Professional Documents
Culture Documents
Aditya_Raj_CN_Assignment3
Aditya_Raj_CN_Assignment3
1 The data link layer takes the packets from _________ and encapsulates them into frames
for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Ans:- a
Q.2 Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Ans:- d
Ans:- d
Q.4 Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Ans:- c
Q.5 The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Ans:- a
Q.6 When does the station B send a positive acknowledgement (ACK) to station A in Stop and
Wait protocol?
a) only when no error occurs at the transmission level
b) when retransmission of old packet in a novel frame is necessary
c) only when station B receives frame with errors
d) all of the above
Ans:- a
Q.7 Which of the following would be found in a Data Link layer header?
a) The packet’s fragmentation offset
b) The source’s logical address
c) The packet’s sequence number
d) The source’s physical address
Ans:- d
Q.8 What is a primary function of the trailer information added by the data link layer
encapsulation?
a) Supports error detection
b) Ensures ordered arrival of data
c) Identifies the devices on the local network
d) Provides delivery to correct destination
Ans:- a
Ans:- b
Ans:- c
Q.11 Bit stuffing means adding an extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the ________
a) header
b)trailer
c) flag
d) none of the above
Ans:- c
Q.12 The MAC (Media Access Control) address of the network card is used in both Ethernet
and Token-Ring networks and is essential for communication. What does MAC provide?
Ans:- c
a) Network
b) Session
c) Datalink
d) transport
Ans:- d
Q.14 __________________ is the process of adding one extra 0 whenever five consecutive 1s
follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.
a) Byte stuffing
b) Unstuffing
c) Bit Stuffing
d) Stuffing
Ans:- c
Q.15 The ______________________ sublayer,as specified in project 802,is LAN specific and
deals with contension issues
a) CSMA
b) MAC
c) LLC
d) DLC
Ans:- b