Professional Documents
Culture Documents
CN Shri Finalnotes
CN Shri Finalnotes
Q.1. Explain ISO OSI reference model with diagram and functions of each layer.
(May15,16,19)
Ans:
➢ OSI stands for Open System Interconnection is a reference model.
➢ It is developed by International Organization for Standardization (ISO) in year 1984.
➢ OSI consist of Seven Layers and each layer performs a particular network function.
➢ Diagram:
By Shri
➢ Function of layers are:
Layer Layers Functions
No:
7 Application Layer - Provides user interface.
(Ques: Enumerate main responsibilities of data link layer. May 17- 5marks)
- The functions of the Data Link layer are:
- Framing: Framing is a function of the data link layer. It provides a way for a sender
to transmit a set of bits that are meaningful to the receiver.
- Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC address) of the sender and/or receiver in the header of each
frame.
- Error control: Data link layer provides the mechanism of error control in which
it detects and retransmits damaged or lost frames.
By Shri
- Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus, flow control coordinates the amount of data that can be sent
before receiving acknowledgement.
- Access control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which device
has control over the channel at a given time.
By Shri
Q.3. Compare TCP/IP and OSI reference model. (Very imp)
or Compare it with TCP/IP reference model. Which layer is used for the following:
1. To routes packets
2. To convert packets to frame
3. To detect and correct errors
4. To run services like FTP, Telnet, etc.
Ans:
Parameters OSI Model TCP/IP Model
Full Form OSI stands for Open System TCP /IP stands for Transmission Control
Interconnection Protocol / Internet Protocol.
Developed By ISO (International Standard ARPANET (Advanced Research Project
Organization) Agency Network)
Approach This model has Vertical Approach This model has Horizontal Approach
Services Network layer provides both Network layer provides only
connection-oriented and connectionless service
connectionless service
Layers It has 7 layers It has 4 layers
Usage The usage of this model is very low This model is highly used
To route Layer 3, Network layer where routing Layer 2, Internet layer from here routing
packets takes place takes place
To convert Layer 2, Data Link Layer convert Network Layer encapsulates IP datagram
packets to packets to frame and send the frames into frames transmitted by network and
frame to physical layer maps IP addresses into physical
addresses.
To detect and Layer 2, Data Link Layer detect and Layer 2, Transport Layers detect and
correct errors correct errors correct errors
To run Application Layer of OSI model is Application Layer of TCP/IP model is
services like responsible for running services like responsible for running services like
FTP, FTP, Telnet FTP, Telnet
Telnet,etc
Figure
By Shri
Q.4. Design issues of various layers or OSI layer (Very imp)
Ans:
1. Reliability
2. Internetworking
3. Scalability
4. Addressing
5. Error Control
6. Flow Control
7. Security
8. Congestion
9. Resource Allocation
10. Routing
11. Protocol Layering
12. Quality of Service
13. Statistical multiplexing
14. Confidentiality, Integrity and Availability
Explanation:
By Shri
Q.5. Why there is a need for layered designing for networking and communication?
(IMP)
Ans:
➢ The layered architecture’s major goal is to split the design into tiny parts.
➢ Each lower layer contributes its services to the top layer, resulting in a complete
collection of services for managing communications and running applications.
➢ It provides modularity and explicit interfaces, allowing subsystems to interact with
one another.
➢ It ensures layer independence by offering services from the lowest to the highest
layer without specifying how the services are implemented. As a result, any
changes made to one layer have no effect on the other levels.
➢ The number of levels, functions, and contents of each layer will differ from one
network to the next.
By Shri
Q.7. Difference Between TCP and UDP
Ans:
Parameters TCP UDP
Full form It stands for Transmission Control It stands for User Datagram Protocol.
Protocol.
Type of It is a connection-oriented protocol, It is a connectionless protocol, which
connection which means that the connection means that it sends the data without
needs to be established before the checking whether the system is ready
data is transmitted over the to receive or not.
network.
Reliable TCP is a reliable protocol as it UDP is an unreliable protocol as it
provides assurance for the delivery does not take the guarantee for the
of data packets. delivery of packets.
Speed TCP is slower than UDP UDP is faster than TCP
Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.
Retransmission Retransmission of data packets is There is no retransmission of lost
possible in TCP packets in UDP
Broadcasting TCP does not support broadcasting. UDP support broadcasting.
Application TCP is used by HTTP, HTTPs, FTP, UDP is used by DNS, DHCP, SNMP, RIP,
SMTP and Telnet TFTP and VoIP
By Shri
2) HUB:(Passive Device)
- A hub is a physical layer networking device which is used to connect
multiple devices in a network.
- Hub is use for data transferring. A hub has many ports in it.
- It is a non-intelligent network device that sends message to all ports.
- Transmission mode is half duplex.
- Collisions may occur during setup of transmission when more than one
computer place data simultaneously in the corresponding ports.
- Types: Active Hub→ A hub that has built in repeater
Passive Hub→ A hub that required separate repeater.
By Shri
4) Router:
- A router is network layer networking device which is used for connecting
different networks together and sends data packets from one network to
another.
- A router can be used both in LANs (Local Area Networks) and WANs (Wide
Area Networks).
- Routers have a routing table in it that is refreshed periodically according to
the changes in the network. In order to transmit data packets, it consults the
table and uses a routing protocol.
By Shri
6) Gateway:
- A gateway is network layer networking device which forms a passage
between two networks operating with different transmission protocols.
- Depending upon the functionality, a gateway can operate at any of the seven
layers of OSI model.
- It also stores information about the routing paths of the communicating
networks.
- It uses packet switching technique to transmit data across the networks.
By Shri
Q.9. Explain LAN, MAN and WAN (IMP)
OR Compare various types of networks.
Ans:
Q.10. What is Topology? Explains different types of topologies with its advantages
and disadvantages. (IMP)
Ans:
A Network Topology is the arrangement with which computer systems or network
devices are connected to each other.
The various network topologies are:
1) Bus Topology:
2) Ring Topology
3) Star Topology
4) Tree Topology
5) Mesh Topology
6) Hybrid Topology
By Shri
1) Bus Topology:
• Bus topology is a network type in which every computer and network device is
connected to a single cable.
• It transmits the data from one end to another in a single direction.
• No bi-directional feature is in bus topology.
• Bus topology may have problem while multiple hosts sending data at the same time.
• Both ends of the shared channel have line terminator.
• Advantages: Low-cost cable, Moderate data speed, Familiar Technology, Limited
Failure.
• Disadvantages:, Difficult trouble shooting, Reconfiguration difficult, Extensive
Cabling, Signal interference, Attenuation.
2) Ring Topology:
By Shri
3) Star Topology:
4) Tree Topology:
• Tree topology combines the characteristics of bus topology and star topology.
• A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
• There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
• Advantages: Limited Failure, Support broadband transmission, easily expandable,
easily manageable, error detection and error correction becomes very easy.
• Disadvantages: High Cost, Difficult trouble shooting, Reconfiguration difficult
By Shri
5) Mesh Topology:
• Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
• There are multiple paths from one computer to another computer.
• It does not contain the switch, hub or any central computer which acts as a central
point of communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
• Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.
6) Hybrid Topology:
By Shri
• For example, if there exist a ring topology in one branch of ICICI bank and bus
topology in another branch of ICICI bank, connecting these two topologies will
result in Hybrid topology.
By Shri
Q.11. Difference between Subnet, Network and Internetwork
Ans:
By Shri
Computer Network Chapter 2 Theory Questions
Q.1. Compare Guided media and Unguided media
Ans:
Parameters Guided Media Unguided media
Medium Used The signal energy propagates through The signal energy propagates through air in
wires in guided media. unguided media.
Types of Guided media is used for point-to-point Unguided media generally suited for radio
Communication communication. broadcasting in all directions.
Network Discrete network topologies are formed Continuous network topologies are formed
Topologies by the guided media. by the unguided media.
Signal Type Signals are in the form of voltage, Signals are in the form of electromagnetic
current or photons in the guided media waves in unguided media.
Example Examples of guided media are twisted Examples of unguided media, are
pair wires, coaxial cables, optical fiber microwave or radio links and infrared light.
cables.
Enhancement By adding more wires, the transmission It is not possible to obtain additional
Capacity capacity can be increased in guided capacity in unguided media.
media.
Diagram
By Shri
Q.3. Compare Different Guided Media. Or What are different guided
transmission media.
Ans:
Parameters Twisted Pair Cable Coaxial Cable Fiber Optic Cable
Alternative ---- Also Known as Coax Cable Also Known as Optical Fiber
Name Cable
Definition Two conductors of a It contains two conductors It consists of one or more
single circuit are twisted parallel to each other. optic fibers that are used to
together transmit data
Made Up of Pair of insulated copper 4 components: Very thin optical fiber that
wire Solid conductor wire, layer are bundled together
of insulation, grounding
conductor, layer of exterior
insulation.
Types Unshielded Twisted Pair Baseband and Broadband Single Mode Fiber and Multi
(UTP) and Shielded Mode Fiber
Twisted Pair (STP)
Price Cost of cable is low than Cost of cable is higher than Cost of cable is more
other two cables twisted pair cable expensive
Attenuation Attenuation is very high Attenuation is low Attenuation is very much low
By Shri
Q.4. Compare different types of Twisted Pair Cables (UTP and STP)
Ans:
Parameters UTP STP
Basic UTP stands for Unshielded Twisted Pair. STP stands for Shielded Twisted Pair.
Grounding grounding cable is not necessary. grounding cable is required.
Speed Data rate in UTP is slow compared to STP. Data rate in STP is high.
Cost cost of UTP is less. STP is costlier than UTP.
Maintenance more maintenance is not needed. more maintenance is needed.
Noise and Prone to noise and interference Less Prone to noise and interference
Interference
Attenuation attenuation is high in comparison to STP. attenuation is low.
Diagram
Q.5. What are the advantages over other guided media? Or List the advantages
of Fiber optics as a communication medium.
Ans: Advantages of Fiber optics as a communication medium:
➢ Higher bandwidth
➢ Less signal attenuation
➢ Immunity to electromagnetic interference
➢ Resistance to corrosive materials
➢ Light weight
➢ Greater immunity to tapping
Q.6. State advantages and disadvantages of Microwave
Ans:
Advantages Disadvantages
Used for longer distance Installation and maintenance are very
expensive
No cable needed Not very effective in bad weather
conditions.
High frequency signals require small Reflected from flat surfaces like water and
antennae metal
Carry 1000’s of voice Channels at a time They are hefty and occupy more space.
Communication over oceans can be Diffracted around solid objects
achieved
By Shri
By Shri
Computer Network Chapter 3 Theory Questions
2) Frame synchronization
➢ The source machine sends data in the form of blocks called frames to the
destination machine.
➢ The starting and ending of each frame should be identified so that the frame can
be recognized by the destination machine.
3) Flow control
➢ Flow control is a mechanism to prevent loss of data
➢ When data transmitted rate and data received rate is not same, some data may be
lost
4) Error control
➢ Error control is done to prevent duplication of frames.
➢ The errors introduced during transmission from source to destination machines
must be detected and corrected at the destination machine.
By Shri
Q.2. Explain CSMA/CA protocols. Explain how collision are handled in CSMA/CD.
Ans:
CSMA/CA protocol:
➢ CSMA/CA stands for Carrier Sense Multiple Access / Collision Avoidance
➢ It is a protocol which functions in Data Link Layer of OSI model.
➢ It prevents collision and avoids wasteful transmission.
➢ It has been specially designed for wireless networks.
➢ We need to avoid collision on wireless network because they cannot be detected.
➢ Collision can be avoided using 3 strategies – Interframe Space
- Contention Window
- Acknowledgement
➢ Flow Diagram
By Shri
Q.3. What is error detection and error correction?
Ans:
Error Correction codes are used to detect and correct the errors when data is
transmitted from the sender to the receiver.
➢ Backward error correction: Once the error is discovered, the receiver requests
the sender to retransmit the entire data unit.
➢ Forward error correction: In this case, the receiver uses the error-correcting
code which automatically corrects the errors.
Error detection uses the concept of redundancy which means adding extra bits for
detecting error at destination
Some popular techniques for error detection are:
➢ Simple Parity check
➢ Two-dimensional Parity check
➢ Checksum
➢ Cyclic redundancy check
By Shri
Q.4. Explain CRC with example.
Ans:
➢ The Cyclic Redundancy Checks (CRC) is the most powerful than parity check
and checksum error detection.
➢ Works on binary division.
➢ Sequence of redundant bits called as CRC remainder is appended at the end
➢ This forms a codeword.
➢ To form this codeword agreed upon G(x) [G(x) - Generator Polynomial] is
used.
➢ At receiver end, this G(x) is used to divide sent codeword
➢ Remainder = 0 implies no error
Remainder 0 implies error
➢ CRC cannot detect all types of errors.
Example:
Note: EX-OR operation
X Y OUTPUT
0 0 0
1 0 1
0 1 1
1 1 0
By Shri
Generate the CRC code for data word 110010101. The divisor is 10101
Ans:
By Shri
Other sums ( They also ask to check the given string is acceptable or not. Note: for such
questions if u got remainder as zeros means all zeros then that string is not acceptable,
if string contain combination or any 1 value in it then it is acceptable)
By Shri
Q.5.
UQ: Compare data flow control techniques.
UQ: Compare it performance to sliding window with Go-back-n technique.
UQ: Explain how the Go-Back-N and Selective Repeat ARQ differ from each other
Ans:
By Shri
Q.6. Explain Go-Back-N ARQ
Ans: (Refer theory from Q.5 difference)
By Shri
Example Explanation:
There are 11 frames to be sent, and the frames are numbered as 0,1,2,3,4,5,6,7,8,9,10.
The sequence number of the frames is decided by the size of the window N.
Let's take the sender's window size to be 4, which means the sender can send 4 frames before
expecting any acknowledgement from the first frame, which is 0.
The sender sends the first frame, which is 0, frame 0 will be there in the current window.
The sender will send the next frames in the buffer (1, 2, 3) because the sender can send 4 frames
without expecting any acknowledgement from the receiver
Let's assume the sender received an acknowledgement for frame 0 from the receiver.
Frame 0 is sent and acknowledged. The current window size is 3; the sender will send the next
frame from the buffer, which is 4, and the window slides.
Now, the current window size is 4. So, the receiver acknowledges frame number 1
The window slides and the sender will send the next frame in the buffer, which is 5, and the window
slides.
Let's assume that the sender is not acknowledging frame number 2 because either the frame is lost
or the acknowledgement is lost.
In this case, the sender will not send frames 4 and 5 again, and it knows that frame 2 is missing
because the receiver would have sent a negative acknowledgement (NACK) for frame 2.
So, the sender will retransmit frame 2 alone and as usual other frames are transmitted.
By Shri
Q.8. Explain Stop and Wait ARQ
Ans: (Refer theory from Q.5 difference)
By Shri
By Shri
Q.9. Explain Framing Methods
Ans:
By Shri
By Shri
By Shri
By Shri
Computer Network
Q.6 Theory Questions
Q.1. Design issues of various layers or OSI layer
Ans:
1. Reliability
2. Internetworking
3. Scalability
4. Addressing
5. Error Control
6. Flow Control
7. Security
8. Congestion
9. Resource Allocation
10. Routing
11. Protocol Layering
12. Quality of Service
13. Statistical multiplexing
14. Confidentiality, Integrity and Availability
Explanation:
By Shri
Q.2. Explain the need for DNS and describe the protocol functioning.
Short Notes on: DNS
Ans:
Definition:
➢ DNS stands for Domain Name System.
➢ DNS is an application layer protocol for message exchange between clients
and servers.
➢ DNS is required for functioning of internet.
➢ DNS is a service that translates the domain name into IP addresses.
➢ Components of DNS: Domain Name Space, Name Servers and Resolvers.
Example:
If someone wants to access the site of example into web browser that had an
IP address 132.147.165.50 , most people would reach the site by specifying
“www.example.com”. Therefore, the domain name is more reliable than IP
address.
Need for DNS:
➢ The purpose of DNS is to translate a domain name into appropriate IP
address.
➢ DNS server eliminates the need for humans to memorize IP addresses such
as 192.168.66.89.
➢ DNS allows you to use internet more easily by allowing you to specify
meaningful name on your web browser instead of useful IP address.
DNS Protocol Functioning:
By Shri
➢ The client machine sends a request to the local name server, which, if root
does not find the address in its database, sends a request to the root name
server, which in turn, will route the query to a top-level domain (TLD) or
authoritative name server.
➢ The root name server can also contain some hostname to IP address
mappings.
➢ The Top-level domain (TLD) server always knows who the authoritative
name server is.
➢ So finally, the IP address is returned to the local name server which in turn
returns the IP address to the host.
Q.3. Write short note on: SNMP and MIB (SNMP is imp)
Ans:
➢ SNMP stands for Simple Network Management Protocol.
➢ SNMP is a framework used for managing devices on the internet.
➢ It provides a set of operations for monitoring and managing the internet.
➢ SNMP is an application layer protocol that uses UDP port number 161/162.
➢ SNMP is used to monitor the network, detect network faults, and sometimes
even used to configure remote devices.
➢ SNMP components –
By Shri
b. SNMP agent –
- It is a software management software module installed on a managed
device.
- Managed devices can be network devices like PC, routers, switches,
servers, etc.
By Shri
data. The probe causes the receiving TCP to resend the acknowledgment
which was lost.
3) Keep Alive Timer – A keepalive timer is used to prevent a long idle
connection between two TCPs. If a client opens a TCP connection to a
server transfers some data and becomes silent the client will crash. In this
case, the connection remains open forever. So a keepalive timer is used.
Each time the server hears from a client, it resets this timer. The time-out
is usually 2 hours. If the server does not hear from the client after 2 hours,
it sends a probe segment. If there is no response after 10 probes, each of
which is 75 s apart, it assumes that the client is down and terminates the
connection.
4) Time Wait Timer – This timer is used during tcp connection termination.
The timer starts after sending the last Ack for 2nd FIN and closing the
connection. After a TCP connection is closed, it is possible for datagrams
that are still making their way through the network to attempt to access
the closed port. The quiet timer is intended to prevent the just-closed port
from reopening again quickly and receiving these last datagrams.
By Shri
Q.8. Write short note on: TCP segment header OR Draw and explain TCP
segment header in detail. (IMP)
Ans:
➢ A packet in TCP is called a segment and segment consists of header.
By Shri