CS2302 COMPUTER NETWORKS 2 MARKS QUESTIONS AND ANSWERS PDF

CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .

Author: Mutaxe Shaktizahn
Country: Guinea-Bissau
Language: English (Spanish)
Genre: Relationship
Published (Last): 14 September 2007
Pages: 297
PDF File Size: 2.26 Mb
ePub File Size: 11.39 Mb
ISBN: 921-7-81785-940-6
Downloads: 86368
Price: Free* [*Free Regsitration Required]
Uploader: Kecage

The ID for the bridge that is sending the message. A device used to connect two anwers networks that use different communication protocols.

This information is added in the form of headers or trailers.

‘+relatedpoststitle+’

All the devices share the link equally. Domain Name System can map a name to an address and conversely an address to 7. What are the responsibilities of abd link layer? What are the three events involved in the connection? Using HDB3, encode the bit stream What are the responsibilities of network layer?

SSMa receiving host specifies both a multicast group and a specific host.

Name four factors needed for a secure network. List out the user related attributes? Explain about congestion control. The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks CRC CRC is based on binary division.

What is the use of Switch? What is hop-by-hop flow control?

  AUTOBOXING IN JAVA PDF

They Route packets from one network to any of a number of potential destination networks on internet routers operate in the physical, data link and ocmputer layer of OSI model.

If the phone is involved in a call at the timethe call must be transferred to the new base station in what is called a hand off. In longitudinal redundancy check LRCa block of bits is divided into rows and a redundant row of bits is added to the whole block. It contains synchronization, flag, flow and error control specifications necessary to move information from one place to another, as well as the physical address of the next station to receive and route a packet.

In network transactions, you can create an equivalent of an electronic or digital signature by the way you send data.

One connection is used for data transfer, the other for control information. Explain the topologies of the network. The effectiveness of the data communication system depends on 3 fundamental characters: The four types of S-frames are Receive ready RR. netwrks

Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they are processed. What are the duties of the transport layer?

Anna University Chennai CS – COMPUTER NETWORKS(Regulation ) model question papers

The value of the code sub field is 11 What are the four internetworking devices? Explain the duties of transport layer. It is a full-duplex protocol, meaning that each TCP connection supports a pair of byte streams, one flowing in each direction.

  ISO 11228 PARTI 1-2-3 PDF

FTP establishes two questiojs between the hosts. Name the four types of S-frames? A router is a single protocol or multiprotocol router that sometimes acts as a router and sometimes act as a bridge.

Our Toolbar

Random Early Detection in each router is programmed to monitor its own queue length and when it detects that congestion is imminent, to notify the source to adjust its congestion window. A hamming code can be designed to correct burst errors of certain lengths.

Distinguish between peer-to-peer relationship and a primary-secondary relationship. What are the types of multiplexing? What are the four aspects related to the reliable delivery of data? Give the format of HTTP response message. Checksum is based on the concept of redundancy. The dividing process is called segmentation.

CS Computer networks – RJ edition 2marks and 16marks with answers

The private key is kept by the receiver. TCP guarantees the reliable, in order delivery of a stream of bytes. Fiber distributed data interface is a local areas. Each station may transmit only during its turn and may send only one frame during each turn. This redundancy may create delays of indeterminable length if the traffic is heavy.

How is a secret key different from public key?

Author: admin