Computer Networks
Computer Networks
1. What is network? What are the three criteria necessary for an effective and efficient
network?
Network is a connected group of autonomous computers that are abided by some rules and also
where functionality is shared.
The most important criteria are performance, reliability and security.
Performance of the network depends on number of users, type of transmission medium, and the
capabilities of the connected h/w and the efficiency of the s/w.
Reliability is measured by frequency of failure, the time it takes a link to recover from the failure and
the network's robustness in a catastrophe.
Security issues include protecting data from unauthorized access and viruses.
3. What are the three fundamental characteristics determine the effectiveness of the data
communication system?
The effectiveness of the data communication system depends on three fundamental characteristics:
Delivery: The system must deliver data to the correct destination.
Accuracy: The system must deliver data accurately.
Timeliness: The system must deliver data in a timely manner.
6. What are some of the factors that determine whether a communication system is a LAN,
MAN, or WAN?
Size, Ownership, the distance it covers and its physical structure
1
8. For n devices in a network, what is the number of cable links required for a mesh and ring
topology?
Mesh topology - n (n-1)/2
Ring topology - n
11. Assume 6 devices are arranged in a mesh topology. How many cables are needed? How many
ports are needed for each device?
Number of cables=n (n-1)/2=6(6-1)/2=15
Number of ports per device=n-1=6-1=5
13. What are header and trailers and how do they get added and removed?
Each layer in the sending machine adds its own information to the message it receives from the
layer just above it and passes the whole package to the layer just below it. This information is added in
the form of headers or trailers. Headers are added to the message at the layers 6,5,4,3, and 2. A trailer is
added at layer2. At the receiving machine, the headers or trailers attached to the data unit at the
corresponding sending layers are removed, and actions appropriate to that layer are taken.
14. The transport layer creates a communication between the source and destination. What are
the three events involved in a connection?
Creating a connection involves three steps: connection establishment, data transfer and connection
release.
17. What are the functions of a DTE? What are the functions of a DCE?
Data terminal equipment is a device that is an information source or an information sink. It is
connected to a network through a DCE.
2
Data circuit-terminating equipment is a device used as an interface between a DTE and a network.
19. Discuss the mode for propagating light along optical channels.
There are two modes for propagating light along optical channels, multimode and single mode.
Multimode: Multiple beams from a light source move through the core in different paths.
Single mode: Fiber with extremely small diameter that limits beams to a few angles, resulting in an
almost horizontal beam.
21. How are the guided media differing from unguided transmission media?
Guided transmission media Unguided transmission media
1. Guided indicate, medium is contained 1.Unguided medium does not have any
within physical boundary Physical boundary
2. Transmission takes place through wire. 2. It is a wireless transmission.
3
16 Mark Questions
Communication model
Communication tasks
Classification of communication network
4
UNIT II DATA LINK LAYER
Two Mark Questions
4. What is redundancy?
It is the error detecting mechanism, which means a shorter group of bits or extra bits may
be appended at the destination of each unit.
6
19. What is a buffer?
Each receiving device has a block of memory called a buffer, reserved for storing incoming data
until they are processed.
22. Mention the advantage and disadvantage of stop and wait flow control.
Advantage: simplicity
Disadvantage: inefficiency.
38. List the most command kinds of Base band 802.3 LAN.
a) 10 Base 5 b) 10 Base 2 c) 10 Base T d) 1 Base 5 e) 100 Base T
16 Mark Questions
9
4. Explain the timers and time registers in FDDI.
Time registers
Synchronous allocation(SA)
Target token rotation time(TTRT)
Absolute maximum time(AMT)
Timers
Token rotation timer(TRT) Token holding timer(THT)
6. Explain the frame format for token ring and token bus.
Access method: Token passing
Priority and reservation
Time limits
Monitor stations
10
UNIT III NETWORK LAYER
6. What are headers and trailers and how do they get added and removed?
The control data added to the beginning of a data is called headers. The control data added to
the end of a data is called trailers. At the sending machine, when the message passes through the
layers each layer adds the headers or trailers. At the receiving machine, each layer removes the data
meant for it and passes the rest to the next layer.
11
9. What are data grams?
In datagram approach, each packet is treated independently from all others. Even when one
packet represents just a place of a multipacket transmission, the network treats it although it existed
alone. Packets in this technology are referred to as datagram.
10. What are the two types of implementation formats in virtual circuits?
Virtual circuit transmission is implemented in 2 formats.
• Switched virtual circuit
• Permanent virtual circuit.
11. What is meant by switched virtual circuit?
Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching.
In this method, a virtual circuit is created whenever it is needed and exits only for the duration of
specific exchange.
18. Write the keys for understanding the distance vector routing.
The three keys for understanding the algorithm are
• Knowledge about the whole networks
• Routing only to neighbors
• Information sharing at regular intervals
12
19. Write the keys for understanding the link state routing.
The three keys for understanding the algorithm are
• Knowledge about the neighborhood.
• Routing to all neighbors.
• Information sharing when there is a range.
20. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state routing, cost is
a weighted value based on a variety of factors such as security levels, traffic or the state of the link.
16 Mark Questions
3. Define routing & explain distance vector routing and link state routing.
Distance vector routing
Sharing information
Routing table
Creating the table
Updating the table
Updating algorithm
Link state routing
Information sharing
Packet cost
Link state packet
Getting information about neighbors
Initialization
Link state database
14
4. Define bridge and explain the type of bridges.
Bridges
Types of bridges
Simple bridge
Multiport bridge
Transparent bridge
5. Explain subnetting
Subnetting
Three levels of hierarchy
Masking
Masks without subnetting
Masks with subnetting
Finding the subnetwork address
Boundary level masking
Non-boundary level masking
15
UNIT IV TRANSPORT LAYER
Two Mark Questions
3. What is the difference between network layer delivery and the transport
layer delivery?
The network layer is responsible for the source-to-destination delivery of packet across multiple
network links.
The transport layer is responsible for source-to-destination delivery of the entire message.
4. What are the four aspects related to the reliable delivery of data?
The four aspects are,
Error control
Sequence control
Loss control
Duplication control
16
9. What are the two possible transport services?
Two basic types of transport services are,
Connection service
Connectionless services
10. The transport layer creates the connection between source and destination.
What are the three events involved in the connection?
For security, the transport layer may create a connection between the two end ports. A
connection is a single logical path between the source and destination that is associated ith all packets
in a message. Creating a connection involves three steps:
• Connection establishment
• Data transfer & Connection release.
11. What are the techniques used in multiplexing?
The three basic techniques of multiplexing are,
Frequency-division multiplexing
Time-division multiplexing
Wave-division multiplexing
24. What is the difference between service point address, logical address and
physical address?
Transport layer header includes a type of address called a service point address or port address which
makes a data delivery from a specific process on one computer to a specific process on another computer.
If a packet passes the network boundary we need another addressing to differentiate the source and
destination systems. The network layer adds a header, which indicates the logical address of the sender and
receiver.
If the frames are to be distributed to different systems on the network, the data link layer adds the header,
which defines the source machine's address and the destination machine's address.
16 Mark Questions
19
UNIT - V APPLICATIONS
Two Mark Questions
6. What is the difference between a user agent (UA) and a mail transfer agent
(MTA)?
The UA prepares the message, creates the envelope, and puts the message in the
envelope. The MTA transfers the mail across the Internet.
20
9. Give the format of HTTP request message.
Request Line
Headers
Blank Line
Body
(present only in
some messages)
Status Line
Headers
Blank Line
Body
21
Authentication: The receiver is sure of the sender's identity and that an imposter has not sent the message.
Integrity: The data must arrive at the receiver exactly as it was sent.
Non-Reputation: The receiver must able to prove that a received message came from a specific sender.
17. What are the advantages & disadvantages of public key encryption?
Advantages:
a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of
keys, keep the private one, and publicly distribute the other one.
b) The no. of keys needed is reduced tremendously. For one million users to communicate, only two
million keys are needed.
Disadvantage:
If you use large numbers the method to be effective. Calculating the cipher text using the long keys takes a
lot of time. So it is not recommended for large amounts of text.
18. What are the advantages & disadvantages of secret key encryption?
Advantage:
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason is that the key is
usually smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
a) Each pair of users must have a secret key. If N people in world want to use this method, there needs to
be N (N-1)/2 secret keys. For one million people to communicate, a half-billion secret keys are needed.
b) The distribution of the keys between two parties can be difficult.
22
16 Mark Questions
23