Network Lab Viva Questions
Network Lab Viva Questions
2. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some physical medium
such as coaxial cable or optical fiber. Such a physical medium is called as Link.
3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as coaxial
cable or optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.
8. What are the criteria necessary for an effective and efficient network?
a. Performance
It can be measured in many ways, including transmit time and response time. b. Reliability
It is measured by frequency of failure, the time it takes a link to recover from a failure, and the networks
robustness.
c. Security
Security issues includes protecting data from unauthorized access and virues.
10. Name the factors that affect the reliability of the network?
a. Frequency of failure
b. Recovery time of a network after a failure
11. Name the factors that affect the security of the network?
a. Unauthorized Access
b. Viruses
If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.
22. What is Multiplexing?
Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single
data link.
31. Which layer links the network support layers and user support layers?
The Transport layer links the network support layers and user support layers.
40. What are the different link types used to build a computer network?
a. Cables
b. Leased Lines
c. Last-Mile Links
d. Wireless Links
Asynchronous Protocols
Synchronous Protocols
a. Character Oriented Protocols
b. Bit Oriented protocols
51. Compare Error Detection and Error Correction:
The correction of errors is more difficult than the detection. In error detection, checks only any error has occurred.
In error correction, the exact number of bits that are corrupted and location in the message are known. The
number of the errors and the size of the message are important factors.