1Which of the following is the primary responsibility of the Data Link Layer?
A.End-to-end delivery of packets
B.Node-to-node delivery of frames
C.Routing of packets
D.Process-to-process delivery
Correct Answer: Node-to-node delivery of frames
Explanation:The Data Link Layer is responsible for the reliable transfer of data frames between two nodes connected by a physical medium (Node-to-node delivery).
Incorrect! Try again.
2In the context of framing, what is the purpose of Bit Stuffing?
A.To increase the data transfer rate
B.To detect errors in the frame
C.To distinguish frame delimiters from data by adding extra bits
D.To pad the frame to a minimum length
Correct Answer: To distinguish frame delimiters from data by adding extra bits
Explanation:Bit stuffing involves adding an extra 0 bit after a sequence of five consecutive 1 bits to prevent the data from matching the flag pattern (usually $01111110$).
Incorrect! Try again.
3Which sublayer of the Data Link Layer is responsible for controlling access to the shared transmission medium?
A.Logical Link Control (LLC)
B.Media Access Control (MAC)
C.Network Control Protocol (NCP)
D.Physical Layer Control (PLC)
Correct Answer: Media Access Control (MAC)
Explanation:The Data Link Layer is divided into two sublayers: LLC (upper) and MAC (lower). The MAC sublayer handles access to shared media.
Incorrect! Try again.
4In a Stop-and-Wait ARQ system, if is the propagation delay and is the transmission time, what is the link utilization efficiency?
A. where
B. where
C. where
D.
Correct Answer: where
Explanation:The efficiency of Stop-and-Wait ARQ is given by , which simplifies to .
Incorrect! Try again.
5What is the Hamming distance between the codewords 10101 and 11110?
A.2
B.3
C.4
D.5
Correct Answer: 3
Explanation:Hamming distance is the number of bit positions in which two codewords differ. . There are three 1s in the result, so the distance is 3.
Incorrect! Try again.
6To correct errors in a data stream, the minimum Hamming distance required in the coding scheme is:
A.
B.
C.
D.
Correct Answer:
Explanation:To detect errors, a distance of is needed. To correct errors, a distance of is required.
Incorrect! Try again.
7In Cyclic Redundancy Check (CRC), if the generator polynomial is , what is the divisor in binary form?
A.1011
B.1101
C.1001
D.1110
Correct Answer: 1011
Explanation:The polynomial corresponds to the binary sequence 1011.
Incorrect! Try again.
8When using a checksum for error detection, the sender calculates the sum of data segments using:
A.1's complement arithmetic
B.2's complement arithmetic
C.Modulo-2 arithmetic
D.Floating point arithmetic
Correct Answer: 1's complement arithmetic
Explanation:In standard checksums (like Internet Checksum), segments are added using 1's complement arithmetic, and the result is complemented to form the checksum.
Incorrect! Try again.
9Which of the following best describes Piggybacking?
A.Sending multiple frames at once
B.Attaching an acknowledgment to a data frame going in the reverse direction
C.Retransmitting a frame immediately after a timeout
D.Using a token to control access
Correct Answer: Attaching an acknowledgment to a data frame going in the reverse direction
Explanation:Piggybacking is the technique of delaying an acknowledgment (ACK) so that it can be attached to the next outgoing data frame.
Incorrect! Try again.
10In the Go-Back-N ARQ protocol, if bits are used for the sequence number, the sender window size must satisfy:
A.
B.
C.
D.
Correct Answer:
Explanation:In Go-Back-N, the window size must be at most to avoid ambiguity between new frames and retransmissions of old frames.
Incorrect! Try again.
11In Selective Repeat ARQ, if the sequence number space is size , what is the maximum size of the sender window?
A.
B.
C.
D.
Correct Answer:
Explanation:In Selective Repeat, the sender and receiver window sizes are typically equal and must satisfy . Thus, max window size is .
Incorrect! Try again.
12What is the standard length of a MAC address?
A.32 bits
B.48 bits
C.64 bits
D.128 bits
Correct Answer: 48 bits
Explanation:A standard Ethernet MAC address is 48 bits (6 bytes) long, typically represented in hexadecimal format.
Incorrect! Try again.
13A Layer 2 Switch makes forwarding decisions based on:
A.Source IP address
B.Destination IP address
C.Destination MAC address
D.Source MAC address
Correct Answer: Destination MAC address
Explanation:Switches look at the destination MAC address of the incoming frame to determine which port to forward the frame to.
Incorrect! Try again.
14Which of the following is the Broadcast MAC address?
A.00:00:00:00:00:00
B.FF:FF:FF:FF:FF:FF
C.127.0.0.1
D.AA:BB:CC:DD:EE:FF
Correct Answer: FF:FF:FF:FF:FF:FF
Explanation:The address consisting of all 1s (FF:FF:FF:FF:FF:FF in hex) is the broadcast address, meaning the frame is intended for all stations on the LAN.
Incorrect! Try again.
15In Pure ALOHA, the vulnerable time (the time interval during which a collision can occur) is:
A. (Frame transmission time)
B.
C.
D.Indeterminate
Correct Answer:
Explanation:In Pure ALOHA, a collision occurs if another station transmits within the time range , making the vulnerable time .
Incorrect! Try again.
16What is the maximum theoretical efficiency (throughput) of Pure ALOHA?
A.18.4%
B.36.8%
C.50%
D.100%
Correct Answer: 18.4%
Explanation:The maximum throughput of Pure ALOHA is or 18.4%.
Incorrect! Try again.
17What is the maximum theoretical efficiency of Slotted ALOHA?
A.18.4%
B.36.8%
C.50%
D.80%
Correct Answer: 36.8%
Explanation:Slotted ALOHA reduces the vulnerable time by half compared to Pure ALOHA. or 36.8%.
Incorrect! Try again.
18In CSMA/CD, what does the station do immediately after detecting a collision?
A.It stops transmitting and waits for a random time
B.It continues transmitting to ensure all nodes detect the collision (Jamming Signal)
C.It switches to Slotted ALOHA mode
D.It drops the packet permanently
Correct Answer: It continues transmitting to ensure all nodes detect the collision (Jamming Signal)
Explanation:Upon detecting a collision, a station sends a brief Jamming Signal to ensure that all other stations on the segment are aware of the collision before stopping.
Incorrect! Try again.
19Which CSMA persistence method transmits immediately if the channel is idle, but transmits with probability ?
A.Non-persistent
B.1-persistent
C.p-persistent
D.0-persistent
Correct Answer: 1-persistent
Explanation:In 1-persistent CSMA, if the station senses the channel is idle, it transmits immediately (probability 1). If busy, it listens continuously until idle.
Incorrect! Try again.
20The Binary Exponential Backoff algorithm is used in Ethernet to:
A.Calculate the CRC
B.Determine the window size for flow control
C.Determine the waiting time after a collision
D.Assign IP addresses
Correct Answer: Determine the waiting time after a collision
Explanation:After a collision, stations wait a random amount of time determined by , where is chosen from $0$ to (Binary Exponential Backoff).
Incorrect! Try again.
21For CSMA/CD to work correctly, the minimum frame size must be:
A.
B.
C.
D.Equal to the header size
Correct Answer:
Explanation:To detect a collision before finishing transmission, the transmission time must be at least twice the propagation delay ().
Incorrect! Try again.
22Why is CSMA/CD not typically used in Wireless LANs (802.11)?
A.Wireless signals travel faster
B.The Hidden Station problem makes collision detection difficult
C.Wireless has no bandwidth limit
D.CSMA/CD is too fast for wireless
Correct Answer: The Hidden Station problem makes collision detection difficult
Explanation:In wireless, a sender cannot always detect a collision at the receiver (Hidden Station problem) and the signal strength of transmission overwhelms incoming collision signals.
Incorrect! Try again.
23Which protocol is used in Wireless LANs instead of CSMA/CD?
A.CSMA/CA (Collision Avoidance)
B.Pure ALOHA
C.Token Ring
D.Slotted ALOHA
Correct Answer: CSMA/CA (Collision Avoidance)
Explanation:Wireless networks use CSMA/CA, which uses RTS/CTS frames and inter-frame spacing to avoid collisions rather than detecting them.
Incorrect! Try again.
24Which of the following is a Controlled Access protocol?
A.ALOHA
B.CSMA/CD
C.Token Passing
D.Ethernet
Correct Answer: Token Passing
Explanation:Token Passing is a controlled access method where a station needs a token to transmit, eliminating collisions. ALOHA and CSMA are random access protocols.
Incorrect! Try again.
25In the Token Ring topology, what happens when a station holds the token?
A.It must forward the token immediately
B.It can transmit data frames
C.It enters sleep mode
D.It listens for collisions
Correct Answer: It can transmit data frames
Explanation:Holding the token grants the station the exclusive right to transmit data on the ring for a specific holding time.
Incorrect! Try again.
26The IEEE standard for Ethernet is:
A.802.11
B.802.3
C.802.5
D.802.15
Correct Answer: 802.3
Explanation:IEEE 802.3 defines the standards for wired Ethernet. 802.11 is Wi-Fi, 802.5 is Token Ring.
Incorrect! Try again.
27What line coding scheme is used in Standard Ethernet (10BaseT)?
A.NRZ-L
B.Manchester Encoding
C.Differential Manchester
D.AMI
Correct Answer: Manchester Encoding
Explanation:Standard Ethernet uses Manchester encoding, which ensures a transition in the middle of every bit period for synchronization.
Incorrect! Try again.
28An Ethernet frame begins with a Preamble. What is its pattern?
A.Alternating 1s and 0s
B.All 1s
C.All 0s
D.Sequence of flag bytes
Correct Answer: Alternating 1s and 0s
Explanation:The preamble is 7 bytes of alternating 1s and 0s ($101010...$) used to synchronize the receiver's clock.
Incorrect! Try again.
29Which field in the Ethernet frame follows the Preamble and signals the beginning of the frame?
A.Source MAC
B.Length
C.SFD (Start Frame Delimiter)
D.CRC
Correct Answer: SFD (Start Frame Delimiter)
Explanation:The SFD is 1 byte ($10101011$) that immediately follows the preamble and indicates the start of the frame content.
Incorrect! Try again.
30What is the minimum frame length of a standard Ethernet frame?
A.32 bytes
B.46 bytes
C.64 bytes
D.128 bytes
Correct Answer: 64 bytes
Explanation:The minimum Ethernet frame size is 64 bytes (18 bytes header/trailer + 46 bytes minimum payload) to ensure collision detection works properly.
Incorrect! Try again.
31If the data payload in an Ethernet frame is less than 46 bytes, what happens?
A.The frame is discarded
B.Padding is added to make it 46 bytes
C.The frame is sent as a 'runt' frame
D.The CRC is omitted
Correct Answer: Padding is added to make it 46 bytes
Explanation:The data field must be at least 46 bytes. If the actual data is less, padding (extra 0s) is added.
Incorrect! Try again.
32The CRC in an Ethernet frame is located in the:
A.Header
B.Preamble
C.Frame Check Sequence (FCS) field at the end
D.Type field
Correct Answer: Frame Check Sequence (FCS) field at the end
Explanation:The 4-byte CRC is stored in the Frame Check Sequence (FCS) field at the tail of the frame.
Incorrect! Try again.
33In 100Base-TX Ethernet, the '100' stands for:
A.100 meters maximum length
B.100 Mbps transmission speed
C.100 nodes maximum
D.100 MHz frequency
Correct Answer: 100 Mbps transmission speed
Explanation:The number indicates the data rate in Mbps. 100Base-TX is Fast Ethernet running at 100 Mbps.
Incorrect! Try again.
34Which component splits a collision domain into multiple smaller collision domains?
A.Repeater
B.Hub
C.Switch
D.Cable
Correct Answer: Switch
Explanation:A Hub broadcasts data to all ports, creating one large collision domain. A Switch isolates ports, creating a separate collision domain for each port.
Incorrect! Try again.
35What is p-persistent CSMA?
A.Station transmits with probability 1 if idle
B.Station transmits immediately if idle
C.Station transmits with probability if idle, waits with probability
D.Station never transmits
Correct Answer: Station transmits with probability if idle, waits with probability
Explanation:In p-persistent CSMA (used in slotted channels), if the channel is idle, the station transmits with probability and defers to the next slot with probability .
Incorrect! Try again.
36Which Hamming code parity configuration (Even/Odd) ensures that the total number of 1s in the code is even?
A.Odd Parity
B.Even Parity
C.CRC Parity
D.Zero Parity
Correct Answer: Even Parity
Explanation:Even Parity adds a bit such that the total count of 1s in the data plus the parity bit is an even number.
Incorrect! Try again.
37Calculate the Hamming code redundancy bits () required for a 7-bit data word (). (Using )
A.3
B.4
C.2
D.5
Correct Answer: 4
Explanation:Using : If , (False). If , (True). So, 4 bits are needed.
Incorrect! Try again.
38What is a Burst Error?
A.A single bit flip
B.Two or more bits in the data unit have changed
C.Error in the header only
D.Error caused by router congestion
Correct Answer: Two or more bits in the data unit have changed
Explanation:A burst error means that 2 or more bits in the data unit have changed from 1 to 0 or from 0 to 1.
Incorrect! Try again.
39The divisor in a CRC generator is always:
A.The same size as the data
B.One bit less than the generator polynomial degree
C.One bit more than the degree of the generator polynomial
D.Always 16 bits
Correct Answer: One bit more than the degree of the generator polynomial
Explanation:If the polynomial degree is (e.g., ), the divisor will have bits.
Incorrect! Try again.
40In a switch, the Address Learning process involves:
A.Reading the destination MAC and storing it in the table
B.Reading the source MAC of incoming frames and mapping it to the port
C.Sending a broadcast to ask for names
D.Manually typing IP addresses
Correct Answer: Reading the source MAC of incoming frames and mapping it to the port
Explanation:Switches learn network topology by examining the Source MAC address of every frame received and recording which port it came from.
Incorrect! Try again.
41Which mechanism is used for Flow Control in the Data Link Layer?
A.CRC
B.Hamming Code
C.Sliding Window Protocol
D.Manchester Encoding
Correct Answer: Sliding Window Protocol
Explanation:Flow control prevents the sender from overwhelming the receiver. Sliding Window (and Stop-and-Wait) are mechanisms to achieve this.
Incorrect! Try again.
42What is the result of in Modulo-2 arithmetic?
A.0100
B.0101
C.0011
D.1111
Correct Answer: 0100
Explanation:Modulo-2 addition is equivalent to XOR. . Result: $0100$.
Incorrect! Try again.
43In Polling (Controlled Access), who controls the link access?
A.Any station
B.The Primary Station
C.The station with the token
D.The station with the highest IP
Correct Answer: The Primary Station
Explanation:In Polling, a Primary device controls the link and polls Secondary devices to see if they have data to send.
Incorrect! Try again.
44Gigabit Ethernet (1000Base-T) supports a data rate of:
A.10 Mbps
B.100 Mbps
C.1000 Mbps
D.10 Gbps
Correct Answer: 1000 Mbps
Explanation:Gigabit Ethernet transmits at 1 Gigabit per second, which is 1000 Mbps.
Incorrect! Try again.
45What is the purpose of the Inter-Frame Gap in Ethernet?
A.To detect collisions
B.To allow the receiver to process the previous frame and prepare for the next
C.To increase the data rate
D.To stuff bits
Correct Answer: To allow the receiver to process the previous frame and prepare for the next
Explanation:Ethernet requires a minimum idle time (96 bit times) between frames to give network interfaces time to recover.
Incorrect! Try again.
46Which of the following is NOT a Random Access Protocol?
A.CSMA/CD
B.ALOHA
C.CSMA/CA
D.Reservation
Correct Answer: Reservation
Explanation:Reservation is a Controlled Access protocol. The others are Random Access (contention-based).
Incorrect! Try again.
47In Byte Stuffing, if the flag byte appears in the data, what is inserted before it?
A.A zero bit
B.Another flag byte
C.An Escape (ESC) byte
D.A parity bit
Correct Answer: An Escape (ESC) byte
Explanation:Byte stuffing uses a special Escape byte to indicate that the following character is data, not a frame delimiter.
Incorrect! Try again.
48The Maximum Transmission Unit (MTU) for standard Ethernet is typically:
A.64 bytes
B.1500 bytes
C.1518 bytes
D.4096 bytes
Correct Answer: 1500 bytes
Explanation:The maximum payload (data field) for a standard Ethernet frame is 1500 bytes.
Incorrect! Try again.
49In 2D Parity check, errors can be detected:
A.Only in rows
B.Only in columns
C.In both rows and columns
D.Only if there is a single bit error
Correct Answer: In both rows and columns
Explanation:2D Parity organizes data into a table and calculates parity for both rows and columns, improving detection capabilities for burst errors.
Incorrect! Try again.
50What happens if a switch receives a frame with a destination MAC address that is not in its forwarding table?
A.It drops the frame
B.It sends it back to the sender
C.It floods the frame out of all ports except the receiving one
D.It sends an ARP request
Correct Answer: It floods the frame out of all ports except the receiving one
Explanation:This is called 'Unknown Unicast Flooding'. The switch broadcasts the frame to find the location of the destination device.
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.