Networking Concepts 15 Completed
Networking Concepts 15 Completed
15 NETWORKING CONCEPTS
4. is the process of efficiently selecting a path in a network along which the data
5. Address refers to the unique physical address to each NIC card assigned by NIC
manufacture.
9. __is a phenomenon that connects the things (smart devices) to the internet over wired or
wireless connections.
a. FM b) RFID c) IoT d) AM
10. On a channel each interface serves as both transmitter and receiver but only
12. is host computer that requests for some services from a server
13. is a computer on the network that facilitate the sharing of data, software and
hardware resources
14. A work station that can be doubled up as a server and client is known as
a. Client b) server
16. A refers to a pre-decided set of rules using which all parties of a network
19. The networks spread across countries or on a very big geographical area
20. refers to all the legal and regulatory aspects of Internet and World Wide Web.
21. Server exclusively used for serving files related requests are called .
23. What does the ancronyn for MAN stands for ________
a) magnetic access network b) metropolitan area network
c) multi area network d) multi access network
24. What does the ancronym for LAN stands for _________
a) local area network b) large area network
c) list area network d) line area network
26. Which protocol handles the address part of each pocket to that it sends to the exact destination?
a) TCP b) HTTP c) IP d) PPP
27. Privately owned network are confined to a localized area called ______
a) LAN b) WAN c) CAN d) MAN
28. In which toplogy all computers are connected through single hub?
a) ring to pology b) mesh topology c) star topoplgy d) bustopology
40. Which of the following is an example for full duplex communication mode?
a) television broadcasting b) walkie – talkie
c) internet browing d) modern telephone system
6. Write the differences between simplex, half duplex, and full duplex?
a) Simplex:
1. The communication is uni-directional.
2. One of the communicating devices can only send data, where as the other can only receive it.
3. Communication is fast because full bandwidth of channel used for transmission.
b) Half duplex:
1. The communication is bi-directional.
2. Both devices can transmit data but not at the same time.
3. This requires a definite turn around time, during which the device changes from the receiving mode to
the transmitting mode.
4. Due to this delay, communication is slower.
c). Full duplex:
1. The communication is bi-directional.
2. Both devices capable of sending as well as receiving data at the same time.
3. The bandwidth of the wire for the data is divided into two channels for carrying data in either
direction.
4. Communication is faster.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
The physical layer: It is connected with transmitting raw bits over a communication channel.
Data link layer: It provides a reliable link between two directly connected nodes, by deleting and possibly
correcting errors that may occur in physical layer.
Network layer: It controls the operations of the subnet. The main function is to determine how
packets/datagram is routed from source to destination.
Transport layer: It keeps the track of all the segments and retransmits those that fail. It creates packets out of
the message received from the application layer.
Session layer: It controls the connection between computers. It establishes messages and terminates the
connections between the local and remote application.
Presentation layer: It is concerned with the syntax and semantics of the information transmitted, concerned
with moving bits among the layers.
Application layer: This layer functions typically include identifying communication partness, determining
resource availability and synchronizing communications.
TCP/IP model: TCP/IP protocols map to a four layer conceptual model known as the DARPA model.
Application
Transport
Network
interface
Internet
(Department of Defense Advanced Resources Projects Agency model).
Each layer in DARAP model corresponds to one or more layers of the seven layers OSI model.
Network Interface layer: It encompasses the data link and physical layers of the OSI model. It handles placing
TCP/IP packets on the network medium and receiving TCP/IP packets of the network medium.
Internet layer: It encompasses the network layer of OSI model. It handles addressing packing and routing
functions. The core protocols of the internet layer are IP, ARP, ICMP and IGMP.
IP: internet protocol ARP: Address Resolution protocol
ICMP: internet Control Message protocol IGMP: Internet group management protocol.
Transport layer: It encompasses the responsibilities of the OSI transport protocol. It handles providing the
application layer with session and datagram communication services. The core protocols are transmission
control protocol (TCP) and user datagram protocol (UDP).
Application layer: It allows the applications to access the services of the other layers and defines the protocols
that applications used to exchange data. Common protocols are HTTP, FTP etc.
a). In functioning of networks many devices play important roles few of them are
Modem: A device that converts digital signals to analog signals and vice-versa.
Workstations: All the user computers connected to a network are called workstations.
Network Interface card: A circuit board that controls the exchange of data over a network.
Bridge: A device that connects two LANs and controls data flow between them.
Repeater: A device used to boost the signal. Router: A device that works like a bridge but can handle different
protocols.
Switch: A device that provides a central connection point for cables form workstations, servers and
peripherals.
a). A topology is the actual appearance or layout of networking. Some of the most popular topologies are:
Bus Topology: The linear bus topology connects all the nodes to a single length of transmission medium. The
transmission of data will be in both directions.
Star Topology: In star network each node is connected directly to the central node by a single path. All
communications between nodes have to be passing through central node.
Ring topology: In a ring network all nodes are connected to a common cable and communication is always in
one direction. The data being transmitted is passed through each node in the ring.
Mesh: In this topology, each node is connected to more than one node to provide an alternative root in the
case the host is either down or too busy.
Tree topology: It consists of group of star configured workstations connected to a linear bus backbone cable.
8. Layer is to accept data from above layer and split it up into smaller units
9. IP stands for
a) Interconnection b) Independent
c) Interspace d) Internet
15. Server can be of types dedicated server and non – dedicated server
a) 2 b) 4 c) 3 d) 5
21. refer to the computer that are attached to a network and are seeking to
share the resource of the network.
22. is an application level protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information system.
29. A is a device that lets you link two similar type networks together
40. Wimax can provide broadband wireless access upto 30 miles for
41. are messages that a web server transmits to a web browser so that a web
server can keep track of the user’s activity on a specific web site.
42. The are malicious programmers who break into secure systems.
44. Wi – Fi refer
47. allow you to combine the power of your digital computer with the global
reach of the telephone system.
a) Wi – fi b) Chat c) VC d) Wi Max
52. The GSM standard for digital cell phones was established in Europe in the mid
a) 1960 b) 1975 c) 1980 d) 8019
a) G b) B c) M d) N
a) 2G b) 4G c) 3G d) 5G
57. In India the cyber laws are contained in the information technology act, 2000 which was
notified on October 2000.
a) 15 b) 17 c) 20 d) 10
58. virus use protocols and commands of computer network to spread themselves on
the network.
60. form of coaxial cable is thinner and it can have maximum segment
length of 185 meters.
63. The purpose of a is also sharing of the hardware and the software
resources among its users.
65. was the first protocol for relaying the IP packets over dial – up lines.
69. sharing provides sharing and grouping of data files over the network.
70. The layer is used to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.
1. d) Network
4. d) Physical layer
5. d) Application layer
6. a) Presentation
7. c) Network
8. a) Transport
9. a) Internet protocol
11. a) FTP
14. c) Interspace
15. a) 2
17. c) WANs
18. b) Network
19. d) Bus
20. c) Tree
21. b) Nodes
22. c) HTTP
23. a) IP
24. d) Session
28. b) Switch
29. d) Hub
34. c) Gateway
35. d) Hub
36. a) Repeater
38. d) 16 to 64kb
41. c) Cookies
42. a) Crackers
45. c) Wavelength
46. d) Laser
47. a) Modem
48. b) Gateway
49. a) WLL
50.
51.
52. c) 1980
53. a) G
54. d) 5G
57. b) 17
58. c) Network
59. a) Cloud Technology
60. d) Thinnet
61.
62. b) Tree
63. c) MAN
64. c) File
65. b) SLIP
66. d) Packet
68. a) TCP
69. c) Email
Page 26