Assignment: SUBMITTED FROM: Yousra Nur Obaid ID:19204025 Submitted To: Md. Hasanuzaman
Assignment: SUBMITTED FROM: Yousra Nur Obaid ID:19204025 Submitted To: Md. Hasanuzaman
Assignment: SUBMITTED FROM: Yousra Nur Obaid ID:19204025 Submitted To: Md. Hasanuzaman
ID:19204025
A media access control address (MAC address) is a unique identifier for an Ethernet or network
adapter over a
network. It distinguishes different network interfaces and is used for a number of network
technologies, particularly most IEEE 802 networks, including Ethernet. In the OSI model, MAC
addresses occur in the Media Access Control
A MAC address is also known as physical address, hardware address and burned-in address.And
We can find mac address (physical address) of a computer using the command ‘getmac‘.
This can be used to get mac address for remote computers also. Below are few examples on how
to use this
command. It works on XP, Vista, Windows 7, Server 2003 and Server 2008 operating systems.
STRAIGHT THROUGH
*White Orange
*Orange
*white green
*blue
*white blue
*green
*white brown
*brown
Cross Over
*White Green
*Green
*White Blue
*Orange
*White Orange
*Blue
*White Brown
* Brown
Rolled Over
*White Brown
*Brown
*White Blue
*Green
*White Green
*Blue
*White Orange
*Orange
such pairs are bundled together in a protective sheath. They are the most widely
used Transmission Media.
Twisted Pair is of two types:
(i) Unshielded Twisted Pair (UTP) : This type of cable has the ability to block
interference and
does not depend on a physical shield for this purpose. It is used for telephonic
applications.
ADVANTAGES:
•Least expensive.
Easy to install.
Eliminates crosstalk.
Comparatively faster.
Disadvantages:
• More expensive.
• Bulky.
Ans:
• Point-to-point topology
•Bus(point-to-multipoint topology
• Star topology
• Ring topology
• Tree topology
• Mesh topology
• Hybrid topology
Point to Point:
Bus Topology :
Bus topology uses a single cable which connects all the included nodes. The main
cable acts as a spine for the entire network. One of the computers in the network
acts as the computer server. When it has two endpoints, it is known as a linear bus
topology.
example:
a multistory office building.The network could consist of a bus running vertically
In a ring network, every device has exactly two neighboring devices for
This topology uses token to pass the information from one computer to another.
finally, to the computer, D. Data is travelling in the form packets in the ring
topology.
Star Topology:
In the star topology, all the computers connect with the help of a hub. This cable
is called a central node, and all other nodes are connected using this central node.
It is most popular on LAN
Mesh Topology:
The mesh topology has a unique network design in which each computer on the
network connects to every other. It is develops a P2P (point-to-point) connection
between all the devices of the network. It offers a high level of redundancy, so
even if one network cable fails, still data has an alternative path to reach its
destination.
example:
tennis nets and football goals.
Tree Topology:
Tree topologies have a root node, and all other nodes are connected which form
a hierarchy. So it is also known as
a single bus, so it is known as a Star Bus topology. Tree topology is a very common
network which is similar to a bus and star topology.
example:
Different floors can be connected to each other through combining star topology
Hybrid Topology:
Hybrid topology combines two or more topologies. The resulting network does
not exhibit one of the standard topologies.
example:
an office in one department, Star and P2P topology is used. A hybrid topology is
always produced when two different basic network topologies are connected.
7. Topology - Bus
7. Topology - Star
7. Topology - Star
6. Short notes:
Well-known port Number.
Ans:
the well known port number are the port number which are reserved for
assignment by ICANN for use by the applications end points that communicate
using the UDP or TCP.
well known port number range is 0-1023.
example:
-FTP.
-TFTP.
-DHCP.
-DNS.
-HTTP.
7. Write down the elaboration of ICMP, ARP, RARP and IGMP. Shortly describe
about themselves.
Ans:
1. ICMP: Internet Control Message Protocol
ICMP is an error- reporting protocol network devices like routers use to generate
error messages to the source IP address when network problems prevent delivery of IP
packets
ARP is a network protocol used to find out the hardware (MAC) address of a device from
an IP Address. The sending device uses ARP to translate IP addresses to MAC addresses.
8. Briefly define distance vector, link state, and path vector protocol.
Ans:
Distance-vector routing protocol:
A distance-vector routing protocol in data networks determines the best route for data packets
based on distance. Distance-vector routing protocols measure the distance by the number of
routers a packet has to pass, one router counts as one hop
Examples: RIP-Routing Information Protocol
IGRP-Interior Gateway Routing Protocol
EIGRP-Enhanced Interior Gateway Routing Protocol
9. Distinguish among distance vector, link state, and path vector protocol.
Ans:
Routing Protocol:
Routing protocols are mechanisms by which routing information is exchanged between
routers so that routing decisions can be made. In the Internet, there are three types of
routing protocols commonly used. They are: distance vector, link state, and path vector.
Example:
RIP, EIGRP, OSPF, BGP
Features of a Router:
3. Packet Filtering
Ans:
Router Components:
Power Supply
Processor
RAM
NVRAM
ROM
Router Interfaces
Router activities: