APPLES 2 Flashcards

1
Q

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called______.

a. parity check
b. fletcher’s checksum
c. piggybacking
d. cyclic redundancy check

A

c. piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the services provided by layer 2 of the 0SI reference model?

a. All of these
b. Physical Addressing and Error Control
c. Flow Control
d. Framing and Access Control

A

a. All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the Byte oriented protocols commonly used?

a. BISYNC, BISYNC and HDLC
b. SONET, BISYNC, PPP and HDCL
c. None of these
d. DDCMP, BISYNC and PPP

A

d. DDCMP, BISYNC and PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unauthorised access of information from a wireless device through a bluetooth connection is called ________.

a. bluemaking
b. bluescoping
c. bluesnarfing
d. bluestring

A

c. bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Error detection technques are used in data communications. What are they?

a. Checksum
b. CRC
c. All of these
d. VRC and LRC

A

c. All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSMA/CD is not suitable for a high propagation delay network like satellite network?

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The maximum size of payload field in Ethernet frame is __________.

a. 1300 bytes
b. 1200 bytes
c. 1000 bytes
d. 1500 bytes

A

d. 1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine the maximum length of the cable in km, for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10, 000 bits. Assume the signal speed in the cable to be 2x10^5 km/s?

a. none of these
b. 4
c. 3
d. 2

A

d. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

a. CSMA/CD
b. CSMA/CA
c. ALOHA
d. CDMA

A

b. CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the performance of LRC in data communications?

a. LRC increases the probability of detecting burst errors.
b. LRC error checker will not detect errors if two bits in one data units are damaged.
c. All of these
d. LRC error checker will not detect errors if two bits in exactly the same position in another data unit are damaged.

A

c. All of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main types of framing in layer 2 of the OSI model?

a. Fixed length framing
b. Variable length framing
c. Fixed size framing
d. Variable size framing

A

Fixed size framing and

Variable size framing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network with CSMA/CD protocol in the MAC layer is running at 1Gbps over a 1 km cable with no repeaters. The signal speed in the cable is 2x10^8 m/sec. What would be the minimum frame size for this network?

a. 1.25kB
b. 1.30kB
c. 1.50kB
d. 1.45kB

A

a. 1.25kB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the multiple access protocol for channel access control?

a. Both CSMA/CD & CSMA/CA
b. CSMA/CD
c. CSMA/CA
d. HDLC

A

a. Both CSMA/CD & CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following best describes CSMA protocol?

a. None of the these
b. sense before transmit
c. Act before you talk
d. Listen before transmit

A

b. sense before transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The physical layer is responsible for?

a. all of these
b. line coding
c. modulation
d. channel coding

A

a. all of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two primary functions of the MAC sublayer?

a. LLC Sublayer
b. Both MAC and LLC layers
c. DLC sublayer
d. MAC sublayer

A

d. MAC sublayer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Header of a frame generally contains ____________

a. frame identifier
b. addresses
c. all of the mentioned
d. synchronization bytes

A

c. all of the mentioned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which sub-layer of the data link layer performs data link functions that depend upon the type of medium?

a. network interface control sub-layer
b. logical link control sub-layer
c. media access control sub-layer
d. error control sub-layer

A

c. media access control sub-layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The strategy of doubling the delay interval between each retransmission attempt is known as?

a. Exponential Timeoff
b. None of these
c. Exponential Backoff
d. Exponential delay

A

c. Exponential Backoff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Consider the data unit 10011001111000100010010010000100 to be transmitted by the sender. Determine the following,

a) number of blocks after segmenting the message?
b) number of bits per block?
c) The checksum?

A

a) 4
b) 8
c) 11111110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which IEEE standard is used for Ethernet?

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the different types of STP ports?

a. Root port, Designated port and Forwarding port
b. Root port, Designated port, Forwarding port, Blocked port
c. Root port, Designated port and Blocked port
d. None of these

A

b. Root port, Designated port, Forwarding port, Blocked port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of Spanning Tree Protocol in a switched LAN?

a. To prevent switching loops in networks with redundant switched paths
b. To manage the VLAN database across multiple switches
c. To prevent routing loops in networks with redundant paths
d. To provide a mechanism for network monitoring in switched environments

A

a. To prevent switching loops in networks with redundant switched paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The sharing of a medium and its link by two or more devices is called _________

a. Microplexing
b. Multiplexing
c. Fully duplexing
d. Duplexing

A

b. Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which transmission media has the highest transmission speed in a network?

a. optical fiber
b. coaxial cable
c. twisted pair cable
d. electrical cable

A

a. optical fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Time it takes to place the complete data packet on the transmission medium for processing is referred to as?

a. Queuing delay
b. Propagation delay
c. Transmission delay
d. Processing delay

A

c. Transmission delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which IEEE standard is used for WiFi?

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which IEEE standard is used for Bluetooth?

A

IEEE 802.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________

a. burst error
b. double error
c. inverted error
d. random error

A

a. burst error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Wireless transmission can be done via

a. microwaves
b. radio waves
c. infrared
d. all of these

A

d. all of these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Bits can be send over guided and unguided media as analog signal by

a. amplitude modulation
b. phase modulation
c. frequency modulation
d. digital modulation

A

d. digital modulation

32
Q

For the IEEE 802.11 MAC protocol for wireless communication, which of the following statements is TRUE?

i. At least three non-overlapping channels are available for transmissions.
ii. The RTS-CTS mechanism is used for collision detection.
iii. Unicast frames are ACKed

A

I and III only

33
Q

Give an example of clock based framing?

a. DDCMP
b. SONET
c. PPP
d. BISYNC

A

b. SONET

34
Q

Give the sublayer that is responsible for flow control?

a. LLC Sublayer
b. MAC sublayer
c. Both DLC or LLC
d. DLC sublayer

A

c. Both DLC or LLC

35
Q

Multiplexing is used in _______

a. Packet & Circuit switching
b. Circuit switching
c. Packet switching
d. Data switching

A

b. Circuit switching

36
Q

In wireless distribution system __________

a. multiple access point are inter-connected with each other
b. access points are not required
c. only one access point exists
d. there is no access point

A

a. multiple access point are inter-connected with each other

37
Q

An interconnected collection of piconet is called ___________

a. multinet
b. micronet
c. mininet
d. scatternet

A

d. scatternet

38
Q

What are the main ways of addressing transmission errors in framing?

a. Character stuffing
b. Bit stuffing
c. None of these
d. Byte stuffing

A

Bit stuffing and Character stuffing

39
Q

In flow control, station A uses 32 byte packets to transmit message to station B using a sliding window protocol. The round trip delay between A and B is 85 milliseconds and bottleneck bandwidth on the path between A and B is 160kbps. Determine the Bandwidth Delay product (BDP) and determine the optimal window size that A should use?

a. BDP 1.8kB, Optimal window size 74.5B
b. BDP 1.7kB, Optimal window size 54.4B
c. BDP 1.8kB, Optimal window size 64.5B
d. BDP 1.9kB, Optimal window size 54.9B

A

b. BDP 1.7kB, Optimal window size 54.4B

40
Q

Which of the following best describes the operation of the spanning tree protocol in computer networks?

a. STP picks one path to forward frames and blocks to other redundant links and when blocking happens then Loops are prevented
b. STP compute the redundant links to root bridge
c. STP select a reference point known as the Root Bridge
d. All of these

A

d. All of these

41
Q

Ethernet frame consists of ____________

a. Default mask
b. MAC address
c. IP address
d. Network address

A

b. MAC address

41
Q

What is the primary purpose of a VLAN?

a. To create a virtual private network
b. Demonstrating the proper layout for a network
c. Segmenting a network inside a switch or device
d. Simulating a network

A

c. Segmenting a network inside a switch or device

42
Q

The message 11001001 at the sender side is to be transmitted using CRC polynomial x^3+1 to protect it from errors. Determine the following?

a) the bits of the divisor L?
b) the length of the CRC bits to be appended to the message?
c) The CRC bits
d) Message to be transmitted?

A

a) 1001
b) 3
c) 011
d) 11001001011

43
Q

Frame format include the header Network layer PDU and Trailer.

a. True
b. False

A

a. True

44
Q

Using the principle of binary to hexadecimal conversion, convert 5B base 16 to binary.

A

0101 1011

45
Q

The physical layer concerns with

a. none of these
b. application to application delivery
c. process to process delivery
d. bit-by-bit delivery

A

d. bit-by-bit delivery

46
Q

What is the access point (AP) in a wireless LAN?

a. all the nodes in the network
b. both device that allows wireless devices to connect to a wired network and wireless devices itself
c. device that allows wireless devices to connect to a wired network
d. wireless devices itself

A

c. device that allows wireless devices to connect to a wired network

47
Q

What is Start Frame Delimiter (SFD) in Ethernet frame?

a. 11111111
b. 10101010
c. 10101011
d. 00000000

A

c. 10101011

48
Q

In framing, Bits flow between adaptors and frames flow between hosts.

a. True
b. False

A

a. True

49
Q

Which of the following is a data link protocol?

a. Ethernet
b. HDLC
c. All of the mentioned
d. PPP

A

c. All of the mentioned

50
Q

Bluetooth is the wireless technology for __________

a. local area network
b. personal area network
c. metropolitan area network
d. wide area network

A

b. personal area network

51
Q

Framing can be broadly categorised in TWO. What are these categories?

A

Bit and Byte Oriented approaches

52
Q

What is the destination MAC address used by Bridge Protocol Data Units(BPDUs)?

a. 02-80-c2-00-00-02
b. none of these
c. 00-80-c2-00-00-01
d. 01-80-c2-00-00-00

A

d. 01-80-c2-00-00-00

53
Q

Determine the LRC given the data blocks 11100111 00111001 00111001 10101001 and find the data portion that is transmitted?

A

LRC 10101010 and Data 10101001 00111001 00111001 11100111

54
Q

Physical layer provides

a. electrical specification of transmission line signal level
b. specification for IR over optical fibre
c. all of these
d. mechanical specifications of electrical connectors and cables

A

c. all of these

55
Q

Propagation delay depends on ___________

a. Distance between routers
b. Speed of the CPU
c. Packet length
d. Transmission rate

A

a. Distance between routers

56
Q

Determine the type of the following destination addresses?

a) 4A:30:10:21:10:1A
b) 47:20:1B:2D:08:1E
c) FF:FF:FF:FF:FF:FF

A

a) Unicast
b) multicast
c) broadcast

57
Q

Station A needs to send a message consisting of 9 packets to station B using sliding window (window size 3) and go-back-n ARQ error control strategy. All packet are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no ACKs from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?

a. 17
b. 16
c. 14
d. 15

A

b. 16

58
Q

Which of the following delay is faced by the packet in travelling from one end system to another?

a. Propagation delay
b. Queuing delay
c. Transmission delay
d. All of the mentioned

A

d. All of the mentioned

59
Q

Which IEEE standard is used for Logical Link Control sublayer of the data link?

A

802.15

60
Q

Describe the checksum operation at the receiver side?

a. Collect all data blocks excluding the checksum, XOR all the data blocks and checksum, if the result if all 1’s, ACCEPT; Else REJECT
b. None of the these
c. Collect all data blocks including the checksum, divide all the data blocks and checksum, if the result if all 0’s, ACCEPT; Else REJECT
d. Collect all data blocks including the checksum, sum all the data blocks and checksum, if the result if all 1’s, ACCEPT; Else REJECT.

A

d. Collect all data blocks including the checksum, sum all the data blocks and checksum, if the result if all 1’s, ACCEPT; Else REJECT.

61
Q

If the time it takes for station A to transmit a signal to B is 10ms and B acknowledges the transmission within the same medium. What will be the round trip time?

a. 40ms
b. 30ms
c. 20ms
d. 10ms

A

d. 20ms

62
Q

The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

a. application layer
b. transport layer
c. network layer
d. physical layer

A

c. network layer

63
Q

Given the frame transmission time TFr to be 100ms. What is the vulnerable time in which collision may occur in Pure ALOHA compared to slotted ALOHA?

a. 200ms for Pure ALOHA and 200ms for Slotted ALOHA
b. none of these
c. 200ms for Pure ALOHA and 100ms for Slotted ALOHA
d. 100ms for Pure ALOHA and 200ms for Slotted ALOHA

A

c. 200ms for Pure ALOHA and 100ms for Slotted ALOHA

64
Q

Which of the following tasks is not done by data link layer?

a. error control
b. flow control
c. encoding
d. framing

A

c. encoding

65
Q

What is the hexadecimal equivalent of the following Ethernet address?
01011010 00010001 01010101 00011000 10101010 00001111
a. 4B-20-1B-2D-08-1E
b. 4A-30-10-21-10-1A
c. 5A-11-55-18-AA-0F
d. 5A-20-1B-1D-08-1E

A

c. 5A-11-55-18-AA-0F

66
Q

When node A wishes to transmit a frame to node B, it does not inform its adaptor to transmit a frame from the node’s memory.

a. True
b. False

A

b. False

67
Q

At what sublayer of layer 2 does WiFi apply?

a. DLC sublayer
b. Both MAC and LLC layers
c. LLC Sublayer
d. MAC sublayer

A

d. MAC sublayer

68
Q

The portion of physical layer that interfaces with the media access control sublayer is called?

a. physical data sublayer
b. physical address sublayer
c. none of these
d. physical signalling sublayer

A

d. physical signalling sublayer

69
Q

The physical layer translates logical communication requests from the ______ into hardware specific operations.

a. transport layer
b. application layer
c. data link layer
d. network layer

A

c. data link layer

70
Q

Transmission delay does not depend on _____________?

a. Packet length
b. Distance between routers
c. Transmission rate
d. Bandwidth of medium

A

b. Distance between routers

70
Q

In asynchronous serial communication the physical layer provides

a. both (a) and (b)
b. flow control
c. start and stop signalling
d. none of these

A

a. both (a) and (b)

71
Q

An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called _______

a. short frame
b. runt frame
c. man frame
d. mini frame

A

b. runt frame

72
Q

What is the propagation time if the distance between node A and B is 12000km. Assume the propagation speed to be 2.4x10^8 m/s in the media cable used?

A

50ms

73
Q

An Ethernet MAC sublayer receives 40 bytes of data from the upper layer. How many bytes of padding must be added to the data?

A

6 Bytes