Module 1:
What is a computer network?
A computer network is a system of interconnected devices (computers, servers,
routers, switches, printers, etc.) that communicate and share resources, such as files,
applications, and data, with one another. The primary goal of a network is to facilitate
communication and resource sharing between devices, often across various
geographical locations.
The devices in a computer network can be linked using various communication
mediums like wired connections (Ethernet cables, fiber optics) or wireless technologies
(Wi-Fi, Bluetooth, etc.). A computer network is typically divided into different categories
based on the scale and scope of the connections:
● Local Area Network (LAN): A network confined to a small geographic area,
such as a single building or campus.
● Wide Area Network (WAN): A network that spans a large geographic area,
potentially across cities, countries, or continents.
● Metropolitan Area Network (MAN): A network that covers a larger area than a
LAN but smaller than a WAN, typically within a city or a large campus.
Computer networks are essential for sharing information and enabling various
technologies like email, cloud computing, video conferencing, and more.
What are the different types of networks?
There are several types of networks, categorized based on their scale, functionality, and
technologies:
1. LAN (Local Area Network):
○ A small network that typically spans a single building or a campus,
designed to connect computers, printers, and other devices in close
proximity.
○ Example: A home network or an office network.
2. WAN (Wide Area Network):
○ A network that connects devices over a large geographical area, such as
across cities, countries, or continents.
○ Example: The Internet or a multinational corporation’s network.
3. MAN (Metropolitan Area Network):
○ A network that covers a city or a large campus, bridging the gap between
LANs and WANs.
○ Example: A city's broadband network or a university campus network
connecting multiple buildings.
4. PAN (Personal Area Network):
○ A network designed for personal devices like smartphones, tablets,
laptops, or wearable devices. It typically operates within a range of a few
meters.
○ Example: Bluetooth networks or Wi-Fi networks used for personal devices.
5. VPN (Virtual Private Network):
○ A network that enables secure, encrypted communication over the
Internet, allowing remote users to connect to a private network as if they
were on-site.
Network Topology
Sr. No. 1: What is a network topology?
A1: Network topology refers to the arrangement of different elements (links, nodes,
devices) in a computer network. It defines how devices are connected and how data
flows between them.
Sr. No. 2: What are the main types of network topologies?
A2: The main types of network topologies are:
● Bus Topology
● Star Topology
● Ring Topology
● Mesh Topology
● Tree Topology
● Hybrid Topology
Sr. No. 3: What is Bus Topology?
A3: In Bus Topology, all devices are connected to a single central cable (the bus).
Data travels in both directions along the cable, and each device checks if the data is
meant for it.
Sr. No. 4: What are the advantages and disadvantages of Bus Topology?
A4:
Advantages:
● Easy to set up
● Requires less cable
● Cost-effective for small networks
Disadvantages:
● If the main cable fails, the entire network goes down
● Limited cable length and number of nodes
● Slower performance with more devices
Sr. No. 5: What is Star Topology?
A5: In Star Topology, all devices are connected to a central hub or switch. Data
passes through the central device to reach its destination.
Sr. No. 6: What are the advantages and disadvantages of Star Topology?
A6:
Advantages:
● Easy to install and manage
● Failure of one device doesn't affect the others
● Easy to detect faults
Disadvantages:
● If the central hub fails, the whole network is affected
● Requires more cable compared to bus topology
Sr. No. 7: What is Ring Topology?
A7: In Ring Topology, each device is connected to two other devices, forming a
circular or ring structure. Data travels in one direction (or both in dual ring).
Sr. No. 8: What are the pros and cons of Ring Topology?
A8:
Advantages:
● Performs better than bus in heavy traffic
● Equal access for all devices
Disadvantages:
● Failure of one device can disrupt the entire network
● Difficult to troubleshoot and expand
Sr. No. 9: What is Mesh Topology?
A9: In Mesh Topology, each device is connected to every other device in the network,
allowing for multiple data paths.
Sr. No. 10: What are the benefits and drawbacks of Mesh Topology?
A10:
Advantages:
● High reliability and redundancy
● Data can take multiple paths
Disadvantages:
● Expensive and complex to set up
● Requires a lot of cabling and configuration
Sr. No. 11: What is Tree Topology?
A11: Tree Topology is a hierarchical structure where star-configured networks are
connected to a main bus backbone. It resembles a tree.
Sr. No. 12: What is Hybrid Topology?
A12: Hybrid Topology combines two or more different topologies (e.g., star and
mesh) to take advantage of the strengths of each.
Sr. No. 13: Which topology is best suited for large organizations?
A13: Hybrid and Mesh topologies are often best suited for large organizations due to
their scalability, fault tolerance, and reliability, though they come at higher cost and
complexity.
Uses of Computer Networks
Q1: What are the primary uses of computer networks?
A1: Computer networks are used for:
● Resource Sharing: Sharing printers, files, and internet connections.
● Communication: Email, instant messaging, video calls.
● Remote Access: Accessing data and systems remotely.
● Data Transfer: Moving large volumes of data between systems.
● Entertainment: Streaming, online gaming.
● E-commerce and Online Services: Shopping, banking, cloud computing.
Network Hardware
Q2: What is network hardware?
A2: Network hardware includes physical devices required to establish and operate a
network, such as routers, switches, modems, network cables, and NICs (Network Interface
Cards).
Q3: What is the function of a router in a network?
A3: A router connects multiple networks and directs data packets between them, often
connecting a local network to the internet.
Q4: What does a switch do in a network?
A4: A switch connects multiple devices within a local area network (LAN) and forwards
data to the correct device based on MAC addresses.
Network Software
Q5: What is network software?
A5: Network software includes programs and operating systems that manage and control
networking functions such as communication protocols, file sharing, and network security.
Q6: Name examples of network software.
A6: Examples include:
● Operating systems with networking features (e.g., Windows Server, Linux)
● Network management tools (e.g., Wireshark, Cisco Packet Tracer)
● Communication software (e.g., Skype, Slack)
Reference Models: OSI Model
Q9: What does OSI stand for, and what is the OSI model?
A9: OSI stands for Open Systems Interconnection. The OSI model is a 7-layer
framework used to understand and design a network system’s functions.
Q10: List the 7 layers of the OSI model.
A10:
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
Q14: Which layer in the OSI model corresponds to the Internet layer in TCP/IP?
A14: The Network layer in OSI corresponds to the Internet layer in TCP/IP.
Network Devices
Q15: What are network devices?
A15: Network devices are physical devices that facilitate communication and data transfer
within a network.
Q16: List common network devices and their functions.
A16:
● Router: Connects different networks and routes data.
● Switch: Connects devices within the same network and manages data transfer.
● Hub: Broadcasts data to all connected devices (less efficient than a switch).
● Modem: Converts digital data to analog signals and vice versa for internet access.
● Access Point: Provides wireless connectivity to a wired network.
● Firewall: Protects the network by filtering incoming and outgoing traffic.
Module 2:
1. Physical Layer
Guided and Unguided Media
Q1: What is guided media in networking?
A1: Guided media refers to transmission media that uses physical pathways like cables to
transmit signals. Examples include twisted pair cables, coaxial cables, and fiber optics.
Q2: What is unguided media?
A2: Unguided media is wireless transmission through air, such as radio waves, microwaves,
and infrared. No physical conductor is used.
Wireless Transmission & Electromagnetic Spectrum
Q3: What is the electromagnetic spectrum?
A3: It refers to the range of all types of electromagnetic radiation, used in wireless
communication. It includes radio waves, microwaves, infrared, visible light, etc.
Q4: Which parts of the electromagnetic spectrum are used in wireless communication?
A4: Mainly radio waves, microwaves, and infrared are used for wireless communication.
2. Switching
Types of Switching
Q5: What is circuit-switched networking?
A5: In circuit switching, a dedicated communication path is established between two devices
for the entire duration of the transmission. Used in traditional telephone networks.
Q6: What is packet switching?
A6: Packet switching breaks data into packets that are sent independently over the network
and reassembled at the destination. Commonly used in internet communication.
Structure of a Switch
Q7: What are the main components of a network switch?
A7: The main components include:
● Input and output ports
● Switching fabric (internal network)
● Control unit for routing decisions
3. Data Link Layer (DLL)
DLL Design Issues
Q8: What services are provided by the Data Link Layer?
A8: It provides:
● Framing
● Error detection and correction
● Flow control
● Reliable communication over physical links
Q9: What is framing in DLL?
A9: Framing is the process of dividing the data stream into manageable units called frames for
transmission.
Q10: What is flow control?
A10: Flow control ensures that the sender does not overwhelm the receiver with too much data
at once.
Error Detection and Correction
Q11: What is the purpose of error detection and correction techniques?
A11: To identify and correct errors that occur during data transmission.
Q12: What is parity checking?
A12: A simple error detection method that adds a parity bit to ensure the number of 1s is even
or odd.
Q13: What is the Hamming Code used for?
A13: Hamming Code is used for error correction by adding redundancy bits to detect and
correct single-bit errors.
Q14: What is CRC (Cyclic Redundancy Check)?
A14: A robust error detection technique using polynomial division to detect changes in data.
Q15: What is a checksum?
A15: A value calculated from a data packet’s contents, used to detect errors in data
transmission.
Elementary Data Link Protocols
Q16: What is the Stop-and-Wait protocol?
A16: A simple protocol where the sender sends one frame and waits for an acknowledgment
before sending the next.
Q17: What is the Sliding Window protocol?
A17: A method that allows multiple frames to be sent before receiving acknowledgments,
increasing efficiency.
Q18: What is the difference between Go-Back-N and Selective Repeat?
A18:
● Go-Back-N: Retransmits all frames after an error.
● Selective Repeat: Only retransmits the frames that were not acknowledged.
Q19: What is piggybacking in networking?
A19: Combining an acknowledgment with outgoing data frames to reduce overhead.
Q20: What is HDLC (High-Level Data Link Control)?
A20: A bit-oriented protocol for error-free and reliable communication at the data link layer.
4. Medium Access Control Protocols
Q21: What are Medium Access Control (MAC) protocols?
A21: Protocols that determine how devices share the communication medium to avoid
collisions.
Types of MAC Protocols
Q22: What are random access protocols?
A22: Protocols where devices transmit whenever they want, handling collisions using
mechanisms like ALOHA and CSMA.
Q23: What are controlled access protocols?
A23: Devices take turns accessing the medium in an orderly manner (e.g., polling, token
passing).
Q24: What is channelization?
A24: Dividing the communication channel into multiple logical channels using methods like
FDMA, TDMA, and CDMA.
5. Ethernet Protocol
Q25: What is Ethernet?
A25: Ethernet is a widely used LAN technology that uses MAC addresses for data transfer.
Types of Ethernet
Q26: What is Standard Ethernet?
A26: Also known as 10Base-T, it operates at 10 Mbps and uses twisted pair cables.
Q27: What is Fast Ethernet?
A27: Fast Ethernet (100Base-T) provides data rates up to 100 Mbps.
Q28: What is Gigabit Ethernet?
A28: Ethernet standard (1000Base-T) that offers speeds up to 1 Gbps.
Q29: What is 10-Gigabit Ethernet?
A29: High-speed Ethernet providing 10 Gbps speeds, often used in data centers and enterprise
networks.
Module 3:
1. Network Layer Services
Q1: What are the main services provided by the network layer?
A1: The network layer provides:
● Routing: Determines the best path for data to travel
● Logical addressing: Assigns IP addresses to devices
● Packet forwarding: Moves packets from source to destination
● Fragmentation and reassembly: Breaks packets for transmission and
reassembles them at the destination
2. Packet Switching
Q2: What is packet switching?
A2: Packet switching breaks data into packets and sends them individually over the
network. Each packet may take a different route and is reassembled at the destination.
Q3: How is packet switching different from circuit switching?
A3: Packet switching is dynamic and efficient, allowing multiple users to share the
same network, while circuit switching reserves a dedicated path for the entire session.
3. Network Layer Performance
Q4: What factors affect network layer performance?
A4:
● Throughput: Rate of successful data delivery
● Latency: Time taken to transfer data
● Packet loss: Dropped packets due to congestion
● Jitter: Variation in packet arrival time
4. IPv4 Addressing
Classful Addressing
Q5: What are the different classes in IPv4 classful addressing?
A5:
Class Range Default Subnet Usage
Mask
A 0.0.0.0 – 255.0.0.0 Large networks
127.255.255.255
B 128.0.0.0 – 255.255.0.0 Medium
191.255.255.255 networks
C 192.0.0.0 – 255.255.255.0 Small networks
223.255.255.255
D 224.0.0.0 – N/A Multicast
239.255.255.255
E 240.0.0.0 – N/A Reserved
255.255.255.255
Classless Addressing
Q6: What is classless addressing (CIDR)?
A6: CIDR (Classless Inter-Domain Routing) replaces classful addressing and allows IP
addresses to be assigned with variable-length subnet masks (e.g., 192.168.1.0/24).
5. Subnetting and Supernetting
Q7: What is subnetting?
A7: Subnetting divides a large network into smaller sub-networks, improving
performance and security.
Q8: What is supernetting?
A8: Supernetting combines multiple networks into a larger address block. It is used in
CIDR to reduce the number of routing table entries.
6. IPv4 Protocol
Q9: What is the purpose of the IPv4 protocol?
A9: IPv4 is responsible for addressing and routing packets between devices on
different networks using 32-bit IP addresses.
7. DHCP (Dynamic Host Configuration Protocol)
Q10: What is DHCP?
A10: DHCP automatically assigns IP addresses and other network configuration details
(like gateway and DNS) to devices on a network.
8. NAT (Network Address Translation)
Q11: What is Network Address Translation (NAT)?
A11: NAT translates private IP addresses to a public IP address for internet access,
allowing multiple devices to share a single public IP.
Q12: Why is NAT used?
A12: It conserves public IP addresses and adds a layer of security by hiding internal IP
addresses.
9. Routing Algorithms
Distance Vector Routing
Q13: What is Distance Vector Routing?
A13: Each router shares its routing table with neighbors at regular intervals. The
algorithm selects the shortest path based on distance metrics (e.g., hop count).
Example Protocol: RIP
Link State Routing
Q14: What is Link State Routing?
A14: Routers build a complete map of the network and independently compute the
shortest path to each destination using Dijkstra’s algorithm.
Example Protocol: OSPF
Path Vector Routing
Q15: What is Path Vector Routing?
A15: It uses path information to prevent routing loops. Each route contains the full path
(AS numbers) to the destination.
Example Protocol: BGP
10. Routing Protocols
RIP (Routing Information Protocol)
Q16: What is RIP?
A16: RIP is a distance-vector routing protocol that uses hop count as a metric. It has a
maximum hop limit of 15.
OSPF (Open Shortest Path First)
Q17: What is OSPF?
A17: OSPF is a link-state routing protocol that uses Dijkstra’s algorithm to calculate the
shortest path and supports large and complex networks efficiently.
BGP (Border Gateway Protocol)
Q18: What is BGP?
A18: BGP is a path-vector protocol used for routing between autonomous systems on
the internet. It uses policies and path attributes to make routing decisions.
Module 4:
1. Transport Layer
Transport Layer Services
Q1: What are the primary services provided by the Transport Layer?
A1: The Transport Layer provides:
● Process-to-process communication
● Reliable data transfer
● Error detection and correction
● Flow control
● Segmentation and reassembly
● Congestion control
Connectionless vs. Connection-oriented Protocols
Q2: What is a connectionless protocol?
A2: A protocol that does not establish a connection before data transfer and sends
data without acknowledgments (e.g., UDP).
Q3: What is a connection-oriented protocol?
A3: A protocol that establishes a connection before data transfer, ensuring reliable
and ordered delivery (e.g., TCP).
2. Transport Layer Protocols
UDP (User Datagram Protocol)
Q4: What is UDP?
A4: UDP is a connectionless, lightweight transport protocol that does not provide
reliability, ordering, or flow control.
Q5: What are the main services provided by UDP?
A5:
● Minimal overhead
● Fast data transfer
● Message boundary preservation
● Multiplexing using ports
Q6: Name some common applications of UDP.
A6:
● DNS (Domain Name System)
● VoIP (Voice over IP)
● Online gaming
● Streaming services
TCP (Transmission Control Protocol)
Q7: What is TCP?
A7: TCP is a connection-oriented protocol that ensures reliable, ordered, and
error-checked delivery of data between applications.
Q8: What are the key features of TCP?
A8:
● Reliable delivery
● Connection establishment via three-way handshake
● Flow and congestion control
● Error detection and correction
● Byte-oriented stream delivery
TCP Segment Structure
Q9: What is a TCP segment?
A9: A TCP segment is a unit of data encapsulated with a TCP header, including fields
like source port, destination port, sequence number, acknowledgment number, flags,
window size, and checksum.
TCP Connection
Q10: How is a TCP connection established?
A10: Through a three-way handshake:
1. Client sends SYN
2. Server replies with SYN-ACK
3. Client sends ACK
Windows in TCP
Q11: What is the role of windowing in TCP?
A11: TCP uses a sliding window for flow control, allowing multiple segments to be
sent before receiving an acknowledgment.
Flow Control in TCP
Q12: What mechanism does TCP use for flow control?
A12: TCP uses a sliding window protocol where the receiver controls the amount of
data the sender can transmit before requiring acknowledgment.
Error Control in TCP
Q13: How does TCP handle error control?
A13: TCP uses checksums for error detection and acknowledgments with
retransmissions to ensure correct data delivery.
TCP Congestion Control
Q14: What is congestion control in TCP?
A14: Congestion control prevents network overload using algorithms like:
● Slow Start
● Congestion Avoidance
● Fast Retransmit
● Fast Recovery
TCP Timers
Q15: What are the types of timers used in TCP?
A15:
● Retransmission Timer
● Persistence Timer
● Keepalive Timer
● Time-Wait Timer
3. Session Layer
Session Layer Design Issues
Q16: What is the role of the Session Layer?
A16: The Session Layer manages sessions (connections) between applications,
handling dialog control, synchronization, and session recovery.
Q17: What are key design issues of the session layer?
A17:
● Session establishment, maintenance, and termination
● Synchronization (e.g., inserting checkpoints)
● Dialog control (full-duplex or half-duplex communication)
Session Layer Protocol – Remote Procedure Call (RPC)
Q18: What is Remote Procedure Call (RPC)?
A18: RPC allows a program to execute procedures on another machine as if they
were local function calls, hiding the complexity of network communication.
Q19: How does RPC work?
A19:
1. The client calls a stub function.
2. The stub packages parameters and sends them to the server.
3. The server unpacks, executes the function, and returns the result.
4. The client receives and unpacks the result.
Q20: What are the benefits of RPC?
A20:
● Simplifies network programming
● Provides transparency
● Encourages modular design
Module 5:
Presentation Layer
Q1: What is the primary role of the Presentation Layer in the OSI model?
A1: The Presentation Layer is responsible for data translation,
encryption/decryption, and compression between the application and transport
layers, ensuring that data is in a readable format for the application.
Q2: What is the difference between Lossy and Lossless Compression?
A2:
Feature Lossy Lossless Compression
Compression
Data Loss Some data is lost No data is lost
Quality Reduced quality Original quality retained
Usage Images, audio, Text, executable files,
video documents
Example JPEG, MP3 PNG, ZIP, GIF
Formats
Q3: What is Huffman Coding?
A3: Huffman Coding is a lossless compression algorithm that assigns shorter codes
to more frequent characters and longer codes to less frequent ones, minimizing the total
bit-length of the encoded message.
Q4: What is Speech Compression used for?
A4: Speech compression reduces the bandwidth needed to transmit spoken audio by
removing redundancies and compressing voice signals (e.g., in VoIP, mobile calls).
Q5: What is LZW (Lempel-Ziv-Welch) Compression?
A5: LZW is a dictionary-based lossless compression technique used in formats like
GIF. It replaces repeated patterns with codes to reduce file size.
Q6: What is RLE (Run-Length Encoding)?
A6: RLE is a simple lossless compression technique that replaces consecutive
repeating characters or data with a single value and a count. Useful for compressing
images with many repeated pixels.
Q7: Compare GIF and JPEG in terms of image compression.
A7:
Feature GIF JPEG
Compressi Lossless (uses LZW) Lossy (uses DCT - Discrete Cosine
on Transform)
Colors Supports 256 colors Supports millions of colors
Animation Supports simple animations Does not support animation
Best For Simple graphics, icons, Photographic images
animations
Application Layer
Q8: What is the role of the Application Layer in the OSI model?
A8: The Application Layer provides network services to the end-users and handles
application-specific operations such as file transfers, email, web browsing, and name
resolution.
Q9: What is the World Wide Web (WWW)?
A9: The WWW is a system of interlinked hypertext documents accessed via the internet
using web browsers. It relies on protocols like HTTP to transfer data.
Q10: What is HTTP (Hypertext Transfer Protocol)?
A10: HTTP is a stateless application-layer protocol used for transmitting web pages
and resources between web servers and clients (browsers).
Q11: What is FTP (File Transfer Protocol)?
A11: FTP is a protocol used to transfer files between computers on a TCP/IP
network. It supports login authentication and operates in active or passive modes.
Q12: What is Electronic Mail (Email) in terms of networking?
A12: Email refers to the electronic exchange of messages between users using
protocols like:
● SMTP (Simple Mail Transfer Protocol) – Sending emails
● POP3 (Post Office Protocol v3) – Receiving emails
● IMAP (Internet Message Access Protocol) – Managing email on the server
Q13: What is DNS (Domain Name System)?
A13: DNS translates human-readable domain names (e.g., google.com) into IP
addresses that computers use to identify each other on the network.
Q14: What is SNMP (Simple Network Management Protocol)?
A14: SNMP is used for monitoring and managing network devices like routers,
switches, servers, and printers. It allows administrators to collect data and control
network elements.
Module 6:
Q1: What is a VLAN (Virtual Local Area Network)?
A1: A VLAN is a logical group of devices on the same physical network that can
communicate as if they are on a separate network, regardless of their physical location.
VLANs improve network security, reduce congestion, and simplify network
management.
Q2: How does a VLAN differ from a physical network?
A2: A VLAN is a virtualized network created within a physical network. Devices in
different physical locations can belong to the same VLAN, allowing them to
communicate as if they were on the same physical LAN.
Q3: What is a VPN (Virtual Private Network)?
A3: A VPN is a secure network connection that allows users to send and receive data
over public networks (like the internet) as if they were directly connected to a private
network. It uses encryption and tunneling protocols for security.
Q4: What are the benefits of using a VPN?
A4:
● Security: Encrypts data, protecting it from eavesdropping
● Privacy: Hides the user's IP address and location
● Remote Access: Enables secure access to a private network from any location
● Bypass Geo-restrictions: Allows access to content restricted in certain regions
Q5: What is TELNET?
A5: TELNET is a network protocol that allows remote access to a computer over a
TCP/IP network. It provides a command-line interface for users to interact with a
remote system, but it is not secure as data, including login credentials, is sent in plain
text.
Q6: What is SSH (Secure Shell)?
A6: SSH is a secure network protocol that provides an encrypted connection for
secure remote access to a computer or server. It is used for system administration and
file transfers, replacing TELNET due to its security.
Q7: How is SSH more secure than TELNET?
A7: SSH encrypts all communication between the client and server, making it secure
from eavesdropping and man-in-the-middle attacks, while TELNET transmits data in
plain text, making it vulnerable to interception.
Q8: What is an FTP server?
A8: An FTP server is a server application that allows the transfer of files between a
client and a server over a network. It uses FTP (File Transfer Protocol) for
communication, supporting both upload and download operations.
Q9: How does FTP work?
A9: FTP uses a client-server model where the client sends a request to the server for
file access. FTP operates over two channels:
● Control channel (Port 21): Manages communication
● Data channel: Transfers files
Q10: What is a Web server?
A10: A web server is a software application or hardware device that serves web
pages to users' browsers via HTTP or HTTPS. The web server processes HTTP
requests and serves files such as HTML documents, images, and videos.
Q11: What is the difference between a web server and an FTP server?
A11:
● Web Server: Serves web pages (HTML, images, CSS) via HTTP/HTTPS
● FTP Server: Facilitates file transfers (upload and download) via FTP
Q12: What is a File Server?
A12: A file server is a server that provides centralized file storage and allows users to
store, access, and manage files across a network. File servers use protocols like SMB
(Server Message Block) or NFS (Network File System).
Q13: What is a DHCP server?
A13: A DHCP (Dynamic Host Configuration Protocol) server automatically assigns IP
addresses and network configuration parameters (like DNS, gateway) to devices on a
network, ensuring devices can communicate on the network.
Q14: What is the role of a DHCP server in a network?
A14: The DHCP server simplifies network management by dynamically allocating IP
addresses to devices (computers, printers, etc.) within a network, avoiding the need for
manual IP address configuration.
Q15: What is a DNS server?
A15: A DNS (Domain Name System) server is responsible for translating domain
names (like google.com) into IP addresses. It acts as a directory for the internet,
enabling users to access websites using human-readable names instead of numerical
IP addresses.
Q16: How does DNS work?
A16: DNS works by using a hierarchical system of servers:
1. A user types a domain name (e.g., google.com) into their browser.
2. The browser sends a DNS query to a DNS server.
3. The DNS server resolves the domain name to an IP address (e.g.,
172.217.16.46).
4. The browser uses the IP address to establish a connection and access the
website.
Q17: Why are DNS servers important for internet functionality?
A17: DNS servers are crucial because they convert human-readable domain names
into IP addresses, allowing devices to communicate with each other over the internet.
Without DNS, users would need to remember IP addresses to access websites.
Q18: What are the differences between a Web Server and a DNS Server?
A18:
● Web Server: Serves content like HTML, images, and videos to users' browsers
using HTTP/HTTPS.
● DNS Server: Resolves domain names to IP addresses to enable users to reach
websites.