Sunday, 8 November 2020

CS8591 Computer Networks - UNIT II DATA-LINK LAYER & MEDIA ACCESS - Multiple Choice Questions (MCQ)

 

CS8591 Computer Networks 

UNIT II DATA-LINK LAYER & MEDIA ACCESS

(Multiple Choice Questions (MCQ))

Introduction – Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC – PPP - Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction – IEEE 802.11, Bluetooth – Connecting Devices.

 

1. The _______________ layer lies below the network layer

A. Physical layer B. Data link layer C. Network layer D. Transport layer

Ans. B

2. The _______________ layer lies above the physical layer.

A. Physical layer B. Data link layer C. Network layer D. Transport layer

Ans. B

3.  The __________ is responsible for moving frames from one hop (node) to the next.

A. Physical layer B. Data link layer C. Network layer D. Transport layer

Ans. B

4. The Data link layer divides the stream of bits received from network layer into manageable data units called ____________.

A. Messages B. Segments C. Frames D. Datagrams

Ans. C

5. _________________ is related to the Data link layer.

A. Physical address B. logical address C. Port address D. Specific address

Ans. A

6. The data link layer imposes a ___________ mechanism to avoid overwhelming the receiver.

A. Flow control

B. Error control

C. Access Control

D. None of the above.

Ans. A

7. The data link layer adds a ____________ mechanism to detect and retransmit damaged or lost frames.

A. Flow control

B. Error control

C. Access Control

D. None of the above.

Ans. B

8. The data link layer adds an _______________ mechanism to regulate the access of a device to the link (medium).

A. Flow control

B. Error control

C. Access Control

D. None of the above.

Ans. C

9. The data link layer is responsible for

A. Flow control

B. Error control

C. Access Control

D. All of the above

Ans. D

10. Trailer is added only at the ____________ .

A. Physical layer B. Data link layer C. Network layer D. Transport layer

Ans. B

11. Trailer contains additional information that deals with

A. Flow control

B. Error detection

C. Access Control

D. All of the above

Ans. B

12. The __________ oversees the delivery of a data unit between two systems on the same network.

A. Physical layer B. Data link layer C. Network layer D. Transport layer

Ans. B

13. The sub-layers of the data link layer are

A. Logical Link Control (LLC) layer

B. Media Access Control (MAC) layer

C. Both (A) and (B)

D. None of the above

Ans. C.

14. The Logical Link Control layer controls
A. frame synchronization

B. flow control

C. error checking

D. All of the above
Ans. D

15. The ____________ is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.

A. Logical Link Control (LLC) layer

B. Media Access Control (MAC) layer

C. Both (A) and (B)

D. None of the above

Ans. B

16. A _______________ is also called MAC address.

A. physical address

B. logical address

C. port address

D. None of the above

Ans. A

17. The ____________ is used to find the physical address of the node when its Internet address is known.

A. Address Resolution Protocol (ARP)

B. Reverse Address Resolution Protocol (RARP)

C. SNMP

D. None of the above.

Ans. A

18. The ______________ allows a host to discover its Internet address when it knows only its physical address.

A. Address Resolution Protocol (ARP)

B. Reverse Address Resolution Protocol (RARP)

C. SNMP

D. None of the above.

Ans. B

19. The main functions of the data link layer are

A. data link control

B. media access control

C. both (a) and (b)

D. None of the above

Ans. C

20. ___________ divides the stream of bits received from network layer into manageable data units called frames.

A. Framing B. Segmentation C. Multiplexing D. Demultiplexing

Ans. A

21. In ___________, there is no need for defining the boundaries of the frames; the size itself can be used as a delimiter.

A. fixed size framing

B. variable size framing

C. both (a) and (b)

D. None of the above

Ans. A

22. In ___________, we need a way to define the end of the frame and the beginning of the next.

A. fixed size framing

B. variable size framing

C. both (a) and (b)

D. None of the above

Ans. B

23. To transmit ______ over the node, it is necessary to mention start and end of each frame.

A. Frames

B. Segments

C. Datagrams

D. All of the above

Ans. A

24. Techniques to solve the necessity of mentioning start and end of each frame are

A. Byte-oriented protocols (Character-oriented protocols

B. Bit-oriented protocols

C. both (a) and (b)

D. None of the above.

Ans. C

25. __________ framing uses two categories of protocols: byte-oriented protocols and bit-oriented protocols.

A.  Fixed-size

B.  Variable-size

C.  Standard

D. None of the above

Ans. B

26.  In ______________, each frame is to be viewed as a collection of bytes (characters) rather than a collection of bits.

A. Byte-oriented protocols (Character-oriented protocols)

B. Bit-oriented protocols

C. both (a) and (b)

D. None of the above.

Ans. A

 

 

27. A byte-oriented approach is illustrated by

A. Binary Synchronous Communication (BISYNC) Protocol

B. Digital Data Communication Message Protocol (DDCMP)

C. Point-to-Point Protocol (PPP)

D. All of the above

Ans. D

28. In _________________, the data portion of the frame is then contained between special sentinel characters: STX (start of text) and ETX (end of text).

A. Binary Synchronous Communication (BISYNC) Protocol

B. Digital Data Communication Message Protocol (DDCMP)

C. Point-to-Point Protocol (PPP)

D. All of the above

Ans. A

29.  Binary Synchronous Communication (BISYNC) Protocol is _______________

A. Sentinel approach

B. Digital Data Communication Message Protocol (DDCMP)

C. Point-to-Point Protocol (PPP)

D. All of the above

Ans.A

30. In ____________, a special byte called the escape character (ESC) is stuffed before every byte in the message with the same pattern as the flag byte. If the ESC sequence is found in the message byte, then another ESC byte is stuffed before it.

A. Byte stuffing (character stuffing)

B. Bit stuffing

C. Both (a) and (b)

D. None of the above

Ans. A

31. The more recent and widely used Point-to-Point Protocol (PPP) is a _______________

A. Byte-oriented protocols (Character-oriented protocols)

B. Bit-oriented protocols

C. both (a) and (b)

D. None of the above.

Ans. A

32. PPP is a byte-oriented protocol using byte stuffing with the escape byte ___________.

A. 01111101 B. 01111111 C. 01111110 D. 11111111

Ans. A

33. In __________________, frames are viewed as a collection of bits.

A. Byte-oriented protocols (Character-oriented protocols)

B. Bit-oriented protocols

C. both (a) and (b)

D. None of the above.

Ans. B

34. HDLC is an acronym for _______.

A.   High-level data link control

B.   Half-duplex digital link combination

C.   Host double-level circuit

D.   High-duplex line communication

Ans. A

35. Data transfer modes of HDLC are

A. Normal response mode

B. Asynchronous response mode

C. Asynchronous balance mode

D. All of the above

Ans. D

36. ___________________ is a bit-oriented protocol.

A. High-level Data Link Control (HDLC) protocol

B. PPP

C. BISYNC

D. None of the above

Ans. A

37. ________________ is the basis for all bit-oriented protocols in use today.

A. HDLC B. PPP C. BISYNC D. DDCMP

Ans. A

38. HDLC denotes both the beginning and end of a frame with the distinguished bit sequence ___________ .

A. 01111101 B. 01111111 C. 01111110 D. 11111111

Ans. C

39. If the HDLC flag field pattern is found in the message data field, it needs to be altered through ___________.

A. synchronizaion

B. bit stuffing

C. byte stuffing

D. None of the above

Ans. B

40. Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the ________.

A. flag

B. trailer

C. header

D. None of the above

Ans. A

41. HDLC defines the following three types of frames:

A. Information frames (I-frames)

B. supervisory frames (S-frames)

C. unnumbered frames (U-frames)

D. All of the above

Ans. D

42. ___________ are used to transport user data and control information relating to user data (piggybacking).

A. Information frames (I-frames)

B. supervisory frames (S-frames)

C. unnumbered frames (U-frames)

D. All of the above

Ans. A

43. __________ are used only to transport control information.

A. Information frames (I-frames)

B. supervisory frames (S-frames)

C. unnumbered frames (U-frames)

D. All of the above

Ans. B

44. _________ are reserved for system management. Information carried by these frames is intended for managing the link itself.

A. Information frames (I-frames)

B. supervisory frames (S-frames) \

C. unnumbered frames (U-frames)

D. All of the above

Ans. C

45. Types of errors are

A. Single-bit error

B. Burst error

C. both (a) and (b)

D. None of the above

Ans. C

46. In error detection, the receiver corrects errors without requesting retransmission.

A. forward

B. backward

C. both (a) and (b)

D. None of the above.

Ans. A

47. In error detection, the receiver asks the sender to send the data again.

A. forward

B. backward

C. retransmission

D. None of the above.

Ans. C

48. In a ____________, only one bit in the data unit has changed.

A. Single-bit error

B. Burst error

C. both (a) and (b)

D. None of the above

Ans. A

49. A ________ means that 2 or more bits in the data unit have changed.

A. Single-bit error

B. Burst error

C. both (a) and (b)

D. None of the above

Ans. B

50. Instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each unit. This technique is called __________.

A. redundancy

B. repetition

C. appending

D. None of the above

Ans. A

51. Types of redundancy checks in data communications are

A. Vertical Redundancy Check (VRC) and Longitudinal Redundancy Check (LRC)

B. Cyclic Redundancy Check (CRC)

C. Checksum

D. All of the above

Ans. D

52. __________ is also called Parity Check.

A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC) D. Checksum

Ans. A

53. ____________ detects single-bit error.

A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC) D. Checksum

Ans. A

54. In ______, a block of bits is organized in a table (rows and columns). The parity bit for each column is checked and  a new row of eight  bits which are parity bits for the whole block is created. Original data with eight parity bits are transferred to the receiver.

A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC) D. Checksum

Ans. B

55. _____________ method is working based on binary division.

A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC) D. Checksum

Ans. C

56. In Cyclic Redundancy Checking, what is the CRC?

A. Quotient B. Dividend C. Divisor D. Remainder.

Ans. D

57. In Cyclic Redundancy Checking, the divisor is _________ the CRC.

A. one bit less than

B. one bit more than

C. the same size as

D. None of the above

Ans. B

58. Which error detection method uses one's complement arithmetic?

A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC) D. Checksum

Ans. D

59. ____________ is used to denote the difference between two binary strings.

A. Hamming distance

B. Hamming code

C. Hamming rule

D. None of the above

Ans. A

60. Functional mechanisms in flow control are

A. acknowledgment

B. timeout

C. both (a) and (b)

D. None of the above

Ans. C

61. If the sender does not receive ACK up to reasonable amount of time, the it retransmit the original frame; waiting for reasonable amount of time is called __________.

A. acknowledgment

B. timeout

C. both (a) and (b)

D. None of the above

Ans. B

62. The general strategy of using acknowledgments and timeouts to implement reliable delivery is sometimes called ___________.

A. Automatic Repeat Request (ARQ)

B. Delivery strategy

C. both (a) and (b)

D. None of the above

Ans. A

63. Stop and Wait Flow Control and Sliding Window Flow Control are the two ______________ mechanisms.

A. flow control

B. access control

C. error control

D. None of the above

Ans. A

64. In the sliding window method of flow control, the receiver window _____ in size when frames are received.

A. decreases 

B. increases

C. does not change

D. None of the above

Ans. A                                                                  

65. In the sliding window method of flow control, the receiver window _____ in size when an ACK is sent.

A. decreases 

B. increases

C. does not change

D. None of the above

Ans. B

66. The receiver's window in a sliding window protocol expands when _______________ .

A. an ACK is received. B. an ACK is sent. C. a frame is received D. a frame is sent

Ans. B

67. The sender's window in a sliding window protocol expands when _______________ .

A. an ACK is received. B. an ACK is sent. C. a frame is received D. a frame is sent

Ans. A

68. An ideal channel in which no frames are lost, duplicated or corrupted is regarded as _______________.

A. Noiseless Channel

B. Noisy Channel

C. Normal Channel

D. None of the above

Ans. A

69. The Simplest protocol and Stop and Wait protocol are for

A. Noiseless Channel

B. Noisy Channel

C. Normal Channel

D. None of the above

Ans. A

70. The __________ protocol has neither flow nor error control.

A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D. Selective-Repeat ARQ

Ans. B

71. In the ________ Protocol, the sender sends its frames one after another with no regard to the receiver

A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D. Selective-Repeat ARQ

Ans. B

72. The __________ protocol has flow control but not error control.

A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D. Selective-Repeat ARQ

Ans. A

73. In the ________ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next fame.

A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D. Selective-Repeat ARQ

Ans. A

74. ____________ means that there will be lot of disturbance in the path when data is carried forward from sender to receiver.

A. Noiseless Channel

B. Noisy Channel

C. Normal Channel

D. None of the above

Ans. B

75. Stop-and-Wait Automatic Repeat Request, Go-Back-N Automatic Repeat Request and Selective Repeat Automatic Repeat Request are for _________________

A. Noiseless Channel

B. Noisy Channel

C. Normal Channel

D. None of the above

Ans. B

76. A technique called _____________ is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a frame is carrying data from B to A, it can also carry control information about the arrived (or lost) frames from A.

A. piggybacking

B. synchronization

C. both (a) and (b)

D. None of the above.

Ans. A

77. The __________ Protocol, adds a simple error control mechanism to the __________ Protocol.

A. Stop-and-Wait ARQ; Stop-and-Wait

B. Go-Back-N ARQ; Stop-and-Wait

C. Selective Repeat ARQ; Go-Back-N ARQ

D. None of the above

Ans. A

78. In the __________ Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding frames.

A. Stop-and-Wait ARQ; Stop-and-Wait

B. Go-Back-N ARQ; Stop-and-Wait

C. Selective Repeat ARQ; Go-Back-N ARQ

D. None of the above

Ans. B

79. In the __________ Protocol, we avoid unnecessary transmission by sending only frames that are corrupted.

A. Stop-and-Wait ARQ; Stop-and-Wait

B. Go-Back-N ARQ; Stop-and-Wait

C. Selective Repeat ARQ; Go-Back-N ARQ

D. None of the above

Ans. C

80. Both Go-Back-N and Selective-Repeat Protocols use a __________.

A. Sliding frame

B. Sliding window

C. Sliding packet

D. None of the above

Ans. B

81. Multiple-access protocols are categorized into the following groups.

A. Random access protocols

B. Controlled-access protocols

C. Channelization protocols

D. All of the above

Ans. D

82. In _________ method, no station is superior to another station. No station is assigned the control over another.

A. Random access

B. Controlled-access

C. Channelization

D. None of the above

Ans. A

83. No rules specify which station should send next. Stations compete with one another to access the medium. That is why these methods are also called _________.

A. Random access

B. Contention methods

C. Both (a) and (b)

D. None of the above

Ans. B

84. In ________, each station sends a frame whenever it has a frame to send.

A. pure ALOHA

B. slotted ALOHA

C. both (a) and (b)

D. None of the above

Ans. A

85. Pure ALOHA dictates that when the time-out period passes,  each station waits a random amount of time before resending its frame. The randomness will help avoid more collisions. This time is called the _________.

A. Back-off time

B. time-out time

C. both (a) and (b)

D. None of the above

Ans. A

86. The length of time in which there is a possibility of collision is the ___________.

A. vulnerable time

B. Back-off time

C. time-out time

D. None of the above

Ans. A

87. In pure ALOHA, the vulnerable time is ________ the frame transmission time.

A. two times

B. three times

C. the same as

D. None of the above

Ans. A

88. _________ was invented to improve the efficiency of pure ALOHA.

A. Slotted ALOHA

B. ALOHA 

C. both (a) and (b)

D. None of the above

Ans. A

89. The ________ is defined as average successful traffic transmitted between stations per unit time.

A. throughput

B. output

C. input

D. None of the above

Ans. A

90. When two or more stations transmits message on channel, the signals will superimpose on each other and is garbled beyond the decoding ability of receiving station, this is called ___________.

A. Collisions

B. Congestions

C. both (a) and (b)

D. None of the above

Ans. A

91. In ___________________, the chance of collision can be reduced if a station senses the medium before trying to use it.

A. Multiple Access B. Carrier Sense Multiple Access (CSMA) C. FDMA D. CDMA

Ans. B

92. __________ is based on the principle ‘Sense before transmit'.

A. Multiple Access B. Carrier Sense Multiple Access (CSMA) C. FDMA D. CDMA

Ans. B

93. _______ augments the algorithm to detect the collision.

A. Multiple Access

B. Carrier Sense Multiple Access (CSMA)

C. CSMA/CD (Carrier Sense Multiple Access (CSMA)/Collision Detection (CD))

D. None of the above

Ans. C

94. In the ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is collision, the frame is sent again.

A. Multiple Access

B. Carrier Sense Multiple Access (CSMA)

C. CSMA/CD

D. None of the above

Ans. C

95. ______________________________ was invented to avoid collisions on wireless networks.

A. Carrier Sense Multiple Access (CSMA)

B. CSMA/CD

C. CSMA/CA (Carrier Sense Multiple Access (CSMA)/Collision Avoidance (CA))

D. None of the above

Ans. C

96. In ____________, Collisions are avoided through the use of three strategies, namely, Interframe Space (IFS), Contention Window and Acknowledgment.

A. Carrier Sense Multiple Access (CSMA)

B. CSMA/CD

C. CSMA/CA

D. None of the above

Ans. C

97. In ___________, the stations consult one another to find which station has the right to send.

A. controlled access

B. random access

C. channelization

D. None of the above

Ans. A

98. Number of popular controlled-access methods is

A. one B. two C. three D. four

Ans. C

99. In the ________ method, a station needs to make a reservation before sending data. 

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. A

100. In the ________ method, time divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval.

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. A

101. In the _______, one device is designated as a primary station and the other devices are secondary stations. All data exchanges must be made through the primary device.

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. B

102. In the ________, the primary device controls link; the secondary devices follow its instructions.

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. B

103. In the ______ method, the stations in a network are organized in a logical ring.

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. C

104. In the ________ method, for each station, there is a predecessor and a successor.

A. reservation

B. Polling

C. Token passing

D. None of the above

Ans. C

105. In the __________ method, a special packet called a __________ circulates through the ring.

A. reservation; control frame

B. polling; poll request

C. token passing; token

D. None of the above

Ans. C

106. ______________ is a multi-access method in which the available bandwidth of a link is shared in time, frequency, or through code between different stations.

A. Channelization

B. Random access

C. Controlled access

D. None of the above

Ans. A

107. Three channelization protocols are

A. Frequency-Division Multiple Access (FDMA)

B. Time-Division Multiple Access (TDMA)

C. Code-Division Multiple Access (CDMA)

D. all of the above

Ans. D

108. In ____________________, the available bandwidth is divided into frequency bands.

A. Frequency-Division Multiple Access (FDMA)

B. Time-Division Multiple Access (TDMA)

C. Code-Division Multiple Access (CDMA)

D. all of the above

Ans. A

109. In _____________, the stations share the bandwidth of the channel in time.

A. Frequency-Division Multiple Access (FDMA)

B. Time-Division Multiple Access (TDMA)

C. Code-Division Multiple Access (CDMA)

D. all of the above

Ans. B

110. In ______________, the stations use different codes to achieve multiple access.

A. Frequency-Division Multiple Access (FDMA)

B. Time-Division Multiple Access (TDMA)

C. Code-Division Multiple Access (CDMA)

D. all of the above

Ans. C

111. _________ is a baseband LAN specification invented in 1970s by Xerox Corporation that operates at 10 Mbps using CSMA/CD to run over coaxial cable.

A. Ethernet

B. Internet

C. intranet

D. None of the above

Ans. A

112. The term ________ is now often used to refer to all CSMA/CD LANs.

A. Ethernet

B. Internet

C. intranet

D. None of the above

Ans. A

113. In ethernet, the __________ field is actually added at the physical layer and is not formally part of the frame.

A. CRC

B. preamble

C. Type

D. None of the above

Ans. B

114. In the Ethernet frame, the _________ field contains error detection information

A. CRC

B. preamble

C. Type

D. None of the above

Ans. A

115. Ethernet, _________ is one of the most widely used standards for computer networking and general data communications.

A. IEEE 802.3

B. IEEE 802.1

C. IEEE 802.5

 D. None of the above

Ans. A

116. 10Bae5, 10Base2, 10BaseT and 10Base F are Categories of Base Band in  ________.

A. IEEE 802.3

B. IEEE 802.1

C. IEEE 802.5

D. None of the above

Ans. A

117. In 10Base5, 10 specifies ____________.

A. data rate in Mbps

B. baseband

C. cable type or length limit

D. None of the above

Ans. A

118. In 10Base5, Base specifies ____________.

A. data rate in Mbps

B. baseband

C. cable type or length limit

D. None of the above

Ans. B

119. In 10Base5, 5 specifies ____________.

A. data rate in Mbps

B. baseband

C. Maximum segment length

D. None of the above

Ans. C

120. ________ wireless LANs are sometimes called wireless Ethernet.

A. IEEE 802.11

B. IEEE 802.

C. IEEE 802.1

D. IEEE 802.5

Ans. A

121. ________ operates on the physical and data link layers.

A. IEEE 802.11

B  IEEE 802.3

C. IEEE 802.1  

D. IEEE 802.5

Ans. A

122. In __________ wireless LAN, an Access Point (AP) is installed to act as Bridge between Wireless and Wired Network

A. IEEE 802.11

B. IEEE 802.3

C. IEEE 802.1

D. IEEE 802.5

Ans. A

123. Basic Service Set (BSS) and Extended Service Set (ESS) are two kind services defined by_____________.

A. IEEE 802.11

B. IEEE 802.3

C. IEEE 802.1

D. IEEE 802.5

Ans. A

124. In IEEE 802.11, a ____________ is made of stationary or mobile wireless stations and an optional central base station, known as the Access Point (AP).

A. BSS

B. ESS

C. DSS

D. None of the above

Ans. A

125. The BSS without an AP is a stand-alone network and cannot send data to other BSSs. It is called an _______________ .

A. ad hoc network

B. infrastructure network

C. both (a) and (b)

D. None of the above

Ans. A

126. A BSS with an AP is sometimes referred to as an _____________.

A. ad hoc network

B. infrastructure network

C. both (a) and (b)

D. None of the above

Ans. B

127. In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two _________.

A. BSSs

B. ESSs

C. APs

D. None of the above

Ans. C

128. In IEEE 802.11, an ___________ is made up of two or more BSSs with Access Points (AP).

A. BSS

B. ESS

C. DSS

D. None of the above

Ans. B

129. A station with ____________ mobility is either stationary (not moving) or moving only inside a BSS.

A. no-transition

B. BSS-transition

C.ESS-transition

D. None of the above

Ans. A

130. A station with ___________ mobility can move from one BSS to another, but the movement is confined inside one ESS.

A. no-transition

B. BSS-transition

C.ESS-transition

D. None of the above

Ans. B

131. A station with ____________ mobility can move from one ESS to another.

 A. no-transition

B. BSS-transition

C.ESS-transition

D. None of the above

Ans. C

132. __________ defines two types of MAC sublayers, namely, the Distributed Coordination Function (DCF) and the Point Coordination Function (PCF)

A. IEEE 802.11

B IEEE 802.3

C. IEEE 802.1

D. IEEE 802.5

Ans. A

133. In wireless networking, the __________ or hidden terminal problem occurs when a node is visible from a wireless access point (AP), but not from other nodes communicating with said AP. This leads to difficulties in media access control.

A. hidden node problem

B. congestion problem

C. visibility problem

D. None of the above

Ans. A

134. In IEEE 802.11, __________ is an optional access method that can be implemented in an infrastructre network (not in an ad hoc network).

A. DCF

B. PCF

C. both (a) and (b)

D. None of the above

Ans. B

135. Which one of the following is not defined by IEEE 802.11 wireless LAN

A. Management frames

B. Control frames

C. Data frames

D. Administrative frames

Ans. D

136. Bluetooth is a ___________ technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on.

A. Wireless LAN

B. Wired LAN

C. LAN

D. None of the above

Ans. A

137. Bluetooth is a low cost, low power, short range ___________________ technology.

A. wireless communication

B. wired LAN

C. LAN

D. None of the above

Ans. A

138. Bluetooth network is called a _______.

A. piconet

B. Scatternet

C. extranet

D. None of the above

Ans. A

139. Piconet (bluetooth) can have up to _______ stations, one of which is called the master (primary device); the rest are called slaves (secondary devices).

A. 8 B. 7 C. 6 D. 5

Ans.8

140. Piconets can be combined to form what is called a ____________.

A. piconet

B. Scatternet

C. extranet

D. None of the above

Ans. B

141. In Bluetooth, the ___________ layer is roughly equivalent to the physical layer of the Internet model.

A. radio

B. baseband

C. L2CAP

D. None of the above

Ans. A

142. In Bluetooth, the ___________ layer is roughly equivalent to the MAC sublayer in LANs.

A. radio

B. baseband

C. L2CAP

D. None of the above

Ans. B

143. In Bluetooth, the ___________ layer is roughly equivalent to the LLC sublayer in LANs.

A. radio

B. baseband

C. L2CAP

D. None of the above

Ans. C

144. The access method in Bluetooth is

A. FDMA

B. CDMA

C. TDD-TDMA

D. None of the above

Ans. C

145. In Bluetooth, the __________ link is used when avoiding latency is more important than integrity.

A.SCO B. ACL C. ACO D. SCL

Ans. A

146. In Bluetooth, _____ is used when data integrity is more important than avoiding latency.

A.SCO B. ACL C. ACO D. SCL

Ans.B

147. Usage of Bluetooth can be categorized as

A. Adhoc networking

B. Cable replacement

C. Access points for data and voice

D. All of the above

Ans. D

148. Both Bluetooth and Wi-Fi are used for providing wireless communication through radio signals. The most distinction between Bluetooth and Wifi is that,

A. Bluetooth is actually accustomed connect short-range devices for sharing information whereas Wifi is used for providing high-speed web access or internet.

B. both are same

C. both (a) and (b)

D. None of the above

Ans. A

149. Which one of the following is not a connecting device in internetworking.

A. Hub B. Repeater C. Bridge D. Conduit

Ans. D

150. All networks except those using co-axial cable require a central location to bring media segment together. These central locations are called _______.

A. Hubs B. Repeaters C. Bridges D. Routers

Ans. A

151. A ___________ simply combines the signals of network segments. There is no signal regeneration.

A. Passive hubs

B. Active hubs

C. Intelligent hub

D. None of the above

Ans. A

152. _______________ is that regenerates or amplifies the signals.

A. Passive hubs

B. Active hubs

C. Intelligent hub

D. None of the above

Ans. B

153. ______________ regenerates the signal and performs some network management and intelligent path selection.

A. Passive hubs

B. Active hubs

C. Intelligent hub

D. None of the above

Ans. C

154. Repeater operates in the ____________________.

A. Physical layer

B. Data link layer

C. Network layer

D. None of the above

Ans. A

155. Repeater recognizes ______________ address.

A. Data link layer

B. Network layer

C. Transport layer

D. Application layer

Ans. A

156. A ___________ receives a signal and before it becomes too weak or corrupted, regenerates the original bit pattern. The repeater then sends the refreshed signal.

A. Hubs B. Repeaters C. Bridges D. Routers

Ans. B

157. The basic purpose of a _________ is to extend the distance of LAN.

A. Hub B. Repeater C. Bridge D. Router

Ans. B

158. A ___________ does not amplify the signal; it regenerates the signal.

A. Repeater B. Hub C. Bridge D. Router

Ans. A

159. A station on a Token Ring LAN can act as a __________________.

A. Hub B. Repeater C. Bridge D. (b) or (c)

Ans. D

160. Which one of the following is not a type of repeater?

A. Single port repeater & Multiport repeater B. Smart repeater C. Optical repeater D. Audio repeater

Ans. D

161. A Bridge operates in both ______________.

A. Physical and Data link layer

B. Data link and Network layer

C. Network and Transport layer

D. Transport and Session layer

Ans. A

162. A _________ extends the maximum distance of network by connecting separate network segment, and simply passes on all the signals it receives. It reads the address of all the signal it receives.

A. Hub B. Repeater C. Bridge D. Router

Ans. C

163. A Bridge recognizes ______________ address.

A. Data link layer

B. Network layer

C. Transport layer

D. None of the above

Ans. A

164. A bridge performs the following functions.

A. Frame filtering and forwarding

B. Learning the address

C. Routing

D. All of the above

Ans. D

165. Which of the following functions that a bridge cannot perform are

A. Bridge cannot determine the most efficient path

B. Traffic management function

C. Both (a) and (b)

D. None of the above

Ans. C

166. Switches operate at the _____________ layer of the OSI model.

A. Physical B. Data link C. Network D. Transport

Ans. B

167. _________ divide a network into several isolated channels or collision domains.

A. Repeaters B. Hubs C. Bridges D. Switches

Ans. D

168. A Router recognizes ______________ address.

A. Data link layer

B. Network layer

C. both (a) and (b)

D. None of the above

Ans. C

169. A __________ is a three layer device that routes packets based on their logical addresses. It connects two or more networks.

A. Repeater B. Hub C. Bridge D. Router

Ans. D

170. The key features of a ____________ is to determine the shortest path to destination.

A. Repeater B. Hub C. Bridge D. Router

Ans. D

171. A ________________ connects two independent networks. It is a protocol converter.

A. Repeater B. Hub C. Bridge D. Gateway

Ans. D

172. A Gateway recognizes ______________ address.

A. Data link layer

B. Network layer

C. Transport layer

D. Application layer

Ans. C

173. A gateway operates in ____________ of the OSI model.

A. physical layer B. data link layer C. network layer D. all seven layers

Ans. D

174. Network Interface Cards (NIC) are also called _________.

A. Network adapter

B. Memory Cards

C. Expansion cards

D. None of the above

Ans. A

175. A ___________ is a hardware component without which a computer cannot be connected over a network.

A. Network Interface Card (NIC)

B. Memory Cards

C. Expansion cards

D. None of the above

Ans. A

176. _________ is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also called network interface controller, network adapter or LAN adapter.

A. NIC

B. Memory Cards

C. Expansion cards

D. None of the above

Ans. A

177. Purpose of NIC are

A. NIC allows both wired and wireless communications.

B.NIC allows communications between computers connected via local area network (LAN) as well as communications over large-scale network through Internet Protocol (IP).

C. NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that the physical layer processes and some data link layer processes can run on it.

D. All of the above

Ans. D

178. _________ is a device which has a block of memory, reserved for storing incoming data until they are processed.

A. Memory card

B. Chip

C. Buffer

D. None of the above

Ans. C

179. In selective reject ARQ only, specific damaged or lost frame is transmitted.

A. Selective reject ARQ

B. ARQ

C. go-back N ARQ

D. Selective-Repeat ARQ

Ans. A

180. ________________________ is a Local Area Network configured by software, not by physical wiring.

A. Metropolitan Area Network (MAN)

B. Virtual Local Area Network (VLAN)

C. Personal Area Network (PAN)

D. None of the above

Ans. B

Various LAN architectures are:

A. Ethernet

B. Token Bus & Token Ring

C. FDDI

D. All of the above

The types of Ethernet Networks are

A. Switched Ethernet

B. Fast Ethernet

C. Gigabit Ethernet

D. All of the above

Ans. D

Types of S-frames are

A. Receive Ready  (RR), Receive Not Ready (RNR), Reject (REJ), Selective Reject (SREJ)

B. Receive Ready  (RR), Receive Not Ready (RNR), Reject (REJ)

C. Receive Ready  (RR), Receive Not Ready (RNR)

D. None of the above

Ans. A

Categories of U-frames are

A. Mode Setting, Unnumbered Exchange, Disconnection, Initialization Mode, Miscellaneous Mode

B. Mode Setting, Unnumbered Exchange, Disconnection, Initialization Mode

C. Mode Setting, Unnumbered Exchange, Disconnection

D. Mode Setting, Unnumbered Exchange

Ans. A


Dr. Selvaganesan
Dept of IT, JJCET

 


No comments:

Post a Comment