79193954 Data Communications and Computer Networks
-
Upload
anjali-naidu -
Category
Documents
-
view
69 -
download
1
description
Transcript of 79193954 Data Communications and Computer Networks
EVALUATION SYSTEM
COURSE FILE
SUBJECT NAME: DATA COMMUNICATIONS AND COMPUTER NETWORKS
CLASS: III / IDEPARTMENT: COMPUTER SCIENCE AND ENGINEERING
FACULTY NAME: T.Lakshmi Lavanya
DATA COMMUNICATIONS AND COMPUTER NETWORKS
COURSE FILEName of the Faculty: T.Lakshmi LavanyaClass: III / CSE
Academic Year: 2013-2014
Document No.ECEW//IT/ES/II/I.1/CF/DCCN
INDEX
COURSE FILE
Subject: Data Communications and Computer Networks Branch: Computer Science and EngineeringName of Faculty: T.Lakshmi Lavanya Academic Year: 2013-2014 Semester: I
Sno. Topic Page No.
1 Syllabus
2 Objective
3 Target
4 Session Planner
5 Syllabus coverage
6 Time Table
7 Lecture wise handwritten class notes
8 Assignments
9 Tutorial
10 Question Bank/Papersa. Subjective unit wiseb. Objective unit wise
11 Sample Assignments
12 Sample Solved Question Paper
13 HOD Review
14 Course Completion Certificate
15 Additional teaching material viz. PPT’s, OHP’s, downloaded material etc.. in a separate file
SYLLABUS
Subject: Data Communication and Computer NetworksBranch: III-CSEAcademic Year: 2013-2014 Semester: IFaculty:T.Lakshmi Lavanya
DAT COMMUNICATION AND COMPUTER NETWORKS
UNIT IIntroduction: Data communications, Networks, The Internet, protocols and Standards, Network Models. Layered tasks. The OSI Model, Layers in the OSI Model. TCP/IP Protocol Suite. Addressing, Physical layer and Media. Data and Signals. Analog and Digital, periodic, Analog Signals, Digital Signals. Transmission impairment. Data rate Limits, performance, Digital Transmission, Digital-to- Digital Conversion, Analog-to-digital Conversion, Analog Transmission, Digital -to-Analog conversion, Analog-To-Analog Conversion.
UNIT II
Bandwidth utilization: Multiplexing and Spreading, Multiplexing, spread Spectrum, Transmission Media, Guided Media, Unguided media: wireless, Switching, circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks, Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks, Dial-up Modems, Digital Subscriber Line, Cable TV networks, Cable TV for Data Transfer.
UNIT III
Error Detection and correction , Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing, Flow and error Control , protocols, Noiseless Channels, HDLC, Point-to-Point protocol, Multiple Access, random Access, Aloha, Controlled Access, Channelization, IEEE standards , standard Ether net , changes in the standard. Fast Ethernet, Gigabit Ethernet, IEEE802.11, Bluetooth.
UNIT IV
Connecting LAN’s. Backbone Networks, and Virtual LANs, Connecting Devices, Backbone networks virtual LANs, cellular telephony, Satellite Networks, sonnet/SDH architecture, sonnet Layers, Sonet Frames, STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks, frame relay and ATM, Frame Relay, ATM, ATM LANs.
UNIT V
Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses, network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6. Network Layer Address Mapping, Error Reporting and Multicasting, address mapping, ICMP, IGMP, ICMPv6, Network Layer: Delivery, Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.
UNIT VI Transport Layer: process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery, User datagram protocol (UDP), TCP, SCTP, Congestion control and Quality of service. Data Traffic. Congestion , congestion control, two Examples, Quality service, Techniques to improve QOS, Integrated Services, Differentiated services, QOS in Switched networks.
UNIT VIIApplication layer: Domain name system, Name space, Domain name space, Distributed of name space, DNS in the Internet, Resolution, DNS messages, Types of records, registers,
Dynamic Domain name System(DDNS), Encapsulation, Remote Logging, Electronic mail and file Transfer, Remote Logging, Telnet, Electronic mail, File Transfer.
UNIT VIII
WWW and HTTP: Architecture, web Documents, HTTP Network Management: SNMP, Network Management system, Simple Network Management protocol (SNMP), Multimedia, Digitizing Audio and Video Audio and video compression, streaming stored audio/video, streaming live audio/ video, Real-Time Interactive Audio/video. RTP, RTCP, Voice over IP.
TEXT BOOKS:
1. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH.
2. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.
REFERENCE BOOKS:1. Introduction to Data Communication and Networking. W.Tomasi.
Pearson Education2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor
and Francis Group.3. Data Communications and Computer Networks, P.C Gupta PHI
OBJECTIVE
Subject: Data Communication and Computer NetworksBranch: III-CSESemester: IFaculty: T.Lakshmi Lavanya
The main objective of this subject is introducing the concepts of electronic communications systems, data communications, and network. It also introduces the wireless and wire link telecommunications systems, basic data communications network and systems, local area networks, internetwork and intranetwork.
And also includes the protocols like TCP/IP. And it also introducing about the telephone instruments and signals and cellular telephone concepts and cellular telephonic systems.
By studying this subject will known about the transmission media and communication cables to transfer the data from source to destination trough signals. And we will know about the communication codes and error controls and data formats for identifying the errors.
Subject: Data Communication and Computer NetworksBranch: III-CSEAcademic Year: 2013-2014
Semester: IFaculty: T.Lakshmi Lavanya
Sno Unit Class Topic Text /
Reference book
Chapter No
Remarks
1
I
L1 INTRODUCTION Data communications, Networks T1, R1 20-24
2 L2 The Internet, protocols and Standards T1,R1 25-28
3 L3 Network Models T1,R2 29-36
4 L4 Layered tasks. The OSI ModelT1, R1,
R2 37-38
5 L5 Layers in the OSI Model. T1, R1, R2 39
6 L6 TCP/IP Protocol Suite, Addressing T1, R1, R2 39-55
7 L7 Physical layer and Media. T1, R1, 58-73
R2
8 L8 Data and Signals T1, R1, R2 75-76
9 L9 Analog and Digital, periodic T1, R1, R2 77-79
11 L10 Analog Signals, Digital Signals. T1, R1, R2 97
12 L11 Transmission impairment. Data rate Limits T1, R1, R2 98-100
13 L12 performance, Digital Transmission T1, R1, R2 100-109
14 L13Digital-to- Digital Conversion, Analog-to-digital Conversion
T1, R1, R2 110
15 L14 Analog Transmission, Digital -to-Analog conversion, T1, R1, R2 110-112
16 L15 Analog-To-Analog Conversion. T1, R1, R2 113-116
II L16 Bandwidth utilization: Multiplexing and Spreading, T1, R1, R2 119-120
L17 Multiplexing, spread Spectrum T1, R1, R2 121-122
L18Transmission Media, Guided Media, Unguided media:
T1, R1, R2 123-124
L19 wireless, Switching, circuit-Switched nerworks T1, R1, R2 124-132
L20 Datagram Networks, Virtual-Circuit Networks, T1, R1, R2 133-136
L21Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks
T1, R1, R2 137-147
L22 Dial-up Modems, Digital Subscriber Line T1, R1, R2 151-162
L23 Cable TV networks T1, R1, R2 163
L24 Cable TV for Data Transfer. T1, R1, R2 164
3 III L25 Error Detection and correction T1, R1, R2 165-174
L26Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing
T1, R1, R2 177-184
L27Flow and error Control , protocols, Noiseless Channels
T1, R1, R2 185-186
L28 HDLC, Point-to-Point protocol, T1, R1, R2 187-194
L29 Multiple Access, random Access, Aloha T1, R1, R2 195-197
L30Frame Synchronization, Frequency- Division Multiplexing
T1, R1, R2 198-202
L31 Controlled Access, Channelization T1, R1, R2 203-207
L32IEEE standards , standard Ether net , changes in the standard.
T1, R1, R2 210-211
L33 Fast Ethernet, Gigabit Ethernet, IEEE802.11 T1, R1, R2 212-214
L34 Bluetooth. T1, R1, R2 215-222
4 IV L35 Connecting LAN’s. Backbone Networks T1, R1, 223-224
R2
L36Virtual LANs, Connecting Devices, Backbone networks virtual LANs
T1, R1, R2 225-229
L37 cellular telephony, Satellite Networks T1, R1, R2 241-246
L38Sonnet/SDH architecture, sonnet Layers, Sonet Frames
T1, R1, R2 247-248
L39STS Multiplexing, sonnet networks, virtual tributaries
T1, R1, R2 249-255
L40 virtual circuit networks T1, R1, R2 256-260
L41 Frame relay and ATM, Frame Relay T1, R1, R2 263-266
L42 ATM, ATM LANs. T1, R1, R2 266-271
5 V L43Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses
T1, R1, R2 272-286
L44network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6.
T1, R1, R2 287-294
L45 Network Layer Address Mapping T1, R1, R2 348-357
L46 Error Reporting and Multicasting, address mapping T1, R1, R2 358
L47 ICMP, IGMP, ICMPv6 T1, R1, R2 359-369
L48Network Layer : Delivery, Forwarding and routing, delivery, forwarding
T1, R1, R2 370-376
L49Unicast Routing protocols, Multi cast Routing protocols.
T1, R1,R2 377-
3382
6 VI L50Transport Layer: process-Process Delivery: UDP, TCP and SCTP
T1, R1, R2 386-402
L51 Process-to-Process Delivery T1, R1, R2 403-415
L52 User datagram protocol (UDP), TCP, SCTP T1, R1, R2 467-468
L53 Congestion control and Quality of service. T1, R1, R2 469-470
L54Data Traffic. Congestion , congestion control, two Examples
T1, R1, R2 471-472
L55 Quality service, Techniques to improve QOS T1, R1, R2 473-480
L56 Integrated Services, Differentiated services T1, R1, R2 481-486
L57 QOS in Switched networks T1, R1, R2 487-490
7 VII L58Application layer: Domain name system, Name space
T1, R1, R2 493-498
L59 Domain name space, Distributed of name space T1, R1, R2 499
L60 DNS in the Internet, Resolution, DNS messages T1, R1, R2 500-510
L61Types of records, registers, Dynamic Domain name System(DDNS)
T1, R1, R2 512-527
L62 Encapsulation, Remote Logging, Electronic mail and
file TransferL63 Remote Logging, TelnetL64 Electronic mail, File Transfer.
8 VIII L65 WWW and HTTP: Architecture, web DocumentsL66 HTTP Network Management: SNMP, Network
Management systemL67 Simple Network Management protocol (SNMP)L68 Multimedia, Digitizing Audio and Video Audio and
video compressionL69 streaming stored audio/video, streaming live audio/
videoL70 Real-Time Interactive Audio/videoL71 RTP, RTCP, Voice over IP.
TEXT BOOKS:
T1. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH.T2. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.
REFERENCE BOOKS:
R1. Introduction to Data Communication and Networking. W.Tomasi.Pearson Education
R2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group.
R3. Data Communications and Computer Networks, P.C Gupta PHI
SYLLABUS COVERAGE
Subject: DATA COMMUNICATION AND COMPUTER NETWORKSBranch: III CSEAcademic Year: 2013-2014
Semester: IFaculty: T.Lakshmi Lavanya
Sno Unit Lecture No.
Date Planned
Date Conducted
Reason(s) for Non Compliance
Plan to over come non compliance
1 I C1
2 C23 C34 C45 T16 C57 C68 C79 CT110 C811 C912 C1013 T214 C1115 C1216 C1317 C1418 CT219 C1520 II C1621 C1722 C1823 T324 C1925 C2026 C2127 C2228 C2329 CT330 C2431 III C2532 C2633 C2734 T4
35 C2836 C2937 C3038 C3139 CT440 C32
41 C33
------------------- I-MID EXAMS FROM -------------------------------
42 C3443 IV C3544 T545 C3646 C3747 C3848 C3949 CT550 C4051 C4152 C4253 V C4354 T655 C4456 C4557 C4658 C4759 CT660 C4861 C4962 VI C5063 C5164 T765 C5266 C5367 C5468 C5569 CT770 C5671 C5772 VII C5873 C5974 T875 C60
C61
C62C63C64
VIII C65C66C67C68C69C70C71
------------------- II-MID EXAMS FROM -------------------------------
C ---- CLASS
CT---- CLASS TEST
T ------- > TUTORIAL
Assignments, Quality and Evaluation Subject: DATA COMMUNICATION AND COMPUTER NETWORKS
Year/Branch: III/I CSE
Faculty: T.Lakshmi Lavanya
Academic Year: 2013-2014 Semester-I
Unit No
Assign-ment no
Topic Date Planned
DateOfSubmission
DateOf Distribution
I 11. Describe the following
standard organizations:
ISO,ITU-T, IEEE,ANSI,EIA, TIA, IAB, ETF, and IRTF.
2. Name and explain the functions of each of the layers of the seven –layer OSI model.
3. Name and explain the functions of Analog and Digital, periodic, Analog Signals, Digital Signals
4. Explain about the TCP/IP Protocol Suite
5. Explain about the Digital-to- Digital Conversion, Analog-to-digital Conversion
6. Explain about the Digital -to- Analog conversion, Analog-To-Analog Conversion.
II 2
1. Describe the followingtypes of Multiplexing and Spreading, Multiplexing, spread Spectrum2. Describe the followingtypes of Guided Media and Un Guided Media Transformation media3. Explain the functions of circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks4. Explain the functions of Structure of a switch, using Telephone and Cable Networks5. Explain the functions
Structure of a switch, using Telephone and Cable Networks for data Transmission
6. Explain the functions Cable TV networks, Cable TV for Data Transfer.
III 3 1. Explain about Error Detection and correction
2. Explain about Block coding, Liner Block codes, Cyclic codes,
checksum, data Link Control, Framing.
3. . Explain about protocols, Noiseless Channels
4. Explain about HDLC, Point-to-Point protocol
5. Explain about Multiple Access, random Access, Aloha, Controlled Access
6. Explain about Gigabit Ethernet, IEEE802.11, and Bluetooth.
IV 4
1. Explain the function of Connecting LAN’s. Backbone Networks, and Virtual LANs
2. Explain the function of Connecting Devices, Backbone networks virtual LANs
3. Explain the function and basic operation of the following cellular telephony, Satellite Networks
4. Explain the function and basic operation of the following sonnet/SDH architecture, sonnet Layers, Sonet
5. Explain the function of the STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks
6. Explain the function and basic operation of the following Frame Relay, ATM, ATM LANs
V 51. Explain about the Logical
Addressing, IPv4 Addresses
2. Explain about the Internet protocol, Internetworking
3. Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6
4. Explain the about the Network Layer Address Mapping, Error Reporting and Multicasting
5. Explain the function and basic operation of the following , IPv4 Addresses, IPv6 Addresses
6. Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.
VI 6
1. Describe the concepts of process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery2. Describe the concepts of TCP, UDP ,SCTP, Congestion control and Quality of service3 Describe the Congestion , congestion control
4. Describe the Integrated Services, Differentiated services
5. Describe the QOS in Switched networks.
VII 7 1. Describe the Domain name system and Domain name space.
2. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages 3. Describe Dynamic Domain name System (DDNS), Encapsulation, Remote Logging.4. Describe the purpose
of Electronic mail and file Transfer, Remote Logging
5. Describe the function of a Telnet
6. Describe the Electronic mail,
File Transfer.
VIII 8
1. Draw and describe the HTTP Architecture and error control.2. Describe the HTTP Network Management: SNMP, Network Management system 3. Describe the Simple Network Management protocol (SNMP)
4. Describe the Digitizing Audio and Video Audio and video compression 5. Explain the , streaming stored audio/video, streaming live audio/ video
6. Define and describe RTP, RTCP, Voice over IP
Quality verified by HOD: Good/Average/Poor Signature of HOD
Tutorial
Subject: Data communication and Computer Networks
Branch: III CSE
Academic Year: 2013-2014 Semester: I
Faculty: T.Lakshmi Lavanya
SnoUnit
noTutorial topic
Date
Planned/
conducte
d
Marks
entered in
the register
(Yes/No)
1 I 1. Explain about the
Digital-to- Digital
Conversion, Analog-to-
Format no: 10MLRIT/CSE/TC/II/ I.2/CF/Tutorial
digital Conversion
2. Explain about the Digital -to- Analog conversion, Analog-To-Analog Conversion.
2 II 1. Explain the functions of circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks
2. Explain the functions Cable TV networks, Cable TV for Data Transfer.
3 III 1. Explain about Error Detection and correctionDecoding
2. Explain about Gigabit
Ethernet, IEEE802.11, and
Bluetooth.
4 IV 1. Explain the function of Connecting LAN’s. Backbone Networks, and Virtual LANs2. Explain the function
and basic operation of the
following Frame Relay, ATM,
ATM LANs
5 V 1. Explain the about the mapping b/w IPv4, IPv6 transition from IPv4 to IPv6.
6 VI 1. Describe the concepts of TCP, UDP ,SCTP, Congestion control and Quality of service
7 VII 1. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages
8 VIII 1. Describe the HTTP Network Management: SNMP, Network Management system
Quality verified by HOD: Good/Average/Poor Signature of HOD
Subject: Data Communication and Computer networksBranch: III-I CSEAcademic Year: 2013-2014
Semester: IFaculty: T.Lakshmi Lavanya
OBJECTIVE QUESTIONS
UNIT-I1. The unit of data is _______ a) Data b) Datum c) Information d) None ( )2. What is protocol_________?3. Information is defined as__________4. When message are intended for all subscribers on the network is called______
( ) a) Broadcasting b) multicasting c) network d) data5. When message are intended for a specific group of subscribers it is called______________ ( ) a) Broadcasting b) multicasting c) network d) data6. Point-to-point networks have only--------stations ( )
a) 2 b) 3 4) 1 d) 07. Example of connection less protocol is ( ) a) Virtual circuit d) datagram circuit c) network d) none8. ISO stands for__________ ( )9. In the simplex mode data transmission is ________ ( ) a) Unidirectional b) bidirectional c) a & b d) none10. _____holds shared files, programs, and the network O/S ( ) a) Server b) client c) shared date d) none11. GAN stands for _____________ ( )12. Converting information signal to a different form is called______ ( )
a) Analog b) digital c) modulation c) demodulation13. What is Data Communication______?
14. Define digital modulation15. Define connection oriented protocol_________16. Determine the number of conditions possible for a binary code Containing the following number of bits____________________ ( ) a) 3 b)5 c) 7 d) 1217. For sine wave with the frequencies of 100Hz .determine the Period ( )
a) 10 b) 100 c) 1 d)none18. For an electronic device operating at 17C with a bandwidth of 10kHz, ( )
Determine the thermal noise power in watts and dBm.a) 4 *10-17 watts b) 11 *10-17 watts c)3 *10-11 watts d)2 *10-12 watts
19. TCP/IP stands for_____________________ ( )20. For sine wave with the period is 0.1ms, determine the frequencies ( ) a) 100 kHz b) 10kHz c) 1MHz d) noneUNIT-II1. For sine wave with the frequencies of 100Hz .determine the Period ( )
a) 10 b) 100 c) 1 d) none2. Define an amplitude_________3. Define frequency_____________4. The distance of one cycle occurring in space is called the_________ ( ) a) Velocity b) frequency c) wavelengthd) time5. The reciprocal of frequency is called_________________ ( ) a)time b)bandwidth c) amplitude d)none
6. What is Bit Rate______?7. What is M-ary______
8. Velocity factor is__________ ( ) a) Vp * c b) c* 2d c) Vp/c d) none9. What is the speed o light___________ ( ) a) 3 *108 m/s b)6.625 *10-23 j/s c)3.14 *109 m/s10. The cancellation of common mode signal is called__________ ( )11. What is the bit_______?12. What is buad________?13. Wavelength λ is________ ( ) a) c/ f b)f/c c)c +f d) 1/c + f 14. Optical power is expressed mathematically as P= __________ ( ) a)dQ/dt b)dt/dQ c)dQ + dt d )none15. Define the critical angle____________16. Refractive index is ___________ ( ) a) v/c b)v+c c) 1/v+c d)c/v17. What are the losses of metallic transmission line ----------- 18. Two kinds of wave’s are__________19. What is bandwidth_________?20. Buffer jacket is made up of__________21. Dielectric constant is separated by_______ ( )
a) Insulator b) conductor c) a & b d) none
UNIT-III1. What is digital transmission________?2. PAM is used to -------------------------------- ( )
a) PSK B) QAM c) PCM d)all3. PAM stands for__________________
4. Peak amplitude values varied between________ ( ) a)+2 v to -2v b)+4v to -4v c)+5v to -5v d)none5. Dynamic range (DR) is the ratio of___________ ( ) a) Vmax/Vmin b) Vmin/Vmax c) Vmax +Vmin6.PCM stands for _______________7. PWD stands for_______________8.PCM system used------- ( ) a) 12bit linear & 8bits compressed code b) 8bit linear & 12bits compressed code c) 12bit linear & 12bits compressed code d) all are correct9. Determine the minimum nyquist rate for a maximum analog input frequency of the 10KHz________________10. Determine the maximum analog input frequency of the sample rate______ ( )11. Dertermine the maximum number of PCM bits
of a Dynamic range of 80 dB.______________12.What is companding_________ ( )
a) Compression & expanding b) extracting & excludingc) Conclusion d) a & b
13. Types of companding__________________ ( )a)analog and digital companding b) data compandingc) Numerical and Data Companding d)none
14. Analog Companding occur in_______________ ( )a)μ-law Companding b)A-law compandingc) Both a & b d) none
15. Line speed is the ratio of__________ ( )a)bits/sec b)bits/n c)baud/sec d)none
16. What is digital Multiplexing_______?17. TDM stands for_________________18. The transmission o information from more than one Source to more than one destination over the same transmission medium. ( )
a) Frequency b) multiplexing c) voltage d) signal19. What is duty cycles___________?20.T2 carrier TDM system have ___________ ( )
a) 64kbps b) BPRZ-AMI c) B6ZS d)all
UNIT-IV
1. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none
2. Which polarization is the electric field propagates parallel to the earth’s surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none
3. The _________of a plane electromagnetic wave is simply the orientation of the electric field vector in respect to earth’s surface. ( )a) Signature b) polarization c) modulation d) none
4. __________represents the flow of electromagnetic waves in the direction of propagation.
( )a) Power density b) radiation c) electromagnetic radiation d) all
5._______is energy per unit of time per unit of area and is usually given in watts per square (
)a) Power density b) radiation c) electromagnetic radiation d) all
6. Power density is _______ ( ) a)p=eh b)p=e/h c)p=e +h d)all
7. A point source radiating power at a constant rate uniformly in all directions. Such a source is called an _______ ( ) a) Isotropic radiation b) electromagnetic radiation
c) Power density d) radiation8. The power density is inversely proportional to the square of the distance from the
source. ()
a) Planck’s law b) Inverse square law c) both a & b d) all
9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it.
However, as waves propagate through free space, they spread out, resulting in a reduction in power density.This is called________ ( )
a)Absorption b)Attenuation c)both a & b d)all10. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb
electromagnetic energy. This type of reduction of power is called________ ( )a) Radiation loss b) coupling loss c) absorption loss d) all
11. Reduction in power density with distance is equivalent to a power loss Is called_______ ( ) a) Wavelength b) velocity c) wave attenuation d) all
12. The attenuation is due to the spherical spreading o the wave in space Is called_______ ( )
a) space attenuation b) wave attenuation c) Attenuation
13. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 14. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none15. Electromagnetic wave_________occurs when an incident wave strikes a boundary
of two media and some or all of the incident power does not enter the second material
a) Refraction b) reflection c) both a & b d) none
16. ______ is defined as the modulation or reduction of energy within a wavefront when it passes near the edge of an opaque object.
( ) a) a) Refraction b) reflection c) both a & b d)Defraction
17. Radio wave _________occurs when two or more electromagnetic waves combine in such a way that system performance is degraded. ( )
a)Refraction b) reflection c) Interference d)Defraction18.___________ are electromagnetic waves that travel along the surface of earth.( ) a) Surface wave b) ground wave c) both a & b d) all
19. Electromagnetic waves that are directed above the horizon level are called ____( ) a) Surface wave b) ground wave c) sky wave d) all20. _______is the minimum distance from a transmit antenna that sky wave of given Frequency will be returned to earth. ( ) a) Surface wave b) ground wave c)skip distance d)all21.________is defined as the loss incurred by an electromagnetic wave as it Propagates in a straight line through a vacuum with no absorption or reflection Of energy from nearby objects. ( ) a) Surface wave b) ground wave c)free-space path loss d)all
22. What is the satellite__________?
23. Satellite‘s are ______ ( ) a) LEO b) MEO c) GEO d) All24. _______ satellites orbit earth above the equator with the same
angular velocity as earth. a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all25.________satellite rotate around earth in circular or elliptical pattern. ( ) a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all
26. 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. 27. However, as waves propagate through free space, they spread out, resulting in
a reduction in power density. This is called________( )
a)Absorption b)Attenuation c)both a & b d)all
28. Earth‘s atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( )a) Radiation loss b) coupling loss c) absorption loss d) all
29. Reduction in power density with distance is equivalent to a power loss Is called_______ ( ) a) Wavelength b) velocity c) wave attenuation d) all
30. The attenuation is due to the spherical spreading o the wave in space Is called_______ ( )
a) Space attenuation b) wave attenuation c) Attenuation
31. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 32. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none
33. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material
a) Refraction b) reflection c) both a & b d) none34. _______are combinations o passive components that are used to regulate the
amplitude and frequency response of the voice signals.( )
a) Equalizer circuit b) speaker c) microphone d) all35. The ______________is the receiver for the telephone
( )a) Equalizer circuit b) speaker c) microphone d) all
36. The ______________is the transmitter for the telephone( )
a) Equalizer circuit b) speaker c) microphone d) all37. The__________is sent back to the calling party at the same time the ringing Signal is sent to the called
( )a) Ringing back signal b) receiver c) both a & b d) none
38. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( )
a) Wave absorption b) Wavelength c) velocity d) wave attenuation 39. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none40. Electromagnetic wave_________occurs when an incident wave strikes a boundary
of two media and some or all of the incident power does not enter the second material
a) Refraction b) reflection c) both a & b d) none
UNIT-V
1. If a datagram router goes down then _ _ _ _ _ _ _ _ _ _ a. all packets will sufferb. only those packets which are queued in the router at that time will suffer c. only those packets which are not queued in the router at that time will sufferd. no packets will suffer2. Indatagramsubnetnewrouteischosen__ __ ___ __ __ ___ __a. for every packet sentb. for all the packet sentc. only for the first packetd. for the packet which is not transmitted3. ThePSTNisanexampleofa_ ___ __ __ __ __ __ ____networka. packet switchedb. circuit switchedc. message switchedd. frame switched4. Eachpacketisroutedindependentlyin__ __ __ ___ __ __ __ a. virtual circuit subnet b. short circuit subnetc. datagram subnetd. ATM subnet5. For a connection oriented service, we need a _ _ _ _ _ _ _ _ _ _ __ _ a. virtual circuit subnet b. short circuit subnetc. datagram subnetd. wireless subnet
6. Which type of switching uses the entire capacity of a dedicatedlink? a. circuit switchingb. datagram packet switchingc. virtual circuit packet switchingd. message switching7. In _ _ _ _ _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data isdelayed because data must be stored andretrieved from RAM. a. space divisionb. time division c. virtuald. packet8. In_ __ __ ___ __ ___ ____,eachpacketofamessageneednotfollowthesamepathfrom sender toreceiver.a. circuit switchingb. message switchingc. virtual approach to packet switchingd. datagram approach to packet switching9. In_ __ __ ___ __ ___ __ _ __ ____,eachpacketofamessagefollowsthesamepath from sender to receiver.]a. circuit switchingb. message switchingc. virtual approach to packet switchingd. datagram approach to packet switching10. A permanent virtual circuit involves _ _ _ _ _ _ _ _ _ _ _ _ _ _ __. a. Connection establishmentb. Data transfer c. Connection released. Connection check11. The set of optimal routes from all sources to a givendestination from a tree rooted to the destinationis known as _ _ _ _ _ _ _ _ _ _ _ _ _ a. Binary treeb. Sparse treec. Sink treed. AVL tree
12. Adaptive routing algorithms get their information from _ _ _ _ __ _ _ _ _ _ _ _ _ a. only from local environmentb. only from adjacent routersc. from locally, adjacent, external routersd. only from external routers13. If the route from I to J is computed in advance, off line, anddownloaded to the routers when thenetworkisbootediscalledas__ __ __ ___ ___ __ a. Dynamic routingb. Session routingc. Temporary routingd. Static routing14. The router algorithm takes the decision to changes the routewhen _ _ _ _ _ _ _ _ _ _ _ _]a. router changesb. topology changesc. user changesd. transmission time does not change15. If route from router I to router J is computed on line based onthe current statistics, then it is called as _ __ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Dynamic routingb. Session routingc. Temporary routingd. Static routing16. If the subnet uses virtual circuits internally, routing decisions
are made only when a new virtualcircuitisbeingsetup.Thisiscalledas________ a. Session routingb. Circuit routingc. Datagram routingd. Forwarding17. _ _ _ _ _ _ _ _ _ _change their routing decisions to reflectchanges in the topology. [02S02]a. Nonadaptive algorithmsb. Adaptive algorithmsc. Static algorithmsd. Recursive algorithms18. If router J is on the optimal path from router I to router K, thenthe path from J to K along the samerouteis__ __ _____ ___ _____ __.[02S03]a. does not existb. optimalc. maximumd. constant19. If router J is on the optimal path from router I to router K, thenthe optimal path from J to K alsofallsalongthesamerouteisknownas_____ ___ ____ ___ ____.[02S04]a. Routing principleb. Optimality principlec. Sink tree principled. Network principle20. ___ _________ ________donotbasetheirroutingdecisionsonmeasurementsor estimates of the currenttraffic and topology. [02S05]a. Nonadaptive algorithmsb. Adaptive algorithmsc. Static algorithmsd. Recursive algorithms
UNIT-VI
1. The method of network routing where every possible pathbetween transmitting and receiving DTE is used is called [03D01] a. Random Routingb. Packet Flooding c. Directory Routingd. Message Switching2. In Hierarchical routing for N router subnet, the optimal numberof levels is _ _ _ _ _ _ _ a. logN
b. log(N -1)c. lnNd. ln(N-1)3. In Hierarchical routing, the routers are divided into what iscalled as _ _ _ _ _ _ _ _ _ _ _ _ a. zonesb. Cellsc. Regionsd. Blocks4. The regions in Hierarchical routing are grouped in to _ _ _ _ _ __ _ _ _ _ _ _ _ _ _. a. Clustersb. Zonesc. Blocks d. Cells5. The Clusters in Hierarchical routing are grouped in to _ _ _ _ __ _ _ _ _ _ _ _ _ _ a. Clustersb. Zones c. Blocks
d. Cells6. 1. If a router sends every incoming packet out only on thoselines that are going approximately in therightdirectionisknownas__ __ ___ _______ a. Random floodingb. Static floodingc. Selective floodingd. Early flooding7. In shortest path routing algorithm, the path length is measuredbased on _ _ _ _ _ _ _ _ _ _ _ _ a. time delayb. number of hopsc. size of the routersd. routing table8. Floodingalwayschoosethe______ ___ _______ a. Shortest path b. First pathc. Last pathd. Largest path 9. In military applications where large number of routers may beblown to bits at any instant, we use _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Shortest path firstb. First come first servec. Forwardingd. Flooding10. In distributed applications, it is sometimes necessary to updateall the databases concurrently, we use _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Shortest path firstb. First come first servec. Forwardingd. Flooding11. In multicast routing with spanning tree method, a network withn groups, each with an average of mmembers, for each group we require _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .a. n pruned spanning trees must be stored for a total of mn treesb. m pruned spanning trees must be stored for a total of mtreesc. n pruned spanning trees must be stored for a total of n treesd. m pruned spanning trees must be stored for a total of mn trees13. To do multicast routing, each router computes a _ _ _ _ _ _ _ __ _ _ _ _ a. Binary treeb. AVL treec. Spanning treed. Sparse tree14. A well -defined groups that are numerically large in size but small compared to the network as awholeareusedin __ _______ __ _____ a. Unicast routing
b. Multicast routingc. Broadcast routingd. Telecast routing15. In__ ______ _______tosendamulticastmessageahostsendsittothecore,which then doesthe multicastalong the spanning tree. . Core based Treesb. AVL treesc. Binary treesd. Sparse trees16. Sending a packet to all destinations simultaneously is called __ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Multicasting b. Unicasting c. Telecasting
d. Broadcasting 17. AnormalFloodingtechniqueisanexampleof____ _________a. Multicasting b. Unicasting c. Telecastingd. Broadcasting 18. In Broadcast routing, if the router does not know anything allabout spanning tree, _ _ _ _ _ _ _ _ _ _ _ _ _ __ method is preferred. a. Reverse Path forwardingb. Multidestination c. Floodingd. spanning tree 19. The method of Broadcast routing in which each packetcontains either a list of destinations or a bit mapindicating the desired destinations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. [04S04]a. Reverse Path forwardingb. Spanning tree c. Multidestinationd. Flooding20. Sending a message to a well defined group that are numerically large in size but small compared to thenetwork as a whole is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ .a. Unicasting b. Multicastingc. Broadcasting d. Telecasting
UNIT-VI1. In link state routing, after the construction of link state packetsnew routes are computed using _ _ _ _ _ _ _ _ _ _ _ _ a. Bellman Ford algorithmb. DES algorithm c. Dijkstra's algorithm2 Count-to-Infinityproblemoccursin______ ______ _______.[05M01]a. distance vector routingb. short path firstc. link state routingd. hierarchical routing3 In distance vector routing algorithm, each router maintains aseparate routing table with the followingentries . [05M02]a. preferred input line , estimated timeb. preferred input line, estimated distancec. preferred output line, estimated timed. preferred output line, router5. Linkstatepacketsarebuiltin _______ a. short path firstb. distance vector routingc. link state routingd. hierarchical routing6. In which routing method do all a. Distance Vectorb. Link Vector c. Shortest path
d. Link State7. In distance vector routing algorithm, the routing tables areupdated _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [05S02]a. by exchanging information with the neighborsb. automatically c. using the backup databased. by the server8. Distance vector routing algorithm is implemented in Internet as_ _ _ _ _ _ _ _ _ _ _ _ _ _ a. OSPF
b. RIPc. ARPd. APR9. Which of the following routing algorithm takes into account thecurrent network load. a. broadcastb. shortest path c. floodingd. distance vector routing1. Indistancevectorroutingthedelaymetricis __________ _______
a. number of hopsb. geographical distancec. number of neighbors d. queue length 11 The processes that keep track of hosts whose home is in thearea, but who currently visiting another areais _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . Home agentb. Mobile agentc. Foreign agentd. User agent12 In AODV routing algorithm for MANETs, the route is discoveredat time _ _ _ _ _ _ _ _ _ _ _ _ _ .a. only when the network is establishedb. in middle of the transmissionc. when there is a need for route by the hostd. when there is no need for route by the host13. Military vehicles on a battlefield with no existing infrastructurewill deploy _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _network. a. MANETb. Cell Network c. LANd. Wi-Fi14. The network in which all the nodes are symmetric and there isno central control or hierarchy is _ _ _ _ _ _ _ _ _ _ _ . a. MANETb. Client -Server Technology c. Peer-to-Peerd. Wi-Fi15. What is the type of network in which the topology change fromtime to time? a. Wi-Fib. Cell Network c. LANd. MANET16. The processes that keep track of all mobile hosts visiting thearea is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Home agentb. Mobile agentc. Foreign agentd. User agent17. The hosts which are basically stationary hosts who move fromone fixed site to another from time to time butuse the network only when they are physically connected to it arecalled _ _ _ _ _ _ _ _ _ _ _ a. Migratory hostsb. Stationary hostsc. Mobile hostsd. Random hosts
18. The hosts who compute on the run and want to maintain theirconnections as they move around _ _ _ _ _ _ __ _ _ _ _ _ _ _ _]a. Migratory hostsb. Stationary hostsc. Mobile hosts
d. Random hosts19. What is the type of network in which the routers themselves aremobile? a. Wide Area Networkb. Mobile Ad hoc Networkc. Mobile Networkd. Local Area Network20. What is the routing algorithm used in MANETs]a. Shortest Path First b. Routing Information Protocol c. Distance Vector Protocold. Ad hoc On -demand Distance Vector Protocol
UNIT-VII
1. Why probe packets are transmitted in the network? a. to know about the capacity of the channel b. to count the number of host in the networkc. to know about efficiency of the routing algorithmd. to know about the congestion2. If the source deduces the existence of congestion by making local observations,such as the time needed foracknowledgements to come back is called as _ _ _ _ _ _ _ _ _ _ _ .
b. Implicit feedback algorithm3. The solution to decrease the load on the network whencongestion occurs is _ _ _ _ _ _ _ _ _ _ . a. splitting the traffic over multiple routesb. increasing the transmission powerc. usage of spare routersd. denying service to the users4. In open loop congestion control techniques, the decisions arebased on the _ _ _ _ _ _ _ _ _ a. without regard to the current state of the networkb. with regard to the current state of the network c. with regard to the choice of the hostd. without regard to the choice of the host 5. In closed loop congestion control techniques, the decisions arebased on the _ _ _ _ _ _ _ _ _ _ . a. concept of a feedback loopb. concept of a forward loopc. concept of current state of networkd. concept current status of the router6. When too many packets are present in the subnet, andperformance degrades then it leads to _ _ _ _ _ _ _ __ _ _ _ a. Ingestionb. Congestionc. Digestiond. Diffusion7. What is it goal of congestion control? a. making sure that subnet is not able to carry the offeredtraffic b. making sure that subnet will allow more than the offeredpacketsc. making sure that subnet is able to carry the offered trafficd. making sure that subnet will not allow any traffic8. The service of open loop congestion control technique is _ _ __ _ _ _ _ _ _ a. monitor the system to detect when and where congestion occurs b. when to accept new trafficc. pass the information to places where action can be takend. adjusting the system to correct the problem9. The service of closed loop congestion control technique is _ __ _ _ _ _ _ _ _ _]a. when to accept new traffic
b. when to discard the packetsc. monitor the system to detect when and where congestion occursd. which packets to discard
10. The solution to increase the capacity when congestion occursis _ _ _ _ _ _ _ _ _ _ _ _ _ a. denying service to the usersb. degrading the service to the usersc. splitting traffic over multiple routesd. rescheduled the demands of the users11. When routers are being inundated by packets that they cannothandle, they just throw them away isknown as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Jitter controlb. Random early detectionc. Choke packetsd. Load shedding 12. If f is the sample instantaneous line utilization, a is the constant that determines how fast the router forgetsrecent history and u is the recent utilization of the line then the formula to update u is _ _ _ _ _ _ _ _ _ _ _ _ .[08D02]13. The choke packet is send back to the source if _ _ _ _ _ _ _ _ _ .[08M01]a. The utilization factor u moves above the given thresholdb. The utilization factor u moves below the given thresholdc. The utilization factor u is equal to the given thresholdd. The utilization factor u doesn`t change 14. When the source host receives the choke packet, then thesource _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. reduces the capacity of the lineb. reduces the line utilization factorc. reduces the traffic generation d. ratereduces the threshold value15. If the buffer fills and a packet segment is dropped, thendropping all the rest of the segments from that packet, since they will be useless anyway is called _ _ _ _ _ _ _ _ __ _ _ _ _a. Priority droppingb. Tail dropping c. Age based droppingd. Head dropping16. Timeoutdeterminationpolicyisusedin___ ______________.[08S01]a. network layerb. data link layerc. transport layerd. application layer17. Flowcontrolpolicyisimplementedin_____ __________ _.a. network layerb. transport layerc. application layerd. physical layer18. Packet discard policy is implemented in _ _ _ _ _ _ _ _ _ _ _ _ __ . [08S03]a. Physical layerb. Data link layerc. MAC layerd. Network layer19. 4. For applications such as audio and video streaming, thevariation in the packet arrival times is called _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. Random early detectionb. Jitter c. Delay differenced. Load shedding20. Sending of a IP packet from host 1 to host 2 where both are ofsame LAN but the packet is transferred through different intermediate LANs is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ .
a. Tunnelingb. Routingc. Diverting d. Forwarding
UNIT_VIII1. The type of fragmentation in which packet is fragmented at thesource host and reassembly is done only atdestination host is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. transparent fragmentation b. internal fragmentationc. free space fragmentation d. nontransparent fragmentation2. Firewallsareusedfor___ _______ _____.a. routingb. security c. tunnelingd. congestion control3. To translate the message semantics from one format to other, __ _ _ _ _ _ _ _ _ is used. a. application gateway b. transport gateway c. session gatewayd. network gateway4. The routing algorithm within each network is _ _ _ _ _ _ _ _ _ __ _ _ _ . a. Routing information protocol b. Exterior gateway protocol c. Interior gateway protocold. Middle gateway protocol 5. In _ _ _ _ _ _ _ _ case higher bandwidth can be achieved.a. connectionless networksb. connection oriented networks c. virtual circuit networksd. optical networks
6. Fragmentationmeans_________ _______ a. adding of small packets to form large packetb. breaking large packet into small packetsc. combining large packets in to a single packetd. forwarding a packet through different networks7. Bridgesareusedat________ ___layer a. Physical layerb. MAC layerc. Networkd. Transport8. Routersareusedat_ __________layer a. Physical layerb. MAC layerc. Networkd. Transport9. Gateways are used at _layera. Physical layerb. MAC layerc. Networkd. Application10. Which type of ATM service is used for regroup timing requirements?a. variable bit rateb. constant bit ratec. available bit rated. unspecified bit rate11. Which of the following assertions is FALSE about the InternetProtocol(IP)? a. It is possible for a computer to have multiple IP addressesb. Ip packets from the same source to the same destinationcan take different routes in the networkc. IP ensures that a packet is discarded if it is unable to reachits destination within a given number of hops
d. The packet source cannot set the route of an outgoingpackets; the route is determined only by the routing tables intherouters on the way12. _ _ _ _ _ _ _ _ _ _ _ protocol is used for constant bit rate.a. AAL1b. AAL2c. AAL 3/4d. AAL513. While booting the system the IP address is _ _ _ _ _ _ _ _ _ _ _ .
a. 1.1.1.1b. 1.1.0.0c. 0.0.1.1d. 0.0.0.014. In ATM network _ _ _ _ _ _ _ _ _ message is used by a sourcehost to set up a connection. a. SET UPb. Call PROCEEDINGc. CONNECTd. RELEASE15. How many class A, B and C networks IDs can exist a. 2,113,658b. 16,382c. 126d. 12816. Which of the following TCP/IP internet protocol, a disklessmachine uses to obtain its IP address from aserver a. RDPb. ARPc. RARP d. RIP17. Theprotocolusedtotesttheinternetis__ _______ a. IGMP b. ICMPc. ARPd. RIP18. Which IP address class has few hosts per network? a. class Ab. class Bc. class Cd. class D19. TheIPaddresswith127aabbccisusedfor_ _________ ___a. broad castingb. multicastingc. loop back testingd. forward testing20. What type of addressing is specifically used by the transportlayer? a. station addressb. application program port addressc. dialog addressd. network address21. Which of the following functionalities must be implemented by a transport protocol over and above thenetwork protocol? a. Recovery from packet lossesb. Detection of duplicate packetsc. Packet delivery in the correct orderd. End to end connectivity 22. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ __ _ _ primitive. a. LISTEN b. ACCEPTc. BINDd. CONNECT23. SEND and RECEIVE primitives are called as _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ _ primitives.]
a. blockingb. non blocking c. data transfer d. error control24. CONNECT and DISCONNECT primitives are called as _ _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ primitives. a. blockingb. non blocking c. data transfer d. error control25. Transport protocol data units(TPDUs) are contained in _ _ _ __ _ _ _ _ _ _ _ _ . a. protocol b. frame
d. packet26. Which of the following layer is transport service provider?[a. networkb. transportc. session d. application27. The transport layer performs the same types of functions asthe _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ layer.]a. sessionb. networkc. data linkd. physical 28. The end points of a transport connection are called _ _ _ _ _ __ _ _ _ _ _ _ _ _ _ a. TSAPs b. AAL -SAPsc. NSAPsd. PSAPs29. In transport layer, End to End delivery is the movement of datafrom _ _ _ _ _ _ _ _ _ _ _ . a. one station to the next stationb. one network to the other network c. source to destinationd. one router to another router30. Which of the following are session layer check points?a. allow just a portion of a file to be resentb. detect and recover errorsc. control the addition of headersd. are involved in dialog control31. The function of the transport layer ensuring that all pieces of atransmission arrive at the destination, notjust some of them is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Duplication controlb. Sequence controlc. Loss controld. Error control32. If either of the communicating device can ask fordisconnection by sending DISCONNECT REQUEST TPDU tothe other, and immediately disconnect without waiting foracknowledgement is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ . a. Graceful disconnectionb. Abrupt disconnectionc. Greedy disconnectiond. Random disconnection33. The type of disconnection in which three way handshakeprotocol is used is _ _ _ _ _ _ _ _ _ . a. Graceful disconnectionb. Abrupt disconnectionc. Greedy disconnectiond. Random disconnection34. 8. The parameter which gives the probability of the transportlayer itself spontaneously terminating a
connection due to internal problems is called a. protectionb. resiliencec. option negotiationd. transfer failure35. A single transport layer connection split and connects the different network connections is called _ _ _ _ _ __ a. Upward multiplexingb. Downward multiplexing c. Congestion controld. Flow control36. Error control is needed at the transport layer because of potential errors occurring _ _ _ _ _ _ _ _ _ _ _ _ _ __ _a. from transmission line noiseb. in routersc. program d. error control