Dypit Qbank Ans
Dypit Qbank Ans
• Local Area Network (LAN): A LAN covers a small geographic area, typically within
a single building or campus. It allows devices to share resources and communicate
locally.
• Wide Area Network (WAN): WANs span large geographical areas, often connecting
LANs across cities or even countries. The internet itself is a global WAN.
• Metropolitan Area Network (MAN): A MAN falls between LAN and WAN in terms
of size and is used to connect multiple LANs within a metropolitan area.
• Wireless Local Area Network (WLAN): Similar to LAN but uses wireless
technology for device connectivity.
2. **Division**: At the sender's end, the message is divided by the generator polynomial
using binary division. The remainder is then appended to the original message.
3. **Receiver's End**: When the message is received, the receiver divides it by the same
generator polynomial. If the remainder is not zero, it indicates that an error has occurred
during transmission.
6. **Common Use**: CRC is widely used in network protocols like Ethernet and Wi-Fi,
as well as in data storage, such as on hard drives and CDs.
**Hamming Code:**
Hamming Code is an error-correction code that allows not only the detection but also the
correction of errors in data transmission. It does this by adding redundant bits to the
original data.
1. **Redundant Bits**: Hamming Code adds extra bits, called parity bits, to the original
data to create a codeword. These bits are positioned at specific locations within the
codeword.
2. **Parity Calculation**: The parity bits are calculated based on the values of the data
bits they cover. Parity can be even or odd, depending on the specific Hamming code
scheme.
3. **Error Detection**: By examining the parity bits, the receiver can determine whether
an error has occurred. If an error is detected, the receiver can use the parity information to
locate and correct the erroneous bit.
4. **Error Correction**: Hamming Code can correct single-bit errors. It can also detect
some multiple-bit errors but not necessarily correct them all.
5. **Efficiency**: Hamming Code is less efficient than CRC for error detection alone, as
it involves more overhead due to the added redundant bits.
6. **Common Use**: Hamming Code is often used in memory systems, like RAM and
ECC (Error-Correcting Code) RAM, where data integrity is critical.
In summary, CRC is primarily used for error detection, while Hamming Code is used for
both error detection and correction. The choice between the two depends on the specific
application's requirements and the desired level of error resilience.
What is an IP address
An IP (Internet Protocol) address is a unique numerical identifier for devices on a
network.
192.168.2.22
2402:e280:3e03:0139:843b:51fe:f3b4:e3f2
Range of IP addresses
What is Subnetting
Subnetting is the process of breaking down a larger network into smaller subnetworks for
better management and efficiency. It involves adjusting the subnet mask to create distinct
subnets.
Problems on Subnetting
1. In case of the single network, only three steps are required in order to reach a Process
i.e Source Host to Destination Network, Destination Network to Destination Host and
then Destination Host to Process. But in the case of Subnetting four steps are required
for Inter-Network Communication. i.e Source Host to Destination Network,
Destination Network to proper Subnet, then Subnet to Host and finally Host to
Process. Hence, it increases Time complexity. In the case of Subnet, more time is
required for communication or data transfer.
2. In the case of Single Network only two IP addresses are wasted to represent Network
Id and Broadcast address but in case of Subnetting two IP addresses are wasted for
each Subnet. Example: If a Network has four Subnets, it means 8 IP addresses are
going to waste.
Problems on Supernetting
Increased risk of network outages: Since a supernet represents all its associated subnets
with one routing table entry, any issue in the table updates or routing process can affect all
the associated subnets. This increases the risk of network outages for all associated
subnets, even if the cause of the outage pertains to just one of the associated subnets.
Complicated troubleshooting: When a network issue arises, it can be more difficult to
troubleshoot it when using supernets as there are more IP addresses and subnets to
examine. Also, supernetting requires careful planning to ensure that routing tables do not
become too large or unwieldy.
Increased security risks: Subnets offer security capabilities such as subnet isolation.
However, aggregating subnets with different security configurations into a supernet
increases the security risks by making it easier for unauthorized access to occur.
What is Routing
Routing is the process of determining the best path for data to travel from a source to a
destination within a network.
What is a switch
A switch is a network device that connects devices within a LAN and forwards data based
on MAC addresses.
What is a router
A router connects different networks and routes data between them.
What is a firewall
A firewall is a security device that monitors and controls incoming and outgoing network
traffic.
What is DHCP, explain the process of DHCP
DHCP, or Dynamic Host Configuration Protocol, is like a helpful assistant for devices
that want to join a network, such as your computer or phone connecting to Wi-Fi. It
ensures they get an address (like a digital home) on the network so they can communicate
with other devices.
Here's how it works :
1. Discover: When your device joins a network, it doesn't have an address yet. It sends
out a message saying, "Hey, I'm new here, and I need an address." This message is
like your device raising its hand to get noticed.
2. Offer: The network has a special computer (the DHCP server) that hands out
addresses. The server hears your request and says, "Sure, I have an available address
for you." It's like the server offering you a place to live on the network.
3. Request: You accept the offer and say, "Yes, I'd like that address, please." It's like you
telling the server, "I'll take that spot!"
4. Acknowledge: The server says, "Great! You can have that address, and here are some
rules for living here." It's like getting the keys to your new network home, along with
some instructions.
5. Lease: The address isn't yours forever; it's more like a rental. You can use it for a
while (as determined by the server), but you'll need to renew it when the lease is up.
6. Renewal: When your lease is about to expire, you ask the server if you can stay a bit
longer. If the server says yes, you get to keep the same address.
7. Release: When you're done using the address, like when you leave the network, you
tell the server, "I'm moving out, and you can give this address to someone else."
What is DNS
DNS, or Domain Name System, is like the phonebook of the internet. It's a crucial
system that translates human-friendly web addresses (like www.example.com) into
computer-friendly IP addresses (like 192.168.1.1).
Here's how DNS works in simple terms:
1. Domain Names: When you type a website's domain name into your browser (e.g.,
www.example.com), your computer doesn't know where to find that website on the
internet.
2. DNS Request: Your computer sends a request to a DNS server, asking, "Where can I
find www.example.com?"
3. DNS Server Lookup: The DNS server has a huge directory of domain names and
their corresponding IP addresses. It looks up "www.example.com" and finds its IP
address.
4. IP Address Returned: The DNS server tells your computer, "You can find
www.example.com at IP address 192.168.1.1."
5. Connection Established: Your computer then connects to that IP address, and the
website is loaded in your browser.