Discuss any four network features.

1 Answer

Answer :

1) File sharing: File sharing is the primary feature of network. Due to use of networks, the sharing of files becomes easier. File sharing requires a shared directory or disk drive to which many users can access over the network. When many users are accessing the same file on the network, more than one person can make changes to a file at the same time. They might both making conflicting changes simultaneously.

2) Printer sharing: Printer sharing is beneficial to many users as they can share costly & higher quality printers. Printer sharing can be done in several different ways on network. The most common way is to use printer queues on server. The printer queue holds print job until any currently running print jobs are finished & then automatically send the waiting jobs to the printer i.e. printer connected to server. Another way to share printer on a network is that each

workstations accesses the printer directly.

3) Application services: You can also share application on a network. For example you can have a shared copy of Microsoft office or some other application & keep it on the network server.

Another application services you can have on the network is shared installation i.e. contents of CD-ROM copy to the server, then run the installation the installing application mush faster & more convenient.

4) E- mail services :E-mail is extremely valuable & important feature for communication within organization or outside the people in world. E-mail service can be used by user in two different ways : 1. File based 2.Client

File based e-mail system requires gateway server for connecting or handling the e-mail interface between the two systems using gateway software that is part of the file-based e-mail system.

A client-server e-mail system is one where an e-mail server containing the messages & handles all incoming & outgoing mail. It is more secure & powerful than file based e-mail system.

5) Remote access: Using this feature user can access their file & e-mail, when they are travelling or working on remote location. It enables users to access to centralized application, stored private or shared files on LAN.

6) Internet & Intranet: Internet: It is public network. This consists of thousands of individual networks & millions of computers located around the world. Internets have many different types of services available such as e-mail, the web & Usenet newsgroups.

Intranet: It is private network or it is company‟s own network. Company use this feature for internal use. For example: company establish its own web server, for placing documents such as employee handbooks, purchases form or other information that company publishes for internal use. It also has internet services such as FTP servers or Usenet servers.

7) Network security: Internal & External

Related questions

Description : State features of any one network control devices. 

Last Answer : A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, ... transforms incoming analog signals into their digital equivalents. A two way communication is established.

Description : State four features of Wi-Fi.

Last Answer : Wi-Fi 1. Wi-Fi stands for wireless fidelity. 2. Wi-Fi typically provides local network access for around a few hundred feet with speeds of up to 54 Mbps. 3. Wi-Fi based on IEEE 802.11 standards. 4. High Capacity Load Balancing 5. Scalability 6. Network Management System

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : Why layered architecture is used in OSI reference model? Discuss.

Last Answer : The OSI reference model is as shown in the figure.There are seven layers in the model. Physical layer, Data link layer, Network layer, Transport layer, Session layer, Presentation layer, ... the entire package is converted to a form that can be transferred to the receiving machine. 

Description : Discuss the role of the HUB. Differentiate between Active Hub and Passive Hub.

Last Answer : HUB: Hub is a connecting device; it is also known as multiport repeater. It is normally used for connecting stations in a physical star topology All networks require a central location to bring media segments ... . They are much expensive than passive hubs. 4. They are not much expensive.

Description : Discuss hybrid topology with suitable diagram. 

Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.

Description : Give two features of IPv6. 

Last Answer : Two features of IPv6 are: An IPv6 address consists of 16 bytes (octets) It is 128 bits long. IPv6 specifies hexadecimal colon notation. Therefore, the address consists of 32 hexadecimal ... multicast. In an IPv6 address, the variable type prefix field defines the address type or purpose.

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ............ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Which is not the Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : C) i-c, ii-a, iii-d, iv-b

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : Europeans Registry for Internet Numbers (ERIN)

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : State the situations under which gateways are necessary in the network.

Last Answer : Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have same function of communication. Situation where gateways are necessary ... case of different frame sizes, data rates, format, acknowledgement schemes, and priority schemes tec.

Description : Enlist the components of computer network. Describe any one in brief.

Last Answer : The components of computer network are: Hub Router Modem Bridge Switches Network Interface Card Cables and connectors Crimping tool LAN tester Explanation ... into analog format so that it can be transferred by using currently available infrastructure. 

Description : Compare Server based network and peer-to-peer network.

Last Answer : Compare Server based network & Peer to Peer network Server based network Peer to Peer 1. It is much like company uses centralized management. 1. It is much like company uses ... 7.It support small Network 8.Better performance 8.Might hurt user's performance

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : Windows 7 asks for network password when trying to share a folder.

Last Answer : answer:“I didn’t set one” Try setting a PW on the master entrance, then try what you are doing again.

Description : Sending messages to devices on my network.

Last Answer : What kind of “messages” were you looking to send? Even though they might all be connected to a single wireless network, they still each have their own protocol for “messages”.

Description : What could be wrong with my network or ISP?

Last Answer : Check for a trojan or root kit virus. When your system is being used as a bot and busily sending email for a spammer it does tend to slow down.

Description : Find the Norton equivalent resistance for the network shown in Fig No. 2

Last Answer : Solution: To find Norton’s equivalent resistance removing voltage source and current source. Voltage source is replaced by short circuit and current source is replaced by open circuit so, we get circuit as

Description : A linear network has a current input 4cos(ω t + 20º)A and a voltage output 10 cos(ωt +110º) V. Determine the associated impedance.

Last Answer : Solution

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Last Answer : Any electric network may be defined as a combination of a number of electric elements.

Description : What is active and passive network?

Last Answer : Active network is a network which contain one or more than one EMF source. An active network consists of an active element like battery or transistor. Passive network is a ... contain any source of energy. Passive network consists of passive element like resistance, inductance and capacitance.

Description : What do you mean by bilateral network and unilateral network?

Last Answer : Bilateral Network: An element whose response is independent of direction of current flowing through it is called Bilateral element and the network, which contains only bilateral elements, is called ... response depends on the direction of current flowing through it, is called unilateral network.

Description :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be A) 3 B) 2 C) 4 D) 5 

Last Answer :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be 3 

Description : Generally in a power system network, the load is represented as a :  (A) Constant power in both load flow study and in stability study  (B) Constant power in load flow study and constant ... impedance in load flow study  (D) Constant impedance in both load flow study and in stability study

Last Answer : Generally in a power system network, the load is represented as a : Constant power in load flow study and constant impedance in stability study 

Description : The number of independent loops for a network with n nodes and b branches is

Last Answer : The number of independent loops for a network with n nodes and b branches is b-n+1