Computer Networks (CSC343) - Quiz - 01
Computer Networks (CSC343) - Quiz - 01
1. In a _______ connection, more than two devices can share a single link.
A. point-to-point
B. multipoint
C. primary
D. secondary
2. _______ is the protocol suite for the current Internet.
A. TCP/IP
B. NCP
C. UNIX
D. ACM
3. In a ______ connection, two and only two devices are connected by a dedicated link.
A. multipoint
B. point-to-point
C. (a) and (b)
D. none of the above
7. Mail services are available to network users through the _______ layer.
A. data link
B. physical
C. transport
D. application
9. In the OSI model, encryption and decryption are functions of the ________ layer.
A. transport
B. session
C. presentation
D. application
10. To deliver a message to the correct application program running on a host, the _______ address must be
consulted.
A. port
B. IP
C. physical
D. none of the above
11. The _______ layer is responsible for delivering data units from one station to the next without errors.
A. transport
B. network
C. data link
D. physical
12. The ______ layer is responsible for the source-to-destination delivery of a packet across multiple network
links.
A. transport
B. network
C. data link
D. physical
Part 2: Short Questions [70] All questions carry equal marks (10)
1. Consider a three-layer protocol. The layers from top to bottom are application, transport, and network. All
layers use headers, and the transport layer also uses a trailer. Sketch a packet showing headers and trailers
for this protocol.
2. Which address does a NIC use when deciding whether to accept a frame?
3. Assuming that a PSTN has a bandwidth of 3000Hz and a typical signal-to-noise power ratio of 20 dB,
determine the maximum theoretical information (data) rate that can be achieved.
4. We have a channel with 5kHz bandwidth. If we want to send data at 150 Kbps, what is the minimum SNR dB?
What is SNR?
5. Two nodes were communicating a while ago, but after some time, communication got stopped; how
connectivity or link between the nodes can be checked.
6. Network performance is often measured through throughput and latency (delay), so these two criteria are
often contradictory.
7. The following data fragment occurs in the middle of a data stream for which the character stuffing algorithm
described in the text is used:
ETX , ESC , A , ESC , B , ETX , ETX. What is the output after stuffing?