CH-1 INTRODUCTION TO COMPUTER NETWORK
I. FILL IN THE BLANKS
1. The hostname command is used to display —————
Ans: name of the computer.
2. The length of a IPv4 and a IPv6 is ——— and ——— bytes respectively.
Ans:32 bit ; 128 bit
3. An access point is used to connect ——–
Ans: wireless network
4. The ping command is used to ——–
Ans: verify the connectivity between two computers
5. HTTPS transfer ———- data.
II. MULTIPLE CHOICE QUESTIONS:
1. Which device is required to connect multiple heterogeneous networks?
A) Hub B) Switch C) Router D) Access Point
Ans: C) Router
2. Which is the largest type of computer network?
A) PAN B) LAN C) MAN D) WAN
Ans: D) WAN
3. Which protocol transfers encrypted data instead of plain data?
A) HTTP B) HTTPS C) FTP D) SMTP
Ans: B) HTTPS
4. How many bytes are reserved for OUI in a MAC address?
A) 3 B) 8 C) 24 D) 12
Ans: C) 24
5. IP address can be automatically assigned if the network is connected with
A) Access Point B) Mail Server C) Web Server D) DHCP Server
Ans: D) DHCP Server
III. SHORT ANSWER QUESTIONS
1. Mention the name of components required to set up a MAN network. Draw a block diagram of a MAN network labeling name of each component. (Hint: MAN network is a connection of multiple LAN)
Ans: A Metropolitan Area Network is formed by interconnecting multiple LANS that are within a limited geographic area. MANS typically merge the networks of multiple organizations to establish communication among them or to share common resources. Most of the time Internet Service Providers set up MAN to provide a high speed internet connection to multiple organizations. Most of the time the physical connection from one organization to another organization is established using Optical Fiber Cable to achieve good quality of service.
2. Why hostname should not be used to identify a computer in a computer network?
Ans: Although a hostname can be used to identify a computer in a computer network, hostnames may not be unique always. It means, there is a possibility that two or more computers in a computer network may have the same hostname.
There are options to change the hostname of a computer independently. If two or more users assign the same hostname to their computers intentionally or unintentionally, it is become difficult to identify a computer. Therefore, if the hostnames are not initialized centrally, the hostname should not be considered as a unique identifier of a computer in a computer network.
3. Give five examples of valid and five examples of invalid IPv4 addresses. (Hint: Each segment of an IPv4 address has a fixed length)
Ans: IP (version 4) addresses are 32-bit integers that can be expressed in hexadecimal notation. Its common format is x.x.x.x, where each x can be any value between 0 and 255.
Five valid IPv4 addresses:
Five invalid IPv4 addresses:
1.1.1 (only 3 decimal numbers
1.1.1. (ending with a dot)
1.1.1.x (containing an alphabet)
184.108.40.2066 (decimal number exceeds 255)
172.8.-9.255 (negative decimal number)
4. Can we compare HTTP and FTP protocols? Mention their functionality.
Ans: The major difference between HTTP and FTP is that HTTP on request provides a web page from a web server to web browser. On the other hand, FTP is used to upload or download file between client and server.
5. How many 16 port switches are required to connect 31 computers in a network? (Hint: To connect all computers, all switches also should be connected among themselves)
Ans: Two 6 port switches are required to connect 31 computers in a network.
====== END ======