Data Communication and Networking MCQs offer a valuable resource to test and enhance your understanding of the intricate world of data transmission, network protocols, and communication technologies. Whether you’re a student preparing for exams or a professional aiming to strengthen your knowledge, these multiple-choice questions with Answers cover a wide spectrum of topics, including network architecture, protocols, and security. These MCQs will help students in university exams,competitive exams and interviews preparation.
Section-1
1. Which protocol layer uses the protocols WWW, HTTP, FTP, SMTP, e-mail etc?
- Application Layer Protocol
- Transport Layer Protocol
- Internet Layer Protocol
- Hardware Layer
The protocols WWW (World Wide Web), HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and e-mail (Electronic Mail) are primarily associated with the application layer of the network protocol stack.
The application layer is the topmost layer of the protocol stack and is responsible for providing network services to user applications. It enables applications to communicate with each other over a network. The protocols mentioned, such as HTTP for web browsing, FTP for file transfer, SMTP for email transmission, and various email protocols (e.g., POP3, IMAP) for email retrieval, all operate within this layer.
The application layer protocols encapsulate the data from the higher-level applications and convert them into a format suitable for transmission over the network. They also handle the necessary communication and coordination between the applications running on different systems.
2. The internetworking protocol is known as
- SMTP
- PPP
- TCP/IP
- NNTP
The internetworking protocol commonly referred to as TCP/IP is a combination of two protocols: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). TCP/IP is a suite of protocols that form the basis of communication on the internet and most modern networks.
The Internet Protocol (IP) is responsible for addressing and routing packets across networks, while the Transmission Control Protocol (TCP) provides reliable, connection-oriented communication between applications running on different devices. Together, TCP/IP provides a comprehensive set of protocols for data transmission, addressing, and routing within an internetwork or the internet.
TCP/IP has become the de facto standard protocol suite for network communication, and it is used by a wide range of applications and devices to enable communication over the internet.
3. If single computer network is divided into segments and router are added between them it forms an
- Internet
- Internetwork
- Network
- Internetworking
When a single computer network is divided into segments and routers are added between them, it forms an internetwork. An internetwork, also known as an internetworking or an internet (with a lowercase "i"), refers to a collection of interconnected networks.
The term "internetwork" is often used to describe the global network infrastructure, such as the internet, which is made up of numerous interconnected networks spanning different geographical locations. However, it can also refer to smaller-scale internetworks within an organization or a local area network (LAN).
By adding routers between network segments, communication is facilitated between devices in different segments. Routers play a critical role in interconnecting networks by forwarding data packets based on their destination IP addresses. They enable data to traverse across network boundaries, allowing devices on different segments to communicate with each other.
So, when a single computer network is divided into segments with routers added between them, it forms an internetwork, which allows for the interconnection and communication of devices across multiple networks or network segments.
4. Check sum is used for
- Error correction
- Error detection
- Both a & b
- None of these
Checksum is used for verifying the integrity of data during transmission or storage. It is a mathematical value calculated from the data being transmitted or stored and is used to detect errors or corruption in the data.
The checksum algorithm calculates a unique value based on the content of the data. This value is then appended to the data or transmitted separately. Upon receiving the data, the recipient can recalculate the checksum using the same algorithm and compare it to the received checksum. If the calculated checksum matches the received checksum, it indicates that the data has been successfully transmitted without any errors or corruption.
The primary purposes of using checksums are:
1. Error Detection: Checksums are used to detect errors in the transmitted or stored data. By comparing the received checksum with the calculated checksum, any discrepancies indicate that the data may have been altered, lost, or corrupted during transmission.
2. Data Integrity: Checksums help ensure the integrity of the data. They provide a means to verify that the received data is the same as the data that was originally transmitted or stored. If the checksums match, it provides confidence that the data has not been tampered with or modified.
3. Data Validation: Checksums can be used to validate the correctness of data. By comparing the received checksum with the calculated checksum, it is possible to verify that the data has been transmitted accurately and completely.
Checksums are widely used in various protocols and systems, including network protocols like TCP/IP and UDP, storage systems, file transfer protocols, and data transmission over unreliable channels. They provide a simple and efficient method to detect errors and ensure data integrity.
5. The type of packet format supported by X.25 are as follows
- Control packet
- Data packet
- Both a & b
- None of these
In the X.25 protocol, the two main types of packets are indeed Control packets and Data packets.
1. Control Packet: Control packets in X.25 are used for the establishment, maintenance, and termination of virtual circuits (logical connections) between devices in an X.25 network. They carry control information necessary for managing the communication between the devices. Control packets include various types such as Call Request, Call Accepted, Call Connected, Clear Request, Clear Confirmation, and Reset.
2. Data Packet: Data packets in X.25 carry user data across the established virtual circuits. These packets encapsulate the data from higher-level protocols or applications and are transmitted between the devices involved in the communication. Data packets contain the actual user data payload along with necessary control information such as sequence numbers for reliable data transmission.
Both Control packets and Data packets play crucial roles in X.25 networks. Control packets handle the setup, maintenance, and termination of connections, while Data packets carry the actual user data being transmitted between the devices.
Please note that X.25 is an older protocol that was commonly used for packet-switched networks before the widespread adoption of TCP/IP. Its usage has significantly declined in recent years with the popularity of more modern networking protocols.
6. ISDN stands for
- Integrated Service Digital Network
- Interaction System Digital Network
- Inexpensive System Digital Network
- None of these
ISDN stands for Integrated Services Digital Network.
7. If routing information is automatically updated by routers when changes are made to the network configuration are called
- Fixed routing
- Dynamic routing
- Both a & b
- Distributed routing
When routing information is automatically updated by routers when changes are made to the network configuration, it is commonly referred to as "dynamic routing." Dynamic routing protocols are designed to automatically exchange routing information among routers, allowing them to adapt to changes in the network topology and update their routing tables accordingly.
Dynamic routing protocols employ various algorithms and mechanisms to exchange information about network reachability, link states, and metrics. When a change occurs, such as the addition or removal of a network link or a change in link status, routers using dynamic routing protocols share this information with their neighboring routers. Through this process of exchanging routing updates, routers can dynamically update their routing tables to reflect the current network topology and choose the best paths for forwarding packets.
Some popular dynamic routing protocols include OSPF (Open Shortest Path First), RIP (Routing Information Protocol), EIGRP (Enhanced Interior Gateway Routing Protocol), and BGP (Border Gateway Protocol). Each protocol has its own characteristics, such as the way they calculate routes, handle metric calculations, and distribute routing updates.
In contrast, "static routing" refers to manually configuring routing information on routers, where network administrators manually define the routes and specify the next hop for each destination network. Static routing does not involve automatic updates based on network changes and requires manual intervention to modify the routing configuration when network changes occur.
Dynamic routing offers advantages such as scalability, adaptability to network changes, and load balancing capabilities. However, it also introduces additional overhead and complexity compared to static routing. The choice between dynamic and static routing depends on the specific requirements and characteristics of the network.
8. ARP stands for
- Address Resolution Protocol
- Address Routing Protocol
- Address Routing Packet
- Address Routing Program
ARP stands for Address Resolution Protocol.
9. If two or more routers are connected to the same subnet, the network administration determines which of the routers the messages should be sent to eliminate this problem._____ are used?
- MAC messages
- ICMP messages
- INDP messages
- IMCP messages
ICMP (Internet Control Message Protocol) messages can be used to determine which of the routers the messages should be sent to when multiple routers are connected to the same subnet.
ICMP is a network protocol that operates at the Internet layer of the TCP/IP protocol suite. It is primarily used for diagnostic and error reporting purposes in IP networks. ICMP includes various types of messages, and one of them is the "Redirect" message.
When multiple routers are connected to the same subnet, the network administrator can configure one of the routers as the "preferred" router for a specific destination network within the subnet. If a device sends a packet to a destination for which a more optimal path exists through another router on the same subnet, the preferred router can send an ICMP Redirect message to inform the device about the better route. The ICMP Redirect message specifies the preferred router's IP address as the next hop for future packets destined to that network.
By receiving the ICMP Redirect message, the device can update its routing table to choose the preferred router as the next hop for the specific destination network, eliminating the need to send the packets to other routers on the same subnet.
So, ICMP messages, specifically ICMP Redirect messages, can be used by the network administration to guide devices in selecting the appropriate router when multiple routers are connected to the same subnet.
10. If two or more routers are available in distributed routing, which route should be selected
- High possible cost
- Least possible cost
- Link cost
- Both b & c
In a distributed routing environment where multiple routers are available, the selection of the route to be used is typically determined by the routing protocol being employed. The routing protocol implements algorithms and metrics to determine the best route based on various factors such as network topology, link bandwidth, delay, cost, or administrative preferences.
Some common routing protocols, such as OSPF (Open Shortest Path First) and IS-IS (Intermediate System to Intermediate System), use metrics such as link cost or path cost to calculate the shortest or most optimal path to a destination network. The routing protocol exchanges routing information among the routers, and each router independently computes its own routing table based on the received information and the metrics used by the protocol.
When there are multiple routes available to a destination network, the routing protocol will consider the metrics and choose the best route according to its algorithm. The specific factors considered may depend on the routing protocol being used and the configuration settings. The chosen route will be the one that offers the most favorable combination of metrics or meets specific criteria, such as the lowest cost or shortest path.
In addition to the routing protocol's decision-making process, network administrators can also influence the route selection by adjusting the configuration parameters or metrics used by the routing protocol. This allows them to prioritize certain routes or adjust the routing behavior based on specific requirements or preferences.
Ultimately, the exact route selected in a distributed routing environment depends on the routing protocol's decision-making algorithm and the configuration settings specified by the network administrators.
Section-2
1. In an optical fiber the inner core is ______ the cladding.
- more dense than
- the same density as
- less than dense
- another name for
2. The inner core of an optical fiber is _____ in composition.
- glass or plastic
- bimetallic
- copper
- liquid
3. Bits can be send over guided and unguided media as analog signal by
- digital modulation
- amplitude modulation
- frequency modulation
- phase modulation
4. The radio communication spectrum is divided into bands based on ___________
- amplitude
- cost and hardware
- frequency
- transmission media.
5. When a beam of light travels through media of two different densities, if the angle of incidence is greater than the critical angle, ______ occurs.
- reflection
- refraction
- incidence
- criticism
6. In a noisy environment, the best transmission medium would be _________
- twisted pair
- optical fiber
- coaxial cable
- the atmosphere
7. What is the frequency range used for FM radio transmission?
- Low frequency: 30 KHz to 300 MHz.
- Very Low Frequency : 0 Hz to 30 Hz.
- High frequency : 3 MHz to 30 MHz.
- Very High Frequency : 30 MHz to 300 MHz.
8. End-to-end connectivity is provided from host-to-host in _________
- session layer
- presentation layer.
- transport layer
- network layer
9. The portion of physical layer that interfaces with the media access control sublayer is called
- physical signalling sublayer
- physical data sublayer
- physical address sublayer
- none of the mentioned
10. PSS was introduced in the year ________
- 1961
- 1971
- 1981
- 1991