Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts
Objective Questions on Application Layer in OSI/TCP/IP Model set-3

Objective Questions on Application Layer in OSI/TCP/IP Model set-3


1) In a/an ........... of DNS resolver, instead of supplying a name and asking for an IP address, the DNS client provides the IP address and requests the corresponding host name.

A. Recursive queries

B. Iterative queries

C. Reverse queries

D. Inverse queries


2) For each resolved query, the DNS resolver caches the returned information for a time that is specified in each resource record in the DNS response. This is known as .........

A. Positive caching

B. Time To Live

C. Negative Caching

D. Reverse Caching


3) As originally defined in RFC 1134, .............. negative caching is the caching of failed name resolutions.

A. Positive caching

B. Time To Live

C. Negative Caching

D. Round Robin Load Balancing


4) ............... can reduce response times for names that DNS cannot resolve for both the DNS client and DNS servers during an iterative query process.

A. Positive caching

B. Time To Live

C. Negative Caching

D. Round Robin Load Balancing


5) The amount of time in seconds to cache the record data is referred to as the .........

A. Time To Cache

B. Time To Live

C. Time For Record

D. Time To Save


6) Which of the following issues arises, when multiple resource records for the same resource record type exist.

A. For the DNS server, how to order the resource records in the DNS Name Query Response message.

B. For the DNS client, how to choose a specific resource record in the DNS Name Query Response message.

C. Both of the above

D. None of the above.


7) To address the issues arises when multiple resource records for the same resource record type exist, RFC 1794 describes a mechanism named ................. to share and distribute loads for network resources.

A. Positive caching

B. Time To Live

C. Negative Caching

D. Round Robin Load Balancing


8) A ............ gets the data for its zones from locally stored and maintained files.

A. primary name server

B. secondary name server

C. ternary name server

D. primary name client


9) A ............. gets the data for its zones across the network from another name server.

A. primary name server

B. secondary name server

C. ternary name server

D. primary name client


10) The process of obtaining zone information across the network is referred to as a .........

A. zone obtaining

B. zone transfer

C. zone information

D. zone extracting


11) Which of the following is/are the reasons to have secondary name servers within an enterprise network.

A. Redundancy

B. Remote locations

C. Load distribution

D. All of the above


12) The source of the zone information for a secondary name server is referred to as a ..........

A. Name server

B. Primary Name Server

C. Master Name Server

D. Secondary Name Server


13) In .......... , when a name server receives a DNS query that it cannot resolve through its own zone files, it sends a recursive query to its forwarder.

A. exclusive mode

B. non-exclusive mode

C. caching mode

D. zonal mode


14) Which of the following is not the work done by a name server using a forwarder in exclusive mode, when attempting to resolve a name.

A. Checks its local cache

B. Checks its zone files

C. Sends a recursive query to a forwarder

D. Attempts to resolve the name through iterative queries to other DNS servers.


15) In ..........., name servers rely on the name-resolving ability of the forwarders.

A. exclusive mode

B. non-exclusive mode

C. caching mode

D. zonal mode


16) Name servers in ........... make no attempt to resolve the query on their own if the forwarder is unable to satisfy the request.

A. exclusive mode

B. non-exclusive mode

C. caching mode

D. zonal mode


17) ........... are DNS servers that only perform queries, cache the answers, and return the results.

A. Querying only server

B. Results only server

C. Caching only server

D. Information only server


18) In DNS resource records, ............ indicate primary and secondary servers for the zone specified in the SOA resource record, and they indicate the servers for any delegated zones.

A. SOA records

B. A records

C. MX records

D. NS records


19) In DNS resource records,......... specifies a mail exchange server for a DNS domain name.

A. SRV

B. MX

C. PTR

D. NS


20) In DNS resource records, .......... specifies the IP addresses of servers of a specific service, protocol and DNS domain.

A. SRV

B. MX

C. PTR

D. NS


Answers:

1) C. Reverse queries
2) A. Positive caching
3) C. Negative Caching
4) C. Negative Caching
5) B. Time To Live
6) C. Both of the above
7) D. Round Robin Load Balancing
8) A. primary name server
9) B. secondary name server
10) B. zone transfer
11) D. All of the above
12) C. Master Name Server
13) B. non-exclusive mode
14) D. Attempts to resolve the name through iterative queries to other DNS servers.
15) A. exclusive mode
16) A. exclusive mode
17) C. Caching only server
18) D. NS records
19) B. MX
20) A. SRV


Related Posts:

For more MCQ's on Computer Networks: Click Here


Solved MCQ on Application Layer in OSI/TCP/IP Model set-2

Solved MCQ on Application Layer in OSI/TCP/IP Model set-2


1) In MIME header field, ............. is a world unique value identifying the content of this part of this message.

A. content-type

B. content-transfer-encoding

C. content-description

D. content-id


2) The Post Office Protocol, version 3, is a standard protocol with STD number 53 and it is described in .....

A. RFC 1939

B. RFC 0937

C. RFC 2821

D. RFC 2822


3) .............. is an electronic mail protocol with both client and server functions.

A. SMTP

B. MIME

C. POP

D. TCP


4) In authentication state of POP3 server, ............ is used to specify a mechanism by which both authentication and data protection can be provided.

A. USER

B. PASS

C. APOP

D. AUTH


5) In transaction state of POP3 commands, .......... retrieve the number of messages and total size of the messages.

A. STAT

B. LIST

C. RETR

D. DELE


6) A MIME compliant message must contain a header field with the ........ verbatim text.

A. MIME-version:1.0

B. MIME-version:1.1

C. MIME-version:2.0

D. MIME-version:2.1


7) In ......... name space, a name is assigned to an address. It is a sequence of characters without structure.

A. hierarchical

B. sequential

C. flat

D. addressed


8) The main disadvantage of a ......... name space is that it cannot be used in a large system such as the internet because it may be centrally controlled to avoid ambiguity and duplication.

A. hierarchical

B. sequential

C. flat

D. addressed


9) The ......... protocol defines a set of messages sent over either User Datagram Protocol(UDP) port53 or Transmission Control Protocol(TCP) port53.

A. Name space

B. DNS

C. Domain space

D. Zone transfer


10) Primary specifications for DNS are defined in which of the following Request for Comments(RFCs)?

A. 974

B. 1034

C. 1035

D. All of the above


11) Which of the following is/are the components of DNS defined by RFC 1034?

A. The domain namespace and resource records

B. Name servers

C. Resolvers

D. All of the above


12) ............ are records in the DNS database that can be used to configure the DNS database server or to contain information of different types of process client queries.

A. Domain namespace

B. Resource records

C. Name servers

D. Resolvers


13) ........... store resource records and information about the domain tree structure and attempt to resolve received client queries.

A. Domain namespace

B. DNS Names

C. Name servers

D. Resolvers


14) ............ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.

A. Domain namespace

B. Resource records

C. Name servers

D. Resolvers


15) ........... have a very specific structure, which identifies the location of the name in the DNS namespace.

A. Domain namespace

B. DNS Names

C. Name servers

D. Resolvers


16) A ................... is a DNS domain name that has been constructed from its location relative to the root of the namespace is known as the root domain.

A. Fully Qualified Domain Name(FQDN)

B. Fully Structured Domain Name(FSDN)

C. Fully Constructed Domain Name(FCDN)

D. Fully Rooted Domain Name(FRDN)


17) State whether the following statements are True or False for the attributes of Fully Qualified Domain Name(FQDN).

i) FQDN are case-sensitive

ii) A period character separates each name.

iii) The entire FQDN can not be no more than 255 characters long.

A. i-True, ii-True, iii-False

B. i-True, ii-False, iii-True

C. i-False, ii-True, iii-True

D. i-False, ii-True, iii-False


18) A ...... is a contiguous portion of a domain of the DNS namespace whose database records exist and managed in a particular DNS database file stored on one or multiple DNS servers.

A. Subdomain

B. Zone

C. Sub DNS

D. Sub zone


19) In a/an ........... of DNS resolver, the queried name server is requested to respond with the requested data or with an error stating that data of the requested type or the specified domain name does not exist.

A. Recursive queries

B. Iterative queries

c. Reverse queries

D. Inverse queries


20) In MIME header field, ......... is a plain text description of the object within the body, which is useful when the object is not human-readable.

A. content-type

B. content-transfer-encoding

C. content-description

D.content-id

                                                                                                                                                                                                                Answers:

1) D. content-id
2) A. RFC 1939
3) C. POP
4) D. AUTH
5) A. STAT
6) A. MIME-version:1.0
7) C. flat
8) C. flat
9) B. DNS
10) D. All of the above
11) D. All of the above
12) B. Resource records
13) C. Name servers
14) D. Resolvers
15) B. DNS Names
16) A. Fully Qualified Domain Name(FQDN)
17) C. i-False, ii-True, iii-True
18) B. Zone 
19) A. Recursive queries
20) C. content-description


Related Posts:

For more MCQ's on Computer Networks: Click Here

MCQ Questions on Application Layer in OSI/TCP/IP Model set-1

MCQ Questions on Application Layer in OSI/TCP/IP Model set-1


1) Which of the following is/are the important applications of application layer?

A. Electronic mail

B. World Wide Web

C. USENET

D. All of the above


2) The TCP/IP ............. corresponds to the combined session, presentation, and application layers of the OSI model.

A. session layer

B. presentation layer

C. application layer

D. None of the above


3) The .......... protocol is based on end-to-end delivery.

A. SMTP

B. TCP

C. IP

D. SCTP


4) The well-known port of SMTP server is ........

A. 110

B. 25

C. 50

D. 20


5) In SMTP header field, ............. is a summary of the message being sent which is specified by the sender.

A. Reply-to

B. Return-path

C. Subject

D. From


6) In SMTP herder field, .......... is added by the final transport system that deilvers the mail.

A. Reply-to

B. Return-path

C. Subject

D. From


7) In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ..........

A. 220 service ready message

B. 421 service not available message

C. Both of the above

D. None of the above


8) In SMTP mail transaction flow, .......... is sent, to which the receiver will identify itself by sending back its domain name.

A. HELO

B. MAIL FROM

C. RCPT TO

D. DATA


9) ............ is a command-line tool designed for most UNIX-like operating systems, which does not define a method of transferring mail, but rather acts as a client/server that supports multiple mail protocols.

A. Recieivemail

B. Sendmail

C. MIME

D. POP


10) Which of the following is/are the components of sendmail?

A. Mail user agent(MUA)

B. Mail transfer agent(MTA)

C. Mail delivery agent(MDA)

D. All of the above


11) The ............ is the interface through which a user can read and send mail.

A. Mail user agent(MUA)

B. Mail transfer agent(MTA)

C. Mail delivery agent(MDA)

D. Mail send agent(MSA)


12) The ............ acts like a mail router, accepting messages from both MTAs and MUAs.

A. Mail user agent(MUA)

B. Mail transfer agent(MTA)

C. Mail delivery agent(MDA)

D. Mail send agent(MSA)


13) .......... uses a queuing system to manage inbound and outbound mail.

A. Recieivemail

B. Sendmail

C. MIME

D. POP


14) The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ...... service ready message.

A. 421

B. 320

C. 220

D. 120


15) ............ is limited to 7-bit ASCII text, with a maximum line length of 1000 characters.

A. SMTP

B. MIME

C. POP

D. MTA


16) A ........... message is one which can be routed through any number of networks that are loosely compliant with RFC2821 or are capable of transmitting RFC2821 messages.

A. SMTP

B. MIME

C. POP

D. MTA


17) There are ....... number of standard content types in MIME.

A. 5

B. 7

C. 9

D. 4


18) In MIME header field, ......... describes how the object within the body is to be interpreted.

A. content-type

B. content-transfer-encoding

C. content-description

D. content-id


19) In MIME header field, ............ describes how the object within the body was encoded in order that it be included in the message using a mail-safe form.

A. content-type

B. content-transfer-encoding

C. content-description

D. content-id


20) In a/an ............ of DNS resolver, the queried name server can return the best answer it currently has back to the DNS resolver.

A. Recursive queries

B. Iterative queries

c. Reverse queries

D. Inverse queries

Answers:


1) D. All of the above
2) C. application layer
3) A. SMTP
4) B. 25
5) C. Subject
6) B. Return-path
7) C. Both of the above
8) A. HELO
9) B. Sendmail
10) D. All of the above
11) A. Mail user agent(MUA)
12) B. Mail transfer agent(MTA)
13) B. Sendmail
14) C. 220
15) A. SMTP
16) B. MIME
17) B. 7
18) A. content-type
19) B. content-transfer-encoding
20) B. Iterative queries



Related Posts:

For more MCQ's on Computer Networks: Click Here

Objective Questions on Transport Layer in OSI Model set-1

Objective Questions on Transport Layer in OSI Model set-1

                    
1) The .......... is responsible for end to end delivery, segmentation and concatenation.

A. Physical layer

B. Data Link layer

C. Network layer

D. Transport layer


2) .......... needs ports or service access points.

A. Physical layer

B. Data Link layer

C. Network layer

D. Transport layer


3) The task of ............... is to provide reliable, cost effective transport of data from source machine to destination machine.

A. Network Layer

B. Transport Layer

C. Presentation Layer

D. Application Layer


4) The hardware and/or software within the transport layer which does the work of making use of the services provided by the network layer is called as .........

A. transport media

B. transport device

C. transport entity

D. network transporter


5) .......... measures the number of bytes of user data transferred per second, measured over some time interval. It is measured separately for each direction.

A. Throughput

B. Transit delay

C. Protection

D. Resilience


6) ............ is the time between a message being sent by the transport user on the source machine and its being receive by the transport user on the destination machine.

A. Throughput

B. Transit delay

C. Protection

D. Resilience


7) The time difference between the instant at which a transport connection is requested and the instant at which it is confirmed is called as ........

A. Connection establishment delay

B. Transit delay

C. Protection delay

D. Priority delay


8) The message sent from transport entity to transport entity is called as ..........

A. transport data unit

B. transport display data unit

C. transport protocol data unit

D. transport protocol display unit


9) ........ are designed for the protocols like ICMP or OSPF, because these protocols are not use either stream packets or datagram sockets.

A. Berkeley sockets

B. Stream sockets

C. Datagram sockets

D. Raw sockets


10) .......... is designed for the connectionless protocol such as User Datagram Protocol(UDP).

A. Berkeley socket

B. Stream socket

C. Datagram socket

D. Raw socket


11) ............ is designed for the connection oriented protocol such as Transmission Control Protocol(TCP).

A. Berkeley socket

B. Stream socket

C. Datagram socket

D. Raw socket


12) ............ is used to implement the transport layer services between the two transport entities.

A. Transport service

B. Transport protocol

C. Transport address

D. Transport control


13) Which of the following is/are the tasks of transport protocols.

A. Error control

B. Sequencing

C. Flow control

D. All of the above


14) The internet uses universal port numbers for services and these numbers are called as .......

A. Well known port numbers

B. Fixed port numbers

C. Standard port numbers

D. Ephemeral port numbers


15) In the internet model, the client program defines itself with a port number which is chosen randomly. This number is called as .......

A. Well known port numbers

B. Fixed port numbers

C. Standard port numbers

D. Ephemeral port numbers


16) The port numbers ........... are known as well known ports and they are reserved for standard circuits.

A. below 1024

B. above 1024

C. below 2048

D. below 512


17) In the TCP segment header, .......... is a 32-bit number identifying the current position of the first data byte in the segment within the entire byte stream for the TCP connection.

A. serial number

B. current number

C. sequence number

D. acknowledgement number


18) In the TCP segment header, .......... is a 32-bit number identifying the next data byte the sender expects from the receiver.

A. serial number

B. current number

C. sequence number

D. acknowledgement number


19) A ........ is a special type of file handle, which is used by a process to request network services from the operating system.

A. socket

B. handler

C. requester

D. protocol


20) ........ is an optional 16-bit one's complement of the one's complement sum of a pseudo-IP header, the UDP header, and the UDP data.

A. Congestion

B. Checksum

C. Pseudosum

D. Headersum

Answers:


1) D. Transport layer
2) D. Transport layer
3) B. Transport Layer
4) C. transport entity
5) A. Throughput
6) B. Transit delay
7) A. Connection establishment delay
8) C. transport protocol data unit
9) D. Raw sockets
10) C. Datagram socket
11) B. Stream socket
12) B. Transport protocol
13) D. All of the above
14) A. Well known port numbers
15) D. Ephemeral port numbers  
16) A. below 1024
17) C. sequence number
18) D. acknowledgement number
19) A. socket
20) B. Checksum


Related Posts:

For more MCQ's on Computer Networks: Click Here

Interview Questions on Network Layer in OSI Model set-1

Interview Questions on Network Layer in OSI Model set-1


1) The ......... provides two well-defined classes of services, namely connectionless and connection oriented services to the numerous nodes or hosts communicating through subnet.

A. physical layer

B. data link layer

C. network layer

D. transport layer


2) In computer networking the term .......... refers to selecting paths in a computer network along which to send data.

A. routing

B. inter-networking

C. internal organization

D. congestion control


3) ............ Routing algorithms do not base their routing decisions on measurements or estimates of the current traffic and topology.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


4) ............. Routing algorithm in contrast change their routing decisions to reflect changes in topology and usually the traffic as well.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


5) ........... is also a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


6) .......... is basically a vector that keeps track of best known distance to each destination and which line to use to get there.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


7) In addresses for .......... networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.

A. class A

B. class C

C. class B

D. class D


8) In .......... , the routers are divided into regions. Each router knows all details about how to route packets to destinations within its own region.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


9) In .......... , each node uses as its fundamental data a map of the network in the form of a graph.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


10) ......... protocols are simple and efficient in small networks, and require little, if any management.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing



11) In ........... routing algorithm, each router knows all details about how to route packets to destinations within its own region. But does not have any idea about internal structure of other regions.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


12) The set of optimal routers from source to a given destination from a tree rooted at the destination called a ........ tree.

A. sink

B. optimal

C. rooted

D. routing


13) .......... is a simple mathematical computation used to check for bit-level errors in the IPV4 header.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


14) The number of network segments on which the datagram is allowed to travel before a router should discard it is called .......

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


15) .......... is an identifier of the upper-layer protocol to which the IPV4 payload must be passed.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


16) The IPV4 address of the intermediate or final destination of the IPV4 packet is called .......

A. Source IP Address

B. Destination IP Address

C. Identification

D. Checksum


17) .......... type of IPV4 address is assigned to all network interfaces located on a subnet, used for one-to-everyone on a subnet communication.

A. Unicast

B. Multicast

C. Broadcast

D. Anycast


18) The ......... header field of IPV6 indicates the number of likes on which the packet is allowed to travel before being discarded by a router.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


19) ......... is an identifier for either the IPV6 extension header immediately following the IPV6 header or an upper layer protocol, such as ICMPv6, TCP or UDP.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


20) The internet addresses are ......... bits in length in IPV4 addressing scheme.

A. 16

B. 64

C. 32

D. 48



Answers:


1) C. network layer
2) A. routing  
3) A. Static or Non-adaptive
4) D. Dynamic or adaptive
5) B. Flooding 
6) C. Distance Vector Routing
7) C. class B
8) D. Hierarchical Routing
9) B. Link state Routing
10) C. Distance Vector Routing
11) D. Hierarchical Routing
12) A. sink
13) C. Checksum
14) D. Time-to-Live(TTL)
15) B. Protocol
16) B. Destination IP Address
17) C. Broadcast
18) D. Hop Limit
19) C. Next Header
20) C. 32


Related Posts: 

For more MCQ's on Computer Networks: Click Here

Solved Objective Questions on Data Link Layer in OSI Model set-1

Solved Objective Questions on Data Link Layer in OSI Model set-1


1) The .......... layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames.

A. Data Link

B. Physical

C. Network

D. Session


2) The service primitives provide a way for the data link layer on the requesting side to learn whether the request was successfully carried out.

A. Request

B. Indication

C. Response

D. Confirm


3) The different types of services provided by data link layer is/are ...

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. All of the above.


4) .......... is used by the network layer to ask the data link layer to do something.

A. Request

B. Indication

C. Response

D. Confirm


5) In ............... the source machine sends independent frames to the destination machine without having the destination machine acknowledge them.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


6) ........... is the most sophisticated service provided by the data link layer to the network layer. The source and destination machines establish a connection before any data transfer takes place.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


7) In .......... , there are still no connections used, but each frame sent is individually acknowledged.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


8) ......... is used to indicate to the network layer that an event has happened, for example, establishment or release of a connection.

A. Request

B. Indication

C. Response

D. Confirm


9) .......... is used on the receiving side by the network layer to reply to a previous indication.

A. Request

B. Indication

C. Response

D. Confirm


10) In .......... we are looking only to see if any error has occurred. The answer is a simple yes or no.

A. error searching

B. error detection

C. error correction

D. error transmission


11) In ........... we need to know the exact number of bits that are corrected and more importantly, their location in the message.

A. error searching

B. error detection

C. error correction

D. error transmission


12) ............ is the process in which the receiver tries to guess the message by using redundant bits.

A. Forward error correction

B. Backward error correction

C. Transmission

D. Retransmission


13) ........... is the technique in which the receiver detects the occurrence of an error and asks the sender to resend the message.

A. Forward error correction

B. Backward error correction

C. Transmission

D. Retransmission


14) In block coding, we divide our message into blocks, each of k bits, called ........

A. Dataword

B. Generator

C. Codeword

D. Checker


15) ............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

A. Transforming

B. Framing

C. Separating

D. Messaging


16) In ............., there is no need for defining the boundaries of the frames; the size itself can be used a delimiter.

A. Standard Size Framing

B. Fixed Size Framing

C. Variable Size Framing

D. Constant Size Framing


17) ............ is prevalent in LANs, we need a way to define the end of the frame and the beginning of the next.

A. Standard Size Framing

B. Fixed Size Framing

C. Variable Size Framing

D. Constant Size Framing


18) Which of the following is/are the methods used for carrying out framing.

A. Character count

B. Starting and ending characters, with character stuffing.

C. Starting and ending flags with bit stuffing.

D. All of the above


19) In ............., the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame.

A. stop and wait protocol

B. simplest protocol

C. sliding window protocol

D. High level Data Link Control Protocol(HDLC)


20) In ......... , the sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver.

A. stop and wait protocol

B. simplest protocol

C. sliding window protocol

D. High level Data Link Control Protocol(HDLC)

Answers:

1) A. Data Link
2) D. Confirm
3) D. All of the above
4) A. Request
5) A. Unacknowledged connectionless service
6) C. Acknowledged connection oriented service
7) B. Acknowledged connectionless service
8) B. Indication
9) B. Indication
10) B. error detection
11) C. error correction
12) A. Forward error correction
13) D. Retransmission
14) A. Dataword
15) B. Framing
16) B. Fixed Size Framing
17) C. Variable Size Framing
18) D. All of the above
19) A. stop and wait protocol
20) C. sliding window protocol


Related Posts:

For more MCQ's on Computer Networks: Click Here

Solved MCQ on Physical Layer in OSI Reference Model set-1

Solved MCQ on Physical Layer in OSI Reference Model set-1


1) Which of the following is/are the applications of twisted pair cables ......

A. In the local loop

B. In the DSL line

C. In the ISDN Network

D. All of the above


2) .......... transmission systems are widely used in the backbone of networks.

A. Unshielded Twisted Pair(UTP)

B. Shielded Twisted Pair(STP)

C. Optical Fiber

D. Wireless


3) ........... has much lower attenuation and can carry signal to longer distances without using amplifiers and repeaters in between.

A. UTP cable

B. STP cable

C. Fiber Optic cable

D. All of the above


4) The major problem(s) suffered for transmission lines on physical layer is/are .........

A. Attenuation distortion

B. Delay distortion

C. Noise

D. All of the above


5) ......... is the lost of energy as the signal propagates outward.

A. Attenuation distortion

B. Delay distortion

C. Noise

D. None of the above


6) .......... is the unwanted energy from sources other than the transmitter.

A. Attenuation distortion

B. Delay distortion

C. Noise

D. Disturbance


7) Which of the following is not the sources of noise?

A. Thermal

B. Magnetic

C. Inter-modulation

D. Cross talk


8) Data rate in data communication depends on which of the following factors.

A. The bandwidth available

B. The level of the signals we use

C. The quality of the channel

D. All of the above


9) ........... is the physical path between the transmitter and receiver.

A. Transmission media

B. Physical media

C. Transmission path

D. Receiving path


10) The key concern in design of data transmission system is Data Rate and .........

A. Data Path

B. Data flow

C. Distance

D. Frequencies



11) A ............ network is none that establishes a dedicated circuit between nodes and terminals before the users may communicate.

A. Message switching

B. Physical switching

C. circuit switching

D. packet switching


12) Which of the following is not the phase involved in circuit switching network?

A. Connection start

B. Connection establishment

C. Data transfer

D. Termination


13) ........... is also known as store and forward switching since the messages are stored at intermediate nodes in route to their destinations.

A. Message switching

B. Physical switching

C. circuit switching

D. packet switching


14) State True or False for the following characteristics of optical fiber cables.

i) The cost of fiber optic cable is more compared to twisted pair and co-axial.

ii) The installation of fiber optic cable is much easier.

A. i-True, ii-True

B. i-False, ii-True

C. i-True, ii-False

D. i-False, ii-False


15) ............ splits traffic data into chunks.

A. Message switching

B. Linear switching

C. circuit switching

D. packet switching


16) ........... is used to optimize the use of the channel capacity available in a network, to minimize the transmission latency and to increase robustness of communication.

A. Message switching

B. Linear switching

C. circuit switching

D. packet switching


17) The term ......... describes the position of the waveform relative to time 0.

A. Frequency

B. Phase

C. Phase Shift

D. Time period


18) If the value of a signal changes over a very short span of time, it's frequency is .......

A. short

B. low

C. high

D. long


19) What is/are the services provided by ISDN?

i. Data applications

ii. Teletext services

iii. Videotext services

iv. Fascimile(FAX)

A. i, ii and iii only

B. ii, iii and iv only

C. i, iii and iv only

D. All i, ii, iii and iv


20) ............. used in telephone network for bi-directional, real time transfer between computers.

A. Message switching

B. Circuit switching

C. Packet switching

D. Circular switching


Answers:


1) D. All of the above
2) C. Optical Fiber
3) C. Fiber Optic cable
4) D. All of the above
5) A. Attenuation distortion
6) C. Noise
7) B. Magnetic
8) D. All of the above
9) A. Transmission media
10) C. Distance
11) C. circuit switching
12) A. Connection start
13) A. Message switching
14) C. i-True, ii-False
15) D. packet switching
16) D. packet switching
17) B. Phase
18) C. high
19) D. All i, ii, iii and iv
20) B. Circuit switching


Related Posts:

For more MCQ's on Computer Networks: Click Here


    Solved MCQ on Network Layer in Computer Networks set-1

    Solved MCQ on Network Layer in Computer Networks set-1


    1. The ........ layer links the network support layers and the user support layers.

    A. transport

    B. network

    C. data link

    D. session


    2) The ............. layer changes bits into electromagnetic signals.

    A. physical

    B. data link

    C. transport

    D. network


    3) The .......... layer coordinates the functions required to transmit a bit stream over a physical medium.

    A. transport

    B. network

    C. data link

    D. physical


    4) Which of the following is an application layer service?

    A. remote log-in.

    B. file transfer and access.

    C. mail service

    D. all of the above


    5) The ......... layer is responsible for the source-to-destination delivery of a packet across multiple network links.

    A. transport

    B. network

    C. data link

    D. session


    6) The .......... layer is the layer closest to the transmission medium.

    A. physical

    B. data link

    C. network

    D. transport


    7) The ...........layer is responsible for the process-to-process delivery of th entire message.

    A. transport

    B. network

    C. data link

    D. physical


    8) Mail services are available to network users through the .......... layer.

    A. data link

    B. physical

    C. transport

    D. application


    9) The ........... layer establishes, maintains, and synchronizes the interactions between communicating devices.

    A. transport

    B. network

    C. session

    D. physical


    10) The .......... layer lies between the network layer and the application layer.

    A. physical

    B. data link

    C. transport

    D. session


    11) The .......... layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format.

    A. transport

    B. network

    C. data link

    D. presentation


    12) Transmission media lies below the .........layer.

    A. physical

    B. network

    C. transport

    D. application


    13) The ........... layer enables the users to access the network.

    A. session

    B. application

    C. data link

    D. physical


    14) Circuit switching takes place at the .......... layer.

    A. data link

    B. physical

    C. network

    D. transport


    15) The ............ layer is responsible for moving frames form one node to the next.

    A. physical

    B. data link

    C. transport

    D. session


    16) The routing processor of a router performs the ........ layer functions of the router.

    A. physical and data link

    B. network

    C. transport

    D. session


    17) The ............. layer adds a header to the packet coming from the upper layer that includes the logical address of the sender and receiver.

    A. physical

    B. data link

    C. network

    D. transport


    18) Network layer lies on .......... layer.

    A. physical

    B. data link

    C. network

    D. transport


    19) The ...........layer is responsible for the delivery of a message from one process to another.

    A. physical

    B. transport

    C. network

    D. session


    20) The data link layer takes the packet it gets from the network layer and encapsulates them into ......

    A. cells

    B. frames

    C. packet

    D. trailer


    Answers:


    1) A. transport
    2) A. physical
    3) D. physical
    4) D. all of the above
    5) B. network
    6) A. physical
    7) A. transport
    8) D. application
    9) C. session
    10) C. transport
    11) D. presentation
    12) A. physical
    13) B. application
    14) B. physical
    15) B. data link
    16) B. network
    17) C. network
    18) A. physical
    19) B. transport
    20) B. frames


    Related Posts:

    For more MCQ's on Computer Networks: Click Here

    Kategori

    Sport

    Kategori