Computer Networking #5 -Questions and Answers

Computer Networking #5 -Questions and Answers

Today’s Question => What is a Network Protocol?

A network protocol can be viewed as a common network communication standard, which is used to define a method of exchanging data over a computer network. Network protocol define rules and conventions for communication between different devices, participating in a computer network.

Almost all protocols used in the Internet are common standards defined by RFC (Request for Comments).

Examples of standard network protocols are:-
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol),
IP (Internet Protocol),
ARP (Address Resolution Protocol),
HTTP (Hypertext Transfer Protocol),
FTP (File Transfer Protocol),
TFTP (Trivial File Transfer Protocol),
SMTP (Simple Mail Transfer Protocol),
SSH (Secure Shell),
Telnet etc.


Related Link
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
Computer Networking #1 -Questions and Answers

Devices participating in network communication should know about the common network protocol and communicate according to the way, defined by the network protocol. In other words, standard network protocol software must be running on both devices participating in network communication.

To explain it more clearly, if you are using your browser to browse web pages from a web server (example, www.gkaim.com), you are using a protocol called HTTP (Hypertext Transfer Protocol). Your computer must request web pages from web server using HTTP and the web server must response back to your computer using HTTP.

How HTTP (Hypertext Transfer Protocol) should work is defined as a common standard, RFC (Request for Comments). Anyone can follow the common standard and create their own Browser or Web server.

Important Questions of Computer Networking – CCNA are Listed Bellow (Part-5)


1- What is SAP?

Answer: Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

2- What are the possible ways of data exchange?

Answer: (i) Simplex (ii) Half-duplex (iii) Full-duplex.

3-Difference between the communication and transmission.

Answer:
Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc.

Communication means the meaning full exchange of information between two communication media.



Related Link
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
Computer Networking #1 -Questions and Answers

4- What is subnet?

Answer: A generic term for section of a large networks usually separated by a bridge or router.

5- What are the two types of transmission technology available?

Answer: (i) Broadcast and (ii) point-to-point

6- What do you meant by “triple X” in Networks?

Answer: The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called “triple X”

7- What is frame relay, in which layer it comes?

Answer: Frame relay is a packet switching technology. It will operate in the data link layer.

8- What is redirector?

Answer: Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.



Related Link
Computer Networking #4 -Questions and Answers
Computer Networking #3 -Questions and Answers
Computer Networking #2 -Questions and Answers
Computer Networking #1 -Questions and Answers

9- What is terminal emulation, in which layer it comes?

Answer: elnet is also called as terminal emulation. It belongs to application layer.

10- What is Beaconing?

Answer: The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.


Useful Link ,Visit once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science

Comment Please