State features of any one network control devices. 

1 Answer

Answer :

A hardware device that are used to connect computers, printers, fax machine and other electronic devices to a network are called network devices. These devices transfer data in a fast, secure and correct way over same or different networks. 

Network Control devices are:

1. Repeater

2. Hub

3. Switch

4. Bridge

5. Router

6. Gateway

7. Modem

Features of network control device:

Repeater:

 It is used to take the distorted, weak and corrupt input signal and regenerate this signal at its output.

 It ensures that the signals are not distorted or weak before it reaches the destination.

 It recreates the bit pattern of the signal, and puts this regenerated signal back on to the transmission medium

 It works in the physical layer with no intelligent function.

Hub:

 It is also known as multiport repeater.

 It is normally used for connecting stations in a physical star topology.

 It is the broadcasting device.

 It sends packets to all nodes in the network.

Switch:

 It is used to connect multiple computers in which it can direct a transmission to its specific destination. (Unicast the signals).

 It is a unicasting device.

 It avoids unnecessary network traffic.

 It operates in both the physical and the data link layer.

Bridge:

 It is a device which connects two or more segment of a network.

 A bridge filters data traffic at a network boundary.

 Bridges reduces the amount of traffic on a LAN by dividing it into two segments.

 It inspects incoming traffic and decides whether to forward or discard it.

 It sends packets between two networks of same type.

 A bridge operates in both the physical and the data link layer.

Gateway:

 It is a node in a computer network, a key stopping point for data on its way to or from other networks.

 Gateway is protocol converter.

 Gateway enables communication between different network architecture and environments.

 It works at all layers of OSI model.

Router:

 It is a device that helps in determining the best and shortest path out of the available paths, for a particular transmission.

 Routers use logical and physical addressing to connect two or more logically separate networks.

 Router read complex network address in packet and efficiently direct packets from one network to another, reducing excessive traffic

 It works at Physical, Data-Link and Network Layer of OSI model

 It Connect dissimilar networks.

Modem:

Modem works as modulator as well as demodulator.

It is the device used to converts digital signals generated by the computer into analog signals which can be transmitted over a telephone or cable line transforms incoming analog signals into their digital equivalents.

A two way communication is established.

Related questions

Description :  Write in brief any two roles of network control devices in computer network.

Last Answer : Two roles of network control devices in computer: Role of repeater: Generates the original signal. Operates in the physical layer. Role of Bridges: Bridges utilize the address ... Role of Gateways: Gateways provide translation services between incompatible networks and works in all layers.

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : Discuss any four network features.

Last Answer : 1) File sharing: File sharing is the primary feature of network. Due to use of networks, the sharing of files becomes easier. File sharing requires a shared directory or disk drive to which ... has internet services such as FTP servers or Usenet servers. 7) Network security: Internal & External

Description : Sending messages to devices on my network.

Last Answer : What kind of “messages” were you looking to send? Even though they might all be connected to a single wireless network, they still each have their own protocol for “messages”.

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : State four features of Wi-Fi.

Last Answer : Wi-Fi 1. Wi-Fi stands for wireless fidelity. 2. Wi-Fi typically provides local network access for around a few hundred feet with speeds of up to 54 Mbps. 3. Wi-Fi based on IEEE 802.11 standards. 4. High Capacity Load Balancing 5. Scalability 6. Network Management System

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : If all devices are connected to a central hub, then topology is called

Last Answer : C) Star Topology

Description : Explain four features of computer networks.

Last Answer : A computer network is interconnection of two or more computers connected to each other so that they can exchange information such as e-mail, messages or documents, or share resources such as disk storage or printer. ... Digital Network (ISDN). 4. Cable TV. 5. Digital Subscriber Line (DSL).

Description : Give two features of IPv6. 

Last Answer : Two features of IPv6 are: An IPv6 address consists of 16 bytes (octets) It is 128 bits long. IPv6 specifies hexadecimal colon notation. Therefore, the address consists of 32 hexadecimal ... multicast. In an IPv6 address, the variable type prefix field defines the address type or purpose.

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : State the situations under which gateways are necessary in the network.

Last Answer : Gateway operates at all 7 layers of the OSI model. It is a device, which connects two different dissimilar n/w which have same function of communication. Situation where gateways are necessary ... case of different frame sizes, data rates, format, acknowledgement schemes, and priority schemes tec.

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : ............ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Which is not the Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : C) i-c, ii-a, iii-d, iv-b

Description : Which is not the Regional Internet Registers (RIR) of the following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)

Last Answer : Europeans Registry for Internet Numbers (ERIN)

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : Enlist the components of computer network. Describe any one in brief.

Last Answer : The components of computer network are: Hub Router Modem Bridge Switches Network Interface Card Cables and connectors Crimping tool LAN tester Explanation ... into analog format so that it can be transferred by using currently available infrastructure. 

Description : Give any four selection criteria for selecting network topology.

Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration. 

Description : Compare Server based network and peer-to-peer network.

Last Answer : Compare Server based network & Peer to Peer network Server based network Peer to Peer 1. It is much like company uses centralized management. 1. It is much like company uses ... 7.It support small Network 8.Better performance 8.Might hurt user's performance

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Windows 7 asks for network password when trying to share a folder.

Last Answer : answer:“I didn’t set one” Try setting a PW on the master entrance, then try what you are doing again.

Description : What could be wrong with my network or ISP?

Last Answer : Check for a trojan or root kit virus. When your system is being used as a bot and busily sending email for a spammer it does tend to slow down.

Description : Find the Norton equivalent resistance for the network shown in Fig No. 2

Last Answer : Solution: To find Norton’s equivalent resistance removing voltage source and current source. Voltage source is replaced by short circuit and current source is replaced by open circuit so, we get circuit as

Description : A linear network has a current input 4cos(ω t + 20º)A and a voltage output 10 cos(ωt +110º) V. Determine the associated impedance.

Last Answer : Solution

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Last Answer : Any electric network may be defined as a combination of a number of electric elements.

Description : What is active and passive network?

Last Answer : Active network is a network which contain one or more than one EMF source. An active network consists of an active element like battery or transistor. Passive network is a ... contain any source of energy. Passive network consists of passive element like resistance, inductance and capacitance.

Description : What do you mean by bilateral network and unilateral network?

Last Answer : Bilateral Network: An element whose response is independent of direction of current flowing through it is called Bilateral element and the network, which contains only bilateral elements, is called ... response depends on the direction of current flowing through it, is called unilateral network.

Description :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be A) 3 B) 2 C) 4 D) 5 

Last Answer :  The number of loop equations required to completely analysing a network comprising of 8 independent branches and 6 nodes including the reference node shall be 3 

Description : Generally in a power system network, the load is represented as a :  (A) Constant power in both load flow study and in stability study  (B) Constant power in load flow study and constant ... impedance in load flow study  (D) Constant impedance in both load flow study and in stability study

Last Answer : Generally in a power system network, the load is represented as a : Constant power in load flow study and constant impedance in stability study 

Description : The number of independent loops for a network with n nodes and b branches is

Last Answer : The number of independent loops for a network with n nodes and b branches is b-n+1

Description : A network contains linear resistors and ideal voltage sources. If values of all the resistors are doubled then the voltage across each resistor will

Last Answer : A network contains linear resistors and ideal voltage sources. If values of all the resistors are doubled then the voltage across each resistor will not change