Computer Networks Model 2
Computer Networks Model 2
Model Question 2
16.
(a) Differentiate between centralized and decentralized network layout.
(b) Expand the terms MTU, ICMP, TCP, UDP, SMTP, FTP and DNS.
17.
(a) What is micro wave transmission? Explain its features.
(b) Explain the message format of ICMP.
18.
(a) What are the services provided backbone service provider?
(b) Differentiate link state and distance vector routing.
19.
(a) Discuss flow control and error control.
(b) What is congestion?
20.
(a) What is client and server program?
(b) Mention any three function of application layer.
1.
Advantages and Disadvantages of Mesh Topology:
Advantages:
Reliability: Redundant paths ensure network reliability.
Scalability: Easily scalable by adding more devices.
Security: Data can take multiple routes, enhancing security.
Disadvantages:
Cost: Expensive to implement due to the high number of connections.
Complexity: Installation and maintenance can be complex.
Cabling: Requires a significant amount of cabling.
2. What is TELNET:
Definition: TELNET (Telecommunication Network) is a protocol that allows a
user to log into a remote computer over a network, providing terminal
emulation. It operates on port 23.
3. Define Voice, Attenuation, Distortion:
Voice: Analog or digital signals representing spoken language.
Attenuation: The reduction in signal strength as it travels through a medium
(e.g., cables or fibers).
Distortion: Any undesirable alteration in the signal waveform during
transmission.
4. What is Parity Checking:
Definition: Parity checking is an error-detection method where a parity bit is
added to a binary code to ensure that the total number of ones in the code
(including the parity bit) is either even (even parity) or odd (odd parity).
5. Define Bit Stuffing:
Definition: Bit stuffing is a technique used in data framing where extra bits
are inserted into the data stream to prevent the occurrence of specific
patterns that might be mistaken for flags or control characters.
6. Explain the Message Format of ICMP:
Message Format:
ICMP messages consist of a header and data.
Common types include Echo Request and Echo Reply for ping.
The header includes type, code, checksum, and additional information.
ICMP is often used for error reporting and network diagnostics.
7. What is Unicast Routing:
Definition: Unicast routing is a network routing technique where data is
transmitted from one sender to one specific receiver. It is the most common
type of routing in IP networks.
8. Mention the Advantage of TCP:
Advantage: TCP (Transmission Control Protocol) provides reliable,
connection-oriented communication, ensuring data integrity, error detection,
and reliable data delivery.
9. What is File Sharing and File Transfer:
File Sharing: Allows multiple users to access and use the same files or
resources on a network.
File Transfer: The process of moving files from one location to another, often
involving copying or moving data between devices or systems.
10. Abbreviate FTP, SMTP, TCP, RIP:
FTP: File Transfer Protocol
SMTP: Simple Mail Transfer Protocol
TCP: Transmission Control Protocol
RIP: Routing Information Protocol
TCP/IP Architecture:
Layers:
1. Application Layer: Provides network services directly to end-users or
applications.
2. Transport Layer: Ensures reliable data transfer between devices (TCP)
or connectionless communication (UDP).
3. Internet Layer: Handles packet addressing and routing, including IP.
4. Link Layer: Manages physical connections and access to the network
medium.
Protocols:
HTTP, HTTPS (Application Layer): Web browsing.
TCP (Transport Layer): Reliable, connection-oriented communication.
IP (Internet Layer): Routing and addressing.
Ethernet, Wi-Fi (Link Layer): Physical network connections.
Example:
A user accessing a website involves HTTP (Application), TCP
(Transport), IP (Internet), and Ethernet or Wi-Fi (Link) layers.
16. (b) Expand the terms MTU, ICMP, TCP, UDP, SMTP, FTP, and DNS:
Microwave Transmission:
Definition: Uses radio waves with short wavelengths to transmit data
between two locations without the need for physical cables.
Features:
Frequency Range: Typically operates in the range of 1 to 300 GHz.
Line-of-Sight: Requires a clear line of sight between transmitting and
receiving antennas.
High Frequency Reuse: Allows multiple frequency bands for parallel
transmission.
Speed: Offers high data transfer rates.
Message Format:
ICMP messages consist of a header and data.
Common types include Echo Request and Echo Reply for ping.
The header includes type, code, checksum, and additional information.
ICMP is often used for error reporting and network diagnostics.
18. (a) What are the services provided by a backbone service provider?
Link-State Routing:
Information Exchange: Routers exchange information about the state of
their links.
Routing Table: Each router constructs a detailed map of the network.
Algorithm: Uses Dijkstra's algorithm to find the shortest path.
Example: OSPF (Open Shortest Path First).
Distance-Vector Routing:
Information Exchange: Routers periodically exchange their routing tables
with neighboring routers.
Routing Table: Contains information about the distance (cost) and next-hop
to reach each destination.
Algorithm: Uses the Bellman-Ford algorithm for path determination.
Example: RIP (Routing Information Protocol).
Flow Control:
Purpose: Regulates the rate of data transmission to prevent congestion and
ensure efficient communication.
Techniques: Stop-and-Wait, Sliding Window.
Error Control:
Purpose: Detects and corrects errors that may occur during data
transmission.
Techniques: Parity checking, CRC (Cyclic Redundancy Check), Forward Error
Correction (FEC).
Congestion:
Definition: Occurs when network resources are overloaded, leading to a
degradation in performance.
Causes: High data traffic, insufficient bandwidth, network bottlenecks.
Effects: Increased packet loss, delays, reduced throughput.
Control Techniques: Traffic shaping, prioritization, congestion avoidance
algorithms.
20. (a) What is a client and server program?
Client Program:
Definition: Software that initiates requests and interacts with the user.
Functionality: Requests services or resources from a server.
Example: Web browsers, email clients.
Server Program:
Definition: Software that listens for and responds to requests from clients.
Functionality: Provides services or resources to clients.
Example: Web servers, email servers.