Computer Networks Online Bits
Computer Networks Online Bits
a. 12 hours
b. 3 hours
c. Zero hours
d. Infinite
2. The information related to multi-programmed hosts is placed in the
header of _ _ _ _ _ _ _ Layer [01D02]
a. Application layer
b. Transport Layer
c. Session layer
d. Network Layer.
3. The _ _ _ _ _ _ _ _ _ _ Layer is a true end to end layer , from source to
destination. [01G01]
a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
4. The operation of subnet is controlled by _ _ _ _ _ _ _ _ [01G02]
a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
5. Accounting Functions are the responsibility of _ _ _ _ _ _ _ _ _ _ Layer
[01M01]
a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
6. Which one of the following is correct?? [01M02]
a. Network Layer.
b. Data Layer
c. Data Link Layer
d. Transport Layer
8. Two sides cannot attempt the same operation at the same time. This
property is accomplished by _ _ _ _ _ _ _ _ _ _ Layer [01M04]
a. Session Layer
b. Transport Layer
c. Physical Layer
1
d. Network Layer
9. The number of layers in the OSI model is _ _ _ _ _ _ _ _ [01S01]
a. 5
b. 4
c. 7
d. 8
10._ _ _ _ _ _ _ Layer contains network virtual terminal [01S02]
a. Application layer
b. Session layer
c. Presentation layer
d. Data Link Layer
11.Presentation Layer is concerned with _ _ _ _ _ _ _ _ _ _ [01S03]
a. Synchronization
b. Flow Control
c. Syntax and Semantics
d. File Transfer.
12.Frame boundaries are recognized and created by _ _ _ _ _ _ _ _ _ Layer.
[01S04]
a. Application layer
b. Data Link Layer
c. Session layer
d. Network Layer.
13.Token Management is the function of _ _ _ _ _ _ _ _ _ _ _ _ Layer.
[01S05]
a. Application layer
b. Data Link Layer
c. Session layer
d. Network Layer.
14.The function of Physical Layer is _ _ _ _ _ _ _ _ _ _ _ [01S06]
a. bus
b. mesh
c. star
d. tree
16.A network that contains multiple hubs is most likely configured in a _ _ _
_ _ _ _ topology [02D02]
a. bus
b. mesh
c. star
d. tree
17.In a network with 25 computers, which topology would require the most
extensive cabling. [02D03]
a. bus
b. mesh
2
c. star
d. tree
18.A television broadcast is an example of _ _ _ _ _ _ _ _ _ _ transmission
[02M01]
a. Simplex
b. half-duplex
c. full-duplex
d. automatic
19.Which topology features a point-to-point line configuration? [02M02]
a. mesh
b. star
c. bus
d. ring
20.In a mesh topology, the relationship between one device and another is _
_ _ _ _ _ _ _ _ [02M03]
a. primary-to-peer
b. peer-to-primary
c. primary-to-secondary
d. peer-to-peer
21.A cable break in a _ _ _ _ _ _ _ _ _ topology stops all transmission
[02M04]
a. bus
b. mesh
c. star
d. primary
22.Which topology requires a central controller or hub? [02S01]
a. mesh
b. star
c. bus
d. ring
23.Which topology requires a multipoint connection? [02S02]
a. mesh
b. star
c. bus
d. ring
24.Communication between a computer and a keyboard involves _ _ _ _ _ _
_ _ _ transmission [02S03]
a. Simplex
b. half-duplex
c. full-duplex
d. automatic
25.A tree topology is a variation of a _ _ _ _ _ _ _ _ _ topology. [02S04]
a. mesh
b. star
c. bus
d. ring
26.In a _ _ _ _ _ _ _ _ _ _ _ _ topology, if there are n devices in anetwork,
each device has n-1 port for cables [02S05]
a. mesh
3
b. star
c. bus
d. ring
27.A _ _ _ _ _ _ _ _ _ _ _ connection provides a dedicated link between two
devices. [02S06]
a. point - to - point
b. multipoint
c. primary
d. Secondary
28.In a _ _ _ _ _ _ _ _ _ _ connection, more than two devices can share a
single link. [02S07]
a. point - to - point
b. multipoint
c. primary
d. Secondary
29.In _ _ _ _ _ _ _ _ _ _ _ transmission, the channel capacity is shared by
both communicating devices at all times. [02S08]
a. Simplex
b. half-duplex
c. full-duplex
d. automatic
30.Which Protocol is used for electronic mail ? [03D01]
a. TELNET
b. NNTP
c. HTTP
d. SMTP
31.The TCP/IP model has connection less communication in _ _ _ _ _ _ _ _ _
_ Layer [03D02]
a. Transport Layer
b. Internet layer
c. Presentation Layer
d. Application Layer
32.The functions of internet Layer in TCP/IP are [03M01]
4
a. 5
b. 4
c. 6
d. 7
36.Internet Layer in TCP/IP is _ _ _ _ _ _ _ _ _ _ [03S02]
a. Connection Oriented
b. Can be Connection Oriented and connection less
c. Connection less
d. Client Server type request
37.The protocol defined by internet layer in TCP/IP is _ _ _ _ _ _ _ _
[03S03]
a. TCP Protocol
b. UDP Protocol
c. SMTP
d. IP P rotocol
38.Two protocols defined in Transport Layer of TCP/IP are _ _ _ _ _ _ _ _ _
_ _ [03S04]
a. TCP and IP
b. TCP and UDP
c. UDP and IP
d. TCP only
39.Which of the following is/are a connection oriented protocol(s)?? _ _ _ _
_ _ _ _ _ _ [03S05]
a. TCP
b. UDP
c. TCP and UDP
d. Neither TCP nor UDP
40.UDP has the following properties [03S06]
a. Application
b. Presentation
c. Transport
d. Internet
43.The IP in TCP/IP uses _ _ _ _ _ _ _ _ bit addresses but IPX in Novell
Netware uses _ _ _ _ _ _ _ bit addresses [04D01]
a. 4, 12
b. 12, 4
c. 8, 16
d. 16, 8
44.In the earlier ARPA NET each node of network consisted [04D02]
5
a. TIP & a host
b. BBN & a host
c. IMP & a host
d. SAP & a host
45.Novell Netware is based on _ _ _ _ _ _ _ _ _ _ _ [04M01]
a. XNS
b. OSI
c. TCP/IP
d. TIP
46.The protocols used in Transport layer of Novell Netware _ _ _ _ _ _ _ _ _
[04M02]
a. TCP
b. IP
c. UDP
d. SAP
48.The address in Novell Netware contains [04M04]
a. 32- bit Network Number, 48-bit Machine Number & 16-bit Local
address
b. 16- bit Network Number, 32-bit Machine Number & 48-bit Local address
c. 48- bit Network Number, 16-bit Machine Number & 32-bit Local address
d. 16- bit Network Number, 48-bit Machine Number & 32-bit Local address
49.The physical layer of Novell Netware consists of _ _ _ _ _ _ _ _ _ _ _
protocol [04S01]
a. IPX
b. NCP
c. SAP
d. ARC NET
50.The connection oriented transport protocol in Novell Netware is _ _ _ _ _
_ _ _ _ _ [04S02]
a. NCP
b. IPX
c. SAP
d. Ethernet
51.IPX is used in _ _ _ _ _ _ _ _ _ _ layer of Novell Netware [04S03]
a. Application
b. Transport
c. Network
d. Physical
52.Expand SAP in Novell Netware [04S04]
6
a. ARPA Computers
b. IMP
c. BBN
d. DARPA Computers
54.Expand TIP in ARPA NET [04S06]
a. BBN
b. IMP
c. TIP
d. DNS
56.Internet is based on _ _ _ _ _ _ _ _ _ protocol stack. [04S08]
a. XNS
b. IMP
c. TCP/IP
d. SAP
57.The topology not used in LAN is _ _ _ _ _ _ _ _ _ [05D01]
a. Ring
b. Star
c. Bus
d. Mesh
58.When packets are small and all are equal sized then they are called _ _ _
_ _ _ _ _ _ [05D02]
a. Frames
b. Small Packets
c. Cells
d. Atoms
59.Irregular topologies are used in _ _ _ _ _ _ _ _ _ _ [05D03]
a. LAN
b. WAN
c. MAN
d. Broadcast Networks
60.Traditional LANs run at the speed of [05M01]
a. Size
b. Transmission Technology
c. Topology
d. Routers
62.In static allocation of channel in LAN Broadcast Networks _ _ _ _ _ _ _ _
_ _ algorithm is used [05M03]
a. FCFS
7
b. Round Robin
c. Shortest Frame first
d. High priority first
63.In _ _ _ _ _ _ _ _ _ Network, there is a broadcast medium to which all
computers are attached [05M04]
a. MAN
b. LAN
c. WAN
d. Broadcast Networks
64.Privately owned networks are _ _ _ _ _ _ _ _ [05S01]
a. MAN
b. LAN
c. WAN
d. Broadcast Networks
65.Worst-case time is bounded in _ _ _ _ _ _ _ _ _ _ [05S02]
a. LAN
b. MAN
c. WAN
d. Broadcast Networks
66._ _ _ _ _ _ Broadcast Networks can be divided into Static and dynamic
depending on channel allocation [05S03]
a. MAN
b. LAN
c. Broadcast Networks
d. WAN
67.Local Cable TV Network is an example for _ _ _ _ _ _ _ _ _ _ [05S04]
a. WAN
b. Broadcast
c. LAN
d. MAN
68.The IEEE standard for DQDB is _ _ _ _ _ _ _ [05S05]
a. 802.3
b. 802.4
c. 802.6
d. 802.5
69.Hosts in WAN are connected by _ _ _ _ _ _ _ _ _ _ _ _ [05S06]
a. Communication Line
b. Subnet
c. Router
d. Another host Computer
70.Which one is not a transmission line? [05S07]
a. Circuits
b. Channels
c. Trunks
d. Paths
71.Satellite or ground radio is an example for _ _ _ _ _ _ _ [05S08]
a. WAN
b. MAN
c. LAN
8
d. Broadcast Networks
72.LASERs face a inhibition on [06D01]
a. sunny day
b. dry day
c. windy day
d. rainy day
73._ _ _ _ _ _ _ _ transmission has more suitable for indoor wireless LANs
[06D02]
a. radio
b. micro wave
c. infra red
d. light wave
74._ _ _ _ _ _ _ _ _ category twisted pairs are called as unshielded twisted
pair [06D03]
a. Category 1
b. Category 3
c. Category 5
d. Category 3 & Category 5
75.Which of the following is not considered an important use of microwaves
[06D04]
a. Industrial bands
b. scientific bands
c. medical bands
d. entertainment bands
76.The number of oscillations per second of anelectromagnetic wave is
called its _ _ _ _ _ _ _ and is measured in _ _ _ _ _ _ _ _ [06M01]
a. twisted pair
b. fibre optics
c. wireless
d. coax
78.A modern application to connect the LANs in two buildings is through _ _
_ _ _ _ _ _ transmission [06M03]
a. radio
b. micro wave
c. infra red
d. light wave
79.What is advantage of twists for a wire _ _ _ _ _ _ _ [06M04]
a. Data lose
b. Noise reduction
c. No noise
d. Added noise
80.In fiber optics a pulse of light indicates _ _ _ _ _ _ [06S01]
a. 1 bit
b. 0 bit
9
c. 1 byte
d. 8 bits
81._ _ _ _ _ _ kind of coaxial cable is used for analog transmission [06S02]
a. Base band
b. Broad band
c. Category 3
d. Fiber
82.As we go from long-wave radio towards visible light, the waves behave
more and more like _ _ _ _ _ _ and less and less like _ _ _ _ _ _ _ _
[06S03]
a. radio, light
b. light., radio
c. radio , micro wave
d. micro wave, light
83.Multipath fading _ _ _ _ _ _ _ _ the signal [06S04]
a. enhances
b. adds to
c. cancels
d. maximizes
84.In micro wave transmission concentrating all the energy into a small
beam using a parabolic antenna gives a _ _ _ _ _ _ _ _ signal to noise
ratio [06S05]
a. lower
b. higher
c. degraded
d. subtle
85.Radio waves are _ _ _ _ _ _ _ _ _ [06S06]
a. uni directional
b. bi directional
c. multidirectional
d. omnidirectional
86.The fundamental relation between frequency (f), wave length (l) and
speed(c) [06S07]
a. f*c=l
b. f/l=c
c. l*c=f
d. f*l=c
87.Speed of light is [06S08]
a. 3*10 8 m/s
b. 3*10 8 cm/sec
c. 3*10 9 m/s
d. 3*10 cm/sec
9
88.In transparent Bridges, all the decisions are made by looking into _ _ _ _
_ _ _ _ _ [07D01]
a. Advertisement Tables
b. Description Tables
c. Hash Tables
d. Fragment Tables
10
89.If destination LAN is unknown in Transparent Bridges then we use _ _ _ _
_ _ _ _ _ _ [07D02]
a. Hardware
b. Software
c. Hybrid
d. Remote
91.Configuration of _ _ _ _ _ _ _ _ _ _ _ _ is manual [07D04]
a. Transparent
b. Spanning Tree
c. Remote
d. Source Routing
92.In LAN with token ring topology, _ _ _ _ _ _ _ _ _ _ _ are used [07D05]
a. Transparent
b. Spanning Tree
c. Remote
d. Source Routing
93.A configuration of N LANs is linearly connected by 4 bridges. By the time
we reach the Nth LAN how many discovery frames will be circulating?
[07D06]
a. N4
b. 4
c. 4N
d. N
94.Which of the following is not an internetworking device? [07M01]
a. Bridge
b. Repeater
c. Router
d. Cable
95.What type of bridge must have its address table entered manually?
[07M02]
a. Simple
b. Transparent
c. Multi port
d. Source routing
96.A bridge has access to the _ _ _ _ _ _ _ _ _ _ _ address of a station on
the same network. [07M03]
a. Physical
b. Network
c. Service access point
d. Logical
97.In source routing bridges _ _ _ _ _ _ _ _ _ frame is used to discover the
destination [07M04]
11
a. Discovery
b. Control
c. Data
d. Acknowledgement
98.LAN's can be connected by a device called _ _ _ _ _ _ _ _ _ _ [07M05]
a. Routers
b. Modems
c. Ethernet card
d. Bridges
99.In _ _ _ _ _ _ _ _ all frames are given to the computer, not to those
addressed [07M06]
a. Promiscuous mode
b. Miscues mode
c. Normal mode
d. Special Mode
100._ _ _ _ _ _ Algorithm is used in transparent bridges [07S01]
a. Forward Learning
b. Backward Learning
c. Reverse Backward Learning
d. Reverse Forward Learning
101.In transparent bridges the failures are handled by _ _ _ _ _ _ [07S02]
a. Host
b. Bridge
c. Network layer
d. Router
102.CSMA/CD and token bus user choose _ _ _ _ _ _ bridge [07S03]
a. Transparent bridge
b. Selective flooding
c. Source Routing
d. Remote Bridges
104.In source routing bridges each LAN has a unique _ _ _ _ _ _ bit no.
[07S05]
a. 10
b. 8
c. 16
d. 12
105.Source routing bridges in the same LANs must have _ _ _ _ _ _ _ _
bridge Number [07S06]
a. Same
b. Different
c. Source
d. Destination
106.Repeater function in the _ _ _ _ _ _ _ _ _ layer [07S07]
a. Physical
12
b. Data link
c. Network
d. Transport
107.Bridges function in the _ _ _ _ _ _ _ layer. [07S08]
a. Physical
b. Data link
c. Network
d. Transport
108.A repeater takes a weakened or corrupted signal and _ _ _ _ _ _ _ _ _ _
it [07S09]
a. Amplifies
b. Regenerates
c. Resample
d. Reroute
109.The PSTN is an example of _ _ _ _ _ _ _ network [08D01]
a. packet-switched
b. circuit-switched
c. message-switched
d. TSI
110.In _ _ _ _ _ _ _ _, each packet of a message follows the same path from
sender to receiver [08D02]
a. Circuit switching
b. message switching
c. a virtual approach to packet switching
d. The datagram approach to packet switching
111.In a time division switch, a _ _ _ _ _ _ _ governs the destination of a
packet stored in RAM [08D03]
a. TDM bus
b. cross bar
c. cross point
d. control unit
112.How many cross points are needed in a single stage switch with 40
inputs and 50 outputs [08M01]
a. 40
b. 50
c. 90
d. 2000
113.The _ _ _ _ _ _ _ _ _ of A TSI controls the order of delivering of slot
values that are stored in RAM [08M02]
a. cross bar
b. cross point
c. control unit
d. transreceiver
114.In _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed
because data must be stored and retrieved from RAM. [08M03]
a. Space-division
b. time-division
c. virtual
d. packet
115.To create a _ _ _ _ _ _ _, combine crossbar switches in stages [08M04]
13
a. Multistage switch
b. cross point
c. packet switch
d. TSI
116.In _ _ _ _ _ _ _ _ _ each packet of a message need not follow the same
path From sender to receiver [08M05]
a. Circuit switching
b. message switching
c. a virtual approach to packet switching
d. The datagram approach to packet switching
117.An important property of circuit switching is the need to setup an end-
to-end path _ _ _ _ _ _ _ _ any data can be sent [08S01]
a. after
b. before
c. along with which
d. avoiding which
118.The elapsed time between the end of dialing and the start of ringing can
be a minimum of _ _ _ _ _ _ _ _ _ [08S02]
a. 1sec
b. 10sec
c. 100sec
d. 1000sec
119.A network using message switching is called _ _ _ _ _ _ [08S03]
a. store-and-forward
b. forward-and-store
c. store-and-send
d. send-and-store
120._ _ _ _ _ _ _ _ Networks place a tight upper limit on block size, allowing
packets to be buffered in router main memory instead of on disk. [08S04]
a. Message switching
b. circuit switching
c. packet switching
d. store-and-forward
121.Which type of switching uses the entire capacity of a dedicated link?
[08S05]
a. Circuit switching
b. datagram packet switching
c. virtual circuit packet switching
d. Message switching
122.The _ _ _ _ _ _ is a device that connects n inputs to m outputs [08S06]
a. Cross point
b. cross bar
c. modem
d. RAM
123.In which type of switching do all the datagrams of a message follow the
same channels of a path [08S07]
a. Circuit switching
b. datagram packet switching
c. virtual circuit packet switching
d. message switching
14
124.which ISDN plane is associated with signaling another D channel
[09D01]
a. user
b. control
c. management
d. supervise
125.When you store and forward messages in B-ISDN, you are using _ _ _ _
_ _ _ _ services [09D02]
a. Conversational
b. messaging
c. retrieval
d. distributive
126.Commercial TV is an example of [09D03]
a. messaging services
b. Conversational services
c. distributional services without user control
d. distributional services with user control
127.The normal user interface to an ISDN is PRI or _ _ _ _ _ _ _ _ _ [09D04]
a. NT1
b. NT2
c. TE1
d. TE2
129.A banyan switch parsers the output line number from _ _ _ _ _ _ _ _
[09M02]
a. snake-like
b. left to right
c. right to left
d. top to bottom
130.For n line, the complexity of a batcher switch grows like _ _ _ _ _ _ _ _ _
[09M03]
a. Log n
b. n2
c. n log n
d. n log 2 n
131.The ISDN equivalent of DTE is [09M04]
a. TE1
b. TE2
c. NT1
d. TA
132.ISDN is an acronym for _ _ _ _ _ _ _ _. [09S01]
15
d. Integrated Signals Digital Network
133.Which of the following channel types is not standardized [09S02]
a. NT1
b. NT2
c. NT3
d. NT4
135.The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual
pipe between the customer and the carrier through which bits flow
[09S04]
a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection
139.A _ _ _ _ _ _ _ _ _ _ is the physical connection between an end point
and a switch or between two switches. [10D02]
a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection
140.The VPI of a UNI is _ _ _ _ _ _ _ _ _ _ _ _ bits in length [10D03]
a. 8
b. 12
c. 16
d. 24
141.The VPI of a NNI is _ _ _ _ _ _ _ _ _ bits in length [10D04]
a. 8
16
b. 12
c. 16
d. 24
142.In a VP switch the _ _ _ _ _ _ _ _ does not change while the _ _ _ _ _ _
_ _ can change . [10D05]
a. VPI, VCI
b. VCI, VPI
c. VP, VPC
d. VPC, VP
143.In a _ _ _ _ _ _ _ switch, both the VPI and VCI can changes [10D06]
a. VP
b. VPC
c. VPI
d. VCI
144.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header and 2
bytes of trailer are added to a 45- byte payload. [10M01]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
145.In the SAR sublayer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and
there is no added header or trailer. [10M02]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
146.A _ _ _ _ _ _ _ _ _ field on a UNI cell header is used for connection
purposes. [10M03]
a. Asynchronous FDM
b. Synchronous FDM
c. Asynchronous TDM
d. Synchronous TDM
149.In an ATM network, all cells belonging to a single message follow the
same _ _ _ _ _ _ _ and remain in their original order until they reach
their destination. [10M06]
a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection
17
150.The ATM _ _ _ _ _ _ _ _ _ _ _ _ _ _ sub layer is concerned with getting
the bits on and off the wire [10S01]
a. Physical Layer
b. ATM Layer
c. AAL1
d. AAL2
151.In data communications, ATM is an acronym for [10S02]
a. is asynchronous
b. is multiplexed
c. is a network
d. uses virtual circuit routing
153.Which layer in ATM protocol reformats the data received from other
networks? [10S04]
a. Physical
b. ATM
c. Application adaptation
d. Data adaptation
154.Which layer in ATM protocol has a 53-byte cell as an end product
[10S05]
a. Physical
b. ATM
c. Application adaptation
d. Data adaptation
155.Which AAL type can best process a data stream having a nonconstant bit
rate? [10S06]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
156.Which AAL type is designed to support a data stream that has a constant
bit rate? [10S07]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
157.Which AAL type is designed to support conventional packet switching
that uses the virtual circuit approach? [10S08]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
158.Which AAL type is designed to support SEAL ? [10S09]
a. AAL1
18
b. AAL2
c. AAL3/4
d. AAL5
159.The end product of the SAR is a data packet that is _ _ _ _ _ _ _ _ _ _
[10S10]
a. Variable in length
b. 48 bytes long
c. 44 to 48 bytes long
d. greater than 48 bytes long
160.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header is added to
47 bytes of data. [10S11]
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
161.In ALOHA, the throughput is a maximized by dividing time into _ _ _ _ _
_ _ _ intervals. [11D01]
a. Variable
b. Unique
c. Discrete
d. Continuous
162.In adaptive tree walk protocol, each node at level I has a fraction _ _ _
_ _ _ _ of the station below it [11D02]
a. 2I
b. I2
c. 2 - I
d. I - 2
163.In _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1
whenever it finds the channel idle [11M01]
a. 1 - persistent CSMA
b. p - persistent CSMA
c. non - persistent CSMA
d. ALOHA.
164.The channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _ _
[11M02]
a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)
d. N/(d+log2d)
165.The channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _
[11M03]
a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)
d. N/(d+log2d)
166.The channel efficiency of binary-countdown protocol is _ _ _ _ _ _
[11M04]
a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)
19
d. N/(d+log2d)
167._ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub layer
[11S01]
a. CSMA
b. TCP
c. CSMA/CD
d. GSM
168.The first collision free protocol is _ _ _ _ _ _ _ _ _ _ [11S02]
a. Binary countdown
b. Basic bitmap
c. Reservation protocol
d. SAP
169.In binary count down protocol each station address bits are _ _ _ _ _ _ _
[11S03]
a. ANDed
b. Ex - Ored
c. Ored
d. NORed
170.Multiple users share a common channel is called _ _ _ _ _ _ _ _ _
[11S04]
a. LAN
b. WAN
c. Contention
d. CSMA/CD
171._ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting.
[11S05]
a. T=1/
b. T=1/µc
c. T = 1/(µc- )
d. T=1/µ
173.The maximum through put of pure ALOHA system is _ _ _ _ _ _ _
[11S07]
a. 18.4 %
b. 36.8 %
c. 17.4 %
d. 34.8 %
174.The maximum through put of slotted ALOHA is _ _ _ _ _ _ _ _ _ [11S08]
a. 18.4 %
b. 36.8 %
c. 17.4 %
d. 34.8 %
175.Collision Detection is a/an _ _ _ _ _ _ _ _ _ _ process [12D01]
a. Digital
20
b. Analog
c. Discrete
d. Continuous
176.In CSMA/CD the time taken for a station to be sure that it has seized the
channel in worst case is _ _ _ _ _ _ _ _
where t = time for signal to propagate between 2 stations [12D02]
a. 2t - e
b. 2 + t
c. 2t
d. 2e - t
177.The problem of a station not being able to detect a potential competitor
for the medium because competitor is far away is called _ _ _ _ _ _ _ _ _
_ [12M01]
a. ALOHA
b. Multiple access
c. Station Model
d. CSMA
180.Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _ [12S02]
a. ALOHA
b. Slotted ALOHA
c. 1-persistent CSMA
d. non-persistent CSMA
181.Contention Slots are not found in _ _ _ _ _ _ _ _ _ [12S03]
a. non-persistent CSMA
b. CSMA/CD
c. Bitmap
d. Binary Countdown
182.A problem with Bitmap protocols is an overhead of _ _ _ _ _ _ _ _ bit(s)
per station [12S04]
a. 0
b. 1
c. 2
d. 3
183.In adaptive tree walk protocol we use _ _ _ _ _ _ and _ _ _ _ _ _ _ _ _
searching [12S05]
21
c. Graph and Depth First
d. Tree and Depth First
184.An early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _ [12S06]
a. MACA
b. ALOHA
c. CSMA/CD
d. Collision Free
185.A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet [13D01]
a. 10Base 5
b. 10Base 2
c. 10Base - T
d. 10Base - F
186.A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet [13D02]
a. 10Base 5
b. 10Base 2
c. 10Base - T
d. 10Base - F
187.The protocol used in ETHERNET is [13D03]
a. ALOHA
b. Binary Count down
c. CSMA/CD
d. Multiple Access Protocol
188.10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet. [13M01]
a. Thick
b. Thin
c. Twisted pair
d. Fiber optics
189.In token ring, the length of the token is _ _ _ _ _ _ _ _ [13M02]
a. 4 bytes
b. 3 bytes
c. 1 bytes
d. 2 bytes
190.The protocol in which, after I collisions, a random number between 0
and 2i - 1 number of slots is skipped is called _ _ _ _ _ _ _ _ [13M03]
a. Exponential
b. Binary countdown
c. Backoff
d. Binary exponential backoff
191.In switched 802.3 LANS, each card forms its own _ _ _ _ _ _ _
independents of the others [13M04]
a. Domain
b. Area
c. Collision Area
d. Collision domain
192.10 base 2 cabling is called _ _ _ _ _ _ _ _ Ethernet. [13S01]
a. Thick
b. Thin
c. Twisted pair
d. Fiber optics
22
193.802.3 base band systems use _ _ _ _ _ _ _ _ encoding. [13S02]
a. Manchester
b. RZ
c. NRZ
d. RZ or NRZ
194.In 802.3, each frame starts with a _ _ _ _ _ _ _ _ of 7 bytes [13S03]
a. SD
b. Preamble
c. ED
d. pad
195.In 802.3, the high order bit of the destination address is a '0' for _ _ _ _
_ _ _ addresses [13S04]
a. Ordinary
b. Group
c. Broadcast
d. Unicast
196.In 802.3, the address consisting of all 1 bits is reserved for _ _ _ _ _ _ _
_ [13S05]
a. Unicast
b. Multicast
c. Broadcast
d. Ordinary
197.The _ _ _ _ _ _ _ _ standard describes the upper part of the data link
layer. [13S06]
a. IEEE 802.2
b. IEEE 802.3
c. IEEE 802.4
d. IEEE 802.5
198.The _ _ _ _ _ _ _ _ standard describes the CSMA/CD protocol [13S07]
a. IEEE 802.2
b. IEEE 802.3
c. IEEE 802.4
d. IEEE 802.5
199.Which IEEE 802 standard does not provide for a collision-free protocol?
[14D01]
a. 802.2
b. Bit map
c. 802.4
d. 802.5
200.In token bus, how does a station transmit data to the destination node?
[14D02]
a. By seizing token
b. By generating token
c. By releasing token
d. By releasing frame
201.In token ring, which sub station gets the token first? [14D03]
a. Priority 0 station
b. Priority 2 station
c. Priority 4 station
23
d. Priority 6 station
202._ _ _ _ _ _ _ _ _ _ _ IEEE standard describe the token ring [14M01]
a. 802.2
b. 892.3
c. 802.4
d. 802.5
203.Which IEEE 802 standard provides for a collision-free protocol? [14M02]
a. 802.2
b. 892.3
c. 802.1
d. 802.5
204.FDDI is an acronym for _ _ _ _ _ _ _ _ _ [14M03]
a. 802.2
b. 892.3
c. 802.4
d. 802.5
210.The DLL at receiving end _ _ _ _ _ _ _ _ the DLE before data are given to
network layer [15D01]
a. Adds
b. Putts
c. Gets
24
d. Removes
211.The DLL service is to provide data from network layer on the source
machine to _ _ _ _ _ _ _ _ machine [15D02]
a. Destination
b. Object
c. Source
d. Server
212.Whenever the sender's data link layer encounter five consecutive ones
in the data, it automatically stuffs a 0 bit into the out going bit stream is
called _ _ _ _ _ _ _ _ [15D03]
a. Character stuffing
b. Character count
c. Bit stuffing
d. Coding violation
213.If a flag byte is given as 0111 1110, and when bit stuffing is applied
than the outgoing bit stream will look like _ _ _ _ _ _ _ _ [15D04]
a. 101111110
b. 001111110
c. 011111010
d. 011111101
214.In _ _ _ _ _ _ _ process sender's DLL insert DLE before each accidental
DLE character in data [15G01]
a. Character stuffing
b. Bit stuffing
c. Symbol stuffing
d. None
215.An acknowledged connectionless service is useful over unreliable
channels such as _ _ _ _ _ _ _ _ systems [15M01]
a. Wireless
b. Wired
c. Double wired
d. Synthetic
216.When connection - oriented service is used, transfers have distinct
phases [15M02]
a. One
b. Two
c. Three
d. Four
217.The approach for DLL to break the bit stream up into discrete parts is _
_ _ _ _ _ _ _ [15M03]
a. Naming
b. Claiming
c. Charging
d. Framing
218.Data link layer provides service to _ _ _ _ _ _ _ _ _ _ layer [15S01]
a. Transport
b. Application
c. Session
d. Network
25
219.Unacknowledged connection less service is adopted when _ _ _ _ _ _
[15S02]
a. Char stuffing
b. Flag
c. Bit stuffing
d. Char count
221.The data link layer must use the service provided to it by the _ _ _ _ _ _
_ _ layer [15S04]
a. Data link
b. Physical
c. Transport
d. Session
222.In the data link layer, each frame begins and ends with a special bit
pattern _ _ _ _ _ _ _ _, called a flag byte [15S05]
a. 01110110
b. 01111110
c. 01011010
d. 10101010
223.When the receiver sees five consecutive incoming '1' bits followed by a
'0' bit it automatically destuffs _ _ _ _ _ _ _ _ _ in bit stuffing. [15S06]
a. '1' bit
b. '0' bit
c. '01' bit
d. '10' bit
224.A path which connects DLL and Network layer on source to DLL and
Network layer on the destination is _ _ _ _ _ _ _ _ _ _ path [15S07]
a. Actual
b. Critical
c. Vertical
d. Virtual
225.If source machine sends independent frames to destination machine
without having acknowledgment, this service is _ _ _ _ _ _ _ _ _ [15S08]
a. 111111011
b. 111111110
c. 1010110
d. 110111111
227.If the data unit is 111111,the divisor 1010,what is the dividend a the
transmitter? [16D02]
26
a. 111111000
b. 1111110000
c. 111111
d. 1111111010
228.If odd parity is used for ASCII error detection, the number of 0's per 8 -
bit symbol is [16D03]
a. even
b. odd
c. indeterminate
d. 42
229.Which error detection method cannot detect a burst error? [16D04]
a. VRC
b. LRC
c. CRC
d. Hamming code
230.The number of bit positions in which two code words differ is called
[16M01]
a. Checksum distance
b. Hamming distance
c. CRC distance
d. Parity distance
231.Computation of checksum is implemented in hardware using [16M02]
a. Shift register
b. AND register
c. OR register
d. EX - OR register
232.If the ASCII character G is sent and D is received, what type of error is
this [16M03]
a. Single bit
b. Multiple bit
c. Burst
d. Recoverable
233.If the ASCII character H is sent and I is received, what type of error is
this [16M04]
a. Single bit
b. Multiple bit
c. Burst
d. Recoverable
234.In cyclic redundancy checking, what is the CRC? [16S01]
a. The divisor
b. The quotient
c. The dividend
d. The remainder
235.In CRC there is no error if the remainder at the receiver is _ _ _ _ _ _ _ _
_ _ _ _. [16S02]
27
236.Error detection is usually done in the _ _ _ _ _ _ _ _ _ layer of the OSI
model [16S03]
a. Physical
b. Data link
c. Network
d. Session
237.Which error detection method uses one's complement arithmetic?
[16S04]
a. VRC
b. LRC or HRC
c. CRC
d. Checksum
238.In cyclic redundancy checking, the divisor is _ _ _ _ _ _ _ _ the CRC
[16S05]
a. VRC
b. LRC
c. CRC
d. Checksum
240.In CRC the quotient at the sender _ _ _ _ _ _ _ _ _ [16S07]
a. 0s are
b. 1s are
c. The polynomial is
d. The CRC remainder is
242.Protocols in which sender sends one frame and then waits for an
acknowledgement before proceeding are called _ _ _ _ _ _ _ protocols.
[17D01]
a. go - and - stop
b. stop - and - wait
c. wait - and - stop
d. wait - and - go
243.The sender or receiver always waits for +ve acknowledgement, which
has _ _ _ _ _ _ _ _ data [17D02]
a. Noisy
b. Less
c. High
d. Noise free
244.If frame arrived undamaged, the data link layer is informed with an
event _ _ _ _ _ _ _ _ [17G01]
28
a. Cksum - error
b. Frame - arrival
c. Frame - error
d. None
245.Protocols in which the sender waits for a positive acknowledgement
before advancing to the next data item are often called _ _ _ _ _ _ _ _ _ _
[17M01]
a. Go back - n
b. stop and wait
c. Unrestricted simplex
d. Simplex protocol for noisy channel
247.In unrestricted simplex protocol, sequence numbers and _ _ _ _ _ _ _
are not used [17M03]
a. Acknowledgements
b. Inputs
c. Outputs
d. Frame count
248.If a frame has arrived safely, correctly then receiver will send _ _ _ _ _
_ _ _ acknowledgements to sender [17S01]
a. +Ve
b. - Ve
c. Neutral
d. No
249.In the data link layer, _ _ _ _ _ _ _ _ _ procedure is used to Fetch a
packet from the network layer for transmission on the channel [17S02]
a. From - network-layer ()
b. to - network-layer ()
c. From - physical - layer ()
d. to - physical-layer ()
250._ _ _ _ _ _ _ _ is used to number the frames [17S03]
a. MAX - SEQ
b. Seq-nr
c. Frame - kind
d. Info
251._ _ _ _ _ _ is a unit of information exchanged between data link layer
and network layer [17S04]
a. Packet
b. Frame
c. Page
d. Block
252._ _ _ _ _ _ _ _ is not a part of frame header [17S05]
a. Seg
b. Kind
c. ACK
29
d. Seq - nr
253.If a receiver simply to discard all subsequent frames, send no
acknowledgements for the discard frame is _ _ _ _ _ _ _ _ _ _ [18D01]
a. Back go n
b. n back go
c. go back n
d. back n go
254.The state labeled by three characters XYX, X = ? [18D02]
a. 0
b. 0 or 1
c. 1
d. 1 or -
255.In finite state machine model each protocol machine is always in a
specific _ _ _ _ _ _ _ _ _ at every instant of time. [18D03]
a. Instant
b. Constant
c. Gap
d. State
256.From each state, there are zero or more possible _ _ _ _ _ _ _ _ to other
states [18D04]
a. Transactions
b. Transitions
c. Traits
d. Transports
257.If the line is poor, _ _ _ _ _ _ _ _ protocol wastes a lot of bandwidth on
retransmitted frames [18G01]
a. Selective repeat
b. Go back n
c. 1 - bit sliding window
d. None
258.Receiving data link layer store all correct frames following bad one is _
_ _ _ _ _ _ _ _ [18G02]
a. Pipelining repeat
b. Selective repeat
c. Simple repeat
d. None
259.The technique of temporarily delaying outgoing acknowledgements, so
that they can hooked onto the next outgoing data frame is _ _ _ _ _ _ _ _
_ _ [18M01]
a. Back tracking
b. Back passing
c. Piggy backing
d. Forwarding
260.Whenever a new packet arrives from the network layer, it is given the
next _ _ _ _ _ _ _ Sequence number [18M02]
a. Highest
b. Lowest
c. Latest
d. Best
30
261.In selective repeat process a _ _ _ _ _ _ _ _ _ is fed back to the sender
and repeats the transfer of data [18M03]
a. Frame
b. Protocol
c. Function
d. Packet
262._ _ _ _ _ _ _ _ _ _ Protocol accepts Frames out of order, but passes
packets to the network layer in order [18S01]
a. Selective repeat
b. Go back n
c. Stop and wait
d. 1 - bit sliding window
263._ _ _ _ _ _ _ _ _ _ Calls the retransmission of specified frame [18S02]
a. - ACK
b. + ACK
c. Type 3
d. Type 1
264._ _ _ _ _ _ _ _ _ is bi - directional and is more robust protocol [18S03]
a. Sliding window
b. Stop and wait
c. PAR
d. utopia
265.Receiving window corresponds to the set of frames permitted to _ _ _ _
_ _ _ _ _ [18S04]
a. Reject
b. Delete
c. Complete
d. accept
266.A situation in which the protocol can make no more forward progress is
_ _ _ _ _ _ _ _ _ [18S05]
a. Lock
b. Dead lock
c. Dead
d. Alive
267.In a finite state machine model quadruple (S, M, I, T) M is set of _ _ _ _
_ _ _ _ _ _ [18S06]
a. States
b. Initial states
c. Frames
d. Transitions
268.In example scenario with MAX - SEQ = 7 a piggy backed
acknowledgment for frame 7 eventually comes back to the _ _ _ _ _ _ _ _
_ [18S07]
a. Sender
b. Receiver
c. Medium
d. Cable
269._ _ _ _ _ _ protocols are widely used in the internet [19D01]
a. IP
31
b. TCP
c. PPP & SLIP
d. pop
270.PPP handles _ _ _ _ _ _ _ _ _ [19D02]
a. Error detection
b. Error creation
c. Application
d. Automation
271.PPP provides a protocol for bringing lines up, testing them, negotiating
options, and bringing them down again gracefully when they are no
longer needed. This protocol is known as [19D03]
a. LCP
b. NCP
c. TCP
d. VCP
272.Expand SLIP. [19G01]
a. PPP
b. SLIP
c. TCP/IP
d. None
274._ _ _ _ _ _ _ _ _ PPP field tell what kind of packet is in the payload field
[19G03]
a. Protocol
b. Check sum
c. Control
d. None
275._ _ _ _ _ _ _ _ Field is used for sequence no, acknowledgements
[19G04]
a. Address
b. Data
c. Control
d. None
276._ _ _ _ _ _ _ _ _ is used when a computer is polling a group of terminals
[19G05]
a. Type bit
b. Poll / select bit
c. Poll / final bit
d. None
277._ _ _ _ _ _ is used to force the other machine to sent a supervisory
frame immediately [19G06]
a. P/F bit
b. P/S bit
c. Ack bit
d. None
32
278._ _ _ _ _ _ _ _ is used to indicate that there is a transmission error
[19M01]
a. Type 1
b. Type 2
c. Type 3
d. Type 4
279._ _ _ _ _ _ type value tells the sender to stop sending [19M02]
a. Type 1
b. Type 2
c. Type 3
d. Type 4
280._ _ _ _ _ _ _ _ _ frame is used for control purpose and also carry the
data when service is unreliable connection less service [19M03]
a. Supervisory
b. Unnumbered
c. Information
d. Numbered
281.The various kinds of supervisory frames are distinguished by _ _ _ _ _ _
field [19S01]
a. Check sum
b. Control field
c. next
d. Type
282.What is present in all HDLC control fields? [20D01]
a. P/F bit
b. N(R)
c. N (S)
d. Code bits
283.The shortest frame in HDLC protocol is usually the _ _ _ _ _ _ _ _ _ _ _ _
frame. [20D02]
a. information
b. supervisory
c. management
d. unmanaged frame
284.HDLC is a _ _ _ _ _ _ _ _ _ _ protocol. [20M01]
a. character - oriented
b. bit - oriented
c. byte - oriented
d. count - oriented
285.BSC is a _ _ _ _ _ _ _ _ _ _ protocol. [20M02]
a. character - oriented
b. bit - oriented
c. byte - oriented
d. count - oriented
286.The HDLC _ _ _ _ _ _ _ _ _ field defines the beginning and end of a
frame. [20M03]
a. flag
b. address
c. control
33
d. FCS
287.BSC stands for _ _ _ _ _ _ _ _ _ _ _ [20S01]
a. primary
b. secondary
c. tertiary
d. a station
34