[go: up one dir, main page]

0% found this document useful (0 votes)
188 views6 pages

DCN Unit Wise Bits With Answers Ss

The document contains questions and answers related to data communications and networking topics. It covers topics like transmission methods, network types, protocols, error detection, switching, and multiple access techniques. Some key points include that ARPANET originally connected host computers directly using IMPs, the Internet is a collection of many networks, a LAN operates within a building or campus, full-duplex transmission allows simultaneous bidirectional communication, and protocols establish rules for data communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views6 pages

DCN Unit Wise Bits With Answers Ss

The document contains questions and answers related to data communications and networking topics. It covers topics like transmission methods, network types, protocols, error detection, switching, and multiple access techniques. Some key points include that ARPANET originally connected host computers directly using IMPs, the Internet is a collection of many networks, a LAN operates within a building or campus, full-duplex transmission allows simultaneous bidirectional communication, and protocols establish rules for data communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

DATA COMMUNICATIONS & NETWORKING (15A04704)

UNIT-I
INTRODUCTION TO NETWORKS & DATA COMMUNICATIONS
1. Communication between a computer and a keyboard involves ______________
transmission. [ ]
A) Simplex B) half-duplex C) full-duplex D) automatic
2. In the original ARPANET, _______ were directly connected together. [ ]
A) Routers B) host computers C) networks D) IMPs
3. ________ is a collection of many separate networks. [ ]
A) A WAN B) An internet C) A LAN D) None of the above
4. This was the first network. [ ]
A) CSNET B) NSFNET C) ARPANET D) ANSNET
5. A _______ is a data communication system within a building, plant, or campus, or between
nearby buildings. [ ]
A) LAN B) MAN C) WAN D) none of the above
6. Data flow between two devices can occur in a _______ way. [ ]
A) Simplex B) half-duplex C) full-duplex D) all of the above
7. A television broadcast is an example of _______ transmission. [ ]
A) half-duplex B) simplex C) full-duplex D) automatic
8. The information to be communicated in a data communications system is the. [ ]
A) Medium B) Protocol C) Message D) Transmission
9. A ________ is a set of rules that governs data communication. [ ]
A) Protocol B) forum C) standard D) none of the above
10. A ______ is a data communication system spanning states, countries, or the whole world.
[ ]
A) MAN B) WAN C) LAN D) none of the above
11. ________media transport electromagnetic waves without the use of a physical conductor.
[ ]
A) Guided B) Unguided C) Either (A) or (B) D) None of the above
12. ______ refers to the physical or logical arrangement of a network. [ ]
A) Topology B) Mode of operation C) Data flow D) None of the above
13. ________ cable is used for voice and data communications. [ ]
A) Twisted-pair B) Coaxial C) Fibre-optic D) none of the above
14. The _______ layer lies between the network layer and the application layer. [ ]
A) Data link B) Transport C) Physical D) none of the above
15. The Internetworking Protocol (IP) is a ________ protocol. [ ]
A) connection-oriented B) reliable C) both a and b D) none of the above
16. The ____ address uniquely defines a host on the Internet. [ ]
A) IP B) port C) specific D) physical
17. The _______ layer changes bits into electromagnetic signals. [ ]
A) Physical B) Transport C) Data link D) None of the above
18. Unipolar, bipolar, and polar encoding are types of _______ encoding. [ ]
A) Line B) block C) NRZ D) Manchester
19. ________ is the process of converting digital data to a digital signal. [ ]
A) Line coding B) Block coding C) Scrambling D) None of the above
20. A(n) ____ medium provides a physical conductor from one device to another. [ ]
A) Unguided B) guided C) either (a) or (b) D) none of the
above
21. _____ cable can carry signals of higher frequency ranges than _______ cable. [ ]
A) Coaxial; twisted-pair B) Twisted-pair; fibre-optic C) Coaxial; fibre-optic D) none
22. ___ are used for cellular phone, satellite, and wireless LAN communications. [ ]
A) Radio waves B) Infrared waves C) Microwaves D) none of the above
UNIT-II
SWITCHING
1. Data link control deals with the design and procedures for ______ communication.
[ ]
A) node-to-node B) process-to-process C) host-to-host D) none of the above
2. In a ________ network, two types of addressing are involved: global and local. [ ]
A) Datagram B) virtual-circuit C) circuit-switched D) none of the above
3. A ________ network is made of a set of switches connected by physical links, in which
each link is divided into n channels. [ ]
A) circuit-switched B) line-switched C) frame-switched D) none of the above
4. In _________, there is no resource allocation for a packet. [ ]
A) circuit switching B) datagram switching C) frame switching D) none of the above
5. A switched WAN is normally implemented as a _______ network. [ ]
A) virtual-circuit B) datagram C) circuit-switched D) none of the above
6. A switch in a datagram network uses a routing table that is based on the ______ address.
[ ]
A) Destination B) source C) local D) none of the above
7. Traditionally, _____ methods of switching have been important. [ ]
A) six B) five C) four D) three
8. Circuit switching takes place at the ________ layer. [ ]
A) Physical B) data link C) network D) transport
9. The network layer in the Internet is designed as a __________ network. [ ]
A) circuit-switched B) datagram C) virtual-circuit D) none of the above
10. A local telephone network is an example of a _______ network. [ ]
A) packet-switched B) message-switched C) circuit-switched D) none of the above
11. In cyclic redundancy checking, the divisor is _______ the CRC. [ ]
A) one bit less than B) one bit more than C) The same size as D) none of the above
12. In cyclic redundancy checking, what is the CRC? [ ]
A) The quotient B) The dividend C) The divisor D) The remainder
13. Which error detection method consists of just one redundant bit per data unit? [ ]
A) CRC B) Checksum C) Simple parity check D) Two-dimensional parity
check [ ]
14. The _____of errors is more difficult than the ______. [ ]
A) detection; correction B) correction; detection C) creation; correction D) creation;
detection .
15. Which error detection method uses one’s complement arithmetic? [ ]
A) Checksum B) CRC C) Simple parity check D) Two-dimensional parity check
16. HDLC is an acronym for _______. [ ]
A) Half-duplex digital link combination B) Host double-level circuit
C) High-duplex line communication D) High-level data link control
17. _______ control refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment. [ ]
A) Flow B) Error C) Transmission D) none of the above
18. ______ control refers to methods of error detection and correction. [ ]
A) Flow B) Error C) Transmission D) none of the above
19. The ______ Protocol has neither flow nor error control. [ ]
A) Selective-Repeat ARQ B) Go-Back-N ARQ C) Stop-and-Wait D) Simplest
20. The most common protocol for point-to-point access is the Point-to-Point Protocol (PPP),
which is a _________protocol. [ ]
A) byte-oriented B) bit-oriented C) character-oriented D) none of the above
21. The _______Protocol has both flow control and error control. [ ]
A) Stop-and-Wait B) Selective-Repeat ARQ C) Go-Back-N ARQ D) both (b) and (c)
22. The Simplest Protocol and the Stop-and-Wait Protocol are for _____channels. [ ]
A) Noiseless B) noisy C) either (a) or (b) D) neither (a) nor (b)
23.The _______Protocol has flow control, but not error control. [ ]
A) Selective-Repeat ARQ B) Stop-and-Wait C) Simplest D) Go-Back-N ARQ
UNIT-III
MULTIPLE ACCESS
1. In _______, the stations share the bandwidth of the channel in time. [ ]
A) FDMA B) CDMA C) TDMA D) none of the above
2. In the _______ method, the stations in a network are organized in a logical ring.[ ]
A) polling B) token passing C) reservation D) none of the above
3. __________ augments the CSMA algorithm to detect collision. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
4. In the _______ method, each station has a predecessor and a successor. [ ]
A) token passing B) polling C) reservation D) none of the above
5. The vulnerable time for CSMA is the ________propagation time. [ ]
A) three times B) two times C) the same as D) none of the above
6. The maximum throughput for pure ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
7. In ________, the available bandwidth is divided into frequency bands. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
8. To avoid collisions on wireless networks, ________was invented. [ ]
A) CSMA/CD B) CSMA/CA C) either (a) or (b) D) both (a) and (b)
9. In _____, each station transmits its data in its assigned time slot. [ ]
A) TDMA B) CDMA C) FDMA D) none of the above
10. We discussed ________ channelization protocols. [ ]
A) Four B) three C) two D) none of the above
11. We discussed ______ popular controlled-access methods. [ ]
A) Four B) three C) two D) none of the above
12. In ______, each station is forced to send only at the beginning of the time slot. [ ]
A) Pure ALOHA B) slotted ALOHA C) both (a) and (b) D) neither (a) nor (b)
13. In _______ methods, the stations consult one another to find which station has the right to
Send. [ ]
A) Channelization B) random access C) controlled access D) none of the above
14. In ________ each station sends a frame whenever it has a frame to send. [ ]
A) Slotted ALOHA B) pure ALOHA C) both (a) and (b) D) neither (a) nor (b)
15. In ______, the stations use different codes to achieve multiple access. [ ]
A) CDMA B) TDMA C) FDMA D) none of the above
16. The maximum throughput for slotted ALOHA is ________ per cent. [ ]
A) 36.8 B) 18.4 C) 12.2 D) none of the above
17. ________ requires that each station first listen to the medium before sending. [ ]
A) FDMA B) CDMA C) MA D) CSMA
18. Gigabit Ethernet has a data rate of ________Mbps. [ ]
A) 10,000 B) 1000 C) 100 D) 10
19. Gigabit Ethernet access methods include _______ mode. [ ]
A) full-duplex B) half-duplex C) both (a) and (b) D) neither (a) nor (b)
20. Standard Ethernet (10-Mbps) uses _______ encoding. [ ]
A) AMI B) Manchester C) NRZ D) differential
Manchester
21. The original IEEE 802.11, has a data rate of ________ Mbps. [ ]
A) 11 B) 22 C) 6 D) 1
22. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
[ ]
A) Baseband B) L2CAP C) radio D) none of the above
23. A Bluetooth network is called a ________. [ ]
A) scatter-net B) blue-net C) pico-net D) none of the above
UNIT-IV
NETWORK LAYER

1. IP is _________ datagram protocol. [ ]


A) An unreliable B) a connectionless C) both a and b D) none of the above
2. IPv6 allows _________ security provisions than IPv4. [ ]
A) More B) less C) the same level D) none of the above
3. The IPv4 header size _______. [ ]
A) Is 20 to 60 bytes long B) is 20 bytes long C) is 60 bytes long D) none of the above
4. The logical addresses in the Internet are called _______ addresses. [ ]
A) Port B) IP C) Email D) none of the above
5. The input and output ports of a router perform the ________ layer functions of the router.
[ ]
A) Physical and data link B) network C) transport D) none of the above
7. For purposes of routing, the Internet is divided into ___________. [ ]
A) Wide area networks B) autonomous networks C) autonomous systems D) none
8. In __forwarding, the full IP address of a destination is given in the routing table[ ]
A) next-hop B) network-specific C) host-specific D) default
9. The Routing Information Protocol (RIP) is an intradomain routing based on _________
routing. [ ]
A) Distance vector B) link state C) path vector D) none of the above
10. In multicast routing, each involved router needs to construct a ________ path tree for
each group. [ ]
A) Average B) longest C) shortest D) none of the above
11. In IPv6, _______ address defines a single computer. [ ]
A) A unicast B) a multicast C) an any cast D) none of the above
12. An IPv6 address can have up to __________ colons. [ ]
A) 8 B) 7 C) 4 D) none of the above
13. IPV4 Address is _______________ [ ]
A) 8 bit B) 16 bit C) 32 bit D) 64 bit
14. Router operates in which layer of OSI Reference Model? [ ]
A) Layer 1 (Physical Layer) B) Layer 3 (Network Layer)
C) Layer 4 (Transport Layer) D) Layer 7 (Application Layer)
15. What is the address size of IPv6? [ ]
A) 32 bit B) 64 bit C) 128 bit D) 256 bit
16. The header length of an IPv6 datagram is _____. [ ]
A) 10bytes B) 25bytes C) 30bytes D) 40bytes
17. IPv6 does not use ______ type of address [ ]
A) Broadcast B) Multicast C) any cast D) None of the mentioned
18. These are the features present in IPv4 but not in IPv6. [ ]
A) Fragmentation B) Header checksum C) Options D) All of the mentioned
18. The ____ field determines the lifetime of IPv6 datagram [ ]
A) Hop limit B) TTL C) Next header D) None of the mentioned
19. In ________ congestion control, policies are applied to prevent congestion before it
happens. [ ]
A) open-loop B) closed-loop C) either (a) or (b) D) neither (a) nor (b)
19. In ________ we try to avoid traffic congestion. [ ]
A) Congestion control B) quality of service C) either (a) or (b) D) both (a) and (b)
20. In _______ congestion control, mechanisms are used to alleviate congestion after it
happens. [ ]
A) open-loop B) closed-loop C) either (a) or (b) D) neither (a) nor (b
21. _______ happens in any system that involves waiting. [ ]
A) Congestion B) Jamming C) Error D) none of the above
UNIT-V
TRANSPORT LAYER PROTOCOL

1. To accomplish flow control, TCP uses a ___________ window protocol. [ ]


A) limited-size B) sliding C) fixed-size D) none of the above
2. UDP and TCP are both _______ layer protocols. [ ]
A) Data link B) network C) transport D) none of the above
3. In the sending computer, UDP receives a data unit from the _______ layer. [ ]
A) Application B) transport C) IP D) none of the above
4. TCP is a ___________ protocol. [ ]
A) connection-oriented B) connectionless C) both a and b D) none of the above
5. UDP uses ________ to handle outgoing user datagrams from multiple processes on one
host. [ ]
A) Flow control B) multiplexing C) de-multiplexing D) none of the above
6. TCP is a(n) _______ transport protocol. [ ]
A) Unreliable B) best-effort delivery C) reliable D) none of the above
7. TCP delivers _______ out-of-order segments to the process. [ ]
A) All B) no C) some D) none of the above
8. One commonly used public-key cryptography method is the ______ algorithm. [ ]
A) RSS B) RAS C) RSA D) RAA
9. A (n) ______ algorithm transforms cipher-text to plaintext. [ ]
A) Encryption B) decryption C) either (a) or (b) D) neither (a) nor
(b)
10. The ________ is the message after transformation. [ ]
A) cipher-text B) plaintext C) secret-text D) none of the above
11. A (n) _______ algorithm transforms plaintext to cipher-text. [ ]
A) Encryption B) decryption C) either (a) or (b) D) neither (a) nor (b)
12. The ________is the original message before transformation. [ ]
A) cipher-text B) plaintext C) secret-text D) none of the above
13. A combination of an encryption algorithm and a decryption algorithm is called [ ]
A) cipher B) secret C) key D) none of the above
14. ________ is the science and art of transforming messages to make them secure and
immune to attacks. [ ]
A) Cryptography B) Crypto analysis C) either (a) or (b) D) neither (a) nor (b)
15. Password-based authentication can be divided into two broad categories: ____and ____.
[ ]
A) Fixed; variable B) time-stamped; fixed C) fixed; one-time D) none of the above
16. Message ________ means that the sender and the receiver expect privacy. [ ]
A) Confidentiality B) integrity C) authentication D) none of the above
17. Digital signature cannot provide ________ for the message. [ ]
A) Integrity B) confidentiality C) nonrepudiation D) authentication
18. A _______ ATM LAN combines features of a pure ATM LAN and a legacy ATM LAN.
[ ]
A) legacy B) pure C) mixed architecture D) none of the above
19. A (n) ______ is the interface between a user and an ATM switch. [ ]
A) NNN B) UNI C) NNI D) None of the above
20. In ATM, a virtual connection is defined by _________. [ ]
A) DLCI B) VPI C) VCI D) a combination of (b)
and (c)
21. The ATM standard defines ______ layers. [ ]
A) Five B) four C) three D) two
22. _________ is the interface between two ATM switches. [ ]
A) NNI B) NNN C) UNI D) none of the above
23. The ATM data packet is a cell composed of ______ bytes. [ ]
A) 53 B) 52 C) 43 D) 42

You might also like