APPLES 2 Flashcards
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called______.
a. parity check
b. fletcher’s checksum
c. piggybacking
d. cyclic redundancy check
c. piggybacking
What are the services provided by layer 2 of the 0SI reference model?
a. All of these
b. Physical Addressing and Error Control
c. Flow Control
d. Framing and Access Control
a. All of these
Name the Byte oriented protocols commonly used?
a. BISYNC, BISYNC and HDLC
b. SONET, BISYNC, PPP and HDCL
c. None of these
d. DDCMP, BISYNC and PPP
d. DDCMP, BISYNC and PPP
Unauthorised access of information from a wireless device through a bluetooth connection is called ________.
a. bluemaking
b. bluescoping
c. bluesnarfing
d. bluestring
c. bluesnarfing
Error detection technques are used in data communications. What are they?
a. Checksum
b. CRC
c. All of these
d. VRC and LRC
c. All of these
CSMA/CD is not suitable for a high propagation delay network like satellite network?
a. True
b. False
a. True
The maximum size of payload field in Ethernet frame is __________.
a. 1300 bytes
b. 1200 bytes
c. 1000 bytes
d. 1500 bytes
d. 1500 bytes
Determine the maximum length of the cable in km, for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10, 000 bits. Assume the signal speed in the cable to be 2x10^5 km/s?
a. none of these
b. 4
c. 3
d. 2
d. 2
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a. CSMA/CD
b. CSMA/CA
c. ALOHA
d. CDMA
b. CSMA/CA
Describe the performance of LRC in data communications?
a. LRC increases the probability of detecting burst errors.
b. LRC error checker will not detect errors if two bits in one data units are damaged.
c. All of these
d. LRC error checker will not detect errors if two bits in exactly the same position in another data unit are damaged.
c. All of these
What are the two main types of framing in layer 2 of the OSI model?
a. Fixed length framing
b. Variable length framing
c. Fixed size framing
d. Variable size framing
Fixed size framing and
Variable size framing
A network with CSMA/CD protocol in the MAC layer is running at 1Gbps over a 1 km cable with no repeaters. The signal speed in the cable is 2x10^8 m/sec. What would be the minimum frame size for this network?
a. 1.25kB
b. 1.30kB
c. 1.50kB
d. 1.45kB
a. 1.25kB
Which of the following is the multiple access protocol for channel access control?
a. Both CSMA/CD & CSMA/CA
b. CSMA/CD
c. CSMA/CA
d. HDLC
a. Both CSMA/CD & CSMA/CA
Which of the following best describes CSMA protocol?
a. None of the these
b. sense before transmit
c. Act before you talk
d. Listen before transmit
b. sense before transmit
The physical layer is responsible for?
a. all of these
b. line coding
c. modulation
d. channel coding
a. all of these
What are the two primary functions of the MAC sublayer?
a. LLC Sublayer
b. Both MAC and LLC layers
c. DLC sublayer
d. MAC sublayer
d. MAC sublayer
Header of a frame generally contains ____________
a. frame identifier
b. addresses
c. all of the mentioned
d. synchronization bytes
c. all of the mentioned
Which sub-layer of the data link layer performs data link functions that depend upon the type of medium?
a. network interface control sub-layer
b. logical link control sub-layer
c. media access control sub-layer
d. error control sub-layer
c. media access control sub-layer
The strategy of doubling the delay interval between each retransmission attempt is known as?
a. Exponential Timeoff
b. None of these
c. Exponential Backoff
d. Exponential delay
c. Exponential Backoff
Consider the data unit 10011001111000100010010010000100 to be transmitted by the sender. Determine the following,
a) number of blocks after segmenting the message?
b) number of bits per block?
c) The checksum?
a) 4
b) 8
c) 11111110
Which IEEE standard is used for Ethernet?
IEEE 802.3
What are the different types of STP ports?
a. Root port, Designated port and Forwarding port
b. Root port, Designated port, Forwarding port, Blocked port
c. Root port, Designated port and Blocked port
d. None of these
b. Root port, Designated port, Forwarding port, Blocked port
What is the purpose of Spanning Tree Protocol in a switched LAN?
a. To prevent switching loops in networks with redundant switched paths
b. To manage the VLAN database across multiple switches
c. To prevent routing loops in networks with redundant paths
d. To provide a mechanism for network monitoring in switched environments
a. To prevent switching loops in networks with redundant switched paths
The sharing of a medium and its link by two or more devices is called _________
a. Microplexing
b. Multiplexing
c. Fully duplexing
d. Duplexing
b. Multiplexing
Which transmission media has the highest transmission speed in a network?
a. optical fiber
b. coaxial cable
c. twisted pair cable
d. electrical cable
a. optical fiber
Time it takes to place the complete data packet on the transmission medium for processing is referred to as?
a. Queuing delay
b. Propagation delay
c. Transmission delay
d. Processing delay
c. Transmission delay
Which IEEE standard is used for WiFi?
IEEE 802.11
Which IEEE standard is used for Bluetooth?
IEEE 802.15
When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________
a. burst error
b. double error
c. inverted error
d. random error
a. burst error
Wireless transmission can be done via
a. microwaves
b. radio waves
c. infrared
d. all of these
d. all of these