0% found this document useful (0 votes)
17 views

OSI Model New11

Uploaded by

pramodpatil6487
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

OSI Model New11

Uploaded by

pramodpatil6487
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 104

UNIT – II

Computer Networks
 A network consists of two or more computers
that are linked in order to share resources
(such as printers and CDs), exchange files, or
allow electronic communications.

 The computers on a network may be linked


through cables, telephone lines, radio waves,
satellites etc.

 A popular example of a computer network is


the Internet, which allows millions of users to
share information.

1
Computer Network (Cont…)

2
Every Network Includes:
1. At least two computers that have
something to share.

2. A cable or wireless pathway, called


Transmission Media, for computers to
signal each other.

3. Rules, called Protocols, so that computers


can use the unified principle of data
communication.

4. Networking Interface Cards (NIC)


3
Advantages of Computer
Networks
 File Sharing: Networks offer a quick and
easy way to share files directly.

 Resource Sharing: All computers in the


network can share resources such as
printers, fax machines, modems and
scanners.

 Communication: Those on the network


can communicate with each other via e-
mail, instant messages etc.
4
Advantages of Computer
Networks (Cont…)

 FlexibleAccess: Networks allow their


users to access files from computers
throughout the network.

 Sharing of Information: Computer


networks enable us to share data and
information with the computers that are
located geographically large distance
apart.

5
Network Computing Models
Centralized Computing
(Client-Server Network)
◦ A client-server network is where
every client is connected to the
server .
◦ Server or mainframe computer has
huge storage and processing
capabilities.

6
Network Computing Models
Distributed Computing (Peer-to-Peer
Network)
◦ All devices have same power.
◦ It interconnects one or more computers.
◦ Centralized backup is not possible.

7
Uses of Computer Network
Simultaneous Access

 Shared Peripheral Devices

 Personal Communication

 Easier Backup

8
APPLICATIONS OF NETWOKS
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
9
What is a Topology?
Network topologies describe the
ways in which the elements of a
network are mapped. They
describe the physical and logical
arrangement of the network
nodes.

The physical topology of a


network refers to the
configuration of cables,
10
Different Types of
Topologies
 Bus Topology

 Star Topology

 Ring Topology

 Mesh Topology

 Tree Topology

 Hybrid Topology
11
Bus Topology
 Allthe nodes (file server, workstations, and
peripherals) on a bus topology are
connected by one single cable.

A bus topology consists of a main run of


cable with a terminator at each end. All
nodes (file server, workstations, and
peripherals) are connected to the linear
cable.

 Popular on LANs because they are


inexpensive and easy to install.
12
Bus Topology

13
Ring Topology
 In a ring network, every device has exactly two
neighbours for communication purposes.

 All messages travel through a ring in the same direction.

 A failure in any cable or device breaks the loop and can


take down the entire network.

 To implement a ring network we use the Token Ring


technology

 A token, or small data packet, is continuously passed


around the network. When a device needs to transmit, it
reserves the token for the next trip around, then
attaches its data packet to it.

14
Ring Topology

15
Star Topology
 In a star network, each node (file server, workstations,
and peripherals) is connected to a central device called
a hub.

 The hub takes a signal that comes from any node and
passes it along to all the other nodes in the network.

 Data on a star network passes through the hub, switch,


or concentrator before continuing to its destination.

 The hub, switch, or concentrator manages and controls


all functions of the network.

 The star topology reduces the chance of network failure


by connecting all of the systems to a central node.
16
Star Topology

17
Tree Topology
 A tree topology (hierarchical topology) can be viewed as
a collection of star networks arranged in a hierarchy.

 This tree has individual peripheral nodes which are


required to transmit to and receive from one other only
and are not required to act as repeaters or regenerators.

 The tree topology arranges links and nodes into distinct


hierarchies in order to allow greater control and easier
troubleshooting.

 This is particularly helpful for colleges, universities and


schools so that each of the connect to the big network
in some way.

18
Tree Topology

19
Mesh Topology
 In this topology, each node is connected to
every other node in the network.

 Implementing the mesh topology is expensive


and difficult.

 In this type of network, each node may send


message to destination through multiple paths.

 While the data is travelling on the Mesh


Network it is automatically configured to reach
the destination by taking the shortest route
which means the least number of hops.
20
Mesh Topology

21
Hybrid Topology
A combination of any two or more
network topologies.

A hybrid topology always accrues when


two different basic network topologies
are connected.

 It is a mixture of above mentioned


topologies. Usually, a central computer
is attached with sub-controllers which in
turn participate in a variety of topologies
22
Hybrid Topology

23
Network Types

Local Area Networks (LAN)


◦ A Network that links devices within a
building or group of adjacent
buildings
Metropolitan Area Networks
(MAN)
◦ A Network that interconnects within
a geographic region
Wide Area Networks (WAN)
◦ A Network that extends over a large 24
Introduction to OSI Model
 OSImodel is based on the proposal
developed by the International
Standards Organization (ISO).

 Thismodel is called ISO OSI (Open


Systems Interconnection) Reference
model because it deals with connecting
open systems (systems that are open for
communication with other systems)

 We call it as OSI Model.


25
The OSI Model
 OSI “ Open Systems Interconnection".
 OSI model was first introduced in 1984 by the
International Organization for Standardization (ISO).
◦ Outlines WHAT needs to be done to send data from one
computer to another.
◦ Not HOW it should be done.
◦ Protocols stacks handle how data is prepared for
transmittal (to be transmitted)
 In the OSI model, The specification needed
◦ are contained in 7 different layers that interact with each
other.
What is “THE MODEL?”

 Commonly referred to as the OSI reference


model.

 The OSI model


◦ is a theoretical blueprint that helps us understand how
data gets from one user’s computer to another.

◦ It is also a model that helps develop standards so that all


of our hardware and software talks nicely to each other.

◦ It aids standardization of networking technologies by


providing an organized structure for hardware and
software developers to follow, to insure there products
are compatible with current and future technologies.
Principles on which OSI model was
designed:
 A layer should be created where different level of
abstraction is needed.

 Each layer should perform a well defined function.

 The function of each layer should be chosen


according to the internationally standardized
protocols.

 The number of layers should be large enough that


distinct functions should not be put in the same
layer and small enough that the architecture does
not become very complex.
28
29
30
OSI Model

31
OSI Layers

32
An Exchange Using the OSI Model

33
Physical Layer

34
Physical Layer (Cont…)

It is the bottom layer of OSI Model.

Itis responsible for the actual physical


connection between the devices. Such
physical connection may be made by
using twisted pair cable.

Itis concerned with transmitting bits


over a communication channel.
35
Functions of Physical Layer

 Transforming bits into signals


 Provides synchronization of bits by a
clock.
 Physical layer manages the way a device
connects to network media.
 It defines the transmission rate.
 It defines the way in which the devices
are connected to the medium.
 It provides physical topologies
 It can use different techniques of
multiplexing. 36
Data Link Layer

37
Data Link Layer (Cont…)
 It is responsible for node-to-node delivery
of data.
 It receives the data from network layer and
creates FRAMES , add physical address to
these frames & pas them to physical layer
 It consist of 2 layers:
Logical Link Layer (LLC) : Defines
the methods and provides addressing
information for communication between
network devices.
Medium Access Control (MAC):
establishes and maintains links between
communicating devices.
38
Functions of Data Link Layer

 Framing : DLL divides the bits received from


N/W layer into frames. (Frame contains all
the addressing information necessary to
travel from S to D).

 Physical addressing: After creating


frames, DLL adds physical address of
sender/receiver (MAC address) in the header
of each frame.

 Flow Control: DLL prevents the fast sender


from drowning the slow receiver. 39
Data Link Layer Example

40
Functions of Data Link Layer

Error Control: It provides the


mechanism of error control in
which it detects & retransmits
damaged or lost frames.

Access Control: When single


comm. Channel is shared by
multiple devices, MAC layer of DLL
provides help to determine which 41
Network Layer

42
Network Layer (Cont…)
 Itis responsible for the source to destination
delivery of a packet across multiple networks.

 If two systems are attached to different


networks with devices like routers, then N/W
layer is used.

 Thus DLL overseas the delivery of the packet


between the two systems on same network
and the network layer ensures that the packet
gets its point of origin to its final destination.

43
Functions of Network Layer
 Internetworking: It provides Internetworking.

 Logical Addressing: When packet is sent outside the


network, N/W layer adds Logical (network) address of
the sender & receiver to each packet.
 Network addresses are assigned to local devices by
n/w administrator and assigned dynamically by special
server called DHCP (Dynamic Host Configuration
Protocol)

 Routing: When independent n/w are connected to


create internetwork several routes are available to
send the data from S to D. These n/w are
interconnected by routers & gateways that route the
packet to final destination. 44
Transport Layer

45
Transport Layer (Cont…)
 Itis responsible for process-to-process delivery of the
entire message.

 TL looks after the delivery of entire message


considering all its packets & make sure that all
packets are in order. On the other hand n/w layer
treated each packet independently.

 At the receiver side, TL provides services to


application layer & takes services form n/w layer.

 At the source side, TL receives message from upper


layer into packets and reassembles these packets
again into message at the destination. 46
Transport Layer (Cont…)
 Transport Layer provides two types of services:

Connection Oriented Transmission: In this


type of transmission the receiving devices
sends an acknowledge back to the source after
a packet or group of packet is received. It is
slower transmission method.

Connectionless Transmission: In this type of


transmission the receiving devices does not
sends an acknowledge back to the source. It is
faster transmission method.
47
Functions of Transport Layer

Segmentation of message into packet &


reassembly of packets into message.

Port addressing: Computers run several


processes. TL header include a port address with
each process.

Flow Control: Flow control facility prevents the


source form sending data packets faster than the
destination can handle.

Error control: TL ensures that the entire


message arrives at the receiving TL without error.
48
Session Layer

49
Session Layer (Cont…)
Session layer is the fifth layer of
OSI Model

It has the responsibility of


beginning, maintaining and ending
the communication between two
devices, called session.

It also provides for orderly


communication between devices50
Functions of Session Layer
Establishing, Maintaining and ending a session:
When sending device first contact with receiving
device, it sends syn (synchronization) packet to
establish a connection & determines the order in
which information will be sent. Receiver sends ack
(acknowledgement). So the session can be set & end.

Dialog Control: This function determines that which


device will communicate first and the amount of data
that will be sent.

Dialog separation: Process of adding checkpoints &


markers to the stream of data is called dialog
separation.
51
Presentation Layer

52
Presentation Layer
(Cont…)
Presentation layer is the sixth layer
of OSI Model.

Itis concerned with the syntax &


semantics of the information
exchanged between the two
devices.

It was designed for data


encryption, decryption and53
Functions of Presentation Layer

Data Presentation or Translation: Because


different computers use different encoding systems.
It ensures that the data being sent is in the format
that the recipient can process.

Data Encryption: PL provides this facility by which


hides the information from everyone except the
person who originally sent the information & the
intended recipient. When encrypted data arrives at
destination, PL decrypts the message.

Data Compression: PL shrinks large amount of data


into smaller pieces i.e. it reduces the size of data.
54
Application Layer

55
Application Layer (Cont…)

It
is the topmost i.e. seventh layer of OSI
Model.

It enables the user to access the network.

Itprovides user interface & supports for


services such as e-mail, file transfer,
access to the world wide web.

So it provides services to different user


applications.
56
Functions of Application Layer
 MailServices: This application provides various
e-mail services.

 File transfer & Access: It allows users to access


files in a remote host, to retrieve files from remote
computer for use etc.

 Remote log-in: A user can log into a remote


computer and access the resources of that
computer.

 Accessing the World Wide Web: Most common


application today is the access of the World Wide
Web. 57
OSI Layers
OSI Model
Data
Layer Function
unit
Network process to
7. Application
application
Data Data representation,
Host 6. Presentation
encryption and decryption
layers
5. Session Interhost communication
Segme End-to-end connections
4. Transport
nts and reliability, Flow control
Path determination and
Packet 3. Network
logical addressing
Media
Frame 2. Data Link Physical addressing
layers
Media, signal and binary
Going from
Bit layer 11.to 7: Please Do Not Throw Sausage
Physical
transmission
Pizza Away
Going from layer 7 to 1: All People Seem To Need Data
Processing 58
Introduction to TCP/IP Model
 The current Internet is based on a TCP/IP
reference model.

 TCPand IP are two protocols of this model.


TCP stands for Transmission Control
Protocol and IP stands for Internet Protocol.

 Thearchitecture or model was defined by


the US department of defense and is used
by ARPANET (Advanced Research Project
Agency Network).

59
Goals on which TCP/IP model was
designed:
The network should connect multiple
networks together.

The connection should withstand till


the source and destination machines
are functioning.

The architecture should be so flexible


that it should be able to transfer data
among different hardware or software
platforms.
60
TCP/IP PROTOCOL SUITE
TCP/IP PROTOCOL SUITE
Host to Network Layer
 It is the bottom layer of TCP/IP model & lies
below the internet layer.

 It is also known as Network Interface Layer.

 Function of this layer is to connect the host


to the network & inform the upper layers so
that they could start sending the data
packets.

 This layer varies from network to network.

63
Network Layer
 Itis similar to Network Layer of OSI
model in functionality.

 Itallow the hosts to submit the packets


to the network & Packets should travel
independently using any possible route.

 The order in which the packets arrive at


destination can be different from the
order in which they were sent. In such
cases it is the responsibility of higher
layer to arrange these packets in proper
order.
64
Functions of Internet Layer
• It keeps track of which layer
receives the information.

• It translates the logical address to


physical machine address.

• It breaks larger packets into smaller


ones.

• It provides flow control &


congestion control services.
65
Transport Layer
 Itis similar in functionality to transport layer of
OSI model.

 It allows the two processes on source &


destination machines to communicate with each
other.

 It divides the byte stream into messages.

 Ithandles the flow control so that a fast sender


ahould not overflow a slow receiver.

 TransportLayer also provides two types of services:


connection oriented & connectionless services. 66
Transport Layer (Cont…)
 Connection Oriented Services: TCP
(Transport Control Protocol is used for
connection oriented services. By this the
receiving devices sends an acknowledge back
to the source after a packet is received.
Functions of TCP:
◦ Error Control: Deliver byte stream from source to
destination without error.

◦ Flow Control: It prevents the source form sending


data packets faster than the destination can handle.

◦ It divides byte stream into small parts & pass it to


internet layer on sender side & reassembles it into67
Functions of Transport Layer

Connectionless Services: UDP (User


Datagram Protocol) is used for
unreliable connectionless services. It
does not sends an acknowledge back to
the source. It is faster transmission
method.

Function of UDP:

◦ UDP is used for client-server type request queries &


applications in which prompt delivery is more
important than accurate delivery such as transmitting
speech or video. 68
Application Layer
 It is the topmost of TCP/IP Model.

 Itis responsible for data transfer between


applications.

 It provides services such as e-mail, file


transfer, access to the world wide web etc.
to the user applications.

 Ituses the protocols like FTP, SNTP & TELNET


to transfer the data between applications
69
Functions of Application Layer
 Mail Services: It provides various e-mail
services.

 Filetransfer & Access: It allows users to


access files in a remote host, to retrieve files
from remote computer for use etc.

 Remote log-in: A user can log into a remote


computer and access the resources of that
computer.

 Accessing the World Wide Web: Most


common application today is the access of
the World Wide Web. 70
Comparison between OSI Model
&
TCP/IP Model

The OSI and TCP/IP models are


having many similarities in the
functionalities provided by the
layers. The layers of TCP
model behave similar to the
layers of OSI model. But these
two models do have
differences.
71
SIMILARITIES

The main similarities between the two


models include the following:

 They share similar architecture. - Both


of the models share a similar architecture.
This can be illustrated by the fact that both
of them are constructed with layers.

 They share a common application


layer.- Both of the models share a common
"application layer". However in practice this
layer includes different services depending
upon each model.
72
SIMILARITIES (Cont…)

 Both models have comparable


transport and network layers- This can
be illustrated by the fact that whatever
functions are performed between the
presentation and network layer of the OSI
model similar functions are performed at
the Transport layer of the TCP/IP model.

 Both models assume that packets are


switched- Basically this means that
individual packets may take differing paths
in order to reach the same destination.

73
DIFFERENCES

The main differences between the two models


are as follows:

 TCP/IP Protocols are considered to be standards


around which the internet has developed. The
OSI model however is a "generic, protocol-
independent standard.“

 TCP/IP combines the presentation and session


layer issues into its application layer.

 TCP/IP combines the OSI data link and physical


layers into the network access layer.

74
DIFFERENCES (Cont…)
 TCP/IP appears to be a more simpler model and
this is mainly due to the fact that it has fewer
layers.

 TCP/IP is considered to be a more credible


model- This is mainly due to the fact because
TCP/IP protocols are the standards around
which the internet was developed therefore it
mainly gains creditability due to this reason.
Where as in contrast networks are not usually
built around the OSI model as it is merely used
as a guidance tool.

 The OSI model consists of 7 architectural layers


whereas the TCP/IP only has 5 layers.
75
COMPARISON

OSI Model TCP/IP Model

OSI stands for Open TP/IP stands for


System Interconnection Transmission Control
because it allows any two Protocol/Internet Protocol.
different systems to It is named after these
communicate regardless protocols, being part of
of their architecture. this model.

OSI model has seven TCP/IP has four layers..


layers.

This model provides clear It does not clearly


distinction between distinguish between
services, interfaces and services, interfaces &
protocols protocols.
76
COMPARISON (Cont…)

OSI Model TCP/IP Model

In this model, Protocols do TCP and IP protocols fit well


not fit well into the model. in the model.

Session & Presentation layers There is no session &


are present in this layer. presentation layer in this
model.

OSI model supports both TCP/IP supports only


connection oriented & connectionless comm. In
connectionless in network network layer but supports
layer but connection oriented both in transport layer.
comm. In transport layer.

77
TCP/IP Layers
OSI TCP/IP
Application Layer Application Layer
TELNET, FTP, SMTP, POP3,
Presentation Layer
SNMP, NNTP, DNS,NIS, NFS,
Session Layer HTTP, ...

Transport Layer Transport Layer


TCP , UDP , ...

Network Layer Internet Layer


IP , ICMP, ARP, RARP, ...

Data Link Layer


Network/Link Layer
FDDI, Ethernet, ISDN, X.25,...
Physical Layer

78
TCP/IP Some Protocol
Layer Protocol
DNS, TFTP, TLS/SSL, FTP, Gopher, HTTP, IMAP, IRC,
NNTP, POP3, SIP, SMTP, SMPP, SNMP, SSH, Telnet,
Echo, RTP, PNRP, rlogin, ENRP
Applicati
on Routing protocols like BGP and RIP which run over
TCP/UDP, may also be considered part of the
Internet Layer.
Transport TCP, UDP, DCCP, SCTP, IL, RUDP, RSVP
IP (IPv4, IPv6), ICMP, IGMP, and ICMPv6
Internet OSPF for IPv4 was initially considered IP layer
protocol since it runs per IP-subnet, but has been
placed on the Link since RFC 2740.
Link ARP, RARP, OSPF (IPv4/IPv6), IS-IS, NDP

79
UNIT – II
Data Link Protocols
Data Link Protocols are sets of
rule and regulations used to
implement data link layer.
They contain rules for:
◦ Line Discipline
◦ Flow Control
◦ Error Control

80
Types of Data Link Protocols
Data Link Protocols are divided
into two categories:

◦ Asynchronous Protocols
◦ Synchronous Protocols

81
Asynchronous Protocols
Asynchronous protocols treat each
character in a bit stream
independently.
These protocols are used in
modems.
They use start and stop bits, and
variable gaps between characters.
They are slower than synchronous
protocols in transmitting data.

82
Asynchronous Protocols
(Cont…)
The different asynchronous
protocols are:
◦ XMODEM
◦ YMODEM
◦ ZMODEM
◦ Block Asynchronous Transmission
(BLAST)
◦ Kermit

83
XMODEM
It is a half duplex stop & wait
protocol.
It is used for telephone line
communication between PCs.
The sender sends a frame to
receiver & waits for ACK frame.
The receiver can send one cancel
signal (CAN) to abort the
transmission.
SOH Header Data CRC
1 Byte 2 128
The frame
Bytes format
Bytesof XMODEM is:
84
YMODEM
This protocol is similar to XMODEM
with the following major
differences:
◦ Two cancel signals (CAN) are used to
abort the transmission.
◦ The data field is 1024 bytes long.
◦ ITU-T CRC-16 is used for error
ZMODEM
checking.

Itis a combination of XMODEM and


YMODEM.
85
BLAST
BLAST is more powerful than
XMODEM.
It is a full duplex protocol.
It uses sliding window flow control.

Kermit
 It is a terminal program as well as file
transfer protocol.
 It is similar in operation to XMODEM, except
that sender has to wait for a negative
acknowledgement (NAK) before it starts
transmission.
86
Kermit
It is a terminal program as well as
file transfer protocol.
It is similar in operation to
XMODEM, except that sender has
to wait for a negative
acknowledgement (NAK) before it
starts transmission.

87
Synchronous Protocols
Synchronous Protocols take the
whole bit stream and divide it into
characters of equal size.
These protocols have high speed
and are used for LAN, WAN and
MAN.
Synchronous protocols are
categorized into two groups:
◦ Character-Oriented Protocol
◦ Bit-Oriented Protocol
88
Character-Oriented Protocol
It interprets frame as a series of
characters.
These are also known as Byte-
Oriented Protocols.
Control information is inserted as
separate control frames or as
addition to existing data frame.
The example of character-oriented
protocol is Binary Synchronous
Communication (BSC) developed
by IBM. 89
Bit-Oriented Protocol
It interprets frame as a series of bits.
Control information can be inserted
as bits depending on the information
to be contained in the frame
Bit-oriented protocol can pack more
information into shorter frames.
The examples of bit-oriented
protocol are:
Synchronous Data Link Control (SDLC)
High Level Data Link Control (HDLC)

90
Synchronous Data Link Control
(SDLC) Protocol
 SDLC protocol was developed by IBM in
1975.
 After developing SDLC, IBM submitted it
to American National Standard Institute
(ANSI) and to International Standard
Organization (ISO) for acceptance.
 ANSI modified it to ADCCP (Advanced
Data Communication Control Procedure.
 ISO modified it to HDLC (High Level Data
Link Control).

91
Synchronous Data Link Control
(SDLC) Protocol (Cont…)
The format of SDLC is:
0111111
frame 0111111
0 Flag Address Control User Data ECF 0 Flag

8-Bit 8-Bit 16-Bit


The flag sequence of 8-bits 01111110
marks the beginning and ending of the
frame.
Address field contains the address of the
receiver.
Control field carries the sequence
number, acknowledgement, requests and
responses.
92
Synchronous Data Link Control
(SDLC) Protocol
The frame format of SDLC is:
0111111 0111111
0 Flag Address Control User Data ECF 0 Flag

8-Bit 8-Bit 16-Bit

The user data field carries the data


and is of variable length.
ECF stands for Error Checking Field
and is of 16-bits. It is used for error
control.

93
High Level Data Link Control
(HDLC) Protocol
HDLC came into existence after
ISO modified the SDLC protocol.
It is a bit-oriented protocol that
supports both half and full duplex
communication.
Systems using HDLC are
characterized by:
◦ Station Types
◦ Configuration.
◦ Response Modes
94
Station Types
To make HDLC protocol applicable
to various network configurations,
three types of stations have been
defined:
◦ Primary Station
◦ Secondary Station
◦ Combined Station

95
Primary Station
It has complete control over the
link at any time.
It has the responsibility of
connecting & disconnecting the
link.
The frames sent by primary
station are called commands.

96
Secondary Station
All the secondary stations work
under the control of primary
station.
The frames sent by secondary
station are called responses.
Combined Station
A combined station can behave either as
primary or as secondary station.
 It can send commands as well as
responses.
97
Symmetrical Configuration
In this configuration, both sites
contain two stations: one primary
and one secondary.
Primary station of one site is linked
with secondary station of the other
andPrimary
vice versa. Primary
Command

Response

Secondary Secondary
Command

Response

Site A Site B 98
Balanced Configuration
Inthis configuration, both sites
have combined stations.
These combined stations are
connected with single link.
This single link can be controlled
by either station.

99
Important Questions
2 Marks

 What is Network?
 List out OSI layer in order.
 What is Frame relay?
 Define Distributed System.
 What is broadcasting?
 What is Multicasting?
 Write down types of networks.
 What is host?
 What is hub? 100
Important Questions
2 Marks (Cont…)

 What is router?
 What is repeater?
 What is transmission media?
 What is twisted pair?
 What is coaxial cable?
 List out types of wireless
transmission,
 What is communication satellite.
 What is MODEM? 101
Important Questions
5 Marks

Explain types of network


Explain network topology
Explain ARPANET
Explain electro magnetic
spectrum
Explain multiplexing
Explain error control
Explain noisy channel
Explain error correcting code 102
Important Questions
10 Marks

Explain network hardware


Explain OSI reference model
Explain TCP /IP model
Explain network software
Explain guided transmission
media
Explain unguided transmission
media 103
Thank You

Mrs. V.Rathika, M.S.,M.Phil., (Ph.D.,)


Assistant Professor,
Department of Computer Applications,
Idhaya College for Women,
Kumbakonam

104

You might also like