Assignment - PT-1 Question Bank 2023-24 DCC
Assignment - PT-1 Question Bank 2023-24 DCC
e
3. Timeliness
4. Jitter
dg
3 List classes of IP addressing with their IP address range. e R
An IP address is an address used to uniquely identify a device on an IP network.
Classes and range:
Class A- 1.0.0.0 to 127.255.255.255
Class B - 128.0.0.0 to 191.255.255.255
Bit Rate: Bit rate is simply the number of bits (i.e., 0's and 1's) transmitted per unit time.
a R
Baud Rate: Baud rate is the number of signal units transmitted per unit time that is needed
D
to represent those bits.
5 List advantages of Computer Network ( any two) a R
1. Convenient resource sharing
2. Connectivity
3. Security
a
6. Reduced cost
7. Great storage capacity
6 List functions of Network layer. e R
Logical addressing
m
Routing
7 List the names of two sublayers of data link layer. e R
Logic Link Control Sublayer
Media Access Control Sublayer
S
8 Choose the name of the layers that performs the following function in OSI. e A
a)Data Encryption b) Error Detection c) File Transfer d) Data Encoding e)framing
f)Routing g)Data encapsulation
a) Data Encryption: Presentation layer
b) Error Detection : Data link layer & Transport layer
c) File Transfer: Application layer
d) Data Encoding: Presentation layer
e) Framing: Data link layer
f) Routing: Network layer
g) Data Encapsulation- Transport Layer, Data Link Layer.
9 For following situations, select appropriate network architecture. e R
a. Number of users 50.
b. Data & resources need to be restricted.
c. No network administrator required.
d. All users with equal priority.
a. Number of users 50 – Client Server architecture.
b. Data & resources need to be restricted - Client Server architecture.
c. No network administrator required- Peer-to-peer architecture.
d. All users with equal priority - Peer-to-peer architecture.
e
dg
11
an
Compare computer Network and human Network. a U
D
Computer Network Human Network
A computer network is interconnection Human network is generally regarded as
of two or more computers connected to a social structure composed of
each other so that they can exchange individuals, business partners, friends
information such as e-mail , messages or or other organizations etc. connected
a
e
connection oriented. oriented
dg
13 List layers of OSI reference model. e R
OSI reference model layers:
1. Application Layer
2. Presentation Layer
3. Session layer
4. Transport layer
5. Network layer
6. Data link layer
7. Physical Layer
an
14 List any four protocol associated with application layer of OSI model. e R
D
Protocols associated with Application layer of OSI Reference model are:
1. Virtual Terminal (TELNET)
2. File transfer Protocol (FTP)
3. Simple Mail Transfer Protocol (SMTP)
4. Hypertext Transport Protocol (HTTP)
a
No
1 Explain modes of communication with the help of diagram. a U
The way in which data is transmitted from one device to another device is known as
transmission mode.
S
b. In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice
versa.. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
e
channel can be utilized for each direction
-Walkie-talkies are half-duplex systems.
dg
an
c. In full-duplex mode both stations can transmit and receive simultaneously. The
transmission medium sharing can occur in two ways, namely, either the link
must contain two physically separate transmission paths or the capacity of the
channel is divided between signals traveling in both directions.
D
-One common example of full-duplex communication is the telephone network.
When two people are communicating by a telephone line, both can talk and
listen at the same time.
a
it
e
Protocol: A protocol is defined as set of rules agreed by sender and receiver. Protocol
governs the exchange of data in true sense.
3 For Network having 10 user, data and resource need to be restricted, network a A
dg
administrator is required .Identify which network architecture you will prefer in
this situation. Justify your answer.
Type of Network architecture - Client-Server Network.
Justification- For the mention situation client Server network is preferred because
centralized database can be maintained at server. All the files are stored at the same
an
place. Also it becomes easier to find files. In a server-based network, users have one
user account and password to log on to the server and to access shared resources.
Server operating systems are designed to handle the load when multiple client
computers access server-based resources.
D
4 Explain wide Area Networks along with any two advantages and Disadvantages. a U
● WANs have a large capacity, connecting a large number of computers over a large
area, and are inherently scalable.
● They facilitate the sharing of regional resources.
● They provide uplinks for connecting LANs and MANs to the Internet.
● Communication links are provided by public carriers like telephone networks,
a
Advantages of WAN:
● Large area coverage: WAN covers a large geographical area (1000 km or more
than).
● Higher bandwidth: WAN networks usually cover large geographical areas.
● Centralized data: Using the WAN network you can share the data connected to all
the devices in the respective network.
Disadvantages of WAN
● Security issue: WAN faces more security problems than LAN and MAN networks
since many technologies are merged in WAN networks. It can open a security gap,
which paves the way of occurring malicious attacks and identity intruders.
● Installation cost: WANs are default complex and complicated because of large
geographical area coverage. Hence there is a setup cost in expensive WAN that also
needs routers, switches, and other security solutions.
● Troubleshooting issues: Troubleshoot the big challenge on the WAN network and
e
it requires more time. If any issue occurs in the computer network then it is the
most difficult part to find out the proper cause due to their broad coverage area.
5 Explain the functions of physical and data link layer of OSI model.
dg
The functions of Physical layer are:
1. Physical characteristics of interfaces and medium.
The physical layer in a network model defines the characteristics of the
interface between the devices and the transmission medium. It also defines the
type of transmission medium.
2. Representation of bits.
an
The physical layer data consists of a stream of bits (sequence of Os or Is)
with no interpretation. To be transmitted, bits must be encoded into signals —
electrical or optical. The physical layer in a network model defines the type of
encoding (how 0's and 1's are changed to signals).
D
3. Data rate.
The transmission rate — the number of bits sent each second — is also
defined by the physical layer in a network model. In other words, the physical
layer in a network model defines the duration of a bit, which is how long it lasts.
4. Synchronization of bits.
a
The sender and receiver not only must use the same bit rate but also must
be synchronized at the bit level. In other words, the sender and the receiver
clocks must be synchronized.
it
5. Line configuration.
The physical layer in a network model is concerned with the connection of
devices to the media. In a point-to-point configuration, two devices are
m
e
The data link in network model layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also
dg
uses a mechanism to recognize duplicate frames. Error control is normally
achieved through a trailer added to the end of the frame.
5. Access Control.
When two or more devices are connected to the same link, data link layer protocols in
network model are necessary to determine which device has control over the link at
any given time.
6 an
Explain in brief various component of computer network?
A computer network is built from the following basic building blocks:-
1. Client computers: - The computers that end users use to access the resources
of the network.
a U
5. Hubs & Switches: - Network cable usually doesn’t connect computers directly
to each other. Instead, each computer connected by cable to a device known as
a hub or switch.
6. Wireless networks: - In this network, computer communicate via radio
S
signals. In wireless network, radio transmitters & receivers take the place of
cables.
7. Network Software : - although network hardware is essential, what really
makes a network work is software .server computer use special network
operating systems in order to function efficiently & client computers need to
have their network settings configured properly in order to access to access
the network.
7 What is ARP? Explain function of ARP. e U
ARP works at Data link layer in the OSI model. It is responsible to find the hardware
address of a host from a known IP address. The ARP’s main task is to convert the 32-bit
IP address (for IPv4) to a 48- bit MAC address.
8 Classify the following protocols into connection oriented and connectionless protocols
and justify your answer.
a) TCP b) IP c) UDP d) SLIP
Connection-oriented protocol:
It means that when devices communication they perform hand sharing to set up on end
to end connection. Usually one device begins by sending a request to open a
connection, and the other responds.
TCP: Connection oriented protocol
- It is a transport layer protocol & it establishes a connection between devices.
SLIP: Connection oriented protocol.
- It is serial line internet protocol
e
- It is connection oriented protocol, because it established a connection between e U
Functions: devices.
dg
● Local host
Connection maintains
less protocol:the ARP Table. ARP maps the Internet Protocol address (IP)to
aThese
physical machinedoaddress.
protocols not establish a connection between devices. It is manually
●
achieved by transmitting interface
It provides the informationbetween
in onethedirection,
IP addressing
from system
source toused by IP
destination
and theto
without checking Hardware
see if theaddresses
destinationused bythere
is still the data
or iflink
it is layer protocol.
prepared to receive the
● ARP broadcasts an IP address in an effort to discover its equivalent
information.
IP: Connectionless protocol
hardware address.
- IP●works
-It
ARPin
of reliability.
has
data link
UDP:● Connection
n/w
Responsible
● isMaintains
layer.
been
It does
lessfor
a user dataARP
an
It is connectionless
implemented
layernottechnologies.
protocol
with many protocol because there
combinations
established connection between devices.
ARP query and ARP response datagram.
gramcache
protocol. It isifconnectionless
so that the same query protocol
has been
is no guarantee
of network
because
and
there is no
processed
guarantee of new
earlier, reliability.
broadcast message is not created but, it checks in the ARP
D
9 Draw and explain cache.TCP/IP model e U
TCP/IP that is Transmission Control Protocol and Internet Protocol has
following features
●Support for a flexible architecture. Adding more machines to a network was easy.
●The network is robust, and connections remained intact until the source and
destination machines were functioning. The main idea was to allow one application
a
e
transport layer.
3. The applications can read and write to the transport layer.
4. Transport layer adds header information to the data.
dg
5. Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.
6.Transport layer also arrange the packets to be sent, in sequence
Layer 4: Application Layer
The TCP/IP specifications described a lot of applications that were at the top of the
an
protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a remote
machine and run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst computer
users connected over a network. It is reliable, simple and efficient.
D
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to transport
electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
5. It allows peer entities to carry conversation.6.It defines two end-to-end protocols:
TCP and UDP.
a
it
m
S