0% found this document useful (0 votes)
19 views40 pages

Chapter 15 Computer Network

Chapter 15 discusses computer networks, defining key concepts such as ARPANET, protocols like TCP/IP and HTTP, and types of networks including LAN, MAN, and WAN. It covers various communication modes, network topologies, and devices such as servers, hubs, and routers, along with security aspects like firewalls and virus types. The chapter also highlights advantages and disadvantages of networking, as well as methods for virus prevention and network protection.

Uploaded by

athmikarai09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views40 pages

Chapter 15 Computer Network

Chapter 15 discusses computer networks, defining key concepts such as ARPANET, protocols like TCP/IP and HTTP, and types of networks including LAN, MAN, and WAN. It covers various communication modes, network topologies, and devices such as servers, hubs, and routers, along with security aspects like firewalls and virus types. The chapter also highlights advantages and disadvantages of networking, as well as methods for virus prevention and network protection.

Uploaded by

athmikarai09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

CHAPTER - 15 COMPUTER NETWORK

CHAPTER 15 COMPUTER NETWORK


One mark questions:
1. Define computer network. (U)
ANS: A computer network is a interconnection of two or more computers that are able to
exchange information’s.
2. What is ARPANET(Advanced Research Projects Agency Network).? (U)
ANS: ARPANET Is an experimental computer network founded by Advanced Research
Projects Agency In 1969.
3. Expand ARPANET. (U)
ANS: Advanced Research Projects Agency Network.
4. Define protocol. (A)
ANS: A protocol is a set of rules and procedures that determine how a computer system
receives and transmits data.
5. What is TCP/IP? (U)
ANS: TCP/IP (Transmission Control Protocol / Internet Protocol ) is the basic
communication language or protocol of the Internet.
6. Expand TCP/IP. (U)
ANS: Transmission Control Protocol / Internet Protocol
7. Expand HTTP. (U)
ANS: Hypertext Transfer Protocol
8. What is FTP? (U)
ANS: FTP is a standard Internet Protocol for transmitting files between computers on the
internet.
9. Expand FTP. (U)
ANS: File Transfer Protocol.
10. Define SMTP. (U)
ANS: SMTP is a TCP/IP protocol used in sending and receiving e-mail.
11. Define the term workstations (nodes). (U)
ANS: The nodes are the devices connected to the network. Examples: Printer, computer
system etc
12. What is server? (U)
ANS: Server is a type of computer or device on a network that manages network
resources.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 1


CHAPTER - 15 COMPUTER NETWORK

13. What is LAN? (U)


ANS: Privately owned small networks that are confined to a localized area (e.g., an office,
a building or a factory) are known as Local Area Networks (LANs).
14. What is MAN? (U)
ANS: Metropolitan Area Network is the networks spread over a city. It typically covers an
area of between 5 and 50 KM.
15. What is WAN? (U)
ANS: A wide Area Network (WAN) is a group of computers that are separated by large
distances and tied together.
16. What is topology of networking? (U)
ANS: Network Topology refers to the arrangement of computers and other devices in a
network.
17. Write any one advantage of star topology. (U)
ANS: o Easy to install and wire.

o No disruptions to the network when connecting or removing devices.

o Easy to detect faults.

18. Write any one advantage of ring topology. (U)


ANS: o Short cable length

o No wiring closet space required

o Suitable for optical fibers.

o Each client has equal access to resources.

19. Define Bandwidth. (U)


ANS: Bandwidth: It is amount of information transmitted or receives per unit time. It is
measuring in Kbps/Mbps etc unit.

20. What is radio wave transmission? (U)


ANS: The transmission making use of radio frequencies is termed as radio-wave
transmission
21. What is transmitter? (U)
ANS: The transmitter is device which takes message, encodes it onto a sine wave and
transmits it with radio wave.
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 2
CHAPTER - 15 COMPUTER NETWORK

22. What is receiver? (U)


ANS: The receiver receives the radio wave and decodes the message from the sine wave
it receives.
23. What is circuit switching? (U)
ANS: It is a technique in which it first establish the physical connection between two
computers and then data are transmitted from the source to the destination. Eg:
Telephonic communication
24. What is simplex communication mode? (U)
ANS: simplex mode is a communication mode in which data can flow in only one
direction.

25. What is half duplex communication mode? (U)


ANS: half-duplex mode is a communication mode in which data can flow in both
directions but only in one direction at a time.
26. What is full duplex communication mode? (U)
ANS: Full duplex- mode is a communication mode in which data can flow in both
directions at the same time.
27. Give an example for simplex communication mode. (U)
ANS: Data sent from computer to printer
28. Give an example for half duplex communication mode. (U)
ANS: The Internet browsing (The user sends a request to a Web server for a web page)
29. Give an example for full duplex communication mode. (U)
ANS: Telephone communication system
30. What is data communication? (U)
ANS: data communication refers to the exchange of data from source to destination via
transmission media.
31. What is the use of modem? (U)
ANS: The modem modulates the signal at the sending end and demodulates at the
receiving end.
32. What is a hub? (U)
ANS: A hub is a hardware device used to connect several computers together.
33. What is a bridge? (U)
ANS: A Bridge is a network device that establishes an intelligent connection between two
local networks with the same standard but with different type’s cables.
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 3
CHAPTER - 15 COMPUTER NETWORK

34. What is mobile computing? (U)


ANS: Mobile computing means that the computing device is not continuously connected
to the base or central network.
35. What is SIM card? (U)
ANS: - Subscriber Identity Module - is a computer chip that gives a cellular
device its unique phone number
36. What is SMS? (U)
ANS: Short Message Service (SMS) is the transmission of short text messages to and
from a mobile phone, fax machine and/or IP address.
37. Expand Wi-Fi. (U)
ANS: Wi-Fi is short for Wireless Fidelity, which lets you connect to the internet without a
direct line from your PC to the ISP(Internet Service Provider).
38. What is chatting? (U)
ANS: Chatting is the exchange of text ,image or videos between two devices.
39. What is video conference? (U)
ANS: A two-way videophone conversation among multiple participations is called Video
Conferencing.
40. What is network security? (U)
ANS: Network security consists of the provisions and policies adopted by a network
administer to prevent and monitor unauthorized access, misuse, modification of a
computer network and network accessible resources.

41. What are Cookies? (U)


ANS: Cookies are messages that a web server transmits to a web browser so that the
web server can keep track of the user’s activity on a specific web site.
42. What are Hackers? (U)
ANS: Hackers are more interested in gaining knowledge about computer systems and
possibly using this knowledge for playful pranks.

43. What is cyber law? (U)


ANS: cyber law is a generic term, which refers to all the legal and regulatory aspects of
internet and the World Wide Web.

44. What is a virus (Vital Information Resource Under Siege)? (U)

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 4


CHAPTER - 15 COMPUTER NETWORK

ANS: VIRUS - is a computer program that can replicate itself and spread from one
computer to another.
45. Name any one antivirus software. (U)
ANS: Avira, AVG, Kaspersky, comodo
Two mark questions:
1. Mention the advantages or goals of networking. (U)
ANS: Refer below questions
2. Mention the disadvantages of networks. (U)
ANS: i. Purchasing the network cabling and file servers can be expensive.
ii. Managing a large network is complicated
iii. Virus can spread easily throughout a computer networks.
iv. There is a ganger of hacking.
3. Mention the needs or service of networks. (A)
ANS: Need of Networking:

-mail tools for communication with the e-mail address.


information around the globe.

4. Briefly explain HTTP. (U)


ANS: HTTP Protocol:
o Hypertext Transfer Protocol.
o It provides a standard for web browsers and servers to communicate. (Set of rules for
providing communication between web browsers and servers.)
o HTTP clients (web browsers) and servers communicate via HTTP request and response
messages.
5. Briefly explain FTP. (U)
ANS: FTP Protocol:
o File Transfer Protocol.
o It is a standard Internet Protocol for transmitting files between computers on the internet.
o FTP is an application protocol that uses the Internet’s TCP/IP protocols.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 5


CHAPTER - 15 COMPUTER NETWORK

o It is also commonly used to download programs and other files to your computer from
other servers.
6. Write any two advantages of FTP. (A)
ANS: Transfer data efficiently in bulk across the network.
Send multiple file directories at the same time.
7. Expand SLIP and PPP. (A)
ANS: SLIP: Serial Line Internet Protocol
PPP: Point to Point Protocol
8. Differentiate between dedicated and non-dedicated server. (A)
ANS: Non-dedicated Servers:
-
dedicated server since it is not completely dedicated to the cause of serving.
Dedicated Servers:

job is to help workstations access data, software and hardware resources.


9. Write any two differences between LAN and WAN.A (U)
10. Explain ring topology. (U)
ANS: In a ring topology, all computers are connected via cable that loops in a ring or
circle.

11. Explain star topology. (U)


ANS: In this type of topology, all the computers are connected to a single hub or a switch
through a cable. This hub is the central node and all others nodes are connected to the
central node.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 6


CHAPTER - 15 COMPUTER NETWORK

12. Explain linear bus topology. (U)


ANS: ogy consists of a main run of cable with a terminator at each
end.

bus.

13. Mention the types of cables used in networking? (U)


ANS: o Twisted Pair cable

o Co-axial cable
o Optical Fiber cable

14. Mention two types of twisted pair cables. (U)


ANS: Unshielded Twisted Pair (UTP), Shielded Twisted pair (STP)
15. Explain the types of co-axial cable. (U)
ANS: Thinnet, Thicknet
16. Write the differences between unshielded twisted and shielded twisted pairs. (U)
ANS: Unshielded twisted pairs (UTP) is the copper media inherited from telephone,
which is being used for increasingly higher data rates.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 7


CHAPTER - 15 COMPUTER NETWORK

Unshielded Shielded

Shielded twisted pairs (STP) cables comes with shielding of individual pairs of wires,
which further protects it from external interference.

advantage of STP over UTP is that it offers greater protection from interference and
crosstalk due to shielding.

17. Explain briefly about radio wave? (U)


ANS: Radio Wave

-wave transmission.

a. The transmitter b. The receiver


transmitter takes some sort of message, encodes it onto a sine wave and transmits
it with radio wave.

receives.
18. What is transmitter and receiver. (U)
ANS: odes it onto a sine wave and
transmits it with radio wave.

receives.
Both the transmitter and receiver use antennas to radiate and capture the radio signals.
19. Name the different switching techniques. (U)

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 8


CHAPTER - 15 COMPUTER NETWORK

ANS:
o Circuit Switching
o Message Switching
o Packet Switching
20. Explain circuit switching. (U)
ANS: Circuit Switching:

physical connection between two computers is


established and then data are transmitted from the source computer to the destination
computer.
-to-end path
connection between computers before any data can be sent.

21. Explain message switching. (U)


ANS: Message Switching:

first, which stores the data in its buffer.


data to this
office.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 9


CHAPTER - 15 COMPUTER NETWORK

22. Explain packet switching. (U)


ANS: Packet Switching:

and message switching and to minimize the disadvantage of both.


alled packets.

23. What is the difference between circuit and message switching? (U)
ANS: Refer above questions
24. Define the term repeaters, multiplexers. (U)
ANS: Repeater:

r is network device that amplifies and restore signals for long-distance


transmission.

run.
25. How a router functions? (U)
ANS: A Router is a network device that is used to separate different segments in a
network to improve performance and reliability.
26. Define Gateway. (U)
ANS:

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 10


CHAPTER - 15 COMPUTER NETWORK

internetwork capability of joining dissimilar network (like LAN – to – SNA).

27. Write the difference between gateway and router? (U)


ANS: A Router works like a bridge but can handle different protocols.

improve performance and reliability.

The term Gateway is applied to a device, system or software application which has
internetwork capability of joining dissimilar network.

28. Define the term SIM and GSM. (U)


ANS: SIM card:

- Subscriber Identity Module - is a chip card; the size of a first class postage
stamp.
ives a cellular device its unique phone number.

GSM:
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 11
CHAPTER - 15 COMPUTER NETWORK

digital cellular systems.

frequency.
29. Write the difference between Wifi and Wifi hotspot? (U)
ANS: Wi-Fi is short for Wireless Fidelity, which lets you connect to the internet without a
direct line from your PC to the ISP.
A hotspot is a venue that offers Wi-Fi access.
-based wireless internet access.
30. Mention different protection methods. (U) (Virus protection methods are different)
ANS: 1. Authorization - Authorization is performed by asking the user a legal login ID.

2. Authentication - Authentication also termed as password protection.

3. Encryption Smart cards– conversion of the form of data from one form to another form

4. Biometric System – It involves unique aspect of a person's body such as Finger-prints,


retinal patterns etc to establish his/her Identity.

5. Firewall - A system designed to prevent unauthorized access to or from a private


network is called firewall.
31. Mention different firewall techniques. (U)
ANS: Firewall - A system designed to prevent unauthorized access to or from a private
network is called firewall.
Firewall techniques are:-

o Packet filter - accepts or rejects of packets based on user defined rules.

o Application gateway - security mechanism to specific application like FTP and Telnet
servers.

o Circuit level gateway - applies security mechanism when a connection is established.

o Proxy Server - Intercepts all messages entering and leaving the network.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 12


CHAPTER - 15 COMPUTER NETWORK

32. What are hackers and crackers? (U)


ANS: Hackers are more interested in gaining knowledge about computer systems and
possibly using this knowledge for playful pranks.

Crackers are the malicious programmers who break into secure systems.

33. Classify types of virus. (U)


ANS: Types of Virus:
File Infectors:
o Infect executable files or attach themselves to a program file and create duplicate files.
Boot sector Virus:
o Install themselves on the beginning tracks of the hard drive or the Master Boot record.
Macro Virus:
o Infect data file like spread sheets or databases of several software packages.
Network Virus:
o E-mail or any data transfer files to spread themselves on the network.
Trojan Horse:
o A Trojan Horses is code hidden in a program such as a game as spreadsheet that looks
safe to run but has hidden side effects.
Worm:
o A worm is a program designed to replicate. The program may perform any variety of
additional tasks as well.
34. Write any two virus prevention methods. (U)
ANS: o Never use a CD or Pen drive without scanning it for viruses.
o Always scan files downloaded from the internet.

o Never boot your PC from floppy.

o Write protect your disks and make regular backup..

o Use licensed software.

o Password protects your PC.

o Install and use antivirus software.

o Keep antivirus software up to date.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 13


CHAPTER - 15 COMPUTER NETWORK

35. Mention any two antivirus software. (U)


ANS: Avira, AVG, Kaspersky, comodo, Quick Heal, K7, Norton 360, Avasta, McAFee.

36. List the characteristics of virus. (U)


ANS: Characteristics of a computer virus:

ace.

Three mark questions


1. Mention different network goals. (U)
ANS: Network Goals/Advantages of Networking:
Resource Sharing:
o The aim is to make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the user.
Reliability:
o A file can have copies on two or three different machines, so if one of them is unavailable
(hardware crash), the other copies could be used.
o Example: military, banking, air reservation etc.
Cost Factor:
o Personal computers have better price/performance ratio than micro computers.
o So it is better to have PC's, one per user, with data stored on one shared file server
machine.
Communication Medium.
o Using a network, it is possible for managers, working far apart, to prepare financial report
of the company.
2. Explain the needs of networking. (A)
ANS: Need of Networking:

ard disk and printers etc.


-mail tools for communication with the e-mail address.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 14


CHAPTER - 15 COMPUTER NETWORK

3. Explain TCP / IP. (U)


ANS: TCP/IP Protocol:
o Transmission Control Protocol / Internet Protocol.
o It is the basic communication language or protocol of the Internet.
o TCP/IP is a two-layer program, the higher layer Transmission Control Protocol (TCP)
manages the assembling of a message or file into smaller packets that are transmitted
over the internet.
o The lower layer Internet Protocol (IP) handles the address part of each packet so that it
gets to the right destination.
4. What is server? Explain the types of server. (U)
ANS: A Server is also a computer that facilitates the sharing of data, software, and
hardware resources like printers, modems etc on the network.

Non-dedicated Servers:
-
dedicated server since it is not completely dedicated to the cause of serving.
-sharing among workstations on a
proportionately smaller scale.
Dedicated Servers:

job is to help workstations access data, software and hardware resources.


e-up as a workstation and such a server is known as dedicated server.
-SLAVE networks.
5. Write any three differences between LAN and W(U)AN.
ANS:
Sl LAN WAN
No
1 Local Area Network Wide Area Network
2 Diameter of not more than a few kilometre Span entire country
3 A total data rate of at least several mbps Data rate is less compared to LAN

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 15


CHAPTER - 15 COMPUTER NETWORK

4 Complete ownership by a single Owned by multiple organization


organization
5 Very low error rates Comparatively high error rates.

6. What is topology of networking? Explain ring topology. (U)


ANS:

Network Topology refers to the arrangement of computers and other devices in a


network.

In a ring topology, all computers are connected via cable that loops in a ring or circle.

7. What is topology of networking? Explain star topology. (U)


ANS: Network Topology refers to the arrangement of computers and other devices in
a network.

Star Topology, all the computers are connected to a single hub or a switch through a
cable. This hub is the central node and all others nodes are connected to the central node.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 16


CHAPTER - 15 COMPUTER NETWORK

8. What is topology of networking? Explain linear bus topology. (U)


ANS: Network Topology refers to the arrangement of computers and other devices in a
network.

A linear bus topology consists of a main run of cable with a terminator at each end.

pology, every workstation is connected to a main cable called the


bus.

9. Explain the different types of cables used in data transmission. (U)


ANS: Types of Twisted Pair Cable:

1. Unshielded Twisted Pair (UTP) Cable:

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 17


CHAPTER - 15 COMPUTER NETWORK

higher data rates.

to 4200 twisted pair.

2. Shielded Twisted Pair (STP) Cable:

protects it from external interference.

it offers greater protection from interference and


crosstalk due to shielding.

Coaxial Cable

foil or wire
shields, each separated by some kind of plastic insulator.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 18


CHAPTER - 15 COMPUTER NETWORK

speed
communication.

is less popular than twisted pair, it is widely used for television signals.

Types of Coaxial Cables:

1. Thicknet: This form of coaxial cable is thicker than Thinnet. The Thicknet coaxial cable
segments (while joining nodes of a network) can be up to 500 meters long.

2. Thinnet: This form of coaxial cable is thinner and it can have maximum segment length
of 185 meters i.e. using these cables, nodes having maximum distance of 185 meters can
be joined.
Optical Fibers

constructed that they carry light from a source at one end of the fiber to a detector at the
other end.

ight emitting diodes (LEDs) or LASER Diodes (LDs).

problem of electrical
interference.

twisted pair.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 19


CHAPTER - 15 COMPUTER NETWORK

10. What are the advantages of twisted pair cable? (A)


ANS:
Advantages Disadvantages
Easy to install
Flexible
It is very the use of repeaters
inexpensive Low bandwidth

11. Explain switching technique. (U)


ANS: Switching techniques are used for transmitting data across networks.
Circuit Switching:

established and then data are transmitted from the source computer to the destination
computer.
lephone call, the switching equipment within the
telephone system seeks out a physical copper path all the way from sender telephone to
the receiver's telephone.
Message Switching:

first, which stores the data in its buffer.


hing office and then sends the data to this
office.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 20


CHAPTER - 15 COMPUTER NETWORK

Packet Switching:

and message switching and to minimize the disadvantage of both.


packets.

12. Explain communication modes. (U) (Note:You can brief it)


ANS: Communication Modes:
data
transmission mode.
data communication mode.

es, data transmission modes are also called directional modes.

Simplex Mode

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 21


CHAPTER - 15 COMPUTER NETWORK

In simplex mode, data can flow in only one direction.

m successful transmission of data.

Half-Duplex Mode

-duplex mode, data can flow in both directions but only in one direction at a time.

-lane bridge where two-way traffic must give way in order to cross the
other.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 22


CHAPTER - 15 COMPUTER NETWORK

b server for a web page.

Full-Duplex Mode

-mode, data can flow in both directions at the same time.

full-duplex communication
mode.

13. Give the examples for simplex, half duplex and full duplex communication mode. (A)
ANS:
Simplex mode - Data sent from computer to printer .
Half duplex mode - The Internet browsing.

Full duplex mode - The telephone communication system.

14. What is modem? Explain its working. (U)


ANS: Modem:
Modulation/ Demodulation.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 23


CHAPTER - 15 COMPUTER NETWORK

other computers via telephone lines.


Modulation: A modem changes the digital data from your computer into analog data, a
format that can be carried by telephone lines.
Demodulation: The modem receiving the call then changes the analog signal back into
digital data that the computer can digest.

end.
s:
o Internal modems: The modems that are fixed within the computer
o External modems: The modems that are connected externally to a computer as other
peripherals are connected.
15. Explain any three applications of networking. (A)
ANS:
i. Video conferencing: This is the process of conducting conference between two or more
participants at different sites by using computer networks.
ii. Chatting: It is real-time communication between two users via computer network.
iii. TELNET: It enables to control a computer system and communicate with other system
in the network.
16. Compare Wifi, Wifi hotspot and Wi-max. (A)
ANS: Wi-fi:

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 24


CHAPTER - 15 COMPUTER NETWORK

-Fi is short for Wireless Fidelity, which lets you connect to the internet without a direct
line from your PC to the ISP.
-Fi to work, you need:
o A broadband internet connection.
o A wireless router, which relays your internet connection from the “wall” to the PC.
o A laptop or desktop with a wireless internet card or external wireless adapter.
Wi-Fi Hotspots:
-Fi access.
, Wi-Fi phone or other suitable portable devices to access
the internet through a Wi-Fi hotspot.
-based wireless internet access.
WiMax:

vide Broadband Wireless Access (BWA) up to 30 miles for fixed stations


and 3-10 miles for mobile stations.

connected to the internet using a standard wired high-speed connection.

Five mark questions:


1. What is computer network? Mention different network goals. (U)
ANS: A computer network is a interconnection of two or more computers that are able to
exchange information’s.
connected if they are capable of exchanging
information.
Network Goals/Advantages of Networking:
Resource Sharing:
o The aim is to make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the user.
Reliability:
o A file can have copies on two or three different machines, so if one of them is unavailable
(hardware crash), the other copies could be used.
o For military, banking, air reservation and many other applications it is of great
importance.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 25


CHAPTER - 15 COMPUTER NETWORK

Cost Factor:
o Personal computers have better price/performance ratio than micro computers.
o So it is better to have PC's, one per user, with data stored on one shared file server
machine.
Communication Medium.
o Using a network, it is possible for managers, working far apart, to prepare financial report
of the company.
o The changes at one end can be immediately noticed at another and hence it speeds up
co-operation among them.

2. Mention different network services (need for network). (U)


ANS: Need of Networking:

-mail tools for communication with the e-mail address.


le to access data and information around the globe.

3. Mention the types of network? Explain any two. (U)


ANS: A computer network means a group of networked components, i.e., computers
are linked by means of a communication system.

o Local Area Network (LAN)


o Wide Area Network (WAN)
o Metropolitan Area Network (MAN)
Local Area Network:
ed small networks that are confined to a localized area (e.g., an office, a
building or a factory) are known as Local Area Networks (LANs).

are shared through LANs.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 26


CHAPTER - 15 COMPUTER NETWORK

o A File Server: Stores all of the software that controls the network, as well as the
software that can be shared by the computers attached to the network.
o A Workstation: Computers connected to the file server. These are less powerful than
the file server.
o Cables: Used to connect the network interface cards on each computer.
Metropolitan Area Network (MAN)

users.
r example, cable TV networks that are spread over a city can be termed as
metropolitan area networks.
Wide Area Network (WAN)

ated by large
distances and tied together.

and together to look like one big LAN.


ate fast and efficient exchange of information at lesser
costs and higher speeds.
4. What is topology? Explain any two topologies of networking. (U)
ANS: Network Topology refers to the arrangement of computers and other devices in a
network.

1. Bus Topology

2. Star Topology

3. Ring Topology

4. Mesh Topology

5. Hybrid Topology
Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 27
CHAPTER - 15 COMPUTER NETWORK

i. Linear or bus Topology:

inear bus topology consists of a main run of cable with a terminator at each end.

lled the
bus.

the network.

Advantages of a Linear Bus Topology

o Easy to connect a computer or peripheral to a linear bus.

o Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

o Entire network shuts down if there is a break in the main cable.

o Terminators are required at both ends of the backbone cable.

o Difficult to identify the problem if the entire network shuts down.

o Not meant to be used as a stand-alone solution in a large building.

ii. Star Topology

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 28


CHAPTER - 15 COMPUTER NETWORK

through a cable. This hub is the central node and all others nodes are connected to the
central node.

Advantages of a Star Topology

o Easy to install and wire.

o No disruptions to the network when connecting or removing devices.

o Easy to detect faults.

Disadvantages of a Star Topology

o Requires more cable length than a linear topology.

o If the hub, switch, or concentrator fails, nodes attached are disabled.

o More expensive than linear bus topologies because of the cost of the hubs, etc.

5. Explain different network cables. (U) (Note:- You can brief it)
ANS: Twisted Pair Cable

d copper wires.

-11).

kilometers without amplification, but for longer distance the


signal becomes too week and repeaters are needed.

-45)

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 29


CHAPTER - 15 COMPUTER NETWORK

Types of Twisted Pair Cable:

pes of twisted pair cables available. These are:

1. Unshielded Twisted Pair (UTP) Cable:

higher data rates.

flexible, low cost media; it can be sued for voice or data communication.

1. CAT1: Voice-Grade communications only; No data transmission

2. CAT2: Data-grade transmission up to 4 Mbps

3. CAT3: Data-Grade transmission up to 10 Mbps

4. CAT4: Data-grade transmission up to 16 Mbps

5. CAT5: Data-grade transmission up to 1000 Mbps

2. Shielded Twisted Pair (STP) Cable:

comes with shielding of individual pairs of wires, which further


protects it from external interference.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 30


CHAPTER - 15 COMPUTER NETWORK

from interference and crosstalk due to shielding.

ends.
Advantages Disadvantages
Easy to install Data transmission rate are very low
Flexible It is incapable to carry a signal over long
It is very inexpensive distance without the use of repeaters
Low bandwidth

Coaxial Cable

shields, each separated by some kind of plastic insulator.

speed communication.

it is widely used for television signals.

Types of Coaxial Cables:

1. Thicknet: This form of coaxial cable is thicker than Thinnet. The Thicknet coaxial cable
segments (while joining nodes of a network) can be up to 500 meters long.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 31


CHAPTER - 15 COMPUTER NETWORK

2. Thinnet: This form of coaxial cable is thinner and it can have maximum segment length
of 185 meters i.e. using these cables, nodes having maximum distance of 185 meters can
be joined.
Advantages Disadvantages

the use of repeaters

Optical Fibers

Fibers consist of thin strands of glass or glass like material which are so
constructed that they carry light from a source at one end of the fiber to a detector at the
other end.

Diodes (LDs).

problem of electrical interference.

twisted pair.

potentially very high. For LEDs, this range is between


20-150 Mbps and higher rates are possible using LDs.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 32


CHAPTER - 15 COMPUTER NETWORK

Advantages Disadvantages
Transmit data over long distance with high
security.
media

6. Explain transmission technique/switching technique. (U)


ANS: Switching techniques:

o Circuit Switching
o Message Switching
o Packet Switching
Circuit Switching:

the complete physical connection between two computers is


established and then data are transmitted from the source computer to the destination
computer.

telephone system seeks out a physical copper path all the way from sender telephone to
the receiver's telephone.
-to-end path
connection between computers before any data can be sent.
Message Switching:

first, which stores the data in its buffer.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 33


CHAPTER - 15 COMPUTER NETWORK

office.
ocess is continued until the data are delivered to the destination computers.

jump at a time.

Packet Switching:
option that tries to combine the advantages of circuit
and message switching and to minimize the disadvantage of both.
packets.
the network is specified.

7. Explain various networking devices. (U)


ANS: Network Devices:
i. Modem:
Modulation/ Demodulation.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 34


CHAPTER - 15 COMPUTER NETWORK

other computers via telephone lines.


concentrator is device that provides a central connection point for cables from
workstations, servers, and peripherals.
-pair wire is run from each workstation to a central
concentrator.
:
o Active hubs:

Active concentrators are used like repeaters to extend the length of a network.
o Passive hubs:
It allows the signal to pass from one computer to another without any change.
ii. Switch:

components.

ly which increases the speed of


the network.
iii.Repeater:

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 35


CHAPTER - 15 COMPUTER NETWORK

-distance
transmission.

run.
iv.Bridge:

networks with the same standard but with different type’s cables.
v.Router:

Router is a network device that is used to separate different segments in a network to


improve performance and reliability.
vi. Gateway:

internetwork capability of joining dissimilar network.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 36


CHAPTER - 15 COMPUTER NETWORK

8. Explain the hardware requirement for networking. (U)


ANS:
1. Network Interface Card(NIC) , Media- Wired or Wireless , Networking devices- Hubs ,
switches, Routers etc
9. Define the following:
a. Modem b. Hub c. Repeater d. Bridge e. Router (U)
ANS:
a). A modem is a computer peripheral that allows you to connect and communicate with
other computers via telephone lines.
b). A hub is a hardware device used to connect several computers together.
c). A Repeater is network device that amplifies and restore signals for long-distance
transmission.
d). A Bridge is a network device that establishes an intelligent connection between two
local networks with the same standard but with different type’s cables.
e). A Router is a network device that is used to separate different segments in a network
to improve performance and reliability.
10. Explain the application of networking in detail. (U)
ANS: Applications in Networking:
SMS:
Short Message Service (SMS) is the transmission of short text messages to and from a
mobile phone, fax machine and/or IP address.
er of alpha-numeric characters and
contain no images or graphics.
E-mail:
-mail) is sending and receiving message by computer.
Advantages:
o Low cost: Electronic mail is an extremely cost-effective way to move information around,
especially when it must be moved quickly.
o Speed: Electronic mail can be delivered almost as fast as the wire can carry it.
Voice Mail:
-mail refers to e-mail systems that support audio.
and listen to the messages by
executing the appropriate command in the e-mail system.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 37


CHAPTER - 15 COMPUTER NETWORK

Chat:

-phone.
pond, and you
hear their responses on the spot and can reply instantly.
Video Conferencing:
-way videophone conversation among multiple participations is called Video
Conferencing.
11. Explain protection methods or network security. (U) (Note:You can brief it)
ANS: Network security consists of the provisions and policies adopted by a network
administer to prevent and monitor unauthorized access, misuse, modification of a
computer network and network accessible resources.

Protection Methods:

1. Authorization - Authorization is performed by asking the user a legal login ID. If the
user is able to provide a legal login ID, He/she is considered an authorized user.

2. Authentication - Authentication also termed as password protection as the authorized


user is asked to provide a valid password and if he/she is able to do this, he/she
considered to be an authentic user.

3. Encryption Smart cards– conversion of the form of data from one form to another form.
An encrypted smart card is a hand held smart card that can generate a token that a
computer system can recognize.

4. Biometric System – It involves unique aspect of a person's body such as Finger-prints,


retinal patterns etc to establish his/her Identity.

5. Firewall - A system designed to prevent unauthorized access to or from a private


network is called firewall. It can be implemented in both hardware and software or
combination or both.
o There are several types of firewall techniques-

o Packet filter - accepts or rejects of packets based on user defined rules.


Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 38
CHAPTER - 15 COMPUTER NETWORK

o Application gateway - security mechanism to specific application like FTP and Telnet
servers.

o Circuit level gateway - applies security mechanism when a connection is established.

o Proxy Server - Intercepts all messages entering and leaving the network.

12. What is computer security? Explain different protection method. (U)


ANS: Refer above question
13. What is a virus? Explain different types of virus. (U)
ANS: VIRUS – “Vital Information Resource Under Siege”.

computer to another.
virus, it may cause damage of your hard disk contents, and/or
interfere normal operation of your computer.
Types of Virus:
File Infectors:
o Infect executable files or attach themselves to a program file and create duplicate files.
Boot sector Virus:
o Install themselves on the beginning tracks of the hard drive or the Master Boot record.
Macro Virus:
o Infect data file like spread sheets or databases of several software packages.
Network Virus:
o E-mail or any data transfer files to spread themselves on the network.
Trojan Horse:
o A Trojan Horses is code hidden in a program such as a game as spreadsheet that looks
safe to run but has hidden side effects.
Worm:
o A worm is a program designed to replicate. The program may perform any variety of
additional tasks as well.
14. Explain the measures to prevent virus. (U)
ANS: The following guidelines to lead virus free computing life.
o Never use a CD without scanning it for viruses.
o Always scan files downloaded from the internet.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 39


CHAPTER - 15 COMPUTER NETWORK

o Never boot your PC from floppy.

o Write protect your disks and make regular backup..

o Use licensed software.

o Password protects your PC.

o Install and use antivirus software.

o Keep antivirus software up to date.

Prepared by: Sanil Abraham , Deeksha Mahalakshmipuram Page 40

You might also like