0% found this document useful (0 votes)
19 views6 pages

Module 1: Introduction To Networking

Uploaded by

snehalparab183
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views6 pages

Module 1: Introduction To Networking

Uploaded by

snehalparab183
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Module 1: Introduction to Networking

Q1: What are the main components of a computer network?


A1: The main components of a computer network include network
hardware (e.g., routers, switches, hubs), network software (e.g., operating
systems, network protocols), and communication media (e.g., cables,
wireless signals).

Q2: Compare the OSI model and TCP/IP model in terms of number of
layers.
A2: The OSI model has 7 layers (Physical, Data Link, Network, Transport,
Session, Presentation, Application), while the TCP/IP model has 4 layers
(Network Interface, Internet, Transport, Application).

Q3: What is the difference between connection-oriented and


connectionless services?
A3: Connection-oriented services establish a dedicated connection before
data transfer and ensure reliable delivery, while connectionless services
send data without establishing a connection and don’t guarantee delivery.

Q4: Name three network topologies.


A4: Three common network topologies are bus topology, star topology,
and ring topology.
Module 2: Physical Layer
Q5: What is the electromagnetic spectrum?
A5: The electromagnetic spectrum is the range of all types of
electromagnetic radiation, including radio waves, microwaves, visible
light, X-rays, and gamma rays.

Q6: Compare twisted pair and coaxial cable in terms of bandwidth and
susceptibility to interference.
A6: Coaxial cable generally offers higher bandwidth and better resistance
to electromagnetic interference compared to twisted pair cable.

Q7: What is the main advantage of fiber optic cables over copper cables?
A7: Fiber optic cables offer much higher bandwidth, longer transmission
distances, and greater resistance to electromagnetic interference
compared to copper cables.
Module 3: Data Link Layer
Q8: What are the main functions of the Data Link Layer?
A8: The main functions of the Data Link Layer include framing, error
control, and flow control.

Q9: Explain the difference between error detection and error correction.
A9: Error detection identifies the presence of errors in transmitted data,
while error correction not only detects errors but also corrects them
without requiring retransmission.

Q10: What is the purpose of the CRC in error detection?


A10: CRC (Cyclic Redundancy Check) is used to detect accidental changes
to raw data, providing a strong guarantee of data integrity.

Q11: Describe the Stop-and-Wait protocol.


A11: In the Stop-and-Wait protocol, the sender sends a frame and waits
for an acknowledgment before sending the next frame. It’s simple but
inefficient for high-speed networks.

Q12: What is the main difference between Go-Back-N and Selective


Repeat protocols?
A12: In Go-Back-N, if an error is detected, all subsequent frames are
retransmitted. In Selective Repeat, only the erroneous frame is
retransmitted.

Q13: Explain the CSMA/CD protocol used in Ethernet.


A13: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a
protocol where devices listen for traffic before transmitting, and if a
collision is detected, they wait a random time before retrying.
Module 4: Network Layer
Q14: What is the purpose of IP addressing?
A14: IP addressing provides a unique identifier for each device on a
network, enabling proper routing of data packets between source and
destination.

Q15: Explain the difference between classful and classless IP addressing.


A15: Classful addressing divides the IP address space into fixed classes (A,
B, C, D, E), while classless addressing (CIDR) allows for more flexible
subnet mask lengths.

Q16: What is subnetting and why is it used?


A16: Subnetting is the process of dividing a larger network into smaller
subnetworks. It’s used to improve network performance, security, and
address allocation efficiency.

Q17: Describe the purpose of Network Address Translation (NAT).


A17: NAT allows multiple devices on a private network to share a single
public IP address, conserving IPv4 addresses and providing a level of
security by hiding internal network structure.

Q18: What are the main differences between IPv4 and IPv6?
A18: IPv6 has a much larger address space (128-bit vs 32-bit), built-in
security features, and improved header structure compared to IPv4.
Q19: Explain the Dijkstra’s algorithm for shortest path routing.
A19: Dijkstra’s algorithm finds the shortest path between nodes in a graph
by iteratively selecting the unvisited node with the smallest tentative
distance and updating the distances to its neighbors.

Q20: What is the difference between Link State and Distance Vector
routing protocols?
A20: Link State protocols maintain a complete view of network topology
and calculate best paths, while Distance Vector protocols only know
distances to their neighbors and exchange this information periodically.

Q21: What is the purpose of the ICMP protocol?


A21: ICMP (Internet Control Message Protocol) is used for error reporting
and network diagnostics, such as ping and traceroute operations.

Q22: Describe the token bucket algorithm for congestion control.


A22: The token bucket algorithm controls network traffic by using a
“bucket” that fills at a constant rate with tokens. Packets can only be sent
if there are enough tokens in the bucket, limiting the overall transmission
rate.
Module 5: Transport Layer
Q23: What are the main differences between UDP and TCP?
A23: TCP is connection-oriented, reliable, and provides flow control and
congestion control. UDP is connectionless, unreliable, and doesn’t provide
these features, but it’s faster and has less overhead.

Q24: Explain the three-way handshake process in TCP connection


establishment.
A24: The three-way handshake involves: 1) Client sends SYN, 2) Server
responds with SYN-ACK, 3) Client sends ACK. This establishes a reliable
connection between client and server.

Q25: What is the purpose of flow control in TCP?


A25: Flow control prevents the sender from overwhelming the receiver by
adjusting the transmission rate based on the receiver’s processing
capacity.

Q26: Describe the slow start mechanism in TCP congestion control.


A26: Slow start is a congestion control algorithm where TCP slowly
increases the amount of data transmitted until it finds the network’s
maximum carrying capacity.
Module 6: Application Layer
Q27: What is the primary function of DNS?
A27: DNS (Domain Name System) translates human-readable domain
names into IP addresses that computers use to identify each other on the
network.
Q28: Explain the difference between authoritative and recursive DNS
servers.
A28: Authoritative DNS servers hold the actual DNS records for a domain,
while recursive DNS servers query other servers on behalf of clients to
resolve domain names.

Q29: What is the purpose of the HTTP protocol?


A29: HTTP (Hypertext Transfer Protocol) is used for transmitting
hypermedia documents, such as HTML, on the World Wide Web.

Q30: Describe the basic operation of SMTP.


A30: SMTP (Simple Mail Transfer Protocol) is used for sending email
messages between servers. It defines how email messages should be
formatted, encrypted, and transferred between mail servers.
Experiments and Practical Questions
Q31: How do you crimp an RJ45 connector onto a CAT6 cable?
A31: To crimp an RJ45 connector: 1) Strip the cable jacket, 2) Untwist and
arrange wires according to TIA/EIA-568B standard, 3) Insert wires into the
connector, 4) Use the crimping tool to secure the connector.

Q32: What is the purpose of the ‘ping’ command?


A32: The ‘ping’ command is used to test the reachability of a host on an IP
network and measure the round-trip time for messages sent from the
originating host to a destination computer.

Q33: How do you use the ‘tracert’ command, and what information does it
provide?
A33: The ‘tracert’ command is used by typing ‘tracert [destination]’ in the
command prompt. It shows the route packets take to reach the
destination and the time taken for each hop.

Q34: What information can you obtain using the ‘netstat’ command?
A34: The ‘netstat’ command displays active TCP connections, ports on
which the computer is listening, Ethernet statistics, the IP routing table,
IPv4 statistics, and IPv6 statistics.

Q35: How do you configure static routing in Packet Tracer?


A35: In Packet Tracer, configure static routing by: 1) Select the router, 2)
Go to Config tab, 3) Click Routing, 4) Add static route with destination
network, subnet mask, and next hop address or exit interface.

Q36: What is the purpose of network discovery tools like Nmap?


A36: Network discovery tools like Nmap are used to discover hosts,
services, operating systems, and vulnerabilities on a network, helping in
network mapping and security auditing.
Q37: How can Wireshark be used to analyze network traffic?
A37: Wireshark captures and displays the contents of network packets in
real-time. It can be used to inspect protocol details, troubleshoot network
issues, and detect security problems by analyzing captured packets.

Q38: What information can you gather about Ethernet frames using
Wireshark?
A38: Using Wireshark, you can observe Ethernet frame details such as
source and destination MAC addresses, frame type, frame size, and the
encapsulated protocol.

Q39: How do you capture and analyze ARP packets using Wireshark?
A39: To capture ARP packets in Wireshark: 1) Start a capture, 2) Apply
filter “arp”, 3) Generate ARP traffic, 4) Analyze captured packets to see
MAC-IP address bindings and ARP request/response processes.

Q40: What is the purpose of simulating CSMA/CD in network simulators?


A40: Simulating CSMA/CD helps understand how Ethernet handles
multiple access and collision detection, allowing students to observe the
protocol’s behavior under various network conditions without physical
hardware.

Q41: How do you set up multiple IP addresses on a single LAN interface in


Linux?
A41: Use the ‘ip’ command: ‘sudo ip addr add 192.168.1.2/24 dev eth0’
adds an IP to the eth0 interface. Repeat with different IPs to add multiple
addresses.

Q42: How do you add a new route to the routing table in Linux?
A42: Use the ‘ip route add’ command. For example: ‘sudo ip route add
10.0.0.0/24 via 192.168.1.1’ adds a route to the 10.0.0.0/24 network
through the gateway 192.168.1.1.

Q43: What is the purpose of IP forwarding, and how do you enable it in


Linux?
A43: IP forwarding allows a Linux system to act as a router. Enable it with:
‘sudo sysctl -w net.ipv4.ip_forward=1’ or by editing /etc/sysctl.conf.

Q44: How do you configure a basic VPN using Packet Tracer?


A44: In Packet Tracer, set up a VPN by: 1) Configure two routers with
public IPs, 2) Set up IPsec policies on both routers, 3) Configure interesting
traffic to be encrypted, 4) Establish the VPN tunnel between the routers.

Q45: What is RIP, and how does it differ from OSPF?


A45: RIP (Routing Information Protocol) is a distance-vector protocol that
uses hop count as its metric. OSPF (Open Shortest Path First) is a link-
state protocol that uses cost-based metrics and is more scalable for larger
networks.
Q46: How do you implement basic socket programming for a TCP client-
server application?
A46: For a basic TCP client-server: 1) Create a server socket that listens
on a specific port, 2) Create a client socket that connects to the server’s IP
and port, 3) Implement send and receive functions for data exchange, 4)
Close the connection when done.

Q47: What are the main steps in performing file transfer using FTP?
A47: Main steps for FTP file transfer: 1) Connect to FTP server, 2)
Authenticate with username and password, 3) Navigate to the desired
directory, 4) Set transfer mode (ASCII or binary), 5) Upload or download
files, 6) Close the connection.

Q48: How does Telnet differ from SSH in terms of security?


A48: Telnet transmits data, including passwords, in plain text, making it
vulnerable to interception. SSH (Secure Shell) encrypts all data, providing
a secure method for remote login and other secure network services.

Q49: What is the purpose of DHCP, and how does it work?


A49: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP
addresses and other network configuration to devices. It works through a
discover-offer-request-acknowledge process between clients and the
DHCP server.

Q50: How do you analyze HTTP headers using Wireshark?


A50: To analyze HTTP headers in Wireshark: 1) Capture traffic and filter
for HTTP, 2) Select an HTTP packet, 3) Expand the HTTP section in the
packet details pane to view headers like GET/POST methods, Host, User-
Agent, Content-Type, etc

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy