Computer Networks Q&A (Expanded)
1. Define computer network and list out applications.
A computer network is a system where multiple computers and devices are connected to
share data, resources, and communication channels. Networks can be wired or wireless, and
they facilitate collaboration and centralized resource usage.
Applications include:
- Internet browsing for accessing global information
- Email and messaging for communication
- File and printer sharing in offices
- Online gaming for entertainment
- Cloud computing for data storage and software access
- Remote desktop access for troubleshooting and support
- Video conferencing for remote meetings and collaboration
2. What are the functionalities of SNMP protocol?
SNMP (Simple Network Management Protocol) is widely used to manage and monitor
network devices such as routers, switches, servers, and printers. It allows network
administrators to:
- Collect performance metrics like CPU usage and bandwidth
- Configure network devices remotely
- Monitor network faults and generate alerts
- Maintain overall network health and performance
3. How congestion occurs in a network?
Network congestion happens when the volume of data traffic exceeds the network's
handling capacity. This causes delays, packet loss, and degraded performance. Factors
contributing to congestion include high traffic load, limited bandwidth, inefficient routing,
and lack of proper congestion control mechanisms.
4. What are the services provided by transport layer protocol?
The transport layer ensures reliable and efficient communication between applications on
different hosts. Its services include:
- Reliable data transfer using acknowledgments and retransmissions (TCP)
- Flow control to avoid overwhelming the receiver
- Error checking and correction
- Segmentation and reassembly of large data into smaller packets
- Multiplexing to support multiple applications on the same device
5. What is the sub network address if the destination address is 200.45.34.56
and the subnet mask is 255.255.240.0?
To find the subnet address, convert both IP and subnet mask to binary and perform a
bitwise AND operation:
IP: 200.45.34.56 -> 11001000.00101101.00100010.00111000
Mask: 255.255.240.0 -> 11111111.11111111.11110000.00000000
AND Result -> 11001000.00101101.00100000.00000000 = 200.45.32.0
So, the subnet address is 200.45.32.0
6. Differentiate Intra and Inter-domain Routing.
Intra-domain routing occurs within a single organization or administrative boundary. It
uses protocols like RIP, OSPF, and EIGRP to determine the best paths. Inter-domain routing
connects different networks or domains across the internet and typically uses BGP (Border
Gateway Protocol) to exchange routing information among autonomous systems.
7. List out advantages and disadvantages of Dynamic Routing.
Advantages:
- Automatically adapts to network topology changes
- Scales well in large and complex networks
- Reduces human error due to manual configuration
Disadvantages:
- Higher CPU and bandwidth usage due to routing updates
- Slower convergence after topology changes
- More difficult to troubleshoot compared to static routing
8. What are the benefits of DHCP?
DHCP (Dynamic Host Configuration Protocol) simplifies network administration by:
- Automatically assigning IP addresses to devices
- Reducing configuration errors and IP conflicts
- Allowing quick reconfiguration of IP addresses
- Centralizing IP address management
- Supporting devices joining and leaving the network dynamically
9. List out the functions of data link layer.
The data link layer manages node-to-node data transfer. Key functions include:
- Framing: Packaging data into manageable units (frames)
- Error detection and correction using checksums
- Flow control to prevent buffer overflow
- Media Access Control (MAC) to control device access to the medium
- Addressing using MAC addresses for local delivery
- Synchronizing data frames between sender and receiver
10. What do you mean by framing?
Framing is the process of breaking a continuous stream of bits into structured data units
called frames. It enables easier error detection, synchronization, and reliable data transfer
over communication channels.
11. Compare the HTTP and FTP.
HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are both used for data
transfer but have different purposes:
- HTTP is used for accessing and browsing web pages, operates over port 80, and is
stateless.
- FTP is used for transferring large files, supports user authentication, operates over ports
20 and 21, and allows file upload/download with directory management.
12. Why is POP3 or IMAP4 needed?
POP3 (Post Office Protocol v3) and IMAP4 (Internet Message Access Protocol v4) are used
by email clients to retrieve messages from mail servers.
- POP3 downloads and removes emails from the server, ideal for single-device use.
- IMAP4 syncs messages between client and server, allowing access from multiple devices
and maintaining mailbox structure.
13. Differentiate UDP and TCP.
TCP and UDP are two transport layer protocols:
- TCP is connection-oriented, reliable, and ensures error checking and data ordering. Used
for web, email, and file transfers.
- UDP is connectionless, faster, but unreliable. Ideal for real-time applications like video
calls, online games, and DNS queries.
14. Name the Internet model protocols at the transport layer.
The transport layer in the Internet model uses two main protocols:
- TCP (Transmission Control Protocol)
- UDP (User Datagram Protocol)
15. Compare Ethernet address with IP address.
Ethernet (MAC) vs IP Address:
- MAC is a 48-bit hardware address assigned by the manufacturer, used at the data link
layer.
- IP address is a logical address (32-bit in IPv4 or 128-bit in IPv6), assigned by network
admins or DHCP, used for routing at the network layer.
16. Write down the functions of ICM.
ICMP (Internet Control Message Protocol) supports network diagnostics and error
reporting. It:
- Reports unreachable destinations
- Sends time exceeded messages for TTL expiry
- Provides tools like ping and traceroute to test connectivity and route paths
17. Differentiate between forwarding table and routing table.
A routing table contains the best known paths to destination networks and is used to build
the forwarding table.
The forwarding table is used by routers to determine where to send each packet based on
destination IP, offering faster lookup and simplified decision-making.
18. What are the important attributes for a good routing algorithm?
A good routing algorithm should be:
- Correct and free of routing loops
- Simple to implement
- Robust against failures
- Stable under changing network conditions
- Fair in distributing load
- Optimal for finding the shortest or best path
- Scalable for large networks
19. Define circuit Switching.
Circuit switching is a communication method where a dedicated communication path is
established between two endpoints for the duration of a session. Used in traditional
telephone networks, it ensures consistent connection and bandwidth until the session ends.
20. What is virtual LAN?
A Virtual LAN (VLAN) is a logical partition of a physical LAN. It groups devices based on
function or department, regardless of physical location. VLANs enhance security, reduce
broadcast domains, and simplify network management.