IMAYAM ARTS & SCIENCE COLLEGE

3y ago
42 Views
2 Downloads
874.94 KB
20 Pages
Last View : 7d ago
Last Download : 3m ago
Upload by : Ryan Jay
Transcription

IMAYAM ARTS & SCIENCE COLLEGEKANNANUR-THURAIYUR-621 206.DEPARTMENT OF COMPUTER SCIENCE ANDAPPLICATIONSQUESTION BANKCLASSYEARSEMESTERTITLE OF THE PAPERSUBJECT CODEPREPARED BYBACHELOR OF COMPUTERAPPLICATIONS::::::IIIVICOMPUTER NETWORKS16SCCCA8Ms. P. MAYIL MCA., M.Phil.,1

.ACAns:8.ACAns:9.ACAns:10.ACAns:UNIT – IOVER VIEW & PHYSICAL LAYERONE MARKThe physical layer concerns with:Bit-by-bit deliveryB Process to process deliveryApplication to application deliveryD None of the mentionedA. Bit – by – bit deliveryWhich transmission media has the highest transmission speed in a networkCoaxial cableB Twisted pair cableOptical fiberD Electrical cableC. Optical fiberBits can be send over guided and unguided media as analog signal byDigital modulationB Amplitude modulationFrequency modulationD Phase modulationA. Digital modulationThe portion of physical layer that interfaces with the media access control sub layer iscalled:physical signaling sub layerB Physical data sub layerPhysical address sub layerD None of the mentionedA. Physical signaling sub layerCommunication between a computer and keyboard involves transmission.AutomaticB Half duplexFull – duplexD SimplexD. SimplexWhich one of the following task done by Data Link Layer?FramingB Error controlFlow ControlD Channel CodingD. Channel CodingWhich transmission media has the highest transmission speed in a network?Coaxial CableB Twisted Pair CableOptical FiberD Electrical CableC. Optical FiberThe Physical Layer is responsible for:Line CodingB Channel CodingModulationD All of the mentionedD. All of the mentionedWireless transmission can be done viaRadio wavesB MicrowavesInfraredD All of the Mentioned.D. All of the Mentioned.A single channel is shared by multiple signal by:Analog ModulationB Digital ModulationMultiplexingD None of the mentionedC. Multiplexing2

.ACAns:8.ACAns:9.ACAns:10.ACAns:UNIT – IIDATA LINK LAYERONE MARKThe data link layer takes the packets from and encapsulates them into framesfor transmissionNetwork LayerB Physical LayerTransport LayerD Application LayerA. Network LayerWhich sub layer of the data link layer performs data link functions that depend upon thetype of medium?Logical Link control Sub layerB Media Access Control sub layerNetwork Interface control Sub layerD None of the mentioned.B. Media Access Control sub layerAutomatic repeat request error management mechanism is provided by:Logical Link control Sub layerB Media Access Control sub layerNetwork Interface control Sub layerD None of the mentioned.A. Logical Link control Sub layerWhich one of the following is a data link protocol?EthernetB Point to Point ProtocolHDLCD All of the mentioned.D. All of the mentionedWhich one of the following is the multiple access protocol for channel access control?CAMA/CDB CSMA/CAD None of the mentionedBoth (A) and (B)C. Both (A) and (B)The technique of temporarily delaying outgoing acknowledgements so that they can behooked onto the next outgoing data frame is calledPiggybackingB CRCFletcher’s ChecksumD None of the MentionedA. PiggybackingHeader of a frame generally contains:Synchronization bytesB AddressesFrames identifierD All of the mentionedE. All of the mentionedMultiplexing is used inPacket SwitchingB Circuit SwitchingData SwitchingD None of the MentionedD. Circuit SwitchingWhich multiplexing technique Transmits digital signals?FDMB TDMWDMD None of the mentionedE. TDMMultiplexing can provideEfficiencyB PrivacyAnti jammingD Both (A) and (B)F. Both (A) and (B)3

ACAns:8.ACAns:9.ACAns:10.ACAns:UNIT – IIINETWORK LAYER SERVICESONE MARKThe network layer concerns withBitsBFramesPacketsDNone of the mentionedC. PacketsWhich one of the following is not a function of network layer?RoutingBInter – networkingCongestion controlDNone of the mentionedD. None of the mentionedIn virtual circuit network each packet contains:full source and destination addressBa short VC numberboth (a) and (b)Dnone of the mentionedB. a short VC numberWhich one of the following routing algorithm can be used for network layer design?shortest path algorithmBdistance vector routinglink state routingDall of the mentionedD. all of the mentionedICMP is primarily used for:error and diagnostic functionsBaddressingforwardingDnone of the mentionedA. Error and Diagnostic functionsAn IPv6 address is bit long32B64128DNone of the AboveC. 128In , each packet is treated independently of all othersDatagram switchingBCircuit SwitchingFrame switchingDNone of these aboveA. Datagram switchingWe can say that a Packet switching has types of component.2B34D5C. 4The IPv4 header size isIs 20 to 60 byte longBIs always 20 byte longIs always 60 byte longDDepends on the MTUIs 20 to 60 byte longIP is a datagram protocolAn unreliableBA connectionlessBoth A and BDNone of the aboveC. Both A and B4

ACAns:8.ACAns:9.ACAns:10.ACAns:UNIT – IVTRANSPORT LAYERONE MARKSWhich of the following are transport layer protocols used in networking?TCP and FTPB UDP and HTTPTCP and UDPD HTTP and FTPC. TCP and UDPTransmission control protocoluses a three way handshake to establish ais a connection-oriented protocolBconnectionreceives data from application as aD all of the mentionedsingle streamD. all of the mentionedTransport layer protocols deals withapplicationtoapplicationB process to process communicationcommunicationnode to node communicationD man to man communicationB. Process to process communicationWhich among the following are delivered by the transport layer in process-to-processdelivery mechanism?FramesB DatagramsPacketsD All of the aboveC. PacketWhich one of the following uses UDP as the transport protocol?HTTPB TelnetDNSD SMTPC. DNSUDP is called transport layerConnectionless, reliableB Connection Oriented, unreliableConnectionless, unreliableD None of the aboveC. Connectionless, unreliableTCP & UDP are both layer protocolData LinkB NetworkTransportD None of the aboveC. TransportTCP groups a number of bytes together into packet called aUser datagramB SegmentDatagramD None of the aboveB. SegementCommunications in TCP isSimplexB Full DuplexHalf DuplexD None of the aboveB. Full DuplexThe inclusion of the checksum in the TCP segment isOptionalB MandatoryBoth A and BD None of the aboveB. Mandatory5

ACAns:8.ACAns:9.ACAns:10.ACAns:UNIT – VAPPLICATION LAYERONE MARKThe translates internet domain and host names to IP address.domain name systemB routing information protocolnetwork time protocolD internet relay chatA. Domain Name SystemWhich one of the following protocol delivers/stores mail to receiver server?simple mail transfer protocolB post office protocolinternet mail access protocolD hypertext transfer protocolA. Simple Mail Transfer ProtocolWhich is not a application layer protocol?HTTPB SMTPFTPD TCPD. TCPE-mail isLoss-tolerant applicationB Bandwidth-sensitive applicationElastic applicationD None of the mentionedC. Elastic applicationWhich is a time-sensitive service?File transferB File downloadE-mailD Internet telephonyD. Internet TelephonyTELNET is abbreviation forTerminal NetworkB Telephone NetworkTelecommunication NetworkD None of the AboveA. Terminal NetworkFTP uses the services ofUDPB TCPIPD None of the aboveB. TCPis the repository of information linked together from points all over the world.The WWWB HTTPHTMLD None of these aboveA. The WWWThe is a standard for specifying any kind of information on the InternetURLB ULRRLUD None of these aboveA. URLA document is created by a web server whenever a browser requests the documentStaticB DynamicActiveD None of these Above.B. Dynamic6

1.Ans:2.Ans:3.Ans:4.Ans:5.Ans:6.Ans:7.UNIT – I OVER VIEW & PHYSICAL LAYERTWO MARKSWhat is mean by data communication?Data communication is the exchange of data (in the form of 1s and 0s) between twodevices via some form of transmission medium (such as a wire cable).What are the three criteria necessary for an effective and efficient network?The most important criteria are performance, reliability and security. Performance of thenetwork depends on number of users, type of transmission medium, the capabilities of theconnected h/w and the efficiency of the s/w. Reliability is measured by frequency offailure, the time it takes a link to recover from the failure and the network’s robustness in acatastrophe. Security issues include protecting data from unauthorized access and viruses.What are the three fundamental characteristics determine the effectiveness of thedata communication system?The effectiveness of the data communication system depends on three fundamentalcharacteristics:(i) Delivery: The system must deliver data to the correct destination.(ii) Accuracy: The system must deliver data accurately.(iii) Timeliness: The system must deliver data in a timely mannerMention the components of Data communication system1. Message, 2.Sender, 3.Medium, 4.Protocol, 5.Receiver.Define Network?A computer network is a set of devices connected by media links. The links connecting thedevices are called as communication channels. Its size, its ownership, physical architectureand the distance it covers determine the type of network.List the layers of the OSI model1.Physical layer2.Data link layer3.Network layer4. Transport layer5.Session layer6.Presentation layer7.Applicationlayer.Distinguish circuit switching and packet switchingCIRCUIT SWITCHINGIn modern circuit-switched networks,electronic signals pass through severalswitches before a connection isestablished. During a call no othernetwork traffic can use those switches.Ans:The resources remain dedicated to thecircuit during the entire data transferand the entire message follows thesame path.Circuit switching can be analog ordigital.7PACKET SWITCHINGIn packet-based networks, the messagegets broken into small data packets.These packets are sent out from thecomputer and they travel around thenetwork seeking out the most efficientroute to travel as circuits becomeavailable.This does not necessarily mean that theyseek out the shortest route. Each packetmay go a different route from the others.

Ans:16.Ans:17.Ans:18.Ans:19.Ans:Define Framing.A point-to-point connection between two computers or devices consists of a wire in whichdata is transmitted as a stream of bits. However, these bits must be framed into discernibleblocks of information. Framing is a function of the data link layer. It provides a way for asender to transmit a set of bits that are meaningful to the receiver. Ethernet, token ring,frame relay, and other data link layer technologies have their own frame structures. Frameshave headers that contain information such as error-checking codes.Give the classifications of computer networks.1.LAN , 2.WAN ,3.MAN.What’s meant by Topology of a network?Topology refers to the way a network is laid out, either physically or logically. Thetopology of a network is the geometric representation of the relationships of all links andlinking devices to each other. There are 4 basic topologies possible: (1) Mesh (2) Star 3)Bus (4) Ring.What’s a hub?In star topology each device has a dedicated point-to-point link only to a central controllercalled as hub. The hub acts as an exchange (i.e.) if one device wants to send data toanother, it sends data to another, it sends the data to the controller, which then relays thedata to the other connected device.What’s meant by transmission mode?It defines the direction of signal flow between two linked devices. There are 3 types oftransmission modes:1. Simplex: Unidirectional communication.2. Half-duplex: Bi directional, but not simultaneous utilization of link.3. Full-duplex: Bi directional, simultaneous utilization of link.What’s a LAN?LAN is a data communication network within a building, plant (or) campus (or)between nearby buildings.What’s MAN?A data communication network system covering an area the size of a town or city.What’s WAN?A data communication network spanning states, countries or the whole world.What’s protocol?A set of rules that govern all aspects of information for communication.Which OSI layers are the network support layers?1. Physical layer 2. Data link layer 3. Network layer.What is the difference between network delivery and Transport layer delivery? Network layer delivery: The network layer is responsible for the source-todestination delivery of a packet. It treats each packet independently, even though theybelong to the same message. Transport layer delivery: The transport layer is responsible for source-to- destination(end-to-end) delivery of the entire message.What are the responsibilities of the session layer?1. Dialog control: The session layer allows two systems enter into a dialog.2. Synchronization: The session layer allows a process to add checkpoints into a streamof data to achieve synchronization between sender and receiver.8

20.Ans:21.Ans:22.Ans:What are the responsibilities of the presentation layer?1. Translation: The presentation layer is responsible for interoperability between thedifferent encoding methods used in different computers. The presentation layer at thesender changes the information from its sender-dependent format into a commonformat. The presentation layer at the receiving machine changes the common formatinto its receiver-dependent format.2. Encryption/Decryption: To carry sensitive information, a system must be able toassure privacy. Encryption means that the sender transforms the original information toanother form and sends the resulting message out over the network. Decryption reversesthe original process to transform the message back to its original form.3. Compression: Data compression reduces the number of bits to be transmitted.What are the disadvantages of optical fiber as a transmission medium?The disadvantages of optical fiber are Very expensive. Installation and maintenance is difficult. FragilityWhat are the criteria used to evaluate transmission medium?The criteria used to evaluate transmission medium are Throughput Propagation speed Propagation time Wavelength9

Ans:10.Ans:11.Ans:UNIT – II DATA LINK LAYERTWO MARKSWhat are the three main functions of the data link layer?1. Line discipline: It coordinates the link system; it determines which device can sendand when it can send.2. Flow control: It coordinates the amount of data that can be sent before receivingacknowledgement.3. Error control: It allows the receiver to inform the sender of any lost or damagedframes and coordinates the transmission of those frames by the sender.What are Virtual LANs?Short for virtual LAN, a network of computers that behave as if they are connected to thesame wire even though they may actually be physically located on different segments of aLAN. VLANs are configured through software rather than hardware, which makes themextremely flexible.Why are protocols needed?Protocols are needed for predetermined understandings for communications. Networkprotocols are sets of rules for exchanging information. This exchange usually occurs muchlike a dialog between two computers. The exchange often begins with the client sending asignal to the server, providing key information about what kind of data is being requested.What are the responsibilities of data link layer?Specific responsibilities of data link layer include the following.a) Framing b) Physical addressing c) Flow control d) Error control e) Access controlMention the types of errorsThere are 2 types of errors a) Single-bit error.b) Burst-bit error.Define the following terms.Single bit error: The term single bit error means that only one bit of a given data unitBurst error: Means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to1What is redundancy?It is the error detecting mechanism, which means a shorter group of bits or extra bits may beappended at the destination of each unit.List out the available detection methods.There are 4 types of redundancy checks are used in data communication.a) Vertical redundancy checks (VRC). b) Longitudinal redundancy checks (LRC).c) Cyclic redundancy checks (CRC). d) Checksum.Write short notes on VRC.The most common and least expensive mechanism for error detection is the verticalredundancy check (VRC) often called a parity check. In this technique a redundant bit calleda parity bit, is appended to every data unit so, that the total number of 0’s in the unit(including the parity bit) becomes even.Write short notes on LRC.In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundantrow of bits is added to the whole block.Write short notes on CRC.The third and most powerful of the redundancy checking techniques is the cyclic redundancychecks (CRC) CRC is based on binary division. Here a sequence of redundant bits, called theCRC remainder is appended to the end of data unit.10

9.Ans:20.Ans:21.Ans:22.Ans:23.Ans:Write short notes on CRC generatorA CRC generator uses a modulo-2 division.a) In the first step, the 4 bit divisor is subtracted from the first 4 bit of the dividend.b) Each bit of the divisor is subtracted from the corresponding bit of the dividend withoutdisturbing the next higher bit.Write short notes on CRC checker.A CRC checker functions exactly like a generator. After receiving the data appended with theCRC it does the same modulo-2 division. If the remainder is all 0’s the CRC is dropped andthe data accepted. Otherwise, the received stream of bits is discarded and the dates are resent.What are the steps followed in checksum generator?The sender follows these stepsa) The units are divided into k sections each of n bits.b) All sections are added together using 2’s complement to get the sum.c) The sum is complemented and become the checksum. d) The checksum is sent with thedata.List out the steps followed is checksum checker sideThe receiver must follow these stepsa) The unit is divided into k section each of n bits. b) All sections are added together using1’s complement to get the sum. c) The sum is complemented. d) If the result is zero.Write short notes on error correctionIt is the mechanism to correct the errors and it can be handled in 2 ways.a) When an error is discovered, the receiver can have the sender retransmit the entire dataunit.b) A receiver can use an error correcting coder, which automatically corrects certain errorsWhat is the purpose of hamming code?A hamming code can be designed to correct burst errors of certain lengths. So the simplestrategy used by the hamming code to correct single bit errors must be redesigned to beapplicable for multiple bit correction.Define flow control.Flow control refers to a set of procedures used to restrict the amount of data. The sender cansend before waiting for acknowledgment.What is a buffer?Each receiving device has a block of memory called a buffer, reserved for storing incomingdata until they are processed.Mention the categories of flow control.There are 2 methods have been developed to control flow of data across communicationlinks.a) Stop and wait- send one from at a time. b) Sliding window- send several frames at a time.Define ARQError control in the data link layer is based on Automatic repeat request (ARQ), which meansretransmission of data in 3 cases. a) Damaged frame b) Lost framec) Lostacknowledgment.Mention the function of go-back N-ARQ.It is the popular mechanism for continuous transmission error control. In this method, if ourframe is lost or damaged, all frames sent since the last frame acknowledged areretransmitted.What is selective reject ARQ?In selective reject ARQ only the specific damag

A physical signaling sub layer B Physical data sub layer C Physical address sub layer D None of the mentioned Ans: A.Physical signaling sub layer 5. Communication between a computer and keyboard involves _ transmission. A. Automatic B Half duplex C Full – duplex D Simplex Ans: D. Simplex 6.

Related Documents:

2014 – 2015. 2 2014-2015 ARTS CONCENTRATIONS AT DURHAM SCHOOL OF THE ARTS ARTS: Music ARTS: Theatre Arts ARTS: Dance ARTS: Visual Arts ARTS: CTE ARTS: Writing . portfolio to Scholastic Art & Writing Awards _ Newspaper Journalism *Completer Options 1) Editor or Co-Editor . AP Art History - 54487X0Y Writing Through Literature 2-10272YW2 .

Daulat Ram College (W) Deen Dayal Upadhyaya College Delhi College of Arts and Commerce Department of Germanic and Romance Studies Deshbandhu College Dr. Bhim Rao Ambedkar College Dyal Singh College Dyal Singh College (Evening) Gargi College (W) Hans Raj College Hindu College Indraprastha College for Women (W) Institute of Home Economics (W .

Elyse (Ginger Cooley) Applegate ARTS 332B 786-1683 Marketing and Public Relations e.a@alaska.edu Manager, Performing and Fine Arts Division Cedar Cussins ARTS 333 786-4890 Performing & Fine Arts cedar@alaska.edu Building Manager ART STUDIOS DRAWING Arts 101 (no phone) PAINTING Arts 102 786-1352 CERAMICS-HANDBUILT Arts 106 786-1246

A LETTER FROM THE PRESIDENT OF THE AMERICAN ACADEMY v THE ARTS AND PUBLIC EDUCATION 1 Introduction 1 Prior Research on the Benefits of Arts Education 4 Access and Gaps in Arts Education 5 Now Is Our Moment 9 Sidebar: Arts Education in Our Schools and Communities 9 THE VALUES OF ARTS EDUCATION 10 Arts Education Builds Well-Rounded Individuals 11 Arts Education Broadens Our Understanding of and .

8 2016 Americans for the Arts Americans Are Experiencing the Arts throughout the Community The American public engages in the arts in many ways—as attendee, arts maker, art purchaser and decorator, and arts advocate. We consume and share art through technology and are more likely to experience the arts outside of the .

amrita tv meenakshi kairali tv puthuyugam captain tv imayam dangal shalini tv dd arunprabha vasanth tv dd yadagiri tamilan television vendhar tv movies . jk channel abn andhra jyothi jai hind jeevan kairali people lotus news dw tv nepal 1 france 24 russia today abp majha

Zahra Vianela Aalabdulrasul Tippie College of Business Cedar Rapids IA Eleanor Abbott College of Liberal Arts and Sciences Davenport IA Fatuma Bulbula Abdalla College of Public Health Iowa City IA Tyler Zia Abdishi College of Liberal Arts and Sciences Wheeling IL Muhammad Ariff Abdul Malik College of Liberal Arts and Sciences Bayan Baru Malaysia Brandon Abel College of Nursing Marion IA Emily .

Architectural Drafting Line Work Arrowheads are drawn freehand. The length of an arrowhead is the same dimension used for the height of lettering. The proportion of the length of the arrowhead to the width is 3:1 respectively. Arrowheads can be either open, closed, solid, or the traditional slash as shown. Other types of symbols can be used in place of the arrowhead or slash. These include .