Computer Network Long Questions & Answer
Computer Network Long Questions & Answer
The original TCP/IP protocol suite was defined as having four layers: host-to-
network, internet, transport, and application.
The TCP/IP protocol suite is made of five layers: physical, data link, network,
transport, and application. The first four layers provide physical standards, network
interfaces, internetworking, and transport functions that correspond to the first four layers of
the OSI model. The three topmost layers in the OSI model, however, are represented in
TCP/IP by a single layer called the application layer (see Figure 1.23).
2. Network Layer:
At the network layer (or, more accurately, the internetwork layer), TCP/IP supports
the Internetworking Protocol. IP, in turn, uses four supporting protocols: ARP, RARP, ICMP,
and IGMP.
a. Internetworking Protocol (IP)
The Internetworking Protocol (IP) is the transmission mechanism used by the TCP/IP
protocols. It is an unreliable and connectionless protocol-a best-effort delivery service. The
term best effort means that IP provides no error checking or tracking.
b. Address Resolution Protocol
The Address Resolution Protocol (ARP) is used to associate a logical address with a physical
address. On a typical physical network, such as a LAN, each device on a link is identified by
a physical or station address, usually imprinted on the network interface card (NIC). ARP is
used to find the physical address of the node when its Internet address is known.
c. Reverse Address Resolution Protocol
3. Transport Layer:
Traditionally the transport layer was represented in TCP/IP by two protocols: TCP
and UDP. IP is a host-to-host protocol, meaning that it can deliver a packet from one physical
device to another. UDP and TCP are transport level protocols responsible for delivery of a
message from a process (running program) to another process. A new transport layer
protocol, SCTP, has been devised to meet the needs of some newer applications.
a. User Datagram Protocol
The User Datagram Protocol (UDP) is the simpler of the two standard TCP/IP transport
protocols. It is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from the upper layer.
b. Transmission Control Protocol
The Transmission Control Protocol (TCP) provides full transport-layer services to
applications. TCP is a reliable stream transport protocol. The term stream, in this context,
means connection-oriented: A connection must be established between both ends of a
transmission before either can transmit data.
c. Stream Control Transmission Protocol
The Stream Control Transmission Protocol (SCTP) provides support for newer applications
such as voice over the Internet. It is a transport layer protocol that combines the best features
of UDP and TCP.
4. Application Layer:
The application layer in TCP/IP is equivalent to the combined session, presentation and
application layers in the OSI model. Many protocols are defined at this layer.
4. Cell Networks
Many of the problems associated with frame internetworking are solved by adopting a
concept called cell networking. A cell is a small data unit of fixed size. In a cell network,
which uses the cell as the basic unit of data exchange, all data are loaded into identical cells
that can be transmitted with complete predictability and uniformity. As frames of different
sizes and formats reach the cell network from a tributary network, they are split into multiple
small data units of equal length and are loaded into cells. The cells are then multiplexed with
other cells and routed through the cell network.
5. Asynchronous TDM
ATM uses asynchronous time-division multiplexing-that is why it is called
Asynchronous Transfer Mode-to multiplex cells corning from different channels. It uses
fixed-size slots (size of a cell). ATM multiplexers fill a slot with a cell from any input
channel that has a cell; the slot is empty if none of the channels has a cell to send
6. Architecture
ATM is a cell-switched network. The user access devices, called the endpoints, are
connected through a user-to-network interface (UNI) to the switches inside the network. The
switches are connected through network-to-network interfaces (NNIs).
The ATM layer provides routing, traffic management, switching, and multiplexing services.
It processes outgoing traffic by accepting 48-byte segments from the AAL sublayers and
transforming them into 53-byte cells by the addition of a 5-byte header.
Header Format:
ATM uses two formats for this header, one for user-to-network interface (UNI) cells and
another for network-to-network interface (NNI) cells.
The physical layer is concerned with transmitting raw bits over a communication
channel. The design issues have to do with making sure that when one side sends a 1 bit, it is
received by the other side as a 1 bit, not as a 0 bit.
The main task of the data link layer is to transform a raw transmission facility into a
line that
appears free of undetected transmission errors to the network layer. It accomplishes this task
by having the sender break up the input data into data frames (typically a few hundred or a
few thousand bytes) and transmits the frames sequentially. If the service is reliable, the
receiver confirms correct receipt of each frame by sending back an acknowledgement frame.
Another issue that arises in the data link layer (and most of the higher layers as well) is how
to keep a fast transmitter from drowning a slow receiver in data. Some traffic regulation
mechanism is often needed to let the transmitter know how much buffer space the receiver
has at the moment. Frequently, this flow regulation and the error handling are integrated.
The network layer controls the operation of the subnet. A key design issue is
determining how packets are routed from source to destination. Routes can be based on static
tables that are ''wired into'' the network and rarely changed. They can also be determined at
the start of each conversation, for example, a terminal session (e.g., a login to a remote
machine). Finally, they can be highly dynamic, being determined anew for each packet, to
reflect the current network load. If too many packets are present in the subnet at the same
time, they will get in one another's way, forming bottlenecks. The control of such congestion
also belongs to the network layer. More generally, the quality of service provided (delay,
transit time, jitter, etc.) is also a network layer issue. When a packet has to travel from one
network to another to get to its destination, many problems can arise. The addressing used by
the second network may be different from the first one. The second one may not accept the
packet at all because it is too large. The protocols may differ, and so on. It is up to the
network layer to overcome all these problems to allow heterogeneous networks to be
interconnected. In broadcast networks, the routing problem is simple, so the network layer is
often thin or even nonexistent.
The basic function of the transport layer is to accept data from above, split it up into
smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive
correctly at the other end. Furthermore, all this must be done efficiently and in a way that
isolates the upper layers from the inevitable changes in the hardware technology. The
transport layer also determines what type of service to provide to the session layer, and,
ultimately, to the users of the network. The most popular type of transport connection is an
error-free point-to-point channel that delivers messages or bytes in the order in which they
The session layer allows users on different machines to establish sessions between
them. Sessions offer various services, including dialog control (keeping track of whose turn it
is to transmit), token management (preventing two parties from attempting the same critical
operation at the same time), and synchronization (check pointing long transmissions to allow
them to continue from where they were after a crash).
The presentation layer is concerned with the syntax and semantics of the information
transmitted. In order to make it possible for computers with different data representations to
communicate, the data structures to be exchanged can be defined in an abstract way, along
with a standard encoding to be used ''on the wire.'' The presentation layer manages these
abstract data structures and allows higher-level data structures (e.g., banking records), to be
defined and exchanged.
The application layer contains a variety of protocols that are commonly needed by
users. One widely-used application protocol is HTTP (Hypertext Transfer Protocol), which is
the basis for the World Wide Web. When a browser wants a Web page, it sends the name of
the page it wants to the server using HTTP. The server then sends the page back. Other
application protocols are used for file transfer, electronic mail, and network news.
Answer:
> A hub is often used to connect small LAN segments in which the number of devices is
generally 24 or fewer, and hubs are multiport repeaters. Hubs provide the signal amplification
required to allow a segment to be extended a greater distance.
> A hub takes an incoming signal on any one port and repeats it out all ports to enable users to
share the Ethernet network resources.
> Ethernet hubs create star topologies in 10-Mbps or 100-Mbps half-duplex Ethernet LANs.
> It is the hub that enables several point-to-point segments to be joined together into one single
network.
> A shared Ethernet LAN means that all members of the network are contending for transmission
of data onto a single network.
Repeaters and hubs have no intelligence; they just repeat whatever signal is received from
one port out all ports without looking at what is being sent or received. Bridges add a level of
intelligence to the network by using the MAC address to build a table of hosts, mapping these
hosts to a network segment and containing traffic within these network segments. For
example, Figure 5-6 illustrates a bridged network with two network segments.
Switches sit in the same place in the network as hubs. Unlike hubs, however, switches
examine each frame and process the frame accordingly instead of just repeating the signal to
all ports. Switches map the MAC addresses of the nodes residing on each network segment
and then allow only the necessary traffic to pass through the switch. A switch performs the
same functions as a bridge; so when the switch receives a frame, it examines the destination
and source MAC addresses and compares them to a table of network segments and addresses.
If the segments are the same, the frame is dropped, or filtered; if the segments differ, the
frame is forwarded to the proper segment.
The filtering of frames and regeneration of forwarded frames enables switches to split a
network into separate collision domains. Frame regeneration enables greater distances and
more network devices, or nodes, to be used in the total network design, and lowers the overall
collision rates. In switched networks, each segment is an independent collision domain,
whereas in shared networks all nodes reside in one, big, shared collision domain.
Routers are devices that forward data packets from one LAN or WAN to another. Based on
routing tables and routing protocols, routers read the network address in the packet contained
within each transmitted frame. Routers then select a sending method for the packet based on
the most expedient route. This most expedient route is determined by factors such as traffic
load, line quality, and available bandwidth. Routers work at Layer 3 (network) in the protocol
stack, whereas bridges and switches work at Layer 2 (data link).
Routers segment LANs to balance traffic within workgroups and to filter traffic for security
purposes and policy management.