0% found this document useful (0 votes)
2 views

Computer Networks QA

The document covers various topics related to communication technologies, including coaxial cables, types of errors, unguided media, and IEEE 802.11 architecture. It also discusses Bluetooth limitations, compares guided and unguided media, and explains multiplexing techniques like FDM and TDM. Additionally, it details mobile generations, compares IPv4 and IPv6, describes IP address classes, and explains packet switching and satellite communication principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer Networks QA

The document covers various topics related to communication technologies, including coaxial cables, types of errors, unguided media, and IEEE 802.11 architecture. It also discusses Bluetooth limitations, compares guided and unguided media, and explains multiplexing techniques like FDM and TDM. Additionally, it details mobile generations, compares IPv4 and IPv6, describes IP address classes, and explains packet switching and satellite communication principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1) Draw a neat diagram of coaxial cable.

A coaxial cable has a central conductor, insulating layer, metallic shield, and outer insulating layer.

[Diagram will be included separately]

2) List different types of errors.

- Single-bit error

- Burst error

- Random error

- Systematic error

3) State any two types of unguided media.

- Radio waves

- Microwaves

4) Explain 802.11 architecture.

IEEE 802.11 architecture consists of stations (STA), access points (AP), basic service set (BSS),

and distribution system (DS). It supports infrastructure and ad-hoc modes.

5) State any two limitations in Bluetooth.

- Limited range (typically 10 meters)

- Low data transfer rate compared to Wi-Fi

6) Compare guided & unguided transmission media.

Guided Media:

- Uses physical path (e.g., cables)

- Less susceptible to interference

Unguided Media:

- Wireless transmission

- More prone to interference

7) List IEEE802.11 standards for network.

- 802.11a: 5 GHz, 54 Mbps


- 802.11b: 2.4 GHz, 11 Mbps

- 802.11g: 2.4 GHz, 54 Mbps

- 802.11n: 2.4/5 GHz, 600 Mbps

- 802.11ac: 5 GHz, up to 1 Gbps

8) Define multiplexing. Compare FDM & TDM.

Multiplexing: Technique to transmit multiple signals over a single medium.

FDM: Frequency Division Multiplexing - assigns different frequencies.

TDM: Time Division Multiplexing - assigns different time slots.

9) Describe various mobile generations in detail.

- 1G: Analog voice communication

- 2G: Digital voice, SMS

- 3G: Internet access, video calling

- 4G: High-speed data, HD streaming

- 5G: Ultra-fast, low latency, IoT support

10) Compare IPv4 & IPv6.

IPv4: 32-bit, 4.3 billion addresses, dotted decimal

IPv6: 128-bit, huge address space, hexadecimal, improved security

11) Describe various IP address classes with suitable example.

- Class A: 1.0.0.0 to 126.0.0.0

- Class B: 128.0.0.0 to 191.255.0.0

- Class C: 192.0.0.0 to 223.255.255.0

12) Describe the principle of packet switching technique with neat example.

Data is broken into packets, sent independently, and reassembled at destination. Efficient and

robust for data communication.

13) State the layers at which the protocol work

1) SLIP

2) IP
3) SMTP

4) UDP

1) SLIP - Data Link Layer

2) IP - Network Layer

3) SMTP - Application Layer

4) UDP - Transport Layer

14) Explain satellite communication with diagram.

It involves transmitting signals to a satellite which relays it to the ground station. Useful for global

coverage. [Diagram will be included]

15) Demonstrate working of CRC with example.

CRC (Cyclic Redundancy Check) adds a checksum to data using polynomial division. The receiver

verifies data integrity using the same polynomial.

You might also like