Enlist the components of computer network. Describe any one in brief.

1 Answer

Answer :

The components of computer network are:

Hub

Router

Modem

Bridge

Switches

Network Interface Card

Cables and connectors

Crimping tool

LAN tester


Explanation:

1) HUB: Hub is a connecting device, it is also known as multiport repeater.

It is normally used for connecting stations in a physical star topology

All networks require a central location to bring media segments together.

These central locations are called hubs. A hub organizes the cables and relays signals to the other media segments. There are three main types of hubs:

1) Passive

2) Active

3) Intelligent

Passive Hubs: A passive hubs simply combines the signals of a network segments. There is no signal processing or regeneration. Apassive hub reduces the cabling distance by half because it does not boost the signals and in fact absorbs some of the signal. With the passive hub each computer receives the signal sent from all the other computers connected to the hub.


Active hubs: They are like passive hubs but have electronic components for regeneration and amplification of signals. by using active hubs the distance between devices can be increased.

The main drawback of active hubs is that the amplify noise along with the signals. They are also much expensive than passive hubs.

Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network management and intelligent path selection. One advantage to this is that all transmission media segment can be connected permanently because each segment will be used only when a signal is sent to a device using that segment.


image

2) ROUTER: Router is a device that connects 2 or more networks. It consist of hardware and software .hardware includes the physical interfaces to the various networks in the internetwork. Software in a router is OS and routing protocols management software. 1) Router use logical and physical addressing to connect two or more logically separate networks. 2) They accomplish this connection by organizing the large network into logical network called subnets. 3) Each of the subnet is given a logical address. This allows the network to be separate but still access to each other and exchange data. 4) Data is grouped into packets. Each packet has physical device address and logical network address.


image

3) MODEM: Modem works as modulator as well as demodulator. Modem converts analog signal to digital signal and vice versa. In case of networking data has to be transferred from one location to another location. At present to transfer such data whatever the infrastructure(PSTN) is available .it is of analog technology but computer sends digital data to transfer this data to another location it is needed to convert into analog format so that it can be transferred by using currently available infrastructure. 


image

Related questions

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : Enlist different types of computer networks on the basis of their geography. 

Last Answer : Classification of networks based on geography LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network CAN - Campus Area Network PAN - Personal Area Network

Description : Enlist different types of servers.

Last Answer : Different types of servers are: Definition of server: The central computer which is more powerful than the clients which allows the clients to access its software, database is called as the server. Types of server: 1. File server 2. Print server 3. Application server 4. Mail server

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ............ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Which is not the Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : C) i-c, ii-a, iii-d, iv-b

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : Europeans Registry for Internet Numbers (ERIN)

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : State features of any one network control devices. 

Last Answer : A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, ... transforms incoming analog signals into their digital equivalents. A two way communication is established.

Description : State the situations under which gateways are necessary in the network.

Last Answer : Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have same function of communication. Situation where gateways are necessary ... case of different frame sizes, data rates, format, acknowledgement schemes, and priority schemes tec.

Description : Discuss any four network features.

Last Answer : 1) File sharing: File sharing is the primary feature of network. Due to use of networks, the sharing of files becomes easier. File sharing requires a shared directory or disk drive to which ... has internet services such as FTP servers or Usenet servers. 7) Network security: Internal & External

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : Compare Server based network and peer-to-peer network.

Last Answer : Compare Server based network & Peer to Peer network Server based network Peer to Peer 1. It is much like company uses centralized management. 1. It is much like company uses ... 7.It support small Network 8.Better performance 8.Might hurt user's performance

Description : State the need for computer networks. 

Last Answer : Need for computer network: File/Folder Sharing Hardware Sharing (Resource sharing) Application sharing User Communication (Email, Remote Access)

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Windows 7 asks for network password when trying to share a folder.

Last Answer : answer:“I didn’t set one” Try setting a PW on the master entrance, then try what you are doing again.

Description : Sending messages to devices on my network.

Last Answer : What kind of “messages” were you looking to send? Even though they might all be connected to a single wireless network, they still each have their own protocol for “messages”.

Description : What could be wrong with my network or ISP?

Last Answer : Check for a trojan or root kit virus. When your system is being used as a bot and busily sending email for a spammer it does tend to slow down.

Description : Find the Norton equivalent resistance for the network shown in Fig No. 2

Last Answer : Solution: To find Norton’s equivalent resistance removing voltage source and current source. Voltage source is replaced by short circuit and current source is replaced by open circuit so, we get circuit as

Description : A linear network has a current input 4cos(ω t + 20º)A and a voltage output 10 cos(ωt +110º) V. Determine the associated impedance.

Last Answer : Solution

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Last Answer : Any electric network may be defined as a combination of a number of electric elements.

Description : What is active and passive network?

Last Answer : Active network is a network which contain one or more than one EMF source. An active network consists of an active element like battery or transistor. Passive network is a ... contain any source of energy. Passive network consists of passive element like resistance, inductance and capacitance.

Description : What do you mean by bilateral network and unilateral network?

Last Answer : Bilateral Network: An element whose response is independent of direction of current flowing through it is called Bilateral element and the network, which contains only bilateral elements, is called ... response depends on the direction of current flowing through it, is called unilateral network.

Description :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be A) 3 B) 2 C) 4 D) 5 

Last Answer :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be 3 

Description : Generally in a power system network, the load is represented as a :  (A) Constant power in both load flow study and in stability study  (B) Constant power in load flow study and constant ... impedance in load flow study  (D) Constant impedance in both load flow study and in stability study

Last Answer : Generally in a power system network, the load is represented as a : Constant power in load flow study and constant impedance in stability study 

Description : The number of independent loops for a network with n nodes and b branches is

Last Answer : The number of independent loops for a network with n nodes and b branches is b-n+1

Description : A network contains linear resistors and ideal voltage sources. If values of all the resistors are doubled then the voltage across each resistor will

Last Answer : A network contains linear resistors and ideal voltage sources. If values of all the resistors are doubled then the voltage across each resistor will not change

Description : A network that consists of at least a voltage source or current source is called A) Active network B) Ideal network C) Sourced network D) Outsourced network

Last Answer : A network that consists of at least a voltage source or current source is called Active network