Computer Networks Two Marks With Answer
Computer Networks Two Marks With Answer
e. Session Layer
f. Presentation Layer
g. Application Layer
16. Which layers are network support layers?
a. Physical Layer
b. Data link Layer and
c. Network Layers
6. Which layers are user support layers?
a. Session Layer
b. Presentation Layer and
c. Application Layer
17. Which layer links the network support layers and user support layers?
The Transport layer links the network support layers and user support layers.
18. What are the concerns of the Physical Layer?
Physical layer coordinates the functions required to transmit a bit stream over a physical
medium.
a. Physical characteristics of interfaces and media
b. Representation of bits
c. Data rate
d. Synchronization of bits
e. Line configuration
f. Physical topology
g. Transmission mode
19. What are the responsibilities of Data Link Layer?
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link
and is responsible for node-node delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
20.What are the responsibilities of Network Layer?
The Network Layer is responsible for the source-to-destination delivery of packet possibly across
multiple networks (links).
a. Logical Addressing
b. Routing
21. What are the responsibilities of Transport Layer?
The Transport Layer is responsible for source-to-destination delivery of the entire message.
a. Service-point Addressing
b. Segmentation and reassembly
c. Connection Control
d. Flow Control
e. Error Control
22. What are the responsibilities of Session Layer?
The Session layer is the network dialog Controller. It establishes, maintains and synchronizes the
interaction between the communicating systems.
a. Dialog control
b. Synchronization
23. What are the responsibilities of Presentation Layer?
The Presentation layer is concerned with the syntax and semantics of the information exchanged
between two systems.
a. Translation
b. Encryption
c. Compression
24. What are the responsibilities of Application Layer?
The Application Layer enables the user, whether human or software, to access the network. It
provides user interfaces and support for services such as e-mail, shared database management
and other types of distributed information services.
a. Network virtual Terminal
b. File transfer, access and Management (FTAM)
c. Mail services
d. Directory Services
25.Dfine Topology?
A topology refers to both the physical and logical layout of a network. The physical topology of
a network refers to the actual layout of the computer cables and other network devices.
26.Types of topologie?
Several topologies are in use for networks today. Some of the more common include.
Bus topology
Ring topology
Star topology
Mesh topology
Tree topology
27.Define star topology?
In the star topology, all computers and other network devices connect to a central device
called a hub or switch.
Each connected device requires a single cable to be connected to the hub, creating a
point-to-point connection between the device and the hub.
Unit-2
1. What are the design issues of Data Link Layer?
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable
link
and is responsible for node-node delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
2.What is Flow Control?
Flow control is a set of procedure that tells the sender how much data it can transmit before it
must wait for an acknowledgement. It should not overwhelm the receiver.
24.Mention the categories of flow control.
There are 2 methods have been developed to control flow of data across communication
links.
a) Stop and wait- send one from at a time.
b) Sliding window- send several frames at a time.
Define sliding window flow control.
In sliding window the sender can transmit several frame before needing an acknowledgement
from the receiver.
Sender maintain detail about:
Size of sender window.
Last acknowledgement received.
Last frame sent.
Receiver holds information about:
Receiver window size
Last acknowledgement sent
Last frame received
23. What is Error Control ?
any frames lost or damaged in transmission and coordinates the retransmission of those
frames by the sender. In the data link layer, the term error control refers primarily to methods
of error detection and retransmission.
25. What Automatic Repeat Request (ARQ)?
Error control is both error detection and error correction. It allows the receiver to inform the
sender of any frames lost or damaged in transmission and coordinates the retransmission of
those frames by the sender. In the data link layer, the term error control refers primarily to
methods of error detection and retransmission. Error control in the data link layer is often
implemented simply: Any time an error is detected in an exchange, specified frames are
retransmitted. This process is called automatic repeat request (ARQ).
26. What is Stop-and-Wait Protocol?
In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from
the receiver (okay to go ahead), and then sends the next frame.
27. What is Stop-and-Wait Automatic Repeat Request?
Error correction in Stop-and-Wait ARQ is done by keeping a copy of the sent frame and
retransmitting of the frame when the timer expires.
28.Compare Error Detection and Error Correction:
The correction of errors is more difficult than the detection. In error detection, checks only
any
error has occurred. In error correction, the exact number of bits that are corrupted and
location in the message are known. The number of the errors and the size of the message are
important factors.
20.What are the types of errors?
a. Single-Bit error
In a single-bit error, only one bit in the data unit has changed
b. Burst Error
A Burst error means that two or more bits in the data have changed.
18.What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains
synchronization, flag, flow and error control specifications necessary to move
information
from one place to another, as well as the physical address of the next station
to receive and
route a packet.
Unit-3
1.What do you mean by switching network?
Long distance transmission is typically done over a network of switched nodes and Nodes not
concerned with content of data Data is routed by being switched from node to node
2.Mention two different Two different switching technologies
Circuit switching
Packet switching
3.Define Circuit switching
Dedicated communication path between two stations
Three phases
Establish
Transfer
Disconnect
Must have switching capacity and channel capacity to establish connection
Must have intelligence to work out routing
When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
congestion results.
Because routers are receiving packets faster than they can forward them.
One of two things must happen:
The subnet must prevent additional packets from entering the congested region until
those already present can be processed.
The congested routers can discard queued packets to make room for those that are
arriving
26.Mention Several techniques employed for Congestion?
Several techniques can be employed. These include:
Warning bit
Choke packets
Load shedding
Random early discard
Traffic shaping
The first 3 deal with congestion detection and recovery. The last 2 deal with congestion
avoidance.
Unit-4
1. What is function of transport layer?
The protocol in the transport layer takes care in the delivery of data from one application
program on one device to an application program on another device. They act as a link between
the upper layer protocols and the services provided by the lower layer.
2. What are the duties of the transport layer?
The services provided by the transport layer
End-to- end delivery
Addressing
Reliable delivery
Flow control
Multiplexing
3. What is the difference between network layer delivery and the transport layer
delivery?
Network layer delivery
The duration of time it takes to send a message from one end of a network to the other and
back, is called RTT
13.What is Multiplexing?
Multiplexing is the set of techniques that allows the simultaneous transmission of multiple
Signals across a single data link.
14.List the application of TCP/IP?
have a number of standard TCP/IP applications such as
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP) control and data connections
Telnet
15.What is UDP?
an alternative to TCP
no guaranteed delivery
no preservation of sequence
no protection against duplication
minimum overhead
Just adds port addressing to IP
16.Draw the format of UDP?
t of U
UNIT-5
1. What is the purpose of Domain Name System?
Domain Name System can map a name to an address and conversely an
address to
name.
2. Discuss the three main division of the domain name space.
Domain name space is divided into three different sections: generic domains,
country
domains & inverse domain.
Generic domain: Define registered hosts according to their generic behavior,
uses
generic suffixes.
Country domain: Uses two characters to identify a country as the last suffix.
Inverse domain: Finds the domain name given the IP address.
3. Discuss the TCP connections needed in FTP.
FTP establishes two connections between the hosts. One connection is used for
data
transfer, the other for control information. The control connection uses very
simple rules of
communication. The data connection needs more complex rules due to the
variety of data
types transferred.
4. Discuss the basic model of FTP.
The client has three components: the user interface, the client control process,
and the
client data transfer process. The server has two components: the server control
process and
the server data transfer process. The control connection is made between the
control
processes. The data connection is made between the data transfer processes.
5. What is the function of SMTP?
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail
Transfer (SMTP). It is a system for sending messages to other computer users
based on email
addresses. SMTP provides mail exchange between users on the same or
different
computers.
6. What is the difference between a user agent (UA) and a mail
transfer agent
(MTA)?
The UA prepares the message, creates the envelope, and puts the message in
the envelope. The MTA transfers the mail across the Internet.
7. How does MIME enhance SMTP?
MIME is a supplementary protocol that allows non-ASCII data to be sent through
SMTP. MIME transforms non-ASCII data at the sender site to NVT ASCII data and
deliverers it to the client SMTP to be sent through the Internet. The server SMTP
at the
receiving side receives the NVT ASCII data and delivers it to MIME to be
transform feed
back to the original data.
8. Why is an application such as POP needed for electronic
messaging?
Workstations interact with the SMTP host, which receives the mail on behalf of
every host in the organization, to retrieve messages by using a client-server
protocol such
as Post Office Protocol, version 3(POP3). Although POP3 is used to download
messages
from the server, the SMTP client still needed on the desktop to forward
messages from the
workstation user to its SMTP mail server.
9. Write down the three types of WWW documents.
The documents in the WWW can be grouped into three broad categories: static,
dynamic and active.
Static: Fixed-content documents that are created and stored in a server.
Dynamic: Created by web server whenever a browser requests the document.
Active: A program to be run at the client side.
10.
SNMP is a framework that provides facilities for managing and monitoring network
resources on the Internet.
SNMP agents
SNMP managers
SNMP agent is software that runs on a piece of network equipment (host, router,
printer, or others) and that maintains information about its configuration and
current state in a database