CN VIVA QUESTIONS
CN VIVA QUESTIONS
There is a list of frequently asked Computer Network Viva Questions, and their
answers are given below:
1. Define a network
A network is a collection of networks joined together by physical media linkages.
Recursively, a network is any physical link connecting two or more nodes or any two or
more networks connected by one or more nodes.
3. Describe a Node.
A network can be made up of two or more computers that are physically linked together,
such as by coaxial cable or optical fibre. Such physical media is known as a link,
and the computer that connects to it is referred to as a node.
8. What are the names of the variables that impact the performance
of the network?
Hardware, software, users, and various transmission mediums are all factors.
The amount of time it takes a link to recover from a failure, how often failures occur, and
how robust the network is are all indicators of how reliable a system is.
Security:
Security concerns include guarding data from viruses and illegal access.
Performance:
Semantics:
Advertisement
The format and structure of the data, or the manner in which they are presented, make
up a protocol's syntax.
Advertisement
Timing:
A switch may receive packets quicker than a card link that can hold them and store them
in memory for a longer amount of time. If this occurs, the switch may eventually run out
of buffer space, forcing some packets from it to be lost in a particular state. The situation
of the network is referred to as the "congested condition of the network".
Finally, broadcasting is a method by which the message is sent to all the nodes in the
network.
Advertisement
o Synchronous TDM
o Asynchronous TDM or statistical TDM
B. Frequency division multiplexing
1. Physical layer
2. Datalink layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
1. Network layer
2. Physical layer
3. Datalink layer
1. Application layer
2. Presentation layer
3. Session layer
Advertisement
1. Representation of bits
2. physical characteristics of interfaces and media
3. data rate
4. bits synchronization
5. a line configuration
6. transmission mode
7. physical topology
o physical addressing
o flow control
o framing
o error control
o access control
Advertisement
1. Connection control
2. error control
3. segmentation and reassembly
4. service point addressing
5. flow control
o Synchronization
o Dialogue management
Advertisement
38. Describe the responsibility of the application layer.
The application layer decides whether software or humans will access the
network. The application layer provides user interfaces and supports, like shared
database management, e-mail, and other types of distributed Information
Services.
I) guided media
1. shielded TP
2. Unshielded TP
B) coaxial cable
Advertisement
1. terrestrial microwave
2. Satellite communication
o Single bit error: In this error, only one bit in the data unit is altered.
o Burst error: two or more data bits will be altered in this error.
43. What is computer network error detection, and what are its
methods?
During transmission, there may be the possibility of corruption of data. For reliable
communication, errors must be deducted and corrected. The concept of redundancy is
used by error detection in a computer network, which means adding extra bits to detect
errors at the destination. There are some common error detection methods which are as
follows
A. Asynchronous protocol
B. Synchronous protocol
1. Character-oriented protocol
2. Bit oriented protocol
1. Point to point
2. Broadcast
1. Simplex
2. Half duplex
3. Full duplex
90. What is the difference between bit rate and baud rate?
The number of bits transmitted during one second is called as Bit rate. At the same
time, the number of signal units per second required to represent those bits is called
the baud rate.
A. Guided media:
A. Repeater:
The Repeater is also called a regenerator. It is an electronic device that operates only
at the physical layer. Before it becomes weak, it receives the signal in the network,
regenerates the signal bit pattern, and puts the refreshed copy back into the link.
B. Bridges:
Bridges operate in both the data link layer and physical layer of lans of the same type. A
large network is divided by the bridges into smaller segments. Bridges contain logic that
allows them to keep the traffic for each segment separate, and for that, the repeaters
relay frame inside the segment containing the intended recipient and control congestion.
C. Routers:
Among multiple interconnected networks, the packets are relayed by the routers.
Routers operate in data link, physical, and network layers. Router's content software
enables them to the determination of several possible paths, i.e., which path is best for a
particular transmission.
D. Gateway:
A gateway is a networked device that acts as an entry point into another network when
discussing networking (network devices gateway). For example, a wireless router is
typically utilized as the default gateway in a home network. In a nutshell, a gateway
serves as a messenger agent, receiving data from one network, interpreting it, and
transmitting it to another. Gateways may function at any layer of the OSI model and are
also known as protocol converters.
On the other hand, The reverse address resolution protocol (RARP) permits a host to
discover its Internet address when it knows only its physical address.
98. What is the minimum and maximum length of the header in the
TCP segmentand the IP datagram?
There should be a minimum length of the header of up to 20 bytes, and the length can
have a maximum of 60 bytes.
1. Star topology:
In the star topology network, all computers had connected using a central hub. It can be
inexpensive. It is very easy to install, and then we can easily reconfigure it, and it is very
easy to detect physical problems.
2. Bus topology:
In this topology network, each computer is directly connected to a primary network cable
with the help of a single line. It is also inexpensive, and it is very easy to install. We can
understand it simply, and they can extend easily.
3. Ring topology:
In this topology, all the computers are connected in a loop. In this, the computers have
equal access to network media. In this system, the installation process is simple. As
much as in other topologies, the signal does not degrade because each computer
regenerates it.
On the other hand, a single cable consumes the entire bandwidth of the cable in
baseband transmission.