0% found this document useful (0 votes)
6 views5 pages

2 Marks CN

The document provides definitions and explanations of key concepts in computer networking, including computer networks, topology, datagrams, encryption, switches, and various network protocols. It also covers topics such as congestion, multiplexing, routers, bridges, and different types of network topologies. Additionally, it discusses technical terms like bit rate, baud rate, and standards such as IEEE 802.11.

Uploaded by

hehee560010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

2 Marks CN

The document provides definitions and explanations of key concepts in computer networking, including computer networks, topology, datagrams, encryption, switches, and various network protocols. It also covers topics such as congestion, multiplexing, routers, bridges, and different types of network topologies. Additionally, it discusses technical terms like bit rate, baud rate, and standards such as IEEE 802.11.

Uploaded by

hehee560010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1. Define Computer Networks.

A computer network is a system that connects numerous independent computers in order


to share information (data) and resources.A computer network is a collection of two or
more computer systems that are linked together.
2. What is Topology?
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topology defines the structure of the network of how all the
components are interconnected to each other.
3. What is Datagram?
datagram refers to the smallest unit via which data is transmitted. Datagrams are data
packets which contain adequate header information so that they can be individually routed
by all intermediate network switching devices to the destination.
4. Define the term encryption and decryption.
Data encryption translates the data into another form or code. The encrypted data is
known as the ciphertext and the decrypted data is known as plain text. A key value is used
for encrypting as well as decrypting data.
5. What is a switch?
Switch is a networking device that groups all the devices over the network to transfer the
data to another device. A switch is better than Hub as it does not broadcast the message
over the Computer
6. Define line coding and unipolar encoding
7. What is pipelining?
pipelining is the method of sending multiple data units without waiting for an
acknowledgment for the first frame sent. Pipelining ensures better utilization of network
resources and also increases the speed of delivery, particularly in situations where a large
number of data units make up a message to be sent.
8. What is CRC?
CRC or Cyclic Redundancy Check is a method of detecting accidental changes/errors in the
communication channel. • CRC uses Generator Polynomial which is available on both
sender and receiver side.
9. What is a gateway ?
A gateway is a network node used in telecommunications that connects two networks with
different transmission protocols together. Gateways serve as an entry and exit point for a
network as all data must pass through or communicate with the gateway prior to being
routed.
10.What is polling ?
Polling is the process where the computer or controlling device waits for an external device
to check for its readiness or state, often with low-level hardware.
11.Define thin and thick ethernet.
Ethernet based LANs using thick cable for inter-connection is referred as Thicknet. While
ethernet systems using thinner coaxial cable is referred as Thinnet.
12.What is congestion?
Congestion causes choking of the communication channel. When too many packets are
displayed in a part of the subnet, the subnet's performance degrades. Hence, the network's
communication channel is called congested
13.Mention the different types of Network topologies.
• Bus Topology.
• Ring Topology.
• Mesh Topology.
• Tree Topology.
• Star Topology.
• Hybrid Topology.

14.What is Multiplexing?
Multiplexing is a technique used to combine and send the multiple data streams over a
single medium. The process of combining the data streams is known as multiplexing and
hardware used for multiplexing is known as a multiplexer
15.Compare LAN and WAN.

16.What is Shannon channel capacity for a noisy channel?


Shannon Capacity • In 1944, Claude Shannon developed • Bandwidth is the bandwidth of
the channel, • SNR is the signal-to-noise ratio, and SNR = (Power of signal) / (power of
noise). • Capacity is the capacity of the channel in bits per second.
17.Expand SMTP and SNMP.
Simple Mail Transfer Protocol
Simple Network Management Protocol
18.Define SNR.
a signal-to-noise ratio, often written S/N or SNR, is a measure of the strength of the desired
signal relative to background noise (undesired signal).
19.What is digital to digital encoding?
Digital-to-digital encoding is the representation of digital information by a digital signal.
When binary 1s and 0s generated by the computer are translated into a sequence of
voltage pulses that can be propagated over a wire, this process is known as digital-to-digital
encoding.

20.Define Router.
Router is a device that connects the LAN to the internet. The router is mainly used to
connect the distinct networks or connect the internet to multiple computers.
21.What is Reservation ?
Whenever we travel from a train or an airplane, the first thing we do is to reserve our seats,
similarly here a station must make a reservation first before transmitting any data-frames.
• This reservation in Computer Network timeline consists of two kinds of periods:
1.Reservation interval of a fixed time duration
2.Data transmission period of variable frames
22.What is bridge? List down the different types of bridges.
Bridges are used to connect two subnetworks that use interchangeable protocols. It
combines two LANs to form an extended LAN.
• Transparent Bridge.
• Source-Route Bridge.

23.What is telnet?
Telnet is a network protocol used to virtually access a computer and to provide a two-way,
collaborative and text-based communication channel between two machines.
24.What is meant by protocol and internet protocol suite?
Internet Protocol suite (IP suite) is the standard network model and communication
protocol stack used on the Internet and on most other computer networks.
25.Define encoding and decoding.
encoding is the process of putting a sequence of characters (letters, numbers, punctuation,
and certain symbols) into a specialized format for efficient storage. Decoding is the
opposite process -- the conversion of an encoded format back into the original sequence of
characters.
26.What is piggybacking? What is its purpose?
Piggybacking is a method of attaching acknowledgment to the outgoing data packet . The
concept of piggybacking is explained as follows: Consider a two-way transmission between
host A and host B . When host A sends a data frame to B, then B does not send the
acknowledgment of the frame sent immediately.
27.What is the difference between ethernet and fast ethernet?
Fast Ethernet focused on increased network and network appliance speed over standard
Ethernet and Ethernet devices. Fast Ethernet provided uniform operability for data
transmission at over 100 megabits per second.
28.Define bit rate and baud rate.
The Baud rate refers to the total number of signal units transmitted in one second. The Bit
rate refers to the total Bits transmitted in one unit time.
Baud rate indicates the total number of times the overall state of a given signal changes/
alters. Bit rate indicates the total bits that travel per second.
29.What do you mean by Nyquist signalling rate? Explain.
the Nyquist rate, named after Harry Nyquist, is a value (in units of samples per second or
hertz, Hz) equal to twice the highest frequency (bandwidth) of a given function or signal.
30.What is CSMA and CSMA/CD?
Carrier Sense Multiple Access
• To minimize the chance of collision and, therefore, increase the performance.
• Principle of CSMA:"Sense before transmit"
• Carrier busy-Transmission is taking place
• Carrier idle-No transmission currently taken place
CSMA/CD is a media access control method that was widely used in Early Ethernet
technology(It is used in 802.3 Ethernet network cable)/LANs when there used to be shared
Bus Topology and each node ( Computers) were connected By Coaxial Cables.
31.What do you mean by IEEE 802.11 standards?
IEEE 802.11 refers to the set of standards that define communication for wireless LANs
(wireless local area networks, or WLANs
32.What do you mean by flooding? Explain.
Flooding is a non-adaptive routing technique following this simple method: when a data
packet arrives at a router, it is sent to all the outgoing links except the one it has arrived on.
33.Define datagram and packet.
Datagram" is a segment of data sent over a packet-switched network. A datagram contains
enough information to be routed from its source to its destination.
A network packet is a basic unit of data that's grouped together and transferred over a
computer network, typically a packet-switched network, such as the internet.

You might also like