Data Communication Networking
Data Communication Networking
Data Communication Networking
LECTURE NOTE
MATRI NO:
FACULTY: DEPT:
CLASS ID:
SUBMISSION DATE:
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
SECTION ONE
1. Introduction
Decades ago, the study of network communications was dealt with under the following: Voice networks,
Data networks, and Hybrid networks. In recent times, the integration of various forms of multimedia
including audio, video, etc. into one stream has reduced the gap that exist among those communications hence
data communication is more commonly used. Data communications refers to the exchange of data (text,
video, audio, etc.) between two devices through a transmission medium such as air, cable, etc. For data
communications to occur, the communicating devices must be part of a communication system made up of a
combination of hardware (physical equipment) and software (programs). The effectiveness of a data
communications system depends on four fundamental characteristics: delivery, accuracy, timeliness, and jitter.
1. Delivery. The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are useless. In the
case of video and audio, timely delivery means delivering data as they are produced, in the same order
that they are produced, and without significant delay. This kind of delivery is called real-time
transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets.
Components
A data communications system has five components as shown in figure 1 below. These components are: source
or sender, message, protocol, transmission medium, and receiver.
Message. The message is the data or information to be sent across the medium. The common forms of
information include text, numbers, pictures, audio, and video.
Source/Sender. The source or sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
Receiver. The receiver is the device that receives the message. It may be a computer, workstation, telephone
handset, printer, television, etc..
Transmission medium. The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic
cable, and radio waves
2
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Protocol. A protocol is a set of rules that govern data communication between two or more devices. It may
be likened to an agreement between the communicating devices.
1.2 Networks
A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the
network.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Performance
Performance can be measured in many ways, including transit time and response time. Transit time is the amount
of time required for a message to travel from one device to another. Response time is the elapsed time
between an inquiry and a response. The performance of a network depends on a number of factors, including
the number of users, the type of transmission medium, the capabilities of the connected hardware, and the
efficiency of the software.
Reliability
Network reliability is measured by the frequency of failure, the time it takes a link to recover from a
failure, and the network's robustness in a catastrophe.
Security:
Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses.
1. Mesh: In a mesh topology, every device has a dedicated point-to-point link to every other device. The
term dedicated means that the link carries traffic only between the two devices it connects. To find the
number of physical links in a fully connected mesh network with n nodes, we first consider that each node
must be connected to every other node. Node 1 must be connected to n - I nodes, node 2 must be connected to
n – 1 nodes, and finally node n must be connected to n - 1 nodes. We need n(n - 1) physical links. However,
if each physical link allows communication in both directions (duplex mode), we can divide the number of
links by 2. In other words, we can say that in a mesh topology, we need n(n -1) /2 duplex-mode links. To
accommodate that many links, every device on the network must have n – 1 input/output ports to be
connected to the other n - 1 stations.
Advantages
1. The use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple devices.
2. A mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system.
3. There is the advantage of privacy or security. When every message travels along a dedicated
line, only the intended recipient sees it. Physical boundaries prevent other users from gaining access to
messages.
4. Point-to-point links make fault identification and fault isolation easy. Traffic can be routed to
avoid links with suspected problems. This facility enables the network manager to discover the
precise location of the fault and aids in finding its cause and solution.
Disadvantages
1. Disadvantage of a mesh are related to the amount of cabling because every device must be connected
to every other device.
2. Installation and reconnection are difficult.
3. The sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can
accommodate.
4. The hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
2. Star Topology: In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a
star topology does not allow direct traffic between devices. The controller acts as an exchange: If one
device wants to send data to another, it sends the data to the controller, which then relays the data to the
other connected device.
Advantages
1. A star topology is less expensive than a mesh topology. In a star, each device needs only one link and
one I/O port to connect it to any number of others.
2. Easy to install and reconfigure.
3. Far less cabling needs to be housed, and additions, moves, and deletions involve only one
connection: between that device and the hub.
4. Other advantage include robustness. If one link fails, only that link is affected. All other links remain
active. This factor also lends itself to easy fault identification and fault isolation. As long as the
hub is working, it can be used to monitor link problems and bypass defective links.
Disadvantages
One big disadvantage of a star topology is the dependency of the whole topology on one single point, the hub.
If the hub goes down, the whole system is dead. Although a star requires far less cable than a mesh, each
node must be linked to a central hub. For this reason, often more cabling is required in a star than in some
other topologies (such as ring or bus).
3. Bus
A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a network.
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running
between the device and the main cable. A tap is a connector that either splices into the main cable or
punctures the sheathing of a cable to create a contact with the metallic core. As a signal travels along the
backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels
farther and farther. For this reason there is a limit on the number of taps a bus can support and on the distance
between those taps.
Advantages
Advantages of a bus topology include ease of installation. Backbone cable can be laid along the most efficient
path, then connected to the nodes by drop lines of various lengths. In this way, a bus uses less cabling than
mesh or star topologies. In a star, for example, four network devices in the same room require four lengths of
cable reaching all the way to the hub. In a bus, this redundancy is eliminated. Only the backbone cable
stretches through the entire facility. Each drop line has to reach only as far as the nearest point on the backbone.
Disadvantages
The disadvantages include difficult reconnection and fault isolation. A bus is usually designed to be optimally
efficient at installation. It can therefore be difficult to add new devices. Signal reflection at the taps can
cause degradation in quality. This degradation can be controlled by limiting the number and spacing of devices
connected to a given length of cable. Adding new devices may therefore require modification or replacement
of the backbone. In addition, a fault or break in the bus cable stops all transmission, even between devices on the
same side of the problem. The damaged area reflects signals back in the direction of origin, creating noise in both
directions.
4. Ring
In a ring topology, each device has a dedicated point-to-point connection with only the two devices on
either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches
its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for
another device, its repeater regenerates the bits and passes them along.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Advantages
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate neighbors
(either physically or logically). To add or delete a device requires changing only two connections. The
only constraints are media and traffic considerations (maximum ring length and number of devices). In
addition, fault isolation is simplified. Generally in a ring, a signal is circulating at all times. If one device does
not receive a signal within a specified period, it can issue an alarm. The alarm alerts the network operator to the
problem and its location. Disadvantages
Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network. This weakness can be solved by using a dual ring or a switch capable
of closing off the break. Ring topology was prevalent when IBM introduced its local-area network Token Ring.
Today, the need for higher-speed LANs has made this topology less popular.
1.4.1 Cable
Cable internet is delivered using the same coaxial cables originally deployed for delivery of analog
video to television sets. Most cable internet providers use a standard called DOCSIS (Data Over Cable
Service Interface Specification), which is an international telecommunications standard that allows for the
addition of high-bandwidth data transfer to an existing coaxial cable TV system.
1.4.2 Cellular
Cellular service is a communications technology in which the last link is delivered wirelessly, and the land area
to be supplied with radio service is divided into cells in a pattern dependent on terrain and reception
characteristics. There are four primary cellular technologies that carry data; broadband categorized as 2G, 3G,
4G, and 5G. The specifications of these technologies are presented in Table 1.
Table 1: Cellular technologies
Category Year launched Max. speed Actual speed
2G 1991 300kbps 100kbps
3G 1991 42mbps 8mbps
4G 2009 1Gbps 50mbps
5G 2020 10Gbps Not available
1.4.3 Satellite
Satellite internet access is provided by communications satellites in the Earth’s orbit. Traditional
communications satellites are launched into geosynchronous orbit at an altitude of 22,236 miles, which
entails a round trip latency of about a half a second for data flowing through the satellite.
1.7 Lab 1: Introducing the Cisco Packet Tracer and setting up a basic switched network Lab objectives
1. Getting familiar with the CPT environment
2. Create Devices
3. Add Modules
4. Make Connections
5. Create a basic network
As a network is a set of connected devices, when there are multiple devices, there may arise a problem of how
to connect them to make one-to-one communication possible. One solution is to make a point-to-point connection
between each pair of devices (a mesh topology) or between a central device and every other device (a star
topology). These methods, however, are impractical and wasteful when applied to very large networks. The
number and length of the links require too much infrastructure to be cost-efficient, and the majority of those
links would be idle most of the time. Other topologies employing multipoint connections, such as a bus, are
ruled out because the distances between devices and the total number of devices increase beyond the
capacities of the media and equipment.
A better solution is switching. A switched network (see Figure 1.16) consists of a series of interlinked
nodes, called switches. Switches are devices capable of creating temporary connections between two or more
devices linked to the switch. In a switched network, some of these nodes are connected to the end systems
(computers or telephones, for example). Switches make networks more intelligent. Switches may operate at
layer 2 or layer 3 of the OSI model. Layer 3 switches perform routing functions like routers.
SECTION TWO
NETWORK OPERATING SYSTEM (CONFIGURE NETWORK OS)
Categories of NOS
Peer-to-peer network operating systems
These allow users to share resources and files located on their computers and to access shared resources
found on other computers. In a peer-to-peer network, all computers are considered equal; they all have the same
privileges to use the resources available on the network. Peer-to-peer networks are designed primarily for small
to medium local area networks. Windows for Work- groups is an example of the program that can function as
peer-to-peer network operating systems. Advantages of Peer-to-Peer(P2P) OS
1. Require less hardware.
2. No server needs to be established.
3. Setup process is easy.
Disadvantages of Peer-to-Peer (P2P) OS
a. No central location for storage, i.e. different systems have different storage capacity.
b. It has less security as compared to the client-server model.
Client/server NOS
This is the most population NOS. it has two components: client, and the server. The Client requests services from
server on the network whereas the Server supplies the requested services or data to the legitimate clients on the
network. The Client-server arrangement allows the centralization of computing resources in one or more dedicated
servers. These servers include file servers, domain name servers (DNS), gateway servers, public key infrastructure
(PKI) servers, database servers, directory server, dynamic host configuration protocol (DHCP) server, web servers, etc.
Resources in the context of NOS refer to printers, processors, file systems or other devices, tape drives,
databases, etc. Figure 2.1 shows a model of a client-server arrangement.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
The NOS runs background services which manage these resources and ensure that legitimate clients access them.
Note that where there are limited hardware resources one server hardware may be used for the provision of these
resources. For instance, a super server hardware like the Oracle SPARC T-series server may be configured to server as
PKI server, Database server, Web Server, File server, and DNS server respectively.
The Group is the basis for resource and account management on the server. This server feature enables resource
sharing and security control in medium and large networks.
A Group may exhibit the following features:
1. Nested or hierarchical arrangement: which simplifies management and group arrangement. This would affect
the permission/privilege/rights granted to each group member.
2. Inherited permissions: which are passed from parent group to child group
3. User and group restrictions: This determine the extent of network resources that clients in a group can
share.
Figure 2.2: Client-server communication The merits of Client Server NOS are:
1. Security of the network is centralized and provided by server.
2. Integration of new technologies is very easy
3. High stability and resource control.
4. Hardware and the operating system can be specialized.
5. Location independence
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
NAT is may be implemented on any device that operates at layer 3 i.e. the network layer, such as routers, layer 3
switches, and gateways. The categorization of IP addresses into private and public is done by the Internet Assigned
Numbers Authority (IANA). IANA does the global coordination of the DNS Root, IP addressing, and other Internet
protocol resources. IANA has reserved a range of addresses as private addresses for use in private networks in homes,
offices, VPN, etc. The essence is to provide control and a single point of administration over a network other than
the global network (Internet). The private IP addresses are:
a. 192.168.0.0 – 192.168.255.255 (65,536 IP addresses)
b. 172.16.0.0 – 172.31.255.255 (1,048,576 IP addresses)
c. 10.0.0.0 – 10.255.255.255 (16,777,216 IP addresses)
Public IP addresses are often assigned by Internet Service Providers (ISPs), and such addresses could be used to
identify the country from which a device is connecting to the Internet.
Public IP addresses may be purchased from ISPs during Internet subscription. Such a public IP may be used to
“NAT” the private IP addresses in a LAN to enable the devices access the Internet. The Public IP may be assigned
to a DNS Server on the LAN or configured in a Router or Layer Switch. When assigned on DNS Server, it means
the DNS Server itself must be connected to a Router that interfaces with the ISP data communications equipment
(DCE).
The remarkable features of an IP address are:
a. Unique.
b. Globalized and Standardized.
c. Essential.
The dynamic IP address is a temporary address assigned to a computing device by DHCP server when it is connected
to a network. This address has an expiration period after which the address can be given to some other device,
thus helping devices to share limited address space on the network. The dynamic IP addressing is flexible, cost
effective, easier to maintain, support more devices and also ensure privacy in the network. The disadvantages are:
The DHCP server is mandatory. The DHCP Server can be a router or a computer. Dynamic IP addressing does
not support remote access facility.
2.4 IPv4
The IPv4 is a 32-bit dotted decimal address value comprising 4 numbers separated by a dot. Each number in an
IPV4 address lies between 0-255. Each number may be represented using 8 bits. However, you may write an
IPv4 address in decimal, octal, binary, or even and hexadecimal. Within the IPv4 addressing scheme, only 4
billion unique addresses could be available though some addresses are also reserved for multicasting purposes
and private networks. It therefore follows that with the growth in connectivity, the IPv4 addressing scheme is easily
exhausted hence the need for the IPv6. A typical IPv4 address looks like
Decimal notation: 192.168.0.1
Binary notation: 11000000 . 10101000 . 00000000. 00000001
IPv4 addressing schemes divides IP addresses into five classes: A, B, C, D, E respectively. This categorization
enables IPv4 routing. Different IP classes are associated with different network types. They can be explained as
follows
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
CLASSES Range
Class A 1.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 255.255.255.255
1. IPv4 address format
2. The IPv4 follows the following format:
1. The 32-bit IP address is grouped into four octets(eight bits) separated by dots and represented in
decimal format. This is called the dotted decimal notation(see figure
2. Each bit in the octet has a binary weight (128,64,32, 16,8,4,2, 1).
3. The minimum value for an octet is 0, and the maximum value for an octet is 255.
2001:0db7::54 → with double colon 2001:0db7:0000:0000:0000:0000:0000:0054 IPv6 address without double colon
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
2.8.1 Interfaces
A network interface is a logical entity on a controller of a device that provides means of connecting to the network. An
interface has multiple parameters associated with it, including an IP address, default gateway (for the IP subnet),
primary physical port, secondary physical port, VLAN identifier, and DHCP server.
Five types of interfaces are recognized on a controller. Four of these are static and are configured at setup time:
1. Management interface (static and configured at setup time; mandatory)
2. AP-manager interface (static and configured at setup time; mandatory)
3. Virtual interface (static and configured at setup time; mandatory)
4. Service-port interface (static and configured at setup time; optional)
5. Dynamic interface (user-defined)
2.8.2 Ports
Unlike interfaces, a port is a physical entity that is used for establishing connections on the device. Network
devices may have two types of ports: Distribution system ports and service ports. Figure
2.5 shows the ports on a Cisco device. The ports are presented in Table 1.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
A distribution system port connects the device to a neighbor switch and serves as the data path between these
two devices. Each distribution system port is, by default, an 802.1Q VLAN trunk port. The service port can be used
management purposes, primarily for out-of-band management. However, AP management traffic is not possible across
the service port. In most cases, the service port is used as a "last resort" means of accessing the controller GUI for
management purposes. For example, in the case where the system distribution ports on the controller are down
or their communication to the wired network is otherwise degraded.
The service port is controlled by the service-port interface and is reserved for out-of-band management of the
device and system recovery and maintenance in the event of a network failure. It is also the only port that is active
when the controller is in boot mode. The service port is not capable of carrying 802.1Q tags, so it must be connected
to an access port on the neighbor switch. Use of the service port is optional. Service ports are not intended for high
volume of traffic.
Figure 2.6 shows the ping command utility on a computer. To launch the ping command utility on your PC, hold down
the Windows key and press R on your keyboard, then type cmd and press enter. The command window will
open (see figure 2.6). Then type ping followed by the IP address or domain name of the remote system you
wish to check connectivity. Provided your computer is on the network, if you are ‘pinging’ a domain name, observe
that the system attempts to resolve the name to its equivalent IP address. In Figure 2.6 we attempted to check if there
is connectivity between the local computer and the remote yahoo server with IP 98.137.11. 163.
The reply shows there was actually a connection as the server echoed back to the local system. Also note that some
devices may be configured to block the ICMP in which case any ping would simply time out.
Like on the computer system, the ping facility can also be launched on the router or switch
5. Miscellaneous: This icon contains other network elements which may or may not be contained in
the other categories above
6. Multiuser connection: This is the last icon
Note: Any of these elements in the device panel could be dragged and dropped on the design window.
Configuring end devices in the design window is very simple. As a matter of fact end devices are not our
problem during network configuration. Including end devices in our design is for testing purposes only. What is
relevant on end devices is the IP address configuration including the DNS server IP, Gateway IP, and Host IP
addresses respectively. The following steps indicate how to build a simple network as shown in Figure 2.7
Step 2: From the device panel drag and drop the two network devices (router R1 and Switch SW1) and three end
devices (PC0,PC1, and PC2) as shown in Figure 2.7
Step 3: Configure the IP addresses on the end devices. To configure IP addresses on the end devices, click
on each of the devices to open its properties window as shown in Figure 2.8.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Navigate to the INTERFACE then the FastEthernet0(in some cases it may be Ethernet0 or GigabitEthernet0 as
it depends on the features of the end device e.g. some laptops have GigabitEthernet adapter while some have
FashEthernet or Ethernet, select static IP, and then enter the host IP address and the subnet mask respectively. Where a
Router like R1 is used as a gateway for the PCs or devices on the network, you may need to navigate to settings (see
Figure 2.9) and set the IP addresses of the gateway and DNS server without which in an ideal scenario the packets from the
end device would not be routed to another device outside the network.
Figure 2.9: Configuring the Gateway IP and DNS server IP of the end device
Step 4: Configure the IP address on the Router. The IP address of the R1 port is to be configured from the
command line interface (CLI). Often times to see the interface/port labels in the design window you may need to
navigate the following menu: Options - Preferences and make the changes as shown in Figure 2.10. It is important
you identify the interfaces of the network device you wish to configure through the CLI. In the present circumstance,
the Router R1 interface we need to configure is the GigabitEthernet0/0 interface. This interface would serve as
the gateway of the network i.e. it would provide exit channel for packets emanating from the local network to
external networks.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Step 5
Click on the network device. The network device we want to configure is R1. Clicking on R1 opens the properties
window with the CLI tab active(see Figure 2.11).
All configurations are to be done through the CLI. Once on this window, hit the enter button on your system to
return to the user exec level. Note that there are two popular access levels: the user Exec mode and the privileged. The
User EXEC level allows access to only basic monitoring commands whereas the privileged EXEC level allows
access to all router commands. Privileged EXEC level may be password protected to allow only authorized users
the ability to configure or manage the router/switch. From privileged EXEC level, you can access all the
command modes. There are five command modes: global configuration mode, interface configuration mode,
subinterface configuration mode, router configuration mode, and line configuration mode. Table 2 shows this
structure. At any point during the configuration use the question mark to display the list of all commands available
to you at that mode. E.g. Router> ?
Switch(config)#hostnameSW1 SW1(config)#exit
SW1#
SW1#copy run start
Destination filename [startup-config]? //press enter again to save
Building configuration...
[OK] SW1#
Figure 2.12: Verifying connectivity between PC0 and the Router (R1)
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
STUDY QUESTIONS
Q1. A small company with 10 employees uses a single LAN to share information between computers. Which
type of connection to the Internet would be appropriate for this company?
Ans. A broadband service, such as DSL, through their local service provider. For this small office, an
appropriate connection to the Internet would be through a common broadband service called Digital
Subscriber Line (DSL), available from their local telephone service provider. With so few employees,
bandwidth is not a significant problem. If the company were bigger, with branch offices in remote sites,
private lines would be more appropriate. Virtual Private Networks would be used if the company had
employees who needed to connect to the company via Internet.
Q2. Which network scenario will require the use of a WAN?
Ans. Employees need to connect to the corporate email server through a VPN while traveling. When
traveling employees need to connect to a corporate email server through a WAN connection, the VPN will
create a secure tunnel between an employee laptop and the corporate network over the WAN connection.
Obtaining dynamic IP addresses through DHCP is a function of LAN communication. Sharing files among
separate buildings on a corporate campus is accomplished through the LAN infrastructure.
Q3. Which statement describes a characteristic of a WAN?
Ans. WAN networks are owned by service providers. WANs are used to interconnect the enterprise LAN to
remote branch site LANs and telecommuter sites. A WAN is owned by a service provider. Although WAN
connections are typically made through serial interfaces, not all serial links are connected to a WAN. LANs,
not WANs, provide end-user network connectivity in an organization.
Q4. What are two common types of circuit-switched WAN technologies?
Ans. ISDN and PSTN. The two most common types of circuit-switched WAN technologies are the public
switched telephone network (PSTN) and the integrated services digital network (ISDN). Frame Relay and
ATM are packet-switched WAN technologies. DSL is a WAN technology that offers broadband Internet
access.
Q5. Which two devices are needed when a digital leased line is used to provide a connection between the
customer and the service provider?
Ans. DSU and CSU. Digital leased lines require a channel service unit (CSU) and a data service unit (DSU).
An access server concentrates dialup modem dial-in and dial-out user communications. Dialup modems are
used to temporarily enable the use of analog telephone lines for digital data communications. A Layer 2
switch is used to connect a LAN.
Q6. What is a requirement of a connectionless packet-switched network?
Ans. Full addressing information must be carried in each data packet. A connection-oriented system
predetermines the network path, creates a virtual circuit for the duration of the packet delivery, and requires
that each packet only carry an identifier. A connectionless packet-switched network, such as the Internet,
requires each data packet to carry addressing information.
Q7. A company needs to interconnect several branch offices across a metropolitan area. The network
engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on
the same network infrastructure. The company also wants easy integration to their existing LAN
infrastructure in their office locations. Which technology should be recommended?
Ans. Ethernet WAN Technology. Ethernet WAN uses many Ethernet standards and it connects easily to
existing Ethernet LANs. It provides a switched, high-bandwidth Layer 2 network capable of managing data,
voice, and video all on the same infrastructure. ISDN, while capable of supporting both voice and data, does
not provide high bandwidth. VSAT uses satellite connectivity to establish a private WAN connection but
with relatively low bandwidth. Use of VSAT, ISDN, and Frame Relay require specific network devices for
the WAN connection and data conversion between LAN and WAN.
Q8. Which equipment is needed for an ISP to provide Internet connections through cable service? Ans.
CMTS equipment. The equipment located at a cable service provider office, the cable modem termination
system (CMTS), sends and receives digital cable modem signals on a cable network to provide Internet
services to cable subscribers. A DSLAM performs a similar function for DSL service providers. A CSU/DSU
is used in leased line connections. Access servers are needed to process multiple simultaneous dial-up
connections to a Central Office (CO).
Q9. Which geographic scope requirement would be considered for a distributed WAN scope?
Ans. Many-to-many scope. In a business context, a one-to-one scope would encompass a corporation that has
a single branch office. A one-to-many WAN scope would encompass a corporation with multiple branch
offices. A distributed WAN would have many branch offices connected to many other sites.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Q18. Which type of information is displayed by the show ip protocols command that is issued from a
router command prompt?
Ans. The configured routing protocols and the networks that the router is advertising* The show ip protocols
command displays information about the routing protocols that are configured, the networks the router is
advertising, and the default administrative distance. The show interfaces command displays interfaces with
line (protocol) status, bandwidth, and delay, reliability, encapsulation, duplex, and I/O statistics. The show ip
interfaces command displays interface information, including protocol status, the IP address, whether a helper
address is configured, and whether an ACL is enabled on the interface. The show protocols command
displays information about the routed protocol that is enabled and the protocol status of interfaces.
Q19. Which action should be taken when planning for redundancy on a hierarchical network design?
Ans. Add alternate physical paths for data to traverse the network. One method of implementing redundancy
is path redundancy, installing alternate physical paths for data to traverse the network. Redundant links in a
switched network supports high availability and can be used for load balancing, reducing congestion on the
network.
Q20. Refer to the figure. PC A sends a request to Server B.
PC A is connected to switch S1, which in turn is connected to router R1. Router R1 is connected to a cloud,
and the cloud is connected to Server B. If 192.168.12.16 IPv4 address is used in the destination field in the
packet as the packet leaves PC A. Provide on each side a label with the needed information?
Ans. The destination IP address in packets does not change along the path between the source and
destination.
At one side of the PC is a label with the following information:
PC A MAC address: 00-0B-85-7F-47-00 IPv4 address: 192.168.10.10 At one side of the switch is a label
with the following information: S1 MAC address: 00-0B-85-D0-BB-F7 IPv4 address: 192.168.11.1
At one side of the router is a label with the following information: R1 MAC address: 00-0B-85-7F-86-B0
IPv4 address: 192.168.10.1
At one side of the server is a label with the following information: SERVER B MAC address: 00-0B-85-7F-
0A-0B IPv4 address: 192.168.12.16
Q21. Refer to the figure.
Server B is connected to switch S1, which in turn is connected to router R1. Router R1 is connected to a
cloud, and the cloud is connected to PC A. If the destination MAC address that corresponds to the IPv4
address is not in the ARP cache, then what is the information needed for R1 to send an ARP request to Server
B?
Ans. At one side of the server is a label with the following information: SERVER B MAC address: 00-0B-85-
7F-0A-0B IPv4 address: 192.168.10.16At one side of the switch is a label with the following information: S1
MAC address: 00-0B-85-D0-BB-F7 IPv4 address: 192.168.11.1At one side of the router is a label with the
following information: R1 MAC address: 00-0B-85-7F-86-B0 IPv4 address: 192.168.10.1At one side of the
PC is a label with the following information: PC A MAC address: 00-0B-85-7F-47-00 IPv4 address:
192.168.12.10
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
Q22. Refer to the figure. If PC1 is sending a packet to PC2 and routing has been configured between the two
routers, what will R1 do with the Ethernet frame header attached by PC1?
Ans. Remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0. When
PC1 forms the various headers attached to the data one of those headers is the Layer 2 header. Because PC1
connects to an Ethernet network, an Ethernet header is used. The source MAC address will be the MAC
address of PC1 and the destination MAC address will be that of G0/0 on R1. When R1 gets that information,
the router removes the Layer 2 header and creates a new one for the type of network the data will be placed
onto the serial link.
Q23. A typical router output shows the following information:
The gateway of last resort is 209.165.200.226 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 209.165.200.226
192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected,
GigabitEthernet0/0 L 192.168.10.1/32 is directly connected, GigabitEthernet0/0 192.168.11.0/24 is variably
subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/1 L 192.168.11.1/32
is directly connected, GigabitEthernet0/1 209.165.200.0/24 is variably subnetted, 2 subnets, 2 masks C
209.165.200.224/30 is directly connected, Serial0/0/0 L 209.165.200.225/32 is directly connected,
Serial0/0/0
What will the router do with a packet that has a destination IP address of 192.168.12.227?
Ans. Send the packet out the Serial0/0/0 interface. After a router determines the destination network by
ANDing the destination IP address with the subnet mask, the router examines the routing table for the resulting
destination network number. When a match is found, the packet is sent to the interface associated with the
network number. When no routing table entry is found for the particular network, the default gateway or
gateway of last resort (if configured or known) is used. If there is no gateway of last resort, the packet is
dropped. In this instance, the 192.168.12.224 network is not found in the routing table and the router uses the
gateway of last resort. The gateway of last resort is the IP address of 209.165.200.226. The router knows this is
an IP address that is associated with the 209.165.200.224 network. The router then proceeds to transmit the
packet out the Serial0/0/0 interface, or the interface that is associated with 209.165.200.224.
Compiled by Dr. B. R. Japheth (Software Engineering and Cyber security
ASSIGNMENT
Question 1. What is the significant difference between a router and a modem? Question 2:
a. What is the main function of the network layer in the OSI model?
b. Which of the network models are responsible for the understanding of the functionality of
a network?
c. What is a network “protocol”?
d. What is the role of the transport layer in the 5 layer TCP/IP protocol stack?
e. Compare and contrast the application protocols SMTP and HTTP.
Question 3:
a. Describe how Network Address Translation (NAT) works to enable devices using private IP
addresses to access the Internet.
b. Describe how the categorization of IP addresses into private and public is done by the Internet
Assigned Numbers Authority (IANA).
c. What are the advantages and disadvantages of STAR Topology?
Question 4:
a. What is the difference between Simplex and Half-Duplex transmission?
a. Draw arrows between three pairs of computers. The arrows should demonstrate Simplex,
Duplex and Half Duplex transmission
b. Give one example use each of Simplex and Duplex transmission
Question 5: Describe the following in brief:
a. Local Area Network (LAN)
b. Metropolitan Area Network (MAN)
c. Wide Area Network (WAN)
d. The Internet
e. Internet Access Technologies
Question 6:
a. What is a Subnet in Subnetting IP Networks?
b. What is Supernetting and why is it useful in terms of the size of the routing table on routers
c. State and explain with appropriate examples three (3) Supernetting Rules in terms of aggregating
contiguous networks in the same address space and creating access control lists (ACLs)
Question 7:
a. What are the typical features of a Network Operating System?
b. Describe with appropriate diagrams the configuration sequences of the Peer-to-peer network
operating systems and the Client/server network operating systems
c. State the advantages and the disadvantages of Peer-to-peer network operating systems