CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .
|Published (Last):||9 March 2005|
|PDF File Size:||14.97 Mb|
|ePub File Size:||11.15 Mb|
|Price:||Free* [*Free Regsitration Required]|
Fiber distributed data interface is a local areas.
CS – Computer Networks – 2 & 16 Marks with answers :Study Zone
What are the three events involved in the connection? What are the different types of AS? However, no more than four repeaters may be positioned between any pairs of hosts, meaning that an Ethernet has a total reach of only 2,m.
Give the format of HTTP request message. An Area is a set of routers that are administratively configured to exchange link-state information with each other.
Give the essential properties for polynomial.
What are the two possible transport services? In link state routing, a small packet containing routing information sent by a router to all other router by a packet called link state packet. One device controls traffic and the others must transmit through it. List the various ways of station configuration. The receiver must able to prove that a received message came from a specific sender. Mention the different physical media?
The control connection is made between the control processes. Environmental science and engineering Two Marks Wi The node selects one of the access points, and sends that AP an Association Request frame.
List mar,s most command kinds of Base band Subnetting provides an elegantly simple way to reduce the total number of network numbers that are assigned.
The size of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. Checksum is based on the concept of redundancy. At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer.
Explain about congestion control. Media access in wireless networks is made more complicated by the fact that some nodes compurer be hidden from each other due to range limitations of radio transmission. Calculating the cipher text using the long keys takes a lot of time.
Ethernet and token ring media access protocols have no central arbitrator of access. Domain Name System can map a name to an address and conversely an address to name. It is used to forward the packets between shared media LANs such as Ethernet. Otherwise, the received stream of bits is discarded and the anssers are resent. The most important criteria are performance, reliability and security. Discuss the mode for propagating light along optical channels.
In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange. The services provided by the transport layer End-to- end delivery Addressing Reliable delivery Flow control Multiplexing 3. Give the format of HTTP response message. Even when one packet represents just a place quesions a multi packet transmission, the network treats it although it existed alone.
It is the process of making sure that all the nodes participating in the routing protocol get a copy of the link state information from all the other nodes.
CS Computer networks – RJ edition 2marks and 16marks with answers
The connection is made after both computers do handshaking. Switched virtual circuit Permanent virtual circuit.
Group the OSI layers byfunction? In link state routing, a small packet containing routing information sent by a router to all other router by a packet called link state packet. Engineering Economics and Financial Management Que Newer Post Older Post Home. Explain about secret key encryption algorithm. The value of the code sub field is 00 Receive not ready RNR. What is meant by Concatenation? TCP guarantees the reliable, in order delivery of a stream of bytes.
Explain the functions of SMTP. What are the four prominent wireless technologies? A polynomial should be selected to have at least questikns following properties. At the sending machine, when the message passes through the layers each layer adds the headers or trailers.
What are the networks related attributes? If a station wants to send data, it must wait and capture the token.