Professional Documents
Culture Documents
CN Question Bank For Mid Term
CN Question Bank For Mid Term
Longs Questions :-
1. Describe OSI reference model with brief functionality of each layer. (7)
Reference Model
• Reference Model offers a means of standardization which is acceptable
worldwide.
• Since people using the computer network are located over a wide physical
range and their network devices might have various architecture.
• In order to provide communication among various devices, we need a
standardized model i.e. a reference model, which would provide us way how
these devices can communicate regardless their architecture.
Physical Layer
• Specifications for the physical components of the network.
• Functions of Physical Layer:
• Bit representation – encode bits into electrical or optical signals
• Transmission rate – The number of bits sent each second
• Physical characteristics of transmission media
• Synchronizing the sender and receiver clocks
• Transmission mode – simplex, half-duplex, full duplex
• Physical Topology – how devices are connected – ring, star, mesh,
bus topology
Data Link Layer
Responsible for delivery of data between two systems on the same network
Main functions of this layer are:
• Framing – divides the stream of bits received from network layer into
manageable data units called frames.
• Physical Addressing – Add a header to the frame to define the
physical address of the source and the destination machines.
• Flow control – Impose a flow control – control rate at which data is
transmitted so as not to flood the receiver
• Error Control – Adds mechanisms to detect and retransmit damaged
or lost frames. This is achieved by adding a trailer to the end of a
frame
Network Layer
Main functions of this layer are:
• Responsible for delivery of packets across multiple networks
• Routing – Provide mechanisms to transmit data over independent
networks that are linked together.
• Network layer is responsible only for delivery of individual packets
and it does not recognize any relationship between those packets
• Add Logical address to the header of the packet
Transport Layer
Main functions of this layer are:
• Responsible for source-to-destination delivery of the entire message
• Segmentation and reassembly – divide message into smaller
segments, number them and transmit. Reassemble these messages at
the receiving end.
• Error control – make sure that the entire message arrives without
errors – else retransmit.
Session Layer
Main functions of this layer are:
• Dialog control – allows two systems to enter into a dialog, keep a track of
whose turn it is to transmit
• Synchronization – adds check points (synchronization points) into stream of
data.
Presentation Layer
Responsibilities of this layer are:
• Translation
• Different computers use different encoding systems (bit order
translation)
• Convert data into a common format before transmitting.
• Syntax represents info such as character codes - how many bits
to represent data – 8 or 7 bits
• Compression – reduce number of bits to be transmitted
Application Layer
• Contains protocols that allow the users to access the network (FTP, HTTP,
SMTP, etc)
• Protocols contain utilities and network-based services that support email via
SMTP, Internet access via HTTP, file transfer via FTP, etc
• Wired LANs run at speeds of 100 Mbps to 1 Gbps, have low delay
(microseconds or nanoseconds), and make very few errors. Newer LANs can
operate at up to 10 Gbps.
• The topology of many wired LANs is built from point-to-point links. IEEE
802.3, popularly called Ethernet, is, by far, the most common type of wired
LAN.
• Gateway level filtering is possible.
• Gateway are devices between the LAN and outside world.
• LAN is secured from the attacks generated out side
• LAN are connected is known as topologies
• Various topologies are possible in network Ex. Star, Ring, Bus
• LAN can be restricted to 100 meters.
• Hub, Cable or Switch can be used to implement LAN architecture.
• At the other end , there is a detector which can sense the light pulse and
generate an electric signal.
• Fiber operates in the range of visible light.
• There are three different ranges of frequencies which have consistent
attenuation(shrinking).
• The first range is centered at 0.85 micron; it has an attenuation of about 0.8
decibels/km
• The second range is centered at 1.30 micron; it has an attenuation of about
0.2 decibels/km
• The third range is centered at 1.55 micron; it has an attenuation of about 0.2
decibels/km
• All the three ranges are 25000 to 30000 GHz wide.
• Two ranges offer less attenuation, they are used in long range
communication.
• the first range has a high level of attenuation
• If we point a flashlight in upward direction at night.The light spreads out in
all directions.
• This effect is known as dispersion.
• The best way to utilize the fiber optimally is to send as many light pulses
together as possible.
• Unfortunately when light pulses are close to each other and they travel a
long distance, there is a chance that a wave conflict with a dispersed
neighbor's outstretched wave.
• Both of them get merged and result into garbage.
• Such transmissions where multiple light rays are sent across are restricted to
a short distance.
• Some waves can still be sent together.
11.Explain Radio waves, micro waves, infrared waves & ISM Band in
detail.(7)
Radio Waves
• The lowest part of spectrum is known as radio waves.
• Here the frequency is less and thus the waves are long .
• An equation is: λf=T Note: λ= pie
• Where λ= Wavelength
f = frequency of wave
T= speed of wave
Microwaves
• Its EM Range is between 108 to 1011 Hz
• Travel straighter and not in all directions
• The waves are so focused in the microwave range that if the sender and
receiver are not precisely aligned, they can not communicate , this
requirement is known as The line of sight (LoS) requirement.
• Microwave gets more and more focused as the wavelength decreases.
• Sender and receiver contain Parabolic antennas (used to pick up safelight
signals) facing each other.
• Do not penetrate through the walls; have a tendency to bounce off the
obstacles
Advantages :
• No wiring between the sender and receiver.
• Microwaves wireless transmission is better here because it does not require
to pass through uneven land and does not require to channel like wire
connections on busy roads and buildings.
• Inexpensive because we only need tower with antennas.
• It can not affected by the natural disaster like flood or earthquake.
• Example : Dish Antenna
Infrared waves
• Our TV remote controls use infrared waves to send signals.
• Other short range devices like VCRs(Videocassette recorder) and stereos
and some electronic toys use infrared waves.
• This waves are easy to produce and use.
• The devices that need to produce and use infrared is cheap.
• Problems:
- Travel straight and can not pass through obstacles.
- They can not work out doors.
The ISM Bands
• This portion is intended to be used for industrial, scientific and medical
(ISM) needs.
• A device which operates in this band does not require any license.
• The only restriction for those who operates in this range is the power.
• It is possible to create problems if a user violates and starts transmitting at a
higher power level than others. It will create problems for all his neighbors.
• FCC- Federal Communications Commission has provided three ISM bands
in the US.
• In India , only the middle one is allowed.
• 902 to 928 MHz
• 2.4 to 2.48 GHz
• 5.736 to 5.860 GHz
• Lower-end band are far better than higher-end bands.
• Lower-end band consume less power to cover the same distance.
Thus the battery life increases and the cost is reduced.
• They do not have any problem flowing through rain or others.
• Some codeless phone also use this bands.
• Outer metallic wrapping is used as a shield against noise and as the second
conductor which completes the circuit. The outer conductor is also encased
in an insulating sheath. The outermost part is the plastic cover which
protects the whole cable.
• The BNC connector is used to connect the end of the cable to the device,
such as a TV set.
• The BNC T connector is used in Ethernet networks to branch out to a
connection to a computer or other device.
• The BNC terminator is used at the end of the cable to prevent the reflection
of the signal.
A twisted pair consists of two conductors(normally copper), each with its own
plastic insulation, twisted together.
Twisted Pair is of two types:
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
TDM is applied primarily on digital signals but can be applied on analog signals as
well. In TDM the shared channel is divided among its user by means of time slot.
Each user can transmit data within the provided time slot only. Digital signals are
divided in frames, equivalent to time slot i.e. frame of an optimal size which can be
transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer
are timely synchronized and both switch to next channel simultaneously.
Light has different wavelength (colors). In fiber optic mode, multiple optical
carrier signals are multiplexed into an optical fiber by using different wavelengths.
This is an analog multiplexing technique and is done conceptually in the same
manner as FDM but uses light as signals.
Multiple data signals can be transmitted over a single frequency by using Code
Division Multiplexing. FDM divides the frequency in smaller channels but CDM
allows its users to full bandwidth and transmit signals all the time using a unique
code. CDM uses orthogonal codes to spread signals.
Each station is assigned with a unique code, called chip. Signals travel with these
codes independently, inside the whole bandwidth.The receiver knows in advance
the chip code signal it has to receive.
End-to-end delivery
The transport layer transmits the entire message to the destination. Therefore, it
ensures the end-to-end delivery of an entire message from a source to the
destination.
Addressing
The transport layer provides the user address which is specified as a station or port.
Reliable delivery
The transport layer provides reliability services by retransmitting the lost and
damaged packets.
Flow Control
Flow control is used to prevent the sender from overwhelming the receiver. If the
receiver is overloaded with too much data, then the receiver discards the packets
and asking for the retransmission of packets. This increases network congestion
and thus, reducing the system performance. The transport layer is responsible for
flow control. It uses the sliding window protocol that makes the data transmission
more efficient as well as it controls the flow of data so that the receiver does not
become overwhelmed. Sliding window protocol is byte oriented rather than frame
oriented.
Multiplexing
The transport layer uses the multiplexing to improve transmission efficiency.
Multiplexing can occur in two ways:
Upward multiplexing: Upward multiplexing means multiple transport layer
connections use the same network connection.
Downward multiplexing: Downward multiplexing means one transport layer
connection uses the multiple network connections.
Requires an established
Connectionless protocol
connection to transmit data
Connection with no requirements for
(connection should be closed
status opening, maintaining, or
once transmission is
terminating a connection
complete)
Data
Able to sequence Unable to sequence
sequencing
Guaranteed
delivery Can guarantee delivery Cannot guarantee
of data to the destination delivery of data to the
router destination
DNS Structure
The domain name is usually contained in a URL. A domain name is made of
multiple parts, called labels. The domain hierarchy is read from right to left with
each section denoting a subdivision.
The TLD appears after the period in the domain name. Examples of top-level
domains include .com, .org and .edu, but there are many others. Some may denote
a country code or geographic location, such as .us for the United States or .ca for
Canada.
Each label on the left-hand side of the TLD denotes another subdomain of the
domain to the right. For example, in the URL www.techtarget.com, "techtarget" is
a subdomain of .com, and "www." is a subdomain of techtarget.com.
3. TLD server. The root server directs the query based on the top-level domain --
the .com, .edu or .org in the URL. This is a more specific part of the lookup.
4. Authoritative name server. The authoritative name server is the final
checkpoint for the DNS query. These servers know everything about a given
domain and deal with the subdomain part of the domain name. These servers
contain DNS resource records with specific information about a domain, such as
the A record.
DNS queries
Recursive DNS queries are those that take place between the recursive server and
the client.
Iterative DNS queries take place between the recursive resolver, which is a local
DNS server, and the nonlocal name servers, like the root, TLD and authoritative
name servers.
Non-recursive queries are those for which the recursive resolver already knows
where to get the answer. The answer is either cached on the recursive server or the
recursive server knows to skip the root and TLD servers and go directly to a
specific authoritative server.
Domain Records
Every domain, whether it is a single host or a top-level domain, can have a set of
resource records associated with it. These records are the DNS database. For a
single host, the most common resource record is just its IP address, but many other
kinds of resource records also exist. When a resolver gives a domain name to DNS,
what it gets back are the resource records associated with that name. Thus, the
primary function of DNS is to map domain names onto resource records.
A resource record is a five-tuple.
1. Domain name : The Domain name tells the domain to which this record
applies.
2. Time to live : The Time to live field gives an indication of how stable the
record is.
3. Class : Class is used for Internet information, it is always ‘IN’.
4. Type : The Type field tells what kind of record this is.
5. Value : This field can be a number, a domain name, or an ASCII string.
Short Questions :-
2. What is Internet?
The Internet is not really a network at all, but a vast collection of different
networks that use certain common protocols and provide certain common services.
It is an unusual system in that it was not planned by anyone and is not controlled
by anyone.
It is widely used since 1980’s.
3. What is ARPANET?
• ARPANET was the network that became the basis for the Internet.
• In 1967, ARPANET was developed under the direction of the U.S.
Advanced Research Projects Agency (ARPA).
• In 1969, the idea became a modest reality with the interconnection of four
university computers. The initial purpose was to communicate with and
share computer resources among mainly scientific users at the connected
institutions.
• ARPANET took advantage of the new idea of sending information in
small units called packets that could be routed on different paths and
reconstructed at their destination.
• The development of the TCP/IP protocols in the 1970s made it possible to
expand the size of the network, which now had become a network of
networks, in an orderly way.
• In the 1980s, ARPANET was handed over to a separate new military
network, the Defense Data Network
There are two types of radio wave signals which transmit, we call
them Analog Signal And Digital Signal.
• Automatic routing
• Static or Manual routing
• Dynamic routing