You are on page 1of 11

COMPUTER NETWORKS

UNIT-I

1.Define Network edge.

Network edge is nothing but the end systems which are located at
the edge of any network.They can be desktop computers,mobile
computers,PDAS,web TV's,set boxes,digital cameras,home appliances.

2.What are hosts?

End Systems are also referred to as hosts because they host/run


application programs,such as Web Browser program,Web Server
program,Email reader program email server program etc. Hosts are
subdivided into 2 categories,clients and servers.

3.Define a client/client program.

A client program is a program running on one end system that


requests and receives a services from a server program running on
another end system.

4.What are distributed applications?

In the client server model, a client program typically runs on one


computer and the server program runs on another computer,the client
server Internet applications are defined as distributed applications.

5.What is meant by peer to peer file sharing application.

The program running in a peer(i.e endsystem)acts as a client


when it requests a file from another peer, and the program acts as
server, when it sends a file to another peer.This is basically used in
Internet telephony.

6.What are the services provided by the Internet for end system
application?

(1)Connection oriented service.

(2)Connection less service.

7.Define connection oriented service?

In connection oriented service the 2 end systems first establish


connection,through the hand shaking procedure, e.e using control
packets.After the connection is established the data packets are
forwarded.

8.How is reliable data transfer acheived?


Reliability in the Internet is achieved through the use of
acknowledgements and retransmissions.i.e Only if the sender receives
an ackowledgement from the receiver end it stops sending the packet.
If the acknowledgement is not received from the receiver,the sender
resends the same packet.

9.How is flow control established in the Internet?

Flow control makes sure that neither aside of a connection


overwhelms the other side by sending too many packets too fast.

Flow control services implements the flow control service by using


sender and receiver buffers.

10.How is congestion control implemented in the Internet.

When a packet switch becomes congested, its buffers can


overflow and packet loss can occur. Congestion control is implemented;
by decreasing the rate at which they send packets into the network
during periods of congestion.

11.What is TCP?

Transmission Control Protocol is the name given to Internets


Connection oriented service.

12.Explain Connectionless service.

Handshaking is not implemented in this service. Here these is no


connection establishment before a data is sent.This service is ideal for
simple transcation oriented application.The Intenets connetionless
service is called the UDP.

13.What are the approaches to build the network core.

There are 2 approaches circuit swiching and packet switching.The


network core is the mesh of routers that Inter connect the Internets
endsystem.

14.Explain circuit switched netwoks.

In circuit switched networks, the resources needed along a path


to provide for communication between the end system are reserved for
the duration of the communication session. Telehone network are
examples for circuit switched networks.

15.How is a circuits implemented in a link in circuit switched networks?

A circuit is implemented with either frequency division (FDM)


multiplexing or time division multiplexing(TDM). With FDM, the
frequency spectrum of a link is shared among the connections
established across the lind. In TDM, link time is divided into frames of
fixed duration and each frame is divided into fixed number of
slots.When the network establishes a connection across a lind the
network dedicates one time slot in every frame to the connection.

16.Explain packet switching technique.

In this technique,packets are transmitted over each


communication link at a rate equal to the full transmission rate of the
line. These networks are store and forward networks.

17.Differentiate Packet Switching and Circuit Switching.

Packet Switching Circuit Switching

1.It is not suitable for real time It is suitable for real time
services,
application line telephone and
because of variable an video conferencing.
unpredictable end to

end delay.

2.Better Bandwidth sharing than Bandwidth sharing is not as good


circuit as switching.

packet switching.

3.Simpler tecnique. Complicated technique.

4.More Efficient. Less Efficient.

5.Less Costly. More costly.

18.How are packet switched networks classifie.

Packet switched networks can be broadly classified into:

(1)Datagram networks

(2)Virtual circuit networks.


19.Explain virtual circuit network.

In this network a preplanned route is established before any


packets are sent. But thes does not have a dedicatedpath as in circuit
switchin.

In this network the actual addresses of the source and distination


are not needed to perform the actual switching. A switches in the VC
network maintains state information for all its origin connections.

20.Explain DataGram Networks.

Here each packet traversing the network contains in its header


the address of the packet destination.This address has a hierachial
structure like the postal address.The packet switch has a forwarding
table that maps the destination addresses.They do not maintain
connection state information.The packet switch is unaware of any flow
of traffic that may be passing through it.

21.List the node to node delays in packet switched network.

(1)Nodal processing delay

(2)Queuing delay

(3)Transmission delay

(4)Propogation delay.

22.What is meant by processing Delay?

The line required to examine the packets header and determine


where to direct the packet is called processing delay. For high speed
routers they are in the order of microseconds/lines.

23.Define queuing delay?

This is the delay a packet experiences as it wait to be text into


the link.The queuing delay depends on the number of earlier arriving
packets that are queued and waiting for txn.Queuing delay can be on
the order of microseconds to milliseconds.

24.What is meant by transmission delay?

Amount of time required by a router to push out a packet is called


transmission delay.It is also called as store and forward delay=L/R.It is
a function of the packets length and transmission rate of the line, but it
has nothing to do with the distance between two routers.

25.What is meant by propogation delay?


The time taken to propogate from the beginning of the link to a
router is the propogation delay.

The bit propogates at the propogation speed of the link.The


propogation speed depends on the physical medium and ranges from
2*10^8 to 3*10^8 m/s.

Propogation delay=d/s=distance between two router/speed

26.Write the expression for total nodal delay.

dnod=dprop+dtrans+dqueue+dprocess.

27.What are the factors which define Queuing delay?

Queuing delay depends on:

(1)Rate at which traffic arrives at the queue.

(2)Transmission rate of the link.

(3)Whether traffic arrives periodically/in bursts.

Traffic intensity=La/R.

28.What is the rule for traffic engineering?

The rule is that traffic intensity La/R should not be greater than 1.

The Delay increases rapidly as traffic intensity near 1.

29.What is meant by packet loss?

When a packet arrives and finds no place in the queue the router
will drop the packet and the packet will be lost.

30.Give the expression for end to end delay?

Considering there are N-1 routers between the source and


destination and assuming queuing delay is negligible.

Dend to end=N(dprop+dtrans+dprocess)

where,

dtrans=L/R.
31.What are the advantages and disadvantages of Layering.

Advantages:

(1)Layering provides a structured way to discuss system


components.

(2)Modularity makes it casire to update system components.

Disadvantages:

(1)One layer may duplicate a lower layer functionality.

(2)The function of one layer may need information that is


present only in another layer.

32.List the various layers in the protocol stank.

(1)Physical layer

(2)Link layer

(3)Network layer

(4)transport layer

(5)APplication layer.

33.What is the function of the Application Layer.

The application protocols and network applications reside in this


layer. Some of the application protocols are: HTTP,FTP etc..,

34. Define the function of the transport layer.

This transport the application layer manages between client and server
sides of application. The two transport layer protocols are TCP and UDP.
Transport layer packets are called segments.

35. Explain the function of the network layer?

Network layer is responsible for moving network layer packets known as


datagram from one host to another.

The network layer has two principal components.

It has a protocol that defines the field in the datagram. The network layer also
contains the routing protocols that determine the route the datagram takes
between source and destination.
36. Link layer – explain.

The link layer moves packet from one node to the next node in the route. At the
next node, the link layer passes the datagram up to the network layer. The
service provided by the link layer depends on the specific link layer protocol that
is employed over the link.

Eg. Ethernet, point to point protocol etc.

Link layer packets are called frames.

37. Physical layer – explain the function.

The job of the physical layer is to move the individual bits within the
frames from one node to the next. The protocol in this layer is again link
dependent and further depends on the actual transmission medium of the link.

38. What is encapsulation?

The process of attaching the layer information along with the message at
each of the layers is called encapsulation.

39. List various network applications?

1. Email 7. Peer to peer sharing

2. Remote access to 8. Multiuser networked


computer games

3. File transfer 9. Streaming stored


video clips
4. News groups
10. Internet phone
5. Text chat
11. Real time video
6. Web conferencing

40. What are the various attacks on network and also list what are the
entrustion detection systems.

Servers are attacked by denial of service attacks,worm attacks that infect


the end systems and log the network with traffic.

To overcome this some intrusion detection systems are 1) firewall and 2) ip trace
back.

41.List the network application architecture

1. Client server architecture

2. Peer to peer architecture


3. Hybrid architecture (combination of client serversand p2p)

42.List the characteristics of CSA (Client Server Architecture).

1. Client do not communicate with each other directly.

2. Server has a fixed well known address

3. Clients can either be ON or OFF.

4. Server are always ON

43. What is meant by a virtual Server ?

Some times a single server is not capable of keeping up with all the
requests from its client . Therefore a cluster of hosts are interconnected (i.e)
Server to create a powerful server . This is called the virtual server.

44.List the advantages and disadvantages of P2P architecture .

The advantages is the architecture is scalable meaning as demand


increases, services capability also increases. But it is very difficult to manage
because the architecture to distributed and decentralised.

45.Explain hybrid architecture with an example.

The hybrid architecture is used in instant chatting applications.

Text sent between to users does not always pan through an intermediate
server.

But here we first register with the central server and then find who and all
are online.

46. Define a process

A process is nothing but a program running within an end system . process


on two end system communicate with each other by exchanging message across
the computer network.

47. How are process classified?

Process are classified as 1)client process

2)server process.

In the context of communication session between a pair of processs,the


process that initiates communication to the client , and the process that wants to
be contacted to begin the session is the server.

48.Define a socket.
When a process wants to send a message to another process on another
host, it shows he message out its door. The socket to the interface between
application layer and transport layer within the host.

Socket is also known as Application Programming Interface-API

49. How is a process addressed?

To identify a receiving process two pieces of information are needed

1) Name/ address of the host (IP address)

2) Identifier that specifies the receiving process in the destination host –


port address

Eg-web server – port address.80

-mail server—25

50. What does Application layer protocol define ?

1) Types of message exchanged for eg request msg. and response msg.

2) The syntax of the various message types like fields and how fields are
delineated

3) Semantics of the fields.

4) Rules for determining when and how the process sends messages and
responds to message.

51.What does the webs protocol define?

The web’s protocol is the HTTP – Hyper Text Transfer Protocol.This defines
the format and sequence of message that are parsed between browser and web
server (Request and response message)

52.How does a network application chooses a protocol.?

The application chooses a transport layer protocol along 3 dimensions

1) Database

2) Bandwidth

3) timing

53. Define URL?

URL- Uniform Resource Locator

It has two components

 host name of the server


 Objects path name.

54. What are non persistent connections?

Here each TCP connections is closed after the server sends the object.
The connection does not persist for the other object.

In non persistent connections the TCP connection transports exactly one


request message and one response message.

55.Explain persistent connection

With persistent connection, the server leaves the TCP connection after
sending a response.It can be usesd for transmitting large amount of data . They
can further be divided into

1) Persistent connection with pipelining

2) Persistent connection without pipelining

56. What is the difference between persistent connection with and


without pipelining ?

Without pipelining the client issues a new request only when the previous
response has been received .

With pipe lining ,the client can make back to back requests for the
reference objects , thus it can make a new request before receiving response.

57.Define the format for a HTTP request msg.

58. HTTP response message format


59.What is cookie technology ? list the components

1) cookies header line in HTTP requesting msg

2) Cookie header line in HTTP response msg

3) Cookie file kept in the end user system manager by the browser.

4) a back end database at the website

60.What is meant by Web Caching?

A Web cache is called a proxy server. This is a network entity that satisfies
HTTP request on behalf of the server .The Web cache has its own disk storage
and keeps copies of recently requested objects in its storage. The users browser
can be configured so that all of the users HTTP request are first diverted to the
Web cache

You might also like