Computer Communication and Networks
Computer Communication and Networks
Basics:
1: Data communication:
Transmission of data electronically from one place to another place. An electromagnetic wave that is used
to transmit data Is called signal. Propagation of signal across medium is called signaling.
2: Elements of data communication?
Sending device, receiving device, communication medium and communication devices.
3: Types of communication?
Wired communication (coaxial cable, twisted pair cable and fiber optic)
Wireless communication (microwave, infrared rays, radio waves)
8: Communication technologies?
Fax, voice mail, E-mail, instant messaging, vedio conferencing, internet telephony, groupware etc.
9: Computer Networks:
Consists of two or more computers to share information or resources
Circuit switching: Creates a dedicated path between two nodes. The entire circuit must be available all the
time for data transfer. Three phases: establish a circuit, send data and terminated the circuit. Telephone is
example.
Packet switching: divides message into packets and sed to destination. Each packet has overhead
information about destination like sender address, sequence number, destination address. Each packet can
travel on any route. Message is reassembled at receiver end. Efficient and less expensive. Used in modern
switched networks.
23: Bandwidth
Amount of data that can be sent at a time over a media. Digital signal bytes per second, analog signal cycles
per second.
1: What is OSI?
Open system interconnection. It is an pen system which allows two systems to communicate even if their
architecture is different. Developed by ISO in 1983. It is a layerd system.
2: Advantages of OSI?
It divides the communication process into smaller tasks
It allows various network types hardware and software to communicate
3: Physical Layer
Bit by bit delivery. It transmits the bits stream and tells how data is transmitted over network and which
control signals are used.
Responsibilities: Data rate, communication medium, characteristics of media, representation of bits,
synchronization and line configuration.
Protocols: IEEE 802, IEEE 802.2 FDDI
5: Network Layer
This layer is responsible to establish, maintain and terminates a connection in network. It manages the
delivery of data from source to destination in the form of packets.
Responsibilities: Logical addressing, routing
Protocols: IPX, IP and X25
6: Transport Layer
Process to process delivery. It controls the flow of data. It ensures that the messages are delivered error
free. Messages are divided into packets and the sent. If there is error, packet will be retransmitted.
Responsibilities: Service point addressing, Segmentation and assembling, connection control, error and
flow control on end to end instead of single link.
Protocols: UDP, TCP, SPX, Net Bui
7: Session Layer:
It establishes, manages and terminates the user connection, provides error check sum and synchronization
among users.
8: Presentation Layer
It deals with the presentation of data.
Responsibilities: Encryption, data re formatting and compression
Protocols: NFS, NCP, SMB
8: Application Layer
Top most layer which provides services to users. It allows users to access systems directly.
Responsibilities: File access, file transfer, mail services etc.
IP addressing
1: MAC is the device address which is unique for each devise but it does not tell the location of network.
IP address is a unique address which locate the location of network.
2: IP: 32 bits
3: MAC: 48 bits
4: Port: 16 bits
5: IPV 4: 32 bits
IPV 4 can connect 4 billion devices. Provides error checksum. Broadcasting
Class A: 1 to 126, 127 reserved for loopback address which means that host can send something to itself.
Its for large network
Class B: Its foe medium size network. Ranges 128-191,
Class C: for small organizations. Ranges 192 to 223
Class D: For multicasting which means the datagram is sent to only specific host group instead of individual
hosts ranges 224-239
Class E: ranges 240-255, broadcasting
6: IPV 6: 128 bits
IPV 6 can connect 2^128 devices. Does not provides error checksum. unicasting
Facilitates unicast, multicast and broadcast
Protocols
1: UDP vs TCP
TCP UDP
Connection oriented Connection less
Reliable delivery Unreliable delivery
Acknowledgement No acknowledgment
2: SMTP
Simple mail transfer protocol which can send simple message, message with images and texts. It is used to
send emails via internet.
3: DNS
Domain name system. Instead of remembering the ip address the domain name is easier to remember like
www.examples.com can be the domain name of 198:32:55:4
4: DHCP
Dynamic host configuration protocol is used for dynamic IP addressing. The servers which manages the
dynamic IP addressing are called DHCP servers, while the workstations that are assigned dynamic IP
addresses are called DHCP clients.
Firewalls:
Firewall is basically a set of components which restricts the access of data and info in a network. Firewall
can be a hardware and software. Firewall software can be installed in the routers, switches and hubs.
What is Telnet?
a network protocol that allows a user on one computer to log into another computer that is part of the same
network. log into a remote computer using a telnet program.
What is Telnet and FTP?
TELNET (TELecommunication NETwork) and FTP (File Transfer Protocol) both are the application
layer protocol. They are connection oriented protocols as they create a connection between remote host and
a server.
Protocol vs Standard?
A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is
a formalized protocol accepted by most of the parties that implement it.
What is Wifi?
Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops),
mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface
with the Internet
What us LiFi?
LiFi (light fidelity) is a bidirectional wireless system that transmits data via LED or infrared light. It was
first unveiled in 2011 and, unlike wifi, which uses radio frequency, LiFi technology only needs a light
source with a chip to transmit an internet signal through light waves.
Types of Multiplexing?
• Frequency Division Multiplexing (FDM): Frequency division multiplexing (FDM) is a
technique of multiplexing which means combining more than one signal over a shared
medium. In FDM, signals of different frequencies are combined for concurrent
transmission.
• Wavelength Division Multiplexing (WDM): Wavelength division multiplexing (WDM) is
a technique of multiplexing multiple optical carrier signals through a single optical fiber
channel by varying the wavelengths of laser lights. WDM allows communication in both
the directions in the fiber cable.
• Time Division Multiplexing (TDM): Time division multiplexing (FDM) is a technique of
multiplexing, where the users are allowed the total available bandwidth on time sharing
basis. Here the time domain is divided into several recurrent slots of fixed length, and each
signal is allotted a time slot on a round-robin basis.
5g:
1G, 2G, 3G, 4G and 5G represent the five generations of mobile networks where G stands for
'Generation' and the numbers 1, 2, 3, 4 and 5 represent the generation number. Since the early
1980s, almost every ten years, we have seen a new generation of mobile networks
Group Discussion
1: Public Vs. Private IP's
Public IP outside the local network communication k liye use hota hai on the other hand private within the
local network. Private fre public cost
Ipv 4 127.0.0.1
Ipv 6 0.0.0.0.0.0.1 or ::1
Creating a logical sub network by borrowing hosts bits to Network side is known as Subnetting
4: What are Dual Stack Routers?To accommodate ipv4 and ipv6
6: Subnet of class A
Subnet of class A 255.0.0.0
B 255.255.0.0
C 255.255.255.0
10.0.0.0
172.16.0.0
192.168.1.0
12: Can same range of private ip addresses be used in more than one internal network?
15: IPsec?
Internet protocol security. ip security protocol, provides secure encrypted communication between two
computers on an internet
CRC used in LAN and WAN and crc work on data link layer whereas checkusm work on transport layer
21: How a local networks become able to connect to the external network?
And
Submetting already defined.
24: Telnet vs FTP
Telnet use for remote access File transport protocol use to transfer files
25: Unicast?
We dilver the msg to any first host to received in the communication channel
Or
Anycast is a netowkr adressing methodology in which a single destination address has multiple paths to
two or more endpoint destinations.
26
Unicast only 1
Multicast not 1 but some, but all
Broadcast all
Anycast any first in the way
27: Hub
Broadcast
28: Switch
Unicast
Distance Vector
Less bandwidth req
Small Packets
Less traffic
Based on local knowledge
Link State Routing
More bandwidth req
large packets
More traffic
Based on global knowledge
Proxy firewall work on application layer and packet filtering work on network layer
38: VPN
Creating a private network fr a public internet, virtual private network
39: Tuneling
Source and destination are of same time but network is of different
Connecting them
40: ACL?
Access control list, those allowed non harmful things which a firewall doesn't block
50: What is formula to find the total number of wires in mesh topologies....
N(n-1)/2
52: CSMA/CD
Detection of collision while transferring data in wired network
53: ALOHA
transmitting of frame detecting whether the channel is idle or busy
58: Piggybacking?
Acknowledgement payload k sth hi bhej dena
59: TTL
Time to live,
Time to Live its used in Multicasting Routing
60: SSL
Secure socket layer
62: Ids?
How to avoid false alarm in ids
Intrusion detection system, used To avoid false positives, We will have to maintain a good ACL....
63: IPS
Intrusion prevention system
Not only alarming but to also to prevent the attack by the system
To avoid flooding overhead and duplicate packets received in broadcasting we use forward Broadcast in
which duplicate and redundent packets received in a network from different paths are discarded and only
one copy is kept
65: Wimax
Wireless in MAN like 4g, 5g
66: In 802
What is80?
What is2?
It was developed in feb 1980
2 is for.feb
80 for 1980