SlideShare a Scribd company logo
1 of 5
UNIT-2
1. Define hidden node problem. MAY/JUNE 2016
It is a situation that occurs on a wireless network where two nodes A and C are sending to a
common destination at the same time because A and C not aware of each other’s transmission.
Eg:
A and C both are within the range of B but not each other. Suppose both A and C wants to
communicate with B. But A and C are unaware of each other and so their frames collide with
each other at B. As A and C is unaware of this collision they are said to be hidden nodes with
respect to each other.
A,B,C are nodes in networking
2. What is Bluetooth? NOV/DEC 2012, MAY/JUNE 2016
 Bluetooth is designed for communication over short distances (on the order of 10 m) with
a bandwidth of 1 Mbps.
 It fills the place of very short-range communication between mobile phones, PDAs,
notebook computers, and other personal or peripheral devices.
 For example, Bluetooth can be used to connect mobile phones to a headset, or a notebook
computer to a printer.
Advantages:
 It creates adhoc connection immediately without any wires.
 It has low power consumption.
 It has range better than Infrared communication.
 Bluetooth devices are available at very cheap cost
3. Write the types of connecting devices in internetworking. MAY/JUNE 2016
1. Hub
2. Repeater
3. Modem, NIC (Network Interface Card)
4. Media Converters, Basic Switches and Bridges
4. Expand ICMP and write the function. MAY/JUNE 2016 , MAY /JUNE 2015
 IP is always configured with a companion protocol known as the Internet Control
Message Protocol (ICMP).
 It defines a collection of error messages that are sent back to the source host whenever a
router or host is unable to process an IP datagram successfully.
For example, ICMP defines the following error messages
 Source Quench
 Time Exceeded
 Parameter Problem
 Redirection
 Destination Unreachable
5. What is meant by exponential back-off? NOV/DEC 2016
 It is a retransmission strategy that doubles the timeout value each time, when a packet is
retransmitted.
 Once an adaptor has detected a collision and stopped its transmission, it waits a certain
amount of time and tries again. Each time it tries to transmit but if it fails again, then the
adaptor doubles the amount of time. This strategy of doubling the delay interval between
each retransmission attempt is a general technique known as exponential back-off.
6. What is scatternet? NOV/DEC 2016
 A scatternet is a type of ad hoc computer network consisting of two or more piconets.
 It is defined as a number of interconnected piconets that supports communication
between more than 8 devices.
 Upto 8 devices can communicate in a small network and is called as piconets.
 The terms "scatternet" and "piconet" are typically applied to bluetooth wireless
technology.
7. Define subnetting. NOV/DEC 2015
 A subnetwork or subnet is a single IP network address to denote multiple physical
networks.
 Routers within a subnetwork use a subnet mask to discover the physical network to
which a packet should be forwarded.
 Subnetting effectively introduces a third level to the two-level hierarchical IP address.
Advantage:
Address space utilization
Subnetting
8. What is the need of ARP? NOV/DEC 2015
 ARP (Address Resolution Protocol) is a mechanism to determine the MAC address of
the node.
 It is used to translate global IP addresses into local link-layer addresses.
9. Identify the class of the following IP address: NOV/DEC 2015
(a) 110.34.56.45
(b) 212.208.63.2
Answers:
Ranges for communication:
CLASS A : 0.0.0.0 to 127.255.255.255
CLASS B : 128.0.0.0 to 191.255.255.255
CLASS C :192.0.0.0 to 223.255.255.255
CLASS D :224.0.0.0 to 239.255.255.255
CLASS E :240.0.0.0 to 255.255.255.255
(a) 110.34.56.45 - ClassA
(b) 212.208.63.23- Class C
10. What is the average size of an Ethernet frame? APR/MAY 2014, NOV/DEC 2017
 The Ethernet IEEE 802.3 standard defined the minimum Ethernet frame size as 64 bytes
 The Ethernet IEEE 802.3 standard defined the maximum Ethernet frame size as 1518 bytes.
 The maximum was later increased to 1522 bytes to allow for VLAN classification.
Ethernet frame format
11. What are the access methods used by wireless LAN? APR/MAY 2014
 Frequency Division Multiple Access (FDMA)
 Time Division Multiple Access (TDMA)
 Code Division Multiple Access (CDMA)
 Space Division Multiple Access (SDMA)
12. State the uses of valid transmission timer. NOV/DEC 2014
 The Valid Transmission Timer (TVX) calculates the period between correct frame
transmissions, therefore it is used to check for faults on the ring. If it expires then a new
claim process begins.
13. What is the purpose of Network Interface Card? MAY/JUNE 2013
 A network interface controller or card is a computer hardware component that connects a
computer to a computer in a network society.
 It manages or controls the wired & wireless connection to exchange the information
between PC’s & internet.
14. What are Virtual LANs? MAY/JUNE 2013
 To increase the scalability of extended LANs .
 VLANs allow a single extended LAN to be partitioned into several separate LANs.
 Each virtual LAN is assigned an identifier and packets can only travel from one segment to
another if both segments have the same identifier.
Advantages:
Like a router, it partitions the network into logical segments, which provides better
administration, security, and management of multicast traffic.
Virtual LANs
15. Why IPV6 is preferred than IPV4? NOV/DEC 2013, MAY/JUNE 2013 , APRIL/ MAY 2017
IPng or IPV6 were
 Support for real-time services.
 Security support is more.
 Auto configuration (i.e., the ability of hosts to automatically configure themselves
with such information as their own IP address and domain name)
 Enhanced routing functionality, including support for mobile hosts
Internet Protocol (also known as IPv4).
 Support connectionless service
 Support best-effort delivery service of datagram across the internet
Compared with IPv4 and IPv6, IPv6 supports multiple networking features than IPv4.
16. What is the use of multicast routing? NOV/DEC 2013
 Multicast routing protocols are used to distribute data (for example, audio/video
streaming broadcasts) to multiple recipients simultaneously.
 In multicast, a source can send a single copy of data to a single multicast address, which
is distributed to an entire group of recipients.
17. Why Ethernet is said to be an I-persistent protocol? NOV/DEC 2012
An adaptor with a frame transmits with probability “1” whenever a busy line
goes idle is said to be a I-persistent protocol.
18. Define ICMP. NOV/DEC 2012
Internet Control Message Protocol (ICMP).
 This protocol is an integral part of IP.
 It allows a router or destination host to communicate with the source, typically to
report an error in IP datagram processing.
19. When is ICMP redirect message used? APR/ MAY 2017
 The ICMP redirect message is used to notify a remote host to send the data packets
on an alternative route.
 Redirects the message only through gateways.
20. What is DHCP? NOV/DEC 2012
The Dynamic Host Configuration protocol has been derived to provide dynamic
configuration. DHCP is also needed when a host moves from network to network or is
connected and disconnected from a network.

More Related Content

What's hot (20)

Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
EC8702 – Unit 1.pptx
EC8702 – Unit 1.pptxEC8702 – Unit 1.pptx
EC8702 – Unit 1.pptx
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
IGMP
IGMPIGMP
IGMP
 
Vlsm
VlsmVlsm
Vlsm
 
Transport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And DemultiplexingTransport Layer Services : Multiplexing And Demultiplexing
Transport Layer Services : Multiplexing And Demultiplexing
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Basic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBasic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing system
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
IPocalypse
IPocalypseIPocalypse
IPocalypse
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Subnetting made simple
Subnetting made simpleSubnetting made simple
Subnetting made simple
 
Ch10
Ch10Ch10
Ch10
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Fingerprint based electronic voting system
Fingerprint based electronic voting systemFingerprint based electronic voting system
Fingerprint based electronic voting system
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Similar to Unit 2

Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer AnamikaSinha57
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docxUsamaAliLone3
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignmentRebecca Patient
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 

Similar to Unit 2 (20)

Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
It6601 mc - qb - part a (2) (1)
It6601   mc - qb - part a (2) (1)It6601   mc - qb - part a (2) (1)
It6601 mc - qb - part a (2) (1)
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
Computer Networking Tasks.docx
Computer Networking Tasks.docxComputer Networking Tasks.docx
Computer Networking Tasks.docx
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Ipv4 Vs Ipv6
Ipv4 Vs Ipv6Ipv4 Vs Ipv6
Ipv4 Vs Ipv6
 
Unit 1 qb
Unit 1 qbUnit 1 qb
Unit 1 qb
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
information technology
information technologyinformation technology
information technology
 
information technology
information technologyinformation technology
information technology
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Unit 2

  • 1. UNIT-2 1. Define hidden node problem. MAY/JUNE 2016 It is a situation that occurs on a wireless network where two nodes A and C are sending to a common destination at the same time because A and C not aware of each other’s transmission. Eg: A and C both are within the range of B but not each other. Suppose both A and C wants to communicate with B. But A and C are unaware of each other and so their frames collide with each other at B. As A and C is unaware of this collision they are said to be hidden nodes with respect to each other. A,B,C are nodes in networking 2. What is Bluetooth? NOV/DEC 2012, MAY/JUNE 2016  Bluetooth is designed for communication over short distances (on the order of 10 m) with a bandwidth of 1 Mbps.  It fills the place of very short-range communication between mobile phones, PDAs, notebook computers, and other personal or peripheral devices.  For example, Bluetooth can be used to connect mobile phones to a headset, or a notebook computer to a printer. Advantages:  It creates adhoc connection immediately without any wires.  It has low power consumption.  It has range better than Infrared communication.  Bluetooth devices are available at very cheap cost 3. Write the types of connecting devices in internetworking. MAY/JUNE 2016 1. Hub 2. Repeater 3. Modem, NIC (Network Interface Card) 4. Media Converters, Basic Switches and Bridges 4. Expand ICMP and write the function. MAY/JUNE 2016 , MAY /JUNE 2015  IP is always configured with a companion protocol known as the Internet Control Message Protocol (ICMP).  It defines a collection of error messages that are sent back to the source host whenever a router or host is unable to process an IP datagram successfully. For example, ICMP defines the following error messages  Source Quench  Time Exceeded
  • 2.  Parameter Problem  Redirection  Destination Unreachable 5. What is meant by exponential back-off? NOV/DEC 2016  It is a retransmission strategy that doubles the timeout value each time, when a packet is retransmitted.  Once an adaptor has detected a collision and stopped its transmission, it waits a certain amount of time and tries again. Each time it tries to transmit but if it fails again, then the adaptor doubles the amount of time. This strategy of doubling the delay interval between each retransmission attempt is a general technique known as exponential back-off. 6. What is scatternet? NOV/DEC 2016  A scatternet is a type of ad hoc computer network consisting of two or more piconets.  It is defined as a number of interconnected piconets that supports communication between more than 8 devices.  Upto 8 devices can communicate in a small network and is called as piconets.  The terms "scatternet" and "piconet" are typically applied to bluetooth wireless technology. 7. Define subnetting. NOV/DEC 2015  A subnetwork or subnet is a single IP network address to denote multiple physical networks.  Routers within a subnetwork use a subnet mask to discover the physical network to which a packet should be forwarded.  Subnetting effectively introduces a third level to the two-level hierarchical IP address. Advantage: Address space utilization Subnetting 8. What is the need of ARP? NOV/DEC 2015  ARP (Address Resolution Protocol) is a mechanism to determine the MAC address of the node.  It is used to translate global IP addresses into local link-layer addresses. 9. Identify the class of the following IP address: NOV/DEC 2015 (a) 110.34.56.45 (b) 212.208.63.2
  • 3. Answers: Ranges for communication: CLASS A : 0.0.0.0 to 127.255.255.255 CLASS B : 128.0.0.0 to 191.255.255.255 CLASS C :192.0.0.0 to 223.255.255.255 CLASS D :224.0.0.0 to 239.255.255.255 CLASS E :240.0.0.0 to 255.255.255.255 (a) 110.34.56.45 - ClassA (b) 212.208.63.23- Class C 10. What is the average size of an Ethernet frame? APR/MAY 2014, NOV/DEC 2017  The Ethernet IEEE 802.3 standard defined the minimum Ethernet frame size as 64 bytes  The Ethernet IEEE 802.3 standard defined the maximum Ethernet frame size as 1518 bytes.  The maximum was later increased to 1522 bytes to allow for VLAN classification. Ethernet frame format 11. What are the access methods used by wireless LAN? APR/MAY 2014  Frequency Division Multiple Access (FDMA)  Time Division Multiple Access (TDMA)  Code Division Multiple Access (CDMA)  Space Division Multiple Access (SDMA) 12. State the uses of valid transmission timer. NOV/DEC 2014  The Valid Transmission Timer (TVX) calculates the period between correct frame transmissions, therefore it is used to check for faults on the ring. If it expires then a new claim process begins. 13. What is the purpose of Network Interface Card? MAY/JUNE 2013  A network interface controller or card is a computer hardware component that connects a computer to a computer in a network society.  It manages or controls the wired & wireless connection to exchange the information between PC’s & internet. 14. What are Virtual LANs? MAY/JUNE 2013  To increase the scalability of extended LANs .  VLANs allow a single extended LAN to be partitioned into several separate LANs.  Each virtual LAN is assigned an identifier and packets can only travel from one segment to another if both segments have the same identifier. Advantages: Like a router, it partitions the network into logical segments, which provides better administration, security, and management of multicast traffic.
  • 4. Virtual LANs 15. Why IPV6 is preferred than IPV4? NOV/DEC 2013, MAY/JUNE 2013 , APRIL/ MAY 2017 IPng or IPV6 were  Support for real-time services.  Security support is more.  Auto configuration (i.e., the ability of hosts to automatically configure themselves with such information as their own IP address and domain name)  Enhanced routing functionality, including support for mobile hosts Internet Protocol (also known as IPv4).  Support connectionless service  Support best-effort delivery service of datagram across the internet Compared with IPv4 and IPv6, IPv6 supports multiple networking features than IPv4. 16. What is the use of multicast routing? NOV/DEC 2013  Multicast routing protocols are used to distribute data (for example, audio/video streaming broadcasts) to multiple recipients simultaneously.  In multicast, a source can send a single copy of data to a single multicast address, which is distributed to an entire group of recipients. 17. Why Ethernet is said to be an I-persistent protocol? NOV/DEC 2012 An adaptor with a frame transmits with probability “1” whenever a busy line goes idle is said to be a I-persistent protocol. 18. Define ICMP. NOV/DEC 2012 Internet Control Message Protocol (ICMP).  This protocol is an integral part of IP.  It allows a router or destination host to communicate with the source, typically to report an error in IP datagram processing. 19. When is ICMP redirect message used? APR/ MAY 2017  The ICMP redirect message is used to notify a remote host to send the data packets on an alternative route.  Redirects the message only through gateways.
  • 5. 20. What is DHCP? NOV/DEC 2012 The Dynamic Host Configuration protocol has been derived to provide dynamic configuration. DHCP is also needed when a host moves from network to network or is connected and disconnected from a network.