Data Communication And Networks 04
- The
device used for splits data into frames and then combines frames into data
in frame relay is termed as
- FRAD(Frame
Relay And Disassembly)
- Framing
- Both a & b
- Slipping
Window Protocol
- The
Error controls involves
- Sequencing
of control frame
- Sending
of control frame
- Both a & b
- None
of these
- During
communication, a channel that is noisy may causes
- Loss
of bits from a frame
- Flips
of bits
- Complete
disappearance of frames
- Introduction
of new bits in the frame
- All of these
- The
data link layer encapsulates each packet in a frame by adding
- Header
- Trailer
- Both a & b
- None
of these
- The
Frame format of framing are
- DLCI-10bits
- EA-2location(First
one is fixed at 0 and second at 1)
- DE-1
is set for the part that can be discarded first when congestion occurs
- Data
size-vary up to 4096bytes
- All of these
- Which
is a simple data link protocol based on certain ideal assumptions to
explain the working of the data link layer
- Stop
ARQ
- Wait
ARQ
- Go
back-N ARQ
- Both a & b
- The
assumptions of Stop and Wait ARQ are as
- Infinite
buffer size
- Half
Duplex
- Does
not produce any error
- Network
layers are always ready
- All of these
- The
protocol based on the assumption are called
- Elementary data link protocol
- Data
link protocol
- Sliding
Window Protocol
- HDLC
- The
basic objective of computer communication in a network environment is to
send an infinitely long message from the ____________
- Source
node to the source node
- Destination
node to the destination node
- Source node to the destination node
- None
of these
- In
stop and wait protocol
- Sequence
number are required
- Sequence number are not required
- Both
a & b
- None
of these
- The
stop and wait protocol is
- easy
to Implement
- Does
not call for congestion
- Both a & b
- None
of these
- The
disadvantage of stop and wait protocol is
- Error
free communication channel does not exist
- Acknowledgement
may get lost
- Deadlock
situation may occur
- All of these
- Which protocol enables the source
machine to possess more than one outstanding frame at a time by using
buffers
- Stop
ARQ
- Wait
ARQ
- Go back-N ARQ
- Both
a & b
- The Go back-N ARQ overcomes the problem
of
- Another
important issue in the design if the data link is to control the rate of
data transmission between _____________
- Source
and destination host
- Two source and destination host
- Three
source and destination host
- None
of these
- Which
one is the important protocol used by the data link layer
- Sliding
protocol
- Sliding Window protocol
- Stop
sliding approach
- None
of these
- The
sender keeps a list o consecutive sequence numbers is known as
- Window
- Sending window
- Stop
and wait ARQ
- Sliding
window
- Which
protocol is for data transmission and is bi-directional, used in the data
link layer that corresponds to layer 2 of OSI model
- Sending
window
- Sliding window protocol
- Stop
and wait ARQ
- Sliding
window
- Sliding
window protocol keeps record of frame sequences sent and acknowledged when
communication takes place between
____________
- Users
- Two users
- More
users
- None
of these
- Sliding
window protocol is also used by most of the _______________________
- Connection
oriented protocols
- Connection oriented network protocols
- Connection
network protocols
- None
of these
- Which
is used by many users to establish their home PC to the Internet via a
phone-line connection
-
- Sliding window protocol works on
_________ in which there is simultaneous two-way communication
- no
duplex
- half
duplex
- full duplex
- single
duplex
-
- Sliding
window protocol makes use of two types of frames namely
- Data
frame
- Acknowledgement
frame
- Both a & b
- None
of these
- Another
improvement is done over this ‘stop and wait’ type protocol by use of
________
- Back
- Piggybacking
- Piggy
- None
of these
- A
technique in which acknowledgement is temporarily delayed and then hooked
onto next outgoing frame is known as
-
- Back
- Piggybacking
- Piggy
- None
of these
- Robin
time taken
- Round trip time
- Round
time trip
- Round
time trip
- The
variants of sliding window protocol are
- Go
back n
- Selective
repeat
- Selective
reject
- All of these
- The
sliding window protocol employs ___________
- A
wait approach
- A
stop approach
- Both a & b
- None
of these
- HDLC
is a __________ synchronous data link layer protocol
- Bit-oriented
- Byte-oriented
- Both a & b
- None
of these
- Switched
protocol
- Non-
Switched protocol
- Both a & b
- None
of these
- HDLC
is a superset of ___________
- HDLC
also has a subset of ______________
- Which
is another subset of HDLC that finds use in packet switched networks of
ITU-TS X.25
- ADCCP
- SDLC
- LAP-B(Link Access Protocol-Balanced)
- None
of these
- In
HDLC three types of stations are specified by the data link layer
- Primary
Station
- Secondary
Station
- Combined
Station
- All of these
- HDLC
works on three different types of configurations namely
- Balanced
configurations
- Unbalanced
configurations
- Symmetrical
configurations
- All of these
- Frames
of secondary station are known as _________ are sent only on request by
the primary station
- Response
- Responses
frame
- Both a & b
- None
of these
- Which
is a unit of data transmission
- Frame
- Stop
and wait ARQ
- HDLC
- Frame
relay
- A
configuration has at least two combined stations in which every station
has equal and complimentary responsibility known as __________________
- Balanced configurations
- Unbalanced
configurations
- Symmetrical
configurations
- None
of these
- Balanced
configurations find use only in the such cases as given below
- Operation:
Full or half duplex
- Network:
Point to Point
- Both a & b
- None
of these
- A configuration has one primary station
and at least one secondary station , and it exists as one station
exercises control over other stations known as ________
- Balanced
configurations
- Unbalanced configurations
- Symmetrical
configurations
- None
of these
- Symmetrical
configurations comprises of _________________________
- Two
independent
- Unbalanced
stations
- Connected
point to point
- All of these
-
- Logically,
every station is considered as __________ stations
-
- The
protocol and data are totally independent, this property known as
____________
- Transmission
- Transparency
- Transparent
- Transport
- In
HDLC, problems like _______________ do not occur
- Data
loss
- Data
duplication
- Data
corruption
- All of these
- How
many modes of operations are defined for the HDLC protocol
- Three
modes of operations are defined for the HDLC protocol
- Normal
Response Mode(NRM)
- Asynchronous
Response Mode(ARM)
- Synchronous
Balanced Mode(ABM)
- All of these
- In
primary station initializes links for controlling the data flow between
___________
- Primary
and secondary stations
- Error
control
- Logical
disconnection of the second stations
- All of these
- The
ABM mode is suitable only to __________ environment
- Point
- Point-to-point
- First-to-end-point
- None
of these
- In the
HDLC protocol, frame consists of __________
- Three
fields
- Four
fields
- Five
fields
- Six fields
-
- A
special eight-bit sequence ________ is referred to as a flag
- 01111111
- 01111110
- 11101110
- 11101110
- In the
HDLC protocol, every frame consists of __________ with a flag
- Starts
- End
- Both a & b
- None
of these
- A
8-bit address is used when the total number of stations exceeds _______
- Data
can be arbitrarily ______
- Long
- Empty
- Full
- Both a & b
- The
HDLC procedure uses a flag synchronous system, these are
- Bit
order of transmission (information frame)
- Bit
order of transmission (supervisor frame)
- Both a & b
- None
of these
- FCS
(frame check sequence) is a _______ sequence for error control
- The
disadvantage of SLIP are as follows
- No
error check function is available
- Protocols
other than IP cannot be used
- No
function is available to authenticate link level connections
- No
function is available to detect loops
- All of these
- PPP
has several advantages over non-standard protocol such as
- SLIP
- X.25
- Both a & b
- None
of these
-
- PPP
was designed to work with layer 3 network layer protocols including
___________
- IP
- IPX
- Apple
talk
- All of these
- PPP
can connect computers using _________
- Serial
cable, phone line
- Trunk
line, cellular telephone
- Specialized
radio links
- Fiber
optic links
- All of these
- Most
dial-up access to Internet is accomplished by using _____
- RAS
has an important role in the proliferation of Internet based services in
the form of _________________
- VoIP
- Data
over IP
- Both a & b
- None
of these
- Which
is opening new challenges in the development of RAS where VoIP enabled RAS
are the need of time
- Voice
convergence
- Data
convergence
- Voice
and data convergence
- None of these
- Remote
access is possible through an __________________
- Internet
service provider
- Dial
up connection through desktop
- Notebook
over regular telephone lines
- Dedicated
line
- All of these
- A
remote access server also known as ____________________
- Communication
- Communication server
- Layer
- None
of these
- RAS
technology can be divided into two segments _________
- Enterprise
- Infrastructure
- Both a & b
- None
of these
- VPN
stands for
- Virtual
Public networking
- Virtual private networking
- Virtual
package networking
- Virtual
packet networking
- PPP
provides three principal components
- Encapsulating
datagrams
- Establishment,
configurations and testing
- Establishment
and configurations
- All of these
- PPP is
able to function across any _______ interface
- DTE
- DCE
- Both a & b
- None
of these
- RS232C
- RS-423
- Both a & b
- None
of these
-
- In
PPP, the default maximum length of the information field is ________
- 1000bytes
- 1500bytes
- 2000bytes
- 2500bytes
-
- The
protocols that are differentiate PPP from HDLC are the
- Link
Control Protocol(LCP)
- Network
Control Protocol(NCP)
- Both a & b
- None
of these
- For
terminate PPP ,the four steps are
- Link
establishment
- Link
configuration negotiation
- Configuration
acknowledgement frame
- Configuration
terminates
- All of these
- The
LCP can terminates the link at any time is done by
- Request to the user
- Not
Request to the user
- Both
a & b
- None
of these
- The
termination of link may happen
- Due to physical event
- Due
to logical event
- Due
to window event
- None
of these
- The
three classes of LCP frames are
- Link
establishment frame
- Link
termination frame
- Link
maintenance frame
- All of these
- The
NCP phase in PPP link connection process is used for establishing and
configuring different network layer protocols such as
- IP
- IPX
- AppleTalk
- All of these
- In
NCP, The link traffic consists of any possible combination of
- NCP
- LCP
- Network-layer
protocol packets
- All of these
- The IP
control Protocol(IPCP) is the
- IP-specific
LCP protocol
- IP-specific NCP protocol
- Both
a & b
- None
of these
- If the
calling peer has an IP address, it tells the
- Called peer What it is
- The
called peer can assign the caller one from a pool of addresses
- Both
a & b
- None
of these
- If the
calling peer does not have an IP address, it tells the
- Called
peer What it is
- The called peer can assign the caller
one from a pool of addresses
- Both
a & b
- None
of these
- The
authentication process involves transmission of password information
between
- RADIUS
server
- RAS(Remote
Access Server)
- Both a & b
- None
of these
- The
Authentication transaction used between a Remote access user and RAS can
be divided into two categories are
- PAP(Password
Authentication Protocol)
- CHAP(Challenge
Handshake Authentication Protocol)
- Both a & b
- None
of these
- The
digest is a
- One-way encryption
- Two-
way encryption
- Three-
way encryption
- Four-
way encryption
- The
technology which is useful for creating Virtual Private Networks (VPNs)
has been developed by
- Microsoft Corporation
- U.S.
Robotics
- Several
remote access vendor companies, known as PPTP forum
- All of these
- PPTP
means
- Point-to-Point Tunneling Protocol
- Point-to-Point
Termination Protocol
- Private-to-Private
termination protocol
- Private-to-Private
Tunneling Protocol
- The
PPTP is used to ensure that message transmitted from one VPN node to
another are
- Not
secure
- Secure
- Networks
- IPX
- What is the extension of PPTP
- PPP
- RAS
- L2TP(Layer Two Tunneling Protocol)
- None
of these
- The
two main components that make up L2TP are the
- L2TP
Access Concentrator(LAC)
- L2TP
Network Server(LNS)
- Both a & b
- None
of these
- A user
connects to NAS through
- ADSL
- Dialup
POTS
- ISDN
- Other
service
- All of these
- Which
is a platform on which Internet service providers(ISP) and other service
providers enables their user to access the various internet based services
- RAS
- TCP
- ARQ
- SLIP
This is very good content you share on this blog. it's very informative and provide me future related information.
ReplyDeleteSelenium training in Chennai
Selenium training in Bangalore
Selenium training in Pune
Selenium Online training
This comment has been removed by the author.
ReplyDeleteThis post is so usefull and informaive keep updating with more information.....
ReplyDeleteFuture Of Data Scientists
Career In Data Science
This is an excellent post - thank you for sharing it! I always relish the opportunity to read such superb content filled with valuable information. The ideas presented here are truly best and exceptionally captivating, making the post thoroughly enjoyable. Please continue with your fantastic work.
ReplyDeletevisit- Data Science for Business: Benefits, Examples & Strategies
Thank you for sharing! I appreciate your positive feedback. It's always rewarding to know that the content resonates with readers. I'll continue to strive for excellence and deliver valuable information. Your encouragement fuels the ongoing effort to provide enjoyable and insightful content.
ReplyDeletevisit: Geospatial Data Analytics: Geographic Insights and Mapping
Useful post Thanks for sharing it ,that truly valuable knowledge about similar topic. checkout my blog Tableau training in pune it will help to gain knowledge about the importance of tableau software in IT industries. thank you
ReplyDeleteThanks for sharing it. I always enjoy reading such superb content with valuable information. The ideas presented are excellent and really cool, making the post truly enjoyable. Keep up the fantastic work.
ReplyDeleteVisit: Mastering Java: A Comprehensive Guide to Java Courses