|
Computer Networks (CS610)
________ of TCP/IP layering model, corresponds to basic network hardware.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
· IP
· UDP
· TCP
· None of the given
____________ uses distance vector approach to define routing
· BGP
· OSPF
· RIP
· None of the given
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address
· 3
· 2
· 1
· 0
Protocol addresses are abstractions provided by ___________.
· hardware
· software
·
· internet
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
· True
· False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
· 32, 48
· 24, 32
· 32, 64
· 32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
· False
· True
In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· D
· C
· T, C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· C
· D
· C, D
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, C
· T
· C
· D
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, D
· c
· T
· T, C
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
· True
· False
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
· True
· False
------------- was especially concerned about the lack of high powered computers.
· IEEE
· APRA (wrong spelling)
· EIA
· None
Missing eot indicates sending computer crashed in frame format.
· True
· False
The -------------term refers to the general concept of a small block of data.
· Packets
· Data
· Frame
· None of given
CRC can detect more errors than a simple checksum.
· True
· False
The network that uses a -------------, usually consist of a single long cable to which computer attach.
· Star topology
· Bus topology
· Ring topology
· None of the given
LAN that use ATM technology have a -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.
·
·
·
·
--------------- has a jitter zero
· Virtual Private Network
· Isochronous Network
· Asynchronous Network
· None of the given
The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
· D + T
· D – T
· D X T
· D / T
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
· Double, triple
· Double, 4 time
· half, triple
· Double, half
End-to-end delivery service is connection oriented.
· True
· False
A single networking technology is best for all needs.
· True
· False
Twice NAT allows a site to run servers.
· True
· False
________ device is used for multicasting.
· Hub
· Switch
· Router
· none of the given
___________ does not depend on any particular unicast routing protocol.
· PIM-DM
· PIM-SM
· PIM-AM
· none of the given
A routing table contains_______
· The destination network ID
· The hop count to reach the network
· The router ID of the next hop
· All of the given
_______ can be used to propagate information about remote networks.
· Dynamic routing
· Static routing
· Address resolution
· None of the given
________ protocol is designed to use within an organization.
· OSPF
· MEOSPF
· MOSPF
· none of the given
NAPT stands for ________________
· Network Address and Protocol Translation
· Network Address and Port Translation
· Network Address and Packet Translation
· None of the given
In dynamic routing, the routing table is initialized when system boots.
· True
· False
OSPF includes ________ address mask with each address.
· 30Bit
· 32Bit
· 34Bit
· none of the given
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
· True
· False
_________ uses window mechanism to control the flow of data.
· IP
· UDP
· TCP
· none of the given
TCP uses _______ mechanism to control the flow of data.
· door
· window
· acknowledgment
· retransmission
IGPs stand for _________
· Internal Gateway Protocols
· Interior Gateway Protocols
· Intermediate Gateway Protocols
· None of the given
________ protocol uses distance vector algorithm.
· IGP
· BGP
· RIP
· none of the given
__________measures distance in network hops, where each network between the source and destination counts as single hop.
· BGP
· OSPF
· RIP
· Non of these
Network Address Translation (NAT) requires device to perform packet translation.
· True
· False
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
· routing path
· routing metric
· routing
· switching
Which of the following is a correct representation of the IPv6?
·
·
·
·
Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.
· 32 bit
· 16 bit
· 8 bit
· 64 bit
Reconstruction of original datagram is called reassembly.
· True
· False
Reliability is the responsibility of the ______ layer.
· Transport
· Network
· Physical
· Internet
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
In Direct point to point communication adding the Nth computer requires------------ new connections.
· None of the given
· N2
· N-1
· (N2 –N)/2
The number of connections needed for N computer in direct point to point communication is equal to:
· (N2-N)/2
· N(N-1)
· N2
· None of the given
Hardware that calculates a CRC uses two simple components.
· AND unit and XOR unit
· Shift register and XOR unit
· Shift register and AND unit
· None of the given
The Gigabit Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
· Greedy algorithm
· Distance vector algorithm
· Dijksta’s algorithm
· Non of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
· Connectionless service paradigm
· Connection-oriented service paradigm
· Both Connectionless and Connection-oriented service paradigm
· None of the given
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
· 48-bit
· 32-bit
· 24-bit
· None of the given
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
· prefix , suffix
· suffix , prefix
· suffix , suffix
· None of the given
___________ places the boundary between the first and second octets
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the second and third octets.
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the third and fourth octets.
· Class A
· Class B
· Class C
· Class D
________ field of header indicates whether a datagram is a fragment or a complete datagram.
· FLAGS
· FLAGMENT OFFSET
· IDENTIFICATION
· None of the given
______ provides connectionless service.
· TCP
· UDP
· IP
· None of the given
UDP and TCP are both_________ layer protocols
· Physical
· Data link
· Network
· Transport
________identifies which application program on receiving computer should receive the data
Logical address
· Source port
· Source port
· Destination Port
· None of the given
________ identifies the application program that sent the data.
· Destination Port
· Source port
· Logical address
· None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
· UDP
· TCP
· Both UDP and TCP
· None of the given
Which of the following protocols allows the sender and receiver to enforce polices.
· RIP
· OSPF
· BGP
· RIP and OSPF
ICMP message transport is acted upon by getting ICMP encrypted in IP.
· True
· False
These ICMP message transport is acted upon ________ as frames on ______
· Intranet, LAN
· Internet, WAN
· Intranet, WAN
· Internet, LAN
Address mask defines how many bits of address are in suffix?
· True
· False
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
· True
· False
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
· itself
· prefix
· suffix
· mask
Find the class of the address:
11110011 10011011 11111011 00001111
· A
· C
· E
· B http://ping.fm/mP5xx
________ of TCP/IP layering model, corresponds to basic network hardware.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
· IP
· UDP
· TCP
· None of the given
____________ uses distance vector approach to define routing
· BGP
· OSPF
· RIP
· None of the given
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address
· 3
· 2
· 1
· 0
Protocol addresses are abstractions provided by ___________.
· hardware
· software
·
· internet
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
· True
· False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
· 32, 48
· 24, 32
· 32, 64
· 32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
· False
· True
In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· D
· C
· T, C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· C
· D
· C, D
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, C
· T
· C
· D
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, D
· c
· T
· T, C
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
· True
· False
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
· True
· False
------------- was especially concerned about the lack of high powered computers.
· IEEE
· APRA (wrong spelling)
· EIA
· None
Missing eot indicates sending computer crashed in frame format.
· True
· False
The -------------term refers to the general concept of a small block of data.
· Packets
· Data
· Frame
· None of given
CRC can detect more errors than a simple checksum.
· True
· False
The network that uses a -------------, usually consist of a single long cable to which computer attach.
· Star topology
· Bus topology
· Ring topology
· None of the given
LAN that use ATM technology have a -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.
·
·
·
·
--------------- has a jitter zero
· Virtual Private Network
· Isochronous Network
· Asynchronous Network
· None of the given
The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
· D + T
· D – T
· D X T
· D / T
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
· Double, triple
· Double, 4 time
· half, triple
· Double, half
End-to-end delivery service is connection oriented.
· True
· False
A single networking technology is best for all needs.
· True
· False
Twice NAT allows a site to run servers.
· True
· False
________ device is used for multicasting.
· Hub
· Switch
· Router
· none of the given
___________ does not depend on any particular unicast routing protocol.
· PIM-DM
· PIM-SM
· PIM-AM
· none of the given
A routing table contains_______
· The destination network ID
· The hop count to reach the network
· The router ID of the next hop
· All of the given
_______ can be used to propagate information about remote networks.
· Dynamic routing
· Static routing
· Address resolution
· None of the given
________ protocol is designed to use within an organization.
· OSPF
· MEOSPF
· MOSPF
· none of the given
NAPT stands for ________________
· Network Address and Protocol Translation
· Network Address and Port Translation
· Network Address and Packet Translation
· None of the given
In dynamic routing, the routing table is initialized when system boots.
· True
· False
OSPF includes ________ address mask with each address.
· 30Bit
· 32Bit
· 34Bit
· none of the given
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
· True
· False
_________ uses window mechanism to control the flow of data.
· IP
· UDP
· TCP
· none of the given
TCP uses _______ mechanism to control the flow of data.
· door
· window
· acknowledgment
· retransmission
IGPs stand for _________
· Internal Gateway Protocols
· Interior Gateway Protocols
· Intermediate Gateway Protocols
· None of the given
________ protocol uses distance vector algorithm.
· IGP
· BGP
· RIP
· none of the given
__________measures distance in network hops, where each network between the source and destination counts as single hop.
· BGP
· OSPF
· RIP
· Non of these
Network Address Translation (NAT) requires device to perform packet translation.
· True
· False
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
· routing path
· routing metric
· routing
· switching
Which of the following is a correct representation of the IPv6?
·
·
·
·
Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.
· 32 bit
· 16 bit
· 8 bit
· 64 bit
Reconstruction of original datagram is called reassembly.
· True
· False
Reliability is the responsibility of the ______ layer.
· Transport
· Network
· Physical
· Internet
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
In Direct point to point communication adding the Nth computer requires------------ new connections.
· None of the given
· N2
· N-1
· (N2 –N)/2
The number of connections needed for N computer in direct point to point communication is equal to:
· (N2-N)/2
· N(N-1)
· N2
· None of the given
Hardware that calculates a CRC uses two simple components.
· AND unit and XOR unit
· Shift register and XOR unit
· Shift register and AND unit
· None of the given
The Gigabit Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
· Greedy algorithm
· Distance vector algorithm
· Dijksta’s algorithm
· Non of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
· Connectionless service paradigm
· Connection-oriented service paradigm
· Both Connectionless and Connection-oriented service paradigm
· None of the given
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
· 48-bit
· 32-bit
· 24-bit
· None of the given
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
· prefix , suffix
· suffix , prefix
· suffix , suffix
· None of the given
___________ places the boundary between the first and second octets
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the second and third octets.
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the third and fourth octets.
· Class A
· Class B
· Class C
· Class D
________ field of header indicates whether a datagram is a fragment or a complete datagram.
· FLAGS
· FLAGMENT OFFSET
· IDENTIFICATION
· None of the given
______ provides connectionless service.
· TCP
· UDP
· IP
· None of the given
UDP and TCP are both_________ layer protocols
· Physical
· Data link
· Network
· Transport
________identifies which application program on receiving computer should receive the data
Logical address
· Source port
· Source port
· Destination Port
· None of the given
________ identifies the application program that sent the data.
· Destination Port
· Source port
· Logical address
· None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
· UDP
· TCP
· Both UDP and TCP
· None of the given
Which of the following protocols allows the sender and receiver to enforce polices.
· RIP
· OSPF
· BGP
· RIP and OSPF
ICMP message transport is acted upon by getting ICMP encrypted in IP.
· True
· False
These ICMP message transport is acted upon ________ as frames on ______
· Intranet, LAN
· Internet, WAN
· Intranet, WAN
· Internet, LAN
Address mask defines how many bits of address are in suffix?
· True
· False
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
· True
· False
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
· itself
· prefix
· suffix
· mask
Find the class of the address:
11110011 10011011 11111011 00001111
· A
· C
· E
· B http://ping.fm/mP5xx