Documente Academic
Documente Profesional
Documente Cultură
UNIT-I
INTRODUCTION TO NETWORKS & DATA COMMUNICATIONS
1. Communication between a computer and a keyboard involves ______________
transmission. [ ]
A) Simplex B) half-duplex C) full-duplex D) automatic
2. In the original ARPANET, _______ were directly connected together. [ ]
A) Routers B) host computers C) networks D) IMPs
3. ________ is a collection of many separate networks. [ ]
A) A WAN B) An internet C) A LAN D) None of the above
4. This was the first network. [ ]
A) CSNET B) NSFNET C) ARPANET D) ANSNET
5. A _______ is a data communication system within a building, plant, or campus, or between
nearby buildings. [ ]
A) LAN B) MAN C) WAN D) none of the above
6. Data flow between two devices can occur in a _______ way. [ ]
A) Simplex B) half-duplex C) full-duplex D) all of the above
7. A television broadcast is an example of _______ transmission. [ ]
A) half-duplex B) simplex C) full-duplex D) automatic
8. The information to be communicated in a data communications system is the. [ ]
A) Medium B) Protocol C) Message D) Transmission
9. A ________ is a set of rules that governs data communication. [ ]
A) Protocol B) forum C) standard D) none of the above
10. A ______ is a data communication system spanning states, countries, or the whole world.
[ ]
A) MAN B) WAN C) LAN D) none of the above
11. ________media transport electromagnetic waves without the use of a physical conductor.
[ ]
A) Guided B) Unguided C) Either (A) or (B) D) None of the above
12. ______ refers to the physical or logical arrangement of a network. [ ]
A) Topology B) Mode of operation C) Data flow D) None of the above
13. ________ cable is used for voice and data communications. [ ]
A) Twisted-pair B) Coaxial C) Fibre-optic D) none of the above
14. The _______ layer lies between the network layer and the application layer. [ ]
A) Data link B) Transport C) Physical D) none of the above
15. The Internetworking Protocol (IP) is a ________ protocol. [ ]
A) connection-oriented B) reliable C) both a and b D) none of the above
16. The ____ address uniquely defines a host on the Internet. [ ]
A) IP B) port C) specific D) physical
17. The _______ layer changes bits into electromagnetic signals. [ ]
A) Physical B) Transport C) Data link D) None of the above
18. Unipolar, bipolar, and polar encoding are types of _______ encoding. [ ]
A) Line B) block C) NRZ D) Manchester
19. ________ is the process of converting digital data to a digital signal. [ ]
A) Line coding B) Block coding C) Scrambling D) None of the above
20. A(n) ____ medium provides a physical conductor from one device to another. [ ]
A) Unguided B) guided C) either (a) or (b) D) none of the
above
21. _____ cable can carry signals of higher frequency ranges than _______ cable. [ ]
A) Coaxial; twisted-pair B) Twisted-pair; fibre-optic C) Coaxial; fibre-optic D) none
22. ___ are used for cellular phone, satellite, and wireless LAN communications. [ ]
A) Radio waves B) Infrared waves C) Microwaves D) none of the above
UNIT-II
SWITCHING
1. Data link control deals with the design and procedures for ______ communication.
[ ]
A) node-to-node B) process-to-process C) host-to-host D) none of the above
2. In a ________ network, two types of addressing are involved: global and local. [ ]
A) Datagram B) virtual-circuit C) circuit-switched D) none of the above
3. A ________ network is made of a set of switches connected by physical links, in which
each link is divided into n channels. [ ]
A) circuit-switched B) line-switched C) frame-switched D) none of the above
4. In _________, there is no resource allocation for a packet. [ ]
A) circuit switching B) datagram switching C) frame switching D) none of the above
5. A switched WAN is normally implemented as a _______ network. [ ]
A) virtual-circuit B) datagram C) circuit-switched D) none of the above
6. A switch in a datagram network uses a routing table that is based on the ______ address.
[ ]
A) Destination B) source C) local D) none of the above
7. Traditionally, _____ methods of switching have been important. [ ]
A) six B) five C) four D) three
8. Circuit switching takes place at the ________ layer. [ ]
A) Physical B) data link C) network D) transport
9. The network layer in the Internet is designed as a __________ network. [ ]
A) circuit-switched B) datagram C) virtual-circuit D) none of the above
10. A local telephone network is an example of a _______ network. [ ]
A) packet-switched B) message-switched C) circuit-switched D) none of the above
11. In cyclic redundancy checking, the divisor is _______ the CRC. [ ]
A) one bit less than B) one bit more than C) The same size as D) none of the above
12. In cyclic redundancy checking, what is the CRC? [ ]
A) The quotient B) The dividend C) The divisor D) The remainder
13. Which error detection method consists of just one redundant bit per data unit? [ ]
A) CRC B) Checksum C) Simple parity check D) Two-dimensional parity
check [ ]
14. The _____of errors is more difficult than the ______. [ ]
A) detection; correction B) correction; detection C) creation; correction D) creation;
detection .
15. Which error detection method uses one’s complement arithmetic? [ ]
A) Checksum B) CRC C) Simple parity check D) Two-dimensional parity check
16. HDLC is an acronym for _______. [ ]
A) Half-duplex digital link combination B) Host double-level circuit
C) High-duplex line communication D) High-level data link control
17. _______ control refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment. [ ]
A) Flow B) Error C) Transmission D) none of the above
18. ______ control refers to methods of error detection and correction. [ ]
A) Flow B) Error C) Transmission D) none of the above
19. The ______ Protocol has neither flow nor error control. [ ]
A) Selective-Repeat ARQ B) Go-Back-N ARQ C) Stop-and-Wait D) Simplest
20. The most common protocol for point-to-point access is the Point-to-Point Protocol (PPP),
which is a _________protocol. [ ]
A) byte-oriented B) bit-oriented C) character-oriented D) none of the above
21. The _______Protocol has both flow control and error control. [ ]
A) Stop-and-Wait B) Selective-Repeat ARQ C) Go-Back-N ARQ D) both (b) and (c)
22. The Simplest Protocol and the Stop-and-Wait Protocol are for _____channels. [ ]
A) Noiseless B) noisy C) either (a) or (b) D) neither (a) nor (b)
23.The _______Protocol has flow control, but not error control. [ ]
A) Selective-Repeat ARQ B) Stop-and-Wait C) Simplest D) Go-Back-N ARQ
UNIT-III
MULTIPLE ACCESS
1. In _______, the stations share the bandwidth of the channel in time. [ ]
A) FDMA B) CDMA C) TDMA D) none of the above
2. In the _______ method, the stations in a network are organized in a logical ring.[ ]
A) polling B) token passing C) reservation D) none of the above
3. __________ augments the CSMA algorithm to detect collision. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
4. In the _______ method, each station has a predecessor and a successor. [ ]
A) token passing B) polling C) reservation D) none of the above
5. The vulnerable time for CSMA is the ________propagation time. [ ]
A) three times B) two times C) the same as D) none of the above
6. The maximum throughput for pure ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
7. In ________, the available bandwidth is divided into frequency bands. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
8. To avoid collisions on wireless networks, ________was invented. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
9. In _____, each station transmits its data in its assigned time slot. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
10. We discussed ________ channelization protocols. [ ]
A) Four B) three C) two D) none of the above
11. We discussed ______ popular controlled-access methods. [ ]
A) Four B) three C) two D) none of the above
12. In ______, each station is forced to send only at the beginning of the time slot. [ ]
A) Pure ALOHA B) slotted ALOHA C) both (a) and (b) D) neither (a) nor (b)
13. In _______ methods, the stations consult one another to find which station has the right to
Send. [ ]
A) Channelization B) random access C) controlled access D) none of the above
14. In ________ each station sends a frame whenever it has a frame to send. [ ]
A) Slotted ALOHA B) pure ALOHA C) both (a) and (b) D) neither (a) nor (b)
15. In ______, the stations use different codes to achieve multiple access. [ ]
A) CDMA B) TDMA C) FDMA D) none of the above
16. The maximum throughput for slotted ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
17. ________ requires that each station first listen to the medium before sending. [ ]
A) FDMA B) CDMA C) MA D) CSMA
18. Gigabit Ethernet has a data rate of ________Mbps. [ ]
A) 10,000 B) 1000 C) 100 D) 10
19. Gigabit Ethernet access methods include _______ mode. [ ]
A) full-duplex B) half-duplex C) both (a) and (b) D) neither (a) nor (b)
20. Standard Ethernet (10-Mbps) uses _______ encoding. [ ]
A) AMI B) Manchester C) NRZ D) differential
Manchester
21. The original IEEE 802.11, has a data rate of ________ Mbps. [ ]
A) 11 B) 22 C) 6 D) 1
22. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
[ ]
A) Baseband B) L2CAP C) radio D) none of the above
23. A Bluetooth network is called a ________. [ ]
A) scatter-net B) blue-net C) pico-net D) none of the above
UNIT-IV
NETWORK LAYER