Chapter 15 Computer Network
Chapter 15 Computer Network
ANS: VIRUS - is a computer program that can replicate itself and spread from one
computer to another.
45. Name any one antivirus software. (U)
ANS: Avira, AVG, Kaspersky, comodo
Two mark questions:
1. Mention the advantages or goals of networking. (U)
ANS: Refer below questions
2. Mention the disadvantages of networks. (U)
ANS: i. Purchasing the network cabling and file servers can be expensive.
ii. Managing a large network is complicated
iii. Virus can spread easily throughout a computer networks.
iv. There is a ganger of hacking.
3. Mention the needs or service of networks. (A)
ANS: Need of Networking:
o It is also commonly used to download programs and other files to your computer from
other servers.
6. Write any two advantages of FTP. (A)
ANS: Transfer data efficiently in bulk across the network.
Send multiple file directories at the same time.
7. Expand SLIP and PPP. (A)
ANS: SLIP: Serial Line Internet Protocol
PPP: Point to Point Protocol
8. Differentiate between dedicated and non-dedicated server. (A)
ANS: Non-dedicated Servers:
-
dedicated server since it is not completely dedicated to the cause of serving.
Dedicated Servers:
bus.
o Co-axial cable
o Optical Fiber cable
Unshielded Shielded
Shielded twisted pairs (STP) cables comes with shielding of individual pairs of wires,
which further protects it from external interference.
advantage of STP over UTP is that it offers greater protection from interference and
crosstalk due to shielding.
-wave transmission.
receives.
18. What is transmitter and receiver. (U)
ANS: odes it onto a sine wave and
transmits it with radio wave.
receives.
Both the transmitter and receiver use antennas to radiate and capture the radio signals.
19. Name the different switching techniques. (U)
ANS:
o Circuit Switching
o Message Switching
o Packet Switching
20. Explain circuit switching. (U)
ANS: Circuit Switching:
23. What is the difference between circuit and message switching? (U)
ANS: Refer above questions
24. Define the term repeaters, multiplexers. (U)
ANS: Repeater:
run.
25. How a router functions? (U)
ANS: A Router is a network device that is used to separate different segments in a
network to improve performance and reliability.
26. Define Gateway. (U)
ANS:
The term Gateway is applied to a device, system or software application which has
internetwork capability of joining dissimilar network.
- Subscriber Identity Module - is a chip card; the size of a first class postage
stamp.
ives a cellular device its unique phone number.
GSM:
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 11
CHAPTER - 15 COMPUTER NETWORK
frequency.
29. Write the difference between Wifi and Wifi hotspot? (U)
ANS: Wi-Fi is short for Wireless Fidelity, which lets you connect to the internet without a
direct line from your PC to the ISP.
A hotspot is a venue that offers Wi-Fi access.
-based wireless internet access.
30. Mention different protection methods. (U) (Virus protection methods are different)
ANS: 1. Authorization - Authorization is performed by asking the user a legal login ID.
3. Encryption Smart cards– conversion of the form of data from one form to another form
o Application gateway - security mechanism to specific application like FTP and Telnet
servers.
o Proxy Server - Intercepts all messages entering and leaving the network.
Crackers are the malicious programmers who break into secure systems.
ace.
Non-dedicated Servers:
-
dedicated server since it is not completely dedicated to the cause of serving.
-sharing among workstations on a
proportionately smaller scale.
Dedicated Servers:
In a ring topology, all computers are connected via cable that loops in a ring or circle.
Star Topology, all the computers are connected to a single hub or a switch through a
cable. This hub is the central node and all others nodes are connected to the central node.
A linear bus topology consists of a main run of cable with a terminator at each end.
Coaxial Cable
foil or wire
shields, each separated by some kind of plastic insulator.
speed
communication.
is less popular than twisted pair, it is widely used for television signals.
1. Thicknet: This form of coaxial cable is thicker than Thinnet. The Thicknet coaxial cable
segments (while joining nodes of a network) can be up to 500 meters long.
2. Thinnet: This form of coaxial cable is thinner and it can have maximum segment length
of 185 meters i.e. using these cables, nodes having maximum distance of 185 meters can
be joined.
Optical Fibers
constructed that they carry light from a source at one end of the fiber to a detector at the
other end.
problem of electrical
interference.
twisted pair.
established and then data are transmitted from the source computer to the destination
computer.
lephone call, the switching equipment within the
telephone system seeks out a physical copper path all the way from sender telephone to
the receiver's telephone.
Message Switching:
Packet Switching:
Simplex Mode
Half-Duplex Mode
-duplex mode, data can flow in both directions but only in one direction at a time.
-lane bridge where two-way traffic must give way in order to cross the
other.
Full-Duplex Mode
full-duplex communication
mode.
13. Give the examples for simplex, half duplex and full duplex communication mode. (A)
ANS:
Simplex mode - Data sent from computer to printer .
Half duplex mode - The Internet browsing.
end.
s:
o Internal modems: The modems that are fixed within the computer
o External modems: The modems that are connected externally to a computer as other
peripherals are connected.
15. Explain any three applications of networking. (A)
ANS:
i. Video conferencing: This is the process of conducting conference between two or more
participants at different sites by using computer networks.
ii. Chatting: It is real-time communication between two users via computer network.
iii. TELNET: It enables to control a computer system and communicate with other system
in the network.
16. Compare Wifi, Wifi hotspot and Wi-max. (A)
ANS: Wi-fi:
-Fi is short for Wireless Fidelity, which lets you connect to the internet without a direct
line from your PC to the ISP.
-Fi to work, you need:
o A broadband internet connection.
o A wireless router, which relays your internet connection from the “wall” to the PC.
o A laptop or desktop with a wireless internet card or external wireless adapter.
Wi-Fi Hotspots:
-Fi access.
, Wi-Fi phone or other suitable portable devices to access
the internet through a Wi-Fi hotspot.
-based wireless internet access.
WiMax:
Cost Factor:
o Personal computers have better price/performance ratio than micro computers.
o So it is better to have PC's, one per user, with data stored on one shared file server
machine.
Communication Medium.
o Using a network, it is possible for managers, working far apart, to prepare financial report
of the company.
o The changes at one end can be immediately noticed at another and hence it speeds up
co-operation among them.
o A File Server: Stores all of the software that controls the network, as well as the
software that can be shared by the computers attached to the network.
o A Workstation: Computers connected to the file server. These are less powerful than
the file server.
o Cables: Used to connect the network interface cards on each computer.
Metropolitan Area Network (MAN)
users.
r example, cable TV networks that are spread over a city can be termed as
metropolitan area networks.
Wide Area Network (WAN)
ated by large
distances and tied together.
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 27
CHAPTER - 15 COMPUTER NETWORK
inear bus topology consists of a main run of cable with a terminator at each end.
lled the
bus.
the network.
through a cable. This hub is the central node and all others nodes are connected to the
central node.
o More expensive than linear bus topologies because of the cost of the hubs, etc.
5. Explain different network cables. (U) (Note:- You can brief it)
ANS: Twisted Pair Cable
d copper wires.
-11).
-45)
flexible, low cost media; it can be sued for voice or data communication.
ends.
Advantages Disadvantages
Easy to install Data transmission rate are very low
Flexible It is incapable to carry a signal over long
It is very inexpensive distance without the use of repeaters
Low bandwidth
Coaxial Cable
speed communication.
1. Thicknet: This form of coaxial cable is thicker than Thinnet. The Thicknet coaxial cable
segments (while joining nodes of a network) can be up to 500 meters long.
2. Thinnet: This form of coaxial cable is thinner and it can have maximum segment length
of 185 meters i.e. using these cables, nodes having maximum distance of 185 meters can
be joined.
Advantages Disadvantages
Optical Fibers
Fibers consist of thin strands of glass or glass like material which are so
constructed that they carry light from a source at one end of the fiber to a detector at the
other end.
Diodes (LDs).
twisted pair.
Advantages Disadvantages
Transmit data over long distance with high
security.
media
o Circuit Switching
o Message Switching
o Packet Switching
Circuit Switching:
telephone system seeks out a physical copper path all the way from sender telephone to
the receiver's telephone.
-to-end path
connection between computers before any data can be sent.
Message Switching:
office.
ocess is continued until the data are delivered to the destination computers.
jump at a time.
Packet Switching:
option that tries to combine the advantages of circuit
and message switching and to minimize the disadvantage of both.
packets.
the network is specified.
Active concentrators are used like repeaters to extend the length of a network.
o Passive hubs:
It allows the signal to pass from one computer to another without any change.
ii. Switch:
components.
-distance
transmission.
run.
iv.Bridge:
networks with the same standard but with different type’s cables.
v.Router:
Chat:
-phone.
pond, and you
hear their responses on the spot and can reply instantly.
Video Conferencing:
-way videophone conversation among multiple participations is called Video
Conferencing.
11. Explain protection methods or network security. (U) (Note:You can brief it)
ANS: Network security consists of the provisions and policies adopted by a network
administer to prevent and monitor unauthorized access, misuse, modification of a
computer network and network accessible resources.
Protection Methods:
1. Authorization - Authorization is performed by asking the user a legal login ID. If the
user is able to provide a legal login ID, He/she is considered an authorized user.
3. Encryption Smart cards– conversion of the form of data from one form to another form.
An encrypted smart card is a hand held smart card that can generate a token that a
computer system can recognize.
o Application gateway - security mechanism to specific application like FTP and Telnet
servers.
o Proxy Server - Intercepts all messages entering and leaving the network.
computer to another.
virus, it may cause damage of your hard disk contents, and/or
interfere normal operation of your computer.
Types of Virus:
File Infectors:
o Infect executable files or attach themselves to a program file and create duplicate files.
Boot sector Virus:
o Install themselves on the beginning tracks of the hard drive or the Master Boot record.
Macro Virus:
o Infect data file like spread sheets or databases of several software packages.
Network Virus:
o E-mail or any data transfer files to spread themselves on the network.
Trojan Horse:
o A Trojan Horses is code hidden in a program such as a game as spreadsheet that looks
safe to run but has hidden side effects.
Worm:
o A worm is a program designed to replicate. The program may perform any variety of
additional tasks as well.
14. Explain the measures to prevent virus. (U)
ANS: The following guidelines to lead virus free computing life.
o Never use a CD without scanning it for viruses.
o Always scan files downloaded from the internet.