Computer NW Short Answers Unit I and II
Computer NW Short Answers Unit I and II
Sc(Computer Science)
BSCCSCN 502: Computer Networks
UNIT - I
1. Define computer network.
A computer network is a group of interconnected computers that communicate with each
other to share resources and information.
2. What are the different uses of computer network?
The primary uses of computer networks are to facilitate communication, enable resource
sharing, provide remote access, and collaborate.
3. Expand VPN, RFID.
VPN- Virtual Private Network
RFID- Radio Frequency Identification
4. Expand GPS, NFC
GPS - Global Positioning System
NFC- Near-Field Communication
5. Expand DMCA, CAPTCHA.
DMCA- Digital Millennium Copyright Act
CAPTCHA- Completely Automated Public Turing test to tell Computers and Humans Apart
6. Expand WiMAX, NSP.
WiMAX- Worldwide Inter-operability for Microwave Access
NSP- Network Service Provider
7. What is CAPTCHA ?
A CAPTCHA test is designed to determine if an online user is really a human and not a bot.
CAPTCHA is an acronym that stands for "Completely Automated Public Turing test to tell
Computers and Humans Apart." Users often encounter CAPTCHA and reCAPTCHA tests on
the Internet.
8. Expand ARPANET, ICMP.
ARPANET - Advanced Research Projects Agency Network
ICMP - Internet Control Message Protocol
9. Expand SMTP, RTP
SMTP- Simple Mail Transfer Protocol
RTP - Real Time Transport Protocol
10. Expand HTTP, TELNET
HTTP- HyperText Transfer Protocol
TELNET - TErminaL NETwork.
11. Expand FTP, DNS.
FTP – File Transfer Protocol
DNS - Domain Name System
12. Expand TCP, UDP.
TCP - Transmission Control Protocol
UDP- User Datagram Protocol
13. Expand DSL, SONET
DSL - Digital Subscriber Line
1
SONET - Synchronous Optical NETwork.
14. Expand LAN, MAN, WAN.
LAN – Local Area Network
MAN – Metropolitan Area Network
WAN – Wide Area Network
15. Define NFC
NFC (near field communication) is the technology that allows two devices — like your phone
and a payments terminal — to talk to each other when they're close together. NFC is the
technology that enables contactless payments.
16. List out types of Network topologies.
Bus, Star, Ring, Mesh
17. What is Bus topology?
Bus topology is a type of network topology in which all devices are connected to a single cable
called a "bus." This cable serves as a shared communication medium, allowing all devices on the
network to receive the same signal simultaneously.
18. What is ring topology?
Ring topology is a type of network configuration where devices are connected in a circular
manner, forming a closed loop. In this setup, each device is connected to exactly two other
devices, creating a continuous pathway for data transmission.
19. What is star topology?
Star topology is a network topology in which each network component is physically connected
to a central node such as a router, hub or switch. In a star topology, the central hub acts like a
server and the connecting nodes act like clients.
20. What is peer-to-peer model?
A peer-to-peer (P2P) service is a decentralized platform whereby two individuals interact
directly with each other, without intermediation by a third party. Instead, the buyer and the
seller transact directly with each other via the P2P service.
21. What is client-server model?
The client-server model, or client-server architecture, is a distributed application framework
dividing tasks between servers and clients, which either reside in the same system or
communicate through a computer network or the Internet.
22. List the different forms of e-commerce.
Business-to-Business (B2B)
Business-to-Consumer (B2C)
Consumer-to-Business (C2B)
Consumer to Consumer (C2C)
Business to Administration (B2A)
Consumer-to-Administration (C2A)
23. What is profiling and phishing?
Network Profiling is a service that monitors the communication to the Virtual Machine, and
from the communication status provides reports that make unknown threats and latent risks
visible. Network Profiling is used via Service Interconnectivity.
Phishing is a technique for attempting to acquire sensitive data, such as bank account numbers,
through a fraudulent solicitation in email or on a web site,
24. What are the two types of transmission technology?
Broadcast Networks, Point-to-Point Networks.
2
25. What is unicasting and broadcasting?
Unicasting is a one-to-one communication model in which a single sender delivers data to a
single receiver.
Multicasting is a one-to-many communication model in which a single sender provides data
to several recipients.
26. What are static and dynamic allocation methods in computer network?
With a static approach, the channel's capacity is essentially divided into fixed portions; each
user is then allocated a portion for all time. If the user has no traffic to use in its portion, then
it goes unused.
With a dynamic approach the allocation of the channel changes based on the traffic generated
by the users.
27. What is communication subnet?
The dedicated processors and trunk circuits that are responsible for communication functions
in a distributed network is called communication subnet
28. List the components of subnet.
Subnetting divides an IP address into two parts, namely network address and host address.
Then, using the subnet mask technique, you can further divide the divided address into units
and assign them to various devices in a network.
29. What are routing and forwarding algorithm?
Network routing is the process of selecting a path across one or more networks. The
principles of routing can apply to any type of network, from telephone networks to public
transportation.
Forwarding algorithm is in charge of taking the path decided for each incoming packet: it
performs a lookup in the local information computed and stored by the routing algorithm; it
sends the outgoing packet along the best path.
30. What is addressing and flow control?
In Computer Network, an addressing or a network address is a unique address that is used to
uniquely identify each computer (host) connected in a network.
Flow control is a technique used to regulate data transfer between computers or other nodes in
a network. Flow control ensures that the transmitting device does not send more data to the
receiving device than it can handle.
31. Differentiate connection oriented and connectionless service.
Connection-oriented service is related to the telephone system. It includes connection
establishment and connection termination. In a connection-oriented service, the Handshake
method is used to establish the connection between sender and receiver.
Connection-less service is related to the postal system. It does not include any connection
establishment and connection termination. Connection-less Service does not give a
guarantee of reliability. In this, Packets do not follow the same path to reach their
destination.
32. What is store-and-forward switching and cut-through switching?
In the store-and-forward switching method, error checking is performed against the frame, and
any frame with errors is discarded. Store and forward switches receive an entire packet before
they begin sending any data at all.
With the cut-through switching method, no error checking is performed against the frame,
which makes forwarding the frame through the switch faster than store-and-forward switches.
Cut through switches can receive the first few bytes of a packet, decide which port(s) to send
it on, and then start sending out the packet while the rest of the packet is still being received
3
33. List the different service primitives.
Service generally includes set of various primitives. A primitive simply means Operations. A
Service is specified by set of primitives that are available and given to user or other various
entities to access the service. The different service primitives are
Indication
Request
Response
Confirm
34. What is service and protocol?
A service is a set of capabilities or operations that a particular layer provides to the
entities of its higher layer.
A protocol refers to a set of rules and conventions governing the format and
interpretation of different components of a frames, packets or messages by peer entities
within a layer. They specify how to initiate, maintain, and terminate a connection, how
to encode and decode data, how to handle errors and congestion, and how to ensure
security and reliability.
35. Differentiate OSI and TCP/IP reference model.
OSI stands for Open Systems Interconnection. It has 7 layers Physical layer, Data Link layer,
Network layer, Transport layer, Session layer, Presentation layer, and Application layer. Each
layer performs its task independently. It was developed in 1984 by the International
Organization for Standardization (ISO).
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It has 4 layers named as
Physical layer, Network layer, Transport layer, and Application layer. It also can be used as a
communications protocol in a private computer network. It was designed by Vint Cerf and Bob
Kahn in the 1970s.
4
UNIT – II
5
11. Draw side view of a single fiber.
TDM FDM
TDM works with digital signals as well FDM works with only analog
as analog signals. signals.
7
26. Differentiate circuit switching and packet switching.
Circuit Switching Packet Switching
The delay between data units in circuit The delay between data units in packet
switching is uniform. switching is not uniform.
Congestion can occur during the connection Congestion can occur during the data
establishment phase because there might be a transfer phase, a large number of
case where a request is being made for a packets comes in no time.
channel but the channel is already occupied.
8
Circuit Switching Packet Switching
between the source and the destination physical path between the source and
the destination
Circuit Switching does not support store and Packet Switching supports store and
forward transmission forward transmission
In-circuit switching each packet follows the In packet switching packets can follow
same route. any route.
Circuit switching requires simple protocols for Packet switching requires complex
delivery. protocols for delivery.
27. Write the various services offered by the data link layer to the networklayer.
Unacknowledged connectionless service − Here, the data link layer of the sending machine
sends independent frames to the data link layer of the receiving machine. The receiving
machine does not acknowledge receiving the frame. No logical connection is set up between
the host machines. Error and data loss is not handled in this service. This is applicable in
Ethernet services and voice communications.
Acknowledged connectionless service − Here, no logical connection is set up between the
host machines, but each frame sent by the source machine is acknowledged by the destination
machine on receiving. If the source does not receive the acknowledgment within a stipulated
time, then it resends the frame. This is used in Wifi (IEEE 802.11) services.
Acknowledged connection-oriented service − This is the best service that the data link
layer can offer to the network layer. A logical connection is set up between the two machines
and the data is transmitted along this logical path. The frames are numbered, that keeps track
of loss of frames and also ensures that frames are received in correct order. The service has
three distinct phases −
• Set up of connection – A logical path is set up between the source and the
destination machines. Buffers and counters are initialised to keep track of frames.
• Sending frames – The frames are transmitted.
• Release connection – The connection is released, buffers and other resources are
released.
10