0% found this document useful (0 votes)
16 views

Computer Network..One Mark

This document contains definitions and explanations of various computer networking terms: 1. It defines different types of networks like broadcast networks, unicasting, MANs, and datagram subnets. 2. It explains networking concepts such as wavelength, toll offices, half duplex transmission, and the various fields in a frame. 3. It provides descriptions of protocols and standards including PAR, ICANN, DHCP, and different multiplexing categories. 4. It covers topics such as collision, cipher, packets, internetworks, and virtual circuits.

Uploaded by

Manish Bujji
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Computer Network..One Mark

This document contains definitions and explanations of various computer networking terms: 1. It defines different types of networks like broadcast networks, unicasting, MANs, and datagram subnets. 2. It explains networking concepts such as wavelength, toll offices, half duplex transmission, and the various fields in a frame. 3. It provides descriptions of protocols and standards including PAR, ICANN, DHCP, and different multiplexing categories. 4. It covers topics such as collision, cipher, packets, internetworks, and virtual circuits.

Uploaded by

Manish Bujji
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer Network

Semester Question One Mark

1. Broadcast Network:(Apr 2012)


Transmission of a message to all nodes in a network.
2. Unicasting:(Apr 2012)
Point-to-Point transmission with exactly one sender & exactly one receiver is
sometime called unicasting.
3. MAN:(Apr 2012)
 Man stand for Metropolitan Area Network.
 It is a network which extends over an entire city.
 It can support both data& voice.
 It use ring topology.
4. Wave length:(Apr 2012)
The propagation speed of a signal divided by its frequency.
5. Toll office:(Apr 2012)

Each end office has a number of outgoing lines to one or more near by switching
centers called toll office.

6. Half duplex:(Apr 2012)


A transmission mode in which communication can be two way but not at the same
time.
Ex:Walkie-Talkie.
7. Various fields of frame:(Apr 2012)
 Flags
 Frame header
 Payload field-Holding the packet
 Frame trailer
8. PAR:(Apr 2012)
PAR stands for Positive Acknowledgement with Retransmission. An error control
method in which connection is made by retransmission of data.It is otherwise called
as ARQ(Automatic Repeat reQuest).
9. Flooding:(Apr 2012)
Saturation of a network with a message.
10. ICANN:(Apr 2012)
ICANN stands for Internet Corporation for Assigned Names and Numbers.
11. Cryptology:(Apr 2012)
The art of devising cryptography are collectively known as cryptology.
12. Qubits:(Apr 2012)
Bits sent one photon at a time are called qubits.
13. Multicasting:(Apr 2013)
A transmission method that allows copies of a single packet to be sent to a selected
group of receivers.

14. Distinguish between LAN and other kinds of Networks:(Apr 2013)

TYPES SIZE DISTANCE


LAN Building, Room, Campus. 10m,100m,1km
MAN City 10km
WAN Country, Continent 100km, 1000km

15. Peers:(Apr 2013)


The entities Comprising the Corresponding layers on different machines are called peers.
It may be software processes, hardware devices, or even human beings.
16. Byte stuffing:(Apr 2013)
The data link layer on the receiving end removes the escape bytes before giving the
data to the network layer, this technique is called byte stuffing.
17. Hamming Distance:(Apr 2013)
The number of bit positions in which two code words differ is called the Hamming
Distance.
EX: Transmitted data- 01001101
Received data- 01010100
Hamming distance=3
18. Piggy backing:(Apr 2013)
The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is known as piggy backing.
19. Various approaches for dealing with errors in the presence of pipelining:(Apr 2013)
 Go-Back-N
 Selective Repeat
20. Collision:(Apr 2013)
If two frames are transmitted simultaneously they overlap in time and the resulting
signal is garbled. This event is called a collision.
21. Cipher:(Apr 2013)
A Cipher is a character-for-character (or) bit-for-bit transformation, without regard
to the linguistic structure of the message.
22. Packets:(Apr 2014)
A Network in which data are transmitted in independent units are called packets.
23. InterNetwork:(Apr 2014)
 It is an interconnection of networks.
 It is denoted by lowercase ‘i’.
24. Computer Network:(Apr 2015)
It is a set of devices(nodes)interconnected using communication links.

25. Virtual circuit subnet:(Apr 2014)


A logic circuit made between the sending & receiving computer. The connection is
made after both computer do handshaking. After the connection, all packets follow
the same route & arrive in sequence.
26. Various categories of IP addresses:(Apr 2014)
Class
A

0 Network Host
B

1 Network Host
0
C

11 Network Host
0
D

1110 Multicast address


E

1111 Reserved for future use


27. Various Primitives for a simple transport service: (Apr 2014)
Send-Send information
Receive-Block until a data packet arrives
Listen-Block until some process tries to connect
Connect-Actively attempt to establish a connection
Disconnect-Request a release of the connection
28. Foot Print:(Apr 2015)
The first geostationary satellites had a single spatial beam that illuminated about 1/3
of the earth’s surface called its footprint.
29. Various categories of multiplexing: (Apr 2015)
 Frequency Division Multiplexing(FDM)
 Time Division Multiplexing(TDM)
 Code Division Multiplexing (CDM)
30. CSMA:(Apr 2015)
CSMA stands for Carrier Sense Multiple Access.
31. Two classes of routing algorithm:(Apr 2015)
 Non adaptive.
 Adaptive.
32. VSAT:(Apr 2015)
VSAT stand for Very Small Aperture Terminals.
33. ARQ:(Apr 2016)
ARQ stands for Automatic Repeat reQuest.
34. Predictive encoding:(Apr 2015)
The transmitter and receiver must use the same prediction algorithm. This is called
predictive encoding.
Advantage:
They reduce the size of the number to be encoded. Hence the number of bits
to be sent is also reduced.
35. Frequency hopping spread spectrum:(Apr 2015)
In frequency hopping spread spectrum, the transmitter hops from frequency to
frequency hundreds of times per second.
It is popular for military communication because it makes transmissions hard to
detect and next to impossible to jam.
36. Cryptanalysis:(Apr 2015)
The art of breaking ciphers, known as cryptanalysis.
37. Monoalphabetic substitution:(Apr 2015)
The general system of symbol-for-symbol substitution is called a monoalphabetic
substitution cipher, with the key being the 26- letter string corresponding to the full
alphabet.
Ex: Plaintext- attack.
Ciphertext- QZZQEA.
38. Bluetooth:(Apr 2016)
It is a wireless network.
It also allows digital cameras, headsets, scanners & other devices to connect to a
computer by merely being brought within a short range without connecting any
wires.
39. BentPipe:(Apr 2016)
Amplifies the Incoming signal and then rebroadcasts it at another frequency to avoid
interference with the incoming signal. This mode of operation is known as a bent
Pipe.
40. Frequency:(Apr 2016)
The number of cycles per second of a periodic signal.
41. TPDU:(Apr 2016)
TPDU Stands for Transport Protocol Data Unit.
42. WAN:(Nov 2012)
WAN stands for Wide Area Network.A network that use a technology that can span
a large geographical distance.It uses ring, star, bus and mesh topology.
Ex:Internet,CellularNetworks,SatelliteNetworks.
43. Datagram subnet:(Nov 2012)
A data transmission method in which each data unit is independent of others. Packets
are called datagrams.
44. Congestion: (Nov 2013)
Excessive network(or) internetwork traffic causing a general degradation of service.
45. Full duplex:(Nov 2013)
A transmission mode in which communication can be two way simultaneously.
Ex: Telephone network.
46. Interface:(Nov 2014)
The boundary between two pieces of equipment. It also refers to mechanical,
electrical, and functional characteristics of the connection.
47. LAN:(Nov 2014)
LAN stand for Local Area Network. A network connectivy devices inside a single
building or inside buildings close to each other.
It uses Star, ring and bus topology.
Ex: Office LAN, FDDI.
48. Local loop:(Nov 2014)
The link that connects a subscriber to the telephone central office.
49. DHCP:(Nov 2014)
DHCP stands for Dynamic Host Configuration Protocol.
50. Various internet control Protocols:(Nov 2014)
a. IMCP - Internet Control Message Protocol
b. ARP - Address Resolution Protocol
c. DHCP –Dynamic Host Configuration Protocol
51. Difference between Net service vs. Transport service:(Nov 2014)

Net Service Transport Service


 3rd layer in the OSI  4th layer in the OSI
Model. Model.
 Responsible for the  Responsible for
delivery of a packet reliable end-to-end
to the final delivery& error
destination. recovery.

52. Simplex:(Nov 2015)


A transmission mode in which communication is one way.
Ex: Keyboard, Monitor.
53. Direct sequence spread spectrum:(Nov 2015)
It uses a code sequence to spread the data signal over a wider frequency band.
It is widely used commercially as a spectrally efficient way to let multiple signals
share the same frequency band.
54. Carrier sense protocols:(Nov 2015)
Protocols in which stations listen for a carrier(i.e., a transmission ) and act
accordingly are called carrier sense protocols.
55. Various service primitives for implementing a simple connection oriented service:(Nov
2018)
 Reliable message streamEx: Sequence of pages.
 Reliable byte streamEx: Movie download.
 Unreliable connectionEx: Voice over IP.

56. GEO:(Nov 2018)

GEO stands for Geostationary Earth Orbit.

57. SNR:(Apr 2019)

 SNR stands for Signal-to-Noise Ratio.


 The amount of thermal noise present is measured by the ratio of the signal power to
the noise power.

58. UTP:(Apr 2019)

UTP stands for Unshielded Twisted Pair.

59. Two error-correcting codes:(Apr 2019)

 Hamming codes.
 Binary convolutional codes.

60. Name the communication used in remote controls of TVS and CD players:(Apr 2019)

 Infrared communication.

61. Stop- and-wait:(Apr 2019)

 A flow-control method in which each data unit must be acknowledged before the
next one can be sent.

62. Contention:(Apr 2019)

 An access method in which two or more devices try to transmit at the same time on
the same channel.
63. MPLS:(Apr 2019)
MPLS stands for Multi Protocol Label Switching.

64. Well-known ports:(Apr 2019)

 Port numbers below 1024 are reserved for standard services that can usually only be
started by privileged users.
 Example:-root in UNIX systems.

65. Two fundamentals cryptographic principles:(Apr 2019)

 Redundancy.
 Freshness.

You might also like