Professional Documents
Culture Documents
10. What was the concern of the telephone system that Vulnerability
motivated the ARPANET design?
12. Which of the following are features of ARPANET de- All of the above
sign?
14. In the layer hierarchy as the data packet moves from Added
the upper to the lower layers, headers are
15. The ________ is the physical path over which a mes- Medium
sage travels
19. Which OSI layer is responsible for dividing the trans- Data link layer
mitted bit stream into frames?
20. Which OSI layer is responsible for determining which Network layer
route through the network to use?
21. Which feature does the data link layer and transport Flow control
layer have in common?
25. Of the following services, which service(s) does the None of the above
IP layer provides?
26. Which of the following is true about the ways in which All of the above
the OSI reference model and TCP/IP reference model
differ.
27. Which of following statements is true about how the Data link layer
data link layer and transport layer differ? is concerned with
framing and the
transport layer is
not
30. Which of the following applications would you select File tranfers
TCP protocol for?
33. In BSD socket API, which system call is used to as- bind()
sign a network address to the socket?
34. In BSD socket API, if a client knows the server name gethostbyname()
but not server's network address, what system call
should the client use to get server's network ad-
dress?
35.
3 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In a transmission system, which of the following Converts received
statement is true for a receiver signal into a form
suitable for deliv-
ery to user
38. Which of the following statement is true for optical All of the above
fiber
39. Which of the following are advantages of optical fiber Noise immunity
No corrosion
40. In BSD socket API, which call is usually used for sendto()
transmitting data in the connectionless mode?
41. Which of following statement about TCP/UDP sockets TCP is faster than
is wrong? UDP
42. Which of following are commonly used as digital All of the above
communication medium?
43. Consider a network link that has distance of 100 4 x 10^-7 seconds
meters, and signal traverses at the speed of light
in cable 2.5 x 10^8 meters per second. The link has
transmission bandwidth of 100 megabits/second (100
x 10^6 bits per second). The packet size is 400 bits.
What is the signal propagation delay?
44. Consider a network link that has distance of 100 4 x 10^-6 seconds
meters, and signal traverses at the speed of light
in cable 2.5 x 10^8 meters per second. The link has
transmission bandwidth of 100 megabits/second (100
4 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
x 10^6 bits per second). The packet size is 400 bits.
What is the packet transmission delay?
47. Which of the following sentences are true for connec- Send/receive
tionless stream mode of service to/from multiple
peer processes,
No setup over-
head and delay,
Destination ad-
dress with each
block,
49. Which of the following is true of data compression Represent the in-
algorithms formation using
fewer bits
Recover original
information exact-
ly
Recover informa-
tion approximately
5 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
51. Which of following statements are true for single-bit It can detect all
parity error detection? single bit errors
in an information
frame
52. Which of following statements are true for two-dimen- All of the above
sional parity error detection?
53. Assume bit errors occur at random. If each bit has 1/16
50% probability to be in error by transmission. What
is the probability of a four-bit frame to be in error by
transmission?
6 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
60. Block codes are generated using _____. Generator matrix
65. Internet protocols use check bits to detect errors, in- Simplicity of im-
stead of using CRC polynomial. The primary rationale plementation
is
69. In ASCII, a single parity bit code can detect ________ An odd number of
errors.
70. The two basic approaches in error control are error False
prevention and detection, and error correction and
re-transmission
71. In networks where errors are infrequent, which ap- End-to-end ap-
proach is favored for efficiency? proach
78. A service offered at a given layer can include which All of the above
of the following feature(s)
8 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
81. Given 3 bits for sequence numbers, what is the max- 7
imum sliding window size at the receiver in Go Back
3 ARQ?
82. Given 3 bits for sequence numbers in Selective Re- None of the above
peat ARQ. If the sender already set the sliding window
size to be 4, what is the maximum sliding window size
at the receiver?
to ensure a se-
quence of infor-
mation packet is
delivered in order
88. Pipelining
9 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In Go-Back-N ARQ, a procedure where transmission
of a new frame is begun before the completion of time
of the previous frame transmission is called
91. Which of the following statements are true for the All of the above
best-effort service of IP?
92. Which of following services belong to the data link All of the above
layer?
94. By framing, frame boundaries can be determined us- All of the above
ing
95. Which of following statements are true about framing All of the above
protocols ?
98. Which of the following statements are true for PPP All of the above
byte stuffing
101. Perform the bit stuffing procedure for the following 110111110110111110
binary sequence: 1101111111011111110101. What is
the outcome?
103. PPP is a data link protocol for point-to-point lines in Byte stuffing
Internet. Its framing is based on which of the follow-
ing?
104. HDLC is another data link control protocol widely in Bit stuffing
use. Its framing is based on which of the following?
105. Which of following statements are true for HDLC? All of the above
Authenticator can
reissue challenge
during session
107. In error detection and loss recovery, which of the All of the above
following statement is correct
112. What is the primary benefit provided by the Slotted Higher maximum
ALOHA compared to ALOHA? throughput
113. What is the vulnerable period of collisions in ALOHA? Two frame trans-
mission time
114. What is the vulnerable period of collisions in Slotted One frame trans-
ALOHA? mission time
117.
12 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In media sharing techniques, which of the following Frequency Divi-
are channelization approaches sion Multiple Ac-
cess
Code Division
Multiple Access
121. Polling is a scheduling approach for dynamic medium All of the above
access control. Which of following statements are
correct?
123. In Carrier Sense Multiple Access with collision detec- Round-trip propa-
tion (CSMA-CD), how long will it take a collision to be gation delay
detected and resolved?
124. Suppose that the ALOHA protocol is used to share 10 frame per sec-
a 56 kbps satellite channel. Suppose that frames are ond
1000 bits long. What is the maximum throughput of
the system in number of frames per second.
126. In media access control, which of the following state- Inefficient for
ments are true for Channelization bursty traffic
Inflexible in allo-
cating bandwidth
to users with
different require-
ments
130. Which of the following is not true for MAC scheduling Reduced compu-
tational or proce-
dural complexity
131. Which of following features are typically true for local All of the above
area networks?
132. Use HDLC and Ethernet to identify similarities be- Both contains
tween medium access control and data link control framing informa-
protocols. Which of following statements are true? tion that delin-
eates the begin-
ning and end of
14 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
each frame.
133. Use IEEE 802.3 and IEEE 802.11 to discuss differ- All of the above
ences between wired and wireless LANs. Which of
following statements are true about the differences?
135. In Ethernet, slot time that is at least the round-trip All of the above
propagation delay, is the critical system parameter for
136. Which one of the following event is not possible in Collision detection
wireless LAN.
Location in a Ba-
15 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
sic Service Area
(BSA)
143. Why not use CSMA/CD in a wireless LAN? The prima- The hidden station
ry reason is problem
144. In IEEE 802.11 MAC for wireless LANs, which of fol- SIFS
lowing inter-frame space (IFS) is used to transmit
high-priority frames such as ACKs?
145. Which of following statements identifies the similar- Both contain fram-
ity between HDLC (data link control) and Ethernet ing information
(medium access control) that delineates the
beginning and end
of each frame
147. Which of the following are management services of- Power manage-
fered by the MAC sublayer in wireless LAN ment
Roaming within
ESS
148.
16 / 17
NWC302C
Study online at https://quizlet.com/_8qi3wu
In CSMA/CA, An amount of time divided into slots Contention proce-
called dure*
Contention sig-
nals*
17 / 17