0% found this document useful (0 votes)
14 views8 pages

CN - IMPORTENT - Q'S - MID - AND - EXTERNAL - (1) (1) (Recovered)

computer networks

Uploaded by

divya25715
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views8 pages

CN - IMPORTENT - Q'S - MID - AND - EXTERNAL - (1) (1) (Recovered)

computer networks

Uploaded by

divya25715
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

CN important Questions

10. How CRC is used for error detection? Calculate CRC, if the message is 110101001 and
the generator is 1011.
14. Define Multiple Access Mechanism and Differentiate FDMA,CDMA and TDMA.
a Multiple Access Mechanism is a method that allows multiple devices to share the same
communication channel simultaneously. These mechanisms are crucial in managing how data
is transmitted in networks with multiple users, preventing data collision and ensuring
efficient bandwidth use. Key multiple access techniques include:
1. TDMA (Time Division Multiple Access) - Divides time into slots, assigning each
user a unique time slot to transmit.
2. FDMA (Frequency Division Multiple Access) - Allocates separate frequency bands
for each user.
3. CDMA (Code Division Multiple Access) - Assigns unique codes to users, allowing
simultaneous transmission over the same frequency..
These mechanisms are essential in systems like Wi-Fi, cellular networks, and satellite
communications to optimize data flow and reduce interference.
15. Demonstrate Ethernet.
16. Explain about optimality principle and shortest path algorithm with example graph.
17. List out differences between virtual circuits and datagram networks.
18. List out differences between connection oriented and connection less services.
19. Illutstrate distance vector algorithm with an example.
20. Discuss about conjestion control with traffic control algorithms. (Leaky bucket, Token
bucket).

21.Differentiate IPV4 and IPV6.


22. Discuss about internet control protocols (ICMP, ARP, DHCP).
23. Discuss about transport layer protocol.
24. Demonstrate TCP connection establishment and connection release mechanisms.
25. Write about WWW and HTTP protocols.
HTTP
o HTTP stands for HyperText Transfer Protocol.
o It is a protocol used to access the data on the World Wide Web (www).
o The HTTP protocol can be used to transfer the data in the form of plain text,
hypertext, audio, video, and so on.
o This protocol is known as HyperText Transfer Protocol because of its efficiency that
allows us to use in a hypertext environment where there are rapid jumps from one
document to another document.
o HTTP is similar to the FTP as it also transfers the files from one host to another host.
But, HTTP is simpler than FTP as HTTP uses only one connection, i.e., no control
connection to transfer the files.
o HTTP is used to carry the data in the form of MIME-like format.
o HTTP is similar to SMTP as the data is transferred between client and server. The
HTTP differs from the SMTP in the way the messages are sent from the client to the
server and from server to the client. SMTP messages are stored and forwarded while
HTTP messages are delivered immediately.
Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a
request and waits for a response from the server. When the server receives the
request, the server processes the request and sends back the response to the HTTP
client after which the client disconnects the connection. The connection between
client and server exist only during the current request and response time only.
o Media independent: HTTP protocol is a media independent as data can be sent as
long as both the client and server know how to handle the data content. It is required
for both the client and server to specify the content type in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and server know each other
only during the current request. Due to this nature of the protocol, both the client and
server do not retain the information between various requests of the web pages.
HTTP Transactions
The above figure shows the HTTP transaction between client and server. The client initiates a
transaction by sending a request message to the server. The server replies to the request
message by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message types follow the
same message format.

Request Message: The request message is sent by the client that consists of a request line,
headers, and sometimes a body.
Response Message: The response message is sent by the server to the client that consists of a
status line, headers, and sometimes a body.

Uniform Resource Locator (URL)


o A client that wants to access the document in an internet needs an address and to
facilitate the access of documents, the HTTP uses the concept of Uniform Resource
Locator (URL).
o The Uniform Resource Locator (URL) is a standard way of specifying any kind of
information on the internet.
o The URL defines four parts: method, host computer, port, and path.
o Method: The method is the protocol used to retrieve the document from a server. For
example, HTTP.
o Host: The host is the computer where the information is stored, and the computer is
given an alias name. Web pages are mainly stored in the computers and the
computers are given an alias name that begins with the characters "www". This field
is not mandatory.
o Port: The URL can also contain the port number of the server, but it's an optional
field. If the port number is included, then it must come between the host and path and
it should be separated from the host by a colon.
o Path: Path is the pathname of the file where the information is stored. The path itself
contain slashes that separate the directories from the subdirectories and files.

26. Illustrate Domain Name System(DNS).


DNS
An application layer protocol defines how the application processes running on different
systems, pass the messages to each other.
o DNS stands for Domain Name System.
o DNS is a directory service that provides a mapping between the name of a host on
the network and its numerical address.
o DNS is required for the functioning of the internet.
o DNS is a service that translates the domain name into IP addresses. This allows the
users of networks to utilize user-friendly names when looking for other hosts
instead of remembering the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50,
most people would reach this site by specifying ftp.EduSoft.com. Therefore, the
domain name is more reliable than IP address.
Working of DNS
o DNS is a client/server network communication protocol. DNS clients send requests
to the. server while DNS servers send responses to the client.
o Client requests contain a name which is converted into an IP address known as a
forward DNS lookups while requests containing an IP address which is converted
into a name known as reverse DNS lookups.
o DNS implements a distributed database to store the name of all the hosts available
on the internet.
o If a client like a web browser sends a request containing a hostname, then a piece of
software such as DNS resolver sends a request to the DNS server to obtain the IP
address of a hostname. If DNS server does not contain the IP address associated
with a hostname, then it forwards the request to another DNS server. If IP address
has arrived at the resolver, which in turn completes the request over the internet
protocol.

You might also like