Computer Networks Booklet.
Computer Networks Booklet.
NETWORKING
NETWORKING
Q.1. What is Computer Network?
Ans. A network consists of two or more
computers that are linked together in order
to share resources (such as printers and
CDs) and information (exchange files, or
allow electronic communications).
Q.2. What is a Node or Workstation?
Ans. A computer/device which is a part of a network is known as Node or
Workstation. A computer becomes a node (also called a workstation) as soon as it is
attached to a network. Each user on a network works on a workstation. If there are
no nodes there would be no network.
Q.3. What are the advantages of Computer Networks?
Ans. Following are the advantages of computer networks:
i) Resource Sharing: Sharing various peripheral devices like printers, scanners
and copiers, or sharing software between multiple users, saves money.
ii) Easy File Sharing: A network enables users to share data files with each other.
Files can be easily shared between users.
iii) Increased Reliability: Reliability implies backing up of information. If one
workstation crashes, data backup can be restored from other computers on
the network
iv) Cost Reduction: Sharing of resources help in cost reduction.
v) Central Storage of Data: Files can be stored on a central node (the file server)
that can be shared and made available to each and every user in an
organization.
Q.4. Write a short note on Evolution of
Networking. Ans.
ARPANET –In the 1960s Advanced Research Projects Agency Network
(ARPANET) was a network established by the US Department of Defence to
connect the academic and research institutions located at different places for
scientific collaborations.The first message was communicated between the
University of California, Los Angeles (UCLA) and Stanford Research Institute
(SRI).Slowly but gradually, more and more organisations joined the ARPANET,
and many independent smaller networks were formed.
NSFnet: In 1985, another agency, the National Science Foundation, created a new,
high capacity network called NSFnet, which was more capable than ARPANET.
It was the Inter Networking i.e the linking of these two and some other networks
that was named Internet.The original ARPANET was shutdown in 1990 and the
governement funding for NSFNet discountinued in 1995, but the commercial
internet service came into picture which are still running the internet.
Q.5. What is Interspace?
Ans. InterSpace is a client/server software program that allows multiple users to
communicate online with real – time audio, video and text chat in dynamic 3D
environments.
Q.6. What are the different ways of sending data across network?
Ans. Data can be sent in the form of voice calls, video call or messages etc.
Q.7. What is Network Switching? Discuss various switching techniques.
Ans. A network is made up of several interconnected nodes. Switching techniques
are used to transfer packets of data from one port of a node to another.
i) Circuit Switching: Circuit switching provides
end to end connection between two computers.
In circuit switching, before a communication
starts, a dedicated path is identified between the
sender and the receiver. All packets follow the
same path established during the connection. i.e
Telephone call system. It involves following steps:
a. A request signal is sent by sender to set up connection with receiver.
b. All intermediate nodes are identified. These nodes are called switching nodes.
c. Destination node sends back the acknowledgement of receiving a signal.
d. Data transmission begins & after it is complete, the call can be terminated.
Advantages:
a) The bandwidth used is fixed
b) With dedicated channel the quality of communication is increased.
c) It is preferred when the communication is long and continuous.
d) Once the circuit is established, data is transmitted without any delays.
Disadvantages:
a) Inefficient in terms of utilization of resources.
b) It is expensive because every connection uses a dedicated path.
ii) Packet Switching: In packet switching,
the entire data is divided into small
fragments called packets. Each packet is
of fixed size usually 128 bytes or 512
bytes. Each packet has a source as well
as destination address for being
transmitted. There is no direct
connection established between the
sender and the receiver, each packet follows different routes. Packets are
delivered in a random order at the destination address. TCP protocol then
arranges all received packets in a sequential order.
Advantages:
a) Failure in the links does not stop the delivery of the data as these packets can be
routed from other paths too.
b)Optimum utilization of resources as multiple users can use same link at same time.
c) No wastage of bandwidth as multiple sources can use same link for sending data.
Disadvantages: Installation costs of packet switching are expensive.
iii) Message Switching: In message switching,
data is sent to switching office first, which
store data in its buffer. It then checks the
available link and, if it is free, the data is
relayed to another switching office until it
reaches destination. It is also called store and
forward switching technique. No dedicated path is established between sender
and receiver.
Q.12. A user wants to upload a text document at the rate of 10 pages per 20
second. What will be the required data rate of the channel? (Assume that
1 page contains 1600 characters and each character is of 8 bits).
Ans.
When a data frame arrives at a port, it is broadcast to every other port, without
considering whether it is destined for a particular destination or not.
A Hub is not an intelligent device. It does not maintain any address table for
connected devices.
It has single collision domain. The limitation of Hub is that if data from two devices
come at the same time, they will collide. It has 4, 8, 16 or 32 ports.
vi) Switch: A Switch is a network device used to connect different devices through
wires in a Local Area Network.
It is called an intelligent device. Switch maintains a switching table that contains the
MAC address of device and the switch port on which each device is configured.
When data arrives, the switch extracts the destination address from the data packet
and looks it up in a table to see where to send the packet. It sends signals to only
selected devices instead of sending to all.
Transmission mode is full duplex, i.e. communication in the channel occurs in both
the directions at the same time. Due to this, collisions do not occur.
Switches can perform some error checking before forwarding data to the destined
port.
It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-
all) communications.
The number of ports is higher – 24/48, so many devices can be connected to a single
switch.
vii) Router: Hubs or swiches are used to
exchange data within a local area network.
Router is a network device that can receive the
data, analyse it and transmit it to other
networks.
Router is a device that routes or forward data
from one network to another based on their IP
address. When a data packet is received,
Router inspects the data’s IP address and determines if a packet was meant for
its own network or if it is meant for another network. If the router determines
that the data packet is meant for its own network it receives it, but if it is not
meant for its own network it sends it off to another network. It acts as a gateway
to the network.
A router can be used both in LANs (Local Area Networks) and WANs (Wide
Area Networks).
It transfers data in the form of IP packets. In order to transmit data, it uses IP
address mentioned in the destination field of the IP packet
Routers have a routing table in it that is refreshed periodically according to the
changes in the network.
viii) Repeater: Data is carried in the form of
signals over the cable. These signals can
travel a specified distance (usually about
100 m). Signals lose their strength beyond
this limit and become weak. In such
conditions, original signals need to be
regenerated.
Repeaters are also known as signal boosters
that amplify or regenerate an incoming
signal before retransmitting it.
ix) Gateway: A gateway is a hardware device that acts as a "gate" between two
networks. It may be a router, firewall, server, or other device that enables traffic
to flow in and out of the network. Gateway serves as the entry and exit point of
a network, as all data coming in or going out of a network must first pass
through the gateway in order to use routing paths.
Q.15. What do you understand by Network topology?
Ans. The arrangement of network devices
along with communication channel is known
as Network structure or Network topology.
Topology defines the structure of the network
of how all the components are interconnected
to each other. The way in which devices are
interconnected to form a network is called
network topology.
Common network topologies are Mesh, Ring,
Bus, Star and Tree.
Q.16. Discuss the various Network topologies in detail.
Ans. Various Network topologies are Bus, Star, Link, Mesh, and Tree.
i. BUS: A bus topology is a topology for a Local Area Network (LAN) in which all
the nodes are connected to a single cable. The cable to which the nodes
connect is called a "backbone" or “bus”. Each node is either connected to the
backbone cable by drop cable or directly connected to the backbone cable.
Data sent from a node are passed on to the bus and hence are transmitted to the
length of the bus in both directions.
That means, data can be
received by any of the
nodes connected to the bus.
ADVANTAGES OF BUS TOPOLOGY
Length of cable required is less than a star topology.
It works very well when there is a small network.
Very cost-effective as compared to other network topology.
DISADVANTAGES OF BUS TOPOLOGY
Bus topology is not great for large networks.
Attenuation: Attenuation is a loss of signal leads to communication issues.
Repeaters are used to regenerate the signal.
If a main cable is damaged, whole network fails or splits into two.
iii. FTP: File transfer protocol is used to transfer (upload-download) the files
between client (local machine) and server (remote machine).
•Two computers are involved in an FTP transfer
•FTP Server: It’s a computer on which FTP server software is installed.
It listens to the request of client.
•FTP Client: It’s a computer on which FTP Client software is running. It
initiates the connection. Once connected, user can upload and download files
between local machine and server.
Before transferring files, the users need to authenticate using user id and
password. However, some servers provide FTP logins without authentication
for accessing files.
Various FTP Client softwares are: Filezilla, Free FTP, WinSCP
Note: FTP is a stateful protocol
iv. SFTP: SFTP (Secure File Transfer Protocol): FTP is not a secure protocol.
File/Data sent over FTP is not protected and can be easily stolen. To protect our
data SFTP protocol is used. In SFTP all data is encrypted before sent across the
network.
v. Point to Point Protocol (PPP): PPP is a communication protocol which
establishes a dedicated and direct connection between two communicating
devices. This protocol defines how two devices will authenticate each other and
establish a direct link between them to exchange data. For example, two routers
with direct connection communicate using PPP. The Internet users who connect
their home computers to the server of an Internet Service Provider (ISP)
through a modem also use PPP.
vi. TCP/IP Protocol: TCP/IP stands for Transmission Control Protocol / Internet
Protocol. It controls and manages the data transmission over the Internet. TCP
is a connection-oriented protocol.
TCP/IP consists of two layers, higher layer and lower layer. TCP is called higher
layer, while IP is called lower layer.
• Higher Layers (TCP) breaks message or file into smaller packets that are
transmitted over the Internet. At the receiver end it again reassembles the packets
into the original message. In TCP, a connection must be built using a handshake
process before information is sent or received. A handshake process means
establishing a direct connection between sender and receiver with start signal and
acknowledgement signal.
• Lower Layer (IP) assigns unique address to each packet so that it can be
transmitted to the right destination. IP is a connectionless protocol.
With more and more devices getting connected to the Internet, Thus, a 128 bits IP
address, called IP version 6 (IPV6 in short) was proposed. An IPv6 address
is represented by eight groups of hexadecimal (base-16) numbers separated by
colons. A sample IPV6 address looks like:
2001:CDBA:0000:0000:0000:0000:3257:9652
Q.28. What is scripting language? Discuss Server side and Client side scripting
languages.
Ans. A scripting language is a programming language which can be embedded or
integrated with other languages. E.g. JavaScript, VBScript, PHP, Perl, Python,Ruby,
and ASP. They have been used extensively to create dynamic web pages.
Dynamic web pages support two types of scripting:
a) Client Side Scripting: A client side scripting language uses client resources
for processing. VB Script and Java Script are examples of client-side
scripting languages. Its code is viewable at client end.
b) Server -Side Scripting: In client side scripting, all requests are processed by
server. Web page display the current time and date, forums, submission forms,
shopping carts etc., use server-side scripting. ASP, JSP, PHP are examples of
server-side scripting languages.
Q.29. What is DNS?
Ans. The Domain Name System,
translates human readable domain
names (e.g www.pathseekers.com) to
machine readable IP addresses (e.g,182.156.84.26). DNS servers translate requests
for names into IP addresses.
Q.30. What is Domain Name?
Ans. A domain name is the name of a website. e.g. pathseekers.education
Q.31. What is URL?
Ans. A uniform resource locator
(URL) is the address of a resource
(web page, website, photo, video etc. )
on the Internet. Web address of the web page written on the address bar of the
browser is known as the uniform resource locator (URL).
The URL text string consists of three parts:
a) Network Protocol b) Host name or Domain Name c) File/Resource location
Common TLD (top level domains) are: .com, .gov, .edu, .mil, .org, .net, .tv, .nic
(national informatics center)
Q.32. Name any two government websites?
Ans. Write any domain name that ends with .gov. e.g www.india.gov, www.usa.gov
Q.33. What is a web server?
Ans. A Web server is a computer or a group of computers that stores web pages on
the internet.
It works on client/server model. It delivers the requested web page to
client(web browser). Web servers use special programs such as Apache ,IIS or
GWS to deliver web pages over the http protocol.
A Web Server is a program that:
• Receive the request from client,
• Process that request and
• Send the requested data back to the client. E.g. Apache, IIS, GWS etc.
Q.34. What is a web client?
Ans. • Webclient is the software that requests some data from the server.
• Web browser is an example of a web client i.e firefox, chrome, safari etc.
• Web Client and Server communicate using special protocol called HTTP.
Q.35. What is URL Resource Location?
Ans. The file or resource location substring contains a path to one specific network
resource on the host/server. Resources are normally located in a host directory or
folder. For example:www.school.com/syllabus/preprimary/nursery.htm is the
location of this Web page including two subdirectories and the file name.
Q.36. Write short note on web 2.0.
Ans. The term web 2.0 was given by O'Reilly Media in 2004. Web 2.0 refers to new
generation of dynamic and interactive websites. Web 2.0 websites uses a new
programming language called AJAX (Asynchronous JavaScript and XML). In
AJAX technology only the part of the webpage which is updated is reloaded. The
entire page doesnot get reloaded each time.
Applications supported by web 2.0 are as follow:
a) Blogging b) Social Bookmarking c) RSS Feeds
b) Advanced Gaming e) Social Media websites
Q.37. What is web hosting? Discuss various types of web hostings?
Ans. Web hosting is the process of uploading/saving the web content on a web
server to make it available on WWW. Webhosting is the place where all the files of
your website are stored.
Advantages: Disadvantages:
1) Cheaper than other 1) They break easily
2) Easy to install & 2) Less data carrying capacity
maintain 3) Not suitable for long distance transmission(signal
3) Lighter in weight loss over long distances without the use of
repeaters)
There are basically two types of the twisted pair cable, which are:
Shielded Twisted Pair (STP) Cable
Unshielded Twisted Pair (UTP) Cable
Unshielded Twisted Pair (UTP) Cable: Unshielded Twisted Pair (UTP) consists of
four pairs of thin, copper wires covered in color-coded plastic insulation that are
twisted together. The wire pairs are then covered with a plastic outer jacket. UTP
cables are of small diameter and it doesn’t need grounding.
The unshielded twisted pair cable is available in five categories i.e CAT1,
CAT2, CAT3, CAT4, CAT5, CAT5a, CAT6, CAT6a.
Note: CAT1 cable is used for Voice-grade communications only. No data
transmission. CAT1 is typically used for telephone wire. This type of wire is not
capable of supporting computer network trafficShielded Twisted Pair (STP)
Cable
The shielded twisted pair (STP) cables
comes with shielding of the individual
pairs of wires, which further protects it
from external interference. Shielded
twisted pair cables support a maximum
distance of 100 Meters without signal
distortion.
Note: UTP does not require grounding but STP requires grounding. The main
purpose of drain wire in STP is to carry away unwanted interference noise to
ground.
The connector used on a twisted cable is called as RJ-45 (Registered Jack 45)
connector.
The signals are broadcasted through air or water and thus are available to anyone
that has a device capable of receiving them. Some of the wireless media are:
Advantages
1. Since it is having short range of communication hence it is considered to be a
secure mode of transmission.
2. It is quite inexpensive transmission medium.
Disadvantages
1. It can only be used for short range communication
2. Infrared wave transmission cannot pass through obstructions like walls, building.
Advantages
1. It is easy to communicate through radio waves in difficult areas since there is no
need of digging and laying cables.
2. They can travel through long distances in all directions. They are Omni directional.
3. They can easily pass through obstacles like a building so they can be used for
both indoor and outdoor communication.
Disadvantages
1. It is susceptible to weather effects like rain, thunderstorm etc.
2. Data transmitted through radio waves is not secure.
Disadvantages
a) Slow Speed: Bluetooth devices communicate at less than 1 Mbps.
b) Short Range: Its range is up to 10 meters.
c) Battery drain: It used battery power of device on which it is running and
consume lot of battery power.
2) Wi-Fi: It stands for Wireless Fidelity. With Wi-Fi communication takes place
without wires. The users share the data with each other by connecting to the
broadband internet service without using cables. It is most popular communication
protocol for LAN. Private homes and offices use Wi-Fi to connect computer and
other wireless devices to each other. It is easy to install and inexpensive. Its range
is up to 50 meters. Its frequency ranges between 2.4GHz to 5GHz