Explain four features of computer networks.

1 Answer

Answer :

A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. 

Features of computer network:

Network features:

Following are the features of network:

1. File Sharing

2. Printer Sharing

3. Application Services

4. E-Mail

5. Remote Access.

File sharing:

File sharing is the primary reason to have a network.

Before networking, computers become a popular way of sharing files, if you want to transfer a file from one computer to another; you would save the file to a floppy disk & walk it over to the other computer.

File sharing requires a shared directory or disk drive to which many users can access over the network.

When many users are accessing the same file on network, more than one person can make changes to a file at the same time.

Additionally, Network operating systems that perform file sharing also administer the security of these shared files.

Advantages:

1. Easily share information on network.

2. User needs regular access of word processing files, spreadsheets so they access easily.

Disadvantages:

1. Conflicting problem arises.

2. Less secure if permission not set proper.

Printer sharing:

Printer sharing enables you to reduce the number of printer s you need & also enables you to offer much higher quality printer.

Printer sharing can be done in several different ways on network.

The most common way is to use printer queues on server.
The printer queue holds print job until any currently running print jobs are
finished and then automatically send the waiting job to the printer.
Another way to share printer on network is that each workstation accesses the printer directly (Network Printer), but each must wait its turn.
network printer that use printer queue always have a print server that handles the job of sending each print job to the printer in turn
the print server function can be filed in a number of ways:-
- By a file server with a printer connected directly to it.
- By computer connected to the network with the printer connected to that computer.
Advantages:
1. Reduce number of printer.
2. Reduce cost.
Disadvantages:
1. Reduce server performance if printer connected to server.
2. Each user must wait its turn.
Application services:
Just as file sharing, applications can also be shared on network.
You can share copy of application & keeping it on the network server, from where it is also run.
When a workstation wants to run the program, it loads the file from the network into its own memory.
Keeping application centralized reduces the amount of disk space needed on each workstation. It is easier to administer the application.
Advantage:
1. Reduces the amount of disk space needed on each workstation.
2. Centralized administration, so more security and reliability.
3. Installation of software on each workstation without CD-ROM.
4. Installing application on workstation is much faster and more convenient.
5. Reduce cost.
Disadvantage:
1. It increases network traffic on network.
2. If server fail or crash, then workstation is useless on network.
3. Requires network license copy for application software or business software.
E-mail:
E-mail is extremely valuable and important feature for communication within organization or outside the people in word.
E-mail service can be used by user in two different ways:
a. File based
b. Client server.
File based e-mail system is consists of a set of files kept in a shared location on a server.
File based e-mail system requires gateway server for connecting or handling the e-mail interface between the two system using gateway software that is part of the file based e-mail system.
In a Client-server e-mail system, an e-mail server contains the message and handles all incoming and outgoing mail.
Client-server e-mail systems are more secure and powerful than File based e-mail system.
Advantage:
1. Helpful for communication within a company or outside a company.
2. Faster communication.
Disadvantage:
1. Network becomes unreliable due to viruses.
2. Require more security mechanism.
Remote access:
Another important service for most networks is remote access to the network users’ use this feature to access their files & e-mail.
When they are traveling or working from a remote location such as their homes.
Using this feature user can access their files and e-mail, when they are travelling or working on remote location.
Some of the methods to provide remote access feature can be implemented as follows :
1. Using modem
2. Using dial-up mechanism
3. Setting up VPN
Advantages:
1. User access their files and e-mails from remote location.
2. It enables user’s access to centralized application, stored private or shared files on LAN.
Disadvantages:
1. Require more security.
2. More hardware or complex hardware required.
Technologies:
1. Public Switched Telephone Network (PSTN).
2. Leased line.
3. Integrated Services Digital Network (ISDN).
4. Cable TV.
5. Digital Subscriber Line (DSL).

Related questions

Description : State the need for computer networks. 

Last Answer : Need for computer network: File/Folder Sharing Hardware Sharing (Resource sharing) Application sharing User Communication (Email, Remote Access)

Description : Enlist different types of computer networks on the basis of their geography. 

Last Answer : Classification of networks based on geography LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network CAN - Campus Area Network PAN - Personal Area Network

Description : State four features of Wi-Fi.

Last Answer : Wi-Fi 1. Wi-Fi stands for wireless fidelity. 2. Wi-Fi typically provides local network access for around a few hundred feet with speeds of up to 54 Mbps. 3. Wi-Fi based on IEEE 802.11 standards. 4. High Capacity Load Balancing 5. Scalability 6. Network Management System

Description : Discuss any four network features.

Last Answer : 1) File sharing: File sharing is the primary feature of network. Due to use of networks, the sharing of files becomes easier. File sharing requires a shared directory or disk drive to which ... has internet services such as FTP servers or Usenet servers. 7) Network security: Internal & External

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : Give two features of IPv6. 

Last Answer : Two features of IPv6 are: An IPv6 address consists of 16 bytes (octets) It is 128 bits long. IPv6 specifies hexadecimal colon notation. Therefore, the address consists of 32 hexadecimal ... multicast. In an IPv6 address, the variable type prefix field defines the address type or purpose.

Description : State features of any one network control devices. 

Last Answer : A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, ... transforms incoming analog signals into their digital equivalents. A two way communication is established.

Description : What's the deal with the cellular networks around Dallas today?

Last Answer : answer:Just a wild guess, but perhaps it's due to a solar storm. However, the following excerpt causes me to doubt the veracity of the above source: Simply said the earth will soon start ... Milky Way around 12.21.12. However, the relevant assertion of the source is apparently corroborated here.

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : Enlist the components of computer network. Describe any one in brief.

Last Answer : The components of computer network are: Hub Router Modem Bridge Switches Network Interface Card Cables and connectors Crimping tool LAN tester Explanation ... into analog format so that it can be transferred by using currently available infrastructure. 

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : Explain handoff procedure in mobile communication.

Last Answer : Assume that there is a call going on between two parties over a voice channel. When the mobile unit moves out of coverage area of a particular cell site the reception becomes weak. Then the cell ... arranges the handoff requests in a queue instead of rejecting them, if the new cell sites are busy.

Description : Explain the architecture of Bluetooth technology with suitable diagram.

Last Answer : Bluetooth is short range wireless technology. Range of Bluetooth is 10 meters. Bluetooth Architecture defines 2 types of networks. 1)Piconet 2)Scatternet Piconet: - It is a Bluetooth network that ... . This node is called bridge slave. This node cannot be the master of two piconets.

Description : Explain Satellite communication with neat diagram

Last Answer : SATELLITE COMMUNICATION: In satellite communication, signal transferring between the sender and receiver is done with the help of satellite. In this process, the signal which is basically a beam ... of satellite: Satellite television digital cinema satellite radio satellite internet access

Description : Explain the function of each layer of OSI reference model with neat diagram.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization) Function of OSI model: i. It provides way to understand how internetwork operates. ... Network virtual terminal file transfer access and management mail services and directory services

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Explain connectionless and connection oriented protocol. Give the example for each type.

Last Answer : Connection less protocol: These protocols do not establish a connection between devices. It is manually achieved by transmitting information in one direction, from source to destination without checking to ... SMTP establish a TCP connection between Sender And port number 25 of receiver

Description : Explain different modes of fibre optic cable.

Last Answer : Current technology supports two modes for propagating light along optical channels. 1. Multimode. 2. Single mode.  Multimode can be implemented in two form:  1. Step ... All the beams arrive at the destination together and can be recombined with little distortion to the signal.

Description : Explain horizontal and vertical communication.

Last Answer : Horizontal communication Fig: Horizontal Communication in OSI Model. 1) The horizontal communication is the logical connection between the layers, there is no direct communication ... communication, it becomes protocol at each layer simultaneously. Fig:Vertical communication

Description : Explain sub-netting and super-netting with example.

Last Answer : Sub-netting:subnet mask is a net mask with the only real difference being that breaking a larger network into smaller parts and each smaller section will use different sets of address ... address) AND 11111111.11111111.11111100.00000000 (supernet mask) Returns 11000000.10101000.01000000.00000000

Description : Draw and explain fiber optic cable.

Last Answer : As shown in the figure, at the center is the glass core through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core is ... be fused to form a solid connection. A fusion splice is almost as good as a single drawn fiber.

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : Explain encapsulation with example.

Last Answer : Each layer in the layered architecture provides service to the layers which are directly above and below it. The outgoing information will travel down through the layers to the lowest layer. While ... to each packet obtained from layer 3 and pass it to layer 1 for physical transmission. 

Description : Explain PAN with suitable diagram. Differentiate between PAN and CAN.

Last Answer : A personal area network(PAN) is a network organized around an individual person. A PAN can also be used for communication among personal devices themselves(interpersonal communication).PAN network can be ... used for personal communication. 4. CAN is mainly used for corporate campuses.

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : Draw and explain Co-axial cable.

Last Answer : Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield) acts not ... building where a number of twists and turns are required.  4. limited to size of network.

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv