You are on page 1of 2

SampIe uestIons for Computer Networks

1) Error detectIon at the data lInk level Is achIeved by:


a) 8It stuffIng (b) CyclIc redundancy codes (c) HammIng codes (d)
EqualIzatIon

2) A subnet mask Is used to
a) dentIfy dIfferent subnets wIthIn an Intranet
b) dentIfy dIfferent subnets wIthIn an Internet
c) dentIfy the number of bIts to be used as the network portIon In the P
address
d) |ask the P address of a machIne from hackers

J) WhIch of the followIng unIquely IdentIfIes a connectIon (when vIewed
from Network):
a) Sender P, FeceIver P
b) Sender Port, FeceIver Port
c) Sender P, Sender Port, FeceIver P, FeceIver Port
d) Sender P, Sender |AC, FeceIver P, FeceIver |AC

4) AssumIng that, for a gIven network layer ImplementatIon, connectIon
establIshment overheads are 100 bytes and dIsconnectIon overheads are 28
bytes, what would be the mInImum sIze of a packet the transport layer needs
to keep If It wIshes to Implement a datagram servIce above the network layer
and needs to keep Its overhead to a maxImum of 12.5. gnore transport layer
overheads.

a) 512 bytes (b) 768 bytes (c) 1152 bytes (d) 1024 bytes

5) Endtoend connectIvIty Is provIded from hosttohost In:
a) the network layer
b) the transport layer
c) the sessIon layer
d) It Is a combIned functIonalIty of the network and the data lInk layers

Answers to SampIe uestIons
1) (b) 2 (c) J (c) 4 (d) 5 (b)

You might also like