Вы находитесь на странице: 1из 10

NARAYANA ENGINEERING COLLEGE: NELLORE

ACADEMIC YEAR: 2012-2013

IT DEPARTMENT
YEAR : III B.TECH

SUBJECT: COMPUTER NETWORKS


EVEN SEMESTER

FACULTY NAME: G.SUHASINI


UNIT 1 MULTIPLE CHOICE 1. Which layer is responsible for transmitting the frames sequentially [ a. sessions layer b. network layer c.Data link layer d. transport layer. 2. What are the protocols in the TCP/IP model? a. ARPNET b. LAN c.SATNET b. FTP 3. a. b. c. d. What is the full form of ISDN Integrated services digital network. Interface services digital network. Interface system digital network. Integrated system digital network. [ ]. ].

].

4. In TCP _________ comes first. a. Network b. protocols c. transmission d.none. 5. Protocols in network layer are _________. a. telnet b. Arpanet c.udp d. both a &c.

].

].

6. Session layer deals with __________. [ ]. a. flow control b. framing c.ack frames d.token management. 7. Fiber optics can carry digital signal in the form of _______.[ a. waves b. signal c. microwaves d. light. ].

8. Coaxial cable can carry signals of higher frequency than _________.[ a. twisted pair cable b. fiber optical c. both 1 & 2. d. none. 9. Which type of Switching is Better _____ [ ] a. Circuit Switching b. Packet Switching c.Message Switching d. All 10.Which device is useful to convert Digital signals to Analog signals [ a.Modem b. Switch c. Trunk d. Junction Box FILL IN THE BLANKS ]

].

1. Unreliable connectionless service is often called __________________. 2. _______________ and_____________ layers are not present in TCP/IP reference model. 3. Multi mode fiber has ___________________ quality.

4 We use ____________ to strengthen the signal periodically. 5. Physical layer is concerned with transmitting ___________ over the channel. 6. OSI refers to -------------------------------7. A set of layers and protocols is called ------------------------8. Is layer ----------- responsible for breaking up incoming messages into smaller units 9. Does layer --------------- adds header to each and every packet 10. ---------------- services order of messages is preserved UNIT 2

MULTIPLE CHOICE 1. Data link layer adds ________ to a frame . [ ]. a. header b. trailer b. both header and trailer d. none. 2. Protocol in which the sender sends one frame and then waits for an ack before proceeding is _______ protocol. [ ]. a. simplex protocol b. sliding window protocol c. stop and wait protocol d. none. 3. The strategy for handling errors when frames are pipelined called _________.[ a. go back n b. selective repeat c. both 1 &2. d. none. ].

4. Sliding window protocol can be categorized by the _________ of sender and receiver. [ ]. a. data b. window of equal size c. window of different size d. window equal to 1. 5. data link layer can provide ________ services. [ ]. a. error control b. framing c. adding headers d. all. 6.Which techinique DLL follows to Detect the Erros [ a.CRC 12 b. CRC 16 c. CRC-CCITT d. All ]

7.How many extra zeros we append to the frames for CRC CCITT [ a. 10 b. 12 c. 16 d. 32

8.How many frames does 1-bit sliding window protocol can send per frame time [ a. 0 b. 1 c. 10 d. 100 9.Which is the first Protocol which can handle the Error Control Issue [ a. Restricted Simplex protocol b. Stop & wait protocol c.Sliding window protocol d. Go Back N protocol ]

10. unrestricted simplex protocol transfers data in ___________ direction. [ a. one direction b. both directions c. no limits d limits restricted.

].

FILL IN THE BLANKS 1. protocols in which sender waits for a positive ack before advancing to the next data are called ______________. 2. What is Flow Control ___________________ 3. What is Time Out _________________ 4. Which technique used by DLL to Correct the Errors ________________ 5. What is CRC stands for _____________________ 6Information ---------- carry data to be transmitted to the user 7.P/F stands for -----------8.CRC used to --------------------9.Hamming code used ----------------10----------- occures when source did not receive the Acknowledge UNIT- 3 MULTIPLE CHOICE 1.Medium access sublayer is Sublayer _____________________ [ ]

a. Datalink layer b. Physical layer c. Network layer d. All the above

2. Channle allocation can be done in Mac ___________________ [ ] a.Static Allocation b. Dynamic allocation c. Both A&B d.None 3. In slotted Aloha Based on what channel can be allocated to Hosts [ a.Priority b.Improtence c. Seviority d. Time 4.with how much probability 1-Persistant CSMA can sends the Data [ a. 0 b. 1 c. 10 d. 0.5 5. the efficiency of Pure Aloha is [ ] a. 10 % b. 15% c. 18% d.20% 6.The access signaling method used for 802.4 token bus is _______.[ a. Manchester b. differential Manchester 3. Both 4.none 7.The efficiency of slotted aloha [
a.10 % b.20% c.37% d.40%

].

8. The length of preamble field in 802.3 is _______ bytes. [ ]. a. 8 bytes b. 6 bytes c.7 bytes d. 4 bytes. 9. The transmission media used in 10 base 2 is___________.[ ]. a. thin coaxial cable b. unshielded c. 850- nm optical d. Ethernet. 10. The topology used in 10 base t is __________[ a. bus b. star c. ring d. mesh.

]..

FILL IN THE BLANKS

1. The protocol which is used to determine who goes next on a multi access channel which belongs to DDL is called __________________. 2. Efficiency of Slotted aloha is _______________ 3. Channel utilization of pure aloha is _______________________. 4. CSMA/CD stands for _____________________ 5. What is MACA stands for ___________________ 6. Token bus uses ---------- protocol 7. Data flows only in a particular direction in ------------8. Slotted Aloha got better performance then -------------9. P-Persistant sends the dat with P------------------10Lanprotocols works with in Radio Range [ ] UNIT-4 MULTIPLE CHOICE 1. In connectionless service each packet is ____________.[ a. Routed based on routers b. Routed independently c. Follow same route d. None

].

2. The shortest path routing can be calculated basing on[ ]. a. the no of hops b. geographical distance in kilometers c. both d.none. 3. Flooding results in ______________[ ]. a. finite no of duplicate packets b. infinite number of duplicate packets. c. no duplication of packets d. packets are duplicates based on no of hops. 4. The disadvantages of distance vector routing are __________.[ ]. a. link state routing b. count to infinity c. split horizon hack d. both 2 & 3. 5. the requirement of link state routing algorithm is_____________.[ ]. a. estimate delay of each neighbor b. estimate the cost to each neighbor c. estimate traffic to each neighbor c. estimate distance to each neighbor. 6. In measuring line cost ________ is taken into account when measuring delay. [ ]. a. traffic b. load c. weight d. cost. 7.VC falls under ____________ [ ] a.Connection Oriented service b. Connection less service c. Both d. none 8.A spanning tree is a subset of subnet that includes all the routers but not the _______.[ ]. a. edges b. vectors c. loops d. paths. 9. Multicasting is used to send packets to _________.[ a. network b. routers c. group of nodes d. hosts. ].

10.congestion means ________.[ ]. a. load > resources b. resource < load c. load < resource d. none. FILL IN THE BLANKS

Monitoring a traffic flow is called _________________. Sink tree does not contains ________________ Give two Examples of broadcasting ______________ The table maintained by distance vector routing is called ___________. 6.----------- are generally used in subnets whose primary service is connectionless 7.--------- in connectionless are called datagrams 8.In ------------ service it is difficult to handle congestion control 9.----------s algorithm is used to find shortest path 10.------------ table gives the best known distance to each destination and which line to access to reach there
UNIT-5 MULTIPLE CHOICE 1. Device which is used to connect different types of Networks [ a. Bridges b. Routers c. Black Box d. Junction Box ]

1. 2. 3. 4. 5.

Adoptive algorithm takes the routing decision based on ________________

2.Technique used to transfer data from one network to other network using intermediate network [ ] a.Internet b. Tunnelling c.Multiplexing d.Switching 3.What is the first field which is comes in IP protocol [ a. IHL b. Version c. DF d. MF ]

4.How much memory is allocated for Header in IP protocol [ ] a. 10 b. 20 c.30 d.40 5.Which field is used to indicate Destination not to fragment the incoming data in IP protocol [ ] a. MF b. DF c. Both d. None 6.Source Address in IP protocol should consist of [ ] a.Source Machine Numer b. Network Address of Source c. Both d.none 7.What are the protocols that falls under Internet control protocols [ ] a.BOOTP b. ARP c.RARP d. All 8.IP address should consist of [ ] a.Host number b. Network number c.Both a&b

d.none

9._________ store and forward data link frames between LANs [ ] a.switches b. Bridges c.Routers d. None

10._______________ forward packets between dissimilar networks [ ] a.Routers b.Junctions c.Multiprotocol Routers d. Single protocol Routers

FILL IN THE BLANKS 1.What is Tunnelling ________________ 2. Two protocols used under Internet Routing _____________ 3.Network Numbers assigned by _____________ 4.how to broadcast packet in Local Network _______________________ 5.How to broadcast packet in Distant network _______________________ 6.Version field indicates which ------- the protocol belongs to 7.Tunneling comes under -----------8.all 1s will be used to----------packet in local network 9.the lowest address in ----------- address is 0.0.0.0 10.---------- address contains both Destination number & Network Number UNIT-6 MULTIPLE CHOICE
1. The ________ is the heart of the whole protocol hierarchy. [ ] a. Network layer b. transport layer c. application layer d. physical 2.

3.

4.

5. 6.

7.

layer The transport layer task is to provide ________________ independently of the physical network or networks currently in use. [ ] a. Cost-effective b. reliable c. both a and b d. effective transport _________is used for messages sent from transport entity to transport entity.[ ] a. TDP b.UDP c. TPDU d. TDPU The packet lifetime management congestion prevention policy is implemented on ----------layer a) Transport b) Session c) Network d) Datalink What is the primary function of transport layer [ ] a)Quality of service b) Transport entity c) Peak cell rate d) Cell rate In flow control and buffering, which among the following only one per connection [ ] a) chained-size buffers b) chained-variable buffers c) circular buffer d) fixed size buffers. For the connection request in TCP Header [ ]

a) Syn = 1 b) Ack =0 c) Both a&b d) none 8. which kind of problem is used for releasing a connection a) Three-way handshake b) Two-army c) Three army 9. How many ports does Transport layer supports [ ] a) Single b)Multiple c)Double d)Zero

[ d) Two-way handshake.

10. UDP transmits segments consisting of an ___byte header followed by the payload [ ] a) 6 b)8 c)7 d)10

FILL IN THE BLANKS

11. The hardware and/or software within the transport layer that does the work is called the ________ 12. TSAP stands for _________________ 13. how many Service Access point Network Layer supports ______________ 14. Sending a packet to all destinations simultaneously is called --------------------15. For the connection reply in TCP what are the values for SYN _______ and ACK __________ 16. There is addressing and flow control in ---------------17. The--------- layers i.e.,physical,datalink,network are called transport service user 18. The function of the-----------layer is routing packets packets from the source to the destination machines. 19. Transport layer supports multiple service access points ________________ 20. In ATM network ------------ message is used by a source host to set up a connection

Unit 7 MULTIPLE CHOICE 1) What is the minimum number of DNS name servers, does each domain should posses? a. 1 b. 2 c. 3 d. 4 2) The components in the domain name space are separated by _ _ _ _ _ _ _ _ _ _ _ _ _ _ [ ].. a. Comma b. Dot c. Colon d. Semi colon 3) DNS represents _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ structure[ ]. a. bus b. loop c. tree d. ring 4) The type of encoding in which manipulation of bit streams without regard to what the bits mean[ ]. is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Destination encoding b. Entropy encoding c. Source encoding d. Differential encoding 5) The moving of the messages from source to destination is done by ____________ agents[ ] a. user agents b.message tranfer agents c. By both d. None 6) Pages that point to other pages [ ] a. hyper text b. Hyper links c. Hyper media 7) Programs that search the web are called as [ ] a. search engines b. Spiders c. Worms d all 8) The type of encoding in which a sequence of values are encoded by representing each one as the difference from previous vallues [ ] a. Destination encoding b. Entropy encoding c. Source encoding d. Differential encoding 9.High end level protocols used by ___________________ [ ] a.Network layer b. Transport layer c.Application layer d.Session layer 10. Security is the issue of which layer ____________________ [ ] a.Network layer b. Transport layer c.Application layer d.Session layer

d. None

FILL IN THE BLANKS 11) The generic domain for nonprofit organizations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 12)SMTP is what type of protocol -_________________ 13)In e-mail system, _ _ _ _ _ _ _ _ _ _ _ _ _ move the message from the source to the destination. 14)SMTP is used to transfer _ _ _ _ _ _ _ 15) 15Pages are viewd with a program called ___________ 16)------ deals mapping the host name on Network 17)deals with fetching the host address 18)The protocol used to fetch information on the internet. Is ----------19)---------pages are written in C++ language. 20)Internet telephony is called as ------------UNIT-8 1)An example of public key algorithm is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [ a. RSA b. DES c. IREA d. RC5 2)Caeser cipher is represented as _ _ _ _ _ _ _ _ [ a. C = (p + 3) mod 3 b. C = (p + 26) mod 3 c. C = (p - 3) mod 26 d. C = (p + 3) mod 26 ]. ]

3)The art of breaking ciphers, called [ ] a) cryptanalysis b) cryptography c) cryptology d) cryptographic 4)Which of the following is the secret-key algorithms [ ] a) DES and IDEA b) RSA c) RSC d) only IDEA 5)------------------ is the modern adaptation for the security [ ] a) firewalls b) RSA c) cryptography d) DES 6)In -------------- each letter or group of letters is replaced by another letter or group of letters [ ] a) substitution b) transposition c) one-time pads d) redundancy 7.in which cypher technique each letter or group of letter is replaced by another letter or group of letter to disguise it [ ] a. substitution cipher b.transposition cipher c.one-time pads d.plain cipher

8.___________ secret key algorithm [ ] a.DES b. DES chaining c.IDEA d. All 9.________________is the technique by which a process verifys that its communication partner is genuine [ ] a. Authentication b.verfication c.validation d.Justification 10.In _________________one party can send a signed messge to another party [ ] a. signature b.digital signature c.secret key signature d.public key signature

FILL IN THE BLANKS 1.Digital signature is ________________________2.What are the examples for Public Key algorithms _________________________ 3.examples of Symetric key algorithms _____________________ 4.Define cryptography____________________ 5.Plain text can be obtained by using which equation _________________ 6.authentication protocol used in many real systems is ------7.DES Stands for ------------------8------------------ is the process of verifying the user 9. the art of breaking cypher is called ---------10.Output of Encryption process is -----------------

Вам также может понравиться