X

XCS353 Computer Networks M.Sc Question Bank : niceindia.com

Name of the College : Noorul Islam College of Engineering
University : Anna University
Degree : M.Sc
Department : Software Engineering
Subject Code/Name : XCS 353 – Computer Networks
Year :
Semester :
Document Type : Question Bank
Website : niceindia.com

Download Model/Sample Question Paper : https://www.pdfquestion.in/uploads/niceindia.com/3143-XCS_353Computer_Networks.pdf

NICE Computer Networks Question Paper

1. List out the various error detecting algorithm? :
** CRC(Cyclic Redundancy check)
** Two dimensional parity
** Check sum

Related : Noorul Islam College of Engineering XCS352 Theory of Computation M.Sc Question Bank : www.pdfquestion.in/3142.html

2. What is ARQ? :
The general strategy of using acknowledgements and timeouts to implement reliable delivery is called automatic repeat request (ARQ).

3. What is the key idea of Stop & Wait Protocol? :
After transmitting one frame, the sender waits for an acknowledgment before transmitting the next frame. If the acknowledgement does not arrive after a certain period of time, the sender time out and retransmits the original frame.

4. What is CSMA/CD? :
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detect. Ethernet is a multiple access network (shared link) and the carrier sense means that all the nodes can distinguish between an idle and busy link. collision detect means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered with a frame transmitted by another node.

5. Write short notes on Ethernet. :
Carrier Sense Multiple Access with Collision Detect. Ethernet is a multiple access network (shared link) and the carrier sense means that all the nodes can distinguish between an idle and busy link. collision detect means that a node listens as it transmits and can therefore detect when a frame it is transmitting has interfered with a frame transmitted by another node.

6. What is transceiver? :
Transceiver is a small device directly attached to the tap and detects when the line is idle and drives the signal when the host is transmitting.

7. What is Repeater? :
Repeater propagate the signal from one segment to another

8. What is a Hub? :
Hub (MultiWay Repeater) propagates the signal onto a number of segments, possibly with different types of cable.

9. Write short notes on Ethernet address? :
Ethernet host in the world has a unique address. The address belongs to the adaptor, not the host; it is usually burned into ROM. it has six hexa decimal numbers separated by colons. Example 8 :0:2b:e4:b1:2.

10. Differentiate between Service interface and Peer-to-Peer interface. :
Service interface communicate between object in the same network system. Peer-to-peer interface communicate between object in different systems.

11. Write short notes on promiscuous mode. :
In promiscuous mode it delivers all received frames to the host, but this is not the normal mode.

12. Why Ethernet is called 1 persistent protocol? :
Ethernet is said to be a 1 persistent protocol because an adaptor with a frame to send transmits with probability 1 whenever a busy line goes idle.

13. What is an exponential back off? :
Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again. Each time it tries to transmit but fails, the adaptor doubles the amount of time it waits before trying again. This strategy of doubling the delay interval between each transmission attempt is a general technique known as exponential back off.

14. What are the advantages of Ethernet? :
** Easy to admin and maintain
** No switch, Router and configuration table
** Easy to add a new Host
** Inexpensive one

15. Write short notes on Token Ring. :
A number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Medium access control is provided by a small frame, the token that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time.

16. Write short notes on FDDI. :
** FDDI uses a ring topology of multimode or single mode optical fiber transmission links operating at 100 Mbps to span up to 200 kms and permits up to 500 stations.
** Employs dual counter-rotating rings.
** 16 and 48-bit addresses are allowed.
** In FDDI, token is absorbed by station and released as soon as it completes the frame transmission {multi-token operation}.

17. What are the 2 different classes of traffic used in FDDI? :
FDDI is designed to handle two types of traffic :
** Synchronous frames that typically have tighter delay requirements (e.g., voice and video)
** Asynchronous frames have greater delay tolerances (e.g., data traffic)

18. Write short notes on network users. :
Network users want the network to provide services that their applications need; e.g., guarantee that each message will be delivered in order, without errors, and within a predefined delay

19. Write short notes on Network designers. :
Network designers want a cost-effective design; e.g., network resources are efficiently utilized and fairly allocated to users

20. Write short notes on Network Providers. :
Network providers want a system that is easy to administer and manage; e.g., faults can be easily found, system can be hot-swapped,

Categories: Computer Networks
Jency:
www.pdfquestion.in © 2022 Contact Us   Privacy Policy   Site Map