List any two disadvantages of bus topology. 

1 Answer

Answer :

Disadvantages of bus topology. 1. Heavy network traffic slows down the bus speed .In bus topology only one computer can transmit & other have to wait till their turn comes & there is no co-ordination between computers for reservation of transmitting time slot. 2. The BNC connector used for expansion of the bus attenuates the signal considerably. 3. A cable break or loose BNC connectors will cause reflections & bring down the whole network causing all network activity to stop.

Related questions

Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : Bus

Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B

Last Answer : C) Star

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.

Last Answer : i. Setup:  ii. Name of topology: Star topology iii. Advantages of Star Topology 1) As compared to Bus topology it gives far much better performance, signals don't necessarily get ... as well number of nodes which can be added in such topology is depended on capacity of central device.

Description : State two advantages of Mesh topology.

Last Answer : Network Topology refers to layout of a network. Network topology specifically refers to the physical layout of the network especially the locations of the computers & how the cable is run ... to Point Connection: Point-to-point links make fault identification and fault isolation easy.

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : In star topology which device is preferable as a star device between switch and hub? Justify. 

Last Answer : Switch in star Topology: Switch is used as a central device to connect different nodes in star topology. Switch is an intelligent device. When switch receives a data packet it reads destination ... whose destination address matches with the address contained in the data packet. Diagram:

Description : Discuss hybrid topology with suitable diagram. 

Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Give any two disadvantages of unshielded twisted pair cable.

Last Answer : Disadvantages of unshielded twisted pair cable. 1. Highly prone to crosstalk. 2. Unable to provide secured transmission of data.

Description : Define LAN. Write any two disadvantages of LAN.

Last Answer : Definition of LAN: LAN is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings. Disadvantages: 1. Power - a good LAN is required ... - if all computers running at once, can reduce speed for each. 6. Area covered is limited.

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : List different classes of IP Address.

Last Answer : Different classes of IP address. Class A Class B Class C Class D Class E

Description : s the predominant form of Fast Ethernet, and runs over two pairs of category 5 or above cable. A) 100 BASE-T B) 100 BASE-TX C) 100 BASE-T4 D) 100 BASE-T2

Last Answer : B) 100 BASE-TX

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Give two features of IPv6. 

Last Answer : Two features of IPv6 are: An IPv6 address consists of 16 bytes (octets) It is 128 bits long. IPv6 specifies hexadecimal colon notation. Therefore, the address consists of 32 hexadecimal ... multicast. In an IPv6 address, the variable type prefix field defines the address type or purpose.

Description : Define protocol. Give the name of any two protocols.

Last Answer : Define protocol: There are certain rules that must be followed to ensure proper communication & a set of such rules is known as protocol. Example: UDP, TCP/IP, SMTP, HTTP, SSL, FTP etc

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : Define Server. Give the name of any two types of Server.

Last Answer : Definition of server: The central computer which is more powerful than the clients & which allows the clients to access its software & database is called as the server. Types of server: 1. File server 2. Print Sever 3. Application server 4. Message server 5. Database server

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100

Last Answer : B) 1

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation