File No: MLRIT/CSE/ES/II/I.1/CF/DCCN
EVALUATION SYSTEM COURSE FILE
SUBJECT NAME: DATA COMMUNICATIONS AND COMPUTER NETWORKS CLASS: III / I DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING FACULTY NAME: K.ARCHANA
DATA COMMUNICATIONS AND COMPUTER NETWORKS [55032]
COURSE FILE
INDEX COURSE FILE Subject: Data Communications and Computer Networks Name of the Faculty: K.Archana Academic Year: Document No. Branch: Computer Science and Engineering Class: III / CSE 2011-2012 MLRIT/IT/ES/II/I.1/CF/DCCN Name of Faculty: K.Archana Academic Year: 2011-2012 Semester: I Sno.
Topic
1
Syllabus
2
Objective
3
Target
4
Session Planner
5
Syllabus coverage
6
Time Table
7
Lecture wise handwritten class notes
8
List of weak students and Remedial action a. weak students as per JNTU Result b. weak students as per MID-term Test Result c. Remedial action Assignments
9 10
Tutorial
11 12
Question Bank/Papers a. Subjective unit wise b. Objective unit wise Sample Assignments
13
Sample Solved Question Paper
14
HOD Review
15
Course Completion Certificate
16
Additional teaching material viz. PPT’s, OHP’s, downloaded material etc.. in a separate file
Page No.
SYLLABUS Subject: Data Communication and Computer Networks Branch: III-CSE(A & B) Academic Year: 2011-2012 Semester: I Faculty: K. Archana DAT COMMUNICATION AND COMPUTER NETWORKS UNIT I Introduction: Data communications, Networks, The Internet, protocols and Standards, Network Models. Layered tasks. The OSI Model, Layers in the OSI Model. TCP/IP Protocol Suite. Addressing, Physical layer and Media. Data and Signals. Analog and Digital, periodic, Analog Signals, Digital Signals. Transmission impairment. Data rate Limits, performance, Digital Transmission, Digital-to- Digital Conversion, Analog-to-digital Conversion, Analog Transmission, Digital -to-Analog conversion, Analog-To-Analog Conversion. UNIT II Bandwidth utilization: Multiplexing and Spreading, Multiplexing, spread Spectrum, Transmission Media, Guided Media, Unguided media: wireless, Switching, circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks, Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks, Dial-up Modems, Digital Subscriber Line, Cable TV networks, Cable TV for Data Transfer. UNIT III Error Detection and correction , Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing, Flow and error Control , protocols, Noiseless Channels, HDLC, Point-to-Point protocol, Multiple Access, random Access, Aloha, Controlled Access, Channelization, IEEE standards , standard Ether net , changes in the standard. Fast Ethernet, Gigabit Ethernet, IEEE802.11, Bluetooth. UNIT IV Connecting LAN’s. Backbone Networks, and Virtual LANs, Connecting Devices, Backbone networks virtual LANs, cellular telephony, Satellite Networks, sonnet/SDH architecture, sonnet Layers, Sonet Frames, STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks, frame relay and ATM, Frame Relay, ATM, ATM LANs.
UNIT V
Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses, network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6. Network Layer Address Mapping, Error Reporting and Multicasting, address mapping, ICMP, IGMP, ICMPv6, Network Layer: Delivery, Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols. UNIT VI Transport Layer: process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery, User datagram protocol (UDP), TCP, SCTP, Congestion control and Quality of service. Data Traffic. Congestion , congestion control, two Examples, Quality service, Techniques to improve QOS, Integrated Services, Differentiated services, QOS in Switched networks. UNIT VII Application layer: Domain name system, Name space, Domain name space, Distributed of name space, DNS in the Internet, Resolution, DNS messages, Types of records, registers, Dynamic Domain name System(DDNS), Encapsulation, Remote Logging, Electronic mail and file Transfer, Remote Logging, Telnet, Electronic mail, File Transfer. UNIT VIII WWW and HTTP: Architecture, web Documents, HTTP Network Management: SNMP, Network Management system, Simple Network Management protocol (SNMP), Multimedia, Digitizing Audio and Video Audio and video compression, streaming stored audio/video, streaming live audio/ video, Real-Time Interactive Audio/video. RTP, RTCP, Voice over IP. TEXT BOOKS: 1.
2.
Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.
REFERENCE BOOKS: 1. Introduction to Data Communication and Networking. W.Tomasi. Pearson Education 2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group. 3. Data Communications and Computer Networks, P.C Gupta PHI
OBJECTIVE
Subject: Data Communication and Computer Networks Branch: III-CSE(A & B) Academic Year: 2011-2012 Semester: I Faculty: K. Archana
The main objective of this subject is introducing the concepts of electronic communications systems, data communications, and network. It also introduces the wireless and wire link telecommunications systems, basic data communications network and systems, local area networks, internetwork and intranetwork. And also includes the protocols like TCP/IP. And it also introducing about the telephone instruments and signals and cellular telephone concepts and cellular telephonic systems. By studying this subject will known about the transmission media and communication cables to transfer the data from source to destination trough signals. And we will know about the communication codes and error controls and data formats for identifying the errors.
TARGET (%):
Subject: Data Communication and Computer Networks Branch: III-CSE (A &B) Academic Year: 2011-2012 Semester: I Faculty: K. Archana
1. Pass Percentage: 100 2. First class with distinction (>=75): 90 3. First class (60-69): 7 4. Pass Class (40-49): 3 Signature of Faculty
Format No.5 MLRIT/CSE/ES/II/I.1/CF/Sessio n Planner
Session Planner Subject: Data Communication and Computer Networks Branch: III-CSE(A) Academic Year: 2011-2012 Semester: I Faculty: K. Archana
Sno
Unit
Class Topic
Text / Ref ere nce boo k
Chapte r No
Remark s
1
L1
INTRODUCTION
2
L2
3
Data communications, Networks
T1, R1
20-24
The Internet, protocols and Standards
T1,R1
25-28
L3
Network Models
T1,R2
29-36
4
L4
Layered tasks. The OSI Model
T1, R1, R2
37-38
5
L5
Layers in the OSI Model.
T1, R1, R2
39
6
L6
TCP/IP Protocol Suite, Addressing
T1, R1, R2
39-55
L7
Physical layer and Media.
T1, R1, R2
58-73
8
L8
Data and Signals
T1, R1, R2
75-76
9
L9
Analog and Digital, periodic
T1, R1, R2
77-79
11
L10
Analog Signals, Digital Signals.
T1, R1, R2
97
12
L11
Transmission impairment. Data rate Limits
T1, R1, R2
98-100
13
L12
100-109
14
L13
15
L14
T1, R1, R2 performance, Digital Transmission T1, R1, R2 Digital-to- Digital Conversion, Analog-to-digital Conversion Analog Transmission, Digital -to-Analog conversion, T1, R1, R2
Analog-To-Analog Conversion.
T1, R1, R2
113-116
Bandwidth utilization: Multiplexing and Spreading,
T1, R1, R2
119-120 121-122
L19
T1, R1, R2 Multiplexing, spread Spectrum Transmission Media, Guided Media, Unguided T1, R1, R2 media: T1, R1, R2 wireless, Switching, circuit-Switched nerworks
L20
Datagram Networks, Virtual-Circuit Networks,
L21
Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks
L22
Dial-up Modems, Digital Subscriber Line
L23
Cable TV networks
L24
Cable TV for Data Transfer.
L25
Error Detection and correction
7
I
16
L15 II
L16 L17 L18
3
III
L26 L27
T1, R1, R2 T1, R1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2
R1, R1, R1, R1,
R1, Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing Flow and error Control , protocols, Noiseless T1, R1, R2 Channels
L28
HDLC, Point-to-Point protocol,
L29
Multiple Access, random Access, Aloha
L30
Frame
Synchronization,
Frequency-
Division
T1, R1, R2 T1, R1, R2 T1, R1,
110 110-112
123-124 124-132 133-136 137-147 151-162 163 164 165-174 177-184 185-186 187-194 195-197 198-202
Multiplexing
4
IV
L31
Controlled Access, Channelization
L32
IEEE standards , standard Ether net , changes in the standard.
L33
Fast Ethernet, Gigabit Ethernet, IEEE802.11
L34
Bluetooth.
L35
Connecting LAN’s. Backbone Networks
L36
Virtual LANs, Connecting Devices, Backbone networks virtual LANs
L37
cellular telephony, Satellite Networks
L38 L39
5
V
virtual circuit networks
L41
Frame relay and ATM, Frame Relay
L42
ATM, ATM LANs.
L44
Network Layer Address Mapping
L46
Error Reporting and Multicasting, address mapping
L47
ICMP, IGMP, ICMPv6
L49 6
VI
T1, R2 T1, R2 T1, R2 T1, R2
R1, R1, R1, R1,
T1, R1, R2 T1, R1, R2
T1, R2 T1, R2 T1, R2 T1, R2
R1, R1, R1,
R1, Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses network Layer: Internet protocol, Internetworking, T1, R1, R2 IPv4, IPv6 transition from IPv4 to IPv6.
L45
L48
T1, R1, R2 T1, R1, R2
Sonnet/SDH architecture, sonnet Layers, Sonet Frames STS Multiplexing, sonnet networks, virtual T1, R1, R2 tributaries
L40
L43
R2
Network Layer : Delivery, Forwarding and routing, delivery, forwarding Unicast Routing protocols, Multi cast Routing protocols.
T1, R2 T1, R2 T1, R2 T1, R2
R1, R1, R1, R1,
T1, R1,R2
L50
Transport Layer: process-Process Delivery: UDP, T1, R1, R2 TCP and SCTP
L51
Process-to-Process Delivery
L52
User datagram protocol (UDP), TCP, SCTP
L53
Congestion control and Quality of service.
L54
Data Traffic. Congestion , congestion control, two Examples
L55
Quality service, Techniques to improve QOS
L56
Integrated Services, Differentiated services
L57
QOS in Switched networks
T1, R2 T1, R2 T1, R2 T1, R2
R1, R1, R1, R1,
T1, R1, R2 T1, R1, R2 T1, R1,
203-207 210-211 212-214 215-222 223-224 225-229 241-246 247-248 249-255 256-260 263-266 266-271 272-286 287-294 348-357 358 359-369 370-376 3773382 386-402 403-415 467-468 469-470 471-472 473-480 481-486 487-490
R2 7
VII
L58
Application layer: space
L59
Domain name space, Distributed of name space
L60
DNS in the Internet, Resolution, DNS messages
L63
Types of records, registers, Dynamic Domain name System(DDNS) Encapsulation, Remote Logging, Electronic mail and file Transfer Remote Logging, Telnet
L64
Electronic mail, File Transfer.
L65
L70
WWW and HTTP: Architecture, web Documents HTTP Network Management: SNMP, Network Management system Simple Network Management protocol (SNMP) Multimedia, Digitizing Audio and Video Audio and video compression streaming stored audio/video, streaming live audio/ video Real-Time Interactive Audio/video
L71
RTP, RTCP, Voice over IP.
L61 L62
8
VIII
Domain name system, Name
L66 L67 L68 L69
T1, R1, R2
493-498
T1, R1, R2 T1, R1, R2 T1, R1, R2
499 500-510 512-527
TEXT BOOKS: T1. TMH. T2.
Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.
REFERENCE BOOKS: R1. R2. R3.
Introduction to Data Communication and Networking. W.Tomasi. Pearson Education Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group. Data Communications and Computer Networks, P.C Gupta PHI
Format No.6 MLRIT/MCA /ES/II/I.1/CF/ Syllabus coverage
SYLLABUS COVERAGE Subject: DATA COMMUNICATION AND COMPUTER NETWORKS Branch: III CSE(A & B)
Academic Year: 2011-2012 Semester: I Faculty: K.Archana
Sno Unit
Lectur e No.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
C1 C2 C3 C4 T1 C5 C6 C7 CT1 C8 C9 C10 T2 C11 C12 C13 C14 CT2 C15 C16 C17 C18 T3 C19 C20 C21 C22 C23 CT3 C24 C25 C26 C27 T4
35 36 37 38 39 40 41
I
II
III
Date Planned
Date Conducte d
C28 C29 C30 C31 CT4 C32 C33
------------------- I-MID EXAMS FROM -------------------------------
Reason(s) for Non Compliance
Plan to over come non compliance
C ---- CLASS CT---- CLASS TEST T ------- > TUTORIAL
Format No.8
MLRIT/CSE/RC/II/I.2/ CF/Weak students list/Mtr
Weak Students as per JNTU Subject: Data Communication and Computer Networks Branch: CSE (III/I-A&B) Academic year: 2011-2012 Semester: I Sno
Htno
Name
%
Note: Weak students are the students who secure less than 50% marks in
Previous JNTU External examinations. Format No.8 (a)
MLRIT/CSE/ES/II/I.1/ CF/Weak student list/Mtr
List of weak students as per Mid Term Test result Subject: Data Communication and Computer Networks Branch: CSE(III/I-A &B) Academic year: 2011-2012 Faculty: K.Archana Mid term test I
Semester: I
Roll no
Name
%
Note: Weak students are the students who get <=10.0 marks out of 20.0 in Mid-term test.
List of weak students as per Mid Term Test result Subject: Data Communication and Computer Networks Branch: CSE(III/I-A&B) Academic year: 2011-2012
Format No.8(b) MLRIT/CSE/ES/II/I.1/ CF/Weak student list/Mtr
Faculty: K.Archana
Semester: I
Mid term test II Roll no
Name
%
Note: Weak students are the students who get <=10.0 marks out of 20.0 in Mid-term test.
Format no: 9 MLRIT/CSE/ES/II I.1/CF/Assignments
Assignments, Quality and Evaluation Subject: DATA COMMUNICATION AND COMPUTER NETWORKS Year/Branch: III/CSE(A&B) Faculty:
K.ARCHANA
Academic Year: 2011-2012 Unit No
Assign -ment no
I
1
Semester-I
Topic
1. Describe the following standard organizations: ISO,ITU-T, IEEE,ANSI,EIA, TIA, IAB, ETF, and IRTF. 2. Name and explain the functions of each of the
Date Planned
Date Of Submissi on
Date Of Distributi on
3.
layers of the seven – layer OSI model. Name and explain the functions of Analog and
Digital, periodic, Analog Signals, Digital Signals
4. Explain about the TCP/IP Protocol Suite
5. Explain about the Digital-to- Digital Conversion, Analog-todigital Conversion 6. Explain about the Digital -to- Analog conversion, AnalogTo-Analog Conversion.
1. Describe the following types of Multiplexing and Spreading, Multiplexing, spread Spectrum
2. Describe the following types of Guided Media and Un
II
2
III
3
Guided Media Transformation media 3. Explain the functions of circuit-Switched networks, Datagram Networks, VirtualCircuit Networks 4. Explain the functions of Structure of a switch, using Telephone and Cable Networks 5. Explain the functions Structure of a switch, using Telephone and Cable Networks for data Transmission 6. Explain the functions Cable TV networks, Cable TV for Data Transfer.
Explain about Error Detection and correction Explain about Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing. . Explain about protocols, Noiseless Channels Explain about HDLC, Point-to-
Point protocol Explain about Multiple Access, random Access, Aloha, Controlled Access 6. Explain about Gigabit Ethernet, IEEE802.11, and Bluetooth. Explain the function of
Connecting LAN’s. Backbone Networks, and Virtual LANs Explain the function of
Connecting Devices, Backbone networks virtual LANs Explain the function and basic operation of the following
cellular telephony, Satellite Networks
IV
4
Explain the function and basic operation of the following
sonnet/SDH architecture, sonnet Layers, Sonet Explain the function of the STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks 6. Explain the function and basic operation of the following Frame Relay, ATM,
ATM LANs
V
5
1. Explain about the Logical
Addressing, IPv4 Addresses 2. Explain about the Internet protocol, Internetworking 3. Explain the about the mapping b/w IPv4, IPv6
transition from IPv4 to IPv6 4. Explain the about the
Network Layer Address Mapping, Error Reporting and Multicasting 5. Explain the function and basic operation of the following , IPv4 Addresses, IPv6
Addresses 6. Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.
1. Describe the concepts of
process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery 2. Describe the concepts of
VI
6
TCP, UDP ,SCTP, Congestion control and Quality of service 3 Describe the Congestion , congestion control 4. Describe the Integrated
Services, Differentiated services 5. Describe the QOS in
Switched networks. 1. Describe the Domain name system and Domain name
space. 2. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages 3. Describe Dynamic Domain name System (DDNS), Encapsulation, Remote Logging.
VII
7
4. Describe the purpose of Electronic mail and
file Transfer, Remote Logging
5. Describe the function of a Telnet 6. Describe the Electronic mail,
File Transfer.
VIII
8
1. Draw and describe the HTTP Architecture and error control. 2. Describe the HTTP
Network Management: SNMP, Network Management system 3. Describe the Simple
Network Management protocol (SNMP) 4. Describe the Digitizing
Audio and Video Audio and video compression 5. Explain the , streaming stored audio/video, streaming live audio/ video 6. Define and describe RTP,
RTCP, Voice over IP
Quality verified by HOD: Good/Average/Poor Format no: 10 Signature of HOD MLRIT/CSE/TC/II/ I.2/CF/Tutorial
Tutorial Subject: Data communication and Computer Networks Branch: III/CSE (A&B) Academic Year: 2011-2012
Semester: I
Faculty: K.Archana
Sno
1
Unit no
Tutorial topic
1. Explain about the
I
Digital-to- Digital Conversion, Analog-todigital Conversion 2.
Explain about the
Digital -to- Analog conversion, Analog-To-Analog Conversion.
2
II
1. Explain the functions of circuit-Switched
networks, Datagram Networks, VirtualCircuit Networks 2.
Explain the functions
Date
Marks
Planned/
entered in
conducte
the register
d
(Yes/No)
Cable TV networks, Cable TV for Data Transfer.
3
III
1. Explain about Error
Detection and correction Decoding 2. Explain about Gigabit
Ethernet, IEEE802.11, and Bluetooth.
4
IV
1.
Explain the function of
Connecting LAN’s. Backbone Networks, and Virtual LANs 2.
Explain the function
and basic operation of the following Frame Relay, ATM,
ATM LANs
5
V
1. Explain the about the mapping b/w IPv4, IPv6
transition from IPv4 to IPv6 .
6
VI
7
VII
1. Describe the
8
VIII
1. Describe the HTTP
1. Describe the concepts of
TCP, UDP ,SCTP, Congestion control and Quality of service Distributed of name space DNS in the Internet, Resolution, DNS messages
Network Management: SNMP, Network Management system
Quality verified by HOD: Good/Average/Poor Signature of HOD
M L R INSTITUTE OF TECHNOLOGY DUNDIGAL, HYDERABAD – 500 043
Subject: Data Communication and Computer networks Branch: III-CSE(A) Academic Year: 2011-2012 Semester: I Faculty: K. Archana
OBJECTIVE QUESTIONS UNIT-I 1. The unit of data is _______ a) Data b) Datum c) Information d) None ( ) 2. What is protocol_________? 3. Information is defined as__________ 4. When message are intended for all subscribers on the network is called______ ( ) a) Broadcasting b) multicasting c) network d) data 5. When message are intended for a specific group of subscribers it is called______________ ( ) a) Broadcasting b) multicasting c) network d) data 6. Point-to-point networks have only--------stations ( ) a) 2 b) 3 4) 1 d) 0 7. Example of connection less protocol is ( ) a) Virtual circuit d) datagram circuit c) network d) none 8. ISO stands for__________ ( ) 9. In the simplex mode data transmission is ________ ( ) a) Unidirectional b) bidirectional c) a & b d) none 10. _____holds shared files, programs, and the network O/S ( ) a) Serverb) client c) shared date d) none 11. GAN stands for _____________ ( ) 12. Converting information signal to a different form is called______ ( ) a) Analog b) digital c) modulation c) demodulation 13. What is Data Communication______? 14. Define digital modulation 15. Define connection oriented protocol_________ 16. Determine the number of conditions possible for a binary code Containing the following number of bits____________________ ( ) a) 3 b)5 c) 7 d) 12 17. For sine wave with the frequencies of 100Hz .determine the Period ( ) a) 10 b) 100 c) 1 d)none 18. For an electronic device operating at 17C with a bandwidth of 10kHz, ( ) Determine the thermal noise power in watts and dBm. a) 4 *10-17 watts b) 11 *10-17 watts c)3 *10-11 watts d)2 *10-12 watts 19. TCP/IP stands for_____________________ ( ) 20. For sine wave with the period is 0.1ms, determine the frequencies ( ) a) 100 kHz b) 10kHz c) 1MHz d) none UNIT-II 1. For sine wave with the frequencies of 100Hz .determine the
Period a) 10 b) 100 c) 1 d) none 2. Define an amplitude_________ 3. Define frequency_____________ 4. The distance of one cycle occurring in space is called the_________ a) Velocity b) frequency c) wavelength d) time 5. The reciprocal of frequency is called_________________ ( ) a)time b)bandwidth c) amplitude d)none
( )
( )
6. What is Bit Rate______? 7. What is M-ary______ 8. Velocity factor is__________ a) Vp * c b) c* 2d c) Vp/c d) none 9. What is the speed o light___________ a) 3 *108 m/s b)6.625 *10-23 j/s c)3.14 *109 m/s 10. The cancellation of common mode signal is called__________ 11. What is the bit_______? 12. What is buad________? 13. Wavelength λ is________ a) c/ f b)f/c c)c +f d) 1/c + f 14. Optical power is expressed mathematically as P= __________ a)dQ/dt b)dt/dQ c)dQ + dt d )none 15. Define the critical angle____________ 16. Refractive index is ___________ a) v/c b)v+c c) 1/v+c d)c/v 17. What are the losses of metallic transmission line ----------18. Two kinds of wave’s are__________ 19. What is bandwidth_________? 20. Buffer jacket is made up of__________ 21. Dielectric constant is separated by_______ a) Insulator b) conductor c) a & b d) none
UNIT-III 1. What is digital transmission________? 2. PAM is used to -------------------------------a) PSK B) QAM c) PCM d)all 3. PAM stands for__________________ 4. Peak amplitude values varied between________ a)+2 v to -2v b)+4v to -4v c)+5v to -5v d)none 5. Dynamic range (DR) is the ratio of___________ a) Vmax/Vmin b) Vmin/Vmax c) Vmax +Vmin
( ) ( ) ( ) ( ) ( ) ( )
( )
(
)
( ) ( )
6.PCM stands for _______________ 7. PWD stands for_______________ 8.PCM system used------( ) a) 12bit linear & 8bits compressed code b) 8bit linear & 12bits compressed code c) 12bit linear & 12bits compressed code d) all are correct 9. Determine the minimum nyquist rate for a maximum analog input frequency of the 10KHz________________ 10. Determine the maximum analog input frequency of the sample rate______ ( ) 11. Dertermine the maximum number of PCM bits of a Dynamic range of 80 dB.______________ 12.What is companding_________ ( ) a) Compression & expanding b) extracting & excluding c) Conclusion d) a & b 13. Types of companding__________________ ( ) a)analog and digital companding b) data companding c) Numerical and Data Compandingd)none 14. Analog Companding occur in_______________ ( ) a)μ-law Companding b)A-law companding c) Both a & b d) none 15. Line speed is the ratio of__________ ( ) a)bits/sec b)bits/n c)baud/sec d)none 16. What is digital Multiplexing_______? 17. TDM stands for_________________ 18. The transmission o information from more than one Source to more than one destination over the same transmission medium. ( ) a) Frequency b) multiplexing c) voltage d) signal 19. What is duty cycles___________? 20.T2 carrier TDM system have ___________ ( ) a) 64kbps b) BPRZ-AMI c) B6ZS d)all
UNIT-IV 1. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none 2. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none 3. The _________of a plane electromagnetic wave is simply the orientation of the electric field vector in respect to earth’s surface. ) a) Signature b) polarization c) modulation d) none
(
4. __________represents the flow of electromagnetic waves in the direction of propagation. ( ) a) Power density b) radiation c) electromagnetic radiation d) all 5._______is energy per unit of time per unit of area and is usually given in watts per square ( ) a) Power density b) radiation c) electromagnetic radiation d) all 6. Power density is _______ ) a)p=eh
( b)p=e/h
c)p=e +h
d)all
7. A point source radiating power at a constant rate uniformly in all directions. Such a source is called an _______ ( ) a) Isotropic radiation b) electromagnetic radiation c) Power density d) radiation 8. The power density is inversely proportional to the square of the distance from the source. ( ) a) Planck’s law b) Inverse square law c) both a & b d) all 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. However, as waves propagate through free space, they spread out, resulting in a reduction in power density.This is called________ ( ) a)Absorption b)Attenuation c)both a & b d)all 10. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( a) Radiation loss b) coupling loss c) absorption loss d) all
)
11. Reduction in power density with distance is equivalent to a power loss Is called_______ a) Wavelength b) velocity c) wave attenuation d) all
(
)
12. The attenuation is due to the spherical spreading o the wave in space Is called_______ a) space attenuation b) wave attenuation c) Attenuation
(
)
13. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 14. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none 15. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none
16. ______ is defined as the modulation or reduction of energy within a wavefront when it passes near the edge of an opaque object. ( ) a) a) Refraction b) reflection c) both a & b d)Defraction 17. Radio wave _________occurs when two or more electromagnetic waves combine in such a way that system performance is degraded. ( ) a)Refraction b) reflection c) Interference d)Defraction 18.___________ are electromagnetic waves that travel along the surface of earth.( ) a) Surface wave b) ground wave c) both a & b d) all 19. Electromagnetic waves that are directed above the horizon level are called ____( ) a) Surface wave b) ground wave c) sky wave d) all 20. _______is the minimum distance from a transmit antenna that sky wave of given Frequency will be returned to earth. ( ) a) Surface wave b) ground wave c)skip distance d)all 21.________is defined as the loss incurred by an electromagnetic wave as it Propagates in a straight line through a vacuum with no absorption or reflection Of energy from nearby objects. ( ) a) Surface wave b) ground wave c)free-space path loss d)all 22. What is the satellite__________? 23. Satellite‘s are ______ ( ) a) LEO b) MEO c) GEO d) All 24. _______ satellites orbit earth above the equator with the same angular velocity as earth. a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all 25.________satellite rotate around earth in circular or elliptical pattern. ( ) a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all 26. 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. 27. However, as waves propagate through free space, they spread out, resulting in a reduction in power density. This is called________ ( ) a)Absorption
b)Attenuation c)both a & b
d)all
28. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( a) Radiation loss b) coupling loss c) absorption loss d) all
)
29. Reduction in power density with distance is equivalent to a power loss Is called_______ a) Wavelength b) velocity c) wave attenuation d) all
(
)
30. The attenuation is due to the spherical spreading o the wave in space Is called_______ a) Space attenuation b) wave attenuation c) Attenuation
(
)
31. Energy is transferred from the wave to the atoms and molecules of substances in the
Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 32. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none 33. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none 34. _______are combinations o passive components that are used to regulate the amplitude and frequency response of the voice signals. ( ) a) Equalizer circuit b) speaker c) microphone d) all 35. The ______________is the receiver for the telephone ( ) a) Equalizer circuit b) speaker c) microphone d) all 36. The ______________is the transmitter for the telephone ( ) a) Equalizer circuit b) speaker c) microphone d) all 37. The__________is sent back to the calling party at the same time the ringing Signal is sent to the called ( ) a) Ringing back signal b) receiver c) both a & b d) none 38. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 39. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none 40. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none
UNIT-V 1. If a datagram router goes down then _ _ _ _ _ _ _ _ _ _ a. all packets will suffer b. only those packets which are queued in the router at that time will suffer c. only those packets which are not queued in the router at that time will suffer d. no packets will suffer 2. Indatagramsubnetnewrouteischosen__ __ ___ __ __ ___ __ a. for every packet sent b. for all the packet sent
c. only for the first packet d. for the packet which is not transmitted 3. ThePSTNisanexampleofa_ ___ __ __ __ __ __ ___ _network a. packet switched b. circuit switched c. message switched d. frame switched 4. Eachpacketisroutedindependentlyin__ __ __ ___ __ __ __ a. virtual circuit subnet b. short circuit subnet c. datagram subnet d. ATM subnet 5. For a connection oriented service, we need a _ _ _ _ _ _ _ _ _ _ _ __ a. virtual circuit subnet b. short circuit subnet c. datagram subnet d. wireless subnet 6. Which type of switching uses the entire capacity of a dedicated link? a. circuit switching b. datagram packet switching c. virtual circuit packet switching d. message switching 7. In _ _ _ _ _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. a. space division b. time division c. virtual d. packet 8. In_ __ __ ___ __ ___ ____ ,eachpacketofamessageneednotfollowthesamepathfrom sender to receiver. a. circuit switching b. message switching c. virtual approach to packet switching d. datagram approach to packet switching 9. In_ __ __ ___ __ ___ __ _ __ __ __,eachpacketofamessagefollowsthesamepath from sender to receiver. ] a. circuit switching b. message switching c. virtual approach to packet switching d. datagram approach to packet switching 10. A permanent virtual circuit involves _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Connection establishment b. Data transfer c. Connection release d. Connection check 11. The set of optimal routes from all sources to a given destination from a tree rooted to the destination is known as _ _ _ _ _ _ _ _ _ _ _ _ _ a. Binary tree b. Sparse tree c. Sink tree d. AVL tree 12. Adaptive routing algorithms get their information from _ _ _ _ _ _________ a. only from local environment b. only from adjacent routers c. from locally, adjacent, external routers d. only from external routers 13. If the route from I to J is computed in advance, off line, and downloaded to the routers when the
networkisbootediscalledas__ __ __ ___ ___ __ a. Dynamic routing b. Session routing c. Temporary routing d. Static routing 14. The router algorithm takes the decision to changes the route when _ _ _ _ _ _ _ _ _ _ _ _] a. router changes b. topology changes c. user changes d. transmission time does not change 15. If route from router I to router J is computed on line based on the current statistics, then it is called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Dynamic routing b. Session routing c. Temporary routing d. Static routing 16. If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuitisbeingsetup.Thisiscalledas________ a. Session routing b. Circuit routing c. Datagram routing d. Forwarding 17. _ _ _ _ _ _ _ _ _ _change their routing decisions to reflect changes in the topology. [02S02] a. Nonadaptive algorithms b. Adaptive algorithms c. Static algorithms d. Recursive algorithms 18. If router J is on the optimal path from router I to router K, then the path from J to K along the samerouteis __ __ _____ ___ _____ __.[02S03] a. does not exist b. optimal c. maximum d. constant 19. If router J is on the optimal path from router I to router K, then the optimal path from J to K also fallsalongthesamerouteisknownas_____ ___ ____ ___ __ __.[02S04] a. Routing principle b. Optimality principle c. Sink tree principle d. Network principle 20. ___ _________ ________ donotbasetheirroutingdecisionsonmeasurementsor estimates of the current traffic and topology. [02S05] a. Nonadaptive algorithms b. Adaptive algorithms c. Static algorithms d. Recursive algorithms UNIT-VI 1. The method of network routing where every possible path between transmitting and receiving DTE is used is called [03D01] a. Random Routing b. Packet Flooding c. Directory Routing d. Message Switching 2. In Hierarchical routing for N router subnet, the optimal number of levels is _ _ _ _ _ _ _ _ _. [03D02] a. logN b. log(N -1)
c. lnN d. ln(N-1) 3. In Hierarchical routing, the routers are divided into what is called as _ _ _ _ _ _ _ _ _ _ _ _ _ _. [03M01] a. zones b. Cells c. Regions d. Blocks 4. The regions in Hierarchical routing are grouped in to _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Clusters b. Zones c. Blocks d. Cells 5. The Clusters in Hierarchical routing are grouped in to _ _ _ _ _ __________ a. Clusters b. Zones c. Blocks d. Cells 6. 1. If a router sends every incoming packet out only on those lines that are going approximately in therightdirectionisknownas__ __ ___ _______ a. Random flooding b. Static flooding c. Selective flooding d. Early flooding 7. In shortest path routing algorithm, the path length is measured based on _ _ _ _ _ _ _ _ _ _ _ _ a. time delay b. number of hops c. size of the routers d. routing table 8. Floodingalwayschoosethe______ ___ _______ a. Shortest path b. First path c. Last path d. Largest path 9. In military applications where large number of routers may be blown to bits at any instant, we use _ _ _ _ __________________ a. Shortest path first b. First come first serve c. Forwarding d. Flooding 10. In distributed applications, it is sometimes necessary to update all the databases concurrently, we use _ _ ____________________ a. Shortest path first b. First come first serve c. Forwarding d. Flooding 11. In multicast routing with spanning tree method, a network with n groups, each with an average of m members, for each group we require _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. n pruned spanning trees must be stored for a total of mn trees b. m pruned spanning trees must be stored for a total of m trees c. n pruned spanning trees must be stored for a total of n trees d. m pruned spanning trees must be stored for a total of mn trees 13. To do multicast routing, each router computes a _ _ _ _ _ _ _ _ _____ a. Binary tree b. AVL tree c. Spanning tree d. Sparse tree 14. A well -defined groups that are numerically large in size but
small compared to the network as a wholeareusedin __ _______ __ _____ a. Unicast routing b. Multicast routing c. Broadcast routing d. Telecast routing 15. In__ ______ _______ tosendamulticastmessageahostsendsittothecore,which then does the multicast along the spanning tree. . Core based Trees b. AVL trees c. Binary trees d. Sparse trees 16. Sending a packet to all destinations simultaneously is called _ ______________ a. Multicasting b. Unicasting c. Telecasting d. Broadcasting 17. AnormalFloodingtechniqueisanexampleof____ _________ a. Multicasting b. Unicasting c. Telecasting d. Broadcasting 18. In Broadcast routing, if the router does not know anything all about spanning tree, _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ method is preferred. a. Reverse Path forwarding b. Multidestination c. Flooding d. spanning tree 19. The method of Broadcast routing in which each packet contains either a list of destinations or a bit map indicating the desired destinations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [04S04] a. Reverse Path forwarding b. Spanning tree c. Multidestination d. Flooding 20. Sending a message to a well defined group that are numerically large in size but small compared to the network as a whole is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Unicasting b. Multicasting c. Broadcasting d. Telecasting
UNIT-VI 1. In link state routing, after the construction of link state packets new routes are computed using _ _ _ _ _ _ _ _ ____ a. Bellman Ford algorithm b. DES algorithm c. Dijkstra's algorithm 2 Count-to-Infinityproblemoccursin______ ______ ___ ____.[05M01] a. distance vector routing b. short path first c. link state routing d. hierarchical routing
3 In distance vector routing algorithm, each router maintains a separate routing table with the following entries . [05M02] a. preferred input line , estimated time b. preferred input line, estimated distance c. preferred output line, estimated time d. preferred output line, router 5. Linkstatepacketsarebuiltin _______ a. short path first b. distance vector routing c. link state routing d. hierarchical routing 6. In which routing method do all a. Distance Vector b. Link Vector c. Shortest path d. Link State 7. In distance vector routing algorithm, the routing tables are updated _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [05S02] a. by exchanging information with the neighbors b. automatically c. using the backup database d. by the server 8. Distance vector routing algorithm is implemented in Internet as ______________ a. OSPF b. RIP c. ARP d. APR 9. Which of the following routing algorithm takes into account the current network load. a. broadcast b. shortest path c. flooding d. distance vector routing 1. Indistancevectorroutingthedelaymetricis __________ _______ a. number of hops b. geographical distance c. number of neighbors d. queue length 11 The processes that keep track of hosts whose home is in the area, but who currently visiting another area is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . Home agent b. Mobile agent c. Foreign agent d. User agent 12 In AODV routing algorithm for MANETs, the route is discovered at time _ _ _ _ _ _ _ _ _ _ _ _ _ . a. only when the network is established b. in middle of the transmission c. when there is a need for route by the host d. when there is no need for route by the host 13. Military vehicles on a battlefield with no existing infrastructure will deploy _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ network. a. MANET b. Cell Network c. LAN d. Wi-Fi 14. The network in which all the nodes are symmetric and there is no central control or hierarchy is _ _ _ _ _ _ _ _ ___. a. MANET b. Client -Server Technology c. Peer-to-Peer d. Wi-Fi
15. What is the type of network in which the topology change from time to time? a. Wi-Fi b. Cell Network c. LAN d. MANET 16. The processes that keep track of all mobile hosts visiting the area is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Home agent b. Mobile agent c. Foreign agent d. User agent 17. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called _ _ _ _ _ _ _ _ _ _ _ a. Migratory hosts b. Stationary hosts c. Mobile hosts d. Random hosts 18. The hosts who compute on the run and want to maintain their connections as they move around _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _] a. Migratory hosts b. Stationary hosts c. Mobile hosts d. Random hosts 19. What is the type of network in which the routers themselves are mobile? a. Wide Area Network b. Mobile Ad hoc Network c. Mobile Network d. Local Area Network 20. What is the routing algorithm used in MANETs] a. Shortest Path First b. Routing Information Protocol c. Distance Vector Protocol d. Ad hoc On -demand Distance Vector Protocol UNIT-VII 1. Why probe packets are transmitted in the network? a. to know about the capacity of the channel b. to count the number of host in the network c. to know about efficiency of the routing algorithm d. to know about the congestion 2. If the source deduces the existence of congestion by making local observations,such as the time needed for acknowledgements to come back is called as _ _ _ _ _ _ _ _ _ _ _ . b. Implicit feedback algorithm 3. The solution to decrease the load on the network when congestion occurs is _ _ _ _ _ _ _ _ _ _ . a. splitting the traffic over multiple routes b. increasing the transmission power c. usage of spare routers d. denying service to the users 4. In open loop congestion control techniques, the decisions are based on the _ _ _ _ _ _ _ _ _ a. without regard to the current state of the network b. with regard to the current state of the network c. with regard to the choice of the host d. without regard to the choice of the host 5. In closed loop congestion control techniques, the decisions are based on the _ _ _ _ _ _ _ _ _ _ . a. concept of a feedback loop b. concept of a forward loop c. concept of current state of network
d. concept current status of the router 6. When too many packets are present in the subnet, and performance degrades then it leads to _ _ _ _ _ _ _ _ ____ a. Ingestion b. Congestion c. Digestion d. Diffusion 7. What is it goal of congestion control? a. making sure that subnet is not able to carry the offered traffic b. making sure that subnet will allow more than the offered packets c. making sure that subnet is able to carry the offered traffic d. making sure that subnet will not allow any traffic 8. The service of open loop congestion control technique is _ _ _ _______ a. monitor the system to detect when and where congestion occurs b. when to accept new traffic c. pass the information to places where action can be taken d. adjusting the system to correct the problem 9. The service of closed loop congestion control technique is _ _ _ _ _ _ _ _ _ _ _] a. when to accept new traffic b. when to discard the packets c. monitor the system to detect when and where congestion occurs d. which packets to discard 10. The solution to increase the capacity when congestion occurs is _ _ _ _ _ _ _ _ _ _ _ _ _ a. denying service to the users b. degrading the service to the users c. splitting traffic over multiple routes d. rescheduled the demands of the users 11. When routers are being inundated by packets that they cannot handle, they just throw them away is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Jitter control b. Random early detection c. Choke packets d. Load shedding 12. If f is the sample instantaneous line utilization, a is the constant that determines how fast the router forgets recent history and u is the recent utilization of the line then the formula to update u is _ _ _ _ _ _ _ _ _ _ _ _ . [08D02] 13. The choke packet is send back to the source if _ _ _ _ _ _ _ _ _ . [08M01] a. The utilization factor u moves above the given threshold b. The utilization factor u moves below the given threshold c. The utilization factor u is equal to the given threshold d. The utilization factor u doesn`t change 14. When the source host receives the choke packet, then the source _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. reduces the capacity of the line b. reduces the line utilization factor c. reduces the traffic generation d. ratereduces the threshold value 15. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called _ _ _ _ _ _ _ _ _ _____ a. Priority dropping b. Tail dropping c. Age based dropping d. Head dropping 16. Timeoutdeterminationpolicyisusedin___ __________ ____.[08S01]
a. network layer b. data link layer c. transport layer d. application layer 17. Flowcontrolpolicyisimplementedin_____ __________ _. a. network layer b. transport layer c. application layer d. physical layer 18. Packet discard policy is implemented in _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [08S03] a. Physical layer b. Data link layer c. MAC layer d. Network layer 19. 4. For applications such as audio and video streaming, the variation in the packet arrival times is called _ _ _ _ _________________ a. Random early detection b. Jitter c. Delay difference d. Load shedding 20. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Tunneling b. Routing c. Diverting d. Forwarding UNIT_VIII 1. The type of fragmentation in which packet is fragmented at the source host and reassembly is done only atdestination host is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. transparent fragmentation b. internal fragmentation c. free space fragmentation d. nontransparent fragmentation 2. Firewallsareusedfor___ _______ _____. a. routing b. security c. tunneling d. congestion control 3. To translate the message semantics from one format to other, _ _ _ _ _ _ _ _ _ _ is used. a. application gateway b. transport gateway c. session gateway d. network gateway 4. The routing algorithm within each network is _ _ _ _ _ _ _ _ _ _ ____. a. Routing information protocol b. Exterior gateway protocol c. Interior gateway protocol d. Middle gateway protocol 5. In _ _ _ _ _ _ _ _ case higher bandwidth can be achieved. a. connectionless networks b. connection oriented networks c. virtual circuit networks d. optical networks 6. Fragmentationmeans_________ _______ a. adding of small packets to form large packet b. breaking large packet into small packets c. combining large packets in to a single packet d. forwarding a packet through different networks 7. Bridgesareusedat________ ___layer a. Physical layer b. MAC layer
c. Network d. Transport 8. Routersareusedat_ __________layer a. Physical layer b. MAC layer c. Network d. Transport 9. Gateways are used at _layer a. Physical layer b. MAC layer c. Network d. Application 10. Which type of ATM service is used for regroup timing requirements? a. variable bit rate b. constant bit rate c. available bit rate d. unspecified bit rate 11. Which of the following assertions is FALSE about the Internet Protocol(IP)? a. It is possible for a computer to have multiple IP addresses b. Ip packets from the same source to the same destination can take different routes in the network c. IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way 12. _ _ _ _ _ _ _ _ _ _ _ protocol is used for constant bit rate. a. AAL1 b. AAL2 c. AAL 3/4 d. AAL5 13. While booting the system the IP address is _ _ _ _ _ _ _ _ _ _ _ . a. 1.1.1.1 b. 1.1.0.0 c. 0.0.1.1 d. 0.0.0.0 14. In ATM network _ _ _ _ _ _ _ _ _ message is used by a source host to set up a connection. a. SET UP b. Call PROCEEDING c. CONNECT d. RELEASE 15. How many class A, B and C networks IDs can exist a. 2,113,658 b. 16,382 c. 126 d. 128 16. Which of the following TCP/IP internet protocol, a diskless machine uses to obtain its IP address from a server a. RDP b. ARP c. RARP d. RIP 17. Theprotocolusedtotesttheinternetis__ _______ a. IGMP b. ICMP c. ARP d. RIP 18. Which IP address class has few hosts per network? a. class A b. class B c. class C d. class D 19. TheIPaddresswith127aabbccisusedfor_ _________ ___
a. broad casting b. multicasting c. loop back testing d. forward testing 20. What type of addressing is specifically used by the transport layer? a. station address b. application program port address c. dialog address d. network address 21. Which of the following functionalities must be implemented by a transport protocol over and above the network protocol? a. Recovery from packet losses b. Detection of duplicate packets c. Packet delivery in the correct order d. End to end connectivity 22. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ _ _ _ _ primitive. a. LISTEN b. ACCEPT c. BIND d. CONNECT 23. SEND and RECEIVE primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ primitives.] a. blocking b. non blocking c. data transfer d. error control 24. CONNECT and DISCONNECT primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ primitives. a. blocking b. non blocking c. data transfer d. error control 25. Transport protocol data units(TPDUs) are contained in _ _ _ _ _________. a. protocol b. frame d. packet 26. Which of the following layer is transport service provider? [ a. network b. transport c. session d. application 27. The transport layer performs the same types of functions as the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ layer.] a. session b. network c. data link d. physical 28. The end points of a transport connection are called _ _ _ _ _ _ __________ a. TSAPs b. AAL -SAPs c. NSAPs d. PSAPs 29. In transport layer, End to End delivery is the movement of data from _ _ _ _ _ _ _ _ _ _ _ . a. one station to the next station b. one network to the other network c. source to destination d. one router to another router 30. Which of the following are session layer check points? a. allow just a portion of a file to be resent b. detect and recover errors c. control the addition of headers
d. are involved in dialog control 31. The function of the transport layer ensuring that all pieces of a transmission arrive at the destination, not just some of them is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Duplication control b. Sequence control c. Loss control d. Error control 32. If either of the communicating device can ask for disconnection by sending DISCONNECT REQUEST TPDU to the other, and immediately disconnect without waiting for acknowledgement is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ___. a. Graceful disconnection b. Abrupt disconnection c. Greedy disconnection d. Random disconnection 33. The type of disconnection in which three way handshake protocol is used is _ _ _ _ _ _ _ _ _ . a. Graceful disconnection b. Abrupt disconnection c. Greedy disconnection d. Random disconnection 34. 8. The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problems is called a. protection b. resilience c. option negotiation d. transfer failure 35. A single transport layer connection split and connects the different network connections is called _ _ _ _ _ _ ___ a. Upward multiplexing b. Downward multiplexing c. Congestion control d. Flow control 36. Error control is needed at the transport layer because of potential errors occurring _ _ _ _ _ _ _ _ _ _ _ _ _ _ __. a. from transmission line noise b. in routers c. program d. error control