0% found this document useful (0 votes)
7 views8 pages

Computer Network QB_Ans

The document is a question bank for a Computer Networks course, covering various topics such as network topologies, the role of switches and modems, OSI model layers, error detection and correction methods, and transmission media. It includes questions with answers on the importance of switches, comparisons of communication types, and the necessity of redundancy in error detection. The document serves as a study guide for understanding key concepts in computer networking and data communication.

Uploaded by

roshphilip19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

Computer Network QB_Ans

The document is a question bank for a Computer Networks course, covering various topics such as network topologies, the role of switches and modems, OSI model layers, error detection and correction methods, and transmission media. It includes questions with answers on the importance of switches, comparisons of communication types, and the necessity of redundancy in error detection. The document serves as a study guide for understanding key concepts in computer networking and data communication.

Uploaded by

roshphilip19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Computer Networks – Question Bank CIA 1

Module 1:
2Marks:
1. Explain importance of switch in network
a. A switch is crucial in networking as it efficiently directs data between devices within a LAN,
reduces collisions, enhances bandwidth usage, and ensures secure communication through
MAC address learning and filtering.
2. Compare simplex half duplex and full duplex communication.
a. Communication
i. Simplex: Data flows in one direction only (e.g., keyboard to monitor).
ii. Half-Duplex: Data flows both ways, but only one direction at a time (e.g., walkie-
talkies).
iii. Full-Duplex: Data flows in both directions simultaneously (e.g., Ethernet, VoIP calls).
3. ⁠List out several types of physical topologies
a. Types of Physical Topologies are:
i. Bus – Single backbone cable.
ii. Star – Central hub/switch connects all devices.
iii. Ring – Devices connected in a closed loop.
iv. Mesh – Every device connects to others.
v. Tree – Hierarchical star and bus combination.
4. Different types of transmission medium in Computer Network
a. Different Types of Transmission Medium in Computer Network
i. Wired: Twisted Pair, Coaxial, Fiber Optic.
ii. Wireless: Radio Waves, Microwaves, Infrared.
5. ⁠Importance of Modem in Computer Networks
a. A modem converts digital data into analog for transmission over telephone lines and vice versa,
enabling internet connectivity for homes and businesses.
6. List the advantages and disadvantages of bus topology.
a. Bus Topology
i. Advantages: Easy setup, cost-effective, requires less cable.
ii. Disadvantages: Difficult troubleshooting, limited scalability, network failure if the
backbone cable fails.
6 Marks:
1. Explain Mesh and Star topology along with merits and demerits
a. Mesh Topology is a network design where each device connects directly to every other device.
It provides multiple paths for data, ensuring high reliability. If one connection fails, data can
take another route, making it highly fault-tolerant. Mesh networks are commonly used in
mission-critical applications such as military communication and industrial control systems.
i. Merits:
1. Highly reliable due to multiple communication paths.
2. Eliminates congestion as each device has a dedicated connection.
3. Enhances security as data transmission does not rely on a single path.
ii. Demerits:
1. Requires extensive cabling, increasing cost and complexity.
2. Difficult to configure and maintain, especially in large networks.
b. Star Topology is a widely used topology where all devices connect to a central switch or hub,
which manages network traffic efficiently.
i. Merits:
1. Easy to set up and troubleshoot.
2. Network failure is minimal unless the central hub fails.
ii. Demerits:
1. The entire network fails if the central hub stops working.
2. Higher installation costs due to dependency on a switch.

2. ⁠Elaborate the role of switch in data communication and discuss operation of switch.
a. A switch is a critical network device that operates at Layer 2 (Data Link Layer) of the OSI
model, facilitating efficient data transmission within a LAN. It plays a crucial role in handling
data traffic by ensuring direct communication between devices rather than broadcasting packets
like hubs.
i. Operation of a Switch:
1. When a device sends a data packet, the switch receives it.
2. The switch examines the MAC address of the destination device.
3. It forwards the packet to the appropriate port, ensuring direct communication.
4. This process improves network performance by reducing congestion.
3. Describe the hybrid topology consisting of star, bus and ring, along with advantages and
disadvantages.
a. A hybrid topology combines different topologies, such as Star, Bus, and Ring, to optimize
network performance. This design is commonly used in large-scale enterprise networks
where different departments require specific network structures.
i. For example, an organization may use:
1. Star topology for internal LAN to connect individual computers to a switch.
2. Bus topology as a backbone to connect multiple departments.
3. Ring topology for interdepartmental communication to ensure structured
data flow.
ii. Advantages:
1. Scalability: Allows easy expansion by integrating new network segments.
2. Reliability: Combines the strengths of multiple topologies, minimizing single
points of failure.
3. Flexibility: Supports different network requirements for various departments.
iii. Disadvantages:
1. Complex installation: Requires specialized knowledge to set up and manage.
2. High cost: Needs multiple devices, switches, routers, and cables, making it
expensive.
3. Difficult troubleshooting: Diagnosing faults can be challenging due to
multiple topologies.
4. Describe the role of modem in data communication and merit and demerits.
a. A modem (Modulator-Demodulator) is a key device in data communication that converts
digital signals into analog for transmission over telephone lines and vice versa. It enables
internet access for homes and businesses, particularly in DSL and dial-up connections.
i. Role in Data Communication:
1. Modulation: Converts digital data from a computer into an analog signal for
transmission.
2. Demodulation: Converts received analog signals back into digital data for
processing.
3. Ensures compatibility: Bridges digital computers with analog transmission
lines.
ii. Merits:
1. Enables internet access via traditional phone lines.
2. Provides cost-effective long-distance data transmission.
3. Supports reliable communication in areas without fiber or broadband.
iii. Demerits:
1. Slower than fiber optic and broadband connections.
2. Prone to signal interference and noise.
3. Requires an active telephone line, which may not be available in modern
setups.
10 Marks:
1. Sketch and analyse the OSI layers and describe the role of each layer in data communication.
a. The OSI (Open Systems Interconnection) model is a seven-layer framework that
standardizes networking communication. Each layer has a specific function, ensuring
efficient data transmission.
i. OSI Model Layers and Their Roles

1. Physical Layer (Layer 1)


o Converts data into electrical, optical, or radio signals for transmission.
o Defines hardware connections, cables, and voltage levels.
o Example: Ethernet cables, radio waves in Wi-Fi.
2. Data Link Layer (Layer 2)
o Responsible for error detection and correction.
o Uses MAC (Media Access Control) addresses for device identification.
o Example: Switches, MAC addresses, Ethernet protocol.
3. Network Layer (Layer 3)
o Handles data routing and addressing via IP (Internet Protocol).
o Determines the best path for data transmission.
o Example: Routers, IP addresses, IPv4/IPv6.
4. Transport Layer (Layer 4)
o Ensures reliable and ordered data delivery.
o Uses TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).
o Example: TCP for emails, UDP for video streaming.
5. Session Layer (Layer 5)
o Establishes, maintains, and terminates communication sessions.
o Manages synchronization between communicating systems.
o Example: Managing multiple web page requests.
6. Presentation Layer (Layer 6)
o Formats, encrypts, and compresses data for transmission.
o Ensures compatibility between different systems.
o Example: SSL/TLS encryption, JPEG, MP3 compression.
7. Application Layer (Layer 7)
o Provides services for user applications (browsers, emails).
o Handles protocols like HTTP, FTP, SMTP, and DNS.
o Example: Web browsing (HTTP), email (SMTP, IMAP).

ii. Analysis of OSI Model

 Advantages: Provides a structured approach, allowing different technologies to


work together.
 Limitations: Some real-world networks use a simplified TCP/IP model instead.
 Practical Use: Helps diagnose network issues by isolating problems at specific
layers.
2. ⁠Elaborate Importance of coaxial cables and fiber optics and explain its operation with neat diagram.
a. Data transmission in computer networks requires different types of cables. Coaxial cables
and Fiber optics are widely used due to their efficiency and reliability.
i. Coaxial Cables
1. Importance:
a. Used in cable TV, broadband networks, and CCTV systems.
b. Provides shielded protection, reducing signal interference.
c. Offers better performance than twisted-pair cables over long distances.
2. Operation:
a. Consists of a central conductor (copper wire) surrounded by an
insulating layer, metallic shielding, and an outer plastic cover.
b. Data travels as electrical signals through the core, with the shield
minimizing interference.
c. Supports high-frequency transmission with minimal data loss.

ii. Fiber Optics


1. Importance:
a. Used in high-speed internet, telecommunications, and data centers.
b. Supports long-distance, high-bandwidth transmission.
c. Immune to electromagnetic interference (EMI).
2. Operation:
a. Composed of a core (glass or plastic) and cladding with a different
refractive index.
b. Uses light signals (instead of electricity) for data transmission.
c. Works on Total Internal Reflection (TIR): light bounces within the
core, allowing it to travel long distances without significant loss.
Module 2:
2 Marks:
1. List out the concepts of redundancy in error reduction
a. Concepts of Redundancy in Error Reduction are:
i. Parity Bits: Adds extra bits to detect errors.
ii. Checksums: Verifies data integrity using a sum of values.
iii. Cyclic Redundancy Check (CRC): Detects errors using polynomial division.
iv. Hamming Code: Corrects errors using redundant bits.
2. State the need for error correction and detection in data link layer
a. Need for Error Correction and Detection in Data Link Layer
i. Ensures reliable communication by detecting and correcting transmission errors.
ii. Prevents data loss and corruption due to noise or interference.
iii. Increases network efficiency by reducing retransmissions.
iv. Essential for maintaining data integrity in real-time communication.
3. ⁠Mention the need of parity bit in error detection
a. Need for Parity Bit in Error Detection
i. Parity bits add a simple redundancy check to detect single-bit errors.
ii. Used in even or odd parity schemes for quick error identification.
iii. Common in serial communication, memory storage, and network data transfer.
6 Marks:
1. Types of Errors with Example
a. Errors in data communication occur due to noise, interference, or signal distortion during
transmission. Errors are categorized into:
i. Single-Bit Error: Only one bit in a data unit is altered (e.g., 1010 → 1000).
1. Example: If "A" (01000001) is transmitted and received as "B" (01000010), a
single-bit error has occurred.
ii. Burst Error: Multiple bits are altered in a data unit, often due to network interference.
1. Example: In "HELLO" (01001000 01000101 01001100 01001100 01001111),
if multiple bits change in "E," it may be received incorrectly.
iii. Packet Loss: Entire frames or packets are lost due to congestion or weak signals.
Example Scenario:
 In a wireless network, interference from other devices may cause burst errors, leading
to corrupt data requiring retransmission.
 To reduce errors, techniques like Hamming Code, CRC, and Checksum are used.
2. Explain the concept of cyclic redundancy check with an example.
b. Cyclic Redundancy Check (CRC) is an error-detection method that adds a checksum
(redundant bits) to transmitted data. It is widely used in networking (Ethernet, Wi-F) and
storage devices (hard drives, SSDs).
i. Concept:
1. The sender divides data bits by a fixed divisor (polynomial) using binary
division.
2. The remainder (CRC code) is appended to the data.
3. The receiver performs the same division; if the remainder is zero, the data is
error-free.
ii. Example:
1. Data: 110101
2. Divisor: 1011
3. After division, remainder 100 is appended, making the transmitted data
110101100.
4. If received data gives a nonzero remainder, an error is detected.
iii. Benefits:
1. Detects burst errors effectively.
2. Faster and more reliable than parity or checksums.
3. Used in Ethernet frames, Wi-Fi, and error detection protocols.
10 Marks:
1. Examine the necessity of redundant bit for error detection and explain about it through VRC &
CRC
a. Necessity of Redundant Bits for Error Detection
Errors in data transmission occur due to noise, interference, or signal distortion. To ensure
reliable communication, redundant bits are added to detect and correct errors. These extra bits
do not contain actual data but help verify its integrity. Without redundancy, detecting and
correcting errors would be impossible, leading to corrupted files, incorrect computations, and
lost data packets in networks.
i. Error Detection Methods: VRC & CRC
1. Vertical Redundancy Check (VRC) – Parity Check
a. Concept: VRC adds an extra parity bit (either even or odd) to a data byte.
i. Even Parity: The number of 1s, including the parity bit, is even.
ii. Odd Parity: The number of 1s, including the parity bit, is odd.
iii. Example:
1. Data: 1010001 (3 ones)
2. Even Parity: 10100011 (Parity bit = 1, making it even)
3. Odd Parity: 10100010 (Parity bit = 0, keeping it odd)
iv. Limitation: Can detect single-bit errors but fails for burst errors
(multiple-bit errors).
2. Cyclic Redundancy Check (CRC)
a. Concept: CRC uses polynomial division to generate a checksum
(redundant bits).
b. Process:
i. The sender divides the data by a predefined divisor polynomial.
ii. The remainder (CRC bits) is appended to the data.
iii. The receiver performs the same division; if the remainder is zero,
the data is error-free.
c. Example:
i. Data: 110101
ii. Divisor: 1011
iii. CRC Remainder: 100
iv. Transmitted Data: 110101100
d. Advantages:
i. Detects burst errors efficiently.
ii. Used in Ethernet, Wi-Fi, and storage devices.
Redundant bits are essential for error detection in networking and storage. While VRC is simple
and effective for single-bit errors, CRC provides stronger error detection for complex data
transmissions. The use of redundancy ensures data accuracy, reliability, and security across digital
communication systems.
2. Analyse in detail about error correction using check sum method.
a. Error correction is vital in ensuring that received data matches the original transmitted data.
The checksum method is a widely used error-detection and correction mechanism in
networking and digital systems. It detects errors by verifying data integrity at the receiver’s
end.
i. Concept of Checksum Method
1. The checksum is a computed value that represents a sum of the data bits.
2. The sender adds a checksum value to the data packet before transmission.
3. The receiver recalculates the checksum and compares it with the transmitted
checksum.
4. If they match, the data is correct; otherwise, an error is detected.
ii. Steps Involved in Checksum Calculation
1. Data Division:
a. The message is divided into fixed-length segments (e.g., 16-bit words).
2. Checksum Calculation (Sender Side):
a. The system adds all data segments using binary addition.
b. The result is stored as the checksum and transmitted with the data.
3. Checksum Verification (Receiver Side):
a. The receiver adds the received data segments and the transmitted
checksum.
b. If the result is all ones (1111… in binary), no error is detected.
c. If the sum contains zero bits, the receiver requests retransmission.
iii. Example of Checksum Calculation
1. Given 16-bit data words:
a. 1010101010101010
b. 1100110011001100
2. Sum: 1010101010101010 + 1100110011001100 = 1011011110010110
3. One’s Complement of Sum: 0100100001101001 (Checksum)
4. Transmitted Data: Data + Checksum
iv. Advantages of Checksum Method
1. Simple implementation in both hardware and software.
2. Fast computation, making it ideal for network protocols (TCP/IP, UDP).
3. Detects transmission errors, ensuring reliable communication.
v. Limitations
1. Cannot correct errors—only detects them.
2. May fail to detect certain types of burst errors.
3. Works best when combined with other error-correction techniques.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy