0% found this document useful (0 votes)
51 views7 pages

COMPUTER NETWORKS - 2m

The document covers fundamental concepts in computer networks, including data communication, network topologies, the OSI model, and various protocols. It explains the functions of different layers such as the data link, network, transport, and application layers, along with key terms like IP addressing, error detection, and encryption. Additionally, it discusses network management techniques and the importance of standards and protocols for effective communication.

Uploaded by

haripriyailango
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views7 pages

COMPUTER NETWORKS - 2m

The document covers fundamental concepts in computer networks, including data communication, network topologies, the OSI model, and various protocols. It explains the functions of different layers such as the data link, network, transport, and application layers, along with key terms like IP addressing, error detection, and encryption. Additionally, it discusses network management techniques and the importance of standards and protocols for effective communication.

Uploaded by

haripriyailango
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

COMPUTER NETWORKS (2m )

Pondicherry university

UNIT I – Data Communication Components

1. Define data communication.


Data communication is the process of sending and receiving data between two or more
devices. It involves hardware, software, and transmission media to ensure the data
reaches the correct destination.
2. What is the role of protocols in communication?
Protocols are sets of rules that control how data is sent, received, and interpreted in a
network. They ensure smooth and accurate communication between devices.
3. List any two types of network topologies.
Two types of network topologies are Star and Bus. In Star, all devices connect to a
central hub, while in Bus, all devices share a single communication line.
4. Define OSI model.
The OSI model is a standard network framework with seven layers. It guides the design
and understanding of network interactions.
5. What is the purpose of bandwidth utilization?
Bandwidth utilization ensures the available data-carrying capacity of a network is used
efficiently, reducing waste and improving speed.
6. What is multiplexing? Name its types.
Multiplexing is a technique to combine multiple signals for transmission over a single
channel. Types include FDM, TDM, and WDM.
7. Define LAN and WAN.
LAN is a Local Area Network covering small areas like homes or offices. WAN is a
Wide Area Network connecting devices over large distances.
8. What is the role of a transmission medium?
The transmission medium carries data signals between sender and receiver. Examples
include cables and wireless signals.
9. Explain wired LAN with an example.
A wired LAN uses Ethernet cables to connect computers in an office. It's fast, secure, and
reliable.
10. What is frequency division multiplexing?
FDM divides the total bandwidth into separate frequency bands, allowing multiple
signals to transmit simultaneously.
11. Define virtual LAN.
VLAN is a logical group of devices from different physical LANs. It improves network
management and security.
12. Write any two characteristics of wireless LAN.
Wireless LAN allows device mobility and uses radio signals for communication. It is
easy to install and flexible.
13. What is time division multiplexing?
TDM assigns each signal a time slot for transmission on a single channel. It reduces
interference and increases efficiency.
14. What is meant by spread spectrum?
Spread spectrum spreads the signal over a wider bandwidth to reduce noise and improve
communication security.
15. State the use of the OSI model.
The OSI model helps design and troubleshoot networks. It defines clear layers for
specific networking tasks.
16. Define switching and name its types.
Switching connects devices and manages data transfer paths. Types include circuit
switching, packet switching, and message switching.
17. What are the different types of protocols?
Common protocols are TCP, UDP, FTP, and HTTP. Each handles different tasks like file
transfer or communication control.
18. What is the use of network standards?
Network standards ensure devices from different vendors work together and provide
guidelines for building networks.
19. Mention any two advantages of star topology.
Star topology is easy to install and troubleshoot. Failure of one cable does not affect the
entire network.
20. What is the main use of a transmission mode?
Transmission modes define how data flows. They affect speed and reliability of
communication.
21. Compare simplex and half-duplex modes.
Simplex allows data in one direction only. Half-duplex allows two-way data but not at
the same time.
22. What is signal propagation?
Signal propagation is the movement of signals through a medium from sender to receiver.
23. Define attenuation.
Attenuation is the weakening of a signal as it travels through a medium, reducing its
strength.
24. What is data encapsulation?
Data encapsulation wraps data with headers and trailers at each OSI layer to prepare it for
transmission.
25. List any two types of communication modes.
Simplex and Full-duplex are two modes. Full-duplex allows simultaneous two-way data
transfer.

UNIT II – Data Link Layer and Medium Access Sub Layer

1. What is the main function of the data link layer?


It ensures reliable transmission between two connected nodes. It handles error detection
and flow control.
2. Define error detection.
Error detection identifies errors in transmitted data using techniques like parity bits and
CRC.
3. What is CRC?
CRC is a method to detect errors in data using polynomial division. It adds a check value
to the data.
4. Define bit stuffing.
Bit stuffing adds extra bits in data to prevent confusion with control information.
5. What is the purpose of framing?
Framing divides data into units or frames, making it easier to manage, send, and detect
errors.
6. Define Stop-and-Wait protocol.
It sends one frame at a time and waits for an acknowledgment before sending the next
frame.
7. What is the difference between ARQ and FEC?
ARQ uses retransmission after error detection. FEC corrects errors at the receiver without
retransmission.
8. Explain piggybacking.
Piggybacking sends acknowledgment along with outgoing data to improve efficiency.
9. What is Selective Repeat ARQ?
It only retransmits frames with errors, not all frames after the error, saving time and
bandwidth.
10. Define Sliding Window Protocol.
It allows multiple frames to be sent before needing acknowledgment, improving
efficiency.
11. What is Hamming Distance?
It measures the number of bit differences between two data strings, useful in error
correction.
12. What is ALOHA protocol?
ALOHA is a simple wireless communication method where devices send data anytime,
with possible collisions.
13. What is CSMA/CD?
CSMA/CD checks for carrier before sending data and detects collisions, used in Ethernet
networks.
14. What is the difference between ALOHA and slotted ALOHA?
Slotted ALOHA divides time into slots to reduce collisions; ALOHA sends data
randomly.
15. What is the use of token passing?
Token passing controls access in a network by passing a token, allowing only one device
to send data.
16. Define Go-back-N protocol.
If an error is detected, Go-back-N resends that frame and all following frames.
17. What is the function of the MAC sublayer?
MAC controls how devices access the shared medium and sends data frames to the
physical layer.
18. What is error correction?
Error correction detects and fixes errors in data during or after transmission.
19. Define Back-off algorithm.
It determines when a device should retry sending data after a collision.
20. What is meant by access control?
Access control determines which device can use the communication channel at a given
time.
21. Explain token bucket algorithm in short.
The token bucket algorithm regulates data flow by allowing packets only if there are
enough tokens.
22. Define collision in networks.
Collision occurs when two devices send data at the same time, causing data to overlap
and become corrupted.
23. What is meant by random access?
In random access, devices transmit data without checking the channel status, possibly
causing collisions.
24. What is the difference between deterministic and non-deterministic protocols?
Deterministic protocols have fixed access schedules; non-deterministic allow devices to
compete for access.
25. What is polling?
Polling is when a central controller asks each device if it has data to send, ensuring
orderly access.

UNIT III – Network Layer

1. Define IP address.
An IP address is a unique number that identifies a device on a network.
2. What is subnetting?
Subnetting divides a large network into smaller ones to improve performance and
security.
3. What is routing?
Routing means choosing the best path for data to travel across networks.
4. Define IPv4 and IPv6.
IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses to support more devices.
5. What is ARP?
ARP maps an IP address to a device’s physical MAC address.
6. What is the use of RARP?
RARP finds the IP address of a device when only the MAC address is known.
7. What is the role of a router?
Routers connect networks and send data to its correct destination.
8. Mention any two features of IPv6.
It offers more IP addresses and better security than IPv4.
9. What is the difference between forwarding and routing?
Forwarding sends data to the next device. Routing decides the whole path.
10. Define logical addressing.
It gives each device a unique address used in data delivery.
11. What is meant by unicast routing?
Unicast routing sends data from one device to one specific receiver.
12. Define distance vector routing.
Each router tells its neighbors the cost to reach other networks.
13. What is BOOTP?
BOOTP automatically gives IP addresses to devices in a network.
14. What is DHCP?
DHCP assigns IP addresses and other settings to devices automatically.
15. What is hierarchical addressing?
It arranges addresses in levels to help routing and management.
16. What is static routing?
Static routing uses fixed paths set by the network admin.
17. Define dynamic routing.
Dynamic routing changes routes automatically using routing protocols.
18. Mention any two types of routing algorithms.
Distance vector and link state are common routing algorithms.
19. What is hop count?
It is the number of devices a packet crosses to reach its destination.
20. What is ICMP?
ICMP sends error messages and status info about network communication.
21. Write the difference between link state and distance vector routing.
Link state knows the full network. Distance vector knows only neighbors.
22. What is tunneling?
Tunneling sends data from one network to another through a protected path.
23. Define network congestion.
Congestion happens when too much data slows down the network.
24. What is NAT?
NAT changes private IP addresses to public ones for internet access.
25. What is the difference between classful and classless addressing?
Classful uses fixed-size address blocks. Classless allows flexible sizes.

UNIT IV – Transport Layer

1. Define TCP.
TCP is a reliable protocol that ensures data is delivered correctly.
2. What is UDP?
UDP is a fast protocol that sends data without checking for errors.
3. Mention any two functions of the transport layer.
It handles data delivery and checks if it arrived correctly.
4. What is segmentation and reassembly?
Breaking big messages into smaller parts and putting them back together.
5. What is flow control?
It ensures data is sent at a speed the receiver can handle.
6. Define Quality of Service (QoS).
QoS manages traffic to give priority to important data.
7. What is congestion control?
It reduces network overload by slowing or stopping data flow.
8. Differentiate TCP and UDP.
TCP is reliable and slow. UDP is faster but not reliable.
9. What is a port number?
It identifies specific services on a device, like email or web.
10. What is the purpose of SCTP?
SCTP is used for reliable, message-based transport like in phone networks.
11. Define socket.
A socket is the link between a program and the network.
12. What is meant by connection-oriented service?
It sets up a connection before data is sent, like a phone call.
13. What is a connectionless service?
It sends data without setting up a connection first, like a postcard.
14. Define checksum.
It checks for errors in received data using a small calculated value.
15. What is meant by three-way handshaking?
It is a process where two devices agree to connect using three messages.
16. What is reliability in transport layer?
It ensures complete and error-free delivery of data.
17. What is the purpose of acknowledgment in TCP?
It confirms the data was received without errors.
18. Define buffering.
Buffering temporarily stores data before it's processed.
19. What is a timer in TCP?
A timer checks how long it takes for data to be acknowledged.
20. Define jitter.
Jitter is the variation in time between arriving data packets.
21. What is meant by leaky bucket algorithm?
It controls data flow by sending it at a steady rate.
22. What is token bucket algorithm?
It allows bursts of data if tokens are available.
23. Mention any two transport layer protocols.
TCP and UDP are the main transport protocols.
24. What is a sequence number?
It shows the order of data segments in a message.
25. What is sliding window in TCP?
It lets many data packets be sent before needing confirmation.

UNIT V – Application Layer

1. What is DNS?
DNS translates domain names like google.com into IP addresses.
2. What is the purpose of TELNET?
TELNET lets users control remote computers over a network.
3. Define FTP.
FTP transfers files between computers over the internet.
4. What is the function of SNMP?
SNMP manages and monitors network devices like routers.
5. What is HTTP?
HTTP is the protocol used to load web pages.
6. What is SMTP?
SMTP sends emails from one server to another.
7. What is email?
Email is a digital message sent from one user to another.
8. What is WWW?
WWW is a system of web pages that you access using a browser.
9. What is the purpose of Bluetooth?
Bluetooth connects devices wirelessly over short distances.
10. Define cryptography.
Cryptography protects data by changing it into unreadable form.
11. What is symmetric encryption?
It uses the same key for both locking and unlocking data.
12. What is asymmetric encryption?
It uses two keys – one to lock and another to unlock data.
13. What is the use of firewalls?
Firewalls protect networks from unauthorized access.
14. Define DDNS.
DDNS updates domain name records automatically as IP changes.
15. What is the use of HTTPS?
HTTPS is secure HTTP that encrypts web data.
16. What is meant by a domain name?
It is the name of a website, like example.com.
17. Define authentication.
Authentication checks if the user is who they claim to be.
18. What is public key?
Public key is shared with others to encrypt messages.
19. What is a private key?
Private key is kept secret and used to decrypt messages.
20. What is digital signature?
It proves a message is from the real sender and unchanged.
21. Define hashing.
Hashing changes data into a short fixed-size value.
22. What is SSL?
SSL keeps internet data safe during transfer.
23. What is the difference between HTTP and HTTPS?
HTTPS is secure with encryption; HTTP is not.
24. What is meant by secure communication?
It protects data from hackers during transfer.
25. What is a session?
A session is a connection between a user and a service that lasts for a period.

You might also like