0

Computer Networks

Description: Computer Networks Computer NetworksComputer NetworkComputer Network
Number of Questions: 15
Created by:
Tags: Computer Networks Computer Network
Attempted 0/15 Correct 0 Score 0

Which of the following methods gets around the problem of synchronization after an error by having each frame start and end with special bytes?

  1. Bit stuffing

  2. Character stuffing

  3. Cyclic redundancy check

  4. Parity checking

  5. Impulse


Correct Option: B
Explanation:

This method gets around the problem of synchronization batter an error by having each frame start and end with special bytes.

Which of the following protocols is used for establishing, configuring, and testing the data link connections?

  1. IP

  2. IGMP

  3. TCP

  4. UDP

  5. LCP


Correct Option: E
Explanation:

This protocol is used for establishing, configuring, and testing the data link connections.

Each virtual circuit is uniquely identified at each frame relay interface by which of the following?

  1. Data Link Connection Identifier

  2. Network Layer Protocol Identifier

  3. Subsequent Protocol Identifier

  4. IGMP

  5. FTP


Correct Option: A
Explanation:

Each virtual circuit is uniquely identified at each frame relay interface by a Data Link Connection Identifier.

Which of the following is a very direct construction of a code that permits correcting single bit errors?

  1. Parity checking

  2. Cyclic redundancy check

  3. Hamming's development

  4. Bit stuffing

  5. Intermodulation


Correct Option: C
Explanation:

It is a very direct construction of code that permits correcting single bit errors.

Which of the following seems safer, and is the level of correction and detection most often used in computer memories?

  1. SEC-DED code

  2. Parity checking

  3. Cyclic redundancy check

  4. Bit stuffing

  5. Thermal


Correct Option: A
Explanation:

It seems safer, and it is the level of correction and detection most often used in computer memories.

Which of the following classes of IP addresses are reserved for multi casting(a sort of broadcasting, but in a limited area)?

  1. Class A addresses

  2. Class C addresses

  3. Class D addresses

  4. Node

  5. Router


Correct Option: C
Explanation:

These addresses are reserved for multi casting(a sort of broadcasting, but in a limited area).

Which of the following is concerned with ensuring that all frames are eventually delivered and possibly in order to a destination as they are sent from the source?

  1. Flow control

  2. Error control

  3. Bit stuffing

  4. Cyclic redundancy check

  5. Parity checking


Correct Option: B
Explanation:

It is concerned with ensuring that all frames are eventually delivered and possibly in order to a destination as they are sent from the source.

Which of the following IP addresses classes is reserved for future or experimental use?

  1. Class E addresses

  2. Class A addresses

  3. Class C addresses

  4. Host

  5. Router


Correct Option: A
Explanation:

These addresses are reserved for future or experimental use.

Which of the following families of protocols is used for establishing and configuring different network layer protocols?

  1. HTTP

  2. FTP

  3. RIP

  4. UDP

  5. NCP


Correct Option: E
Explanation:

A family of Network Control Protocols are used for establishing and configuring different network layer protocols.

In which of the following flow controls, the receiver sends back information to the sender giving it permission to send more data?

  1. Rate based flow control

  2. Feedback based flow control

  3. Bit stuffing

  4. Cyclic redundancy code

  5. Parity checking


Correct Option: B
Explanation:

Here, the receiver sends back information to the sender giving it permission to send more data.

One or more LAN segments that are bounded by routers and use the same IP address prefix is called

  1. host

  2. internet

  3. subnet

  4. LAN segment

  5. neighbour


Correct Option: C
Explanation:

One or more LAN segments that are bounded by routers and use the same IP address prefix.

In which of the following techniques, if the number of non zero pulses after the last substitution is even, the substitution pattern will be B00V, which makes the total number of non zero pulses even?

  1. B8ZS Encoding Technique

  2. AMI Encoding Technique

  3. Pseudoternary Encoding Scheme

  4. HDB3 Encoding Technique

  5. Bandwidth


Correct Option: D
Explanation:

Here, if the number of non zero pulses after the last substitution is even, the substitution pattern will be B00V, which makes the total number of nonzero pulses even.

In which of the following, there is always a transition at the middle of the bit, but the bit values are determined at the beginning of the bit?

  1. NRZ Unipolar Encoding

  2. NRZ-L Polar Encoding

  3. AMI Bipolar Encoding

  4. B8ZS Bipolar Encoding

  5. Differential Manchester Biphase Encoding


Correct Option: E
Explanation:

There is always a transition at the middle of the bit, but the bit values are determined at the beginning of the bit.

Which of the following classes of IP addresses uses 14 bit for the and 16 bit for the portion of the IP address?

  1. Class B addresses

  2. Class A addresses

  3. Class C addresses

  4. Packet

  5. Host


Correct Option: A
Explanation:

These addresses use 14 bits for the and 16 bits for the portion of the IP address.

In which of the following encodings, the duration of bit is divided into two halves and the voltage remains at one level during the first half and moves to other level in the second half?

  1. Pseudoternary Encoding

  2. AMI Encoding

  3. Manchester Encoding

  4. B8ZS Encoding

  5. NRZ Unipolar Encoding


Correct Option: C
Explanation:

Here, the duration of the bit is divided into two halves and the voltage remains at one level during the first half and moves to other level in the second half.

- Hide questions