0% found this document useful (0 votes)
150 views20 pages

UNIT 5 Final CN

This document provides answers to frequently asked questions about computer networking topics. It discusses File Transfer Protocol (FTP) and how it works to transfer files between hosts. It also differentiates between passive and active FTP. Other topics covered include Multipurpose Internet Mail Extension (MIME), Trivial File Transfer Protocol (TFTP), Domain Name System (DNS), electronic mail architecture and services, Telnet and how it allows remote login, mail access protocols like POP3, IMAP, and SMTP, and the Simple Network Management Protocol (SNMP).

Uploaded by

Shivam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views20 pages

UNIT 5 Final CN

This document provides answers to frequently asked questions about computer networking topics. It discusses File Transfer Protocol (FTP) and how it works to transfer files between hosts. It also differentiates between passive and active FTP. Other topics covered include Multipurpose Internet Mail Extension (MIME), Trivial File Transfer Protocol (TFTP), Domain Name System (DNS), electronic mail architecture and services, Telnet and how it allows remote login, mail access protocols like POP3, IMAP, and SMTP, and the Simple Network Management Protocol (SNMP).

Uploaded by

Shivam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

B.

TECH
COMPUTER SCIENCE ENGINEERING
MCA/ BCA/ Polytechnic CS/ B.Sc. IT/CS
(AKTU, Lucknow)
Dr. A.P.J. Abdul Kalam Technical University
University, Uttar Pradesh

SUBJECT – Computer Network


UNIT 5- MOST EXPECTED QUESTIONS AND ANSWERS

By Vishal Dhiman
Que 1.1. Write a short note on file transfer protocol.
AKTU 2013-14, Marks 2.5
AKTU 2015-16, 2017-18; Marks 05
Answer
1. FTP transmits the files from one host to another host .
2. FTP (File Transfer Protocol) is the simplest and most secure way to exchange files
over the internet. The most common use for FTP is to download files from the
internet.
3. FTP creates both a control and a data connection in order to transfer files.
4. Within an active FTP session, the control connection is established from the client
to the server, with the data connection established from the server to the client.
Que 1.2. How does FTP work? Differentiate between passive and active FTP.
AKTU 2016-17, Marks 10
Answer
Working of FTP:
1. The client FTP application opens a control connection to the server on destination
port 21, and specifies a source port as the source to which the FTP server should
respond (using TCP).
2. The FTP server responds on port 21.
3. The FTP server and client negotiate the data transfer parameters.
4. The FTP server opens a second connection on port 20 to the
original client.
5. The client responds on the data port, completing a TCP connection
6. Data transfer begins.
7. The server indicates the end of the data transfer.
8. Client closes the connection once the data is received.
9. The data connection is closed.
10. The FTP connection is closed.
Control
Connection
Difference between passive and active FTP:
S.No. Passive FTP Active FTP

1. Passive FTP does not provide security Active FTP provides more security to
to the FTP server. the FTP server.

2. Passive FTP does not have connection Active FTP may cause problems
issues from firewalls. because of firewalls
3. In passive FTP, the command channel In active FTP, client establishes the
and the data channel are established command channel and the server
by the client. establishes the data channel
4. Passive mode is used as a default Active mode is not used as a default
mode of a browser. mode of a browser.
Command and
control port

Data Port
Que 1.3. Write a short note on:

i. MIME
ii. TFTP
AKTU 2013-14, Marks 05
Answer
MIME:
1. The Multipurpose Internet Mail Extension (MIME) protocol was developed to
define a method of moving multimedia files through existing email gateways.
2. It offers a simple standardized way to represent and encode a wide variety of
media types, including audio and video for transmission via internet mail.
3. MIME, use to overcome from SMTP Limitations
SMTP – no audio , no video , no big size of data
TFTP:
1. The TFTP stand for Trivial File Transfer Protocol.
2. Mainly use for transfer files within a Local area network.
3. It makes UDP (User Datagram Protocol) connections.
4. Not use to transfer the files over the internet (through LAN Cable).
5. Its default port number is 69.
6. It is connectionless and speed fast.
7. It is not secure and It has no acknowledgement policy.
Que 1.4. Write a short note on DNS in the internet.
AKTU 2013-14, 2015-16, 2017-18; Marks 05
Answer
1. DNS Stands for “Domain Name System or Service”.
2. It is an automatic process that converts the Domain name to its corresponding IP
address (Number).
3. So That web browser can understand which web page you want to access on the
internet.
4. Example – Mobile Contact

www.ABC .com
Que 1.5. Explain about email architecture and services.
AKTU 2013-14, Marks 10
OR
Write a short note on electronic mail.
AKTU 2015-16, Marks 05
Answer
1. E-mail stands for Electronic mail.
2. E-mail is a private communication between two parties who have an account on
the internet.
3. It is an electronic message sent from the computer to another Computer.
4. Email messages are conveyed through email servers, It uses multiple protocols
within the TCP/IP.
5. For Example – SMTP, POP.

Structure of Email message.


Emails consist of two main parts :
1. Header : Header contains the name and address of the recipient.
2. Body of message. : Body contains the message itself.
Email address:
To send and receive mails, One need to have an e-mail address.
E-mail addresses consists of two parts:
1. User name – it is the name of a person’s account, which can be a actual name or
any name
2. Domain name: It is the location of the person’s account on the internet separated
by a (.) and then type of organization is mentioned.
3. For Example
User name @ Domain name
Here two parts are separated by “At” or @ symbol.
Que 1.6. Elaborate about Telnet and its working procedure.
AKTU 2016-17,
17, 2017-18;
2017 Marks 10
Answer
1. TELNET Stands for Tele Communication Network
2. This Protocol belongs to TCP/IP
3. It is used for remotely login into another remot
remote computer. That means to work
with any remote computer we have to login by using our user id and password
directly
4. For this purpose we use TELNET Protocol.
5. For Example : FACEBOOK LOGIN, INSTAGRAM and Other types of logins.
Working procedure:
1. Telnet uses software, installed on our computer, to create a connection with the
remote host.
2. The Telnet client (software), will send a request to the Telnet server (remote host)
when command is given.
3. The server will reply asking for a username and password.
4. If accepted, the Telnet client will establish a connection to the host, thus making
our computer a virtual terminal and provide a complete access to the host's
computer.
5. Telnet requires the use of a username and password, which means we need to
have previously set up an account on the remote computer.
Que 1.7.. Explain the two mail access protocols in brief:
a. POP3
b. IMAP
c. SMTP
AKTU 2013-14,
2013 Marks 10
Answer
a. POP3:
1. POP3 Stands for POST OFFICE
FFICE PROTOCOL VERSION 3.
2. SMTP holds the mail if destination computer is offline. Client internet with mail
server using POP3 to fetch it.
b. IMAP (Internet Message Access Protocol) :
1. IMAP was designed as a superset of POP3 and enhances both message retrieval
and management.
2. IMAP protocol will not automatically download all emails, each time email
program connects to email server.
3. The IMAP protocol allows us to see through em
email
ail messages at the email server
before we download them
4. With IMAP we can choose to download our messages or just delete
them.
c. SMTP (Simple Mail Transfer Protocol) :
1. The main function of text based SMTP protocol is to send emails.
2. It is used for sending message to a mail server for relaying.
3. It uses TCP (Transmission Control Protocol) to transfer message from client to
server.
4. SMTP uses port 25 for message transmission.
5. SMTP messages are read by humans. These messages are first stored and then
forwarded.
Que 1.8. Explain the SMTP can handle transfer of videos and images? Also explain the
advantages of IMAP4 over POP3 mail access protocols.
AKTU 2014-15, Marks 10
Answer:
SMTP cannot handle transfer of videos and images.
Advantages of IMAP4 over POP3:
1. In IMAP4, we can access our email from anywhere but in POP3 it is not possible.
2. In IMAP4 multiple users can connect to single mail box but POP3 can connect only
single user to mail box.
3. In IMAP4 an email does not need to be deleted multiple times, which can be a
problem in POP3.
Que 1.9. Write a short note on SNMP.
AKTU 2015-16, Marks 05
OR
Explain the SNMP protocols in detail.
AKTU 2016-17, Marks 15
AKTU 2017-18, Marks 10

Answer
1. The Simple Network Management Protocol (SNMP) is a framework for managing
devices in an internet using the TCP/IP protocol suite.
2. It provides a set of fundamental operations for monitoring and maintaining an
internet. SNMP uses the concept of manager and agent.
3. A manager is a host that controls and monitors a set of agents, usually routers.
4. The protocol is designed at the application level so that it can monitor devices
made by different manufacturers and installed on different physical networks.
5. SNMP frees management tasks from both the physical characteristics of the
managed devices and the underlying networking technology.
6. It can be used in a heterogeneous internet made of different LANs and WANs
connected by routers or gateways made by different manufacturers.
Que 1.11. What is the difference between an active web document and dynamic web
page? Also explain the role of CGI.
AKTU 2014-15, Marks 10
Answer

Active web document


An active web document is a document where the browser performs the logic instead
of the server.
Active web document are downloaded in client environment and then run.
It uses PHP as scripting language.

Dynamic web page


Dynamic web page is a page where server performs the logic instead of the browser.
Dynamic web page runs on the server and then the result is sent to the user.
It uses AJAX with JavaScript.

Role of CGI:
1. It helps to create and handle dynamic document.
2. It provides sets of standards for web document.
3. It acts as a gateway for accessing other resources such as database.
Que 1.12. Compare and contrast SMTP and HTTP.
Answer
S.no. SMTP HTTP

1. Message is transferred from client to Message transfer is from client to


server. server or the other way round

2. It uses TCP. It uses TCP.

3. It uses port 25 for transmission. It uses port 80 for transmission.

4. SMTP messages are to be read by HTTP messages are to be read and


humans. understood by the HTTP servers and
HTTP clients

5. These messages are first stored and These messages are immediately
then forwarded delivered

.
Que 1.13. Describe internet.
Answer
Internet:
1. The internet is a globally existing network of networks consisting of a huge
number of computers located in all the parts of the world.
2. All the computers connected to the internet are part of this huge network.
3. Networking is interconnection of computers. Generally the networking topologies
used for networking are star, bus, ring, etc.
4. When a limited number of computers are to be interconnected, the local area
network (LAN) is used. But in the internet the interconnection is achieved even via
satellites.
Que 1.14. Differentiate between X.25 and frame relay.
Answer
S.No. X.25 frame relay
1. X.25 networks work at speed up to Frame relay operates at higher speed of
64 kbps. 1.5 Mbps.

2. Frames are delivered more reliably Frames are delivered unreliably than
than frame relay. X.25.

3. Frames are delivered in order. Frames are not delivered in order.

4. Bad frames can be received back by Bad frames are discarded by frame
sending acknowledgement signal. relay

5. X.25 provides flow control. Frame relay does not provide flow
control.

You might also like