Você está na página 1de 24

qno question

1 Which of the fallowing is static routing algorithm?

2
Which of the fallowing is dynamic routing algorithm?
Sending a packet to all destinations simultaneously is
3
called----

4
Sending a message to such a group is called --------.

5
Which of the fallowing are congestion prevention policies?
6 Err:508

7 In -------- every incoming packet is sent out on every


outgoing line except the one from which it arrived on.

8
In ---------- router does not wait for the packet from source.
An open loop method which can manage the congestion
9 by forcing the packets to be transmitted at uniform rate is
called --------

10 ------------ is to avoid a fast sender from sending packets


faster than the rate the receiver can receive.
A---------- is a combination of hardware and software that
11 isolates an organization’s internal network from the
internet.

12
AAL stands for---------------

13
Which of the fallowing is advantage of ATM?

14
TCP uses ------------ methods for congestion avoidance.
15 The real solution of NAT, CIDR is-------------

16
ARP stand for-------------
17
BGP Stands for -------------------------
18 Which of the fallowing are autonomous systems?

19 ----------- is a special case of inter networking where source


& destination hosts are on the same type of networks and
there is a different network in between.
20 Which of the fallowing is connection-less service?
21 Create a new communication end point
22 Actively attempt to establish a connection
23 Control packet for managing the window
24 The server is waiting for an incoming call
The number of bits that can pass through a point in one
25
second
26 TCP/IP protocol suite is a--- layer protocol
27 The name of the packet in the UDP protocol
28 A connectionless TCP/IP Transport layer protocol
Stopping the sending of multicast messages from an
29
interface
30 The inclusion of acknowledgement on a data frame
31 An address defined in the network layer
32 A private network that uses the TCP/IP suite
33 A global network that uses the TCP/IP suite
34 Saturation of a network with a message

35
A network formed from two or more smaller networks
36 Domain Name System Consists of
37 Resource Record is a ---- Tuple
38 SOA Stands for
39 DNS in the Internet Consists Of
40 How are new domains added to DNS? By using

41 ------ is a method whereby an answer to a query is stored


in memory for easy access to future requests.

42
---- is a protocol that can be used in different platforms
43
PGP Stands for

44
PEM Stands for
45 User Agent is also called as
46 Message transfer agent uses
47 Message access agent uses
48 Example of command-driven user agents are
49 Example of GUI-based user agents are

50
POP Stands for
51 Which is not a MIME Type
52 HTTP uses a ---- connection to transfer protocol
----- is a computer that keeps copies of responses to
53
recent requests.
--- is a technology that creates and handles dynamic
54
documents.
55 Echoes the incoming request
56 HTML is used to create ------ web pages

57
---- is the main protocol used to access data on the WWW
58 A browser consists of a
Gaps between consecutive packets at the receiver cause
59
a phenomenon called...
60 MPEG is a method to compress
61 JPEG is a method to compress
62 ---- uses a temporary even-numbered UDP port
63 Real-time traffic needs the support of ----
64 GSM is a
65 Image Compression is also called as

66
In data communications, ATM is an acronym for
Because ATM _ _ _ _ _ _ _ _ _ _ , which means that cells
67 follow the same path, the cells do not usually arrive out of
order.
Which layer in ATM protocol reformats the data received
68
from other networks?
Which layer in ATM protocol has a 53-byte cell as an end
69
product
Which AAL type can best process a data stream having a
70
nonconstant bit rate?
Which AAL type is designed to support a data stream that
71
has a constant bit rate?

72 Which AAL type is designed to support conventional


packet switching that uses the virtual circuit approach?
73 Which AAL type is designed to support SEAL ?
The end product of the SAR is a data packet that is _ _ _ _
74
______
In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header
75
is added to 47 bytes of data.
In ALOHA, the throughput is a maximized by dividing time
76
into _ _ _ _ _ _ _ _ intervals
In adaptive tree walk protocol, each node at level I has a
77
fraction _ _ _ _ _ _ _ of the station below it

78 In _ _ _ _ _ _ _ _ _ protocol the station transmits with a


probability of 1 whenever it finds the channel idle
The channel efficiency of bit-map protocol at low load is _
79
______
The channel efficiency of bit-map protocol at high load is _
80
_______
The channel efficiency of binary-countdown protocol is _ _
81
___
_ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub
82
layer

83
The first collision free protocol is _ _ _ _ _ _ _ _ _
In binary count down protocol each station address bits
84
are _ _ _ _ _ _ _
Multiple users share a common channel is called _ _ _ _ _ _
85
__
_ _ _ _ _ _ _ _ _ _system is used for ground based radio
86
broadcasting Static channel allocation
The problem of a station not being able to detect a
87 potential competitor for the medium because competitor
is far away is called _ _ _ _ _ _ _ _ _
The problem of a station not being able to detect a
88 potential competitor for the medium because it thinks
that there is activity between them is called _ _ _ _ _ _ _ _ _
__
Protocols in which stations listen for a carrier and act
89
accordingly are _ _ _ _ _ _ _

90
Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _

91
Contention Slots are not found in _ _ _ _ _ _ _
A problem with Bitmap protocols is an overhead of _ _ _ _
92
_ _ _ _ bit(s) per station
In adaptive tree walk protocol we use _ _ _ _ _ _ and _ _ _ _
93
_ _ _ _ _ searching

94
An early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _
95 A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet

96
A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet

97
The protocol used in ETHERNET is
98 10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet.

99
In token ring, the length of the token is _ _ _ _ _ _ _ _
The protocol in which, after I collisions, a random number
100 between 0 and 2i - 1 number of slots is skipped is called _
___
option1 option2 option3
Flooding Shotest Path Distance Vector

Shotest Path Distance Vector


Flooding
Multi-destination
Broadcasting Routing both
Multi-destination
Broadcasting Routing both

flow-control Routing Retransmission


Leaky bucket token bucket Both

Flooding Optimality Queuing

Queuing Flooding Choke packets

Congestion control congestion prevent traffic shaping

both
Congestion control flow control

Router FireWall
Jitter

ATM Application Layer ATM Adaptation Layer ATM Additional Layer


Incremental
One Network Compatibility migration

Both
Multiplicative Decrease Slow sort Recovery
IPV4 IPV6 Both

Address Resolution Application Resolution Adaptation


Protocol Protocol Resolution Protocol
Border Gateway Border Group
Back Ground Protocol Protocol Protocol
Stub Multi-homed Transit

Tunneling Segment syndrome


TCP UDP both
BIND CONNECT SOCKET
BIND CONNECT SOCKET
DATA CONNECT CONTROL
BIND CONNECT SOCKET
Slice Time-to-Live
Throughput
7 5 4
Datagram User datagram Datagram packet
TCP UDP TUP

Pruning Tunneling Preamble


Playback buffer piggybacking Pipelining
Physical address Address mapping Logical address
ARPANET TELNET INTERNET
ARPANET TELNET INTERNET
Flooding Frame Relay Grafting

ARPANET SUPERNET INTERNET


Name Space Resource Records Name Server
4 5 6
Start of Authority Start of Association Both a & b
Generic Domains Country Domains Inverse Domain
Registrars DDNS PQDN

Resolver Caching Resolution

Handshaking ARP DNS


Pretty Good Policy Pretty Good Privacy Pretty Good Private
Privacy Enhanced
Pretty Enhanced Mail Private E-Mail Mail
Mail Reader Mail box Transfer Agent
SMTP POP IMAP
SMTP POP IMAP
Mail pine elm
Outlook Eudora Netscape

Post office protocol Panel office protocol Port office protocol


Multipart Multiport Message
TCP UDP Both a & b

Proxy server Name server Mail server

BGI CGI Both a & b


CONNECT TRACE POST
Static Dynamic Both a & b

SMTP MIME HTTP


Client programs Controller Interpreters

Jitter Ripper Mixer


Audio Video Both a & b
Audio Pictures Graphics
RTP RFC RET
Multicasting Multiplexing Both a & b
8 kbps 13 kbps 9 kbps
JPEG MPEG Masking
Automatic Transfer Automatic Transport
Automated Transfer Mode Modulation Mode

is asynchronous is multiplexed is a network


Application
Physical ATM adaptation
Application
Physical ATM adaptation

AAL1 AAL2 AAL3/4

AAL1 AAL2 AAL3/5

AAL1 AAL2 AAL3/6


AAL1 AAL2 AAL3/7

Variable in length 48 bytes long 44 to 48 bytes long

AAL1 AAL2 AAL3/7

Variable Unique Discrete

2I I2 2-I

non - persistent
1 - persistent CSMA p - persistent CSMA CSMA

d/(N+d) d/(d+1) d/(d+log2N)

d/(N+d) d/(d+1) d/(d+log2N)

d/(N+d) d/(d+1) d/(d+log2N)

CSMA b. TCP TCP CSMA/CD

Binary countdown Basic bitmap Reservation protocol

ANDed Ex - Ored Ored


LAN WAN Contention
Dynamic channel
allocation ALOHA

Collision Avoidance Hidden Station


Exposed Station Problem Problem Problem

Collision Avoidance Hidden Station


Exposed Station Problem Problem Problem

ALOHA Multiple access Station Model

Slotted ALOHA
ALOHA 1-persistent CSMA

non-persistent CSMA CSMA/CD Bitmap

1 2
0
Tree and Breadth Graph and Depth
Graph and Breadth First First First

MACA ALOHA CSMA/CD


10Base 5 10Base 2 10Base - T

10Base 5 10Base 2 10Base - T

ALOHA Binary Count down CSMA/CD


Thick Thin Twisted pair

4 bytes 3 bytes 1 bytes

Exponential Binary countdown Backoff


option4 answer
Option 1& 2 4

Option 1& 2 3

None 1

None 2

4
All
None 3

1
None

3
None

3
None

2
None

3
None

2
None

All 4

None 3

None 2

1
None
2
None
All 4

1
None.
None 2
LISTEN 3
LISTEN 2
CREDIT 4
LISTEN 4
1
None
6 2
None 2
UTP 2

1
Polling
None 2
None 3
INTRANET 4
INTRANET 3
Footprint 1

2
INTRANET
All The Above 4
7 2
None 1
All 4
FQDN 1

2
Mapping

3
PING
2
None

3
None
Both b & c 1
Both b & c 1
Both b & c 4
All The Above 4
All The Above 4

1
None
Video 1
None 2

1
Both b & c

1
None
HEAD 2
None 2

1
TELNET
all the above 3

4
None
None 1
Both b & c 4
RIP 1
None 1
14 kbps 2
None 1
Asynchronous
4
Transfer Mode

uses virtual circuit 2


routing
3
Data adaptation

2
Data adaptation

2
AAL5

1
AAL6

3
AAL7
AAL8 4
greater than 48
2
bytes long

1
AAL8

3
Continuous

3
I-2

1
ALOHA

1
N/(d+log2d)

2
N/(d+log2d)

3
N/(d+log2d)

3
GSM

2
SAP

3
NORed
4
CSMA/CD

3
CSMA

Access Grant 3
Problem

1
Access Grant
Problem

4
CSMA
non-persistent
3
CSMA

1
Binary Countdown

3 2

Tree and Depth


4
First

1
Collision Free
10Base - F 3
1
10Base - F
Multiple Access
3
Protocol
Fiber optics 1

2
2 bytes

Binary exponential 4
backoff
G.V.S.Rajkumar

Você também pode gostar