0% found this document useful (0 votes)
32 views36 pages

TCP IP and Internet

The document consists of a series of 2-mark questions related to computer networks, covering various topics such as data communication, network layers, protocols, and transmission media. It includes definitions, responsibilities of different layers, types of protocols, and key concepts like ARQ, DHCP, and TCP/IP. Each question is aimed at assessing fundamental knowledge in computer networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views36 pages

TCP IP and Internet

The document consists of a series of 2-mark questions related to computer networks, covering various topics such as data communication, network layers, protocols, and transmission media. It includes definitions, responsibilities of different layers, types of protocols, and key concepts like ARQ, DHCP, and TCP/IP. Each question is aimed at assessing fundamental knowledge in computer networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Computer Network- 2 MARKS Questions

Set-1

1. Define data communication.

It is the exchange of data between two devices via some form of Transmission medium ( such as

copper cable, twisted pair cable etc).

2. What are the elements of data communication?

The elements of data communication are:

 Sender

 Receiver

 Transmission medium

 Message

 Protocol

3. How we can check the effectiveness of data communication?

The effectiveness of data communication can be checked by

 Accuracy

 Delivery

 Timeliness

4. What are the classes of transmission media?

The classes of transmission media are:

1. Guided transmission media and 2. Unguided transmission media

5. Define Optical fiber

It is a method of transmitting information from one place to another by sending light through an

optical fiber.

6. Define distributed processing

A task is divided among multiple computers. Instead of single large machine handling all the process,

each separate computer handles the subset.

7. What do you mean by OSI?

Open system interconnection model is a model for understanding and designing a network

architecture. It is not a protocol.


Page 1
Computer Network- 2 MARKS Questions
8. Define Network.

A network is a set of devices connected by physical media links. A network is recursively a connection

of two or more nodes by a physical link or two or more networks connected by one or more nodes

9. What is a Link?

At the lowest level, a network can consist of two or more computers directly connected by some

physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.

What is point-point link?

If the physical links are limited to a pair of nodes it is said to be point-point link.

11. What is Multiple Access?

If the physical links are shared by more than two nodes, it is said to be Multiple Access.

12. Define Switch?

Switches are H/W or S/W devices capable of creating temporary Connections B/W 2 or more devices.

13. What are the types of switching?

The types of switching are: 1. Circuit switching 2. Packet switching 3.Message switching

14. What do you mean by Crossbar switches?

It connects m inputs to n outputs in a grid using electronic micro switches at each cross points.

15. Define Blocking?

The reduction in the number of cross points result in a phenomenon called Blocking.

16. Define packet switching?


In packet switching data are transmitted in discrete units of potentially variable length blocks called Packets.

17. What are the approaches of packet switching?

The approaches of packet switching are: 1. Virtual circuit 2. Datagram

18. What do you mean by Permanent Virtual circuit?


The same Virtual circuit is provided between two users on a continuous basis. The circuit is dedicated to
the specific user
19. What do you mean by DSL?
It is a new technology that uses the existing telecommunication network to accomplish high speed
delivery of data, voice & video etc.
20. What is the purpose of Physical layer?
The physical layer coordinates the functions required to transmit a bit stream over a physical medium.

Page 2
Computer Network- 2 MARKS Questions
Set-2

1. What do you mean by Automatic Repeat Request (ARQ)?

ARQ means retransmission of data in three cases:

1. Damaged Frame 2. Lost Frame 3. Lost Acknowledge

2. What are the responsibilities of Data Link Layer?

The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is

responsible for:

1. Node-node delivery. 2. Framing 3. Physical Addressing

4. Flow Control 5. Error Control 6. Access Control

3. What are the three protocols used for noisy channels?

The three protocols used for noisy channels

1. Stop – and – Wait ARQ 2. Go – back – N ARQ 3. Selective Repeat ARQ

4. What is CSMA/CD?

Carrier Sense Multiple Access with Collision Detection is a protocol used to sense whether a medium is

busy before transmission and it also has the ability to detect whether the packets has collided with

another.

5. What are the various types of connecting devices?

There are five types of connecting devices

1. Repeaters 2. Hubs 3. Bridges 4. Routers 5. Switches.

6. Define Flow control

It refers to a set of procedures used to restrict the amount of data the sender can sent before waiting

for an acknowledgement

7. What are the categories of Flow control?

The categories of Flow control are:

1. Stop& wait 2. Sliding Window

8. Mention the disadvantages of stop& wait.

1. Inefficiency 2. Slow process

Page 3
Computer Network- 2 MARKS Questions
9. What are the functions of data link layer?

The functions of data link layer are: 1. Flow control 2. Error control

10. Define Link Discipline

It coordinates the link system. It determines which device can send and when it can send.

11. What do you mean by polling?

When the primary device is ready to receive data, it asks the secondary to send data. This is called

polling.

12.What are the various controlled access methods?

The various controlled access methods are:

1. Reservation 2. Token passing 3. Polling

13 What are the various Random access methods?

The various Random access methods are:

1. Slotted ALOHA 2. CSMA 3. CSMA/CD,CSMA/CA

14. Define Piconet

A Bluetooth network is called Piconet .It can have up to eight stations one of which is called the master

and the rest are called slaves.

15. What is the frequency range of Bluetooth devices?

The frequency range of Bluetooth device is 2.4 GHZ.

16. What is the need of connecting devices?

To connect LANs or segments of LAN we use connecting devices. These devices can operate in different

layers of internet model.

17. What type of address a data link layer is using?

The data link layer is using a physical address

18. What do you mean by Backbone networks?

It allows several LANs to be connected. The architecture used are Star and Bus

19. What is the need of frame relay?


It is a Virtual circuit wide area network that was designed to respond to demands for a new type of WAN.

20. What is the maximum length of a datagram?

The maximum length of a datagram is 65,535 bytes.

Page 4
Computer Network- 2 MARKS Questions
Set-3

1. What are the responsibilities of Network Layer?

The Network Layer is responsible for the source-to-destination delivery of packet possibly across

multiple networks (links).

a. Logical Addressing

b. Routing.

2. What is DHCP?

The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration. DHCP is

also needed when a host moves from network to network or is connected and disconnected from a

network.

3. Define ICMP?

Internet Control Message Protocol is a collection of error messages that are sent back to the source

host whenever a router or host is unable to process an IP datagram successfully.

4. What is BOOTP?

BOOTSTRAP Protocol is a client/server protocol designed to provide the following four information for

a diskless computer or a computer that is booted for the first time. IP address, Subnet mask, IP

address of a router, IP address of a name server.

5. What is the need of internetwork?

To exchange data between networks, they need to be connected to make an Internetwork.

6. What are the types of class full addressing?

The types are Class A, Class B, Class C, Class D, Class E

7. What do you mean by ARP?

ARP stands for Address resolution protocol, maps an IP address to a MAC address

8. What do you mean by RARP?

RARP stands for Reverse Address resolution protocol, maps an MAC address to a IP address

9. Define Delivery of a packet.

It refers to the way a packet is handled by the underlying network under the control of network layer

10. What are the types of delivery?

There are two types of delivery: 1. Direct delivery 2. Indirect delivery

Page 5
Computer Network- 2 MARKS Questions
11. What is class less addressing?

Classless addressing requires hierarchical and geographical routing to prevent immense routing tables

12. What is Unicast & Multicast communication?

Unicast communication is one source sending a packet to one destination. Multicast communication is one

source sending a packet to multiple destinations.

13. What do you mean by Net id & Host id?

The Internet address (or IP address) is 32 bits (for IPv4) that uniquely and universally defines a host or

router on the Internet. The portion of the IP address that identifies the network is called the net id.

The portion of the IP address that identifies the host or router on the network is called the host id.

14. Define forwarding.

It refers to a way a packet is delivered to next station. It requires a host or a Router to have a routing

table.

15. What are the common notations used for address?

The two common notations used for address are: 1. Binary notations 2. Dotted decimal notations

16. What are the advantages of IPV6 over IPV4?

1. Larger address space 2. Better header format 3. New options 4. Support for more security

17. Define static mapping.

It creating a table that associates an IP address with a MAC address.

18. Compare direct delivery & indirect delivery

In direct delivery source and destination node belong to e same network In indirect delivery source and

destination node belong to different network

19. What are the rules of non-boundary-level masking?

The bytes in the IP address that corresponds to 255 in the mask will be repeated in the Sub network

address. The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub

network address. For other bytes, use the bit-wise AND operator.

20. What is Fragmentation?

Fragmentation is the division of a datagram into smaller units to accommodate the MTU of a data link

protocol.

Page 6
Computer Network- 2 MARKS Questions
Set-4

1. What are the responsibilities of Transport Layer?

The Transport Layer is responsible for source-to-destination delivery of the entire message.

a. Service-point Addressing b. Segmentation and reassembly c. Connection Control

d. Flow Control e. Error Control

2. Define Congestion

It will occur if the number of packets sent to the network is greater than the Capacity of the network.

3. What do you mean by Congestion control?

It is a mechanism and technique to control the congestion.

4. What are the types of congestion control?

There are two types of congestion control:

1. Open loop congestion control

2. Closed loop congestion control

5. What are the two factors that measure network performance?

The two factors that measure network performance are Delay Throughput.

6. Compare Open loop Congestion Control & Closed loop congestion control

In Open loop congestion control, policies are applied to prevent congestion before it happens. In Closed

loop congestion control, policies are applied to reduce congestion after it happens.

7. What is meant by quality of service?

The quality of service defines a set of attributes related to the performance of the is connection. For

each connection, the user can request a particular attribute each service class associated with a set of

attributes.

8. What do you mean by TCP?

TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol, meaning

that each TCP connection supports a pair of byte streams, one flowing in each direction.

9. Explain the three types of addresses in TCP/IP?

Three types of addresses are used by systems using the TCP/IP protocol: the physical address, the

internetwork address (IP address), and the port address.

Page 7
Computer Network- 2 MARKS Questions
10. What are the flow characteristics related to QOS?

The flow characteristics related to QOS are:

1. Reliability 2. Delay 3. Jitter 4. Bandwidth

11. What are the techniques to improve QOS?

The techniques to improve QOS are:

1. Scheduling 2.Traffic shaping 3. Resource reservation 4.Admission control

12. Define Socket address

The combination of IP address and port address is called Socket address.

13. What are the two types of protocols used in Transport layer?

The two types of protocols used in Transport layer are: 1.TCP and 2. UDP

14.Define Throughput.

It is defines as a number of packets passing through the network in a unit of time.

15.Define UDP

User datagram protocol is a Unreliable, connectionless protocol, used along with the IP protocol

16.What is the need of port numbers?

Port numbers are used as a addressing mechanism in transport layer.

17. What are the types of port numbers used in transport layer?

1. Well-known port 2. Registered port 3. Dynamic port

18. Why TCP services are called Stream delivery services?

TCP allows the sending process to deliver data as a stream of bytes and the receiving process to deliver

data as a stream of bytes. so it is called as stream of bytes.

19 .Define jitter

It is the variation in delay for packets belonging to same flow .

20. Compare connectionless service & connection oriented service

In connection less service there is no connection between transmitter & receiver Ex: TCP

In connection oriented service there is a connection between transmitter & receiver Ex: UDP

Page 8
Computer Network- 2 MARKS Questions
Set-5
1. What are the responsibilities of Application Layer?

The Application Layer enables the user, whether human or software, to access the network. It provides

user interfaces and support for services such as e-mail, shared database management and other types of

distributed information services:

 Network virtual Terminal

 File transfer, access and Management (FTAM)

 Mail services

 Directory Services

2. What is Encapsulation and De-capsulation ?

To send a message from one application program to another, the TCP/UDP protocol encapsulates and de-

capsulate messages.

3. What is DNS?

Domain name service is the method by which Internet address in mnemonic form such assun.it.ac.in are

converted into the equivalent numeric IP address such as 134.220.4.1

4. What is Fully Qualified Domain Name?

If a label is terminated by a null string is called a Fully Qualified Domain Name,

5. What is Generic Domains?

Generic domain define registered hosts according to their generic behavior. Each node in the tree

defines a domain, which is an index to the domain name space database Eg.

 com – Commercial organizations

 edu – Educational institutions

 gov – Government institutions

6. What is simple mail transfer protocol?

The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer

Protocol (SMTP). It’s a system for sending messages to other computer users based on email addresses.

7. What is User Agent?

A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a program

used to send and receive mail.

Page 9
Computer Network- 2 MARKS Questions
8. What do you mean by File transfer protocol?

It is a standard mechanism provided by the internet for copying a file from one host to another

9. What are the two types of connections in FTP?

The two types of connections in FTP are: 1. Control connection and 2. Open connection

10. Define HTTP.

It is used mainly to access data on the World Wide Web. The protocol transfer data in the form of

plaintext, hypertext, audio, video and so on.

11. What are the types of messages in HTTP transaction?

The types of messages in HTTP transaction are: 1. Request messages and 2. Response messages

12. What are the parts of a browser?

The parts of a browser are: 1. A controller 2. A client program 3. Interpreter

13. Name the four aspects of security.

1. Privacy 2. Authentication 3. Integrity 4. Non-repudiation

14. Define Cryptography.

The science and art of manipulating messages to make them secure.

15, Define authentication.

It means that the receiver is sure of the sender identity.

16. What do you mean by encryption?

The process of converting plain text to cipher text.

17. Define Privacy

It means that sender and receiver expect confidentiality.

18. What do you mean by Symmetric key cryptography?

In Symmetric key cryptography both the parties will use the same key.

19. What are steps to transfer a mail message?

The steps in transferring a mail message are:

a) Connection establishment b) Mail transfer c) Connection termination

20. What is POP?

Post Office Protocol, version3 (POP3) and Internet Mail Access Protocol version4 (IMAP4) are protocol

used by a mail server in conjunction with SMTP to receive and hold mail for hosts.

Page 10
Computer Network- 2 MARKS Questions
Set-6

Q1. What factors affect data transmission?

Ans Several factors affect how data is transmitted. They include the following

(i) Transmission rate-Frequency and bandwidth

(ii) Line Configurations-Point to point versus multipoint.

(iii) Serial and Parallel transmission

(iv) Direction of transmission-Simplex, Half Duplex, and Full Duplex

(v) Transmission Mode-Asynchronous and synchronous.

(vi) Circuit switching and Packet switching (vii) Multiplexing (viii)Protocols

Q2. What is a Network? What are the benefits of networks?

Ans: A network or communications network, is a system of interconnected computers, telephones or

other communications devices that can communicate with one another and share applications and data.

The benefit of networks are given below:

(i) Sharing of peripheral devices. (ii) Sharing of programs and data (iii) Better communications

(iv) Security of information (v) Access to databases

Q3. Define the following terms:

(i) Node (ii) Hub (iii) Backbone (iv) Router (v) Bridge (vi) Gateway

Ans (i) Node:- A node is a piece of hardware on the system that can be addressed by a message from

another node, that is , a computer, printer , fax, modem or CD-ROM drive.

(ii) Hub:- Node are connected to a hub, also called a concentrator, whose purpose is to simplify wiring

of nodes to each other and to route signals between the nodes.

(iii) Backbone:-A backbone is a high –capacity link to which many nodes or hub can be connected ,it is

design to carry lots of traffic.

(iv) Router:-A router is a special computer that direct communicating messages when several networks

are connected together.

(v) Bridge:-A bridge is an interface used to connect the same type of networks.

(vi)Gateway:- A gateway is an interface permitting communication between dissimilar networks-for

instance, between a LAN and a WAN or between two LANs based on different OS or different layouts.

Page 11
Computer Network- 2 MARKS Questions
lQ4. What are the major difference between LAN and WAN?

Ans The major differences between LAN and WAN

Q5. Give two major reasons to have network security.

LAN WAN

 LAN are small sized networks  WAN are geographically spread over wide area.

 Range of LAN may vary from 10m to 1.5 km.  There is no limitation on the distance it spans.

 LAN operate between 10Mbps and 2 Gbps.  Typical speed of WAN varies from 56Kbps to 155 Mbps.

 They offer very low delay.  They offer very high delay

 Complete ownership by a single organization.  Owned by multiple organizations

 Very low error rates.  Comparatively higher error rates

Ans Two major reasons to have network

security are given below:

(i) Secrecy:- Keeping information out of the reach of unauthorized users.

(ii) Authentication:- Determining the authorized users before sharing sensitive information with or

entering into a business contract.

Q6. What is the purpose of using a Web Browser? Name any one commonly used Web Browser.

Ans The Web Browser fetches the page requested, interprets the text and formatting commands

that it contains and display the page property formatted on the screen.

Q7. Write two advantages and disadvantages for STAR topology.

Ans Advantages of STAR topology: (i) One device per connection. (ii) Easy to access

Disadvantages of STAR topology: (i) Central node dependency (ii) Long cable length.

Q8. Write one difference between Telnet and FTP.

Ans Telnet-to connect to remote computers. Telnet is a program or command that allows the user to

connect to remote computers on the Internet using a user name and password.

FTP(File transfer protocol):- is a method whereby the user can connect to a remote computer known as

Page 12
Computer Network- 2 MARKS Questions
FTP site and transfer files to his/her own microcomputer’s hard disk. Some FTP files are open to the

public, some are not.

Q9. Explain the following terms in short:

(i) DHTML (ii) ISP

Ans DHTML is the next generation of HTML. It describes how text and images are displayed on a web page.

Dynamic HTML, developed by Netscape and the World Wide Web Consortium (W3C) is based entirely on

industry standard HTML and Java. New features in Dynamic HTML, such as absolute positioning and layers,

give designers and developers much greater control over the look and feel of web pages.

ISP(Internet Service Provider) is a company that connects your communication line to is servers, or

central (host)computer, which connects you to the internet via another company’s network access points.

ISP’s have a wide range of prices and packages for users to choose from.

Q10. What are firewalls?

Ans: Firewalls are defensive barriers that fence off a private network from the internet.

Q11. What is the difference B/W Message Switching technique and Packet Switching technique?

Ans: Message Switching:-It is better known as store and forward. In this mechanism a node on

receiving a message, stores it till the appropriate route is not free, then forwards it on the route when

the route is free.

Packet Switching:-It is best for data. In a packet –switched network, data are transmitted in discrete

units called packets. A packet is a fixed length block of data for transmission. The maximum length of

the packet is established by the network. Longer transmissions are broken up into multiple packets. The

packets have headers with priority codes and source and destination addresses along with data to be

sent. The packets are sent over the network node to node, kept there for a small time and then routed

according to the information in its header.

Q12. Write two applications of Cyber –Law.

Ans Two applications of Cyber –Law are given below

(i) Restricting/Penalizing unauthorized user. (ii) Promoting , coordinating and controlling e-Business.

Q13. Write a note on Fast Ethernet Technology.

Page 13
Computer Network- 2 MARKS Questions
Ans The growing importance of LANs and the increasing complexity of desktop computing applications

are fueling the need for high performance networks.

100BASE-T(Fast Ethernet) provides a cost effective and high-performance for small workgroups.

SMBs(Small to Medium Business), and any network supporting bandwidth-intensive applications. Fast

Ethernet technology operates at 10 times the speed of traditional Ethernet, offering maximum

performance and enhanced capability for existing Ethernet- based networks.

Q14. What is the diffrence between XML and HTML? Write two differences.

Ans The major differences between XML and HTML

XML HTML

It doesn’t specify either semantics or tag set. The semantics and tag set are fixed.

It is a language for documents containing It is a language used to design the layout of a

structured information and all semantics are document and to specify the hyperlinks.

defined by the applications that process them.

Q15. Expand the following terminologies:

(i) TCP/IP (ii) XML (iii) CDMA (iv) WLL

Ans (i) TCP/IP:-Transmission Control Protocol/Internet Protocol

(ii)XML:-eXtensible Markup Language

(iii)CDMA:-Code division Multiple access

(iv) WLL:-Wireless Local Loop.

Q16. What is a Modem? What is its function?

Ans: A modem is a computer peripheral that connects a workstation to other workstation via telephones

lines and facilitates communications. It is short form for modulation/Demodulation. Modem converts

digital signals to A/F(Audio Frequency) tones which are in the frequency range that the telephone lines

can transmit and it can also convert transmitted tones back to digital information.

Q17. Differentiate between Internet and Intranet.

Ans The internet is worldwide network of computer networks around the globe. Internet uses a set of

protocols called TCP/IP .

On the other hand Intranet is a network ,which is privately owned. Intranet also uses a set of protocols

as internet.

Page 14
Computer Network- 2 MARKS Questions
Q18. Define the following :

(i) Data channel (ii) Baud (iii)bps (iv) Bps (v) Bandwidth

Ans: (i) A data channel is a medium used to carry information or data from one point to the other.

(ii) Baud is the unit of measurement for the information carrying capacity of a communication channel.

It is synonymous with bits per second.

(iii) bps:- bits per second. It refers to a thousand bits transmitted per second.

(iv) Bps:- bytes per second. It refers to a thousand bytes transmitted per second.

(v) Bandwidth:-It refers to the difference between the highest and lowest frequencies of a

transmission channel. This term is also sometimes used to refer to the amount of information travelling

through a single channel at any one point of time.

Q 19) Differentiate between tree and Bus topologies of a network.

Ans: Tree topology:- is a network with the shape of an inverted tree with the central root branching

and sub-branching to the extremities of the network.

Bus topology:-In this topology, all devices on network are connected to a single continuous cable called a

bus. This topology can be used for smaller networks.

Q20. What do you mean by a backbone network?

Ans. A backbone network is a network that is used as a backbone to connect the several LAN’S together

to form a WAN.

FDDI (Fiber Distribute Data Interface) is such a network. FDDI is a high performance fiber optic token

ring LAN running at 100 Mbps over distances up to 200 kms with up to 1000 stations connected.

Q21. What are cookies?

Ans. Cookies are messages that a web server transmits to a web browser so that the web server can

keep track of the user’s activity on a specific web site.

Q22. What is XML? How is it different from HTML?

Ans. XML is a markup language for creating documents containing structured information. In HTML both

tag semantics and tag are fixed but XML specifies neither semantics nor tag set. Rather it provides a

facility to define tags and relationships among them.

Q23. What are switched LANs/Switched Ethernet LANS?

Page 15
Computer Network- 2 MARKS Questions
Ans. LANs that are segmented through switches are called switched LANs. In case of Ethernet LANs

they are called Switched Ethernet LANS.

Q24. What is a communication channel? What choices do u have while choosing a communication

channel for a network?

Ans. Communication channels mean the connecting cables that link various workstations. There are three

basic types of cables:

(i) Twisted Pair Cables:- These cables consist of two insulated copper wires twisted around each other.

These are also used for short and medium range telephone communication.

(ii) Coaxial Cables:- A coaxial cable consist of one or more small cables in protective covering. These are

more expensive than twisted pair cable but perform better.

(iii) Fiber-optic Cables:– These cables are made of plastic and glass and are about as thick as human

hair. These cables are highly durable and offer excellent performance but are expensive.

Q25 What do you mean by topology? What are the most popular topologies?

Ans. Topology refers to the way which the workstations attached to the network are interconnected.

The most popular topologies are: Bus, Ring ,Star, Tree

Q26. What is firewall? What are different firewall techniques?

Ans. The system designed to prevent unauthorized access to or form a private network is called

FIREWALL. There are several types of firewall techniques:

Packet Filter, Application Gateway, Circuit-level Gateway, Proxy Server

Q27. What is the significance of anonymous user in FTP? What is uploading? Can an anonymous

user upload? If yes, how? If no, why?

Ans. In order to use FTP effectively, one needs to be an authorized user. However, anonymous FTP is a

method whereby FTP server allows the general public to access files on the FTP.

Uploading of files refers to the transfer of files from one’s computer onto FTP server.

An anonymous user generally is not allowed to do so and anonymous users have permission to download

only. However, on many UNIX FTP servers, there is a / incoming directory. If this directory is there,

then an anonymous users have permissions to upload only in this directory and nowhere else.

Page 16
Computer Network- 2 MARKS Questions
Q28. What is Ethernet? What is Ethernet Card?
Ans. Ethernet is a LAN architecture developed by Xerox Corp in association with DEC and Intel.
Ethernet uses bus or star topologies and can support data transfer rates of up to 10 Mbps. The
computers that are the part of Ethernet have to install a special card called Ethernet Card.

Set-7

1) Mention major network architecture.


1) client-server network 2) Peer-to-peer network

2) What is client-server technology?


It is a network where one computer acts as the server and another is called client. The server is the

most important part of the network system providing access to resources and providing security.

3) Mention the advantage of client-server technology.


 resources and security are directly controlled through the server.

 New technology can be easily implemented in to the system.

4) Mention the disadvantage of client-server technology.


 investment on the server and networking cost is high.

 Network administrator is required.

5) What is peer-to-peer technology?


In this architecture all computers are considered equal because all have the same abilities to use the

resources available on the network. Here the resources are shared among the nodes. Each computer acts

both as client and server.

6. Explain advantages of Computer Network


 Speed: The files can be transferred from one Computer to another instantly.

 Cost: Application software (Network version) can be installed on one Computer and accessed by

other Computers on the Network. This makes maintenance and upgrading of software easy.

 Security: The information on the computer can be made available only through password. Further

some information can be made available only for reading and not copying.

 Resource sharing: Expensive peripheral devices can be shared by many users in a network.

Page 17
Computer Network- 2 MARKS Questions
 Easy access: Users can access information from any computer that is available on the network.

They need go to a specific Computer which may be located in a different building or different

location to retrieve information from their account.

7. Explain different types of Computer networks


The different types of Computer networks are

 LAN-Local area Network is networking of Computers in a smaller physical area like a home, office or

small group of buildings. The advantages of LAN are: high data transfer rate, sharing of resources

like printers, files and other applications. The Computers are connected using cables.

 MAN-A Metropolitan area Network is a network of computers within a city or metropolitan area. It

is an extended LAN. They use fiber optic cables for faster data transmission. A MAN supports both

data and voice. Cable televisions are examples for MAN.

 WAN-Wide area Networks connect computers in larger geographical areas. The computers are

connected using satellite links, cables or long distance telecommunication links. Security of data is

high. It supports remote accessing. Internet services are example of WAN.

8. Explain Network services.

 File Services-All the data files of an organization are stored in one place and can be shared by many

users. Files can be organized and updated systematically.

 Print Services- When Printers available on the Network, multiple users can print to the same

printer. The network printers are usually faster and more capable. They may have accessories such

as envelope readers or multiple paper trays.

 Database Services-Multiple users can have access to the database at the same time. The Database

software ensures integrity of data and provides multiple access.

 Message Services-The services include Electronic mail, voice mail, remote access, document

transfers across the internet.

 Application services- several software applications that are developed using network architecture.

The applications can be made available to multiple users. Any upgradation made to these applications

is also instantly available to the users.


Page 18
Computer Network- 2 MARKS Questions
9. Mention different types of Network topologies. Explain?
BUS:-the linear bus topology connects all the nodes to a common straight cable. All the nodes on the

network share the common bus. This topology is very reliable since a failure of one or more nodes does

not affect the bus. The disadvantages of the linear bus are the need for minimum distances between
nodes to avoid signal interference, & the loss of data caused by the simultaneous transmission by 2 nodes.

STAR- in star network, each node is connected directly to the central computer. All communications

between the nodes have to pass through the central computer. Star networks allow the administrator to

give selected nodes higher priority and also allow centralized running of diagnostic programs.

RING- in a ring network, all nodes are connected to a common cable, and the cable starts and ends at

the network server. In this type of network, communications are always in one direction, and the data

being transmitted is passed through each node in the ring. A major disadvantage of this network is that

when a node fails, it can completely halt all communications on the network.

TREE- a tree topology combines characteristics of linear bus and star topologies. It consists of groups

of star configured workstations connected to a linear bus backbone cable. Tree topologies allow for the

expansion of an existing network, and enable schools to configure a network to meet their needs.

MESH- a pure mesh network has point- to- point connections between every node in the network. Pure

mesh architectures are not usually considered practical. One problem is that each device requires an

interface for every other device on the network.

10. Write short notes on Client-Server networking

Client-server networks consist of servers and clients. Server is a powerful Computer using advanced

network operating system and clients(workstation) access data stored in servers. Server can host e-mail,

store common data files and other applications needed by the client. The server also validates any user

who tries to login and denies access to network resources as well as client software to unauthorized

users. Servers are mainly used for centralized management of data and resources.

Advantages

 Data security and resources are controlled through server.

 Upgrading and replacement of applications are done as needs increase, without changing the

existing formats.

Page 19
Computer Network- 2 MARKS Questions
 Clients can access the server from remote locations.

 Reduces cost of client’s computer

 New technologies(object oriented programming)can be integrated easily ,as and when the need

arises.

Limitations(Disadvantages)

 Initial investment may be expensive

 Maintenance will require staff who must ensure efficient operations

 If the server breaks down, the operations of client processes may stop.

11. Explain peer-peer networking

In a peer-peer network, there are no dedicated servers. All Computers are equal, and therefore termed

as peer-peer. Each Computer functions both as a client and a server. No single Computer holds the

control of entire network. The users are located in the same area and security is not an important issue.

All the users can access data and programs that reside on all the computers across the network without

any restrictions.

Advantages

 There is no need for dedicated server. Therefore, less expensive.

 A single user operating system such as windows-XP is sufficient

Disadvantages(Limitations)

 There can be no security as all computers can be accessed by all users

 A failure of a node in peer-peer network means the network can no longer access

 data or applications on that node.

 The number of Computers connected are limited to 10 or 12.

12.What do you mean by data communication?

Ans: It is the exchange of data between two devices via some form of transmission medium such as wire

cable. The communicating system must be part of a communication system made up of a combination of

hardware and software. The effectiveness of a data communication system depends on three

fundamental characteristics: delivery, accuracy and timeliness.

Page 20
Computer Network- 2 MARKS Questions
13.What is simplex?
Ans: It is the mode of communication between two devices in which flow of data is unidirectional. i.e. one

can transmit and other can receive. E.g. keyboard and monitor.

14.What is half-duplex?
Ans: It is the mode of communication between two devices in which flow of data is bidirectional but not

at the same time. ie each station can transmit and receive but not at the same time. E.g walkie-talkies

15.What is full duplex?

Ans: It is the mode of communication between two devices in which flow of data is bidirectional and it

occurs simultaneously. Here signals going in either direction share the capacity of the link. E.g. telephone

16.What is a network?

Ans: It is a set of devices connected by communication links. A node can be a computer or any other

device capable of sending and/or receiving data generated by other nodes on the network.

17.What is distributed processing?

Ans: It is a strategy in which services provided by the network reside at multiple sites.

18.What is point to point connection?

Ans:It provides a dedicated link between two devices. The entire capacity of the link is reserved for

transmission between the two devices e.g. when we change the TV channels by remote control we

establish a point to point connection between remote control and TV control system.

19.What is multipoint connection?

Ans: In multipoint connection more than two specific devices share a single link. Here the capacity of the

channel is shared either separately or temporally.

20.Define internet?

Page 21
Computer Network- 2 MARKS Questions
Ans: It is a network of networks.

Set-8

1.What is a protocol?
Ans: It is a set of rules that governs data communication. A protocol defines what is communicated, how
it is communicated, and when it is communicated. The key elements of protocol are syntax, semantics and
timing.

2.What is TCP/IP protocol model?


Ans: It is a five layered model which provides guidelines for the development of universally compatible
networking protocols. The five layers are physical, data link, network, transport and application.

3.Describe the functions of five layers?


Ans: Physical- It transmits raw bits over a medium. It provides mechanical, and electrical specification.

Data link- It organizes bits into frames. It provides hop to hop delivery.

Network-It moves the packets from source to destination. It provides internetworking.

Transport-It provides reliable process to process message delivery and error recovery.

Application-It allows ti access to network resources.

4.What is ISO-OSI model?


Ans: Open Systems Interconnection or OSI model was designed by the International

Organization for Standardization (ISO) .It is a seven layer model. It is a theoretical model designed to
show how a protocol stack should be implemented. It defines two extra layers in addition to TCP/IP
model.
Session -It was designed to establish, maintain, and synchronize the interaction between communicating
system
Presentation-It was designed to handle the syntax and semantics of the information exchanged between

the two systems. It was designed for data translation, encryption, decryption, and compression.

4. What is multiplexing?

Page 22
Computer Network- 2 MARKS Questions
Ans: Multiplexing is the process of dividing a link, the physical medium, into logical channels for better

efficiency. Here medium is not changed but it has several channels instead of one.

5.What is switching?
Ans: Switching in data communication is of three types:

1. Circuit switching 2. Packet switching 3. Message switching

6.How data is transmitted over a medium?

Ans: Data is transmitted in the form of electromagnetic signals.

7. Compare analog and digital signals?

Ans: Analog signals can have an infinite number of values in a range but digital signal can have only a

limited number of values.

8.Define bandwidth?

Ans: The range of frequencies that a medium can pass is called bandwidth. It is the difference between

the highest and lowest frequencies that the medium can satisfactorily pass.

9.What are the factors on which data rate depends?

Ans: Data rate ie. how fast we can send data depends upon

i) Bandwidth available

ii) The levels of signals we can use

iii) The quality of the channel (level of noise)

10.Define bit rate and bit interval?

Ans: Digital signals are aperiodic.so instead of using period and frequency we use bit interval and bit rate

respectively. Bit interval is the time required to send one single bit. Bit rate is the number of bit

intervals per second.

11.What is Nyquist bit rate formula?

Ans: For a noiseless channel, the Nyquist bit rate formula defines the theoretical maximum bit rate

Bitrate=2* Bandwidth*log2L

Page 23
Computer Network- 2 MARKS Questions
Where Bandwidth is the bandwidth of the channel L is the number of signal level used to represent the

data Bitrate is the bit rate in bits per second.

12.Define Shannon Capacity?

Ans: Shannon Capacity determines the theoretical highest data rate foe a noise channel.

Capacity= Bandwidth * log2 (1+SNR)

Bandwidth is the bandwidth of the channel. SNR is the signal to noise ratio, it is the statically ratio of
the power of the signal to the power of the noise. Capacity is the capacity of the channel in bits per
second.
13.What is sampling?
Ans: It is the process of obtaining amplitude of a signal at regular intervals.

14.Define pulse amplitude modulation?

Ans: It is an analog to digital conversion method which takes analog signals, samples it and generates a

series of pulse based on the results of the sampling. It is not used in data communication because the

series of pulses generated still of any amplitude. To modify it we use pulse code modulation.

15.Define pulse code modulation?

Ans: Pulse code Modulation modifies pulses created by PAM to create a completely digital signal. For this

PCM first quantizes the PAM pulse. Quantization is the method of assigning integral values in a specific

tange to sampled instances. PCM is made up of four separate processes:

PAM, quantization, binary encoding and line encoding.

16.What is Nyquist Theorem?

Ans: According to this theorem, the sampling rate must be at least 2 times the highest frequency of the

original signal.

17.What are the modes of data transmission?

Ans: Data transmission can be serial or parallel in mode In parallel transmission, a group of bits is sent

simultaneously, with each bit on a separate line. In serial transmission there is only one line and the bits

are sent sequentially.

18.What is Asynchronous mode of data transmission?

Ans: It is a serial mode of transmission. In this mode of transmission, each byte is framed with a start

bit and a stop bit. There may be a variable length gap between each byte.

Page 24
Computer Network- 2 MARKS Questions
19.What is Synchronous mode of data transmission?

Ans: It is a serial mode of transmission. In this mode of transmission, bits are sent in a continuous

stream without start and stop bit and without gaps between bytes. Regrouping the bits into meaningful

bytes is the responsibility of the receiver.

20.What are the different types of multiplexing?

Ans: Multiplexing is of three types. Frequency division multiplexing and wave division multiplexing is for

analog signals and time division multiplexing is for digital signals.


Set-9
1.What is FDM?

Ans: In frequency division multiplexing each signal modulates a different carrier frequency. The

modulated carrier combines to form a new signal that is then sent across the link. Here multiplexers

modulate and combine the signal while DE multiplexers decompose and demodulate. Guard bands keep the

modulating signal from overlapping and interfering with one another.

2.What is TDM?
Ans: In TDM digital signals from n devices are interleaved with one another, forming a frame of data.

Framing bits allow the TDM multiplexer to synchronize properly.

3.What are the different transmission media?


Ans: The transmission media is broadly categorized into two types

i)Guided media(wired) ii)Unguided media(wireless)

4.What are the different Guided Media?


Ans: The media which provides a conduct from one device to another is called a guided media. These
include twisted pair cable, coaxial cable, and fiber-optic cable.

5.Describe about the different Guided Medias.


Ans: Twisted pair cable consists of two insulated cupper wires twisted together. It is used in telephone

line for voice and data communications.

Coaxial cable has the following layers: a metallic rod-shaped inner conductor, an insulator covering the

rod, a metallic outer conductor (shield), an insulator covering the shield, and a plastic cover. Coaxial

Page 25
Computer Network- 2 MARKS Questions
cable can carry signals of higher frequency ranges than twisted-pair cable. Coaxial cable is used in cable

TV networks and Ethernet LANs.

Fiber-optic cables are composed of a glass or plastic inner core surrounded by cladding, all encased in an

outer jacket. Fiber-optic cables carry data signals in the form of light. The signal is propagated along

the inner core by reflection. Its features are noise resistance, low attenuation, and high bandwidth

capabilities. It is used in backbone networks, cable TV networks, and fast Ethernet networks.

6.What do you mean by wireless communication?


Ans: Unguided media transport electromagnetic waves without using a physical conductor. This type of

communication is referred as wireless communication. Here signals are broadcaster through air and thus

available to anyone who has a device to receive it.

7.What do you mean by switching?


Ans: It is a method in which communication devices are connected to one another efficiently. A switch is

intermediary hardware or software that links devices together temporarily.

8.What are the switching methods?


Ans: There are three fundamental switching methods: circuit switching, packet switching, and message

switching. In circuit switching, a direct physical connection between two devices is created by space

division switches, time division switches or both. In packet switching data is transmitted using a packet

switched network. Packet switched network is a network in which data are transmitted in independent

units called packets.

9.What are the duties of data link layer?


Ans: Data link layer is responsible for carrying packets from one hop (computer or router) to the next. The duties

of data link layer include packetizing, addressing, error control, flow control, medium access control.

10.What are the types of errors?


Ans: Errors can be categorized as a single-bit error or burst error. A single bit error has one bit error

per data unit. A burst error has two or more bits errors per data unit.

11.What do you mean by redundancy?

Page 26
Computer Network- 2 MARKS Questions
Ans: Redundancy is the concept of sending extra bits for use in error detection. Three common

redundancy methods are parity check, cyclic redundancy check (CRC), and checksum.

12.Define parity check.


Ans: In parity check, a parity bit is added to every data unit so that the total number of 1s is even (or
odd for odd parity). Simple parity check can detect all single bit errors. It can detect burst errors only
if the total number of errors in each data unit is odd. In two dimensional parity checks, a block of bits is
divided into rows and a redundant row of bits is added to the whole block.
13. Define cyclic redundancy check (CRC).
Ans: C RC appends a sequence of redundant bits derived from binary division to the data unit. The

divisor in the CRC generator is often represented as an algebraic polynomial.

14. What is hamming code?

Ans: The hamming code is an error correction method using redundant bits. The number of bits is a

function of the length of the data bits. In hamming code for a data unit of m bits, we use the formula

2r >= m+r+1 to determine the number of redundant bits needed. By rearranging the order of bit

transmission of the data units, the hamming code can correct burst errors.

15.What do you mean by flow control?

Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t become overwhelmed.

i.e. flow control refers to a set of procedures used to restrict the amount of data that the sender can

send before waiting for acknowledgement.

16.What do you mean by error control?

Ans: Error control refers primarily to methods of error detection and retransmission. Anytime an error

is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat

request (ARQ).

17.Define stop and wait ARQ.

Ans: In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the

receiver before sending the next frame.

18.Define Go-Back-N ARQ?

Page 27
Computer Network- 2 MARKS Questions
Ans: In Go-Back-N ARQ, multiple frames can be in transit at the same time. If there is an error,

retransmission begins with the last Unacknowledged frame even if subsequent frames arrived correctly.

Duplicate frames are discarded.

19.Define Selective Repeat ARQ?

Ans: In Selective Repeat ARQ, multiple frames can be in transit at the same time. If there is an error,

only unacknowledged frame is retransmitted.

20.What do you mean by pipelining, is there any pipelining in error control?


Ans: The process in which a task is often begun before the previous task has ended is called pipelining.
There is no pipelining in stop and wait ARQ however it does apply in Go-Back-N ARQ and Selective
Repeat ARQ.
Set-10
1.What is HDLC?

Ans: It is a bit oriented data link protocol designed to support both half duplex and full duplex

communication over point to point and multi point links. HDLC is characterized by their station type,

configuration and their response modes.

2.What do you mean by point to point protocol?

Ans: The point to point protocol was designed to provide a dedicated line for users who need internet

access via a telephone line or a cable TV connection. Its connection goes through three phases: idle,

establishing, authenticating, networking and terminating. At data link layer it employs a version of HDLC.

3. What do you mean by point to point protocol stack?

Ans: Point to point protocol uses a stack of other protocol to use the link, to authenticate the parties

involved, and to carry the network layer data. Three sets of protocols are defined: link control protocol,

Authentication protocol, and network control protocol.

4.What do you mean by line control protocol?

Ans: It is responsible for establishing, maintaining, configuring, and terminating links.

5A.What do you mean by Authentication protocol?

Page 28
Computer Network- 2 MARKS Questions
Ans: Authentication means validating the identity of a user who needs to access a set of resources. It is

of two types: i) Password Authentication Protocol(PAP)

ii)Challenge Handshake Authentication Protocol(CHAP)

PAP is a two-step process. The user sends a authentication identification and a password. The system

determines the validity of the Information sent. CHAP is a three step process. The system sends a value

to the user. The user manipulates the value and sends the result. The system Verifies the result.

5.What do you mean by network control protocol?

Ans: Network control protocol is a set of protocols to allow the encapsulation of data coming from

network layer protocol that requires the services of PPP.

6. What do you mean by CSMA?

Ans: To reduce the possibility of collision CSMA method was developed. In CSMA each station first

listen to the medium (Or check the state of the medium) before sending. It can’t eliminate collision.

7.What do you mean by Bluetooth?

Ans: It is a wireless LAN technology designed to connect devices of different functions such as

telephones, notebooks, computers, cameras, printers and so on. Bluetooth LAN Is an adhoc network that

is the network is formed spontaneously? It is the implementation of protocol defined by the IEEE

802.15 standard.

8.What is IP address?

Ans: The internet address (IP address) is 32bits that uniquely and universally defines a host or router

on the internet. The portion of the IP address that identifies the network is called netid. The portion of

the IP address that identifies the host or router on the network is called hostid.

9.What do you mean by subnetting?

Ans: Subnetting divides one large network into several smaller ones. It adds an intermediate level of

hierarchy in IP addressing.

Page 29
Computer Network- 2 MARKS Questions
10.What are the advantages of fiber optics cable?

Ans: The advantages of fiber optics cable over twisted pair cable are Noise Resistance-As they use light

so external noise is not a factor. Less signal attenuation-fiber optics transmission distance is

significantly greater than that of other guided media. Higher bandwidth-It can support higher

bandwidth.

12.What are the disadvantages of fiber optics cable?

Ans: The disadvantages of fiber optics cable over twisted pair cable are Cost-It is expensive

Installation/maintenance-Any roughness or cracking defuses light and alters the signal Fragility-It is

more fragile.

13.What are the propagation type of radio wave?

Ans: Radio wave propagation is dependent upon frequency. There are five propagation types.

i)surface propagation ii) Tropospheric propagation iii) Ionospheric propagation

iv)Line of sight propagation v) space propagation

14.What do you mean by Geosynchronous Satellites?


Ans: Satellite communication uses a satellite in geosynchronous orbit to relay signals. The Satellite must

move at the same speed as the earth so that it seems to remain fixed above a certain spot. Only one

orbit can be geosynchronous. This orbit occurs at the equatorial plane and is approximately 22,000 miles

from the surface of earth.

15.What are the factors for evaluating the suitability of the media?
Ans: The factors are cost, throughput, attenuation, Electromagnetic interference(EMI), security.

16.What do you mean by medium access control(MAC) sublayer.


Ans: The protocols used to determine who goes next on a multi-access channel belong to a sublayer of the

data link layer is called the multi-access channel(MAC) sublayer. It is the bottom part of data link layer.

17.What do you mean by ALOHA?


Ans: It is the method used to solve the channel allocation problem. It is used for:

i)ground based radio broadcasting

Page 30
Computer Network- 2 MARKS Questions
ii)In a network in which uncoordinated users are competing for the use of single channel.

It is of two types: 1.Pure aloha 2.Slotted aloha

18.What is pure ALOHA?


Ans: It lets users transmit whenever they have data to send. Collision may occur but due to feedback

property sender can know the status of message. conflict occur when at one time more bits are

transmitted. The assumptions are :

i)all frame size is same for all user.

ii)collision occur when frames are transmitted simultaneously

iii)indefinite population of no of user.

iv)N=number of frames/frame time

iv)it obeys poisson’s distribution if N>1 there will be collision 0<1

19.What is slotted ALOHA?

Ans: In this method time is divided into discrete intervals, each interval corresponding to one frame. It

requires user to agree on slot boundaries. Here data is not send at any time instead it wait for beginning

of the next slot. Thus pure ALOHA is tuned into discrete one.

20.What do you mean by persistent CSMA(carrier sense multiple access)?

Ans: When a station has data to send, it first listens to the channel to see if anyone else is transmitting

at that moment. If channel is busy it waits until the station becomes idle. When collision occurs it waits

and then sends. It sends frame with probability 1 when channel is idle.

Page 31
Computer Network- 2 MARKS Questions
Set-11
1.What do you mean by non-persistent CSMA(carrier sense multiple access) ?

Ans: Here if no one else is sending the station begins doing so itself. However, if the channel is already

in use, the station doesn’t continuously sense it rather it waits for a random period of time and then

repeats. It leads better channel utilization but longer delay.

2.What do you mean by p persistent CSMA(carrier sense multiple access)?

Ans: It applies to slotted channels. When a station becomes ready to send, it senses the channel. If it is

idle it transmits with a probability P, with a probability Q=P-1 It defers until the next slot. If that slot

is also idle, it either transmits or defers again with probability P and Q. The process is repeated until

either the frame has been transmitted or another station begins transmitting.

3.What is FDDI?

Ans: It is high performance fiber optic token ring LAN running at 100Mbps over distance up 1000

stations. FDDI access is limited by time. A FDDI cabling consist of two fiber rings.

i)one transmitting clockwise ii)one transmitting counterclockwise

4.What is Firewalls?

Ans: It is an electronic down bridge which is used to enhance the security of a network. It’s

configuration has two components.

i)Two routers ii)Application gateway

the packets traveling through the LAN are inspected here and packets meeting certain criteria are

forwarded and others are dropped.

5.What is Repeaters?

Ans: A receiver receives a signal before it becomes too weak or corrupted, regenerates the original bit
pattern, and puts the refreshed copy back onto the link. It operates on physical layer of OSI model.

6.What is Bridges?

Ans: They divide large network into smaller components. They can relay frames between two originally
separated LANs. They provide security through partitioning traffic. They operate on physical and data
link layer of OSI model.

Page 32
Computer Network- 2 MARKS Questions
7.What is Routers?

Ans: Router relay packets among multiple interconnected networks. They receive packet from one
connected network and pass it to another network. They have access to network layer addresses and
certain software that enables them to determine which path is best for transmission among several
paths. They operate on physical, data link and network layer of OSI model.

8.What is Gateway?

Ans: It is a protocol converter. A gateway can accept a packet formatted for one protocol and convert it
to a packet formatted for another protocol. It operates on all the seven layers of OSI model.

9.What do you mean by Data Terminal Equipment(DTE)?

Ans: It is any device that is source of or destination for binary digital data. At physical layer it can be a
terminal computer. They generate or consume information.

10.What do you mean by Data Terminating Equipment (DCE)?

Ans: Data circuit terminating equipment includes any functional unit that transmit or receives data in the
form of an analog or digital signal through a network. DTE generates digital data and passes them to a
DCE, the DCE converts the data to a form acceptable to the transmission media and sends the converted
signal to another DCE on the network.

11.What do you mean by protocol stack?

Ans: The list of protocols used by certain system, one protocol per layer is called protocol stack.

12.What do you mean by peer?

Ans: Entities comprising the corresponding layers on different machines are called peers. It may be

• hardware device.

• processes

• human being peers communicate by using protocol.

13.What do you mean by broadcasting?

Ans: Broadcast system allow addressing a packet to all destination by using a special code in address
field. when packet is transmitted it is received and processed by every machine on the network.

Page 33
Computer Network- 2 MARKS Questions
14.What are the advantages of broadcast network.
Ans:
 a single communication channel is shared by all computers.
 packets are transmitted and received by all the computer.
 address field is attached to whom it is intended.
 multicasting is used in network.

15.What do you mean by point to point network?

Ans: Point to point network consist of many connections between individual pair of machines. large
networks are point to point. Routing algorithm plays an important in point to point network. It uses
stored ad forward technique. It is a packet switching network.

16.What are the design issue of layers?

Ans: The design issue of layer are:


 Addressing technique.ie source and destination address

 Types of communication

 Error control

 Order of message.

 Speed matching

 Multiplexing and demultiplexing.

17.What are the protocols in application layer?


Ans: The protocols defined in application layer are: 1. TELNET 2. FTP 3. SMTP 4. DNS

18.What are the protocols in transport layer ?


Ans: The protocols defined in transport layer are: 1. TCP 2. UDP

19.Define TCP?

Ans: It is connection oriented protocol. It consists byte streams originating on one machine to be
delivered without error on any other machine in the network. While transmitting it fragments the
stream to discrete messages and passes to internet layer. At the destination it reassembles the
messages into output stream.

20.Define UDP?
Ans: It is unreliable connectionless protocol. It is used for one-shot, client-server type, request-reply
queries and applications in which prompt delivery is required than accuracy

Page 34
Computer Network- 2 MARKS Questions
Set-12
1.Define IP?

Ans: Internetwork protocol (IP) is the transmission mechanism used by TCP/IP protocol. It is an

unreliable and connectionless datagram protocol. It provides no error checking and tracking.

2.What do you mean by client server model?

Ans: In client server model, the client runs a program to request a service and the server runs a program

to provide the service. These two programs communicate with each other. One server program can

provide services to many client programs.

3.What are the information that a computer attached to a TCP/IP internet must possesses?

Ans: Each computer attached to TCP/IP must possesses the following information

 Its IP addesss

 Its subnet mask

 The IP addesss of the router.

 The Ip address of the name server.

4.What is domain name system(DNS)?

Ans: Domain Name System (DNS )is a client server application that identifies each host on the internet

with a unique user friendly name.

5.What is TELNET?

Ans: TELNET is a client –server application that allows a user to log on to a remote machine, giving the

user access to the remote system. TELNET is an abbreviation of terminal Network.

6.What do you mean by local login and remote login?

Ans: When a user logs into a local time-sharing system, it is called local login. When a user wants to
access an application program or utility located on a remote machine, he or she performs remote login.

Page 35
Computer Network- 2 MARKS Questions
7.What is Network Virtual Terminal?

Ans: A universal interface provided by TELNET is called Network Virtual Terminal(NVT) character set.
Via this interface TELNET translates characters (data or command) that come from local terminal into
NVT form and delivers them to the network.

8.What do you mean by Simple Mail Transfer Protocol?

Ans: The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer
Protocol. SMTP provides for mail exchange between users on the same or different computer and
supports Sending a single message to one or more recipient Sending message that include text, voice,
video, or graphics. Sending message to users on network outside the internet.

9.What is Hypertext Transfer Protocol(HTTP)?

Ans: It is the main protocol used to access data on the World Wide Web. the protocol transfers data in
the form of plain text, hypertext, audio, video, and so on. It is so called because its efficiency allows its
use in a hypertext environment where there are rapid jumps from one document to another.

10.What is URL?

Ans: It is a standard for specifying any kind of information on the World Wide Web.

11. What is World Wide Web?

Ans: World Wide Web is a repository of information spread all over the world and linked together. It is
a unique combination of flexibility, portability, and user-friendly features. The World Wide Web today
is a distributed client-server service, in which a client using a browser can access a service using a
server. The service provided is distributed over many locations called web sites.

12.What is HTML?

Ans: Hypertext Markup Language (HTML) is a language for creating static web pages

Page 36

You might also like