0% found this document useful (0 votes)
6 views

Computer Networks Model 2

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Computer Networks Model 2

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Computer Networks

Model Question 2

Each Questions carries 2 Marks.

1. State the advantages and disadvantages of mesh topology.


2. What is TELNET?
3. Define voice, attenuation, distortion.
4. What is parity checking?
5. Define bit stuffing.
6. Explain the message format of ICMP.
7. What is Unicast routing?
8. Mention the advantage of TCP
9. What is file sharing and file transfer?
10. Abbreviate FTP, SMTP, TCP, RIP.

Each question carries 6 marks.

11. Differentiate between centralized and decentralized network layout.


12. Explain TCP/IP architecture.
13. Derive Shannon channel capacity for noisy channel.
14. Define the backward and forward error correction.
15. Write a note on CSMA.

Each question carries 8 marks.

16.
(a) Differentiate between centralized and decentralized network layout.
(b) Expand the terms MTU, ICMP, TCP, UDP, SMTP, FTP and DNS.
17.
(a) What is micro wave transmission? Explain its features.
(b) Explain the message format of ICMP.

18.
(a) What are the services provided backbone service provider?
(b) Differentiate link state and distance vector routing.

19.
(a) Discuss flow control and error control.
(b) What is congestion?

20.
(a) What is client and server program?
(b) Mention any three function of application layer.
1.
Advantages and Disadvantages of Mesh Topology:
 Advantages:
 Reliability: Redundant paths ensure network reliability.
 Scalability: Easily scalable by adding more devices.
 Security: Data can take multiple routes, enhancing security.
 Disadvantages:
 Cost: Expensive to implement due to the high number of connections.
 Complexity: Installation and maintenance can be complex.
 Cabling: Requires a significant amount of cabling.
2. What is TELNET:
 Definition: TELNET (Telecommunication Network) is a protocol that allows a
user to log into a remote computer over a network, providing terminal
emulation. It operates on port 23.
3. Define Voice, Attenuation, Distortion:
 Voice: Analog or digital signals representing spoken language.
 Attenuation: The reduction in signal strength as it travels through a medium
(e.g., cables or fibers).
 Distortion: Any undesirable alteration in the signal waveform during
transmission.
4. What is Parity Checking:
 Definition: Parity checking is an error-detection method where a parity bit is
added to a binary code to ensure that the total number of ones in the code
(including the parity bit) is either even (even parity) or odd (odd parity).
5. Define Bit Stuffing:
 Definition: Bit stuffing is a technique used in data framing where extra bits
are inserted into the data stream to prevent the occurrence of specific
patterns that might be mistaken for flags or control characters.
6. Explain the Message Format of ICMP:
 Message Format:
 ICMP messages consist of a header and data.
 Common types include Echo Request and Echo Reply for ping.
 The header includes type, code, checksum, and additional information.
 ICMP is often used for error reporting and network diagnostics.
7. What is Unicast Routing:
 Definition: Unicast routing is a network routing technique where data is
transmitted from one sender to one specific receiver. It is the most common
type of routing in IP networks.
8. Mention the Advantage of TCP:
 Advantage: TCP (Transmission Control Protocol) provides reliable,
connection-oriented communication, ensuring data integrity, error detection,
and reliable data delivery.
9. What is File Sharing and File Transfer:
 File Sharing: Allows multiple users to access and use the same files or
resources on a network.
 File Transfer: The process of moving files from one location to another, often
involving copying or moving data between devices or systems.
10. Abbreviate FTP, SMTP, TCP, RIP:
 FTP: File Transfer Protocol
 SMTP: Simple Mail Transfer Protocol
 TCP: Transmission Control Protocol
 RIP: Routing Information Protocol

11. Differentiate between centralized and decentralized network layout:

 Centralized Network Layout:


 Characteristics:
 All network resources, data, and control are concentrated in a central
hub or server.
 Client devices depend on the central server for data processing and
control.
 Advantages:
 Centralized management simplifies administration and security
measures.
 Easier implementation of uniform policies and updates.
 Disadvantages:
 Single point of failure (the central server), leading to network
downtime.
 Scalability issues as the network grows.
 Decentralized Network Layout:
 Characteristics:
 Resources and control are distributed across multiple nodes in the
network.
 Each node can operate independently, with less reliance on a central
server.
 Advantages:
 Improved fault tolerance and reliability due to distributed resources.
 Scalability as additional nodes can be added without a central
bottleneck.
 Disadvantages:
 Complexity in management and coordination.
 Challenges in enforcing uniform policies and updates.

12. Explain TCP/IP architecture:

 TCP/IP Architecture:
 Layers:
1. Application Layer: Provides network services directly to end-users or
applications.
2. Transport Layer: Ensures reliable data transfer between devices (TCP)
or connectionless communication (UDP).
3. Internet Layer: Handles packet addressing and routing, including IP.
4. Link Layer: Manages physical connections and access to the network
medium.
 Protocols:
 HTTP, HTTPS (Application Layer): Web browsing.
 TCP (Transport Layer): Reliable, connection-oriented communication.
 IP (Internet Layer): Routing and addressing.
 Ethernet, Wi-Fi (Link Layer): Physical network connections.
 Example:
 A user accessing a website involves HTTP (Application), TCP
(Transport), IP (Internet), and Ethernet or Wi-Fi (Link) layers.

13. Derive Shannon channel capacity for a noisy channel:

 Shannon Channel Capacity Formula:


 C = B * log2(1 + S/N)
 C: Channel capacity (bps)
 B: Bandwidth of the channel (Hz)
 S: Signal power
 N: Noise power

14. Define Backward and Forward Error Correction:

 Backward Error Correction (BEC):


 Definition: In BEC, the receiver detects errors and requests the sender to
retransmit the entire data block.
 Example: Automatic Repeat reQuest (ARQ) protocols like Stop-and-Wait.
 Forward Error Correction (FEC):
 Definition: In FEC, additional error-correcting codes are sent along with the
data, allowing the receiver to correct errors without requesting
retransmission.
 Example: Reed-Solomon codes used in CDs and DVDs.

15. Write a note on CSMA:

 CSMA (Carrier Sense Multiple Access):


 Principle:
 Devices listen to the network to check for carrier signals before
transmitting data.
 A device waits for an idle channel and transmits if no other
transmission is detected.
 Types:
 CSMA: Basic CSMA without collision detection.
 CSMA/CD (Collision Detection): Used in Ethernet networks. Devices
detect collisions and take corrective actions.
 CSMA/CA (Collision Avoidance): Used in Wi-Fi networks. Devices try
to avoid collisions before they occur.
 Advantages:
 Simple and widely used in Ethernet and Wi-Fi networks.
 Efficient use of available bandwidth.
 Disadvantages:
 Susceptible to collisions, especially in high-traffic environments.
 Performance degrades as the network size increases.

16. (a) Differentiate between centralized and decentralized network layout:

 Centralized Network Layout:


 Characteristics:
 All network resources, data, and control are concentrated in a central
hub or server.
 Client devices depend on the central server for data processing and
control.
 Advantages:
 Centralized management simplifies administration and security
measures.
 Easier implementation of uniform policies and updates.
 Disadvantages:
 Single point of failure (the central server), leading to network
downtime.
 Scalability issues as the network grows.
 Decentralized Network Layout:
 Characteristics:
 Resources and control are distributed across multiple nodes in the
network.
 Each node can operate independently, with less reliance on a central
server.
 Advantages:
 Improved fault tolerance and reliability due to distributed resources.
 Scalability as additional nodes can be added without a central
bottleneck.
 Disadvantages:
 Complexity in management and coordination.
 Challenges in enforcing uniform policies and updates.

16. (b) Expand the terms MTU, ICMP, TCP, UDP, SMTP, FTP, and DNS:

 MTU: Maximum Transmission Unit


 ICMP: Internet Control Message Protocol
 TCP: Transmission Control Protocol
 UDP: User Datagram Protocol
 SMTP: Simple Mail Transfer Protocol
 FTP: File Transfer Protocol
 DNS: Domain Name System

17. (a) What is microwave transmission? Explain its features:

 Microwave Transmission:
 Definition: Uses radio waves with short wavelengths to transmit data
between two locations without the need for physical cables.
 Features:
 Frequency Range: Typically operates in the range of 1 to 300 GHz.
 Line-of-Sight: Requires a clear line of sight between transmitting and
receiving antennas.
 High Frequency Reuse: Allows multiple frequency bands for parallel
transmission.
 Speed: Offers high data transfer rates.

17. (b) Explain the message format of ICMP:

 Message Format:
 ICMP messages consist of a header and data.
 Common types include Echo Request and Echo Reply for ping.
 The header includes type, code, checksum, and additional information.
 ICMP is often used for error reporting and network diagnostics.

18. (a) What are the services provided by a backbone service provider?

 Services Provided by Backbone Service Provider:


 High-speed data transmission over a wide area.
 Connectivity between different regions or countries.
 Redundancy and reliability in network infrastructure.
 Support for various network protocols and technologies.
 Scalability to handle increasing data traffic.
 Interconnection with other backbone providers for global reach.

18. (b) Differentiate link-state and distance-vector routing:

 Link-State Routing:
 Information Exchange: Routers exchange information about the state of
their links.
 Routing Table: Each router constructs a detailed map of the network.
 Algorithm: Uses Dijkstra's algorithm to find the shortest path.
 Example: OSPF (Open Shortest Path First).
 Distance-Vector Routing:
 Information Exchange: Routers periodically exchange their routing tables
with neighboring routers.
 Routing Table: Contains information about the distance (cost) and next-hop
to reach each destination.
 Algorithm: Uses the Bellman-Ford algorithm for path determination.
 Example: RIP (Routing Information Protocol).

19. (a) Discuss flow control and error control:

 Flow Control:
 Purpose: Regulates the rate of data transmission to prevent congestion and
ensure efficient communication.
 Techniques: Stop-and-Wait, Sliding Window.
 Error Control:
 Purpose: Detects and corrects errors that may occur during data
transmission.
 Techniques: Parity checking, CRC (Cyclic Redundancy Check), Forward Error
Correction (FEC).

19. (b) What is congestion?

 Congestion:
 Definition: Occurs when network resources are overloaded, leading to a
degradation in performance.
 Causes: High data traffic, insufficient bandwidth, network bottlenecks.
 Effects: Increased packet loss, delays, reduced throughput.
 Control Techniques: Traffic shaping, prioritization, congestion avoidance
algorithms.
20. (a) What is a client and server program?
 Client Program:
 Definition: Software that initiates requests and interacts with the user.
 Functionality: Requests services or resources from a server.
 Example: Web browsers, email clients.
 Server Program:
 Definition: Software that listens for and responds to requests from clients.
 Functionality: Provides services or resources to clients.
 Example: Web servers, email servers.

20. (b) Mention any three functions of the application layer:

 Functions of the Application Layer:


1. Communication Services:
 Providing network services directly to end-users or applications.
 Examples include HTTP (Hypertext Transfer Protocol) for web
browsing, FTP (File Transfer Protocol) for file transfer, and SMTP
(Simple Mail Transfer Protocol) for email communication.
2. Network Virtual Terminal:
 Defining the characteristics of the virtual terminal used for
communication between networked devices.
 Ensures compatibility between different types of terminals.
3. File Transfer, Management, and Access:
 Enabling users to transfer files between devices, manage file systems,
and access remote files.
 Protocols like FTP and NFS (Network File System) operate at this layer.

You might also like