CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .
|Published (Last):||27 June 2006|
|PDF File Size:||9.32 Mb|
|ePub File Size:||7.89 Mb|
|Price:||Free* [*Free Regsitration Required]|
How to request Study Material? What is rate based design? There are 3 types of HDLC frames. Distinguish between marka relationship and a primary-secondary relationship. Pretty Good Privacy is used to provide security for electronic mail.
This basic strategy is usually called hop-by-hop flow control. Explain about secret key encryption algorithm. Each time it tries to transmit but fails, the adaptor doubles the netwoorks of time it waits before trying again.
The services provided by the transport layer End-to- end delivery Addressing Reliable markw Flow control Multiplexing 3. The control data added to the beginning of a data is called headers.
All the devices share the link equally. What are the three events involved in a connection? Explain the main idea of UDP?
CS – Computer Networks – 2 & 16 Marks with answers :Study Zone
What are the three events involved in the connection? A passive hub provides a simple physical connection between the attached devices. A trailer is added at layer2.
It is used in crating dynamic documents. What are the two classes of traffic in FDDI? Headers are added to the message at the layers 6,5,4,3, and 2. Define bridge and explain the type of bridges. The control connection is made between the control processes.
There are 4 types of redundancy checks are used in data communication. It provides authentication, confidentiality, data integrity, and non repudiation.
The quality of service defines a set of attributes related to the performance of the connection. Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they are processed. Group the OSI layers byfunction? Headers networms added to the message at the layers 6,5,4,3, and 2. The control connection uses very simple rules of communication.
The error detection method used by the higher layer protocol is called checksum. One set contains the end user portion of the HDLC frame — the logical address, control information, and data.
Permutation is transposition in cs23022 level. E Civil 5th Semester Question Such switches are sometimes known by the obvious name of LAN switches. The node sends a Probe frame. Thus flow control is an end to an end issue, while congestion control is concerned with answwers hosts and networks interact.
The combining process is called concatenation. Domain name space is divided into three different sections: List out the available detection methods.
What are the rules of boundary-level masking? The connection is made after both computers do handshaking. So it is used to encrypt or decrypt long messages. Packets in this technology are referred to as datagram.
The node selects one of the access points, and sends that AP an Association Request frame. In answeers method, the same virtual circuit is provided between two uses on a continuous basis.