CS2302 COMPUTER NETWORKS 2 MARKS QUESTIONS AND ANSWERS PDF

CS Computer Networks Two Marks Questions With Answers Anna University, Chennai. Anna_University,_Chennai_logo. UNIT I. 1. Explain ISO/OSI . CS COMPUTER NETWORKS TWO MARK QUESTIONS WITH ANSWERS ANNA UNIVERSITY QUESTION BANK BY SELVAM COLLEGE OF. A Computer network is a number of computers interconn this is for 2 marks and 16 marks question papers for data communication. Copyright: Attribution CSComputer Networks – Anna University Engineering Question Bank 4 U. Uploaded Mobile Communication 2-MARK Questions and Answers. Uploaded .

Author: Mirisar Vinos
Country: Russian Federation
Language: English (Spanish)
Genre: Politics
Published (Last): 4 August 2011
Pages: 147
PDF File Size: 2.88 Mb
ePub File Size: 2.38 Mb
ISBN: 402-5-53744-931-3
Downloads: 62047
Price: Free* [*Free Regsitration Required]
Uploader: Gashicage

Domain name space is divided into three different sections: What is the purpose of Domain Name System? Digital signature is a method to authenticate the sender of a message. Ethernet,token ring, and several wireless protocols.

In this method, a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange. The server has two components: GE Computer Programming 4. The UA prepares the message, creates the envelope, and puts the message in the envelope.

Write the keys for understanding the link state routing. A router gets its coomputer about its neighbors by periodically sending them a short greeting packets. In longitudinal redundancy check LRCa block of bits is divided into rows and a redundant row of bits is added to the whole block.

  BATUK BHAIRAV STOTRA PDF

These bitts are called framing bits. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact.

CS – Computer Networks – 2 & 16 Marks with answers :Study Zone

CS — Computer Networks Page 12 of 24 6. Why Ethernet is said to be a I -persistent protocol? If a frame is corrupted comuter transit, a NAK ansewrs returned and the frame is resent out of sequence. Security issues include protecting data from unauthorized access and viruses. What is the function of FECN? The two main categories are User Oriented Network Oriented Where is the Menu? What are the criteria used to evaluate transmission medium?

Internet Control Message Protocol is a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully For one million users answwers communicate, only two million keys are needed. The value of the code sub field is 10 Reject REJ. Anna University – B.

Our Toolbar

Calculating the cipher text using the long keys takes a networsk of time. It is used to forward the packets between shared media LANs such as Ethernet.

  CVSA OUT OF SERVICE CRITERIA PDF

Instead, the receiver looks metworks changes from one level to another as its basis for recognition of 1s. Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again.

CS Computer networks – RJ edition 2marks and 16marks with answers

The switch moves from device to device at a constant rate and fixed order. What is meant by quality of service? The sender CS — Computer Networks Page 13 of 24 and receiver are communicating with each other and are using some types of flow control at a higher level. So it is used to encrypt or decrypt long messages. What is Token Bus?

Domain name space is divided into three different sections: The dividing process is called segmentation. Write short notes on CRC checker.

In datagram approach, quesyions packet is treated independently from all others. List the various ways of station configuration.