DATA LINK LAYER
1.
The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
Explanation: None.
Explanation: None.
2.
Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
a) framing
b) error control
c) flow control
d) channel coding
Answer: d
Explanation: None.
Explanation: None.
3.
Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
4.
Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer: d
Explanation: None.
Explanation: None.
5.
Automatic repeat request error management mechanism is provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
6.
When 2 or more bits in a data unit has been changed during the transmission,
the error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
a) random error
b) burst error
c) inverted error
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
7.
CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: a
Explanation: None.
Explanation: None.
8.
Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: d
Explanation: None.
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: d
Explanation: None.
9.
Which one of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) None of the mentioned
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) None of the mentioned
Answer: c
Explanation: None.
Explanation: None.
10.
The technique of temporarily delaying outgoing outgoing acknowledgements so
that they can be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
Answer: a
Explanation: None.
Comments
Post a Comment