Vous êtes sur la page 1sur 6

1. Give the three important network criterias. Answer: Performance, Reliability, Security 2.

It is the type of connection which provides a dedicated link between two devices. Answer: Point-to-point 3. Give atleast three categories of network topology. Answers: Star, Bus, Mesh, Ring (any) 4. It is usually privately owned links the devices in a single office, building, or campuses. Answer: Local Area Network 5. What are the three categories of network. Answers: Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Networks (MAN) 6. Performance is inversely related to delay. When you use the Internet, which of the following applications are more sensitive to delay? a. Sending an e-mail b. Copying a file c. Surfing the Internet. Answer: c. Surfing the Internet 7. What are the 7 layers in the OSI model? Answers: Physical, Data Link, Network, Transport, Session, Presentation, Application 8. In TCP/IP protocol what are the layers equivalent to OSI model? Answer: Physical, Network, Transport, Application 9. It is the transmission mechanism used by the TCP/IP protocols. It is an unreliable and connectionless protocol-a best-effort delivery service. Answer: Internetworking Protocol (IP) 10. In TCP/IP what are the different protocols under Network Layer. Give atleast three. Answer: Internetworking Protocol (IP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), Internet Control Message Protocol (ICMP), Internet Group Message Protocol (IGMP) (any) 11. In TCP/IP what are the different protocols under Transport Layer. Give atleast two. Answer: User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Stream Control Transmission Protocol (SCTP) 12. Four levels of addresses used in an internet employing the TCP/IP protocols. Answers: Physical Address, Logical Address, Port Address, Specific Address 13. The layer which is responsible for the process-to-process delivery of the entire message. Answer: Transport Layer

14. The layer which is responsible for the source-to-destination delivery of a packet across multiple network links. Answer: Network Layer 15. It is an/a address uniquely defines a host on the Internet. Answer: IP address 16. A/an address which is a user-friendly address. Answer: Specific address 17. What are the formulas for frequency and period. Answer: f = 1/T, T = 1/f 18. It means a loss of energy. Answer: Attenuation 19. It means that the signal change its form or shape. Answer: Distortion 20. It is the measure of how fast we can actually send data through a network. Answer: Troughput 21. It defines how long it takes for an entire message to completely arrive at the destination from the time the first bit is sent out from the source. Answer: Latency or Delay 22. It measures the time required for a bit to travel from the source to the destination. Answer: Propagation time 23. Another performance issue that is related to delay. Answer: Jitter 24. Data must be transformed to __________ signals to be transmitted. Answer: electromagnetic 25. What are the three Pulse Code Modulation processes? Answers: Sampling, Quantizing, Encoding 26. What is the relationship between period and frequency? Answer: Inversely Proportional 27. The most common technique to change an analog signal to digital data (digitization). Answer: Pulse Code Modulation (PCM)

28. It is used at the sender site to create a stream of bits from an analog signal. Answer: Modulator 29. In transmission modes, what are the three subclasses of serial transmission? Answer: Asynchronous, Synchronous, Isochronous 30. It is the process of converting digital data to a digital signal. Answer: Line Coding 31. What are the three techniques in digital-to-digital conversion? Answer: Line coding, Block coding, Scrambling. 32. It is used to ensure synchronization and inherent error detection. Answer: Redundancy 33. Give atleast three coding schemes? Answer: Unipolar Scheme, Polar Scheme, Bipolar Scheme, Multilevel Scheme, Multitransition Scheme (any) 34. Digital-to-analog conversion can be accomplished in several ways. Give atleast two. Answer: Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), and Phase Shift Keying (PSK). Quadrature Amplitude Modulation (QAM) combines ASK and PSK. 35. It is the combination of Amplitude Shift Keying and Phase Shift Keying. Answer: Quadrature Amplitude Modulation 36. The amplitude of the carrier signal is varied to create signal elements. Both frequency and phase remain constant while the amplitude changes. Answer: Amplitude Shift Keying (ASK) 37. The phase of the carrier is varied to represent two or more different signal elements. Both peak amplitude and frequency remain constant as the phase changes. Answer: Phase Shift Keying (PSK) 38. It is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Answer: Multiplexing

39. What are the three categories of multiplexing? Answer: Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), Wave-length Division Multiplexing (WDM) 40. It uses a series of filters to decompose the multiplexed signal into its constituent component signals. Answer: Demultiplexer 41. It is a digital process that allows several connections to share the high bandwidth of a link. Answer: Time Division Multiplexing (TDM) 42. It is the use of available bandwidth to achieve specific goals. Answer: Bandwidth Utilization 43. It is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted. Answer: Frequency Division Multiplexing 44. Give three example of guided medium. Answer: Twisted-pair cable, Coaxial cable, Optical fiber 45. Are waves used for short-range communications such as those between a PC and a peripheral device. Answer: Infrared waves 46. Give the three propagation methods. Answer: Ground wave propagation, Sky Wave Propagation, Line-of-sight propagation 47. Unguided media uses what type of medium? Answer: Free space 48. The switched network consists three methods of switching. Answer: Circuit switching, Packet switching, Message switching. 49. Type of switching that there is no resource allocation for a packet. Answer: Packet Switching

50. What are the three major components of telephone network? Answer: Local loops, Trunks, Switching offices. 51. What do you mean by DSL? Answer: Digital Subscriber Line

52. What is the cyclical error detection? Answer: Cyclical Redundancy Check 53. What is HDLC? Answer: High-level Data Link Control 54. It is s technique used to improve the efficiency of the bidirectional protocols. Answer: Piggybacking 55. It uses byte stuffing; a special byte added to the data section of the frame when there is a character with the same pattern as the flag. Answer: Byte-oriented protocols 56. It refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Answer: Flow Control 57. It uses bit stuffing; an extra 0 is added to the data section of the frame when there is a sequence of bits with the same pattern as the flag. Answer: Bit-oriented protocols 58. It refers to methods of error detection and correction. Answer: Error Control 59. What are the three categories of multiple access protocols? Answer: Random Access Protocol, Controlled-Access Protocol, Channelization Protocol 60. It is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Answer: Channelization 61. What type of channelization protocol if the available bandwidth is divided into frequency bands. Answer: Frequency-Division Multiple Access (FDMA)

62. What type of channelization protocol if the stations share the bandwidth of the channel in time. Answer: Time Division Multiple Access (TDMA) 63. What type of channelization protocol if the stations use different codes to achieve multiple access. Answer: Code Division Multiple Access (CDMA) 64. A method where the station needs to make a reservation before sending data. Answer: Reservation Access Method 65. It provides support for newer applications such as voice over the Internet. Answer: Stream Control Transmission Protocol (SCTP) 66. It is used to associate a logical address with a physical address. Answer: Address Resolution Protocol (ARP) 67. It is a cross network between a circuit-switched network and a datagram network. Answer: Virtual-circuit network 68. A component of telephone network that a twisted-pair cable that connects the subscriber telephone to the nearest end office or local central office. Answer: Local Loops 69. To avoid having a permanent physical link between any two subscribers, the telephone company has switches located in a ___________. Answer: Switching Office 70. Determine the number of synchronous pulses required for a message transmitted using 6x6 matrix sum coding technique coded in ASCII, the system efficiency is 36%. Answer: 357 pulses 71. Determine the required hamming code if the hamming bits are placed after 2,5,9, etc. 011000100010001000110. Answer: 11101

Vous aimerez peut-être aussi