Network:
1.In OSI, terminal emulation is done in (HCL)
a)semion b)appl.. c)presenta... d)transport
ans: b
2)Which are the different network toplogies ?
3) Tell an example of bus type network.
ethernet.
4)What is the Bandwidth of ethernet ?
5)Explain the advantage and disadvantage of ethernet ?
6)Which is the protocol used in ethernet. (CSMA/CD)
bridges, routers and generators
7)What is the advantage of Ring network ?
Compare it with ethernet.
8) Piggy backing is a technique for
a) Flow control b) sequence c) Acknowledgement d) retransmition
ans: c piggy backing
hughes
9 16 bit mantissa and 8 bit exponent can present what maximum value?
4bit window size in sliding window protocol, how many acknowledements can be held?
CSMA/Cd protocol used in
Ans
11 Checksum in IP packet is
Sum of the bits and 9's complement of sum
12) TCP/IP hdr checksum : what method is used ?
Ans. one's complement of sum of one's complement (CRC)
13) CSMA/Cd is used in which lan Ans. Ethernet
14) One question on synchronous transmission :
ans. Timing info is embedded in data itself
ATM : Asynchronous transfer mode
telephone : Synchronous transfer
15) 4bit seq no in sliding window protocol with selective repeat.
what is the max no. of acks that can be held at transmitter
ans. 8
16) CSMA/CD is used in
a) token ring
b) FDDI
d) ethernet
Ans : d
17) Max no of Acknowledgements for a 4 bit sequence number in a
sliding window protocol.
18) ARP
a) MAC to IP
b) IP to MAC
c)
Ans : b
19) NSF
20) If A sends a message to B with encryption then key is
a)A public key
b)B public key
c)A private key
d)B private key
ans:b
21) if even parity is used for parity generation, what is the
hamming distance
22) the code set is {00000,00111,11100,11011}
what is the error detecting and correcting capability?
ans:2,1
23) IEEE 802.5 is
ans: TOKEN RING
24) bit stuffing used in HDLC Protocol for
25) which is not suitable to find out IP address
ans:ARP
26) IP AND IPX
27) execution phase can be
a. pipelined
b. no parallelism is possible
c. vector processing
d.
28)In public key algorithm , A wants to send message to B .....
which key is used
a. A public key
b. A private key
c. B public key
d. B private key
29) to prevent replay attacks in transmission
a. symmetric encoding
b. Asymmetric encoding
c. for every exchange, key should be changed
30) flow control is used for
a. congestion at receiver
b.
c.
d.
31)If you type in the command
nohup sort employees > list 2 > error out &
and log off ,the next time you log in . the output
will be
a). in a file called list and the error will de typed in
a file error out
b). there will be no file called list or error out
c). error will be logged in a file called list and o/p
will be in error out
d). you will not be allowed to log in
e). none of the above
32) 202.141.65.62 type of IP address belong to which class. Ans:class B
33)What are the funs. of transport layer? What is TCP, UDP, their
differences .....
34) About ARP and RARP.
BFL
35) FTP(transfer a file b/w stations with user authentification)
37)TCP in transport layer (connection oriented)
38)gateway is used (to connect incompatible networks)
39) routers used (in network layer )
40) packets are formed ( in network layer )
41)fork in unix (system call used to create process)
42)make (creation of more than one file )
43)in unix .profile contains ( start up program)
44)in unix echo is used for ( answer C)
44) In unix 'ls 'stores contents in( inode block)
45) 1.which is not used for error correction :
ANS :bit stuffing.
46)which of the following is not fctn of datalink layer:
ANS : Encryption.
47)voltage levels of rs232c:
ANS :+12,-12.
48) which of the following is not used for client/server.
i)RPC,ii)TCP/IP,iii)MESSAGEQs,iv)None
ANS: none.
49) 2) What is ATM
a)Automated teller machine
b) all time money
* c) Asynchronous ttransfer mode
d) Acttive test moniter
50) FDDI is a
* a) ring network
b) star network
c) mesh network
d) bus based network
51) x.25 transfer protocal is used for
a) packet switching
* b) circuit switching
c) framing
d) datagram
52) a t-switch is used to
a) control how message are passed between computers
b) echo every character that received
* c) transmit characers one at a time
d) rearrange the ....
53) 16)which network protocol IBM mainframe and midrange support
* a. SNA
b. TCP/IP
C. X.25
d.IEEE 802.5
54)the achronym DAN stands for
a.data acess nettwork
* b.distributed area network
c.desktop area network
d.disk access node
55) the fctn of datalink layer is:bit stuffing.
56)which of the following is not fctn of datalink layer: Encription.
57)voltage levels of rs232x:+12,-12.
58)which of the following is not used for client/server.
59)RPC,TCP/IP,MESSAGEQs None ans:may be none.
60) RS 232 is standards for
ans:physical layer
61) .25 protocol encapsulates the follwing layers
a)network
b)datalink
c)physical
d)all of the above
e)none of the above
62)TCP/IP can work on
a)ethernet
b)tokenring
c)a&b
d)none
63)x.25 protocol encapsulates the follwing layers
a)network
b)datalink
c)physical
d)all of the above
e)none of the above
64)TCP/IP can work on
a)ethernet
b)tokenring
c)a&b
d)none
65)a node has the ip address 138.50.10.7 and 138.50.10.9.But it is
transmitting data from node1 to node2only. The reason may be
a)a node cannot have more than one address
b)class A should have second octet different
c)classB " " " " "
d)a,b,c
66) the OSI layer from bottom to top
No comments:
Post a Comment
Write your openion about my blog spot..To get automatic facebook updates like my Pagehttps://www.facebook.com/shivashankar4u ..It takes only 1 min to write the comment and to like the page.. Thanks.