Computer Networks CT-2

Computer Networks CT-2

University

20 Qs

quiz-placeholder

Similar activities

WSN-MAC Protocol

WSN-MAC Protocol

University

22 Qs

Data Communications Quiz 1-ICE 3203

Data Communications Quiz 1-ICE 3203

University

20 Qs

WIRED LAN QUIZ ICE 3203

WIRED LAN QUIZ ICE 3203

University

20 Qs

TCP/UDP

TCP/UDP

University

20 Qs

Quiz Master's 2.0

Quiz Master's 2.0

University

15 Qs

Tech-fest

Tech-fest

University

20 Qs

GREEN TECHNOLOGY COMPLIANCE

GREEN TECHNOLOGY COMPLIANCE

University

20 Qs

Chapter 3 Quiz: Data Link Layer

Chapter 3 Quiz: Data Link Layer

University

20 Qs

Computer Networks CT-2

Computer Networks CT-2

Assessment

Quiz

Engineering

University

Medium

Created by

Vasavi Komali

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

network layer

physical layer

transport layer

application layer

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Automatic repeat request error management mechanism is provided by ________.

media access control sublayer

logical link control sublayer

network interface control sublayer

application access control sublayer

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?

  • 0 to 63

  • 0 to 64

  • 1 to 63

  • 1 to 64

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

ARQ stands for _______.

  • Automatic repeat quantization

  • Automatic retransmission request

  • Automatic repeat request

  • Acknowledge repeat request

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

_________framing uses two categories of protocols: character-oriented and bit-oriented.

Variable-size

Standard

Fixed-size

None of the above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is a data link protocol?

ethernet

point to point protocol

hdlc

all of the mentioned

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________.

cyclic redundancy check

piggybacking

fletcher’s checksum

parity check

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?