0% found this document useful (0 votes)
172 views

Cs8591 Computer Networks Multiple Choice Questions (MCQ) Anna University Regulations 2017

This document contains 40 multiple choice questions about computer networks. The questions cover topics like data network identification codes, wireless LAN standards, the OSI model, IP protocols, networking devices, routing algorithms, and network attacks. The questions are multiple choice with a single correct answer provided for each. The purpose of the document is to test knowledge of fundamental computer networking concepts.

Uploaded by

sonu kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
172 views

Cs8591 Computer Networks Multiple Choice Questions (MCQ) Anna University Regulations 2017

This document contains 40 multiple choice questions about computer networks. The questions cover topics like data network identification codes, wireless LAN standards, the OSI model, IP protocols, networking devices, routing algorithms, and network attacks. The questions are multiple choice with a single correct answer provided for each. The purpose of the document is to test knowledge of fundamental computer networking concepts.

Uploaded by

sonu kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

CS8591 COMPUTER NETWORKS

CS8591 COMPUTER NETWORKS

Multiple Choice Questions (MCQ)

Anna University

Regulations 2017

1
CS8591 COMPUTER NETWORKS

1. How many digits of the DNIC (Data Network Identification Code) identify
the country?

A. First three

B. First four

C. First five

D. First six

E. None of the above

Ans: A (first three)

2. Which Project 802 standard provides for a collision-free protocol?

A. 802.2

B. 802.3

C. 802.5

D. 802.6

Ans: C. 802.5

3. The protocol data unit (PDU) for the application layer in the Internet stack is

A. Segment

B. Datagram

C. Message

D. Frame

Ans: C. Message

4. What is a Firewall in Computer Network?

A. The physical boundary of Network

B. An operating System of Computer Network

C. A system designed to prevent unauthorized access

D. A web browsing Software

www.studymaterialz.in 2
CS8591 COMPUTER NETWORKS

Ans: C. A system designed to prevent unauthorized access

5. Which of the following services is not provided by wireless access point in


802.11 WLAN?

A. Association

B. Disassociation

C. Error correction

D. Integration

Ans: C. Error correction

6. Bridge works in which layer of the OSI model?

A. Application layer

B. Transport layer

C. Network layer

D. Data link layer

Ans: D. Data link layer

7. Why IP Protocol is considered as unreliable?

A. A packet may be lost

B. Packets may arrive out of order

C. Duplicate packets may be generated

D. All of the above

Ans: D. All of the above

8. What are the uses of subnetting ?

A. It divides one large network into several smaller ones

B. It divides network into network classes

C. It speeds up the speed of network

D. None of above

www.studymaterialz.in 3
CS8591 COMPUTER NETWORKS

Ans: A. It divides one large network into several smaller ones

9. The Internet is an example of

A. Cell switched network

B. circuit switched network

C. Packet switched network

D. All of above

Ans: C. Packet switched network

10. What does protocol defines?

A. Protocol defines what data is communicated.

B. Protocol defines how data is communicated.

C. Protocol defines when data is communicated.

D. All of above

Ans: D. All of above

11. What is the use of Ping command?

A. To test a device on the network is reachable

B. To test a hard disk fault

C. To test a bug in an Application

D. To test a Pinter Quality

Ans: A. to test a device on the network is reachable

12. What is the Demilitarized Zone?

A. The area between firewall & connection to an external network

B. The area between ISP to Military area

C. The area surrounded by secured servers

D. The area surrounded by the Military

www.studymaterialz.in 4
CS8591 COMPUTER NETWORKS

Ans: A. The area between firewall & connection to an external network

13. The combination of an IP address and a port number is known as


___________.

A. network number

B. socket address

C. subnet mask number

D. MAC address

Ans: B. socket address

14. Which of the following is reliable communication?

A. TCP

B. IP

C. UPD

D. All of them

Ans: A. TCP

15. What is the size of Host bits in Class B of IP address?

A. 04

B. 08

C. 16

D. 32

Ans: C. 16

16. Which of the following is not associated with the session layer?

A. Dialog control

B. Token management

C. Semantics of the information transmitted

D. Synchronization

www.studymaterialz.in 5
CS8591 COMPUTER NETWORKS

Ans: C. Semantics of the information transmitted

17. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B. provides communication between the Internet Protocol Software on one


machine and the Internet Protocol Software on another

C. reports error conditions to the original source, the source must relate errors to
individual application programs and take action to correct the problem

D. All of the above

E. None of the above

Ans: D.All of the above

18. Your company has a LAN in its downtown office and has now set up a LAN
in the manufacturing plant in the suburbs. To enable everyone to share data and
resources between the two LANs, what type of device(s) are needed to connect
them? Choose the most correct answer.

A. Modem

B. Cable

C. Hub

D. Router

Ans: D. Router

19. Which of the following TCP/IP protocol is used for transferring electronic
mail messages from one machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

E. None of the above

Ans: C. SMTP

www.studymaterialz.in 6
CS8591 COMPUTER NETWORKS

20. Which of the following device is used to connect two systems, especially if
the systems use different protocols?

A. hub

B. bridge

C. gateway

D. repeater

E. None of the above

Ans: C. gateway

21. _______ can detect burst error of length less than or equal to degree of the
polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code

B. CRC

C. VRC

D. None of the above

Ans: B. CRC

22. The PSTN is an example of a ………………… network.

A. packet switched

B. circuit switched

C. message switched

D. None of these

Ans: B. circuit switched

23. When and where RARP is used intentionally or effectively?

A. At the time of network booting where no space to store IP address (or


diskless network) for address resolution.

B. In broadcasting to get IP address of Network.

www.studymaterialz.in 7
CS8591 COMPUTER NETWORKS

C. To get the access in private network whenever it is required.

D. None of the above.

Ans: A. At the time of network booting where no space to store IP address


(or diskless network) for address resolution.

24. Which one of the following routing algorithm can be used for network layer
design?

A. shortest path algorithm

B. distance vector routing

C. link state routing

D. all of the mentioned

Ans: D. all of the mentioned

25. A subset of a network that includes all the routers but contains no loops is
called:

A. spanning tree

B. spider structure

C. spider tree

D. none of the mentioned

Ans: A. spanning tree

26. ICMP is primarily used for:

A. error and diagnostic functions

B. addressing

C. forwarding

D. none of the mentioned

Ans: A. error and diagnostic functions

27. User datagram protocol is called connectionless because:

www.studymaterialz.in 8
CS8591 COMPUTER NETWORKS

A. all UDP packets are treated independently by transport layer

B. it sends data as a stream of related packets

C. both (a) and (b)

D. none of the mentioned

Ans: A. all UDP packets are treated independently by transport layer

28. An endpoint of an inter-process communication flow across a computer


network is called:

A. socket

B. pipe

C. port

D. none of the mentioned

Ans: A. socket

29. A _____ is a TCP name for a transport service access point.

A. port

B. pipe

C. node

D. none of the mentioned

Ans: A. port

30. Which one of the following is a transport layer protocol?

A. stream control transmission protocol

B. internet control message protocol

C. neighbour discovery protocol

D. dynamic host configuration protocol

Ans: A. stream control transmission protocol

31. Physical layer provides:

www.studymaterialz.in 9
CS8591 COMPUTER NETWORKS

A. mechanical specifications of electrical connectors and cables

B. electrical specification of transmission line signal level

C. specification for IR over optical fiber

D. all of the mentioned

Ans: D. all of the mentioned

32. The ____ translates internet domain and host names to IP address.

A. domain name system

B. routing information protocol

C. network time protocol

D. internet relay chat

Ans: A. domain name system

33. When displaying a web page, the application layer uses the:

A. HTTP protocol

B. FTP protocol

C. SMTP protocol

D. none of the mentioned

Ans: A. HTTP protocol

34. This is a time-sensitive service:

A. File transfer

B. File download

C. E-mail

D. Internet telephony

Ans: D. Internet telephony

35. Which of the following is a form of DoS attack?

www.studymaterialz.in 10
CS8591 COMPUTER NETWORKS

A. Vulnerability attack

B. Bandwidth flooding

C. Connection flooding

D. All of the mentioned

Ans: D. All of the mentioned

36. Packet sniffers involve:

A. Active receiver

B. Passive receiver

C. Both of the mentioned

D. None of the mentioned

Ans: B. Passive receiver

37. Identify the incorrect statement:

A. FTP stands for File Transfer Protocol

B. FTP uses two parallel TCP connections

C. FTP sends its control information in-band

D. FTP sends exactly one file over the data connection

Ans: C. FTP sends its control information in-band

38. If 5 files are transferred from server A to client B in the same session. The
number of TCP connection between A and B is:

A. 5

B. 10

C. 2

D. 6

Ans: D. 6

39. Find the FTP reply whose message is wrongly matched:

www.studymaterialz.in 11
CS8591 COMPUTER NETWORKS

A. 331 – Username OK, password required

B. 425 – Can’t open data connection

C. 452 – Error writing file

D. 452 – Can’t open data connection

Ans: D. 452 – Can’t open data connection

40. In an Ethernet local area network, which one of the following statements is
TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.

B. The purpose of the jamming signal is to pad the frames that are smaller than
the minimum frame size.

C. A station continues to transmit the packet even after the collision is detected.

D. The exponential back off mechanism reduces the probability of collision on


retransmissions

Ans: D. The exponential back off mechanism reduces the probability of


collision on retransmissions

41. The first Network:

A. CNNET

B. NSFNET

C. ASAPNET

D. ARPANET

Ans: D. ARPANET

42. Which organization has authority over interstate and international commerce
in the communications field?

A. ITU-T

B. IEEE

C. FCC

www.studymaterialz.in 12
CS8591 COMPUTER NETWORKS

D. ISOC

Ans: C. FCC

43. Which transmission media has the highest transmission speed in a network?

A. coaxial cable

B. twisted pair cable

C. optical fiber

D. electrical cable

Ans: C. optical fiber

44. Baud rate is:

A. number of signal changes per second

B. number of bits per second

C. number of bytes per second

D. number of ASCII characters per second

Ans: A. number of signal changes per second

45. The slowest transmission speeds are those of

A. Coaxial cable

B. Twisted pair wire

C. Fiber-optic cable

D. Microwave

Ans: B. Twisted pair wire

46. The performance of a data communication network depends on

A. The number of users

B. The transmission media

C. The hardware and software

www.studymaterialz.in 13
CS8591 COMPUTER NETWORKS

D. All of the above

Ans: D. All of the above

47. Which of the following to keep track of the individual units of data (called
packets) that a message is divided into for efficient routing through the Internet.

A. Address Resolution Protocol (ARP)

B. Internet Protocol (IP)

C. Hypertext transfer Protocol (HTTP)

D. Transmission Control Protocol/Internet Protocol (TCP/IP)

Ans: D. Transmission Control Protocol/Internet Protocol (TCP/IP)

48. The process of keeping addresses in memory for future use is called

A. Routing

B. Resolving

C. Caching

D. None of the above

Ans: C. Caching

49. A small network making up the Internet and also having a small numbers of
computers within it is called

A. Host

B. Address

C. Subdomain

D. None of the above

Ans: C. Subdomain

50. If a file consisting of 50,000 characters takes 40 seconds to send, then the
data rate is __________.

A. 1 kbps

www.studymaterialz.in 14
CS8591 COMPUTER NETWORKS

B. 1.25 kbps

C. 2 kbps

D. 10 kbps

Ans: D. 10 kbps

Explanation:

50,000 character takes 40 seconds

ie 50,000 * 8 = 40 seconds. (each character is of 8 bits)

In one second → (50,000 * 8)/40 bits / second.

10,000 bits / second.

51. In CRC there is no error if the remainder at the receiver is _____.

A. equal to the remainder at the sender

B. zero

C. nonzero

D. the quotient at the sender

Ans: B. zero

52. Internet-like networks within an enterprise.

A. Intranets

B. Switching alternating

C. Inter organizational networks

D. Extranets

Ans: A. Intranets

53. Sending a file from your personal computer's primary memory or disk to
another computer is called

A. uploading

B. downloading

www.studymaterialz.in 15
CS8591 COMPUTER NETWORKS

C. logging on

D. hangs on

E. None of the above

Ans: A. uploading

54. FDDI is a

A. ring network

B. star network

C. mesh network

D. bus based network

E. None of the above

Ans: A. ring network

55. Which address is the loopback address?

A. 0.0.0.1

B. 127.0.0.0

C. 127.0.0.1

D. 255.255.255.255

Ans: C. 127.0.0.1

56. A modulator converts a _____ signal to a(n) _____ signal.

A. FSK; PSK

B. PSK; FSK

C. analog; digital

D. digital; analog

Ans: C. analog; digital

57. The birthplace of the World Wide Web is considered to be

www.studymaterialz.in 16
CS8591 COMPUTER NETWORKS

A. the Department of Defence

B. CERN

C. ARPA

D. Netscape

Ans: B. CERN

58. What is the port number for HTTP?

A. 99

B. 86

C. 80

D. 23

Ans: C. 80

59. The communication mode that supports data in both directions at the same
time is

A. simplex

B. half-duplex

C. full-duplex

D. multiplex

Ans: C. full-duplex

60. The basic Ethernet design does not provide

A. access control

B. addressing

C. automatic retransmission of a message

D. multiple virtual networks

Ans: C. automatic retransmission of a message

61. What does the acronym ISDN stand for?

www.studymaterialz.in 17
CS8591 COMPUTER NETWORKS

A. Indian Standard Digital Network

B. Integrated Services Digital Network

C. Intelligent Services Digital Network

D. Integrated Services Data Network

Ans: B. Integrated Services Digital Network

62. ASK, PSK, FSK, and QAM are examples of _____ encoding.

A. digital-to-digital

B. digital-to-analog

C. analog-to-analog

D. analog-to-digital

Ans: B. digital-to-analog

63. Who invented the modem?

A. Wang Laboratories Ltd.

B. AT & T Information Systems, USA

C. Apple Computers Inc.

D. Digital Equipment Corpn

Ans: B. AT & T Information Systems, USA

64. With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

Ans: D. 255.255.255.0

65. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?

www.studymaterialz.in 18
CS8591 COMPUTER NETWORKS

A. NBTSTAT

B. Netstat

C. PING

D. Hostname

Ans: C. PING

66. Which Layer is Responsible for Congestion Control?

A. Network Layer

B. Data link Layer

C. Transport Layer

D. Application layer

Ans: C. Transport Layer

67. Pure ALOHA has a maximum throughput of -----------

A.16.4 %

B. 18.4 %

C. 7.4 %

D. 1 %

Ans: B. 18.4 %

68. Which of these is a feature of hubs?

A.Hubs amplifies the incoming signal.

B. Hubs understand frames, packets or headers

C. All lines coming into a Hub must operate at a same speed.

D. all of these

Ans: C. All lines coming into a Hub must operate at a same speed.

69. DSL stands for ------------------------

www.studymaterialz.in 19
CS8591 COMPUTER NETWORKS

A. data subscriber lines

B. dual subscriber lines

C. delay subscriber lines

D. digital subscriber lines

Ans: D. digital subscriber lines

70. Which of the following is a MAC address?

A. 192.166.200.50

B. 00056A:01A01A5CCA7FF60

C. 568, Airport Road

D. 01:A5: BB: A7: FF: 60

Ans: D. 01:A5: BB: A7: FF: 60

71. The main difference between TCP and UDP is

A.UDP is connection oriented whereas TCP is datagram service

B.TCP is an Internet protocol whereas UDP is an ATM protocol

C.UDP is a datagram whereas TCP is a connection oriented service

D.All of the above

Ans: C.UDP is a datagram whereas TCP is a connection oriented service

72. What operates in the Data Link and the Network layer?

A. NIC

B. Bridge

C. Brouter

D. Router

E. None of the above

Ans: C. Brouter

www.studymaterialz.in 20
CS8591 COMPUTER NETWORKS

73. Which file transfer protocol uses UDP?

A. NFS

B. TELNET

C. TFTP

D. FTP

Ans: C. TFTP

74. Which of the following network access standard is used for connecting
stations to a circuit-switched network?

A. X.3

B. X.21

C. X.25

D. X.75

Ans: B. X.21

75. In OSI model, which of the following layer provides error-free delivery of
data?

A. Data link

B. Network

C. transport

D. Session

E. None of the above

Ans: C. transport

76. To avoid transmission errors, a check figure is calculated by the

A. transmitting computer

B. receiving computer

C. both (a) and (b)

www.studymaterialz.in 21
CS8591 COMPUTER NETWORKS

D. Start and stop bit

Ans: C. both (a) and (b)

77. What is the first octet range for a class A IP address?

A. 1 - 126

B. 192 - 255

C. 192 - 223

D. 1 - 127

E. 128 – 191

Ans: A. 1 - 126

78. CSMA (Carrier Sense Multiple Access) is

A. a method of determining which device has access to the transmission


medium at any time

B. a method access control technique for multiple-access transmission media.

C. a very common bit-oriented data link protocol issued by ISO.

D. network access standard for connecting stations to a circuit-switched


network

Ans: B. a method access control technique for multiple-access transmission


media.

79. What is the first octet range for a class B IP address?

A. 128 - 255

B. 1 - 127

C. 192 - 223

D. 128 - 191

E. 127 – 191

Ans: D. 128 - 191

www.studymaterialz.in 22
CS8591 COMPUTER NETWORKS

80. ARP (Address Resolution Protocol) is

A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-


level physical hardware address

B. a TCP/IP high level protocol for transferring files from one machine to
another

C. a protocol used to monitor computers

D. a protocol that handles error and control messages

Ans: A. a TCP/IP protocol used to dynamically bind a high level IP


Address to a low-level physical hardware address

81. The 802.5 standard implements a way for preventing collisions on the
network. How are collisions prevented when using this standard?

A. CSMA/CD

B. Token passing

C. Collision detection

D. Time sharing

E. Switched repeaters

Ans: B. Token passing

82. Terminals are required for

A. real time, batch processing, and timesharing

B. real time, timesharing, and distributed processing

C. real time, distributed processing, and manager inquiry

D. real time, timesharing, and message switching

Ans: D. real time, timesharing, and message switching

83. What OSI layer handles logical address to logical name resolution?

A. Transport

B. Physical

www.studymaterialz.in 23
CS8591 COMPUTER NETWORKS

C. Presentation

D. Data Link

Ans: A. Transport

84. Consider different activities related to email.

m1:Send an email from a mail client to mail server

m2:Download an email from mailbox server to a mail client

m3:Checking email in a web browser

Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP

B. m1:SMTP, m2:FTP, m3:HTTP

C. m1:SMTP, m2:POP, m3:HTTP

D. m1:POP, m2:SMTP, m3:IMAP

Ans: C. m1:SMTP, m2:POP, m3:HTTP

85. One of the header fields in an IP datagram is the Time to Live (TTL) field.
Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets

B. It can be used to reduce delays

C. It can be used to optimize throughput

D. It can be used to prevent packet looping

Ans: D. it can be used to prevent packet looping

86. Which of the following system calls results in the sending of SYN packets?

A. socket

B. bind

C. listen

D. connect

www.studymaterialz.in 24
CS8591 COMPUTER NETWORKS

Ans: D. connect

87. In the slow start phase of the TCP congestion control algorithm, the size of
the congestion window

A. does not increase

B. increases linearly

C. increases quadratically

D. increases exponentially

Ans: D. increases exponentially

88. Match the following:

(P) SMTP (1) Application layer

(Q) BGP (2) Transport layer

(R) TCP (3) Data link layer

(S) PPP (4) Network layer

(5) Physical layer

A. P – 2 Q – 1 R – 3 S – 5

B. P – 1 Q – 4 R – 2 S – 3

C. P – 1 Q – 4 R – 2 S – 5

D. P – 2 Q – 4 R – 1 S – 3

Ans: B. P – 1 Q – 4 R – 2 S – 3

89. What is the maximum size of data that the application layer can pass on to
the TCP layer below?

A. Any size

B. 2^16 bytes-size of TCP header

C. 2^16 bytes

D. 1500 bytes

www.studymaterialz.in 25
CS8591 COMPUTER NETWORKS

Ans: A. Any size

90. A computer on a 10Mbps network is regulated by a token bucket. The token


bucket is filled at a rate of 2Mbps. It is initially filled to capacity with
16Megabits. What is the maximum duration for which the computer can
transmit at the full 10Mbps?

A. 1.6 seconds

B. 2 seconds

C. 5 seconds

D. 8 seconds

Ans: B. 2 seconds

Explanation:

Tokens are added at the rate of r bytes/sec which is 2Mbps in the given
question.

Capacity of the token bucket (b) = 16 Mbits

Maximum possible transmission rate (M) = 10Mbps

So the maximum burst time = b/(M-r) = 16/(10-2) = 2 seconds

91. In Ethernet when Manchester encoding is used, the bit rate is:

A. Half the baud rate.

B. Twice the baud rate.

C. Same as the baud rate.

D. none of the above

Ans: A. Half the baud rate.

92. Station A needs to send a message consisting of 9 packets to Station B using


a sliding window (window size 3) and go-back-n error control strategy. All
packets are ready and immediately available for transmission. If every 5th
packet that A transmits gets lost (but no acks from B ever get lost), then what is
the number of packets that A will transmit for sending the message to B?

www.studymaterialz.in 26
CS8591 COMPUTER NETWORKS

A. 12

B. 14

C. 16

D. 18

Ans: C. 16

Explanation:

Total 16 packets are sent. See following table for sequence of events. Since
go-back-n error control strategy is used, all packets after a lost packet are
sent again.

Sender Receiver

2 1

3 2

4 3

5 4

7 6

[Timeout for 5]

6 5

7 6

www.studymaterialz.in 27
CS8591 COMPUTER NETWORKS

[Timeout for 7]

8 7

9 8

[Timeout for 9]

93. Determine the maximum length of the cable (in km) for transmitting data at
a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume
the signal speed in the cable to be 2,00,000 km/s.

A.1

B.2

C.2.5

D.5

Ans: B.2

Explanation:

Data should be transmitted at the rate of 500 Mbps.

Transmission Time >= 2*Propagation Time

=> 10000/(500*1000000) <= 2*length/200000

=> lenght = 2km (max)

94. Let G(x) be the generator polynomial used for CRC checking. What is the
condition that should be satisfied by G(x) to detect odd number of bits in error?

A.G(x) contains more than two terms

B.G(x) does not divide 1+x^k, for any k not exceeding the frame length

www.studymaterialz.in 28
CS8591 COMPUTER NETWORKS

C.1+x is a factor of G(x)

D.G(x) has an odd number of terms.

Ans: C.1+x is a factor of G(x)

95. In serial data transmission, every byte of data is padded with a ‘0’ in the
beginning and one or two ‘1’ s at the end of byte because

A.Receiver is to be synchronized for byte reception

B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits

C. Padded bits are useful in parity computation

D. None of these

Ans: A.Receiver is to be synchronized for byte reception

96. Which one of the following statements is FALSE?

A. Packet switching leads to better utilization of bandwidth resources than


circuit switching.

B. Packet switching results in less variation in delay than circuit switching.

C. Packet switching requires more per packet processing than circuit switching

D. Packet switching can lead to reordering unlike in circuit switching

Ans: B. Packet switching results in less variation in delay than circuit


switching.

97. Which of the following statements is FALSE regarding a bridge?

A. Bridge is a layer 2 device

B. Bridge reduces collision domain

C. Bridge is used to connect two or more LAN segments

D. Bridge reduces broadcast domain

Ans: D. Bridge reduces broadcast domain

www.studymaterialz.in 29
CS8591 COMPUTER NETWORKS

98. In a packet switching network, if the message size is 48 bytes and each
packet contains a header of 3 bytes. If 24 packets are required to transmit the
message, the packet size is ________.

A. 2 bytes

B. 1 bytes

C. 4 bytes

D. 5 bytes

Ans: D. 5 bytes

Explanation:

There are 24 packets and 48 byte of data, So 48 / 24 = 2 byte data for


each packet.

Header size is 3 byte 2 + 3 = 5 byte will be the size of data packet.

99. In Ethernet CSMA/CD, the special bit sequence transmitted by media access
management to handle collision is called

A. Preamble

B. Post amble

C. Jam

D. None of the above

Ans: C. Jam

100. What will be the efficiency of a Stop and Wait protocol, if the transmission
time for a frame is 20ns and the propagation time is 30ns?

A. 20%

B. 25%

C. 40%

D. 66%

Ans: B. 25%

www.studymaterialz.in 30
CS8591 COMPUTER NETWORKS

Explanation:

Efficiency of stop and wait protocol = 1 / (1 + 2a) where, a = tpd / tx


tpd = propagation delay tx = transmission delay

Efficiency = 1 / (1 + 2(30/20))

= 1/4 * 100

= 25 %

www.studymaterialz.in 31

You might also like