Sunteți pe pagina 1din 6

DATA COMMUNICATIONS & NETWORKING (15A04704)

UNIT-I
INTRODUCTION TO NETWORKS & DATA COMMUNICATIONS
1. Communication between a computer and a keyboard involves ______________
transmission. [ ]
A) Simplex B) half-duplex C) full-duplex D) automatic
2. In the original ARPANET, _______ were directly connected together. [ ]
A) Routers B) host computers C) networks D) IMPs
3. ________ is a collection of many separate networks. [ ]
A) A WAN B) An internet C) A LAN D) None of the above
4. This was the first network. [ ]
A) CSNET B) NSFNET C) ARPANET D) ANSNET
5. A _______ is a data communication system within a building, plant, or campus, or between
nearby buildings. [ ]
A) LAN B) MAN C) WAN D) none of the above
6. Data flow between two devices can occur in a _______ way. [ ]
A) Simplex B) half-duplex C) full-duplex D) all of the above
7. A television broadcast is an example of _______ transmission. [ ]
A) half-duplex B) simplex C) full-duplex D) automatic
8. The information to be communicated in a data communications system is the. [ ]
A) Medium B) Protocol C) Message D) Transmission
9. A ________ is a set of rules that governs data communication. [ ]
A) Protocol B) forum C) standard D) none of the above
10. A ______ is a data communication system spanning states, countries, or the whole world.
[ ]
A) MAN B) WAN C) LAN D) none of the above
11. ________media transport electromagnetic waves without the use of a physical conductor.
[ ]
A) Guided B) Unguided C) Either (A) or (B) D) None of the above
12. ______ refers to the physical or logical arrangement of a network. [ ]
A) Topology B) Mode of operation C) Data flow D) None of the above
13. ________ cable is used for voice and data communications. [ ]
A) Twisted-pair B) Coaxial C) Fibre-optic D) none of the above
14. The _______ layer lies between the network layer and the application layer. [ ]
A) Data link B) Transport C) Physical D) none of the above
15. The Internetworking Protocol (IP) is a ________ protocol. [ ]
A) connection-oriented B) reliable C) both a and b D) none of the above
16. The ____ address uniquely defines a host on the Internet. [ ]
A) IP B) port C) specific D) physical
17. The _______ layer changes bits into electromagnetic signals. [ ]
A) Physical B) Transport C) Data link D) None of the above
18. Unipolar, bipolar, and polar encoding are types of _______ encoding. [ ]
A) Line B) block C) NRZ D) Manchester
19. ________ is the process of converting digital data to a digital signal. [ ]
A) Line coding B) Block coding C) Scrambling D) None of the above
20. A(n) ____ medium provides a physical conductor from one device to another. [ ]
A) Unguided B) guided C) either (a) or (b) D) none of the
above
21. _____ cable can carry signals of higher frequency ranges than _______ cable. [ ]
A) Coaxial; twisted-pair B) Twisted-pair; fibre-optic C) Coaxial; fibre-optic D) none
22. ___ are used for cellular phone, satellite, and wireless LAN communications. [ ]
A) Radio waves B) Infrared waves C) Microwaves D) none of the above
UNIT-II
SWITCHING
1. Data link control deals with the design and procedures for ______ communication.
[ ]
A) node-to-node B) process-to-process C) host-to-host D) none of the above
2. In a ________ network, two types of addressing are involved: global and local. [ ]
A) Datagram B) virtual-circuit C) circuit-switched D) none of the above
3. A ________ network is made of a set of switches connected by physical links, in which
each link is divided into n channels. [ ]
A) circuit-switched B) line-switched C) frame-switched D) none of the above
4. In _________, there is no resource allocation for a packet. [ ]
A) circuit switching B) datagram switching C) frame switching D) none of the above
5. A switched WAN is normally implemented as a _______ network. [ ]
A) virtual-circuit B) datagram C) circuit-switched D) none of the above
6. A switch in a datagram network uses a routing table that is based on the ______ address.
[ ]
A) Destination B) source C) local D) none of the above
7. Traditionally, _____ methods of switching have been important. [ ]
A) six B) five C) four D) three
8. Circuit switching takes place at the ________ layer. [ ]
A) Physical B) data link C) network D) transport
9. The network layer in the Internet is designed as a __________ network. [ ]
A) circuit-switched B) datagram C) virtual-circuit D) none of the above
10. A local telephone network is an example of a _______ network. [ ]
A) packet-switched B) message-switched C) circuit-switched D) none of the above
11. In cyclic redundancy checking, the divisor is _______ the CRC. [ ]
A) one bit less than B) one bit more than C) The same size as D) none of the above
12. In cyclic redundancy checking, what is the CRC? [ ]
A) The quotient B) The dividend C) The divisor D) The remainder
13. Which error detection method consists of just one redundant bit per data unit? [ ]
A) CRC B) Checksum C) Simple parity check D) Two-dimensional parity
check [ ]
14. The _____of errors is more difficult than the ______. [ ]
A) detection; correction B) correction; detection C) creation; correction D) creation;
detection .
15. Which error detection method uses one’s complement arithmetic? [ ]
A) Checksum B) CRC C) Simple parity check D) Two-dimensional parity check
16. HDLC is an acronym for _______. [ ]
A) Half-duplex digital link combination B) Host double-level circuit
C) High-duplex line communication D) High-level data link control
17. _______ control refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment. [ ]
A) Flow B) Error C) Transmission D) none of the above
18. ______ control refers to methods of error detection and correction. [ ]
A) Flow B) Error C) Transmission D) none of the above
19. The ______ Protocol has neither flow nor error control. [ ]
A) Selective-Repeat ARQ B) Go-Back-N ARQ C) Stop-and-Wait D) Simplest
20. The most common protocol for point-to-point access is the Point-to-Point Protocol (PPP),
which is a _________protocol. [ ]
A) byte-oriented B) bit-oriented C) character-oriented D) none of the above
21. The _______Protocol has both flow control and error control. [ ]
A) Stop-and-Wait B) Selective-Repeat ARQ C) Go-Back-N ARQ D) both (b) and (c)
22. The Simplest Protocol and the Stop-and-Wait Protocol are for _____channels. [ ]
A) Noiseless B) noisy C) either (a) or (b) D) neither (a) nor (b)
23.The _______Protocol has flow control, but not error control. [ ]
A) Selective-Repeat ARQ B) Stop-and-Wait C) Simplest D) Go-Back-N ARQ
UNIT-III
MULTIPLE ACCESS
1. In _______, the stations share the bandwidth of the channel in time. [ ]
A) FDMA B) CDMA C) TDMA D) none of the above
2. In the _______ method, the stations in a network are organized in a logical ring.[ ]
A) polling B) token passing C) reservation D) none of the above
3. __________ augments the CSMA algorithm to detect collision. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
4. In the _______ method, each station has a predecessor and a successor. [ ]
A) token passing B) polling C) reservation D) none of the above
5. The vulnerable time for CSMA is the ________propagation time. [ ]
A) three times B) two times C) the same as D) none of the above
6. The maximum throughput for pure ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
7. In ________, the available bandwidth is divided into frequency bands. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
8. To avoid collisions on wireless networks, ________was invented. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
9. In _____, each station transmits its data in its assigned time slot. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
10. We discussed ________ channelization protocols. [ ]
A) Four B) three C) two D) none of the above
11. We discussed ______ popular controlled-access methods. [ ]
A) Four B) three C) two D) none of the above
12. In ______, each station is forced to send only at the beginning of the time slot. [ ]
A) Pure ALOHA B) slotted ALOHA C) both (a) and (b) D) neither (a) nor (b)
13. In _______ methods, the stations consult one another to find which station has the right to
Send. [ ]
A) Channelization B) random access C) controlled access D) none of the above
14. In ________ each station sends a frame whenever it has a frame to send. [ ]
A) Slotted ALOHA B) pure ALOHA C) both (a) and (b) D) neither (a) nor (b)
15. In ______, the stations use different codes to achieve multiple access. [ ]
A) CDMA B) TDMA C) FDMA D) none of the above
16. The maximum throughput for slotted ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
17. ________ requires that each station first listen to the medium before sending. [ ]
A) FDMA B) CDMA C) MA D) CSMA
18. Gigabit Ethernet has a data rate of ________Mbps. [ ]
A) 10,000 B) 1000 C) 100 D) 10
19. Gigabit Ethernet access methods include _______ mode. [ ]
A) full-duplex B) half-duplex C) both (a) and (b) D) neither (a) nor (b)
20. Standard Ethernet (10-Mbps) uses _______ encoding. [ ]
A) AMI B) Manchester C) NRZ D) differential
Manchester
21. The original IEEE 802.11, has a data rate of ________ Mbps. [ ]
A) 11 B) 22 C) 6 D) 1
22. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
[ ]
A) Baseband B) L2CAP C) radio D) none of the above
23. A Bluetooth network is called a ________. [ ]
A) scatter-net B) blue-net C) pico-net D) none of the above
UNIT-IV
NETWORK LAYER

1. IP is _________ datagram protocol. [ ]


A) An unreliable B) a connectionless C) both a and b D) none of the above
2. IPv6 allows _________ security provisions than IPv4. [ ]
A) More B) less C) the same level D) none of the above
3. The IPv4 header size _______. [ ]
A) Is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) none of the above
4. The logical addresses in the Internet are called _______ addresses. [ ]
A) Port B) IP C) Email D) none of the above
5. The input and output ports of a router perform the ________ layer functions of the router.
[ ]
A) Physical and data link B) network C) transport D) none of the above
7. For purposes of routing, the Internet is divided into ___________. [ ]
A) Wide area networks B) autonomous networks C) autonomous systems D) none
8. In __forwarding, the full IP address of a destination is given in the routing table[ ]
A) next-hop B) network-specific C) host-specific D) default
9. The Routing Information Protocol (RIP) is an intradomain routing based on _________
routing. [ ]
A) Distance vector B) link state C) path vector D) none of the above
10. In multicast routing, each involved router needs to construct a ________ path tree for
each group. [ ]
A) Average B) longest C) shortest D) none of the above
11. In IPv6, _______ address defines a single computer. [ ]
A) A unicast B) a multicast C) an any cast D) none of the above
12. An IPv6 address can have up to __________ colons. [ ]
A) 8 B) 7 C) 4 D) none of the above
13. IPV4 Address is _______________ [ ]
A) 8 bit B) 16 bit C) 32 bit D) 64 bit
14. Router operates in which layer of OSI Reference Model? [ ]
A) Layer 1 (Physical Layer) B) Layer 3 (Network Layer)
C) Layer 4 (Transport Layer) D) Layer 7 (Application Layer)
15. What is the address size of IPv6? [ ]
A) 32 bit B) 64 bit C) 128 bit D) 256 bit
16. The header length of an IPv6 datagram is _____. [ ]
A) 10bytes B) 25bytes C) 30bytes D) 40bytes
17. IPv6 does not use ______ type of address [ ]
A) Broadcast B) Multicast C) any cast D) None of the mentioned
18. These are the features present in IPv4 but not in IPv6. [ ]
A) Fragmentation B) Header checksum C) Options D) All of the mentioned
18. The ____ field determines the lifetime of IPv6 datagram [ ]
A) Hop limit B) TTL C) Next header D) None of the mentioned
19. In ________ congestion control, policies are applied to prevent congestion before it
happens. [ ]
A) open-loop B) closed-loop C) either (a) or (b) D) neither (a) nor (b)
19. In ________ we try to avoid traffic congestion. [ ]
A) Congestion control B) quality of service C) either (a) or (b) D) both (a) and (b)
20. In _______ congestion control, mechanisms are used to alleviate congestion after it
happens. [ ]
A) open-loop B) closed-loop C) either (a) or (b) D) neither (a) nor (b
21. _______ happens in any system that involves waiting. [ ]
A) Congestion B) Jamming C) Error D) none of the above
UNIT-V
TRANSPORT LAYER PROTOCOL

1. To accomplish flow control, TCP uses a ___________ window protocol. [ ]


A) limited-size B) sliding C) fixed-size D) none of the above
2. UDP and TCP are both _______ layer protocols. [ ]
A) Data link B) network C) transport D) none of the above
3. In the sending computer, UDP receives a data unit from the _______ layer. [ ]
A) Application B) transport C) IP D) none of the above
4. TCP is a ___________ protocol. [ ]
A) connection-oriented B) connectionless C) both a and b D) none of the above
5. UDP uses ________ to handle outgoing user datagrams from multiple processes on one
host. [ ]
A) Flow control B) multiplexing C) de-multiplexing D) none of the above
6. TCP is a(n) _______ transport protocol. [ ]
A) Unreliable B) best-effort delivery C) reliable D) none of the above
7. TCP delivers _______ out-of-order segments to the process. [ ]
A) All B) no C) some D) none of the above
8. One commonly used public-key cryptography method is the ______ algorithm. [ ]
A) RSS B) RAS C) RSA D) RAA
9. A (n) ______ algorithm transforms cipher-text to plaintext. [ ]
A) Encryption B) decryption C) either (a) or (b) D) neither (a) nor
(b)
10. The ________ is the message after transformation. [ ]
A) cipher-text B) plaintext C) secret-text D) none of the above
11. A (n) _______ algorithm transforms plaintext to cipher-text. [ ]
A) Encryption B) decryption C) either (a) or (b) D) neither (a) nor (b)
12. The ________is the original message before transformation. [ ]
A) cipher-text B) plaintext C) secret-text D) none of the above
13. A combination of an encryption algorithm and a decryption algorithm is called [ ]
A) cipher B) secret C) key D) none of the above
14. ________ is the science and art of transforming messages to make them secure and
immune to attacks. [ ]
A) Cryptography B) Crypto analysis C) either (a) or (b) D) neither (a) nor (b)
15. Password-based authentication can be divided into two broad categories: ____and ____.
[ ]
A) Fixed; variable B) time-stamped; fixed C) fixed; one-time D) none of the above
16. Message ________ means that the sender and the receiver expect privacy. [ ]
A) Confidentiality B) integrity C) authentication D) none of the above
17. Digital signature cannot provide ________ for the message. [ ]
A) Integrity B) confidentiality C) nonrepudiation D) authentication
18. A _______ ATM LAN combines features of a pure ATM LAN and a legacy ATM LAN.
[ ]
A) legacy B) pure C) mixed architecture D) none of the above
19. A (n) ______ is the interface between a user and an ATM switch. [ ]
A) NNN B) UNI C) NNI D) None of the above
20. In ATM, a virtual connection is defined by _________. [ ]
A) DLCI B) VPI C) VCI D) a combination of (b)
and (c)
21. The ATM standard defines ______ layers. [ ]
A) Five B) four C) three D) two
22. _________ is the interface between two ATM switches. [ ]
A) NNI B) NNN C) UNI D) none of the above
23. The ATM data packet is a cell composed of ______ bytes. [ ]
A) 53 B) 52 C) 43 D) 42

S-ar putea să vă placă și