Computer Network Unit 1 q what are the topologies in computer n/w ?


Download 392.71 Kb.
bet13/57
Sana09.06.2023
Hajmi392.71 Kb.
#1474191
1   ...   9   10   11   12   13   14   15   16   ...   57
Bog'liq
Computer Network

Increase network availability. Increasing network availability is a technical goal usually achieved through the implementation of network redundancy features.

  • Streamline network management. The redesign of network management processes in another example of a technical goal.

  • Increase network scalability. Over time, the network requirements for an organization will change



    Q 2. What is piggybacking ?
    Ans; Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others.


    Q 3. Name the two sub layers of Data link layer. Specify their protocols.
    Ans: 1.Logical link control(LLC)
    Protocols : SDLC, NetBIOS, NetWare
    2.Media access Control (MAC)
    Protocols : CSMA/CA, Slotted-ALOHA, CDMA, OFDMA


    Q 4. What is HDLC ? List the features. Explain various response modes and station type.
    Ans:Protocol Overall Description:

    Layer 2 of the OSI model is the data link layer. One of the most common layer 2 protocols is the HDLC protocol. In fact, many other common layer 2 protocols are heavily based on HDLC, particularly its framing structure: namely, SDLC, SS#7, LAPB ,LAPD and ADCCP .
    HDLC uses zero insertion/deletion process (commonly known as bit stuffing) to ensure that the bit pattern of the delimiter flag does not occur in the fields between flags. The HDLC frame is synchronous and therefore relies on the physical layer to provide method of clocking and synchronizing the transmission and reception of frames.
    The HDLC protocol is defined by ISO for use on both point-to-point and multipoint (multidrop) data links. It supports full duplex transparent-mode operation and is now extensively used in both multipoint and computer networks.



    Download 392.71 Kb.

    Do'stlaringiz bilan baham:
  • 1   ...   9   10   11   12   13   14   15   16   ...   57




    Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
    ma'muriyatiga murojaat qiling