Beruflich Dokumente
Kultur Dokumente
User-id 09214_arpit
Solution 1:- On the basis of scale/scope Computer Networks can be categorised as:-
Solution 2:- Every protocols are set of rules that controls the connection communication
and data transfer between two computers and can be viewed as a set of layers.
TCP/IP OSI
Application Layer – HTTP Application Layer (Layer 7)
Presentation Layer (Layer 6)
Session Layer (Layer 5)
Transport Layer – TCP Transport Layer (Layer 4)
Network Layer – IP Network Layer (Layer 3)
Link Layer – Ethernet Data Link Layer (Layer 2)
Physical Layer – RJ 45/ CAT 5 Physical Layer (Layer 1)
A comparison of the OSI model and the TCP/IP models will point out some similarities
and differences.
Similarities
OSI and TCP/IP reference model have the following major similarities
· Both have layers.
· Both have application layers, though they include very different services.
· Both assume packets are switched. This means that individual packets may take
different paths to reach the same destination. This is contrasted with circuit-switched
networks where all the packets take the same path.
Differences
OSI and TCP/IP reference model have the following main differences:
· TCP/IP combines the presentation and session layer issues into its application layer.
· TCP/IP combines the OSI data link and physical layers into the network access layer.
· TCP/IP protocols are the standards around which the Internet developed, so the
TCP/IP model gains credibility just because of its protocols. In contrast, networks are
not usually built on the OSI protocol, even though the OSI model is used as a guide.
Solution 3:- The following shall be needed in order to connect a computer to internet
1. A computer.
2. An Internet Service Provider which provides end user access to World Wide
Web.
3. User Name and Password provided by the ISP to authenticate the end user.
4. A modem (either telephonic, DSL or Cable) to connect to the ISP.
5. An end user application (Web Browser)like Internet Explorer to access WWW.
6. A data plan provided by the ISP.
Internet provides us various opportunities in our daily life some of them are
Solution 4:- Internet Service provider enables a end user to avail the services of internet
by
providing a unique user name and password to every user. When the user
connects to the ISP Server, this server validates the user by matching the user
name entered by the client with the list of user names entered in the server and
then verifies the password for that user name. If the user name and password
matches then ISP Server checks the account status and usage plan of that
user. On having adequate balance the user is authorised to use the internet
services.
Solution 5:-
With the increased use of internet the risk of information being tampered or
threatened has also increased. Some of the popular types of threats are:-