You are on page 1of 14
Very High Probability Questions \WA CPs ~ Re Section 2: Very High Probability Questions This section includes questions and parts of the syllabus that have a predictability rating of over 80% based on past 10 years of historical data. 2.1 Computer Networks Mia A x) edaleM cles) iis Rating of 98% for your upeomingic Questions from this topic have been asked in the following previous question papers: Jun 2020, Dec 2018, Jun 2018, Dec 2017, Jun 2017, Dec 2016, Jun 2016, Dec 2015, Jun 2015, Jun 2014, Dec 2013, Dec 2012, Jun 2012, Dec 2011, Jun 2011, ete. and | additional assignment question papers too. 2.1.1 Network Applications Q: | List and describe the various types of network applications: In today’s world, there are numerous computer applications; without computer networking, itis difficult to conceive the world. The following are a few of these applications: Person-to-Person Communication: Real-time technologies, such as videoconferencing and virtual meeting settings through the network or the internet, allow remote users to communicate in real time, possibly seeing and hearing each other. Email: Email stands for electronic mail, which is a protocol for receiving, delivering, and storing electronic messages. With the advent of the computer network, email has grown in popularity. Email has become the preferred form of communication in many circumstances, Emails are accessible with email client software such as Outlook. ‘Webmail has also grown increasingly popular in addition to email client software. Most email service providers include this as a bonus feature, allowing users to access their mailbox through the Internet, Some email systems are built with the World Wide Web wownw.gyaniversity.com 2 CCiT-001: Fundamental of Computer Systems as their primary user interface. Sites like Yahoo! Mail, Google Mail, and Hotmail have grown in popularity because they allow anyone to create free email accounts. Interactive Entertainment: The entertainment sector makes substantial use of computer networks. Services such as Video on Demand, in which a user can choose from any movie or TV show ever made in any country and have it instantaneously presented on his screen. Other uses include live and interactive television, in which viewers may take part in quiz programmes, multiplayer real-time games, and flight simulators, among others. FIP: The File Transfer Protocol is a network protocol that uses the Transmission Control Protocol Network to exchange and manipulate files over a computer network. FIP is a popular method for transferring Web page fies from their originator to the machine that serves them to the rest of the world. It's also used to download programmes and other things from other servers to your computer. ‘Telnet: For TCP/IP networks, such as the Internet, a terminal emulation programme is available. Telnet is a TCP/IP-based protocol for connecting to remote machines across a. computer network. To connect to a telnet server, you can use software called telnet client on your computer. When your telnet client connects to the remote host, it transforms into a virtual terminal, allowing you to communicate with the remote host from your computer. Most of the time, you'll need to log into the remote host, which needs you to have an account on that system. You can occasionally log in as a visitor or public user without creating an account. Marketing and Sales: Both marketing and sales firms make heavy use of computer networks. They are used by marketing professionals to gather, exchange, and evaluate data on client needs and product development cycles. Teleshopping and online- reservation services for hotels, airlines, and other businesses are examples of sales applications. Financial Services: The financial services of today are entirely reliant on computer networks, Credit history searches, foreign exchange and investment services, and electronic fund transfers, which allow users to transfer money without going to a bank, are all included in the application. 2.1.2 Star Topology WWE ELAS ole aloe CU aCe ho Elite disadvantages. www.gyaniversity.com i | Very High Probability Questions Each computer on a network communicates with acentral hub (also known asa concentrator) that resends the message to all or just the target computer in a star architecture, A hub multiplies the number of network connections available. A four-port hub, for example, can link up to four machines, For a small network, a single hub ig sufficient; however, bigger networks require numerous hubs. However i raises the cost of hardware and cabling. y VAS Star Topology Advantages ¢ It's more dependable: A star network's centre is an ideal spot to diagnose network problems, and if one computer fails, the entire network isn't disrupted. Hub locates the problem and isolates the infected computer. It's simple to replace, install, or remove hosts or other devices, and problems are straightforward to spot. By simply extending 2 new line from the computer to the central location and putting it into the hub, it is easier to modify or add a new computer without disrupting the rest of the network. Multiple cable types are used in the same network with a hub. © Itperforms admirably. Disadvantages + Itis more expensive to install because it takes more wire. This is because all network lines must be hauled to one central point, requiring longer cable length than other networking topologies, Because of the reliance on the central hub, if the central hub fails, the entire network ceases to function. Many star networks require a device to rebroadcast or switch network data at the centre point, ‘wwow.gyaniversity.com 4 CiT-001: Fundamental of Computer Systems 3 OSI Models 2.1 Discuss OSI model Rate ‘The OSI model isan abstract description of layered communications and computer network protocol architecture. It is an open system, which means it can connect with any other system that adheres to the stated standards, formats, and semantics. PROTOCOLS define the rules through which various parties can communicate with one another. It separates network architecture into seven levels, which are the Application, Prssentation, Session, Transport, Network, Data Link, and Physical Layers, from top t0 ottom, As a result, its commonly referred to as the OSI Seven Layer Model. [Alayeris a group of conceptually elated functions that give services to the layer above it “hile also receiving services from the layer below it. On each tier, an instance delivers veivices to instances on the layer above it while also requesting services from instances on the layer befow it. A layer that offers error-free communications over a network, for example, provides the path required by applications above it, while calling the next lower layer to transmit and receive the packets that make up the path’s contents. “Tyo instances on the same layer are conceptually connected via a horizontal protocol connection on that layer. Layers of GS! Model Q: | Enumerate the different layers of OSI model. ‘The following are the layers of OSI model: OSI Model — Layers 7 [Applicaton |, i 6 | Presentation | > Applicaton | Upper Layer ES | (iattioseaS 5 | Session | / | 4 | Transport ———— Network 3 Lower Layer 2 i 1 OSI Model www.gyaniversity.com sang Very High Probability Questions Data goes from layer 7 to layer 1, then to cabling or another suitable media o transmission side. Data passes from layer 1 to layer 7 when it reaches the rece the iver side, ‘Application Layer: This is the layer that allows users to interact with the syste, cope with the data, we'll need application software. 'm. To Presentation Layer: It turns the data into a format that may be used. Compressio : ; : ny decompression, encryption, and decryption are among the functions it performs Session Layer: This layer is in charge of managing the connections between the vatio application layers. nus ‘Transport Layer: This layer divides data into segments and then reassembles the stream. The protocols used in this tier are TCP and UDP. Data is converted into so-called segments in this layer. Network Layer: The logical address is translated into a physical address by this layer. ‘This layer also fixes the data path route. This layer is where the router operates. Data is referred to as a packet in this tier. Data Link Layer: The MAC Address is used to offer physical identification of a device in this layer. It converts packets into frames by adding source and destination addresses. Physical Layer: The functional requirements for activating a physical link are provided by this layer. Data is sent from one device to another through this layer. ‘With an example, we can better comprehend the OSI layer. Consider sending a word document across the internet or to a different network. The following is the procedure that will be followed: «The user can modify the file using application software such as Microsoft Word or ‘Word Viewer in the APPLICATION LAYER. «Inthe PRESENTATION LAYER, the user can use WINRAR or WINZIP £0 compress the word file and convert the contents to another format, such as iP OF sar. He can also transform the document from one format to another. ; «The specific file must be connected with the browser in the SESSION LAYER in order to be attached to email or other clients. a «Data is transformed to segments in the TRANSPORT LAYER. Each packet has ® source IP and a destination IP. This layer also includes frame checks and parity °° + ‘The data is passed to a router in the NETWORK LAYER. The router determin the most efficient data transmission path. A ¢ Trnemterion fines ure handled at the DATALINE LAYER, and data#low © managed so that receivers are not swamped by rapid senders. weww.gyaniversity.com CIT-001: Fundamental of Computer Systems 4, Frames are sent as bits across media such as network cable and optical fibre in the PHYSICAL LAYER. TCP/IP Model Discuss TCP/IP model Host to Host Network In truth, this layer is not specified in the TCP/IP paradigm. However, it essentially mezges the physical and data link layers’ functionalities. The Physical layer, which starts at the bottom, deals with hardware. TCP/IP uses the existing Physical layer and does not define its own, allowing it to function with any network suites. This layer also encodes and sends data in the form of bits across network communications media, which are received by the destination device's Physical layer. "The Data Link Layer, which is responsible for transporting packets from the network layer to multiple hosts, is frequently integrated with this layer. IP packets are sent in a variety of ways depending on the connection type. PPP is used by dial-up modems to transfer IP packets, while PPoE is used by broadband users. Internet Layer ‘This layer routes and distributes data across networks that are similar or wholly different. The Network layer is in charge of packet delivery from start to finish, as well as routing, flow control, and error control. The Internet Protocol or Internet Protocol Security is an example of this layer. Transport Layer ‘The Network layer might be compared to the physical vehicle that transmits data, End- to-end message transfers or linking apps are classified as Transmission Control Protocol or User Datagram Protocol at this layer. TCP (Transmission Control Protocol) is a connection-oriented protocol that is thought to offer a reliable byte stream. TCP features include traffic congestion control, data arrival in order, minimal error, and the discarding of duplicate data. Application Layer The Application layer, which is utilised for network communication, is the top layer of the TCP/IP paradigm. Data is transferred across this layer via ports, which are used by applications. Port 21 is used by the File Transfer Protocol, while port 80 is used by the Hypertext Transfer Protocol. waw.gyaniversity.com 7 Very High Probability Questions CPAP has numerous advantages. TCP/IP allows for cross-platform networking, which is very useful in today's world. Additionally, this ea offers Breater failure recovery and the ability to expand networks without disrupting existing services, TCP/dependability IP's is another significant advantage of adopting this protocol, ‘TCP/IP has been chosen over other networking protocols because it allows othe, portions of the network to continue to function even if one component of the network fils, TCP/P is also easly extendable, allowing for the Internet's extraordinary rate of growth. 2.1.5 Classification of Network Define network and write the classification of nety DSCC There are mainly three types of networks: Local Area Network (LAN) Write down the basic components of a LAN. A local area network (LAN) is a collection of | computers that are connected to form a Single network in order to share resources such as disc drives, printers, data, CPU, fax/modem, applications, and so on. LAN LANs are typically limited to a geographical area of less than 2 kilometres and are capable of supporting high-speed networks, Although many different types of LANs have been constructed and established, a few have recently emerged as the most popular. The Ethernet system, which is based on a bus architecture, is the most extensively used LAN technology, www gyaniversity.com . CIT-001: Fundamental of Computer Systems Jntesmediate nodes allow larger LANs to connect to each other. A “router” device can connect 2 LAN to another LAN, as well as WANs and MANs. ALAN is made up of five basic components: s Workstations, printers, and file servers are examples of network devices that are routinely accessed by all other computers. «Hubs, routers, switches, and other network connectivity devices are examples of network communication equipment. «Each network device requires a Network Interface Card to connect to the network. It's the point where the machine and the physical network meet. + Asaphysical transmission medium, cable is used. «Network Operating System (NOS) ~a set of software applications that control the operation and administration of a network. Characteristics of LAN «It links computers in a single building, block, or campus, allowing them to collaborate in a limited geographical region. © LANsare private networks that are not regulated or subject to tariffs. © When compared to 2 conventional WAN, LANs function at a comparatively high speed. © InaLAN, there are various types of Media Access Control systems, the most common of which are Ethernet and Token Ring. © Buses or rings are used to connect people. Advantages of LAN © Itallows multiple computers to share expensive resources such as laser printers, software, and mass storage devices. * The LAN provides for the rapid interchange of critical data. © Ttaids in the enhancement of productivity. A LAN installation should be thoroughly examined in terms of its potential contribution to the organization's long-term goals. Disadvantages of LAN * In comparison to many other options, the financial cost of LAN is still expensive. + Tenccessitates memory space on each of the networked machines. This decreases the amount of RAM available to the user's programmes. * Tfconfidential data must be protected, some form of security mechanism must be created. woww.gyaniversity.com Very High Probability Questions + Theuser loses some control over the situation. It's possible that you'll have to share aca a printer with other pope You cin find youself in a positon whee the entre network locks up because one person committed a mistake, Metropolitan Area Network (MAN) MANs, or metropolitan area networks, are massive computer networks that often spana metopolis To connec theists, the usually se wireles technology or optical be connections. 'AMAN is designed to cover a broader geographic region than a LAN, ranging from a fevvblocks to entire cities. MANs can also rly on data-rate communications channels that range from moderate to high. A MAN may be owned and operated bya single company, although itis typically utilised by alrge numberof people and organisations, MANs canbe publicly owned and operated or privately owned and operated. They wll frequently give mechanisms for local networks to connect to the internet. Modem and wire/cable equipment are utilised in metropolitan area networks that can stretch up to 50 kilometres. A metropolitan area network (MAN) is a huge computer network that stretches across a city or university. Its geographical range sin between a WAN and a LAN. MANs connect LANs in a metropolitan area to wider area networks like the Internet and provide Internet connectivity for them, * The network sie is somewhere in the middle of LAN and WAN. A MAN normally covers a radius ofS to 50 kilometres, Many MANs are the size of cit) \w.gyaniversity.com CIT-001: Fundamental of Computer Systems although they can be as tiny as a handful of buildings or as huge as the North of Scotland in other situations. (A MAN is frequently used as a high-speed network to allow regional resources to be shared. It's also common to employ 2 WAN link to give a shared connection to other networks. Characteristics of MAN It usually refers to towns and cities (50 kms). Te was created in the 1980s. «Optical fibres, cables, and other communication mediums are utilised in MAN. « For distributed computing applications, appropriate data rates are required. Wide Area Network (WAN) ‘A Wide Area Network (WAN) is a network system that connects cities, counties, or continents via routers and public communications cables. The Internet is the largest and most well-known example of 2 WAN. Users and computers in one area can communicate with users and computers in other locations via WANs, which connect LANs and other types of networks. Many WANs are private and created for a single organisation. Others, which are created by Internet service providers, connect a company's LAN to the Internet. Leased lines are frequently used to build WANs. A router connects to the LAN on one end of the leased line and a hub within the WAN on the other. Leased lines can be quite costly. WANS can be established around a public network or the Internet instead of leased lines. a aa Am2 p= Pst Pact ning nse fete) www.gyaniversity.com Very High Probability Questions Characteristics of WAN * Itusually covers a broad area. or + Satellites and public telephone networks are utilised as communication mediums, with routers connecting them. + Routers pass packets from one sender to the next along a path from the sender to the receiver. Difference between LAN, WAN and MAN. | It stands for | | It stands for wide | Full form SS metropolitan area | sagewodk: area network. Cost Less Costly | More Costly Costliest Up to 10-100 r inf j Speed | $10 Mbps 256 Kbps to 2 Mbps | | Mbps | Range 1Km | UptosoKms | Upto 10000 Kms — = } _ _ —_ leaaes | Distributed Queue | Topology BusandRing | Dual Bus ae ‘ a (PQDB] ay, ont | | Computers are | | Computersare | eho the 1 | | located across the | '"" ey . | Location of i 1 te | Computers are city and ie continent. The | | computers a connected via oe | ii | connected in the | lotsted within the | £0"? connection is | - | syste | same building. . established either | system telephone lines to : | through a satellite | | allow for easy ee | communication. communication | "| link or through the | internet. wwnw.gyaniversity.com CIT-001: Fundamental of Computer Systems Fenaracestes| tan || wan | The connectivity of several branches Banking isan of MNCs such as example of MAN Proctor & Gamble . in-which multiple is an example of ith | Aa office wit branches in acity WAN. The vars such as Delhi are microwave satellite connected through | communication | public telephone system or an exchanges, and the internet | | | departments such | as personnel, | accounting, and | others located in S | Examples | the same building system is connection, a Ted vig | confected to each connects these | and connected via | ° jan other using LAN branches. Each | bus topology within each branch has its own | utilising Eanetaet branch, and Jocal area network. | cards isan example | isrecent branches | However, the | jofalAan. | are connected many LANs in | using modems and various branches | bridges. communicate with | | the head office via | a WAN link. 2.1.6 Hybrid Topology ‘Two or more topologies are merged to build a full network in a hybrid topology. A hybrid topology, for example, may be a blend of a star and a bus topology. They're also the most widely used. Several star topology networks are coupled to a bus connection in a star bus topology. If computer fails in this architecture, the rest of the network is unaffected. If the central component, or hub, that connects all of the computers in a star break, you'll have major issues because no computer will be able to communicate. Advantages * In the case of hybrid technology, network expansion is a breeze. www.gyaniversity.com Very High Probability Questions [fone client fails, the network as a whole does not go down, Disadvantages «When one hub dies, all connections to that hub fail as well, even if other hubs remain operational 2.1.7 Network Topology Define the terms network topology, physical topology, ang erecta ves) The pattern of connected devices is referred to as topology in computer networking, A network's topology can be thought of as its structure. This shape may or may not correspond to the actual physical layout of the network's devices. ‘The study of the layout or mapping of the elements (Links, nodes, etc.) of a network interaction between nodes is known as network topology. Topologies can be physical or conceptual, and they dictate the approach for physically growing the network in the future. ‘The physical architecture of a network, including the devices, placement, and cable installation, is referred to as physical topology. In contrast to its design, logical topology relates to how data actually moves through a network. The following are some things to think about when picking a topology: Costing: In terms of installation, some topologies may be less expensive than others (for example Bus topology). Length of Cable: In order to join machines in a network, itis required. Network Scalability: The topology should allow the network to expand in the future without incurring significant costs. Cable Types: Unshielded twisted pair, coaxial cable, and fibre optics are all examples of cable media. Unshielded twisted pair is the most common cable, and it's most commonly used with star topology. 2.1.8 Bus Topology ' Dee eL Cena Ure ete ee nel tade CET Elo 4 worn gyaniversty.com ey — ee C1T-001: Fundamental of Computer Systems {Abus topology is a centralised communication system to which all computers are tinked. As indicated in the diagram, it consists ofa single length of cable with a teqminator at each end. It's a passive topology, which implies that only one computer von send a message at a time, As a result, the number of computers connected to a bus erwork can ave a substantial impact on the network's speed. Before a computer can broadcast, it must first wait for the bus to become available. Each node is linked to the others. The network operating system oversees the flow of data between devices by keeping track of each node's unique address. Bus Topology ‘The bus topology is the most basic and commonly utilised in the architecture of local area networks. The topology of a bus is called a passive topology. On the bus, the computers continue to listen. They receive data that belongs to them when they hear it. When a device on the network wants to send a broadcast message to another device on the network, it first checks to see if anyone else on the bus is transmitting, then sends the information out over the medium. Although it is visible to all other devices on the network, only the intended recipient accepts and processes it. Data frames with source and destination addresses are used to do this. Advantages ® Ina tiny local area network, it is simple, stable, and simple to operate. © Ituses the least amount of cable to link computers and, as a result, is less expensive than other cabling methods. * Connectors make it simple to implement and extend. * If one of the bus's computers fails, it has no effect on the remainder of the Passengers. Disadvantages * No two computers can transfer data at the same time in this topology. * Itcannot handle well with big loads, which can significantly slow down a bus. * As more machines are added, performance suffers. * Both ends of the cable must have terminators. * It's difficult to change the configuration once it's been set up. www.gyaniversity.com

You might also like