Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Q.

1 The data link layer takes the packets from _________ and encapsulates them into frames
for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer

Ans:- a

Q.2 Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding

Ans:- d

Q.3 Which of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned

Ans:- d

Q.4 Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC

Ans:- c

Q.5 The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________

a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check

Ans:- a
Q.6 When does the station B send a positive acknowledgement (ACK) to station A in Stop and
Wait protocol?
a) only when no error occurs at the transmission level
b) when retransmission of old packet in a novel frame is necessary
c) only when station B receives frame with errors
d) all of the above

Ans:- a

Q.7 Which of the following would be found in a Data Link layer header?
a) The packet’s fragmentation offset
b) The source’s logical address
c) The packet’s sequence number
d) The source’s physical address

Ans:- d

Q.8 What is a primary function of the trailer information added by the data link layer
encapsulation?
a) Supports error detection
b) Ensures ordered arrival of data
c) Identifies the devices on the local network
d) Provides delivery to correct destination

Ans:- a

Q.9 Error detection at the data link layer is achieved by?


a) Bit stuffing
b) Cyclic redundancy codes
c) Hamming codes
d) Equalization

Ans:- b

Q.10 In ________ protocols, we use ________


a) byte-oriented; bit stuffing
b) character-oriented; bit stuffing
c) bit-oriented; bit stuffing
d) none of the above

Ans:- c

Q.11 Bit stuffing means adding an extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the ________
a) header
b)trailer
c) flag
d) none of the above

Ans:- c

Q.12 The MAC (Media Access Control) address of the network card is used in both Ethernet
and Token-Ring networks and is essential for communication. What does MAC provide?

a) An alias for the computer name


b) The logical domain address for the workstation
c) A physical address that is assigned by the manufacturer
d) A physical address that is randomly assigned each time the computer is started

Ans:- c

Q.13 The ___________layer detects and retransmits damaged or loss frames.

a) Network
b) Session
c) Datalink
d) transport

Ans:- d

Q.14 __________________ is the process of adding one extra 0 whenever five consecutive 1s
follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.

a) Byte stuffing
b) Unstuffing
c) Bit Stuffing
d) Stuffing

Ans:- c

Q.15 The ______________________ sublayer,as specified in project 802,is LAN specific and
deals with contension issues
a) CSMA
b) MAC
c) LLC
d) DLC

Ans:- b

You might also like