7. In ______________________mode cell header is composed of SIX elements. (a) Synchronous transfer (b) Asynchronous transfer (c) Data transfer (d) None of the above 8. Fast Ethernet supports a maximum data rate of ___________. (a) 100 Mbps (b) 100 Kbps (c) 120 Mbps (d) 120 Kbps 9. The Gigabit Media Independent Interface is an interface found between the ___________________________________. (a) Media interface control layer and transport layer (b) Media access control layer and transport layer (c) Media information control layer and physical layer (d) Media Access Control layer and the Physical layer 10. ____________________Control needs to provide services to the network layer. (a) Logical link (b) Data link (c) Address link (d) None of the above 11. User-network information exchange is also called as ___________________. (a) Virtual circuit connections (b) Logical connection (c) Information exchange (d) Control signaling 12. ___________________________ provides a uniform interface to the Reconciliation sub-layer for all physical media. (a) Media Access Control layer (b) Physical Medium Dependent sub-layers (c) Physical coding sub-layer (d) Logical Link Control layer 13. ATM does the data transfer in the form of _________________. (a) Discrete chunks (b) Normal chunks (c) Indiscreet chunks (d) None of the above 14. _________ represents the set of ATM service categories. (a) ABR (b) FBR (c) GFR (d) None of the above 15. Network Attached Storage servers usually support _____________________levels.
RAID 0, RAID 1, RAID 2 and RAID 3. RAID 2, RAID 3, RAID 4 and RAID 5. RAID 1, RAID 2, RAID 3 and RAID 5. RAID 0, RAID 1, RAID 4 and RAID 5.
16. The main task of AAL is _________________________ (a) Transferring and retrieving (b) Segmentation and reassemble (c) Combining and dividing (d) None of the above 17. For receive and transmit data paths the Gigabit Media Independent Interface have ______ capacity (a) 4 bit (b) 8 bit (c) 6 bit (d) 12 bit 18. The development of Wi-Fi technology commenced in ___________ year. (a) 1995 (b) 1996 (c) 1997 (d) 1998 19. The technologies for wireless LANs are specified by the _________________ group of standards. (Pick the right choice). (a) IEEE 803.11 (b) IEEE 802.11 (c) IEEE 802.22 (d) IEEE 803.22 20. Which is NOT a property of congestion control mechanism (a) Efficiency (b) Fairness (c) Stability (d) Security 21. Jackson's theorem was given by _____________________. (a) Jorge R. Jackson (b) James R. Jackson (c) James G. Jackson (d) Jorge G. Jackson 22. _____________layer provides information about IP and IPX protocols (a) Logical Link Control (b) Media Access Control (c) Physical Coding Sub-layer (d) Physical Media Attachment
23. Which is NOT a WLAN component (a) User devices (b) Radio NICs (c) Applications (d) Routers 24. A signal which has all its values fixed is known as ______________. (a) Deterministic signal (b) Distributed signal (c) Data transfer signal (d) Direct signal 25. The subscribers of frame relay are engaged ________________________ with the service provider. (a) Network capacity (b) Committed Information Rate (c) Dropping frames (d) Network resources. 26. _______________________ ARQ approach is the most efficient of all ARQ approaches. (a) Selective-repeat (b) Stop-and-wait ARQ (c) Go-Back-N ARQ (d) Continuous ARQ 27. In TCP flow control, window field provides a maximum window size of_______ bytes (a) 65,455 (b) 65,535 (c) 65,545 (d) 65,435 28. Which among the following is considered as the simplest heavy-tailed distribution? (a) Jordan theorem (b) John bell theorem (c) Jacksons theorem (d) Jacobi theorem 29. When the overall demand of a resource exceeds its capacity is termed as ____________. (a) Signaling (b) Effects of Congestion (c) Congestion (d) None of above in negotiations on
30. TCPs 16-bit window field provides a maximum window size of ___________ bytes (a) 65,445 (b) 64,430 (c) 65,535 (d) 64,475 31. Both the sender and the _____________________ play a major role in determining the transmission rate of data flow. (a) Receiver (b) Network (c) Router (d) Retransmission timer 32. ____________________ value depends on the round-trip timer (a) Keep alive timer (b) Delayed ACK timer (c) Retransmit timer (d) Probe timer 33. ____________is defined in reference to a particular service class (a) Resource (b) Efficiency (c) Fairness (d) Service 34. GCRA stands for _________________________________. (a) General Cell Rate Algorithm (b) Geographical Cell Rate Algorithm (c) Guaranty Cell Rate Algorithm (d) Generalized Cell Rate Algorithm 35. _______________ is the fundamental property of any control system. (a) Stability (b) Data (c) Networking (d) None of the above 36. Identify the recently developed window management technique that has started to show up in TCP implementations. (a) Limited transmit (b) Fast recovery (c) Fast retransmit (d) Slow start
37. _____________________ technique is to use the available capacity in a network as much as possible and react to congestion in a controlled way. (a) Implicit congestion avoidance (b) Explicit congestion avoidance (c) Both A and B (d) None of above 38. A _____________is a control packet created at a congested node and sent back to a source node to control traffic flow. (a) Choke packet (b) Data packet (c) Node address packet (d) Node data packet 39. _________________is the capability of transmitting a single stream to multiple subscribers simultaneously. (a) Single casting (b) Multi-threading (c) Multicasting (d) None of above 40. _________________ uses the reverse-path multicasting (RPM) algorithm to construct source-based multicast delivery trees. (a) Distance-Vector Multicast Routing Protocol (DVMRP) (b) Core-Based Trees (CBT) (c) Protocol Independent Multicast (PIM) (d) Border Gateway Multicast Protocol (BGMP) 41. ______________________________ is the measure of maximum number of backto-back cells that may be transmitted at the peak cell rate without harming the sustained cell rate. (a) Peak Cell Rate (b) Sustained Cell Rate (c) Cell Transfer Delay (d) Maximum Burst Size 42. _______________ timer is used to holdup the transmission of ACK packets (a) Delayed ACK (b) Keep alive ACK (c) Retransmit ACK (d) Probe ACK 43. _____________________ Control has a major effect on the performance of bursty traffic if it mainly consists of bursts separated by long idle periods.
(a) Closed-loop (b) Open-loop (c) Hop-by-hop (d) Congestion 44. Identify the element of IntServ model whose function is to forward various packets flows in a manner which ensures that QoS commitments are met. (a) Packet classifier (b) Packet scheduler (c) Flow descriptor (d) Admission control 45. Identify the network element which is used to specify the allowed traffic pattern into network. (a) Tspec (b) Rspec (c) Filterspec (d) Flowspec 46. Identify the ATM service category which receives a capacity of SCR from the network. (a) RT-VBR (b) NRT-VBR (c) UBR (d) ABR 47. Name the edge function which checks the adherence of flow to the specified traffic profile. (a) (b) (c) (d) Marker Classifier Metering Shaper
48. Which of the following factors influences the PHB of a specific flow? (a) (b) (c) (d) Packet loss Assured forwarding Expedited forwarding Best-effort behavior
49. SBM is a signaling protocol that offers a method to map an _____________ protocol (a) Internet-level setup
(b) Intranet-level setup (c) Extranet-level setup (d) None of the above 50. Name the DiffServ model in which the packets from a sender are treated equally. (a) (b) (c) (d) Structured DiffServ Flat DiffServ Direct DiffServ Indirect DiffServ
56. The two categories of Fast Ethernet that have been designed by IEEE are __________________ and _______________. (a) 1000BASE-X, 1000BASE-T4 (b) 100BASE-X, 100BASE-T4 (c) 1000BASE-X, 1000BASE-T6 (d) 10BASE-X, 10BASE-T6 57. The internetwork Border Gateway Protocol involves identification of ___________and the transportation of _________________. (a) Optimal routing paths, Information groups (b) Data collection paths, application groups (c) Structural routing, program groups (d) None of the above 58. NAS can increase the availability of data by using __________ or ____________. (a) SISK, Clustering (b) RAID, Clustering (c) RISK, Clustering (d) None of above 59. In Graph theory - entities of a graph as ____________and the links as _____________. (a) Rows, columns (b) Roots, begins (c) Nodes, edges (d) None of the above 60. We can represent a graph using either an _____________ or an ____________ matrix. (a) Adjacency, Incidence (b) Combining, arithmetic (c) Rows, adjacent (d) None of the Above 61. The IP routing process assigns values to different routes, based on the distance between the ______________and ________________. (a) Source, destination (b) Packets, roots (c) Clients, packets (d) Server, roots
62. _____________________ Field of the MPLS header has a length of __________ has the actual value of the MPLS label.
Label, 20 bits Class Of Service (COS), 25 bits Stack, 30 bits Time-to-Live (TTL), 35 bits
63. The SBM LAN is made up of __________________ and ______________________. (a) (b) (c) (d) Many SBM clients, designated SBM Less SBM clients, delivery SBM Many SBM servers, designated SBM Less SBM servers, delivery SBM
64. The SBM protocol operations into two categories ______________ and ____________. (a) (b) (c) (d) Application design and data control Installation and executing control Execution and error handling control Initialization and admission control.
65. In __________________________ approach for providing multicast under Diffserv, the multicast information is embedded within the __________ itself as an additional header element. (a) Multicast capable core router, header (b) Multicast non-capable core router, router (c) Encapsulation based, packet (d) Packet embedding, multicast 66. The group membership protocol is employed by _______________to learn about the presence of group members on their directly attached to ____________________. (a) (b) (c) (d) Packets, sub-routers Routers, sub-networks Communicators, application None of the above
67. IPv4 multicast address range from _____________ to _______________ is reserved for multicasting (a) 0.0.0.224 to 255.255.255.239 (b) 239.225.225.255 to 0.0.255.255 (c) 224.0.0.0 to 239.255.255.255 (d) 255.255.239.224 to 225.255.0.0 68. The MTP Packet Format having fourth byte of the transport header includes the subchannel value of the__________. And the sub-channel field has a default value of______.
69. SLA between a _________________ and _________________is firstly established and the corresponding Service Level Specification (SLS) is delivered to the Network Access Server (NAS). (a) Service level and database (b) Data, internet (c) Application and the Internet provider (d) None of the above 70. Assured forwarding is elaborate scheme for managing the _____________and it defines ___________ priority classes. (a) Applications, three (b) Service classes, four (c) Network, six (d) Address, five 71. Packet scheduler algorithms follow different approaches ___________________ and ______________________. (a) Weighted Fair Queuing (WFQ) and First In First Out (FIFO). (b) Unweight Fair Queuing (WFQ) and Last In First Out (FIFO). (c) Condition Fair Queuing (WFQ) and First In Last Out (FIFO). (d) Process Fair Queuing (WFQ) and Last In Last Out (FIFO).
(a) Information and process State information (b) Manipulate and Maintain state information (c) counting and distributing (d) transfer and loading
73. The ____________________________ and _______________________ are the IntraDomain Routing Protocols (a) Brood Gateway Protocol (BGP) and Intra-Domain Routing Protocol (IDRP). (b) Base Gateway Protocol (BGP) and Altera-Domain Routing Protocol (IDRP).
(c) Border Gateway Protocol (BGP) and Inter-Domain Routing Protocol (IDRP). (d) Business Gateway Protocol (BGP) and Inactive-Domain Routing Protocol (IDRP).
74. MPLS also provides ________networks. (a) ATM and ISDN (b) FEC and SLS (c) PRN and IDSN (d) IDRP and IDSN
significant
benefits
when
applied
to
________
and
75. In multicast group ______________ and ______________ is used to receiving frames address. (a) LAN process and process interface card (b) IP process and network interface card (c) WAN process and rooter interface card (d) MAN process and HUB interface card
1 A 2 C 3 C 4 B 5 D 6 B 7 B 8 A 9 D 10 C 11 B 12 C 13 A 14 C 15 D 16 B 17 B 18 C 19 B 20 D
21 B 22 A 23 C 24 A 25 B 26 A 27 B 28 B 29 C 30 C 31 B 32 D 33 C 34 D 35 A 36 A 37 B 38 A 39 C 40 A
41 D 42 A 43 B 44 B 45 A 46 A 47 C 48 A 49 A 50 B
Part - B
Q. No. Ans. Key 51 B 52 B 53 A 54 C 55 C 56 B
57 A 58 B 59 C 60 A 61 A 62 A 63 A 64 D 65 C 66 B 67 C 68 A 69 C 70 B 71 A 72 B 73 C 74 A 75 B