This document summarizes key concepts from a computer networks lecture on the application layer, including:
- Cookies are small text files stored on a user's computer that allow websites to recognize the user and track preferences.
- Web caches (proxy servers) satisfy HTTP requests on behalf of origin servers to reduce response time and traffic on access links.
- FTP uses TCP connections to transfer files between clients and servers, with separate control and data connections.
- Email systems use SMTP over TCP to transfer messages between mail servers, which store messages in user mailboxes accessed with POP3 or IMAP.
- DNS is a distributed database that translates human-friendly domain names to IP addresses using a hierarchy of
A mail server is a computer that handles email delivery. It implements the client and server portions of SMTP to reliably transfer messages between servers using TCP on port 25. A mail server stores users' incoming emails in their mailboxes and queues outgoing messages to be sent. IMAP and POP3 are additional protocols that allow users to access their mailboxes to read and manage messages.
A mail server is a computer that handles email delivery. It implements the client and server portions of SMTP to reliably transfer messages between servers using TCP port 25. A mail server stores users' incoming emails in their mailboxes and queues outgoing messages to be sent. The major components of electronic mail systems are user agents for composing/reading mail, mail servers for message storage and transfer using SMTP, and protocols like POP3 and IMAP for users to access their mailboxes.
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
The document discusses the application layer of the OSI model and common application layer protocols. It describes how protocols like HTTP, SMTP, POP, FTP, and SMB allow end-user applications to transfer files, emails and web pages across the network. DNS and DHCP are also covered as they provide important network services like translating domain names to IP addresses and assigning IP configuration to devices.
The document introduces SMTP (Simple Mail Transfer Protocol) and how it works to transfer emails between servers and clients. It discusses setting up an SMTP server and related issues like using SMTP to send emails to free email services and where to obtain a free SMTP server address.
The document discusses application layer protocols and services. It describes how the application, session, and presentation layers work together to provide network services to end user applications. It provides examples of common application layer protocols like HTTP, SMTP, POP, and IMAP and how they enable services like web browsing and email. It also discusses protocols that provide IP addressing services like DNS and DHCP. The document outlines objectives for explaining application layer protocols, how they interact with applications, well-known examples, and how data moves across the network.
The document discusses computer networks and email. It describes how DNS works by converting domain names to IP addresses so humans can access websites using names instead of numbers. It then explains the basic architecture of email, including common email providers and protocols like SMTP, POP, and IMAP. SMTP is used to transfer messages between servers, while POP and IMAP deal with receiving and accessing emails from the server. The document also provides details on email message format, with the header containing sender/recipient info and the body containing the actual content.
A server algorithm that combines delayed allocation and pre-allocation can limit maximum concurrency levels. Delayed allocation reserves disk space for files but writes data to disk periodically rather than immediately. Pre-allocation reserves additional disk blocks upfront. To limit concurrency, the server restricts the number of concurrent client connections or operations that can be processed simultaneously.
This document summarizes key concepts from a computer networks lecture on the application layer, including:
- Cookies are small text files stored on a user's computer that allow websites to recognize the user and track preferences.
- Web caches (proxy servers) satisfy HTTP requests on behalf of origin servers to reduce response time and traffic on access links.
- FTP uses TCP connections to transfer files between clients and servers, with separate control and data connections.
- Email systems use SMTP over TCP to transfer messages between mail servers, which store messages in user mailboxes accessed with POP3 or IMAP.
- DNS is a distributed database that translates human-friendly domain names to IP addresses using a hierarchy of
A mail server is a computer that handles email delivery. It implements the client and server portions of SMTP to reliably transfer messages between servers using TCP on port 25. A mail server stores users' incoming emails in their mailboxes and queues outgoing messages to be sent. IMAP and POP3 are additional protocols that allow users to access their mailboxes to read and manage messages.
A mail server is a computer that handles email delivery. It implements the client and server portions of SMTP to reliably transfer messages between servers using TCP port 25. A mail server stores users' incoming emails in their mailboxes and queues outgoing messages to be sent. The major components of electronic mail systems are user agents for composing/reading mail, mail servers for message storage and transfer using SMTP, and protocols like POP3 and IMAP for users to access their mailboxes.
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
The document discusses the application layer of the OSI model and common application layer protocols. It describes how protocols like HTTP, SMTP, POP, FTP, and SMB allow end-user applications to transfer files, emails and web pages across the network. DNS and DHCP are also covered as they provide important network services like translating domain names to IP addresses and assigning IP configuration to devices.
The document introduces SMTP (Simple Mail Transfer Protocol) and how it works to transfer emails between servers and clients. It discusses setting up an SMTP server and related issues like using SMTP to send emails to free email services and where to obtain a free SMTP server address.
The document discusses application layer protocols and services. It describes how the application, session, and presentation layers work together to provide network services to end user applications. It provides examples of common application layer protocols like HTTP, SMTP, POP, and IMAP and how they enable services like web browsing and email. It also discusses protocols that provide IP addressing services like DNS and DHCP. The document outlines objectives for explaining application layer protocols, how they interact with applications, well-known examples, and how data moves across the network.
The document discusses computer networks and email. It describes how DNS works by converting domain names to IP addresses so humans can access websites using names instead of numbers. It then explains the basic architecture of email, including common email providers and protocols like SMTP, POP, and IMAP. SMTP is used to transfer messages between servers, while POP and IMAP deal with receiving and accessing emails from the server. The document also provides details on email message format, with the header containing sender/recipient info and the body containing the actual content.
A server algorithm that combines delayed allocation and pre-allocation can limit maximum concurrency levels. Delayed allocation reserves disk space for files but writes data to disk periodically rather than immediately. Pre-allocation reserves additional disk blocks upfront. To limit concurrency, the server restricts the number of concurrent client connections or operations that can be processed simultaneously.
This document discusses two common protocols for retrieving email from a server: POP3 and IMAP. POP3 allows a user to download emails from the server to their local device but does not support server-side functionality. IMAP allows users to access and manipulate emails stored on the server, avoiding delays from downloading. While POP3 is more widely used currently, IMAP offers advantages like folder management and searching that make it a preferable protocol.
This document discusses several internet protocols including TCP, IP, UDP, SMTP, POP3, IMAP, HTTP, HTTPS, IGMP, ICMP, FTP, Telnet, and NTP. It provides brief explanations of what each protocol is used for, such as TCP being the backbone of internet communication and establishing connections between programs to exchange data, IP addressing packets for delivery, SMTP and POP3 protocols for sending and receiving emails, and HTTP and HTTPS for transmitting web pages in a secure or non-secure manner. The document also touches on protocols like UDP for small data packets, FTP for file transfers, IGMP for multicasting, ICMP for error messages, Telnet for text-based connections, and NTP for clock synchronization
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
This document provides information about courses and tutorials offered by WEIT Tutorials located in Thane, India. The tutorials cover various computer science and engineering courses including BSC, MCA, and engineering degrees. Contact information including the address, phone numbers, and social media links are provided to stay connected for updates and study notes.
This document discusses electronic mail (e-mail) and how it works. It describes the key components of an e-mail system including user agents, message transfer agents, and message access agents. It explains the store-and-forward model that modern e-mail uses to send and receive messages between users. It also outlines the main protocols used for e-mail - SMTP for sending messages between servers, and POP3 or IMAP for users to access their messages. IMAP is generally preferred as it allows accessing and organizing messages from multiple devices.
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
The document summarizes several internet protocols used for communication over IP networks:
SMTP is used for email transmission and uses TCP port 25. It allows for mail, recipient, and data commands in a transaction. POP and IMAP are used for retrieving email from servers, with POP deleting emails from the server and IMAP leaving them on the server. HTTP is the underlying protocol for the web and uses port 80. FTP uses ports 20 and 21 for data and control connections. PGP provides encryption for email. Client-server and n-tier architectures partition tasks between clients and servers. Multiple protocols are needed for complex network communication due to hardware failures, congestion, and other issues.
This is the mini project "Email sending software", using python language.
.......................................................................................................................
......................................................................................................................
/....................................................................../..............................................
.................................................................../..................................................
SMTP (Simple Mail Transfer Protocol) is an Internet standard protocol for electronic mail transmission. It was first defined in 1982 and became widely used in the early 1980s as a complement to UUCP mail. SMTP uses a client-server model where the client initiates a connection and sends messages to the server, which then acknowledges receipt. It allows messages to be transferred between machines that are intermittently connected. Common SMTP commands include HELO, MAIL FROM, RCPT TO, DATA, QUIT, and RSET. SMTP can be secured using SSL/TLS to encrypt the communication channel. The latest developments include supporting real-time dynamic content in emails and internationalized email addresses encoded in UTF-8.
This document discusses various topics related to computer networking including protocols, sockets, IP addresses, URLs, reading web page source code, downloading files from the internet, TCP/IP and UDP servers and clients, file servers and clients, two-way communication between servers and clients, and sending simple emails. It provides information on networking hardware and software, protocols like TCP/IP and UDP, socket programming, parsing URLs, creating servers and clients, and sending/receiving data over networks.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
Chapter 10: Objectives
--------------------------------------------------
By the end of this chapter, you will be able to:
Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
Describe how common application layer protocols interact with end user applications.
Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol.
Explain how data is moved across the network, from opening an application to receiving data.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
This document provides information about the Networks Laboratory course offered at Anjalai Ammal Mahalingam Engineering College. It includes the syllabus, list of experiments, objectives and outcomes of the course. The course aims to teach students socket programming, simulation tools, and hands-on experience with networking protocols. Some key experiments include implementing stop-and-wait and sliding window protocols, socket programming, simulating ARP/RARP, PING and traceroute, and studying routing algorithms. The course is intended to help students use simulation tools, implement protocols, and analyze network performance and routing.
This document discusses how web performance impacts business metrics and provides recommendations for optimization. It begins by showing how small improvements in page load time (e.g. from 6 seconds to 1.2 seconds) led to large increases in revenue and traffic for Shopzilla. Similarly, Amazon saw a 1% drop in sales for every 100ms increase in latency. The document then examines factors that impact web performance like DNS lookups, connections, wait times, and loading content. It provides tips for optimization like reducing payload sizes and leveraging caching. Throughout, it emphasizes the importance of monitoring and troubleshooting performance issues.
HTTP and SMTP are application layer protocols used for communication over the internet. HTTP is used for retrieving and viewing web pages through a request-response conversation between a web client and server. SMTP is used for sending email and defines commands for mail servers to transfer messages between each other or to email clients. Both protocols establish rules for the format and content of messages to allow application programs to communicate without needing to understand the underlying network layers.
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
The document provides an overview of how the Internet works by explaining key concepts like internet addresses, protocol stacks, packets, networking infrastructure, domain names, and various protocols. It begins with an introduction to IP addresses and how computers connect to the internet. It then discusses how data is broken into packets and transmitted using layered protocol stacks. The document outlines the physical infrastructure of the internet including routers, backbones, and internet exchange points. It also explains how domain names are resolved to IP addresses via the domain name system. Finally, it briefly discusses several important internet protocols like HTTP, TCP, and IP.
SMTP (Simple Mail Transfer Protocol) is used to transfer email between servers over the Internet. It is a push protocol that allows email clients to send messages to SMTP servers, which then forward the messages to their destinations. SMTP uses port 25 and involves establishing a TCP connection between a client and server, with the client sending commands and the server sending responses to transfer the message.
The document provides a high-level overview of how the Internet works by explaining key concepts like Internet addresses (IP addresses), protocol stacks, packets, networking infrastructure, and domain names. It describes how computers on the Internet are assigned unique IP addresses and how messages are broken into packets that travel through a protocol stack consisting of application, transport, internet and hardware layers. It also outlines the physical infrastructure that connects computers, including connections to internet service providers, backbones, routers and network access points that packets traverse to reach their destination address on another computer connected to the Internet.
5 Common Mistakes to Avoid During the Job Application Process.pdfAlliance Jobs
The journey toward landing your dream job can be both exhilarating and nerve-wracking. As you navigate through the intricate web of job applications, interviews, and follow-ups, it’s crucial to steer clear of common pitfalls that could hinder your chances. Let’s delve into some of the most frequent mistakes applicants make during the job application process and explore how you can sidestep them. Plus, we’ll highlight how Alliance Job Search can enhance your local job hunt.
A Guide to a Winning Interview June 2024Bruce Bennett
This webinar is an in-depth review of the interview process. Preparation is a key element to acing an interview. Learn the best approaches from the initial phone screen to the face-to-face meeting with the hiring manager. You will hear great answers to several standard questions, including the dreaded “Tell Me About Yourself”.
More Related Content
Similar to unit-5-final-cn-unit-5-notes-important-questions.pdf
This document discusses two common protocols for retrieving email from a server: POP3 and IMAP. POP3 allows a user to download emails from the server to their local device but does not support server-side functionality. IMAP allows users to access and manipulate emails stored on the server, avoiding delays from downloading. While POP3 is more widely used currently, IMAP offers advantages like folder management and searching that make it a preferable protocol.
This document discusses several internet protocols including TCP, IP, UDP, SMTP, POP3, IMAP, HTTP, HTTPS, IGMP, ICMP, FTP, Telnet, and NTP. It provides brief explanations of what each protocol is used for, such as TCP being the backbone of internet communication and establishing connections between programs to exchange data, IP addressing packets for delivery, SMTP and POP3 protocols for sending and receiving emails, and HTTP and HTTPS for transmitting web pages in a secure or non-secure manner. The document also touches on protocols like UDP for small data packets, FTP for file transfers, IGMP for multicasting, ICMP for error messages, Telnet for text-based connections, and NTP for clock synchronization
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
This document provides information about courses and tutorials offered by WEIT Tutorials located in Thane, India. The tutorials cover various computer science and engineering courses including BSC, MCA, and engineering degrees. Contact information including the address, phone numbers, and social media links are provided to stay connected for updates and study notes.
This document discusses electronic mail (e-mail) and how it works. It describes the key components of an e-mail system including user agents, message transfer agents, and message access agents. It explains the store-and-forward model that modern e-mail uses to send and receive messages between users. It also outlines the main protocols used for e-mail - SMTP for sending messages between servers, and POP3 or IMAP for users to access their messages. IMAP is generally preferred as it allows accessing and organizing messages from multiple devices.
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
The document summarizes several internet protocols used for communication over IP networks:
SMTP is used for email transmission and uses TCP port 25. It allows for mail, recipient, and data commands in a transaction. POP and IMAP are used for retrieving email from servers, with POP deleting emails from the server and IMAP leaving them on the server. HTTP is the underlying protocol for the web and uses port 80. FTP uses ports 20 and 21 for data and control connections. PGP provides encryption for email. Client-server and n-tier architectures partition tasks between clients and servers. Multiple protocols are needed for complex network communication due to hardware failures, congestion, and other issues.
This is the mini project "Email sending software", using python language.
.......................................................................................................................
......................................................................................................................
/....................................................................../..............................................
.................................................................../..................................................
SMTP (Simple Mail Transfer Protocol) is an Internet standard protocol for electronic mail transmission. It was first defined in 1982 and became widely used in the early 1980s as a complement to UUCP mail. SMTP uses a client-server model where the client initiates a connection and sends messages to the server, which then acknowledges receipt. It allows messages to be transferred between machines that are intermittently connected. Common SMTP commands include HELO, MAIL FROM, RCPT TO, DATA, QUIT, and RSET. SMTP can be secured using SSL/TLS to encrypt the communication channel. The latest developments include supporting real-time dynamic content in emails and internationalized email addresses encoded in UTF-8.
This document discusses various topics related to computer networking including protocols, sockets, IP addresses, URLs, reading web page source code, downloading files from the internet, TCP/IP and UDP servers and clients, file servers and clients, two-way communication between servers and clients, and sending simple emails. It provides information on networking hardware and software, protocols like TCP/IP and UDP, socket programming, parsing URLs, creating servers and clients, and sending/receiving data over networks.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
Chapter 10: Objectives
--------------------------------------------------
By the end of this chapter, you will be able to:
Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
Describe how common application layer protocols interact with end user applications.
Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol.
Explain how data is moved across the network, from opening an application to receiving data.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
This document provides information about the Networks Laboratory course offered at Anjalai Ammal Mahalingam Engineering College. It includes the syllabus, list of experiments, objectives and outcomes of the course. The course aims to teach students socket programming, simulation tools, and hands-on experience with networking protocols. Some key experiments include implementing stop-and-wait and sliding window protocols, socket programming, simulating ARP/RARP, PING and traceroute, and studying routing algorithms. The course is intended to help students use simulation tools, implement protocols, and analyze network performance and routing.
This document discusses how web performance impacts business metrics and provides recommendations for optimization. It begins by showing how small improvements in page load time (e.g. from 6 seconds to 1.2 seconds) led to large increases in revenue and traffic for Shopzilla. Similarly, Amazon saw a 1% drop in sales for every 100ms increase in latency. The document then examines factors that impact web performance like DNS lookups, connections, wait times, and loading content. It provides tips for optimization like reducing payload sizes and leveraging caching. Throughout, it emphasizes the importance of monitoring and troubleshooting performance issues.
HTTP and SMTP are application layer protocols used for communication over the internet. HTTP is used for retrieving and viewing web pages through a request-response conversation between a web client and server. SMTP is used for sending email and defines commands for mail servers to transfer messages between each other or to email clients. Both protocols establish rules for the format and content of messages to allow application programs to communicate without needing to understand the underlying network layers.
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
The document provides an overview of how the Internet works by explaining key concepts like internet addresses, protocol stacks, packets, networking infrastructure, domain names, and various protocols. It begins with an introduction to IP addresses and how computers connect to the internet. It then discusses how data is broken into packets and transmitted using layered protocol stacks. The document outlines the physical infrastructure of the internet including routers, backbones, and internet exchange points. It also explains how domain names are resolved to IP addresses via the domain name system. Finally, it briefly discusses several important internet protocols like HTTP, TCP, and IP.
SMTP (Simple Mail Transfer Protocol) is used to transfer email between servers over the Internet. It is a push protocol that allows email clients to send messages to SMTP servers, which then forward the messages to their destinations. SMTP uses port 25 and involves establishing a TCP connection between a client and server, with the client sending commands and the server sending responses to transfer the message.
The document provides a high-level overview of how the Internet works by explaining key concepts like Internet addresses (IP addresses), protocol stacks, packets, networking infrastructure, and domain names. It describes how computers on the Internet are assigned unique IP addresses and how messages are broken into packets that travel through a protocol stack consisting of application, transport, internet and hardware layers. It also outlines the physical infrastructure that connects computers, including connections to internet service providers, backbones, routers and network access points that packets traverse to reach their destination address on another computer connected to the Internet.
Similar to unit-5-final-cn-unit-5-notes-important-questions.pdf (20)
5 Common Mistakes to Avoid During the Job Application Process.pdfAlliance Jobs
The journey toward landing your dream job can be both exhilarating and nerve-wracking. As you navigate through the intricate web of job applications, interviews, and follow-ups, it’s crucial to steer clear of common pitfalls that could hinder your chances. Let’s delve into some of the most frequent mistakes applicants make during the job application process and explore how you can sidestep them. Plus, we’ll highlight how Alliance Job Search can enhance your local job hunt.
A Guide to a Winning Interview June 2024Bruce Bennett
This webinar is an in-depth review of the interview process. Preparation is a key element to acing an interview. Learn the best approaches from the initial phone screen to the face-to-face meeting with the hiring manager. You will hear great answers to several standard questions, including the dreaded “Tell Me About Yourself”.
Resumes, Cover Letters, and Applying OnlineBruce Bennett
This webinar showcases resume styles and the elements that go into building your resume. Every job application requires unique skills, and this session will show you how to improve your resume to match the jobs to which you are applying. Additionally, we will discuss cover letters and learn about ideas to include. Every job application requires unique skills so learn ways to give you the best chance of success when applying for a new position. Learn how to take advantage of all the features when uploading a job application to a company’s applicant tracking system.
Leadership Ambassador club Adventist modulekakomaeric00
Aims to equip people who aspire to become leaders with good qualities,and with Christian values and morals as per Biblical teachings.The you who aspire to be leaders should first read and understand what the ambassador module for leadership says about leadership and marry that to what the bible says.Christians sh
Learnings from Successful Jobs SearchersBruce Bennett
Are you interested to know what actions help in a job search? This webinar is the summary of several individuals who discussed their job search journey for others to follow. You will learn there are common actions that helped them succeed in their quest for gainful employment.
Joyce M Sullivan, Founder & CEO of SocMediaFin, Inc. shares her "Five Questions - The Story of You", "Reflections - What Matters to You?" and "The Three Circle Exercise" to guide those evaluating what their next move may be in their careers.
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...dsnow9802
Jill Pizzola's tenure as Senior Talent Acquisition Partner at THOMSON REUTERS in Marlton, New Jersey, from 2018 to 2023, was marked by innovation and excellence.
1. UNIT 5 Final CN - unit 5 notes important questions
Computer Networks (Dr. A.P.J. Abdul Kalam Technical University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
UNIT 5 Final CN - unit 5 notes important questions
Computer Networks (Dr. A.P.J. Abdul Kalam Technical University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
2. COMPUTER SCIENCE ENGINEERING
MCA/ BCA/ Polytechnic CS/ B.Sc. IT/CS
Dr. A.P.J. Abdul Kalam Technical University
SUBJECT
UNIT 5- MOST EXPECTED
B.TECH
COMPUTER SCIENCE ENGINEERING
MCA/ BCA/ Polytechnic CS/ B.Sc. IT/CS
(AKTU, Lucknow)
Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh
SUBJECT – Computer Network
MOST EXPECTED QUESTIONS AND ANSWERS
By Vishal Dhiman
MCA/ BCA/ Polytechnic CS/ B.Sc. IT/CS
Uttar Pradesh
Computer Network
QUESTIONS AND ANSWERS
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
3. Que 1.1. Write a short note on file transfer protocol.
AKTU 2013-14, Marks 2.5
AKTU 2015-16, 2017-18; Marks 05
Answer
1. FTP transmits the files from one host to another host .
2. FTP (File Transfer Protocol) is the simplest and most secure way to exchange files
over the internet. The most common use for FTP is to download files from the
internet.
3. FTP creates both a control and a data connection in order to transfer files.
4. Within an active FTP session, the control connection is established from the client
to the server, with the data connection established from the server to the client.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
4. Que 1.2. How does FTP work? Differentiate between passive and active FTP.
AKTU 2016-17, Marks 10
Answer
Working of FTP:
1. The client FTP application opens a control connection to the server on destination
port 21, and specifies a source port as the source to which the FTP server should
respond (using TCP).
2. The FTP server responds on port 21.
3. The FTP server and client negotiate the data transfer parameters.
4. The FTP server opens a second connection on port 20 to the
original client.
5. The client responds on the data port, completing a TCP connection
6. Data transfer begins.
7. The server indicates the end of the data transfer.
8. Client closes the connection once the data is received.
9. The data connection is closed.
10. The FTP connection is closed.
Control
Connection
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
5. Difference between passive and active FTP:
S.No. Passive FTP Active FTP
1. Passive FTP does not provide security
to the FTP server.
Active FTP provides more security to
the FTP server.
2. Passive FTP does not have connection
issues from firewalls.
Active FTP may cause problems
because of firewalls
3. In passive FTP, the command channel
and the data channel are established
by the client.
In active FTP, client establishes the
command channel and the server
establishes the data channel
4. Passive mode is used as a default
mode of a browser.
Active mode is not used as a default
mode of a browser.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
7. Que 1.3. Write a short note on:
i. MIME
ii. TFTP
AKTU 2013-14, Marks 05
Answer
MIME:
1. The Multipurpose Internet Mail Extension (MIME) protocol was developed to
define a method of moving multimedia files through existing email gateways.
2. It offers a simple standardized way to represent and encode a wide variety of
media types, including audio and video for transmission via internet mail.
3. MIME, use to overcome from SMTP Limitations
SMTP – no audio , no video , no big size of data
TFTP:
1. The TFTP stand for Trivial File Transfer Protocol.
2. Mainly use for transfer files within a Local area network.
3. It makes UDP (User Datagram Protocol) connections.
4. Not use to transfer the files over the internet (through LAN Cable).
5. Its default port number is 69.
6. It is connectionless and speed fast.
7. It is not secure and It has no acknowledgement policy.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
8. Que 1.4. Write a short note on DNS in the internet.
AKTU 2013-14, 2015-16, 2017-18; Marks 05
Answer
1. DNS Stands for “Domain Name System or Service”.
2. It is an automatic process that converts the Domain name to its corresponding IP
address (Number).
3. So That web browser can understand which web page you want to access on the
internet.
4. Example – Mobile Contact
www.ABC .com
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
9. Que 1.5. Explain about email architecture and services.
AKTU 2013-14, Marks 10
OR
Write a short note on electronic mail.
AKTU 2015-16, Marks 05
Answer
1. E-mail stands for Electronic mail.
2. E-mail is a private communication between two parties who have an account on
the internet.
3. It is an electronic message sent from the computer to another Computer.
4. Email messages are conveyed through email servers, It uses multiple protocols
within the TCP/IP.
5. For Example – SMTP, POP.
Structure of Email message.
Emails consist of two main parts :
1. Header : Header contains the name and address of the recipient.
2. Body of message. : Body contains the message itself.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
10. Email address:
To send and receive mails, One need to have an e-mail address.
E-mail addresses consists of two parts:
1. User name – it is the name of a person’s account, which can be a actual name or
any name
2. Domain name: It is the location of the person’s account on the internet separated
by a (.) and then type of organization is mentioned.
3. For Example
User name @ Domain name
Here two parts are separated by “At” or @ symbol.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
11. Que 1.6. Elaborate about Telnet and its working procedure.
Answer
1. TELNET Stands for Tele Communication Network
2. This Protocol belongs to TCP/IP
3. It is used for remotely login into another remot
with any remote computer we have to login by using our user id and password
directly
4. For this purpose we use TELNET Protocol.
5. For Example : FACEBOOK LOGIN, INSTAGRAM and Other types of logins.
Elaborate about Telnet and its working procedure.
AKTU 2016-17, 2017
TELNET Stands for Tele Communication Network
Protocol belongs to TCP/IP
It is used for remotely login into another remote computer. That means to work
with any remote computer we have to login by using our user id and password
this purpose we use TELNET Protocol.
For Example : FACEBOOK LOGIN, INSTAGRAM and Other types of logins.
17, 2017-18; Marks 10
means to work
with any remote computer we have to login by using our user id and password
For Example : FACEBOOK LOGIN, INSTAGRAM and Other types of logins.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
12. Working procedure:
1. Telnet uses software, installed on our computer, to create a connection with the
remote host.
2. The Telnet client (software), will send a request to the Telnet server (remote host)
when command is given.
3. The server will reply asking for a username and password.
4. If accepted, the Telnet client will establish a connection to the host, thus making
our computer a virtual terminal and provide a complete access to the host's
computer.
5. Telnet requires the use of a username and password, which means we need to
have previously set up an account on the remote computer.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
13. Que 1.7. Explain the two mail access protocols in brief:
a. POP3
b. IMAP
c. SMTP
Answer
a. POP3:
1. POP3 Stands for POST OFFICE PROTOCOL VERSION 3.
2. SMTP holds the mail if destination computer is offline.
server using POP3 to fetch it.
. Explain the two mail access protocols in brief:
AKTU 2013
FFICE PROTOCOL VERSION 3.
SMTP holds the mail if destination computer is offline. Client internet with mail
server using POP3 to fetch it.
AKTU 2013-14, Marks 10
Client internet with mail
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
14. b. IMAP (Internet Message Access Protocol)
1. IMAP was designed as a superset of POP3 and enhances both message retrieval
and management.
2. IMAP protocol will not automatically download all emails, each time email
program connects to email server.
3. The IMAP protocol allows us to see through em
before we download them
4. With IMAP we can choose to download our messages or just delete
them.
IMAP (Internet Message Access Protocol) :
IMAP was designed as a superset of POP3 and enhances both message retrieval
IMAP protocol will not automatically download all emails, each time email
program connects to email server.
The IMAP protocol allows us to see through email messages at the email server
before we download them
With IMAP we can choose to download our messages or just delete
IMAP was designed as a superset of POP3 and enhances both message retrieval
IMAP protocol will not automatically download all emails, each time email
ail messages at the email server
With IMAP we can choose to download our messages or just delete
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
15. c. SMTP (Simple Mail Transfer Protocol) :
1. The main function of text based SMTP protocol is to send emails.
2. It is used for sending message to a mail server for relaying.
3. It uses TCP (Transmission Control Protocol) to transfer message from client to
server.
4. SMTP uses port 25 for message transmission.
5. SMTP messages are read by humans. These messages are first stored and then
forwarded.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
16. Que 1.8. Explain the SMTP can handle transfer of videos and images? Also explain the
advantages of IMAP4 over POP3 mail access protocols.
AKTU 2014-15, Marks 10
Answer:
SMTP cannot handle transfer of videos and images.
Advantages of IMAP4 over POP3:
1. In IMAP4, we can access our email from anywhere but in POP3 it is not possible.
2. In IMAP4 multiple users can connect to single mail box but POP3 can connect only
single user to mail box.
3. In IMAP4 an email does not need to be deleted multiple times, which can be a
problem in POP3.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
17. Que 1.9. Write a short note on SNMP.
AKTU 2015-16, Marks 05
OR
Explain the SNMP protocols in detail.
AKTU 2016-17, Marks 15
AKTU 2017-18, Marks 10
Answer
1. The Simple Network Management Protocol (SNMP) is a framework for managing
devices in an internet using the TCP/IP protocol suite.
2. It provides a set of fundamental operations for monitoring and maintaining an
internet. SNMP uses the concept of manager and agent.
3. A manager is a host that controls and monitors a set of agents, usually routers.
4. The protocol is designed at the application level so that it can monitor devices
made by different manufacturers and installed on different physical networks.
5. SNMP frees management tasks from both the physical characteristics of the
managed devices and the underlying networking technology.
6. It can be used in a heterogeneous internet made of different LANs and WANs
connected by routers or gateways made by different manufacturers.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
18. Que 1.11. What is the difference between an active web document and dynamic web
page? Also explain the role of CGI.
AKTU 2014-15, Marks 10
Answer
Active web document
An active web document is a document where the browser performs the logic instead
of the server.
Active web document are downloaded in client environment and then run.
It uses PHP as scripting language.
Dynamic web page
Dynamic web page is a page where server performs the logic instead of the browser.
Dynamic web page runs on the server and then the result is sent to the user.
It uses AJAX with JavaScript.
Role of CGI:
1. It helps to create and handle dynamic document.
2. It provides sets of standards for web document.
3. It acts as a gateway for accessing other resources such as database.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
19. Que 1.12. Compare and contrast SMTP and HTTP.
Answer
S.no. SMTP HTTP
1. Message is transferred from client to
server.
Message transfer is from client to
server or the other way round
2. It uses TCP. It uses TCP.
3. It uses port 25 for transmission. It uses port 80 for transmission.
4. SMTP messages are to be read by
humans.
HTTP messages are to be read and
understood by the HTTP servers and
HTTP clients
5. These messages are first stored and
then forwarded
These messages are immediately
delivered
.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
20. Que 1.13. Describe internet.
Answer
Internet:
1. The internet is a globally existing network of networks consisting of a huge
number of computers located in all the parts of the world.
2. All the computers connected to the internet are part of this huge network.
3. Networking is interconnection of computers. Generally the networking topologies
used for networking are star, bus, ring, etc.
4. When a limited number of computers are to be interconnected, the local area
network (LAN) is used. But in the internet the interconnection is achieved even via
satellites.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556
21. Que 1.14. Differentiate between X.25 and frame relay.
Answer
S.No. X.25 frame relay
1. X.25 networks work at speed up to
64 kbps.
Frame relay operates at higher speed of
1.5 Mbps.
2. Frames are delivered more reliably
than frame relay.
Frames are delivered unreliably than
X.25.
3. Frames are delivered in order. Frames are not delivered in order.
4. Bad frames can be received back by
sending acknowledgement signal.
Bad frames are discarded by frame
relay
5. X.25 provides flow control. Frame relay does not provide flow
control.
Downloaded by somya singh (radheeshyam1176@gmail.com)
lOMoARcPSD|39396556