Network Layer MCQ Quiz in मल्याळम - Objective Question with Answer for Network Layer - സൗജന്യ PDF ഡൗൺലോഡ് ചെയ്യുക

Last updated on Mar 19, 2025

നേടുക Network Layer ഉത്തരങ്ങളും വിശദമായ പരിഹാരങ്ങളുമുള്ള മൾട്ടിപ്പിൾ ചോയ്സ് ചോദ്യങ്ങൾ (MCQ ക്വിസ്). ഇവ സൗജന്യമായി ഡൗൺലോഡ് ചെയ്യുക Network Layer MCQ ക്വിസ് പിഡിഎഫ്, ബാങ്കിംഗ്, എസ്എസ്‌സി, റെയിൽവേ, യുപിഎസ്‌സി, സ്റ്റേറ്റ് പിഎസ്‌സി തുടങ്ങിയ നിങ്ങളുടെ വരാനിരിക്കുന്ന പരീക്ഷകൾക്കായി തയ്യാറെടുക്കുക

Latest Network Layer MCQ Objective Questions

Top Network Layer MCQ Objective Questions

Network Layer Question 1:

The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet ?

  1. 62 subnets and 1022 hosts
  2. 64 subnets and 1024 hosts
  3. 62 subnets and 254 hosts
  4. 64 subnets and 256 hosts

Answer (Detailed Solution Below)

Option 1 : 62 subnets and 1022 hosts

Network Layer Question 1 Detailed Solution

Concept:

In class B, 16 bits are reserved for Network id and 16 for host id.

Explanation

6 bit is added due to subnetting

Number of subnest = 26 − 2= 62

Total Network Id = 16 + 6 = 22

Network Id + Host Id = 32 bits

Number of bit in host id = h = 32 - 22 = 10 bits

The number of available hosts = 2h − 2,

= 210 - 2 = 1024 - 2 = 1022

Therefore option 1 is the correct answer

  

2 is subtracted because subnet values consisting of all zeros and all ones (broadcast), reducing the number of available subnets by two in classic subnetting. In modern networks. Those two are counted leading to 64 subnets.

Network Layer Question 2:

Which of the following switching technique was used in ARPANET?

  1. Message Switching
  2. Packet Switching
  3. Circuit Switching
  4. Data switching

Answer (Detailed Solution Below)

Option 2 : Packet Switching

Network Layer Question 2 Detailed Solution

Answer: Option 2

Concept

In circuit-switched networks, the resources needed along a path (buffers, link transmission rate) to provide for communication between the end systems are reserved for the duration of the communication session between the end systems.

In packet-switched networks, these resources are not reserved, rather Simply in each packet mark the source address and destination and throw them in the network. These packets might not follow the same path.

ARPANET

The Advanced Research Projects Agency Network was established by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense.

It was the first wide-area packet-switching network with distributed control.
It is one of the first networks to implement the TCP/IP protocol suite.

Network Layer Question 3:

Consider the store and forward packet switched network in which bandwidth of each link is 2 × 106 bytes/sec. A user on host A sends a file of size 5000 bytes to host B through routers R1, R2, and R3 in three different ways. In the first case a single packet containing the complete file is transmitted from A to B. In the second case, the file is split into 20 equal parts, and these packets are transmitted from A to B. In the third case, the file is split into 40 equal parts and these packets are sent from A to B. Each packet contains 100 bytes of header information along with the user data. Consider only transmission time and ignore processing, queuing and propagation delays. Also assume that there are no errors during transmission. Let T1, T2 and T3 be the times taken to transmit the file in the first, second and third case respectively. Which one of the following is CORRECT?

  1. T3 > T1 > T2
  2. T2 > T1 > T3
  3. T1 > T2 > T3
  4. T1 > T3 > T2

Answer (Detailed Solution Below)

Option 4 : T1 > T3 > T2

Network Layer Question 3 Detailed Solution

File size (data) = 5000 byte

Header size = 100 byte

Bandwidth (BW) = 2 × 106 byte/second

First case,

\(Transmission\;time\left( {{T_t}} \right) = \frac{{data\; + \;header}}{{BW}}\;\)

\({T_t}\; = \;\frac{{5000 + 100}}{{2\; \times \;{{10}^6}}}\; = \;2.55\;ms\)

A → R1 → R2 → R3 → B

4 hops are needed

T1 = 4 × 2.55 ms

T1 = 10.2 ms

Second case,

Data per packet = 5000 ÷ 20 = 250 B

Header size = 100 B

\(Transmission\;time\left( {{T_t}} \right) = \frac{{data\; + \;header}}{{BW}}\;\)

\({T_t}\; = \;\frac{{250 + 100}}{{2\; \times \;{{10}^6}}} = 0.175\;ms\)

X → R1 → R2 → R3 → Y

4 hops are needed

∴ time needed for 1st packet = 4 × 0.175 ms = 0.7 ms

And time needed for remaining 19 packets = 19 × 0.175 = 3.325 ms

T2 = 0.7 + 3.325 = 4.025 ms

Third case,

Data per packet = 5000 ÷ 40 = 125 B

Header size = 100 B

\(Transmission\;time\left( {{T_t}} \right)\; = \;\frac{{data\; + \;header}}{{BW}}\;\)

\({T_t} = \frac{{125 + 100}}{{2\; \times \;{{10}^6}}} = 0.1125\;ms\)

X → R1 → R2 → R3F → Y

4 hops are needed

∴ time needed for 1st packet = 4 × 0.1125 ms = 0.45 ms

And time needed for remaining 19 packets = 39 × 0.1125 = 4.3875 ms

∴ T3 = 0.45 + 4.3875 = 4.8375 ms

Network Layer Question 4:

Contention - based MAC protocols are commonly used in:

  1. Ethernet networks 
  2. Token Ring networks 
  3. ATM networks
  4. Point - to - Point networks

Answer (Detailed Solution Below)

Option 1 : Ethernet networks 

Network Layer Question 4 Detailed Solution

The correct answer is Ethernet networks

Key Points

  • Ethernet networks:
    • In Ethernet networks, the MAC (Medium Access Control) protocol used is known as CSMA/CD (Carrier Sense Multiple Access with Collision Detection). This protocol employs a contention-based approach to access the shared communication medium.
    • Devices on the network listen for the presence of a carrier signal (carrier sense) before attempting to transmit data. If the medium is busy, they wait for a random amount of time before retrying.
    • In the case of a collision (when two devices transmit simultaneously and their signals overlap), CSMA/CD facilitates collision detection. Colliding devices stop transmitting, initiate a backoff period, and then retry.
    • So, contention-based MAC protocols, such as CSMA/CD, find common usage in Ethernet networks where multiple devices contend for access to the shared communication medium.

Additional Information

  • Token Ring networks:
    • Token Ring networks, on the other hand, use a different approach. They utilize a token-passing protocol where a special token circulates around the network. Only the device possessing the token is allowed to transmit.
    • This is in contrast to contention-based protocols, as devices don't have to contend for access. The token is passed sequentially, ensuring orderly and fair access to the network.
  • ATM networks:
    • ATM (Asynchronous Transfer Mode) networks typically use a combination of contention and reservation protocols. While some aspects may involve contention-based access, others may use reservation-based mechanisms to allocate bandwidth for specific connections.
  • Point-to-Point networks:
    • In Point-to-Point networks, the need for contention is minimal as there are only two endpoints involved. The communication link is generally dedicated, and contention-based protocols like CSMA/CD are not commonly used in this context. Point-to-Point links often use protocols optimized for point-to-point communication without the need for contention resolution.

Network Layer Question 5:

Let host X sends a file a size of 1500 byte to host Y through routers R1, R2, R3 and R4 respectively in two different ways. Each packet contains 100 bytes of header information along with the user data. Assume that the bandwidth of each link is 107 B/s. In the first case, a single packet containing the complete file is transmitted from X to Y. In second case the file is split into 15 equal parts, and these packets are transmitted from X to Y. Consider only transmission time and ignore processing, queuing and propagation delays with no errors during transmission. What is the difference between the time taken to send the packet in first case and the time taken to send the packet in second case in μs?

Answer (Detailed Solution Below) 420

Network Layer Question 5 Detailed Solution

File size (data) = 1500 byte

Header size = 100 byte

Bandwidth (BW) = 107 byte/second

First case,

\(Transmission\;time\left( {{T_t}} \right) = \frac{{data\; + \;header}}{{BW}}\;\)

\({T_t} = \frac{{1500 + 100}}{{{{10}^7}}} = 160\;\mu s\)

X → R1 → R2 → R3 → R4 → Y

5 hops are needed

∴ total time needed = 5 × 160 μs = 800 μs

Second case,

Data per packet = 1500 ÷ 15 = 100 B

Header size = 100 B

\(Transmission\;time\left( {{T_t}} \right) = \frac{{data\; + \;header}}{{BW}}\;\)

\({T_t}\; = \;\frac{{100 + 100}}{{{{10}^7}}}\; = \;20\;\mu s\)

X → R1 → R2 → R3 → R4 → Y

5 hops are needed

∴ time needed for 1st packet = 5 × 20 μs = 100 μs

And time needed for remaining 14th packet = 14 × 20 μs = 280 μs

∴ total time = 100 + 280 = 380 μs

Difference between time = 800 – 380 = 420 μs

Network Layer Question 6:

If one link fails, the entire network can be disabled in ______.

  1. Mesh Topology
  2. Bus Topology
  3. Star Topology
  4. Bus and Ring Topology

Answer (Detailed Solution Below)

Option 4 : Bus and Ring Topology

Network Layer Question 6 Detailed Solution

The correct answer is option 4.

Concept:

A single cable links all of the included nodes in a bus topology. The primary cable serves as the network's backbone. If the common cable breaks, the entire system will be brought to a halt.

Every device in a ring network has exactly two neighbors for communication purposes. It's called ring topology because it's shaped like a ring. Every computer in this topology is linked to another computer. A single computer failure can disrupt the entire network.

As a result, bus and ring topologies have difficulties, such as the possibility of the entire network being deactivated if one connection fails.

Hence the correct answer is Bus and Ring Topology.

Additional InformationStar Topology: 

All of the computers in a star topology communicate through a hub. This cable is known as a central node, and it is used to link all other nodes. The attached nodes are deactivated if the hub or concentrator fails.

Mesh Topology:

A mesh topology is a network configuration in which each computer and network device is linked to the others. Most communications can be dispersed using this topology even if one of the links fails. It is a wireless network topology that is extensively used.

Network Layer Question 7:

The class-C IPv4 address must start with ______.

  1. 101
  2. 10
  3. 011
  4. 110

Answer (Detailed Solution Below)

Option 4 : 110

Network Layer Question 7 Detailed Solution

Answer: Option 4

Concept

Classful Addressing 

 

First byte

Second byte

Third byte

Fourth byte

Class A

0

-

-

-

Class B

10

-

-

-

Class C

110

-

-

-

Class D

1110

-

-

-

Class E

1111

-

-

-

 

In class A

The First byte should be in the range of 0 -126 

The First byte only contains network part and (Second, Third, Fourth) byte will be the host part.

In class B:

The First byte should be in the range of 128 - 191.

Network part includes (First byte and Second byte) and host part includes (Third and Fourth byte).

In class C

The First byte should be in the range of 192 - 223.

Network part includes (First byte, Second byte, Third byte) and host part includes (Third and Fourth byte).

In class D

The First byte should be in the range of 192 - 223.

These are addresses are used for multicast networking.

In class E

These addresses are reserved for Future and experimental purposes.

 

First byte

Second byte

Third byte

Fourth byte

Class A

0- 127

-

-

-

Class B

128-191

-

-

-

Class C

192-223

-

-

-

Class D

224-239

-

-

-

Class E

240-255

-

-

-

 

Network Layer Question 8:

The process of modifying IP address information in IP packet headers while in transit across a traffic routing device is called

  1. Port address translation (PAT)
  2. Network address translation (NAT)
  3. Address mapping
  4. Port mapping

Answer (Detailed Solution Below)

Option 2 : Network address translation (NAT)

Network Layer Question 8 Detailed Solution

The process of modifying IP address information in IP packet headers while in transit across a traffic routing device is called Network address translation (NAT).

CONCEPT:

Private Network uses the private IP address and public IP address is used to access the Internet.

Network Address Translation(NAT) is a process to translate one or more Private IP address into one or more public IP address so that localhost can access the Internet.

The idea of NAT is to allow multiple devices to access the Internet through a single public IP address.

Hence, the correct answer is "option 2".

Additional Information

Option 1:

Port Address Translation(PAT) translates the Private IP address into Public IP address using port numbers.

More than one device can use a single IP address to access the Internet using different port numbers.

Option 3:

Address mapping is used to map the IP address into different forms.

Option 4:

Port mapping is the process of redirecting the communication request from one IP address and port number combination to another IP address and port number combination.

Three types of NAT are:

1. Static NAT: In static NAT, a single private IP address is translated into a single public IP address.

2. Dynamic NAT: In dynamic NAT, multiple IP addresses are mapped to a pool of public IP addresses.

3. Port Address Translation(PAT): PAT is also called NAT overload.

Network Layer Question 9:

ICMP error message should NOT be sent after receiving:

  1. Another ICMP error message
  2. A datagram for which fragmentation is required but DF bit is set in the IP header.
  3. Any fragment other than the first fragment from a fragmented IP datagram.
  4. A datagram with TTL exceeded.

Answer (Detailed Solution Below)

Option :

Network Layer Question 9 Detailed Solution

ICMP error message should NOT be sent after receiving when:

  • After another ICMP error message
  • After an IGMP message of any kind.
  • After any fragment other than the first fragment from a fragmented IP datagram

ICMP error message should be sent after receiving when:

  • If DF( do not fragment) bit is set and a router needs to fragment the datagram to send it further then the ICMP error message must be sent to the sender.
  • If TTL is exceeded then also it should report to the sender by sending the ICMP error message.

Options 1 and 3 are the correct answer.

Network Layer Question 10:

Select the option that best describes the truth of the following statements.

(i) HTTP is a markup language.

(ii) 10.10.10.10 is not a valid IP Address.

  1. (i) False, (ii) True
  2. (i) True, (ii) True
  3. (i) True, (ii) False
  4. (i) False, (ii) False

Answer (Detailed Solution Below)

Option 4 : (i) False, (ii) False

Network Layer Question 10 Detailed Solution

The correct answer is (i) False, (ii) False.

Key Points

  • HTTP stands for Hyper Text Transfer Protocol.
    • It is the foundation of the World Wide Web.
    • It is an application layer protocol designed to transfer information between networked devices.
    • It runs on top of other layers of the network protocol stack.
  • HTTP is not a markup language. Hence, statement 1 is false.
  • A valid IP address must be in the form of A.B.C.D, where A, B, C and D are numbers from 0-255.
    • A valid IP address must be in the form of xxx.xxx.xxx.xxx.
  • Hence, statement 2 is false.

Additional Information

  • An HTTP request is a way internet communications platforms such as web browsers ask for the information they need to load a website.
  • Each HTTP request made across the Internet carries with it a series of encoded data that carries different types of information.
  • A typical HTTP request contains:
    • HTTP version type
    • a URL
    • an HTTP method
    • HTTP request headers
    • Optional HTTP body
Get Free Access Now
Hot Links: teen patti customer care number teen patti win teen patti bliss