NC 2marks pdf
NC 2marks pdf
Data communication involves the transfer of data between devices. Key components include:
• Medium: The physical path over which the message travels (e.g., cables, airwaves).
• Encoder/Decoder: Devices that convert data from one form to another for transmission and
reception.
• Mesh Topology: Devices are interconnected, providing multiple paths for data.
3. Protocols
Protocols are sets of rules and conventions that allow devices to communicate over a network. They
define how data is transmitted and received, ensuring reliable and efficient communication.
Examples include TCP/IP, HTTP, and FTP.
• ICMP (Internet Control Message Protocol): Used for error messages and operational
information (e.g., ping).
• SNMP (Simple Network Management Protocol): Used for network management and
monitoring.
• Guided Media: Includes twisted pair cables, coaxial cables, and fiber-optic cables.
• Transport Layer: Manages end-to-end communication and data integrity (e.g., TCP, UDP).
• Network Interface Layer: Manages physical data transmission over the network.
• Guided Media: Uses physical conduits like cables to transmit data. Examples include twisted
pair cables, coaxial cables, and fiber-optic cables.
• Unguided Media: Transmits data without physical means, using electromagnetic waves.
Examples include radio waves, microwaves, and infrared waves.
Switching involves directing data packets from a source to a destination within a network. Types of
switching:
• Packet Switching: Data is broken into packets that are routed independently (e.g., internet
communication).
UNIT -2
The data link layer is the second layer in the OSI model and is responsible for:
• Framing: Dividing the data stream into manageable units called frames.
• Error Detection and Correction: Identifying and correcting errors that may occur in the
physical layer.
• Flow Control: Ensuring that the sender does not overwhelm the receiver.
• Media Access Control: Regulating access to the physical transmission medium.
2. Types of Errors
• Parity Check
• Checksum
• Hamming Code
• Block Parity
CRC is an error-detecting code used to identify errors in digital data. It operates by dividing the data
by a predetermined polynomial and appending the remainder as the CRC code to the data. On
receipt, the data is re-verified to detect errors.
5. Receiver recalculates the sum, complements it, and verifies for errors.
• Allows the sender to send multiple frames before receiving acknowledgment (up to a
defined window size).
• Requires retransmission of all frames after an erroneous frame.
• Stop-and-Wait: The sender waits for an acknowledgment after sending each frame.
• Go-Back-N ARQ
• Ring Topology: Devices are connected in a circular fashion, with each device linked to two
others.
Usage Used in wired networks like Ethernet. Used in wireless networks like Wi-Fi.
Mechanism Listens to the medium while sending data. Reserves the channel before sending data.
ARP is a protocol used to map an IP address to its corresponding MAC address within a local
network. It operates at the network layer and facilitates communication between devices on the
same network. Key points:
• Dynamic Resolution: It dynamically resolves MAC addresses when the IP address is known.
• Broadcast-Based: ARP sends a broadcast to all devices in the network to discover the
intended MAC address.
The IP address is divided into five classes (A, B, C, D, and E), distinguished by their initial bits and
network sizes:
• Class B: For medium-sized networks; first two bits are 10 (128.0.0.0 to 191.255.255.255).
• Class C: For small networks; first three bits are 110 (192.0.0.0 to 223.255.255.255).
• Class D: Used for multicasting; first four bits are 1110 (224.0.0.0 to 239.255.255.255).
• Class E: Reserved for research; first four bits are 1111 (240.0.0.0 to 255.255.255.255).
Congestion in a network occurs when the demand for network resources exceeds the available
capacity, leading to performance degradation. Causes include:
5. What is Multicasting?
Multicasting is a communication method where data is sent from one source to multiple selected
destinations simultaneously. Key characteristics:
6. Define Masking
Masking involves using a subnet mask to extract the network and host portions of an IP address.
• Subnet Mask: A 32-bit number used to determine which part of an IP address is the network
and which is the host.
Feature ARP (Address Resolution Protocol) RARP (Reverse Address Resolution Protocol)
Used for devices within the same Used during device boot-up to obtain an IP
Usage network. address.
• Loop Prevention: Techniques like split horizon and hold-down timers prevent routing loops.
1. Static Routing: Routes are manually configured and do not change dynamically.
2. Dynamic Routing: Routes are updated automatically based on network changes. Examples:
ICMP is a network-layer protocol used for error reporting and diagnostics. Functions include:
• Error Reporting: Notifies sender about delivery issues (e.g., unreachable destinations).
• Diagnostics: Tools like ping and traceroute use ICMP to test connectivity and trace paths.
UNIT- 4
2. Process-Process Communication
QoS attributes ensure the performance, reliability, and efficiency of network communication. Key
attributes include:
• Latency: The time taken for data to travel from source to destination.
TCP is considered a reliable byte stream protocol because it ensures the complete and correct
delivery of data in the order it was sent. It uses:
• Data Transfer: The actual exchange of data between sender and receiver.
• Connection Termination: Using a four-way handshake (FIN, ACK, FIN, ACK) to close the
connection.
TCP state transition control involves the management of various states like LISTEN, SYN-SENT, SYN-
RECEIVED, ESTABLISHED, FIN-WAIT, TIME-WAIT, and CLOSED. The performance is measured by how
efficiently TCP handles these transitions, maintains connections, and ensures data reliability and
flow control.
Feature TCP
UDP
TCP provides reliability and ensures data integrity, while UDP offers faster data transmission with
less overhead but without the same level of reliability.
UNIT – 5
The Domain Name System (DNS) translates human-readable domain names (like
www.example.com) into IP addresses (like 192.0.2.1) that computers use to identify each other on
the network. This process allows users to access websites using easy-to-remember domain names
instead of numeric IP addresses.
• Top-Level Domains (TLDs): The highest level in the DNS hierarchy, such as .com, .org, .net,
and country-code TLDs like .uk or .jp.
• Second-Level Domains: Directly below TLDs, these are typically the names chosen by
organizations or individuals (e.g., example in example.com).
• Control Connection: This connection (usually on port 21) is used for sending commands and
receiving responses.
• Data Connection: This connection (usually on port 20) is used for transferring files between
the client and server. It is established when a file transfer command is issued.
• Server: Receives commands from the client, processes them, and returns responses. The
server also handles the actual file transfer via the data connection.
5. Function of SMTP
Simple Mail Transfer Protocol (SMTP) is used for sending and receiving email between servers. It
ensures that emails are correctly routed and delivered to their intended recipients.
Multipurpose Internet Mail Extensions (MIME) extends the capabilities of SMTP by allowing it to
handle different types of content, such as text, images, audio, and video. MIME encodes these types
of content into a format that can be safely transmitted via SMTP.
Post Office Protocol (POP) is used to retrieve emails from a mail server to a local client. POP allows
users to download their emails and read them offline, which is useful for managing email storage
and accessing messages without a constant internet connection.
• Static Documents: Fixed content that does not change unless manually updated (e.g., HTML
pages).
• Dynamic Documents: Content that changes based on user interactions or server processes
(e.g., PHP or ASP pages).
• Active Documents: Interactive content that can change in real-time without needing to
reload the page (e.g., JavaScript applications).
• Fully Qualified Domain Name (FQDN): A complete domain name that specifies its exact
location in the DNS hierarchy, including all higher-level domains (e.g., www.example.com.).
• Partially Qualified Domain Name (PQDN): A domain name that does not include all higher-
level domains, often relying on context or local DNS settings to resolve (e.g., www within the
example.com domain).
• Request Line: Includes the method (GET, POST, etc.), the resource requested (e.g.,
/index.html), and the HTTP version (e.g., HTTP/1.1).
• Headers: Key-value pairs that provide additional information about the request (e.g., Host:
www.example.com).
• Body (Optional): Contains data sent with the request, used primarily in POST or PUT
requests.