CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .
|Published (Last):||14 August 2012|
|PDF File Size:||13.56 Mb|
|ePub File Size:||12.25 Mb|
|Price:||Free* [*Free Regsitration Required]|
The three keys for understanding the algorithm are Knowledge about the whole networks Routing only to neighbors Information sharing at regular intervals Even when one packet represents just a place of a multi packet transmission, the network treats it although it existed alone. What is the function of stop and wait flow control? Distinguish between peer-to-peer relationship and a primary-secondary relationship.
Engineering Economics and Financial Management Que It collects and processes the data they receive from neighboring nodes, and then transmit the processed data.
Anna University Chennai CS – COMPUTER NETWORKS(Regulation ) model question papers
What does the electrical specification of EIA describe? Discuss the basic model of FTP. Questioms functions are handled by the IEEE A token is passed among stations.
A frame consists of one complete cycle of time slots, including one or more slot dedicated to each sending device. Workstations interact with the SMTP host, which receives the xs2302 on behalf of every host in the organization, to retrieve messages by using a client-server protocol such as Post Office Protocol, version 3 POP3.
Data circuit-terminating equipment is a device used as an interface between a DTE and a network. Congestion occurs because the switches in a network have a limited buffer size to store arrived packets. Physical, datalink and network layers are the network support layers; they deal with the physical aspects of moving data from one device to another. Broadcast is simple — each bridge forwards a frame with a destination broadcast address out on each active selected port other than the one on which the frame was received.
What is Token Bus? At the receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers are removed, and actions appropriate to that layer retaken.
The MTA transfers the mail across the Internet. It is a system for sending messages to other computer users based on e-mail addresses.
Explain the main idea of UDP? How to request Study Material? What is selective reject ARQ? Mention the types of error correcting methods. The client has three components: So the simple strategy used by the hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction.
How does a given bridge learn whether it should forward a multicast frame over a given port? One device controls traffic and the others must transmit through it. Here each entity can create qhestions pair of keys, keep the private one, and publicly distribute the other one.
What are the steps followed in checksum generator? The network support layers are Physical layer, Data link layer and Network layer. Explain error cs22302 and error correction techniques. After the connection, all packets follow the same route and arrive in sequence. Ocmputer are the two categories of QoS attributes? Discuss the mode for propagating light along optical channels.
What is the purpose of hamming code? Domain name space is divided into three different sections: What is meant by Concatenation? Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. In longitudinal redundancy check LRCa block of bits is divided into rows and a redundant row questionw bits is added to the whole block. The sender uses this key and an encryption algorithm to encrypt data; the receiver uses the same key and the narks CS — Computer Networks Page 16 of 24 decryption algorithm to decrypt the data.
A polynomial should be selected to have at least the following properties. For one nefworks users to communicate, only two million keys are needed.
If the phone is involved in a call at the timethe call ccs2302 be transferred to the new base station in what is called a hand off. P r i vacy: In the NRZ-L sequence, positive and negative voltages have specific meanings: Switched virtual circuit format is comparable conceptually to dial-up line nehworks circuit switching.
Domain Name System can map a name to an address and conversely an address to name. It allows additional text to include codes that define fonts, layouts, embedded graphics and networkd links. How to mediate access to a shared link?
At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment.
The documents in the WWW can be grouped into three broad categories: The quality of service defines a set of attributes related to the performance of the connection. The control connection is made between the control processes.
Explain the duties of transport layer.