306 Computer Network Unit 3
306 Computer Network Unit 3
UNIT 3
What is the primary function of the data link layer in the OSI model?
A) TCP
B) IP
C) Ethernet
D) HTTP
Answer: C) Ethernet
What does the term "framing" refer to in the data link layer?
Answer: C) The method of defining the start and end of a data packet
Which of the following is NOT a type of error detection technique used in the data link layer?
A) Parity Check
C) Checksum
D) Encryption
Answer: D) Encryption
Answer: B) To manage the rate of data transmission between sender and receiver
Which protocol uses a method called "Carrier Sense Multiple Access with Collision Detection"
(CSMA/CD)?
A) Token Ring
D) Frame Relay
What is the primary purpose of an address resolution protocol (ARP) at the data link layer?
D) To encrypt data
D) To compress data
What does "error correction" mean in the context of the data link layer?
Which of the following is a common data link layer protocol used in wireless networks?
A) Ethernet
B) Token Ring
A) Star topology
B) Ring topology
C) Bus topology
D) Mesh topology
A) Frame synchronization
B) Routing of packets
C) Physical addressing
A) 512 bytes
B) 1500 bytes
C) 9000 bytes
D) 64 bytes
A) CSMA/CD
B) Token passing
D) Polling
Answer: C) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
What does the term "bit stuffing" refer to in the data link layer?
Which of the following is a characteristic of Asynchronous Transfer Mode (ATM) at the data link
layer?
What is the role of the Logical Link Control (LLC) sublayer in the data link layer?
A) IP addressing
B) MAC addressing
C) Logical addressing
D) Port addressing
What is the primary goal of implementing Quality of Service (QoS) at the data link layer?
D) It is simple to implement.
What does the term "sliding window" refer to in data link protocols?
Which protocol allows the sender to send multiple frames before needing an acknowledgment?
A) Stop-and-Wait
B) Go-Back-N
C) Selective Repeat
Answer: B) Go-Back-N
What is the main advantage of the Selective Repeat protocol over Go-Back-N?
A) Simplicity in implementation
D) Higher latency
What happens in the Sliding Window protocol when the window size is increased?
Answer: A) The sender can transmit more frames before needing an acknowledgment.
A) Go-Back-N
B) Stop-and-Wait
C) Selective Repeat
Answer: A) Go-Back-N
What is the primary function of the acknowledgment (ACK) in data link protocols?
In the Go-Back-N ARQ protocol, if the sender's window size is N, what is the maximum number of
frames that can be sent without receiving an acknowledgment?
A) N-1
B) N
C) N+1
D) 2N
Answer: B) N
In the context of data link protocols, what does the term "frame" refer to?
A) HDLC
B) TCP
C) UDP
D) X.25
Answer: A) HDLC
A) Complexity in implementation
D) Low latency
What is the role of the sender in the Selective Repeat protocol when it receives a NAK (Negative
Acknowledgment)?
Answer: B) It retransmits only the specified frame that was not acknowledged.
Which of the following scenarios would likely benefit most from the use of the Sliding Window
protocol?
A) High-latency satellite communication
What is one of the main reasons for using a combination of protocols in a communication system?
A) To increase complexity
C) End-to-end communication
D) Data encryption
A) To encrypt data
C) To compress data
How many parity bits are required for a Hamming code that can correct one-bit errors in a 7-bit data
word?
A) 2
B) 3
C) 4
D) 7
Answer: B) 3
In Hamming code, what is the relationship between the number of data bits (k) and the number of
total bits (n)?
B) n = k × r
C) n = k - r
D) n = k^2
What is the maximum number of errors that Hamming code can correct?
B) Two-bit errors
C) Three-bit errors
D) None
A) 3
B) 4
C) 7
D) 11
Answer: B) 4
Which of the following statements is true regarding parity bits in Hamming code?
B) Parity bits are used only for error detection, not correction.
If a Hamming code has 7 bits total, how many bits are used for error correction?
A) 2
B) 3
C) 4
D) 1
Answer: B) 3
B) By using the syndrome to identify the error's position and flipping the bit
Answer: B) By using the syndrome to identify the error's position and flipping the bit
What is the maximum number of parity bits needed to correct errors in a block of k data bits?
A) r ≤ k
B) r ≤ log2(k + r + 1)
C) r = k/2
D) r = k + 1
Answer: B) r ≤ log2(k + r + 1)
In Hamming code, what does the parity bit for position 1 check?
A) All bits
B) Bits in positions that have a binary representation with the least significant bit as 1
Answer: B) Bits in positions that have a binary representation with the least significant bit as 1
If a received Hamming code word is determined to have an error at position 5, what action should be
taken?
Which of the following represents a valid Hamming code for the data bits 1011?
A) 1110110
B) 1001100
C) 1101001
D) 0111010
Answer: A) 1110110
A) Single-bit error
B) Two-bit error
C) Burst error
In Hamming code, if the total number of bits is 15, how many data bits can be accommodated?
A) 8
B) 7
C) 11
D) 12
A) To encrypt data
B) To compress data
A) Modular arithmetic
B) Prime factorization
C) Binary division
D) Boolean algebra
What happens if the CRC value calculated at the receiver does not match the appended CRC?
B) Data encryption
C) Data compression
D) Network routing
B) CRC can detect burst errors more effectively than single-bit errors.
Answer: B) CRC can detect burst errors more effectively than single-bit errors.
A) One bit
B) Two bits
B) CRC-16
C) CRC-32
D) CRC-4
Answer: C) CRC-32
A) Decimal
B) Binary
C) Hexadecimal
D) Octal
Answer: B) Binary
B) Simplicity in implementation
D) Efficiency in overhead
When using CRC, how are bits shifted during the calculation?
A) Left-shifted
B) Right-shifted
C) Circularly shifted
D) Randomly shifted
Answer: A) Left-shifted
If a received message has a non-zero CRC value, what does that indicate?
A) As a binary number
B) As a hexadecimal number
C) As a decimal number
D) As a string of characters
A) To compress data
C) To encrypt data
In odd parity, what is added to a data set with an even number of 1s?
A) 0
B) 1
D) A checksum is added.
Answer: B) 1
D) Parity bits help to maintain the integrity of the data during transmission.
Answer: D) Parity bits help to maintain the integrity of the data during transmission.
B) Double-bit error
C) Burst error
In a data packet of 8 bits, if the number of 1s is 5, what would be the even parity bit?
A) 0
B) 1
D) A checksum is added.
Answer: B) 1
If a system uses even parity and receives the data 1101001, what does it assume about the
transmission?
Which of the following scenarios would require the use of parity checking?
What is the overhead associated with adding a parity bit to a data packet?
In a scenario using odd parity, what should the parity bit be for the data 011011?
A) 0
B) 1
D) A checksum is added.
Answer: A) 0
Which parity scheme is more reliable for error detection?
A) Even parity
B) Odd parity
D) Neither is reliable
Answer: C) Both are equally reliable (as they can only detect single-bit errors).
What is the maximum number of errors that can be detected using parity checking?
A) 1 error
B) 2 errors
D) None
Which method can be combined with parity to enhance error detection capabilities?
A) Hamming code
B) Data compression
C) Encryption
C) Data encryption
D) Data compression
Answer: B) Error detection in data packets
If a system uses even parity and the original data is 1010, what will the transmitted data be including
the parity bit?
A) 1010
B) 10101
C) 10100
D) 10010
Answer: C) 10100
A) To encrypt data
B) To compress data
A) Data encryption
C) Data compression
D) Network routing
What happens if the calculated checksum does not match the transmitted checksum?
A) XOR checksum
D) CRC checksum
C) Random errors
B) XOR checksum
D) CRC
Answer: C) One’s complement checksum
A) CRC
B) MD5
C) SHA-256
A) 00101100
B) 00101101
C) 11010010
D) 00000000
Answer: A) 00101100
A) 4 bits
B) 8 bits
C) 16 bits
D) 32 bits
Answer: C) 16 bits
D) To authenticate users
Answer: C) Adding up the values of all bytes and taking the complement
Why might a checksum not be sufficient for all error detection needs?
A) CRC checksum
C) MD5 checksum
D) XOR checksum
B) To connect devices within the same network and manage data traffic
Answer: B) To connect devices within the same network and manage data traffic
A) By using IP addresses
A) Physical Layer
C) Network Layer
D) Transport Layer
A) To store IP addresses
Answer: B) To map MAC addresses to switch ports for efficient data forwarding
What happens when a switch receives a frame with an unknown destination MAC address?
What is the process called when a switch learns the MAC addresses of devices on the network?
A) Filtering
B) Learning
C) Flooding
D) Routing
Answer: B) Learning
B) 255 devices
C) Unlimited
Which switching method allows a switch to start forwarding a frame as soon as it receives the
destination address?
A) Store-and-Forward Switching
B) Cut-Through Switching
C) Fragment-Free Switching
D) Virtual Switching
A) Increased latency
C) Higher cost
A) Virtual Local Area Network; to segment network traffic for better management
Answer: A) Virtual Local Area Network; to segment network traffic for better management
A) It ignores them.
Answer: A) A feature that allows only authorized devices to connect to specific ports
Which type of switch is typically used in larger networks for traffic management?
A) Unmanaged switch
B) Layer 2 switch
C) Layer 3 switch
D) Hub
A) Layer 2 switches operate only on MAC addresses; Layer 3 switches can route based on IP
addresses.
D) There is no difference.
Answer: A) Layer 2 switches operate only on MAC addresses; Layer 3 switches can route based on IP
addresses.
Answer: B) To combine multiple network connections for higher bandwidth and redundancy
Answer: B) Excessive broadcast traffic flooding the network, causing performance issues
A) To encrypt data
C) To compress data
A) Controlled access
B) Random access
C) Token-based access
D) Time-division access
B) Wireless networks
C) Optical networks
A) High cost
B) Complexity
D) Limited range
A) Users transmit whenever they have data, without waiting for a time slot
Answer: A) Users transmit whenever they have data, without waiting for a time slot
A) 18.4%
B) 36.8%
C) 50%
D) 100%
Answer: A) 18.4%
A) 18.4%
B) 36.8%
C) 50%
D) 100%
Answer: B) 36.8%
Answer: C) The transmitting stations wait a random amount of time before retransmitting.
In a scenario using Slotted ALOHA, if the time slot duration is too long, what might occur?
A) Increased throughput
B) Simple implementation
D) Low delay
What is the primary reason for using random access protocols like ALOHA?
B) Satellite communication
In which situation would you prefer using ALOHA over other multiple access protocols?
A) A successful transmission
B) Token Ring
C) Frame Relay
A) High cost
C) Complexity of implementation
A) Collision Detection
B) Collision Domain
C) Circuit Design
D) Channel Division
A) Physical Layer
C) Network Layer
D) Transport Layer
D) By increasing bandwidth
A) Wi-Fi
B) Ethernet
C) Token Ring
D) Bluetooth
Answer: B) Ethernet
In a CSMA/CD system, after a collision is detected, what method is commonly used to wait before
retransmitting?
C) Immediate retransmission
A) 18.4%
B) 36.8%
C) 66.7%
D) 100%
Answer: C) 66.7%
A) Increased efficiency
B) Decreased collisions
What is the primary reason for the decline in the use of CSMA/CD in modern networks?
D) Complexity of configuration
Answer: B) A technique that allows devices to transmit whenever they have data
B) Possibility of collisions
What happens when two devices transmit simultaneously in a random access protocol?
A) Token Ring
B) ALOHA
D) Frame Relay
Answer: B) ALOHA
B) To maximize throughput
Answer: C) To allow multiple users to share the same communication channel efficiently
A) Immediate retransmission
C) Priority queuing
A) 18.4%
B) 36.8%
C) 50%
D) 100%
Answer: A) 18.4%
Which protocol variant improves the efficiency of Pure ALOHA by introducing time slots?
A) Slotted ALOHA
B) CSMA
C) CSMA/CD
Answer: C) They can lead to high collision rates under heavy load.
Which of the following situations is most suitable for random access protocols?
A) Application Layer
B) Transport Layer
C) Network Layer
A) ALOHA
B) CSMA/CD
C) Token Ring
D) TDM
Answer: B) CSMA/CD
What is the main purpose of implementing a backoff algorithm in random access protocols?
A) Simplicity of implementation
What type of traffic pattern is most efficiently handled by random access protocols?
B) Bursty traffic
In which application scenario might you prefer using a random access protocol?
What is the primary reason for the decline in the use of ALOHA in modern networks?
A) High complexity
B) Limited scalability
A) ALOHA
B) CSMA/CD
C) Token Ring
A) Random access
B) Token passing
D) Carrier sensing
C) Simplicity of implementation
D) Elimination of collisions
In a polling system, how does the master device determine which slave device can transmit?
A) By random selection
Which type of network topology is typically associated with controlled access protocols like Token
Ring?
A) Star topology
B) Bus topology
C) Ring topology
D) Mesh topology
Which of the following describes a scenario where controlled access protocols are most beneficial?
In controlled access protocols, what is a common way to resolve contention for the medium?
A) Token Ring
B) Polling
C) CSMA/CA
D) Token Bus
Answer: C) CSMA/CA
Which protocol might be used in a network where devices need to share a medium without
collisions?
A) Ethernet
B) Token Ring
C) ALOHA
D) CSMA/CD
In a controlled access environment, what typically happens to network efficiency during high traffic?
B) Polling
C) Token passing
D) Carrier sensing
B) Possibility of collisions
A) Network Layer
C) Transport Layer
D) Application Layer
A) 1518 bytes
B) 1024 bytes
C) 2048 bytes
D) 4096 bytes
A) Token passing
B) Acknowledgment messages
D) Polling
Answer: D) The devices wait for a random backoff time before retransmitting.
A) 100BASE-T
B) 10BASE-T
C) 1000BASE-T
D) 10GBASE-T
Answer: B) 10BASE-T
A) Cat5e
B) Fiber optic
C) Coaxial
D) HDMI
Answer: D) HDMI
Answer: B) Full-duplex allows simultaneous two-way communication, while half-duplex does not.
A) 10BASE-T
B) 100BASE-T
C) 1000BASE-T
D) 10GBASE-T
Answer: C) 1000BASE-T
What is the function of the CRC (Cyclic Redundancy Check) in an Ethernet frame?
B) Star topology
C) Bus topology
D) Mesh topology
Answer: C) Bus topology (though modern Ethernet typically uses star topology with switches)
A) To amplify signals
C) To serve as a router
In which scenario would you typically use a crossover cable in an Ethernet network?
Which Ethernet protocol variant allows for the use of VLANs (Virtual Local Area Networks)?
A) 10BASE-T
B) 802.1Q
C) CSMA/CD
D) 1000BASE-SX
Answer: B) 802.1Q
A) To increase speed
In Ethernet networks, what does the term "collision domain" refer to?
Answer: C) The portion of the network where packet collisions can occur