Sie sind auf Seite 1von 3

Name Arpit Agarwal

User-id 09214_arpit

Solution to Assignment No. 1

Solution 1:- On the basis of scale/scope Computer Networks can be categorised as:-

1. Personal Area Network(PAN):- Personal Area Network is a Computer Network


used for intra personal communication among various computer devices
present in the proximity of an individual’s body like Telephone, Personal Digital
Assistants, Printers, Scanners etc. or to connecting to a higher level network.
The geographical range of PAN extends to few meters only. Personal area
networks may be wired with computer buses such as USB and FireWire or with
wireless network technologies such as IrDA, Bluetooth.
2. Local Area Network(LAN):- A Computer Network connecting computers and
other digital devices in a limited geographical area such as office building,
home, school, hospital, etc. and includes high data transfer rate(upto100 MBps)
with the use of Ethernet over twisted pair cabling and Wi-Fi Technology.
3. Campus Area Network(CAN):- A Computer Network formed by
interconnection of various LAN and PANs of a particular campus interconnected
through routers and switches using optical fibre and Cat5 cabling as
transmission media.
4. Metropolitan Area Network(MAN):- A computer Network that spans a city or a
large campus by interconnecting a number of LANs using a high capacity
backbone technology and provides uplink services to WAN or Internet.
5. Wide Area Network(WAN):- A Computer Network connecting cities and
countries using transmission facilities provided by common carriers like
Telephone Companies and functioning at lower three layers of OSI reference
model.

Solution 2:- Every protocols are set of rules that controls the connection communication
and data transfer between two computers and can be viewed as a set of layers.

TCP/IP OSI
Application Layer – HTTP Application Layer (Layer 7)
Presentation Layer (Layer 6)
Session Layer (Layer 5)
Transport Layer – TCP Transport Layer (Layer 4)
Network Layer – IP Network Layer (Layer 3)
Link Layer – Ethernet Data Link Layer (Layer 2)
Physical Layer – RJ 45/ CAT 5 Physical Layer (Layer 1)

A comparison of the OSI model and the TCP/IP models will point out some similarities
and differences.

Similarities

OSI and TCP/IP reference model have the following major similarities
· Both have layers.

· Both have application layers, though they include very different services.

· Both have comparable transport and network layers.

· Both models need to be known by networking professionals.

· Both assume packets are switched. This means that individual packets may take
different paths to reach the same destination. This is contrasted with circuit-switched
networks where all the packets take the same path.

Differences

OSI and TCP/IP reference model have the following main differences:

· TCP/IP combines the presentation and session layer issues into its application layer.

· TCP/IP combines the OSI data link and physical layers into the network access layer.

· TCP/IP appears simpler because it has fewer layers.

· TCP/IP protocols are the standards around which the Internet developed, so the
TCP/IP model gains credibility just because of its protocols. In contrast, networks are
not usually built on the OSI protocol, even though the OSI model is used as a guide.

Solution 3:- The following shall be needed in order to connect a computer to internet

1. A computer.
2. An Internet Service Provider which provides end user access to World Wide
Web.
3. User Name and Password provided by the ISP to authenticate the end user.
4. A modem (either telephonic, DSL or Cable) to connect to the ISP.
5. An end user application (Web Browser)like Internet Explorer to access WWW.
6. A data plan provided by the ISP.

Internet provides us various opportunities in our daily life some of them are

1. Sharing Information is the most advantageous feature of Internet. Internet


provides various information and data in various fields, it has become a pool of
information and anyone can excess it from anywhere i.e. with the use of internet
information is not geographically bounded.
2. Internet has changed our communication system to a great extend the old mail
system is replaced by the e-mails, chat servers and video conferencing. These
advancements had enabled us to communicate at a very high transfer rate that
is almost instantaneously.
3. Entertainment:- Besides Knowledge and information Internet also provide a
good means of entertainment. Using Internet one can watch Online Movies,
videos, Listen songs, play online games.
4. Business:- Internet can be used to extend one’s business with the help of
Online Advertisement through various web sites and email providers.
5. E-Commerce:- Internet by the way of e-commerce provides best and cheapest
items just at a click of the finger and also provides a comparative study of
various features with an option of user’s review thus making the purchase easy.
6. E-Banking:- Internet has made banking easy by the concept of Central Bank
Server Computer which makes a person enable to manage his account from
any part of the world. Also with the use of ATMs and e-banking one can
manage his accounts without going to the bank itself.

Solution 4:- Internet Service provider enables a end user to avail the services of internet
by
providing a unique user name and password to every user. When the user
connects to the ISP Server, this server validates the user by matching the user
name entered by the client with the list of user names entered in the server and
then verifies the password for that user name. If the user name and password
matches then ISP Server checks the account status and usage plan of that
user. On having adequate balance the user is authorised to use the internet
services.

Solution 5:-

With the increased use of internet the risk of information being tampered or
threatened has also increased. Some of the popular types of threats are:-

1. Virus:- A computer virus is a computer program that works at the backhand


of other applications. A virus can spread from one computer to another
when its host is taken to the target computer when it is sent over a network
or the Internet, or carried it on a removable medium such as a floppy disk,
CD, DVD, or USB drive.
2. Spyware:- Spyware is a computer programme that is secretly installed on
the user's personal computer, and collects small pieces of information
without user’s knowledge. The presence of spyware is typically hidden from
the user, and can be difficult to detect.
3. Rootkit:- A rootkit is software that enables continued privileged access to a
computer while actively hiding its presence from administrators by
subverting standard operating system functionality or other applications and
can take full control over the computer.
4. Worm:- A computer worm is a self-replicating computer program, which
uses a computer network to send copies of itself to other nodes without any
user intervention and consuming bandwidth of the network.
5. Trojan Horse:- A Trojan horse, or Trojan, is software that appears to
perform a desirable function for the user prior to run or install, but (perhaps
in addition to the expected function) steals information or harms the system.

Das könnte Ihnen auch gefallen