2. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first B. first two C. first three D.

Size: px
Start display at page:

Download "2. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first B. first two C. first three D."

Transcription

1 1. What device separates a single network into two segments but lets the two segments appear as one to higher protocols? A. Switch B. Bridge C. Router D. Gateway 2. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first B. first two C. first three D. first four 3. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? A. flooding B. delta routing C. static routing D. hot potato routing 4. Frames from one LAN can be transmitted to another LAN via the device A. Bridge B. Router C. Modem D. Repeater 5. Which of the following condition is used to transmit two packets over a medium at the same time? A. Collision B. Contention C. Synchronous D. Asynchronous 6. The houses the switches in token ring. A. NIC B. MAU

2 C. transceiver D. nine-pin connector 7. The packets switching concept was first proposed A. in the late 1950s for Defense Ministry of US B. in the late 1980s for the Defense Ministry of US C. in the early 1960s for military communication systems, mainly to handle speech D. All of the above 8. Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: A. Extranets B. Switching alternating C. Bandwidth alternatives D. Inter organizational networks 9. The geostationary satellite used for communication systems A. rotates with the earth B. is positioned over equator C. remains stationary relative to the earth D. All of the above 10. You have a class A network address with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Whi A B C D

3 11. What are the most commonly used transmission speeds in BPS used in data communication? A. 500 B C D What is the default subnet mask for a class C network? A B C D Which of the following is used for modulation and demodulation? A. modem B. gateway C. protocols D. multiplexer 14. Which of the following is not a disadvantage of wireless LAN? A. interference of transmissions from different B. slower data transmission computers C. higher error rate D. all of the above 15. Which of the following does not allow multiple users or devices to share one communications line? A. controller B. concentrator C. doubleplexer D. multipplexer 16. Which of the following is required to communicate between two computers? A. protocol B. communications software

4 C. communications hardware D. all of the above 17. Which of the following types of channels moves data relatively slowly? A. wideband channel B. voiceband channel C. broadband channel D. narrowband channel 18. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 222 B. 233 C. 241 D How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? A bits B bits C bits D bits 20. The Internet Control Message Protocol (ICMP) A. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another C. allows gateways to send error a control messages to other gateways or hosts D. All of the above 21. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing

5 plant in the suburbs. To enable everyone to share data and resources between the two LANs, name the device A. Hub B. Cable C. Router D. Modem 22. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver A. cannot talk at once B. can send or receive data one at a time C. can do one way data transmission only D. can receive and send data simultaneously 23. How many hosts are attached to each of the local area networks at your site? A. 64 B. 128 C. 254 D Which of the following technique is used for fragment? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. a technique used in best-effort delivery systems to avoid endlessly looping packets D. all of the above 25. Internet-like networks within an enterprise called - A. Intranets B. Extranets C. Switching alternating D. Inter organizational networks 26. To connect a computer with a device in the same room, you might be likely to use

6 A. a coaxial cable B. a ground station C. a dedicated line D. all of the above 27. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? A. 12 B. 120 C D Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots - A. 3 slots B. 5 slots C. 7 slots D. 9 slots 29. What is the port number for NNTP? A. 70 B. 79 C. 87 D Contention is A. a continuous frequency capable of being modulated or impressed with a second signal B. the condition when two or more stations attempt to use the same channel at the same time C. one or more conductors that serve as a common connection for a related group of devices D. a collection of interconnected functional units that provides a data communications service among stations attached to the network 31. Avalanche photodiode receivers can detect hits of transmitted data by receiving

7 A. 100 photons B. 200 photons C. 300 photons D. 400 photons 32. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. a form of TDMA in which circuit switching is B. the method of determining which device has used to dynamically change the channel assignments access to the transmission medium at any time C. a medium access control technique for multiple access transmission media D. all of the above 33. When you ping the loopback address, a packet is sent where? A. On the network B. Across the wire C. Through the loopback dongle D. Down through the layers of the IP architecture and then up the layers again 34. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. RPC C. SNMP D. SMTP 35. A front-end processor is A. a user computer system B. preliminary processor of batch jobs C. a processor in a large-scale computer that executes operating system instructions D. a minicomputer that relieves main-frame computers at a computer centre of communications control functions 36. Which of the following statements is correct for the use of packet switching?

8 A. the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied C. the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure B. by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved D. all of the above 37. In CRC there is no error if the remainder at the receiver is. A. zero B. non-zero C. the quotient at the sender D. equal to the remainder at the sender 38. What can greatly reduce TCP/IP configuration problems? A. PDC B. WINS Proxy C. WINS Server D. DHCP Server 39. Carrier is A. a continuous frequency capable of being modulated or impressed with a second signal B. the condition when two or more sections attempt to use the same channel at the same time C. one or more conductors that serve as a common connection for a related group of devices D. a collection of interconnected functional units that provides a data communications service among stations attached to the network

9 40. Which of the following device is used to connect two systems, especially if the systems use different protocols? A. hub B. bridge C. gateway D. repeater 41. The synchronous modems are more costly than the asynchronous modems because A. they produce large volume of data B. they contain clock recovery circuits C. they operate with a larger bandwidth D. they transmit the data with stop and start bits 42. A distributed network configuration in which all data/information pass through a central computer is A. bus network B. star network C. ring network D. Point-to-point network 43. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? A. X.25 B. UDP C. SMTP D. VMTP 44. A remote batch-processing operation in which data is solely input to a central computer would require a: A. simplex lines B. telegraph line C. mixedband channel D. all the above 45. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?

10 A. 6 Kbps B. 12 Kbps C. 24 Kbps D. 48 Kbps 46. The slowest transmission speeds are those of A. microwaves B. coaxial cable C. fiber-optic cable D. twisted-pair wire 47. What part of is the Network ID, assuming a default subnet mask? A. 51 B. 192 C D If you get both local and remote echoes, every character you type will appear on the screen A. once B. twice C. three times D. never 49. ICMP (Internet Control Message Protocol) is A. a protocol used to monitor computers B. a protocol that handles error and control messages C. a TCP/IP high level protocol for transferring files from one machine to another D. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address 50. Which of the following refers to the terms "residual error rate"? A. signal to noise ratio divided by the ratio of B. the number of bit errors per twenty four

11 energy per bit to noise per hertz C. the probability that one or more errors will be detected when an error detection mechanism is used hours of continuous operation on an asynchronous line D. the probability that one or more errors will be undetected when an error detection scheme is used 51. Which of the following summation operations is performed on the bits to check an errordetecting code? A. Codec B. Checksum C. Attenuation D. Coder-decoder 52. Select the correct statement about broadband and baseband. A. Baseband refers to local area networks, and broadband refers to wide area networks. B. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed C. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable D. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel 53. An error-detecting code inserted as a field in a block of data to be transmitted is known as A. Checksum B. flow control C. Error detecting code D. Frame check sequence 54. The cheapest modems can transmit A. 100 bits per second B. 300 bits per second C. 600 bits per second D. 900 bits per second

12 55. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answe A. OSI B. Network Server C. Virtual Private Network D. Network operating system 56. Error rate is A. the ratio of the number of data units in error to the total number of data units C. an error-detecting code based on a summation operation performed on the bits to be checked B. a check bit appended to an array of binary digits to make the sum of all the binary digits D. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected 57. Which address is the loopback address? A B C D If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n) A. POS termina B. intelligent terminal C. data collection terminal D. batch processing terminal 59. Which network topology is considered passive? A. Bus B. Star C. Ring D. Cross

13 60. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device A. Modem B. Interface C. Attenuation D. Teleprocessor 61. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers? A. 4 B. 9 C. 12 D The receive equalizer reduces delay distortions using a A. gearshift B. descrambler C. difference engine D. tapped delay lines 63. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologie A. 12 B. 48 C. 88 D A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most A. ARP.EXE B. NETSTAT.EXE

14 C. Network Monitor D. Performance Monitor 65. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is A. form filling B. menu selection C. question and answer D. open-ended question 66. Error detection at a data link level is achieved by A. bit stuffing B. equalization C. Hamming codes D. cyclic redundancy codes 67. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is A bands B bands C bands D bands 68. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as A. bridges B. User Agent C. Gateways D. mail gateway 69. Sending a file from your personal computer's primary memory or disk to another computer is called A. hang on B. uploading

15 C. logging on D. downloading 70. What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? A. Electronic mail package B. Memory resident package C. Project management package D. Data communication package 71. The communication mode that supports two-way traffic but only one direction at a time is A. simplex B. duplex C. half duplex D. multiplex 72. HMP (Host Monitoring Protocol) is: A. a protocol used to monitor computers B. a protocol that handles error and control messages C. a TCP/IP high level protocol for transferring files from one machine to another D. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address 73. Which of the following is a voice band channel? A. Coaxial cable B. Telephone line C. Telegraph line D. Microwave systems 74. You are working with three networks that have the network IDs , , and What subnet mask can you use to combine these addresses into one?

16 A B C D Which of the following technique is used for encapsulation? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. a technique used in best-effort delivery systems to avoid endlessly looping packets D. all of the above 76. On a class B network, how many hosts are available at each site with a subnet mask of 248? A. 2,046 B. 4,094 C. 8,190 D. 16, What are the data transmission channels available for carrying data from one location to another? A. Voiceband B. Broadband C. Narrowband D. All of the above 78. Devices interconnected by the LAN should include A. mass storage device, printers and plotters B. computers and terminals C. bridges and gateways D. all of the above

17 79. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? A. 8,000 B frame B. 10,000 B frame C. 50,000 B frame D. 80,000 B frame 80. Data are sent over pin of the EIA-232 interface. A. 1 B. 2 C. 3 D To connect a computer with a device in the same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a ground station D. all of the above 82. Demodulation is a process of A. performing data description B. converting analog to digital signals C. converting digital to analog signals D. multiplexing various signals into one high speed line signals 83. Internet-like networks between a company and its business partners. Select the best fit for answer: A. Extranets B. Switching alternating C. Bandwidth alternatives D. Inter organizational networks 84. Modulation is the process of

18 A. performing data encryption B. converting digital signals to analog signals C. converting analog signals to digital signals D. multiplexing various signals into high speed line signals 85. Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A , , B , , C , , D , , You are working with a network that has the network ID What subnet should you use that supports up to 25 hosts and a maximum number of subnets? A B C D Which of the following statement is incorrect? A. The sender's IP - to- physical address bindingb. The Addresses Resolution Protocol, ARP, is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet. allows a host to find the physical address of a target host on the same physical network, given only the target IP address. C. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine. D. All of the above 88. Demodulation is the process of A. converting digital signals to analog signals B. converting analog signals to digital signals C. dividing the high-speed signals into D. combining many low speed channels into one

19 frequency bands high speed channel 89. An example of an analog communication method is A. voice grade telephone line B. laser beam C. microwave D. all of the above 90. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? A. Layer 2 protocols B. Layer 5 protocols C. Layer 7 protocols D. Layer 10 protocols 91. What frequency range is used for FM radio transmission? A. Very Low Frequency : 3 khz to 30. khz B. Low Frequency : 30 khz to 300 khz C. High Frequency : 3 MHz to 30 MHz D. Very High Frequency : 30 MHz to 300 MHz 92. Transmission of computerised data from one location to another is called A. data flow B. data transfer C. data management D. data communication 93. Compared to analog signals, digital signals A. are more accurate B. allow faster transmission C. both (a) and (b) D. all of the above

20 94. HOSTS file entries are limited to how many characters? A. 32 B. 255 C. 926 D. Unlimited 95. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorith A. 5 bps B. 500 bps C bps D bps 96. A central computer surrounded by one or more satellite computers is called a A. bus network B. star network C. ring network D. all of the above 97. An anticipated result from multi programming operations is: A. better scheduling of work B. the handling of more jobs C. reduced computer idle time D. all of the above 98. FDDI is a A. ring network B. mesh network C. bus based network D. none of the above 99. Modem is used in data transmission. When was it invented and in which country? A. 1950, USA B. 1963, USA

21 C. 1950, Japan D. 1965, Germany 100. Which of the following technique is used for Time-To-Line (TTL)? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. C. a technique used in best-effort delivery system to avoid endlessly looping packets. D. all of the above

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Come & Join Us at VUSTUDENTS.net

Come & Join Us at VUSTUDENTS.net Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and

More information

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved. Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No Data Communications Course Design 2005-2006 Course Information Organization Division EASTERN ARIZONA COLLEGE Business Course Number CMP 205 Title Credits 3 Developed by Lecture/Lab Ratio Transfer Status

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Computer science..pharmacy college

Computer science..pharmacy college Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Module 11. OSI Model, Network Devices, and Network Standards

Module 11. OSI Model, Network Devices, and Network Standards Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare

More information

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,

More information

Networks. Allow number of independent stationary devices or computers to communicate directly

Networks. Allow number of independent stationary devices or computers to communicate directly Networks Allow number of independent stationary devices or computers to communicate directly Provides a skeletal infrastructure for a collaborative system Networking By Prashant Mali [BSc,MSc(CS),CNA,LLB]

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

PSD2A Computer Networks. Unit : I-V

PSD2A Computer Networks. Unit : I-V PSD2A Computer Networks Unit : I-V 1 UNIT 1 Introduction Network Hardware Software Reference Models OSI and TCP/IP models Example networks: Internet, ATM, Ethernet and Wireless LANs Physical layer Theoretical

More information

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)

More information

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017 5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS1302-COMPUTER NETWORKS Year/Sem:

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

SAE6A/SAZ6B DATA COMMUNICATION AND NETWORKING UNIT : I To V

SAE6A/SAZ6B DATA COMMUNICATION AND NETWORKING UNIT : I To V SAE6A/SAZ6B DATA COMMUNICATION AND NETWORKING UNIT : I To V 1 UNIT 1:Syllabus Introduction to Data Communication Network Protocols & standards standards organizations Line Configuration Topology Transmission

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

This PDF document is a sample chapter from the book...

This PDF document is a sample chapter from the book... This PDF document is a sample chapter from the book... To order this book, print the last page of this document. Copyright 2001 Society of Manufacturing Engineers Chapter 37 Manufacturing Networks 37.1

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming 2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender

More information

CS1302 / Computer Networks

CS1302 / Computer Networks CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?

More information

TERM EXAMS CS610- COMPUTER NETWORKS

TERM EXAMS CS610- COMPUTER NETWORKS MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala faisalgrw123@gmail.com MEGA File Solved MCQ s For Final TERM EXAMS CS610- COMPUTER NETWORKS Question No: 1 ( Marks: 1 ) - Please choose

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

Communication Technologies

Communication Technologies Unit 29: Communication Technologies Unit code: F/601/7264 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

Chapter 9. Introduction. Communications

Chapter 9. Introduction. Communications Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing

More information

VU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012

VU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012 1 CS610 COMPUTER NETWORKS Final Term Solved MCQs Mega File (Latest All in One) The protocol address of the next hop must be to an equivalent hardware address before a packet can be sent. Encrypted Decrypted

More information

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,

More information

WAN Technologies CCNA 4

WAN Technologies CCNA 4 WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe

More information

COMMUNICATIONS AND NETWORKS

COMMUNICATIONS AND NETWORKS COMMUNICATIONS AND NETWORKS Data Communications Data communications describes a process in which one computer transfers data, instructions, and information to another computer. The basic model for data

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Unit 09 Computer Networks

Unit 09 Computer Networks Unit 09 Computer Networks Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio 2 In order to setup a network

More information

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers. Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information