Sunday, 18 March 2012

Data Communication And Networks 04


  1. The device used for splits data into frames and then combines frames into data in frame relay is termed as
    1. FRAD(Frame Relay And Disassembly)
    2. Framing
    3. Both a & b
    4. Slipping Window Protocol
  2. The Error controls involves
    1. Sequencing of control frame
    2. Sending of control frame
    3. Both a & b
    4. None of these
  3. During communication, a channel that is noisy may causes
    1. Loss of bits from a frame
    2. Flips of bits
    3. Complete disappearance of frames
    4. Introduction of new bits in the frame
    5. All of these
  4. The data link layer encapsulates each packet in a frame by adding

    1. Header
    2. Trailer
    3. Both a & b
    4. None of these

  1. The Frame format of framing are
    1. DLCI-10bits
    2. EA-2location(First one is fixed at 0 and second at 1)
    3. DE-1 is set for the part that can be discarded first when congestion occurs
    4. Data size-vary up to 4096bytes
    5. All of these
  2. Which is a simple data link protocol based on certain ideal assumptions to explain the working of the data link layer

    1. Stop ARQ
    2. Wait ARQ
    3. Go back-N ARQ
    4. Both a & b

  1. The assumptions of Stop and Wait ARQ are as
    1. Infinite buffer size
    2. Half Duplex
    3. Does not produce any error
    4. Network layers are always ready
    5. All of these
  2. The protocol based on the assumption are called
    1. Elementary data link protocol
    2. Data link protocol
    3. Sliding Window Protocol
    4. HDLC
  3. The basic objective of computer communication in a network environment is to send an infinitely long message from the ____________
    1. Source node to the source node
    2. Destination node to the destination node
    3. Source node to the destination node
    4. None of these
  4. In stop and wait protocol
    1. Sequence number are required
    2. Sequence number are not required
    3. Both a & b
    4. None of these
  5. The stop and wait protocol is

    1. easy to Implement
    2. Does not call for congestion
    3. Both a & b
    4. None of these

  1. The disadvantage of stop and wait protocol is
    1. Error free communication channel does not exist
    2. Acknowledgement may get lost
    3. Deadlock situation may occur
    4. All of these
  2.    Which protocol enables the source machine to possess more than one outstanding frame at a time by using buffers

    1. Stop ARQ
    2. Wait ARQ
    3. Go back-N ARQ
    4. Both a & b

  1.  The Go back-N ARQ overcomes the problem of

    1. PAR
    2. PER
    3. PRA
    4. DAR

  1. Another important issue in the design if the data link is to control the rate of data transmission between _____________
    1. Source and destination host
    2. Two source and destination host
    3. Three source and destination host
    4. None of  these
  2. Which one is the important protocol used by the data link layer
    1. Sliding protocol
    2. Sliding Window protocol
    3. Stop sliding approach
    4. None of these
  3. The sender keeps a list o consecutive sequence numbers is known as

    1. Window
    2. Sending window
    3. Stop and wait ARQ
    4. Sliding window

  1. Which protocol is for data transmission and is bi-directional, used in the data link layer that corresponds to layer 2 of OSI model

    1. Sending window
    2. Sliding window protocol
    3. Stop and wait ARQ
    4. Sliding window

  1. Sliding window protocol keeps record of frame sequences sent and acknowledged when communication takes place between  ____________

    1. Users
    2. Two users
    3. More users
    4. None of these

  1. Sliding window protocol is also used by most of the _______________________
    1. Connection oriented protocols
    2. Connection oriented network protocols
    3. Connection network protocols
    4. None of these
  2. Which is used by many users to establish their home PC to the Internet via a phone-line connection

    1. FTP
    2. PPP
    3. OSI
    4. PAR

    1.  
  1.  Sliding window protocol works on _________ in which there is simultaneous two-way communication

    1. no duplex
    2. half duplex
    3. full duplex
    4. single duplex

    1.  
  1. Sliding window protocol makes use of two types of frames namely

    1. Data frame
    2. Acknowledgement frame
    3. Both a & b
    4. None of these

  1. Another improvement is done over this ‘stop and wait’ type protocol by use of ________

    1. Back
    2. Piggybacking
    3. Piggy
    4. None of these

  1. A technique in which acknowledgement is temporarily delayed and then hooked onto next outgoing frame is known as
    1.  

    1. Back
    2. Piggybacking
    3. Piggy
    4. None of these

  1. RTT stands for

    1. Robin time taken
    2. Round trip time
    3. Round time trip
    4. Round time trip

  1. The variants of sliding window protocol are

    1. Go back n
    2. Selective repeat
    3. Selective reject
    4. All of these

  1. The sliding window protocol employs ___________

    1. A wait approach
    2. A stop approach
    3. Both a & b
    4. None of these

  1. HDLC is a __________ synchronous data link layer protocol

    1. Bit-oriented
    2. Byte-oriented
    3. Both a & b
    4. None of these

    1.  
  1. HDLC provides

    1. Switched protocol
    2. Non- Switched protocol
    3. Both a & b
    4. None of these

  1. HDLC is a superset of ___________

    1. ADCCP
    2. SDLC
    3. ISO
    4. OSI

  1. HDLC also has a subset of ______________

    1. ADCCP
    2. SDLC
    3. ISO
    4. FRAD

  1. Which is another subset of HDLC that finds use in packet switched networks of ITU-TS X.25
    1. ADCCP
    2. SDLC
    3. LAP-B(Link Access Protocol-Balanced)
    4. None of these
  2. In HDLC three types of stations are specified by the data link layer

    1. Primary Station
    2. Secondary Station
    3. Combined Station
    4. All of these

  1. HDLC works on three different types of configurations namely
    1. Balanced configurations
    2. Unbalanced configurations
    3. Symmetrical configurations
    4. All of these
  2. Frames of secondary station are known as _________ are sent only on request by the primary station

    1. Response
    2. Responses frame
    3. Both a & b
    4. None of these

  1. Which is a unit of data transmission

    1. Frame
    2. Stop and wait ARQ
    3. HDLC
    4. Frame relay

  1. A configuration has at least two combined stations in which every station has equal and complimentary responsibility known as __________________
    1. Balanced configurations
    2. Unbalanced configurations
    3. Symmetrical configurations
    4. None of these
  2. Balanced configurations find use only in the such cases as given below
    1. Operation: Full or half duplex
    2. Network: Point to Point
    3. Both a & b
    4. None of these
  3.   A configuration has one primary station and at least one secondary station , and it exists as one station exercises control over other stations known as ________
    1. Balanced configurations
    2. Unbalanced configurations
    3. Symmetrical configurations
    4. None of these
  4. Symmetrical configurations comprises of _________________________

    1. Two independent
    2. Unbalanced stations
    3. Connected point to point
    4. All of these

    1.  
  1. Logically, every station is considered as __________ stations

    1. 1
    2. 2
    3. 3
    4. 4

    1.  
  1. The protocol and data are totally independent, this property known as ____________

    1. Transmission
    2. Transparency
    3. Transparent
    4. Transport

  1. In HDLC, problems like _______________ do not occur

    1. Data loss
    2. Data duplication
    3. Data corruption
    4. All of these

  1. How many modes of operations are defined for the HDLC protocol

    1. 2
    2. 3
    3. 4
    4. 5

  1. Three modes of operations are defined for the HDLC protocol
    1. Normal Response Mode(NRM)
    2. Asynchronous Response Mode(ARM)
    3. Synchronous Balanced Mode(ABM)
    4. All of these
  2. In primary station initializes links for controlling the data flow between ___________
    1. Primary and secondary stations
    2. Error control
    3. Logical disconnection of the second stations
    4. All of these
  3. The ABM mode is suitable only to __________ environment

    1. Point
    2. Point-to-point
    3. First-to-end-point
    4. None of these

  1. In the HDLC protocol, frame consists of __________

    1. Three fields
    2. Four fields
    3. Five fields
    4. Six fields

    1.  
  1. A special eight-bit sequence ________ is referred to as a flag

    1. 01111111
    2. 01111110
    3. 11101110
    4. 11101110

  1. In the HDLC protocol, every frame consists of __________ with a flag

    1. Starts
    2. End
    3. Both a & b
    4. None of these

  1. A 8-bit address is used when the total number of stations exceeds _______

    1. 64
    2. 128
    3. 256
    4. None of these

  1. Data can be arbitrarily ______

    1. Long
    2. Empty
    3. Full
    4. Both a & b

  1. The HDLC procedure uses a flag synchronous system, these are
    1. Bit order of transmission (information frame)
    2. Bit order of transmission (supervisor frame)
    3. Both a & b
    4. None of these
  2. FCS (frame check sequence) is a _______ sequence for error control

    1. 4bit
    2. 16bit
    3. 32bit
    4. 64bit

  1. The disadvantage of SLIP are as follows
    1. No error check function is available
    2. Protocols other than IP cannot be used
    3. No function is available to authenticate link level connections
    4. No function is available to detect loops
    5. All of these
  2. PPP has several advantages over non-standard protocol such as

    1. SLIP
    2. X.25
    3. Both a & b
    4. None of these

    1.  
  1. PPP was designed to work with layer 3 network layer protocols including ___________

    1. IP
    2. IPX
    3. Apple talk
    4. All of these

  1. PPP can connect computers using _________
    1. Serial cable, phone line
    2. Trunk line, cellular telephone
    3. Specialized radio links
    4. Fiber optic links
    5. All of these
  2. Most dial-up access to Internet is accomplished by using _____

    1. HDLC
    2. PPP
    3. IP
    4. IPX

  1. RAS has an important role in the proliferation of Internet based services in the form of _________________

    1. VoIP
    2. Data over IP
    3. Both a & b
    4. None of these

  1. Which is opening new challenges in the development of RAS where VoIP enabled RAS are the need of time
    1. Voice convergence
    2. Data convergence
    3. Voice and data convergence
    4. None of these
  2. Remote access is possible through an __________________
    1. Internet service provider
    2. Dial up connection through desktop
    3. Notebook over regular telephone lines
    4. Dedicated line
    5. All of these
  3. A remote access server also known as ____________________

    1. Communication
    2. Communication server
    3. Layer
    4. None of these

  1. RAS technology can be divided into two segments _________

    1. Enterprise
    2. Infrastructure
    3. Both a & b
    4. None of these

  1. VPN stands for
    1. Virtual Public networking
    2. Virtual private networking
    3. Virtual package networking
    4. Virtual packet networking
  2. PPP provides three principal components
    1. Encapsulating datagrams
    2. Establishment, configurations and  testing
    3. Establishment and configurations
    4. All of these
  3. PPP is able to function across any _______ interface

    1. DTE
    2. DCE
    3. Both a & b
    4. None of these

  1. PPP may include

    1. RS232C
    2. RS-423
    3. Both a & b
    4. None of these

    1.  
  1. In PPP, the default maximum length of the information  field is ________

    1. 1000bytes
    2. 1500bytes
    3. 2000bytes
    4. 2500bytes

    1.  
  1. The protocols that are differentiate PPP from HDLC are the
    1. Link Control Protocol(LCP)
    2. Network Control Protocol(NCP)
    3. Both a & b
    4. None of these
  2. For terminate PPP ,the four steps are
    1. Link establishment
    2. Link configuration negotiation
    3. Configuration acknowledgement frame
    4. Configuration terminates
    5. All of these
  3. The LCP can terminates the link at any time is done by

    1. Request to the user
    2. Not Request  to the user
    3. Both a & b
    4. None of these

  1. The termination of link may happen
    1. Due to physical event
    2. Due to logical event
    3. Due to window event
    4. None of these
  2. The three classes of LCP frames are
    1. Link establishment frame
    2. Link termination frame
    3. Link maintenance frame
    4. All of these
  3. The NCP phase in PPP link connection process is used for establishing and configuring different network layer protocols such as

    1. IP
    2. IPX
    3. AppleTalk
    4. All of these

  1. In NCP, The link traffic consists of any possible combination of

    1. NCP
    2. LCP
    3. Network-layer protocol packets
    4. All of these

  1. The IP control Protocol(IPCP) is the
    1. IP-specific LCP protocol
    2. IP-specific NCP protocol
    3. Both a & b
    4. None of these
  2. If the calling peer has an IP address, it tells the
    1. Called peer What it is
    2. The called peer can assign the caller one from a pool of addresses
    3. Both a & b
    4. None of these
  3. If the calling peer does not have an IP address, it tells the
    1. Called peer What it is
    2. The called peer can assign the caller one from a pool of addresses
    3. Both a & b
    4. None of these
  4. The authentication process involves transmission of password information between
    1. RADIUS server
    2. RAS(Remote Access Server)
    3. Both a & b
    4. None of these
  5. The Authentication transaction used between a Remote access user and RAS can be divided into two categories are
    1. PAP(Password Authentication Protocol)
    2. CHAP(Challenge Handshake Authentication Protocol)
    3. Both a  & b
    4. None of these
  6. The digest is a

    1. One-way encryption
    2. Two- way encryption
    3. Three- way encryption
    4. Four- way encryption

  1. The technology which is useful for creating Virtual Private Networks (VPNs) has been developed by
    1.  Microsoft Corporation
    2. U.S. Robotics
    3. Several remote access vendor companies, known as PPTP forum
    4. All of these
  2. PPTP means
    1. Point-to-Point Tunneling Protocol
    2. Point-to-Point Termination Protocol
    3. Private-to-Private termination protocol
    4. Private-to-Private Tunneling Protocol
  3. The PPTP is used to ensure that message transmitted from one VPN node to another are

    1. Not secure
    2. Secure
    3. Networks
    4. IPX

  1.  What is the extension of PPTP
    1. PPP
    2. RAS
    3. L2TP(Layer Two Tunneling Protocol)
    4. None of these
  2. The two main components that make up L2TP are the
    1. L2TP Access Concentrator(LAC)
    2. L2TP Network Server(LNS)
    3. Both a & b
    4. None of these
  3. A user connects to NAS through

    1. ADSL
    2. Dialup POTS
    3. ISDN
    4. Other service
    5. All of these

  1. Which is a platform on which Internet service providers(ISP) and other service providers enables their user to access the various internet based services

    1. RAS
    2. TCP
    3. ARQ
    4. SLIP

7 comments :

  1. This is very good content you share on this blog. it's very informative and provide me future related information.
    Selenium training in Chennai
    Selenium training in Bangalore
    Selenium training in Pune
    Selenium Online training


    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. This post is so usefull and informaive keep updating with more information.....
    Future Of Data Scientists
    Career In Data Science

    ReplyDelete
  4. This is an excellent post - thank you for sharing it! I always relish the opportunity to read such superb content filled with valuable information. The ideas presented here are truly best and exceptionally captivating, making the post thoroughly enjoyable. Please continue with your fantastic work.
    visit- Data Science for Business: Benefits, Examples & Strategies

    ReplyDelete
  5. Thank you for sharing! I appreciate your positive feedback. It's always rewarding to know that the content resonates with readers. I'll continue to strive for excellence and deliver valuable information. Your encouragement fuels the ongoing effort to provide enjoyable and insightful content.
    visit: Geospatial Data Analytics: Geographic Insights and Mapping

    ReplyDelete
  6. Useful post Thanks for sharing it ,that truly valuable knowledge about similar topic. checkout my blog Tableau training in pune it will help to gain knowledge about the importance of tableau software in IT industries. thank you

    ReplyDelete
  7. Thanks for sharing it. I always enjoy reading such superb content with valuable information. The ideas presented are excellent and really cool, making the post truly enjoyable. Keep up the fantastic work.
    Visit: Mastering Java: A Comprehensive Guide to Java Courses

    ReplyDelete