Top Banner
EVALUATION SYSTEM COURSE SUBJECT NAME: DATA COMMUNICATIONS AND COMPUTER NETWORKS CLASS: III / I DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING FACULTY NAME: T.Lakshmi Lavanya
42
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 79193954 Data Communications and Computer Networks

EVALUATION SYSTEM

COURSE FILE

SUBJECT NAME: DATA COMMUNICATIONS AND COMPUTER NETWORKS

CLASS: III / IDEPARTMENT: COMPUTER SCIENCE AND ENGINEERING

FACULTY NAME: T.Lakshmi Lavanya

Page 2: 79193954 Data Communications and Computer Networks

DATA COMMUNICATIONS AND COMPUTER NETWORKS

COURSE FILEName of the Faculty: T.Lakshmi LavanyaClass: III / CSE

Academic Year: 2013-2014

Document No.ECEW//IT/ES/II/I.1/CF/DCCN

INDEX

COURSE FILE

Subject: Data Communications and Computer Networks Branch: Computer Science and EngineeringName of Faculty: T.Lakshmi Lavanya Academic Year: 2013-2014 Semester: I

Sno. Topic Page No.

1 Syllabus

Page 3: 79193954 Data Communications and Computer Networks

2 Objective

3 Target

4 Session Planner

5 Syllabus coverage

6 Time Table

7 Lecture wise handwritten class notes

8 Assignments

9 Tutorial

10 Question Bank/Papersa. Subjective unit wiseb. Objective unit wise

11 Sample Assignments

12 Sample Solved Question Paper

13 HOD Review

14 Course Completion Certificate

15 Additional teaching material viz. PPT’s, OHP’s, downloaded material etc.. in a separate file

SYLLABUS

Subject: Data Communication and Computer NetworksBranch: III-CSEAcademic Year: 2013-2014 Semester: IFaculty:T.Lakshmi Lavanya

DAT COMMUNICATION AND COMPUTER NETWORKS

UNIT IIntroduction: Data communications, Networks, The Internet, protocols and Standards, Network Models. Layered tasks. The OSI Model, Layers in the OSI Model. TCP/IP Protocol Suite. Addressing, Physical layer and Media. Data and Signals. Analog and Digital, periodic, Analog Signals, Digital Signals. Transmission impairment. Data rate Limits, performance, Digital Transmission, Digital-to- Digital Conversion, Analog-to-digital Conversion, Analog Transmission, Digital -to-Analog conversion, Analog-To-Analog Conversion.

Page 4: 79193954 Data Communications and Computer Networks

UNIT II

Bandwidth utilization: Multiplexing and Spreading, Multiplexing, spread Spectrum, Transmission Media, Guided Media, Unguided media: wireless, Switching, circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks, Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks, Dial-up Modems, Digital Subscriber Line, Cable TV networks, Cable TV for Data Transfer.

UNIT III

Error Detection and correction , Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing, Flow and error Control , protocols, Noiseless Channels, HDLC, Point-to-Point protocol, Multiple Access, random Access, Aloha, Controlled Access, Channelization, IEEE standards , standard Ether net , changes in the standard. Fast Ethernet, Gigabit Ethernet, IEEE802.11, Bluetooth.

UNIT IV

Connecting LAN’s. Backbone Networks, and Virtual LANs, Connecting Devices, Backbone networks virtual LANs, cellular telephony, Satellite Networks, sonnet/SDH architecture, sonnet Layers, Sonet Frames, STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks, frame relay and ATM, Frame Relay, ATM, ATM LANs.

UNIT V

Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses, network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6. Network Layer Address Mapping, Error Reporting and Multicasting, address mapping, ICMP, IGMP, ICMPv6, Network Layer: Delivery, Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.

UNIT VI Transport Layer: process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery, User datagram protocol (UDP), TCP, SCTP, Congestion control and Quality of service. Data Traffic. Congestion , congestion control, two Examples, Quality service, Techniques to improve QOS, Integrated Services, Differentiated services, QOS in Switched networks.

UNIT VIIApplication layer: Domain name system, Name space, Domain name space, Distributed of name space, DNS in the Internet, Resolution, DNS messages, Types of records, registers,

Page 5: 79193954 Data Communications and Computer Networks

Dynamic Domain name System(DDNS), Encapsulation, Remote Logging, Electronic mail and file Transfer, Remote Logging, Telnet, Electronic mail, File Transfer.

UNIT VIII

WWW and HTTP: Architecture, web Documents, HTTP Network Management: SNMP, Network Management system, Simple Network Management protocol (SNMP), Multimedia, Digitizing Audio and Video Audio and video compression, streaming stored audio/video, streaming live audio/ video, Real-Time Interactive Audio/video. RTP, RTCP, Voice over IP.

TEXT BOOKS:

1. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH.

2. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.

REFERENCE BOOKS:1. Introduction to Data Communication and Networking. W.Tomasi.

Pearson Education2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor

and Francis Group.3. Data Communications and Computer Networks, P.C Gupta PHI

OBJECTIVE

Subject: Data Communication and Computer NetworksBranch: III-CSESemester: IFaculty: T.Lakshmi Lavanya

The main objective of this subject is introducing the concepts of electronic communications systems, data communications, and network. It also introduces the wireless and wire link telecommunications systems, basic data communications network and systems, local area networks, internetwork and intranetwork.

Page 6: 79193954 Data Communications and Computer Networks

And also includes the protocols like TCP/IP. And it also introducing about the telephone instruments and signals and cellular telephone concepts and cellular telephonic systems.

By studying this subject will known about the transmission media and communication cables to transfer the data from source to destination trough signals. And we will know about the communication codes and error controls and data formats for identifying the errors.

Subject: Data Communication and Computer NetworksBranch: III-CSEAcademic Year: 2013-2014

Semester: IFaculty: T.Lakshmi Lavanya

Sno Unit Class Topic Text /

Reference book

Chapter No

Remarks

1

I

L1 INTRODUCTION Data communications, Networks T1, R1 20-24

2 L2 The Internet, protocols and Standards T1,R1 25-28

3 L3 Network Models T1,R2 29-36

4 L4 Layered tasks. The OSI ModelT1, R1,

R2 37-38

5 L5 Layers in the OSI Model. T1, R1, R2 39

6 L6 TCP/IP Protocol Suite, Addressing T1, R1, R2 39-55

7 L7 Physical layer and Media. T1, R1, 58-73

Page 7: 79193954 Data Communications and Computer Networks

R2

8 L8 Data and Signals T1, R1, R2 75-76

9 L9 Analog and Digital, periodic T1, R1, R2 77-79

11 L10 Analog Signals, Digital Signals. T1, R1, R2 97

12 L11 Transmission impairment. Data rate Limits T1, R1, R2 98-100

13 L12 performance, Digital Transmission T1, R1, R2 100-109

14 L13Digital-to- Digital Conversion, Analog-to-digital Conversion

T1, R1, R2 110

15 L14 Analog Transmission, Digital -to-Analog conversion, T1, R1, R2 110-112

16 L15 Analog-To-Analog Conversion. T1, R1, R2 113-116

II L16 Bandwidth utilization: Multiplexing and Spreading, T1, R1, R2 119-120

L17 Multiplexing, spread Spectrum T1, R1, R2 121-122

L18Transmission Media, Guided Media, Unguided media:

T1, R1, R2 123-124

L19 wireless, Switching, circuit-Switched nerworks T1, R1, R2 124-132

L20 Datagram Networks, Virtual-Circuit Networks, T1, R1, R2 133-136

L21Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks

T1, R1, R2 137-147

L22 Dial-up Modems, Digital Subscriber Line T1, R1, R2 151-162

L23 Cable TV networks T1, R1, R2 163

L24 Cable TV for Data Transfer. T1, R1, R2 164

3 III L25 Error Detection and correction T1, R1, R2 165-174

L26Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing

T1, R1, R2 177-184

L27Flow and error Control , protocols, Noiseless Channels

T1, R1, R2 185-186

L28 HDLC, Point-to-Point protocol, T1, R1, R2 187-194

L29 Multiple Access, random Access, Aloha T1, R1, R2 195-197

L30Frame Synchronization, Frequency- Division Multiplexing

T1, R1, R2 198-202

L31 Controlled Access, Channelization T1, R1, R2 203-207

L32IEEE standards , standard Ether net , changes in the standard.

T1, R1, R2 210-211

L33 Fast Ethernet, Gigabit Ethernet, IEEE802.11 T1, R1, R2 212-214

L34 Bluetooth. T1, R1, R2 215-222

4 IV L35 Connecting LAN’s. Backbone Networks T1, R1, 223-224

Page 8: 79193954 Data Communications and Computer Networks

R2

L36Virtual LANs, Connecting Devices, Backbone networks virtual LANs

T1, R1, R2 225-229

L37 cellular telephony, Satellite Networks T1, R1, R2 241-246

L38Sonnet/SDH architecture, sonnet Layers, Sonet Frames

T1, R1, R2 247-248

L39STS Multiplexing, sonnet networks, virtual tributaries

T1, R1, R2 249-255

L40 virtual circuit networks T1, R1, R2 256-260

L41 Frame relay and ATM, Frame Relay T1, R1, R2 263-266

L42 ATM, ATM LANs. T1, R1, R2 266-271

5 V L43Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses

T1, R1, R2 272-286

L44network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6.

T1, R1, R2 287-294

L45 Network Layer Address Mapping T1, R1, R2 348-357

L46 Error Reporting and Multicasting, address mapping T1, R1, R2 358

L47 ICMP, IGMP, ICMPv6 T1, R1, R2 359-369

L48Network Layer : Delivery, Forwarding and routing, delivery, forwarding

T1, R1, R2 370-376

L49Unicast Routing protocols, Multi cast Routing protocols.

T1, R1,R2 377-

3382

6 VI L50Transport Layer: process-Process Delivery: UDP, TCP and SCTP

T1, R1, R2 386-402

L51 Process-to-Process Delivery T1, R1, R2 403-415

L52 User datagram protocol (UDP), TCP, SCTP T1, R1, R2 467-468

L53 Congestion control and Quality of service. T1, R1, R2 469-470

L54Data Traffic. Congestion , congestion control, two Examples

T1, R1, R2 471-472

L55 Quality service, Techniques to improve QOS T1, R1, R2 473-480

L56 Integrated Services, Differentiated services T1, R1, R2 481-486

L57 QOS in Switched networks T1, R1, R2 487-490

7 VII L58Application layer: Domain name system, Name space

T1, R1, R2 493-498

L59 Domain name space, Distributed of name space T1, R1, R2 499

L60 DNS in the Internet, Resolution, DNS messages T1, R1, R2 500-510

L61Types of records, registers, Dynamic Domain name System(DDNS)

T1, R1, R2 512-527

L62 Encapsulation, Remote Logging, Electronic mail and

Page 9: 79193954 Data Communications and Computer Networks

file TransferL63 Remote Logging, TelnetL64 Electronic mail, File Transfer.

8 VIII L65 WWW and HTTP: Architecture, web DocumentsL66 HTTP Network Management: SNMP, Network

Management systemL67 Simple Network Management protocol (SNMP)L68 Multimedia, Digitizing Audio and Video Audio and

video compressionL69 streaming stored audio/video, streaming live audio/

videoL70 Real-Time Interactive Audio/videoL71 RTP, RTCP, Voice over IP.

TEXT BOOKS:

T1. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH.T2. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.

REFERENCE BOOKS:

R1. Introduction to Data Communication and Networking. W.Tomasi.Pearson Education

R2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group.

R3. Data Communications and Computer Networks, P.C Gupta PHI

SYLLABUS COVERAGE

Subject: DATA COMMUNICATION AND COMPUTER NETWORKSBranch: III CSEAcademic Year: 2013-2014

Semester: IFaculty: T.Lakshmi Lavanya

Sno Unit Lecture No.

Date Planned

Date Conducted

Reason(s) for Non Compliance

Plan to over come non compliance

1 I C1

Page 10: 79193954 Data Communications and Computer Networks

2 C23 C34 C45 T16 C57 C68 C79 CT110 C811 C912 C1013 T214 C1115 C1216 C1317 C1418 CT219 C1520 II C1621 C1722 C1823 T324 C1925 C2026 C2127 C2228 C2329 CT330 C2431 III C2532 C2633 C2734 T4

35 C2836 C2937 C3038 C3139 CT440 C32

Page 11: 79193954 Data Communications and Computer Networks

41 C33

------------------- I-MID EXAMS FROM -------------------------------

42 C3443 IV C3544 T545 C3646 C3747 C3848 C3949 CT550 C4051 C4152 C4253 V C4354 T655 C4456 C4557 C4658 C4759 CT660 C4861 C4962 VI C5063 C5164 T765 C5266 C5367 C5468 C5569 CT770 C5671 C5772 VII C5873 C5974 T875 C60

C61

Page 12: 79193954 Data Communications and Computer Networks

C62C63C64

VIII C65C66C67C68C69C70C71

------------------- II-MID EXAMS FROM -------------------------------

C ---- CLASS

CT---- CLASS TEST

T ------- > TUTORIAL

Assignments, Quality and Evaluation Subject: DATA COMMUNICATION AND COMPUTER NETWORKS

Year/Branch: III/I CSE

Faculty: T.Lakshmi Lavanya

Academic Year: 2013-2014 Semester-I

Unit No

Assign-ment no

Topic Date Planned

DateOfSubmission

DateOf Distribution

I 11. Describe the following

standard organizations:

Page 13: 79193954 Data Communications and Computer Networks

ISO,ITU-T, IEEE,ANSI,EIA, TIA, IAB, ETF, and IRTF.

2. Name and explain the functions of each of the layers of the seven –layer OSI model.

3. Name and explain the functions of Analog and Digital, periodic, Analog Signals, Digital Signals

4. Explain about the TCP/IP Protocol Suite

5. Explain about the Digital-to- Digital Conversion, Analog-to-digital Conversion

6. Explain about the Digital -to- Analog conversion, Analog-To-Analog Conversion.

II 2

1. Describe the followingtypes of Multiplexing and Spreading, Multiplexing, spread Spectrum2. Describe the followingtypes of Guided Media and Un Guided Media Transformation media3. Explain the functions of circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks4. Explain the functions of Structure of a switch, using Telephone and Cable Networks5. Explain the functions

Structure of a switch, using Telephone and Cable Networks for data Transmission

6. Explain the functions Cable TV networks, Cable TV for Data Transfer.

III 3 1. Explain about Error Detection and correction

2. Explain about Block coding, Liner Block codes, Cyclic codes,

Page 14: 79193954 Data Communications and Computer Networks

checksum, data Link Control, Framing.

3. . Explain about protocols, Noiseless Channels

4. Explain about HDLC, Point-to-Point protocol

5. Explain about Multiple Access, random Access, Aloha, Controlled Access

6. Explain about Gigabit Ethernet, IEEE802.11, and Bluetooth.

IV 4

1. Explain the function of Connecting LAN’s. Backbone Networks, and Virtual LANs

2. Explain the function of Connecting Devices, Backbone networks virtual LANs

3. Explain the function and basic operation of the following cellular telephony, Satellite Networks

4. Explain the function and basic operation of the following sonnet/SDH architecture, sonnet Layers, Sonet

5. Explain the function of the STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks

6. Explain the function and basic operation of the following Frame Relay, ATM, ATM LANs

V 51. Explain about the Logical

Addressing, IPv4 Addresses

2. Explain about the Internet protocol, Internetworking

3. Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6

Page 15: 79193954 Data Communications and Computer Networks

4. Explain the about the Network Layer Address Mapping, Error Reporting and Multicasting

5. Explain the function and basic operation of the following , IPv4 Addresses, IPv6 Addresses

6. Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.

VI 6

1. Describe the concepts of process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery2. Describe the concepts of TCP, UDP ,SCTP, Congestion control and Quality of service3 Describe the Congestion , congestion control

4. Describe the Integrated Services, Differentiated services

5. Describe the QOS in Switched networks.

VII 7 1. Describe the Domain name system and Domain name space.

2. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages 3. Describe Dynamic Domain name System (DDNS), Encapsulation, Remote Logging.4. Describe the purpose

of Electronic mail and file Transfer, Remote Logging

5. Describe the function of a Telnet

6. Describe the Electronic mail,

Page 16: 79193954 Data Communications and Computer Networks

File Transfer.

VIII 8

1. Draw and describe the HTTP Architecture and error control.2. Describe the HTTP Network Management: SNMP, Network Management system 3. Describe the Simple Network Management protocol (SNMP)

4. Describe the Digitizing Audio and Video Audio and video compression 5. Explain the , streaming stored audio/video, streaming live audio/ video

6. Define and describe RTP, RTCP, Voice over IP

Quality verified by HOD: Good/Average/Poor Signature of HOD

Tutorial

Subject: Data communication and Computer Networks

Branch: III CSE

Academic Year: 2013-2014 Semester: I

Faculty: T.Lakshmi Lavanya

SnoUnit

noTutorial topic

Date

Planned/

conducte

d

Marks

entered in

the register

(Yes/No)

1 I 1. Explain about the

Digital-to- Digital

Conversion, Analog-to-

Format no: 10MLRIT/CSE/TC/II/ I.2/CF/Tutorial

Page 17: 79193954 Data Communications and Computer Networks

digital Conversion

2. Explain about the Digital -to- Analog conversion, Analog-To-Analog Conversion.

2 II 1. Explain the functions of circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks

2. Explain the functions Cable TV networks, Cable TV for Data Transfer.

3 III 1. Explain about Error Detection and correctionDecoding

2. Explain about Gigabit

Ethernet, IEEE802.11, and

Bluetooth.

4 IV 1. Explain the function of Connecting LAN’s. Backbone Networks, and Virtual LANs2. Explain the function

and basic operation of the

following Frame Relay, ATM,

ATM LANs

5 V 1. Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6.

6 VI 1. Describe the concepts of TCP, UDP ,SCTP, Congestion control and Quality of service

7 VII 1. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages

Page 18: 79193954 Data Communications and Computer Networks

8 VIII 1. Describe the HTTP Network Management: SNMP, Network Management system

Quality verified by HOD: Good/Average/Poor Signature of HOD

Subject: Data Communication and Computer networksBranch: III-I CSEAcademic Year: 2013-2014

Semester: IFaculty: T.Lakshmi Lavanya

OBJECTIVE QUESTIONS

UNIT-I1. The unit of data is _______ a) Data b) Datum c) Information d) None ( )2. What is protocol_________?3. Information is defined as__________4. When message are intended for all subscribers on the network is called______

( ) a) Broadcasting b) multicasting c) network d) data5. When message are intended for a specific group of subscribers it is called______________ ( ) a) Broadcasting b) multicasting c) network d) data6. Point-to-point networks have only--------stations ( )

a) 2 b) 3 4) 1 d) 07. Example of connection less protocol is ( ) a) Virtual circuit d) datagram circuit c) network d) none8. ISO stands for__________ ( )9. In the simplex mode data transmission is ________ ( ) a) Unidirectional b) bidirectional c) a & b d) none10. _____holds shared files, programs, and the network O/S ( ) a) Server b) client c) shared date d) none11. GAN stands for _____________ ( )12. Converting information signal to a different form is called______ ( )

a) Analog b) digital c) modulation c) demodulation13. What is Data Communication______?

Page 19: 79193954 Data Communications and Computer Networks

14. Define digital modulation15. Define connection oriented protocol_________16. Determine the number of conditions possible for a binary code Containing the following number of bits____________________ ( ) a) 3 b)5 c) 7 d) 1217. For sine wave with the frequencies of 100Hz .determine the Period ( )

a) 10 b) 100 c) 1 d)none18. For an electronic device operating at 17C with a bandwidth of 10kHz, ( )

Determine the thermal noise power in watts and dBm.a) 4 *10-17 watts b) 11 *10-17 watts c)3 *10-11 watts d)2 *10-12 watts

19. TCP/IP stands for_____________________ ( )20. For sine wave with the period is 0.1ms, determine the frequencies ( ) a) 100 kHz b) 10kHz c) 1MHz d) noneUNIT-II1. For sine wave with the frequencies of 100Hz .determine the Period ( )

a) 10 b) 100 c) 1 d) none2. Define an amplitude_________3. Define frequency_____________4. The distance of one cycle occurring in space is called the_________ ( ) a) Velocity b) frequency c) wavelengthd) time5. The reciprocal of frequency is called_________________ ( ) a)time b)bandwidth c) amplitude d)none

6. What is Bit Rate______?7. What is M-ary______

8. Velocity factor is__________ ( ) a) Vp * c b) c* 2d c) Vp/c d) none9. What is the speed o light___________ ( ) a) 3 *108 m/s b)6.625 *10-23 j/s c)3.14 *109 m/s10. The cancellation of common mode signal is called__________ ( )11. What is the bit_______?12. What is buad________?13. Wavelength λ is________ ( ) a) c/ f b)f/c c)c +f d) 1/c + f 14. Optical power is expressed mathematically as P= __________ ( ) a)dQ/dt b)dt/dQ c)dQ + dt d )none15. Define the critical angle____________16. Refractive index is ___________ ( ) a) v/c b)v+c c) 1/v+c d)c/v17. What are the losses of metallic transmission line ----------- 18. Two kinds of wave’s are__________19. What is bandwidth_________?20. Buffer jacket is made up of__________21. Dielectric constant is separated by_______ ( )

a) Insulator b) conductor c) a & b d) none

UNIT-III1. What is digital transmission________?2. PAM is used to -------------------------------- ( )

a) PSK B) QAM c) PCM d)all3. PAM stands for__________________

Page 20: 79193954 Data Communications and Computer Networks

4. Peak amplitude values varied between________ ( ) a)+2 v to -2v b)+4v to -4v c)+5v to -5v d)none5. Dynamic range (DR) is the ratio of___________ ( ) a) Vmax/Vmin b) Vmin/Vmax c) Vmax +Vmin6.PCM stands for _______________7. PWD stands for_______________8.PCM system used------- ( ) a) 12bit linear & 8bits compressed code b) 8bit linear & 12bits compressed code c) 12bit linear & 12bits compressed code d) all are correct9. Determine the minimum nyquist rate for a maximum analog input frequency of the 10KHz________________10. Determine the maximum analog input frequency of the sample rate______ ( )11. Dertermine the maximum number of PCM bits

of a Dynamic range of 80 dB.______________12.What is companding_________ ( )

a) Compression & expanding b) extracting & excludingc) Conclusion d) a & b

13. Types of companding__________________ ( )a)analog and digital companding b) data compandingc) Numerical and Data Companding d)none

14. Analog Companding occur in_______________ ( )a)μ-law Companding b)A-law compandingc) Both a & b d) none

15. Line speed is the ratio of__________ ( )a)bits/sec b)bits/n c)baud/sec d)none

16. What is digital Multiplexing_______?17. TDM stands for_________________18. The transmission o information from more than one Source to more than one destination over the same transmission medium. ( )

a) Frequency b) multiplexing c) voltage d) signal19. What is duty cycles___________?20.T2 carrier TDM system have ___________ ( )

a) 64kbps b) BPRZ-AMI c) B6ZS d)all

UNIT-IV

1. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none

2. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none

3. The _________of a plane electromagnetic wave is simply the orientation of the electric field vector in respect to earth’s surface. ( )a) Signature b) polarization c) modulation d) none

4. __________represents the flow of electromagnetic waves in the direction of propagation.

( )a) Power density b) radiation c) electromagnetic radiation d) all

Page 21: 79193954 Data Communications and Computer Networks

5._______is energy per unit of time per unit of area and is usually given in watts per square (

)a) Power density b) radiation c) electromagnetic radiation d) all

6. Power density is _______ ( ) a)p=eh b)p=e/h c)p=e +h d)all

7. A point source radiating power at a constant rate uniformly in all directions. Such a source is called an _______ ( ) a) Isotropic radiation b) electromagnetic radiation

c) Power density d) radiation8. The power density is inversely proportional to the square of the distance from the

source. ()

a) Planck’s law b) Inverse square law c) both a & b d) all

9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it.

However, as waves propagate through free space, they spread out, resulting in a reduction in power density.This is called________ ( )

a)Absorption b)Attenuation c)both a & b d)all10. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb

electromagnetic energy. This type of reduction of power is called________ ( )a) Radiation loss b) coupling loss c) absorption loss d) all

11. Reduction in power density with distance is equivalent to a power loss Is called_______ ( ) a) Wavelength b) velocity c) wave attenuation d) all

12. The attenuation is due to the spherical spreading o the wave in space Is called_______ ( )

a) space attenuation b) wave attenuation c) Attenuation

13. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 14. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none15. Electromagnetic wave_________occurs when an incident wave strikes a boundary

of two media and some or all of the incident power does not enter the second material

a) Refraction b) reflection c) both a & b d) none

16. ______ is defined as the modulation or reduction of energy within a wavefront when it passes near the edge of an opaque object.

( ) a) a) Refraction b) reflection c) both a & b d)Defraction

17. Radio wave _________occurs when two or more electromagnetic waves combine in such a way that system performance is degraded. ( )

Page 22: 79193954 Data Communications and Computer Networks

a)Refraction b) reflection c) Interference d)Defraction18.___________ are electromagnetic waves that travel along the surface of earth.( ) a) Surface wave b) ground wave c) both a & b d) all

19. Electromagnetic waves that are directed above the horizon level are called ____( ) a) Surface wave b) ground wave c) sky wave d) all20. _______is the minimum distance from a transmit antenna that sky wave of given Frequency will be returned to earth. ( ) a) Surface wave b) ground wave c)skip distance d)all21.________is defined as the loss incurred by an electromagnetic wave as it Propagates in a straight line through a vacuum with no absorption or reflection Of energy from nearby objects. ( ) a) Surface wave b) ground wave c)free-space path loss d)all

22. What is the satellite__________?

23. Satellite‘s are ______ ( ) a) LEO b) MEO c) GEO d) All24. _______ satellites orbit earth above the equator with the same

angular velocity as earth. a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all25.________satellite rotate around earth in circular or elliptical pattern. ( ) a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all

26. 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. 27. However, as waves propagate through free space, they spread out, resulting in

a reduction in power density. This is called________( )

a)Absorption b)Attenuation c)both a & b d)all

28. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( )a) Radiation loss b) coupling loss c) absorption loss d) all

29. Reduction in power density with distance is equivalent to a power loss Is called_______ ( ) a) Wavelength b) velocity c) wave attenuation d) all

30. The attenuation is due to the spherical spreading o the wave in space Is called_______ ( )

a) Space attenuation b) wave attenuation c) Attenuation

31. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 32. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none

Page 23: 79193954 Data Communications and Computer Networks

33. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material

a) Refraction b) reflection c) both a & b d) none34. _______are combinations o passive components that are used to regulate the

amplitude and frequency response of the voice signals.( )

a) Equalizer circuit b) speaker c) microphone d) all35. The ______________is the receiver for the telephone

( )a) Equalizer circuit b) speaker c) microphone d) all

36. The ______________is the transmitter for the telephone( )

a) Equalizer circuit b) speaker c) microphone d) all37. The__________is sent back to the calling party at the same time the ringing Signal is sent to the called

( )a) Ringing back signal b) receiver c) both a & b d) none

38. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( )

a) Wave absorption b) Wavelength c) velocity d) wave attenuation 39. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none40. Electromagnetic wave_________occurs when an incident wave strikes a boundary

of two media and some or all of the incident power does not enter the second material

a) Refraction b) reflection c) both a & b d) none

UNIT-V

1. If a datagram router goes down then _ _ _ _ _ _ _ _ _ _ a. all packets will sufferb. only those packets which are queued in the router at that time will suffer c. only those packets which are not queued in the router at that time will sufferd. no packets will suffer2. Indatagramsubnetnewrouteischosen__ __ ___ __ __ ___ __a. for every packet sentb. for all the packet sentc. only for the first packetd. for the packet which is not transmitted3. ThePSTNisanexampleofa_ ___ __ __ __ __ __ ____networka. packet switchedb. circuit switchedc. message switchedd. frame switched4. Eachpacketisroutedindependentlyin__ __ __ ___ __ __ __ a. virtual circuit subnet b. short circuit subnetc. datagram subnetd. ATM subnet5. For a connection oriented service, we need a _ _ _ _ _ _ _ _ _ _ __ _ a. virtual circuit subnet b. short circuit subnetc. datagram subnetd. wireless subnet

Page 24: 79193954 Data Communications and Computer Networks

6. Which type of switching uses the entire capacity of a dedicatedlink? a. circuit switchingb. datagram packet switchingc. virtual circuit packet switchingd. message switching7. In _ _ _ _ _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data isdelayed because data must be stored andretrieved from RAM. a. space divisionb. time division c. virtuald. packet8. In_ __ __ ___ __ ___ ____,eachpacketofamessageneednotfollowthesamepathfrom sender toreceiver.a. circuit switchingb. message switchingc. virtual approach to packet switchingd. datagram approach to packet switching9. In_ __ __ ___ __ ___ __ _ __ ____,eachpacketofamessagefollowsthesamepath from sender to receiver.]a. circuit switchingb. message switchingc. virtual approach to packet switchingd. datagram approach to packet switching10. A permanent virtual circuit involves _ _ _ _ _ _ _ _ _ _ _ _ _ _ __. a. Connection establishmentb. Data transfer c. Connection released. Connection check11. The set of optimal routes from all sources to a givendestination from a tree rooted to the destinationis known as _ _ _ _ _ _ _ _ _ _ _ _ _ a. Binary treeb. Sparse treec. Sink treed. AVL tree

12. Adaptive routing algorithms get their information from _ _ _ _ __ _ _ _ _ _ _ _ _ a. only from local environmentb. only from adjacent routersc. from locally, adjacent, external routersd. only from external routers13. If the route from I to J is computed in advance, off line, anddownloaded to the routers when thenetworkisbootediscalledas__ __ __ ___ ___ __ a. Dynamic routingb. Session routingc. Temporary routingd. Static routing14. The router algorithm takes the decision to changes the routewhen _ _ _ _ _ _ _ _ _ _ _ _]a. router changesb. topology changesc. user changesd. transmission time does not change15. If route from router I to router J is computed on line based onthe current statistics, then it is called as _ __ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Dynamic routingb. Session routingc. Temporary routingd. Static routing16. If the subnet uses virtual circuits internally, routing decisions

Page 25: 79193954 Data Communications and Computer Networks

are made only when a new virtualcircuitisbeingsetup.Thisiscalledas________ a. Session routingb. Circuit routingc. Datagram routingd. Forwarding17. _ _ _ _ _ _ _ _ _ _change their routing decisions to reflectchanges in the topology. [02S02]a. Nonadaptive algorithmsb. Adaptive algorithmsc. Static algorithmsd. Recursive algorithms18. If router J is on the optimal path from router I to router K, thenthe path from J to K along the samerouteis__ __ _____ ___ _____ __.[02S03]a. does not existb. optimalc. maximumd. constant19. If router J is on the optimal path from router I to router K, thenthe optimal path from J to K alsofallsalongthesamerouteisknownas_____ ___ ____ ___ ____.[02S04]a. Routing principleb. Optimality principlec. Sink tree principled. Network principle20. ___ _________ ________donotbasetheirroutingdecisionsonmeasurementsor estimates of the currenttraffic and topology. [02S05]a. Nonadaptive algorithmsb. Adaptive algorithmsc. Static algorithmsd. Recursive algorithms

UNIT-VI

1. The method of network routing where every possible pathbetween transmitting and receiving DTE is used is called [03D01] a. Random Routingb. Packet Flooding c. Directory Routingd. Message Switching2. In Hierarchical routing for N router subnet, the optimal numberof levels is _ _ _ _ _ _ _ a. logN

b. log(N -1)c. lnNd. ln(N-1)3. In Hierarchical routing, the routers are divided into what iscalled as _ _ _ _ _ _ _ _ _ _ _ _ a. zonesb. Cellsc. Regionsd. Blocks4. The regions in Hierarchical routing are grouped in to _ _ _ _ _ __ _ _ _ _ _ _ _ _ _. a. Clustersb. Zonesc. Blocks d. Cells5. The Clusters in Hierarchical routing are grouped in to _ _ _ _ __ _ _ _ _ _ _ _ _ _ a. Clustersb. Zones c. Blocks

Page 26: 79193954 Data Communications and Computer Networks

d. Cells6. 1. If a router sends every incoming packet out only on thoselines that are going approximately in therightdirectionisknownas__ __ ___ _______ a. Random floodingb. Static floodingc. Selective floodingd. Early flooding7. In shortest path routing algorithm, the path length is measuredbased on _ _ _ _ _ _ _ _ _ _ _ _ a. time delayb. number of hopsc. size of the routersd. routing table8. Floodingalwayschoosethe______ ___ _______ a. Shortest path b. First pathc. Last pathd. Largest path 9. In military applications where large number of routers may beblown to bits at any instant, we use _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Shortest path firstb. First come first servec. Forwardingd. Flooding10. In distributed applications, it is sometimes necessary to updateall the databases concurrently, we use _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Shortest path firstb. First come first servec. Forwardingd. Flooding11. In multicast routing with spanning tree method, a network withn groups, each with an average of mmembers, for each group we require _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .a. n pruned spanning trees must be stored for a total of mn treesb. m pruned spanning trees must be stored for a total of mtreesc. n pruned spanning trees must be stored for a total of n treesd. m pruned spanning trees must be stored for a total of mn trees13. To do multicast routing, each router computes a _ _ _ _ _ _ _ __ _ _ _ _ a. Binary treeb. AVL treec. Spanning treed. Sparse tree14. A well -defined groups that are numerically large in size but small compared to the network as awholeareusedin __ _______ __ _____ a. Unicast routing

b. Multicast routingc. Broadcast routingd. Telecast routing15. In__ ______ _______tosendamulticastmessageahostsendsittothecore,which then doesthe multicastalong the spanning tree. . Core based Treesb. AVL treesc. Binary treesd. Sparse trees16. Sending a packet to all destinations simultaneously is called __ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Multicasting b. Unicasting c. Telecasting

Page 27: 79193954 Data Communications and Computer Networks

d. Broadcasting 17. AnormalFloodingtechniqueisanexampleof____ _________a. Multicasting b. Unicasting c. Telecastingd. Broadcasting 18. In Broadcast routing, if the router does not know anything allabout spanning tree, _ _ _ _ _ _ _ _ _ _ _ _ _ __ method is preferred. a. Reverse Path forwardingb. Multidestination c. Floodingd. spanning tree 19. The method of Broadcast routing in which each packetcontains either a list of destinations or a bit mapindicating the desired destinations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. [04S04]a. Reverse Path forwardingb. Spanning tree c. Multidestinationd. Flooding20. Sending a message to a well defined group that are numerically large in size but small compared to thenetwork as a whole is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .a. Unicasting b. Multicastingc. Broadcasting d. Telecasting

UNIT-VI1. In link state routing, after the construction of link state packetsnew routes are computed using _ _ _ _ _ _ _ _ _ _ _ _ a. Bellman Ford algorithmb. DES algorithm c. Dijkstra's algorithm2 Count-to-Infinityproblemoccursin______ ______ _______.[05M01]a. distance vector routingb. short path firstc. link state routingd. hierarchical routing3 In distance vector routing algorithm, each router maintains aseparate routing table with the followingentries . [05M02]a. preferred input line , estimated timeb. preferred input line, estimated distancec. preferred output line, estimated timed. preferred output line, router5. Linkstatepacketsarebuiltin _______ a. short path firstb. distance vector routingc. link state routingd. hierarchical routing6. In which routing method do all a. Distance Vectorb. Link Vector c. Shortest path

d. Link State7. In distance vector routing algorithm, the routing tables areupdated _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [05S02]a. by exchanging information with the neighborsb. automatically c. using the backup databased. by the server8. Distance vector routing algorithm is implemented in Internet as_ _ _ _ _ _ _ _ _ _ _ _ _ _ a. OSPF

Page 28: 79193954 Data Communications and Computer Networks

b. RIPc. ARPd. APR9. Which of the following routing algorithm takes into account thecurrent network load. a. broadcastb. shortest path c. floodingd. distance vector routing1. Indistancevectorroutingthedelaymetricis __________ _______

a. number of hopsb. geographical distancec. number of neighbors d. queue length 11 The processes that keep track of hosts whose home is in thearea, but who currently visiting another areais _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . Home agentb. Mobile agentc. Foreign agentd. User agent12 In AODV routing algorithm for MANETs, the route is discoveredat time _ _ _ _ _ _ _ _ _ _ _ _ _ .a. only when the network is establishedb. in middle of the transmissionc. when there is a need for route by the hostd. when there is no need for route by the host13. Military vehicles on a battlefield with no existing infrastructurewill deploy _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _network. a. MANETb. Cell Network c. LANd. Wi-Fi14. The network in which all the nodes are symmetric and there isno central control or hierarchy is _ _ _ _ _ _ _ _ _ _ _ . a. MANETb. Client -Server Technology c. Peer-to-Peerd. Wi-Fi15. What is the type of network in which the topology change fromtime to time? a. Wi-Fib. Cell Network c. LANd. MANET16. The processes that keep track of all mobile hosts visiting thearea is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Home agentb. Mobile agentc. Foreign agentd. User agent17. The hosts which are basically stationary hosts who move fromone fixed site to another from time to time butuse the network only when they are physically connected to it arecalled _ _ _ _ _ _ _ _ _ _ _ a. Migratory hostsb. Stationary hostsc. Mobile hostsd. Random hosts

18. The hosts who compute on the run and want to maintain theirconnections as they move around _ _ _ _ _ _ __ _ _ _ _ _ _ _ _]a. Migratory hostsb. Stationary hostsc. Mobile hosts

Page 29: 79193954 Data Communications and Computer Networks

d. Random hosts19. What is the type of network in which the routers themselves aremobile? a. Wide Area Networkb. Mobile Ad hoc Networkc. Mobile Networkd. Local Area Network20. What is the routing algorithm used in MANETs]a. Shortest Path First b. Routing Information Protocol c. Distance Vector Protocold. Ad hoc On -demand Distance Vector Protocol

UNIT-VII

1. Why probe packets are transmitted in the network? a. to know about the capacity of the channel b. to count the number of host in the networkc. to know about efficiency of the routing algorithmd. to know about the congestion2. If the source deduces the existence of congestion by making local observations,such as the time needed foracknowledgements to come back is called as _ _ _ _ _ _ _ _ _ _ _ .

b. Implicit feedback algorithm3. The solution to decrease the load on the network whencongestion occurs is _ _ _ _ _ _ _ _ _ _ . a. splitting the traffic over multiple routesb. increasing the transmission powerc. usage of spare routersd. denying service to the users4. In open loop congestion control techniques, the decisions arebased on the _ _ _ _ _ _ _ _ _ a. without regard to the current state of the networkb. with regard to the current state of the network c. with regard to the choice of the hostd. without regard to the choice of the host 5. In closed loop congestion control techniques, the decisions arebased on the _ _ _ _ _ _ _ _ _ _ . a. concept of a feedback loopb. concept of a forward loopc. concept of current state of networkd. concept current status of the router6. When too many packets are present in the subnet, andperformance degrades then it leads to _ _ _ _ _ _ _ __ _ _ _ a. Ingestionb. Congestionc. Digestiond. Diffusion7. What is it goal of congestion control? a. making sure that subnet is not able to carry the offeredtraffic b. making sure that subnet will allow more than the offeredpacketsc. making sure that subnet is able to carry the offered trafficd. making sure that subnet will not allow any traffic8. The service of open loop congestion control technique is _ _ __ _ _ _ _ _ _ a. monitor the system to detect when and where congestion occurs b. when to accept new trafficc. pass the information to places where action can be takend. adjusting the system to correct the problem9. The service of closed loop congestion control technique is _ __ _ _ _ _ _ _ _ _]a. when to accept new traffic

Page 30: 79193954 Data Communications and Computer Networks

b. when to discard the packetsc. monitor the system to detect when and where congestion occursd. which packets to discard

10. The solution to increase the capacity when congestion occursis _ _ _ _ _ _ _ _ _ _ _ _ _ a. denying service to the usersb. degrading the service to the usersc. splitting traffic over multiple routesd. rescheduled the demands of the users11. When routers are being inundated by packets that they cannothandle, they just throw them away isknown as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Jitter controlb. Random early detectionc. Choke packetsd. Load shedding 12. If f is the sample instantaneous line utilization, a is the constant that determines how fast the router forgetsrecent history and u is the recent utilization of the line then the formula to update u is _ _ _ _ _ _ _ _ _ _ _ _ .[08D02]13. The choke packet is send back to the source if _ _ _ _ _ _ _ _ _ .[08M01]a. The utilization factor u moves above the given thresholdb. The utilization factor u moves below the given thresholdc. The utilization factor u is equal to the given thresholdd. The utilization factor u doesn`t change 14. When the source host receives the choke packet, then thesource _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. reduces the capacity of the lineb. reduces the line utilization factorc. reduces the traffic generation d. ratereduces the threshold value15. If the buffer fills and a packet segment is dropped, thendropping all the rest of the segments from that packet, since they will be useless anyway is called _ _ _ _ _ _ _ _ __ _ _ _ _a. Priority droppingb. Tail dropping c. Age based droppingd. Head dropping16. Timeoutdeterminationpolicyisusedin___ ______________.[08S01]a. network layerb. data link layerc. transport layerd. application layer17. Flowcontrolpolicyisimplementedin_____ __________ _.a. network layerb. transport layerc. application layerd. physical layer18. Packet discard policy is implemented in _ _ _ _ _ _ _ _ _ _ _ _ __ . [08S03]a. Physical layerb. Data link layerc. MAC layerd. Network layer19. 4. For applications such as audio and video streaming, thevariation in the packet arrival times is called _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Random early detectionb. Jitter c. Delay differenced. Load shedding20. Sending of a IP packet from host 1 to host 2 where both are ofsame LAN but the packet is transferred through different intermediate LANs is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ .

Page 31: 79193954 Data Communications and Computer Networks

a. Tunnelingb. Routingc. Diverting d. Forwarding

UNIT_VIII1. The type of fragmentation in which packet is fragmented at thesource host and reassembly is done only atdestination host is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. transparent fragmentation b. internal fragmentationc. free space fragmentation d. nontransparent fragmentation2. Firewallsareusedfor___ _______ _____.a. routingb. security c. tunnelingd. congestion control3. To translate the message semantics from one format to other, __ _ _ _ _ _ _ _ _ is used. a. application gateway b. transport gateway c. session gatewayd. network gateway4. The routing algorithm within each network is _ _ _ _ _ _ _ _ _ __ _ _ _ . a. Routing information protocol b. Exterior gateway protocol c. Interior gateway protocold. Middle gateway protocol 5. In _ _ _ _ _ _ _ _ case higher bandwidth can be achieved.a. connectionless networksb. connection oriented networks c. virtual circuit networksd. optical networks

6. Fragmentationmeans_________ _______ a. adding of small packets to form large packetb. breaking large packet into small packetsc. combining large packets in to a single packetd. forwarding a packet through different networks7. Bridgesareusedat________ ___layer a. Physical layerb. MAC layerc. Networkd. Transport8. Routersareusedat_ __________layer a. Physical layerb. MAC layerc. Networkd. Transport9. Gateways are used at _layera. Physical layerb. MAC layerc. Networkd. Application10. Which type of ATM service is used for regroup timing requirements?a. variable bit rateb. constant bit ratec. available bit rated. unspecified bit rate11. Which of the following assertions is FALSE about the InternetProtocol(IP)? a. It is possible for a computer to have multiple IP addressesb. Ip packets from the same source to the same destinationcan take different routes in the networkc. IP ensures that a packet is discarded if it is unable to reachits destination within a given number of hops

Page 32: 79193954 Data Communications and Computer Networks

d. The packet source cannot set the route of an outgoingpackets; the route is determined only by the routing tables intherouters on the way12. _ _ _ _ _ _ _ _ _ _ _ protocol is used for constant bit rate.a. AAL1b. AAL2c. AAL 3/4d. AAL513. While booting the system the IP address is _ _ _ _ _ _ _ _ _ _ _ .

a. 1.1.1.1b. 1.1.0.0c. 0.0.1.1d. 0.0.0.014. In ATM network _ _ _ _ _ _ _ _ _ message is used by a sourcehost to set up a connection. a. SET UPb. Call PROCEEDINGc. CONNECTd. RELEASE15. How many class A, B and C networks IDs can exist a. 2,113,658b. 16,382c. 126d. 12816. Which of the following TCP/IP internet protocol, a disklessmachine uses to obtain its IP address from aserver a. RDPb. ARPc. RARP d. RIP17. Theprotocolusedtotesttheinternetis__ _______ a. IGMP b. ICMPc. ARPd. RIP18. Which IP address class has few hosts per network? a. class Ab. class Bc. class Cd. class D19. TheIPaddresswith127aabbccisusedfor_ _________ ___a. broad castingb. multicastingc. loop back testingd. forward testing20. What type of addressing is specifically used by the transportlayer? a. station addressb. application program port addressc. dialog addressd. network address21. Which of the following functionalities must be implemented by a transport protocol over and above thenetwork protocol? a. Recovery from packet lossesb. Detection of duplicate packetsc. Packet delivery in the correct orderd. End to end connectivity 22. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ __ _ _ primitive. a. LISTEN b. ACCEPTc. BINDd. CONNECT23. SEND and RECEIVE primitives are called as _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ _ primitives.]

Page 33: 79193954 Data Communications and Computer Networks

a. blockingb. non blocking c. data transfer d. error control24. CONNECT and DISCONNECT primitives are called as _ _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ primitives. a. blockingb. non blocking c. data transfer d. error control25. Transport protocol data units(TPDUs) are contained in _ _ _ __ _ _ _ _ _ _ _ _ . a. protocol b. frame

d. packet26. Which of the following layer is transport service provider?[a. networkb. transportc. session d. application27. The transport layer performs the same types of functions asthe _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ layer.]a. sessionb. networkc. data linkd. physical 28. The end points of a transport connection are called _ _ _ _ _ __ _ _ _ _ _ _ _ _ _ a. TSAPs b. AAL -SAPsc. NSAPsd. PSAPs29. In transport layer, End to End delivery is the movement of datafrom _ _ _ _ _ _ _ _ _ _ _ . a. one station to the next stationb. one network to the other network c. source to destinationd. one router to another router30. Which of the following are session layer check points?a. allow just a portion of a file to be resentb. detect and recover errorsc. control the addition of headersd. are involved in dialog control31. The function of the transport layer ensuring that all pieces of atransmission arrive at the destination, notjust some of them is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Duplication controlb. Sequence controlc. Loss controld. Error control32. If either of the communicating device can ask fordisconnection by sending DISCONNECT REQUEST TPDU tothe other, and immediately disconnect without waiting foracknowledgement is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ . a. Graceful disconnectionb. Abrupt disconnectionc. Greedy disconnectiond. Random disconnection33. The type of disconnection in which three way handshakeprotocol is used is _ _ _ _ _ _ _ _ _ . a. Graceful disconnectionb. Abrupt disconnectionc. Greedy disconnectiond. Random disconnection34. 8. The parameter which gives the probability of the transportlayer itself spontaneously terminating a

Page 34: 79193954 Data Communications and Computer Networks

connection due to internal problems is called a. protectionb. resiliencec. option negotiationd. transfer failure35. A single transport layer connection split and connects the different network connections is called _ _ _ _ _ __ a. Upward multiplexingb. Downward multiplexing c. Congestion controld. Flow control36. Error control is needed at the transport layer because of potential errors occurring _ _ _ _ _ _ _ _ _ _ _ _ _ __ _a. from transmission line noiseb. in routersc. program d. error control