0% found this document useful (0 votes)
17 views

Network_Questions_Answers

Uploaded by

maxiprok7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Network_Questions_Answers

Uploaded by

maxiprok7
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Networking Questions Answers

Answers to Chapter 1 Questions

Multiple-Choice Questions
1.1 A network that requires call setup, call transmission, and call termination is known
as:

(a) Dedicated network

(b) Switched network

(c) Long-haul network

(d) Local network

1.2 Which of the following computer network typically has the least transmission rate?

(a) a LAN

(b) a MAN

(c) a WAN

1.3 WiMAX is:

(a) a LAN

(b) a MAN

(c) a WAN

1.4 Wi-Fi is:

(a) a LAN

(b) a MAN

(c) a WAN

1.5 The computers in your lab are connected by:

(a) a LAN

(b) a MAN

(c) a WAN

1.6 A cable TV network serving New York City is:

(a) a LAN

(b) a MAN

(c) a WAN
1.7 If you are in Houston, Texas, which network will enable you to share information
with your friend in Manchester, United Kingdom?

(a) a LAN

(b) a MAN

(c) a WAN

1.8 Ethernet was invented in the year:

(a) 1969

(b) 1973

(c) 1982

(d) 1991

1.9 This is not an organization that develops standards:

(a) ANSI

(b) IEEE

(c) ITU

(d) OSI

1.10 IEEE does not do one of the following:

(a) Develops technical standards

(b) Allocates spectrum

(c) Publishes technical papers

(d) Sponsors conferences

Essay Questions
1.1 What is a network protocol?

Answer:

A set of rules that allow orderly data exchange in networks.

1.2 What are the differences between a LAN and a WAN?

Answer:

LAN covers a small area with high speeds; WAN spans large distances with lower speeds.
1.3 Select a LAN and discuss how it works.

Answer:

Ethernet connects devices using switches for high-speed data transfer.

1.4 Choose a particular MAN and write a short essay about it.

Answer:

WiMAX connects citywide areas, providing broadband connectivity.

1.5 The Internet is regarded as a 'network of networks.' Explain why.

Answer:

It interconnects various LANs, MANs, and WANs globally using TCP/IP.

1.6 Write a short essay on either home area network (HAN) or storage area network
(SAN).

Answer:

SAN enables data storage and sharing across servers efficiently.

1.7 The ALOHA network was the first system to successfully use the packet radio for
communication. Write a short essay about it.

Answer:

ALOHA used packet-switching over radio, inspiring Ethernet development.

1.8 A LAN uses a network operating system (NOS) to operate. What specifically does
NOS do? Give examples of NOS.

Answer:

NOS manages devices and file sharing; examples: Windows Server, Novell NetWare.

1.9 Why are standards important in computer networking?

Answer:

They ensure interoperability and compatibility between devices and systems.

1.10 Select a standards organization and write briefly about it.

Answer:

IEEE develops networking standards like Ethernet (802.3) and Wi-Fi (802.11).
1.11 What benefits does the government derive in using computer networks?

Answer:

Networks improve governance through e-services, efficiency, and transparency.

1.12 Select a social network and write briefly about it.

Answer:

Facebook connects users globally for communication and content sharing.

1.13 Discuss two applications of computer networks not discussed in this chapter.

Answer:

Healthcare (telemedicine) and manufacturing (automated systems).

1.14 Write a short essay on smart cities.

Answer:

Smart cities use IoT and data for efficient infrastructure and resource management.

1.15 Find two RFC documents.

Answer:

RFC 791 defines IP; RFC 2616 defines HTTP/1.1.

1.16 Write about IBM standards.

Answer:

SNA enables mainframe communication; EBCDIC is used for data encoding.

Answers to Chapter 2 Questions

Multiple-Choice Questions
2.1 Digital communications can also be referred to as:

(a) Data transmission

(b) Analog transmission

(c) Digital bit stream


2.2 The communication channel is also referred to as:

(a) Communication transmission

(b) Transmission media

2.3 Computer bus is an example of a transmission media?

(a) True

(b) False

2.4 Radio wave is not one shape or form of a digital data?

(a) True

(b) False

2.5 Limiting the distance a signal can travel can be known as:

(a) Noise absorption

(b) Interference

(c) Attenuation

(d) Transmission impairment

2.6 Converting analog information to digital information for electronic systems is one of
the ways computer network encoding can be done.

(a) True

(b) False

2.7 Byte stuffing cannot be referred to as character stuffing in computer networks.

(a) True

(b) False

2.8 In circuit switching, the long wait before connection is established is at least up to:

(a) 5 secs

(b) 10 secs

(c) 15 secs

(d) 20 secs

2.9 In the case of message switching, there is no need to establish a dedicated path
between two stations quite unlike the circuit switching.

(a) True

(b) False
2.10 Common LAN/WAN architecture multimedia support is not one of the advantages
of cell switching.

(a) True

(b) False

Essay Questions
2.1 Name at least five examples of a transmission media?

Answer:

Examples include coaxial cable, optical fiber, twisted-pair cable, microwave, and
satellite.

2.2 Name five of the different shapes and forms that communication data can be
represented?

Answer:

Forms include analog waveforms, digital signals, binary data, characters, and images.

2.3 What factors must you consider in choosing the best transmission media for any
application?

Answer:

Factors include bandwidth, cost, ease of installation, attenuation, and resistance to


interference.

2.4 Name and discuss the two different types of transmission media?

Answer:

1- Wired Media: Includes copper cables and fiber optics.

2- Wireless Media: Includes radio waves and microwaves.

2.5 What is encoding? What are the two ways encoding can be categorized?

Answer:
Encoding is the process of representing data in a different format to enable
transmission.

1-Analog Encoding 2- Digital Encoding

2.6 Describe the Polar and Bipolar encoding techniques.


Answer:

1-Polar Encoding: Assigns positive and negative voltage levels to the digital signal.

2- Bipolar Encoding: Uses polar signals but alternates between the poles only for '1'
values.
2.7 Consider the binary sequence 0100101. Draw the waveforms for the following
formats: (a) Unipolar NRZ: The signal alternates between 0 and a positive level.

(b) Bipolar RZ: The signal alternates between positive and negative voltages for '1', with
a return to zero.

(c) AMI: '1' is represented by alternating positive and negative voltages.

Answer:
2.8 Consider a binary sequence with a long sequence of 1s followed by a single 0 and
then a long sequence of 1s such as this binary sequence 11111011111. Draw the
waveforms for this sequence, using the fol lowing signaling formats:

(a) Unipolar NRZ signal format

(b) Bipolar RZ signal format

(c) AMI (Alternate Mark Inversion) RZ signaling format

Answer:

2.9 Briefly describe the working of a bit and byte stuffing in a computer network system?

Answer: 1. Bit Stuffing: Adds a '0' after a sequence of consecutive '1's to avoid ambiguity.

2. Byte Stuffing: Inserts a special byte to indicate the start or end of data.
2.10 Given an input bit stream of [0110111111100111111111100000], determine what
the bit stuffing will be?

Answer:

When encountering more than 5 consecutive '1's, insert a '0' immediately after them.
Result: [0110111111010011111011111100000]

2.11 Given an input bit stream in a computer network system, determine what the bit
stuffing will be?

Answer:

The result after bit stuffing is: [0110111111010011111011111100000].


2.12 What will be the unstuffed bit stream at the output end of the computer network
system?

Answer:

After unstuffing, the original bit stream is restored: [0110111111100111111111100000].

2.13 (a) Define the multiplexing process.

(b) Briefly describe the two forms of a multiplexer in a digital communication


system.

Answer:
Multiplexing is the process of combining multiple signals for transmission over a single
medium.

(a) Time Division Multiplexing (TDM): Divides the transmission medium by time.

(b) Frequency Division Multiplexing (FDM): Divides the transmission medium by


frequency.

2.14 (a) How does circuit switching work in a computer network system?

(b) What are the advantages and disadvantages of circuit switching?

Answer:

(a) Circuit Switching establishes a dedicated path for communication.

(b) Advantages: Fixed and fast communication.

Disadvantages: Inefficient if the channel remains unused.


2.15 What are the (a) advantages and (b) disadvantages of a packet switching?

Answer:

(a) Advantages:

1. High network efficiency.

2. Flexible data transmission.

3. Lower cost compared to circuit switching.

(b) Disadvantages:

1. Potential delays due to packet assembly.

2. Possibility of packet loss or misordering.

2.16 What is the difference between message switching and circuit switching?

Answer:
1. Message Switching: Temporarily stores messages before forwarding them. Suitable
for asynchronous transmission.
2. Circuit Switching: Creates a dedicated channel between the sender and receiver.
Suitable for voice calls.

2.17 (a) What are the differences between cell switching and packet switching?

(b) What are the advantages and disadvantages of cell switching?

Answer:

(a) Differences: Packet Switching: Uses variable-length packets, ideal for internet
applications. Cell Switching: Uses fixed-length cells, commonly used in ATM
networks.

(b) Advantages of Cell Switching:

1. Fixed delay, suitable for real-time applications.

Disadvantages:

1. Inefficient for large file transfers due to fixed cell size.


Answers to Chapter 3 Questions

Multiple-Choice Questions
3.1 How many layers does the OSI model have?

(a) 2

(b) 7

(c) 5

(d) Less than 7

3.2 In the OSI model, layers 1–4 relate to communications technology.

(a) True

(b) False

3.3 In the OSI model, layers 5–7 do not relate to user applications.

(a) True

(b) False

3.4 In the TCP/IP model, the network interface layer is responsible for the specification
of how to organize data into frames over a network.

(a) True

(b) False

3.5 The responsibilities of the ARP protocol are:

(a) To find the Internet address from the IP address.

(b) To find the application address from the IP address.

(c) To find the session address from the IP address.

(d) To find the physical address from the IP address.

3.6 Hubs can be classified as:

(a) Non-active

(b) Passive

(c) Active and passive

(d) Non-passive

3.7 Gateways are also called protocol converters and can operate at any network layer.

(a) True

(b) False
3.8 The Signaling System No. 7 (SS7) is a data communications network standard not
intended to be used as a control and management network for telecommunication
networks.

(a) True

(b) False

3.9 The types of signaling points are:

(a) Service switching point (SSP) and signal transfer point (STP)

(b) Signal transfer point (STP) and service control point (SCP)

(c) Service switching point (SSP) and service control point (SCP)

(d) Service switching point (SSP), signal transfer point (STP), and service control point
(SCP)

3.10 The SS7 signaling connection control part (SCCP) is the layer responsible for services
like connection-oriented, connectionless, and peer-to-peer communication.

(a) True

(b) False

Essay Questions
3.1 Name the seven layers of the OSI model.

Answer:

The OSI model layers are Physical, Data Link, Network, Transport, Session, Presentation,
and Application.

3.2 Describe the physical layer and the application layer.

Answer:

The Physical layer manages data transmission over a medium, while the Application
layer provides end-user interfaces and network services.

3.3 How many layers does the TCP/IP model have? Describe each layer.

Answer:

The TCP/IP model has 5 layers: Physical, Network Interface, Internet, Transport, and
Application.
3.4 What is a hub?

Answer:

A hub is a networking device that connects multiple Ethernet devices, making them act
as a single network segment.

3.5 Describe the two different types of hubs.

Answer:

Passive hubs distribute signals without any processing, while active hubs regenerate and
amplify the signals.

3.6 Describe the different types of bridges.

Answer:

Types of bridges include simple bridges, multiport bridges, and transparent bridges.

3.7 What are routers, and how can they receive information?

Answer:

Routers forward data packets based on their IP addresses. They receive information via
static routes or dynamic protocols.

3.8 Describe Signaling System No. 7 (SS7).

Answer:

SS7 is a set of telecommunication protocols used for setting up and tearing down calls,
routing messages, and managing databases in a network.

3.9 Name and describe the three types of signaling points in SS7.

Answer:
SS7 signaling points include Service Switching Points (SSP), Signal Transfer Points (STP),
and Service Control Points (SCP). SSP initiates calls, STP routes messages, and SCP
stores and processes data.

3.10 Compare the OSI model with the IEEE model.

Answer:

The OSI model has 7 layers focusing on standardization, while the IEEE model
emphasizes physical and data link layers for LAN communication.
3.11 What is a repeater designed to do?

Answer:

Repeater amplifies and regenerates signals for longer distances.

3.12 Explain a gateway?

Answer:

Gateway connects networks with different protocols.

3.13 Describe a brouter?

Answer:

Brouter combines bridge and router functions.

3.14 Compare the OSI model with the IEEE Model?

Answer:

OSI: 7-layer model for networking.

IEEE: Focuses on LAN/MAN (OSI's physical and data link layers)

Answers to Chapter 4 Questions

Multiple-Choice Questions
4.1 Local area network (LAN) is typically a group of data communication networks or a
group of computers and other necessary devices that are connected within the same
location/space.

(a) True

(b) False

4.2 Examples of the random access protocols include the following:

(a) ALOHA

(b) Carrier Sense Multiple Access

(c) Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

(d) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

(e) All of the above

4.3 ALOHA is not highly decentralized and slots are not normally synchronized.

(a) True

(b) False
4.4 In CSMA protocol, the following:

(a) 1-persistent CSMA

(b) Non-persistent CSMA

(c) p-persistent CSMA

(d) All of the above

4.5 CSMA/CD is governed by:

(a) IEEE 802.2 standard

(b) IEEE 802.4 standard

(c) IEEE 802.3 standard

(d) IEEE 802.1 standard

4.6 In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the
contention window; it stops the timer and restarts it when the channel becomes
idle.

(a) True

(b) False

4.7 The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is not the part of
the control access protocol that is usually used in a bus topology.

(a) True

(b) False

4.8 Ethernet can provide speeds in the range of:

(a) 1 Mbps to 10 Gbps

(b) 5 Mbps to 10 Gbps

(c) 15 Mbps to 10 Gbps

(d) 10 Mbps to 10 Gbps

4.9 Token bus networks are seen as somewhat unreliable and difficult to expand and
upgrade.

(a) True

(b) False
4.10 In a star topology:

(a) Computers are not connected to one another but are all not connected to a central
hub or switch.

(b) Computers are connected to one another but are all connected to a central hub or
switch.

(c) Computers are not connected to one another but are all connected to a central
hub or switch.

(d) Computers are connected to one another but are all not connected to a central
hub or switch.

Essay Questions
4.1 What do you understand by random access relative to a LAN? Describe briefly
random access in a LAN?

Answer:
Random access allows devices to transmit data whenever the channel is free. In LANs,
protocols like CSMA handle access to prevent collisions.

4.2 Describe briefly Carrier Sense Multiple Access (CSMA) protocol in a random access
LAN.

Answer:

CSMA listens to the channel before sending data. If the channel is idle, data is
transmitted; otherwise, it waits.

4.3 What is a token ring?

Answer:

A token ring is a network where a token circulates and grants the right to transmit data,
preventing collisions.

4.4 Describe briefly the different types of Ethernet LAN.

Answer:

Ethernet types include standard Ethernet, fast Ethernet, and gigabit Ethernet, offering
varying speeds and applications.

4.5 Mention some of the characteristics of a star topology in a LAN.

Answer:

Star topology connects devices to a central hub. It is easy to set up and troubleshoot but
depends on the hub's functionality.
Answers to Chapter 5 Questions

Multiple-Choice Questions
5.1 Which of the following switching methods is used by the Internet?

(a) Packet switching

(b) Circuit switching

(c) Cable switching

(d) Transmission switching

5.2 Internet supports message exchange between users through a mechanism called:

(a) Gateway

(b) Interfaces

(c) Layers

(d) Protocols

5.3 Which protocol provides a connectionless service?

(a) IP

(b) TCP

(c) UDP

5.4 APNIC is responsible for allocating IP addresses for:

(a) Africa

(b) America

(c) Asia and the Pacific region

(d) Latin America and the Caribbean region

(e) Europe, Middle East, and Central Asia

5.5 Which of the following is not true?

(a) The Internet is a specific piece of hardware and software.

(b) The Internet is not the same everywhere.

(c) The Internet is not restricted to educational, noncommercial uses.

(d) The Internet is a medium for communicating with others.

(e) The Internet is flexible in cost.

5.6 Only classes A, B, and C of IP addresses are commonly used.

(a) True

(b) False
5.7 The IP address 152.116.24.100 belongs to:

(a) Class A

(b) Class B

(c) Class C

(d) Class D

(e) Class E

5.8 The most popular Internet service for commercial purposes is:

(a) Email

(b) Telnet

(c) FTP

(d) WWW

5.9 IPv6 does not support the following addressing:

(a) Unicast addressing

(b) Anycast addressing

(c) Multicast addressing

(d) Broadcast addressing

5.10 Internet2 is designed to solve the following problems except:

(a) Limited IP addresses

(b) Limited bandwidth

(c) Congestion and reliability

(d) Connecting regional and global communities

Essay Questions
5.1 Write about two individuals who played key roles in the development of the
Internet.

Answer:

Vinton Cerf and Robert Kahn developed the TCP/IP protocol suite, forming the backbone
of Internet communication.

5.2 Describe the responsibilities of the four layers in the Internet protocol stack.

Answer:

The four layers are: Application (user interaction), Transport (data delivery), Internet
(packet routing), and Network (hardware communication).
5.3 Why is Internet regarded as a 'network of networks'?

Answer:

The Internet connects various independent networks globally, enabling seamless


communication.

5.4 What is the major difference between TCP and UDP?

Answer:

TCP is connection-oriented and reliable, while UDP is connectionless and faster but less
reliable.

5.5 Explain fields IHL, DSCP, ECN, and TTL of an IP header format.

Answer:

IHL specifies header length, DSCP manages quality of service, ECN handles congestion,
and TTL limits packet lifespan.

Answers to Chapter 6 Questions

Multiple-Choice Questions
6.1 Intranets are primarily used for:

(a) Public access

(b) Internal organizational communication

(c) External business communication

6.2 Extranets are used for:

(a) Internal communication

(b) Communication with external stakeholders

(c) Open public access

6.3 Key technologies for intranets and extranets do NOT include:

(a) Web servers

(b) Firewalls

(c) LAN cards

(d) VPNs
6.4 One of the following is NOT a benefit of an extranet:

(a) Enhanced data sharing

(b) Improved security

(c) Public unrestricted access

6.5 VPNs are essential for:

(a) Securing public access

(b) Securely connecting remote users and networks

(c) Increasing internet speed

6.6 The difference between intranets and extranets lies in:

(a) Type of data shared

(b) Accessibility to external users

(c) Use of encryption

6.7 Which of the following is a key feature of intranets?

(a) Global accessibility

(b) Secure internal collaboration

(c) Unrestricted public access

6.8 Firewalls in intranets are used to:

(a) Monitor employee activity

(b) Secure internal data

(c) Enhance internet speed

6.9 Which of the following best describes VPNs?

(a) A public network for private access

(b) A secured private network over public infrastructure

(c) A method to speed up internet connections

6.10 Extranets are used to:

(a) Share public announcements

(b) Collaborate with external partners

(c) Improve public relations


Essay Questions
6.1 List three common uses of intranets.

Answer:

Communication, sharing resources, collaboration.

6.2 What is the primary difference between intranets and extranets?

Answer:

Intranets are internal, extranets include external users.

6.3 Name three technologies used in intranets and extranets.

Answer:

Web servers, firewalls, VPNs.

6.4 Briefly describe the purpose of VPNs in extranets.

Answer:

Encrypts data for secure transmission.

6.5 What is a key advantage of using an extranet?

Answer:

Secure external collaboration.

You might also like