0

Computer Networks

Description: Networking
Number of Questions: 30
Created by:
Tags: GATE - IT Computer Science & Information Technology - CS
Attempted 0/30 Correct 0 Score 0

Which of the following systems is used for a connection between an Ethernet and a token bus?

  1. Repeater

  2. Bridge

  3. Router

  4. Gateway

  5. None of the above


Correct Option: B
Explanation:

Ethernet and token bus are protocols at the data link layer and a bridge is used when two networks have different data link layers but the same network layer.

Which of the following layers of the OSI model determines the route of packets from source to destination and is responsible for congestion control?

  1. Data link layer

  2. Network layer

  3. Transport layer

  4. Session layer

  5. Presentation layer


Correct Option: B
Explanation:

Its main task is routing and congestion control.

Which of the following systems connects two networks together and is used at the physical layer?

  1. Bridge

  2. Repeater

  3. Router

  4. Gateway

  5. End system


Correct Option: B
Explanation:

It is used at the physical layer and just forwards bits from one network to another.

Which of the following layers of the OSI model performs data encoding and data compression?

  1. Session layer

  2. Application layer

  3. Presentation layer

  4. Transport layer

  5. Network layer


Correct Option: C
Explanation:

It is concerned with all aspects of information representation including data encoding and compression.

Which of the following carrier sense LAN protocols is more widely used because of its efficient use of bandwidth?

  1. 1-persistent CSMA

  2. Non-persistent CSMA

  3. p-persistent CSMA

  4. CSMA / CD

  5. None of the above


Correct Option: D
Explanation:

Upon detecting a collision, stations abort the transmission and saves time and bandwidth.

Which among the following LAN protocols is not a collision-free protocol?

  1. CSMA with Collision Detection

  2. Basic Bit-map Method

  3. Broadcast Recognition with Alternating Priorities (BRAP)

  4. Multi-Level Multi-Access Protocol (MLMA)

  5. Binary Countdown


Correct Option: A
Explanation:

Collision occurs during the contention period.

Which of the following are limited contention protocols used in LANs?

  1. Collision-free protocols

  2. Pure or slotted ALOHA protocols

  3. Protocol that uses contention at high loads and collision-free technique at low loads

  4. Protocol that uses contention at low loads and collision-free technique at high loads

  5. None of the above


Correct Option: D
Explanation:

This ensures low delay at low loads and good channel efficiency at high loads.

Which of the following layers of the OSI model performs the function of multiplexing several connections to reduce cost?

  1. Data link layer

  2. Network layer

  3. Transport layer

  4. Session layer

  5. Presentation layer


Correct Option: C
Explanation:

It multiplexes several transport connections onto the same network connection to reduce cost and is a true end-to-end layer.

Which of the following layers of the OSI model solves the problems caused by damaged, lost, and duplicate frames?

  1. Physical layer

  2. Data link layer

  3. Network layer

  4. Transport layer

  5. Session layer


Correct Option: B
Explanation:

This layer solves the problems caused by lost, damaged and duplicate frames.

In a token bus protocol, if a station accepts the token and then crashes immediately, which control frame will be used?

  1. Who_follows

  2. Set_successor

  3. Resolve_contention

  4. Token

  5. Claim_token


Correct Option: E
Explanation:

When the token holder crashes along with the token, the ring initialisation algorithm is used and Claim_token control frame is sent.

Which of the following is not a function of the data link layer?

  1. Framing

  2. Error control

  3. Crash recovery

  4. Flow control

  5. Link management


Correct Option: C
Explanation:

Crash recovery is a function of the transport layer.

What is the technique that temporarily delays outgoing acknowledgements so that they can be hooked onto the next outgoing data frame, widely known as?

  1. Hamming

  2. Piggybacking

  3. Stop and wait

  4. Framing

  5. Flow control


Correct Option: B
Explanation:

The delaying acknowledgements to be sent with next frame is piggybacking.

Which of the following data link layer protocols makes use of the technique of pipelining?

  1. Go back n

  2. Selective repeat

  3. Stop and wait protocol

  4. Positive acknowledgement with retransmission (PAR)

  5. Both (1) and (2)


Correct Option: E
Explanation:

Both (1) and (2) use pipelining.

Which of the following is an error detecting code in which bit strings are treated as representations of polynomials?

  1. Cyclic redundancy code

  2. Parity code

  3. Hamming code

  4. Bit stuffing

  5. Character stuffing


Correct Option: A
Explanation:

It is also known as polynomial code.

Which of the following is a routing algorithm with the shortest delay?

  1. Hot potato algorithm

  2. Flooding

  3. Dijkstra algorithm

  4. Random walk algorithm

  5. Optimal routing


Correct Option: B
Explanation:

It always chooses the shortest path because it chooses every possible path in parallel.

Which of the following classes of routing algorithms uses both global information from the entire subnet as well as the local information on each IMP to take a routing decision?

  1. Centralised routing algorithms

  2. Non-adaptive algorithms

  3. Isolated routing algorithms

  4. Distributed routing algorithms

  5. None of the above


Correct Option: D
Explanation:

It uses both global and local information.

Which of the following systems is used when a connection is needed between a token bus network and an X.25 public network?

  1. Repeater

  2. Bridge

  3. Router

  4. Gateway

  5. None of the above


Correct Option: C
Explanation:

Router is needed when two networks use the same transport layer but have different network layers. A router can convert token bus frames to the form required by X.25 n/w.

Which of the following LAN protocols is applied to slotted channels?

  1. 1-persistent CSMA

  2. p-persistent CSMA

  3. Non persistent CSMA

  4. CSMA / CD

  5. None of the above


Correct Option: B
Explanation:

This station transmits with probability p if channel is idle with probability q = 1 - p. It defers until the next slot and so is applied to slotted channels.

Which of the following routing algorithms makes use of the tree structure?

  1. Optimal routing

  2. Random walk

  3. Selective flooding

  4. Hierarchical routing

  5. Backward learning


Correct Option: A
Explanation:

Based on the optimality principle that set of optimal routes from all sources to a given destination form a tree rooted at the destination called sink tree.

Which among the following is a digital interface between the computer (DTE) and the modem (DCE)?

  1. X.21

  2. RS-232-C

  3. RS-449

  4. Both (2) and (3)

  5. None of the above


Correct Option: A
Explanation:

X.21 is a digital signaling interface.

Which of the following routings is widely used for very large networks?

  1. Multipath routing

  2. Flooding

  3. Hierarchical routing

  4. Optimal routing

  5. Random walk


Correct Option: C
Explanation:

IMPs are divided into regions with each IMP knowing all details of routing in its own region and nothing about other regions; is effective for large networks.

Which of the following semantics of Remote Procedure Call at the session layer is ideal for idempotent operations?

  1. Exactly once

  2. At most once

  3. At least once

  4. Last of many

  5. None of the above


Correct Option: C
Explanation:

Idempotent operations can be repeated over and over with no harm and hence this semantics is ideal where client keeps trying until it gets a proper reply so that it knows the operation is performed one or more times.

Which of the following is not an effective method for congestion control?

  1. Packet discarding

  2. Isarithmic congestion control

  3. Sending choke packets

  4. Flow control

  5. Pre-allocation of buffers


Correct Option: D
Explanation:

It cannot really solve congestion problems because computer traffic is bursty.

During which of the following functions does the transport layer require a three-way handshake protocol?

  1. Establishing a connection

  2. Releasing a connection

  3. Buffering

  4. Multiplexing

  5. Crash recovery


Correct Option: A
Explanation:

Three-way handshake is useful to solve the problem of duplicate connection requests.

Which of the following transport layer QOS parameters measures the number of bytes of user data transferred per second?

  1. Transit delay

  2. Connection establishment delay

  3. Throughput

  4. Residual error rate

  5. Resilience


Correct Option: C
Explanation:

It measures number of bytes of user data transferred per sec, over a time interval.

Which of the following is referred to as an orphan in a client-server model?

  1. A waiting client when the server crashes after carrying out the request, but before sending the reply

  2. A running server with no waiting parent.

  3. A lost message

  4. An unacknowledged message

  5. A duplicate message


Correct Option: B
Explanation:

When a client crashes after starting a RPC , the server whose process continues to run is called an orphan and causes wastage of CPU cycles and other resources.

Which of the following is a context dependent encoding?

  1. Huffman coding

  2. Arithmetic coding

  3. Both (1) and (2)

  4. Run length encoding

  5. None of the above


Correct Option: D
Explanation:

It is a context dependent encoding.

What does the transport layer QOS parameter, connection release failure and probability measure?

  1. Fraction of times the agreed upon goals were not met.

  2. Fraction of connection release attempts that did not complete.

  3. Probability of transport layer terminating a connection.

  4. Chance of connection not being established within the maximum establishment delay time.

  5. None of the above


Correct Option: B
Explanation:

It is measured by Connection Release Failure Probability.

Which of the following can be considered as a block cipher?

  1. Vigenere cipher

  2. Transposition cipher

  3. Monoalphabetic cipher

  4. Null cipher

  5. Both (1) and (2)


Correct Option: E
Explanation:

Both vigenere cipher and transposition cipher are block ciphers.

Which of the following types of virtual terminals have built-in microprocessors?

  1. Form mode terminals

  2. Page mode terminals

  3. Scroll mode terminals

  4. All of the above

  5. None of the above


Correct Option: A
Explanation:

The most sophisticated terminals with built-in microprocessors and allow local editing, macros and other facilities.

- Hide questions