Vous êtes sur la page 1sur 16

QUESTION BANK ON DATA COMMUNICATION

Q.1. What is a Network?

A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs),
exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone
lines, radio waves, satellites, or infrared light beams.

The three basic types of networks include: Local Area Network (LAN) ,Wide Area Network (WAN)

Q.2. What is LAN?

The term LAN stands for "Local Area Network". This is the type of network used within an office or a building to connect
together the computers belonging to a single company. Many LANs are built using Ethernet cabling in which the physical
medium (the Ethernet cable) is shared by all the users of the network. Sections of cable (often known as "segments") may
be connected using repeaters (sometimes also called "hubs") and bridges. Packets are transmitted through an Ethernet
network using Medium Access Control (MAC) protocol headers and are protected by a 32-bit checksum.

The related terms MAN, and WAN stand respectively for Metropolitan Area Network and Wide Area Network.

Q.3.What are various components of a Data communication System?

The various components of a Data communication System Are:

A .Data or Message

B .Sender

C .Receiver

D .Protocol

E.Transmission Media.

Q.4. How the data is transmitted between two computers?

To send messages to and from computers, the network software puts the message information in a packet. (If the message
to be sent is too big to fit into one packet, it will be sent in a series of packets.) In addition to the message data, the packet
contains a header and a trailer that carry special information to the destination. One piece of information in the header is
the address of the destination.

Q.5.What is a wireless LAN?

A wireless local area network (WLAN) is a local area network (LAN) that doesn't rely on wired Ethernet connections. A
WLAN can be either an extension to a current wired network or an alternative to it. Use of a WLAN adds flexibility to
networking. A WLAN allows users to move around while keeping their computers connected.

WLANs have data transfer speeds ranging from 1 to 54Mbps, with some manufacturers offering proprietary 108Mbps
solutions. The 802.11n standard can reach 300 to 600Mbps.

Q.6.What are advantages of Peer To Peer Network?

ADVANTAGES

An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and
computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also
increases. This is not true of client-server architecture with a fixed set of servers, in which adding more clients could mean
slower data transfer for all users.
The distributed nature of peer-to-peer networks also increases robustness in case of failures by replicating data over
multiple peers, and -- in pure P2P systems -- by enabling peers to find the data without relying on a centralized index
server. In the latter case, there is no single point of failure in the system.

Q.7.What are various advantages of Ring Topology?

ADVANTAGES
• A ring is relatively easy to install and reconfigure. each device is linked only to its
Immediate neighbors.
• To add or delete a device requires moving only two connections. Fault isolation simplified. The terminal has equal
priority on a ring topology.

Q.8. What does the term "simplex" mean?

The term simplex is used to describe the simplest form of communication when one party (the source or sender) sends data
to another party (the destination or receiver). The data flows in one direction only. Some good examples of a
simplex communication link are the public television service, and radio transmission.

Q.9.What is Wide Area Network?

Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated
transoceanic cabling or satellite uplinks may be used to connect this type of network. Using a WAN, schools in Florida can
communicate with places like Tokyo in a matter of minutes, without paying enormous phone bills. A WAN is complicated.
It uses multiplexers to connect local and metropolitan networks to global communications networks like the Internet.

Q.10.What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a network. These rules include
guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of
cabling, and speed of data transfer.

Q.11.Define Ethernet?

The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything
through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the
cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the
same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time
before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by
collisions and retransmitting is very small and does not normally effect the speed of transmission on the network.

Q.12.Define Token Ring.

The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In
Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a
logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have
information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives
an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for
which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a
star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to
the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.

Q.13. Illustrate the difference between message switching and packet switching?

In message switching, each switch stores the whole message and forwards it to the next switch.
In a packet switched network, there is no resource reservation; resources are allocated on demand.

Q.14. What are various disadvantages of Ring Topology?

DISADVANTAGES
In a simple one wire ring, a break in the ring such as a disable station can disable the entire network. But this weakness can
be solved by using a dual ring or a switch capable of closing off the break.

Q.15.What is Networking Hardware?

Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-
processing and communications within the network.

Some of the basic networking hardware components are:

• Switches
• Repeaters
• Bridges
• Routers

Q.16. Compare TCP and UDP.


A: The User Datagram Protocol (UDP) is a process-to-process protocol that adds only port address, checksum error control
and length information to the data from upper layer.
The Transmission control protocol (TCP) provides full transport-layer services to applications. TCP is a reliable stream
transport protocol.

Q.17.What are workstations?

All of the user computers connected to a network are called workstations. A typical workstation is a computer that is
configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily
need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network
workstation.

Q.18.What are Advantages of Client Server Architecture?

ADVANTAGES:
A client-server architecture enables the roles and responsibilities of a computing system to be distributed among several
independent computers that are known to each other only through a network. All the data is stored on the servers, which
generally have far greater security controls than most clients. Servers can better control access and resources, to guarantee
that only those clients with the appropriate permissions may access and change data.

Q.19.What are Disadvantages of Client Server Architecture?

DISADVANTAGES:
Traffic congestion on the network has been an issue since the inception of the client-server paradigm. As the number of
simultaneous client requests to a given server increases, the server can become severely overloaded. The client-server
paradigm lacks the robustness of a good P2P network. Under client-server, should a critical server fail, clients’ requests
cannot be fulfilled.
Q.20.What are Token Ring Cards?

Token Ring network cards look similar to Ethernet cards. One visible difference is the type of connector on the back end of
the card. Token Ring cards generally have a nine pin DIN type connector to attach the card to the network cable.

Q.21.What is Switch?

A switch is a device which provides temporary connection between multiple systems. Most switches are active, that is they
electrically amplify the signal as it moves from one device to another. Switches no longer broadcast network packets as
hubs did in the past, they memorize addressing of computers and send the information to the correct location directly.
Switches are:

• Often used in a star or star-wired ring topology


• Also called hubs

Q.22.What are Repeaters?

Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a
repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or
they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the
standards set for the type of cable being used.

Q.23.What are Bridges?

A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are
adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two.

A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the
correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on
both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the
network.

Q.24.What are Routers?

A router translates information from one network to another; it is similar to a superintelligent bridge. Routers select the
best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on
collisions, and is smart enough to know when to direct traffic along back roads and shortcuts. Routers can:

• Direct signal traffic efficiently


• Route messages between any two protocols
• Route messages between linear bus, star, and star-wired ring topologies
• Route messages across fiber optic, coaxial, and twisted-pair cabling

Q.25.What is Network Cabling?

Cable is the medium through which information usually moves from one network device to another. There are several
types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other
networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology,
protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a
network is necessary for the development of a successful network.

Q.26.Describe Unshielded Twisted Pair (UTP) Cable?

Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular
and is generally the best option for school networks (See fig. 1).
Fig.1. Unshielded twisted pair

The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires
inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices.

Q.27.What are various categories of Unshielded Twisted Pair (UTP) Cable?

Categories of Unshielded Twisted Pair

Type Use

Category 1 Voice Only (Telephone Wire)

Category 2 Data to 4 Mbps (LocalTalk)

Category 3 Data to 10 Mbps (Ethernet)

Category 4 Data to 20 Mbps (16 Mbps Token Ring)

Category 5 Data to 100 Mbps (Fast Ethernet)

Q.28.What is Unshielded Twisted Pair Connector?

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like
a large telephone-style connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered
Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which
wire goes with each pin inside the connector.

Q.29.Describe Shielded Twisted Pair (STP) Cable?

A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference. Shielded twisted pair
(STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite
bulky. Shielded twisted pair is often used on networks using Token Ring topology.

Q.30.Describe Coaxial Cable?

Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center
conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent
lights, motors, and other computers.

Fig. 3. Coaxial cable


Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater
cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin
coaxial.

Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying
Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra
protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice
when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is
difficult to install.

Q.31.What is Coaxial Cable Connectors?


Coaxial Cable Connectors

The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector (See fig.
4). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator.
Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the
BNC connectors that crimp, rather than screw, onto the cable.

Q.32.Describe Fiber Optic Cable?

Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It
transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for
certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting
networks between buildings, due to its immunity to the effects of moisture and lighting.

Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the
capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include
services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper
cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable
carrying Ethernet signals.

Q.33. What is Fiber Optic Connector?

Fiber Optic Connector

The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a BNC
connector. A newer connector, the SC, is becoming more popular. It has a squared face and is easier to connect in a
confined space.

Q.34.Give Ethernet cable Summary?

Ethernet Cable Summary

Specification Cable Type Maximum length

10BaseT Unshielded Twisted Pair 100 meters

10Base2 Thin Coaxial 185 meters

10Base5 Thick Coaxial 500 meters

10BaseF Fiber Optic 2000 meters

100BaseT Unshielded Twisted Pair 100 meters

100BaseTX Unshielded Twisted Pair 220 meters


Q.35.What are Wireless LANs?

Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals,
infrared light beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and
file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed
between transceivers as if they were physically connected. For longer distance, wireless communications can also take
place through cellular telephone technology, microwave transmission, or by satellite.

Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN.

Q.36.What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical
topology should not be confused with logical topology which is the method used to pass information between workstations.

Q.37.What are Main Types of Physical Topologies?

The following sections discuss the physical topologies used in networks and other related topics.

• Linear Bus
• Star
• Star-Wired Ring
• Tree
• Considerations When Choosing a Topology
• Summary Chart

Q.38.What is Linear Bus topology?

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server,
workstations, and peripherals) are connected to the linear cable. Ethernet and LocalTalk networks use a linear bus
topology.

Fig. 1. Linear Bus topology

Q.39.What are Advantages of a Linear Bus Topology?

• Easy to connect a computer or peripheral to a linear bus.


• Requires less cable length than a star topology.

Q.40.What are Disadvantages of a Linear Bus Topology?

• Entire network shuts down if there is a break in the main cable.


• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts down.
• Not meant to be used as a stand-alone solution in a large building.

Q.41.What is Star topology?


A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central
network hub or concentrator (See fig. 2).

Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator
manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common
with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.

Fig. 2. Star topology

Q.42.What are Advantages of a Star Topology?

• Easy to install and wire.


• No disruptions to the network then connecting or removing devices.
• Easy to detect faults and to remove parts.

Q.43.What are Disadvantages of a Star Topology?

• Requires more cable length than a linear topology.


• If the hub or concentrator fails, nodes attached are disabled.
• More expensive than linear bus topologies because of the cost of the concentrators.

The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called
the star-wired ring.

Q.44.What is Ring topology?

A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation
access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or
ring (See fig. 3). The Token Ring protocol uses a star-wired ring topology.

Q.45.What is Tree topology?

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured
workstations connected to a linear bus backbone cable (See fig. 4). Tree topologies allow for the expansion of an existing
network, and enable schools to configure a network to meet their needs.
Q.46.What are Advantages of a Tree Topology?

• Point-to-point wiring for individual segments.


• Supported by several hardware and software venders.

Q.47.What are Disadvantages of a Tree Topology?

• Overall length of each segment is limited by the type of cabling used.


• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.

Q.48.What are Considerations When Choosing a Topology?

• Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase
concentrators.
• Length of cable needed. The linear bus network uses shorter lengths of cable.
• Future growth. With a star topology, expanding a network is easily done by adding another concentrator.
• Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star
topologies.

Q.49.Give summary chart for Physical Topology, Cable used and common protocol.?

Summary Chart:

Physical Topology Common Cable Common Protocol

Twisted Pair
Ethernet
Linear Bus Coaxial
LocalTalk
Fiber

Twisted Pair Ethernet


Star
Fiber LocalTalk

Star-Wired Ring Twisted Pair Token Ring

Twisted Pair
Tree Coaxial Ethernet
Fiber

Q.50. What are the factors which determine whether a communication system is a LAN, WAN, MAN?

Amsted type of communication system is decided by the area covered by the network and the type of use of the system.Te
range or Size of the network decides whethet its LAN,MAN or WAN.
Q.51.What is Peer-to-Peer Network?

Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access
shared resources found on other computers. However, they do not have a file server or a centralized management source
(See fig. 1). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the
resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks.
AppleShare and Windows for Workgroups are examples of programs that can function as peer-to-peer network operating
systems.

Fig. 1. Peer-to-peer network

Q.52.What are Advantages of a peer-to-peer network?

• Less initial expense - No need for a dedicated server.


• Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer
operations.

Q.53.What are Disadvantages of a peer-to-peer network?

• Decentralized - No central repository for files and applications.


• Security - Does not provide the security available on a client/server network.

Q.54.What is Client/Server architecture?

Client/server network operating systems allow the network to centralize functions and applications in one or more
dedicated file servers (See fig. 2). The file servers become the heart of the system, providing access to resources and
providing security. Individual workstations (clients) have access to the resources available on the file servers. The network
operating system provides the mechanism to integrate all the components of the network and allow multiple users to
simultaneously share the same resources irrespective of physical location. Novell Netware and Windows 2000 Server are
examples of client/server network operating systems.

Fig. 2. Client/server network

Q.55.What are Advantages of a client/server network?

• Centralized - Resources and data security are controlled through the server.
• Scalability - Any or all elements can be replaced individually as needs increase.
• Flexibility - New technology can be easily integrated into system.
• Interoperability - All components (client/network/server) work together.
• Accessibility - Server can be accessed remotely and across multiple platforms.
Q.56.What are Disadvantages of a client/server network?

• Expense - Requires initial investment in dedicated server.


• Maintenance - Large networks will require a staff to ensure efficient operation.
• Dependence - When server goes down, operations will cease across the network.

Q.57.Give Examples of network operating systems?

The following list includes some of the more popular peer-to-peer and client/server network operating systems.

1.Apple Share

2.Microsoft Windows Server

3.Novell Netware

Q.58.What are Bridges?

Bridge - Devices that connect and pass packets between two network segments that use the same communications protocol.
Bridges are very Important devices for networking of various communication systems.

Q.59.What are cables?

Cable is a physical medium used for Transmission of data between two or more systems.e.g. Transmission medium of
copper wire or optical fiber wrapped in a protective cover.

Q.60.What is CSMA/CA?

CSMA/CA - Carrier Sense Multiple Access Collision Avoidance is a network access method in which each device signals
its intent to transmit before it actually does so. This prevents other devices from sending information, thus preventing
collisions from occurring between signals from two or more devices.

Q.61. What is OSI model.


ANS:OSI (open system interconnection) model was developed by ISO(International Standards Organisation).This model
was invented before the protocols were developed. This Model is based on Seven layer Architecture, Which are:
1.Application
2.Presentation
3.Session.
4.Transport
5.Network
6.Data link layer
7.Physical layer.

Q.62.What is an E-mail?

An E-mail is An electronic mail message sent from a host computer to a remote computer.E-mail is a very popular method
of communication used these days.

Q.63. Compare TCP and UDP.

The User Datagram Protocol (UDP) is a process-to-process protocol that adds only port address, checksum error control
and length information to the data from upper layer.
The Transmission control protocol (TCP) provides full transport-layer services to applications. TCP is a reliable stream
transport protocol.

Q.64.What is Ethernet?
Ethernet - A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel and Digital Equipment
Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps (megabits per second).

Q.65.What are Expansion slots?

Expansion Slot - Area in a computer that accepts additional input/output boards to increase the capability of the computer.

Q.66. Write critique of ISO model?

ISO is an organization and it developed a model named OSI (open system interconnection).This model was invented before
the protocols were developed. This ordering means that the model was not biased towards one set of protocols.

Q.67.What is GB?

Gigabyte (GB) Describes the some amount of memory storage One GB is equal to One billion bytes of information.Also
1GB is equal to One thousand megabytes.

Q.68.What is Hub?

Hub - A hardware device that contains multiple independent but connected modules of network and internetwork
equipment. Hubs can be active (where they repeat signals sent through them) or passive (where they do not repeat but
merely split signals sent through them).

Q.69.What is Infrared?

Infrared is a mode of Unguided(or Wireless communication) data communication .The waves used in Infrared
communication are magnetic waves whose frequency range is above that of microwaves, but below that of the visible
spectrum.

Q.70.What is Intranet?

Intranet is a Network internal to an organization that uses Internet protocols. Intranet is a network Privately used by any
particular organization.

Q.71.What is Internet?

Internet is a global network of networks used to exchange information using the TCP/IP protocol. It allows for electronic
mail and the accessing ad retrieval of information from remote sources.

Q.72.What is Modem?

Modem (Modulator/Demodulator) are Devices that convert digital and analog signals. Modems allow computer data
(digital) to be transmitted over voice-grade telephone lines (analog).

Q.73.What is Multiplexer?

Multiplexer - A device that allows multiple logical signals to be transmitted simultaneously across a single physical
channel.These are used for maximum utilization of Transmission medium.

Q.74.What is Network Modem?

Network Modem is A modem connected to a Local Area Network (LAN) that is accessible from any workstation on the
network. Network Modem is Basically Used for Communication by Various devices in the network.
Q.75.What is Network Interface Card?

Network Interface Card (NIC) is a board that provides network communication capabilities to and from a computer .NICs
are very important for computer networking.

Q.76.What is a node?

Node is a End point of a network connection. Nodes include any device attached to a network such as file servers, printers,
or workstations.

Q.77.What are Node devices?

Node Devices are Any computer or peripheral that is connected to the network. Node devices basically describe various
components connected to form a network.

Q.78.What is Port?

Ports is a connection point for a cable .By means of ports we can connect various devices to our computer system for
different types of data communication. Some of the commonly used ports are:

COM port, Ethernet port etc.

Q.79.What is RAID?

RAID (Redundant Array of Inexpensive Disks) is a configuration of multiple disks designed to preserve data after a disk
casualty.Its main function is the data recovery at the time of System Failures.
Q.80.What is RJ-45?

RJ-45 is a Standard connectors used for unshielded twisted-pair cable. RJ Stands for Registered Jack.

It is very commonly used connection for networking of computer systems.

Q.81. Write the concept of layer protocols and layer interfaces?

Protocols are the set of rules governing the set of data communication. The key elements of a protocol are syntax,
semantics, and timing.

Layer interfaces allow the flow of information in-between layers. Well defined interfaces and functions provide modularity
to network.

Q.82.What is Segment?

Segment - Refers to a section of cable on a network. In Ethernet networks, two types of segments are defined. A populated
or trunk segment is a network cable that has one or more nodes attached to it. A link segment is a cable that connects a
computer to an interconnecting device, such as a repeater or concentrator, or connects a interconnecting

Q.83.What is Speed of Data Transfer?

Speed of Data Transfer is the rate at which information travels through a network, usually measured in megabits per
second. The different systems and Different mediums have different data transfer speeds.

Q.84.What is a Terminator?

Terminator is a device that provides electrical resistance at the end of a transmission line. Its function is to absorb signals
on the line, thereby keeping them from bouncing back and being received again by the network.

Q.85.What is Thicknet and Thinnet?

Thicknet is basically a type of coaxial cable .A Thicknet is a thick coaxial cable that is used with a 10Base5 Ethernet LAN.

Q.86. List 2 advantages and 2 disadvantages of having international standards?


ANS: ADVANTAGES-1 standards are essential in creating and maintaining an open and competitive market for
equipment manufactures.
2 standards provides guidelines to manufacturers, vendors, govt. agencies etc.
DISADVANTAGES-1standard committees are procedural bodies and are slow moving.
2 standards make the area of development narrow.

Q.87.What is Token?

Token - A special packet that contains data and acts as a messenger or carrier between each computer and device on a ring
topology. Each computer must wait for the messenger to stop at its node before it can send data over the network.

Q.88. What is Transceiver?

Transceiver (Transmitter/Receiver) is a Device that receives and sends signals over a medium. In networks, it is generally
used to allow for the connection between two different types of cable connectors, such as AUI and RJ-45.

Q.89.What is USB?

USB (Universal Serial Bus) Port is a hardware interface for low-speed peripherals such as the keyboard, mouse, joystick,
scanner, printer, and telephony devices.
Q.90.What is Workstation?

Workstation is a computer connected to a network at which users interact with software stored on the network.These
provides sharing of software resources to the users.

Q.91.What are Ethernet Cards?

Ethernet cards contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for
coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet
cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet
card. When this method is used there is always an external transceiver attached to the workstation.

Q.92.What is Multimode step-index propagation mode?


Multimode step-index uses multiple beams of light. The density of the core remains constant from the center to the edges.
A beam of light moves through the constant density in a straight line until it reaches the interface of the core and the
cladding. At the interface there is an abrupt change o a lower density that alters the angle of the beam's motion.

Q.93.What is Multimode graded-index propagation mode?


Multimode graded-index uses fiber with varying densities. Density is highest at the center of the core and decreases
gradually to its lowest at the edge. Each density difference causes each beam to refract into a curve. Varying the refraction
varies the distance each beam travels in a given period of time, resulting in different beams intersection at regular intervals.
Careful placement of the receiver at one of these intersections allows the signal to be reconstructed with far greater
precision.

Q.94.What is Single Step-index propagation mode?


Single mode uses step-index fiber and a highly focused source of light that limits beams to a small range of angles, all
close to the horizontal. Propagation of different beams is almost identical and delays are negligible.
Q.95.What is Surface Propagation?
In surface propagation radio waves travel through the lowest portion of the atmosphere, hugging the earth.

Q.96.What is Tropospheric Propagation?


Tropospheric propagation can work two ways. Either a signal can be directed in a straight line from antenna to antenna
(line-of-sight), or it can be broadcast at an angle into the upper layers of the troposphere where it is reflected back to the
earth's surface.

Q.97.What is ionospheric Propagation?


In ionospheric propagation higher-frequency radio waves radiate upward into the ionosphere where they are reflected back
to earth. The density difference between the troposphere and the ionosphere causes each radio wave to speed up and
change direction, heading back to earth.

Q.98.What is line-of-sight Propagation?


In line-of-sight propagation, very high frequency signals are transmitted in straight lines directly from antenna to antenna.
Antennas must be directional, facing each other, and either tall enough or close enough together not to be affected by the
curvature of the earth.

Q.99.What is Hybrid Networking?

Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not have
one of the standard forms. For example, a tree network connected to a tree network is still a tree network, but two star
networks connected together (known as extended star) exhibit hybrid network topologies. A hybrid topology is always
produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star
ring network and star bus network

Q.100. What is Unguided media?

The electromagnetic spectrum has voice-band frequencies that are generally transmitted as current over metal cables, such
as twisted-pair or coaxial cable. Radio frequencies can travel through air or space but require specific transmitting and
receiving mechanisms. Visible light is harnessed using fiber-optic cable. Unguided media or wireless communication
transport electromagnetic waves without using a physical conductor.

Vous aimerez peut-être aussi