TCP IP and Internet
TCP IP and Internet
Set-1
It is the exchange of data between two devices via some form of Transmission medium ( such as
Sender
Receiver
Transmission medium
Message
Protocol
Accuracy
Delivery
Timeliness
It is a method of transmitting information from one place to another by sending light through an
optical fiber.
A task is divided among multiple computers. Instead of single large machine handling all the process,
Open system interconnection model is a model for understanding and designing a network
A network is a set of devices connected by physical media links. A network is recursively a connection
of two or more nodes by a physical link or two or more networks connected by one or more nodes
9. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some
physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.
If the physical links are limited to a pair of nodes it is said to be point-point link.
If the physical links are shared by more than two nodes, it is said to be Multiple Access.
Switches are H/W or S/W devices capable of creating temporary Connections B/W 2 or more devices.
The types of switching are: 1. Circuit switching 2. Packet switching 3.Message switching
It connects m inputs to n outputs in a grid using electronic micro switches at each cross points.
The reduction in the number of cross points result in a phenomenon called Blocking.
Page 2
Computer Network- 2 MARKS Questions
Set-2
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is
responsible for:
4. What is CSMA/CD?
Carrier Sense Multiple Access with Collision Detection is a protocol used to sense whether a medium is
busy before transmission and it also has the ability to detect whether the packets has collided with
another.
It refers to a set of procedures used to restrict the amount of data the sender can sent before waiting
for an acknowledgement
Page 3
Computer Network- 2 MARKS Questions
9. What are the functions of data link layer?
The functions of data link layer are: 1. Flow control 2. Error control
It coordinates the link system. It determines which device can send and when it can send.
When the primary device is ready to receive data, it asks the secondary to send data. This is called
polling.
A Bluetooth network is called Piconet .It can have up to eight stations one of which is called the master
To connect LANs or segments of LAN we use connecting devices. These devices can operate in different
It allows several LANs to be connected. The architecture used are Star and Bus
Page 4
Computer Network- 2 MARKS Questions
Set-3
The Network Layer is responsible for the source-to-destination delivery of packet possibly across
a. Logical Addressing
b. Routing.
2. What is DHCP?
The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration. DHCP is
also needed when a host moves from network to network or is connected and disconnected from a
network.
3. Define ICMP?
Internet Control Message Protocol is a collection of error messages that are sent back to the source
4. What is BOOTP?
BOOTSTRAP Protocol is a client/server protocol designed to provide the following four information for
a diskless computer or a computer that is booted for the first time. IP address, Subnet mask, IP
ARP stands for Address resolution protocol, maps an IP address to a MAC address
RARP stands for Reverse Address resolution protocol, maps an MAC address to a IP address
It refers to the way a packet is handled by the underlying network under the control of network layer
Page 5
Computer Network- 2 MARKS Questions
11. What is class less addressing?
Classless addressing requires hierarchical and geographical routing to prevent immense routing tables
Unicast communication is one source sending a packet to one destination. Multicast communication is one
The Internet address (or IP address) is 32 bits (for IPv4) that uniquely and universally defines a host or
router on the Internet. The portion of the IP address that identifies the network is called the net id.
The portion of the IP address that identifies the host or router on the network is called the host id.
It refers to a way a packet is delivered to next station. It requires a host or a Router to have a routing
table.
The two common notations used for address are: 1. Binary notations 2. Dotted decimal notations
1. Larger address space 2. Better header format 3. New options 4. Support for more security
In direct delivery source and destination node belong to e same network In indirect delivery source and
The bytes in the IP address that corresponds to 255 in the mask will be repeated in the Sub network
address. The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub
network address. For other bytes, use the bit-wise AND operator.
Fragmentation is the division of a datagram into smaller units to accommodate the MTU of a data link
protocol.
Page 6
Computer Network- 2 MARKS Questions
Set-4
The Transport Layer is responsible for source-to-destination delivery of the entire message.
2. Define Congestion
It will occur if the number of packets sent to the network is greater than the Capacity of the network.
The two factors that measure network performance are Delay Throughput.
6. Compare Open loop Congestion Control & Closed loop congestion control
In Open loop congestion control, policies are applied to prevent congestion before it happens. In Closed
loop congestion control, policies are applied to reduce congestion after it happens.
The quality of service defines a set of attributes related to the performance of the is connection. For
each connection, the user can request a particular attribute each service class associated with a set of
attributes.
TCP guarantees the reliable, in order delivery of a stream of bytes. It is a full-duplex protocol, meaning
that each TCP connection supports a pair of byte streams, one flowing in each direction.
Three types of addresses are used by systems using the TCP/IP protocol: the physical address, the
Page 7
Computer Network- 2 MARKS Questions
10. What are the flow characteristics related to QOS?
13. What are the two types of protocols used in Transport layer?
The two types of protocols used in Transport layer are: 1.TCP and 2. UDP
14.Define Throughput.
15.Define UDP
User datagram protocol is a Unreliable, connectionless protocol, used along with the IP protocol
17. What are the types of port numbers used in transport layer?
TCP allows the sending process to deliver data as a stream of bytes and the receiving process to deliver
19 .Define jitter
In connection less service there is no connection between transmitter & receiver Ex: TCP
In connection oriented service there is a connection between transmitter & receiver Ex: UDP
Page 8
Computer Network- 2 MARKS Questions
Set-5
1. What are the responsibilities of Application Layer?
The Application Layer enables the user, whether human or software, to access the network. It provides
user interfaces and support for services such as e-mail, shared database management and other types of
Mail services
Directory Services
To send a message from one application program to another, the TCP/UDP protocol encapsulates and de-
capsulate messages.
3. What is DNS?
Domain name service is the method by which Internet address in mnemonic form such assun.it.ac.in are
Generic domain define registered hosts according to their generic behavior. Each node in the tree
defines a domain, which is an index to the domain name space database Eg.
The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer
Protocol (SMTP). It’s a system for sending messages to other computer users based on email addresses.
A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a program
Page 9
Computer Network- 2 MARKS Questions
8. What do you mean by File transfer protocol?
It is a standard mechanism provided by the internet for copying a file from one host to another
The two types of connections in FTP are: 1. Control connection and 2. Open connection
It is used mainly to access data on the World Wide Web. The protocol transfer data in the form of
The types of messages in HTTP transaction are: 1. Request messages and 2. Response messages
In Symmetric key cryptography both the parties will use the same key.
Post Office Protocol, version3 (POP3) and Internet Mail Access Protocol version4 (IMAP4) are protocol
used by a mail server in conjunction with SMTP to receive and hold mail for hosts.
Page 10
Computer Network- 2 MARKS Questions
Set-6
Ans Several factors affect how data is transmitted. They include the following
other communications devices that can communicate with one another and share applications and data.
(i) Sharing of peripheral devices. (ii) Sharing of programs and data (iii) Better communications
(i) Node (ii) Hub (iii) Backbone (iv) Router (v) Bridge (vi) Gateway
Ans (i) Node:- A node is a piece of hardware on the system that can be addressed by a message from
(ii) Hub:- Node are connected to a hub, also called a concentrator, whose purpose is to simplify wiring
(iii) Backbone:-A backbone is a high –capacity link to which many nodes or hub can be connected ,it is
(iv) Router:-A router is a special computer that direct communicating messages when several networks
(v) Bridge:-A bridge is an interface used to connect the same type of networks.
instance, between a LAN and a WAN or between two LANs based on different OS or different layouts.
Page 11
Computer Network- 2 MARKS Questions
lQ4. What are the major difference between LAN and WAN?
LAN WAN
LAN are small sized networks WAN are geographically spread over wide area.
Range of LAN may vary from 10m to 1.5 km. There is no limitation on the distance it spans.
LAN operate between 10Mbps and 2 Gbps. Typical speed of WAN varies from 56Kbps to 155 Mbps.
They offer very low delay. They offer very high delay
(ii) Authentication:- Determining the authorized users before sharing sensitive information with or
Q6. What is the purpose of using a Web Browser? Name any one commonly used Web Browser.
Ans The Web Browser fetches the page requested, interprets the text and formatting commands
that it contains and display the page property formatted on the screen.
Ans Advantages of STAR topology: (i) One device per connection. (ii) Easy to access
Disadvantages of STAR topology: (i) Central node dependency (ii) Long cable length.
Ans Telnet-to connect to remote computers. Telnet is a program or command that allows the user to
connect to remote computers on the Internet using a user name and password.
FTP(File transfer protocol):- is a method whereby the user can connect to a remote computer known as
Page 12
Computer Network- 2 MARKS Questions
FTP site and transfer files to his/her own microcomputer’s hard disk. Some FTP files are open to the
Ans DHTML is the next generation of HTML. It describes how text and images are displayed on a web page.
Dynamic HTML, developed by Netscape and the World Wide Web Consortium (W3C) is based entirely on
industry standard HTML and Java. New features in Dynamic HTML, such as absolute positioning and layers,
give designers and developers much greater control over the look and feel of web pages.
ISP(Internet Service Provider) is a company that connects your communication line to is servers, or
central (host)computer, which connects you to the internet via another company’s network access points.
ISP’s have a wide range of prices and packages for users to choose from.
Ans: Firewalls are defensive barriers that fence off a private network from the internet.
Q11. What is the difference B/W Message Switching technique and Packet Switching technique?
Ans: Message Switching:-It is better known as store and forward. In this mechanism a node on
receiving a message, stores it till the appropriate route is not free, then forwards it on the route when
Packet Switching:-It is best for data. In a packet –switched network, data are transmitted in discrete
units called packets. A packet is a fixed length block of data for transmission. The maximum length of
the packet is established by the network. Longer transmissions are broken up into multiple packets. The
packets have headers with priority codes and source and destination addresses along with data to be
sent. The packets are sent over the network node to node, kept there for a small time and then routed
(i) Restricting/Penalizing unauthorized user. (ii) Promoting , coordinating and controlling e-Business.
Page 13
Computer Network- 2 MARKS Questions
Ans The growing importance of LANs and the increasing complexity of desktop computing applications
100BASE-T(Fast Ethernet) provides a cost effective and high-performance for small workgroups.
SMBs(Small to Medium Business), and any network supporting bandwidth-intensive applications. Fast
Ethernet technology operates at 10 times the speed of traditional Ethernet, offering maximum
Q14. What is the diffrence between XML and HTML? Write two differences.
XML HTML
It doesn’t specify either semantics or tag set. The semantics and tag set are fixed.
structured information and all semantics are document and to specify the hyperlinks.
Ans: A modem is a computer peripheral that connects a workstation to other workstation via telephones
lines and facilitates communications. It is short form for modulation/Demodulation. Modem converts
digital signals to A/F(Audio Frequency) tones which are in the frequency range that the telephone lines
can transmit and it can also convert transmitted tones back to digital information.
Ans The internet is worldwide network of computer networks around the globe. Internet uses a set of
On the other hand Intranet is a network ,which is privately owned. Intranet also uses a set of protocols
as internet.
Page 14
Computer Network- 2 MARKS Questions
Q18. Define the following :
(i) Data channel (ii) Baud (iii)bps (iv) Bps (v) Bandwidth
Ans: (i) A data channel is a medium used to carry information or data from one point to the other.
(ii) Baud is the unit of measurement for the information carrying capacity of a communication channel.
(iii) bps:- bits per second. It refers to a thousand bits transmitted per second.
(iv) Bps:- bytes per second. It refers to a thousand bytes transmitted per second.
(v) Bandwidth:-It refers to the difference between the highest and lowest frequencies of a
transmission channel. This term is also sometimes used to refer to the amount of information travelling
Ans: Tree topology:- is a network with the shape of an inverted tree with the central root branching
Bus topology:-In this topology, all devices on network are connected to a single continuous cable called a
Ans. A backbone network is a network that is used as a backbone to connect the several LAN’S together
to form a WAN.
FDDI (Fiber Distribute Data Interface) is such a network. FDDI is a high performance fiber optic token
ring LAN running at 100 Mbps over distances up to 200 kms with up to 1000 stations connected.
Ans. Cookies are messages that a web server transmits to a web browser so that the web server can
Ans. XML is a markup language for creating documents containing structured information. In HTML both
tag semantics and tag are fixed but XML specifies neither semantics nor tag set. Rather it provides a
Page 15
Computer Network- 2 MARKS Questions
Ans. LANs that are segmented through switches are called switched LANs. In case of Ethernet LANs
Q24. What is a communication channel? What choices do u have while choosing a communication
Ans. Communication channels mean the connecting cables that link various workstations. There are three
(i) Twisted Pair Cables:- These cables consist of two insulated copper wires twisted around each other.
These are also used for short and medium range telephone communication.
(ii) Coaxial Cables:- A coaxial cable consist of one or more small cables in protective covering. These are
(iii) Fiber-optic Cables:– These cables are made of plastic and glass and are about as thick as human
hair. These cables are highly durable and offer excellent performance but are expensive.
Q25 What do you mean by topology? What are the most popular topologies?
Ans. Topology refers to the way which the workstations attached to the network are interconnected.
Ans. The system designed to prevent unauthorized access to or form a private network is called
Q27. What is the significance of anonymous user in FTP? What is uploading? Can an anonymous
Ans. In order to use FTP effectively, one needs to be an authorized user. However, anonymous FTP is a
method whereby FTP server allows the general public to access files on the FTP.
Uploading of files refers to the transfer of files from one’s computer onto FTP server.
An anonymous user generally is not allowed to do so and anonymous users have permission to download
only. However, on many UNIX FTP servers, there is a / incoming directory. If this directory is there,
then an anonymous users have permissions to upload only in this directory and nowhere else.
Page 16
Computer Network- 2 MARKS Questions
Q28. What is Ethernet? What is Ethernet Card?
Ans. Ethernet is a LAN architecture developed by Xerox Corp in association with DEC and Intel.
Ethernet uses bus or star topologies and can support data transfer rates of up to 10 Mbps. The
computers that are the part of Ethernet have to install a special card called Ethernet Card.
Set-7
most important part of the network system providing access to resources and providing security.
resources available on the network. Here the resources are shared among the nodes. Each computer acts
Cost: Application software (Network version) can be installed on one Computer and accessed by
other Computers on the Network. This makes maintenance and upgrading of software easy.
Security: The information on the computer can be made available only through password. Further
some information can be made available only for reading and not copying.
Resource sharing: Expensive peripheral devices can be shared by many users in a network.
Page 17
Computer Network- 2 MARKS Questions
Easy access: Users can access information from any computer that is available on the network.
They need go to a specific Computer which may be located in a different building or different
LAN-Local area Network is networking of Computers in a smaller physical area like a home, office or
small group of buildings. The advantages of LAN are: high data transfer rate, sharing of resources
like printers, files and other applications. The Computers are connected using cables.
MAN-A Metropolitan area Network is a network of computers within a city or metropolitan area. It
is an extended LAN. They use fiber optic cables for faster data transmission. A MAN supports both
WAN-Wide area Networks connect computers in larger geographical areas. The computers are
connected using satellite links, cables or long distance telecommunication links. Security of data is
File Services-All the data files of an organization are stored in one place and can be shared by many
Print Services- When Printers available on the Network, multiple users can print to the same
printer. The network printers are usually faster and more capable. They may have accessories such
Database Services-Multiple users can have access to the database at the same time. The Database
Message Services-The services include Electronic mail, voice mail, remote access, document
Application services- several software applications that are developed using network architecture.
The applications can be made available to multiple users. Any upgradation made to these applications
network share the common bus. This topology is very reliable since a failure of one or more nodes does
not affect the bus. The disadvantages of the linear bus are the need for minimum distances between
nodes to avoid signal interference, & the loss of data caused by the simultaneous transmission by 2 nodes.
STAR- in star network, each node is connected directly to the central computer. All communications
between the nodes have to pass through the central computer. Star networks allow the administrator to
give selected nodes higher priority and also allow centralized running of diagnostic programs.
RING- in a ring network, all nodes are connected to a common cable, and the cable starts and ends at
the network server. In this type of network, communications are always in one direction, and the data
being transmitted is passed through each node in the ring. A major disadvantage of this network is that
when a node fails, it can completely halt all communications on the network.
TREE- a tree topology combines characteristics of linear bus and star topologies. It consists of groups
of star configured workstations connected to a linear bus backbone cable. Tree topologies allow for the
expansion of an existing network, and enable schools to configure a network to meet their needs.
MESH- a pure mesh network has point- to- point connections between every node in the network. Pure
mesh architectures are not usually considered practical. One problem is that each device requires an
Client-server networks consist of servers and clients. Server is a powerful Computer using advanced
network operating system and clients(workstation) access data stored in servers. Server can host e-mail,
store common data files and other applications needed by the client. The server also validates any user
who tries to login and denies access to network resources as well as client software to unauthorized
users. Servers are mainly used for centralized management of data and resources.
Advantages
Upgrading and replacement of applications are done as needs increase, without changing the
existing formats.
Page 19
Computer Network- 2 MARKS Questions
Clients can access the server from remote locations.
New technologies(object oriented programming)can be integrated easily ,as and when the need
arises.
Limitations(Disadvantages)
If the server breaks down, the operations of client processes may stop.
In a peer-peer network, there are no dedicated servers. All Computers are equal, and therefore termed
as peer-peer. Each Computer functions both as a client and a server. No single Computer holds the
control of entire network. The users are located in the same area and security is not an important issue.
All the users can access data and programs that reside on all the computers across the network without
any restrictions.
Advantages
Disadvantages(Limitations)
A failure of a node in peer-peer network means the network can no longer access
Ans: It is the exchange of data between two devices via some form of transmission medium such as wire
cable. The communicating system must be part of a communication system made up of a combination of
hardware and software. The effectiveness of a data communication system depends on three
Page 20
Computer Network- 2 MARKS Questions
13.What is simplex?
Ans: It is the mode of communication between two devices in which flow of data is unidirectional. i.e. one
can transmit and other can receive. E.g. keyboard and monitor.
14.What is half-duplex?
Ans: It is the mode of communication between two devices in which flow of data is bidirectional but not
at the same time. ie each station can transmit and receive but not at the same time. E.g walkie-talkies
Ans: It is the mode of communication between two devices in which flow of data is bidirectional and it
occurs simultaneously. Here signals going in either direction share the capacity of the link. E.g. telephone
16.What is a network?
Ans: It is a set of devices connected by communication links. A node can be a computer or any other
device capable of sending and/or receiving data generated by other nodes on the network.
Ans: It is a strategy in which services provided by the network reside at multiple sites.
Ans:It provides a dedicated link between two devices. The entire capacity of the link is reserved for
transmission between the two devices e.g. when we change the TV channels by remote control we
establish a point to point connection between remote control and TV control system.
Ans: In multipoint connection more than two specific devices share a single link. Here the capacity of the
20.Define internet?
Page 21
Computer Network- 2 MARKS Questions
Ans: It is a network of networks.
Set-8
1.What is a protocol?
Ans: It is a set of rules that governs data communication. A protocol defines what is communicated, how
it is communicated, and when it is communicated. The key elements of protocol are syntax, semantics and
timing.
Data link- It organizes bits into frames. It provides hop to hop delivery.
Transport-It provides reliable process to process message delivery and error recovery.
Organization for Standardization (ISO) .It is a seven layer model. It is a theoretical model designed to
show how a protocol stack should be implemented. It defines two extra layers in addition to TCP/IP
model.
Session -It was designed to establish, maintain, and synchronize the interaction between communicating
system
Presentation-It was designed to handle the syntax and semantics of the information exchanged between
the two systems. It was designed for data translation, encryption, decryption, and compression.
4. What is multiplexing?
Page 22
Computer Network- 2 MARKS Questions
Ans: Multiplexing is the process of dividing a link, the physical medium, into logical channels for better
efficiency. Here medium is not changed but it has several channels instead of one.
5.What is switching?
Ans: Switching in data communication is of three types:
Ans: Analog signals can have an infinite number of values in a range but digital signal can have only a
8.Define bandwidth?
Ans: The range of frequencies that a medium can pass is called bandwidth. It is the difference between
the highest and lowest frequencies that the medium can satisfactorily pass.
Ans: Data rate ie. how fast we can send data depends upon
i) Bandwidth available
Ans: Digital signals are aperiodic.so instead of using period and frequency we use bit interval and bit rate
respectively. Bit interval is the time required to send one single bit. Bit rate is the number of bit
Ans: For a noiseless channel, the Nyquist bit rate formula defines the theoretical maximum bit rate
Bitrate=2* Bandwidth*log2L
Page 23
Computer Network- 2 MARKS Questions
Where Bandwidth is the bandwidth of the channel L is the number of signal level used to represent the
Ans: Shannon Capacity determines the theoretical highest data rate foe a noise channel.
Bandwidth is the bandwidth of the channel. SNR is the signal to noise ratio, it is the statically ratio of
the power of the signal to the power of the noise. Capacity is the capacity of the channel in bits per
second.
13.What is sampling?
Ans: It is the process of obtaining amplitude of a signal at regular intervals.
Ans: It is an analog to digital conversion method which takes analog signals, samples it and generates a
series of pulse based on the results of the sampling. It is not used in data communication because the
series of pulses generated still of any amplitude. To modify it we use pulse code modulation.
Ans: Pulse code Modulation modifies pulses created by PAM to create a completely digital signal. For this
PCM first quantizes the PAM pulse. Quantization is the method of assigning integral values in a specific
Ans: According to this theorem, the sampling rate must be at least 2 times the highest frequency of the
original signal.
Ans: Data transmission can be serial or parallel in mode In parallel transmission, a group of bits is sent
simultaneously, with each bit on a separate line. In serial transmission there is only one line and the bits
Ans: It is a serial mode of transmission. In this mode of transmission, each byte is framed with a start
bit and a stop bit. There may be a variable length gap between each byte.
Page 24
Computer Network- 2 MARKS Questions
19.What is Synchronous mode of data transmission?
Ans: It is a serial mode of transmission. In this mode of transmission, bits are sent in a continuous
stream without start and stop bit and without gaps between bytes. Regrouping the bits into meaningful
Ans: Multiplexing is of three types. Frequency division multiplexing and wave division multiplexing is for
Ans: In frequency division multiplexing each signal modulates a different carrier frequency. The
modulated carrier combines to form a new signal that is then sent across the link. Here multiplexers
modulate and combine the signal while DE multiplexers decompose and demodulate. Guard bands keep the
2.What is TDM?
Ans: In TDM digital signals from n devices are interleaved with one another, forming a frame of data.
Coaxial cable has the following layers: a metallic rod-shaped inner conductor, an insulator covering the
rod, a metallic outer conductor (shield), an insulator covering the shield, and a plastic cover. Coaxial
Page 25
Computer Network- 2 MARKS Questions
cable can carry signals of higher frequency ranges than twisted-pair cable. Coaxial cable is used in cable
Fiber-optic cables are composed of a glass or plastic inner core surrounded by cladding, all encased in an
outer jacket. Fiber-optic cables carry data signals in the form of light. The signal is propagated along
the inner core by reflection. Its features are noise resistance, low attenuation, and high bandwidth
capabilities. It is used in backbone networks, cable TV networks, and fast Ethernet networks.
communication is referred as wireless communication. Here signals are broadcaster through air and thus
switching. In circuit switching, a direct physical connection between two devices is created by space
division switches, time division switches or both. In packet switching data is transmitted using a packet
switched network. Packet switched network is a network in which data are transmitted in independent
of data link layer include packetizing, addressing, error control, flow control, medium access control.
per data unit. A burst error has two or more bits errors per data unit.
Page 26
Computer Network- 2 MARKS Questions
Ans: Redundancy is the concept of sending extra bits for use in error detection. Three common
redundancy methods are parity check, cyclic redundancy check (CRC), and checksum.
Ans: The hamming code is an error correction method using redundant bits. The number of bits is a
function of the length of the data bits. In hamming code for a data unit of m bits, we use the formula
2r >= m+r+1 to determine the number of redundant bits needed. By rearranging the order of bit
transmission of the data units, the hamming code can correct burst errors.
Ans: It is the regulation of sender’s data rate so that the receiver buffer doesn’t become overwhelmed.
i.e. flow control refers to a set of procedures used to restrict the amount of data that the sender can
Ans: Error control refers primarily to methods of error detection and retransmission. Anytime an error
is detected in an exchange, specified frames are retransmitted. This process is called automatic repeat
request (ARQ).
Ans: In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the
Page 27
Computer Network- 2 MARKS Questions
Ans: In Go-Back-N ARQ, multiple frames can be in transit at the same time. If there is an error,
retransmission begins with the last Unacknowledged frame even if subsequent frames arrived correctly.
Ans: In Selective Repeat ARQ, multiple frames can be in transit at the same time. If there is an error,
Ans: It is a bit oriented data link protocol designed to support both half duplex and full duplex
communication over point to point and multi point links. HDLC is characterized by their station type,
Ans: The point to point protocol was designed to provide a dedicated line for users who need internet
access via a telephone line or a cable TV connection. Its connection goes through three phases: idle,
establishing, authenticating, networking and terminating. At data link layer it employs a version of HDLC.
Ans: Point to point protocol uses a stack of other protocol to use the link, to authenticate the parties
involved, and to carry the network layer data. Three sets of protocols are defined: link control protocol,
Page 28
Computer Network- 2 MARKS Questions
Ans: Authentication means validating the identity of a user who needs to access a set of resources. It is
PAP is a two-step process. The user sends a authentication identification and a password. The system
determines the validity of the Information sent. CHAP is a three step process. The system sends a value
to the user. The user manipulates the value and sends the result. The system Verifies the result.
Ans: Network control protocol is a set of protocols to allow the encapsulation of data coming from
Ans: To reduce the possibility of collision CSMA method was developed. In CSMA each station first
listen to the medium (Or check the state of the medium) before sending. It can’t eliminate collision.
Ans: It is a wireless LAN technology designed to connect devices of different functions such as
telephones, notebooks, computers, cameras, printers and so on. Bluetooth LAN Is an adhoc network that
is the network is formed spontaneously? It is the implementation of protocol defined by the IEEE
802.15 standard.
8.What is IP address?
Ans: The internet address (IP address) is 32bits that uniquely and universally defines a host or router
on the internet. The portion of the IP address that identifies the network is called netid. The portion of
the IP address that identifies the host or router on the network is called hostid.
Ans: Subnetting divides one large network into several smaller ones. It adds an intermediate level of
hierarchy in IP addressing.
Page 29
Computer Network- 2 MARKS Questions
10.What are the advantages of fiber optics cable?
Ans: The advantages of fiber optics cable over twisted pair cable are Noise Resistance-As they use light
so external noise is not a factor. Less signal attenuation-fiber optics transmission distance is
significantly greater than that of other guided media. Higher bandwidth-It can support higher
bandwidth.
Ans: The disadvantages of fiber optics cable over twisted pair cable are Cost-It is expensive
Installation/maintenance-Any roughness or cracking defuses light and alters the signal Fragility-It is
more fragile.
Ans: Radio wave propagation is dependent upon frequency. There are five propagation types.
move at the same speed as the earth so that it seems to remain fixed above a certain spot. Only one
orbit can be geosynchronous. This orbit occurs at the equatorial plane and is approximately 22,000 miles
15.What are the factors for evaluating the suitability of the media?
Ans: The factors are cost, throughput, attenuation, Electromagnetic interference(EMI), security.
data link layer is called the multi-access channel(MAC) sublayer. It is the bottom part of data link layer.
Page 30
Computer Network- 2 MARKS Questions
ii)In a network in which uncoordinated users are competing for the use of single channel.
property sender can know the status of message. conflict occur when at one time more bits are
Ans: In this method time is divided into discrete intervals, each interval corresponding to one frame. It
requires user to agree on slot boundaries. Here data is not send at any time instead it wait for beginning
of the next slot. Thus pure ALOHA is tuned into discrete one.
Ans: When a station has data to send, it first listens to the channel to see if anyone else is transmitting
at that moment. If channel is busy it waits until the station becomes idle. When collision occurs it waits
and then sends. It sends frame with probability 1 when channel is idle.
Page 31
Computer Network- 2 MARKS Questions
Set-11
1.What do you mean by non-persistent CSMA(carrier sense multiple access) ?
Ans: Here if no one else is sending the station begins doing so itself. However, if the channel is already
in use, the station doesn’t continuously sense it rather it waits for a random period of time and then
Ans: It applies to slotted channels. When a station becomes ready to send, it senses the channel. If it is
idle it transmits with a probability P, with a probability Q=P-1 It defers until the next slot. If that slot
is also idle, it either transmits or defers again with probability P and Q. The process is repeated until
either the frame has been transmitted or another station begins transmitting.
3.What is FDDI?
Ans: It is high performance fiber optic token ring LAN running at 100Mbps over distance up 1000
stations. FDDI access is limited by time. A FDDI cabling consist of two fiber rings.
4.What is Firewalls?
Ans: It is an electronic down bridge which is used to enhance the security of a network. It’s
the packets traveling through the LAN are inspected here and packets meeting certain criteria are
5.What is Repeaters?
Ans: A receiver receives a signal before it becomes too weak or corrupted, regenerates the original bit
pattern, and puts the refreshed copy back onto the link. It operates on physical layer of OSI model.
6.What is Bridges?
Ans: They divide large network into smaller components. They can relay frames between two originally
separated LANs. They provide security through partitioning traffic. They operate on physical and data
link layer of OSI model.
Page 32
Computer Network- 2 MARKS Questions
7.What is Routers?
Ans: Router relay packets among multiple interconnected networks. They receive packet from one
connected network and pass it to another network. They have access to network layer addresses and
certain software that enables them to determine which path is best for transmission among several
paths. They operate on physical, data link and network layer of OSI model.
8.What is Gateway?
Ans: It is a protocol converter. A gateway can accept a packet formatted for one protocol and convert it
to a packet formatted for another protocol. It operates on all the seven layers of OSI model.
Ans: It is any device that is source of or destination for binary digital data. At physical layer it can be a
terminal computer. They generate or consume information.
Ans: Data circuit terminating equipment includes any functional unit that transmit or receives data in the
form of an analog or digital signal through a network. DTE generates digital data and passes them to a
DCE, the DCE converts the data to a form acceptable to the transmission media and sends the converted
signal to another DCE on the network.
Ans: The list of protocols used by certain system, one protocol per layer is called protocol stack.
Ans: Entities comprising the corresponding layers on different machines are called peers. It may be
• hardware device.
• processes
Ans: Broadcast system allow addressing a packet to all destination by using a special code in address
field. when packet is transmitted it is received and processed by every machine on the network.
Page 33
Computer Network- 2 MARKS Questions
14.What are the advantages of broadcast network.
Ans:
a single communication channel is shared by all computers.
packets are transmitted and received by all the computer.
address field is attached to whom it is intended.
multicasting is used in network.
Ans: Point to point network consist of many connections between individual pair of machines. large
networks are point to point. Routing algorithm plays an important in point to point network. It uses
stored ad forward technique. It is a packet switching network.
Types of communication
Error control
Order of message.
Speed matching
19.Define TCP?
Ans: It is connection oriented protocol. It consists byte streams originating on one machine to be
delivered without error on any other machine in the network. While transmitting it fragments the
stream to discrete messages and passes to internet layer. At the destination it reassembles the
messages into output stream.
20.Define UDP?
Ans: It is unreliable connectionless protocol. It is used for one-shot, client-server type, request-reply
queries and applications in which prompt delivery is required than accuracy
Page 34
Computer Network- 2 MARKS Questions
Set-12
1.Define IP?
Ans: Internetwork protocol (IP) is the transmission mechanism used by TCP/IP protocol. It is an
unreliable and connectionless datagram protocol. It provides no error checking and tracking.
Ans: In client server model, the client runs a program to request a service and the server runs a program
to provide the service. These two programs communicate with each other. One server program can
3.What are the information that a computer attached to a TCP/IP internet must possesses?
Ans: Each computer attached to TCP/IP must possesses the following information
Its IP addesss
Ans: Domain Name System (DNS )is a client server application that identifies each host on the internet
5.What is TELNET?
Ans: TELNET is a client –server application that allows a user to log on to a remote machine, giving the
Ans: When a user logs into a local time-sharing system, it is called local login. When a user wants to
access an application program or utility located on a remote machine, he or she performs remote login.
Page 35
Computer Network- 2 MARKS Questions
7.What is Network Virtual Terminal?
Ans: A universal interface provided by TELNET is called Network Virtual Terminal(NVT) character set.
Via this interface TELNET translates characters (data or command) that come from local terminal into
NVT form and delivers them to the network.
Ans: The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail Transfer
Protocol. SMTP provides for mail exchange between users on the same or different computer and
supports Sending a single message to one or more recipient Sending message that include text, voice,
video, or graphics. Sending message to users on network outside the internet.
Ans: It is the main protocol used to access data on the World Wide Web. the protocol transfers data in
the form of plain text, hypertext, audio, video, and so on. It is so called because its efficiency allows its
use in a hypertext environment where there are rapid jumps from one document to another.
10.What is URL?
Ans: It is a standard for specifying any kind of information on the World Wide Web.
Ans: World Wide Web is a repository of information spread all over the world and linked together. It is
a unique combination of flexibility, portability, and user-friendly features. The World Wide Web today
is a distributed client-server service, in which a client using a browser can access a service using a
server. The service provided is distributed over many locations called web sites.
12.What is HTML?
Ans: Hypertext Markup Language (HTML) is a language for creating static web pages
Page 36