Computer Networks (CS610)
________ of TCP/IP layering model, corresponds to basic network hardware.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
· IP
· UDP
· TCP
· None of the given
____________ uses distance vector approach to define routing
· BGP
· OSPF
· RIP
· None of the given
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address
· 3
· 2
· 1
· 0
Protocol addresses are abstractions provided by ___________.
· hardware
· software
· operating system
· internet
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
· True
· False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
· 32, 48
· 24, 32
· 32, 64
· 32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
· False
· True
In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· D
· C
· T, C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· C
· D
· C, D
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, C
· T
· C
· D
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, D
· c
· T
· T, C
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
· True
· False
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
· True
· False
------------- was especially concerned about the lack of high powered computers.
· IEEE
· APRA (wrong spelling)
· EIA
· None
Missing eot indicates sending computer crashed in frame format.
· True
· False
The -------------term refers to the general concept of a small block of data.
· Packets
· Data
· Frame
· None of given
CRC can detect more errors than a simple checksum.
· True
· False
The network that uses a -------------, usually consist of a single long cable to which computer attach.
· Star topology
· Bus topology
· Ring topology
· None of the given
LAN that use ATM technology have a -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.
· Source address, destination address.
· Destination adress, destination address.
· Destination adress, source address.
· source adress, source address.
--------------- has a jitter zero
· Virtual Private Network
· Isochronous Network
· Asynchronous Network
· None of the given
The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
· D + T
· D – T
· D X T
· D / T
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
· Double, triple
· Double, 4 time
· half, triple
· Double, half
End-to-end delivery service is connection oriented.
· True
· False
A single networking technology is best for all needs.
· True
· False
Twice NAT allows a site to run servers.
· True
· False
________ device is used for multicasting.
· Hub
· Switch
· Router
· none of the given
___________ does not depend on any particular unicast routing protocol.
· PIM-DM
· PIM-SM
· PIM-AM
· none of the given
A routing table contains_______
· The destination network ID
· The hop count to reach the network
· The router ID of the next hop
· All of the given
_______ can be used to propagate information about remote networks.
· Dynamic routing
· Static routing
· Address resolution
· None of the given
________ protocol is designed to use within an organization.
· OSPF
· MEOSPF
· MOSPF
· none of the given
NAPT stands for ________________
· Network Address and Protocol Translation
· Network Address and Port Translation
· Network Address and Packet Translation
· None of the given
In dynamic routing, the routing table is initialized when system boots.
· True
· False
OSPF includes ________ address mask with each address.
· 30Bit
· 32Bit
· 34Bit
· none of the given
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
· True
· False
_________ uses window mechanism to control the flow of data.
· IP
· UDP
· TCP
· none of the given
TCP uses _______ mechanism to control the flow of data.
· door
· window
· acknowledgment
· retransmission
IGPs stand for _________
· Internal Gateway Protocols
· Interior Gateway Protocols
· Intermediate Gateway Protocols
· None of the given
________ protocol uses distance vector algorithm.
· IGP
· BGP
· RIP
· none of the given
__________measures distance in network hops, where each network between the source and destination counts as single hop.
· BGP
· OSPF
· RIP
· Non of these
Network Address Translation (NAT) requires device to perform packet translation.
· True
· False
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
· routing path
· routing metric
· routing
· switching
Which of the following is a correct representation of the IPv6?
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
· 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.
· 32 bit
· 16 bit
· 8 bit
· 64 bit
Reconstruction of original datagram is called reassembly.
· True
· False
Reliability is the responsibility of the ______ layer.
· Transport
· Network
· Physical
· Internet
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
In Direct point to point communication adding the Nth computer requires------------ new connections.
· None of the given
· N2
· N-1
· (N2 –N)/2
The number of connections needed for N computer in direct point to point communication is equal to:
· (N2-N)/2
· N(N-1)
· N2
· None of the given
Hardware that calculates a CRC uses two simple components.
· AND unit and XOR unit
· Shift register and XOR unit
· Shift register and AND unit
· None of the given
The Gigabit Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
· Greedy algorithm
· Distance vector algorithm
· Dijksta's algorithm
· Non of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
· Connectionless service paradigm
· Connection-oriented service paradigm
· Both Connectionless and Connection-oriented service paradigm
· None of the given
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
· 48-bit
· 32-bit
· 24-bit
· None of the given
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
· prefix , suffix
· suffix , prefix
· suffix , suffix
· None of the given
___________ places the boundary between the first and second octets
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the second and third octets.
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the third and fourth octets.
· Class A
· Class B
· Class C
· Class D
________ field of header indicates whether a datagram is a fragment or a complete datagram.
· FLAGS
· FLAGMENT OFFSET
· IDENTIFICATION
· None of the given
______ provides connectionless service.
· TCP
· UDP
· IP
· None of the given
UDP and TCP are both_________ layer protocols
· Physical
· Data link
· Network
· Transport
________identifies which application program on receiving computer should receive the data
Logical address
· Source port
· Source port
· Destination Port
· None of the given
________ identifies the application program that sent the data.
· Destination Port
· Source port
· Logical address
· None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
· UDP
· TCP
· Both UDP and TCP
· None of the given
Which of the following protocols allows the sender and receiver to enforce polices.
· RIP
· OSPF
· BGP
· RIP and OSPF
ICMP message transport is acted upon by getting ICMP encrypted in IP.
· True
· False
These ICMP message transport is acted upon ________ as frames on ______
· Intranet, LAN
· Internet, WAN
· Intranet, WAN
· Internet, LAN
Address mask defines how many bits of address are in suffix?
· True
· False
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
· True
· False
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
· itself
· prefix
· suffix
· mask
Find the class of the address:
11110011 10011011 11111011 00001111
· A
· C
· E
· B
Find the class of the address.
10100111 11011011 10001011 01101111
· A
· B
· E
· C
On of the design goals for unicast route propagation is __________.
· consistency
· inconsistency
· stability
· dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
· True
· False
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
· one or more (????)
· only one
· no
· many
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
· Anycast
· Unicast
· Multicast
· Non of the given
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
· Unicast
· Anycast
· Multicast
· Non of the given
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
· True
· False
The time for acknowledgement to arrival of packet depends on.
· Distance to destination and Current traffic conditions
· Current traffic conditions
· Distance to destination
· non of these
Cost, effort, risks, and resources are the factors included in--------
· Estimation
· Testing
· Development
· Maintenance
Final Quizs
There are _______ possibilities to detect the destination using Trace-route
· 1
· 2
· 3
· None of the given
_______ is used for single destination computer.
· Multicast
· Broadcast
· unicast
· none of the given
·
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
· 16-bit
· 48-bit
· 64-bit
· 128-bit
Which is not the type of error messages defined by ICMP.
· Source quench
· Time exceeded
· Destination unreachable
· none of the given
End to End delivery Service of IP datagram is _____
· Connection oriented
· Connectionless
· both a and b
· none of the given
________ is a type of address used for collection of computers with same prefix.
· Cluster
· unicast
· Multicast
· none of the given
IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram's larger than network
· Destination
· Intermediate routers
· Source
· Medium
_______ Source is responsible for fragmentation.
· IPV4
· IPV6
________ message is sent in response to incoming datagrams with problems.
· TCP/IP
· IGMP
· ICMP
· none of the given
________ field is used to identify a specific path through the network
· FLOW LABEL
· TRAFFIC CLASS
· Both a and b
· none of the given
Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
· TCP
· UDP
· IP
· None of the given
The process of using a routing table to select a next hop for a given datagram is called __________.
· Encapsulation
· Reassembling
· Routing or forwarding
· None of the given
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________
· Distance Vector Multicast Routing Protocol (DVMRP)
· Core Based Tree (CBT)
· Protocol Independent Multicast_Sparse Mode (PIM-SM)
· Protocol Independent Multicast_Dense Mode (PIM-DM)
Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
· postfix, Infix
· non of these
· Infix, prefix
· prefix, suffix
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
· None of the given
· TCP
· UDP
· IP
_____ Protocol provides error reporting mechanism.
· IGMP
· SNMP
· ICMP
· none of the given
________ encapsulates IP datagram as data area in hardware frame.
· Network Interface Layer
· Datalink Layer
· Network Layer
· None of the given
TTL stands for __________
· Time to Learn
· Time to Leave
· Time to Live
· none of the given
______ layer Provides reliable delivery of datagram.
· Network
· Transport
· Datalink
· none of the given
Which protocol is used to test different tools.
· ICMP
· IGMP
· TCP/IP
· none of the given
Routers use _______ to forward datagrams along prearranged path.
· Traffic class
· Flow label
· Destination address
· none of the given
NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.
· TRUE
· FALSE
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
· Least
· Maximum
· Fragment
· Frame
Postfix defines how much of address used to identify network.
· TRUE
· FALSE
______ contains all information needed to deliver datagram to the destination.
· Header
The Source can configure outgoing datagram's to avoid _________
· Segmentation
· Defragmentation
· Fragmentation
· None of the given
The Current version of IP-Version 4 is _____ old
· 18 years
· 20 years
· 22 years
· none of given
The Header format of IPv6 is entirely different.
· TRUE
· FALSE
_______ shows senders preference for low latency, high Reliability.
· TYPE
· SERVICE TYPE
· SERVICE PRIORITY
· None of the given
The Network Layer Protocol ICMP stands for____________
· Instant Control Message Protocol
· Internet Control Message Protocol
· Initial Control Message Protocol
· None of the given
IPV6 address consists of ________
· 32 Bits
· 64 Bits
· 128 Bits
· none of the given
_______ is a technique used to Limit datagram size to small MTU of any network
· Segmentation
· Fragmentation
· Encapsulation
· none of the given
ICMP message transport is acted upon by getting ICMP _________ in IP.
· De-encapsulated
· Encapsulated
· Segmented
· none of the given
IETF stands for _____________
· Internet Engineering Task Force
· Internal Efficient Task Force
· Internet Engineering Technical Force
· none of the given
Which of the following protocols provide the routing information at the autonomous system level?
· BGP
· OSPF
· RIP
· OSPF and RIP
A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.
· Unicast
· Multicast
· Broadcast
· Unicast & Multicast
_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
· RIP
· OSPF
· BGP
· None of the given
In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data.
· ACKNOWLEGE NUMBER, WINDOW
· SEQUENCE NUMBER, WINDOW
· ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
· None of the given
_________ is used to attach two autonomous systems.
· BGP
· IGP
· EGP
· none of the given
Routing inserts or changes values in _______
· MAC address
· routing table
· both (a) and (b)
· None of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
· True
· False
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
· True
· False
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
· True
· False
The computer uses _________ to inform Local router about the last application when it leaves.
· ICMP
· IGMP
· SNMP
· None of the given
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
· 96
· 100
· 120
· none of the given
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
· Efficiency
· Security
· Accuracy
· Anomalies
Class A mask is 255.0.0.0 which is used for ______
· Unicasting
· Multicasting
· Subnetting
· All of the given
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.
· True
· False
Which one of these is not a main feature of connectionless service:
· It includes extension of LAN abstraction.
· It has universal addressing and the data is delivered in packets frames), each with a header.
· It combines collection of physical networks into a single virtual network.
· It has universal addressing and the data is delivered in packets frames), without a header.
Which one is NOT the function of ping program?
· Traceability
· Reach ability
· Both a and b
· None of the given
A datagram cannot be larger than ________ of a network over which it is sent.
· MTU
· Size
· IP header
· None of the given
MTU Stands for _______
· Minimum transmission unit
· Maximum transmission unit
· Multicast transmission unit
· None of the given
Fragmentation when using ICMP for path MTU should be avoided.
· True
· False
HEADER LEN field gives size of extention header.
· False
· True
The process of learning the path MTU is known as path MTU discovery.
· True
· False
________ is less complex and easy to understand.
· TCP
· UDP
· IP
· None of the given
IPV6 128 bits address includes network prefix and ________
· Host sufix
· Host prefix
· source Prefix
· None of the given
The Universal Datagram is not an end-to-end protocol.
· True
· False
Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.
· 64
· 48
· 32
· 8
The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver's hardware to synchronize with the incoming signal.
· 64
· 32
· 16
· 8
The third field of the header consists of ------ bit Ethernet frame type.
· 48
· 32
· 16
· 8
An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.
· BNC- t base 10
· RJ 45- t base 10
· BNC-t base 5
· RJ 45-t base 2
A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.
· Source , destination
· Source , source
· Destination, source
· None from above
Formally named __________ informally known as the thick wire Ethernet or Thick net.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Formally named --------------- informally known as thin wire Ethernet or thin net.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
· DMA(Direct Memory Access)
· Multiplexer
· Transceiver
· None of the given
A system with redundant bridges might have a problem with_______ in the system.
· Loop
· Filters
· Spamming
· All above
A Bridge can ________
· Filter a frame
· Forward a frame
· Extend a LAN
· Do all the above
________ has a jitter zero
- None of the given
- Virtual Private Network
- Isochronous Network
- Asynchronous Network
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
- Connectionless service paradigm
- Connection oriented service paradigm
- Both Connectionless and Connection-oriented service paradigm
- None of the given
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
· 21-bit
· 22-bit
· 23-bit
· 24-bit
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
· Hierarchal address
· Default route
· Shortest path
· None of the given
The next hop to which a packet is sent depends only on
· Packet's destination
· Packet's original source
· Path the packet has taken
· Non of the given
When an application--------------- data, it makes a copy of the data available to all other computers on the network?
· Broadcasting
· Multicasting
· Unicasting
· None of the given
A ---------- provide a mechanism that a customer can use to set a physical address.
· Static addressing scheme
· Configurable addressing scheme
· Dynamic addressing scheme
· None of the given
_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.
· Repeater
· Bridge
· Hub
· None of the given
The maximum size of an Ethernet segment is___________
· 250 meters
· 500 meters
· 700 meters
· None of the given
FDDI can transmits data at a rate of -----
· 1000 million bits per second
· 100 million bits per second
· 10 million bits per second
· None of the given
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
· CSMA/CD
· CSMA/CA
· TOKEN PASSING
· None of the given
-------------- have advantages arisen from the size and ease of computation.
· CRC
· Parity
· Checksums
· None of given
The term -------- is used to denote the definition of a packet used with a specific type of network.
· Packet
· Frame
· Data
· None of the given
------ has no way to determine the cause of the problem.
· Ping
· Trace route
· ICMP
· Non of the given
In -------------, network occupies the smaller area like a room a floor or a building
· LAN
· WAN
· MAN
· None of the given
In ---------, network occupies larger areas like cities & countries.
· LAN
· WAN
· MAN
· None of the given
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
· False
· True
A typical port on an ATM switch operates at __________ or higher.
· OC-2 speed (155Mbps)
· OC-3 speed (100Mbps)
· OC-3 speed (155Mbps)
· OC-3 speed (155Gbps)
The product of delay and throughput measures the _____ of data that can be present on the network.
· Area
· Volume
· Length
· None of the given
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
· Constant Bit Rate (CBR) service
· Variable Bit Rate (VBR) service
· Available Bit Rate (ABR) service
· None of the given
Which of the following is a connecting device?
· Bridge
· Repeater
· Hub
· All the given
A bridges function in the _________ layers(s).
· Physical (MAC)
· Data link
· Network
· Physical (MAC) and Data link
A Bridge forwards or filters a frame by comparing the information in its address table to the frame's__________
· Layer 2 source address
· Source node's physical address
· Layer 2 destination address
· Layer 3 destination address
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
· 8 octets
· 8 bytes
· 8 bits
· None of the given
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
· Explicit frame type
· Ideal frame type
· Implicit frame type
· None of the given
Local Talk is a LAN technology that employs -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
The Fast Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
· Parity
· Checksums
· CRC
· None of given
Computer networks are often called -------------- because they use packet technology.
· Ethernet
· Switch networks
· Packet networks
· None of the given
------ Program sends a message to a remote computer and reports whether the computer responds.
· Ping
· Traceroute
· ICMP
· Non of the given
In Point-to-Point topology there are two topologies.
· Tree and Ring
· Star and Ring
· Star and Tree
· None of the given
A network uses a ------arranges for computers to be connected in a closed loop.
· Star Topology
· Ring Topology
· Bus Topology
· None of the given
An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.
· RJ-45, 10 Base T
· RJ-45, 10 Base 5
· BNC, 10 Base 2