CS8591 Computer Networks
UNIT II DATA-LINK LAYER & MEDIA ACCESS
(Multiple Choice Questions (MCQ))
Introduction –
Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC – PPP -
Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction –
IEEE 802.11, Bluetooth – Connecting Devices.
1.
The _______________ layer lies below the network layer
A.
Physical layer B. Data link layer C. Network layer D. Transport layer
Ans.
B
2.
The _______________ layer lies above the physical layer.
A.
Physical layer B. Data link layer C. Network layer D. Transport layer
Ans.
B
3. The __________ is responsible for moving
frames from one hop (node) to the next.
A.
Physical layer B. Data link layer C. Network layer D. Transport layer
Ans.
B
4.
The Data link layer divides the stream of bits received from network layer into
manageable data units called ____________.
A.
Messages B. Segments C. Frames D. Datagrams
Ans.
C
5.
_________________ is related to the Data link layer.
A.
Physical address B. logical address C. Port address D. Specific address
Ans.
A
6.
The data link layer imposes a ___________ mechanism to avoid overwhelming the
receiver.
A.
Flow control
B.
Error control
C.
Access Control
D.
None of the above.
Ans.
A
7.
The data link layer adds a ____________ mechanism to detect and retransmit
damaged or lost frames.
A.
Flow control
B.
Error control
C.
Access Control
D.
None of the above.
Ans.
B
8.
The data link layer adds an _______________ mechanism to regulate the access of
a device to the link (medium).
A.
Flow control
B.
Error control
C.
Access Control
D.
None of the above.
Ans.
C
9.
The data link layer is responsible for
A.
Flow control
B.
Error control
C.
Access Control
D.
All of the above
Ans.
D
10.
Trailer is added only at the ____________ .
A.
Physical layer B. Data link layer C. Network layer D. Transport layer
Ans.
B
11.
Trailer contains additional information that deals with
A.
Flow control
B.
Error detection
C.
Access Control
D.
All of the above
Ans.
B
12.
The __________ oversees the delivery of a data unit between two systems on the
same network.
A.
Physical layer B. Data link layer C. Network layer D. Transport layer
Ans.
B
13.
The sub-layers of the data link layer are
A.
Logical Link Control (LLC) layer
B.
Media Access Control (MAC) layer
C.
Both (A) and (B)
D.
None of the above
Ans.
C.
14. The Logical
Link Control layer controls
A. frame
synchronization
B. flow control
C. error checking
D. All of the above
Ans. D
15. The ____________
is responsible for moving data packets to and from one Network Interface Card
(NIC) to another across a shared channel.
A.
Logical Link Control (LLC) layer
B.
Media Access Control (MAC) layer
C.
Both (A) and (B)
D.
None of the above
Ans. B
16.
A _______________ is also called MAC address.
A.
physical address
B.
logical address
C.
port address
D.
None of the above
Ans.
A
17.
The ____________ is used to find the physical address of the node when its Internet
address is known.
A.
Address Resolution Protocol (ARP)
B.
Reverse Address Resolution Protocol (RARP)
C.
SNMP
D.
None of the above.
Ans.
A
18.
The ______________ allows a host to discover its Internet
address when it knows only its physical address.
A.
Address Resolution Protocol (ARP)
B.
Reverse Address Resolution Protocol (RARP)
C.
SNMP
D.
None of the above.
Ans.
B
19. The main
functions of the data link layer are
A. data link
control
B. media access
control
C. both (a) and (b)
D. None of the
above
Ans. C
20.
___________ divides the stream of bits received from network layer into
manageable data units called frames.
A. Framing B.
Segmentation C. Multiplexing D. Demultiplexing
Ans. A
21.
In ___________, there is no need for defining the boundaries of the frames; the
size itself can be used as a delimiter.
A. fixed size
framing
B. variable size
framing
C. both (a) and (b)
D. None of the
above
Ans. A
22.
In ___________, we need a way to define the end of the frame and the beginning
of the next.
A.
fixed size framing
B.
variable size framing
C.
both (a) and (b)
D.
None of the above
Ans.
B
23.
To transmit ______ over the node, it is necessary to mention start and end of
each frame.
A.
Frames
B.
Segments
C.
Datagrams
D.
All of the above
Ans.
A
24.
Techniques to solve the necessity of mentioning start and end of each frame are
A.
Byte-oriented protocols (Character-oriented protocols
B.
Bit-oriented protocols
C.
both (a) and (b)
D.
None of the above.
Ans.
C
25.
__________ framing uses two categories of protocols: byte-oriented protocols
and bit-oriented protocols.
A. Fixed-size
B. Variable-size
C.
Standard
D.
None of the above
Ans.
B
26.
In ______________, each frame is to be
viewed as a collection of bytes (characters) rather than a collection of bits.
A.
Byte-oriented protocols (Character-oriented protocols)
B.
Bit-oriented protocols
C.
both (a) and (b)
D.
None of the above.
Ans.
A
27.
A byte-oriented approach is illustrated by
A.
Binary Synchronous Communication (BISYNC) Protocol
B.
Digital Data Communication Message Protocol (DDCMP)
C.
Point-to-Point Protocol (PPP)
D.
All of the above
Ans.
D
28. In
_________________, the data portion of the frame is then contained between special
sentinel characters: STX (start of text) and ETX (end of text).
A.
Binary Synchronous Communication (BISYNC) Protocol
B.
Digital Data Communication Message Protocol (DDCMP)
C.
Point-to-Point Protocol (PPP)
D.
All of the above
Ans. A
29. Binary Synchronous Communication (BISYNC)
Protocol is _______________
A.
Sentinel approach
B.
Digital Data Communication Message Protocol (DDCMP)
C.
Point-to-Point Protocol (PPP)
D.
All of the above
Ans.A
30. In ____________, a
special byte called the escape character (ESC)
is stuffed before every byte in the message with the same
pattern as the flag byte. If the ESC sequence is found in the
message byte, then another ESC byte is stuffed before
it.
A. Byte stuffing (character stuffing)
B. Bit stuffing
C. Both (a) and (b)
D. None of the above
Ans. A
31.
The more recent and widely used Point-to-Point Protocol (PPP) is a
_______________
A.
Byte-oriented protocols (Character-oriented protocols)
B.
Bit-oriented protocols
C.
both (a) and (b)
D.
None of the above.
Ans.
A
32.
PPP is a byte-oriented protocol using byte stuffing with the escape byte
___________.
A.
01111101 B. 01111111 C. 01111110 D. 11111111
Ans.
A
33.
In __________________, frames are viewed as a collection of bits.
A.
Byte-oriented protocols (Character-oriented protocols)
B.
Bit-oriented protocols
C.
both (a) and (b)
D.
None of the above.
Ans. B
34. HDLC is an
acronym for _______.
A. High-level data link control
B. Half-duplex digital link combination
C. Host double-level circuit
D. High-duplex line communication
Ans. A
35.
Data transfer modes of HDLC are
A. Normal response
mode
B. Asynchronous
response mode
C. Asynchronous
balance mode
D. All of the above
Ans. D
36. ___________________
is a bit-oriented protocol.
A.
High-level Data Link Control (HDLC) protocol
B.
PPP
C.
BISYNC
D.
None of the above
Ans. A
37.
________________ is the basis for all bit-oriented protocols in use today.
A. HDLC B. PPP C.
BISYNC D. DDCMP
Ans. A
38.
HDLC denotes both the beginning and end of a frame with the distinguished bit
sequence ___________ .
A.
01111101 B. 01111111 C. 01111110 D. 11111111
Ans. C
39. If the HDLC
flag field pattern is found in the message data field, it needs to be altered
through
___________.
A. synchronizaion
B. bit stuffing
C. byte stuffing
D. None of the
above
Ans. B
40. Bit stuffing
means adding an extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the ________.
A. flag
B. trailer
C. header
D. None of the
above
Ans. A
41.
HDLC defines the following three types of frames:
A.
Information frames (I-frames)
B.
supervisory frames (S-frames)
C.
unnumbered frames (U-frames)
D.
All of the above
Ans.
D
42.
___________ are used to transport user data and control information relating to
user data (piggybacking).
A.
Information frames (I-frames)
B.
supervisory frames (S-frames)
C.
unnumbered frames (U-frames)
D.
All of the above
Ans.
A
43.
__________ are used only to transport control information.
A.
Information frames (I-frames)
B.
supervisory frames (S-frames)
C.
unnumbered frames (U-frames)
D.
All of the above
Ans.
B
44.
_________ are reserved for system management. Information carried by these frames
is intended for managing the link itself.
A.
Information frames (I-frames)
B.
supervisory frames (S-frames) \
C.
unnumbered frames (U-frames)
D.
All of the above
Ans.
C
45.
Types of errors are
A.
Single-bit error
B.
Burst error
C.
both (a) and (b)
D.
None of the above
Ans.
C
46.
In error detection, the receiver corrects errors without requesting
retransmission.
A.
forward
B.
backward
C.
both (a) and (b)
D.
None of the above.
Ans.
A
47.
In error detection, the receiver asks the sender to send the data again.
A.
forward
B.
backward
C.
retransmission
D.
None of the above.
Ans.
C
48.
In a ____________, only one bit in the data unit has changed.
A.
Single-bit error
B.
Burst error
C.
both (a) and (b)
D.
None of the above
Ans.
A
49.
A ________ means that 2 or more bits in the data unit have changed.
A.
Single-bit error
B.
Burst error
C.
both (a) and (b)
D.
None of the above
Ans.
B
50.
Instead of repeating the entire data stream, a shorter group of bits may be
appended to the end of each unit. This technique is called __________.
A.
redundancy
B.
repetition
C.
appending
D.
None of the above
Ans.
A
51.
Types of redundancy checks in data communications are
A.
Vertical Redundancy Check (VRC) and Longitudinal Redundancy Check (LRC)
B.
Cyclic Redundancy Check (CRC)
C.
Checksum
D.
All of the above
Ans.
D
52.
__________ is also called Parity Check.
A.
Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic
Redundancy Check (CRC) D. Checksum
Ans.
A
53.
____________ detects single-bit error.
A.
Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic
Redundancy Check (CRC) D. Checksum
Ans.
A
54.
In ______, a block of bits is organized in a table (rows and columns). The
parity bit for each column is checked and
a new row of eight bits which are
parity bits for the whole block is created. Original data with eight parity
bits are transferred to the receiver.
A.
Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic
Redundancy Check (CRC) D. Checksum
Ans.
B
55.
_____________ method is working based on binary division.
A.
Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic
Redundancy Check (CRC) D. Checksum
Ans.
C
56.
In Cyclic Redundancy Checking, what is the CRC?
A.
Quotient B. Dividend C. Divisor D. Remainder.
Ans.
D
57.
In Cyclic Redundancy Checking, the divisor is _________ the CRC.
A.
one bit less than
B.
one bit more than
C.
the same size as
D.
None of the above
Ans.
B
58.
Which error detection method uses one's complement arithmetic?
A.
Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic
Redundancy Check (CRC) D. Checksum
Ans.
D
59. ____________ is used to
denote the difference between two binary strings.
A.
Hamming distance
B.
Hamming code
C.
Hamming rule
D.
None of the above
Ans.
A
60.
Functional mechanisms in flow control are
A.
acknowledgment
B.
timeout
C.
both (a) and (b)
D.
None of the above
Ans.
C
61.
If the sender does not receive ACK up to reasonable amount of time, the it
retransmit the original frame; waiting for reasonable amount of time is called
__________.
A.
acknowledgment
B.
timeout
C.
both (a) and (b)
D.
None of the above
Ans.
B
62.
The general strategy of using acknowledgments and timeouts to implement
reliable delivery is sometimes called ___________.
A.
Automatic Repeat Request (ARQ)
B.
Delivery strategy
C.
both (a) and (b)
D.
None of the above
Ans.
A
63.
Stop and Wait Flow Control and Sliding Window Flow Control are the two
______________ mechanisms.
A.
flow control
B.
access control
C.
error control
D.
None of the above
Ans.
A
64.
In the sliding window method of flow control, the receiver window _____ in size
when frames are received.
A.
decreases
B.
increases
C.
does not change
D.
None of the above
Ans. A
65.
In the sliding window method of flow control, the receiver window _____ in size
when an ACK is sent.
A.
decreases
B.
increases
C.
does not change
D.
None of the above
Ans.
B
66.
The receiver's window in a sliding window protocol expands when _______________
.
A.
an ACK is received. B. an ACK is sent. C. a frame is received D. a frame is
sent
Ans.
B
67.
The sender's window in a sliding window protocol expands when _______________ .
A.
an ACK is received. B. an ACK is sent. C. a frame is received D. a frame is
sent
Ans.
A
68. An
ideal channel in which no frames are lost, duplicated or corrupted is regarded
as _______________.
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
D. None of the above
Ans. A
69. The Simplest protocol and
Stop and Wait protocol are for
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
D. None of the above
Ans. A
70. The
__________ protocol has neither flow nor error control.
A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D.
Selective-Repeat ARQ
Ans. B
71. In
the ________ Protocol, the sender sends its frames one after another with no
regard to the receiver
A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D.
Selective-Repeat ARQ
Ans. B
72. The
__________ protocol has flow control but not error control.
A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D.
Selective-Repeat ARQ
Ans. A
73. In
the ________ Protocol, the sender sends one frame, stops until it receives
confirmation from the receiver, and then sends the next fame.
A. Stop-and-Wait B. Simplest C. Go-Back-N ARQ D.
Selective-Repeat ARQ
Ans. A
74. ____________ means that there will be lot of
disturbance in the path when data is carried forward from sender to receiver.
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
D. None of the above
Ans. B
75. Stop-and-Wait Automatic
Repeat Request, Go-Back-N Automatic Repeat Request and Selective Repeat
Automatic Repeat Request are for _________________
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
D. None of the above
Ans.
B
76.
A technique called _____________ is used to improve the efficiency of the
bidirectional protocols. When a frame is carrying data from A to B, it can also
carry control information about arrived (or lost) frames from B; when a frame
is carrying data from B to A, it can also carry control information about the
arrived (or lost) frames from A.
A. piggybacking
B. synchronization
C. both (a) and (b)
D. None of the above.
Ans. A
77. The __________ Protocol, adds
a simple error control mechanism to the __________ Protocol.
A.
Stop-and-Wait ARQ; Stop-and-Wait
B.
Go-Back-N ARQ; Stop-and-Wait
C.
Selective Repeat ARQ; Go-Back-N ARQ
D.
None of the above
Ans.
A
78. In the __________ Protocol,
if no acknowledgment for a frame has arrived, we resend all outstanding frames.
A.
Stop-and-Wait ARQ; Stop-and-Wait
B.
Go-Back-N ARQ; Stop-and-Wait
C.
Selective Repeat ARQ; Go-Back-N ARQ
D.
None of the above
Ans.
B
79. In the __________ Protocol,
we avoid unnecessary transmission by sending only frames that are corrupted.
A.
Stop-and-Wait ARQ; Stop-and-Wait
B.
Go-Back-N ARQ; Stop-and-Wait
C.
Selective Repeat ARQ; Go-Back-N ARQ
D.
None of the above
Ans.
C
80. Both Go-Back-N and
Selective-Repeat Protocols use a __________.
A.
Sliding frame
B.
Sliding window
C.
Sliding packet
D.
None of the above
Ans.
B
81.
Multiple-access protocols are categorized into the following groups.
A.
Random access protocols
B.
Controlled-access protocols
C.
Channelization protocols
D.
All of the above
Ans.
D
82. In _________ method, no
station is superior to another station. No station is assigned the control over
another.
A.
Random access
B.
Controlled-access
C.
Channelization
D.
None of the above
Ans.
A
83. No rules specify which
station should send next. Stations compete with one another to access the
medium. That is why these methods are also called _________.
A.
Random access
B.
Contention methods
C.
Both (a) and (b)
D.
None of the above
Ans.
B
84. In ________, each station
sends a frame whenever it has a frame to send.
A.
pure ALOHA
B.
slotted ALOHA
C.
both (a) and (b)
D.
None of the above
Ans.
A
85. Pure ALOHA dictates that when
the time-out period passes, each station
waits a random amount of time before resending its frame. The randomness will
help avoid more collisions. This time is called the _________.
A.
Back-off time
B.
time-out time
C.
both (a) and (b)
D.
None of the above
Ans.
A
86. The length of time in which
there is a possibility of collision is the ___________.
A.
vulnerable time
B.
Back-off time
C.
time-out time
D.
None of the above
Ans.
A
87. In pure ALOHA, the vulnerable
time is ________ the frame transmission time.
A.
two times
B.
three times
C.
the same as
D.
None of the above
Ans.
A
88. _________ was invented to
improve the efficiency of pure ALOHA.
A.
Slotted ALOHA
B.
ALOHA
C.
both (a) and (b)
D.
None of the above
Ans.
A
89. The ________ is defined as
average successful traffic transmitted between stations per unit time.
A.
throughput
B.
output
C.
input
D.
None of the above
Ans.
A
90. When two or more stations
transmits message on channel, the signals will superimpose on each other and is
garbled beyond the decoding ability of receiving station, this is called
___________.
A.
Collisions
B.
Congestions
C.
both (a) and (b)
D.
None of the above
Ans.
A
91. In ___________________, the
chance of collision can be reduced if a station senses the medium before trying
to use it.
A.
Multiple Access B. Carrier Sense Multiple Access (CSMA) C. FDMA D. CDMA
Ans.
B
92. __________ is based on the
principle ‘Sense before transmit'.
A.
Multiple Access B. Carrier Sense Multiple Access (CSMA) C. FDMA D. CDMA
Ans.
B
93. _______ augments the algorithm
to detect the collision.
A.
Multiple Access
B.
Carrier Sense Multiple Access (CSMA)
C.
CSMA/CD (Carrier Sense Multiple Access (CSMA)/Collision Detection (CD))
D.
None of the above
Ans.
C
94. In the ________, a station
monitors the medium after it sends a frame to see if the transmission was
successful. If so, the station is finished. If, however, there is collision,
the frame is sent again.
A.
Multiple Access
B.
Carrier Sense Multiple Access (CSMA)
C.
CSMA/CD
D.
None of the above
Ans.
C
95. ______________________________
was invented to avoid collisions on wireless networks.
A.
Carrier Sense Multiple Access (CSMA)
B.
CSMA/CD
C.
CSMA/CA (Carrier Sense Multiple Access (CSMA)/Collision Avoidance (CA))
D.
None of the above
Ans.
C
96. In ____________, Collisions
are avoided through the use of three strategies, namely, Interframe Space
(IFS), Contention Window and Acknowledgment.
A.
Carrier Sense Multiple Access (CSMA)
B.
CSMA/CD
C.
CSMA/CA
D.
None of the above
Ans.
C
97. In ___________, the stations
consult one another to find which station has the right to send.
A.
controlled access
B.
random access
C.
channelization
D.
None of the above
Ans.
A
98. Number of popular
controlled-access methods is
A.
one B. two C. three D. four
Ans.
C
99. In the ________ method, a
station needs to make a reservation before sending data.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
A
100. In the ________ method, time
divided into intervals. In each interval, a reservation frame precedes the data
frames sent in that interval.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
A
101. In the _______, one device
is designated as a primary station and the other devices are secondary
stations. All data exchanges must be made through the primary device.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
B
102. In the ________, the primary
device controls link; the secondary devices follow its instructions.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
B
103. In the ______ method, the
stations in a network are organized in a logical ring.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
C
104.
In the ________ method, for each station, there is a predecessor and a
successor.
A.
reservation
B.
Polling
C.
Token passing
D.
None of the above
Ans.
C
105. In the __________ method, a
special packet called a __________ circulates through the ring.
A.
reservation; control frame
B.
polling; poll request
C.
token passing; token
D.
None of the above
Ans.
C
106. ______________ is a
multi-access method in which the available bandwidth of a link is shared in
time, frequency, or through code between different stations.
A.
Channelization
B.
Random access
C.
Controlled access
D.
None of the above
Ans.
A
107. Three channelization
protocols are
A.
Frequency-Division Multiple Access (FDMA)
B.
Time-Division Multiple Access (TDMA)
C.
Code-Division Multiple Access (CDMA)
D.
all of the above
Ans.
D
108. In ____________________, the
available bandwidth is divided into frequency bands.
A.
Frequency-Division Multiple Access (FDMA)
B.
Time-Division Multiple Access (TDMA)
C.
Code-Division Multiple Access (CDMA)
D.
all of the above
Ans.
A
109. In _____________, the
stations share the bandwidth of the channel in time.
A.
Frequency-Division Multiple Access (FDMA)
B.
Time-Division Multiple Access (TDMA)
C.
Code-Division Multiple Access (CDMA)
D.
all of the above
Ans.
B
110. In ______________, the
stations use different codes to achieve multiple access.
A.
Frequency-Division Multiple Access (FDMA)
B.
Time-Division Multiple Access (TDMA)
C.
Code-Division Multiple Access (CDMA)
D.
all of the above
Ans.
C
111.
_________ is a baseband LAN specification invented in 1970s by Xerox
Corporation that operates at 10 Mbps using CSMA/CD to run over coaxial cable.
A.
Ethernet
B.
Internet
C.
intranet
D.
None of the above
Ans.
A
112. The term ________ is now
often used to refer to all CSMA/CD LANs.
A.
Ethernet
B.
Internet
C.
intranet
D.
None of the above
Ans.
A
113. In ethernet, the __________
field is actually added at the physical layer and is not formally part of the
frame.
A.
CRC
B.
preamble
C.
Type
D.
None of the above
Ans.
B
114. In the Ethernet frame, the
_________ field contains error detection information
A.
CRC
B.
preamble
C.
Type
D.
None of the above
Ans.
A
115. Ethernet, _________ is one
of the most widely used standards for computer networking and general data
communications.
A.
IEEE 802.3
B.
IEEE 802.1
C.
IEEE 802.5
D. None of the above
Ans.
A
116. 10Bae5, 10Base2, 10BaseT and
10Base F are Categories of Base Band in ________.
A.
IEEE 802.3
B.
IEEE 802.1
C.
IEEE 802.5
D.
None of the above
Ans.
A
117. In 10Base5, 10 specifies
____________.
A.
data rate in Mbps
B.
baseband
C.
cable type or length limit
D.
None of the above
Ans.
A
118. In 10Base5, Base specifies
____________.
A.
data rate in Mbps
B.
baseband
C.
cable type or length limit
D.
None of the above
Ans.
B
119. In 10Base5, 5 specifies
____________.
A.
data rate in Mbps
B.
baseband
C.
Maximum segment length
D.
None of the above
Ans.
C
120. ________ wireless LANs are
sometimes called wireless Ethernet.
A.
IEEE 802.11
B.
IEEE 802.
C.
IEEE 802.1
D.
IEEE 802.5
Ans.
A
121. ________ operates on the
physical and data link layers.
A.
IEEE 802.11
B
IEEE 802.3
C.
IEEE 802.1
D.
IEEE 802.5
Ans.
A
122.
In __________ wireless LAN, an Access Point (AP) is installed to act as Bridge
between Wireless and Wired Network
A.
IEEE 802.11
B.
IEEE 802.3
C.
IEEE 802.1
D.
IEEE 802.5
Ans.
A
123. Basic Service Set (BSS) and
Extended Service Set (ESS) are two kind services defined by_____________.
A.
IEEE 802.11
B.
IEEE 802.3
C.
IEEE 802.1
D.
IEEE 802.5
Ans.
A
124. In IEEE 802.11, a
____________ is made of stationary or mobile wireless stations and an optional
central base station, known as the Access Point (AP).
A.
BSS
B.
ESS
C.
DSS
D.
None of the above
Ans.
A
125. The BSS without an AP is a
stand-alone network and cannot send data to other BSSs. It is called an
_______________ .
A.
ad hoc network
B.
infrastructure network
C.
both (a) and (b)
D.
None of the above
Ans.
A
126. A BSS with an AP is
sometimes referred to as an _____________.
A.
ad hoc network
B.
infrastructure network
C.
both (a) and (b)
D.
None of the above
Ans.
B
127. In IEEE 802.11,
communication between two stations in two different BSSs usually occurs via two
_________.
A.
BSSs
B.
ESSs
C.
APs
D.
None of the above
Ans.
C
128. In IEEE 802.11, an
___________ is made up of two or more BSSs with Access Points (AP).
A.
BSS
B.
ESS
C.
DSS
D.
None of the above
Ans.
B
129. A station with ____________
mobility is either stationary (not moving) or moving only inside a BSS.
A.
no-transition
B.
BSS-transition
C.ESS-transition
D.
None of the above
Ans.
A
130. A station with ___________
mobility can move from one BSS to another, but the movement is confined inside
one ESS.
A.
no-transition
B.
BSS-transition
C.ESS-transition
D.
None of the above
Ans.
B
131. A station with ____________
mobility can move from one ESS to another.
A. no-transition
B.
BSS-transition
C.ESS-transition
D.
None of the above
Ans.
C
132. __________ defines two types
of MAC sublayers, namely, the Distributed Coordination Function (DCF) and the
Point Coordination Function (PCF)
A.
IEEE 802.11
B
IEEE 802.3
C.
IEEE 802.1
D.
IEEE 802.5
Ans.
A
133. In wireless networking, the
__________ or hidden terminal problem occurs when a node is visible from a
wireless access point (AP), but not from other nodes communicating with said
AP. This leads to difficulties in media access control.
A.
hidden node problem
B.
congestion problem
C.
visibility problem
D.
None of the above
Ans.
A
134. In IEEE 802.11, __________
is an optional access method that can be implemented in an infrastructre
network (not in an ad hoc network).
A.
DCF
B.
PCF
C.
both (a) and (b)
D.
None of the above
Ans.
B
135. Which one of the following
is not defined by IEEE 802.11 wireless LAN
A.
Management frames
B.
Control frames
C.
Data frames
D.
Administrative frames
Ans.
D
136.
Bluetooth is a ___________ technology designed to connect devices of different
functions such as telephones, notebooks, computers, cameras, printers, coffee
makers, and so on.
A.
Wireless LAN
B.
Wired LAN
C.
LAN
D.
None of the above
Ans.
A
137. Bluetooth is a low cost, low
power, short range ___________________ technology.
A.
wireless communication
B.
wired LAN
C.
LAN
D.
None of the above
Ans.
A
138. Bluetooth network is called
a _______.
A.
piconet
B.
Scatternet
C.
extranet
D.
None of the above
Ans.
A
139. Piconet (bluetooth) can have
up to _______ stations, one of which is called the master (primary device); the
rest are called slaves (secondary devices).
A.
8 B. 7 C. 6 D. 5
Ans.8
140. Piconets can be combined to
form what is called a ____________.
A.
piconet
B.
Scatternet
C.
extranet
D.
None of the above
Ans.
B
141. In Bluetooth, the
___________ layer is roughly equivalent to the physical layer of the Internet
model.
A.
radio
B.
baseband
C.
L2CAP
D.
None of the above
Ans.
A
142. In Bluetooth, the
___________ layer is roughly equivalent to the MAC sublayer in LANs.
A.
radio
B.
baseband
C.
L2CAP
D.
None of the above
Ans.
B
143. In Bluetooth, the
___________ layer is roughly equivalent to the LLC sublayer in LANs.
A.
radio
B.
baseband
C.
L2CAP
D.
None of the above
Ans.
C
144. The access method in
Bluetooth is
A.
FDMA
B.
CDMA
C.
TDD-TDMA
D.
None of the above
Ans.
C
145. In Bluetooth, the __________
link is used when avoiding latency is more important than integrity.
A.SCO
B. ACL C. ACO D. SCL
Ans.
A
146. In Bluetooth, _____ is used
when data integrity is more important than avoiding latency.
A.SCO
B. ACL C. ACO D. SCL
Ans.B
147. Usage of Bluetooth can be
categorized as
A.
Adhoc networking
B.
Cable replacement
C.
Access points for data and voice
D.
All of the above
Ans.
D
148. Both Bluetooth and Wi-Fi are
used for providing wireless communication through radio signals. The most
distinction between Bluetooth and Wifi is that,
A.
Bluetooth is actually accustomed connect short-range devices for sharing
information whereas Wifi is used for providing high-speed web access or
internet.
B.
both are same
C.
both (a) and (b)
D.
None of the above
Ans.
A
149.
Which one of the following is not a connecting device in internetworking.
A.
Hub B. Repeater C. Bridge D. Conduit
Ans.
D
150. All networks except those
using co-axial cable require a central location to bring media segment
together. These central locations are called _______.
A.
Hubs B. Repeaters C. Bridges D. Routers
Ans.
A
151. A ___________ simply
combines the signals of network segments. There is no signal regeneration.
A.
Passive hubs
B.
Active hubs
C.
Intelligent hub
D.
None of the above
Ans.
A
152. _______________ is that
regenerates or amplifies the signals.
A.
Passive hubs
B.
Active hubs
C.
Intelligent hub
D.
None of the above
Ans.
B
153. ______________ regenerates
the signal and performs some network management and intelligent path selection.
A.
Passive hubs
B.
Active hubs
C.
Intelligent hub
D.
None of the above
Ans.
C
154. Repeater operates in the ____________________.
A.
Physical layer
B.
Data link layer
C.
Network layer
D.
None of the above
Ans.
A
155. Repeater recognizes
______________ address.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Application layer
Ans.
A
156. A ___________ receives a
signal and before it becomes too weak or corrupted, regenerates the original
bit pattern. The repeater then sends the refreshed signal.
A.
Hubs B. Repeaters C. Bridges D. Routers
Ans.
B
157. The basic purpose of a
_________ is to extend the distance of LAN.
A.
Hub B. Repeater C. Bridge D. Router
Ans.
B
158. A ___________ does not
amplify the signal; it regenerates the signal.
A.
Repeater B. Hub C. Bridge D. Router
Ans.
A
159. A station on a Token Ring
LAN can act as a __________________.
A.
Hub B. Repeater C. Bridge D. (b) or (c)
Ans.
D
160. Which one of the following
is not a type of repeater?
A.
Single port repeater & Multiport repeater B. Smart repeater C. Optical
repeater D. Audio repeater
Ans.
D
161. A Bridge operates in both ______________.
A.
Physical and Data link layer
B.
Data link and Network layer
C.
Network and Transport layer
D.
Transport and Session layer
Ans.
A
162. A _________ extends the
maximum distance of network by connecting separate network segment, and simply
passes on all the signals it receives. It reads the address of all the signal
it receives.
A.
Hub B. Repeater C. Bridge D. Router
Ans.
C
163. A Bridge recognizes
______________ address.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
None of the above
Ans.
A
164. A bridge performs the
following functions.
A.
Frame filtering and forwarding
B.
Learning the address
C.
Routing
D.
All of the above
Ans.
D
165. Which of the following
functions that a bridge cannot perform are
A.
Bridge cannot determine the most efficient path
B.
Traffic management function
C.
Both (a) and (b)
D.
None of the above
Ans.
C
166. Switches operate at the
_____________ layer of the OSI model.
A.
Physical B. Data link C. Network D. Transport
Ans.
B
167. _________ divide a network
into several isolated channels or collision domains.
A.
Repeaters B. Hubs C. Bridges D. Switches
Ans.
D
168. A Router recognizes
______________ address.
A.
Data link layer
B.
Network layer
C.
both (a) and (b)
D.
None of the above
Ans.
C
169. A __________ is a three
layer device that routes packets based on their logical addresses. It connects
two or more networks.
A.
Repeater B. Hub C. Bridge D. Router
Ans.
D
170. The key features of a
____________ is to determine the shortest path to destination.
A.
Repeater B. Hub C. Bridge D. Router
Ans.
D
171. A ________________ connects
two independent networks. It is a protocol converter.
A.
Repeater B. Hub C. Bridge D. Gateway
Ans.
D
172. A Gateway recognizes
______________ address.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Application layer
Ans.
C
173. A gateway operates in
____________ of the OSI model.
A.
physical layer B. data link layer C. network layer D. all seven layers
Ans.
D
174. Network Interface Cards
(NIC) are also called _________.
A.
Network adapter
B.
Memory Cards
C.
Expansion cards
D.
None of the above
Ans.
A
175. A ___________ is a hardware
component without which a computer cannot be connected over a network.
A.
Network Interface Card (NIC)
B.
Memory Cards
C.
Expansion cards
D.
None of the above
Ans.
A
176. _________ is a circuit board
installed in a computer that provides a dedicated network connection to the
computer. It is also called network interface controller, network adapter or
LAN adapter.
A.
NIC
B.
Memory Cards
C.
Expansion cards
D.
None of the above
Ans.
A
177. Purpose of NIC are
A.
NIC allows both wired and wireless communications.
B.NIC
allows communications between computers connected via local area network (LAN)
as well as communications over large-scale network through Internet Protocol
(IP).
C.
NIC is both a physical layer and a data link layer device, i.e. it provides the
necessary hardware circuitry so that the physical layer processes and some data
link layer processes can run on it.
D.
All of the above
Ans.
D
178. _________ is a device which
has a block of memory, reserved for storing incoming data until they are
processed.
A.
Memory card
B.
Chip
C.
Buffer
D.
None of the above
Ans.
C
179. In selective reject ARQ
only, specific damaged or lost frame is transmitted.
A.
Selective reject ARQ
B.
ARQ
C.
go-back N ARQ
D.
Selective-Repeat ARQ
Ans.
A
180. ________________________ is
a Local Area Network configured by software, not by physical wiring.
A.
Metropolitan Area Network (MAN)
B.
Virtual Local Area Network (VLAN)
C.
Personal Area Network (PAN)
D.
None of the above
Ans.
B
Various LAN architectures are:
A.
Ethernet
B.
Token Bus & Token Ring
C.
FDDI
D.
All of the above
The types of Ethernet Networks
are
A.
Switched Ethernet
B.
Fast Ethernet
C.
Gigabit Ethernet
D.
All of the above
Ans.
D
Types of S-frames are
A.
Receive Ready (RR), Receive Not Ready
(RNR), Reject (REJ), Selective Reject (SREJ)
B.
Receive Ready (RR), Receive Not Ready
(RNR), Reject (REJ)
C.
Receive Ready (RR), Receive Not Ready
(RNR)
D.
None of the above
Ans.
A
Categories of U-frames are
A.
Mode Setting, Unnumbered Exchange, Disconnection, Initialization Mode,
Miscellaneous Mode
B.
Mode Setting, Unnumbered Exchange, Disconnection, Initialization Mode
C.
Mode Setting, Unnumbered Exchange, Disconnection
D.
Mode Setting, Unnumbered Exchange
Ans.
A
Dr. Selvaganesan
Dept of IT, JJCET
No comments:
Post a Comment