DCN Bits

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers
are
a) Added b) Removed c) Rearranged d) Modified

2. A list of protocols used by a system, one protocol per layer, is called


a) protocol architecture b) protocol stack c) protocol suite d) protocol
system
3. Which address is used to identify a process on a host by the transport layer?
a) physical address b) logical address c) port address d) specific
address
4. Delimiting and synchronization of data exchange is provided by
a) Application layer b) Session layer c) Transport layer d) Link layer
5. In a ___ topology, if there are n devices in a network, each device has n-1 ports for cable.
a) Bus b) Mesh c) Ring d) Star
6. ________ cable is used for voice and data communications.
a) Twisted-pair b) Coaxial c) Fibre-optic d) none of the above
7. In _________, resources are allocated on demand.
a) packet switching b) circuit switching c) line switching d) frequency switching
8. In Stop-and-Wait ARQ, the acknowledgment number always announces in ______
arithmetic the sequence number of the next frame expected.

a) modulo-m b) modulo-2 c) modulo-4 d) None of the above


9. Which of the following tasks is not done by data link layer?
a) Framing b) Error control c) Flow control d) Channel coding
10. What is the maximum size of data that the application layer can pass on to the TCP layer
below?
a) Any size b) 2^16 bytes-size of TCP header c) 2^16 bytes d) 1500 bytes
11. This was the first network.
a) CSNET b) NSFNET c) ANSNET d) ARPANET
12. The _________Protocol, adds a simple error control mechanism to _______Protocol.
a) Selective Repeat ARQ; Go-Back-N ARQ b) Go-Back-N ARQ; Stop-and-Wait c) Stop-and-
Wait ARQ; Stop-and-Wait d) None of the above
13. The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______
channels.
a) Noiseless b) Noisy c) Either (a) or (b) d) Neither (a) nor (b)
14. In a ring topology, the computer in possession of the ____ can transmit data.
a) Pocket b) Access method c) Data d) Token
15. Encryption and Decryption are the functions of ___ layers.
a) Transport b) Session c) Presentation d) Physical
II. Fill in the Blanks

1. A protocol is a set of rules that governs data communication.


2. The physical layer changes bits into electromagnetic signals.
3. The transport layer lies between the network layer and the application layer.
4. In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the
maximum size of the receive window must be 16
5. Packets in datagram switching are referred to as Datagrams
6. In a multipoint connection, more than two devices can share a single link.
7. Point-To-Point connection provides a dedicated link between two devices.
8. A television broadcast is an example of simplex transmission.
9. The information to be communicated in a data communications system is the Message.
10. Packet-switched networks allows different speed links.

III. State True or False

1. Line coding is the process of converting digital data to a digital signal. [ True ]
2. The IP address uniquely defines a host on the Internet. [ True ]
3. Datagram switching is done at application layer of OSI model. [ False ]
4. The probability of the error in a transmitted block decreases with the length of the block.
[False]
5. Internet works on Packet Switching. [True]
6. MODEM is not used in local area network (LAN)? [True]
7. The application layer protocol used by a Telnet application is telnet. [True]
8. Bridge works in Data linklayer of the OSI model? [True]

You might also like