CN Viva Questions
CN Viva Questions
CN Viva Questions
2. What is a Link?
At the lowest level, a network can consist of two or more computers directly
connected by some physical medium such as coaxial cable or optical fiber. Such a
physical medium is called as Link.
3. What is a node?
A network can consist of two or more computers directly connected by some
physical medium such as coaxial cable or optical fber. Such a physical medium is
called as Links and the computer it connects is called as Nodes.
Access.
& What are the criteria necessary for an effective and efficient network?
a. Performance
It can be measured in many ways, including transmit time and response time. b.
Reliability
It is measured by frequency of failure, the time it takes a link to recover from a
failure, and the network's robustness.
C. Security
Security issues includes protecting data from unauthorized access and virues.
1. Number of Users
2. Type of transmission medium
3. Hardware
4. Software
10. Name the factors that affect the reliability of the network?
Frequency offailure
Recovery time of a network after a failure
11. Name the factors that affect the security of the network?
uthorized Access
.Viruses
12. What is Protocol?
A protocol is a set of rules that govern all aspects of information communication.
31. Which layer links the network support layers and user support layers?
The Transport layer links the network support layers and user support layers
32. What are the concerns of the Physical Layer?
Physical layer coordinates the functions required to transmit a bit stream over a
physical medium.
a. Physical characteristics of interfaces and media
b. Representation of bits
c. Data rate
d Synchronization of bits
e. Line configuration
f Physical topology
& Transmission mode
a. Translation
b. Encryption
c. Compression
1. Asynchronous Protocols
2. Synchronous Protocols
a. Character Oriented Protocols
b. Bit Oriented protocols
Series of interface points that allow other computers to communicate with the other
ers of network protocol stack.
control congestion.
3. Routers: They relay packets among multiple interconnected networks (i.e. LANS of
different type). They operate in the physical, data link and network layers. They
contain software that enable them to determine which of the several possible paths
is the best for a particular transmission.
4. Gateways: They relay packets among networks that have different protocols (e.g
between a LAN and a WAN). They accept a packet formatted for one protocol and
convert it to a packet formatted for another protocol before forwarding it. They
operate in all seven layers of the OSI model.
99. What are the data units at different layers of the TCP /IP protocol suite?
The data unit created at the application layer is called a message, at the transport
layer the data unit created is called either a segment or an user datagram, at the
network layer the data unit created is called the datagram, at the data link layer the
datagram is encapsulated in to a frame and finally transmitted as signals along the
transmission media.
The address resolution protocol (ARP) is used to associate the 32 bit IP address
with the 48 bit physical address, used by a host or a router to find the physical
address of another host on its network by sending a ARP query packet that
The address resolution protocol (ARP) is used to associate the 32 bit IP address
with the 48 bit physical address, used by a host or a router to find the physical
address of another host on its network by sending a ARP query packet that
includes the IP address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its
Internet address when it knows only its physical address.
101. What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum
length of 60 bytes.
103. What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TF TP) allows a local host to obtain files from a
remote host but does not provide reliability or security. It uses the fundamental
packet delivery services offered by UDP.
The File Transfer Protocol FTP) is the standardmechanism provided by TCP /IP for
copying a fle from one host to another. It uses the services offer by TCP and so is
reliable and secure. It establis hes two connections (virtual circuits) between the
hosts, one for data transfer and another for control information.
110. What is the difference between routable and non- routable protocols?
Routable protocols can work with a router and can be used to build large networks.
Non-Routable protocols are designed to work on small, local networks and cannot be
used witha router.
111. Why should you care about the OSI Reference Model?
It provides a framework for discussing network operations and design.