11 MKC-CN - New

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

MUTHAYAMMAL ENGINEERING COLLEGE

(An Autonomous Institution)


(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu

Must Know Concepts


MKC
CSE
2023-24

Subject Name 21CSF07/COMPUTER NETWORKS


S. Notation Concept/Definition/Meaning/Units/Equation/
Term Units
No. (Symbol) Expression
UNIT-I : INTRODUCTION
Computer It is a set of computers connected together for the
1. Network purpose of sharing resources
Link A link of a network is one of the connections
2.
between the nodes of the network
3. Node Any system or device connected to a network
Data
4. Communication To exchange of data between two devices

5. Router A node that is connected to two or more networks

6. Protocols set of rules followed by the network


Local Area It is a computer network within a small
7. LAN
Network geographical area.
Metropolitan which is typically limited to a single building or site
8. MAN
Area Network larger than a LAN
WAN is a network that exists over a large-scale
Wide Area
9. WAN geographical area. It connects different smaller
Network
networks
Network
10. refers to the physical or logical layout of a network
Topology
all nodes cooperate to distribute data amongst each
11. Mesh Topology
other
devices are connected in a circular manner, forming
12. Ring Topology
a closed loop
Each computer and network device is connected to a
13. Bus Topology
single cable or backbone
communication channel that sends information in
14. Simplex
one direction only
data can be transmitted in both directions on a signal
15. Half duplex
carrier but not at the same time
Transmit data in both directions on a signal carrier
16. Full duplex
at the same time.
Open Systems OSI is a reference model for how applications
17. Interconnection Model communicate over a network
Responsible for sending bits from one computer to
18. Physical Layer
another. Lowest layer
Data link layer performs the most reliable node to
19. Data Link Layer
node delivery of data
to deliver packets from source to destination across
20. Network Layer
multiple links (networks)
responsible for end-to-end communication over a
21. Transport Layer
network
to establish, maintain and synchronize the
22. Session Layer
interaction between communicating systems
Presentation It deals with the syntax and semantics of the
23. Layer information being exchanged
Application
24. responsible for accessing the network by user
Layer
Transmission
Control TCP/IP is a suite of communication protocols used to
25. Protocol/Internet Protocol interconnect network devices on the internet
Protocol

UNIT-II : DATA LINK LAYER


It refers to an electrical signal that is converted into
26. Digital Signals
a pattern of bits
is a common connection point for devices in
27. Hub
a network
It is an electronic device that receives a signal and
28. Repeaters
retransmits it

29. Bridges used to connect multiple LANs to a larger LAN


shorter group of bits or extra bits may be appended
30. Redundancy
at the destination of each unit
only one bit of a given data unit is changed from 1
31. Single bit error
to 0 or from 0 to 1.
Means that 2 or more bits in the data unit have
32. Burst error
changed from 1 to 0 from 0 to 1
Responsibilities a) Framing b) Physical addressing c) Flow control
33. of data link layer d) Error control e) Access control
longitudinal
a block of bits is divided into rows and a redundant
34. redundancy LRC
row of bits is added to the whole block
check
Cyclic is an error-detecting code commonly used in
35. Redundancy CRC digital networks and storage devices to detect
Check accidental changes to raw data
The error detection method used by the higher layer
36. Checksum
protocol is called checksum.

37. Error Correction It is the mechanism to correct the errors


Error Correcting a) Single bit error correction b) Burst error
38. Methods correction
Hamming code is a set of error-correction codes that
can be used to detect and correct the errors that can
39. Hamming Code
occur when the data is moved or stored from the
sender to the receiver
Flow control refers to a set of procedures used to
40. flow control restrict the amount of data. The sender can send
before waiting for acknowledgment
Each receiving device has a block of memory called
41. buffer a buffer, reserved for storing incoming data until
they are processed

42. Stop and wait Send one from at a time

43. Sliding window Send several frames at a time


Data Link
44. DLC is the service provided by the Data Link layer
Control
is a group of communication protocols of the data
High-level Data
45. HDLC link layer for transmitting data between network
Link Control
points or nodes.
is a communication protocol of the data link layer
Point - to - Point
46. PPP that is used to transmit multiprotocol data between
Protocol
two directly connected (point-to-point) computers
responsible for the transmission of data packets to
Media Access
47. MAC and from the network-interface card, and to and
Control
from another remotely shared channel
Ethernet connecting computers together with cable
48. Ethernet
so the computers can share information
IEEE 802.11 refers to the set of standards
49. IEEE 802.11 that define communication for wireless LANs
(wireless local area networks, or WLANs)
essentially works by using short-range wireless
50. Bluetooth communication technology to connect two devices
together

UNIT-III : NETWORK LAYER


The IP address in IPV4 is 32 bits. It is represented
51. IPV4 addressing in 4 blocks of 8 bits. It uniquely defines the
connection of a device
An IPv6 address is a 128-bits.Pv6 has the capability
52. IPV6 addressing to provide unique addresses to each and every
device or node attached to the Internet.
When a bigger network is divided into smaller
53. Subnetting
networks, in order to maintain security
is a set of Internet protocol (IP) standards that is
Classless inter-
54. CIDR used to create unique identifiers for networks and
domain routing
individual devices
Internetworking is the process or technique of
55. Internetworking connecting different networks by using intermediary
devices such as routers or gateway devices
Responsibilities
responsible for routing, which is moving packets
56. of Network
across the network using the most appropriate paths
Layer
A router’s interface is attached with Ipv4 and IPv6
Dual Stack
57. addresses configured is used in order to transition
Routers
from IPv4 to IPv6
Tunneling is used as a medium to communicate the
58. Tunneling
transit network with the different ip versions
is an Internet standard that enables a local-area
Network Address network (LAN) to use one set of IP addresses for
59. NAT
Translation internal traffic and a second set of addresses for
external traffic
Address
It is used to transform an IP address to its
60. Resolution ARP
corresponding physical network address
Protocol
Reverse Address
61. Resolution RARP maps a MAC address to an IP address
Protocol
A DHCP Server is a network server that
Dynamic Host
automatically provides and assigns IP addresses,
62. Configuration DHCP
default gateways and other network parameters to
Protocol
client devices.
is a collection of error messages that are sent back
Internet Control
63. ICMP to the source host whenever a router or host is
Message Protocol
unable to process an IP datagram successfully
 OPEN
BGP Messages  UPDATE
64.
 KEEPALIVE
 NOTIFICATION
Addresses in the range of 224.0.0.0 to 224.0.0.255
Local sub-
65. are individually assigned by IANA and designated
network
for multicasting on the local subnetwork only
The processes on each machine that communicate at
66. peer-peer process
a given layer are called peer-peer process
The duration of time it takes to send a message from
67. Round Trip Time RTT one end of a network to the other and back, is called
RTT
If the message is sent from a source to a single
68. Unicasting
destination nod
69. Multicasting If the message is sent to some subset of other nodes
If the message is sent to all the m nodes in the
70. Broadcasting
network
It provide centralized control of network resources
Server-based
71. and rely on server computers to provide security and
network
network administration
A router is a device that forwards data packets
72. Router
along networks
When two nodes communicate with each other over
Circuit
73. a dedicated communication path, it is called circuit
Switching
switching
In message switching, the whole message is treated
Message
74. as a data unit and is switching / transferred in its
Switching
entirety
Packet switching is a method of grouping data that
75. Packet Switching
is transmitted over a digital network into packets

UNIT-IV : ROUTING AND TRANSPORT LAYER


Internet Group is a communications protocol used by hosts and
76. Management IGMP adjacent routers on IPv4 networks to establish
Protocol multicast group memberships
Properties of
Correctness, simplicity, robustness, stability,
77. Routing
fairness, and optimality
Algorithm
to find a path between two nodes that has the
Shortest Path
78. smallest total cost, where the total cost of a path is
Routing
the sum of the arc costs in that path
Another static algorithm is flooding, in which every
79. Flooding incoming packet is sent out on every outgoing line
except the one it arrived on
It is group communication where data
Multicasting transmission is addressed to a group of destination
80.
computers simultaneously. Multicast can be one-to-
many or many-to-many distribution
User Datagram UDP packets, called user datagram,
81. User Datagram have a fixed-size header of 8 bytes made of four
fields, each of 2 bytes
Process-to- UDP provides process-to-process communication
82. Process using socket addresses, a combination of IP
Communication addresses and port numbers
There is no relationship between the different user
Connectionless data grams even if they are coming from the same
83. Services source process and going to the same destination
program
SCTP is a new transport-layer protocol that
84. SCTP
combines the features of UDP and TCP
Purpose of exchanging routing information. Their
Routing types are
85. protocols 1. Distance vector (RIP, IGRP)
2. Link state (OSPF, IS-IS)
Distance-Vector requires that a router inform its neighbors of
86. DVR
Routing topology changes periodically
Link State Each router shares knowledge of its neighbors with
87. Routing every other router in the network.
Routing is a dynamic routing protocol which uses hop count
88. Information RIP as a routing metric to find the best path between the
Protocol source and the destination network
It uses a link state routing (LSR) algorithm and
Open Shortest falls into the group of interior gateway protocols
89. OSPF
Path First (IGPs), operating within a single autonomous
system (AS).
Designed to exchange routing and reach ability
Border Gateway
90. BGP information among autonomous systems (AS) on
Protocol
the Internet.
used primarily for establishing low-latency and loss-
User Datagram
91. UDP tolerating connections between applications on the
Protocol
internet
TCP Flow Flow Control basically means that TCP will ensure
92. Control that a sender is not overwhelming a receiver by
sending packets faster than it can consume. ...
Error control includes mechanisms for detecting
Error corrupted segments, lost segments, out-of-order
93. Control in TCP segments, and duplicated segments. It also
correcting errors after they are detected
Congestion control is a network layer issue, and is
Congestion thus concerned with what happens when there is
94. control more data in the network than can be sent with
reasonable packet delays, no lost packets, etc.
Flow control is a local, congestion control is global
Quality of refers to any technology that manages data traffic to
95. QoS
service reduce packet loss, latency and jitter on the network
1. Addressing
Elements of 2. Connection Establishment.
96. transport 3. Connection Release.
protocols 4. Error control and flow control
5. Multiplexing
In networks that use virtual circuits within the
subnet, each open connection consumes some table
97. Multiplexing
space in the routers for the entire duration of the
connection
Transmissions of message between 2 transport
98. TPDU
entities are carried out by TPDU
Window decouples the issues of acknowledgement of the
99. management in correct receipt of segments and receiver buffer
TCP allocation
Sliding Window data link layer protocols for reliable and sequential
100. protocol delivery of data frames

UNIT-V : APPLICATION LAYER AND SECURITY


Network security is the security provided to a
101. Security in CN network from unauthorized access and risks
It is an internet application that allows users to view
102. WWW web pages and move from one web page to another
 Privacy
Aspects of  Authentication
103. Security
 Integrity
 Non-repudiation
Web browser is a software program that interprets
104. Web Browser and displays the contents of HTML web pages
Uniform URL is a string identifier that identifies a page on
105. Resource Locator URL
the World Wide Web
Teletype TELNET is used to connect remote computers and
106. Network TELNET
issue commands on those computers
Hypertext It is used mainly to access data on the World Wide
107. Transfer Protocol HTTP
Web
File Transfer It is a standard mechanism provided by the internet
108. Protocol FTP
for copying a file from one host to another
Email operates across computer networks, which
109. Electronic Mail today is primarily the Internet
Telnet is an application protocol used on the
Internet or local area network to provide a
110. Telnet bidirectional interactive text-oriented
communication facility using a virtual terminal
connection
A cryptographic network protocol for operating
111. Secure Shell SSH network services securely over an unsecured
network
Domain Name a client/server application that identifies each host
112. System DNS
on the internet with a unique user friendly name
It is a standard and reliable host to host mail
Simple Mail
113. Transfer Protocol SMTP transport protocol that operates over the TCP port
25
Simple Network to allow the network administrator to monitor and
114. Management SNMP configure devices on the network, remotely via the
Protocol network
the most commonly used message request protocol
Post Office
115. Protocol POP in the Internet world for transferring messages from
an e-mail server to an e-mail client
The technology comes in many forms, with key size
Cryptographic
116. Algorithms and strength generally being the biggest differences
in one variety from the next.
Authentication is the process of verifying the
117. Authentication identity of a person or device
Keeps the information away from an unauthorized
118. Confidentiality person

119. Integrity Identifying any alteration to the data


An entity cannot refuse the ownership of a previous
120. Non repudiation action or commitment
Symmetric key
121. encryption Same keys are used for encrypting and decrypting

Asymmetric Key Different keys are used for encrypting and


122. Encryption decrypting the information
Public key cryptography is a method of encrypting
Public Key
123. Cryptography data with two different keys and making one of
the keys, the public key, available for anyone to use.
An X. 509 certificate is a digital certificate that uses
124. X. 509 the widely accepted international X
A Firewall is software that blocks unauthorized
125. Firewall users from connecting to your computer

PLACEMENT QUESTIONS
The Protocol Data Unit for Application layer in
126. Message the Internet Stack (or TCP/IP) is called Message
There are 7 OSI layers: Physical Layer, Data Link
Layers of the OSI
127. reference model Layer, Network Layer, Transport Layer, Session
Layer, Presentation Layer and Application Layer
A backbone network is a centralized infrastructure
Backbone
128. network that is designed to distribute different routes and
data to various networks
A point to point connection does not need any other
Point to Point
129. Link network devices other than connecting a cable to the
NIC cards of both computers
A subnet mask is combined with an IP address in
130. Subnet Mask order to identify two parts
Maximum length A single segment of UTP cable has an allowable
131. allowed for a length of 90 to 100 meters. This limitation can be
UTP cable overcome by using repeaters and switches
Data encapsulation is the process of breaking down
Data
132. encapsulation information into smaller manageable chunks before
it is transmitted across the network
VPN means Virtual Private Network, a technology
133. VPN that allows a secure tunnel to be created across a
network such as the Internet

134. NAT NAT is Network Address Translation

135. NIC NIC is short for Network Interface Card


Layers under There are four layers: the Network Layer, Internet
136. TCP/IP Layer, Transport Layer and Application Layer
Proxy servers primarily prevent external users who
137. Proxy servers identifying the IP addresses of an internal network
Function of the This layer provides the protocols and means for two
138. OSI Session devices on the network to communicate with each
Layer other by holding a session
A fault tolerance system ensures continuous data
Fault Tolerance
139. System availability. This is done by eliminating a single
point of failure
The 10 refers to the data transfer rate, in this case is
140. 10Base-T 10Mbps
private IP Private IP addresses are assigned for use on
141. address intranets
NOS, or Network Operating System, is specialized
software whose main task is to provide network
142. NOS connectivity to a computer in order for it to be able
to communicate with other computers and
connected devices
DoS, or Denial-of-Service attack, is an attempt to
prevent users from being able to access the internet
143. DoS or any other network services. Such attacks may
come in different forms and are done by a group of
perpetuators
Crosstalks are electromagnetic interferences or
144. Crosstalks noise that can affect data being transmitted across
cables
MAC, or Media Access Control, uniquely identifies
145. MAC Address a device on the network
Star topology consists of a central hub that connects
146. Star topology to nodes. This is one of the easiest to setup and
maintain
SLIP, or Serial Line Interface Protocol, is actually
147. SLIP an old protocol developed during the early UNIX
days
Tracert is a Windows utility program that can used
148. Tracert to trace the route taken by data from the router to
the destination network
Ping is a utility program that allows you to check
149. Ping connectivity between network devices on the
network
Ipconfig is a utility program that is commonly used
150. Ipconfig to identify the addresses information of a computer
on a network

Faculty Team Prepared


HoD

You might also like