Sunday 18 March 2012

Data Communication And Networks 02


  1. A computer network permits sharing of

    1. Resources
    2. Information
    3. Both a & b
    4. None of these

  1. The first operational computer network in the world was the _________ for the United States Department of Defense

    1. ARPANET
    2. ERNET
    3. SKYNET
    4. DARPANET

    1.  
  1. ATM stands for
    1. Automatic taller machine
    2. Automated teller machine
    3. Automatic transfer machine
    4. Automated transfer machine
  2.  _______ is the technology that connects the machines and people within a site in a small area

    1. LAN
    2. MAN
    3. WAN
    4. None of these

  1. ______ is a network that covers geographic areas that are larger, such as districts or cities

    1. LAN
    2. MAN
    3. WAN
    4. None of these

    1.  
  1. ______ is a network that this technology connects sites that are in diverse locations

    1. LAN
    2. MAN
    3. WAN
    4. None of these

  1. ______ is a collection of point-to-point links that may form a circle

    1. LAN
    2. MAN
    3. WAN
    4. Ring topology

  1. ______ refers to tone signals used for various control purposes via the telephone network

    1. SMS
    2. DTMF
    3. GSM
    4. None of these

  1. LAN is a network that is restricted to a relatively

    1. Small area
    2. Large area
    3. Both a & b
    4. None of these

  1. The components used by LANs can be categorized into

    1. Hardware
    2. Cabling protocols
    3. Standards
    4. All of these

    1.  
  1. The various LAN protocols are

    1. Ethernet
    2. Token ring
    3. Both  a & b
    4. None of these

  1. The Institute of Electrical and Electronics Engineers established a project named IEEE project 802 during the year _____

    1. 1990
    2. 1970
    3. 1980
    4. 1960

  1. In 1985, the committee issued a set of ___ standards

    1. 2
    2. 3
    3. 4
    4. 5

  1. ISO revised these standards and reintroduced them as ISO 8802 standards during ____          

    1. 1977
    2. 1987
    3. 1997
    4. 1999

  1. The following are the important standards proposed by IEEE
    1. IEEE 802.1- overview and relationship among the various IEEE standards
    2. IEEE 802.3 or CSMA/CD bus
    3. IEEE 802.4 or token bus
    4. IEEE 802.5 or token ring
    5. IEEE 802.6 or MAN protocol
    6. All of these
  2. When compared with the OSI reference model, the IEEE standard contains the following layers:
    1. Physical layer
    2. Medium access control(MAC) equivalent to the lower part of the OSI data link layer
    3. Logical link layer(LAC) equivalent to the upper part of the data link layer
    4. Network layer, the OSI network layer, that performs some of the higher order layer functions
    5. All of these
  3. The 802.2 compatible interfaces provide two major types of services, which are

    1. Unacknowledged
    2. Connectionless
    3. Both a & b
    4. None of these

  1. The ________ follows the ring topology

    1. IBM of LAN
    2. LAN of IBM
    3. Both a & b
    4. None of these

    1.  
  1. In a token ring, the stations are connected to the __________

    1. Logical ring
    2. Physical ring
    3. Both a & b
    4. None of these

    1.  
  1. A _________ preamble is used to synchronize the receiver’s clock

    1. Four-byte
    2. Three-byte
    3. Two-byte
    4. One-byte

  1. Start of frame and end of frame are used to _______ the frame boundaries

    1. Mark
    2. Modify
    3. Delete
    4. Find

  1. Frame control is also used to specify the ________
    1. Frame technique
    2. Frame type
    3. Both a & b
    4. None of these
  2. The destination address and source address field is similar to
    1. IEEE 802.3 or CSMA/CD bus
    2. IEEE 802.4 or token bus
    3. IEEE 802.5 or token ring
    4. IEEE 802.6 or MAN protocol
  3. Info field is used to ________

    1. Send messages
    2. Send data
    3. Delete data
    4. Create data

  1. The maximum length of this field is _______ when the address is _______

    1. 8182 & 2 bits
    2. 8182 & 2 bytes
    3. 8182 & 4 bits
    4. 8182 & 4 bytes

  1. The maximum length of this field is _______ when the address is _______
    1. 8174 bytes & 6 bits
    2. 8174 bytes & 6 bytes
    3. 8174 bytes & 8 bytes
    4. 8174 bits & 6 bytes
  2. Check sum is used for

    1. Error correction
    2. Error detection
    3. Both a & b
    4. None of these

    1.  
  1. Solicit-successor frame contains the address of the

    1. Sending station
    2. Successor
    3. Both a & b
    4. None of these

  1. Government agencies and local libraries often use a MAN to connect to private

    1. Industries
    2. Citizens
    3. Both a & b
    4. None of these

    1.  
  1. The geographical limit of a MAN may

    1. Not span a city
    2. Span a city
    3. Either span or not
    4. None of these

  1. In MAN, different LANs are connected through a local _______

    1. Telephone exchange
    2. Computer wires
    3. Both a & b
    4. None of these

  1. Some of the widely used protocols for MAN are

    1. RS-232
    2. X.25
    3. Frame relay
    4. Asynchronous transfer mode(ATM)
    5. ISDN
    6. OC-3lines(155 Mbps)
    7. ADSL(asymmetric digital subscriber line)
    8. All of the above

  1.  MAN stands for
    1. Machine area network
    2. Metropolitan area network
    3. Metropolitan asynchronous network
    4. Machine asynchronous network
  2. WAN technologies function at the lower three layers of the OSI reference model

    1. Physical layer
    2. Data link layer
    3. Network layer
    4. All of these

    1.  
  1. WAN also uses switching technology provided by ____________
    1. Local exchange
    2. Long distance carrier
    3. Both a & b
    4. Small distance carrier
  2.  Packet switching technologies such as _____________ are used to implement WAN along with statistical multiplexing
    1. ATM
    2. Frame relay
    3. Switched multimeagabit data service
    4. X.25
    5. All of these
  3. MAN uses only a

    1. Long exchange
    2. Local carrier
    3. Both a & b
    4. None of these

    1.  
  1. In MAN, a network is accomplished using components

    1. Hardware
    2. Protocols
    3. Both a & b
    4. None of these

    1.  
  1. In MAN, a network is accomplished using basic components
    1. Hardware
    2. Protocols(software)
    3. Applications(useful software)
    4. All of the above
  2. The Internet(internetworking) ha become a potent tool for

    1. Education
    2. Productivity
    3. Enlightenment
    4. All of these

  1. The Government of India had set up ERNET in ______ to provide TCP/IP connections for education and research communities in India

    1. 1976
    2. 1986
    3. 1996
    4. 1999

  1. The liberalized policies encouraged many private players like

    1. DISHNET
    2. JAINTV
    3. Mantra online
    4. All of these

  1. The other government organizations like _______________ to enter this field to bring the Internet to common people

    1. NIC
    2. VSNL
    3. MTNL
    4. All of the above

    1.  
  1. The major network infrastructure available in the country has two types of WAN

    1. Terrestrial WAN
    2. VSAT WAN
    3. Both a & b
    4. None of these

    1.  
  1. Following are different options for setting up the Intranet, education portal or e-commerce, etc………….

    1. Leased line
    2. Dial Up connection
    3. VSAT
    4. Radio link
    5. All of the above

  1.  The networks can be broadly divided into three categories namely
    1. LAN for a single building
    2. MAN- single city
    3. WAN-country, continent and planet
    4. All of the above
  2. The host to terminal connection is a conventional type of connection between

    1. Main frame
    2. Dumb terminals
    3. Both a & b
    4. None of these

  1. TC means
    1. Terminal Computer
    2. Terminal Controller
    3. Technical Computer
    4. None of these
  2. A collection of interconnected networks is known as

    1. Internetwork
    2. Internet
    3. Network
    4. None of these

    1.  
  1. The type of packet format supported by X.25 are as follows

    1. Control packet
    2. Data packet
    3. Both a & b
    4. None of these

  1. A terminal controller may be used to integrate two or more terminals for connection with a

    1. Low speed line
    2. High speed line
    3. Single WAN line
    4. Both a & b

  1. ISDN stands for
    1. Integrated Service Digital Network
    2. Interaction System Digital Network
    3. Inexpensive System Digital Network
    4. None of these
  2. For LAN to LAN connection, which are mainly used

    1. ISDN
    2. Leased Line
    3. Frame relay
    4. All of these

    1.  
  1. Which function allows selection of the appropriate route based on IP header information and sends packets through this route

    1. Forwarding function
    2. Filtering function
    3. Both a & b
    4. None of these

  1. Which function allows dumping of invalid packets for a specific network instead of forwarding

    1. Forwarding function
    2. Filtering function
    3. Both a & b
    4. None of these

  1. Routing in the same network may be termed as

    1. Local routing
    2. Static routing
    3. Dynamic routing
    4. Distributing routing

  1. The routing table possessed by a router includes
    1. Combination of destination address
    2. Next hops that corresponds to that address
    3. Both a & b
    4. None of these
  2. If there is a fixed route information to each router, is called

    1. Fixed routing
    2. Dynamic routing
    3. Both a & b
    4. Distributed routing

  1. If routing information is automatically updated by routers when changes are made to the network configuration are called
    1.  

    1. Fixed routing
    2. Dynamic routing
    3. Both a & b
    4. Distributed routing

  1. The processing required to transferring a packet from the source host to the destination host or to the relaying router are called

    1. Fixed routing
    2. Dynamic routing
    3. Local routing
    4. Distributed routing

    1.  
  1. ARP stands for
    1. Address Resolution Protocol
    2. Address Routing Protocol
    3. Address Routing Packet
    4. Address Routing Program
  2. If two or more routers are connected to the same subnet, the network administration determines which of the routers the messages should be sent to.. to eliminate this problem._____ are used

    1. MAC messages
    2. ICMP messages
    3. INDP messages
    4. IMCP messages

    1.  
  1. If two or more routers are available in distributed routing, which route should be  selected

    1. High possible cost
    2. Least possible cost
    3. Link cost
    4. Both b & c

  1. If there is no any specific intention, the cost for a single link is usually set at ___

    1. 1
    2. 2
    3. 3
    4. 4

  1. Multi-path routing can be achieved in

    1. Distance-vector type
    2. Link-state type
    3. Both a & b
    4. None of these

  1.  If there are two or more routes to reach the same destination at the same cost, which method is applicable to determine how to select this route
    1. Round robin method
    2. Random selection method
    3. Mixed method
    4. All of these
  2. The Mixed method remains _________ for the amount of  processing required

    1. Effective
    2. Ineffective
    3. Both a & b
    4. None of these

  1.   A set of networks interconnected by routers within a specific area using the same routing protocol is called

    1. Domain
    2. Backbone
    3. Inter-domain router
    4. All of these

  1. A network composed of inter-domain router is called

    1. Domain
    2. Backbone
    3. Inter-domain router
    4. All of these

  1. A router within a specific domain is called

    1. Domain
    2. Backbone
    3. Inter-domain router
    4. All of these

  1. Two or more domains may be further combined to form a

    1. Domain
    2. Backbone
    3. Inter-domain router
    4. Higher-order domain

  1. Each domain is also called

    1. Operation domain
    2. Backbone
    3. Inter-domain
    4. All of these

    1.  
  1. Routing protocol in such an internet system can be broadly divided into two types named

    1. Intra- domain routing
    2. Inter- domain routing
    3. Both a & b
    4. None of these

  1. To communication between two or more domains, which are used

    1. Intra- domain routing
    2. Inter- domain routing
    3. Both a & b
    4. None of these

  1. Some Intra-domain protocols are
    1. RIP(Routing Information Protocol)
    2. OSPF(Open Shortest Path First)
    3. IS-IS(Intermediate System to Intermediate System )
    4. All of these
  2. ________ are the algorithms are available to update contents of routing tables

    1. Distance-Vector Protocol
    2. Link-State Protocol
    3. Both a & b
    4. None of these

  1. Distance vector protocols are

    1. RIP
    2. IGRP(Interior Gateway Routing Protocol )
    3. Both a & b
    4. None of these

  1. RIP stands for
    1. Routing Information Protocol
    2. Routing Intra Protocol
    3.  Route Intermediate Protocol
    4. Resolution Information Protocol
  2. The Link state protocol are
    1. OSPF(Open Shortest Path First)
    2. IS-IS(Intermediate System to Intermediate System)
    3. Both a & b
    4. None of these
  3. In link state protocol, the load on router will be

    1. Small
    2. Large
    3. Medium
    4. None of these

    1.  
  1.  For large load on router, the processing is

    1. Complex
    2. Simple
    3. Both a & b
    4. None of these

  1. Which protocol are used in link state type routing protocol developed for use in large scale network
    1. OSPF(Open Shortest Path First)
    2. IS-IS(Intermediate System to Intermediate System)
    3. Both a & b
    4. None of these
  2. The common part of OSPF packet format is

    1. Packet type
    2. Packet length
    3. Router ID
    4. Area ID
    5. Authentication type
    6. Authentication data
    7. Version
    8. Checksum
    9. Individual information part
    10. All of these

  1. The router may be classified into three types named

    1. Domain border router
    2. Internal router
    3. Area border router
    4. All of these

  1. OSPF is a hierarchical routing composed of

    1. Intra-area routing
    2. Inter-area routing
    3. Inter-domain routing
    4. All of these

  1. The word SLIP stands for

    1. Serial Line IP
    2. Standard Line IP
    3. Serial Link IP
    4. Standard Link IP

  1. The word PPP stands for
    1. Point to Point Protocol
    2. Packet to Packet Protocol
    3. Point to Packet Protocol
    4. Packet to Point Protocol
  2. ________ is used mainly for connection between LANs that are remotely located from one another

    1. SLIP
    2. PPP
    3. Both a & b
    4. None of these

    1.  
  1.  _________ is used for connection between routers or equipment that must be highly reliable

    1. SLIP
    2. PPP
    3. Both a & b
    4. None of these

  1. The wireless LANs offers the obvious advantage of
    1. Avoidance of cabling cost
    2. Provide LAN capabilities in temporary quarters
    3. Both a & b
    4. None of these
  2. The bandwidth of wireless radio LAN is

    1. 24Mbps
    2. 2 Mbps
    3. 4 Mbps
    4. 8 Mbps

  1. The frequency range of wireless LAN is

    1. 900 MHz bands
    2. 2GHz bands
    3. 5 GHz bands
    4. All of these

  1.  A hub antennae is located at a _________ from where line-of-sight can be established with the various terminal antennae.

    1. Highest point
    2. Lowest point
    3. Central point
    4. None of these

  1. The effective throughput is more in the range of _________  per hub

    1. 1 to 2 Mbps
    2. 2 to 3 Mbps
    3. 3 to 4 Mbps
    4. 4 to 5 Mbps

  1. PDA stands for
    1. Personal Device Assistant
    2. Pointer Description Assistant
    3. Personal Digital Assistant
    4. Personal Description Analog
  2. USB stands for
    1. University System Bus
    2. Universal System Board
    3. University System Board
    4. University Serial Bus
  3. _______ are wireless network standard with a data rate of only 2Mbps

    1. IEEE802.11a
    2. IEEE802.11b
    3. IEEE803.11a
    4. IEEE803.11b

  1. _______ are wireless network standard with a data rate of only11Mbps

    1. IEEE802.11a
    2. IEEE802.11b
    3. IEEE803.11a
    4. IEEE803.11b

  1. IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the access point router

    1. 1000feet
    2. 100feet
    3. 101feet
    4. 110feet

  1. IEEE802.11a and IEEE802.11b uses _____ band

    1. 1.4GHz
    2. 2.4GHz
    3. 3.4GHz
    4. 4.4GHz

  1. ________ technology allows speeds up to 54Mbps

    1. IEEE802.11g
    2. IEEE803.11a
    3. IEEE803.11b
    4. IEEE802.11a

    1.  
  1. ________ allows the movement of device with or without user

    1. User mobility
    2. Device portability
    3. Both a & b
    4. None of these

    1.  
  1. A user can access to the same or similar telecommunication services at different places

    1. User mobility
    2. Device portability
    3. Both a & b
    4. None of these

    1.  
  1. A number of mobile and wireless device are

    1. Sensor
    2. Mobile-phone
    3. PDA
    4. Embedded controller
    5. Pager
    6. Palmtop
    7. Notebook
    8. All of these

    1.  
  1. The availability of _________ made the wireless communication popular among the masses.

    1. Low cost microprocessor
    2. Digital switching
    3. Both a & b
    4. None of these

  1. Cellular radio has another popular names as

    1. Cellular mobile
    2. Cellular phone
    3. Both a & b
    4. None of these

  1. Radio is basically a device, which has

    1. Receiver
    2. Transmitter
    3. Both a & b
    4. None of these

  1. Wireless communication can be carried out

    1. Use of radio
    2. Without using radio
    3. Both a & b
    4. Without use of video

  1. The term radio may be defined as consisting of ______________ of the signal

    1. Modulation
    2. Radiation
    3. Both a & b
    4. None of these

    1.  
  1. A transmitter and an antenna are used to ____________ the modulated signal within radio spectrum

    1. Modulate
    2. Radiate
    3. Both  a & b
    4. None of these

    1.  
  1. In telephone system as we know that a voice with bandwidth of approximately ____ modulates the current of a telephone line

    1. 2kHz
    2. 3 kHz
    3. 4 kHz
    4. 5 kHz

  1. Wireless ca be defined as the ____________________ by means of high frequency electrical waves without a connecting wire

    1. Radio transmission
    2. Reception of signals
    3. Both a & b
    4. None of these

  1. The frequency of a cell may be ________ after the interference zone

    1. Reused
    2. Used
    3. Not be used
    4. Not be reused

  1. PSTN stands for
    1. Public Switched Transport Network
    2. Public System Transport Network
    3. Public System Transfer Network
    4. Public Switched Telephone Network
  2. The radii of a cell may vary from ___________ in a building to a city
    1. One of meters to tens of kilometers
    2. Tens of meters to tens of kilometers
    3. Hundreds of  meters to tens of kilometers
    4. Hundreds of meters to hundreds of kilometers
  3. The shape of cell mat not be a ___________ and depends up on the environment

    1. Hexagon
    2. Circle
    3. Pentagon
    4. Both a & b

  1. SDM stands for
    1. System Division Multiple
    2. System Division Multiplexing
    3. Space Division Multiplexing
    4. System Double Multiplexing
  2. Frequencies for communication may vary from very high frequency to ________

    1. Medium range
    2. Microwave range
    3. Digital range
    4. None of these

    1.  
  1. The signal may be analog or digital with _______

    1. Amplitude
    2. Frequency
    3. Phase modulation
    4. All of these

  1. The multiplexing and access techniques are
    1. SDM(Space Division Multiplexing)
    2. FDM(Frequency Division Multiplexing)
    3. TDM(Time Division Multiplexing)
    4. CDM(Code Division Multiplexing)
    5. All of these
  2. The advantages of mobile communication may be looked into
    1. Higher capacity
    2. Higher number of users
    3. Less transmission power needed
    4. More robust
    5. Decentralized base station deals with interference
    6. Transmission area
    7. All of these
  3. The disadvantages of mobile communication are           
    1. Fixed network needed for the base stations
    2. Handover(changing from one cell to another) necessary
    3. Interference with other cells such as co-channel, adjacent-channel
    4. All of these
  4. The important issues on wireless communication are

    1. Cell sizing
    2. Frequency reuse planning
    3. Channel allocation strategies
    4. All of these

  1. In the beginning around 1980, analog cellular telephone systems were developing in ___________

    1. USA
    2. UK
    3. Europe
    4. Japan

  1. The proposed system was expected to meet certain as mentioned as
    1. Good subjective speech quality
    2. Low terminal and service cost
    3. Support for international terminals
    4. Spectral efficiency
    5. ISDN compatibility
    6. All of these
  2. ETSI stands for
    1. European Telecommunication Standards Institute
    2. European Telephone Standards Institute
    3. European Telecommunication Systems Institute
    4. European Telecom Standards Institute
  3. GSM(Global System for Mobile Communication) is a _______ digital mobile telephones standard using a combination Time Division Multiple Access(TDMA) and FDMA(Frequency Division Multiple Access)

    1. First generation
    2. Second generation
    3. Third generation
    4. None of these

    1.  
  1. GSM provides only _______ data connection

    1. 8.6kbps
    2. 9.6kbps
    3. 7.6kbps
    4. 8.8kbps

  1. The uplink and downlink frequencies for GSM are different and therefore a channel has a pair of frequencies _______ apart

    1. 70MHz
    2. 80MHz
    3. 90MHz
    4. 60MHz

  1. The separation between uplink and downlink frequencies are called

    1. Duplex distance
    2. Double distance
    3. Triplex distance
    4. None of these

  1. In a channel the separation between adjacent carrier frequencies is known as channel separation which is _______ in case of GSM

    1. 100kHz
    2. 200 kHz
    3. 300 kHz
    4. 400 kHz

  1. The services supported by GSM are

    1. Telephony
    2. Fax and SMS
    3. Call forwarding
    4. Caller ID
    5. Call waiting
    6. All of these

  1. GSM supports data at rates up to 9.6kbps on
    1. POTS(Plain Old Telephone Service)
    2. ISDN
    3. Packet Switched Public Data Networks
    4. Circuit Switched Public Data Networks
    5. All of these
  2. The access methods and protocols for GSM may be from

    1. X.25
    2. X.32
    3. Both a & b
    4. None of these

  1. There are basic types of services offered through GSM are
    1. Telephony or teleservices
    2. Data or bearer services
    3. Supplementary services
    4. All of these
  2. The supplementary services are used to enhance the features of

    1. Bearer
    2. Teleservices
    3. Both a & b
    4. None of these

    1.  
  1. Dual tone signals are used for various control purposes via the
    1. Telephone network
    2. Different from dual pulses
    3. Both a & b
    4. None of these
  2. SMS(Short Message Service) is a message consisting of  a maximum of ______ alphanumeric characters

    1. 150
    2. 160
    3. 170
    4. 180

  1. GSM supports ______ Group 3 facsimile

    1. CCIIT
    2. CCITT
    3. CCCIT
    4. CCTTI

  1. Call forwarding is a ________________
    1. Telephony or teleservices
    2. Data or bearer services
    3. Supplementary services
    4. All of these
  2. The other services of call forwarding are
    1. Cell broadcast, voice mail, fax mail
    2. Barring of outgoing and incoming calls conditionally
    3. Call hold, call waiting, conferencing
    4. Closed user groups
    5. All of these
  3. GSM consists of many subsystems, such as the
    1. Mobile station(MS)
    2. Base station subsystem(BSS)
    3. Network and Switching subsystem(NSS)
    4. Operation subsystem(OSS)
    5. All of these
  4. Which forms a radio subsystem

    1. Mobile station
    2. Base station subsystem
    3. Both a & b
    4. None of these

  1. The generic GSM network architecture  which is composed of three subsystem are__________
    1. Radio subsystem (RSS)
    2. Network and switching subsystem
    3. Operation subsystem
    4. All of these
  2. The RSS is basically consisting of radio specific equipment such as ____________ to control the radio link
    1. Mobile station(MS)
    2. Base station subsystem(BSS)
    3. Both a & b
    4. None of these
  3. The chief  components of RSS are

    1. BSS
    2. Cellular layout
    3. Base station controller(BSC)
    4. All of these

  1. SIM stands for
    1. System Identity Module
    2. Subscriber Identity Module
    3. Subscriber Identity Modem
    4. Subscriber Input Modem
  2. MS contains a SIM card in the form of a very _______ inside the equipment

    1. Large chip
    2. Small chip
    3. Both a & b
    4. None of these

  1. Cell site is defined as the location where _______________ are placed

    1. Base station
    2. Antennas
    3. Both a & b
    4. None of these

    1.  
  1. Cells are the basic constituents of a cellular layouts with ________

    1. Cell sites
    2. Cell systems
    3. Cell forwarding
    4. None of these

  1. A cell is simply represented by simple ____________

    1. Pentagon
    2. Hexagon
    3. Both a & b
    4. None of these

    1.  
  1. The size of cells in case of GSM and Personal Communication Service(PCS) are much smaller in the range of _______

    1. 5Kms
    2. 10Kms
    3. 15Kms
    4. 20Kms 

  1. The portions covered by the antenna are called

    1. Portions
    2. Sectors
    3. Cell sector
    4. None of these

  1. The BTS or Base Transceiver Station is also called

    1. RBS
    2. PCS
    3. GSM
    4. SIM

  1. BTS are housed with all radio equipments such as

    1. Antennas
    2. Signal processors
    3. Amplifiers
    4. All of these

    1.  
  1. Base station may also  be placed near center of cell and known as

    1. Excited cell
    2. Center excited cell
    3. Center cell
    4. None of these

  1. The actual cell is the _____ hexagon, with the towers at the corners

    1. Red
    2. Blue
    3. Red and blue
    4. None of these

  1. Antenna always transmits inward to each cell and area served depends on

    1. Topography
    2. Population
    3. Traffic
    4. All of these

  1. Network and switching subsystem is composed of the ________________
    1. Mobile Services Switching Center(MSC)
    2. Home Location Register(HLR)
    3. Visitor Location Register(VLR)
    4. All of these
  2. The  mobile stations(MS) communicates only via the

    1. BTS
    2. BSS
    3. BSC
    4. Um

  1. A BTS is connected to a mobile station via the

    1. BTS
    2. BSS
    3. Abis interface with BSC
    4. Um interface
    5. Both c & d

  1. The Um interface basically consists of _________ for wireless transmission

    1. FDMA
    2. TDMA
    3. CDMA
    4. All of these

  1. The FDMA involves the division up to the maximum of _______
     bandwidth into 124 carrier frequencies spaced 200 kHz apart

    1. 25MHz
    2. 35MHz
    3. 24MHz
    4. 20MHz

  1. The FDMA channel are further divided in time with a burst period of approximately _______ using a TDMA technique

    1. 0.277ms
    2. 0.377ms
    3. 0.477ms
    4. 0.577ms

  1. The eight burst period are grouped into a TDMA frame which forms the basic unit for definition of

    1. Physical channel
    2. Logical channel
    3. Both a & b
    4. None of these

  1.  One _______ is one burst period per TDMA frame

    1. Physical channel
    2. Logical channel
    3. Both a & b
    4. None of these

  1. The more channel increases the

    1. GSM
    2. No of base station
    3. No of mobile station
    4. Transmitter power

  1. The more channel decreases the

    1. GSM
    2. No of base station
    3. No of mobile station
    4. Transmitter power

  1. The other popular name for MSC(Mobile Switching Center ) is
    1. BS(Base Station)
    2. MS(Mobile Switch)
    3. MTSO(Mobile Telecommunication Switching Office)
    4. Both b & c
  2. MSC is connected to a ____________ at one end

    1. Mobile station
    2. Base station
    3. Transmitter station
    4. None of these

  1. MSC is connected to a ____________ at other end

    1. MSCs
    2. PSTN
    3. ISDN
    4. None of these

  1. MSCs acts as a __________
    1. Switching
    2. Local Switching exchange
    3. Remote Switching exchange
    4. None of these
  2. The MSC also provides all the functionality such as

    1. Registration
    2. Handover
    3. Authentication
    4. Location updating
    5. Call routing to a roaming subscriber
    6. All of these

  1. The MSC provided to establish link with other fixed networks termed as

    1. Local MSC
    2. Router MSC
    3. Gateway MSC
    4. Remote MSC

  1. The main task of MSC are entrusted upon as
    1. Interworking function(IWF)
    2. Mobility management operations
    3. Data service unit(DSU)
    4. SS7
    5. All of these
  2. Name the two chief databases

    1. Home location register(HLR)
    2. Visitor location register(VLR)
    3. Both a & b
    4. None of these

  1.  Which has its main task as associated with MSC

    1. Home location register
    2. Visitor location register
    3. Both a & b
    4. None of these

    1.  
  1. IMEI stands for
    1. International mobile equipment identity
    2. International mobile equipment information
    3. Interworking mobile equipment information
    4. Interworking management equipment information
  2. Subscriber’s all administrative information along with the current location in GSM network including in database of HLR are
    1. IMEI number
    2. Directory number
    3. Current city
    4. Last visited area
    5. The class of service subscriber
    6. All of these
  3. HLR keeps the ____________ of each mobile that belongs to the MSC to which it is interacting

    1. Last location
    2. First location
    3. Current location
    4. None of these

  1. HLR performs the functions such as _____________ to subscribers at their current locations by using user profile information

    1. Delivery of calls
    2. Information and messages
    3. Both a & b
    4. None of these

  1. HLR maintains user information in the form of
    1. Static information
    2. Dynamic  information
    3. Both a & b
    4. None of these
  2. The static information is the
    1. International Mobile Subscriber Identity
    2. Service subscription information authentication key
    3. Account status
    4. All of these
  3. The dynamic information is the _________ area of the mobile subscriber which is the identity of the currently serving VLR

    1. Last location
    2. First location
    3. Current location
    4. None of these

  1. The HLR handles SS7 transactions with both

    1. MSCs
    2. VLR nodes
    3. Both a & b
    4. None of these

    1.  
  1. VLR main tasks are association with

    1. MSC
    2. IMSI
    3. TMSI
    4. Roaming
    5. All of these

  1. In nutshell we can say that both the ___________work together to provide local connections as well as roaming outside the local service area

    1. HLR
    2. VLR
    3. Both a & b
    4. None of these

    1.  
  1. The operations and Maintenance Center oversees the all important for__________      
    1. Proper operation
    2. Setup of the network
    3. Provides Telecommunication Management Network(TMN)
    4. All of these
  2. Operation Subsystem also provides interface NSS via O-Interface that may be __________

    1. X.25 interface
    2. X.32 interface
    3. X.23 interface
    4. None of these

    1.  
  1. Authentications Center(AuC) is used for
    1. Authentication
    2. Security by generating authentication algorithms
    3. Cryptographic codes
    4. All of these
  2. AuC is responsible for maintaining all data needed to authenticate a call and to encrypt __________________           

    1. Voice traffic
    2. Signaling messages
    3. Both a & b
    4. None of these

  1. EIR stands for
    1. Equipment Identification Register
    2. Equipment Identification Remote
    3. Equipment Information Remote
    4. Equipment Information Register
  2. EIR fulfills the ______________ requirement of GSM

    1. Security
    2. Authentication
    3. Both a & b
    4. None of these

  1. SIM card has a secret key for ________________ over the radio channel

    1. Authentication
    2. Encryption
    3. Both a & b
    4. None of these

    1.  
  1. GSM network checks the __________________ of a mobile device through EIR database

    1. Type
    2. Serial number
    3. Both a & b
    4. None of these

    1.  
  1. EIR maintains a database of ______________
    1. Manufacturing devices
    2. Malfunctioning devices
    3. Functioning devices
    4. None of these
  2. Um is the link between a

    1. Mobile station
    2. Base station
    3. Both a & b
    4. None of these

    1.  
  1. GSM 900 operates on a frequency range of _________ for uplink

    1. 890-910MHz
    2. 890-915MHz.
    3. 890-901MHz
    4. 890-911MHz

    1.  
  1. GSM 900 operates on a frequency range of _________ for downlink

    1. 935-960MHz
    2. 940-970MHz
    3. 945-950MHz
    4. 925-960MHz

  1. FDM is used to ___________ the available frequency band in GSM

    1. Addition
    2. Divide
    3. Both a & b
    4. None of these

  1. The GSM has many burst types such as
    1. Normal burst
    2. Access burst
    3. Synchronization burst
    4. Frequency correction burst
    5. Dummy burst
    6. All of these
  2.  The normal burst period lasts
    1. Approximately 577ms or 15/26ms
    2. Approximately 572ms
    3. Approximately 567ms
    4. Approximately 578ms
  3. Which is provided to avoid overlap with other burst

    1. Frequency space
    2. Guard space
    3. Information space
    4. Bandwidth space

  1. Which is a dedicated time slots within a data or bit stream which repeats after a certain period of time

    1. Frequency
    2. Amplitude
    3. Channel
    4. Normal burst

  1. The channel can be further divided into

    1. Dedicated channel
    2. Common channel
    3. Both a & b
    4. None of these

  1. Both the dedicated and common channel are allocated to a

    1. Base station
    2. Mobile station
    3. Mobile switch
    4. All of these

    1.  
  1. When a slot repeated every 4.615ms constitute a _______ channel which can be split into several logical channel

    1. Logical
    2. Physical
    3. Both a & b
    4. None of these

  1.  TDMA is used to split carrier frequency of 200kHz into_______ time slots

    1. 4
    2. 8
    3. 16
    4. 24

  1. GSM 900 has _____ physical full duplex channels

    1. 125
    2. 124
    3. 248
    4. 247

  1. GSM 900 has _____ physical half duplex channels

    1. 125
    2. 124
    3. 248
    4. 247

  1. Time slot is also known as

    1. Logical channel
    2. Physical channel
    3. Both a & b
    4. None of these

    1.  
  1. A Traffic Channel(TCH) is defined for speech and data at a rates of

    1. 9.6kb/s
    2. 4.8kb/s
    3. 2.4kb/s
    4. All of these

    1.  
  1. The length of 24 TDMA frames are kept

    1. 120ms
    2. 130ms
    3. 150ms
    4. 160ms

  1.  How many frames are included for traffic in 26TDMA frames

    1. 1
    2. 24
    3. 25
    4. 16

  1. How many frames are included for Slow Associated Control Channel(SACCH) in 26TDMA frames

    1. 1
    2. 24
    3. 25
    4. 16

  1. How many frames are included for currently unused in 26TDMA frames

    1. 1
    2. 24
    3. 25
    4. 16

  1. Which are basically used to control the logical channels

    1. CCHs
    2. TCH
    3. Both a & b
    4. None of these

    1.  
  1. Depending upon the task performed by the Control Channels(CCHs),they are categorized in
    1. Broadcast Control Channels(BCCH)
    2. Common Control Channels(CCCH)
    3. Dedicated Control Channels(DCCH)
    4. All of these
  2. The different control channel are accessed by

    1. Idle mode
    2. Dedicated mode mobile
    3. Both a & b
    4. None of these

  1. Which is a unidirectional downlink point to multi-point signaling channel from BTS to MS

    1. BCCH
    2. CCCH
    3. DCCH
    4. All of these

  1. Which is bi-directional point to multi-point signaling channel that exchanges the signaling information for network access management and transport information regarding connection setup between MS and BTS
    1.  

    1. BCCH
    2. CCCH
    3. DCCH
    4. All of these

    1.  
  1. Which is bidirectional and are multiplexed on a standard channel for registration, location updating and authentication in order to set up a call or TCH

    1. BCCH
    2. CCCH
    3. DCCH
    4. All of these

  1. GSM specifies a multiplexing scheme to integrate several frames where a periodic pattern of 26 slots occurs in all TDM frames with a TCH , the combination of these frames are called

    1. Multiframe
    2. Traffic-multiframe
    3. Multiprogramming
    4. None of these

  1. Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is currently unused
    1. SACCH(Slow Associated Control Channel)
    2. FACCH(Fast Associated Control Channel)
    3. BCCH
    4. CCCH
  2. GSM is already mentioned that the duration of one TDMA frame is

    1. 4.516ms
    2. 4.615ms
    3. 4.156ms
    4. 4.165ms

  1. Control multiframe comprises of 51 TDMA frame with a duration of ________

    1. 234.5ms
    2. 233.5ms
    3. 235.4ms
    4. 235.3ms

  1. 2048 superframes constitute a ________

    1. hyperframe
    2. lowerframe
    3. strongerframe
    4. none of these

  1. GSM has three functional layers
    1. Physical layer
    2. Data link layer
    3. Layer three in correspondence with OSI model
    4. All of these
  2. In OSI model, the lower three layers usually terminate in the ______ but it is not true in case of GSM
    1. Another node
    2. Same node
    3. Two nodes
    4. None of these
  3. In protocols, the RR part of layer three is spread over the

    1. MS
    2. BTS
    3. BSC
    4. MSC
    5. All of these


  1. Physical layer is the ___________ which provides transfer of bit streams over the physical radio links through Um interface
    1. Lowest layer
    2. Highest layer
    3. First layer
    4. None of these
  2. Physical layer handles all radio specific functions such as ________________
    1. Creation of bursts
    2. Multiplexing of bursts into TDMA frame
    3. Synchronization with BTS
    4. Channel coding, error detection and correction
    5. Quality control on the downlink
    6. All of these
  3. The digital modulation and security related issues such as encryption of digital data are carried over the radio interface between ____________

    1. MS
    2. BTS
    3. Both a & b
    4. None of these

    1.  
  1. The communication on Abis interface between _____ and BSC is established by using the standard LAPD

    1. MS
    2. BTS
    3. MTS
    4. None of these

  1. A reliable data link service is provided between _________ through Message Transfer Part of SS7

    1. BSC
    2. MSC
    3. Both a & b
    4. None of these

    1.  
  1. The layer three chiefly comprises of _____________
    1. RR(radio resource management)
    2. MM(Mobility management)
    3. CM(call control management)
    4. All of these
  2. What are the functions of mobility management

    1. Location update
    2. Authentication
    3. Temporary Mobile Subscriber Identity
    4. Reallocation
    5. All of these

    1.  
  1. CM performs

    1. Establishment
    2. Maintenance
    3. Termination of a circuit-switched call
    4. All of these

    1.  
  1. CM performs other supporting

    1. Supplementary service(SS)
    2. Short Message Service(SMS)
    3. Both a & b
    4. None of these

  1. The radio resource management sublayer terminates at the

    1. BSC
    2. BSS
    3. MSC
    4. MTS

  1. The radio resource management is used to establish physical connections over the call-related signaling and traffic channels between the ______________

    1. BSC
    2. BSS
    3. MS
    4. Both b & c

  1. The RR layer is the part of RR layer is implemented in the BTS to provide functions between the ___________

    1. BTS
    2. BSC
    3. MSC
    4. Both a & b

  1. The __________ is also responsibility of the layers

    1. Handover
    2. Handoff
    3. Both a & b
    4. None of these

  1. Which uses signal strength measurements and cell congestion information to determine when a handoff should occur

    1. MSC
    2. BSS
    3. BSC
    4. Both a & b

  1. Handoff notifications are sent to respective ____ which in turn forward them to HLRs

    1. VLRs
    2. VLCs
    3. VCDs
    4. LCDs

  1. The mobility management sublayer on the _____ of the RR is terminated at the MSC

    1. Low
    2. Top
    3. Center
    4. First

  1. MM is used to

    1. Establish
    2. Maintain
    3. Release connections between the MS a
    4. The network MSC

    1. All of these
  1.  The Communication Management protocol controls __________ call establishment

    1. first-to-end
    2. end-to-end
    3. end-to-first
    4. first-to-first

  1. CM protocols are used in GSM network, these are
    1. Transaction Capabilities Application Part(TCAP) protocol
    2. Mobile Application Part(MAP)  protocol
    3. Both a & b
    4. None of these
  2. MAP is used between _________in the form of query and response messages

    1. MSC
    2. VLR
    3. HLR
    4. AuC
    5. All of these

  1. ____________ Together with the MSC. Provide the call routing and roaming capabilities of GSM where a subscriber can roam nationally and even internationally

    1. HLR
    2. VLR
    3. CLR
    4. Both a & b

  1. MSISDN stands for
    1. Mobile Subscriber ISDN Number
    2. Mobile Station  ISDN Number
    3. Mobile Switching ISDN Number
    4. Mobile Standard ISDN Number
  2. Which number caller used to reach a mobile subscriber

    1. MSISDN number
    2. IMSI number
    3. TMSI number
    4. MSRN

  1. MSISDN number consists of
    1. Country code(such as 91 for India)
    2. National subscriber destination code
    3. Subscriber number
    4. All of these
  2. Which number of MSISDN is the address of the GSM provider
    1. Country code(such as 91 for India)
    2. National subscriber destination code
    3. Subscriber number
    4. All of these
  3. Which is a unique identification number allocated to each mobile subscriber

    1. MSISDN Number
    2. IMSI Number
    3. TMSI Number
    4. MSRN

  1. It sits inside SIM card, which can be carried out anywhere and can be used in any MS

    1. MSISDN Number
    2. IMSI Number
    3. TMSI Number
    4. MSRN

  1. The IMSI number consists of
    1. MCC(Mobile Country Code consisting of three digits)
    2. MNC(Mobile Network Code consisting of two digits)
    3. MSIN(Mobile Subscriber Identity Number consisting of ten digits)
    4. All of these
  2. Which is used in the place of the IMSI for the definite identification and addressing of the mobile station

    1. MSISDN Number
    2. IMSI Number
    3. TMSI Number
    4. MSRN

  1. In TMSI nobody can determine the identity of the subscriber by listening to the __________

    1. Video channel
    2. Radio channel
    3. Audio channel
    4. None of these

    1.  
  1. GSM used the _______ byte TMSI for local subscriber identification

    1. 2
    2. 4
    3. 6
    4. 8

  1. Which is a temporary location-dependent ISDN number assigned by the locally responsible VLR to each mobile station in its area

    1. MSISDN Number
    2. IMSI Number
    3. TMSI Number
    4. MSRN           

  1. The MSRN consists of
    1. VCC(Visitor country code)
    2. VNDC(Visitor national destination code)
    3. The identification of the current MSC along with the subscriber number(SN)
    4. All of these
  2. GSM call may be classified into two types namely
    1. MTC(Mobile Terminated Call)
    2. MOC(Mobile Originated Call)
    3. Both a & b
    4. None of these
  3. ___________ becomes necessary when mobile moves from area of one BSC into another area of the same or into another BSC

    1. Handoff
    2. Handover
    3. Haddon
    4. Handwork

  1. Handover involves a number of procedures depending upon the location are
    1. Intra-cell handover
    2. Inter-cell, intra-BSC handover
    3. Inter-BSC, intra-MSC handover
    4. Inter MSC handover
    5. All of these
  2. Which involve the transfer of connections from one channel to another channel on the same BTS
    1. Intra-cell handover
    2. Inter-cell, intra-BSC handover
    3. Inter-BSC, intra-MSC handover
    4. Inter MSC handover
  3. Which involve the transfer of the connection from one BTS to another BTS on the same BSC
    1. Intra-cell handover
    2. Inter-cell, intra-BSC handover
    3. Inter-BSC, intra-MSC handover
    4. Inter MSC handover
  4. The connections is transferred between BTS belonging to two different BSCs within one MSC is called
    1. Intra-cell handover
    2. Inter-cell, intra-BSC handover
    3. Inter-BSC, intra-MSC handover
    4. Inter MSC handover
  5. Which involve the transfer of a connection to a BTS between two cells within another MSC
    1. Intra-cell handover
    2. Inter-cell, intra-BSC handover
    3. Inter-BSC, intra-MSC handover
    4. Inter MSC handover
  6. A collection of interconnected networks is known as

    1. Internet
    2. Internetwork
    3. Network
    4. Internetworking

  1. The process of interconnecting different network is called

    1. Internet
    2. Internetwork
    3. Network
    4. Internetworking

  1. The internetworking protocol is known as

    1. SMTP
    2. PPP
    3. TCP/IP
    4. NNTP

  1. The Network element that connects individual network is known as

    1. Gateway
    2. Router
    3. TCP/IP
    4. Both a & b

  1. If single computer network is divided into segments and router are added between them it forms an

    1. Internet
    2. Internetwork
    3. Network
    4. Internetworking

  1. Which was used as original term for an internetwork which meant a method for connecting networks with disparate technologies

    1. Catenet
    2. Bridge
    3. PANs
    4. Novell netware

  1.  The computer network are of different types…some are
    1. PANs(Personal Area Networks)
    2. Novell Netware
    3. Both  a & b
    4. None of these
  2. The word Internet and internet are

    1. Different
    2. Same
    3. Dependent on each other
    4. None of these

  1. Which signifies the specific network model

    1. internet
    2. Internet
    3. Both a & b
    4. None of these

  1. Which means generic interconnection of networks

    1. internet
    2. Internet
    3. Both a & b
    4. None of these

    1.  
  1. Which protocol provides a reliable data transfer

    1. TCP
    2. UDP
    3. IP
    4. Both a & b

  1. Which protocol provides a unreliable data transfer

    1. TCP
    2. UDP
    3. IP
    4. Both a & b

  1. Every computer has a unique address called

    1. IP
    2. UDP
    3. TCP
    4. None of these

  1. The IP address lies between

    1. 0 to 245
    2. 0 to 254
    3. 0 to 255
    4. 0 to 265

    1.  
  1. DHCP stands for
    1. Dynamic Host Configuration Protocol
    2. Digital Host Communication Provider
    3. Digital Host Communication Protocol
    4. Dynamic Host Configuration Provider
  2. __________ is used for every computer needs one protocol stack for communicating on the Internet

    1. Protocol stack
    2. Protocol
    3. Transmission protocol
    4. None of these

  1. Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
    1. Application Layer Protocol
    2. Transport Layer Protocol
    3. Internet Layer Protocol
    4. Hardware Layer
  2. Which protocol uses TCP routes to an application on a computer by use of a port number
    1. Application Layer Protocol
    2. Transport Layer Protocol
    3. Internet Layer Protocol
    4. Hardware Layer
  3. Which protocol moves IP packets to a specific computer by use of an IP address
    1. Application Layer Protocol
    2. Transport Layer Protocol
    3. Internet Layer Protocol
    4. Hardware Layer
  4. Which contains network interface cards, modems for phones or wireless lines for converting binary packet data to network signals and vice versa
    1. Application Layer Protocol
    2. Transport Layer Protocol
    3. Internet Layer Protocol
    4. Hardware Layer
  5. Hardware layer handle raw

    1. Bytes of data
    2. Bits of data
    3. Both a & b
    4. None of these

  1. Where is the TCP layer is situated in the application layer in the protocol stack

    1. Below
    2. Top
    3. Center
    4. None of these

  1. TCP uses port number to route correct application on the ___________

    1. Source computer
    2. Destination computer
    3. Both a & b
    4. None of these

  1. TCP is __________ in nature

    1. Textual
    2. Not textual
    3. None of these

    1.            
  1. TCP also contains a ___ checksum

    1. 16bit
    2. 16byte
    3. 32bit
    4. 32byte

  1. What is the port number of the HTTP

    1. 80
    2. 25
    3. 23
    4. 20/21

  1. What is the port number of the SMTP

    1. 25
    2. 23
    3. 20/21
    4. 27960

  1. What is the port number of the Telnet

    1. 25
    2. 23
    3. 20/21
    4. 27960

  1. What is the port number of the FTP

    1. 25
    2. 23
    3. 20/21
    4. 27960

  1. What is the port number of the Quake III Arena

    1. 25
    2. 23
    3. 20/21
    4. 27960

  1. TCP is ______________

    1. Connection-oriented
    2. Reliable
    3. Both a & b
    4. None of these

    1.  
  1. IP is ___________

    1. Connectionless
    2. Unreliable
    3. Both a & b
    4. None of these

    1.  
  1. IP does not ensure movement of a packet to its destination and have no knowledge of __________

    1. Port numbers
    2. Connections
    3. Both a & b
    4. None of these

    1.  
  1. IP packets ________ arrive in the order in which it is sent

    1. May
    2. May not
    3. May or may not
    4. None of these

    1.  
  1. SMDS stands for
    1. Switched Multiple Data Services
    2. Switched Multimegabit Data Services
    3. Switched Multiple Double Services
    4. Switched Multiple Data Subscriber
  2. SMDS is a packet switched, high speed, connectionless public data service that extends
    1. Local Area Network
    2. Metropolitan Area Network
    3. Wide Area Network
    4. All of these
  3. In SMDS, the service follows
    1. IEEE 802.6 DQDB(Distributed Queue Dual Bus)
    2. IEEE 802.5 DQDB(Distributed Queue Dual Bus)
    3. IEEE 802.4 DQDB(Distributed Queue Dual Bus)
    4. IEEE 803.6 DQDB(Distributed Queue Dual Bus)
  4. The SMDS is defined for MAN under_______ standard

    1. IEEE 802.5
    2. IEEE 802.4
    3. IEEE 802.6
    4. IEEE 802.2

  1. SMDS is capable of variety of technologies including
    1. DQDB(Distributed Queue Dual Bus)
    2. Broadband ISDN(B-ISDN)
    3. Both a & b
    4. None of these
  2. North American implementation uses DQDB with DS1 at a data rate of

    1. 1.5Mbit/s
    2. 45Mbits/s
    3. 1.6Mbit/s
    4. 46Mbit/s

    1.  
  1. North American implementation uses DQDB with DS3 at a data rate of

    1. 1.5Mbit/s
    2. 45Mbits/s
    3. 1.6Mbit/s
    4. 46Mbit/s

  1. SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of

    1. 1.5Mbit/s
    2. 45Mbits/s
    3. 155Mbit/s
    4. 1.9Mbit/s

  1. SMDS is a

    1. Data service
    2. Telephone service
    3. Frame service
    4. Video service

  1. SMDS is a

    1. Technology
    2. Protocol
    3. Both a & b
    4. None of these

    1.  
  1. The word CPE means
    1. Customer Premises Equipment
    2. Computer Premises Equipment
    3. Customer Packet Equipment
    4. Customer Protocol Equipment
  2. The SMDS is designed to handle

    1. Continuous traffic
    2. Finite traffic
    3. Bursty traffic
    4. All of these

  1. The telephone service is designed to handle

    1. Continuous traffic
    2. Finite traffic
    3. Bursty traffic
    4. All of these

  1. In SMDS , the telephone number consists of

    1. Country code
    2. Area code
    3. Subscriber code
    4. All of these

  1. The SMDS can serve

    1. Only area
    2. Only nationally
    3. Internationally
    4. None of these

    1.  
  1. Address of source and destination in SMDS both consists of 4 bit code followed by a telephone no of max.

    1. 12 decimal digits
    2. 16 decimal digits
    3. 15 decimal digits
    4. 20 decimal digits

    1.  
  1. The SMDS is similar to which  transfer mode
    1. Synchronous transfer mode
    2. Asynchronous transfer mode
    3. Both a & b
    4. None of these
  2. SMDS make use of cell relay with _______ per cell

    1. 53 octets
    2. 56 octets
    3. 58 octets
    4. 55 octets

    1.  
  1. The data unit of SMDS can encapsulate frames of

    1. IEEE802.3
    2. IEEE802.5
    3. FDDI
    4. All of these

  1. SMDS make use of

    1. Copper
    2. Fiber media
    3. Both a & b
    4. None of these

  1. In SMDS, with a tick every 10msec user can send_________ on the average

    1. 100,000 bytes/sec
    2. 10,000 bytes/sec
    3. 100,0000 bytes/sec
    4. 100,000,00 bytes/sec

  1. Which means the network can expand with minimal investment

    1. SNMP
    2. Scalability
    3. Screening
    4. Simple

    1.  
  1.  Which is a network protocol that is based on UDP and is a component of the component of the Internet Protocol Suite, defined by IETF(Internet Engineering Task Force)

    1. SNMP
    2. Scalability
    3. Screening
    4. Multicasting

    1.  
  1. The user can have access to high speed lines ______ connected to MAN

    1. 32Mbits/s
    2. 33Mbits/s
    3. 34Mbits/s
    4. 35Mbits/s

  1. The user can having access capacity of ______ connected to MAN

    1. 151Mbits/s
    2. 152Mbits/s
    3. 154Mbits/s
    4. 155Mbits/s

  1. The backbones of MAN has working data rate of ________

    1. 139Mbits/s
    2. 140Mbits/s
    3. 155Mbits/s
    4. 134Mbits/s

  1. User is charged for maximum rate of __________ bandwidth

    1. 34Mbits/s
    2. 4Mbits/s
    3. 10Mbits/s
    4. 16Mbits/s
    5. 25Mbits/s
    6. Except (a) all are answers

  1. SMDS was primarily used for connecting

    1. LAN
    2. MAN
    3. WAN
    4. PAN

  1. In SMDS, MAN interconnect

    1. Ethernet
    2. Token ring networks
    3. Both a & b
    4. None of these

  1. SMDS networks have many underlying devices for supporting high-speed service are
    1. Subscriber network interface(SNI)
    2. Carrier equipment
    3. Customer Premises Equipment (CPE)
    4. All of these
  2. CPE may be devices such as

    1. PCs(Personal computers)
    2. Intermediate nodes
    3. Terminals
    4. All of these

    1.  
  1. Which are intermediate nodes provided by SMDS carrier

    1. Multiplexers
    2. Modems
    3. Routers
    4. All of these

  1. PDUs contain

    1. Source address
    2. Destination address
    3. Both a & b
    4. None of these

  1.  Addressing in SMDS has provision for 

    1. Group addressing
    2. Security features
    3. Both a & b
    4. None of these

  1. In SMDS, there are two useful security features, namely
    1. Source address validation
    2. Address screening
    3. Both a & b
    4. None of these
  2. CCITT stands for
    1. Consultative Committee International for Telegraphy and Telephony
    2. International Consultative Committee for Telegraphy and Telephony
    3. International Consultative Committee for Telephony and Telegraphy
    4. Consultative Committee International for Telephony and Telegraphy
  3. X.25, it was developed for computer connections used for

    1. Timesharing connection
    2. Terminal connection
    3. Both a & b
    4. None of these

  1. X.25 provides a virtual high-quality digital network at

    1. Low cost
    2. High cost
    3. Medium cost
    4. All of these

  1. Which is another useful characteristics of X.25

    1. Speed
    2. Matching
    3. Speed matching
    4. None of these

  1. In X.25 DTEs are not required to use the same line speed because of the

    1. Store
    2. Forward nature of packet switching
    3. Excellent flow control
    4. All of these

  1.  In X.25, A host connected at 56kbps and communicating with numerous remote sites can be linked with cheaper______ lines

    1. 18.2kbps
    2. 19.2kbps
    3. 20.2kbps
    4. 22.2kbps

  1. In X.25 defines the protocols from
    1. Layer 2 to Layer 3
    2. Layer 1 to Layer 2
    3. Layer 1 to Layer 3
    4. Layer 3 to Layer 2
  2. Based on X.25 rules, how many logical channel can be set on a single physical line

    1. 256
    2. 16
    3. 4096
    4. 2556

    1.  
  1. To enable control of 4096 logical channels in X.25, there are ____ channel groups

    1. 256
    2. 16
    3. 4096
    4. 2556

  1. Each logical channel group is divided into ____ logical channels

    1. 256
    2. 16
    3. 4096
    4. 2556

  1. The channel grouping in X.25 are known as
    1. Logical channel group number(LCGN)
    2. Logical channel number(LCN)
    3. Both a & b
    4. None of these
  2. X.25 is a

    1. Protocol
    2. Data service
    3. Telephone service
    4. Technology

  1. X.25 protocol was recommended by CCITT in

    1. 1975
    2. 1976
    3. 1977
    4. 1978

  1. X.25 protocol exchanged the data control information between

    1. A node
    2. A user device
    3. Both a & b
    4. None of these

  1. The user device and node are properly referred to as

    1. DTE
    2. DCE
    3. Both a & b
    4. None of these

  1. A terminal of 1.2kbit/s can communicate with host computer at _______ through the packet switched network

    1. 9600bits/s
    2. 8600bits/s
    3. 7600bits/s
    4. 6600bits/s

  1. The transmission speed of sender should be ___________ as that of receiver in the X.25

    1. Same
    2. Different
    3. Both a & b
    4. None of these

  1. X.25 make use of _______ service

    1. Connectionless
    2. Connection-oriented
    3. Both a & b
    4. None of these

  1. PAD stands for
    1. Packet Assembly and Disassembly
    2. Procedure Assembly and Disassembly
    3. Permanent Assembly and Disassembly
    4. Package Assembly and Disassembly
  2. X.25 supports two types of packet format named

    1. Control packet
    2. Data packet
    3. Both a & b
    4. None of these

    1.  
  1. A X.25 packet make up the ______ of an HDLC frame

    1. Frame field
    2. Data field
    3. Information field
    4. Both b and c are same

  1. Maximum packet sizes in X.25 vary from

    1. 64bytes to 128bytes
    2. 64bytes to 4096 bytes
    3. 64bytes to 256bytes
    4. 32bytes to 64bytes

  1. A X.25 protocol use
    1. Store and forward method
    2. Stop and wait method
    3. Store and stop method
    4. None of these
  2. The advantage of X.25 are
    1. Was developed to recover errors
    2. Packet switching eases compatibility problems in communications between PCs
    3. Packet switching cannot waste bandwidth
    4. All of these
  3. Frame relay constitutes of the OSI _____ layer

    1. First
    2. Second
    3. Third
    4. Fourth

  1. Logical channels are identified by a number referred by
    1. DLCI(Data Link Connection Identifier)
    2. VLCI(Very Large Connection Identifier)
    3. HDLC(High Level Data Link Control )
    4. QLLC
  2. DLCI can have a value between

    1. 0 and 1025
    2. 0 and 125
    3. 0 and 256
    4. 0 and 1023

    1.  
  1. The device which splits data into frames as well as combines frames into data is referred as
    1. FRAD(Frame relay and Disassembly)
    2. FDLC
    3. HDLC
    4. DLCI
  2. Frame relay indicates network congestion using two flags namely ________ bits in data frames
    1. Forward Explicit Congestion Notification(FECN)
    2. Backward Explicit Congestion Notification(BECN)
    3. Both a & b
    4. None of these
  3. Cell relay is data transmission services that uses transmission technology referred to as

    1. ATM(Asynchronous Transfer Mode)
    2. BTM
    3. STM
    4. DTM

  1. The data transmission is a fixed length of data known as

    1. Cell
    2. Frame
    3. Relay
    4. Cell relay

  1. Advantages of cell relay are

    1. High-speed transmission
    2. Multiplexing transmission
    3. Both a & b
    4. None of these

  1. Disadvantages of cell relay are

    1. Cell discarding occurs with congestion
    2. High cost
    3. Both a & b
    4. None of these

  1. The cell relay protocol corresponds to first ____ layer of OSI

    1. One
    2. Two
    3. Three
    4. Four

  1. The part that corresponds to second layer, that is, data link layer is referred to as

    1. DLC layer
    2. ATM layer
    3. STM layer
    4. Protocol layer

  1. In cell relay these logical channels are represented as

    1. Virtual Channels(VCs)
    2. Virtual Paths(VPs)
    3. Both a & b
    4. None of these

  1. A VC is a virtual channel composed of

    1. Frames
    2. Cells
    3. Relay
    4. Protocol

  1. VP is a bundle of

    1. VCs
    2. VCM
    3. VCI
    4. VIP

  1. Identifiers are called ___________________ are used to identify VPS and VCs

    1. VCIs
    2. VIPs
    3. Both a & b
    4. None of these

  1. In cell relay communication performed between

    1. Two VP
    2. Two VC
    3. VP and VC
    4. VP and VCI

  1. ATM is an
    1. International Telecommunication
    2. International Telecommunication-Union
    3. International Telecommunication Union-Telecommunication Standardization Sector(ITU-T)
    4. International Telecommunication Union-Telecommunication
  2. ATM networks are

    1. Connectionless
    2. Interconnected
    3. Connection oriented
    4. None of these

  1. In today ATM, separate networks are used to carry _________ information mostly

    1. Voice
    2. Video
    3. Data
    4. All of these

  1. Data traffic in ATM tend to be

    1. Continuous
    2. Bursty
    3. Discontinuous
    4. None of these

  1. ATM cell has a fixed length of __________

    1. 52bytes
    2. 53bytes
    3. 54bytes
    4. 55bytes

  1. Which is a portion carries the actual information

    1. Payload(48bytes)
    2. Payment
    3. Payroll
    4. None of these

  1. The purpose of ATM is to provide
    1. High speed
    2. Low-delay multiplexing
    3. Switching networks
    4. All of these
  2. ATM is specifically designed as ________ technology for voice, video, and data

    1. Single
    2. Double
    3. Multiple
    4. None of these

  1. ATM can support
    1. Different speeds
    2. Traffic types
    3. Quality of service attached to applications
    4. All of these
  2. ATM cells coming from a user are guaranteed delivery at the other end with a

    1. High probability
    2. Low delay
    3. Both a & b
    4. None of these

  1. The characteristics of ATM are as follows
    1. The transport speeds of most ATM applications are most often 155Mbps and 622Mbps
    2. ATM is a flexible service made possible by the size of the packets (cells).
    3. The small cell size allows a variety of applications to run on ATM networks including voice, video and data
    4. All of these
  2. Narrow band ISDN provides for the following services

    1. Circuit-switched voice
    2. Circuit-switched data
    3. Low-speed packet
    4. High-speed packet
    5. All of these

  1. The cell relay is considered to be the __________ of the future

    1. Transmission service
    2. Transport service
    3. Transfer service
    4. None of these

  1. ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines, as also other media

    1. CCITT
    2. ITU
    3. Both a & b
    4. None of these

  1. Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less

    1. 1.533Mbps
    2. 1.544Mbps
    3. 1.555Mbps
    4. 1.552Mbps

  1. The range of speeds for the broadband ISDN services usually range from ______ to the Gigabit range

    1. 24Mbs
    2. 25Mbs
    3. 26Mbs
    4. 27Mbs

  1. BRA stands for

    1. Basic Rate Access
    2. Basic Random Assembly
    3. Bit Rate Assembly
    4. Bursty Rate Assembly

    1.  
  1. BRA affords an ISDN user with simultaneous access to two _____ data channels

    1. 32kbps
    2. 64kbps
    3. 128kbps
    4. 256kbps

  1. The ISDN Internetworking Equipment devices are

    1. Terminal Adapters(TAs)
    2. ISDN Bridges
    3. ISDN Routers
    4. All of these

  1. Advantages of ISDN internetworking are

    1. Quality
    2. Economy
    3. Availability
    4. All of these

    1.  
  1. ISDN connections mat be seen as very _______ digital conduits

    1. High rate-of-error
    2. Low rate-of-error
    3. Both a & b
    4. None of these

    1.  
  1. Each channel in BRA is referred to as

    1. A-channel
    2. B-channel
    3. C-channel
    4. F-channel

  1. The B-channel is capable of carrying both

    1. Voice
    2. Data
    3. Both a & b
    4. None of these

  1. The Another channel in BRA(Basic Rate Access) is referred as D-channel Functions at

    1. 12Kbps
    2. 14Kbps
    3. 16Kbps
    4. 18Kbps

  1. The D-channel in BRA is used for sending and receiving signal between

    1. User devices
    2. ISDN
    3. Both a & b
    4. None of these

  1. The total transmission rate of BRA workout to a combined total of

    1. 144kbit/s
    2. 145kbit/s
    3. 146kbit/s
    4. 147kbit/s

  1. BRA is also known as ____________, as per CCITT

    1. I.430
    2. I.420
    3. I.440
    4. I.450

  1. Which service provide up to thirty independent 64kbps B channels and a separate 64kbps D channel to carried the signaling

    1. Basic rate access
    2. Primary rate access
    3. Both  a & b
    4. None of these 

  1. Primary rate access is also known as __________, as per CCITT

    1. I.420
    2. I.421
    3. I.422
    4. I.423

  1. The CCITT eventually was reformed in to the group which is now called the ________

    1. ITU-T
    2. UIT-T
    3. TIU-T
    4. TUI-T

  1. The two standards ISDN connectors are
    1. RJ-45 type plug and socket uses unshielded twisted pair cable
    2. One for accessing primary rate ISDN through a coaxial cable
    3. Both a & b
    4. None of these
  2. ISDN can be accessed as per CCITT by using two service called

    1. BRI(Basic Rate Interface)
    2. PRI(Primary Rate Interface)
    3. Both a & b
    4. None of these

    1.  
  1. BRI includes ______ B channels and ________ D channel
    1. One , two
    2. Two, three
    3. Two, one(may be written as 2B+D)
    4. Three, two
  2. BRI providing data transmission speed of

    1. 62kbps
    2. 63kbps
    3. 64kbps
    4. 65kbps

  1. PRI is popularly referred to as ____________ due to the number of channels as per CCITT

    1. 20+D
    2. 30+D
    3. 40+D
    4. 50+D

  1. PRI can carry up to 30 independent, ________ lines of data or voice channels

    1. 62kbps
    2. 63kbps
    3. 64kbps
    4. 65kbps

8 comments :

  1. plz give me answer those question written abov

    ReplyDelete
    Replies
    1. see in questions very carefully.... answer is in bold letters.
      in 4 options you will see one option is with dark black color. that Bold option is the answer of the question.

      बहुत सावधानी से प्रश्नों में देखें .... उत्तर बोल्ड अक्षरों में है I
      4 विकल्पों में आप देखेंगे कि एक विकल्प काले रंग का काला है। बोल्ड विकल्प प्रश्न का उत्तर है।

      Delete
  2. pls send answer all of above question
    sandeep.sony.28@gmail.com

    ReplyDelete
    Replies
    1. see in questions very carefully.... answer is in bold letters.
      in 4 options you will see one option is with dark black color. that Bold option is the answer of the question.

      बहुत सावधानी से प्रश्नों में देखें .... उत्तर बोल्ड अक्षरों में है I
      4 विकल्पों में आप देखेंगे कि एक विकल्प काले रंग का काला है। बोल्ड विकल्प प्रश्न का उत्तर है।

      Delete
  3. pls send answer all of above question
    gunadmtdomains@gmail.com

    ReplyDelete
    Replies
    1. see in questions very carefully.... answer is in bold letters.
      in 4 options you will see one option is with dark black color. that Bold option is the answer of the question.

      बहुत सावधानी से प्रश्नों में देखें .... उत्तर बोल्ड अक्षरों में है I
      4 विकल्पों में आप देखेंगे कि एक विकल्प काले रंग का काला है। बोल्ड विकल्प प्रश्न का उत्तर है।

      Delete
  4. I really appreciate information shared above. It’s of great help. If someone want to learn Online (Virtual) instructor lead live training in IBM IDENTITY MANAGEMENT, kindly contact us http://www.maxmunus.com/contact
    MaxMunus Offer World Class Virtual Instructor led training on IBM IDENTITY MANAGEMENT. We have industry expert trainer. We provide Training Material and Software Support. MaxMunus has successfully conducted 100000+ trainings in India, USA, UK, Australlia, Switzerland, Qatar, Saudi Arabia, Bangladesh, Bahrain and UAE etc.
    For Demo Contact us.
    Saurabh Srivastava
    MaxMunus
    E-mail: saurabh@maxmunus.com
    Skype id: saurabhmaxmunus
    Ph:+91 8553576305 / 080 - 41103383
    http://www.maxmunus.com/


    ReplyDelete