Sy Comp Sem Iv DCC 22414 QP Model Answers
Sy Comp Sem Iv DCC 22414 QP Model Answers
Marks
P.T.O.
22414 [2]
Marks
3. Attempt any THREE of the following: 12
a) What advantages does TDM have over FDM in a circuit
switched Network.
b) Compare Analog and Digital signals.
c) With suitable diagram describe:
(i) STAR topology
(ii) RING topology
d) Describe major functions of network layer in TCP/IP protocol
suite.
SUMMER – 19 EXAMINATION
Subject Name: Data Communication Network Model Answer Subject Code: 22414
Page No: 1 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(b) Microwave
(c) infrared
(d) Satellite
3. 802.5:Token Ring
Page No: 2 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Routing.
3. Congestion control
5. Address transformation
Page No: 3 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Broadcast networks
2. Point-to-point networks
Point to point networks consists of many connections between individual pairs of
machines. To go from the source to the destination a packet on these types of
network may have to go through intermediate computers before they reach the
desired computer.
b Draw structural diagram of fiber optic cable and write its functions 4M
Ans 2 M for
diagram
and 2 M
for
functions
1. Single-mode fibers - Used to transmit one signal per fiber (used in telephones
and cable TV)
2. Multi-mode fibers - Used to transmit many signals per fiber (used in computer
Page No: 4 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse,
light or radio signal — through the network at the electrical and mechanical level.
It provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.
Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and management
and handles errors in the physical layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer
controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error
Page No: 5 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
checking.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
OSI Model
Page No: 6 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page No: 7 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
attached to a central node (often called a hub or switch). The attachment of these diagram
network pieces to the central component is visually represented in a form similar to and 1
a star. mark for
descriptio
The hub and hosts, and the transmission lines between them, form a graph with n ,2M
the topology of a star. Data on a star network passes through the hub before ring
topology-
continuing to its destination. The hub manages and controls all functions of the
1 M for
network. It also acts as a repeater for the data flow. diagram
and 1
Mark for
descriptio
n
The star network is one of the most common computer network topologies.
(ii)RING Topology
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node - a
ring.
Data travels from node to node, with each node along the way handling every
packet.
Page No: 8 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to or from each other according to their
adjacent proximity in the ring structure. This type of topology is highly efficient
and handles heavier loads better than bus topology.
Page No: 9 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b Describe the functions of physical and data link layer of OSI model 4M
ans Functions of Physical Layer 2M for
Physical
Physical layer is the actual carrier of information between computers layer
Communication between computers happens due to physical layer Function
and 2 M
Data is actually carried between every adjacent node for Data
(computers/routers) by transmission of electromagnetic/optical signals at link
the physical layer over wired/wireless media layer)(4
Page No: 10 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Physical layer therefore encompasses the set of all protocols/standards used functions
in different types of Wired/Wireless interfaces and the telecommunication each)
links connecting them
It also includes the mechanical, electrical and timing specifications for
different network interfaces
Functions of Data Link Layer
Data link layer receives the data from the network layer & divide it into
manageable units called frames.
It then provides the addressing information by adding header to each
frame.
Physical addresses of source & destination machines are added to each
frame.
It provides flow control mechanism to ensure that sender is not sending the
data at the speed that the receiver cannot process.
It also provide error control mechanism to detect & retransmit damaged,
duplicate, or lost frame, thus adding reliability to physical layer.
Another function of data link layer is access control. When two or more
devices are attached to the same link, data link layer protocols determine
which device has control over the link at any given time.
Page No: 11 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
consisting of Network address with first bit as 0 and the next 3 bytes with host id.
Hence, number of hosts are more when compared to number of networks. The
default subnet masks for class A networks is 255.0.0.0. Class A networks have
their network addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.
Class B: Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes referring to
host ID. The default subnet masks for class B is 255.255.0.0. Network addresses
for these ranges from 128.0.0.0 to 191.0.0.0.
Class C: Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies Host ID. Here,
number of networks is more when compared to number of hosts in each network.
The default subnet masks for class C is 255.255.255.0 The network IP addresses
for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting
and its starting bits are 1110
Class E: Class E range for first byte is 240-255 .Class E is reserved for future use
and its starting bits are 1111
Page No: 12 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Simplex Mode
Half duplex Mode
Full duplex Mode
a. In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit; the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
-Keyboards, traditional monitors and printers are examples of simplex
devices.
Page No: 13 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of
the channel can be utilized for each direction
-for example :Walkie-talkies.
Page No: 14 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Message switching
Circuit switching is preferred over packet switching in voice communication
because:
In circuit switching, a dedicated path is established between sender and
receiver which is maintained for entire duration of conversation.
It provides continuous and guaranteed delivery of data.
During the data transfer phase, no addressing is needed.
Delays are small.
It uses connection oriented service.
Message received in order to the destination
c Your company has the network id 165.130.0.0. You are responsible for 6M
creating subnets on the network, and each subnet must provide at least 1000
host ids. What subnet mask meets the requirement for the minimum number
of host ids and provides the highest number of subnets?
ans The given network id 165.130.0.0 is class B (Range of class B is 128.0.0.0 to Explanati
191.255.255.255) with subnet mask of 255.255.252.0 creates 62 subnets with 1022 on 6 M
host each.
11111111.11111111.11111100.00000000.
To calculate the number of host ids available for each subnet is based on the
number of digits remaining in the network address.
The number of possible host ids in each subnet ranges from 00000001 through
11111110.
So, in the network 165.130.0.0/22, host addresses can range from 165.130.0.1
through 165.130.254
Page No: 15 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
tries dividing it by g(x). If there is remainder there has been a transmission error divisor
and zero remainder means no error in the transmission. r is degree of g(x) and do
polynomial. the
Step by step procedure: problem.
1. Append a string of r zero bits to the lower order end of data word(m) where r is Full
less than the number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
marks
= 4 zeros. Now data word contains m+r bits has to be
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 given
division even if
3. The remainder obtained after division is the r bit CRC. they
4. This CRC will replace the r zeros appended to the data unit to get the code word explain
to be transmitted. the
method
NOTE: The polynomial code for calculation of redundant bits is not given .hence or do the
the data given is insufficient for calculating redundant bits and the ratio of useful problem
bits to total bits. with
assumpti
ons’.
b Describe the process of DHCP server configuration. 6M
ans DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses Diagram
DHCP servers and DHCP clients. A DHCP server is a machine that runs a service 2M,
Explanati
that can lease out IP addresses and other TCP/IP information to any client that
on 4 M
requests them. The DHCP server typically has a pool of IP addresses that it is
allowed to distribute to clients, and these clients lease an IP address from the pool
for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client
machines that run special DHCP client software enabling them to communicate
with DHCP server.
DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various
DHCP options from DHCP servers in a four-step process:
Page No: 16 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The
client then initializes and binds its TCP/IP protocol stack and can begin network
communication.
c What is the MAC protocol used in TOKEN ring LAN’s? What happens if the 6M
token is lost?
ans Token ring local area network (LAN) network is a communication protocol for Descripti
local area networks.it uses special three-byte frame called a “token” that travels
on of
MAC
around a logical ring of workstations or servers. This token passing is a channel
protocol
access method providing fair access for all stations, and eliminating the collision
4 M,
of contention-based access methods. Explanati
on of
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5
token lost
and was fairly successful, particularly in the corporate environments, but 2 M
gradually eclipsed by the later versions of Ethernet.
The IEEE 802.5 Token ring technology provides for data transfer rates of either 4
or 16 Mbps.
4. When the frame gets back to originator, it sees that message has been copied
and received.
The Fibre Distributed Data Interface (FDDI) also uses a Token ring protocol.
If one device does not receive a token within a specified period, it can issue an
alarm. The alarm alerts the network administrator to the problem and its location.
Then, network administrator generates a new , free token
OR
Page No: 17 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
· There are two error conditions that could cause the token ring to break down.
One is the lost token in which case there is no token in the ring.
Other is the busy token that circulates endlessly.
To overcome these problems, the IEEE 802 standard specifies that one of the
stations must be designated as “active monitor”. The monitor detects the lost
condition using a timer by time-out mechanism and recovers by using a new
free token
Page No: 18 / 1 8
22414
11920
3 Hours / 70 Marks Seat No.
Marks
P.T.O.
22414 [2]
Marks
3. Attempt any THREE of the following: 12
a) State the two advantages and two disadvantages of unguided
media.
b) Draw and explain block diagram of communication system.
c) Describe different connecting devices used in computer network.
d) Draw and explain OSI reference model.
WINTER – 19 EXAMINATION
Subject Name: Data Communication and Network
Model Answer
1|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is more efficient and more reliable In this transmission start bits and
than asynchronous transmission to stop bits are added with data.
transfer the large amount of data.
3|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Optical fibers use the principle of ‘reflection’ to pass light through a channel.
c Explain wireless LAN 802.17 architecture. 4M
Ans Consider
Wireless LAN 802.11: IEEE 802.11
The IEEE 802.11 standard defines the physical layer and media access control instead of
(MAC) layer for a wireless local area network. Wireless LANs transmit and 802.17
receive data over the atmosphere, using radio frequency (RF) or infrared optical
technology, thereby; eliminating the need for fixed wired connections.
802.11 Architecture: BSS diagram
1M,
The 802.11architecture defines two types of services: Explanation -
1M-
1. Basic services set (BSS) ESS diagram
1M,
2. Extended Service Set (ESS) Explanation -
1M
1. Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a *Note:
central base station called access point (AP). If student
• The use of access point is optional. attempted to
• If the access point is not present, it is known as stand-alone network. Such a solve the
BSS cannot send data to other BSSs. This type of architecture is known as adhoc answer give
architecture. appropriate
• The BSS in which an access point is present is known as an infrastructure marks.
network.
4|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
These extended networks are created by joining the access points of basic services
sets through a wired LAN known as distribution system.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.
5|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
6|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3.Radio wave propagation is susceptible to weather effects like rain, thunder and
storm etc.
b Draw and explain block diagram of communication system. 4M
Ans 1 M diagram.
3M
explanation
1. Message
2. Sender
3. Medium
4. Receiver
5. Protocol
Message:
Medium: The message originated from sender needs a path over which it can
travel to the receiver. Such path is called as medium or channel
8|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Receiver: It is the device which receives the message and reproduces it. A
receiver can be host, camera, workstation, telephone etc.
3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem
Repeater:
It is used to take the distorted, weak and corrupt input signal and regenerate
this signal at its output.
It ensures that the signals are not distorted or weak before it reaches the
destination.
It recreates the bit pattern of the signal, and puts this regenerated signal back
on to the transmission medium
Hub:
9|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It operates in both the physical and the data link layer.
Bridge:
It inspects incoming traffic and decides whether to forward or discard it.
A bridge operates in both the physical and the data link layer.
Gateway:
It is a node in a computer network, a key stopping point for data on its way to
or from other networks.
Router:
It is a device that helps in determining the best and shortest path out of the
available paths, for a particular transmission.
Routers use logical and physical addressing to connect two or more logically
separate networks.
Router read complex network address in packet and efficiently directs packets
from one network to another, reducing excessive traffic.
Modem:
10 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is the device used to converts digital signals generated by the computer into
analog signals which can be transmitted over a telephone or cable line
transforms incoming analog signals into their digital equivalents.
11 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
12 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
bandwidth in logical channels and allocates one user to each channel. Each user
can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other.
Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.
When channel A transmits its frame at one end, the De-multiplexer provides
media to channel A on the other end. As soon as the channel A’s time slot
expires, this side switches to channel B. On the other end, the De-multiplexer
13 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
14 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Data Transfer: Once the circuit has been established, data and voice are
transferred from the source to the destination. The dedicated connection
remains as long as the end parties communicate.
Circuit Disconnection: When data transfer is complete, the connection
is relinquished. The disconnection is initiated by any one of the user.
Disconnection involves removal of all intermediate links from the sender
to the receiver.
15 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Protocol is used to connect to the host, so that the packets can be sent over it.
4. Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
16 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
5. Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.
The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a
remote machine and run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
17 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Simplex Mode
Half duplex Mode
Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction.
Keyboards, traditional monitors and printers are examples of simplex devices.
2. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction
-for example: Walkie-talkies.
18 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions .One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone
line, both can talk and listen at the same time.
19 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between callers and called is established over the network.
Packet Switching: The entire message is broken down into smaller chunks
called packets. The switching information is added in the header of each packet
and transmitted independently.
It is easier for intermediate networking devices to store small size packets and
they do not take much resource either on carrier path or in the internal memory
of switches.
20 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Configure and start the intend daemon on each host machine on the
network. Read TCP/IP daemons and then follow the instructions
in Configuring the intend daemon.
Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up,
configure at least one host to function as a name server.
Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.
Decide which hosts on the network will be servers, and which services a
particular server will provide.Follow the instructions in Server network
services to start the server daemons you wish to run.
21 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
• The communication between the primary and the secondary can be one-to-one
or one-to-many.
22 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7. Select BOOTP only, set the lease duration to Unlimited, and click OK.
8. Right-click Reservations.
9. Enter the IP address and the MAC address for Controller A. Click
Add.
23 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
10. Enter the IP address and the MAC address for Controller B. Click
Add.
Ans 4 components-
Wireless Network Infrastructures
11/2M each
The infrastructure of a wireless network interconnects wireless users and end
systems. The infrastructure might consist of base stations, access controllers,
application connectivity software, and a distribution system. These components
enhance wireless communications and fulfill important functions necessary for
specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the
wireless communications signals traveling through the air medium to a wired
network? Often referred to as a distribution system. Therefore, a base station
enables users to access a wide range of network services, such as web browsing,
e-mail access, and database applications. A base station often contains a wireless
NIC that implements the same technology in operation by the user's wireless
NIC.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions.
As show in Figure a base station might support point-to-point or point-to-
multipoint communications.
24 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming
mechanisms in wireless network standards, companies offer access-control
solutions to strengthen wireless systems. The key component to these solutions
is an access controller, which is typically hardware that resides on the wired
portion of the network between the access points and the protected side of the
network. Access controllers provide centralized intelligence behind the access
points to regulate traffic between the open wireless network and important
resources. In some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it
takes is a browser and e-mail software on the client device. Users might lose a
wireless connection from time to time, but the protocols in use for these
relatively simple applications are resilient under most conditions.
Special application connectivity software is necessary as an interface between
a user's computer device and the end system hosting the application's software
or database.
25 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet
comprises the distribution system.
26 | 2 6