Computer Networks
Computer Networks
BASIC
1. What is a computer network?
A computer network is a set of devices or nodes communica ng via links. These devices
communicate with each other in order to share resources and exchange data. All the devices
in the network are capable of transmi ng and receiving data using the same
communica on protocols.
2. What is a node in a computer network?
A node in a computer network is a device capable of genera ng, transmi ng and receiving
data produced by others devices in the same network. A node is otherwise referred to as a
sta on or system. Some examples of nodes include printers, computers, modem and so on.
3. What is a link in a computer network?
A link in a computer network is the physical interface or medium through which the data
generated by the nodes in the computer network, is transmi ed. It can be a cable, op cal
fiber, air, radio waves or any other physical medium capable of transpor ng a signal
containing some informa on.
4. What is the use of gateway in a computer network?
A gateway acts as an entry point to a computer network. It manages all the inflow and
ou low of data from a computer network. A gateway is capable of connec ng two dissimilar
networks using different transmission protocols. Unlike the other networking devices, the
gateway can act in any layer of the network architecture model.
5. What is the use of firewall in a computer network?
A firewall is a hardware or so ware – based device responsible for monitoring the network
security and filtering the inflow of data from the external untrusted sources. The data traffic
sa sfying a defined set of security protocols is only allowed to enter the secured internal
network. This prevents any malicious external so ware from accessing the confiden al
informa on from the internal networks.
6. How does the proxy server protect the computer network?
A proxy server acts as an intermediate server between the users and the website requested
by the users. When a user makes a web request, this request is transferred to the proxy
server which then makes the web request on behalf of the user, collects the response from
the web server and then proceeds to send the data to the user. This prevents end users and
internal networks from being a acked by malicious so ware in the Internet.
7. What is the use of NIC in a computer network?
Network Interface Card (NIC) is a component which allows a device to connect to a
computer network. It provides the devices a dedicated, reliable and secure connec on to
the network. It manages the wired and wireless communica ons of devices in order to
exchange informa on with other devices.
8. What is the use of MAC address in a computer network?
MAC address is a unique 12 – digit hexadecimal address associated with the Network
Interface Card (NIC). MAC address is also referred to as physical address or hardware address
or link layer address or burned – in address as this address is hard – wired at the me of
manufacturing and is unique to that par cular network adaptor. This hardware address is
responsible for forwarding of data between intermediate devices.
9. What is the use of IP address in a computer network?
IP address also called the global address or network address or logical address, is used to
uniquely iden fy a device on the computer network. Rou ng of transmi ed data is done
with the help of IP addresses of the source and des na on. The IP addresses of devices are
not unique and may vary over a certain me period.
10. What is the use of ipconfig command in computer network?
IPCONFIG stands for Internet Protocol Configura on. It is a command – line u lity which
displays some addi onal informa on such as the device’s currently assigned IP address, IP
addresses of the DNS servers being used, subnet mask in addi on to the TCP/IP
configura on of the network. It also displays the enabled and disabled configura ons of
connected devices.
11. What is the use of ifconfig command in a computer network?
IFCONFIG stands for Internet Configura on. As the name suggests, ifconfig command is used
for the configura on of the network interface parameters or assignment of address to the
network interface or to display the informa on of the current network interface
configura on. This command is o en used in UNIX – like opera ng systems.
12. What is data encapsula on in a computer network?
Data encapsula on in a computer network is the addi on or binding of some addi onal
informa on to data during its transmission. Every layer of the OSI and TCP/IP model binds
some informa on such as headers and trailer at the sender side. For example, the IP
addresses of the source and des na on are included in the header of the packet in the
network layer.
13. What is the use of ping command in a computer network?
Ping command is used in a computer network to check the connec vity or reachability of a
remote host. An echo request is sent to a remote address to check if it’s accessible. If the
echo request is delivered to the des na on host and the host is able to respond with an
echo reply, then the host is considered to be alive and reachable.
14. What is the use of beacon frames in a computer network?
Beacon frame is a management frame used in IEEE 802.11 WLAN. In a WLAN, the access
point and the devices periodically publicize their presence using the beacon frames. These
frames are used to synchronize devices and contain network informa on such as the traffic
map, mestamp, SSID, beacon interval and so on.
15. What is encoding in a computer network?
Encoding in computer network is the process of conversion of data such as images, text,
audio, video into a binary pa ern or code for secure and efficient transmission of data.
16. What is conges on in a computer network?
Conges on in a computer network occurs as a consequence of excess load on the network.
If the nodes or links of the network carry large amount of data which exceeds the maximum
capacity of the network, this may lead to deteriora on in the performance of the network
and may induce delay in transfer of data.