Description : In_______framing, there isno need for defining the boundariesof frames. A) fixed-size B) variable-size C) standard D) none of the above
Last Answer : none of the above
Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above
Last Answer : A. fixed-size
Description : In an Ethernet local area network, which one of the following statements is TRUE ? a. A station stops to sense the channel once it starts transmitting a frame. b. The purpose ... collision is detected. d. The exponential backoff mechanism reduces the probability of collision on retransmissions
Last Answer : The exponential backoff mechanism reduces the probability of collision on retransmissions
Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500
Last Answer : a. 2500
Description : Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. b. 2 c. 2.5 d. 5
Last Answer : b. 2
Description : Inasynchronous transmission, the gap time between bytes is _______. A) fixed B) variable C) afunctionof the data rate D) zero
Last Answer : variable
Description : In Stop-and-Wait ARQ, we use sequence numbers to number the frames. The sequence numbers are based on __________arithmetic. A) modulo-2 B) modulo-4 C) modulo-m D) none of the above
Last Answer : modulo-2
Description : Inthe _________Protocol, ifno acknowledgment for aframe has arrived, we resend all outstanding frames. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above
Last Answer : Go-Back-N ARQ
Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D
Last Answer : c. C
Description : The RTS and CTS frames in CSMA/CA ____ solvethe hidden stationproblem. The RTS and CTS frames in CSMA/CA ____ solve the exposed station problem. A) can; cannot B) cannot; can C) can; can D) cannot; cannot
Last Answer : can; cannot
Description : The IEEE 802.11 wireless LANs use ________ types of frames. A) four B) five C) six D) none of the above
Description : A ________bridge can forward and filter frames andautomatically buildits forwarding table. A) simple B) dual C) transparent D) none of the above
Last Answer : transparent
Description : In Go-Back-N ARQ, if frames 4,5, and 6 are received successfully, thereceiver may send an ACK _______ to thesender. A) 5 B) 6 C) 7 D) any of theabove
Last Answer : 7
Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above
Last Answer : Selective-Repeat ARQ
Description : Inthe _____ Protocol, the sender sends its frames oneafter another with noregard to the receiver. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ
Last Answer : Stop-and-Wait B) Simplest
Description : SONET sends ________ frames per second A) 1000 B) 2000 C) 4000 D) 8000
Last Answer : 2000
Description : Frames from oneLAN can be transmitted to anotherLAN viathe device A. Router B. Bridge C. Repeater D. Modem
Last Answer : Bridge
Description : The probability thata singlebit will be inerror on a typical public telephone lineusing 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error ratefor a communicationline using 9-bit frames is ... to A. 0.003 B. 0.009 C. 0.991 D. 0.999 E. None of the above
Last Answer : 0.009
Description : If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ______. a. 64 Kbps b. 32 Mbps c. 32 Kbps d. 64 MbpS
Last Answer : c. 32 Kbps
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? a. 1 Mbps b. 2 Mbps c. 10 Mbps d. 12 Mbps
Last Answer : b. 2 Mbps
Description : A network with bandwidth of 10 Mbps can pass only an average of 15,000 frames per minute with each frame carrying an average of 8,000 bits. What is the throughput of this network? a. 2 Mbps b. 60 Mbps c. 120 Mbps
Last Answer : a. 2 Mbps
Description : A pure ALOHA Network transmits 200 bit frames using a shared channel with 200 Kbps bandwidth. If the system (all stations put together) produces 500 frames per second, then the throughput of the system is ______. a. 0.384 b. 0.184 c. 0.286 d. 0.58
Last Answer : b. 0.184
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets
Description : Which category of HDLC frames undergoes error and flow control mechanisms by comprising send and receive sequence numbers? a. Uframes b. Iframes c. Sframes d. All of the above
Last Answer : Sframes
Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames
Last Answer : b. Sender Sliding Window
Description : Which ARQ mechanism deals with the transmission of only damaged or lost frames despite the other multiple frames by increasing the efficiency & its utility in noisy channels? a. GoBackN ARQ b. Selective Repeat ARQ c. StopandWait ARQ d. All of the above
Last Answer : b. Selective Repeat ARQ
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : The _______ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames A. Data Link B. Physical C. Network D. Session
Last Answer : A. Data Link
Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames
Last Answer : B. Sender Sliding Window
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets
Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes
Last Answer : c) packets
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : An ICMP message has _____ headerand a variable-size data section. A) a 16-byte B) a 32-byte C) an 8-byte D) noneof the above
Last Answer : an 8-byte
Description : A _______is defined as a small, fixed-size block of information. A) frame B) packet C) cell D) none of the above
Last Answer : cell
Description : ..... is a black box testing method ? Boundary value analysis Basic path testing Code path analysis None of above
Last Answer : Boundary value analysis
Description : Breaking physical memory into fixed-sized bloclcs called as: (1) Packets (2) Page (3) Frames (4) Segments
Last Answer : Frames
Description : In IEEE 802.11, when a frame isgoingfrom one AP to another AP in a wireless distribution system, the address flag is_____ A) 00 B) 01 C) 10 D) 11
Last Answer : 11
Description : In IEEE 802.11, when a frame isgoingfrom a station to an AP, theaddress flag is _____. A) 00 B) 01 C) 10 D) 11
Last Answer : 10
Description : In IEEE 802.11, when a frame is coming from an AP and going to astation, the address flag is _______. A) 00 B) 01 C) 10 D) 11
Last Answer : 01
Description : In IEEE 802.11, when a frame isgoingfrom one station in a BSS toanother without passing through thedistribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11
Last Answer : 00
Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream
Last Answer : a. inserting a 0 in user stream to differentiate it with a flag
Description : How would one squeeze more channels of communication into TDM frames of standard length? A. Shorten the time delay for each channel B. Raise the amplitude C. Add modulators D. Remove the synchronizing pulses
Last Answer : A. Shorten the time delay for each channel
Description : Find out the wrong one from the following: a) HTML 3 was developed in 1995 b) HTML 3.2 was next official version support for Tables, Images, Heading and other elements that is Align attributes etc. ... is current official standard version. d) None of These e) All of the Above f) None of These
Last Answer : f) None of These
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : The target hardware address on an Ethernet is _______ in an ARP request. A) 0x000000000000 B) 0.0.0.0 C) variable D) class dependent
Last Answer : 0x000000000000
Description : IPv6 has _______ -bit addresses. A. 32 B. 64 C. 128 D. Variable
Last Answer : C. 128
Description : The rate at which this is quantity passes through a fixed boundary per unit time a. Flux b. Existence c. Irradiance d. All of these
Last Answer : All of these
Description : A system which consists of fixed amount of mass and no mass can cross its boundary called _____. A. Equilibrium system B. Thermal equilibrium system C. Open system D. Closed system
Last Answer : Closed system