0% found this document useful (0 votes)
2K views2 pages

Important Questions Computer Networks: Question Bank

The document contains questions about computer networks. It asks about layers in the OSI model and examples of each layer. It also asks about transmission media in the physical layer, random access protocols with examples, design issues in the network layer, advantages of token passing over CSMA/CD, why protocols are needed, and multiple choice questions about networking topics.

Uploaded by

venkiscribd444
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views2 pages

Important Questions Computer Networks: Question Bank

The document contains questions about computer networks. It asks about layers in the OSI model and examples of each layer. It also asks about transmission media in the physical layer, random access protocols with examples, design issues in the network layer, advantages of token passing over CSMA/CD, why protocols are needed, and multiple choice questions about networking topics.

Uploaded by

venkiscribd444
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Important Questions Computer Networks

 Explain briefly about layers in OSI model with examples each ?


 Explain the concept of transmission media present in physical layer?
 Explain the random access protocols with a example each?
 Explain the design issues of network layer?
  List out advantage of token passing protocol over CSMA/CD
protocol?
 Describe Why are protocols needed?

Question Bank

 Start and Stop bits are used in a serial communication for [ ]


a. Error Detection b. Error Correction c. Synchronization d. None
 A high speed communication equipment typically would not be needed [ ]
a. Email b. Message c.LAN Communication d. None
 The method communication in which transmission takes place in both directions, but
only in one direction at a time is called________ [ ]
a. Simplex b.Half duplex c. Full duplex d. None
 Protocols are [ ]
a. Agreement on how communication components
b. Physical communication channels are used for transferring data
c. Both a&b
d. None
 How layers are there in TCP/IP model [ ]
a. 4Layers b. 7 Layers c. 6 Layers d. 8 Layers
 How many bits are there in Ethernet address [ ]
a. 64 bits b. 32 bits c. 16 bits d. None
 The Network Layer concerns with [ ]
a. Bits b. Frames c. Packets d. None
 The 4 bit IP address consists of [ ]
a. Network address b. Port address c. both a&b d. None
 Multi Access Control is Divided in to [ ]
a. 2 b. 3 c. 4 d. 1
 Error detection at the Data Link Level achieved by [ ]
a.Cyclic redundancy code b. Bit Stuffing c. Hamming Code d. Equalization
 In pure ALOHA, channel utilization, expressed throughput S, in terms of offered load
G is given by ____________

 Ethernet uses ________________ coding.

 When the frame returns to the sending station, that station removes the frame from
the ring by a process called ________________.

 ______________ ensures that error free data is transferred between the adjacent
nodes in the network.

 The last address of IP Address represents _______________.


 ______________________ Layer of OSI model also called end to end layer.

 _____________________ provides a connection oriented reliable service for sending


Messages.

 Bridge works in ___________________ layer of OSI model.

 The technique in which the data link layer automatically stuff bit ‘0’ after five
consecutive 1’s____________________.

 In _________________ scheme transmission proceeds immediately if the carrier is


Idle.

You might also like