Computer Networks
Computer Networks
Computer Networks
COMPUTER NETWORKS
6) Syntax and semantics of the information exchanged between two systems is done by
a) Session layer
b) Application laye
c) Transport layer
d) Presentation layer
1
ABBSOFT COMPUTERS
9) Transmission lines suffers from major problem
a) Attenuation distortion
b) Delay distortion
c) Noise
d) All of the above
10) If the value of a signal changes over a very short span of time, its frequency is
……………..
a) Low
b) High
c) Average
d) Zero
12) The term ……….. describes the position of the waveform relative to time 0.
a) Frequency
b) Phase
c) Phase shift
d) Time period
15) The term used to describe the way in which computers are connected in network.
a) Logic
b) Technology
c) Topology
d) All of the above
2
ABBSOFT COMPUTERS
18) The ………….. layer is responsible for resolving access to the shared media or
resources.
a) physical
b) MAC sub layer
c) Network
d) Transport
21) DLE STX stands for data link escape, start of text
a) True
b) False
23) The …….. ………. Service primitives provide a way for the data link layer on the
requesting side to learn whether the request was successfully carried out and if not, why
a) request
b) indication
c) response
d) confirm
3
ABBSOFT COMPUTERS
30) The congestion routing algorithms change their routing decisions to reflect changes in
topology and usually the traffic as well.
a) True
b) False
35) In multicast listener query routers use multicast listener query messages to query a
subnet for multicast listeners.
a) True
b) False
37) The internet addresses are ……. Bits in length in IPV4 addressing scheme.
a) 16
b) 64
c) 32
b) 48
38) The IPV4 address is a logical address because it is assigned at the internet layer.
a) True
b) False
4
ABBSOFT COMPUTERS
39) In addresses for ……….networks, the first 16 bits specify a particular network, and
the last 16 bits specify a particular host.
a) class A
b) class B
c) class C
b) class D
2 MARK QUESTIONS
3) The data link layer of the ISO OSI model is divided into ……… sub layers.
A WAN typically spans a set of countries that have data rates less than …….Mbps.
a) 2,2
b) 1,2
c) 2,1
d) 1,1
5) Session routing algorithm takes place when subnet uses virtual circuits
Forwarding is used if subnet uses datagram.
a) True
b) False
5
ABBSOFT COMPUTERS
7) When the load is much less than the capacity of the network, the delay is at a
minimum.
Throughput is the number of bits passing through a point in a second.
a) TT
b) FF
c) FT
d) TF
9) The layers which are not present in TCP / IP reference model are ------&-------
(Session and presentation)
6
ABBSOFT COMPUTERS
10) In principle, all OSI connections are half duplex.
A procedure included in the caller’s address space by the linker is known as local
procedure.
a) TT
b) FF
c) FT
d) TF
7
ABBSOFT COMPUTERS
19) TCP / IP model contains :
a) 4 layers
b) 5 layers
c) 4-5 layers
d) none of these
4 MARK QUESTIONS
1) Match the following
a) simplex communication 1)data transfers occurs in one direction only
b) half duplex communication 2) data transfers occurs in either direction,
but not simultaneously
c) full duplex communication 3) data transfers occurs in either direction
simultaneously
a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1, b-3,c-2
d) a-3,b-2,c-1
a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) a-3,b-4,c-1,d-2
a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1, b-3,c-2
d) a-3,b-2,c-1
4) Match the following field names in TCP segment format to their description
a) source port 1)The 16 bit source port number, used by the receiver to reply.
b) destinatation port 2) The 16 bit destination port number.
c) reserved 3) six bits reserved for future use; must be zero
a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1,b-3,c-2
d) a-3,b-2,c-1
8
ABBSOFT COMPUTERS
a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) a-3,b-4,c-1,d-2
a) only 1,2
b) only 1,3,4
c) only 4
d) all of the above
10) The IPsec is a collection of protocols designed by internet engineering task force to
provide security for a packet at the n/w level.
In encapsulation mode, a common technique is packet switched networks consists of
wrapping a packet in a new one.
The Authentication header is used to provide integrity and authentication to IP
datagrams.
The ESP is used to provide integrity check, authentication, and encryption to IP address.
a) TTTT
b) FFTT
c) FTTT
d) TFFT
9
ABBSOFT COMPUTERS
11) The TCP protocol is based on end to end delivery.
The client SMTP uses the DNS to determine the IP address of the destination mailbox.
a) TT
b) FF
c) FT
d) TF
12) A procedure included in the caller’s address address space by the linker is known as
local procedure.
Packing parameters into a message is called parameter marshaling
a) TT
b) FF
c) FT
d) TF
14) Which classes can not accommodate more than 254 hosts.
1) class B, class C
2) class D, class C
3) class B, class D
4) class B, class A
a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) None of the above
10