You are on page 1of 9

NARAYANA ENGINEERING COLLEGE: NELLORE

DEAPRTMENT OF CSE & IT


Academic Year: 2013-14

Class: III B. Tech II Sem CSE, IT Subject: Computer Networks
Faculty: G. SUHASINI

UNIT 1
1. Which layer is responsible for transmitting the frames sequentially [ ]
a) sessions layer b) network layer c) Data link layer d) transport layer

2. What are the protocols in the TCP/IP model? [ ]
a) ARPNET b) LAN c) SATNET d) FTP

3. What is the full form of ISDN [ ]
a. Integrated services digital network.
b. Interface services digital network.
c. Interface system digital network.
d. Integrated system digital network.

4. In TCP _________ comes first. [ ]
a) Network b) protocols c) transmission d) none

5. Protocols in network layer are _________. [ ]
a) telnet b) Arpanet c) UDP d) both a &c

6. Session layer deals with __________. [ ]
a) flow control b) framing c) ack frames d) token management

7. Fiber optics can carry digital signal in the form of _______. [ ]
a) waves b) signal c) microwaves d) light

8. Coaxial cable can carry signals of higher frequency than _________. [ ]
a) Twisted pair cable b) fiber optical c) both 1 & 2 d) none

9. Which type of Switching is Better _____ [ ]
a) Circuit Switching b) Packet Switching c) Message Switching d) All

10. Which device is useful to convert Digital signals to Analog signals [ ]
a) Modem b) Switch c) Trunk d) Junction Box

FILL IN THE BLANKS
1. Unreliable connectionless service is often called __________________.
2. _______________ and_____________ layers are not present in TCP/IP reference model.
3. Multi mode fiber has ___________________ quality.
4 We use ____________ to strengthen the signal periodically.
5. Physical layer is concerned with transmitting ___________ over the channel.
6. OSI refers to ________________________.
7. A set of layers and protocols is called _______________________.
8. ____________ Layer is responsible for breaking up incoming messages into smaller units.
9. ___________ Layer adds header to each and every packet.
10. In ___________ services order of messages is preserved.


UNIT 2

1. Data link layer adds ________ to a frame. [ ]
a) header b) trailer c) both header and trailer d) none

2. Protocol in which the sender sends one frame and then waits for an acknowledgement before
proceeding,
is _______ protocol. [ ]
a) Simplex protocol b) Sliding window protocol
c) Stop and wait protocol d) none

3. The strategy for handling errors when frames are pipelined called _________. [ ]
a) go back n b) selective repeat c) both 1 &2 d) none

4. Sliding window protocol can be categorized by the _____of sender and receiver. [ ]
a. data b. window of equal size c. window of different size d. window equal to 1

5. Data link layer provides ________ services. [ ]
a. error control b. framing c. adding headers d. All

6. Which technique does DLL follow to detect errors? [ ]
a. CRC 12 b. CRC 16 c. CRC-CCITT d. All

7. How many extra zeros do we append to the frames for CRC CCITT [ ]
a. 10 b. 12 c. 16 d. 32

8. How many frames does 1-bit sliding window protocol can send per frame time [ ]
a. 0 b. 1 c. 10 d. 100

9. Which is the first protocol which can handle the Error Control Issue? [ ]
a. Restricted Simplex protocol b. Stop & wait protocol
c. Sliding window protocol d. Go Back N protocol

10. Unrestricted simplex protocol transfers data in ___________ direction. [ ]
a. One direction b. both directions c. no limits d. limits restricted

FILL IN THE BLANKS
1. Protocols in which sender waits for a positive acknowledgement before advancing to the next
data are called ______________.
2. What is Flow Control ___________________
3. What is Time Out _________________
4. Which technique used by DLL to Correct the Errors ________________
5. What is CRC stands for _____________________
6. __________ frames carry data to be transmitted to the user.
7. P/F stands for ____________.
8. CRC used to ___________________.
9. Hamming code used to _________________.
10. _________________ occurs when source did not receive the Acknowledge.
UNIT- 3
1. Medium access sublayer is Sublayer _____________________ [ ]
a. Datalink layer b. Physical layer c. Network layer d. All the above

2. Channel allocation can be done in Mac ___________________ [ ]
a. Static Allocation b. Dynamic allocation c. Both A & B d. None

3. In slotted Aloha Based on what channel can be allocated to Hosts [ ]
a. Priority b. Importance c. Severity d. Time

4. With how much probability can 1-Persistant CSMA send data? [ ]
a. 0 b. 1 c. 10 d. 0.5

5. The efficiency of Pure Aloha is [ ]
a. 10 % b. 15% c. 18% d.20%

6. The access signaling method used for 802.4 token bus is _______. [ ]
a. Manchester b. differential Manchester 3. Both 4.none

7. The efficiency of slotted aloha [ ]
a.10 % b.20% c. 37% d.40%

8. The length of preamble field in 802.3 is _______ bytes. [ ]
a. 8 bytes b. 6 bytes c.7 bytes d. 4 bytes.

9. The transmission media used in 10 base 2 is___________. [ ]
a. thin coaxial cable b. unshielded c. 850- nm optical d. Ethernet.

10. The topology used in 10 base t is __________ [ ]
a. bus b. star c. ring d. mesh.



FILL IN THE BLANKS
1. The protocol which is used to determine who goes next on a multi access channel which
belongs to DDL is called __________________.
2. Efficiency of Slotted aloha is _______________
3. Channel utilization of pure aloha is _______________________.
4. CSMA/CD stands for _____________________
5. What is MACA stands for ___________________
6. Token bus uses ________ protocol.
7. Data flows only in ____________ direction in a ring
8. Slotted Aloha got better performance than ___________
9. P-Persistent sends the data with _______________
10. Wireless LAN protocols works within __________________

UNIT-4
1. In connectionless service each packet is ____________. [ ]
a. Routed based on routers b. Routed independently
c. Follow same route d. None

2. The shortest path routing can be calculated basing on [ ]
a. the no of hops b. geographical distance in kilometers c. both d.none.

3. Flooding results in ______________ [ ]
a. finite no of duplicate packets b. infinite number of duplicate packets.
c. no duplication of packets d. packets are duplicates based on no of hops.


4. The disadvantages of distance vector routing are __________. [ ]
a. link state routing b. count to infinity c. split horizon hack d. both b & c

5. The requirement of link state routing algorithm is_____________. [ ]
a. estimate delay of each neighbor b. estimate the cost to each neighbor
c. estimate traffic to each neighbor c. estimate distance to each neighbor.

6. In measuring line cost ________ is taken into account when measuring delay. [ ]
a. traffic b. load c. weight d. cost

7. VC falls under ____________ [ ]
a. Connection Oriented service b. Connection less service c. Both d. none

8. A spanning tree is a subset of subnet that includes all the routers but not the ____[ ]
a. edges b. vectors c. loops d. paths.

9. Multicasting is used to send packets to _________. [ ]
a. network b. routers c. group of nodes d. hosts

10. Congestion means ________. [ ]
a. load > resources b. resource < load c. load < resource d. none

FILL IN THE BLANKS
1. Adoptive algorithm takes the routing decision based on ________________
2. Monitoring a traffic flow is called _________________.
3. Sink tree does not contains ________________
4. Give two Examples of broadcasting ______________
5. The table maintained by distance vector routing is called ___________.
6. Virtual circuits are generally used in ____________ whose primary service is connectionless.
7. Packets in connectionless are called ____________.
8. In connectionless service it is difficult to handle _________________
9. Dijkstras algorithm is used to find ________________.
10. ____________ table gives the best known distance to each destination and which line to
access to reach there.

UNIT-5

1. Device which is used to connect different types of Networks [ ]
a. Bridges b. Routers c. Black Box d. Junction Box

2.Technique used to transfer data from one network to other network using intermediate network
a.Internet b. Tunnelling c.Multiplexing d.Switching [ ]

3.What is the first field which is comes in IP protocol [ ]
a. IHL b. Version c. DF d. MF

4.How much memory is allocated for Header in IP protocol [ ]
a. 10 b. 20 c.30 d.40

5.Which field is used to indicate Destination not to fragment the incoming data in IP protocol
a. MF b. DF c. Both d. None [ ]

6.Source Address in IP protocol should consist of [ ]
a.Source Machine Numer b. Network Address of Source
c. Both d.none

7.What are the protocols that falls under Internet control protocols [ ]
a.BOOTP b. ARP c.RARP d. All

8.IP address should consist of [ ]
a.Host number b. Network number c.Both a&b d.none

9._________ store and forward data link frames between LANs [ ]
a.switches b. Bridges c.Routers d. None

10._______________ forward packets between dissimilar networks [ ]
a.Routers b.Junctions c.Multiprotocol Routers d. Single protocol Routers


FILL IN THE BLANKS
1. What is Tunnelling ________________
2. Two protocols used under Internet Routing _____________
3. Network Numbers assigned by _____________
4. How to broadcast packet in Local Network _______________________
5. How to broadcast packet in Distant network _______________________
6. Version field indicates which version the __________ belongs to.
7. Tunneling comes under ____________ layer.
8. All 1s will be used to broadcast packet in _________ network.
9. The lowest address in IP address is ___________________
10. Destination address contains both ___________ number & ____________ Number.

UNIT-6
1. The ________ is the heart of the whole protocol hierarchy. [ ]
a. Network layer b. transport layer c. application layer d. physical layer

2. The transport layer task is to provide ________________ independently of the physical
network or networks currently in use. [ ]
a. Cost-effective b. reliable c. both a and b d. effective transport
b.
3. _________is used for messages sent from transport entity to transport entity [ ]
a. TDP b.UDP c. TPDU d. TDPU
b.
4. The packet lifetime management congestion prevention policy is implemented on ----------- layer
a) Transport b) Session c) Network d) Datalink [ ]

5. What is the primary function of transport layer [ ]
a) Quality of service b) Transport entity c) Peak cell rate d) Cell rate

6. In flow control and buffering, which among the following only one per connection[ ]
a) chained-size buffers b) chained-variable buffers c) circular buffer d) fixed size buffers.

7. For the connection request in TCP Header [ ]
a) Syn = 1 b) Ack =0 c) Both a&b d) none

8. which kind of problem is used for releasing a connection [ ]
a) Three-way handshake b) Two-army c) Three army d) Two-way handshake.

9. How many ports does Transport layer supports [ ]
a) Single b)Multiple c)Double d)Zero

10. UDP transmits segments consisting of an ___byte header followed by the payload [ ]
a) 6 b)8 c)7 d)10

FILL IN THE BLANKS
11. The hardware and/or software within the transport layer that does the work is called the
________
12. TSAP stands for _________________
13. how many Service Access point Network Layer supports ______________
14. Sending a packet to all destinations simultaneously is called ---------------------
15. For the connection reply in TCP what are the values for SYN _______ and ACK __________
16. There is addressing and flow control in ___________ layer.
17. The bottom layers i.e., physical, datalink, network are called ______________
18. The function of the _________ layer is routing packets from the source to the destination machines.
19. Transport layer supports __________ access points
20. In ATM network _____________message is used by a source host to set up a connection.

Unit 7
1) What is the minimum number of DNS name servers, does each domain should posses?
[ ]
a. 1
b. 2
c. 3
d. 4
2) The components in the domain name space are separated by _ _ _ _ _ _ _ _ _ _ _ _ _ _
[ ]
a. Comma
b. Dot
c. Colon
d. Semi colon

3) DNS represents _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ structure. [ ]
a. bus
b. loop
c. tree
d. ring

4) The type of encoding in which manipulation of bit streams without regard to what the bits
mean. [ ]
is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
a. Destination encoding
b. Entropy encoding
c. Source encoding
d. Differential encoding


5) The moving of the messages from source to destination is done by ____________ agents
a. user agents b.message tranfer agents c. By both d. None [ ]

6) Pages that point to other pages [ ]
a. hyper text b. Hyper links c. Hyper media d. None

7) Programs that search the web are called as [ ]
a. search engines b. Spiders c. Worms d all

8) The type of encoding in which a sequence of values are encoded by representing each one as
the difference from previous vallues [ ]
a. Destination encoding
b. Entropy encoding
c. Source encoding
d. Differential encoding

9.High end level protocols used by ___________________ [ ]
a.Network layer b. Transport layer c.Application layer d.Session layer

10. Security is the issue of which layer ____________________ [ ]
a.Network layer b. Transport layer c.Application layer d.Session layer

FILL IN THE BLANKS
11) The generic domain for nonprofit organizations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
12) SMTP is what type of protocol -_________________
13) In e-mail system, _ _ _ _ _ _ _ _ _ _ _ _ _ move the message from the source to the
destination.
14) SMTP is used to transfer _ _ _ _ _ _ _
15) 15Pages are viewed with a program called ___________
16) DNS deals mapping the ____________ on Network.
17) SMTP deals with fetching the ________________
18) The protocol used to fetch information on the internet is ____________
19) Web pages are written in ________________ Language.
20) Internet telephony is called as _______________.

UNIT-8
1)An example of public key algorithm is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [ ]
a. RSA
b. DES
c. IREA
d. RC5

2)Caeser cipher is represented as _ _ _ _ _ _ _ _ [ ]
a. C = (p + 3) mod 3
b. C = (p + 26) mod 3
c. C = (p - 3) mod 26
d. C = (p + 3) mod 26

3)The art of breaking ciphers, called [ ]
a) cryptanalysis b) cryptography c) cryptology d) cryptographic

4)Which of the following is the secret-key algorithms [ ]
a) DES and IDEA b) RSA c) RSC d) only IDEA

5)------------------ is the modern adaptation for the security [ ]
a) firewalls b) RSA c) cryptography d) DES

6)In -------------- each letter or group of letters is replaced by another letter or group of letters [ ]
a) substitution b) transposition c) one-time pads d) redundancy

7.in which cypher technique each letter or group of letter is replaced by another letter or group of letter to
disguise it [ ]
a. substitution cipher b.transposition cipher c.one-time pads d.plain cipher

8.___________ secret key algorithm [ ]
a.DES b. DES chaining c.IDEA d. All

9.________________is the technique by which a process verifys that its communication
partner is genuine [ ]
a. Authentication b.verfication c.validation d.Justification

10.In _________________one party can send a signed messge to another party [ ]
a. signature b.digital signature c.secret key signature d.public key signature

FILL IN THE BLANKS
1. Digital signature is ________________________-
2. What are the examples for Public Key algorithms _________________________
3. Examples of Symetric key algorithms _____________________
4. Define cryptography____________________
5. Plain text can be obtained by using which equation _________________
6. Authentication protocol used in many real systems is _______________
7. DES Stands for ________________________
8. _______________ is the process of verifying the user
9. The art of breaking cypher is called ____________________
10. Output of Encryption process is_____________________



NECN
(1)

(2)
NECG
(1)
(2)


Signature of the Staff Signature of the HOD

You might also like