You are on page 1of 33

EVALUATION SYSTEM COURSE FILE

SUBJECT NAME: DATA COMMUNICATIONS AND COMPUTER NETWORKS CLASS: III / I DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING FACULTY NAME: T.Lakshmi Lavanya

DATA COMMUNICATIONS AND COMPUTER NETWORKS

COURSE FILE

INDEX COURSE FILE


Subject: Data Communications and Computer Networks Name of the Faculty: T.Lakshmi Academic Year: Document No. Branch: Computer Science and Engineering Lavanya 2013-2014 ECEW//IT/ES/II/I.1/CF/DCCN Name of Faculty: Class: III / CSE T.Lakshmi Lavanya Academic Year: 2013-2014 Semester: I Sno. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Topic Syllabus Objective Target Session Planner Syllabus coverage Time Table Lecture wise handwritten class notes Assignments Tutorial Question Bank/Papers a. Subjective unit wise b. Objective unit wise Sample Assignments Sample Solved Question Paper HOD Review Course Completion Certificate Additional teaching material viz. PPTs, OHPs, downloaded material etc.. in a separate file Page No.

SYLLABUS
Subject: Data Communication and Computer Networks Branch: III-CSE

Academic Year: 2013-2014 Semester: I Faculty:T.Lakshmi Lavanya DAT COMMUNICATION AND COMPUTER NETWORKS UNIT I Introduction: Data communications, Networks, The Internet, protocols and Standards, Network Models. Layered tasks. The OSI Model, Layers in the OSI Model. TCP/IP Protocol Suite. Addressing, Physical layer and Media. Data and Signals. Analog and Digital, periodic, Analog Signals, Digital Signals. Transmission impairment. Data rate Limits, performance, Digital Transmission, Digital-to- Digital Conversion, Analog-to-digital Conversion, Analog Transmission, Digital -to-Analog conversion, Analog-To-Analog Conversion. UNIT II Bandwidth utilization: Multiplexing and Spreading, Multiplexing, spread Spectrum, Transmission Media, Guided Media, Unguided media: wireless, Switching, circuit-Switched networks, Datagram Networks, Virtual-Circuit Networks, Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks, Dial-up Modems, Digital Subscriber Line, Cable TV networks, Cable TV for Data Transfer. UNIT III Error Detection and correction , Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing, Flow and error Control , protocols, Noiseless Channels, HDLC, Point-to-Point protocol, Multiple Access, random Access, Aloha, Controlled Access, Channelization, IEEE standards , standard Ether net , changes in the standard. Fast Ethernet, Gigabit Ethernet, IEEE802.11, Bluetooth. UNIT IV Connecting LANs. Backbone Networks, and Virtual LANs, Connecting Devices, Backbone networks virtual LANs, cellular telephony, Satellite Networks, sonnet/SDH architecture, sonnet Layers, Sonet Frames, STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks, frame relay and ATM, Frame Relay, ATM, ATM LANs.

UNIT V Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses, network Layer: Internet protocol, Internetworking, IPv4, IPv6 transition from IPv4 to IPv6. Network Layer Address Mapping, Error Reporting and Multicasting, address mapping, ICMP, IGMP, ICMPv6, Network

Layer: Delivery, Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols. UNIT VI Transport Layer: process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery, User datagram protocol (UDP), TCP, SCTP, Congestion control and Quality of service. Data Traffic. Congestion , congestion control, two Examples, Quality service, Techniques to improve QOS, Integrated Services, Differentiated services, QOS in Switched networks. UNIT VII Application layer: Domain name system, Name space, Domain name space, Distributed of name space, DNS in the Internet, Resolution, DNS messages, Types of records, registers, Dynamic Domain name System(DDNS), Encapsulation, Remote Logging, Electronic mail and file Transfer, Remote Logging, Telnet, Electronic mail, File Transfer. UNIT VIII WWW and HTTP: Architecture, web Documents, HTTP Network Management: SNMP, Network Management system, Simple Network Management protocol (SNMP), Multimedia, Digitizing Audio and Video Audio and video compression, streaming stored audio/video, streaming live audio/ video, Real-Time Interactive Audio/video. RTP, RTCP, Voice over IP. TEXT BOOKS: 1. 2. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, TMH. Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.

REFERENCE BOOKS: 1. Introduction to Data Communication and Networking. W.Tomasi. Pearson Education 2. Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group. 3. Data Communications and Computer Networks, P.C Gupta PHI

OBJECTIVE

Subject: Data Communication and Computer Networks Branch: III-CSE Semester: I Faculty: T.Lakshmi Lavanya

The main objective of this subject is introducing the concepts of electronic communications systems, data communications, and network. It also introduces the wireless and wire link telecommunications systems, basic data communications network and systems, local area networks, internetwork and intranetwork. And also includes the protocols like TCP/IP. And it also introducing about the telephone instruments and signals and cellular telephone concepts and cellular telephonic systems. By studying this subject will known about the transmission media and communication cables to transfer the data from source to destination trough signals. And we will know about the communication codes and error controls and data formats for identifying the errors.

Subject: Data Communication and Computer Networks Branch: III-CSE Academic Year: 2013-2014 Semester: I Faculty: T.Lakshmi Lavanya

Sno

Unit

Class
Topic

Text / Ref ere nce boo k T1, R1 T1,R1 T1,R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2 R1, R1, R1, R1, R1,

Chapte r No

Remark s

1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 II I

L1 L2 L3 L4 L5 L6 L7 L8 L9 L10 L11 L12 L13 L14 L15 L16 L17 L18 L19 L20 L21 L22 L23 L24

INTRODUCTION

Data communications, Networks

20-24 25-28 29-36 37-38 39 39-55 58-73 75-76 77-79 97 98-100 100-109 110 110-112 113-116 119-120 121-122 123-124 124-132 133-136 137-147 151-162 163 164 165-174 177-184 185-186

The Internet, protocols and Standards Network Models Layered tasks. The OSI Model Layers in the OSI Model. TCP/IP Protocol Suite, Addressing Physical layer and Media. Data and Signals Analog and Digital, periodic Analog Signals, Digital Signals. Transmission impairment. Data rate Limits performance, Digital Transmission Digital-to- Digital Conversion, Analog-to-digital Conversion Analog Transmission, Digital -to-Analog conversion, Analog-To-Analog Conversion. Bandwidth utilization: Multiplexing and Spreading, Multiplexing, spread Spectrum Transmission Media, Guided Media, Unguided media: wireless, Switching, circuit-Switched nerworks Datagram Networks, Virtual-Circuit Networks, Structure of a switch, using Telephone and Cable Networks for data Transmission, telephone networks Dial-up Modems, Digital Subscriber Line Cable TV networks Cable TV for Data Transfer. Error Detection and correction Introduction, Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing Flow and error Control , protocols, Noiseless

III

L25 L26 L27

T1, R1, R2

Channels
L28 L29 L30 L31 L32 L33 L34 4 IV L35 L36 L37 L38 L39 L40 L41 L42 5 V L43 L44 L45 L46 L47 L48 L49 6 VI L50 L51 L52 L53 L54

HDLC, Point-to-Point protocol, Multiple Access, random Access, Aloha


Frame Synchronization, Multiplexing FrequencyDivision

Controlled Access, Channelization IEEE standards , standard Ether net , changes in the standard. Fast Ethernet, Gigabit Ethernet, IEEE802.11 Bluetooth. Connecting LANs. Backbone Networks Virtual LANs, Connecting Devices, Backbone networks virtual LANs cellular telephony, Satellite Networks Sonnet/SDH architecture, sonnet Layers, Sonet Frames STS Multiplexing, sonnet networks, virtual tributaries virtual circuit networks Frame relay and ATM, Frame Relay ATM, ATM LANs.

T1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2 T1, R2

R1, R1, R1, R1, R1, R1, R1, R1, R1,

187-194 195-197 198-202 203-207 210-211 212-214 215-222 223-224 225-229 241-246 247-248 249-255 256-260 263-266 266-271 272-286 287-294 348-357 358 359-369 370-376 3773382 386-402 403-415 467-468 469-470 471-472

T1, R1, R2 T1, R1, R2 T1, R1, R2 T1, R2 T1, R2 T1, R2 T1, R2 R1, R1, R1,

R1, Network layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses network Layer: Internet protocol, Internetworking, T1, R1, R2 IPv4, IPv6 transition from IPv4 to IPv6.

Network Layer Address Mapping Error Reporting and Multicasting, address mapping ICMP, IGMP, ICMPv6 Network Layer : Delivery, Forwarding and routing, delivery, forwarding Unicast Routing protocols, Multi cast Routing protocols. Transport Layer: process-Process Delivery: UDP, TCP and SCTP Process-to-Process Delivery User datagram protocol (UDP), TCP, SCTP Congestion control and Quality of service. Data Traffic. Congestion , congestion control, two

T1, R2 T1, R2 T1, R2 T1, R2

R1, R1, R1, R1,

T1, R1,R2

T1, R1, R2 T1, R2 T1, R2 T1, R2 T1, R2 R1, R1, R1, R1,

Examples
L55 L56 L57 7 VII L58 L59 L60 L61 L62 L63 L64 8 VIII L65 L66 L67 L68 L69 L70 L71

Quality service, Techniques to improve QOS Integrated Services, Differentiated services QOS in Switched networks Application layer: space Domain name system, Name

T1, R2 T1, R2 T1, R2 T1, R2

R1, R1, R1, R1,

473-480 481-486 487-490 493-498 499 500-510 512-527

Domain name space, Distributed of name space DNS in the Internet, Resolution, DNS messages Types of records, registers, Dynamic Domain name System(DDNS) Encapsulation, Remote Logging, Electronic mail and file Transfer Remote Logging, Telnet Electronic mail, File Transfer. WWW and HTTP: Architecture, web Documents HTTP Network Management: SNMP, Network Management system Simple Network Management protocol (SNMP) Multimedia, Digitizing Audio and Video Audio and video compression streaming stored audio/video, streaming live audio/ video Real-Time Interactive Audio/video RTP, RTCP, Voice over IP.

T1, R1, R2 T1, R1, R2 T1, R1, R2

TEXT BOOKS: T1. TMH. T2. Data Communication and networking, Fourth Edition by Behrouza A. Forouzan, Computer Networks, A.S. Tanenbaum, 4th edition, Pearson education.

REFERENCE BOOKS: R1. R2. R3. Introduction to Data Communication and Networking. W.Tomasi. Pearson Education Data and computer Communications, G.S Hura and M.Singal, CRC press, Taylor and Francis Group. Data Communications and Computer Networks, P.C Gupta PHI

SYLLABUS COVERAGE
Subject: DATA COMMUNICATION AND COMPUTER NETWORKS Branch: III CSE Academic Year: 2013-2014 Semester: I Faculty: T.Lakshmi Lavanya

Sno Unit 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 I

Lectur e No. C1 C2 C3 C4 T1 C5 C6 C7 CT1 C8 C9 C10 T2 C11 C12 C13 C14 CT2 C15 C16 C17 C18 T3 C19 C20 C21 C22 C23 CT3 C24 C25 C26 C27 T4 C28 C29 C30 C31 CT4 C32 C33

Date Planned

Date Conducte d

Reason(s) for Non Compliance

Plan to over come non compliance

II

III

------------------- I-MID EXAMS FROM -------------------------------

C ---- CLASS CT---- CLASS TEST T ------- > TUTORIAL

Assignments, Quality and Evaluation


Subject: DATA COMMUNICATION AND COMPUTER NETWORKS Year/Branch: III/I CSE Faculty: T.Lakshmi Lavanya Semester-I

Academic Year: 2013-2014 Unit No I Assign -ment no 1 Topic Date Planned

Date Of Submissi on

Date Of Distributi on

1. Describe the following standard organizations: ISO,ITU-T, IEEE,ANSI,EIA, TIA, IAB, ETF, and IRTF. 2. Name and explain the functions of each of the layers of the seven layer OSI model. 3. Name and explain the functions of Analog and

Digital, periodic, Analog Signals, Digital Signals

4. Explain about the


TCP/IP Protocol Suite

5. Explain about the


Digital-to- Digital Conversion, Analog-todigital Conversion 6. Explain about the Digital -to- Analog conversion, Analog-

To-Analog Conversion.

1. Describe the following types of Multiplexing and


Spreading, Multiplexing, spread Spectrum

2. Describe the following types of Guided Media and Un


Guided Media Transformation media 3. Explain the functions of circuit-Switched networks, Datagram Networks, VirtualCircuit Networks 4. Explain the functions of Structure of a switch, using Telephone and Cable Networks 5. Explain the functions Structure of a switch, using Telephone and Cable Networks for data Transmission 6. Explain the functions Cable TV networks, Cable TV for Data Transfer.

II

III

1. Explain about Error Detection and correction 2. Explain about Block coding, Liner Block codes, Cyclic codes, checksum, data Link Control, Framing. 3. . Explain about protocols, Noiseless Channels 4. Explain about HDLC, Point-toPoint protocol 5. Explain about Multiple Access, random Access, Aloha, Controlled Access 6. Explain about Gigabit Ethernet, IEEE802.11, and Bluetooth.

IV

1. Explain the function of


Connecting LANs. Backbone Networks, and Virtual LANs

2. Explain the function of


Connecting Devices, Backbone networks virtual LANs

3. Explain the function and


basic operation of the following

cellular telephony, Satellite Networks

4. Explain the function and


basic operation of the following

sonnet/SDH architecture, sonnet Layers, Sonet

5. Explain the function of the


STS Multiplexing, sonnet networks, virtual tributaries, virtual circuit networks
6. Explain the function and basic operation of the following Frame Relay, ATM,

ATM LANs
1. Explain about the Logical

Addressing, IPv4 Addresses 2. Explain about the Internet protocol, Internetworking


3. Explain the about the mapping b/w IPv4, IPv6

transition from IPv4 to IPv6


4. Explain the about the

Network Layer Address Mapping, Error Reporting and Multicasting


5. Explain the function and basic operation of the following , IPv4 Addresses, IPv6

Addresses 6. Explain about the Forwarding and routing, delivery, forwarding, Unicast Routing protocols, Multi cast routing protocols.

1. Describe the concepts of

process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery


2. Describe the concepts of

VI

TCP, UDP ,SCTP, Congestion control and Quality of service 3 Describe the Congestion , congestion control
4. Describe the Integrated

Services, Differentiated services


5. Describe the QOS in

Switched networks.
1. Describe the Domain name system and Domain name

space.
2. Describe the Distributed of name space DNS in the Internet, Resolution, DNS messages 3. Describe Dynamic Domain name System (DDNS), Encapsulation, Remote Logging.

VII

4. Describe the purpose


of Electronic mail and

file Transfer, Remote Logging

5. Describe the function


of a Telnet 6. Describe the Electronic mail,

File Transfer.

VIII

1. Draw and describe the HTTP Architecture and error control. 2. Describe the HTTP

Network Management: SNMP, Network Management system 3. Describe the Simple Network Management protocol (SNMP)
4. Describe the Digitizing

Audio and Video Audio and video compression 5. Explain the , streaming stored audio/video, streaming live audio/ video
6. Define and describe RTP,

RTCP, Voice over IP

Quality verified by HOD: Good/Average/Poor Format no: 10 Signature of HOD MLRIT/CSE/TC/II/ I.2/CF/Tutorial

Tutorial
Subject: Data communication and Computer Networks Branch: III CSE Academic Year: 2013-2014 Faculty: T.Lakshmi Lavanya Date Sno Unit no Tutorial topic Planned/ conducte d 1 I
1. Explain about the

Semester: I

Marks entered in the register (Yes/No)

Digital-to- Digital Conversion, Analog-todigital Conversion


2. Explain about the

Digital -to- Analog conversion, Analog-To-Analog Conversion.

II

1. Explain the functions


of circuit-Switched

networks, Datagram Networks, VirtualCircuit Networks 2. Explain the functions Cable TV networks, Cable TV for Data Transfer.

III

1. Explain about Error

Detection and correction


Decoding 2. Explain about Gigabit

Ethernet, IEEE802.11, and Bluetooth.

IV

1.

Explain the function of

Connecting LANs. Backbone Networks, and Virtual LANs


2. Explain the function and basic operation of the following Frame Relay, ATM,

ATM LANs

1. Explain the about the mapping b/w IPv4, IPv6

transition from IPv4 to IPv6


.

VI

1. Describe the concepts of

TCP, UDP ,SCTP, Congestion control and Quality of service


1. Describe the

VII

Distributed of name space DNS in the Internet, Resolution, DNS messages


1. Describe the HTTP

VIII

Network Management: SNMP, Network Management system

Quality verified by HOD: Good/Average/Poor Signature of HOD

Subject: Data Communication and Computer networks Branch: III-I CSE Academic Year: 2013-2014 Semester: I Faculty: T.Lakshmi Lavanya

OBJECTIVE QUESTIONS
UNIT-I 1. The unit of data is _______ a) Data b) Datum c) Information d) None ( ) 2. What is protocol_________? 3. Information is defined as__________ 4. When message are intended for all subscribers on the network is called______ ( ) a) Broadcasting b) multicasting c) network d) data 5. When message are intended for a specific group of subscribers it is called______________ ( ) a) Broadcasting b) multicasting c) network d) data 6. Point-to-point networks have only--------stations ( ) a) 2 b) 3 4) 1 d) 0 7. Example of connection less protocol is ( ) a) Virtual circuit d) datagram circuit c) network d) none 8. ISO stands for__________ ( ) 9. In the simplex mode data transmission is ________ ( ) a) Unidirectional b) bidirectional c) a & b d) none 10. _____holds shared files, programs, and the network O/S ( ) a) Serverb) client c) shared date d) none 11. GAN stands for _____________ ( ) 12. Converting information signal to a different form is called______ ( ) a) Analog b) digital c) modulation c) demodulation 13. What is Data Communication______? 14. Define digital modulation 15. Define connection oriented protocol_________ 16. Determine the number of conditions possible for a binary code Containing the following number of bits____________________ ( ) a) 3 b)5 c) 7 d) 12 17. For sine wave with the frequencies of 100Hz .determine the Period ( ) a) 10 b) 100 c) 1 d)none 18. For an electronic device operating at 17C with a bandwidth of 10kHz, ( ) Determine the thermal noise power in watts and dBm. a) 4 *10-17 watts b) 11 *10-17 watts c)3 *10-11 watts d)2 *10-12 watts 19. TCP/IP stands for_____________________ ( ) 20. For sine wave with the period is 0.1ms, determine the frequencies ( ) a) 100 kHz b) 10kHz c) 1MHz d) none UNIT-II 1. For sine wave with the frequencies of 100Hz .determine the Period ( ) a) 10 b) 100 c) 1 d) none 2. Define an amplitude_________ 3. Define frequency_____________

4. The distance of one cycle occurring in space is called the_________ a) Velocity b) frequency c) wavelength d) time 5. The reciprocal of frequency is called_________________ ( ) a)time b)bandwidth c) amplitude d)none 6. What is Bit Rate______? 7. What is M-ary______ 8. Velocity factor is__________ a) Vp * c b) c* 2d c) Vp/c d) none 9. What is the speed o light___________ a) 3 *108 m/s b)6.625 *10-23 j/s c)3.14 *109 m/s 10. The cancellation of common mode signal is called__________ 11. What is the bit_______? 12. What is buad________? 13. Wavelength is________ a) c/ f b)f/c c)c +f d) 1/c + f 14. Optical power is expressed mathematically as P= __________ a)dQ/dt b)dt/dQ c)dQ + dt d )none 15. Define the critical angle____________ 16. Refractive index is ___________ a) v/c b)v+c c) 1/v+c d)c/v 17. What are the losses of metallic transmission line ----------18. Two kinds of waves are__________ 19. What is bandwidth_________? 20. Buffer jacket is made up of__________ 21. Dielectric constant is separated by_______ a) Insulator b) conductor c) a & b d) none

( )

( ) ( ) ( ) ( ) ( ) ( )

( )

UNIT-III 1. What is digital transmission________? 2. PAM is used to -------------------------------( ) a) PSK B) QAM c) PCM d)all 3. PAM stands for__________________ 4. Peak amplitude values varied between________ ( ) a)+2 v to -2v b)+4v to -4v c)+5v to -5v d)none 5. Dynamic range (DR) is the ratio of___________ ( ) a) Vmax/Vmin b) Vmin/Vmax c) Vmax +Vmin 6.PCM stands for _______________ 7. PWD stands for_______________ 8.PCM system used------( ) a) 12bit linear & 8bits compressed code b) 8bit linear & 12bits compressed code c) 12bit linear & 12bits compressed code d) all are correct 9. Determine the minimum nyquist rate for a maximum analog input frequency of the 10KHz________________ 10. Determine the maximum analog input frequency of the sample rate______ ( ) 11. Dertermine the maximum number of PCM bits of a Dynamic range of 80 dB.______________ 12.What is companding_________ ( ) a) Compression & expanding b) extracting & excluding c) Conclusion d) a & b 13. Types of companding__________________ ( ) a)analog and digital companding b) data companding c) Numerical and Data Companding d)none

14. Analog Companding occur in_______________ ( ) a)-law Companding b)A-law companding c) Both a & b d) none 15. Line speed is the ratio of__________ ( ) a)bits/sec b)bits/n c)baud/sec d)none 16. What is digital Multiplexing_______? 17. TDM stands for_________________ 18. The transmission o information from more than one Source to more than one destination over the same transmission medium. ( ) a) Frequency b) multiplexing c) voltage d) signal 19. What is duty cycles___________? 20.T2 carrier TDM system have ___________ ( ) a) 64kbps b) BPRZ-AMI c) B6ZS d)all UNIT-IV 1. Which polarization is the electric field propagates parallel to the earths surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none 2. Which polarization is the electric field propagates parallel to the earths surface ( ) a) Vertical polarization b) horizontal polarization c) a & b d) none 3. The _________of a plane electromagnetic wave is simply the orientation of the electric field vector in respect to earths surface. ) a) Signature b) polarization c) modulation d) none 4. __________represents the flow of electromagnetic waves in the direction of propagation. ( ) a) Power density b) radiation c) electromagnetic radiation d) all 5._______is energy per unit of time per unit of area and is usually given in watts per square ( ) a) Power density b) radiation c) electromagnetic radiation d) all 6. Power density is _______ ) a)p=eh b)p=e/h c)p=e +h d)all ( (

7. A point source radiating power at a constant rate uniformly in all directions. Such a source is called an _______ ( ) a) Isotropic radiation b) electromagnetic radiation c) Power density d) radiation 8. The power density is inversely proportional to the square of the distance from the source. ( ) a) Plancks law b) Inverse square law c) both a & b d) all 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. However, as waves propagate through free space, they spread out, resulting in a reduction in power density.This is called________ ( ) a)Absorption b)Attenuation c)both a & b d)all

10. Earths atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( a) Radiation loss b) coupling loss c) absorption loss d) all 11. Reduction in power density with distance is equivalent to a power loss Is called_______ a) Wavelength b) velocity c) wave attenuation d) all 12. The attenuation is due to the spherical spreading o the wave in space Is called_______ a) space attenuation b) wave attenuation c) Attenuation (

13. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 14. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none 15. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none 16. ______ is defined as the modulation or reduction of energy within a wavefront when it passes near the edge of an opaque object. ( ) a) a) Refraction b) reflection c) both a & b d)Defraction 17. Radio wave _________occurs when two or more electromagnetic waves combine in such a way that system performance is degraded. ( ) a)Refraction b) reflection c) Interference d)Defraction 18.___________ are electromagnetic waves that travel along the surface of earth.( ) a) Surface wave b) ground wave c) both a & b d) all 19. Electromagnetic waves that are directed above the horizon level are called ____( ) a) Surface wave b) ground wave c) sky wave d) all 20. _______is the minimum distance from a transmit antenna that sky wave of given Frequency will be returned to earth. ( ) a) Surface wave b) ground wave c)skip distance d)all 21.________is defined as the loss incurred by an electromagnetic wave as it Propagates in a straight line through a vacuum with no absorption or reflection Of energy from nearby objects. ( ) a) Surface wave b) ground wave c)free-space path loss d)all 22. What is the satellite__________? 23. Satellites are ______ a) LEO b) MEO c) GEO d) All 24. _______ satellites orbit earth above the equator with the same angular velocity as earth. ( )

a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all 25.________satellite rotate around earth in circular or elliptical pattern. ( ) a) Synchronous satellite b) nonsychronous satellite c) both a & b d) all 26. 9. In free space is a vacuum, so no loss of energy occurs as a wave propagate through it. 27. However, as waves propagate through free space, they spread out, resulting in a reduction in power density. This is called________ ( ) a)Absorption b)Attenuation c)both a & b d)all )

28. Earths atmosphere is not a vacuum, it contains particles that can absorb electromagnetic energy. This type of reduction of power is called________ ( a) Radiation loss b) coupling loss c) absorption loss d) all 29. Reduction in power density with distance is equivalent to a power loss Is called_______ a) Wavelength b) velocity c) wave attenuation d) all 30. The attenuation is due to the spherical spreading o the wave in space Is called_______ a) Space attenuation b) wave attenuation c) Attenuation (

31. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 32. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none 33. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none 34. _______are combinations o passive components that are used to regulate the amplitude and frequency response of the voice signals. ( ) a) Equalizer circuit b) speaker c) microphone d) all 35. The ______________is the receiver for the telephone ( ) a) Equalizer circuit b) speaker c) microphone d) all 36. The ______________is the transmitter for the telephone ( ) a) Equalizer circuit b) speaker c) microphone d) all 37. The__________is sent back to the calling party at the same time the ringing Signal is sent to the called ( ) a) Ringing back signal b) receiver c) both a & b d) none 38. Energy is transferred from the wave to the atoms and molecules of substances in the Atmosphere, this transfer energy is called______ ( ) a) Wave absorption b) Wavelength c) velocity d) wave attenuation 39. Electromagnetic _________is the change in direction o an electromagnetic wave As it passes obliquely from one medium to another medium with a different density a) Refraction b) reflection c) both a & b d) none

40. Electromagnetic wave_________occurs when an incident wave strikes a boundary of two media and some or all of the incident power does not enter the second material a) Refraction b) reflection c) both a & b d) none UNIT-V 1. If a datagram router goes down then _ _ _ _ _ _ _ _ _ _ a. all packets will suffer b. only those packets which are queued in the router at that time will suffer c. only those packets which are not queued in the router at that time will suffer d. no packets will suffer 2. Indatagramsubnetnewrouteischosen__ __ ___ __ __ ___ __ a. for every packet sent b. for all the packet sent c. only for the first packet d. for the packet which is not transmitted 3. ThePSTNisanexampleofa_ ___ __ __ __ __ __ ___ _network a. packet switched b. circuit switched c. message switched d. frame switched 4. Eachpacketisroutedindependentlyin__ __ __ ___ __ __ __ a. virtual circuit subnet b. short circuit subnet c. datagram subnet d. ATM subnet 5. For a connection oriented service, we need a _ _ _ _ _ _ _ _ _ _ _ __ a. virtual circuit subnet b. short circuit subnet c. datagram subnet d. wireless subnet 6. Which type of switching uses the entire capacity of a dedicated link? a. circuit switching b. datagram packet switching c. virtual circuit packet switching d. message switching 7. In _ _ _ _ _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM. a. space division b. time division c. virtual d. packet 8. In_ __ __ ___ __ ___ ____ ,eachpacketofamessageneednotfollowthesamepathfrom sender to receiver. a. circuit switching b. message switching c. virtual approach to packet switching d. datagram approach to packet switching 9. In_ __ __ ___ __ ___ __ _ __ __ __,eachpacketofamessagefollowsthesamepath from sender to receiver. ] a. circuit switching b. message switching c. virtual approach to packet switching d. datagram approach to packet switching 10. A permanent virtual circuit involves _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Connection establishment

b. Data transfer c. Connection release d. Connection check 11. The set of optimal routes from all sources to a given destination from a tree rooted to the destination is known as _ _ _ _ _ _ _ _ _ _ _ _ _ a. Binary tree b. Sparse tree c. Sink tree d. AVL tree 12. Adaptive routing algorithms get their information from _ _ _ _ _ _________ a. only from local environment b. only from adjacent routers c. from locally, adjacent, external routers d. only from external routers 13. If the route from I to J is computed in advance, off line, and downloaded to the routers when the networkisbootediscalledas__ __ __ ___ ___ __ a. Dynamic routing b. Session routing c. Temporary routing d. Static routing 14. The router algorithm takes the decision to changes the route when _ _ _ _ _ _ _ _ _ _ _ _] a. router changes b. topology changes c. user changes d. transmission time does not change 15. If route from router I to router J is computed on line based on the current statistics, then it is called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Dynamic routing b. Session routing c. Temporary routing d. Static routing 16. If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuitisbeingsetup.Thisiscalledas________ a. Session routing b. Circuit routing c. Datagram routing d. Forwarding 17. _ _ _ _ _ _ _ _ _ _change their routing decisions to reflect changes in the topology. [02S02] a. Nonadaptive algorithms b. Adaptive algorithms c. Static algorithms d. Recursive algorithms 18. If router J is on the optimal path from router I to router K, then the path from J to K along the samerouteis __ __ _____ ___ _____ __.[02S03] a. does not exist b. optimal c. maximum d. constant 19. If router J is on the optimal path from router I to router K, then the optimal path from J to K also fallsalongthesamerouteisknownas_____ ___ ____ ___ __ __.[02S04] a. Routing principle b. Optimality principle c. Sink tree principle d. Network principle 20. ___ _________ ________ donotbasetheirroutingdecisionsonmeasurementsor estimates of the current traffic and topology. [02S05]

a. Nonadaptive algorithms b. Adaptive algorithms c. Static algorithms d. Recursive algorithms UNIT-VI 1. The method of network routing where every possible path between transmitting and receiving DTE is used is called [03D01] a. Random Routing b. Packet Flooding c. Directory Routing d. Message Switching 2. In Hierarchical routing for N router subnet, the optimal number of levels is _ _ _ _ _ _ _ a. logN b. log(N -1) c. lnN d. ln(N-1) 3. In Hierarchical routing, the routers are divided into what is called as _ _ _ _ _ _ _ _ _ _ _ _ a. zones b. Cells c. Regions d. Blocks 4. The regions in Hierarchical routing are grouped in to _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. a. Clusters b. Zones c. Blocks d. Cells 5. The Clusters in Hierarchical routing are grouped in to _ _ _ _ _ __________ a. Clusters b. Zones c. Blocks d. Cells 6. 1. If a router sends every incoming packet out only on those lines that are going approximately in therightdirectionisknownas__ __ ___ _______ a. Random flooding b. Static flooding c. Selective flooding d. Early flooding 7. In shortest path routing algorithm, the path length is measured based on _ _ _ _ _ _ _ _ _ _ _ _ a. time delay b. number of hops c. size of the routers d. routing table 8. Floodingalwayschoosethe______ ___ _______ a. Shortest path b. First path c. Last path d. Largest path 9. In military applications where large number of routers may be blown to bits at any instant, we use _ _ _ _ __________________ a. Shortest path first b. First come first serve c. Forwarding d. Flooding 10. In distributed applications, it is sometimes necessary to update all the databases concurrently, we use _ _ ____________________ a. Shortest path first b. First come first serve

c. Forwarding d. Flooding 11. In multicast routing with spanning tree method, a network with n groups, each with an average of m members, for each group we require _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. n pruned spanning trees must be stored for a total of mn trees b. m pruned spanning trees must be stored for a total of m trees c. n pruned spanning trees must be stored for a total of n trees d. m pruned spanning trees must be stored for a total of mn trees 13. To do multicast routing, each router computes a _ _ _ _ _ _ _ _ _____ a. Binary tree b. AVL tree c. Spanning tree d. Sparse tree 14. A well -defined groups that are numerically large in size but small compared to the network as a wholeareusedin __ _______ __ _____ a. Unicast routing b. Multicast routing c. Broadcast routing d. Telecast routing 15. In__ ______ _______ tosendamulticastmessageahostsendsittothecore,which then does the multicast along the spanning tree. . Core based Trees b. AVL trees c. Binary trees d. Sparse trees 16. Sending a packet to all destinations simultaneously is called _ ______________ a. Multicasting b. Unicasting c. Telecasting d. Broadcasting 17. AnormalFloodingtechniqueisanexampleof____ _________ a. Multicasting b. Unicasting c. Telecasting d. Broadcasting 18. In Broadcast routing, if the router does not know anything all about spanning tree, _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ method is preferred. a. Reverse Path forwarding b. Multidestination c. Flooding d. spanning tree 19. The method of Broadcast routing in which each packet contains either a list of destinations or a bit map indicating the desired destinations is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [04S04] a. Reverse Path forwarding b. Spanning tree c. Multidestination d. Flooding 20. Sending a message to a well defined group that are numerically large in size but small compared to the network as a whole is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Unicasting b. Multicasting c. Broadcasting d. Telecasting UNIT-VI

1. In link state routing, after the construction of link state packets new routes are computed using _ _ _ _ _ _ _ _ ____ a. Bellman Ford algorithm b. DES algorithm c. Dijkstra's algorithm 2 Count-to-Infinityproblemoccursin______ ______ ___ ____.[05M01] a. distance vector routing b. short path first c. link state routing d. hierarchical routing 3 In distance vector routing algorithm, each router maintains a separate routing table with the following entries . [05M02] a. preferred input line , estimated time b. preferred input line, estimated distance c. preferred output line, estimated time d. preferred output line, router 5. Linkstatepacketsarebuiltin _______ a. short path first b. distance vector routing c. link state routing d. hierarchical routing 6. In which routing method do all a. Distance Vector b. Link Vector c. Shortest path d. Link State 7. In distance vector routing algorithm, the routing tables are updated _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [05S02] a. by exchanging information with the neighbors b. automatically c. using the backup database d. by the server 8. Distance vector routing algorithm is implemented in Internet as ______________ a. OSPF b. RIP c. ARP d. APR 9. Which of the following routing algorithm takes into account the current network load. a. broadcast b. shortest path c. flooding d. distance vector routing 1. Indistancevectorroutingthedelaymetricis __________ _______ a. number of hops b. geographical distance c. number of neighbors d. queue length 11 The processes that keep track of hosts whose home is in the area, but who currently visiting another area is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . Home agent b. Mobile agent c. Foreign agent d. User agent 12 In AODV routing algorithm for MANETs, the route is discovered at time _ _ _ _ _ _ _ _ _ _ _ _ _ . a. only when the network is established b. in middle of the transmission c. when there is a need for route by the host d. when there is no need for route by the host 13. Military vehicles on a battlefield with no existing infrastructure will deploy _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ network.

a. MANET b. Cell Network c. LAN d. Wi-Fi 14. The network in which all the nodes are symmetric and there is no central control or hierarchy is _ _ _ _ _ _ _ _ ___. a. MANET b. Client -Server Technology c. Peer-to-Peer d. Wi-Fi 15. What is the type of network in which the topology change from time to time? a. Wi-Fi b. Cell Network c. LAN d. MANET 16. The processes that keep track of all mobile hosts visiting the area is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Home agent b. Mobile agent c. Foreign agent d. User agent 17. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called _ _ _ _ _ _ _ _ _ _ _ a. Migratory hosts b. Stationary hosts c. Mobile hosts d. Random hosts 18. The hosts who compute on the run and want to maintain their connections as they move around _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _] a. Migratory hosts b. Stationary hosts c. Mobile hosts d. Random hosts 19. What is the type of network in which the routers themselves are mobile? a. Wide Area Network b. Mobile Ad hoc Network c. Mobile Network d. Local Area Network 20. What is the routing algorithm used in MANETs] a. Shortest Path First b. Routing Information Protocol c. Distance Vector Protocol d. Ad hoc On -demand Distance Vector Protocol UNIT-VII 1. Why probe packets are transmitted in the network? a. to know about the capacity of the channel b. to count the number of host in the network c. to know about efficiency of the routing algorithm d. to know about the congestion 2. If the source deduces the existence of congestion by making local observations,such as the time needed for acknowledgements to come back is called as _ _ _ _ _ _ _ _ _ _ _ . b. Implicit feedback algorithm 3. The solution to decrease the load on the network when congestion occurs is _ _ _ _ _ _ _ _ _ _ . a. splitting the traffic over multiple routes b. increasing the transmission power c. usage of spare routers

d. denying service to the users 4. In open loop congestion control techniques, the decisions are based on the _ _ _ _ _ _ _ _ _ a. without regard to the current state of the network b. with regard to the current state of the network c. with regard to the choice of the host d. without regard to the choice of the host 5. In closed loop congestion control techniques, the decisions are based on the _ _ _ _ _ _ _ _ _ _ . a. concept of a feedback loop b. concept of a forward loop c. concept of current state of network d. concept current status of the router 6. When too many packets are present in the subnet, and performance degrades then it leads to _ _ _ _ _ _ _ _ ____ a. Ingestion b. Congestion c. Digestion d. Diffusion 7. What is it goal of congestion control? a. making sure that subnet is not able to carry the offered traffic b. making sure that subnet will allow more than the offered packets c. making sure that subnet is able to carry the offered traffic d. making sure that subnet will not allow any traffic 8. The service of open loop congestion control technique is _ _ _ _______ a. monitor the system to detect when and where congestion occurs b. when to accept new traffic c. pass the information to places where action can be taken d. adjusting the system to correct the problem 9. The service of closed loop congestion control technique is _ _ _ _ _ _ _ _ _ _ _] a. when to accept new traffic b. when to discard the packets c. monitor the system to detect when and where congestion occurs d. which packets to discard 10. The solution to increase the capacity when congestion occurs is _ _ _ _ _ _ _ _ _ _ _ _ _ a. denying service to the users b. degrading the service to the users c. splitting traffic over multiple routes d. rescheduled the demands of the users 11. When routers are being inundated by packets that they cannot handle, they just throw them away is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Jitter control b. Random early detection c. Choke packets d. Load shedding 12. If f is the sample instantaneous line utilization, a is the constant that determines how fast the router forgets recent history and u is the recent utilization of the line then the formula to update u is _ _ _ _ _ _ _ _ _ _ _ _ . [08D02] 13. The choke packet is send back to the source if _ _ _ _ _ _ _ _ _ . [08M01] a. The utilization factor u moves above the given threshold b. The utilization factor u moves below the given threshold c. The utilization factor u is equal to the given threshold d. The utilization factor u doesn`t change 14. When the source host receives the choke packet, then the source _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ a. reduces the capacity of the line b. reduces the line utilization factor

c. reduces the traffic generation d. ratereduces the threshold value 15. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called _ _ _ _ _ _ _ _ _ _____ a. Priority dropping b. Tail dropping c. Age based dropping d. Head dropping 16. Timeoutdeterminationpolicyisusedin___ __________ ____.[08S01] a. network layer b. data link layer c. transport layer d. application layer 17. Flowcontrolpolicyisimplementedin_____ __________ _. a. network layer b. transport layer c. application layer d. physical layer 18. Packet discard policy is implemented in _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [08S03] a. Physical layer b. Data link layer c. MAC layer d. Network layer 19. 4. For applications such as audio and video streaming, the variation in the packet arrival times is called _ _ _ _ _________________ a. Random early detection b. Jitter c. Delay difference d. Load shedding 20. Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Tunneling b. Routing c. Diverting d. Forwarding UNIT_VIII 1. The type of fragmentation in which packet is fragmented at the source host and reassembly is done only atdestination host is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. transparent fragmentation b. internal fragmentation c. free space fragmentation d. nontransparent fragmentation 2. Firewallsareusedfor___ _______ _____. a. routing b. security c. tunneling d. congestion control 3. To translate the message semantics from one format to other, _ _ _ _ _ _ _ _ _ _ is used. a. application gateway b. transport gateway c. session gateway d. network gateway 4. The routing algorithm within each network is _ _ _ _ _ _ _ _ _ _ ____. a. Routing information protocol b. Exterior gateway protocol c. Interior gateway protocol d. Middle gateway protocol 5. In _ _ _ _ _ _ _ _ case higher bandwidth can be achieved. a. connectionless networks

b. connection oriented networks c. virtual circuit networks d. optical networks 6. Fragmentationmeans_________ _______ a. adding of small packets to form large packet b. breaking large packet into small packets c. combining large packets in to a single packet d. forwarding a packet through different networks 7. Bridgesareusedat________ ___layer a. Physical layer b. MAC layer c. Network d. Transport 8. Routersareusedat_ __________layer a. Physical layer b. MAC layer c. Network d. Transport 9. Gateways are used at _layer a. Physical layer b. MAC layer c. Network d. Application 10. Which type of ATM service is used for regroup timing requirements? a. variable bit rate b. constant bit rate c. available bit rate d. unspecified bit rate 11. Which of the following assertions is FALSE about the Internet Protocol(IP)? a. It is possible for a computer to have multiple IP addresses b. Ip packets from the same source to the same destination can take different routes in the network c. IP ensures that a packet is discarded if it is unable to reach its destination within a given number of hops d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way 12. _ _ _ _ _ _ _ _ _ _ _ protocol is used for constant bit rate. a. AAL1 b. AAL2 c. AAL 3/4 d. AAL5 13. While booting the system the IP address is _ _ _ _ _ _ _ _ _ _ _ . a. 1.1.1.1 b. 1.1.0.0 c. 0.0.1.1 d. 0.0.0.0 14. In ATM network _ _ _ _ _ _ _ _ _ message is used by a source host to set up a connection. a. SET UP b. Call PROCEEDING c. CONNECT d. RELEASE 15. How many class A, B and C networks IDs can exist a. 2,113,658 b. 16,382 c. 126 d. 128 16. Which of the following TCP/IP internet protocol, a diskless machine uses to obtain its IP address from a server a. RDP b. ARP c. RARP

d. RIP 17. Theprotocolusedtotesttheinternetis__ _______ a. IGMP b. ICMP c. ARP d. RIP 18. Which IP address class has few hosts per network? a. class A b. class B c. class C d. class D 19. TheIPaddresswith127aabbccisusedfor_ _________ ___ a. broad casting b. multicasting c. loop back testing d. forward testing 20. What type of addressing is specifically used by the transport layer? a. station address b. application program port address c. dialog address d. network address 21. Which of the following functionalities must be implemented by a transport protocol over and above the network protocol? a. Recovery from packet losses b. Detection of duplicate packets c. Packet delivery in the correct order d. End to end connectivity 22. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ _ _ _ _ primitive. a. LISTEN b. ACCEPT c. BIND d. CONNECT 23. SEND and RECEIVE primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ primitives.] a. blocking b. non blocking c. data transfer d. error control 24. CONNECT and DISCONNECT primitives are called as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ primitives. a. blocking b. non blocking c. data transfer d. error control 25. Transport protocol data units(TPDUs) are contained in _ _ _ _ _________. a. protocol b. frame d. packet 26. Which of the following layer is transport service provider? [ a. network b. transport c. session d. application 27. The transport layer performs the same types of functions as the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ layer.] a. session b. network c. data link d. physical 28. The end points of a transport connection are called _ _ _ _ _ _ __________ a. TSAPs b. AAL -SAPs

c. NSAPs d. PSAPs 29. In transport layer, End to End delivery is the movement of data from _ _ _ _ _ _ _ _ _ _ _ . a. one station to the next station b. one network to the other network c. source to destination d. one router to another router 30. Which of the following are session layer check points? a. allow just a portion of a file to be resent b. detect and recover errors c. control the addition of headers d. are involved in dialog control 31. The function of the transport layer ensuring that all pieces of a transmission arrive at the destination, not just some of them is _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ . a. Duplication control b. Sequence control c. Loss control d. Error control 32. If either of the communicating device can ask for disconnection by sending DISCONNECT REQUEST TPDU to the other, and immediately disconnect without waiting for acknowledgement is called _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ___. a. Graceful disconnection b. Abrupt disconnection c. Greedy disconnection d. Random disconnection 33. The type of disconnection in which three way handshake protocol is used is _ _ _ _ _ _ _ _ _ . a. Graceful disconnection b. Abrupt disconnection c. Greedy disconnection d. Random disconnection 34. 8. The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problems is called a. protection b. resilience c. option negotiation d. transfer failure 35. A single transport layer connection split and connects the different network connections is called _ _ _ _ _ _ _ a. Upward multiplexing b. Downward multiplexing c. Congestion control d. Flow control 36. Error control is needed at the transport layer because of potential errors occurring _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _a. from transmission line noise b. in routers c. program d. error control

You might also like