0% found this document useful (0 votes)
14 views

Computer Network

The document covers various concepts in computer networks, including definitions of key terms such as protocols, Ethernet, and routing. It explains functionalities of network layers, types of topologies, and differences between guided and unguided media. Additionally, it discusses error detection methods, transmission impairments, and the roles of devices like hubs, bridges, switches, routers, and gateways.

Uploaded by

Patel Bhagirath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Computer Network

The document covers various concepts in computer networks, including definitions of key terms such as protocols, Ethernet, and routing. It explains functionalities of network layers, types of topologies, and differences between guided and unguided media. Additionally, it discusses error detection methods, transmission impairments, and the roles of devices like hubs, bridges, switches, routers, and gateways.

Uploaded by

Patel Bhagirath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Computer Networks

Short Question
Communication between a computer and a keyboard
involves______________ transmission.
→ Simplex

Define Bit stuffing & Byte stuffing.


→Bit Stuffing: The process of adding extra bits to the data stream to
avoid ambiguity or flag conflicts in the communication.
Byte Stuffing: Adding special characters (escape sequences) to the
data stream to distinguish data from control information.

_________command is used to find the IP address of the


system.
→ ipconfig (Windows) or ifconfig/ip a (Linux/Unix).

Describe the term “bandwidth”.


→ The maximum rate of data transfer across a communication channel,
usually measured in bits per second (bps).

Assume that SNRdB = 36 and the channel bandwidth is 2


MHz. Calculate the capacity of channel?

Computer Networks

Define protocol.
→A set of rules and conventions used to enable communication between
devices in a network.

Define Ethernet.
→A networking technology for local area networks (LANs) that defines
wiring, signaling standards, and data transmission methods.

Define Routing.
→The process of determining the best path for data packets to travel
across a network from source to destination.

Give full form of WWW.


→World Wide Web

Differentiate HTTP and HTTPS



HTTP: Unsecured; data is transmitted as plain text.
HTTPS: Secured using SSL/TLS, encrypting the data in transit.

List any two transport layer service.


→ - Reliable data transfer (e.g., TCP).
- Multiplexing and demultiplexing.

What is Internetworking?
→Connecting multiple networks to form a single large network using
routers and gateways.
Computer Networks

Give full form of ATM and FTP


→ - ATM: Asynchronous Transfer Mode
- FTP: File Transfer Protocol

The switch needs _ _address to forward the data


→The switch needs MAC address to forward the data.

In an OSI model architecture which layer transmits the


error-free frames?
→ Datalink

In the TCP/IP protocol suite, which of the following is a


transport layer protocol?
→ Transmission Control Protocol (TCP)

Which port number is used by FTP data.


→20

The default connection type used by HTTP is


→Persistent (Keep-Alive)

Which layer in OSI model is responsible for process to


process delivery?
→ Transport Layer

Find the error if any in the given IPv4 address:


75.52.301.14
Computer Networks

→ The third octet (301) is invalid because the range for each octet in
IPv4 is 0–255.

What is the size of IPvo address?


→32 bits (4 bytes)

What is the header length in port number?


→Port numbers are part of the transport layer headers, occupying 16
bits (2 bytes).

Long Question

List out functionalities of Data link layer and explain in


brief.
→Functionalities of Data Link Layer
The Data Link Layer (Layer 2) in the OSI model provides the following
functionalities:
1. Framing: Divides the data received from the network layer into
frames for easier transmission.
2. Error Control: Detects and corrects errors that may occur during
transmission.
3. Flow Control: Ensures that the sender does not overwhelm the
receiver with data.
4. Access Control: Determines which device has control over the
communication channel in a shared network.
5. Physical Addressing: Adds physical addresses (MAC addresses)
to frames to identify sender and receiver.
Computer Networks

What is topology in computer network? List out types of


topologies and explain any two with neat diagram.
→Topology refers to the arrangement of nodes and links in a computer
network.
Types of Topologies:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

Star Topology
In this topology, all devices are connected to a central hub or switch.
• Advantages: Easy to manage, fault isolation, and scalable.
• Disadvantages: Failure of the hub causes the entire network to
fail.

Ring Topology
In this topology, each node is connected to two other nodes, forming a
closed loop.
• Advantages: Simple to implement, predictable performance.
• Disadvantages: Failure in any node disrupts the entire network.

Differentiate between guided media and unguided media.


What are the advantages and advantages of Fiber Optic
Cable over other guided media?

Computer Networks

Feature Guided Media Unguided Media


Transmission Mode Cables, Wires Wireless
Example Twisted-pair, Coaxial, Radio waves,
Fiber Optics Microwaves,Infrared
waves
Interference Low interefence High interference

Advantages of Fiber Optic Cable:


1. High Bandwidth: Supports higher data transfer rates.
2. Low Attenuation: Minimal signal loss over long distances.
3. Immunity to EMI: Resistant to electromagnetic interference.
Disadvantages of Fiber Optic Cable:
1. Cost: Expensive compared to other guided media.
2. Installation: Requires specialized equipment and skills.

Differentiate between Synchronous transmission and


Asynchronous Transmission.

Computer Networks

List and explain three different types of transmission


impairment.
→ Attenuation: Signal strength decreases over distance.
Noise: Unwanted signals that distort the data, such as thermal noise.
Delay Distortion: Different frequency components of a signal arrive at
different times.

Explain CRC for the data word: 1001, Divisor: 1011.How


the receiver will detect error if the code word changesS to
1000110 during the transmission.
→CRC Example
Given: Dataword = 1001, Divisor = 1011
Steps:
1. Append 3 zeros (degree of divisor - 1) to dataword: 1001000.
2. Perform binary division of 1001000 by 1011 to get the remainder.
3. Append the remainder to the original dataword to create the
codeword.
Error Detection:
• If the received codeword 1000110 is divided by 1011 and the
remainder is non-zero, an error is detected.

Distinguish between synchronous and statistical TDM.



Features Synchronous Statistical TDM
Channel Fixed Time slots Dynamic Allocation
Efficiency Low if slots are High due to dynamic
unused allocation

Explain optical fiber over twisted-pair and coaxial cable


with a diagram.
Computer Networks

→ Advantages: Higher bandwidth, less signal degradation, better


security.
Disadvantages: Higher cost, complex installation.
Diagram:
• Optical fiber: Thin glass/plastic core carrying light signals.
• Twisted-pair and coaxial cables use electrical signals for data
transfer.

The attenuation of a signal is -10 dB. What is the final


signal power if it was originally 5 W?

List out some of the applications of UDP


→UDP (User Datagram Protocol) is widely used in applications where
low latency is crucial and error correction is not the primary focus.
Examples include:
1. Video Streaming: Real-time video/audio applications like YouTube
and Netflix.
2. Online Gaming: Multiplayer games require minimal delay.
3. DNS (Domain Name System): For quick query resolution.
4. VoIP (Voice over IP): Applications like Skype.
5. Broadcast and Multicast Services: Used in systems requiring
data distribution to multiple clients.
A network using CSMA/CD has a bandwidth of 10 Mbps. If
the maximum Propagation time (including the delays in
the devices and ignoring the time needed to send a
Computer Networks

jamming signal, as we see later) is 25.6 us, what is the


minimum size of the frame?
→ To ensure proper collision detection in CSMA/CD, the frame
transmission time must be at least twice the propagation delay.

The following is the content of a UDP header in the


hexadecimal format:

CB84000D001C001C

a. What is the source port number?

b. What is the destination port number?

c. What is the length of the user datagram?

d. What is the length of the data?


→ Given Header: CB84000D001C001C
Each field in the UDP header is 16 bits:
Field Hex Decimal
Source Port CB84 52100
Destination Port 000D 13
Length 001C 28
Checksum 001C N/A
Computer Networks

a. Source Port Number: 52100


b. Destination Port Number: 13
c. Length of User Datagram: 28 bytes
d. Length of Data: Length - Header Size = 28 - 8 = 20 bytes

Explain DNS and its important


→DNS (Domain Name System) and Its Importance
Definition: DNS translates human-readable domain names (e.g.,
www.google.com) into IP addresses (e.g., 142.250.190.46) that
computers can use to communicate.
Importance:
1. Ease of Use: Users don’t need to remember complex IP
addresses.
2. Scalability: Handles millions of domain names efficiently.
3. Redundancy: Ensures high availability with distributed servers.
4. Flexibility: Supports dynamic updates for changing IP addresses.

Explain functionality of Hub, Bridge, Switch, Router and


Gateway

- Hub
Simple device that broadcasts data to all connected devices. No
intelligence; operates at the physical layer.

- Bridge
Connects and filters traffic between two network segments.
Operates at the data link layer.

- Switch
Smart device that forwards data only to the intended recipient
using MAC addresses. Operates at the data link layer.
Computer Networks

- Router
Connects different networks and forwards data packets based on
IP addresses. Operates at the network layer.
- Gateway
Acts as a translator between two different network protocols, e.g.,
converting IPX to TCP/IP. Operates at multiple layers as needed.

Write a short note on DNS.


→The Domain Name System (DNS) is the backbone of the internet,
responsible for translating human-friendly domain names into IP
addresses.
• Hierarchy: DNS operates using a hierarchical structure with root
servers, TLD servers, and authoritative servers.
• Components:
o Resolvers: Handle client requests.
o Root Servers: Top-level servers directing queries to TLD
servers.
o TLD Servers: Handle top-level domains like .com, .org.
o Authoritative Servers: Store specific domain records.
Applications: Web browsing, email routing, and other internet services.

Difference between Switch and Router

You might also like