Professional Documents
Culture Documents
(b) RZ
(e) Manchester.
(c) B8ZS
3. Consider the following Fig 1 which consists of five different network topologies
In the above figure, which of the following correctly identifies the respective
topologies?
Graph, ring, star, unconnected, fully connected
Star, ring , tree, uncompleted, fully connected
Star, rounded, graph, irregular, fully connected
Ring, tree, star, regular, fully connected
Star, ring, tree, irregular, fully connected.
4. Shannons noisy channel capacity theorem states that C = H Log 2( 1 + S/N) bits
per second. In this equation H stands for
C is the bandwidth of the signal
H is the bandwidth of the Channel
C is the bandwidth of the Channel
H is the bandwidth of the signal
S/N is in decibels.
5. When signals are used to transmit digital data
Channel of infinite bandwidth must be used for 100% accurate reception of data
A modulation technique must always be used
The data rate is only limited by the bandwidth of the channel used
Data must be decoded on to the signal at the transmitter
The Noise level of the channel can increase the bandwidth.
6. In go-back-n ARQ, if frames 4, 5, 6 are received successfully, What is the ACK
number receiver may send to the sender?
(a) 5
8
(b) 6
(e) 9.
(c) 7
(d)
Answers
(B) D
(E) R.
(C) M
(D) P
Answers
Answer
11. : (c)
Reason : 10101010 bit pattern is used to indicate an error if an odd parity approach is used.
Answer
12. : (d)
Reason : 10Base5:500m, 100
10Base2: 200m, 30 .
Answer
13. : (c)
Reason : The acronym ADSL stands for Asymmetric Digital Subscriber Line.
Answer
14. : (c)
Reason : Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. The effective average
data rate of each station is 2.5 Mbps.
Answer
15. : (a)
Reason : Q (qualifier) bit in the X.25 standard (GFI general format identifier) allows the user to define the
source of control information.
Answer
16. : (c)
Reason : CLP field on a cell header in the ATM layer determines whether a cell can be dropped.
Answer
17. : (d)
Reason : Gateway is internetworking device , which is the greatest number of layers in the OSI model.
Answer
18. : (b)
Reason : Application Adaptation Layer 5 is also called as Simple and efficient adaptation layer.
Answer
19. : (d)
Reason :
A packet traveling from one Token Ring network to another Token Ring network uses the
services of a transparent bridge.
Answer
20. : (c)
Reason : Application program port addresses is the type of addressing is specifically used by the transport
layer.
(b) 000010
(c) 010000
(d) 000001
(e) 111111.
2 Which category of AAL of ATM is intended to support connection-oriented data
3. services?
(a) AAL1
(b) AAL2
(c) AAL3
(d)
AAL4
(e) AAL5.
2 In the process of congestion control, the bits FECN and BECN of frame relay
4. protocol are useful to
Warn sender and receiver of congestion in the network respectively
Warn receiver and sender of congestion in the network respectively
Warn only receiver of congestion in the network respectively
Warn only sender of congestion in the network respectively
Indicate the congestion but no warning to either sender or receiver is given
2 MIME allows what type of data to be sent through SMTP?
5.
(a) Audio
(b) Non-ASCII data
(c) Image
(d) Video
(e) All of the
above.
2 Which of the following application protocol is a framework for managing devices in
6. an internet using the TCP/IP protocol suite.
(a) SMTP
(b) SNMP
(c) FTP
(d) TELNET
(e) HTTP.
2 Which of the following component of SMTP can transform non-SMTP mail to
7. SMTP format and vice versa.
(a) mail spool
(b) mail gateway
(d) mail exchanger (e) none of the above.
2 What names objects, defines the type of data that can be stored in an object, and
8. encodes data for network transmission.
(a) MIB
(b) SMI
(c) SNMP
(d)
ASN.1
(e) BER .
2 Flow Control in data communications
9.
Can be implemented using a CSMA/CD Protocol
Makes a channel an error-free one.
Can be implemented using a Stop-and-Wait Protocol
Cannot be implemented on a simplex link
None of the above.
3 Which of the following is not correct regarding the Simple Mail Transfer Protocol
0. (SMTP) and Post Office Protocol3 (POP3)?
SMTP delivers email by having the source machine establish a TCP connection to
port 25 of the destination machine
SMTP and POP3 are simple one ASCII protocols
POP3 uses the port 20 by default to establish a connection
POP3 is used for fetching email from a remote mailbox
SMTP provides for mail exchange between users on the same or different
computers.
etween the client and the server look like SMTP messages.
Answers