Computer Network Questions Bank with Answers · Computer Network Questions Bank with Answers ......
Transcript of Computer Network Questions Bank with Answers · Computer Network Questions Bank with Answers ......
3201 Computer Networks – 2014/2015 Handout: Questions Bank
1
Computer Network Questions Bank with Answers
Question1:
There is considerable confusion in the literature between a computer network and a
distributed system. Explain this statement.
Computer networks vs. distributed systems:
Distributed System Computer Networks
- A collection of independent
computers appears to its users as a
single coherent system
- The coherent model and software
are absent
- Layer of software on top of OS
called “middleware” is responsible
for implementing this model.
- Users are exposed to the actual
machines
- The distinction between a network and a distributed system lies with the
software, rather than the hardware.
Question2:
Define the following terms: ANSI, UDP, ISO, FTP, IP, NAT, PAT, SNAT, and ICS.
ANSI American National Standards Institute
Is the primary organization for fostering the development of technology standards in the
United States,
A private nonprofit organization that oversees the development of voluntary consensus
standards
UDP User Datagram Protocol
Offers only a minimal transport service -- non-guaranteed datagram delivery -- and gives
applications direct access to the datagram service of the IP layer
ISO International Organization for Standardization
Is an international standard-setting body composed of representatives from various
national standards organizations
FTP file transfer protocol
Is a standard network protocol used to transfer files from one host to another host over
a TCP-based network, such as the Internet.
IP internet protocol
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the
task of delivering datagrams from the source host to the destination host solely based on
the addresses.
3201 Computer Networks – 2014/2015 Handout: Questions Bank
2
NAT Network Address Translation
An Internet standard that enables a local-area network (LAN) to use one set of IP
addressesfor internal traffic and a second set of addresses for external traffic.
PAT port address translation
A type of network address translation. During PAT, each computer on LAN is translated
to the same IP address, but with a different port number assignment.
SNAT Source Network Address Translation (source-nat or SNAT)
Allows traffic from a private network to go out to the internet.
ICS Internet connection sharing
A method for connecting multiple computers in a LAN to the Internet through a single
connection and a single IP address.
Question3:
Which of the OSI layers handles each of the following?
Transmitting raw bits over a communication channel.
Physical Layer
How to keep a fast transmitter from drowning a slow receiver in data.
Data Link Layer
Controls the operation of the subnet
Network Layer
Concerned with the syntax and semantics of the information transmitted.
Presentation Layer
Dividing the transmitted bit stream into frames.
Data Link Layer
Determining which route through the subnet to use.
Network Layer
Question4:
Explain the use of Reliable and Unreliable connection.
Reliable means data never lost ,its done through acknowledge sent from the receiver
to the sender.
3201 Computer Networks – 2014/2015 Handout: Questions Bank
3
- Acknowledge process introduces overheads and delayes
- Some times acknowledge not accepted such as digitized voice traffic
Reliable services in the sense that we are assured of the receiver receiving the data ,
and in
Unreliable : means ( no acknowledge) connectionless services are often called
datagram service.
Unreliable the receiver might not actually get the data. This is monitored by
usually setting a feedback required or not mechanism.
When to use them:
Reliable In cases like FTP, we might require that the sender acknowledge the
receipt. For this we use reliable connection oriented services.
Unreliable In other cases such as database queries, it is not really required that the
receiver sends an acknowledgement. In these cases, we use unreliable connectionless
services.
Question5:
Discuss the advantages and disadvantages of a wireless topology.
Advantages of a Wireless Topology:
• The nice thing about wireless networks is the lack of cabling. The wireless
network requires only base backbone segments to connect the wireless cells to the
wired network if there is one.
• Troubleshooting failed devices and cells is very easy and makes failed
components easy to find and replace.
• Easy Management
Disadvantages of a Wireless Topology:
• Signal interference. Other devices and machinery that emit radio frequencies or
“noise” can cause interference and static, which can disrupt the bubble of
communication around the cell. Another source of noise is lightning during
storms. This noise is the same static you hear when lightning strikes while you are
speaking on a phone.
• Blockage can occur in structures that are made of thick stone or metal, which do
not allow radio frequencies to pass through easily. This drawback usually can be
overcome somewhat by changing the frequency used by the devices to a higher
frequency.
3201 Computer Networks – 2014/2015 Handout: Questions Bank
4
• Signal interception. means unwanted third parties could intercept wireless
communications without physically being on the premises; they would simply
have to be within the signal range.
Question6:
a) Given a channel of bandwidth F=3 KHz and bit rate b=300, 600, 1200, 2400,
38000 bps and we want to transmit n=8 bits (01100010) through that channel.
Calculate for each above bit rates the following:
Number of harmonics passed, Time of transmission T[msec.], Frequency
of first harmonic
Write your conclusion and draw the binary signal (original signal) and the
successive approximation to the original signal when passing one
harmonic, 2 harmonics, 4 harmonics and 8 harmonics.
B (bps) T [msec] 1st harmonic #harmonics passed
300 26.67 37.5 80.01
600 13.33 75.02 39.99
1200 6.67 149.93 20.01
2400 3.33 300.3 9.99
38000 0.21 4761.9 0.63
n = number of bits
Time =(𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠
𝑏𝑖𝑡𝑟𝑎𝑡𝑒) then mul by 1000 to convert from sec to msec
1st harmonic =( 𝑏𝑖𝑡𝑟𝑎𝑡𝑒
𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠)
# harmonics =f * (𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠
𝑏𝑖𝑡𝑟𝑎𝑡𝑒) then mu by 1000 to transfer frequency from khz to mhz
Maximum bit rate with 3 KHz bandwidth will be 2400 bit/sec
3201 Computer Networks – 2014/2015 Handout: Questions Bank
5
Question7:
F=32 KHz
Bit rate=300, 600, 1200, 2400, 38000 bps
N=16 bits
Bit
rate
b
bit/sec
Time of
transmission
T=n/b * 1000 msec
Frequency
of 1st
harmonic
F0=1/T Hz
No. of
harmonic
passed=
F * T= F * n/b
300 53.33 18.75 853.28
600 26.66 37.5 426.56
1200 13.33 75 213.28
2400 6.66 150 106.56
38000 0.42 2380 6.72
Conclusion:
Maximum bit rate with 16 KHz bandwidth will be 2400 bit/sec
Question8:
Given a channel of bandwidth f = 8 khz and bitrate b= 300, 600, 1200, 2400, & 38000
bps and we want to transmit n = 2 bytes through that channel.
Calculate for each above bitrates the following
- Number of harmonics passed
3201 Computer Networks – 2014/2015 Handout: Questions Bank
6
- Time of transmission T [msec]
- Frequency of the first harmonic
B (bps) T [msec] 1st harmonic #harmonics passed
300 53.33 18.75 426
600 26.67 37.5 213
1200 13.33 75 106
2400 6.67 150 53
38000 0.42 2375 3
n = number of bits n= 2*8 =16 bit
Time =(𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠
𝑏𝑖𝑡𝑟𝑎𝑡𝑒) then mul by 1000 to convert from sec to msec
1st harmonic =( 𝑏𝑖𝑡𝑟𝑎𝑡𝑒
𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠)
# harmonics =f * (𝑛𝑜. 𝑜𝑓 𝑏𝑖𝑡𝑠
𝑏𝑖𝑡𝑟𝑎𝑡𝑒) then mu by 1000 to transfer frequency from khz to mhz
Question9:
What is meant by each of the following terms: ( ARP , HTTP , HTTPS, NTP,SMTP,
FTP, SSH ).
Address Resolution Protocol The Address Resolution Protocol (ARP)
HTTP and HTTPS: The Hypertext Transfer .
Network Time Protocol (NTP): The Network Time Protocol (NTP)
Simple Mail Transfer Protocol (SMTP): The Simple Mail Transfer Protocol
File Transfer Protocol (FTP): The File Transfer Protocol .
Secure Shell (SSH): The Secure Shell
Question10:
Compare between the ISO-OSI Reference model and the TCP/IP model.
Criteria OSI TCP/IP
Number of Layers 7 layer’s:
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
4 layer’s:
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Host-to-network
Protocols/Layers 1. Application Layer (HTTP, FTP,
NFS, NTP …).
1. Application Layer (TELNET,
FTP, SMTP, DNS).
2. Transport Layer (TCP, UDP).
3201 Computer Networks – 2014/2015 Handout: Questions Bank
7
2. Presentation Layer (MIME, TLS,
SSL, XDR).
3. Session Layer (SAP, PPTP,
SOCKS…).
4. Transport Layer (TCP, UDP,
SPX, DCCP…).
5. Network Layer (IP, ICMP, Apple
Talk….).
6. Data Link Layer (IEEE 802.3,
PPP, SDLC….).
7. Physical Layer (IEEE 802.16,
USB, Bluetooth, Hubs, DSL….).
3. Internet Layer (IP).
4. Host-to-network Layer
(ARPANET, SATNET, Packet
radio, LAN).
Role/Layer Application Layer: Contains a variety
of protocols that are commonly needed
by users.
Presentation Layer: Manages theses abstract data structures
& allows higher-level data structures to
be defined & exchanged, as computers
with different data representations to
communicate.
Session Layer: The user negotiate with the session layer
to establish a connection with a process
on another machine to establish a
session, the user must provide the remote
address he wants to connect to the
operation of setting up a session between
2 processes is often called “binding”.
Transport Layer: We mean by “end-to-end” or from
“source-to-destination” a program or a
source machine carries only a
conversation with the similar program on
a destination machine using the message
headers & control messages.
Network Layer: Controls the operation of the subnet.
Data Link Layer:
Data link layer takes “raw
transmission bits” & break it up
into “Data frames”.
Creates & recognizes frames
boundaries, this can be done by
attaching special bit patterns to
Application Layer: Contains all the higher level protocols.
Transport Layer: Allow peer entities on the source &
destination hosts to carry on a
conversation.
Internet Layer:
Uses packet switching
techniques, based on a
connectionless internetworking
Defines packet format & protocol
called “IP”.
Host-to-network Layer: The host has to connect to the network
using some protocol, so it can send IP
packets to it.
3201 Computer Networks – 2014/2015 Handout: Questions Bank
8
Question11:
Classify the different switching techniques used in computer networks and which one is
used.
Different switching techniques:
- Circuit Switching:
The switching equipment within the telephone system seeks out a physical path all the
way from your telephone to the receiver's telephone
- Message Switching:
No physical path is established in advance between sender and receiver. Instead, when
the sender has a block of data to be sent, it is stored in the first switching office (i.e.,
router) and then forwarded later, one hop at a time. Each block is received in its entirety,
inspected for errors, and then retransmitted.
- Packet Switching:
There is no limit at all on block size, which means that routers (in a modern system) must
have disks to buffer long blocks. It also means that a single block can tie up a router-
router line for minutes, rendering message switching useless for interactive traffic.
Packet switching Circuit switching
Doesn’t setup a physical connection
between sender and receiver inadvance
Setup physical connection inadvance
Acquire the bandwidth only on
transmission and then releases it
Holds the bandwidth until the end of
transmission
No bandwidth waste Bandwidth is wasted
Circuits are never dedicated Circuits are dedicated
IMPs provide speed, code conversion as
well as some correction
No
IMPs provide buffering in the main
memory install and forward routing
Buffering is to be in the secondary
memory for sender and receiver only
the beginning & the end of the
frame “01111110”.
Problem of flooding slow
receivers from fast senders must
be taken into consideration.
Problem of transmission on both
directions must be solved.
Physical Layer: Concerned with transmitting raw bits
over a communication channels.
3201 Computer Networks – 2014/2015 Handout: Questions Bank
9
Cost doesn’t depend on the distance
between the two ends
Charge = f ( traffic, time )
Cost doesn’t depend on the traffic (no. of
bits) sent
Charge = f ( distance, time )
Used for coputer networks Rarely used
Packets may arrive to the rciever in order
different than transmission order
Message arrive in order
Question12:
Compare between the 5 different IP classes in computer networks (ranges, Subnet masks
and number of clients).
IP
Class
Ranges Subnet masks Number of
Clients
A 1 - 126 255.0.0.0 16,777,214
B 128 - 191 255.255.0.0 65,534
C 192 - 223 255.255.255.0 254
D 224 - 239 Multicast address N/A
E 240 - 255 Reserved for future
use
N/A
Question13:
What is meant by loopback test on 127.0.0.1?
Messages sent to 127.0.0.1 do not appear in the network. The network adapter
loopback(send back) all messages to the sending application. That is it is used
when a program access a network service running on the same computer itself.
That is loopback address is used to test the self-connectivity.
Question14:
Define the following terms: SAP, UTP, STP, TCP, FTP, IP, Computer Network,
Protocol, NOS
SAP service access point
A Service Access Point (SAP) is an identifying label for network endpoints used
in Open Systems Interconnection (OSI) networking.
STP shielded twisted pair
Twisted pair cabling is a type of wiring in which two conductors (the forward and return
conductors of a single circuit) are twisted together for the purposes of canceling
out electromagnetic interference (EMI) from external sources
UTP unshielded twisted pair
3201 Computer Networks – 2014/2015 Handout: Questions Bank
10
UTP cable is also the most common cable used in computer networking.
Modern Ethernet, the most common data networking standard, utilizes UTP cables.
TCP transmission control protocol
TCP provides reliable, ordered delivery of a stream of bytes from a program on one
computer to another program on another computer. TCP is the protocol that major
Internet applications such as the World Wide Web, email, remote administration and file
transfer rely on
FTP file transfer protocol
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from
one host to another host over a TCP-based network, such as the Internet.
IP internet protocol
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the
task of delivering datagrams from the source host to the destination host solely based on
the addresses.
Computer Network
Group of computers connected to each other in order to exchange information such as
- torage or printers.
Protocol
Is an agreement between the communicating parties on how communication is to
proceed.
NOS network operating system
A networking operating system (NOS), is the software that runs on a server and enables
the server to manage data, users, groups, security, applications, and other networking
functions. The network operating system is designed to allow shared file and printer
access among multiple computers in a network
Question15:
Explain the different Modulation techniques used to transmit data throw the computer
network channels.
Modulation:
3201 Computer Networks – 2014/2015 Handout: Questions Bank
11
(a) A binary signal
(b) Amplitude modulation
(c) Frequency modulation
(d) Phase modulation
Question16:
What is meant by 10Base2 and 1000BaseCX?
10base2 --> 10 means transmission rate is 10 bps ,, base means baseband ,, 2
means thinnet coaxial cable as the maximum size of the cable is 200 m or 185 m
1000baseCX --> 1000 means transmission rate is 1000 bps ,, base means
baseband transmission ,, CX means coaxial cable
Question17:
Describe the concept of satellite communication and compare it with the terrestial links.
Satellite vs terrestial links:
Terristal links Satellite
Propagation delay 6 Msec/Km = 𝟏𝟎𝟑
𝟑∗𝟏𝟎𝟖 Typical propagation delay 270 Msec
To send x kbits over a 9600 bps is (𝒙∗𝟏𝟔𝟎𝟎
𝟗𝟔𝟎𝟎) To send x kbits over a 5-Mbps is 270 MS
+ 𝑥
𝟓∗𝟏𝟎6ms
The satellite is faster and the propagation delay is independent of distance between
sender and receiver
Question18:
Draw the wire configuration to connect PC-to-PC and to connect PC-to-Hub.
Using a Straight Through Cable to Connect Two Hosts:
3201 Computer Networks – 2014/2015 Handout: Questions Bank
12
Using a Crossover Cable to Connect Two Hosts:
Question19:
List two ways in which the OSI reference model and TCP/IP reference model are the
same. Now list two ways in which they differ.
Similarities between TCP/IP and OSI reference Model:
· Both models are based on layered protocols
3201 Computer Networks – 2014/2015 Handout: Questions Bank
13
· Both have a network, transport and application layer
· In both models, the transport service can provide a reliable end-to-end byte
stream
On the other hand, they differ in several ways:
· The numbers of layers are different
· TCP/IP does not have session or presentation layers
· OSI does not support internetworking and OSI has both connection oriented
and connectionless service in the network layer
Question20:
The following Character encoding is used in a data link protocol:
A: 01000111; B: 11100011; FLAG: 01111110; ESC: 11100000
Show the bit sequence transmitted (In Binary) for the four –character frame: A B ESC
FLAG when each of the following framing methods are used:
1. Character Count
2. Flag bytes with byte stuffing.
3. Starting and ending flag bytes, with bit stuffing.
o Character count
00000100 01000111 11100011 11100000
01111110 o Flag bytes with byte stuffing
01111110 01000111 11100011 11100000 11100000 11100000 01111110 01111110
Flag A B Esc (byte
stuffed) Esc
Esc (byte
stuffed) flag Flag
o Starting and ending flag bytes, with bit stuffing
01111110 01000111 110100011 111000000 011111010 01111110
flag A B Esc flag Flag
Question21:
What is meant by TDMA and FDMA? Explain each of them and write their delay equations. TDMA: Time Division with Multiple Access Time is divisible into slots of time. Each user is assigned a fixed number of predefined
channel time slots. The user has access to entire channel bandwidth but only during its allocated slots.
FDMA: Frequency Division with Multiple Access
3201 Computer Networks – 2014/2015 Handout: Questions Bank
14
Bandwidth is divided by the number of users. Each user is assigned fraction where by
the assigned buffer it can be seen that the system can be modeled as sub channel, each
of them viewed as an queuing system with a constant service time for the packet
transmission time for each sub channel.