Question
a.
Network layer and Routing
b.
Data Link Layer and Bit synchronization
c.
Transport layer and End-to-end process communication
d.
Medium Access Control sub-layer and Channel sharing
Posted under GATE cse question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In the following pairs of OSI protocol layer/sub-layer and its functionality, the INCORRECT pair is
Similar Questions
Discover Related MCQs
Q. Choose the best matching between Group 1 and Group 2.
Group-1 Group-2
P. Data link 1. Ensures reliable transport of data over a physical point-to-point link
Q. Network layer 2. Encoder/decodes data for physical transmission
R. Transport layer 3. Allows end-to-end communication between two processes
4. Routes data from one network node to the next
View solution
Q. Which of the following is NOT true with respect to a transparent bridge and a router?
View solution
Q. Host A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN. Ethernet frames may carry data up to 1500 bytes (i.e. MTU = 1500 bytes). Size of UDP header is 8 bytes and size of IP header is 20 bytes. There is no option field in IP header. How may total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment?
View solution
Q. Since it is a network that uses switch, every packet goes through two links, one from source to switch and other from switch to destination. Since there are 10000 bits and packet size is 5000, two packets are sent. Transmission time for each packet is 5000 / 10^7 bits per second links. Each link has a propagation delay of 20 microseconds. The switch begins forwarding a packet 35 microseconds after it receives the same. If 10000 bits of data are to be transmitted between the two hosts using a packet size of 5000 bits, the time elapsed between the transmission of the first bit of data and the reception of the last bit of the data in microseconds is _________.
View solution
Q. Which one of the following statements is FALSE?
View solution
Q. Which one of the following statements is FALSE?
View solution
Q. A serial transmission Ti uses 8 information bits, 2 start bits, 1 stop bit and 1 parity bit for each character. A synchronous transmission T2 uses 3 eight bit sync characters followed by 30 eight bit information characters. If the bit rate is 1200 bits/second in both cases, what are the transfer rates of Ti and T2?
View solution
Q. In a sliding window ARQ scheme, the transmitter's window size is N and the receiver's window size is M. The minimum number of distinct sequence numbers required to ensure correct operation of the ARQ scheme is
View solution
Q. Which one of the following protocols is NOT used to resolve one form of address to another one?
View solution
Q. Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted.
View solution
Q. A firewall is to be configured to allow hosts in a private network to freely open TCP connections and send packets on open connections. However, it will only allow external hosts to send packets on existing open TCP connections or connections that are being opened (by internal hosts) but not allow them to open TCP connections to hosts in the private network. To achieve this the minimum capability of the firewall should be that of
View solution
Q. Which protocol will be used to automate the IP configuration mechanism which includes IP address, subnet mask, default gateway, and DNS information?
View solution
Q. In Go–back 3 flow control protocol every 6th packet is lost. If we have to send 11 packets. How many transmissions will be needed ?
View solution
Q. What will be the total minimum bandwidth of the channel required for 7 channels of 400 kHz bandwidth multiplexed together with each guard band of 20 kHz?
View solution
Q. Which of the following is false:
View solution
Q. The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
View solution
Q. Which of the following protocol is called as byte-oriented protocol?
View solution
Q. If syn = 0 and ack = 1, it indicates
View solution
Q. A DNS.....................server gets its data from another DNS server.
View solution
Q. The .............................field in the MIME header describes the method used to encode the data.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!