CS 610 Solved (Correct) MCQS (References are given in Blue Font) The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent. Encrypted Decrypted
Translated Non of these A _____________ addressbindin! table is used for each physical network. New "imilar
Separate #ld $D% provides connectionoriented service. True
False T&% provides connection oriented reliable data da ta streamin! service' whereas $D% provides connectionless unreliable messa!in! service. The $D% stands for__________. $niversal Data!ram %rotocol User Datagram Protocol $nited Data!ram %rotocol None of the !iven (n )way handshake T&% requires to !enerate a random ________ sequence number. )* bit 32 bit )+ bit none of the !iven T&% stands for _______ Transport control protocol Transmission control protocol Terminal control protocol None of the !iven
As the Internet Internet gre! the original original Classful addressing addressing sche"e sche"e #eca"e a li"itation$ %he I& address s'ace as #eing ehausted #ecause all netors had to choose one of three 'ossi#le si*es$ Select correct o'tion+ True False
Question , - of .0 ( Start ti"e+ 06+--+0/ &M ) %otal M a r s+ 1 %ice A% allos a site to run servers$ Select correct o'tion+ True False &reli"inar &reli"inar version of I& as called 222222222$ Select correct o'tion+ I& 3 e 4eneration (I&ng) IP - Next Generation (IPng) I& 3 et 4eneration (I&ng) one of the given As the Internet Internet gre! the original original Classful addressing addressing sche"e sche"e #eca"e a li"itation$ %he I& address s'ace as #eing ehausted #ecause all netors had to choose one of to 'ossi#le si*es$ si*es$ Select correct o'tion+ %rue False 222222222 uses indo "echanis" "echanis" to to control the the flo of data$ Select correct o'tion+ I& 5& TCP none of the given %C& uses indo "echanis" to control the flo of data$ %he Internet service 'roviders coordinate ith the Internet assigned nu"#er authorit to o#tain their netor nu"#ers$ Select correct o'tion+ True False 7hich 'rotocol 'rotocol is used to test different different tools$ Select correct o'tion+ ICMP I4M& %C&8I& none of the given $"(N, (&-% T# TE"T EA&/A0(1(T23 (&-% can also be used to test different tools. An (nternet host A' is reachable from another host 0' if data!ram4s can be delivered from A to 0. %in! pro!ram tests reach ability. (t sends data!ram from 0 to A' that ec hoes back to 0. it uses (&-% echo request and echo reply messa!es. (nternet layer includes code to reply to incomin! (&-% echo request messa!es.
22222222 identifies the a''lication a''lication 'rogra" 'rogra" that sent the data$ Select correct o'tion+ estination &ort Source port 9ogical address
Question , - of .0 ( Start ti"e+ 06+--+0/ &M ) %otal M a r s+ 1 %ice A% allos a site to run servers$ Select correct o'tion+ True False &reli"inar &reli"inar version of I& as called 222222222$ Select correct o'tion+ I& 3 e 4eneration (I&ng) IP - Next Generation (IPng) I& 3 et 4eneration (I&ng) one of the given As the Internet Internet gre! the original original Classful addressing addressing sche"e sche"e #eca"e a li"itation$ %he I& address s'ace as #eing ehausted #ecause all netors had to choose one of to 'ossi#le si*es$ si*es$ Select correct o'tion+ %rue False 222222222 uses indo "echanis" "echanis" to to control the the flo of data$ Select correct o'tion+ I& 5& TCP none of the given %C& uses indo "echanis" to control the flo of data$ %he Internet service 'roviders coordinate ith the Internet assigned nu"#er authorit to o#tain their netor nu"#ers$ Select correct o'tion+ True False 7hich 'rotocol 'rotocol is used to test different different tools$ Select correct o'tion+ ICMP I4M& %C&8I& none of the given $"(N, (&-% T# TE"T EA&/A0(1(T23 (&-% can also be used to test different tools. An (nternet host A' is reachable from another host 0' if data!ram4s can be delivered from A to 0. %in! pro!ram tests reach ability. (t sends data!ram from 0 to A' that ec hoes back to 0. it uses (&-% echo request and echo reply messa!es. (nternet layer includes code to reply to incomin! (&-% echo request messa!es.
22222222 identifies the a''lication a''lication 'rogra" 'rogra" that sent the data$ Select correct o'tion+ estination &ort Source port 9ogical address
one of the given %he Source can configure outgoing datagra":s to avoid 222222222 Select correct o'tion+ Seg"entation efrag"entation Fragmentation one of the given 5ra!mentation should be avoided. "ource can confi!ure out!oin! data!rams to avoid fra!mentation. "ource determines path -T$ smallest network -T$ on path from source to destination.
Question , 1; of .0 ( Start ti"e+ 06++1. &M ) %otal M a r s+ 1 %he ti"e for acnoledge"ent acnoledge"ent to arrive de'ends on 2222222222 Select correct o'tion+ istance to destination Current traffic conditions Both a and one of the given The time for acknowled!ement to arrive depends on3 6 Distance to destination 6 &urrent traffic conditions
hich is not the the t'e of error "essages "essages defined # # ICM&$ Select correct o'tion+ Source =uench %i"e eceeded estination unreacha#le None o! the gi"en >RR?R M>SSA4>S+ %hese are as follos+ @ Source =uench @ %i"e eceeded @ estination unreacha#le @ Redirect @ Frag"entation re=uired _________ is used to attach two autonomous systems. "elect correct option3 0,% (,%
#GP none of the !iven Question # 2 of 20 Due to revolutionali7ation of (%89 the speed has increased from _______ "elect correct option3
:9kbps to :;
$%&ps to 'gps none of the !iven "cale is also dramatically chan!ed. "i7e " i7e from a few tens to a few tens of millions #f computers has been revolutioni7ed. "peed "pee d has increased from :9=bps to ;,bps. Also There is an increased frame si7e in hardware Question # 3 of 20 >henever it handles a packet' (% software needs to separate the destination address into a prefix. "elect correct option3 True
False -%$T(N, T/E &1A"" #5 AN ADDE""3 >henever it handles a packet' (% software needs to separate the destination Address into a prefix and suffix. Question # 4 of 20 TT1 stands for __________ "elect correct option3
Time to 1earn Time to 1eave
Time to i"e none of the !iven Question # 5 of 20 (,%s stand for _________ "elect correct option3
(nternal ,ateway %rotocols
Interior Gatea* Protocols (ntermediate ,ateway %rotocols None of the !iven Question # 6 of 20 identifies which application pro!ram on receivin! computer shou ld _____________ _____________ identifies receive the data "elect correct option3 1o!ical address "ource port
+estination Port None of the !iven 5ield Destination %ort identifies which application pro!ram on receivin! co mputer should receive the data. >hile field source port p ort identifies the application pro!rams that sent the data. Question # 7 of 20
__________________encapsulates (% data!ram as data area in hardware frame. "elect correct option3
Netor& Inter!ace a*er Datalink 1ayer Network 1ayer None of the !iven The network interface layer encapsulates an entire data!ram in the data area of a hardware frame vu7s.net Question # of 20 &lass A mask is <::.*.*.* which is used for ________________ "elect correct option3 $nicastin! -ulticastin!
Sunetting All of the !iven class A mask is <::.*.*.* which is used for subnettin!. Question # ! of 20 NAT is not useful at a residence with &able -odem or D"1 connectivity. "elect correct option3 True "alse Question # 0 of 20 Autonomous "ystem chooses a routin! protocol to exchan!e routin! information which is passed before bein! summari7ed to another !roup. "elect correct option3 True 5alse Question # of 20 ______ layer %rovides reliable delivery of data!ram. "elect correct option3 Network
Transport Datalink none of the !iven Transport layer provides reliable delivery. Network layer ? (% ? can detect and report errors without actually fixin! them. (t focuses on data!ram delivery. Application layer is not interested in differentiatin! amon! delivery problems at intermediate routers Question # 2 of 20 The process of usin! a routin! table to select a next hop for a !iven data!ram is called_________. "elect correct option3 Encapsulation
eassemblin!
,outing or !orarding None of the !iven The process of usin! a routin! table to select a next hop for a !iven data!ram is called routin! or forwardin!. Question # 3 of 20 The process of learnin! the path -T$ is known as path -T$ discovery. "elect correct option3
True 5alse The process of learnin! the path -T$ is known as path -T$ discovery. Question # 4 of 20 As the (nternet !rew' the ori!inal &lassful addressin! scheme became a limitation. The (% address space was bein! exhausted because all networks had to choose one of ________ possible si7es. "elect correct option3
three two four five T$ree As the (nternet !rew' the ori!inal &lassful addressin! scheme became a limitation. The (% address space was bein! exhausted because all networks had to choose one of Three possible si7es. -any addresses were unused. Two new mechanisms were invented to overcome the limitations' which are as 5ollows3 6 "ubnet addressin! 6 &lassless addressin! Question # 5 of 20 End to End delivery "ervice of (% data!ram is _____ "elect correct option3 &onnection oriented
Connectionless both a and b none of the !iven Question # 6 of 20 E,% stands for _________ "elect correct option3
Extension ,ateway %rotocol
#xterior Gatea* Protocol Explicit ,ateway %rotocol none of the !iven
Question # 7 of 20 /ashin! is the transformation of a strin! of characters into a u sually shorter fixedlen!th value or a key that represents the ori!inal strin!. "elect correct option3
True 5alse /ashin! is the transformation of a strin! of characters into a u sually shorter fixedlen!th value or a key that represents the ori!inal strin!. /ashin! is used to index and retrieve items in a database because it is faster to find the item usin! the shorter hashed key than to find it usin! the ori!inal value. (t is also used in many encryption al!orithms. Question # of 20 Althou!h the A% messa!e format is sufficiently !eneral to allow arbitrary protocol and hardware addresses. A% is almost always used to bind a )<bit (% address to a ____ Ethernet address. "elect correct option3 ;9bit
.-it 9+bit ;<@bit Althou!h the A% messa!e format is sufficiently !eneral to allow arbitrary protocol and hardware addresses. A% is almost always used to bind a )<bit (% address to a +@bit Ethernet address Question # ! of 20 eliability is not the responsibility of the Transport layer. "elect correct option3 True "alse eliability is the responsibility of the Transport layer. (n T&%(%' T&% provides reliable transport service. -ost (nternet applications use T&% as no other protocol has proved to work better. Question # 20 of 20 (%89 address with ______ leadin! 7eros is interpreted to hold an (%8+ address. "elect correct option3
htt'+88vu*s$net8 !6 ;** ;<* none of the !iven (%v9 address with B9 leadin! 7eros is interpreted to hold an (%v+ addressQuestion # of 20 NAT software does not allow a %& to connect with the (nternet and act as a NAT device at the same time. "elect correct option3
True "alse Question # 2 of 20 T&% uses the term se!ment to refer to a ________. "elect correct option3 packet message both Ca and Cb None of the !iven both a and b T&% uses sin!le format for all messa!es. T&% uses the term se!ment to refer to a messa!e. Each messa!e sent from T&% on one machine to T&% on another machine uses this format includin! data and acknowled!ement. Question # 3 of 20 The $niversal Data!ram %rotocol is a messa!eoriented protocol. "elect correct option3 True 5alse $D% has the followin! characteristics. 6 (t is an endtoend protocol. (t provides applicationtoapplication communication. 6 (t provides connectionless service. 6 (t is a -essa!e#riented protocol. 6 (t uses besteffort delivery service. 6 (t follows arbitrary interaction. 6 (t is operatin! system independent Question # 4 of 20 ______________field tells the receiver how to order fra!ments within a !iven data!ram. "elect correct option3
51A," 51A,-ENT #55"ET (DENT(5(&AT(#N %one of t$e gi&en The 5A,-ENT #55"ET field tells a receiver how to order fra!ments within a !iven data!ram Question # 5 of 20 (% data!ram can contains ________ octets. "elect correct option3 *9:':): '65(535 ;9:':)9 none of the !iven Data!rams can have different si7es i.e.
/eader area is usually fixed C<* octets but can have options. Data area can contain between ; octet and 9:.:): octets C<;9;. $sually' data area is much lar!er than header. Question # 6 of 20 The amount of buffer space available at any time is called the window. "elect correct option3 True 5alse Question # 7 of 20 _______ "ource is responsible for fra!mentation. "elect correct option3 (%8+ )P*6 (%v9 source Cnot intermediate routers is responsible for fra!mentation. outers simply drop data!rams lar!er than network -T$ C-aximum Transmission $nit. "o source must fra!ment data!ram to reach destination. Question # of 20 outers use _______ to forward data!rams alon! prearran!ed path. "elect correct option3 Traffic class "lo+ label Destination address none of the !iven outers use flow label to forward data!rams alon! prearran!ed path Question # ! of 20 _______ protocol uses three way handshake to be!in a connection. "elect correct option3 $D% T,P (% none of the !iven Question # 0 of 20 Typical internet routin! uses uses a combination of two metrics__________________. "elect correct option3 routin! metrics administrative cost and routin! metrics hop cost a-ministrati&e cost an- $op count Question # 4 of 20 Network Address and %ort Translation CNA%T is by far the most popular form of _______ "elect correct option3
Network Address Transmission %et+or. /--ress Translation Network Address Transformation None of the !iven Question # 5 of 20 The routers within an autonomous system use a _____________ to exchan!e routin! information. "elect correct option3 )nterior ate+a1 protocols)Ps Exterior ,ateway protocol CE,%s 0oth (nterior ,ateway protocolsC(,%s and Exterior ,ateway protocol CE,%s None of the !iven (t is used amon! routers within autonomous system. The destinations lie within (,%. Question # 7 of 20 (nterior ,ateway %rotocols C(,%s and Exterior ,ateway %rotocols CE,%s two broad classes of (nternet outin! %rotocol. "elect correct option3 True 5alse Question # of 20 The Network 1ayer %rotocol (&-% stands for____________ "elect correct option3
(nstant &ontrol -essa!e %rotocol )nternet ,ontrol essage Protocol (nitial &ontrol -essa!e %rotocol None of the !iven Question # ! of 20 The &urrent version of (%8ersion + is _____ old "elect correct option3 ;@ years 20 1ears << years none of !iven T&% is a connectionless and reliable transport protocol. "elect correct option3 True "alse
/T $ea-er is about t$e________________of t$e cell
"elect correct option3 ;:F 0 page 66 <*F :F itter is significance for ______________ "elect correct option3 8oice 8ideo Data /l of abo&e page 66 8o+ man1 met$o-s e9ist for buil-ing routing table: "elect correct option ; 2 pages )+ T$e process of for+ar-ing t$e pac.ets of information is calle- routing T$e routing table contains information about t$e _____________ imme-iatel1 aroun- it "elect correct option3 • Topolo!y of the network • Destination page 5 • 0oth of the above • None of the above /s1nc$ronous Transfer o-e uses t$e concept of ______________ "elect correct option3 &onnectionless networkin! • ,onnection'oriente- net+or.ing page 66 ;$ic$ of t$e follo+ing statement is true regar-ing /T: "elect correct option3 • (t is a sin!le technolo!y for voice' video and data • (t has low Gitter and hi!h capacity (t uses fixed si7ed small cells. +@ octetHs data • /ll of t$e abo&e page 65 / ____ can for+ar- or bloc. messages base- on t$e information in t$e message itself "elect correct option -essa!e di!est %roxy firewall • Pac.et filter fire+all not foun- in $an-outs • %rivate =ey 2ou can use an (% packet filter firewall to create a set of rules that either discards or accepts traffic over a network connection.C"ource to confirm
http3publib.boulder.ibm.cominfocenterpowersysv)r;m:index.Gsp topicIipha:packetfilterfirewall.htm Transmission me-ia are usuall1 categori
D 5D• TD None of the above /ll -estinations on same s+itc$ $a&e same _________ "elect correct option3 outer (nformation • %e9t 8op page 5 None of the• above ;$ic$ of t$e follo+ing statement is true regar-ing Distance'*ector >outing: "elect correct option3 (t is very simple to implement. • Pac.et s+itc$ up-ates its o+n routing table first Page 64 (t is used in (%. • All of the above /n e9terior s+itc$ is one +it$ +$ic$ _______________ "elect correct option3 • ,omputers are attac$e- page 5! No computer is attached• /ubs are attached externally None of the above "rame rela1 is _______________________ "elect correct option3 • ,onnection oriente- ser&ice page 64 • &onnectionless service (t is typically ran!es from :-bps to ;***-bps. None of the above /n interior s+itc$ is one +it$ +$ic$ ___________ "elect correct option3
&omputers are attached • %o computer is attac$e- page 5! &omputers are attached internally None of the above ;$ic$ of t$e follo+ing is not a benefit of source in-epen-ence: "elect correct option3 (t allows fast and efficient routin!. • Pac.et s+itc$ -o not nee- to $a&e complete information about all -estinations Network functions even if topolo!y chan!es None of the above ;$ic$ of t$e follo+ing statement regar-ing /T is true: "elect correct option3 &onnections in AT- are called virtual channels The 8& is identified by a <+bit value formed from the 8%( • ?ot$ a an- b None of the above /T $ea-er is about t$e '''''''''' of t$e cell "elect correct option3 ;:F 0 <*F :F 8o+ man1 met$o-s e9ist for computing routing table: "elect correct option3 : + ) 2 ;$ic$ of t$e follo+ing statement is true regar-ing Distance'&ector routing: "elect correct option3 (t is very simple to implement. • Pac.et s+itc$ up-ates its o+n routing table first (t is used in (%. All of the above ;$ic$ one of t$e follo+ing is a propert1 of static routing: "elect correct option3 (t is inflexible (t is done at boot time (t has low network overload /ll of t$e abo&e /s1nc$ronous Transfer o-e uses t$e concept of '''''''''''''''''''' "elect correct option3 &onnectionless networkin! ,onnection'oriente- net+or.ing
;$ic$ multiple9ing tec$ni=ue s$ifts eac$ signal to a -ifferent carrier fre=uenc1: "elect correct option3 TD"D 0oth a and b None of the above /n interior s+itc$ is one +it$ +$ic$ @@@@@@@ "elect correct option3 &omputers are attached %o computer is attac$e&omputers are attached internally None of the above A/% net+or.s can not be e9ten-e- to &er1 large net+or.s because of t$e limitations of "elect correct option3 Area Distance outers Technolo!y ;$ic$ of t$e follo+ing statement is +rong regar-ing /T: "elect correct option3 • (t is a sin!le technolo!y for voice' video and data • (t has low Gitter and hi!h capacity. • (t uses fixed si7e' small cells' and +@ octet4s data • %one of t$e abo&e ;$ic$ one of t$e follo+ing is t$e responsibilit1 of DBi.straC algorit$m: "elect correct option3 To compute t$e s$ortest pat$ bet+een t+o no-es To extract next hop information from path information To insert next hop information into routin! table All of the above ;$ic$ one of t$e follo+ing is a propert1 of -1namic routing: "elect correct option3 • (t is inflexible • (t has low network overload • )t can +or. aroun- net+or. failure All of the• above ;$ic$ of t$e follo+ing statement is true regar-ing /T: "elect correct option3 AT- is a sin!le technolo!y that is desi!ned to meet the !oals of both 1ANs and >ANs. AT- uses the concept of connectionoriented networkin!. ?ot$ a an- b None of the above ource in-epen-ence is a p$enomena in +$ic$ ne9t $op to -estination -oes not -epen- on t$e JJJJJJJ
"elect correct option3 ource of pac.et Destination of packet No of hops "ource of protocol )f a computer on t$e net+or. s$ares resources for ot$ers to use( it is calle- ____ a er&er b ,lient c ainframe /ns+erE a 2 Terminators are use- in ______ topolog1 a ?us b tar /ns+erE a 3 )n _____ topolog1( if a computerCs net+or. cable is bro.en( +$ole net+or. goes -o+n a ?us b tar /ns+erE a 4 "or large net+or.s( _______ topolog1 is use- a ?us b tar c >ing /ns+erE b 5 )F stan-s for a )nternational tan-ar- Frgani
____ Aa1er -eci-es +$ic$ p$1sical pat$+a1 t$e -ata s$oul- ta.e a /pplication b %et+or. c P$1sical /ns+erE c ! )D% is an e9ample of ______ net+or. a ,ircuit s+itc$eb Pac.et s+itc$e/ns+erE a 0 G25 is an e9ample of ______ net+or. a ,ircuit s+itc$eb Pac.et s+itc$e/ns+erE b _____________ allo+s A/% users to s$are computer programs an- -ata a ,ommunication ser&er b Print ser&er c "ile ser&er /ns+erE c 2 Print ser&er uses ________ +$ic$ is a buffer t$at $ol-s -ata before it is sen- to t$e printer a Queue b pool c %o-e /ns+erE b 3 / stan-alone program t$at $as been mo-ifie- to +or. on a A/% b1 inclu-ing concurrenc1 controls suc$ as file an- recor- loc.ing is an e9ample of____ a A/% intrinsic soft+are b A/% a+are soft+are c roup+are - A/% ignorant soft+are /ns+erE a 4 T$e ______ portion of A/% management soft+are restricts access( recor-s user acti&ities an- au-it -ata etc a ,onfiguration management b ecurit1 management c Performance management /ns+er E b 5 ;$at is t$e ma9 cable lengt$ of TP:
a 00 ft b 200 ft c 00 m - 200 m /ns+er E 6 ;$at is t$e ma9 -ata capacit1 of TP: a 0 mbps b 00 mbps c 000 mbps - 0000 mbps /ns+erE b 7 ;$ic$ connector TP uses: a ?%, b >' c >'45 - >'6! /ns+er E c ;$at is t$e central -e&ice in star topolog1: a TP ser&er b 8ubHs+itc$ c PD, - >outer /ns+er E b ! ;$at is ma9 -ata capacit1 for optical fiber cable: a 0 mbps b 00 mbps c 000 mbps - 0000 mbps /ns+er E c
(n Direct point to point communication addin! the Nth computer requires new connections.
► None
of the !iven
► N< ► N; ► CN<
?N<
disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23 Question %oE 2 a r . sE $ttpEHH&u
(n %ointto%oint topolo!y there are two topolo!ies. ► Tree
and in!
► "tar
and in!
► "tar
and Tree
► None
of the !iven
%#(NTT#%#(NT3 www.vu7s.net
htt'+88grou's$google$co"8grou'8vus (n Point-to-Point topolo!y there are two topolo!ies. ; "TA topolo!y < TEE topolo!y Question %oE 3 a r . sE $ttpEHH&u
► 1AN ► >AN ► -AN ► None
of the !iven
In !"N network occupies the smaer area ike a room a $oor or a %uiding.(P# & 8ar-+are t$at calculates a ,>, uses t+o simple components . ► AND
unit and K# unit
► "hift
re!ister and K# unit
► "hift
re!ister and AND unit
► none
of the !iven
&& uses Gust two hardware components3 6 "hift re!ister 6 Exclusive # C K# unit .(P# 2'
Question %oE 6 a r . sE $ttpEHH&u
The ,i!abit Ethernet hardware operates at a rate of ► ;*
-bps
► ;**
-bps
L ;*** -bps L None of the !iven iga%it )thernet that operates at 1 %ps (1''' *%ps over $i%er optics and twisted pair )thernet ca%es. $ttpEHH&u
formall1 name- __________ informall1 .no+n as t$e t+iste- pair It$ernet or TP It$ernet
L ;* 0ase < L ;* 0ase : L ;* 0ase T L none of the !iven 1'+",)- his is another standard o$ wiring scheme. It is common/ caed 1'+ase-0 wisted Pair or P )thernet. (P# &3 net /n interface for t$in It$ernet must $a&e an ____________ connector ( an- must generate signals accor-ing to t$e_____________ specification .
L M+:' ;* 0ase T
L M+:' ;* 0ase :
L 0N&' ;* 0ase <
L 0N&' ;* 0ase T EHH&u
L 1oop L 5ilters L "pannin! Trees L All !iven choices
$ttpEHH&u
L ,reedy al!orithm L Distance vector al!orithm L DiGksta4s al!orithm L none of the !iven Dikstras agorithm can accommodate weights on edges in graph. he shortest Path is then the path with owest tota weight (sum o$ the weight with a edges. It shoud %e noted that the shortest path is not necessari/ with $ewest edges (or hops.
?asic A/% tec$nologies suc$ as It$ernet( To.en >ing( an- "DD) use a _____
L &onnectionless service paradi!m
L &onnectionoriented service paradi!m L 0oth &onnectionless and &onnectionoriented service paradi!m L None of the !iven
_______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer
L %hysical 1ayer L Network (nterface 1ayer L (nternet 1ayer L Transport 1ayer
!")4 & ensure reia%e trans$er a/er & in 5P a/ering mode is transport a/er. EHH&u
L +@bit L )<bit L <+bit L None of the !iven
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a 6ost and used $or a communication with the host
t$e a--ress __________ i-entifies t$e p$1sical net+or. to +$ic$ t$e computer is attac$e-( +$ile t$e _______ i-entifies an in-i&i-ual computer on t$at net+or.
L %refix' suffix
L suffix' prefix L suffix' suffix L none of the !iven
PREFIX:
It identi$ies the ph/sica network to which the computers are attached. SUFFIX:
It identi$ies an individua computer on the network.
___________ places t$e boun-ar1 bet+een t$e first an- secon- octets
L &lass A L &lass 0 L &lass & L &lass D &lass A places the boundary between the first and second octets. &lass 0 places the boundary between the second and third octets' and class & places the boundary between the third and fourth octets.
___________ places t$e boun-ar1 bet+een t$e t$ir- an- fourt$ octets
L &lass A L &lass 0 L &lass & L &lass D &lass A places the boundary between the first and second octets. &lass 0 places the boundary between the second and third octets' and class & places the boundary between the third and fourth octets.
$ttpEHH&u
________ fiel- of $ea-er in-icates +$et$er a -atagram is a fragment or a complete -atagram .
L 51A," L 51A,-ENT #55"ET L (DENT(5(&AT(#N L None of the !iven
74"*)N"I8N (% uses fra!mentation i.e. data!ram4s can be split into pieces to fit in network with small -T$. Each fra!ment is an independent data!ram. (t includes all header fields. 0it in header indicates that the data!ram is a fra!ment tpEHH&u
L T&% L $D% L (% L none of the !iven 9DP has the $oowing characteristics. : It is an end-to-end protoco. It provides appication-to-appication communication. : It provides connectioness service. : It is a *essage-8riented protoco. : It uses %est-e$$ort deiver/ service. : It $oows ar%itrar/ interaction. : It is operating s/stem independent
EHH&u
UDP an- T,P are bot$_________ la1er protocols
L %hysical L Data link L Network
L Transport
,onnection'oriente- ser&ice( Point'to'point( ,omplete reliabilit1( "ull'-uple9 communication( tream interface( >eliable connection start'up an- raceful connection s$ut-o+n are t$e ser&ices pro&i-e- b1__________
L (% L None of the !iven L T&% L $D% "E8(&E %#8(DED 02 T&%3 5ollowin! are the services provided by T&%3 6 &onnectionoriented service 6 %ointtopoint 6 &omplete reliability 6 5ullduplex communication 6 "tream interface 6 eliable connection startup 6 ,raceful connection shutdown _______ protocols of T,PH)P la1ering mo-el specif1 $o+ to ensure reliable transfer
L %hysical 1ayer L Network (nterface 1ayer L (nternet 1ayer L Transport 1ayer
!")4 & ensure reia%e trans$er a/er & in 5P a/ering mode is transport a/er
________i-entifies +$ic$ application program on recei&ing computer s$oul- recei&e t$e -ata
L 1o!ical address L "ource port L Destination %ort L None of the !iven
7ied Destination Port identi$ies which appication program on receiving computer shoud receive the data $ied source port identi$ies the appication programs that sent the data. Question %oE 23 a r . sE $ttpEHH&u
________ identifies the application pro!ram that sent the data. L Destination %ort L "ource port L 1o!ical address L None of the !iven 7ied Destination Port identi$ies which appication program on receiving computer shoud receive the data ;hie $ied source port identi$ies the appication programs that sent the data. (4e$erence $rom )-%ooks
T$e ?or-er ate+a1 Protocol ?P uses_________ for all communication
L $D% L T&% L 0oth $D% and T&%
L none of the !iven 0#DE ,ATE>A2 %#T#
(t is most popular Exterior ,ateway %rotocol in (nternet. (t has followin! characteristics3 (t provides routin! amon! autonomous systems CE,%. (t provides policies to control routes advertised. (t uses reliable transport CT&%.
EHH&u
L 0,% L #"%5 L (% L None of the !iven
#$T(N, (N5#-AT(#N %#T# C(%3 (t has the followin! characteristics3 (t is used for routin! within an autonomous system C(,%. /op &ount -etric3 (% measures distance in network ho ps' where each network between the source and destination counts as a sin!le hop. (t uses $D% for all messa!e transmissions. (% is used over 1AN. 8ersion ; of (% uses hardware broadcast and version < allows Delivery via multicast. (t can be used to advertise default route propa!ation. An or!ani7ation can use (% to (nstall a default route in each router. (t uses distance vector al!orithm. EHH&u
),P message transport is acte- upon b1 getting ),P encr1pte- in )P
L True L 5alse
I5*P message transport is acted upon %/ getting I5*P encapsuated in IP (P# 11<
Protocol a--resses are abstractions pro&i-e- b1 ___________
L hardware L software L operatin! system L internet Protoco addresses are a%stractions provided %/ so$tware (re$erence
T$ese pac.ets ser&e same purpose on ________ as frames on ______
L (ntranet' 1AN L (nternet' >AN L (ntranet' >AN L (nternet' 1AN =I49"! P"5>), hese packets serve same purpose in Internet as $rames on !"N
/--ress mas. -efines $o+ man1 bits of a--ress are in suffi9:
L True L 5alse Address mask defines how many bits of address are in prefix. %refix defines how much of address used to identify network. $ttpEHH&u
a single net+or.ing tec$nolog1 is best for all nee-s
L True L 5alse here is no singe networking technoog/ that is %est $or a needs $ttpEHH&u
/ computer attac$e- to a gi&en net+or. can onl1 communicate +it$ ot$er computers attac$e- to t$e same net+or. )s t$is a problem +it$ multiple net+or.s:
L True L 5alse the chief problems with multiple networks are as follows3 6 A computer attached to a !iven network can only communicate with other &omputers attached to the same network. EHH&u
T$e term self'i-entif1ing is use- for ,lassful )P a--resses because t$e class of t$e a--ress can be compute- from t$e a--ress__________
L (tself L prefix L suffix L mask 5ass$u IP addresses are se$-identi$/ing %ecause the cass o$ the address can % e computed $rom the address itse$ "in- t$e class of t$e a--ress 000 00 0000 00
LA L0 LE
L& eference table handouts % O @P &u
LA L& LE L0 eference table handouts % O @P EHH&u
)n +$ic$ met$o- of /--ress >esolution Protocol t$e protocol a--ress is -etermineb1 $ar-+are a--ress: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
LT LD L& L T' & eference table handouts % O BP
EHH&u
;$ic$ met$o- of /--ress >esolution Protocol re=uires $ar-+are broa-cast: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
LD LT
L& L T' D eference table handouts % O BP EHH&u
;$ic$ met$o- of /--ress >esolution Protocol resolution +it$ minimum -ela1: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
L T' D Lc LT L T' & eference table handouts % O BP )n +$ic$ met$o- of /--ress >esolution Protocol t$e implimentation is more -ifficult: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
L T' & LT L& LD eference table handouts % O BPEHH&u
Fn of t$e -esign goals for unicast route propagation is __________
L &onsistency L inconsistency L stability
L dynamic addressin! 8n o$ the design goas $or unicast route propagation is sta%iit/?continua changes in route are undesira%e %ecause the/ ead to higher itter and datagram arriving out o$ order. hus0 once a unicast routing protoco $inds a shortest path0 it usua/ retains the route unti a $aiure makes the path unusa%e. (4e$erence $rom )-%ook
&u
Propagation multicast routing information -iffers -ramaticall1 from unicast route propagation:
L True L 5alse
Propagating multicast routing information differs dramatically from unicast route propagation . he di$$erence arises %ecause internet muticast aows d/namic group mem%ership and autonomous senders $ttpEHH&u
To sa&e traffic( an IP -oes not summari
L True L 5alse o save tra$$ic0 an )P summari@e routing in$ormation $rom the autonomous s/stem %e$ore passing it to another autonomous s/stem. *ore important an )P impements poic/ constraint that aows a s/stem manager to determine eAact/ what in$ormation is reeased outside the organi@ation. C 4e$erence $rom )-%ook
EHH&u
)n )P&6 t$e t1pe of a--ress use- for collection of computers +it$ same prefi9 /re .no+n as_________
L Anycast
L $nicast L -ulticast L Non of the !iven 7oowing are specia t/pes o$ addresses0 IPvB uses Unicast: It is used $or singe destination computer. Multicast: It is used $or mutipe destinationsC possi%/ not at same site. Cluster: his t/pe o$ address is used $or coection o$ computers with same pre$iA0 Datagram is deivered to one out o$ custer .
pecial t1pes of a--resses in )P&6 use- for multiple -estinationsK possibl1 not same site /re .no+n as________
L $nicast L Anycast L -ulticast L none of the !iven 5ollowin! are special types of addresses' (%v9 uses3 UnicastE (t is used for sin!le destination computer. ulticastE (t is used for multiple destinationsQ possibly not at same site. ,lusterE This type of address is used for collection of computers with same prefix' Data!ram is delivered to one out of cluster. EHH&u
UDP offers application programs a essage'Friente- )nterface( applications can -epen- on protocol to preser&e -ata boun-aries
L True L 5alse 9DP o$$ers appication programs a *essage-8riented Inter$ace. It does not divide messages into packets $or transmission and does not com%ine messages $or deiver/. "D="N"), : "ppications can depend on protoco to preserve data %oundaries.
EHH&u
>eliabilit1 is t$e responsibilit1 of t$e _________ la1er
L Network L Data link L Transport L Application 4eia%iit/ is the responsi%iit/ o$ the ransport a/er &u
T,P uses _______ mec$anism to control t$e flo+ of -ata
L door L window L acknowled!ment L retransmission )n Direct point to point communication a--ing t$e %t$ computer re=uires'''''''''''' ne+ connections
L None of the !iven L N< L N; L CN< ?N< disadvantage In Direct point to point communication is that adding a new computer to the network requires N-1 new connections .(P# 23 net )n Point'to'Point topolog1 t$ere are t+o topologies .
L Tree and in!
L "tar and in! L "tar and Tree L None of the !iven %#(NTT#%#(NT3 (n Point-to-Point topolo!y there are two topolo!ies. ; "TA topolo!y < TEE topolo!y $ttpEHH&u
L 1AN L >AN L -AN L None of the !iven In !"N network occupies the smaer area ike a room a $oor or a %uiding.(P# &
net 8ar-+are t$at calculates a ,>, uses t+o simple components
L AND unit and K# unit L "hift re!ister and K# unit L "hift re!ister and ANDunit L none of the !iven && uses Gust two hardware components3 6 "hift re!ister 6 Exclusive # C K# unit .(P# 2' $ttpEHH&u
T$e igabit It$ernet $ar-+are operates at a rate of ''''''''
L ;* -bps L ;** -bps L ;*** -bps L None of the !iven iga%it )thernet that operates at 1 %ps (1''' *%ps over $i%er optics and twisted pair )thernet ca%es. net
formall1 name- __________ informall1 .no+n as t$e t+iste- pair It$ernet or TP It$ernet
L ;* 0ase < L ;* 0ase : L ;* 0ase T L none of the !iven 1'+",)- his is another standard o$ wiring scheme. It is common/ caed 1'+ase-0 wisted Pair or P )thernet. (P# &3 net /n interface for t$in It$ernet must $a&e an ____________ connector ( an- must generate signals accor-ing to t$e_____________ specification .
L M+:' ;* 0ase T L M+:' ;* 0ase :
L 0N&' ;* 0ase <
L 0N&' ;* 0ase T EHH&u
/ s1stem +it$ re-un-ant bri-ges mig$t $a&e a problem +it$_______ in t$e s1stem
L 1oop L 5ilters L "pannin! Trees L All !iven choices
EHH&u
L ,reedy al!orithm L Distance vector al!orithm L DiGksta4s al!orithm L none of the !iven Dikstras agorithm can accommodate weights on edges in graph. he shortest Path is then the path with owest tota weight (sum o$ the weight with a edges. It shoud +e noted that the shortest path is not necessari/ with $ewest edges (or hops. ?asic A/% tec$nologies suc$ as It$ernet( To.en >ing( an- "DD) use a _____
L &onnectionless service paradi!m L &onnectionoriented service paradi!m L 0oth &onnectionless and &onnectionoriented service paradi!m L none of the !iven
&u
L %hysical 1ayer L Network (nterface 1ayer L (nternet 1ayer L Transport 1ayer
!")4 & ensure reia%e trans$er a/er & in 5P a/ering mode is transport a/er.
/n )nternet /--ress )P a--ress is a uni=ue __________ binar1 number assigneto a $ost an- use- for all communication +it$ $ost
L +@bit L )<bit L <+bit L None of the !iven
"n Internet address (IP address is a unique 32-%it %inar/ num%er assigned to a host and used $or a communication with the host $ttpEHH&u
T$e a--ress __________ i-entifies t$e p$1sical net+or. to +$ic$ t$e computer is attac$e-( +$ile t$e _______ i-entifies an in-i&i-ual computer on t$at net+or.
L prefix ' suffix L suffix ' prefix L suffix ' suffix L None of the !iven
PREFIX:
It identi$ies the ph/sica network to which the computers are attached. SUFFIX:
It identi$ies an individua computer on the network. $ttpEHH&u
___________ places t$e boun-ar1 bet+een t$e first an- secon- octets
L &lass A L &lass 0 L &lass & L &lass D &lass A places the boundary between the first and second octets. &lass 0 places the boundary between the second and third octets' and class & places the boundary between the third and fourth octets.
$ttpEHH&u
___________ places t$e boun-ar1 bet+een t$e t$ir- an- fourt$ octets
L &lass A L &lass 0 L &lass & L &lass D &lass A places the boundary between the first and second octets. &lass 0 places the boundary between the second and third octets' and class & places the boundary between the third and fourth octets.
$ttpEHH&u
________ fiel- of $ea-er in-icates +$et$er a -atagram is a fragment or a complete -atagram
L 51A," L 51A,-ENT #55"ET L (DENT(5(&AT(#N L None of the !iven
74"*)N"I8N EHH&u
L T&% L $D% L (% L none of the !iven 9DP has the $oowing characteristics. : It is an end-to-end protoco. It provides appication-to-appication communication. : It provides connectioness service. : It is a *essage-8riented protoco. : It uses %est-e$$ort deiver/ service. : It $oows ar%itrar/ interaction. : It is operating s/stem independent
UDP an- T,P are bot$_________ la1er protocols
L %hysical L Data link L Network
L Transport
$ttpEHH&ueliable connection startup an- raceful connection s$ut-o+n are t$e ser&ices pro&i-e- b1__________
L (% L None of the !iven L T&% L $D% "E8(&E %#8(DED 02 T&%3 5ollowin! are the services provided by T&%3 6 &onnectionoriented service 6 %ointtopoint 6 &omplete reliability 6 5ullduplex communication 6 "tream interface 6 eliable connection startup 6 ,raceful connection shutdown $ttpEHH&u
L %hysical 1ayer L Network (nterface 1ayer L (nternet 1ayer L Transport 1ayer !")4 & ensure reia%e trans$er a/er & in 5P a/ering mode is transport a/er EHH&u
________i-entifies +$ic$ application program on recei&ing computer s$oul- recei&e t$e -ata
L 1o!ical address L "ource port L Destination %ort L None of the !iven
$ttpEHH&u
________ i-entifies t$e application program t$at sent t$e -ata
L Destination %ort L "ource port L 1o!ical address L None of the !iven
The 0order ,ateway %rotocol C0,% uses_________ for all communication
L $D% L T&% L 0oth $D% and T&%
L None of the !iven 0#DE ,ATE>A2 %#T#
(t is most popular Exterior ,ateway %rotocol in (nternet. (t has followin! characteristics3 (t provides routin! amon! autonomous systems CE,%. (t provides policies to control routes advertised. (t uses reliable transport CT&%.
.
$ttpEHH&u
L 0,% L #"%5 L (% L None of the !iven
#$T(N, (N5#-AT(#N %#T# C(%3 (t has the followin! characteristics3 (t is used for routin! within an autonomous system C(,%. /op &ount -etric3 (% measures distance in network ho ps' where each network between the source and destination counts as a sin!le hop. (t uses $D% for all messa!e transmissions. (% is used over 1AN. 8ersion ; of (% uses hardware broadcast and version < allows delivery via multicast. (t can be used to advertise default route propa!ation. An or!ani7ation can use (% to install a default route in each router. (t uses distance vector al!orithm. EHH&u
),P message transport is acte- upon b1 getting ),P encr1pte- in )P
L True L 5alse I5*P message transport is acted upon %/ getting I5*P encapsuated in IP (P# 11< EHH&u
L hardware L software L operatin! system L internet Protoco addresses are a%stractions provided %/ so$tware
T$ese pac.ets ser&e same purpose on ________ as frames on ______
L (ntranet' 1AN L (nternet' >AN L (ntranet' >AN L (nternet' 1AN =I49"! P"5>), hese packets serve same purpose in Internet as $rames on !"N
net
/--ress mas. -efines $o+ man1 bits of a--ress are in suffi9:
L True L 5alse Address mask defines how many bits of address are in prefix. %refix defines how much of address used to identify network.
/ single net+or.ing tec$nolog1 is best for all nee-s .
L True L 5alse here is no singe networking technoog/ that is %est $or a needsEHH&u
/ computer attac$e- to a gi&en net+or. can onl1 communicate +it$ ot$er computers attac$e- to t$e same net+or. )s t$is a problem +it$ multiple net+or.s:
L True L 5alse the chief problems with multiple networks are as follows3 6 A computer attached to a !iven network can only communicate with other &omputers attached to the same network. EHH&u
T$e term self'i-entif1ing is use- for ,lassful )P a--resses because t$e class of t$e a--ress can be compute- from t$e a--ress__________
L (tself L prefix L suffix L mask 5ass$u IP addresses are se$-identi$/ing %ecause the cass o$ the address can % e computed $rom the address itse$
"in- t$e class of t$e a--ress 000 00 0000 00
LA L0 LE L& eference table handouts % O @P $ttpEHH&u
00 000 0 0000
LA L& LE L0 eference table handouts % O @P
)n +$ic$ met$o- of /--ress >esolution Protocol t$e protocol a--ress is -etermineb1 $ar-+are a--ress: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
LT LD L& L T' & eference table handouts % O BP
EHH&u
;$ic$ met$o- of /--ress >esolution Protocol re=uires $ar-+are broa-cast: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
LD LT L& L T' D eference table handouts % O BP
&u
;$ic$ met$o- of /--ress >esolution Protocol resolution +it$ minimum -ela1: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
L T' D Lc LT L T' & eference table handouts % O BP )n +$ic$ met$o- of /--ress >esolution Protocol t$e implementation is more -ifficult: ;ere JTJ stan-s for Table loo.up( J,J for ,lose-'form ,omputation an- JDJ for Data I9c$ange:
L T' & LT L& LD eference table handouts % O BP
Fn of t$e -esign goals for unicast route propagation is __________
L &onsistency L inconsistency L stability L dynamic addressin! 8n o$ the design goas $or unicast route propagation is sta%iit/?continua changes in route are undesira%e %ecause the/ ead to higher itter and datagram arriving out o$
order. hus0 once a unicast routing protoco $inds a shortest path0 it usua/ retains the route unti a $aiure makes the path unusa%e. (4e$erence $rom )-%ook $ttpEHH&u
Propagation multicast routing information -iffers -ramaticall1 from unicast route propagation:
L True L 5alse
Propagating multicast routing information differs dramatically from unicast route propagation . he di$$erence arises %ecause internet muticast aows d/namic group mem%ership and autonomous senders to sa&e traffic an IP -oes not summari
L True L 5alse to save tra$$ic0 an )P summari@e routing in$ormation $rom the autonomous s/stem %e$ore passing it to another autonomous s/stem. *ore important an )P impements poic/ constraint that aows a s/stem manager to determine eAact/ what in$ormation is reeased outside the organi@ation. C 4e$erence $rom )-%ook
$ttpEHH&u
)n )P&6 t$e t1pe of a--ress use- for collection of computers +it$ same prefi9 /re .no+n as_____
L Anycast L $nicast L -ulticast L none of the !iven 7oowing are specia t/pes o$ addresses0 IPvB uses Unicast: It is used $or singe destination computer.
Multicast: It
is used $or mutipe destinationsC possi%/ not at same site. Cluster: his t/pe o$ address is used $or coection o$ computers with same pre$iA0 Datagram is deivered to one out o$ custer. &u
pecial t1pes of a--resses in )P&6 use- for multiple -estinationsK possibl1 not at same site _________
L $nicast L Anycast L -ulticast L none of the !iven 5ollowin! are special types of addresses' (%v9 uses3 UnicastE (t is used for sin!le destination computer. ulticastE (t is used for multiple destinationsQ possibly not at same site. ,lusterE This type of address is used for collection of computers with same prefix' Data!ram is delivered to one out of cluster.
UDP offers application programs a essage'Friente- )nterface( applications can -epen- on protocol to preser&e -ata boun-aries
L True L 5alse 9DP o$$ers appication programs a *essage-8riented Inter$ace. It does not divide messages into packets $or transmission and does not com%ine messages $or deiver/. "D="N"), : "ppications can depend on protoco to preserve data %oundaries. $ttpEHH&u
>eliabilit1 is t$e responsibilit1 of t$e _________ la1er
L Network L Data link
L Transport L Application 4eia%iit/ is the responsi%iit/ o$ the ransport a/er EHH&u
T,P uses _______ mec$anism to control t$e flo+ of -ata
L Door L window L acknowled!ment L retransmission 5P uses window mechanism to contro the $ow o$ data. $ttpEHH&u
t$e time for ac.no+le-gement to arri&al of pac.et -epen-s on
L Distance to destination and &urrent traffic conditions L &urrent traffic conditions L Distance to destination L non of these he time $or acknowedgement to arrive depends on : Distance to destination : 5urrent tra$$ic conditions EHH&u
"DD) can transmits -ata at a rate of ''''''''''
L ;** million bits per second