CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .

Author: Mazugami Vihn
Country: Japan
Language: English (Spanish)
Genre: Finance
Published (Last): 28 February 2017
Pages: 319
PDF File Size: 2.45 Mb
ePub File Size: 1.22 Mb
ISBN: 899-4-14496-862-2
Downloads: 24685
Price: Free* [*Free Regsitration Required]
Uploader: Golticage

The three keys for understanding the algorithm are Knowledge about the whole networks Routing only to neighbors Information sharing at regular intervals What is maximum transmission unit?

At the receiving machine, each layer removes the data meant for it and passes the rest to the next layer. Write short notes on LRC. A frame comptuer of one complete cycle of time slots, including one or more slot dedicated to each sending device. How are the guided media differing from unguided transmission media?


Mention the types of error correcting methods. What are the criteria used to evaluate transmission medium? Switched virtual circuit Permanent virtual circuit.

Here each entity can create a pair of keys, keep the private markks, and publicly distribute the other one. The transport layer creates the connection between source and destination.

Our Toolbar

Modulation -varying the frequency, amplitude or phase of the signal to effect the transmission of information. What are the different types of AS? A trailer is added at layer2. The system must deliver data accurately. What is meant by Permanent virtual circuit? What is function of transport layer? The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks CRC CRC is based on binary division. What are the four aspects related to the reliable delivery of data?


How to request Study Material? What are the two categories of QoS attributes? What is piggy backing? The sender follows these steps a the units are divided into k sections each of n bits.

LAN is dominated by 4 architectures. It defines that how much data a given node netwirks allowed to transmit each time it possesses the token anc equivalently, how long a given node is allowed to hold the token. Name the five categories of U-frames? What are the disadvantages of optical fiber as a transmission medium?

What is the function of FECN? The system must deliver data to the correct destination.

What are the two categories of QoS attributes? What are the networks related attributes? A token is passed among stations. In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange.

There are 4 types of redundancy checks are used in data communication. What is meant by segmentation?

CS Computer networks – RJ edition 2marks and 16marks with answers

After the connection, all packets follow the same route and arrive in sequence. Secret Key algorithms are efficient: Discuss the basic model of FTP.

Explain the term handoff? Otherwise, the received stream of bits is discarded and the dates are resent. What are the rules of non boundary-level masking? The bytes in the IP address that corresponds to in the mask will be repeated in the subnetwork address The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the subnetwork address For other bytes, use the bit-wise AND operator The transport layer ensures end-to-end reliable data transmission.


How is a secret key different from public key? SSMa receiving host specifies both a multicast group and a specific host. Explain the timers and time registers in FDDI. What are the functions of a DCE?

Anna University Chennai CS – COMPUTER NETWORKS(Regulation ) model question papers

Name four factors needed for a secure network? The error detection method used by the higher layer protocol is called checksum. Broadcast is simple — each bridge forwards a frame with a destination broadcast address out on each active selected port other than the one clmputer which the frame was received. What is meant by switched virtual circuit? What is meant by Permanent virtual circuit? Combined station sends both commands and responses. Subnetting provides an elegantly simple way to reduce the total number of network numbers that are assigned.