Computerofdatacommunicationrefertoprotocolinvolvedintransmissionof
digitizeddatabetweentwoormoreonlineprocessinglocationsandisanintegral
part of the modern information and retrieval systems in terms of their online
access.Themoderninformationsystem,unliketheirprecursorwhichworkedin
anofflinemode,operateinanonlineinteractivemodewhereinausercaninteract
with a host from a remote terminal using a communication link. The article,
beforedescribingthecomputercommunicationnetworks,touchesuponthebasic
concepts,types,techniquesandprotocolsinvolvedindatacommunication.
Page 1 of 12
QUESTIONS
1. Name two well known transport protocols provided by the internet
transport layer.
b. provide a brief description of each service and indicate what type of application
might use that service.
2. describe the token bucket mechanism for congestion control.
b. with which other technique is token bucket usually combined to achieve
complete flow control.
c. what problems in the simpler approach are addressed by using a token bucket
mechanism.
3. suppose a service is defined as an operation or facility provided by protocol
layer N to the layer N+1 above it. Also suppose we define protocol as an algorithm
operating at protocol layer N that uses services provided by layer N-1 to implement
a style of communication.
i. given the definition of service and protocol above use these definition or any
other discussion to illustrate the fundamental difference between a service and a
protocol.
b. Discuss the use of formal analysis techniques for protocol.
c. Comment on why such techniques are used in analyzing protocol.
d. give some examples on the type of problems that such analysis can reveal.
4. Describe OSI 7 layer model, name each layer in the model and draw a diagram
that shows the ordeal of these layers. write a paragraph description of the areas or
functions that each layer is responsible for.
b. contrast the osi model you have just described with the TCP/IP reference model.
c. using a diagram show the correspondence between relevant protocol layers in
the two model.
Page 2 of 12
d. discuss the relative merits of each of these models in the context of modern
computer networking.
5. mention 6 devices used to connect network or internet working devices.
b. describe each of them indicating atleast two advantages and disadvantages of
each
c. explain the difference in operation of a repeater, bridge and router and show how
these relates to the ISO 7 layer model.
Page 3 of 12
ANSWERS
1. a)Two well known transport protocol provided by the internet layer are;
*User datagram protocol (UDP)
*Transmission control protocol (TCP)
b) TCP is a connection oriented data service that provides a reliable loss free
end to Peer to peer communication between applications is often managed
ENEe
using tcp. Applications like the simple mail transfer protocol and the domain name
2. a) The token bucket approach to congestion tries to limit the impact of bursts of
network packets on routers along the path while retaining some exibility in terms
of allowing a brief increase in traffic in response to sudden demands bursts.
b) Token bucket is combined with leaky bucket which buffers incoming packets
and emits them in a constant rate stream.
c) token bucket provides some fexibility in responding to sudden requests for high
traffic volume allowing an intial burst of traffic to saturate the link and then
enforcing a constant bandwidth utilisation after the initial free token pool has been
exhausted.
3.a)
c) The use of some specification tools can assist in automatic verification using
computer analysis which eliminates the possibility of human error of an important
factor in many proof techniques.
d) State space expansion can identify failure modes and deadlock situations that
can arise if certain sequences of events occur In addition such analysis can reveal
redundant states and thus be used to optimise the protocol Safety properties can
also be proposed and verified.
Page 5 of 12
b. The contrast with the TCP/IP model should note the correspondence between
the OSI and TCP layers at the Network and Transport level. The discussion will
also indicate that the Host to Network layer of TCP/IP corresponds pretty well to
the Data Link and Physical layers of the OSI model .Session and Presentation
layers are not present in TCP/IP and really are not needed as has been shown by
experience over the last few years.
Page 6 of 12
c.
Application
Presentation
Session
Host-to Host
Transport
Internet
Network
Networ
k
access
Data link
Physical
Bridges
Hub
Modem
ROUTER
Router is a device that connect two or more networks that uses the
similar protocol.it consist of hardware and software:hareware can be a
computer while software consists of special management program that
controls flow of data between networks.Routers operates at a network
layer of OSI model.They use logical and physical address to connect
two or more logically separate network.
Advantages
a.They use high level of intelligence
to route data
b.Routers can also act as bridge to
handle non-routeable protocols such
as NETBEUI(network bios extended
user interface)
Disadvantages
a.High level of intelligence take
more processing time which can
affect performance.
b.Routers are very complicated
,installation and maintenance are
difficult.
GATEWAYS
Gateways are devices which connects two or morenetworks that uses
different protocols.they are similar in function to routes but they are
more powerful and intelligent devices.A gateway can actually convert
data so that network with an application on a computer on the other
side of the gateway e.g a gateway can receive email messages in one
format and convert them into another format.gateways can operate at
all seven(7) layers of the OSI model.
Advantages
a.user level authentication is allowed
b.Application commands are analyzed
inside the payload portion of the data
packets.
c.connection between internal and
external host are disallowed.
Disadvantages
a.it is slower than packet filters
b.needs the internal client to know about
them.
c.Every possible type of connection
cannot be supported.
Page 8 of 12
REPEATER
Repeaters are used within network to extend the length of
communications.Data are processed through transmission media in the
form of waves or signals.The transmission media weakens signals that
move through it ,this is called Attenuation.If the data is to be
transmitted beyond the maximum length of communication media;
signals have amplified.The device that are used to amplify the signals
are called Repeaters.
Advantages
a.Repeaters easily extend the length of
networks
b.it can connect signals from the same
network type that uses different types of
cables.
Disadvantages
a.Repeaters cannot be used to connect
segments of different network types.
b.They cannot be used to segment
traffic on a network to reduce
congestion.
BRIDGES
Bridges are used to connect similar network segments.A bridge does
not pass the signal it receives ,when a bridge receives a signal it
determines its destination by looking at its destination and sends the
signal towards it,Bridges works at the datalink layer of the OSI model.
Advantages
a.Bridges like repeaters can connect
similar network types with different
cabling.
b.Bridges extend network segments by
connecting them together to make one
logical network.
Disadvantages
a.Bridges possess the information about
the data they receive which can slow
performance.
b.They are unable to detect problems
cause they are not transport protocolsensitive
Page 9 of 12
HUB
Hubs are basically multi ports repeaters for UTP cables .some hubs
have ports for other type of cables such as coaxial cables.hub ranges
in size from four ports and for specific network types. Types of hubs
are namely:
*Passive hub
*Active hub
*Switch/intelligent hub
Advantages
a.Hubs need almost no configuration.
b.Active hubs can extend maximum
network media distance.
Disadvantages
a.Passive hubs can greatly limit
maximum media distance.
b.Hubs have no intelligence to filter
traffic so all data is sent out on all ports
whether it is needed or not.
MODEM
Modems are device that convert digital signals to analog and vice
versa.The word modem stands for Modulation and Demodulation,
the process of converting digital signals to analog signals is called
Modulation while the process of converting analog signals to digital
is called demodulation.Modems are used with computer to transfer
data from one computer to another computer through Telephone lines.
Two types of modem are:
*Internal modem
*External modem
Advantages
a.inexpensive hardware and telephone
Disadvantages
a.very slow performance
Page 10 of 12
lines
b.easy to setup and maintain.
Page 11 of 12
REFERENCES
Aguboshim F.C (2006) Computer software and application packages
TCP/IP vs. OSI retrieved from the web (www)
www.careerride.com Ton-nw2.blogspot.co.ke/2009 network-administrator-interview
Aguboshim F.C (2008) Data Communication and Network Technology
Google.com
WWW.Tutorialsweb.com Repeaters, router, bridges and gateways
Page 12 of 12