31. Define cyclic redundancy check (CRC).
C RC appends a sequence of redundant bits derived from binary division to the data unit. The divisor in the CRC generator is often represented as an algebraic polynomial.
32. What is hamming code?
The hamming code is an error correction method using redundant bits. The number of bits is a function of the length of the data bits. In hamming code for a data unit of m bits, we use the formula 2r >= m+r+1 to determine the number of redundant bits needed. By rearranging the order of bit transmission of the data units, the hamming code can correct burst errors.
33.Define stop and wait ARQ.
In stop and wait ARQ, the sender sends a frame and waits for an acknowledgement from the receiver before sending the next frame.
34. What do you mean by network control protocol?
Network control protocol is a set of protocols to allow the encapsulation of data coming from network layer protocol that requires the services of PPP
35. What do you mean by CSMA?
To reduce the possibility of collision CSMA method was developed. In CSMA each station first listen to the medium (Or check the state of the medium) before sending. It can’t eliminate collision.
36. What do you mean by Bluetooth?
It is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers and so on.
37. What is IP address?
The internet address (IP address) is 32bits that uniquely and universally defines a host or router on the internet.The portion of the IP address that identifies the network is called netid. The portion of the IP address that identifies the host or router on the network is called hostid.
38. What do you mean by ALOHA ?
It is the method used to solve the channel allocation problem .It is used for:
i)ground based radio broadcasting
ii)In a network in which uncoordinated users are competing for the use of single channel.
It is of two types:
39. What is Firewalls?
It is an electronic downbridge which is used to enhance the security of a network. It’s configuration has two components.
the packets traveling through the LAN are inspected here and packets meeting certain criteria are forwarded and others are dropped.
40. What is Repeaters ?
A receiver receives a signal before it becomes too weak or corrupted,regenerates the original bit pattern,and puts the refreshed copy back onto the link.It operates on phycal layer of OSI model.