Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Studies Assignement 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

SUBJECT NAME AND CODE:Computer studies 2B(CE260US)

MODE OF STUDY:Full time

ASSIGNMENT:1

LECTURER:Mr. Levi Ndongo

CLASS GROUP:B

Student Names Student Numbers

Justin Muyahiso 202100324

Mbapaha Kandetu 220012989

Ndasilwohenda N Shanyengange 220013683

Shikongo Toivo 202157822

Tjehavangere Tjihuro 202255646

Page 1 of 7
Question 1: Network Fundamentals [10 Marks]

Explain the concept of a computer network and its importance in today's digital world.
Describe the key components of a computer network and provide examples of
different types of networks.

The concept of a computer network.

•A computer network allows for the circulation of resources such as printers,files and
data storage as well as the capability to communicate with other computers and access
the internet.Networking also allows collaboration between individuals and groups and
supports the transfer of data and information across a variety of platforms and devices.

Importance of a computer network

•Provides best way of business communication.

•Cost-effective resource sharing.

•Improving storage efficiency and volume.

Key components of a computer network

•IP Address:An IP address is a unique numerical identifier that is assigned to every


device on a network.IP addresses are used to identify devices and enable
communication between them.

•DNS:The Domain Name System(DNS) is a protocol that is used to translate human-


readable domain names (such as www.google.com) into IP addresses that computers
can understand.

•Firewall:A firewall is a security device that is used to monitor and control incoming
and outgoing network traffic

Examples of different types of networks

•Local area networks(LANs)

•Wide area networks (WANs)

•Metropolitan area networks (MANs)

Question 2: Network Topologies [5 Marks]

Compare and contrast the characteristics of three common network topologies: bus,
star, and ring. Discuss the advantages and disadvantages of each topology and provide
real-world scenarios where each might be most suitable.

Page 2 of 7
Bus

All the nodes are connected by single cable in bus network topology type. The cable
starts from the node and terminates on the other end.

Advantages of Bus network topology type:

•It is cheap, easy to install and easy to implement.

•It requires less cable work.

Disadvantages Bus network topology type

•The cable length is limited and hence it limits number of stations supported by bus
network.

•Fault isolation is difficult.

Star

In star network each node is connected to a central device known as Concentrator or


Hub. Nodes can be file server, work stations and peripherals. Here hub receives the
signal from any node and passes it to all the other nodes on the network.

Advantages of Star network topology type:

•All the nodes are connected with central node. Hence it reduces chances of complete
network failure. Only the faulty nodes need to be repaired.

•It is easy to manage.

Disadvantages Star network topology type

•It requires more cable length compare to linear topologies.

•If the hub or concentrator fails all the attached nodes are disabled.

Ring

All the nodes are connected end to end to form loop. Here each node has connection
with two other nodes one to left and the other to right of it.

A token (known as small data packet) is passed around the network continuously.
When a node needs to transmit, it reserves the token for next trip around and attaches
its data packet to it.

Advantages of Ring network topology type:

Page 3 of 7
•It is easier to manage and hence fault isolation is easy and straightforward.

•It has lowest cost among all the network topologies.

Disadvantages Ring network topology type

•Any extra node is added after shutting down the entire network and hence will disrupt
the services to the operational nodes.

•It provides slowest speed as nodes are accessed sequentially

Question 3: OSI Model [5 Marks]

Explain the OSI (Open Systems Interconnection) model and its seven layers. For each
layer, briefly describe its function and provide an example of a protocol or technology
that operates at that layer.

•The OSI (Open Systems Interconnection) model is a conceptual framework that


defines the functions of a network. It consists of seven layers,each responsible for a
specific set of tasks and functions.

•Physical Layer: Deals with the physical aspects of data transmission such as cables,
connectors and electrical signals.It focuses on transmitting raw bits over a
communication medium. Example:Ethernet.

•Data Link Layer:Provides reliable transmission of data over a physical link by


detecting and correcting errors. It is responsible for framing and organizing data into
frames. Example:Ethernet(802.3).

•Network Layer:Handles the routing of data packets across different networks. It


identifies the best path for the data to reach its destination. Example:IP(Internet
Protocol).

•Transport Layer:Ensures reliable and error-free data transfer between applications


running on different hosts.It handles segmentation,reassembly and flow control.
Example:TCP(Transmission Control Protocol).

•Session Layer:Establishes,maintains and terminates sessions between applications.It


manages the communication sessions and synchronization between them.

•Presentation Layer:Concerned with the syntax and semantics of the data exchanged
between applications.It formats,encrypts and compresses the data for presentation to
the application layer.

•Application Layer:Provides network services to applications.It is responsible for


processes such as file transfer,email and web browsing. Example: HTTP (Hypertext
Transfer Protocol).

Page 4 of 7
Question 4: IP Addressing [5 Marks]

a) Define the terms "IPv4" and "IPv6." Explain why there was a need to transition from
IPv4 to IPv6.

•IPv4 stands for Internet Protocol version 4, which is the fourth version of the Internet
Protocol.It is the most widely used IP addressing scheme.IPv4 addresses are 32-bit
numbers expressed in four sets of decimal numbers between 0 and 255,separated by
periods. Examples: 192.168.0.1, 10.0.0.1.

•IPv6 stands for Internet Protocol version 6,which is the sixth version of the Internet
Protocol. It was developed to address the limitations of IPv4's address space. IPv6
addresses are 128-bit numbers expressed in eight sets of hexadecimal numbers
separated by colons. Examples: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

•The transition from IPv4 to IPv6 was necessary due to the exponential growth of
internet-connected devices and the depletion of available IPv4 addresses.IPv6 provides
a significantly larger address space,allowing for a virtually unlimited number of unique
addresses.This is crucial for the continued expansion of the internet and the increased
number of devices and services requiring IP addresses.Additionally,IPv6 offers other
advantages,such as improved security,built-in support for mobile devices and more
efficient routing.Despite the importance of IPv6,the transition has been gradual due to
the cost and complexity of migrating existing networks and systems to the new
protocol.

Question 5: Network Protocols [5 Marks]

Describe the purpose and functionality of the following network protocols:

a) TCP (Transmission Control Protocol)

•TCP is a connection-oriented protocol that provides reliable and ordered delivery


of data packets over IP networks.It ensures that data sent from one device reaches
the destination accurately and in the correct order

b) UDP (User Datagram Protocol)

•UDP is a connectionless protocol that provides faster but unreliable delivery of data
packets over IP networks.It does not include features like error checking,
retransmission, or flow control.

c) HTTP (Hypertext Transfer Protocol)

•HTTP is an application-layer protocol used for communication between web


browsers and web servers.It allows for the retrieval and display of hypertext
documents,commonly in the form of web pages.

Page 5 of 7
d) FTP (File Transfer Protocol)

•FTP is a standard network protocol used to transfer files between a client and a
server on a computer network. It allows users to upload, download, and manage
files on remote servers. FTP can operate in two modes: active mode, where the client
initiates the connection, and passive mode, where the server initiates the
connection.

Question 6: Network Security [5 Marks]

Explain the concept of network security and the importance of encryption in


maintaining secure communication.

•Network security refers to the measures and strategies employed to protect a


computer network from unauthorized access,misuse and threats.It involves protecting
the confidentiality,integrity and availability of network resources,data and
communication.

•Encryption plays a crucial role in maintaining secure communication.It involves the


use of cryptographic algorithms to transform plaintext data into an unreadable format,
known as cipher text.Encryption ensures that data transmitted over a network is
unintelligible to unauthorized individuals.It provides confidentiality and prevents
eavesdropping and data tampering.

Question 7: Wireless Networks [10 Marks]

a) Define the term "Wi-Fi" and explain how wireless networks differ from wired
networks.

Wi-Fi is the family of wireless network protocols which are commonly used for local
area networking of devices and internet access.It allows nearby digital devices to
exchange data by radio waves as they link devices together and to a wireless router to
connect them to the internet.

How wireless network differs from wired network.

•Wired network uses cable to connect devices while wireless network does not use
cables to connect devices,they use routers.

•The mobility and roaming of data for wired network is limited while for wireless it is
higher.

•Wired network requires physical access while wireless requires proximity.

Page 6 of 7
•Wired network requires cumbersome and manpower intensive(installation activity)
whereas wireless network requires less labour intensive and easy.

•Wired network security is very high,while for wireless network is less and easy to hack.

Question 8: Network Types [5 Marks]

Compare and contrast LANs (Local Area Networks) and WANs (Wide Area Networks).
Provide examples of situations where each type of network would be most appropriate.

•LAN (Local Area Network):A LAN is a network that covers a small area,such as an office
building,school or home.It connects devices within the same physical location,typically
using Ethernet cables or Wi-Fi.LANs allow for the sharing of resources and facilitate
communication between connected devices. Examples of LAN use cases include
household networks,office networks and small business networks.

•WAN (Wide Area Network):A WAN is a network that spans a large geographic area,
connecting multiple LANs or other networks together.WANs utilize public or private
telecommunication networks,such as the internet or dedicated leased lines,to establish
connections between distant locations.WANs are used by organizations with multiple
branch offices or by internet service providers to provide internet connectivity to
customers. Examples of WAN use cases include global corporate networks, internet
access for homes and businesses, and international communication networks.

Page 7 of 7

You might also like