Unit 2 Chapter 8

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

UNIT 2

CHAPTER 8
NETWORK PROTOCOL

1. What is the advantage and disadvantage of using Bluetooth technology?


ANS. There are some important advantages of Bluetooth are given below
o It avoids interference from other wireless devices.
o It has lower power consumption.
o It is easily upgradeable.
o It has range better than Infrared communication.
o The Bluetooth is used for voice and data transfer.
o Bluetooth devices are available at very cheap cost.
o No line of sight hence can connect through any obstacles.
o Free to use if the device is installed with Bluetooth.
o The technology is adopted in many products such as head set, in car system, printer, web cam,
GPS system, keyboard and mouse.
There are some important disadvantages of Bluetooth are given below

o It can lose connection in certain conditions.


o It has low bandwidth as compared to Wi-Fi.
o It allows only short range communication between devices.
o Security is a very key aspect as it +can be hacked.

2. What is HyperText Transfer Protocol (HTTP)? How it works?


ANS : HTTP is a request-response (also called client-server) protocol that runs over TCP. The
common use of HTTP is between a web browser (client) and a web server (server). A client
sends a request to the server through a web browser to view specified information. After
receiving a request, the server sends specified information to the client. It is a non-secure
transmission. HTTP facilitates access of hypertext from the World Wide Web by defining how
information are formatted and transmitted, and how the Web servers and browsers should
respond to various commands.
A web page is written using a mark-up language like HTML and is stored on a web
server for access via its URL. Once a user opens a web browser and types in the URL of the
intended web page, a logical communication link between the user machine (client) and the
web server is created using HTTP. For example, whenever we enter the URL
http//www.psscive.ac.in in a browser, it sends HTTP request to the web-server where
psscive.ac.in is hosted. The HTTP response from the web-server fetches and sends the
requested web-page, which is displayed on browser.

3. What is File Transfer Protocol (FTP)? How it works?


ANS : File Transfer Protocol (FTP) is the protocol used for transferring files from one machine
to another. It is a standard mechanism provided by TCP/IP. Transforming files from one system
to another seems very simple, but some problems need to be dealt with before transforming
files. For example, two systems may use a different file name convention, may have different
directory structures, may have a different way of representing data. All these problems are
resolved by FTP.
FTP also works on a client-server model. When a user requests for a file transfer with
another system, FTP sets up a connection between the two nodes for accessing the file.
Optionally, the user can authenticate using user ID and password. The user then specifies the
file name and location of the desired file. After that, another connection sets up and the file
transfer happens directly between the two machines. However, some servers provide FTP
logins without authentication for accessing files.

4. What is Pint to Point Protocol (PPP)? How it works?


ANS : Point to Point Protocol (PPP) is a communication protocol which establishes a dedicated
and direct connection between two communicating devices. This protocol defines how two
devices will authenticate each other and establish a direct link between them to exchange
data. For example, two routers with direct connection communicate using PPP. The Internet
users who connect their home computers to the server of an Internet Service Provider (ISP)
through a modem also use PPP. The communicating devices should have duplex modes for
using this protocol. This protocol maintains data integrity ensuring that the packets arrive in
order. It intimates the sender about damage or lost packets and asks to resend it.

5. Differentiate between SMTP and TCP/IP.


ANS. : SMTP(Simple Mail Transfer Protocol) is a protocol used for email services. It is a Push
protocol that is used to send an email. It uses information written on the message header (like
an envelope on a letter sent by post), and is not concerned with the content of the email
message. Each email header contains email addresses of recipients. The email containing
header and body are entered into a queue of outgoing mails. SMTP simply defines how data or
commands transfer from client to server or server to client. It is used two times between the
sender and sender‘s mail server and between two mail servers. To transfer mails, SMTP uses
three phases, i.e. connection establishment, mail transfer and connection termination.
The commands, which are used to send data from client to server and responses, which is
used to send data from server to client.
HELO – This command is used to identify the user and full domain name, which is transmitted
only once per session.
MAIL – This command is used to initiate a message transfer.
RCPT – This command comes after MAIL and is used to identify the recipient‘s fully qualified
name. For multiple recipients, RCPT is used for each of the recipients.
DATA – This command is used to send data one line after the other.

Transmission Control Protocol (TCP) It is a set of standardised rules and procedures, used for
interconnecting various network devices over the internet by defining how the data should be
transmitted, routed, broken into packets, addressed, and received at the destination. The TCP
defines how applications can create communication channels across a network. IP defines the
way each packet is addressed and routed to ensure it reaches the correct destination.
TCP uses a connection-oriented service. It decides a path and data units are delivered
via the decided path. When the TCP conversation is finished, the session is terminated. TCP
ensures that the message or data is broken into smaller chunks, called IP packets. Each of
these packets are routed (transmitted) through the Internet, along a path from one router to
the next, until it reaches the specified destination. TCP guarantees the delivery of packets on
the designated IP address. It is also responsible for ordering the packets so that they are
delivered in sequence. The commonly used TCP/IP protocol includes – HTTP, HTTPS, FTP,
SMTP, PPP, Telnet.

6. What is protocol and its need in computer network?


ANS : Protocol is a set of standard rules that the communicating parties — the sender, the
receiver, and all other intermediate devices need to follow. The protocol identifies the rules,
syntax, semantics, and synchronization of communication and feasible error managing
methods. A Network Protocol is composed of rules, procedures, and types that describe
communication among a couple of devices over the network. The sender and receiver can be
parts of different networks, placed at different geographic locations. Besides, the data transfer
rates in different networks can vary, requiring data to be sent in different formats.
Need for Protocols We need protocols for different reasons such as flow control, access
control and addressing. Flow control is required when the sender and receiver have different
speeds of sending and receiving the data.

7. What is meaning of wireless communication?


ANS : Wireless communication involves the transmission of information over a distance
without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal
through wireless communication technologies and devices.

Features of Wireless Communication

The evolution of wireless technology has brought many advancements with its effective
features.
 The transmitted distance can be anywhere between a few meters (for example, a
television's remote control) and thousands of kilometers (for example, radio
communication).
 Wireless communication can be used for cellular telephony, wireless access to the
internet, wireless home networking, and so on.
 Other examples of applications of radio wireless technology include GPS units,
garage door openers, wireless computer mice, keyboards and headsets,
headphones, radio receivers, satellite television, broadcast television and cordless
telephones

8. Differentiate between radio wave and microwave transmission.


ANS : Differences Between Radio wave and Microwave
1. Radio wave wavelength is greater than 1 cm while the wavelength of a
microwave is in the range of 1 cm to 1mm.
2. A radio wave is generated when a charged particle (ion) is swiftly
accelerated and decelerated in the air. On the other hand, the
microwaves are produced with the help of klystron or magnetron in which
the radio wave is propagated in a magnetic field in order to generate
microwave.
3. The detection of a radio wave is done using receivers aerials whereas
microwave is detected using point contact diodes.
4. Microwave is a high frequency and high energy wave. As against, the
radio wave is a low frequency and low energy wave.
5. Radio wave is omnidirectional in nature. Conversely, a microwave is
unidirectional.
6. Microwaves can cover shorter distances. On the contrary, radio waves
can travel a long distance.
7. Radio wave is ususally propagated through sky mode while microwave
uses the line of sight propagation.
8. Radio waves are commonly used in AM, FM, cellular systems, etc. In
contrast, radar systems, aircraft navigation, microwave oven are the
common applications of microwaves.

9. Write down common wireless devices to which you are using in your daily life.
ANS : Common wireless devices to which you are using in your daily life.
 TV remote controls
 phones
 tablets
 Bluetooth
 mice and
 keyboards
 wireless routers
 Wireless chargers
 radios

10. What do you understand by mobile telecommunication technologies?


ANS : Today the mobile phone network is the most used network in the world. The ability to be
connected to the network on-the-go makes it very convenient to communicate with people via
call or instant messages. It is also handy to access the Internet using the mobile phone
network through wireless connection. Besides, the Internet of Things (IoT) is letting us control
and communicate with other smart devices as well. The architecture of the mobile network
has rapidly evolved over the last few decades. The different landmark achievements in mobile
communication technologies are classified as different generations. They are identified as 1G,
2G, 3G, 4G, and 5G. Let us briefly discuss the mobile telecommunication generations.

You might also like