Documente Academic
Documente Profesional
Documente Cultură
a) Point-to-point
b) multipoint
c) Primary
d) Secondary
4. As the data packet moves from the lower to upper layers, headers are [ ]
9. Mail services and directory services are available to network users through
the_________ layer. [ ]
d) None
12.The end -to- end delivery of the entire message is the responsibility of the
____layer.
ANSWERS:
1) b 2) a 3) c 4) b 5) b
6) b 7) a 8) a 9) d 10) c
11) Physical Layer 12) Transport 13) Protocols 14) Full –Duplex 15) 53
16) protocol 17) message 18) ITU-T 19) Distributed processing 20) medium
Unit -2
c) Satellite communications
d) Radio broadcasting
b) Coaxial cables
c) Optical fibers
a) The troposphere
b) The ionosphere
c) Space
10. The physical layer, in reference to the OSI model, defines the interface
between the X.25 network and the Packet mode device.
a) True b) False
12. In _____each packet of a message follows the same path from sender to
receiver.
13.____ AAl type is designed to support a data stream that has a constant bit
rate.
18. ____ layer decides which physical pathway the data should take.
ANSWERS:
1) d 2) b 3) b 4) b 5) d 6) d 7) d 8) d 9) a 10) a
11) Terminal Adapter 12) virtual Circuit switching 13) AAl1
14) 3 KHz to 300GH 15) UN guided media 18) Physical
19) Circuit switched 20) Packet switched
UNIT III
a) 2 b) 3 c) 4 d) 8
d) None
4. In stop - and -wait ARQ, if data1 has an error, the receiver sends a ____
frame. []
6. Which layer is responsible for flow control with sliding windows and
reliability with sequence numbers and acknowledgments?
a) Transport b) Application c) Internet d) Network Interface
7. IEEE subdivided the data link layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers
called?
a) Physical b) MAC, LLC c) Session d) IP
8. Is the following statement true of the Go-back-N error control strategy?
A transmitter may send up to N packets before it receives an
acknowledgment.
a) True b) False
9. In stop and wait ARQ, if data1 has an error, the receiver sends a
_______frame.
13.In sliding flow control, if the window size is 63 ____ is the range of
sequence numbers.
16.What is SLIP
17. Poll/select line discipline requires ________ to identify the packet recipient.
19. The HDLC _________field defines the beginning and end of a frame.
20.The Address field of a frame in HDLC protocol contains the address of the
________station.
Answers:
11) Bit oriented protocol 12) Automatic Repeat Request 13) 0 to 63 14) Error
Correction 15) Zero 17) dedicated line 18)line discipline, flow control and
error control 19) flag 20) secondary.
UNIT IV
a) 1/e b) 1/2e c) e d) 2e
a) 10 Base 5
b) 10 Base 2
c) 10 Base T
d) None
1. What is a MAC?
a) A Computer made by Apple
b) Memory Address Corruption
c) Mediocre Apple Computer
d) Media Access Control
2. The ________is a product of the LLC sub layer.
a) 802.3 frame b) 802.5 frame c) PDU d) preamble
7. In transparent bridge ,both source and destinations are in the same LAN,
then a frame is ________
9. The monitor station in the ___ standard ensures that one and only one
token is circulating.
10. Another term for CSMA/CD and the IEEE802.3 standard is _____
Ans: All these 3 are related to ethernet cables, where 10base2 can define as
maximum rate of data transfer is 10megabits per second ,B stands for baseband
signaling and 2 is for 200 meter of length... this is same for 10base5 but where
in 10baset T stands for twisted pair of cable
Answers:
1) a 2) a 3) b 4) a 5) c 6) d 7) c8)a 9)d 10)a
11) Same data rate 12) Discarded 13) Mac14) 802.4 15) Ethernet 16)
ethernet17) distributed queue dual bus 19) physical and data link layer 20)
switched multi mega bit data services
UNIT V:
d) None
4. Which routing algorithm requires more traffic between routers for setup
and updating?
13. The other name of the Distance Vector routing algorithm is __________
15. A________ is a subset of the subnet that includes all the routers but contains
no loops.
Ans: Sending a message to a group is called multicasting, and its routing algorithm
is called multicast routing.
Answers:
11) Network 12) flooding 13) Bellman-ford 14) broadcasting 15) spanning tree16)
Address resolution protocol17) Reverse Address resolution protocol 18) yes
UNIT VI
a) Autonomous System
b) Internetworking
d) None
a) A b) B c) C d) D
3. For what does the data link layer look for as it sends a frame from one link
to another?
15.When too many packets are present in the subnet ,performance degrades is
_____
16.What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
Ans: The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.
It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with
the autonomous system. This is newer than EGP (Exterior Gateway Protocol
18.________ Protocol data units is employed at the network layer.
Answers:
1) a 2) c 3) d 4) c 5) d 6) d7) c 8) 9) 10)
11) Physical, IP address 12) Transport 13) Dynamic Host Configuration protocol
UNIT VII
c) Source to destination
d) None
a) Cons
b) Clns
c) Cots
d) Clts
a) Connectionless
b) Connection-oriented
c) Segmentation
d) None
4. Making sure that data segments arrive in the correct order is ____ control
2. To call a remote procedure ,the client program must be bound with a small
library procedure called _____
5. The hardware (or) software with in the transport layer that does the work is
called _____
6. What are the duties of transport layer?
Ans: Flow control: adjust and confirm data flow rate for successful transmission. Error
Control: a way to recover corrupted data.
10. You have one IP: 192.168.10.29. In which layer this IP works?
1) b 2) b 3) b 4) a 5) d 6)d 7)8)9)10)
UNIT VIII:
a) HTTP
b) HTML
c) CGI
d) Java
2. Remote login can involve_______
a) NVT
b) TELNET
c) TCP/IP
a) Message preparation
b) Envelope creation
d) A and B
a) Encryption
b) Decryption
c) Hashing
d) A and B
a) a hash function
b) a secret key
c) a nonce
6. Mail services are available to network users through the ______ layer.
a. Data link b. Physical c. Transport d. Application
7. An SNMP manager can send ______messages
a) GetRequest b) SetRequest c) GetNextRequest d)all
8. An SNMP agent can send ______messages
b) GetResponse b) GetRequest c) GetNextRequest d) SetRequest
9. MIME allows ____ data to be sent through SMTP
a) Audio b)non-ASCII data c)image d)all
14.Cryptography means_________
Answers:
1) a 2) b 3) c 4) a 5) a6)7)d8)a9)a10)a
11) Joint Photographic Experts Group 12) Motion Picture Experts Group