CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .

Author: Kigashicage Mazudal
Country: Yemen
Language: English (Spanish)
Genre: Business
Published (Last): 24 March 2007
Pages: 315
PDF File Size: 5.95 Mb
ePub File Size: 7.47 Mb
ISBN: 933-2-20346-422-1
Downloads: 28856
Price: Free* [*Free Regsitration Required]
Uploader: Shazahn

What is Source Specific Multicast? The combining process is called concatenation. The private key is kept by the receiver. The seven layers of the OSI model belonging to three subgroups. What are the three events involved in the connection? In datagram approach, each packet is treated independently from all others.

As the time-to-live field is generated, each packet is marked with a lifetime, usually the number of hops that are allowed before a packet is considered lost and accordingly, destroyed. Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.

Our Toolbar

The ID for what the sending bridge believes to the root bridge. What are the features in OSPF? What is the purpose of Domain Name System?

The data must arrive at the receiver exactly as it was sent. This basic strategy is usually called hop-by-hop flow control. All the devices share the link equally. Page 1 of 24 9. Discuss the three main division of the mar,s name space. Why the congestion occurs in network?


CS – Computer Networks – 2 & 16 Marks with answers :Study Zone

Name four factors needed for a secure network? The client has three components: Security issues include protecting data from unauthorized access and viruses.

The UA prepares the message, creates the envelope, and puts the message in the envelope.

A Character level encryption in which the characters retain their plaintext but the position of the character questipns. A hamming code can be designed to correct burst errors of certain lengths.

Anna University Chennai CS – COMPUTER NETWORKS(Regulation ) model question papers

The three keys for understanding the algorithm are Knowledge about the neighborhood. Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by network resources. There are 3 types of HDLC frames. What is meant by segment? A trailer is added at layer2. What is meant by bit stuffing? Physical, data link and network layers are the network support layers; they deal with the physical aspects of moving data from one device to another.

What is the difference between a passive and an active hub? Write the keys for understanding the link state routing? Explain socket in detail. Mention the various architecture in a LAN. If a frame is corrupted in transit, a NAK is returned and the frame is resent out of sequence. If it dose not, a change is assumed to have occurred and the sending router then alerts the rest of the network in its next LSP.


Effect of one wire on another is called as cross talk.


Uses two characters to identify a country as the last suffix. The data connection is made between the data transfer processes. Here sequence of redundant bits, called the CRC remainder is appended to the end of data unit.

A connection is a single logical networsk between the source and destination that is associated with all packets in a message. A repeater is a device that forwards digital signals, much like an amplifier forwards analog signals. Direct current is a zero-frequency signal with constant amplitude.

What are the responsibilities of data link layer? Installation and maintenance is difficult. MAC sub layer resolves the contention for the shared media. How many ports are needed for each device? Created by web server whenever a browser requests the document. What are the two classes of traffic in FDDI? Why the congestion occur in network? At nettworks receiving machine, each layer removes the data meant for it and passes the rest to the next layer.

The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks CRC CRC is based on binary division. In quesions key, the same key is used by both parties.

Group the OSI layers by function.

Posted in Sex