If the data link layer can detect errors between hops, why do you think we
need another checking mechanism at the transport layer?
Ans. The errors between the nodes can be detected by the data link layer
control, but the error at the node (between input port and output port) of
the node cannot be detected by the data link layer.
Last Date of submission: On or before 7th Feb,2019