91% found this document useful (11 votes)
14K views34 pages

Computer Networks Online Bits

The document contains 56 multiple choice questions related to computer networking concepts like the OSI model layers, TCP/IP model layers, network topologies, and protocols. The questions cover topics such as which layer is responsible for multiplexing, the number of layers in the OSI and TCP/IP models, examples of different network topologies and their characteristics, protocols used for different purposes like email and web, and comparisons of TCP/IP and Novell Netware protocols.

Uploaded by

06121a0401
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
91% found this document useful (11 votes)
14K views34 pages

Computer Networks Online Bits

The document contains 56 multiple choice questions related to computer networking concepts like the OSI model layers, TCP/IP model layers, network topologies, and protocols. The questions cover topics such as which layer is responsible for multiplexing, the number of layers in the OSI and TCP/IP models, examples of different network topologies and their characteristics, protocols used for different purposes like email and web, and comparisons of TCP/IP and Novell Netware protocols.

Uploaded by

06121a0401
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

JNTU ONLINE EXAMINATIONS [Mid 1 - cn]

1. A file is being transferred. The time required actually is 6- hours. The


mean time between crashes is 2- hours. The time required for the
transfer is _ _ _ _ _ _ _ _ hours if synchronization is not provided.
[01D01]

a. 12 hours
b. 3 hours
c. Zero hours
d. Infinite
2. The information related to multi-programmed hosts is placed in the
header of _ _ _ _ _ _ _ Layer [01D02]

a. Application layer
b. Transport Layer
c. Session layer
d. Network Layer.
3. The _ _ _ _ _ _ _ _ _ _ Layer is a true end to end layer , from source to
destination. [01G01]

a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
4. The operation of subnet is controlled by _ _ _ _ _ _ _ _ [01G02]

a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
5. Accounting Functions are the responsibility of _ _ _ _ _ _ _ _ _ _ Layer
[01M01]

a. Network Layer.
b. Data Link Layer
c. Data Layer
d. Transport Layer
6. Which one of the following is correct?? [01M02]

a. Character - represented by One's Complement


b. Character - represented by Two's Complement
c. Integer - represented by ASCII
d. Character - represented by Unicode
7. Multiplexing and Demultiplexing of Network connections is by _ _ _ _ _ _
Layer [01M03]

a. Network Layer.
b. Data Layer
c. Data Link Layer
d. Transport Layer
8. Two sides cannot attempt the same operation at the same time. This
property is accomplished by _ _ _ _ _ _ _ _ _ _ Layer [01M04]

a. Session Layer
b. Transport Layer
c. Physical Layer

1
d. Network Layer
9. The number of layers in the OSI model is _ _ _ _ _ _ _ _ [01S01]

a. 5
b. 4
c. 7
d. 8
10._ _ _ _ _ _ _ Layer contains network virtual terminal [01S02]

a. Application layer
b. Session layer
c. Presentation layer
d. Data Link Layer
[Link] Layer is concerned with _ _ _ _ _ _ _ _ _ _ [01S03]

a. Synchronization
b. Flow Control
c. Syntax and Semantics
d. File Transfer.
[Link] boundaries are recognized and created by _ _ _ _ _ _ _ _ _ Layer.
[01S04]

a. Application layer
b. Data Link Layer
c. Session layer
d. Network Layer.
[Link] Management is the function of _ _ _ _ _ _ _ _ _ _ _ _ Layer.
[01S05]

a. Application layer
b. Data Link Layer
c. Session layer
d. Network Layer.
[Link] function of Physical Layer is _ _ _ _ _ _ _ _ _ _ _ [01S06]

a. Error correction and Detection


b. Piggybacking
c. Flow Control
d. Determine number of volts to represent 1 or 0.
[Link] and privacy are less of an issue for devices in a _ _ _ _ _ _ _ _
topology [02D01]

a. bus
b. mesh
c. star
d. tree
16.A network that contains multiple hubs is most likely configured in a _ _ _
_ _ _ _ topology [02D02]

a. bus
b. mesh
c. star
d. tree
[Link] a network with 25 computers, which topology would require the most
extensive cabling. [02D03]

a. bus
b. mesh

2
c. star
d. tree
18.A television broadcast is an example of _ _ _ _ _ _ _ _ _ _ transmission
[02M01]

a. Simplex
b. half-duplex
c. full-duplex
d. automatic
[Link] topology features a point-to-point line configuration? [02M02]

a. mesh
b. star
c. bus
d. ring
[Link] a mesh topology, the relationship between one device and another is _
_ _ _ _ _ _ _ _ [02M03]

a. primary-to-peer
b. peer-to-primary
c. primary-to-secondary
d. peer-to-peer
21.A cable break in a _ _ _ _ _ _ _ _ _ topology stops all transmission
[02M04]

a. bus
b. mesh
c. star
d. primary
[Link] topology requires a central controller or hub? [02S01]

a. mesh
b. star
c. bus
d. ring
[Link] topology requires a multipoint connection? [02S02]

a. mesh
b. star
c. bus
d. ring
[Link] between a computer and a keyboard involves _ _ _ _ _ _
_ _ _ transmission [02S03]

a. Simplex
b. half-duplex
c. full-duplex
d. automatic
25.A tree topology is a variation of a _ _ _ _ _ _ _ _ _ topology. [02S04]

a. mesh
b. star
c. bus
d. ring
[Link] a _ _ _ _ _ _ _ _ _ _ _ _ topology, if there are n devices in anetwork,
each device has n-1 port for cables [02S05]

a. mesh

3
b. star
c. bus
d. ring
27.A _ _ _ _ _ _ _ _ _ _ _ connection provides a dedicated link between two
devices. [02S06]

a. point - to - point
b. multipoint
c. primary
d. Secondary
[Link] a _ _ _ _ _ _ _ _ _ _ connection, more than two devices can share a
single link. [02S07]

a. point - to - point
b. multipoint
c. primary
d. Secondary
[Link] _ _ _ _ _ _ _ _ _ _ _ transmission, the channel capacity is shared by
both communicating devices at all times. [02S08]

a. Simplex
b. half-duplex
c. full-duplex
d. automatic
[Link] Protocol is used for electronic mail ? [03D01]

a. TELNET
b. NNTP
c. HTTP
d. SMTP
[Link] TCP/IP model has connection less communication in _ _ _ _ _ _ _ _ _
_ Layer [03D02]

a. Transport Layer
b. Internet layer
c. Presentation Layer
d. Application Layer
[Link] functions of internet Layer in TCP/IP are [03M01]

a. Flow Control and Error Control


b. Congestion Control and Flow Control
c. Packet Routing and Flow Control
d. Congestion Control and Packet Routing
[Link] protocols used in Host to network layer of TCP/IP model are
[03M02]

a. TEL NET and LAN


b. ARPA NET and SAT NET
c. PACKET RADIO and IP
d. LAN and IP
[Link] is acronym of [03M03]

a. Hyper Text Transfer Protocol


b. Hyper Test Transfer Protocol
c. Hyper Text Transport Protocol
d. Hyper Text Transport Program
[Link] number of layers in TCP/IP model is _ _ _ _ _ _ _ _ _ [03S01]

4
a. 5
b. 4
c. 6
d. 7
[Link] Layer in TCP/IP is _ _ _ _ _ _ _ _ _ _ [03S02]

a. Connection Oriented
b. Can be Connection Oriented and connection less
c. Connection less
d. Client Server type request
[Link] protocol defined by internet layer in TCP/IP is _ _ _ _ _ _ _ _
[03S03]

a. TCP Protocol
b. UDP Protocol
c. SMTP
d. IP P rotocol
[Link] protocols defined in Transport Layer of TCP/IP are _ _ _ _ _ _ _ _ _
_ _ [03S04]

a. TCP and IP
b. TCP and UDP
c. UDP and IP
d. TCP only
[Link] of the following is/are a connection oriented protocol(s)?? _ _ _ _
_ _ _ _ _ _ [03S05]

a. TCP
b. UDP
c. TCP and UDP
d. Neither TCP nor UDP
[Link] has the following properties [03S06]

a. Connection oriented and reliable


b. Connection Less and reliable
c. Connection less and Unreliable
d. Connection Oriented and Unreliable
[Link] of the following is the Layers of TCP/IP model?? [03S07]

a. Physical, Network, Transport, Application


b. Host to Network, Network, Presentation, Application
c. Host to Network, Internet, Transport, Application
d. Physical, Internet, Session, Application
[Link] Layer contains High-level protocols in TCP/IP model?? [03S08]

a. Application
b. Presentation
c. Transport
d. Internet
[Link] IP in TCP/IP uses _ _ _ _ _ _ _ _ bit addresses but IPX in Novell
Netware uses _ _ _ _ _ _ _ bit addresses [04D01]

a. 4, 12
b. 12, 4
c. 8, 16
d. 16, 8
[Link] the earlier ARPA NET each node of network consisted [04D02]

5
a. TIP & a host
b. BBN & a host
c. IMP & a host
d. SAP & a host
[Link] Netware is based on _ _ _ _ _ _ _ _ _ _ _ [04M01]

a. XNS
b. OSI
c. TCP/IP
d. TIP
[Link] protocols used in Transport layer of Novell Netware _ _ _ _ _ _ _ _ _
[04M02]

a. NCP & SAP


b. NCP & IPX
c. NCP & SPX
d. NCP & TIP
[Link] in Novell Netware is functionally similar to _ _ _ _ _ _ _ _ _ _
Protocol [04M03]

a. TCP
b. IP
c. UDP
d. SAP
[Link] address in Novell Netware contains [04M04]

a. 32- bit Network Number, 48-bit Machine Number & 16-bit Local
address
b. 16- bit Network Number, 32-bit Machine Number & 48-bit Local address
c. 48- bit Network Number, 16-bit Machine Number & 32-bit Local address
d. 16- bit Network Number, 48-bit Machine Number & 32-bit Local address
[Link] physical layer of Novell Netware consists of _ _ _ _ _ _ _ _ _ _ _
protocol [04S01]

a. IPX
b. NCP
c. SAP
d. ARC NET
[Link] connection oriented transport protocol in Novell Netware is _ _ _ _ _
_ _ _ _ _ [04S02]

a. NCP
b. IPX
c. SAP
d. Ethernet
[Link] is used in _ _ _ _ _ _ _ _ _ _ layer of Novell Netware [04S03]

a. Application
b. Transport
c. Network
d. Physical
[Link] SAP in Novell Netware [04S04]

a. Service access point


b. Special Access Point
c. Service access protocol
d. Service Advertising Protocol
[Link] in ARPANET are called [04S05]

6
a. ARPA Computers
b. IMP
c. BBN
d. DARPA Computers
[Link] TIP in ARPA NET [04S06]

a. Touch Interest protocol


b. Terminal Interface protocol
c. Transport International Protocol
d. Terminal Interface protocol
55._ _ _ _ _ _ _ _ _ _ was created to organize machines into Domains and
map hostnames into IP addresses. [04S07]

a. BBN
b. IMP
c. TIP
d. DNS
[Link] is based on _ _ _ _ _ _ _ _ _ protocol stack. [04S08]

a. XNS
b. IMP
c. TCP/IP
d. SAP
[Link] topology not used in LAN is _ _ _ _ _ _ _ _ _ [05D01]

a. Ring
b. Star
c. Bus
d. Mesh
[Link] packets are small and all are equal sized then they are called _ _ _
_ _ _ _ _ _ [05D02]

a. Frames
b. Small Packets
c. Cells
d. Atoms
[Link] topologies are used in _ _ _ _ _ _ _ _ _ _ [05D03]

a. LAN
b. WAN
c. MAN
d. Broadcast Networks
[Link] LANs run at the speed of [05M01]

a. 100 to 1000 MBPS


b. 1000 to 10000 MBPS
c. 10 to 100 MBPS
d. 10 to 100 GBPS
[Link] of the following is not a characteristic of LAN [05M02]

a. Size
b. Transmission Technology
c. Topology
d. Routers
[Link] static allocation of channel in LAN Broadcast Networks _ _ _ _ _ _ _ _
_ _ algorithm is used [05M03]

a. FCFS

7
b. Round Robin
c. Shortest Frame first
d. High priority first
[Link] _ _ _ _ _ _ _ _ _ Network, there is a broadcast medium to which all
computers are attached [05M04]

a. MAN
b. LAN
c. WAN
d. Broadcast Networks
[Link] owned networks are _ _ _ _ _ _ _ _ [05S01]

a. MAN
b. LAN
c. WAN
d. Broadcast Networks
[Link]-case time is bounded in _ _ _ _ _ _ _ _ _ _ [05S02]

a. LAN
b. MAN
c. WAN
d. Broadcast Networks
66._ _ _ _ _ _ Broadcast Networks can be divided into Static and dynamic
depending on channel allocation [05S03]

a. MAN
b. LAN
c. Broadcast Networks
d. WAN
[Link] Cable TV Network is an example for _ _ _ _ _ _ _ _ _ _ [05S04]

a. WAN
b. Broadcast
c. LAN
d. MAN
[Link] IEEE standard for DQDB is _ _ _ _ _ _ _ [05S05]

a. 802.3
b. 802.4
c. 802.6
d. 802.5
[Link] in WAN are connected by _ _ _ _ _ _ _ _ _ _ _ _ [05S06]

a. Communication Line
b. Subnet
c. Router
d. Another host Computer
[Link] one is not a transmission line? [05S07]

a. Circuits
b. Channels
c. Trunks
d. Paths
[Link] or ground radio is an example for _ _ _ _ _ _ _ [05S08]

a. WAN
b. MAN
c. LAN

8
d. Broadcast Networks
[Link] face a inhibition on [06D01]

a. sunny day
b. dry day
c. windy day
d. rainy day
73._ _ _ _ _ _ _ _ transmission has more suitable for indoor wireless LANs
[06D02]

a. radio
b. micro wave
c. infra red
d. light wave
74._ _ _ _ _ _ _ _ _ category twisted pairs are called as unshielded twisted
pair [06D03]

a. Category 1
b. Category 3
c. Category 5
d. Category 3 & Category 5
[Link] of the following is not considered an important use of microwaves
[06D04]

a. Industrial bands
b. scientific bands
c. medical bands
d. entertainment bands
[Link] number of oscillations per second of anelectromagnetic wave is
called its _ _ _ _ _ _ _ and is measured in _ _ _ _ _ _ _ _ [06M01]

a. wave length ,mts


b. frequency,Hz
c. amplitude, mts
d. time period, secs
[Link] mode of transmission most suitable is _ _ _ _ _ _ _ [06M02]

a. twisted pair
b. fibre optics
c. wireless
d. coax
78.A modern application to connect the LANs in two buildings is through _ _
_ _ _ _ _ _ transmission [06M03]

a. radio
b. micro wave
c. infra red
d. light wave
[Link] is advantage of twists for a wire _ _ _ _ _ _ _ [06M04]

a. Data lose
b. Noise reduction
c. No noise
d. Added noise
[Link] fiber optics a pulse of light indicates _ _ _ _ _ _ [06S01]

a. 1 bit
b. 0 bit

9
c. 1 byte
d. 8 bits
81._ _ _ _ _ _ kind of coaxial cable is used for analog transmission [06S02]

a. Base band
b. Broad band
c. Category 3
d. Fiber
[Link] we go from long-wave radio towards visible light, the waves behave
more and more like _ _ _ _ _ _ and less and less like _ _ _ _ _ _ _ _
[06S03]

a. radio, light
b. light., radio
c. radio , micro wave
d. micro wave, light
[Link] fading _ _ _ _ _ _ _ _ the signal [06S04]

a. enhances
b. adds to
c. cancels
d. maximizes
[Link] micro wave transmission concentrating all the energy into a small
beam using a parabolic antenna gives a _ _ _ _ _ _ _ _ signal to noise
ratio [06S05]

a. lower
b. higher
c. degraded
d. subtle
[Link] waves are _ _ _ _ _ _ _ _ _ [06S06]

a. uni directional
b. bi directional
c. multidirectional
d. omnidirectional
[Link] fundamental relation between frequency (f), wave length (l) and
speed(c) [06S07]

a. f*c=l
b. f/l=c
c. l*c=f
d. f*l=c
[Link] of light is [06S08]

a. 3*10 8 m/s
b. 3*10 8 cm/sec
c. 3*10 9 m/s
d. 3*10 cm/sec
9

[Link] transparent Bridges, all the decisions are made by looking into _ _ _ _
_ _ _ _ _ [07D01]

a. Advertisement Tables
b. Description Tables
c. Hash Tables
d. Fragment Tables

10
[Link] destination LAN is unknown in Transparent Bridges then we use _ _ _ _
_ _ _ _ _ _ [07D02]

a. Link State Routing


b. Flooding
c. Shortest Path Routing
d. Flow Based Routing
[Link] among the below of source routing bridges is complex? [07D03]

a. Hardware
b. Software
c. Hybrid
d. Remote
[Link] of _ _ _ _ _ _ _ _ _ _ _ _ is manual [07D04]

a. Transparent
b. Spanning Tree
c. Remote
d. Source Routing
[Link] LAN with token ring topology, _ _ _ _ _ _ _ _ _ _ _ are used [07D05]

a. Transparent
b. Spanning Tree
c. Remote
d. Source Routing
93.A configuration of N LANs is linearly connected by 4 bridges. By the time
we reach the Nth LAN how many discovery frames will be circulating?
[07D06]

a. N4

b. 4
c. 4N

d. N
[Link] of the following is not an internetworking device? [07M01]

a. Bridge
b. Repeater
c. Router
d. Cable
[Link] type of bridge must have its address table entered manually?
[07M02]

a. Simple
b. Transparent
c. Multi port
d. Source routing
96.A bridge has access to the _ _ _ _ _ _ _ _ _ _ _ address of a station on
the same network. [07M03]

a. Physical
b. Network
c. Service access point
d. Logical
[Link] source routing bridges _ _ _ _ _ _ _ _ _ frame is used to discover the
destination [07M04]

11
a. Discovery
b. Control
c. Data
d. Acknowledgement
[Link]'s can be connected by a device called _ _ _ _ _ _ _ _ _ _ [07M05]

a. Routers
b. Modems
c. Ethernet card
d. Bridges
[Link] _ _ _ _ _ _ _ _ all frames are given to the computer, not to those
addressed [07M06]

a. Promiscuous mode
b. Miscues mode
c. Normal mode
d. Special Mode
100._ _ _ _ _ _ Algorithm is used in transparent bridges [07S01]

a. Forward Learning
b. Backward Learning
c. Reverse Backward Learning
d. Reverse Forward Learning
[Link] transparent bridges the failures are handled by _ _ _ _ _ _ [07S02]

a. Host
b. Bridge
c. Network layer
d. Router
[Link]/CD and token bus user choose _ _ _ _ _ _ bridge [07S03]

a. Source routing bridge


b. Transparent bridge
c. Remote bridge
d. Selective Bridges
103._ _ _ _ _ _ bridge operates in promiscuous mode [07S04]

a. Transparent bridge
b. Selective flooding
c. Source Routing
d. Remote Bridges
[Link] source routing bridges each LAN has a unique _ _ _ _ _ _ bit no.
[07S05]

a. 10
b. 8
c. 16
d. 12
[Link] routing bridges in the same LANs must have _ _ _ _ _ _ _ _
bridge Number [07S06]

a. Same
b. Different
c. Source
d. Destination
[Link] function in the _ _ _ _ _ _ _ _ _ layer [07S07]

a. Physical

12
b. Data link
c. Network
d. Transport
[Link] function in the _ _ _ _ _ _ _ layer. [07S08]

a. Physical
b. Data link
c. Network
d. Transport
108.A repeater takes a weakened or corrupted signal and _ _ _ _ _ _ _ _ _ _
it [07S09]

a. Amplifies
b. Regenerates
c. Resample
d. Reroute
[Link] PSTN is an example of _ _ _ _ _ _ _ network [08D01]

a. packet-switched
b. circuit-switched
c. message-switched
d. TSI
[Link] _ _ _ _ _ _ _ _, each packet of a message follows the same path from
sender to receiver [08D02]

a. Circuit switching
b. message switching
c. a virtual approach to packet switching
d. The datagram approach to packet switching
[Link] a time division switch, a _ _ _ _ _ _ _ governs the destination of a
packet stored in RAM [08D03]

a. TDM bus
b. cross bar
c. cross point
d. control unit
[Link] many cross points are needed in a single stage switch with 40
inputs and 50 outputs [08M01]

a. 40
b. 50
c. 90
d. 2000
[Link] _ _ _ _ _ _ _ _ _ of A TSI controls the order of delivering of slot
values that are stored in RAM [08M02]

a. cross bar
b. cross point
c. control unit
d. transreceiver
[Link] _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed
because data must be stored and retrieved from RAM. [08M03]

a. Space-division
b. time-division
c. virtual
d. packet
[Link] create a _ _ _ _ _ _ _, combine crossbar switches in stages [08M04]

13
a. Multistage switch
b. cross point
c. packet switch
d. TSI
[Link] _ _ _ _ _ _ _ _ _ each packet of a message need not follow the same
path From sender to receiver [08M05]

a. Circuit switching
b. message switching
c. a virtual approach to packet switching
d. The datagram approach to packet switching
[Link] important property of circuit switching is the need to setup an end-
to-end path _ _ _ _ _ _ _ _ any data can be sent [08S01]

a. after
b. before
c. along with which
d. avoiding which
[Link] elapsed time between the end of dialing and the start of ringing can
be a minimum of _ _ _ _ _ _ _ _ _ [08S02]

a. 1sec
b. 10sec
c. 100sec
d. 1000sec
119.A network using message switching is called _ _ _ _ _ _ [08S03]

a. store-and-forward
b. forward-and-store
c. store-and-send
d. send-and-store
120._ _ _ _ _ _ _ _ Networks place a tight upper limit on block size, allowing
packets to be buffered in router main memory instead of on disk. [08S04]

a. Message switching
b. circuit switching
c. packet switching
d. store-and-forward
[Link] type of switching uses the entire capacity of a dedicated link?
[08S05]

a. Circuit switching
b. datagram packet switching
c. virtual circuit packet switching
d. Message switching
[Link] _ _ _ _ _ _ is a device that connects n inputs to m outputs [08S06]

a. Cross point
b. cross bar
c. modem
d. RAM
[Link] which type of switching do all the datagrams of a message follow the
same channels of a path [08S07]

a. Circuit switching
b. datagram packet switching
c. virtual circuit packet switching
d. message switching

14
[Link] ISDN plane is associated with signaling another D channel
[09D01]

a. user
b. control
c. management
d. supervise
[Link] you store and forward messages in B-ISDN, you are using _ _ _ _
_ _ _ _ services [09D02]

a. Conversational
b. messaging
c. retrieval
d. distributive
[Link] TV is an example of [09D03]

a. messaging services
b. Conversational services
c. distributional services without user control
d. distributional services with user control
[Link] normal user interface to an ISDN is PRI or _ _ _ _ _ _ _ _ _ [09D04]

a. Bit Rate Interface


b. Basic Rate Interface
c. Byte Rate Interface
d. Broad Rate Interface
[Link] reference point U is a specification for connecting the ISDN office
with _ _ _ _ _ _ _ _ _ _ [09M01]

a. NT1
b. NT2
c. TE1
d. TE2
129.A banyan switch parsers the output line number from _ _ _ _ _ _ _ _
[09M02]

a. snake-like
b. left to right
c. right to left
d. top to bottom
[Link] n line, the complexity of a batcher switch grows like _ _ _ _ _ _ _ _ _
[09M03]

a. Log n
b. n2
c. n log n
d. n log 2 n
[Link] ISDN equivalent of DTE is [09M04]

a. TE1
b. TE2
c. NT1
d. TA
[Link] is an acronym for _ _ _ _ _ _ _ _. [09S01]

a. Information Services for Digital Networks


b. Internetwork System for Data Networks
c. Integrated Services Digital Network

15
d. Integrated Signals Digital Network
[Link] of the following channel types is not standardized [09S02]

a. 4 kHz analog telephone channel


b. 64kbps digital PCM channel for voice or data
c. 16 kbps digital channel
d. 16 kbps analog channel
[Link] that performs functions related to the OSI model's layers 1, 2
& 3 is called _ _ _ _ _ _ _ _. [09S03]

a. NT1
b. NT2
c. NT3
d. NT4
[Link] key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual
pipe between the customer and the carrier through which bits flow
[09S04]

a. digital byte pipe


b. analog bit pipe
c. digital pipe
d. digital bit pipe
[Link] digital bit pipe can support multiple independent channels by _ _ _
_ _ _ _ _ _ of the bit stream. [09S05]

a. time division multiplexing


b. space division multiplexing
c. frequency division multiplexing
d. amplitude division multiplexing
[Link] is PBX [09S06]

a. Public Branch eXchange


b. Public Band exchange
c. Private Branch eXchange
d. Public Band eXchange
138.A _ _ _ _ _ _ _ _ _ provides a connection or a set of connection between
switches. [10D01]

a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection
139.A _ _ _ _ _ _ _ _ _ _ is the physical connection between an end point
and a switch or between two switches. [10D02]

a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection
[Link] VPI of a UNI is _ _ _ _ _ _ _ _ _ _ _ _ bits in length [10D03]

a. 8
b. 12
c. 16
d. 24
[Link] VPI of a NNI is _ _ _ _ _ _ _ _ _ bits in length [10D04]

a. 8

16
b. 12
c. 16
d. 24
[Link] a VP switch the _ _ _ _ _ _ _ _ does not change while the _ _ _ _ _ _
_ _ can change . [10D05]

a. VPI, VCI
b. VCI, VPI
c. VP, VPC
d. VPC, VP
[Link] a _ _ _ _ _ _ _ switch, both the VPI and VCI can changes [10D06]

a. VP
b. VPC
c. VPI
d. VCI
[Link] the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header and 2
bytes of trailer are added to a 45- byte payload. [10M01]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
[Link] the SAR sublayer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and
there is no added header or trailer. [10M02]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
146.A _ _ _ _ _ _ _ _ _ field on a UNI cell header is used for connection
purposes. [10M03]

a. VPI ( Virtual path identifier)


b. VCI (Virtual circuit identifier )
c. CLP(Cell loss priority)
d. GFC(generic flow constant)
147.A _ _ _ _ _ _ _ _ _ _ _ field on a cell header in the ATM layer determines
whether a cell can be dropped. [10M04]

a. VPI ( Virtual path identifier)


b. VCI (Virtual circuit identifier )
c. CLP(Cell loss priority)
d. GFC(generic flow constant)
[Link] multiplexes cells using _ _ _ _ _ _ _ _ _ _ [10M05]

a. Asynchronous FDM
b. Synchronous FDM
c. Asynchronous TDM
d. Synchronous TDM
[Link] an ATM network, all cells belonging to a single message follow the
same _ _ _ _ _ _ _ and remain in their original order until they reach
their destination. [10M06]

a. Transmission path
b. Virtual path
c. Virtual circuit
d. Virtual connection

17
[Link] ATM _ _ _ _ _ _ _ _ _ _ _ _ _ _ sub layer is concerned with getting
the bits on and off the wire [10S01]

a. Physical Layer
b. ATM Layer
c. AAL1
d. AAL2
[Link] data communications, ATM is an acronym for [10S02]

a. Automated Transfer Mode


b. Automatic Transfer Modulation
c. Automatic Transport Mode
d. Asynchronous Transfer Mode
[Link] ATM _ _ _ _ _ _ _ _ _ _ , which means that cells follow the
same path, the cells do not usually arrive out of order. [10S03]

a. is asynchronous
b. is multiplexed
c. is a network
d. uses virtual circuit routing
[Link] layer in ATM protocol reformats the data received from other
networks? [10S04]

a. Physical
b. ATM
c. Application adaptation
d. Data adaptation
[Link] layer in ATM protocol has a 53-byte cell as an end product
[10S05]

a. Physical
b. ATM
c. Application adaptation
d. Data adaptation
[Link] AAL type can best process a data stream having a nonconstant bit
rate? [10S06]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
[Link] AAL type is designed to support a data stream that has a constant
bit rate? [10S07]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
[Link] AAL type is designed to support conventional packet switching
that uses the virtual circuit approach? [10S08]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
[Link] AAL type is designed to support SEAL ? [10S09]

a. AAL1

18
b. AAL2
c. AAL3/4
d. AAL5
[Link] end product of the SAR is a data packet that is _ _ _ _ _ _ _ _ _ _
[10S10]

a. Variable in length
b. 48 bytes long
c. 44 to 48 bytes long
d. greater than 48 bytes long
[Link] the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header is added to
47 bytes of data. [10S11]

a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
[Link] ALOHA, the throughput is a maximized by dividing time into _ _ _ _ _
_ _ _ intervals. [11D01]

a. Variable
b. Unique
c. Discrete
d. Continuous
[Link] adaptive tree walk protocol, each node at level I has a fraction _ _ _
_ _ _ _ of the station below it [11D02]

a. 2I
b. I2
c. 2 - I
d. I - 2
[Link] _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1
whenever it finds the channel idle [11M01]

a. 1 - persistent CSMA
b. p - persistent CSMA
c. non - persistent CSMA
d. ALOHA.
[Link] channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _ _
[11M02]

a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)
d. N/(d+log2d)
[Link] channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _
[11M03]

a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)
d. N/(d+log2d)
[Link] channel efficiency of binary-countdown protocol is _ _ _ _ _ _
[11M04]

a. d/(N+d)
b. d/(d+1)
c. d/(d+log2N)

19
d. N/(d+log2d)
167._ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub layer
[11S01]

a. CSMA
b. TCP
c. CSMA/CD
d. GSM
[Link] first collision free protocol is _ _ _ _ _ _ _ _ _ _ [11S02]

a. Binary countdown
b. Basic bitmap
c. Reservation protocol
d. SAP
[Link] binary count down protocol each station address bits are _ _ _ _ _ _ _
[11S03]

a. ANDed
b. Ex - Ored
c. Ored
d. NORed
[Link] users share a common channel is called _ _ _ _ _ _ _ _ _
[11S04]

a. LAN
b. WAN
c. Contention
d. CSMA/CD
171._ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting.
[11S05]

a. Static channel allocation


b. Dynamic channel allocation
c. ALOHA
d. CSMA
[Link] mean delay of static channel allocation in LANS and MANS using
FDM is _ _ _ _ _ _ _ [11S06]

a. T=1/
b. T=1/µc
c. T = 1/(µc- )
d. T=1/µ
[Link] maximum through put of pure ALOHA system is _ _ _ _ _ _ _
[11S07]

a. 18.4 %
b. 36.8 %
c. 17.4 %
d. 34.8 %
[Link] maximum through put of slotted ALOHA is _ _ _ _ _ _ _ _ _ [11S08]

a. 18.4 %
b. 36.8 %
c. 17.4 %
d. 34.8 %
[Link] Detection is a/an _ _ _ _ _ _ _ _ _ _ process [12D01]
a. Digital

20
b. Analog
c. Discrete
d. Continuous
[Link] CSMA/CD the time taken for a station to be sure that it has seized the
channel in worst case is _ _ _ _ _ _ _ _
where t = time for signal to propagate between 2 stations [12D02]

a. 2t - e
b. 2 + t
c. 2t
d. 2e - t
[Link] problem of a station not being able to detect a potential competitor
for the medium because competitor is far away is called _ _ _ _ _ _ _ _ _
_ [12M01]

a. Exposed Station Problem


b. Collision Avoidance Problem
c. Hidden Station Problem
d. Access Grant Problem
[Link] problem of a station not being able to detect a potential competitor
for the medium because it thinks that there is activity between them is
called _ _ _ _ _ _ _ _ _ _ _ [12M02]

a. Exposed Station Problem


b. Collision Avoidance Problem
c. Hidden Station Problem
d. Access Grant Problem
[Link] in which stations listen for a carrier and act accordingly are _
_ _ _ _ _ _ _ [12S01]

a. ALOHA
b. Multiple access
c. Station Model
d. CSMA
[Link] Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _ [12S02]

a. ALOHA
b. Slotted ALOHA
c. 1-persistent CSMA
d. non-persistent CSMA
[Link] Slots are not found in _ _ _ _ _ _ _ _ _ [12S03]

a. non-persistent CSMA
b. CSMA/CD
c. Bitmap
d. Binary Countdown
182.A problem with Bitmap protocols is an overhead of _ _ _ _ _ _ _ _ bit(s)
per station [12S04]

a. 0
b. 1
c. 2
d. 3
[Link] adaptive tree walk protocol we use _ _ _ _ _ _ and _ _ _ _ _ _ _ _ _
searching [12S05]

a. Graph and Breadth First


b. Tree and Breadth First

21
c. Graph and Depth First
d. Tree and Depth First
[Link] early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _ [12S06]

a. MACA
b. ALOHA
c. CSMA/CD
d. Collision Free
185.A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet [13D01]

a. 10Base 5
b. 10Base 2
c. 10Base - T
d. 10Base - F
186.A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet [13D02]

a. 10Base 5
b. 10Base 2
c. 10Base - T
d. 10Base - F
[Link] protocol used in ETHERNET is [13D03]

a. ALOHA
b. Binary Count down
c. CSMA/CD
d. Multiple Access Protocol
188.10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet. [13M01]

a. Thick
b. Thin
c. Twisted pair
d. Fiber optics
[Link] token ring, the length of the token is _ _ _ _ _ _ _ _ [13M02]

a. 4 bytes
b. 3 bytes
c. 1 bytes
d. 2 bytes
[Link] protocol in which, after I collisions, a random number between 0
and 2i - 1 number of slots is skipped is called _ _ _ _ _ _ _ _ [13M03]

a. Exponential
b. Binary countdown
c. Backoff
d. Binary exponential backoff
[Link] switched 802.3 LANS, each card forms its own _ _ _ _ _ _ _
independents of the others [13M04]

a. Domain
b. Area
c. Collision Area
d. Collision domain
192.10 base 2 cabling is called _ _ _ _ _ _ _ _ Ethernet. [13S01]

a. Thick
b. Thin
c. Twisted pair
d. Fiber optics

22
193.802.3 base band systems use _ _ _ _ _ _ _ _ encoding. [13S02]

a. Manchester
b. RZ
c. NRZ
d. RZ or NRZ
[Link] 802.3, each frame starts with a _ _ _ _ _ _ _ _ of 7 bytes [13S03]

a. SD
b. Preamble
c. ED
d. pad
[Link] 802.3, the high order bit of the destination address is a '0' for _ _ _ _
_ _ _ addresses [13S04]

a. Ordinary
b. Group
c. Broadcast
d. Unicast
[Link] 802.3, the address consisting of all 1 bits is reserved for _ _ _ _ _ _ _
_ [13S05]

a. Unicast
b. Multicast
c. Broadcast
d. Ordinary
[Link] _ _ _ _ _ _ _ _ standard describes the upper part of the data link
layer. [13S06]

a. IEEE 802.2
b. IEEE 802.3
c. IEEE 802.4
d. IEEE 802.5
[Link] _ _ _ _ _ _ _ _ standard describes the CSMA/CD protocol [13S07]

a. IEEE 802.2
b. IEEE 802.3
c. IEEE 802.4
d. IEEE 802.5
[Link] IEEE 802 standard does not provide for a collision-free protocol?
[14D01]

a. 802.2
b. Bit map
c. 802.4
d. 802.5
[Link] token bus, how does a station transmit data to the destination node?
[14D02]

a. By seizing token
b. By generating token
c. By releasing token
d. By releasing frame
[Link] token ring, which sub station gets the token first? [14D03]

a. Priority 0 station
b. Priority 2 station
c. Priority 4 station

23
d. Priority 6 station
202._ _ _ _ _ _ _ _ _ _ _ IEEE standard describe the token ring [14M01]

a. 802.2
b. 892.3
c. 802.4
d. 802.5
[Link] IEEE 802 standard provides for a collision-free protocol? [14M02]

a. 802.2
b. 892.3
c. 802.1
d. 802.5
[Link] is an acronym for _ _ _ _ _ _ _ _ _ [14M03]

a. Fast data delivery interface


b. Fiber distributed data interface
c. Fiber distributed digital interface
d. fast distributed data interface
[Link] Token Ring, Which of the following is not a transceiver function ?
[14S01]

a. Transmission and receipt of data


b. Checking of line voltages
c. Addition and subtraction of header
d. Collision
[Link] token Ring , when a frame reaches its destination station, which of
the following occurs? [14S02]

a. the message is copied


b. four bits in the packet are not changed
c. the message is take off the ring and replaced by the token
d. the message is removed from the buffer
[Link] token ring , Where is the token when a data frame is in circulation?
[14S03]

a. at the receiving station


b. at the sending station
c. at the intermediate node
d. circulating in the ring
[Link] is not happen at a Token Ring station? [14S04]

a. examination of the destination address


b. regeneration of the token
c. passing of the frame to the next station
d. correcting error
209._ _ _ _ _ _ _ _ _ _ IEEE standard describe the token bus [14S05]

a. 802.2
b. 892.3
c. 802.4
d. 802.5
[Link] DLL at receiving end _ _ _ _ _ _ _ _ the DLE before data are given to
network layer [15D01]

a. Adds
b. Putts
c. Gets

24
d. Removes
[Link] DLL service is to provide data from network layer on the source
machine to _ _ _ _ _ _ _ _ machine [15D02]

a. Destination
b. Object
c. Source
d. Server
[Link] the sender's data link layer encounter five consecutive ones
in the data, it automatically stuffs a 0 bit into the out going bit stream is
called _ _ _ _ _ _ _ _ [15D03]

a. Character stuffing
b. Character count
c. Bit stuffing
d. Coding violation
[Link] a flag byte is given as 0111 1110, and when bit stuffing is applied
than the outgoing bit stream will look like _ _ _ _ _ _ _ _ [15D04]

a. 101111110
b. 001111110
c. 011111010
d. 011111101
[Link] _ _ _ _ _ _ _ process sender's DLL insert DLE before each accidental
DLE character in data [15G01]

a. Character stuffing
b. Bit stuffing
c. Symbol stuffing
d. None
[Link] acknowledged connectionless service is useful over unreliable
channels such as _ _ _ _ _ _ _ _ systems [15M01]

a. Wireless
b. Wired
c. Double wired
d. Synthetic
[Link] connection - oriented service is used, transfers have distinct
phases [15M02]

a. One
b. Two
c. Three
d. Four
[Link] approach for DLL to break the bit stream up into discrete parts is _
_ _ _ _ _ _ _ [15M03]

a. Naming
b. Claiming
c. Charging
d. Framing
[Link] link layer provides service to _ _ _ _ _ _ _ _ _ _ layer [15S01]

a. Transport
b. Application
c. Session
d. Network

25
[Link] connection less service is adopted when _ _ _ _ _ _
[15S02]

a. Error rate is very low


b. Error rate is very high
c. Long length is required
d. short length is required
[Link] frame begins and ends with a special bit pattern called _ _ _ _ _ _
_ _ [15S03]

a. Char stuffing
b. Flag
c. Bit stuffing
d. Char count
[Link] data link layer must use the service provided to it by the _ _ _ _ _ _
_ _ layer [15S04]

a. Data link
b. Physical
c. Transport
d. Session
[Link] the data link layer, each frame begins and ends with a special bit
pattern _ _ _ _ _ _ _ _, called a flag byte [15S05]

a. 01110110
b. 01111110
c. 01011010
d. 10101010
[Link] the receiver sees five consecutive incoming '1' bits followed by a
'0' bit it automatically destuffs _ _ _ _ _ _ _ _ _ in bit stuffing. [15S06]

a. '1' bit
b. '0' bit
c. '01' bit
d. '10' bit
224.A path which connects DLL and Network layer on source to DLL and
Network layer on the destination is _ _ _ _ _ _ _ _ _ _ path [15S07]

a. Actual
b. Critical
c. Vertical
d. Virtual
[Link] source machine sends independent frames to destination machine
without having acknowledgment, this service is _ _ _ _ _ _ _ _ _ [15S08]

a. Unacknowledged connection oriented


b. Unacknowledged connection less
c. Acknowledged connection oriented
d. Acknowledged connection less
[Link] the data unit is 111111, the divisor 1010, and the reminder 110, what
is the dividend at the receiver? [16D01]

a. 111111011
b. 111111110
c. 1010110
d. 110111111
[Link] the data unit is 111111,the divisor 1010,what is the dividend a the
transmitter? [16D02]

26
a. 111111000
b. 1111110000
c. 111111
d. 1111111010
[Link] odd parity is used for ASCII error detection, the number of 0's per 8 -
bit symbol is [16D03]

a. even
b. odd
c. indeterminate
d. 42
[Link] error detection method cannot detect a burst error? [16D04]

a. VRC
b. LRC
c. CRC
d. Hamming code
[Link] number of bit positions in which two code words differ is called
[16M01]

a. Checksum distance
b. Hamming distance
c. CRC distance
d. Parity distance
[Link] of checksum is implemented in hardware using [16M02]

a. Shift register
b. AND register
c. OR register
d. EX - OR register
[Link] the ASCII character G is sent and D is received, what type of error is
this [16M03]

a. Single bit
b. Multiple bit
c. Burst
d. Recoverable
[Link] the ASCII character H is sent and I is received, what type of error is
this [16M04]

a. Single bit
b. Multiple bit
c. Burst
d. Recoverable
[Link] cyclic redundancy checking, what is the CRC? [16S01]

a. The divisor
b. The quotient
c. The dividend
d. The remainder
[Link] CRC there is no error if the remainder at the receiver is _ _ _ _ _ _ _ _
_ _ _ _. [16S02]

a. Equal to the remainder at the sender


b. Zero
c. Non - zero
d. The quotient at the sender

27
[Link] detection is usually done in the _ _ _ _ _ _ _ _ _ layer of the OSI
model [16S03]

a. Physical
b. Data link
c. Network
d. Session
[Link] error detection method uses one's complement arithmetic?
[16S04]

a. VRC
b. LRC or HRC
c. CRC
d. Checksum
[Link] cyclic redundancy checking, the divisor is _ _ _ _ _ _ _ _ the CRC
[16S05]

a. The same size as


b. One bit less than
c. One bit more than
d. Two bits more than
[Link] error detection method involves polynomials? [16S06]

a. VRC
b. LRC
c. CRC
d. Checksum
[Link] CRC the quotient at the sender _ _ _ _ _ _ _ _ _ [16S07]

a. Becomes the dividend at the receiver


b. Becomes the divisor at the receiver
c. Is discarded
d. Is the remainder
[Link] the CRC generator, _ _ _ _ _ _ added to the data unit after the
division process [16S08]

a. 0s are
b. 1s are
c. The polynomial is
d. The CRC remainder is
[Link] in which sender sends one frame and then waits for an
acknowledgement before proceeding are called _ _ _ _ _ _ _ protocols.
[17D01]

a. go - and - stop
b. stop - and - wait
c. wait - and - stop
d. wait - and - go
[Link] sender or receiver always waits for +ve acknowledgement, which
has _ _ _ _ _ _ _ _ data [17D02]

a. Noisy
b. Less
c. High
d. Noise free
[Link] frame arrived undamaged, the data link layer is informed with an
event _ _ _ _ _ _ _ _ [17G01]

28
a. Cksum - error
b. Frame - arrival
c. Frame - error
d. None
[Link] in which the sender waits for a positive acknowledgement
before advancing to the next data item are often called _ _ _ _ _ _ _ _ _ _
[17M01]

a. Positive acknowledgement with retransmission (PAR)


b. Simplex protocol for noisy channel
c. Stop and wait
d. Unrestricted simplex
[Link] in which the sender sends one frame and then waits for an
acknowledgement before proceeding are called _ _ _ _ _ _ _ _ _ [17M02]

a. Go back - n
b. stop and wait
c. Unrestricted simplex
d. Simplex protocol for noisy channel
[Link] unrestricted simplex protocol, sequence numbers and _ _ _ _ _ _ _
are not used [17M03]

a. Acknowledgements
b. Inputs
c. Outputs
d. Frame count
[Link] a frame has arrived safely, correctly then receiver will send _ _ _ _ _
_ _ _ acknowledgements to sender [17S01]

a. +Ve
b. - Ve
c. Neutral
d. No
[Link] the data link layer, _ _ _ _ _ _ _ _ _ procedure is used to Fetch a
packet from the network layer for transmission on the channel [17S02]

a. From - network-layer ()
b. to - network-layer ()
c. From - physical - layer ()
d. to - physical-layer ()
250._ _ _ _ _ _ _ _ is used to number the frames [17S03]

a. MAX - SEQ
b. Seq-nr
c. Frame - kind
d. Info
251._ _ _ _ _ _ is a unit of information exchanged between data link layer
and network layer [17S04]

a. Packet
b. Frame
c. Page
d. Block
252._ _ _ _ _ _ _ _ is not a part of frame header [17S05]

a. Seg
b. Kind
c. ACK

29
d. Seq - nr
[Link] a receiver simply to discard all subsequent frames, send no
acknowledgements for the discard frame is _ _ _ _ _ _ _ _ _ _ [18D01]

a. Back go n
b. n back go
c. go back n
d. back n go
[Link] state labeled by three characters XYX, X = ? [18D02]

a. 0
b. 0 or 1
c. 1
d. 1 or -
[Link] finite state machine model each protocol machine is always in a
specific _ _ _ _ _ _ _ _ _ at every instant of time. [18D03]

a. Instant
b. Constant
c. Gap
d. State
[Link] each state, there are zero or more possible _ _ _ _ _ _ _ _ to other
states [18D04]

a. Transactions
b. Transitions
c. Traits
d. Transports
[Link] the line is poor, _ _ _ _ _ _ _ _ protocol wastes a lot of bandwidth on
retransmitted frames [18G01]

a. Selective repeat
b. Go back n
c. 1 - bit sliding window
d. None
[Link] data link layer store all correct frames following bad one is _
_ _ _ _ _ _ _ _ [18G02]

a. Pipelining repeat
b. Selective repeat
c. Simple repeat
d. None
[Link] technique of temporarily delaying outgoing acknowledgements, so
that they can hooked onto the next outgoing data frame is _ _ _ _ _ _ _ _
_ _ [18M01]

a. Back tracking
b. Back passing
c. Piggy backing
d. Forwarding
[Link] a new packet arrives from the network layer, it is given the
next _ _ _ _ _ _ _ Sequence number [18M02]

a. Highest
b. Lowest
c. Latest
d. Best

30
[Link] selective repeat process a _ _ _ _ _ _ _ _ _ is fed back to the sender
and repeats the transfer of data [18M03]

a. Frame
b. Protocol
c. Function
d. Packet
262._ _ _ _ _ _ _ _ _ _ Protocol accepts Frames out of order, but passes
packets to the network layer in order [18S01]

a. Selective repeat
b. Go back n
c. Stop and wait
d. 1 - bit sliding window
263._ _ _ _ _ _ _ _ _ _ Calls the retransmission of specified frame [18S02]

a. - ACK
b. + ACK
c. Type 3
d. Type 1
264._ _ _ _ _ _ _ _ _ is bi - directional and is more robust protocol [18S03]

a. Sliding window
b. Stop and wait
c. PAR
d. utopia
[Link] window corresponds to the set of frames permitted to _ _ _ _
_ _ _ _ _ [18S04]

a. Reject
b. Delete
c. Complete
d. accept
266.A situation in which the protocol can make no more forward progress is
_ _ _ _ _ _ _ _ _ [18S05]

a. Lock
b. Dead lock
c. Dead
d. Alive
[Link] a finite state machine model quadruple (S, M, I, T) M is set of _ _ _ _
_ _ _ _ _ _ [18S06]

a. States
b. Initial states
c. Frames
d. Transitions
[Link] example scenario with MAX - SEQ = 7 a piggy backed
acknowledgment for frame 7 eventually comes back to the _ _ _ _ _ _ _ _
_ [18S07]

a. Sender
b. Receiver
c. Medium
d. Cable
269._ _ _ _ _ _ protocols are widely used in the internet [19D01]

a. IP

31
b. TCP
c. PPP & SLIP
d. pop
[Link] handles _ _ _ _ _ _ _ _ _ [19D02]

a. Error detection
b. Error creation
c. Application
d. Automation
[Link] provides a protocol for bringing lines up, testing them, negotiating
options, and bringing them down again gracefully when they are no
longer needed. This protocol is known as [19D03]

a. LCP
b. NCP
c. TCP
d. VCP
[Link] SLIP. [19G01]

a. Section Link Internet Protocol


b. Selection Link Input Protocol
c. Serial Line Internet Protocol
d. None
273._ _ _ _ _ _ does not provide any form of authentication [19G02]

a. PPP
b. SLIP
c. TCP/IP
d. None
274._ _ _ _ _ _ _ _ _ PPP field tell what kind of packet is in the payload field
[19G03]

a. Protocol
b. Check sum
c. Control
d. None
275._ _ _ _ _ _ _ _ Field is used for sequence no, acknowledgements
[19G04]

a. Address
b. Data
c. Control
d. None
276._ _ _ _ _ _ _ _ _ is used when a computer is polling a group of terminals
[19G05]

a. Type bit
b. Poll / select bit
c. Poll / final bit
d. None
277._ _ _ _ _ _ is used to force the other machine to sent a supervisory
frame immediately [19G06]

a. P/F bit
b. P/S bit
c. Ack bit
d. None

32
278._ _ _ _ _ _ _ _ is used to indicate that there is a transmission error
[19M01]

a. Type 1
b. Type 2
c. Type 3
d. Type 4
279._ _ _ _ _ _ type value tells the sender to stop sending [19M02]

a. Type 1
b. Type 2
c. Type 3
d. Type 4
280._ _ _ _ _ _ _ _ _ frame is used for control purpose and also carry the
data when service is unreliable connection less service [19M03]

a. Supervisory
b. Unnumbered
c. Information
d. Numbered
[Link] various kinds of supervisory frames are distinguished by _ _ _ _ _ _
field [19S01]

a. Check sum
b. Control field
c. next
d. Type
[Link] is present in all HDLC control fields? [20D01]

a. P/F bit
b. N(R)
c. N (S)
d. Code bits
[Link] shortest frame in HDLC protocol is usually the _ _ _ _ _ _ _ _ _ _ _ _
frame. [20D02]

a. information
b. supervisory
c. management
d. unmanaged frame
[Link] is a _ _ _ _ _ _ _ _ _ _ protocol. [20M01]

a. character - oriented
b. bit - oriented
c. byte - oriented
d. count - oriented
[Link] is a _ _ _ _ _ _ _ _ _ _ protocol. [20M02]

a. character - oriented
b. bit - oriented
c. byte - oriented
d. count - oriented
[Link] HDLC _ _ _ _ _ _ _ _ _ field defines the beginning and end of a
frame. [20M03]

a. flag
b. address
c. control

33
d. FCS
[Link] stands for _ _ _ _ _ _ _ _ _ _ _ [20S01]

a. Binary synchronous control


b. Binary synchronous communication
c. Bit-oriented synchronous communication
d. Byte-oriented synchronous communication
[Link] is an acronym for _ _ _ _ _ _ _ _ _ [20S02]

a. high - duplex line communication


b. high -l evel data link control
c. half - duplex digital link combination
d. host double level circuit
[Link] address field of a frame in HDLC protocol contains the address of
the _ _ _ _ _ _ _ _ _ station [20S03]

a. primary
b. secondary
c. tertiary
d. a station

34

You might also like