Uploaded by لؤي مطر

TESTBANK

advertisement
IP attaches a header to upper layer data to form an IP __________.
Select one:
packet
subnet
datagram
layer
Although it is intended to ultimately be replaced, IPv4 is currently the standard IP used in
TCP/IP networks.
Select one:
True
False
Suppose two IPv6 nodes want to communicate using IPv6 datagrams but are connected to
each other by intervening IPv4 routers in the middle. The best solution here is_____
Select one:
Tunneling
No solution
Replace the system
fragmentation
Which of the following is NOT an enhancement of IPv6 over IPv4?
Select one:
expanded address space
header format helps speed processing/forwarding
header changes to facilitate QoS
improved error recovery
Guaranteed delivery with bounded delay: This service guarantees that the packet will be
delivered within a specified host-to-host delay bound.
In-Order packets: This service ensures that the packet arrives at the destination in the order
in which they are sent.
Guaranteed max jitter: This service ensures that the amount of time taken between two
successive transmissions at the sender is equal to the time between their receipt at the
destination.
Security services: The network layer provides security by using a session key between the
source and destination host. The network layer in the source host encrypts the payloads of
datagrams being sent to the destination host. The network layer in the destination host
would then decrypt the payload. In such a way, the network layer maintains the data
integrity and source authentication services.
Suppose datagrams are limited to 1,700 bytes (including header) between source Host A and
destination Host B.
Assuming a 20-byte IP header, how many datagrams would be required to send an MP3
consisting of 100,000 bytes?
Hint: The answer must be an integer number.
Answer: 60
‫طريقة الحل‬
1700 – )‫ ثابتة‬40( = 1660
1660 / 100.000= 60
File size = 100000 bytes.
Assume the data is carried in TCP segments, with each TCP segment also having 20 bytes of
header. Then each datagram can carry 1500-40=1460 bytes of the file. Number of datagrams
required 1105/1460=69. datagrams
Answer All but the last datagram will be 1,500 bytes; the last datagram will be 720
(calculated from 681460 - 100000)+40 = 760bytes. Note that here there is no fragmentation
- the source host does not create datagrams larger than 1500 bytes, and these datagrams
are smaller than the MTUs of the links.
_________ determines how datagram is routed among routers along end-end path from
source host to destination host.
Select one:
Control plane
Data plane
Forwarding
None of the above
The reassembly of the fragments of an IP datagram is done in the datagram’s destination
host.
Select one:
True
False
The job of delivering the data in a transport-layer segment to the correct socket is
called. Demultiplexing
Sequence numbers are required for a receiver to find out whether an arriving packet
contains a new data or is a retransmission.
The job of gathering data chunks at the source host from different sockets, capsulating each
data chunk with header information to create segments, and passing the segments to the
network layer is called. Multiplexing
Sender can have up to N unacknowledged packets in pipeline, and receiver only sends
cumulative ack Go-Back-N protocol
Sender can have up to N unacknowledged packets in pipeline, and receiver sends individual
ack for each packet. Selective Repeat Protocol
To join the internet, the computer has to be connected to a____
A. Internet architecture board
B. Internet service provider
A ___ is a device that forwards packets between networks by processing the routing
information included in the packet.
A. Switch
B. Router
C. Hub
D. Firewall
Sequence numbers are required for a receiver to find out whether an arriving packet
contains a new data or is a retransmission.
Select one:
True
False
Zeroconf protocol means that the protocol is able to automatically configure a host’s
network-related aspects in order to connect the host into a network.
Select one:
True
False
Which of the following field in IPv4 datagram is not related to fragmentation?
Select one:
More flag
TOS
Offset
Identifier
The term IANA stands for?
Internet Assigned Numbers Authority
Internal Associative Numbers Authority
Internal Assigned Numbers Authority
Internet Associative Numbers Authoritative
How many versions available of IP?
One version
Four versions
Six versions
Two versions
Generalized-forwarding means that besides its final destination, other factors associated
with a datagram is also considered when a router determines the output interface for the
datagram
Select one:
True
False
The term IPv4 stands for?
Internet Programming Version 4
International Protocol Version 4
International Programming Version 4
Internet Protocol Version 4
These are the features present in IPv4 but not in IPv6
Select one:
Fragmentation
Header checksum
Options
All of the mentioned
The size of IP address in IPv6 is
Select one:
4 octets
16 byte
32 bits
40 bytes
There is not a need for connection establishment and termination procedures to support
connection-oriented service with a reliable network service.
Select one:
True
False
The first line of HTTP request message is called ____________
Select one:
Header line
Entity line
Request line
Status line
Status line: Explanation: Status line is the the start line of an HTTP response.
Which is a time-sensitive service?
Select one:
Internet telephony
File download
E-mail
File transfer
Given that DNS RR format: (name, value, type, ttl)
If Type=CNAME, then Value is a________________ for the alias hostname Name .
canonical hostname
hostname
mail server
domain
FTP uses _________ parallel TCP connections to transfer a file
Select one:
4
3
1
2
HTTP response messages never have an empty message body.
Select one:
True
False
POP3 protocol is stateless across sessions.
Select one:
True
False
A user requests a Web page that consists of some text and three images. For this page, the
client will send one request message and receive four response messages.
Select one:
True
False
In DNS: iterated query puts burden of name resolution on contacted name server, and
heavy load at upper levels of hierarchy.
Select one:
True
False
The domain name system is maintained by _______
Select one:
a single computer
centralized database system
distributed database system
a single server
When displaying a web page, the application layer uses the _____________
Select one:
SMTP protocol
FTP protocol
TCP protocol
HTTP protocol
Demultiplexing in UDP, receiver uses four values:
1. source IP address
2. source port number
3. destination IP address
4. destination port number
to direct segment to appropriate socket.
Select one:
True
False
The first line of HTTP response message is called request line.
Select one:
True
False
Given that DNS RR format: (name, value, type, ttl)
If Type=A , then Name is a domain (such as foo.com ) and Value is the hostname of an
authoritative DNS server that knows how to obtain the IP addresses for hosts in the domain.
False
UDP provides a reliable byte-stream between client and server but TCP does not.
Select one:
True
False
Transport services and protocols provide logical communication between hosts.
Select one:
True
False
SMTP is a "push" protocol, while HTTP is a "pull" protocol.
Select one:
True
False
In computer network nodes are ___________
Select one:
the computer that routes the data
all of the mentioned
the computer that terminates the data
the computer that originates the data
Router can be called (host)
Select one:
True
False
Upstream transmission rate typically is larger than downstream transmission rate
Select one:
True
False
Transport layer is implemented in routers.
Select one:
True
False
To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
c) internet service provider
d) different computer
Most routers use this principle
Select one:
Stop and wait
Store and forward
Both Stop and wait and Store and forward
None of the mentioned
For persistent HTTP, multiple objects can be sent over single TCP connection between
client and server.
Select one:
True
False
_______ define format, order of messages sent and received among network entities, and
actions taken on message transmission and receipt. Protocols
Sender wont overwhelme receiver. flow control
Program running within a host. Process
Responsible for com, org, net, edu, aero, jobs, museums. top-level domain (TLD) servers
Suppose you wanted to do a transaction from a remote client to a server as fast as possible.
would you use UDP or TCP. User Datagram Protocol (UDP)
Provides interrupted TCP connection, data integrity, and endpoint authentication. SSL
Attackers make resources (server, bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic. Denial Of Service (DoS)
Promiscuous network interface reads/records all packets (ex. including passwords!) Passing
by. Packet Sniffing
Send packet with false source address. IP Spoofing
Self-Replicating infection by passively receiving object that gets itself executed. Worm
Self-replicating infection by receiving/executing object (ex. e-mail attachment). Virus
In TCP, the byte stream "number" of first byte in segment's data is called. sequence number
Encapsulates transport-layer segment with a network-layer header. network-layer datagram
Generated by the transport layer and encapsulates application-layer message with transport
layer header. transport-layer segment
Data which an application wants to send and passed onto the transport layer. Applicationlayer message
Encapsulates Network layer datagram with a link-layer Header. link-layer frame
Pipelined protocols means that sender sends one packet, then walts for receiver response
Select one:
True
False
Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
TCP process may not write and read data at the same speed. So we need
__________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
In segment header, sequence number and acknowledgement number fields
refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is
sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Bytes of data being transferred in each connection are numbered by TCP.
These numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
The size of an IP address in IPv6 is _________
a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits
The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
In the IPv6 header, the traffic class field is similar to which field in the IPv4
header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
IPv6 does not use _________ type of address.
a) broadcast
b) multicast
c) anycast
d) unicast
Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
The _________ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) Type of traffic
Dual-stack approach refers to _________
a) implementing Ipv4 with 2 stacks
b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support
d) implementing a MAC address with 2 stacks
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they
are connected to each other by intervening IPv4 routers. The best solution
here is ________
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
Teredo is an automatic tunneling technique. In each client the obfuscated
IPv4 address is represented by bits ______
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
Services provided by Internet transport protocols
TCP service:
connection-oriented: setup required between client, server
reliable transport between sending and receiving process
flow control: sender won’t overwhelm receiver
congestion control: throttle sender when network overloaded
does not provide: timing, minimum bandwidth guarantees
UDP service:
connection-less: unreliable data transfer between sending and receiving process
does not provide: connection setup, reliability, flow control, congestion control, timing, or
bandwidth guarantee
What is the difference between a host and an end system? List several different
types of end systems. Is a Web server an end system?
There is no difference. "Host" and "end system" are used interchangeably. End
systems include PCs, workstations, Web servers, mail servers, Internet-connected
PDAs, WebTVs, etc.
Why are standards important for protocols?
Standards are important for protocols so that both communicating computers are
sending and interpreting data in the same order and manner.
1- A telephone network is an example of a packet switching network
Select one:
True
False
1. A local telephone network is an example of a _______ network.
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
2- Using higher access link is more performance and cheaper than installing a local cache in
the institutional network.
Select one;
True
False
3- Consider sending a 10000-byte datagram into a link that has an MTU of 980 bytes. Suppose the
original datagram is stamped with the identification number 422
How many fragments are generated?
Hint: The value must be integer number only.
Answer: 10
(10000-20) / (980-20) = 10.3 = 10
20 = IP header
4- Router can be called (host)
Select one:
True
False
5- TCP is the network layer protocol used on the Internet today.
Select one:
True
False
6- IMAP protocol is stateless across sessions.
Select one:
True
False
7- In the email system, the header lines, as: "To:, From:, Subject:", are the same as
SMTP commands "MAIL FROM, RCPT TO:"
Select one:
True
False
8- ISO stands for _______________
Select one:
International Standards Organization
International Organization for Standardization
International standalone organization
none of the mentioned
9- DHCP client and servers on the same subnet communicate via----------------Select one:
TCP unicast
TCP broadcast
UDP unicast
UDP broadcast
10- "Parity bits" are used for which of the following purposes?
To transmit faster
To detect errors
To identify the user
Encryption of data.
11- Route aggregation means that an ISP uses a single prefix to advertise multiple networks.
Select one:
True
False
12- Each IP packet must contain --------------------Only Destination address.
Only Source address.
Source and Destination address.
Source or Destination address.
13- During normal IP packet forwarding by a router, which of the following fields of the IP header is
updated?
Checksum
Destination address
Repeater
Source address
14- Which of the following field in IPV4 datagram is not related to fragmentation?
Select one:
TOS
Offset
Identifier
More flag
15- A network-layer packet is a datagram.
A router forwards a packet based on the packet's -------------------- address
Select one:
MAC
flow
PORT
IP
16- Which field helps to check rearrangement of the fragments?
tti
flag
identifier
offset
17- Transport layer protocols deals with
Select one:
node to node communication
process to process communication
application to application communication
18- what is the header size of UDP packet?
Select one:
16 bytes
8 bits
8 bytes
19- The first Network was called ASAPNET
Select one:
True
False
20- The value of acknowledgement field in a segment defines_____________
Select one:
Number of previous bytes to receive
Sequence of zero's and one's
Number of the expected next byte to receive
Total number of bytes to receive
21- Two devices are in network if ________________ .
Select one:
a process in one device is able to exchange information with a process in another device
a process is running on both devices
PIDs of the processes running of different devices are same
22- What allows TCP to detect lost segments and in turn recover from that loss?
Select one:
Checksum
Acknowledgment number
Sequence number
Both Sequence & Acknowledgment number
23- Which layer provides the services to user?
Select one:
presentation layer
application layer
session layer
Network layer
24- The receiver of the data controls the amount of data that are to be sent by the sender is
referred as -----------------Select one:
Congestion control
Flow control
Error control
Error detection
25- Suppose Host A sends two TCP segments to Host B over a TCP connection. The first segment
has sequence number 90; the second has sequence number 110. Then the data in the first
segment is ____________
91 bytes
20 bytes
110 bytes
90 bytes
Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first
segment has sequence number 90; the second has sequence number 110.
a. How much data is in the first segment?
b. Suppose that the first segment is lost but the second segment arrives at B. In the
acknowledgment that Host B sends to Host A, what will be the acknowledgment number?
a)
Consider sequence numbers,First segment=90
Second segment=110
Data in the first segment=110-90
=20
b) Consider the first segment is lost but the second segment arrives at B. In the acknowledgment
that Host B sends to Host A, then the acknowledgment number will be first segment of sequence
number, that is 90.
26- A _________ set of rules that governs data communication.
Select one:
Standards
Protocols
RFCS
Servers
27- With nonpersistent connections between browser and origin server, it is possible for a single
TCP segment to carry two distinct HTTP request messages.
Select one:
True
False
28- A ----------------is a device that forwards packets between networks by processing the routing
information included in the packet.
Select one:
firewall
hub
router
switch
29- The Date: header in the HTTP response message indicates when the object in the response was
last modified.
Select one:
True
False
The first line of HTTP request message is called ____________
Header line
Entity line
Request line
Status line
Which is a time-sensitive service?
Internet telephony
File download
E-mail
File transfer
FTP uses _________ parallel TCP connections to transfer a file
4
3
1
2
HTTP response messages never have an empty message body.
True
False
POP3 protocol is stateless across sessions.
True
False
A user requests a Web page that consists of some text and three images. For this page, the
client will send one request message and receive four response messages.
True
False
In DNS: iterated query puts burden of name resolution on contacted name server, and heavy
load at upper levels of hierarchy.
True
False
The domain name system is maintained by _______
a single computer
centralized database system
distributed database system
a single server
The number of objects in a Web page which consists of 10 jpeg images and HTML text is
Answer : 10(jpeg)+1(html) = 11
When displaying a web page, the application layer uses the _____________
SMTP protocol
FTP protocol
TCP protocol
HTTP protocol
User datagram protocol is called connectionless because__________
it is received in the same order as sent order
it sends data as a stream of related packets
all UDP packets are treated independently by transport layer
Which of the following is true with respect to TCP
Connection-oriented
Process-to-process
Transport layer protocol
All of the mentioned
Communication offered by TCP is__________
Semi-duplex
Half-duplex
Full-duplex
Byte by byte
TCP groups a number of bytes together into a packet called__________
Segment
Packet
Buffer
Stack
What allows TCP to detect lost segments and in turn recover from that loss?
Acknowledgment number
Checksum
Sequence number
Both Sequence & Acknowledgment number
TCP fast retransmit means that if sender receives 3 ACKs for same data (“triple duplicate
ACKs”), resend unacked segment with smallest sequence #.
True
False
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival
of data.
Acknowledgment
Segment
Buffer
Packet
TCP includes a sequence number so that the packets can be reassembled at the destination
in the correct order.
True
False
"Stop and wait" protocols means that sender allows multiple, “in-flight”, yet-to-beacknowledged packets.
True
False (truth pipelining)
Transport layer protocols deals with :
application to application communication
process to process communication
node to node communication
The TCP segment has a field in its header for rwnd .
True
False
For "Go-back-N" protocol, sender maintains timer for each unacked packet. when timer
expires, retransmit only that unacked packet.
True
False
A transport-layer protocol can provide reliable data transfer even if the underlying network
layer is unreliable, by carefully combining acknowledgments, timers, retransmissions, and
sequence numbers.
True
False
1. The first line of HTTP request message is called ____________
a. Select one:
i. Header line
ii. Entity line
iii. Request line
iv. Status line
2. Which is a time-sensitive service?
a. Select one:
i. Internet telephony
ii. File download
iii. E-mail
iv. File transfer
3. Given that DNS RR format: (name, value, type, ttl)
If Type=CNAME, then Value is a________________ for the alias hostname Name .
a. Select one:
i. canonical hostname
ii. hostname
iii. mail server
iv. domain
4. FTP uses _________ parallel TCP connections to transfer a file
a. Select one:
i. 4
ii. 3
iii. 1
iv. 2
5. Installing a local cache in the institutional network is more performance and cheaper
than using higher access link.
a. Select one:
i. True
ii. False
6. HTTP response messages never have an empty message body.
a. Select one:
i. True
ii. False
7. POP3 protocol is stateless across sessions.
a. Select one:
i. True
ii. False
8. A user requests a Web page that consists of some text and three images. For this
page, the client will send one request message and receive four response messages.
a. Select one:
i. True
ii. False
9. In DNS: iterated query puts burden of name resolution on contacted name server,
and heavy load at upper levels of hierarchy.
a. Select one:
i. True
ii. False
10. The domain name system is maintained by _______
a. Select one:
i. a single computer
ii. centralized database system
iii. distributed database system
iv. a single server
11. When displaying a web page, the application layer uses the _____________
a. Select one:
i. SMTP protocol
ii. FTP protocol
iii. TCP protocol
iv. HTTP protocol
The minimum size of TCP segment header is
20 bytes
32 bytes
16 bytes
20 bits
UDP provides unreliable transfer of datagrams between client and server.
True
Recall the Go-back-N protocol in Section 3.4.
this protocol have a timer for each unacknowledged packet
GBN does not use timer
GBN has only one timer, for the oldest unacknowledged packet
Sequence numbers are required for a receiver to find out whether an arriving packet contains
new data or is a retransmission.
True
False
"Stop and wait" protocols means that sender allows multiple, "in-flight", yet-to-beacknowledged packets.
True
False (truth is pipelining)
"Total length" field in UDP packet header is the length of
UDP header plus data
Only UDP header
Only checksum
Only data
Suppose Host A sends two TCP segments to Host B over a TCP connection. The first segment has
sequence number 90 the second has sequence number 110. Then the data in the first segment
is_____________
90 bytes
20 bytes
91 bytes
110 bytes
Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP
connection to Host B. In this same segment the acknowledgment number is necessarily 42.
True
False
The value of acknowledgement field in a segment defines__________
Sequence of zero's and one's
Number of previous bytes to receive
Number of the expected next byte to receive
Total number of bytes to receive
The source port identifier in the TCP header tells the TCP software on the destination computer,
which application on the destination it should pass the packet to.
True
False
The size of the TCP rwnd never changes throughout the duration of the connection.( The size
of the TCP advertised window (RcvWindow) never changes throughout the
duration of the connection. )
True
False
Demultiplexing in UDP, receiver uses four
values:
1. source IP address
2. source port number
3. destination IP address
4. destination port number
to direct segment to appropriate socket.
True
False
A transport protocol can be either connection oriented, such as UDP, or connectionless, such as
TCP.
True
False
what is the header size of UDP packet?
8 bits
16 bytes
124 bytes
8 bytes
What allows TCP to detect lost segments and in turn recover from that loss?
Both Sequence & Acknowledgment number
Acknowledgment number
Sequence number
Checksum
Internet works on
Select one:
packet switching
both packet switching and circuit switching
data switching
circuit switching
Two devices are in network if
Select one:
none of the mentioned
a process is running on both devices
PIDs of the processes running of different devices are same
a process in one device is able to exchange information with a process in another device
If there are N routers from source to destination, total end to end delay in sending packet
( Lnumber of bits in the packet, R. transmission rate)
Select one:
N
(2N*L)/R
(N*L) /R
1/R
ISO stands for
Select one:
International Standards Organization
none of the mentioned
International Organization for Standardization
International standalone organization
define format, order of messages sent and received among n
message transmission, receipt
Select one
Protocols
None of the
RFCS
Standards
Which address identifies a process on a host?
Select one:
logical address
specific address
port address
physical address
The first Network was called ASAPNET
True
False
Which of this is a network edge device?
Select one:
Switch
Bridge
Router
Smartphones
Application layer is responsible for process to process delivery.
Select one:
True
False
Transport layer is implemented in routers.
True
False
The first line of HTTP request message is called ____________
Header line
Entity line
Request line
Status line
Which is a time-sensitive service?
Internet telephony
File download
E-mail
File transfer
FTP uses _________ parallel TCP connections to transfer a file
4
3
1
2
HTTP response messages never have an empty message body.
True
False
POP3 protocol is stateless across sessions.
True
False
A user requests a Web page that consists of some text and three images. For this page, the
client will send one request message and receive four response messages.
True
False
In DNS: iterated query puts burden of name resolution on contacted name server, and heavy
load at upper levels of hierarchy.
True
False
The domain name system is maintained by _______
a single computer
centralized database system
distributed database system
a single server
The number of objects in a Web page which consists of 10 jpeg images and HTML text is
Answer : 10(jpeg)+1(html) = 11
When displaying a web page, the application layer uses the _____________
SMTP protocol
FTP protocol
TCP protocol
HTTP protocol
User datagram protocol is called connectionless because__________
it is received in the same order as sent order
it sends data as a stream of related packets
all UDP packets are treated independently by transport layer
Which of the following is true with respect to TCP
Connection-oriented
Process-to-process
Transport layer protocol
All of the mentioned
Communication offered by TCP is__________
Semi-duplex
Half-duplex
Full-duplex
Byte by byte
TCP groups a number of bytes together into a packet called__________
Segment
Packet
Buffer
Stack
What allows TCP to detect lost segments and in turn recover from that loss?
Acknowledgment number
Checksum
Sequence number
Both Sequence & Acknowledgment number
TCP fast retransmit means that if sender receives 3 ACKs for same data (“triple duplicate
ACKs”), resend unacked segment with smallest sequence #.
True
False
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival
of data.
Acknowledgment
Segment
Buffer
Packet
TCP includes a sequence number so that the packets can be reassembled at the destination
in the correct order.
True
False
"Stop and wait" protocols means that sender allows multiple, “in-flight”, yet-to-beacknowledged packets.
True
False (truth pipelining)
Transport layer protocols deals with :
application to application communication
process to process communication
node to node communication
The TCP segment has a field in its header for rwnd .
True
False
For "Go-back-N" protocol, sender maintains timer for each unacked packet. when timer
expires, retransmit only that unacked packet.
True
False
A transport-layer protocol can provide reliable data transfer even if the underlying network
layer is unreliable, by carefully combining acknowledgments, timers, retransmissions, and
sequence numbers.
True
False
MCQS for Computer Networks (Ch1-3)
A local area network (LAN) is defined by _______________
A.
The geometric size of the network
B.
The maximum number of hosts in the network
C.
The maximum number hosts in the network and/or the geometric
size of the network
D.
The topology of the network
The largest geographic area a wide area network (WAN) can span is
A.
a town
B.
a state
C.
a country
D.
the world
The TCP/IP protocol suite consists of _______ layers.
A.
two
B.
Three
C.
five
D.
six
A router is involved in ____________ layers of the TCP/IP protocol suite.
A.
two
B.
Three
C.
four
D.
five
A link-layer switch is involved in ______________ layers of the TCP/IP
protocol suite
A.
two
B.
Three
C.
four
D.
five
In the TCP/IP protocol suite, which of the following is an application
layer protocol?
A.
The User Datagram Protocol (UDP)
B.
The Internet Protocol (IP)
C.
The File Transfer Protocol (FTP)
D.
The Transmission Control Protocol (TCP)
In the TCP/IP protocol suite, which of the following is a transport layer
protocol?
A.
The Internet Control Message protocol (ICMP)
B.
The Internet Protocol (IP)
C.
The Address Resolution Protocol (ARP)
D.
The Transmission Control Protocol (TCP)
In the TCP/IP protocol suite, which of the following is a network layer
protocol?
A.
The Stream Control Transmission Protocol (SCTP)
B.
The Secure Shell (SSH)
C.
The Internet Protocol (IP)
D.
User Datagram Protocol (UDP)
In the TCP/IP protocol suite, the ______ layer is responsible for moving
frames from one hop (node) to the next.
A.
physical
B.
data link
C.
transport
D.
network
The transport-layer packet in the TCP/IP protocol suite is called
A.
a message
B.
a datagram
C.
a segment or a user datagram
D.
a frame
In the TCP/IP protocol suite, the physical layer is concerned with the
movement of _______ over the physical medium.
A.
programs
B.
dialogs
C.
protocols
D.
bits
In the TCP/IP protocol suite, a port number is the identifier at the
____________.
A.
application layer
B.
transport layer
C.
network layer
D.
physical layer
In the TCP/IP protocol suite, a logical address is the identifier at the
_______________.
A.
network layer
B.
transport layer
C.
data-link layer
D.
application layer
The _________ layer is responsible for the delivery of a message from
one process to another.
A.
physical
B.
transport
C.
network
D.
application
The Internet Protocol (IP) is ________ protocol.
A.
a reliable
B.
a connection-oriented
C.
a reliable and connection-oriented
D.
an unreliable
The application layer in the TCP/IP protocol suite is usually considered
to be the combination of ________ layers in the OSI model
A.
application, presentation, and session
B.
application, transport, and network
C.
application, data-link, and physical
D.
network, data-link, and physical
A proposed standard is elevated to ________ standard status after at least
two successful tries.
A.
informational
B.
historic
C.
draft
D.
None of the choices are correct
An RFC is labeled ________ if it must be implemented by all Internet
systems.
A.
required
B.
elective
C.
recommended
D.
None of the choices are correct
In the original ARPANET, _______ were directly connected to each
other.
A.
interface message processors (IMPs)
B.
host computers
C.
networks
_______ was formed to connect universities with no defense ties.
A.
ARPANET
B.
CSNET
C.
NSFNET
D.
ANSNET
Currently _______ is responsible for the management of Internet domain
names and addresses
A.
NIC
B.
ICANN
C.
ISOC
D.
IEFE
In TCP/IP, a message at the application layer is encapsulated in a packet
at the ________ layer.
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a message at the transport layer is encapsulated in a packet at
the ________ layer.
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a message belonging to the network layer is decapsulated
from a packet at the ________ layer.
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a message belonging to the transport layer is decapsulated
from a packet at the ________ layer
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a logical connection between an entity at the network layer
can be made with another entity at the ________ layer.
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a logical connection between an entity at the data-link layer
can be made with another entity at the ________ layer.
A.
network
B.
transport
C.
data link
D.
physical
In TCP/IP, a packet at the third layer carries data belonging to the
________ layer and the header belonging to the _________ layer.
A.
third; third
B.
third; fourth
C.
fourth; third
D.
fourth; fourth
In a client-server paradigm, a _______ program provides services to a
(another) _______ program
A.
client; client
B.
client; server
C.
server; client
D.
server; server
In a client-server paradigm
A.
both the server and the client must be running all the time.
B.
both the server and the client need to be running only when they
are needed.
C.
the server must be running all the time but the client needs to be
running only when it is needed.
D.
the client must be running all the time but the server needs to be
running only when it is needed
The first section of a URL identifier is the __________.
A.
protocol
B.
path
C.
host
D.
port
A _______ document is a fixed-content document that is created and
stored in a server. The client can get a copy of the document only
A.
static
B.
dynamic
C.
active
D.
None of the choices are correct
_____________ is a language for creating a static document
A.
Extensible Style Language (XSL)
B.
Hypertext Markup Language (HTML)
C.
Extensible Markup Language (XML)
D.
All choices are correct
A _______ document is created by a Web server whenever a browser
requests the document
A.
static
B.
dynamic
C.
active
D.
None of the choices are correct
For many applications, we need a program or a script to be run at the
client site. These are called _______________ documents
A.
static
B.
dynamic
C.
active
D.
None of the choices are correct
HTTP uses the services of _________
A.
UDP
B.
IP
C.
TCP
D.
DNS
In HTTP, the first line in a request message is called a _______ line; the
first line in the response message is called the ________ line
A.
request; response
B.
status; response
C.
status; status
D.
None of the choices are correct
In a ___________ connection, one TCP connection is made for each
request/response.
A.
persistent
B.
nonpersistent
C.
persistent or a nonpersistent
D.
None of the choices are correct
In a ___________ connection, the server leaves the connection open for
more requests after sending a response.
A.
persistent
B.
nonpersistent
C.
persistent or nonpersistent
D.
None of the choices are correct
In HTTP, _______ server is a computer that keeps copies of responses to
recent requests.
A.
a regular
B.
a proxy
C.
an auxiliary
D.
a remote
An HTTP request message always contains _______.
A.
a header line and a body
B.
a request line and a header line
C.
a request line, a header line, and a body
D.
a request line, a header line, a blank line, and a body
Which of the following is present in both an HTTP request line and a
status line?
A.
version number
B.
URL
C.
status code
D.
method
FTP uses the services of ________.
A.
UDP
B.
IP
C.
TCP
D.
none of the choices are correct
16
. In FTP, _________ well-known port(s) is (are) used.
A.
one
B.
two
C.
three
D.
four
During an FTP session the control connection is opened _______.
A.
once
B.
twice
C.
many times
D.
none of the choices are correct
During an FTP session the data connection may be opened _______.
A.
only once
B.
only two times
C.
as many times as needed
D.
none of the choices are correct
In FTP, a file can be organized into records, pages, or a stream of bytes.
These are types of an attribute called _______.
A.
file types
B.
data structures
C.
transmission modes
D.
none of the choices are correct
. In FTP, there are three types of _______: stream, block, and
compressed.
A.
file types
B.
data types
C.
transmission modes
D.
none of the choices are correct
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
A.
file type
B.
data structure
C.
transmission mode
D.
none of the choices are correct
In FTP, when we _______, it is copied from the client to the server.
A.
retrieve a file
B.
store a file
C.
open a file
D.
none of the choices are correct
In the common scenario, the electronic mail system needs
_________________________.
A.
two UAs, two MTAs and one MAA
B.
two UAs, two MTAs and two MAAs
C.
two UAs, two pairs of MTAs and a pair of MAAs
D.
two UAs, two pairs of MTAs and a two pairs of MAAs
________ provides service to the user to make the process of sending or
receiving a message easier.
A.
An MTA
B.
An MAA
C.
A UA
D.
None of the choices are correct
An e-mail message contains the ________ and the __________.
A.
header; envelop
B.
header; body
C.
envelop; body
D.
None of the choices are correct
In the Internet, an e-mail address consists of two parts: a _______ and a
_______.
A.
local part; domain name
B.
global part; domain name
C.
label; domain name
D.
local part; label
_________ is a supplementary protocol that allows non-ASCII data to be
sent through e-mail.
A.
SMPT
B.
MPEG
C.
MIME
D.
POP
The formal protocol that defines the MTA client and server in the
Internet is called ___________.
A.
SMTP
B.
SNMP
C.
TELNET
D.
SSH
SMTP is a __________ protocol.
A.
pull
B.
push
C.
push and pull
D.
None of the choices are correct
The message access protocol is a ________ protocol.
A.
pull
B.
push
C.
push and pull
D.
None of the choices are correct
In the _______ encoding scheme, each 24 bits become four 6-bit chunks,
and eventually are sent as 32 bits
A.
8bit
B.
binary
C.
base64
D.
quoted-printable
In the _______ encoding scheme, a non-ASCII character is sent as 3
characters.
A.
8bit
B.
base64
C.
quoted-printable
D.
binary
TELNET is an abbreviation for ____________.
A.
terminal network
B.
telephone network
C.
telecommunication network
D.
None of the choices are correct
When a user logs into a local time-sharing system, it is called ________
login.
A.
local
B.
remote
C.
local or remote
D.
None of the choices are correct
When a user wants to access an application program or utility located on
a remote machine, he or she performs ___________ login.
A.
local
B.
remote
C.
local or remote
D.
None of the choices are correct
Network Virtual Terminal (NVT) uses two sets of characters, one for
_____ and one for __________.
A.
sending; receiving
B.
request; reply
C.
data; control
D.
None of the choices are correct
For data, NVT uses US ASCII characters with the highest order bit set to
______.
A.
1
B.
0
C.
1 or 0
D.
None of the choices are correct
For control, NVT uses US ASCII characters with the highest order bit set
to ______.
A.
1
B.
0
C.
1 or 0
D.
None of the choices are correct
The _______ translates local characters into NVT characters.
A.
terminal driver
B.
TELNET client
C.
TELNET server
D.
pseudoterminal driver
The _______ translates NVT characters into a form acceptable by the
remote operating system.
A.
terminal driver
B.
TELNET client
C.
TELNET server
D.
pseudoterminal driver
The _________ component in the SSH provides confidentiality, integrity,
authentication and compression.
A.
SSH Application
B.
SSH-AUTH
C.
SSH-CONN
D.
SSH-TRAN
Port forwarding is ____________________________.
A.
a protocol used to forward messages from one port to another port
B.
a procedure for changing an ephemeral port to a well-known port
C.
a service, provided by SSH, that creates a secure channel for
applications that do not have security services.
D.
None of the choices are correct
In a _______ name space, a name is a sequence of characters without
structure.
A.
linear
B.
flat
C.
hierarchical
D.
organized
In a _________ name space, each name is made of several parts.
A.
linear
B.
flat
C.
hierarchical
D.
organized
In the DNS, the names are defined in ___________ structure.
A.
a linear list
B.
an inverted-tree
C.
a three-dimensional
D.
None of the choices are correct
The root of the DNS tree is _______.
A.
a string of 127 characters
B.
a string of 63 characters
C.
a string of 15 characters
D.
an empty string
In the domain name space, a full domain name is a sequence of labels
separated by ________.
A.
colons
B.
semicolons
C.
dots
D.
commas
In the domain name space, if a label is terminated by a null string, it is
called a __________.
A.
PQDN
B.
CQDN
C.
SQDN
D.
None of the choices are correct
In the domain name space, if a label is not terminated by a null string, it
is called a __________.
A.
FQDN
B.
PQDN
C.
SQDN
D.
None of the choices are correct
In the domain name space, a _________ is a subtree of the domain name
space.
A.
label
B.
name
C.
domain
D.
None of the choices are correct
In the domain name space, what a server is responsible for or has
authority over is called a _________.
A.
domain
B.
label
C.
zone
D.
None of the choices are correct
A _______ server is a computer whose zone system consists of the whole
tree.
A.
domain
B.
zone
C.
root
D.
primary
A ________ server is a computer that stores a file about the zone for
which it has an authority.
A.
primary
B.
secondary
C.
zone
D.
root
A ________ server is a computer that transfers the complete information
about a zone from another server.
A.
primary
B.
secondary
C.
zone
D.
root
In the Internet, the country domain section uses ___________ country
abbreviations.
A.
two-character
B.
three-character
C.
four-character
D.
None of the choices are correct
In __________ resolution, the resolver expects the server to supply the
final answer.
A.
iterative
B.
recursive
C.
straight
D.
None of the choices are correct
In __________ resolution, the server returns the IP address of the server
that it thinks can resolve the query.
A.
iterative
B.
recursive
C.
straight
D.
None of the choices are correct
DNS can use the services of ________.
A.
UDP
B.
TCP
C.
either UDP or TCP
D.
None of the choices are correct
A registrar, a commercial entity accredited by ________ is responsible for
adding new domains to DNS data base
A.
NIC
B.
ICANN
C.
ISOC
D.
IEFE
In a centralized P2P network, the directory system uses the ________
paradigm; the storing and downloading of the files are done using
__________ paradigm.
A.
client-server; client-server
B.
peer-to-peer; client-server
C.
client-server; peer-to-peer
D.
peer-to-peer; peer-to-peer
Napster is an example of a ____________ peer-to-peer network
A.
centralized
B.
structured-decentralized
C.
unstructured-decentralized
D.
None of the choices are correct
Gnutella is an example of a ____________ peer-to-peer network
A.
centralized
B.
structured-decentralized
C.
unstructured-decentralized
D.
None of the choices are correct
BitTorrent is an example of a ____________ peer-to-peer network
A.
centralized
B.
structured-decentralized
C.
unstructured-decentralized
D.
None of the choices are correct
In a structured-decentralized P2P network, ________________.
A.
the directory system is kept in a center
B.
a query to find a file must be flooded through the network
C.
a pre-defined set of rules is used to link nodes so that a query can
be effectively and efficiently resolved
D.
None of the choices are correct
In a DHT-based network, each peer
A.
has a partial knowledge about the whole network.
B.
has a complete knowledge about the whole network.
C.
only has a knowledge about its successor.
D.
None of the choices are correct
The finger table is the routing table used in ______________.
A.
Gnutella
B.
Pastry
C.
Kademlia
D.
None of the choices are correct
Which of the following is not a Chord interface.
A.
Lookup
B.
Fix node
C.
Stabilize
D.
Join
In __________ a key is stored in a node whose identifier is numerically
closest to the key.
A.
Chord
B.
Pastry
C.
Kademlia
D.
None of the choices are correct
To resolve a query, _________ uses two entities: a routing table and a leaf
set.
A.
Chord
B.
Pastry
C.
Kademlia
D.
None of the choices are correct
In Kademlia, the distance between the two identifiers (nodes or keys)
are measured as the bitwise-___________ between them.
A.
AND
B.
NOR
C.
OR
D.
None of the choices are correct
In ________, nodes and data items are m-bit identifiers that create an
identifier space of 2m points distributed at the leaves of a binary tree
A.
Chord
B.
Pastry
C.
Kademlia
D.
None of the choices are correct
In Kademlia, each node in the network divides the binary tree into m
subtrees that.
A.
include the node itself
B.
do not include the node itself
C.
include the node itself and the successor node
D.
None of the choices are correct
Trackerless BitTorrent uses __________ DHT to do the job of tracking.
A.
Chord
B.
Pastry
C.
Kademlia
D.
None of the choices are correct
At the transport layer, to define the processes, we need two identifiers
called ____________.
A.
logical addresses
B.
physical addresses
C.
port addresses
D.
None of the choices are correct
The ports ranging from 0 to 1,023 are called the ___________ ports. The
ports ranging from 1,024 to 49,151 are called ___________ ports. The
ports ranging from 49,152 to 65,535 are called the ___________ ports.
A.
well-known; registered; dynamic or private
B.
registered; dynamic or private; well-known
C.
private or dynamic; well-known; registered
D.
private or dynamic; registered; well-known
UDP and TCP are two protocols at the ___________ layer.
A.
data link
B.
network
C.
transport
D.
application
Which of the following functions are performed by UDP?
A.
process-to-process communication
B.
host-to-host communication
C.
node-to-node communication
D.
None of the choices are correct
A port number is _______ bits long.
A.
8
B.
16
C.
32
D.
64
Which of the following does UDP provide?
A.
flow control
B.
connection-oriented delivery
C.
error control
D.
None of the choices are correct
The source port number on the UDP user datagram header defines
_______.
A.
the sending computer
B.
the receiving computer
C.
the process running on the sending computer
D.
None of the choices are correct
To use the services of UDP, we need ________ socket addresses.
A.
four
B.
two
C.
three
D.
None of the choices are correct
UDP packets are called __________ .
A.
user datagrams
B.
segments
C.
frames
D.
None of the choices are correct
UDP packets have a fixed-size header of _______ bytes.
A.
16
B.
8
C.
40
D.
32
TCP is a __________ protocol.
A.
byte-oriented
B.
message-oriented
C.
block-oriented
D.
None of the choices are correct
TCP groups a number of bytes together into a packet called a
___________.
A.
user datagram
B.
segment
C.
datagram
D.
None of the choices are correct
TCP is a(n) ___________ protocol.
A.
connection-oriented
B.
connectionless
C.
both connection-oriented and connectionless
D.
None of the choices are correct
TCP is a(n) _______ transport protocol.
A.
unreliable
B.
best-effort delivery
C.
reliable
D.
None of the choices are correct
TCP uses _________________ to check the safe and sound arrival of data.
A.
an acknowledgment mechanism
B.
out-of-band signaling
C.
the services of another protocol
D.
None of the choices are correct
The bytes of data being transferred in each connection are numbered by
TCP. The numbering starts with a __________________.
A.
0
B.
1
C.
randomly generated number
D.
None of the choices are correct
In TCP, the sequence number for each segment is the number of the
_______ byte (virtual byte) carried in that segment.
A.
first
B.
last
C.
middle
D.
None of the choices are correct
Communication in TCP is ___________.
A.
simplex
B.
half-duplex
C.
full-duplex
D.
None of the choices are correct
In TCP, the value of the acknowledgment field in a sent segment defines
the sequence number related to the ______ byte a party expects to
receive next.
A.
first
B.
last
C.
next
D.
None of the choices are correct
The inclusion of the checksum in the TCP segment is ________.
A.
optional
B.
mandatory
C.
depends on the type of data
D.
None of the choices are correct
In TCP, a SYN segment consumes _____ sequence number(s).
A.
no
B.
one
C.
two
D.
None of the choices are correct
In TCP, a SYN + ACK segment consumes _____ sequence numbers.
A.
no
B.
three
C.
two
D.
one
In TCP, an ACK segment, if carrying no data, consumes ______ sequence
number(s).
A.
no
B.
one
C.
two
D.
None of the choices are correct
The connection establishment procedure in TCP is susceptible to a
serious security problem called the _________ attack.
A.
ACK flooding
B.
FIN flooding
C.
SYN flooding
D.
None of the choices are correct
The SYN flooding attack belongs to a group of security attacks known as
a _____ attack.
A.
denial of service
B.
replay
C.
man-in-the middle
D.
None of the choices are correct
One of the main duties of the transport layer is to provide ____________
communication.
A.
node-to-node
B.
host-to-host
C.
process-to-process
D.
None of the choices are correct
In TCP, a FIN segment consumes ____ sequence numbers if it does not
carry data.
A.
two
B.
three
C.
no
D.
one
A client program normally uses ____________ port number. A server
program normally uses __________ port number.
A.
a well-known; an ephemeral
B.
an ephemeral; a well-known
C.
a private; a well-known
D.
None of the choices are correct
In TCP, a FIN + ACK segment consumes _____ sequence number(s) if it
does not carry data.
A.
two
B.
three
C.
one
D.
no
A socket address is a combination of __________.
A.
A MAC address and a logical address
B.
A MAC address and a port number
C.
a user-specific address and a logical address
D.
None of the choices are correct
In TCP, one end can stop sending data while still receiving data. This is
called a ______ termination.
A.
half-close
B.
half-open
C.
full-close
D.
None of the choices are correct
______________ means accepting items from more than one source.
______________ means delivering items to more than one source.
A.
Demultiplexing; Multiplexing
B.
Multiplexing; Demultiplexing
C.
Encapsulation; Decapsulation
D.
Pulling; Pushing
TCP sliding windows are __________ oriented.
A.
packet
B.
segment
C.
byte
D.
None of the choices are correct
________ means the producer delivers the items when they are
produced. _______ means the consumer takes the items when it is ready
to do so.
A.
Pushing; pulling
B.
Pulling; pushing
C.
Forwarding; accepting
D.
None of the choices are correct
In TCP, the size of the send window is the ________ of rwnd and cwnd.
A.
maximum
B.
sum of
C.
minimum
D.
None of the choices are correct
In the stop-and-wait protocol, the maximum send window size is ______
and the maximum receive window size is _______ where m is the
number of bits in the sequence.
A.
1; 1
B.
2 m; – 1
C.
1; 2m
D.
2m; 2m
In TCP, the window should not be _________.
A.
opened
B.
closed
C.
shrunk
D.
slide
In the Go-Back-N protocol, the maximum send window size is ______
and the maximum receive window size is _______, where m is related to
the number of bits in the sequence. number.
A.
1; 1
B.
1; 2m
C.
2m – 1; 1
D.
2m – 1; 2m – 1
In TCP, the receiver can temporarily shut down the window; the sender,
however, can always send a segment of _____ byte(s) after the window is
shut down.
A.
ten
B.
zero
C.
one
D.
None of the choices are correct
In the selective-repeat protocol, the maximum send window size is
______ and the maximum receive window size is _______, where m is
the number of bits in the sequence.
A.
1; 1
B.
1; 2m – 1
C.
2m – 1; 1
D.
2m – 1; 2m – 1
A serious problem can arise in the sliding window operation when
either the sending application program creates data slowly or the
receiving application program consumes data slowly, or both. This
problem is called the ______.
A.
silly window syndrome
B.
unexpected syndrome
C.
window bug
D.
None of the choices are correct
UDP is a ________________ transport protocol.
A.
connectionless, reliable
B.
connection-oriented, unreliable
C.
connectionless, unreliable
D.
None of the choices are correct
Nagle's algorithm can solve the silly window syndrome created by the
_________.
A.
sender
B.
receiver
C.
both sender and receiver
D.
None of the choices are correct
UDP is an acronym for _______.
A.
User Delivery Protocol
B.
User Datagram Procedure
C.
User Datagram Protocol
D.
None of the choices are correct
Clark's solution can solve the silly window syndrome created by the
_________.
A.
sender
B.
receiver
C.
both sender and receiver
D.
None of the choices are correct
Delayed acknowledgment can solve the silly window syndrome created
by the _________.
A.
sender
B.
receiver
C.
both sender and receiver
D.
None of the choices are correct
In TCP, an ACK segments that carry no data consumes _______ sequence
number(s).
A.
no
B.
one
C.
two
D.
None of the choices are correct
In modern implementations of TCP, a retransmission occurs if the
retransmission timer expires or ________ duplicate ACK segments have
arrived.
A.
one
B.
two
C.
three
D.
None of the choices are correct
In TCP, ________ retransmission timer is set for an ACK segment.
A.
one
B.
a previous
C.
no
D.
None of the choices are correct
In TCP, there can be ______ RTT measurement(s) in progress at any
time.
A.
two
B.
only one
C.
several
D.
None of the choices are correct
We need to multiply the header length field by _______ to find the total
number of bytes in the TCP header.
A.
2
B.
4
C.
6
D.
None of the choices are correct
In TCP, urgent data requires the urgent pointer field as well as the URG
bit (to be set) in the _______ field.
A.
control
B.
offset
C.
sequence number
D.
None of the choices are correct
In TCP, if the ACK value is 200, then byte _______ has been received
successfully.
A.
199
B.
200
C.
201
D.
None of the choices are correct
In TCP, the _______ timer prevents a long idle connection between two
TCPs.
A.
retransmission
B.
persistence
C.
keepalive
D.
None of the choices are correct
In TCP, the _______ timer is needed to handle the zero window-size
advertisement.
A.
retransmission
B.
persistence
C.
keepalive
D.
None of the choices are correct
In TCP, Karn's algorithm is used in calculations by the _______ timer.
A.
retransmission
B.
persistence
C.
keepalive
D.
None of the choices are correct
In TCP, a special segment called a probe is sent by a sending TCP when
the _______ timer goes off.
A.
transmission
B.
persistence
C.
keepalive
D.
None of the choices are correct
__________ control refers to the mechanisms and techniques to keep the
load below the capacity.
A.
flow
B.
error
C.
congestion
D.
None of the choices are correct
In TCP's ________ algorithm the size of the congestion window
increases exponentially until it reaches a threshold.
A.
congestion avoidance
B.
congestion detection
C.
slow start
D.
None of the choices are correct
In TCP's __________ algorithm the size of the congestion window
increases additively until congestion is detected.
A.
congestion avoidance
B.
congestion detection
C.
slow start
D.
None of the choices are correct
________ treats the two signs of congestion detections, timeout and three
duplicate ACKs, in the same way.
A.
Taho TCP
B.
Reno TCP
C.
new Reno TCP
D.
None of the choices are correct
In ______ TCP, when the connection is established, TCP starts the slow
start algorithms and sets the ssthresh variable to a pre-agreed value
(normally 64 or 128 kilobytes) and the cwnd variable to 1 MSS.
A.
Taho TCP
B.
Reno TCP
C.
new Reno TCP
D.
None of the choices are correct
The ___________ added a new state to the congestion control FSM,
called the fast recovery state.
A.
Taho TCP
B.
Reno TCP
C.
new Reno TCP
D.
None of the choices are correct
The ___________ treated the two signals of congestion, timeout and
arrival of three duplicate ACKs, differently.
A.
Taho TCP
B.
Reno TCP
C.
new Reno TCP
D.
None of the choices are correct
The __________ state in Reno TCP is a state somehow between the slow
start and the congestion avoidance states.
A.
congestion avoidance
B.
congestion detection
C.
slow recovery
D.
None of the choices are correct
In the Reno TCP, when TCP enters the fast recovery, if duplicate ACKs
continue to come, TCP ____________________________________.
A.
stays in this state, but the cwnd grows additively
B.
stays in this state, but the cwnd grows exponentially
C.
moves to slow start state
D.
moves to the congestion avoidance state but deflate the size of the
cwnd to ssthresh value
In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs,
TCP ____________________________________.
A.
stays in this state, but the cwnd grows additively
B.
stays in this state, but the cwnd grows exponentially
C.
moves to slow start state
D.
moves to the congestion avoidance state but deflate the size of the
cwnd to ssthresh value
In the Reno TCP, when TCP enters the fast recovery, if a new (non
duplicate) ACK arrives TCP ____________________________________.
A.
stays in this state, but the cwnd grows additively
B.
stays in this state, but the cwnd grows exponentially
C.
moves to slow start state
D.
moves to the congestion avoidance state but deflate the size of
the cwnd to ssthresh value
A later version of TCP, called ______ TCP, made an extra optimization
on the _______ TCP.
A.
New Reno; Reno
B.
New Taho; Taho
C.
New Reno; Taho
D.
New Taho; Reno
In the slow start algorithm, the size of the congestion window grows
______________ until ___________________.
A.
exponentially; it reaches a threshold
B.
exponentially; congestion is detected
C.
additively; it reaches a threshold
D.
additively; congestion is detected
In the congestion avoidance algorithm, the size of the congestion
window grows ______________ congestion is detected.
A.
exponentially; it reaches a threshold
B.
exponentially; congestion is detected
C.
additively; it reaches a threshold
D.
additively; congestion is detected
The congestion window size, after it passes the initial slow start state,
follows a saw tooth pattern called
_________________________________.
A.
exponential increase, additive decrease
B.
additive increase, exponential decrease
C.
multiplicative increase, additive decrease
D.
additive increase, multiplicative decrease
?Which layer is used to link the network support layers and user support layers
In the OSi model, as a data packet moves from the lower to the upper layers, headers are
Transport layer is implemented in
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at
B is
?Which layer is responsible for process to process delivery in a general network model
FTP is built on----- architecture
Communication channel is shared by all the machines on the network in
Which of the following layers is an addition to OSI model when compared with TCP IP
?model
OSI stands for
?How many layers are present in the Internet protocol stack (TCP/IP model)
Which type at topology is best suited for large businesses which must carefully control and
?coordinate the operation of distributed branch outlets
The domain name system is maintained by
The DNS protocol runs over UDP and uses port
The HTTP response message leaves out the requested object when
FTP server listens for connection on port number
With nonpersistent connections between browser and origin server, it is possible for a single
.TCP segment te HTTP request messages
The packet of information at the application layer is called
HTTP response messages never have an emnpty measage body
?Which one of the following protocol delivers/stores mail to receiver server
,POP3 protocol is stateless across sessions
FTP uses_ _ _ parallel TCP connections to transfer a file
HTTP is "stateless", server maintains no Information about past client requests
When displaying a web page, the application layer uses the
The HTTP response message leaves out the requested object when. method is used
The process which initiates the communication is the server; the process that waits to be
.contacted is the client
Installing a local cache in the institutional network is more performance and cheaper than
.using higher access link
2021/‫‏‬6/‫‏‬22
FTP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
FTP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “FTP”.
1. Expansion of FTP is __________
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) Fast Transfer Protocol
View Answer
Answer: b
Explanation: File Transfer Protocol is an application layer protocol used to share “files”
between a server and a client. The protocol uses two separate ports for data and control
connections: port 20 for data and port 21 for control.
2. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
View Answer
Answer: a
Explanation: An FTP connection includes a Server and a Client which wish to share a number
of data files. The server can transfer files with multiple clients at the same time while the client
communicates with only one server at a time.
3. FTP uses _________ parallel TCP connections to transfer a file.
a) 1
b) 2
c) 3
d) 4
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-ftp 1/5
2021/‫‏‬6/‫‏‬22
FTP - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: Control connection using FTP port: 21, and data connection using FTP port: 20.
The FTP session is started or ended using port 21 and the actual data i.e. files are sent through
port 20.
4. Identify the incorrect statement regarding FTP.
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
View Answer
Answer: c
Explanation: FTP is out-of-band because the data connection is done separately through port
20 and control connection is done separately through port 21.
5. If 5 files are transferred from server A to client B in the same session. The number of TCP
connections between A and B is _______
a) 5
b) 10
c) 2
d) 6
View Answer
Answer: d
Explanation: The client would first initiate the TCP control connection through port 21. Then
for every file transfer, a separate connection would be made through port 20. Now, since we
have five files to be transferred, 1 control connection + 5 data connections = 6 total TCP
connections.
6. FTP server _____________
a) Maintains state information
b) Is stateless
c) Has single TCP connection for a file transfer
d) Has UDP connection for file transfer
View Answer
Answer: a
Explanation: FTP server maintains state information of every control connection to keep track
of the active and inactive connections in the session. This helps the server decide which
connection to terminate, in case the connection is inactive for too long.
7. The commands, from client to server, and replies, from server to client, are sent across the
control connection in ________ bit ASCII format.
/https://www.sanfoundry.com/computer-networks-mcqs-ftp 2/5
2021/‫‏‬6/‫‏‬22
FTP - Computer Networks Questions & Answers - Sanfoundry
a) 8
b) 7
c) 3
d) 5
View Answer
Answer: b
Explanation: FTP was designed to transmit commands only in English characters that are
possible with just 7 bits in ASCII. Even the media has to be converted to ASCII before
transmission.
8. Find the FTP reply whose message is wrongly matched.
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection
View Answer
Answer: d
Explanation: The correct response code for the message “Can’t open data connection” is 425.
Response code 452 is sent usually when the connection is suddenly closed.
9. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode
View Answer
Answer: a
Explanation: Stream mode is the default mode of FTP, in which the TCP transforms/fragments
the data into segments, and then after the transmission is completed, converts it back to
stream of bytes.
10. The password is sent to the server using ________ command.
a) PASSWD
b) PASS
c) PASSWORD
d) PWORD
View Answer
Answer: b
Explanation: The PASS command, preceded by the username, completes the user’s
/https://www.sanfoundry.com/computer-networks-mcqs-ftp 3/5
2021/‫‏‬6/‫‏‬22
HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
HTTP & FTP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP &
FTP”.
1. Multiple objects can be sent over a TCP connection between client and server in a persistent
HTTP connection.
a) True
b) False
View Answer
Answer: a
Explanation: Persistent connections are kept active after completing transaction so that
multiple objects can be sent over the same TCP connection.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
View Answer
Answer: a
Explanation: HTTP is an Application layer protocol used to define how messages are formatted
and transmitted through the World Wide Web.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator
View Answer
Answer: a
Explanation: The Uniform Resource Identifier is a name and locator for the resource to be
/https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 1/5
2021/‫‏‬6/‫‏‬22
HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry
located by the HTTP. The URLs and URNs are derived through the identifier.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) border gateway protocol
d) domain host control protocol
View Answer
Answer: b
Explanation: HTTP clients perform requests using a TCP connection, because the TCP
connection provides a more reliable service. UDP is not a reliable protocol, border gateway
protocol is used on top of TCP, while domain host control protocol is a network layer protocol.
5. In HTTP pipelining ________________
a) multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
View Answer
Answer: a
Explanation: HTTP pipelining helps the client make multiple requests without having to waiting
for each response, thus saving a lot of time and bandwidth for the client.
6. FTP server listens for connection on port number ____________
a) 20
b) 21
c) 22
d) 23
View Answer
Answer: b
Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote login. Port 23 is used
for TELNET.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 2/5
2021/‫‏‬6/‫‏‬22
HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: The clients use the Transmission Control Protocol for FTP as it’s more reliable
than UDP, DCCP, and SCTP, and reliability of file transfer is required to be as high as possible
for FTP.
8. In Active mode FTP, the client initiates both the control and data connections.
a) True
b) False
View Answer
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control connections,
while in Active mode, the client initiates the control connection and then the server initiates
the data connection.
9. The File Transfer Protocol is built on ______________
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
View Answer
Answer: c
Explanation: The FTP connection includes a Server and a Client which wish to share files. The
server can have multiple clients at the same time while the client communicates with only one
server at a time.
10. In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mode
View Answer
Answer: d
Explanation: In Stream mode, the data is transferred in a continuous stream. In Block mode,
data is transferred after being divided into smaller blocks. In Compressed mode, data is
transferred after being compressed using some compression algorithm.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 3/5
2021/‫‏‬6/‫‏‬22
HTTP Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
HTTP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP”.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is
________
a) 4
b) 1
c) 5
d) 7
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
View Answer
Answer: a
Explanation: By default the http connection is issued with persistent connection. In persistent
connection server leaves connection open after sending response. As little as one RTT (Time
for a small packet to travel from client to server and back) is required for all referenced
objects.
3. The time taken by a packet to travel from client to server and then back to the client is called
__________
a) STT
b) RTT
c) PTT
d) JTT
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-http 1/6
2021/‫‏‬6/‫‏‬22
HTTP Questions & Answers - Sanfoundry
Answer: b
Explanation: RTT stands for round-trip time.
4. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) Fourth
View Answer
Answer: c
Explanation: In first step client sends a segment to establish a connection with the server. In
the second the step the client waits for the acknowledgement to be received from the server.
After receiving the acknowledgement, the client sends actual data in the third step.
5. In the process of fetching a web page from a server the HTTP request/response takes
__________ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: By default the http connection will be persistent connection. Hence it will take
only 1 RTT to fetch a webpage from a server.
6. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line
View Answer
Answer: a
Explanation: The line followed by request line are called header lines and status line is the
initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
/https://www.sanfoundry.com/computer-networks-mcqs-http 2/6
2021/‫‏‬6/‫‏‬22
HTTP Questions & Answers - Sanfoundry
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT
View Answer
Answer: c
Explanation: There are two methods which help to request a response from a server. Those
are GET and POST. In GET method, the client requests data from server. In POST method the
client submits data to be processed to the server.
9. The HTTP response message leaves out the requested object when ____________ method is
used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: HEAD method is much faster than GET method. In HEAD method much smaller
amount of data is transferred. The HEAD method asks only for information about a document
and not for the document itself.
10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
View Answer
Answer: d
Explanation: 404 Not Found.
11. Which of the following is not correct?
a) Web cache doesnt has its own disk space
/https://www.sanfoundry.com/computer-networks-mcqs-http 3/6
2021/‫‏‬6/‫‏‬22
HTTP Questions & Answers - Sanfoundry
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
View Answer
Answer: a
Explanation: Web cache or also known as HTTP cache is a temporary storage where HTML
pages and images are stored temporarily so that server lag could be reduced.
12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
View Answer
Answer: c
Explanation: The HTTP protocol requests the server of the website its trying to access so that it
can store its files, images etc. in cache memory. This request of asking the server for a
document considering a specific parameter is called conditional GET Request.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: Status line is the the start line of an HTTP response. It contains the information
such as the protocol version, a status text, status code.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
`
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Application Layer – 2
/https://www.sanfoundry.com/computer-networks-mcqs-http 4/6
2021/‫‏‬6/‫‏‬22
HTTP Questions & Answers - Sanfoundry
» Next - Computer Networks Questions & Answers – HTTP & FTP
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
C# Programming Examples on Threads
Bachelor of Computer Applications Questions and Answers
Java MCQ (Multiple Choice Questions)
Network Theory MCQ (Multiple Choice Questions)
HTML MCQ (Multiple Choice Questions)
JUnit MCQ (Multiple Choice Questions)
Java Programming Examples on Utility Classes
MySQL MCQ (Multiple Choice Questions)
Computer Graphics MCQ (Multiple Choice Questions)
Computer Science Questions and Answers
Java Programming Examples on Multithreading
Master of Computer Applications Questions and Answers
Computer Organization and Architecture MCQ (Multiple Choice Questions)
JavaScript MCQ (Multiple Choice Questions)
SAN MCQ (Multiple Choice Questions)
C# Programming Examples on Networking
Neural Networks MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
Computer Fundamentals MCQ (Multiple Choice Questions)
Computer Networks MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at
Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency
developments in these areas. He lives in Bangalore and delivers focused training sessions to IT
professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux
Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols
/https://www.sanfoundry.com/computer-networks-mcqs-http 5/6
2021/‫‏‬6/‫‏‬22
Application Layer Interview Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Application Layer – 2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Application Layer – 2”.
1. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
View Answer
Answer: a
Explanation: Domain name system is the way the internet domain names are stored and
translated to IP addresses. The domain names systems matches the name of website to ip
addresses of the website.
2. Which one of the following allows a user at one site to establish a connection to another site
and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
View Answer
Answer: c
Explanation: Telnet is used for accessing remote computers. Using telnet a user can access
computer remotely. With Telnet, you can log on as a regular user with whatever privileges you
may have been granted to the specific application and data on the computer.
3. Application layer protocol defines ____________
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
/https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 1/6
2021/‫‏‬6/‫‏‬22
Application Layer Interview Questions & Answers - Sanfoundry
d) all of the mentioned
View Answer
Answer: d
Explanation: Application layer deals with the user interface, what message is to be sent or the
message format, syntax and semantics. A user has access to application layer for sending and
receiving messages.
4. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
View Answer
Answer: a
Explanation: SMTP, abbreviation for Simple Mail Transfer Protocol is an application layer
protocol. A client who wishes to send a mail creates a TCP connection to the SMTP server and
then sends the mail across the connection.
5. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
View Answer
Answer: a
Explanation: Base64 is used commonly in a number of applications including email via MIME,
and storing complex data in XML. Problem with sending normal binary data to a network is
that bits can be misinterpreted by underlying protocols, produce incorrect data at receiving
node and that is why we use this code.
6. Which one of the following is an internet standard protocol for managing devices on IP
network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
View Answer
Answer: b
Explanation: SNMP is a set of protocols for network management and monitoring. This
/https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 2/6
2021/‫‏‬6/‫‏‬22
Application Layer Interview Questions & Answers - Sanfoundry
protocol is included in the application layer. SNMP uses 7 protocol data units.
7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
View Answer
Answer: c
Explanation: Resource reservation protocol is used in transport layer. It is designed to reserve
resources across a network for quality of service using the integrated services model.
8. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) resource reservation protocol
View Answer
Answer: a
Explanation: SIP is a signaling protocol in which its function includes initiating, maintaining and
terminating real time sessions. SIP is used for signaling and controlling multimedia sessions.
9. Which one of the following is not correct?
a) Application layer protocols are used by both source and destination devices during a
communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
View Answer
Answer: d
Explanation: HTTP is an application layer protocol. Whereas TCP is a transport layer protocol.
10. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 3/6
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Application Layer – 1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Application Layer – 1”.
1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Answer: d
Explanation: TCP is transport layer protocol.
advertisement
2. The packet of information at the application layer is called __________
a) Packet
b) Message
c) Segment
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 1/8
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
d) Frame
View Answer
Answer: b
Explanation: For Application, Presentation and Session layers there is no data format for
message. Message is message as such in these three layers. But when it comes to Transport,
Network, Data and Physical layer they have data in format of segments, packets, frames and
bits respectively.
3. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
View Answer
Answer: d
Explanation: HTTP is a protocol.
advertisement
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
View Answer
Answer: c
Explanation: Application layer provides the interface between applications and the network. So
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 2/8
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
application developer can decide what transport layer to use and what should be its maximum
buffer size.
5. Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
View Answer
Answer: a
Explanation: End to End service is provided in the application layer. Whereas process to
process service is provided at the transport layer.
advertisement
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
7. Pick the odd one out.
a) File transfer
b) File download
c) E-mail
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 3/8
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
d) Interactive games
View Answer
Answer: d
Explanation: File transfer, File download and Email are services provided by the application
layer and there are message and data oriented.
advertisement
8. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
View Answer
Answer: d
Explanation: The services provided by the application layer are network virtual terminal, file
transfer, access and management, mail services, directory services, various file and data
operations.
9. To deliver a message to the correct application program running on a host, the _______ address
must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 4/8
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: IP address lets you know where the network is located. Whereas MAC address is
a unique address for every device. Port address identifies a process or service you want to
carry on.
advertisement
10. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
11. Transport services available to applications in one or another form _________
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
View Answer
Answer: d
Explanation: The transport services that are provided to application are reliable data transfer,
security and timing. These are very important for proper end to end services.
12. Electronic mail uses which Application layer protocol?
a) SMTP
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 5/8
2021/‫‏‬6/‫‏‬22
Application Layer - Computer Networks Questions & Answers - Sanfoundry
b) HTTP
c) FTP
d) SIP
View Answer
Answer: a
Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one
used in application layer is SMTP.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Packet Switching & Circuit Switching
» Next - Computer Networks Questions & Answers – Application Layer – 2
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
C Programming Examples on File Handling
Linux MCQ (Multiple Choice Questions)
Computer Organization and Architecture MCQ (Multiple Choice Questions)
C# Programming Examples on Files
Computer Graphics MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
/https://www.sanfoundry.com/computer-networks-mcqs-application-layer 6/8
2021/‫‏‬6/‫‏‬22
Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Packet Switching & Circuit Switching
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Packet
Switching & Circuit Switching”.
1. A local telephone network is an example of a _______ network.
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
View Answer
Answer: b
Explanation: Circuit switching is connection oriented switching technique, whereas in the case
of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer,
whereas packet switching is implemented in the Network layer. Internet too is based on the
concept of circuit switching.
advertisement
2. Most packet switches use this principle ____________
a) Stop and wait
/https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 1/7
2021/‫‏‬6/‫‏‬22
Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry
b) Store and forward
c) Store and wait
d) Stop and forward
View Answer
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it receives
the entire packet. If the entire packet is not received and the time-out period expires, the
packet switch will inform the sender to resend the part of packet or the entire packet based on
the algorithm being used.
3. If there are N routers from source to destination, the total end to end delay in sending packet
P(L-> number of bits in the packet R-> transmission rate) is equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: The equation to find the end to end delay when no. of bits, transmission rate and
no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of
all, the processing delay, queuing delay, transmission delay and propagation delay.
advertisement
4. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
/https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 2/7
2021/‫‏‬6/‫‏‬22
Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry
d) Packet switching and Circuit switching
View Answer
Answer: d
Explanation: Packet switching and Circuit switching are two different types of switching
methods used to connect the multiple communicating devices with one another. Packet
switching is used in conventional LAN systems and circuit switching is used in telephonic
systems.
5. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: In circuit switching, a physical path between the sender and receiver is
established. This path is maintained until the connection is needed. Circuit switching is
implemented in the Physical layer and is used in telephonic systems.
advertisement
6. As the resources are reserved between two communicating end systems in circuit switching,
___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
/https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 3/7
2021/‫‏‬6/‫‏‬22
Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry
d) store and forward
View Answer
Answer: b
Explanation: Circuit switching is connection oriented and is always implemented in the
physical layer. Once a path is set, all transmission occurs through the same path. It is used
since the early times in telephonic systems.
7. In _________ systems, resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
View Answer
Answer: a
Explanation: In packet switching, the bits are received in out of order and need to be
assembled at the receiver end, whereas in the case of Circuit switching, all the bits are
received in order. All transmissions may not occur through the same path in case of packet
switching.
advertisement
8. Which of the following is not an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 4/7
2021/‫‏‬6/‫‏‬22
Physical Media - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Physical Media
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Physical Media”.
1. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
View Answer
Answer: c
Explanation: Wireless LAN is unguided media.
advertisement
2. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
/https://www.sanfoundry.com/computer-networks-mcqs-physical-media 1/7
2021/‫‏‬6/‫‏‬22
Physical Media - Computer Networks Questions & Answers - Sanfoundry
d) None of the mentioned
View Answer
Answer: a
Explanation: Unshielded twisted pair(UTP) is commonly used in home access.
3. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: Coaxial cable has an inner conductor surrounded by a insulating layer, which is
surrounded by a conducting shield. Coaxial cable is used to carry high frequency signals with
low losses.
advertisement
4. Fiber optics posses following properties __________
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
View Answer
Answer: d
Explanation: In fibre optics the transmission of information is in the form of light or photons.
/https://www.sanfoundry.com/computer-networks-mcqs-physical-media 2/7
2021/‫‏‬6/‫‏‬22
Physical Media - Computer Networks Questions & Answers - Sanfoundry
Due to all above properties mentioned in options fibre optics can be submerged in water and
are used at more risk environments.
5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
View Answer
Answer: b
Explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical
carrier represented as OC-n has n*51.8 Mbits/s transmission speed. For eg. OC-3 has 3*51.8
Mbits/s speed.
advertisement
6. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
View Answer
Answer: b
Explanation: The three types are those that operate over very short distance, those that
operate in local areas, those that operate in the wide area.
7. Radio channels are attractive medium because __________
a) Can penetrate walls
/https://www.sanfoundry.com/computer-networks-mcqs-physical-media 3/7
2021/‫‏‬6/‫‏‬22
Physical Media - Computer Networks Questions & Answers - Sanfoundry
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
View Answer
Answer: d
Explanation: Radio channels can penetrate walls, can be used to provide connectivity to mobile
users and can also carry signals for long distances.
advertisement
8. Geostationary satellites ___________
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
View Answer
Answer: a
Explanation: They are placed in orbit at 36,000km above Earth’s surface.
Sanfoundry Global Education & Learning Series – Computer Networks.
advertisement
/https://www.sanfoundry.com/computer-networks-mcqs-physical-media 4/7
2021/‫‏‬6/‫‏‬22
Network Attacks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Network Attacks
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Network Attacks”.
1. The attacker using a network of compromised devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer
Answer: b
Explanation: Botnet is a network of compromised devices used by the attacker without the
owner’s knowledge to perform unethical activities such as spamming. The attacker usually
uses the least secure devices to create the botnet.
advertisement
2. Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
/https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 1/7
2021/‫‏‬6/‫‏‬22
Network Attacks Questions & Answers - Sanfoundry
c) Connection flooding
d) All of the mentioned
View Answer
Answer: d
Explanation: In a DoS attack, the attacker won’t let the victims access the network by using a
certain method that ensures that an essential network resource is unavailable to the victim. In
vulnerability attack, the attacker exploits any obvious vulnerable entity in the network to deny
the victim access into the network. In bandwidth flooding, the attacker floods the victim with a
huge flow of packets and uses up all the bandwidth. In connection flooding, the attacker floods
the victim network with a huge number of connections, so that, no other machine can connect
to it.
3. The DoS attack, in which the attacker establishes a large number of half-open or fully open
TCP connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
View Answer
Answer: c
Explanation: In Vulnerability attack, the attacker exploits the vulnerable control points of the
network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses
up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the
victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the
attacker to the victim at random ports.
advertisement
/https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 2/7
2021/‫‏‬6/‫‏‬22
Network Attacks Questions & Answers - Sanfoundry
4. The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
View Answer
Answer: b
Explanation: In Bandwidth flooding, the attacker floods the victim machine with a deluge of
packets to make sure that no bandwidth is available. The victim then cannot utilize the
complete bandwidth to perform its operation.
5. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
View Answer
Answer: b
Explanation: The function of packet sniffers is to just silently receive the packets flowing in the
channel. If they inject any packets into the channel, they might alert the other users about the
intrusion.
advertisement
6. Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
/https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 3/7
2021/‫‏‬6/‫‏‬22
Network Attacks Questions & Answers - Sanfoundry
d) Switched network
View Answer
Answer: d
Explanation: Switches make sure that the packet is sent to the intended receiver and no one
else, thus preventing Sniffers to perform their function. Intelligent switches are hence used
preferably for the network.
7. Firewalls are often configured to block ___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
View Answer
Answer: a
Explanation: UDP is more vulnerable to attacks, so firewalls are often configured to block
suspicious UDP traffic.
advertisement
8. In a network, If P is the only packet being transmitted and there was no earlier transmission,
which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Questions for Campus Interviews - Sanfoundry
Computer Networks Questions & Answers –
STP Cables
« Prev
Next »
This set of Computer Networks Questions and Answers for Campus interviews focuses on “STP
(Shielded Twisted Pair) Cables”.
1. _____________ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
View Answer
Answer: c
Explanation: A file server allows LAN users to share computer programs and data. It uses the
File Transfer Protocol to provide this feature on ports 20 and 21. The file server works as a
medium for the transfer.
advertisement
2. With respect to physical media, STP cables stands for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
/https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 1/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions for Campus Interviews - Sanfoundry
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
View Answer
Answer: a
Explanation: For physical media, STP cable stands for Shielded twisted pair cable. 100 Mbps is
the max data capacity of STP cable and its default connector is RJ45. It is popularly used in
LANs due to its ease of maintenance and installation.
3. A standalone program that has been modified to work on a LAN by including concurrency
controls such as file and record locking is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
View Answer
Answer: a
Explanation: A standalone program that has been modified to work on a LAN by including
concurrency controls such as file and record locking is an example of LAN intrinsic software.
They are used to give better functionality of the program and the applications working over it
to the users of the LAN.
advertisement
4. The __________ portion of LAN management software restricts access, records user activities
and audit data, etc.
a) Configuration management
b) Security management
c) Performance management
/https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 2/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions for Campus Interviews - Sanfoundry
d) Recovery management
View Answer
Answer: b
Explanation: The Security management portion of LAN management software restricts access,
records user activities, and audit data. It is responsible for controlling access to the network
based on predefined policy. The security management ensures authentication, confidentiality,
and integrity in the LAN.
5. What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
View Answer
Answer: c
Explanation: The max the Shielded twisted pair cable is 100 meters. If the length exceeds 100
meters, the loss of signals flowing through the cable would be really high. Thus, STP cable is
more suitable for smaller networks like LANs.
advertisement
6. What is the max data transfer rate of STP cables?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 3/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions for Campus Interviews - Sanfoundry
Answer: b
Explanation: 100 Mbps is the max data transfer rate that can be handled by STP cables, and its
default connector is RJ-45. 100 Mbps is a feasible data transfer rate for small networks like
LANs.
7. Which connector does the STP cable use?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
View Answer
Answer: c
Explanation: RJ-45 is used for STP cable. 100 Mbps is the max data transfer rate that can be
handled by STP. RJ-45 is popularly used to connect to modern-day routers, computer network
cards, and other network devices.
advertisement
8. What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router
View Answer
Answer: b
Explanation: In star topology, no computer is connected to another computer directly but all
the computers are connected to a central switch or hub. Every message sent from a source
/https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 4/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions for Campus Interviews - Sanfoundry
computer goes through the switch or hub and the switch or hub then forwards the message
only to the intended destination computer.
9. What is the max data transfer rate for optical fiber cable?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
View Answer
Answer: d
Explanation: Fiber channel speeds have been increasing over the years. 10000 Mbps is the
max data transfer rate for optical fiber cables. It is said to be the fastest among the other kinds
of cables like STP cables and co-axial cables. People are now using optical fiber cables instead
of STP cables for LANs due to their fast data transfer capability.
10. Which of the following architecture uses the CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
View Answer
Answer: b
Explanation: Collision detection is not possible in Ethernet without extensions. Collision
detection techniques for multiple access like CSMA/CD are used to detect collisions in the
Ethernet architecture.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 5/8
2021/‫‏‬6/‫‏‬22
Delays & Loss - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Delays and Loss
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Delays
and Loss”.
1. Which of the following delay is faced by the packet in travelling from one end system to
another?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: d
Explanation: When a packet has to travel from one end system to another, it first faces the
queuing delay when there are multiple packets which are to be sent, then it faces the
transmission delay to convert the packet into bits to be transmitted, and then it faces the
propagation delay to propagate the bits through the physical medium.
advertisement
Ads by
Stop seeing this ad
Why this ad?
/https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 1/8
2021/‫‏‬6/‫‏‬22
Delays & Loss - Computer Networks Questions & Answers - Sanfoundry
2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is
____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
View Answer
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2 microseconds.
3. The time required to examine the packet’s header and determine where to direct the packet is
part of __________
a) Processing delay
b) Queuing delay
c) Transmission delay
d) Propagation delay
View Answer
Answer: a
Explanation: Processing delay is induced at a router’s or other network processor’s end in the
path of the packet and is caused by the time taken by the processor to examine the packet’s
header to decide the further path of the packet.
advertisement
4. Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic
intensity in the network is given by ____________
a) La/R
b) LR/a
/https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 2/8
2021/‫‏‬6/‫‏‬22
Delays & Loss - Computer Networks Questions & Answers - Sanfoundry
c) R/La
d) Ra/L
View Answer
Answer: a
Explanation: Traffic Intensity = (Number of bits in packet * Average Transmission rate)/Current
Transmission rate.
5. In the transfer of file between server and client, if the transmission rates along the path is
10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
View Answer
Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck link.
advertisement
6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested
network. The number of routers between source and destination is?
a) N/2
b) N
c) N-1
d) 2N
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 3/8
2021/‫‏‬6/‫‏‬22
Delays & Loss - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: In the equation N (dproc + dtrans + dprop), N is the number of checkpoints/stops
that the packet makes as it reaches the destination. The stops are made at each router and
the final destination node. Now, since N = number of routers + final node, then number of
routers = N – final node. As we know, there is only 1 final node in a path, thus, number of
routers = N – 1. Suppose, There is a path A->R1->R2->B for a packet where A is the source
node, B is the final node and R1 and R2 are routers. The total delay would be given by N (dproc
+ dtrans + dprop) where N = 3, since the packet would stop at R1, R2 and B. The number of
routers here are 2, and (N – 1) is also 2.
7. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
View Answer
Answer: c
Explanation: The total node-to-node delay, that is, nodal delay is the sum of all, the processing
delay, queuing delay, transmission delay and propagation delay. Ideally, the nodal delay must
be low as possible for a better Quality of Service of the network.
advertisement
8. In a network, If P is the only packet being transmitted and there was no earlier transmission,
which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
/https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 4/8
2021/‫‏‬6/‫‏‬22
Delays & Loss - Computer Networks Questions & Answers - Sanfoundry
d) Processing delay
View Answer
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need for a queue.
Therefore, the delay caused due to the queuing would be none i.e. 0.
9. Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
View Answer
Answer: b
Explanation: Transmission delay = packet length / transmission rate. The transmission rate
depends upon the bandwidth of the medium.
advertisement
10. Propagation delay depends on ___________
a) Packet length
b) Transmission rate
c) Distance between the routers
d) Speed of the CPU
View Answer
Answer: c
Explanation: Propagation delay is caused when the packet is in its electric signal form and is
travelling through a medium (a wire or a electromagnetic wave). Propagation delay is the time
/https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 5/8
2021/‫‏‬6/‫‏‬22
Multiplexing - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Multiplexing
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Multiplexing”.
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
View Answer
Answer: b
Explanation: Multiplexing is a method using which one can send multiples signals through a
shared medium at the same time. This helps in using less resources and thus saving the cost
of sending messages.
advertisement
Ads by
2. Multiplexing is used in _______
a) Packet switching
Stop seeing this ad
b) Circuit switching
Why this ad?
/https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 1/7
2021/‫‏‬6/‫‏‬22
Multiplexing - Computer Networks Questions & Answers - Sanfoundry
c) Data switching
d) Packet & Circuit switching
View Answer
Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a physical path
between end points. Circuit switching method is also called a connection oriented network.
Two nodes must be physically and logically connected to each other to create a circuit
switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
View Answer
Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital
signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and
Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like
ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).
advertisement
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
/https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 2/7
2021/‫‏‬6/‫‏‬22
Multiplexing - Computer Networks Questions & Answers - Sanfoundry
d) 2n
View Answer
Answer: a
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and
each and every source has access to the complete channel bandwidth during its allotted time
slot. When the time slot of the source is not active, it remains idle and waits for its slot to
begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of
circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
View Answer
Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
advertisement
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
/https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 3/7
2021/‫‏‬6/‫‏‬22
Multiplexing - Computer Networks Questions & Answers - Sanfoundry
d) Stop period
View Answer
Answer: c
Explanation: There are instances when connection between two endpoints has been
established, but no communication or transfer of messages occurs. This period of time is
called silent period. The silent period ends when either of the two endpoints starts the
communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
View Answer
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings
up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high
privacy when implemented because in the implementation, the transport layer of the OSI
network model handles the function of multiplexing through interfaces called ports which
provide the required efficiency and privacy.
advertisement
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the
transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
/https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 4/7
2021/‫‏‬6/‫‏‬22
Multiplexing - Computer Networks Questions & Answers - Sanfoundry
d) Equal to or greater than
View Answer
Answer: a
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always
be greater than the sum of transmission rates of the single sources. This happens because the
transmission rate is provided to each source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for
combining several low rate channels to a single high rate channel. For a certain time slot, the
several channels could use the maximum bandwidth. Each channel is inactive for a period of
time too. Some other multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 5/7
2021/‫‏‬6/‫‏‬22
Topology Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Topology
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Topology”.
1. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
View Answer
Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in
the network is connected. There are many topologies in networking like bus, tree, ring, star,
mesh, and hybrid topology. There is no particular best topology and a suitable topology can be
chosen based on the kind of application of the network .
advertisement
Ads by
2. Which network topology requires
central
controller
hub?
Stopaseeing
this
ad Whyor
this
ad?
a) Star
/https://www.sanfoundry.com/computer-networks-mcqs-topology 1/7
2021/‫‏‬6/‫‏‬22
Topology Questions & Answers - Sanfoundry
b) Mesh
c) Ring
d) Bus
View Answer
Answer: a
Explanation: In star topology, no computer is connected to another computer directly but all
the computers are connected to a central hub. Every message sent from a source computer
goes through the hub and the hub then forwards the message only to the intended
destination computer.
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data
passes through all other nodes in the network through the cable. It is really simple to install
but it’s not secure enough to be used in most of the computer network applications.
advertisement
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
/https://www.sanfoundry.com/computer-networks-mcqs-topology 2/7
2021/‫‏‬6/‫‏‬22
Topology Questions & Answers - Sanfoundry
d) PAN
View Answer
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a
large geographical area. WANs are used to connect cities, states or even countries. A wireless
connection is required to build a WAN. The best example of WAN is the Internet.
5. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects
computers in a small area such as schools, offices, residence etc. It is the most versatile kind of
data communication system where most of the computer network concepts can be visibly
used.
advertisement
6. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-topology 3/7
2021/‫‏‬6/‫‏‬22
Topology Questions & Answers - Sanfoundry
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a
large geographical area. These are used to connect cities, states or even countries. They can
be connected through leased lines or satellites.
7. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for
combining several low rate channels to a single high rate channel. For a certain time slot, the
several channels could use the maximum bandwidth. Each channel is inactive for a period of
time too. Some other multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.
advertisement
8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
View Answer
Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is
/https://www.sanfoundry.com/computer-networks-mcqs-topology 4/7
2021/‫‏‬6/‫‏‬22
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Transport Layer
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Transport Layer”.
1. Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answer: a
Explanation: The flow of data in the OSI model flows in following manner Application ->
Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer
has its own set of functions and protocols to ensure efficient network performance.
advertisement
2. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
/https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 1/8
2021/‫‏‬6/‫‏‬22
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
View Answer
Answer: c
Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an
abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram
Protocol. TCP is connection oriented whereas UDP is connectionless.
3. User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
View Answer
Answer: a
Explanation: UDP is an alternative for TCP and it is used for those purposes where speed
matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is
connection oriented.
advertisement
4. Transmission control protocol ___________
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 2/8
2021/‫‏‬6/‫‏‬22
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts
communicating via an IP network. Major internet applications like www, email, file transfer etc
rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than
timely delivery.
5. An endpoint of an inter-process communication flow across a computer network is called
__________
a) socket
b) pipe
c) port
d) machine
View Answer
Answer: a
Explanation: Socket is one end point in a two way communication link in the network. TCP
layer can identify the application that data is destined to be sent by using the port number
that is bound to socket.
advertisement
6. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
View Answer
Answer: b
Explanation: Winsock is a programming interface which deals with input output requests for
/https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 3/8
2021/‫‏‬6/‫‏‬22
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
internet applications in windows OS. It defines how windows network software should access
network services.
7. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
View Answer
Answer: a
Explanation: The datagram congestion control is a transport layer protocol which deals with
reliable connection setup, teardown, congestion control, explicit congestion notification, and
feature negotiation. It is used in modern day systems where there are really high chances of
congestion. The protocol was last updated in the year 2008.
advertisement
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
View Answer
Answer: a
Explanation: Just as the IP address identifies the computer, the network port identifies the
application or service running on the computer. A port number is 16 bits. The combination of
IP address preceded with the port number is called the socket address.
/https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 4/8
2021/‫‏‬6/‫‏‬22
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
9. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
View Answer
Answer: b
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals
with logical communication between process. It is responsible for delivering a message
between network host.
advertisement
10. Which of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
View Answer
Answer: a
Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol
used in networking system where streams of data are to be continuously transmitted between
two connected network nodes. Some of the other transport layer protocols are RDP, RUDP,
TCP, DCCP, UDP etc.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 5/8
2021/‫‏‬6/‫‏‬22
Network Layer - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Network Layer
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Network Layer”.
1. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
View Answer
Answer: c
Explanation: In computer networks, the data from the application layer is sent to the transport
layer and is converted to segments. These segments are then transferred to the network layer
and these are called packets. These packets are then sent to data link layer where they are
encapsulated into frames. These frames are then transferred to physical layer where the
frames are converted to bits.
advertisement
Ads by
Stop seeing this ad
Why this ad?
/https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 1/8
2021/‫‏‬6/‫‏‬22
Network Layer - Computer Networks Questions & Answers - Sanfoundry
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
View Answer
Answer: d
Explanation: In the OSI model, network layer is the third layer and it provides data routing
paths for network communications. Error control is a function of the data link layer and the
transport layer.
3. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
View Answer
Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of
a network and host portion and it depends on address class. The size of the host address and
network address depends upon the class of the address in classful IP addressing.
advertisement
4. In virtual circuit network each packet contains ___________
a) full source and destination address
b) a short VC number
c) only source address
/https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 2/8
2021/‫‏‬6/‫‏‬22
Network Layer - Computer Networks Questions & Answers - Sanfoundry
d) only destination address
View Answer
Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of
identifier which is used to distinguish between several virtual circuits in a connection oriented
circuit switched network. Each virtual circuit is used to transfer data over a larger packet
switched network.
5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer: d
Explanation: The routing algorithm is what decides where a packet should go next. There are
several routing techniques like shortest path algorithm, static and dynamic routing,
decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The
routing algorithms go hand in hand with the operations of all the routers in the networks. The
routers are the main participants in these algorithms.
advertisement
6. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
/https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 3/8
2021/‫‏‬6/‫‏‬22
Network Layer - Computer Networks Questions & Answers - Sanfoundry
d) there are multiple receivers
View Answer
Answer: c
Explanation: In multi-destination routing, there is more than one receiver and the route for
each destination which is contained in a list of destinations is to be found by the routing
algorithm. Multi-destination routing is also used in broadcasting.
7. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
View Answer
Answer: a
Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical
topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The
main purpose of STP is to ensure that you do not create loops when you have redundant
paths in your network.
advertisement
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 4/8
2021/‫‏‬6/‫‏‬22
Network Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: The Routing Information Protocol (RIP) is used by the network layer for the
function of dynamic routing. Congestion control focuses on the flow of the traffic in the
network and uses algorithms like traffic aware routing, admission control and load shedding
to deal with congestion.
9. The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
View Answer
Answer: b
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP,
CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet
protocol is for data link layer.
advertisement
10. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
View Answer
Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking
devices to send error messages and operational information indicating a host or router cannot
/https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 5/8
2021/‫‏‬6/‫‏‬22
Data Link Layer - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Data Link Layer
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Data
Link Layer”.
1. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer: a
Explanation: In computer networks, the data from application layer is sent to transport layer
and is converted to segments. These segments are then transferred to the network layer and
these are called packets. These packets are then sent to data link layer where they are
encapsulated into frames. These frames are then transferred to physical layer where the
frames are converted to bits. Error control and flow control data is inserted in the frames at
the data link layer.
advertisement
Ads by
Stop seeing this ad
Why this ad?
/https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 1/8
2021/‫‏‬6/‫‏‬22
Data Link Layer - Computer Networks Questions & Answers - Sanfoundry
2. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with
framing, error control and flow control. Data link layer is the layer where the packets are
encapsulated into frames.
3. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
View Answer
Answer: b
Explanation: Media access control (MAC) deals with transmission of data packets to and from
the network-interface card, and also to and from another remotely shared channel. The MAC
sublayer also prevents collision using protocols like CSMA/CD.
advertisement
4. Header of a frame generally contains ______________
Ads by
a) synchronization bytes
Stop seeing this ad Why this ad?
b) addresses
/https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 2/8
2021/‫‏‬6/‫‏‬22
Data Link Layer - Computer Networks Questions & Answers - Sanfoundry
c) frame identifier
d) all of the mentioned
View Answer
Answer: d
Explanation: In a frame, the header is a part of the data that contains all the required
information about the transmission of the file. It contains information like synchronization
bytes, addresses, frame identifier etc. It also contains error control information for reducing
the errors in the transmitted frames.
5. Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
View Answer
Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main function is to
manage traffic, flow and error control. The automatic repeat request error management
mechanism is provided by the LLC when an error is found in the received frame at the
receiver’s end to inform the sender to re-send the frame.
advertisement
6. When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
Ads by
b) burst error
Stop seeing this ad Why this ad?
c) inverted error
/https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 3/8
2021/‫‏‬6/‫‏‬22
Data Link Layer - Computer Networks Questions & Answers - Sanfoundry
d) double error
View Answer
Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit error. When more
than a single bit of data is corrupted or has error, it is called burst error. If a single bit error
occurs, the bit can be simply repaired by inverting it, but in case of a burst error, the sender
has to send the frame again.
7. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
View Answer
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which helps us to
identify any error that occurred during the transmission of the data. CRC is only able to detect
errors, not correct them. CRC is inserted in the frame trailer.
advertisement
8. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Ads by
View Answer
Stop seeing this ad
Why this ad?
/https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 4/8
2021/‫‏‬6/‫‏‬22
Data Link Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous
data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP
(Point to point protocol) etc. These protocols are used to provide the logical link control
function of the Data Link Layer.
9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
View Answer
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred,
whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing
Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing Multiple
Access/Collision Avoidance. These protocols are used for efficient multiple channel access.
advertisement
10. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
View Answer
Ads by
Stop seeing this ad
Why this ad?
/https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 5/8
2021/‫‏‬6/‫‏‬22
Physical Layer - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Physical Layer
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Physical Layer”.
1. The physical layer is concerned with ___________
a) bit-by-bit delivery
p) process to process delivery
c) application to application delivery
d) port to port delivery
View Answer
Answer: a
Explanation: Physical layer deals with bit to bit delivery in networking. The data unit in the
physical layer is bits. Process to process delivery or the port to port delivery is dealt in the
transport layer. The various transmission mediums aid the physical layer in performing its
functions.
advertisement
2. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
/https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 1/8
2021/‫‏‬6/‫‏‬22
Physical Layer - Computer Networks Questions & Answers - Sanfoundry
b) twisted pair cable
c) optical fiber
d) electrical cable
View Answer
Answer: c
Explanation: Fiber optics is considered to have the highest transmission speed among the all
mentioned above. The fiber optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx
whereas IEEE standard for it is 802.3z. It is popularly used for modern day network
connections due to its high transmission rate.
3. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answer: a
Explanation: In analog modulation, digital low frequency baseband signal (digital bit stream) is
transmitted over a higher frequency. Whereas in digital modulation the only difference is that
the base band signal is of discrete amplitude level. The bits are represented by only two
frequency levels, one for high and one for low.
advertisement
4. The portion of physical layer that interfaces with the media access control sublayer is called
___________
a) physical signalling sublayer
b) physical data sublayer
/https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 2/8
2021/‫‏‬6/‫‏‬22
Physical Layer - Computer Networks Questions & Answers - Sanfoundry
c) physical address sublayer
d) physical transport sublayer
View Answer
Answer: a
Explanation: The portion of physical layer that interfaces with the medium access control
sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding,
reception, decoding and performs optional isolation functions. It handles which media
connection the signal should be forwarded to physically.
5. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
View Answer
Answer: d
Explanation: Anything dealing with a network cable or the standards in use – including pins,
connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer
deals with bit to bit delivery of the data aided by the various transmission mediums.
advertisement
6. In asynchronous serial communication the physical layer provides ___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 3/8
2021/‫‏‬6/‫‏‬22
Physical Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: In asynchronous serial communication, the communication is not synchronized
by clock signal. Instead of a start and stop signaling and flow control method is followed.
Unlike asynchronous serial communication, in synchronous serial communication a clock
signal is used for communication, so the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
View Answer
Answer: d
Explanation: The physical layer is responsible for line coding, channel coding and modulation
that is needed for the transmission of the information. The physical configuration including
pins, connectors and the electric current used is dealt in the physical layer based on the
requirement of the network application.
advertisement
8. The physical layer translates logical communication requests from the ______ into hardware
specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 4/8
2021/‫‏‬6/‫‏‬22
Physical Layer - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Physical layer accepts data or information from the data link layer and converts it
into hardware specific operations so as to transfer the message through physical cables. Some
examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables.
9. A single channel is shared by multiple signals by ____________
a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation
View Answer
Answer: c
Explanation: In communication and computer networks, the main goal is to share a scarce
resource. This is done by multiplexing, where multiple analog or digital signals are combined
into one signal over a shared medium. The multiple kinds of signals are designated by the
transport layer which is the layer present on a higher level than the physical layer.
advertisement
10. Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
View Answer
Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves.
These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless
/https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 5/8
2021/‫‏‬6/‫‏‬22
Reference Models - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Reference Models – 2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Reference Models – 2”.
1. OSI stands for __________
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet
View Answer
Answer: a
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a
structured plan on how applications communicate over a network, which also helps us to have
a structured plan for troubleshooting. It is recognized by the ISO as the generalized model for
computer network i.e. it can be modified to design any kind of computer network.
advertisement
2. The number of layers in ISO OSI reference model is __________
a) 4
/https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 1/8
2021/‫‏‬6/‫‏‬22
Reference Models - Computer Networks Questions & Answers - Sanfoundry
b) 5
c) 6
d) 7
View Answer
Answer: d
Explanation: In OSI reference model, there are 7 layers namely Application, Presentation,
Session, Transport, Network, Data Link and Physical layer. Each layer uses a protocol to
perform its designated function, for example, the data link layer uses error detection protocols
for error control functions.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
View Answer
Answer: a
Explanation: In OSI reference model, there are two layers which are not present in TCP/IP
model. They are Presentation and Session layer. The functions of Presentation and Session
layer in the OSI model are handled by the transport layer itself in TCP/IP.
advertisement
4. Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
/https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 2/8
2021/‫‏‬6/‫‏‬22
Reference Models - Computer Networks Questions & Answers - Sanfoundry
d) network layer
View Answer
Answer: c
Explanation: Physical, data link and network layers are network support layers and session,
presentation and application layers are user support layers. The transport layer links these
layers by segmenting and rearranging the data. It uses protocols like TCP and UDP.
5. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
Answer: d
Explanation: The physical, logical, port and specific addresses are used in TCP/IP protocol. All
the addressing schemes, that is physical (MAC) and logical address, port address and specific
address are employed in both TCP/IP model and OSI model. In TCP/IP, the addresses are more
focused on the internet implementation of these addresses.
advertisement
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 3/8
2021/‫‏‬6/‫‏‬22
Reference Models - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Several TCP/IP prototypes were developed at multiple research centers between
1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was
developed with the intention to create a model for the Internet while OSI was intended to be a
general network model.
7. Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
View Answer
Answer: b
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection
between two systems in a network. The protocols used in Transport layer is TCP and UDP. The
transport layer is responsible for segmentation of the data. It uses ports for the
implementation of process-to-process delivery.
advertisement
8. Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Answer: c
Explanation: A port number is a way to identify a specific process to which an Internet or other
/https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 4/8
2021/‫‏‬6/‫‏‬22
Reference Models - Computer Networks Questions & Answers - Sanfoundry
network message is to be forwarded when it arrives at a server. Some examples of port
numbers are port 20 which is used for FTP data, port 22 which is used for SSH remote login
,and port 23 which is used for TELNET.
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
View Answer
Answer: a
Explanation: In networking, a user mainly interacts with application layer to create and send
information to other computer or network. Application layer provides the interface between
applications and the network. It is the top-most layer in both the TCP/IP and the OSI model.
advertisement
10. Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer
View Answer
Answer: b
Explanation: Physical layer is a layer 1 device which deals with network cables or the standards
in use like connectors, pins, electric current used etc. Basically the transmission speed is
determined by the cables and connectors used. Hence it is physical layer that determines the
/https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 5/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Reference Models – 1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Reference Models – 1”.
1. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
View Answer
Answer: a
Explanation: There are five layers in the Internet Protocol stack. The five layers in Internet
Protocol stack is Application, Transport, Network, Data link and Physical layer. The internet
protocol stack model is also called the TCP/IP model and it’s used in modern Internet
Communication.
advertisement
2. The number of layers in ISO OSI reference model is __________
a) 5
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 1/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
b) 7
c) 6
d) 10
View Answer
Answer: b
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session,
Transport, Network, Data link and Physical layer. OSI stands for Open System Interconnect and
it is a generalized model.
3. Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
View Answer
Answer: d
Explanation: The only difference between OSI model and TCP/IP model is that the functions of
Presentation and Session layer in the OSI model are handled by the transport layer itself in
TCP/IP. OSI is a generalized model and TCP/IP is an application specific model.
advertisement
4. Application layer is implemented in ____________
a) End system
b) NIC
c) Ethernet
d) Packet transport
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 2/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
Answer: a
Explanation: Not only application layer, but presentation layer, session layer and transport
layer are also implemented in the end system. The layers below are implemented outside the
end system, for example, the network layer is implemented on the routers and the physical
layer is implemented for the medium.
5. Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission
View Answer
Answer: a
Explanation: Application, Presentation, Session and Transport layer are implemented in the
end system. The transport layer handles the process to process delivery of the packet through
ports.
advertisement
6. The functionalities of the presentation layer include ____________
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
View Answer
Answer: d
Explanation: Some functions of the presentation layer include character-code translation, data
conversion, data encryption and decryption, and data translation. It connects the application
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 3/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
layer with the layers below converting the human readable text and media to machine
readable format and vice-versa.
7. Delimiting and synchronization of data exchange is provided by __________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
View Answer
Answer: b
Explanation: The session layer provides the mechanism for opening, closing and managing a
session between end-user application processes. The session layer 5 is responsible for
establishing managing synchronizing and terminating sessions. In TCP/IP protocol stack, the
functions of the session layer are handled by the transport layer itself and thus the session
layer is missing from the TCP/IP model.
advertisement
8. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is
_________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: d
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer provides the
mechanism for opening, closing and managing a session between end-user application
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 4/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
processes. In TCP/IP protocol stack, the functions of the session layer are handled by the
transport layer itself and thus the session layer is missing from the TCP/IP model.
9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B
is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: a
Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from device
A to device B, the 5th layer to receive data at B is application layer. Application layer provides
the interface between applications and the network. The user interacts with only this layer.
advertisement
10. In the OSI model, as a data packet moves from the lower to the upper layers, headers are
_______
a) Added
b) Removed
c) Rearranged
d) Randomized
View Answer
Answer: b
Explanation: In OSI reference model, when data packet moves from lower layers to higher
layer, headers get removed. Whereas when the data packet moves from higher layer to lower
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 5/8
2021/‫‏‬6/‫‏‬22
Reference Models Questions & Answers - Sanfoundry
layers, headers are added. These headers contain the essential control information for the
protocols used on the specific layer.
11. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
View Answer
Answer: c
Explanation: One layer may use the information from another layer, for example timestamp
value. The information is contained in the header inserted by the previous layer. The headers
are added as the packet moves from higher layers to the lower layers.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Access Networks
» Next - Computer Networks Questions & Answers – Reference Models – 2
advertisement
Recommended Posts:
/https://www.sanfoundry.com/computer-networks-mcqs-reference-models 6/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Access Networks
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Access
Networks”.
1. Which of this is not a constituent of residential telephone line?
a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel
View Answer
Answer: c
Explanation: A low-speed downstream channel is not a constituent of a residential telephone
line. But it might be just a two-way telephone channel. Internet can be provided through a
high-speed downstream channel in a residential telephone line.
advertisement
2. DSL telcos provide which of the following services?
a) Wired phone access
b) ISP
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 1/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
c) Wired phone access and ISP
d) Network routing and ISP
View Answer
Answer: c
Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service
Provider. In a Digital Subscriber Line system, the same company which provides phone
connection is also an ISP. The internet is provided through the pre-installed telephone lines.
3. The function of DSLAM is to __________
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
View Answer
Answer: a
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by
Telcos to convert the analog signals to digital signals for the purpose of providing internet. The
DSLAM located in a telco’s Central Office does this function.
advertisement
4. Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 2/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: CMTS stands for Cable modem termination system. It is used in cable internet
access. In cable internet access, internet is not provided through telephone lines and the
companies that provide such connections don’t necessarily provide telephone access.
5. HFC contains _______
a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable
View Answer
Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband
network that combines optical fiber and coaxial cable. It has been popularly used since the
early 1990s. It is stronger than the optical fiber cables and faster than the co-axial cables.
advertisement
6. Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: CMTS stands for Cable modem termination system. In cable access analog signal
is converted to digital signal by CMTS. In cable internet access, internet is not provided
through telephone lines. DSLAM is used by Telecom companies.
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 3/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
7. Among the optical-distribution architectures that are essentially switched ethernet is __________
a) AON
b) PON
c) NON
d) MON
View Answer
Answer:a
Explanation: AON stands for Active optical networks which are essentially switched Ethernets.
Each user has his/her own dedicated optical fiber line connecting to the ISP in an AON.
advertisement
8. StarBand provides __________
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S.
from 2000–2015. It was discontinued from September 30 2015 due to increasing competition
from other ISPs.
9. Home Access is provided by __________
a) DSL
b) FTTP
c) Cable
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 4/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
d) All of the mentioned
View Answer
Answer: d
Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the
fastest speeds followed by the cable connections and then the DSLs. FTTP is popularly used in
modern connections.
advertisement
10. ONT is connected to splitter using _________
a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable
View Answer
Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination
Point (TP) with an optical fibre cable. It translates light signals from the fibre optic line to
electric signals that the router can read.
11. Which of the following factors affect transmission rate in DSL?
a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 5/8
2021/‫‏‬6/‫‏‬22
Access Networks - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair line
i.e. the protection and electrical interference would affect the transmission rate in DSL. Unlike
DSL, FTTP is not really affected by these factors.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Basics – 2
» Next - Computer Networks Questions & Answers – Reference Models – 1
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Mechatronics Engineering Questions and Answers
Electrical Engineering Questions and Answers
Instrumentation Engineering Questions and Answers
Digital Signal Processing MCQ (Multiple Choice Questions)
Digital Electronics MCQ (Multiple Choice Questions)
Electronics & Communication Engineering Questions and Answers
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Electrical & Electronics Engineering Questions and Answers
Computer Graphics MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
/https://www.sanfoundry.com/computer-networks-mcqs-access-networks 6/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Interview Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Basics – 2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics
– 2”.
1. When collection of various computers seems a single coherent system to its client, then it is
called _________
a) computer network
b) distributed system
c) networking system
d) mail system
View Answer
Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers
which uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that the
whole collection of computers appears to its users as a single coherent system.
Example:- World wide web
advertisement
/https://www.sanfoundry.com/computer-networks-question-answers-basics 1/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Interview Questions & Answers - Sanfoundry
2. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
View Answer
Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices exchange
data with each other using connections between nodes. The nodes have certain processes
which enable them to share a specific type of data using a distinct protocol.
3. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer
Answer: d
Explanation: An overlay network is a computer network that is built on top of another network.
Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer
Networks (P2P).
advertisement
4. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
/https://www.sanfoundry.com/computer-networks-question-answers-basics 2/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Interview Questions & Answers - Sanfoundry
c) the computer that terminates the data
d) all of the mentioned
View Answer
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or
receiving data or even routing the data to its destination. Routers, Computers and
Smartphones are some examples of network nodes.
5. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
View Answer
Answer: a
Explanation: In a broadcast network, information is sent to all stations in a network whereas in
a multicast network the data or information is sent to a group of stations in the network. In
unicast network, information is sent to only one specific station. The broadcast address of the
network is the last assigned address of the network.
advertisement
6. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network
View Answer
/https://www.sanfoundry.com/computer-networks-question-answers-basics 3/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Interview Questions & Answers - Sanfoundry
Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency
band for transmission.
7. A __________ is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
d) hub
View Answer
Answer: c
Explanation: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. They make use of
routing protocols like RIP to find the cheapest path to the destination.
advertisement
8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
View Answer
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that
/https://www.sanfoundry.com/computer-networks-question-answers-basics 4/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Interview Questions & Answers - Sanfoundry
are employed for the implementation of network protocol suite. Each layer in the network
model has to use one specific protocol from the protocol stack.
9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
View Answer
Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the network
could handle. To avoid network congestion, the network management uses various open-loop
and closed-loop congestion control techniques.
advertisement
10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer: b
Explanation: A virtual private network extends a private network across a public network, and
enables users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network.VPN provides enhanced security and
online anonymity to users on the internet. It is also used to unblock websites which are
unavailable in certain regions.
/https://www.sanfoundry.com/computer-networks-question-answers-basics 5/8
2021/‫‏‬6/‫‏‬22
Computer Network Basics Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Basics – 1
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics
– 1”.
1. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC
View Answer
Answer: a
Explanation: RFC stands for Request For Comments and they are documents that describe
methods, behaviors, research, or innovations applicable to the working of the Internet.
advertisement
2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers
are ___________
a) Added
b) Removed
/https://www.sanfoundry.com/computer-networks-mcqs-basics 1/7
2021/‫‏‬6/‫‏‬22
Computer Network Basics Questions & Answers - Sanfoundry
c) Rearranged
d) Modified
View Answer
Answer: a
Explanation: Each layer adds its own header to the packet from the previous layer. For
example, in the Internet layer, the IP header is added over the TCP header on the data packet
that came from the transport layer.
3. The structure or format of data is called ___________
a) Syntax
b) Semantics
c) Struct
d) Formatting
View Answer
Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines
how a particular pattern to be interpreted, and what action is to be taken based on that
interpretation. In programming languages, syntax of the instructions plays a vital role in
designing of the program.
advertisement
4. Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-basics 2/7
2021/‫‏‬6/‫‏‬22
Computer Network Basics Questions & Answers - Sanfoundry
Answer: d
Explanation: In simplex transmission, data flows in single direction which in this case refers to
the data flowing from the keyboard to the computer. Another example would be of the mouse
where the data flows from the mouse to the computer only.
5. The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Answer: d
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the
first network to be implemented which used the TCP/IP protocol in the year 1969.
advertisement
6. A _______ is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route
View Answer
Answer: b
Explanation: Messages travel from sender to receiver via a physical path called the medium
using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided
(wireless).
/https://www.sanfoundry.com/computer-networks-mcqs-basics 3/7
2021/‫‏‬6/‫‏‬22
Computer Network Basics Questions & Answers - Sanfoundry
7. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
View Answer
Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is
responsible for regulating all interstate communications originating or terminating in USA. It
was founded in the year 1934.
advertisement
8. Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
View Answer
Answer: d
Explanation: Network edge devices refer to host systems, which can host applications like web
browser. A switch can’t operate as a host, but as a central device which can be used to manage
network communication.
9. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
/https://www.sanfoundry.com/computer-networks-mcqs-basics 4/7
2021/‫‏‬6/‫‏‬22
Computer Network Basics Questions & Answers - Sanfoundry
c) RFCs
d) Servers
View Answer
Answer: a
Explanation: In communications, a protocol refers to a set of rules and regulations that allow a
network of nodes to transmit and receive information. Each layer in the network model has a
protocol set, for example, the transport layer has TCP and UDP protocols.
advertisement
10. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
View Answer
Answer: b
Explanation: A multipoint communication is established when three or many network nodes
are connected to each other. Frame relay, Ethernet and ATM are some examples of multipoint
connections.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-mcqs-basics 5/7
2021/‫‏‬6/‫‏‬22
exam 1 Flashcards | Quizlet
Home / Other / Computer Skills / Cisco Systems
exam 1
Study
exam 1
Terms in this set (52)
1) physical/ Ethernet
2) data-link/ Ethernet
The OSI model consists of
3) network/ IP
how many Layers? Name
4) transport/ TCP/UDP
Them.
5) session/ TCP/UDP/application
6) presentation/ application
7) application/ application
Also note that the OSI model is just that, a model.
Does the OSI model match
modern networks systems
exactly?
In the real world exactly which function is
performed at which layer can be somewhat fuzzy.
For example, ICMP can be though of as a inband
layer 3 signaling protocol or a layer 4 transport
protocol.
What layer is closest to the
layer one; physical Ethernet
transmission medium (IE
closest to the wire)
In what layer is the data unit
layer 2; data-link Ethernet
usually called a frame?
In what layer is the data unit
layer 3; network IP
usually called a packet?
/https://quizlet.com/266699170/exam-1-flash-cards 1/10
2021/‫‏‬6/‫‏‬22
In what 1layer is the data unit
exam
exam 1 Flashcards | Quizlet
layer 4; transport TCP/UDP
Study
usually called a segment?
As the data packet moves
deleted
from lower (hardware) to
upper (user) layers headers
and/or trailers are (added or
deleted)
As the data packet moves
added
from upper (user) to lower
(hardware) layers headers
and/or trailers are (added or
deleted)
Layer 4 (trasport) Reliable transmission of data
segments between points on a network, including
segmentation, acknowledgement and
What is the main function of
multiplexing
the transport layer? What
about the session layer?
Layer 5 (session) Managing communication
sessions, i.e. continuous exchange of information
in the form of multiple back-and-forth
transmissions between two nodes
When we talk about Ethernet
layer 2
we are talking mostly about
which OSI "layer"?
When we talk about IP we are
layer 3
talking mostly about which
OSI "layer"?
When we talk about TCP we
layer 4
are talking mostly about
which OSI "layer"?
/https://quizlet.com/266699170/exam-1-flash-cards 2/10
2021/‫‏‬6/‫‏‬22
exam 1 Flashcards | Quizlet
exam 1
Study
Upgrade to remove adverts
What is the difference
between two hosts on the
same "network" and two hosts
on the same "Internetwork"?
Two hosts are on the same
Only ₪11.67/month
Two hosts on the same network is equal to two
hosts on the same IP subnet .
Two hosts on the same internetwork is equal to
two hosts on the same autonomous network or
network owned by one company or being.
Yes. They are on the same network.
layer 2 network. Can they
communicate directly (without
using a layer 3 router)?
Two hosts are on the same
No. In this case they are on different networks, the
layer 3 internetwork but not
router will
on the same layer 2 network.
have to relay layer 3 (IPv4) between the two Layer
Can they communicate
2 networks.
directly (without using a layer
3 router)?
/https://quizlet.com/266699170/exam-1-flash-cards 3/10
2021/‫‏‬6/‫‏‬22
exam 1
exam 1 Flashcards | Quizlet
WHEN were they defined:
Study
TCP was documented in 1974, UDP in 1980
TYPE OF DOCUMENT:
Internet standards are defined in documents
called Requests For Comments (RFCs).
TCP was written in 1973, then revised and formally
documented in RFC 675, Specification of Internet
Transmission Control Program, December 1974.
When were the IP and TCP
and UDP protocols defined?
In what type of document?
Who publishes these
documents? Where would
you go on the Internet to look
these up these documents?
UDP was defined in RFC 768, User Datagram
Protocol, in 1980
PUBLISHER:
The TCP/IP protocols were initially developed as
part of the research network developed by the 2
United States DARPA(Defense Advanced
Research Projects Agency or ARPA) scientists—
Vint Cerf and Bob Kahn, persons most often
called the fathers of the Internet.
Basic internetworking was to be done by IP, and
the reliability features by TCP. This paved the way
for the creation of an alternative transport-layer
protocol for applications that didn't want or need
the features provided by TCP. This, of course, is
the User Datagram Protocol (UDP).
IEEE 802.3 is a working group and a collection of
Who sets the standards for
Ethernet?
Institute of Electrical and Electronics Engineers
(IEEE) standards produced by the working group
defining the physical layer and data link layer's
media access control (MAC) of wired Ethernet.
When was the the TCP/IP RFC
1981 RFC's defining IP (RFC 791), ICMP (RFC792),
released?
and TCP (RFC 793) released
Where would you look to file
rfc-editor
the current "Best practices"
documents for the Internet?
/https://quizlet.com/266699170/exam-1-flash-cards 4/10
2021/‫‏‬6/‫‏‬22
exam 1 Flashcards | Quizlet
What are
exam
1 two names for a
Hub/Repeater.
Study
device that sits in the middle
of a standard half duplex
10BaseT star physical
topology network?
What is the maximum length
100 meters
for a 100 base TX segment?
What are two names for a
Bridge/Switch
device that sits in the middle
of a standard 10BaseT network
and separates collision
domains?
Upgrade to remove adverts
Only ₪11.67/month
Name two types of ethernet
10 base 5/10 base 2 are two types of ethernet
media that use a physical bus
media that use a physical bus topology.
topology?
What are the advantages to
Bus doesn't need extra devices, disadvantage is if
using a star physical topology
one problem occurs the whole segment is down.
as opposed to a bus physical
Star can isolate a faulty segment but you need
topology for ethernet. What
hub/repeater.
are the disadvantages?
What is the maximum length
100 meters
for a 1000 base TX segment?
/https://quizlet.com/266699170/exam-1-flash-cards 5/10
2021/‫‏‬6/‫‏‬22
exam 1
exam 1 Flashcards | Quizlet
Ethernet requires a device to sit in the center Study
of
Can a network technology be
the star and link up all systems. This is a Repeater
a physical star, but a logical
or Hub (synonyms) in older half duplex systems. It
bus? What is an example of
is a bridge or switch in modern full duplex
this? What does it mean to be
systems. Modern ethernet (IE 100BaseTX or
a logical bus network?
newer/faster) is an example of this.
Can you run a plain old
Yes, blue and/or brown pair
phone line and a 100mbps
(100TX) ethernet on the same
cat5 cable? If so, which pairs
would you assign to each?
Can you run a plain old
No, GiGE bit Ethernet means all 4 pairs
phone line and a GiGE
ethernet on the same cat5
cable? If so, which pairs
would you assign to each?
Which can move data a
Singlemode
longer distance, Multimode
fiber or Singlemode fiber?
What type (laser or LED) and
1550
wavelength (1310 or 1550) of
optics would you use on a
Singlemode fiber to go the
longest distance?
What type of connector ends
RJ45 or 8P8C
are used for ethernet on UTP
cable?
/https://quizlet.com/266699170/exam-1-flash-cards 6/10
2021/‫‏‬6/‫‏‬22
exam 1 Flashcards | Quizlet
Which pairs
exam
1 in a Cat 5
Orange and green pairs
Study
ethernet cable are used for
100mbps ethernet? What
colors are they marked with?
Upgrade to remove adverts
What is the normally used
Only ₪11.67/month
Yellow
color for a single mode fiber
optic patch cables.
What is the normally used
Orange
color for a multimode mode
fiber optic patch cables.
wavelength-division multiplexing (WDM) is a
What does WDM mean in
technology which multiplexes a number of optical
relation to fiber optic cables?
carrier signals onto a single optical fiber by using
different wavelengths (i.e., colors) of laser light.
Is a single fiber strand of any
No, one channel for each direction
use for standard fiber optic
connections?
What modern technology
WDM
might be used to run a full
duplex connection on a single
fiber?
What is a end station?
One interface
/https://quizlet.com/266699170/exam-1-flash-cards 7/10
2021/‫‏‬6/‫‏‬22
What is 1an intermediate
exam
exam 1 Flashcards | Quizlet
Multiple interfaces
Study
station?
Collison domain:
A collision domain is, as the name implies, a part
of a network where packet collisions can occur. A
collision occurs when two devices send a packet
at the same time on the shared network segment.
The packets collide and both devices must send
the packets again, which reduces network
efficiency. Collisions are often in a hub
environment, because each port on a hub is in the
What is the difference
same collision domain. By contrast, each port on a
between a collison domain
bridge, a switch or a router is in a separate
and a broadcast domain in
collision domain.
ethernet?
Broadcast domain
A broadcast domain is a domain in which a
broadcast is forwarded. A broadcast domain
contains all devices that can reach each other at
the data link layer (OSI layer 2) by using
broadcast. All ports on a hub or a switch are by
default in the same broadcast domain. All ports
on a router are in the different broadcast domains
and routers don't forward broadcasts from one
broadcast domain to another
How far from a 100Mbps
100 meters
repeater can you located a
workstation that is connected
via twisted pair?
If you have a full duplex 100
100 meters, signal continuation
Mbps Ethernet running over a
twisted pair cat 5 copper
cable media, how far away
from the switch can you
locate the end station? What
is the cause of this limitation?
/https://quizlet.com/266699170/exam-1-flash-cards 8/10
2021/‫‏‬6/‫‏‬22
If you have
exam
1 a switch
exam 1 Flashcards | Quizlet
half duplex
Study
connected to a repeater
would you want the switches
port to be set to full or half
duplex?
Does a port which is set to full
no
duplex listen for collisions
when it transmits?
Should you trust that auto-
most of the time
negotiation of duplex and
speed will always work?
If you have two 1000Mbps
single-mode 1310
Ethernet switches that are
linked via fiber optics what
type of fiber optic connection
(and on what type of fiber)
should you use to link the
switches if they are 5
Kilometers apart? (assume
lowest cost solution)
If you have two 1000Mbps
multi-mode 1550
Ethernet switches that are
linked via fiber optics what
type of fiber optic connection
(and on what type of fiber)
would you use to link the
switches if they are 300
meters apart? (assume lowest
cost solution)
/https://quizlet.com/266699170/exam-1-flash-cards 9/10
2021/‫‏‬6/‫‏‬22
exam 1 Flashcards | Quizlet
Two end1 stations are
exam
yes for both ( if you are in the collision domain,
Study
connected to a Hub/repeater.
you always going to be in the broadcast domain )
Are they the same collision
domain? Are they in the same
broadcast domain?
Two end stations are
no for collision domain, yes for broadcast domain
connected to a bridge/switch.
Are they in the same collision
domain? Are they in the same
broadcast domain?
How many bytes does a Vlan
4 octates
tag add to a Ethernet frame?
What is the maximum size of a
1522 ( not on the test )
802.1q Ethernet frame (not
including the preamble)
How many different vlans can
4096
you have on a 802.1q enabled
switch?
/https://quizlet.com/266699170/exam-1-flash-cards 10/10
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Networks & Internet Technologies Final Exam
Study
Networks & Internet Technologies Final Exam
Terms in this set (101)
A communication mechanism
True
with a dedicated path
between two endpoints with
guaranteed isolation is called
circuit switching.
The best example of a packet
False
switched network is the
analog telephone system,
also known and the "Public
Switched Telephone Network"
or "PSTN."
1. A single communication is not affected by
others
Which of the following is a
property of the circuit
2. Circuits are not permanent but created when
switched paradigm?
needed and removed when communication ends
3. Endpoint-to-endpoint communication
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 1/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
a. Small blocks
data
a. Packets
Networks
& of
Internet
Technologies
Final Exam
b. The basis of the Internet
b. Packet Switching
c. Uses Frequency Division
c. Circuit Switching
Study
Multiplexing
d. Packet Switching
d. Uses Statistical Multiplexing
e. Circuit Switching
e. Uses Synchronous Time
Division Multiplexing
f. Packets
f. Varied in size depending on
g. Circuit Switching
technology but commonly
1500 Bytes
h. Packet Switching
g. Can communicate with only
i. Packet Switching
one recipient
h. Can communicate with one
or many recipients
i. Lower in cost due to the
ability to share a single path
a. LAN
a. Local Area Network
b. MAN
b. Metropolitan Area Network
c. WAN
c. Wide Area Network
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 2/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
a. Organizationally
Unique Technologies
a. OUI
Networks
& Internet
Final Exam
Study
Identifier
b. OUI
b. First 24-bits of a MAC
address
c. NIC
c. Network Interface Card
d. MAC Address
d. Ethernet Address
e. MAC Address
e. Media Access Control
f. NIC
address
g. MAC Address
f. Network Interface
Controller
h. MAC Address
g. 90:B1:1C:9B:3A:CC
h.48-bit unique address
01:00:5E:C0:00:08
a. multicast address
.11111111.11111111.11111111.11111111.11111111.11111111
b. broadcast address
One computer gets a copy of the
c. Unicast Address
acket
d. Unicast Address
. 00-50-56-C0-00-08
e. Multicast Address
Some computers get a copy of the
acket
f. Broadcast Address
All computers get a copy of the
g. Broadcast Address
acket
. FF:FF:FF:FF:FF:FF
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 3/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Each frame consists
of twoTechnologies
false Final Exam
Networks
& Internet
Study
parts: The footer and the
payload.
The largest part of a frame is
false
(usually) the header.
In a frame, the payload is
true
transmitted second.
a. It allows for sequences of bits to be reserved
for marking the beginning and end of the frame
Which of the following
statements are TRUE about
bit/Byte stuffing?
b. Once used, the receiving end reverses the
changes automatically
c. Once completed, it ensures the reserved
characters do not appear in the payload.
Network Hardware (NICs) do
true
not understand IP addresses.
Mapping between a protocol
true
address (IP address) and a
hardware address (MAC
address) is called address
resolution.
As a packet travels along a
true
network path from router to
router, the Source and
Destination MAC address
change from hop to hop but
the Source and Destination IP
do not.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 4/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
In an ARP query,
how manyTechnologies
1
Networks
& Internet
Final Exam
Study
computers reply to the
broadcast?
What does ICMP stand for?
Internet Control Message Protocol
What does DHCP stand for?
Dynamic Host Configuration Protocol
Each subnet must have its
false
own DHCP server.
Hosts using IPv6 addresses
true
don't use DHCP because they
generates their own unique
addresses using a multicast
(broadcast) discovery of a
network prefix and the MAC
address (split) for the suffix.
When IPv4 addresses started
true
to become scarce, Network
Address Translation (NAT)
was invented to allow
multiple computers to share a
single global address.
a. 169.254.0.0/16
Which of the following are
designated as PRIVATE
addresses and are nonroutable?
b. 192.168.0.0/16
c. 172.16.0.0/12
d. 10.0.0.0/8
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 5/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
a. Uses a translation
table Technologies
a. Both
NAT Exam
and NAPT
Networks
& Internet
Final
b. Network Address and Port
Study
b. NAPT
Translation
c. NAT
c. Network Address
Translation
d. NAPT
d. Uses port number to
e. Both NAT and NAPT
associate each datagram with
a specific "conversation"
f. Both NAT and NAPT
e. Replaces the IP source
address when sending
datagrams to the Internet
f. Replaces the IP destination
address when receiving
datagrams from the Internet
Most broadband providers
true
provide their customers with a
NAPT device that we
commonly call our "router." In
actuality it is usually a modem,
router, NAT/NAPT, Wi-Fi
access point all wrapped into
one.
Application programs must
false
be aware of the physical
network they are using.
The size of an IP datagram is
false
always the same.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 6/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
The size of each
field of anTechnologies
IP
true Final Exam
Networks
& Internet
Study
header is always the same.
a. source IP
b. checksum
Which of the following are
Header fields in an IPv4
datagram? (select all that
apply)
c. Version
d. Time to Live (TTL)
e. Destination IP
f. Header Length
g. Total Length
IP routers use ________ to
forwarding tables
determine the next hop a
packet will take.
There is one entry in every
false
router for each host on the
Internet.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 7/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
In the following
excerpt from
172.19.0.128/25
Networks
& Internet
Technologies
Final Exam
Study
a router forwarding table,
which entry would apply to a
packet with destination IP 172.19.0.200:
Remember: the MOST specific
route that applies is the one
used.
172.16.0.200/32
172.19.0.0/25
172.19.0.128/25
172.16.0.0/16
172.19.0.0/16
172.0.0.0/8
As an IP datagram is sent over
true
the Internet, the destination
address in the header does
not change.
IP is a guaranteed paradigm
false
meaning that datagrams may
be lost, duplicated, delayed,
delivered out of order, or
delivered with corrupted
data.
An IP datagram is
true
encapsulated in the payload
of a frame for transmission.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 8/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Put the following
in order Technologies
a. 4 Final Exam
Networks
& Internet
Study
starting when a fully formed
frame arrives at the first
b. 2
router. (Note the start point!!!)
c. 3
a. The frame is sent across the
physical network.
d. 1
b. The router reads the IP
datagram destination address
from the header and
calculates the new frame
header (destination MAC
address) using its ARP tables.
c. The router encapsulates the
datagram into the payload of
a new frame
d. The router de-encapsulates
the frame and discards the
old header information
The maximum amount of data
true
a frame can send is called the
Maximum Transmission Unit.
When one network has a MTU
true
of 1500 and the next has an
MTU of 1492 the router
cannot re-encapsulate the
first datagram to send over
the second network.
UDP is the only
true
connectionless transport
protocol.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 9/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
IP lacks an important
feature
true Final Exam
Networks
& Internet
Technologies
Study
necessary for all applications;
it cannot distinguish amongst
different applications on a
single host.
TCP and UDP function on this
layer 4
Layer of the Internet Model.
Which of the following are
1. Can send or receive from many applications
features of UDP? (check all
that apply)
2. Cannot guarantee delivery
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 10/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Match the definitions
with the
a. best-effort
Networks
& Internet
Technologies
Final Exam
Study
features of UDP.
b. Connectionless Paradigm
a. Uses IP for transmission
with no further steps to
c. Connectionless Paradigm
ensure transmission or correct
errors.
d. Message-Oriented interface
b.Applications do not need to
e. end-to-end protocol
set up or tear down a
connection before sending
f. arbitrary modes of interaction
data; it can be sent at any
time.
g. best-effort delivery
c. No state information is
used or saved; No control
messages are used. Data is
the only element of the
transmission.
d. Does not divide up data
into multiple packets or
combine messages for
delivery.
e. Allows an individual
application (not the host
itself) to be an endpoint for
communication.
f. Can send 1-to-1, 1-to-many,
many-to-1 or many-to-many.
g. All the delivery problems of
IP (messages can be lost,
duplicated, delayed,
corrupted or delivered out of
order) still exist and are not
detected or corrected.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 11/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Networks
& Internet
Each UDP message
must fitTechnologies
true Final Exam
Study
inside a single IP datagram. As
a result of the fixed size of IP
headers, and the common
(and small) MTU,
programmers typically limit
UDP messages to prevent
fragmentation.
UDP would be a good
true
protocol to use for live
streaming radio.
Applications use logical port
false
numbers that are independent
of the OS to identify it as an
endpoint.
To keep UDP short, there are
true
no headers just data.
Checksum field is optional in
true
UDP.
To ensure that a particular
true
user datagram was delivered
to the intended host, UDP
sometimes adds information
from the IP layer like source
IP and destination IP but this
is only used to calculate a
checksum, not for delivery
itself. This is called a pseudo
header.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 12/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
TCP uses the &
unreliable
IP Technologies
true Final Exam
Networks
Internet
Study
service to provide reliable
data delivery.
1. A three way handshake must be used to
Which of the following are
establish a connection to a destination before
features of TCP? (check all
sending data.
that apply)
2. Delivered in order, and exactly as sent
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 13/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Match the definitions
with the
a. connection
orientation
Networks
& Internet
Technologies
Final Exam
Study
features of TCP.
b. point-to-point communication
a. Applications must request a
connection before sending
c. complete reliability
data.
d. full duplex communication
b. Each connection has
exactly 2 endpoints.
e. stream interface
c. Guaranteed delivery
f. stream interface
exactly as sent, complete and
in order.
g. reliable startup and graceful shutdown
d. Data can flow in either
direction and from either side
of the connection at any time.
e. Sends a continuous
sequence of data; Data is not
grouped into messages or
records.
f. Sending application data
size is not guaranteed during
delivery.
g. Applications reliably start a
communication, ensures that
all data has been delivered
and then both sides agree to
shut down the connection.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 14/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
TCP provides&a virtual
true Final Exam
Networks
Internet Technologies
Study
connection between
applications. This illusion of a
physical connection is named
as such because it is achieved
through software.
TCP segments and UDP
true
datagrams are encapsulated
in IP packets which are
encapsulated in network
Frames and sent across the
physical medium.
1. End systems might crash or reboot
2. Machines with faster hardware can generate
data faster than slower ones can read and
Which of the following are
interpret said data causing the slower processor
problems that TCP must
to be overrun.
overcome to ensure
reliability? (choose all that
3. Intermediate switches and router can be
apply)
overrun with data from many aggressive hosts
sending on a common link.
4. Messages can be lost, duplicated, corrupted,
delayed, or delivered out of order
To handle duplicate packets
true
and out of order packets, TCP
attached a sequencing
number to each packet. If the
packet is the next expected, it
is passed up to the
application, if not, it is
catalogued and stored until it
is ready to be used.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 15/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
To handle packet
lost, TCP Technologies
false Final Exam
Networks
& Internet
Study
uses negative
acknowledgement with
retransmission. Whenever a
frame does not arrive, a small
message is sent back to the
sender reporting the failure.
A packet will be retransmitted
false
indefinitely until it is received.
To prevent a packet for one
unique
TCP session from being
confused with a different
session, a ________
ID is added to each packet.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 16/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Match the following
a. stop
and go
Networks
& Internet Technologies
Final
Exam
Study
definitions and terms:
b. sliding window
a. When a subsequent packet
is not sent until the previous
c. congestion
packet is acknowledged.
d. retransmission
b. When a group of packets
are sent (continuously) until
acknowledgement of the first
packet in the group arrives.
c. When delivery of packets is
delayed due to the limitations
of the speed of a connection
and the buffer of the
intermediate systems.
d. When TCP does to receive
an acknowledgement within a
specific amount of time, it
sends the packet again.
Complete the following
a. synchronization segment
Abbreviations:
b. acknowledgement
a. SYN
c. finish segment
b. ACK
c. FIN
Which sequence for the
SYN, SYN/ACK, ACK
three-way handshake used to
establish a TCP connection is
correct?
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 17/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
1. source
port
Networks & Internet Technologies
Final
Exam
Study
2. sequence number
Which of the following are
header fields for TCP?
3. checksum
4. destination port
5. acknowledgement number
6. window
Ethernet devices and cabling
false
has remained basically
constant for over 30 years
and new hardware is not
compatible with older
hardware.
The 16-bit type field allows for
true
an Ethernet frame to be used
with multiple protocols like
IPv4 or IPv6.
In the conventional Ethernet
true
frame, the payload cannot be
more than 1500 bytes; in the
IEEE 802.3 standard, it cannot
be more than 1492 bytes.
1. calculates the CRC (used for error checking)
What does a NIC do?
2. recognizes addresses and frames
3. sends and receives frames
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 18/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
The original Ethernet
was Technologies
false Final Exam
Networks
& Internet
Study
called thick net because the
wires used to interconnect
computers were heavy fiber
cables. It was also called
10BASE5.
The next upgrade to Ethernet
true
wiring used a more skinnier
more flexible coaxial cable
and was called thin net or
10BASE2.
The third generation of
true
Ethernet wiring was called
twisted pair Ethernet and (at
least physically) abandoned
the bus model for a central
interconnection called a hub
which directly connected to
each NIC.
Match the Names with their
a. 100BASE-T
Designations.
b. 1000BASE-T
a. fast ethernet
c. 10BASE-T
b. gigabit ethernet
1000BASE-T
c. twisted pair ethernet
d. gig-E
Twisted pair Ethernet uses this
RJ-45
type of connector.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 19/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
For Ethernet,&
there
are twoTechnologies
true Final Exam
Networks
Internet
Study
types of cables, patch(or
straight) and crossover (or
crossed).
A maximum length
true
specification is a fundamental
part of LAN technology.
A repeater is an analog
true
hardware device used to
extend a LAN. It amplifies and
sends all incoming signals to
the other side.
1. Bridges "learn" which computers are connected
to which port/segment by looking into the
headers of incoming frames for MAC addresses.
Which of the following are
true about adaptive bridges?
2. A bridge examines the destination MAC
address in a frame, and does not forward the
frame onto the other LAN segment unless
necessary.
3. They are sometimes also called learning
bridges
A bridged network is faster
true
than a non-bridged one.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 20/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
To prevent a &
cycle
from Technologies
false Final Exam
Networks
Internet
Study
causing an endless loop,
bridges implement an
algorithm that computes a
Distributed Spanning
Exchange. That is, the
algorithm views bridges as
nodes in a graph, and
imposes a tree on the graph.
1. root election
What are the steps of the
Spanning Tree Protocol?
2. shortest path computation
3. forwarding
A hub is an analog device that
true
forwards signals among (all)
computers connected to it
while a switch is a digital
device that forwards packets
to specific ports only.
The acronym VLAN stands for
false
Visual Local Area Network.
Which of the following are
1. VLAN switches allow one switch to act like
true of a VLAN switch? (check
multiple independent switches dividing computers
all that apply)
into separate broadcast domains
VLANs CANNOT operate
false
across multiple switches.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 21/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
The government
(FCC)
true Final Exam
Networks
& Internet
Technologies
Study
regulates the frequencies in
the electromagnetic
spectrum that can be used for
wireless communication.
1. Wi-Max used for mobile broadband
Which of the following are
2. LTE cellular data network
wireless network
technologies?
3. Bluetooth
4. Wi-Fi routers at home
1. PAN
1. Personal Are Network
2. WLAN
2. Wireless Local Area Network
3. MAN
3. Metropolitan Area Network
4. WAN
4. Wide Area Network
Wi-Fi stands for Wireless
true
Fidelity.
The WiFi Alliance is a non-
true
profit organization that
certifies products based off
of the IEEE 802.11 standard.
What is the term for using
spread spectrum
multiple frequencies to send
data increasing performance
and tolerating interference for
wireless?
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 22/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Two hosts communicating
ad hoc
networking
Networks
& Internet Technologies
Final
Exam
Study
with each other directly
without the use of an Access
Point is called:
Most wireless LANs are set up
true
so hosts connect to an access
point which is connected to a
switch/router.
When a host is in range of two
false
wireless access points, it must
associate with a particular AP.
The header of a wireless
false
frame can only have one
destination MAC address.
Two different types of access
true
points exist, cheap dumb
ones that rely on the
computer to choose when to
change their association and
expensive intelligent ones
that coordinate with each
other to provide smooth
handoffs.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 23/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
There are two&classes
of Technologies
false Final Exam
Networks
Internet
Study
WiMAX, Mobile (802.16e) and
Fixed (802.16d):
Fixed WiMAX allows for handoffs between access points
and is used for Wireless
broadband access to laptops
and cell phones.
Mobile WiMAX doesn't allow
for hand-offs and is used for
wireless broadband
connections to buildings and
houses.
1. can cover areas up to 10Km
Which of the following are
2. Can provide transmission speeds of up to
key features of WiMAX?
70Mbps full-duplex at closer ranger
(check all that apply)
3. Allows for both line of sight (LOS) and non line
of sight (NLOS) access
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 24/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
Match the following
PAN Technologies
a. bluetooth
Networks
& Internet
Final Exam
Study
Technologies with their
features or definitions:
b. ultra wideband (UWB)
a. 802.15.1a
c. zigbee
b.802.15.3a
d. bluetooth
c. 802.15.4
e. bluetooth
d. Up to 721 Kbps @5m
f. zigbee
e. Uses 1 frequency band
g. ultra wideband (UWB)
f. Uses 3 frequency bands
h. bluetooth
g. Uses many frequency
i. zigbee
bands (spectrum)
h. Used to replace cabling for
peripherals
i. Used for home automation
and remote controlled
devices
1. Transmission range and speeds vary
considerably but typical applications are seen at
rates up to 16Mbps and distances around 5m
Which of the following are
true about Infrared wireless
2. Signal reflects off objects and cannot not go
technology? (check all that
through them.
apply)
3. Transmission is directional in a 30 degree cone
4. Often used in remote controls
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 25/26
2021/‫‏‬6/‫‏‬22
Networks & Internet Technologies Final Exam Flashcards | Quizlet
1. HasFinal
limitedExam
distance
Networks & Internet Technologies
Study
Which of the following are
2. Used to "tag" items and devices for inventory
true about RFID? (check all
control, and detection, and embedding digital
that apply)
data.
3. Short for Radio Frequency Identification
Wireless WAN technologies
false
can be divided into two
categories, Cellular and
Metropolitan communications
systems.
Ideally, each cell tower forms
true
a hexagon because the cells
can be arranged in a
honeycomb. In practice,
cellular coverage is not
perfect and transmits in a
circular pattern.
In practice, all cells are the
false
same size.
Interference can be
true
minimized if adjacent cells
use different frequencies.
/https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 26/26
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Midterm Answers
Study
Midterm Answers
Terms in this set (87)
In 1980, the Internet was a
A. Less than 100 sites
research project that
involved:
Computer networking is easy
False
for a beginner because there
is a single underlying theory
that explains the relationship
among all parts.
Early communications
False
networks such as the
telegraph and telephone
systems use packets to send
information.
Packet switching is the basis
True
for the modern Internet.
A. a concept
In the 1970s, the Internet was:
B. a revolution in computer networking
C. a set of standards
D. proposed by Vinton Cerf and Robert Kahn
/https://quizlet.com/135114631/midterm-answers-flash-cards 1/15
2021/‫‏‬6/‫‏‬22
Because theAnswers
Internet tolerates
Midterm
Midterm Answers Flashcards | Quizlet
False
Study
heterogeneity, engineers can't
experiment with new
networking technologies
without disrupting existing
networks.
For communication to be
True
successful across networks,
all entities must agree on how
information will be
represented and
communicated.
The term protocol refers to a
True
specification for network
communications.
Multiple protocols designed
True
to work together in a
complete, cooperative set are
called a suite.
Protocols in a suite are
True
furthermore collected into a
unified whole known as a
layering model.
Protocol implementations
True
follow the layering model by
passing the output from a
protocol in one layer to the
input of a protocol in the next
layer.
/https://quizlet.com/135114631/midterm-answers-flash-cards 2/15
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
A pair of protocols
in
Midterm
Answers
True
Study
adjacent layers pass a pointer
to the packet rather than
create a new copy.
Upgrade to remove adverts
As data passes down through
Only ₪11.67/month
Added
the protocol layers on the
sending computer, headers
are:
The TCP/IP protocol suite that
A. 5
is widely used today
corresponds to a model that
contains how many layers?
The primary motivation for
False
early computer networks was
email due to computers being
large and expensive.
/https://quizlet.com/135114631/midterm-answers-flash-cards 3/15
2021/‫‏‬6/‫‏‬22
The Advanced
Research
Midterm
Answers
Midterm Answers Flashcards | Quizlet
B. ARPANET
Study
Projects Agency, an agency of
the US. Department of
Defense, gathered
researchers and contractors
together to produce a
working data network known
as ? .
As the Internet experienced
A. focus on new applications
exponential growth over the
B. increase in communication speeds
past 25 years, it changed in
the following ways:
A. audio
Multimedia is Data that
B. video
contains a combination of ?
D. text
E. graphics
A. traditional communications systems adopting
Recent trends in computer
networks and the Internet
include:
Internet technology
B. high-quality teleconferencing
C. cloud computing
D. social networking applications
E. sensor networks
Which of the following
A. The pair uses the connection to exchange data
statements describe a
C. A pair of applications requests a connection
connection-oriented
interaction?
What handles initiating
B. application programs
contact with and accepting
contact from a remote
computer?
/https://quizlet.com/135114631/midterm-answers-flash-cards 4/15
2021/‫‏‬6/‫‏‬22
In the client-server
paradigm,
Midterm
Answers
Midterm Answers Flashcards | Quizlet
True
Study
the server software waits
passively for contact, while
the client software actively
initiates contact.
Boiling it down to its core
True
definition, server software
consists of a program
dedicated to providing a
service.
A client can access multiple
True
services but typically contacts
only one remote server at a
time.
B. A program that waits passively for
communication
A server can be defined as:
C. A computer that has fast CPU, large memory,
and powerful operating system
D. A computer dedicated to running one or more
server programs
Can a computer operate
Yes
multiple clients and even
multiple copies of a single
application?
Can a computer run multiple
Yes
server programs?
/https://quizlet.com/135114631/midterm-answers-flash-cards 5/15
2021/‫‏‬6/‫‏‬22
Can consolidating
multiple
Midterm
Answers
Midterm Answers Flashcards | Quizlet
Yes
Study
server programs on a single
computer reduce cost
without significantly reducing
performance?
How does a client identify a
A - 1. Computer
server on the Internet?
B - 2. Service
A. Internet Protocol address
B. Protocol port number
When a request arrives at a
False
server, software on the server
uses the IP address to
determine which application
on the server computer
should handle the request.
A server can act as a client.
True
If only one server provides a
True
given service, the network
connection that connects the
server to the Internet can
become a bottleneck.
If a ______ architecture is
C. peer-to-peer
implemented in server code,
data is distributed equally
among a set of N servers.
In the real world, a p2p
False
system enables extremely
large traffic to one computer
because N can be extremely
small.
/https://quizlet.com/135114631/midterm-answers-flash-cards 6/15
2021/‫‏‬6/‫‏‬22
The primaryAnswers
example of
Midterm
Midterm Answers Flashcards | Quizlet
D. TCP/IP
Study
communications software that
enables clients and servers to
interoperate is:
The amount of work done on
B. thick client
a client vs. a server varies
across server software. In
which model is application
processing, graphic rendering
and storage all offloaded
from the server to the client?
In the thin client model, the
True
server handles more of the
work relative to the thick
client model.
In a three-tier client/server
B. backend server
architecture, the following
D. client/user machine
types of machines are found:
F. middle-tier/gateway server
The World Wide Web is:
C. One of many services in use on the Internet
A. a markup language
HTML can be defined as:
B. declarative
C. a representation standard
/https://quizlet.com/135114631/midterm-answers-flash-cards 7/15
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
Match the term
to its place in
Midterm
Answers
A - 1. document name
a Uniform Resource Locator.
C - 2. computer name
Study
E - 3. protocol
vvv://www:xxx/yyy?zzz
B - 4. port
D - 5. parameters
A. yyy
B. xxx
C. www
D. zzz
E. vvv
In terms of the client-server
True
model, a browser is a client
that extracts a server name
from a URL and contacts the
server.
A browser can significantly
A. cache
reduce download time by
saving images in a _____ .
FTP handles both uploading
True
and downloading of any type
of data.
An FTP client allocates a
B. port
random ______ before sending a
request to the server on a
known _____. (same word for
both answers)
In the original architecture of
B. mail transfer application
Internet email service, what
component acted as both a
client and server?
/https://quizlet.com/135114631/midterm-answers-flash-cards 8/15
2021/‫‏‬6/‫‏‬22
The MIME standard
encodes
Midterm
Answers
Midterm Answers Flashcards | Quizlet
A. printable letters
Study
non-text attachments as _______
Match each part of the
C - 1. xxx
domain name below.
B - 2. yyy
A - 3. zzz
xxx.yyy.zzz
A. top-level domain
B. group or organization
C. individual computer
No computer can run a web
False
server unless the computer's
domain name starts with
www.
What does DNS stand for?
The name resolution process
C. Domain Name System
False
involves a resolver that forms
a DNS reply message and
waits for a DNS request
message.
An email program using SMTP
False
requests a mail exchange
(MX) record from the DNS
database. A MAC address is
returned in response.
The best way to form large
False
networks is to simply
interconnect the wires from
one to another.
/https://quizlet.com/135114631/midterm-answers-flash-cards 9/15
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
Which of the
following
Midterm
Answers
A. Network Hardware (Layer 1)
incompatibilities prevent two
B. Frames (Layer 2)
networks from simply being
C. Addresses (Layer 3)
Study
directly connected
(bridged)?
There is only one internet,
False
THE Internet.
What is/are the basic
C. router
component(s) used for
interconnecting
heterogeneous networks?
What is the minimum number
A. 1
of routers that can be used to
connect 4 networks?
Using multiple routers
True
improves reliability and avoids
a single point of failure by
sending traffic along an
alternate path if a link fails.
Internet protocol software
False
shows the detailed
information of the physical
network connection such as
the IP address, MAC address,
DNS server, default router,
and the route a packet takes.
/https://quizlet.com/135114631/midterm-answers-flash-cards 10/15
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
Match the Layer
with its
Midterm
Answers
A - 1. Physical
description in the TCP/IP
B - 2. Network Interface (MAC)
Model
D - 3. Internet (IP)
A. Layer 1
E - 4. Transport (TCP)
B. Layer 2
C - 5. Session
C. None
C - 6. Presentation
D. Layer 3
F - 7. Application
Study
E. Layer 4
F. Layer 5
A. Apple iPhone 6 Plus
B. Sonos PLAY:5 Speakers
C. GE Profile™ Series 30" Built-In Double
Which of the following could
Convection Wall Oven with Brillion Technology
be a host? (look up the
(look this one up!!)
product if you are unsure of
D. Dell Optiplex 9020 MiniTower
the features)
E. Samsung UHD 4K HU8550 Series Smart TV
H. Titan Supercomputer in Oak Ridge National
Laboratory
I. Jawbone Era Bluetooth Headset
Changing IPv4 to IPv6 is easy
False
as it only requires a change to
one part of the Internet.
A. abstract
IP Addresses are: (select all
B. uniform
that apply)
C. independent from MAC addresses
D. unique
_____ uses 32-bit addresses and
IPv4
____ uses 128-bit addresses.
IPv6
An IP address is a ______
B. binary
number assigned to a host
and used for all
communication with the host.
/https://quizlet.com/135114631/midterm-answers-flash-cards 11/15
2021/‫‏‬6/‫‏‬22
On a single Answers
network, two
Midterm
Midterm Answers Flashcards | Quizlet
True
Study
computers cannot have the
same IP address.
How many primary classes
3
did the original classful IP
addressing scheme divide
IPv4 into?
onsider the classful addressing
Class Identifier
cheme:
Prefix
the following Class C IP address
Suffix
written in binary for your benefit)
ach part has a name. What are they?
P address:
000000.10101000.00000000.00000001
00----.--------.--------.---------0000.10101000.00000000.-------------.--------.-------.00000001
Unicasting still uses Class D
False
addresses for delivery to a set
or group of computers on the
same network.
Which IP addresses are
A. 10.9.8.7
properly formatted in dotted
D. 172.16.45.222
decimal notation?
F. 255.255.255.255
/https://quizlet.com/135114631/midterm-answers-flash-cards 12/15
2021/‫‏‬6/‫‏‬22
Midterm Answers
Which of the following
describes the logic AND used
in calculating netmasks?
Your computer has been
Midterm Answers Flashcards | Quizlet
1&1=1
Study
1&0=0
0&1=0
0&0=0
C. 172.16.128.64/26
configured in the following
way: 172.16.128.67 mask
255.255.255.192
How would you represent the
network you are on in CIDR
notation?
Match the following special
B - 1. Directed Broadcast Address
IPv4 addresses
A - 2. Limited Broadcast address
A. 255.255.255.255
C - 3. Loopback Address
B. 192.168.0.255
D - 4. network address
C. 127.0.0.1
E - 5. This computer
D. 192.168.0.0
E. 0.0.0.0
A router must have multiple IP
True
addresses to "route" packets
from one network to another.
In an IPv6 address, the
True
interface address/suffix is
always constant and of length
64bits.
What are the three parts of an
IPv6 address?
A. Subnet
C. Global Prefix
D. Interface
/https://quizlet.com/135114631/midterm-answers-flash-cards 13/15
2021/‫‏‬6/‫‏‬22
Midterm Answers
Which of the following is an
IPv6 address in proper
notation
A communication mechanism
Midterm Answers Flashcards | Quizlet
A. ABCD::4
Study
B. FE80::2AA:FF:FE9A:4CA2
C. 2607:f8b0:4004:806::1013
D. FE80:0:0:0:02AA:00FF:FE9A:4CA2
Circuit Switching
with a dedicated path
between two endpoints with
guaranteed isolation is called
_________ _____________
The best example of a circuit
True
switched network is the
analog telephone system,
also known and the "Public
Switched Telephone Network"
or "PSTN"
B. a single communication is not affected by
Which of the following is a
others
property of the circuit
C. circuits are not permanent but created when
switched paradigm?
needed and removed when communication ends
D. Endpoint-to-endpoint communication
C - 1. Small blocks of data
A - 2. The basis of the Internet
B - 3. Uses Frequency Division Multiplexing
A - 4. Uses Statistical Multiplexing
Match the term with it's
B - 5. Uses Synchronous Time Division
definition:
Multiplexing
A. Packet switching
C - 6. Varied in size depending on the technology
B. Curcuit Switching
but commonly 1500 Bytes.
C. Packets
B - 7. Can communicate with only one recipient
A - 8. Can communicate with one or many
recipients
A - 9. Lower in cost due to the ability to share a
single path
/https://quizlet.com/135114631/midterm-answers-flash-cards 14/15
2021/‫‏‬6/‫‏‬22
Midterm Answers Flashcards | Quizlet
Complete the
following
Midterm
Answers
Local
categories of Packet Switched
Metropolitan
Networks:
Wide
Study
LAN: ______ Area Network
MAN: _________ Area Network
WAN: ______ Area Network
D - 1. Organizationally Unique Identifier
D - 2. First 24-bits of a MAC address
Match the following terms
B - 3. Network Interface Card
and descriptions
A - 4. Ethernet Address
A. MAC address
A - 5. Media Access Control address
B. NIC
B - 6. Network Interface Controller
C. N/A
A - 7. 90:B1:1C:9B:3A:CC
D. OUI
A - 8. 48-bit unique address
C - 9. unicast
C - 10. multicast
A - 1. FF:FF:FF:FF:FF:FF
Match the following
A. Broadcast Address
B. Multicast Address
C. Unicast Address
A - 2. 11111111.11111111.11111111.11111111.11111111.11111111
A - 3. All computers get a copy of the packet
C - 4. One computer gets a copy of the packet
C - 5. 00-50-56-C0-00-08
B - 6. 01:00:5E:C0:00:08
B - 7. Some computers get a copy of the packet
Each frame consists of two
Header
parts: The _______ and the
Payload
_________
The largest part of a frame is
False
(usually) the header
In a frame, the payload is
True
transmitted second.
/https://quizlet.com/135114631/midterm-answers-flash-cards 15/15
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
Home / Other / Computer Skills / Cisco Systems
Computer Networking Fundamentals Student Test Bank
Study
Computer Networking Fundamentals Student Test Bank
Terms in this set (142)
What is the first octet range for a class C IP
192 - 223
address?
In computer networks a loss in signal strength
attenuation
measured in decibels is referred to as:
Which networking device uses NAT?
Router
Which one of the following is an example of a
192.168.0.1
loopback address?
Which communication method refers to the
Half Duplex
transmission of data in just one direction at a
time?
Which one of the following correctly describes
A protocol that handles error and control messages.
ICMP?
Identify a feature of fibre optic cable.
Immunity to electromagnetic interference
TCP port 80 is associated with which application
HTTP
layer?
Which one of the following WAN link connection
Public internet connection.
options best describes a cable modem
connection?
The cabling junction box, located on the
The demarcation point
customer premises, that connects the customer
premises equipment to the local loop is termed?
Which one of the following encryption algorithms
AES
is an example of asymmetric encryption?
Identify the a type of VPN access
Remote Access
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 1/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
Computer Networking Fundamentals Student Test Bank
Upgrade to remove adverts
Which ITU-T standard for synchronous
Study
Only ₪11.67/month
V.35
communications uses a 34-pin rectangular
connector?
What is the maximum signaling rate of an HSSI
52 Mbps
WAN link?
Which one of the following WAN connection links
PPP
involve Call setup?
Which one of the following is best for suited for
ATM
simultaneous use of voice and data?
Which one of the following is a circuit switched
ISDN
communication link?
Which one of the following devices is commonly
CSU/DSU
used as a DCE?
What characteristic of UTP cabling helps avoid
Twisting of pairs.
crosstalk?
Which one of the following IP addresses is a
224.0.0.2
multicast destination address?
Which of the following type of connection
Switch to Router
requires a straight through UTP cable?
Which type of broadcast is sent to all hosts on a
Direct Broadcast
network and may be forwarded by a router of the
router?
A router separates a computer network into:
Which one of the following is the valid host range
Broadcast Domains
194.30.1.1 - 254
for the network ID 194.30.1.0 with a default subnet
mask?
Which one of the following ranges are
1-1023
considered 'well known' port numbers?
In which layer of the OSI model is routing
Network
performed?
Which transport layer protocol provides a
UDP
connectionless service between hosts?
What protocol is used to find the hardware
ARP
address of a local device?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 2/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
What is the purpose
of a subnet
mask in IP
To determine
Computer
Networking
Fundamentals
Student Test
Bank the network ID of a host from its IP address.
Study
addressing?
What subnet mask would be used with the hosts
255.255.252.0
on the 160.40.1.0/22 network?
What is one of the primary functions of a router?
Which protocol is associated with layer 4 of the
To forward packets towards their destination.
UDP
OSI model?
How many bits are in an Ethernet MAC address?
The Domain Name System (DNS) is primarily used
48
determine the IP address of a host given its symbolic name
to:
Which transport layer protocol is responsible for
TCP
reliable delivery of data?
Which one of the following address ranges is
224.0.0.0 - 224.0.0.255
reserved for 'well known' multicast addresses?
What class of IP address is 224.40.5.16?
D
In the OSI model which is the correct order of
Data, Segment, Packet, Frame, Bitstream
data encapsulation?
At which layer of the OSI model does a router
3
exist?
How many layers are in the OSI model?
7
Which technology is used to efficiently transport
QoS
Voice over IP (VoIP) traffic?
Which one of the following is the main standard
IEEE 802.15
for Bluetooth?
Data confidentiality can be ensured by which
Authentication
component of VPN technology?
Which IPsec security protocol should be used
ESP
when confidentiality is required?
Which one of the following is true about an IEEE
It has no access points.
802.11 Wireless LAN . Independent Basic Service
Set (IBSS) topology?
Which of following cable type is designed to
CAT 5e
carry up to 1000 Mbps signals?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 3/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
Which of the following
is a characteristic
of a
Fault Tolerance
Computer
Networking
Fundamentals
Student Test
Bank
Study
computer network?
What is the role of QOS in a converged network?
Establishes delivery priorities for different communication types in a network.
Why is single mode fibre-optic cable preferred
It has less dispersion of light.
for longer distances over multi- mode fibre optic?
Which device should be used for enabling a host
Router
to communicate with another host on a different
network?
The XYZ company has two offices, one
MAN
downtown, and a brand new office in the newer
section of town. To connect the two offices, they
will need a dedicated line, probably leased from
the local phone company. What type of network
will they be implementing to connect their two
offices?
What is one of the disadvantages of a peer-to-
limited security
peer network compared to a server-based
network?
When data is being prepared for transmission
encapsulation
onto the network, it is broken into small pieces
and a header and trailer are added to each piece
to help identify it. What is this process called?
Which part of the network communication
NIC driver
process is responsible for sending and receiving
data to and from the network media?
You have just started a new business. You need to
peer-to-peer network
have three to four workstations available for your
employees who simply need to share some files
and a printer, but you don't have a large budget.
Security is not a major concern, but costs are.
What type of network would be the most
appropriate for your situation?
You're the network administrator for a company
WAN
located in Arizona that has just opened an office
in Texas. You need to make sure that the two
locations can communicate. What type of
network are you implementing?
In a physical bus topology, both ends of the
signal bounce
medium must be terminated in order to prevent
what?
What does the frame trailer consist of in an
cyclic redundancy check
Ethernet frame?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 4/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
What is the IEEE
standard governing
wireless
802.11 Bank
Computer
Networking
Fundamentals
Student Test
Study
networking?
What is the main advantage of a point-to-point
data travels on a dedicated link
topology?
What is the media access method used by
CSMA/CD
Ethernet?
What type of logical topology is at work when
logical bus
using an Ethernet hub?
When discussing Ethernet standards, what does
the transmission speed, the type of transmissions, and the length or type of
the XBaseY terminology refer to?
cabling
When using UTP cabling, what is the maximum
100 meters
cable length that can be used from the NIC to a
hub or switch?
Which of the following is NOT a characteristic of
operates in half-duplex only
Unshielded Twisted Pair cabling?
Which of the following is NOT an advantage of a
provides redundancy and fault tolerance
physical star?
What are all of the connections in a network
cable plant
considered, including the cables and their
connectors?
What is a disadvantage of using fiber-optic
difficult to install
cabling?
What is the term used that defines network
structured cabling
cabling in the work area and between
telecommunications closets and equipment
rooms?
What type of wiring should be used for a high-
fiber-optic cabling
speed connection between two buildings?
When a signal travels across network medium, it
attenuation
signal loses strength the further it gets from the
transmitting station, to the point where the
receiving station can no longer interpret the
signals correctly. What is the term for this
phenomenon?
Which of the following connections might require
switch to switch
a crossover cable?
Which of the following is a length of cable that
patch cable
connects a computer to either a networking
device or to an RJ-45 jack?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 5/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
How many bits
are available inFundamentals
an IPv6 network Student Test
16
Computer
Networking
Bank
Study
for creating subnets when the prefix is /48 and
the host ID is 64 bits?
In what layer does the NIC operate?
Network Access
The last 64 bits of an IPv6 address are the
the MAC address
interface identifier. Where is that number derived
from?
The Transport layer deals with which unit of
segment
information?
What is the decimal equivalent to the binary
193
number 11000001?
Which of the following is not a function of the
delivers packets efficiently
Network Access layer?
Which part of a computer's IP address
subnet mask
configuration indicates the portion of the address
that specifies the network ID?
You are the network administrator for a company
PAT
that uses a private addressing scheme for its
internal network. You have 300 workstations that
regularly access the Internet. What process must
be in operation on your network to allow all the
workstations to have access to the Internet using
only one public IP address?
At each layer of the OSI model, data is appended
encapsulation
to the original message and then sent on to the
next lower layer. What is this process called?
At what layer do NICs operate?
Data Link
The Transport layer segments data into smaller
MTU
chunks, the size of which is determined by which
of the following?
What information would you find in the header of
window size
a Transport layer PDU?
What layer is responsible for making sure that the
6
data that it sends and receives is in a format that
the receiving and sending computers can
understand?
Which is the IEEE standard that sets the standards
802.11
for wireless networking?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 6/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
Which layer isNetworking
responsible forFundamentals
determining the Student Test
Network
Computer
Bank
Study
best path a packet should travel across an
internetwork?
Which layer is responsible for establishing a
Session
connection between the source and destination?
Which layer of the OSI model is responsible for
Presentation
encryption and decryption?
You are working at the help desk and you get a
Network layer device
message that a user cannot access the Internet.
You open a command prompt, ping the
workstation's IP address, and get a response. You
ask the user to try the Internet again. He does so
with the same result— no connection. Which type
of device is most likely to be the problem?
Besides a managed switch, what is a high-end
smart
switch that offers features such as multicast
processing and port security called?
Each interface on a router must have an IP
MAC address
address and what else to be able to communicate
on the network?
When an access control list is applied on a
packet filtering
router's interface, that interface is performing a
specific function on the packets that it receives.
What is that function called?
Which is the PCI bus type that has the highest
PCIe
possible transfer rate?
Which of the following combinations will you find
MAC address/switch port number
in a switching table?
Which of the following is not a function that
the ability to transfer it's switching table with neighboring switches
would be found in a managed switch?
Which of the following is the fastest switching
cut-through
mode?
Which of the following is the switching protocol
STP
that is used to eliminate the possibility of
switching loops?
Which common e-mail protocol allows the user to
IMAP
access messages, yet still have them stored on
the server?
A MAC address is composed of two 24-bit
It's the organizationally unique identifier for the manufacturer of the device.
numbers. What does the first 24-bit number
represent?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 7/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
A wireless router
is actually composed
of three Student Test
a router
and a switch
Computer
Networking
Fundamentals
Bank
Study
devices, a wireless access point and which two
other devices?
At which layer would you find errors that were
Physical
caused by EMI?
Every NIC is embedded with a unique address
MAC address
that consists of a 12-digit hexadecimal value. What
is this address called?
The switch reads each frame and makes a note of where each MAC address
How does a switch "learn" MAC addresses?
came from.
How many bits are in an IPv6 address?
128
In wireless networks, what type of media access
CSMA/CA
control is used?
Just as a switch keeps records of MAC addresses
ARP
that it has learned, so does your computer. What
protocol does your computer use to learn MAC
addresses?
TCP establishes a connection with the destination
three-way handshake
device using which process?
What command would you issue from the
ping IPaddress
command prompt to test whether your computer
has connectivity to the network?
What does it usually mean when the activity light
It is communicating with the network.
on a switch is blinking?
What is one of the disadvantages of a server-
additional costs
based network compared to a peer-to-peer
network?
What is the IEEE standard that governs all forms
802.3
of Ethernet media?
What is the main disadvantage of cable modem
It uses a bus topology.
networking?
What is the maximum cable length for both
100 m
category 5e and category 6 UTP cable?
What is the most common topology and
switched / Ethernet
technology combination in use today?
What is the way in which bit signals are
encoding
represented on the network medium?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 8/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
What was the Networking
primary reason Fundamentals
to create a
share Bank
resources, communicate with e-mail, share information
Computer
Student Test
Study
network?
When a frame is received, which component
switch
reads the source and destination MAC addresses,
looks up the destination to determine where to
send the frame, and forwards it out the correct
port?
When referring to network bandwidth, what is the
bits per second
basic unit of measurement?
Which layer has been subdivided into the Logical
Data Link
Link Control sublayer and the Media Access
Control sublayer?
Which layer is responsible for the encoding of
1
signals?
Which of the following is NOT a component of an
4-byte frame check sequence
Ethernet frame header?
Which of the following is not a true statement
It determines the path used based on the destination IP address.
regarding the function of a switch?
Devices on a hub have to share the available bandwidth; switches are intelligent
Why is the use of a switch preferred over a hub?
- they read the frame and determine where to send it; switches can operate in
full-duplex mode.
What directory service protocol used in Linux
LDAP
systems is also supported by Windows?
What is a partial copy of a VM that is used to
snapshot
restore it to a previous state?
What is the native file-sharing protocol in Linux?
What method does the CPU use to divide its
NFS
time slicing
computing cycles between more than one
process?
Which edition of Windows Server 2008 includes
Datacenter Edition
support for up to 64 processors and provides
unlimited virtual instances?
Which of the following virtualization products
VMware Workstation
provides hosted virtualization?
You are testing out a new DHCP server and want
host-only
to make sure that it does not interfere with your
current network. What option would you use to
configure your network adapter using VMware
workstation?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 9/10
2021/‫‏‬6/‫‏‬22
Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet
The 802.11i standard
is the newest
version of
WPA2Bank
Computer
Networking
Fundamentals
Student Test
Study
wireless security that uses more advanced
encryption methods than the previous versions.
What is it more commonly referred to as?
What is a policy that defines the methods
authentication
involved when a user logs on to the network
called?
What process, available on most routers, will help
NAT
improve security by masking the internal IP
address of the transmitting device?
Which of the following is a scanner used as a tool
Port
to determine what possible points of entry exist
that are open and vulnerable on your system?
Which protocol is used to encrypt data as it
IPSec
travels a network?
After you have set up a network for a small
Telnet
business, you may need to access the network
remotely to provide support for the users. Which
remote access option should not be used unless
a secure connection can be established first?
Before you purchase any software for a small
EULA
business, especially the OS, you should be aware
of the number of users that are allowed to access
the software. What document will give you that
information?
You have been asked to install a VPN remote
Routing and Remote Access Service (RRAS)
access solution using Windows Server.What do
you need to install?
Which command will display the configured IP
ipconfig /all
address, default gateway, and DNS servers for a
Windows workstation?
You are currently troubleshooting a network issue
tests that the local IP stack is functioning
with your ISP's customer support agent. The agent
requests that you open up command prompt and
type "ping 127.0.0.1". What does this accomplish?
/https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 10/10
2021/‫‏‬6/‫‏‬22
Computer Networks Test - Sanfoundry
Computer Networks Questions & Answers –
IPv6 Addressing
« Prev
Next »
This set of Computer Networks test focuses on “IPv6 Addressing”.
1. Dual-stack approach refers to _________
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) Implementing a MAC address with 2 stacks
View Answer
Answer: c
Explanation: Dual-stack is one of the approaches used to support IPv6 in already existing
systems. ISPs are using it as a method to transfer from IPv4 to IPv6 completely eventually due
to the lower number of possible available addresses in IPv4.
advertisement
2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to
each other by intervening IPv4 routers. The best solution here is ________
a) Use dual-stack approach
b) Tunneling
/https://www.sanfoundry.com/computer-networks-questions-answers-test 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Test - Sanfoundry
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tunnel in which at the sender’s side, the IPv6
datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is
stripped and the IPv6 packet is sent to the receiver.
3. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is
represented by bits ______
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Teredo is a technique through which gives the possibility for full IPv6 network
connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the
datagram represents obfuscated 1Pv4 address of the IPv4 network.
advertisement
4. A link local address of local addresses is used in an _______
a) Isolated router
b) Isolated mask
c) Isolated subnet
d) Isolated net
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-test 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Test - Sanfoundry
Answer: c
Explanation: Isolated subnet is very huge sharing network area in this link local address of
local addresses is used. A link local address can be configured on any subnet with the prefix
“FE80::”.
5. In subcategories of reserved address in IPv6, address that is used by a host to test itself
without going into network is called _________
a) Unspecified address
b) Loopback address
c) Compatible address
d) Mapped address
View Answer
Answer: b
Explanation: In subcategories of reserved address in IPv6, address that is used by a host to
test itself without going into network is called loop back address. IPv6 loopback address is
0000:0000:0000:0000:0000:0000:0000:0001. IPv4 loopback address is 127.0.0.1. It’s a reserved
address.
6. A few leftmost bits in each address of IPv6 address define its category is called ________
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type
View Answer
Answer: a
Explanation: Prefix is the bits in the IP address which are placed in leftmost position. A
network prefix in IPv6 is given by a CIDR format-liked number at the end of the address.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-test 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Test - Sanfoundry
7. In IPv6 addresses, addresses that start with eight 0s are called ________
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses
View Answer
Answer: d
Explanation: In IPv6 address format, the starting bits are specified with eight 0s to represent
reserved addresses. These reserved addresses have a certain function pre-defined like the
loop-back address is used to test a network card. Reserved addresses cannot be allotted to a
machine.
advertisement
8. Which statement(s) about IPv6 addresses are true?
a) Leading zeros are required
b) Two colons (::) are used to represent successive hexadecimal fields of zeros
c) Two colons (::) are used to separate fields
d) A single interface cannot have multiple IPv6 addresses of different types
View Answer
Answer: b
Explanation: In order to shorten the written length of an IPv6 address, successive fields of
zeros may be replaced by double colons. In trying to shorten the address further, leading
zeros may also be removed. Just as with IPv4, a single device’s interface can have more than
one address; with IPv6 there are more types of addresses and the same rule applies. There
can be link-local, global unicast, and multicast addresses all assigned to the same interface.
/https://www.sanfoundry.com/computer-networks-questions-answers-test 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Test - Sanfoundry
9. When was IPv6 launched?
a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
d) June 6, 2012
View Answer
Answer: d
Explanation: IPv6 is the latest version of the Internet Protocol released on 6th June 2012. An
IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in
IPv6.
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for tests, here is complete set of 1000+ Multiple
Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – IPv6
» Next - Computer Networks Questions & Answers – P2P Applications
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-test 5/7
2021/‫‏‬6/‫‏‬22
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Wireless LAN
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Wireless LAN”.
1. What is the access point (AP) in a wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless devices
itself
d) all the nodes in the network
View Answer
Answer: a
Explanation: Access point in a wireless network is any device that will allow the wireless
devices to a wired network. A router is the best example of an Access Point.
advertisement
2. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 1/7
2021/‫‏‬6/‫‏‬22
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
c) nodes are not required
d) all nodes are access points
View Answer
Answer: a
Explanation: An ad-hoc wireless network is a decentralized kind of a wireless network. An
access point is usually a central device and it would go against the rules of the ad-hoc network
to use one. Hence it is not required.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
View Answer
Answer: b
Explanation: CSMA/CA stands for Carrier-sense multiple access/collision avoidance. It is a
multiple access protocol used by IEEE 802.11 standard for wireless LAN. It’s based on the
principle of collision avoidance by using different algorithms to avoid collisions between
channels.
advertisement
4. In wireless distribution system __________
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 2/7
2021/‫‏‬6/‫‏‬22
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: A Wireless Distribution System allows the connection of multiple access points
together. It is used to expand a wireless network to a larger network.
5. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
View Answer
Answer: c
Explanation: A wireless network interface controller works on the physical layer and the data
link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode
access point is not required.
advertisement
6. In wireless network an extended service set is a set of ________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
View Answer
Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN architecture and is
used to expand the range of the basic service set by allowing connection of multiple basic
service sets.
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 3/7
2021/‫‏‬6/‫‏‬22
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
View Answer
Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded on multiple
carrier frequencies. It is also used in digital television and audio broadcasting in addition to
Wireless LANs.
advertisement
8. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
View Answer
Answer: a
Explanation: Collision detection is not possible in wireless LAN with no extensions. Collision
detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless
LANs.
9. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 4/7
2021/‫‏‬6/‫‏‬22
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
d) security algorithm for emails
View Answer
Answer: b
Explanation: WEP is a security algorithm for wireless network which intended to provide data
confidentiality comparable to that of traditional wired networks. It was introduced in 1997.
advertisement
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
View Answer
Answer: a
Explanation: WPA or WiFi Protected Access is a security protocol used to provide users and
firms with strong data security and protection for their wireless networks (WiFi) to give them
confidence that only authorized users can access their network.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 5/7
2021/‫‏‬6/‫‏‬22
IPv6 - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
IPv6
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv6”.
1. The size of an IP address in IPv6 is _________
a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses
are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant
alternative in case IPv4 runs out of possible new addresses.
advertisement
2. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
/https://www.sanfoundry.com/computer-networks-mcqs-ipv6 1/7
2021/‫‏‬6/‫‏‬22
IPv6 - Computer Networks Questions & Answers - Sanfoundry
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results in faster
processing of the datagram. There is one fixed header and optional headers which may or
may not exist. The fixed header contains the mandatory essential information about the
packet while the optional headers contain the optional “not that necessary” information.
3. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: The traffic class field is used to specify the priority of the IP packet which is a
similar functionality to the Type of Service field in the IPv4 header. It’s an 8-bit field and its
values are not defined in the RFC 2460.
advertisement
4. IPv6 does not use _________ type of address.
a) broadcast
b) multicast
c) anycast
d) unicast
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-ipv6 2/7
2021/‫‏‬6/‫‏‬22
IPv6 - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: There is no concept of broadcast address in IPv6. Instead, there is an anycast
address in IPv6 which allows sending messages to a group of devices but not all devices in a
network. Anycast address is not standardized in IPv4.
5. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
View Answer
Answer: d
Explanation: There is an anycast address in IPv6 which allows sending messages to a group of
devices but not all devices in a network. Anycast address is not standardized in IPv4.
advertisement
6. The _________ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) Type of traffic
View Answer
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is
forwarded by the router. When the value becomes zero the datagram is discarded. The field is
8-bits wide, so an IPv6 packet can live up to 255 router hops only.
/https://www.sanfoundry.com/computer-networks-mcqs-ipv6 3/7
2021/‫‏‬6/‫‏‬22
IPv6 - Computer Networks Questions & Answers - Sanfoundry
7. Dual-stack approach refers to _________
a) implementing Ipv4 with 2 stacks
b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support
d) implementing a MAC address with 2 stacks
View Answer
Answer: c
Explanation: Dual-stack is one of the approaches used to support IPv6 in already existing
systems. ISPs are using it as a method to transfer from IPv4 to IPv6 completely eventually due
to the lower number of possible available addresses in IPv4.
advertisement
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to
each other by intervening IPv4 routers. The best solution here is ________
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tunnel in which at the sender’s side, the IPv6
datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is
stripped and the IPv6 packet is sent to the receiver.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is
represented by bits ______
a) 96 to 127
/https://www.sanfoundry.com/computer-networks-mcqs-ipv6 4/7
2021/‫‏‬6/‫‏‬22
IPv6 - Computer Networks Questions & Answers - Sanfoundry
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Teredo is a technique through which gives the possibility for full IPv6 network
connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the
datagram represents obfuscated 1Pv4 address of the IPv4 network.
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – IPv4 Addressing
» Next - Computer Networks Questions & Answers – IPv6 Addressing
advertisement
/https://www.sanfoundry.com/computer-networks-mcqs-ipv6 5/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Experienced - Sanfoundry
Computer Networks Questions & Answers –
IPv4 Addressing
« Prev
Next »
This set of Computer Networks Interview Questions and Answers for Experienced people focuses
on “IPv4 Addressing”.
1. Which of these is not applicable for IP protocol?
a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting
View Answer
Answer: b
Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the
transport layer protocols like TCP to offer reliability.
advertisement
2. Which of the following demerits does Fragmentation have?
a) Complicates routers
b) Open to DOS attack
c) Overlapping of fragments
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Experienced - Sanfoundry
d) All of the mentioned
View Answer
Answer: d
Explanation: Fragmentation makes the implementation of the IP protocol complex and can
also be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation
won’t be required if the transport layer protocols perform wise segmentation.
3. Which field helps to check rearrangement of the fragments?
a) Offset
b) Flag
c) TTL
d) Identifier
View Answer
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the original
datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits).
advertisement
4. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
View Answer
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Experienced - Sanfoundry
Answer: b
Explanation: In classless addressing, there are no classes but addresses are still granted in
blocks. The total number of addresses in a block of classless IP addresses = 2(32 – CIDR_value).
5. In IPv4 Addresses, classful addressing is replaced with ________
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
View Answer
Answer: a
Explanation: Classful addressing is replaced with classless addressing as a large ratio of the
available addresses in a class in calssful addressing is wasted. In classless addressing, one can
reserve the number of IP addresses required by modifying the CIDR value and make sure that
not many addresses are wasted.
advertisement
6. First address in a block is used as network address that represents the ________
a) Class Network
b) Entity
c) Organization
d) Codes
View Answer
Answer: c
Explanation: First address in a block is used as network address that represents the
organization. The network address can be found by AND’ing any address in the block by the
default mask. The last address in a block represents the broadcast address.
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Experienced - Sanfoundry
7. In classful addressing, a large part of available addresses are ________
a) Organized
b) Blocked
c) Wasted
d) Communicated
View Answer
Answer: c
Explanation: In classful addressing, a large part of available addresses are wasted. Thus to
solve this classful addressing is replaced with classless addressing where one can reserve the
number of IP addresses required by modifying the CIDR value and make sure that not many
addresses are wasted.
advertisement
8. Network addresses are a very important concept of ________
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
View Answer
Answer: c
Explanation: Network addresses are a very important concept of IP addressing. The first
address in a block is used as network address that represents the organization. The network
address can be found by AND’ing any address in the block or class by the default mask.
9. Which of this is not a class of IP address?
a) Class E
b) Class C
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Experienced - Sanfoundry
c) Class D
d) Class F
View Answer
Answer: d
Explanation: Class F is not a class of IP addressing. There are only five classes of IP addresses:
Class A (0.0.0.0 to 127.255.255.255), Class B (128.0.0.0 to 191.255.255.255), Class C (192.0.0.0
to 223.255.255.255), Class D (224.0.0.0 to 239.255.255.255), and Class E (240.0.0.0 to
255.255.255.255).
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – IPv4
» Next - Computer Networks Questions & Answers – IPv6
advertisement
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 5/7
2021/‫‏‬6/‫‏‬22
IPv4 - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
IPv4
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv4”.
1. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
View Answer
Answer: a
Explanation: The Internet Protocol is the networking protocol which establishes the internet by
relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which
handles the Error Reporting functionality.
advertisement
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
/https://www.sanfoundry.com/computer-networks-mcqs-ipv4 1/7
2021/‫‏‬6/‫‏‬22
IPv4 - Computer Networks Questions & Answers - Sanfoundry
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not related to
fragmentation but is used to request specific treatment such as high throughput, high
reliability or low latency for the IP packet depending upon the type of service it belongs to.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on
the number of hops it makes (Number of routers it goes through). TTL field is decremented by
one each time the datagram is processed by a router. When the value is 0, the packet is
automatically destroyed.
advertisement
4. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-ipv4 2/7
2021/‫‏‬6/‫‏‬22
IPv4 - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can
be used to carry payloads of more than one protocol type. Its most used values are 17 and 6
for UDP and TCP respectively. ICMP and IGMP are network layer protocols.
5. The data field cannot carry which of the following?
a) TCP segment
b) UDP segment
c) ICMP messages
d) SMTP messages
View Answer
Answer: c
Explanation: Data field usually has transport layer segments, but it can also carry ICMP
messages. SMTP is an application layer protocol. First it must go through the transport layer to
be converted into TCP segments and then it can be inserted into IP packets.
advertisement
6. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) Protocol field value
View Answer
Answer: a
Explanation: The Flag field in the IP header is used to control and identify the fragments. It
contains three bits: reserved, don’t fragment and more fragments. If the more fragments bit is
0, it means that the fragment is the last fragment.
/https://www.sanfoundry.com/computer-networks-mcqs-ipv4 3/7
2021/‫‏‬6/‫‏‬22
IPv4 - Computer Networks Questions & Answers - Sanfoundry
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) does not offer error reporting
View Answer
Answer: b
Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the
transport layer protocols like TCP to offer reliability.
advertisement
8. Which of the following demerits does Fragmentation have?
a) complicates routers
b) open to DOS attack
c) overlapping of fragments.
d) all of the mentioned
View Answer
Answer: d
Explanation: Fragmentation makes the implementation of the IP protocol complex and can
also be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation
won’t be required if the transport layer protocols perform wise segmentation.
9. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) ttl
/https://www.sanfoundry.com/computer-networks-mcqs-ipv4 4/7
2021/‫‏‬6/‫‏‬22
IPv4 - Computer Networks Questions & Answers - Sanfoundry
d) identifer
View Answer
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the original
datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits).
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – World Wide Web
» Next - Computer Networks Questions & Answers – IPv4 Addressing
advertisement
/https://www.sanfoundry.com/computer-networks-mcqs-ipv4 5/7
2021/‫‏‬6/‫‏‬22
World Wide Web - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
World Wide Web
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “World
Wide Web”.
1. A piece of icon or image on a web page associated with another webpage is called ______
a) url
b) hyperlink
c) plugin
d) extension
View Answer
Answer: b
Explanation: URLs are locators for resources present on the World Wide Web. A plugin
provides extra functionality to the webpage. An extension provides modification allowance for
the core functionality of a webpage. Hyperlink is piece of icon or image on a web page
associated with another webpage.
advertisement
2. Dynamic web page ______
a) is same every time whenever it displays
/https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 1/7
2021/‫‏‬6/‫‏‬22
World Wide Web - Computer Networks Questions & Answers - Sanfoundry
b) generates on demand by a program or a request from browser
c) both is same every time whenever it displays and generates on demand by a program or a
request from browser
d) is different always in a predefined order
View Answer
Answer: b
Explanation: A dynamic web page provides different content every time the user opens it
based on some events like new additions or time of the day. Languages such as JavaScript are
used to respond to client-side events while languages such as PHP as used to respond to
server-side events.
3. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
View Answer
Answer: d
Explanation: A web browser is an application program that is used to access the World Wide
Web resources, applications and websites. Some examples of web browsers are Google
Chrome, Internet Explorer and Safari.
advertisement
4. Common gateway interface is used to _______
a) generate executable files from web content by web server
b) generate web pages
c) stream videos
/https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 2/7
2021/‫‏‬6/‫‏‬22
World Wide Web - Computer Networks Questions & Answers - Sanfoundry
d) download media files
View Answer
Answer: a
Explanation: CGI is an interface through servers can run execute console-based executable
files on a web server that generates dynamic web pages. A CGI script executes only when a
request is made. The script then generates HTML.
5. URL stands for ________
a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator
View Answer
Answer: c
Explanation: The Uniform Resource Locator is a locator for the resource to be located by HTTP
on the World Wide Web. The URL is derived from the Uniform Resource Identifier.
advertisement
6. A web cookie is a small piece of data that is _______
a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) sent from the root server to other root servers
View Answer
Answer: a
Explanation: A web cookie is a small piece of data sent from a website and stored in user’s web
/https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 3/7
2021/‫‏‬6/‫‏‬22
World Wide Web - Computer Networks Questions & Answers - Sanfoundry
browser while a user is browsing the website and is used to remember stateful information
about the user’s operations on the website. This can help the website provide a better
browsing experience to the user.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) CSS
View Answer
Answer: d
Explanation: CSS alone cannot be used to generate dynamic web pages as it does not provide
many event handling functions. It can be used along with JavaScript to generate dynamic web
pages which are visually compelling.
advertisement
8. An alternative to JavaScript on windows platform is _______
a) VBScript
b) ASP.NET
c) JSP
d) PHP
View Answer
Answer: a
Explanation: VBScript is a general-purpose, lightweight and active scripting language which can
be used on Microsoft Visual Basic. It was first released in 1996.
/https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 4/7
2021/‫‏‬6/‫‏‬22
World Wide Web - Computer Networks Questions & Answers - Sanfoundry
9. What is document object model (DOM)?
a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) scripting language
View Answer
Answer: a
Explanation: DOM is a hierarchical model i.e. a tree used to represent an HTML or XML
document. Every node of the tree an object that represents a part of the document.
advertisement
10. AJAX stands for _______
a) asynchronous javascript and xml
b) advanced JSP and xml
c) asynchronous JSP and xml
d) advanced javascript and xml
View Answer
Answer: a
Explanation: AJAX is a group of technologies that works on the client-side to create
asynchronous web applications. It is used to modify only a part of a webpage and not the
whole webpage whenever some event occurs.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 5/7
2021/‫‏‬6/‫‏‬22
Frame Relay - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Frame Relay
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Frame
Relay”.
1. Frame Relay is cheaper than other _____
a) LANs
b) WANs
c) MANs
d) Multipoint Networks
View Answer
Answer: b
Explanation: Frame relay is a standardized wide area network technology and is popularly
used because it is cheaper than leased line WANs. It is also very simple to configure user
equipment in a Frame Relay network.
advertisement
2. Frame Relay networks offer an option called _______
a) Voice Over For Relay
b) Voice Over Fine Relay
/https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 1/7
2021/‫‏‬6/‫‏‬22
Frame Relay - Computer Networks Questions & Answers - Sanfoundry
c) Voice On Frame Relay
d) Voice Over Frame Relay
View Answer
Answer: d
Explanation: Frame Relay networks offer an option called Voice over Frame Relay, which
transmits voice and voice-band data over a Frame Relay network. It has two sub-protocols
FRF11 and FRF12.
3. There are ________ total features of Frame Relay.
a) Five
b) Seven
c) Nine
d) Ten
View Answer
Answer: c
Explanation: Frame relay is a wide area network technology used to transmit information over
a network in the form of frames using relays. The frames are of variable size. It is cheaper than
other WANs and it’s simple to configure user equipment in the network.
advertisement
4. Frame Relay does not provide flow or error control, they must be provided by the ______
a) Lower Level Protocol
b) Highest Level Protocol
c) Upper Level Protocol
d) Lowest Level Protocol
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 2/7
2021/‫‏‬6/‫‏‬22
Frame Relay - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: Frame relay only provides error detection using CRC. If errors are detected, the
upper-layer protocols, such as TCP are expected to provide error correction features. Network
layer provides flow control.
5. Frame Relay deploys physical layer carriers such as _______
a) ADMs
b) UPSR
c) BLSR
d) SONET
View Answer
Answer: d
Explanation: Frame Relays uses carriers such as SONET (for fiber-optic connections) to
physically transmit data frames over a Frame Relay network. SONET is cheaper and provides
better network reliability than other carriers.
advertisement
6. Frame relay provides error detection at the ______
a) physical layer
b) data link layer
c) network layer
d) transport layer
View Answer
Answer: b
Explanation: Frame relay provides error detection using CRC in the data link layer. The
transport layer then provides the error correction features if an error is detected.
/https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 3/7
2021/‫‏‬6/‫‏‬22
Frame Relay - Computer Networks Questions & Answers - Sanfoundry
7. Virtual circuit identifier in frame relay is called _______
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
d) circuit connection identifier
View Answer
Answer: a
Explanation: The Data Link Connection Identifier is 10-bit virtual circuit identifier. It is used to
assign frames to the specified Permanent Virtual Circuits or Switched Virtual Circuits.
advertisement
8. Frame relay has only _______
a) physical layer
b) data link layer
c) physical layer and data link layer
d) network layer and data link layer
View Answer
Answer: c
Explanation: The physical layer is guided by the protocols recognized by the ANSI and provides
conversion to frames. The data link layer supports the simplified core functions specified by
the OSI model like error detection.
9. In frame relay networks, extended address is used ________
a) to increase the range of data link connection identifiers
b) for error detection
c) for encryption
/https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 4/7
2021/‫‏‬6/‫‏‬22
Frame Relay - Computer Networks Questions & Answers - Sanfoundry
d) for error recovery
View Answer
Answer: a
Explanation: Extended address is indicated by the last bit of every address byte in the DLCI. It
specifies whether the byte is the last in the addressing field. It is used to increase the range of
data link connection identifiers.
advertisement
10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) FRAD is used for error recovery
View Answer
Answer: a
Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It converts packets into
frames that can be transmitted over Frame Relay Networks. It operates at the physical layer.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
/https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 5/7
2021/‫‏‬6/‫‏‬22
ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
ATM & Frame Relay
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ATM &
Frame Relay”.
1. ATM and frame relay are ________
a) virtual circuit networks
b) datagram networks
c) virtual private networks
d) virtual public networks
View Answer
Answer: a
Explanation: ATM and frame relay are transmission modes in which information is transferred
through electric circuit layer as packets. ATM has fixed packet size and frame relay has variable
packet size.
2. ATM uses _______________
a) asynchronous frequency division multiplexing
b) asynchronous time division multiplexing
c) asynchronous space division multiplexing
d) asynchronous amplitude division multiplexing
View Answer
Answer: b
Explanation: ATM uses a constant data stream consisting of transmission cells to transmit
information in a fixed division of time. The packet size remains fixed.
3. ATM standard defines _______ layers.
a) 2
b) 3
c) 4
d) 5
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 1/5
2021/‫‏‬6/‫‏‬22
ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: The three layers are physical layer, ATM layer and application adoption layer. The
physical layer corresponds to the physical layer, ATM layer corresponds to the data link layer
and the AAL layer corresponds to the network layer of the OSI model.
4. ATM can be used for ________
a) local area network
b) wide area network
c) campus area network
d) networks covering any range
View Answer
Answer: d
Explanation: ATM is a connection oriented network for cell relay which can be implemented
for networks covering any area. It uses Time Division Multiplexing and supports voice, video
and data communications.
5. An ATM cell has the payload field of __________
a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes
View Answer
Answer: b
Explanation: An ATM field contains a header and a payload. The header is of 5 bytes and the
payload is of 48 bytes. The size of the header remains fixed.
6. Frame relay has error detection at the ______
a) physical layer
b) data link layer
c) network layer
d) transport layer
View Answer
Answer: b
Explanation: The Frame Relay header contains an 8-bit Header Error Control field (HEC). The
HEC field contains an 8-bit CRC which is used for error control.
7. Virtual circuit identifier in frame relay is called ______
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
/https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 2/5
2021/‫‏‬6/‫‏‬22
ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry
d) circuit connection identifier
View Answer
Answer: a
Explanation: The Data Link Connection Identifier is 10-bit virtual circuit identifier. It is used to
assign frames to the specified Permanent Virtual Circuits or Switched Virtual Circuits.
8. Frame relay has _______
a) only physical layer
b) only data link layer
c) only network layer
d) both physical and data link layer
View Answer
Answer: d
Explanation: The physical layer is guided by the protocols recognized by the ANSI. The data link
layer supports the simplified core functions specified by the OSI model.
9. In frame relay networks, extended address is used _______
a) to increase the range of data link connection identifiers
b) for error detection
c) for encryption
d) for error recovery
View Answer
Answer: a
Explanation: Extended address is indicated by the last bit of every address byte in the DLCI. It
specifies whether the byte is the last in the addressing field. It is used to increase the range of
data link connection identifiers.
10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) FRAD is used for error recovery
View Answer
Answer: a
Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It converts packets into
frames that can be transmitted over Frame Relay Networks. It operates at the physical layer.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 3/5
2021/‫‏‬6/‫‏‬22
Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Virtual Circuit
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Virtual
Circuit”.
1. Which of the following is not a characteristic of Virtual Circuit Network?
a) There are setup and teardown phases in addition to the data transfer phase
b) Resources can be allocated during setup phase or on demand
c) All packets follow the same path established during the connection
d) Virtual circuit network is implemented in application layer
View Answer
Answer: d
Explanation: Virtual circuit network is normally implemented in data link layer. It is a
combination of circuit-switched network and datagram network which are implemented in the
physical layer and network layer respectively.
advertisement
2. The address that is unique in the scope of the network or internationally if the network is part
of an international network is called as ______
a) Global address
/https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 1/7
2021/‫‏‬6/‫‏‬22
Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry
b) Network address
c) Physical address
d) IP address
View Answer
Answer: a
Explanation: Global address is a network address that is unique internationally and is used as
a common address by all the users of the network. It is used to create a virtual circuit
identifier.
3. The Identifier that is used for data transfer in virtual circuit network is called _______
a) Global address
b) Virtual circuit identifier
c) Network identifier
d) IP identifier
View Answer
Answer: b
Explanation: A virtual circuit identifier is a type of numeric identifying address that is used to
distinguish between different virtual circuits in a circuit-switched network. It is used for data
transfer and has a switch scope.
advertisement
4. Which of the following is not a phase of virtual circuit network?
a) Setup phase
b) Data transfer phase
c) Termination phase
d) Teardown phase
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 2/7
2021/‫‏‬6/‫‏‬22
Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: There are three phases in a virtual circuit network: setup, data transfer and
teardown phase. There is no termination phase in it.
5. Steps required in setup process are ___________
a) Setup request and acknowledgement
b) Setup request and setup response
c) Setup request and setup termination
d) Setup and termination steps
View Answer
Answer: a
Explanation: Setup request (sent by a source) and acknowledgement (sent by the destination)
are the steps in the setup process. Both the ends’ switches make table entries during the
setup process.
advertisement
6. During teardown phase, the source, after sending all the frames to destination, sends a _____
to notify termination.
a) teardown response
b) teardown request
c) termination request
d) termination response
View Answer
Answer: b
Explanation: The source, after sending all the frames to destination sends teardown request to
which, destination sends teardown response. The switches then delete the corresponding
table entries.
/https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 3/7
2021/‫‏‬6/‫‏‬22
Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry
7. Delay of the resource allocated during setup phase during data transfer is ________
a) constant
b) increases for each packet
c) same for each packet
d) different for each packet
View Answer
Answer: c
Explanation: If a resource is allocated during setup phase, delay is same for each packet as
there is only one-time delay during the setup phase and no delay during the data transfer
phase.
advertisement
8. Delay of the resource allocated on demand during data transfer is ________
a) constant
b) increases for each packet
c) same for each packet
d) different for each packet
View Answer
Answer: d
Explanation: If a resource is to be allocated on demand during the data transfer phase, the
delay for each packet would be different depending upon the resource requirement of the
packets.
9. In virtual circuit network, the number of delay times for setup and teardown respectively are
_______
a) 1 and 1
b) 1 and 2
/https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 4/7
2021/‫‏‬6/‫‏‬22
Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry
c) 2 and 1
d) 2 and 2
View Answer
Answer: a
Explanation: There is one-time delay for both setup and teardown phase. The one-time delay
in setup phase is for resource allocation and the one-time delay in teardown phase is for the
de-allocation of the resources.
advertisement
10. In data transfer phase, how many columns does the table contain?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: The switch maintains a table for each Virtual Circuit Network. In the data transfer
phase, it maintains 2 columns each for incoming data and outgoing data. The columns are in
the following order: Source port, Source VCI, Destination port, Destination VCI.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 5/7
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Congestion Control
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Congestion Control”.
1. Two broad categories of congestion control are
a) Open-loop and Closed-loop
b) Open-control and Closed-control
c) Active control and Passive control
d) Active loop and Passive loop
View Answer
Answer: a
Explanation: Open loop congestion control techniques are used to prevent congestion before
it even happens by enforcing certain policies. Closed loop congestion control techniques are
used to treat congestion after it has happened.
advertisement
2. In open-loop control, policies are applied to __________
a) Remove after congestion occurs
b) Remove after sometime
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 1/8
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
c) Prevent before congestion occurs
d) Prevent before sending packets
View Answer
Answer: c
Explanation: Open loop congestion control techniques are used to prevent congestion before
it even happens by enforcing certain policies. Retransmission policy, window policy and
acknowledgement policy are some policies that might be enforced.
3. Retransmission of packets must not be done when _______
a) Packet is lost
b) Packet is corrupted
c) Packet is needed
d) Packet is error-free
View Answer
Answer: d
Explanation: Retransmission refers to the sender having to resend the packet to the receiver. It
needs to be done only when some anomaly occurs with the packet like when the packet is lost
or corrupted.
advertisement
4. In Go-Back-N window, when the timer of the packet times out, several packets have to be
resent even some may have arrived safe. Whereas in Selective Repeat window, the sender
resends ___________
a) Packet which are not lost
b) Only those packets which are lost or corrupted
c) Packet from starting
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 2/8
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
d) All the packets
View Answer
Answer: b
Explanation: In Selective Repeat, the sender side uses a searching algorithm to find the
packets which need to be retransmitted based on the negative acknowledgements received
and then resends only those packets thus saving bandwidth.
5. Discarding policy is mainly done by _______
a) Sender
b) Receiver
c) Router
d) Switch
View Answer
Answer: c
Explanation: The discarding policy adopted by the routers mainly states that the routers
discard sensitive or corrupted packets that it receives, thus controlling the integrity of the
packet flow. The discarding policy is adopted as an open loop congestion control technique.
advertisement
6. Closed-Loop control mechanisms try to _________
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 3/8
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: In closed loop congestion control, methods are implemented to remove
congestion after it occurs. Some of the methods used are backpressure and choke packet.
7. The technique in which a congested node stops receiving data from the immediate upstream
node or nodes is called as _______
a) Admission policy
b) Backpressure
c) Forward signaling
d) Backward signaling
View Answer
Answer: b
Explanation: In this closed loop congestion control technique, the congested node propagates
in the opposite direction of the data flow to inform the predecessor node to reduce the flow of
packets. This is why this technique is called a node-to-node congestion control technique.
advertisement
8. Backpressure technique can be applied only to _______
a) Congestion networks
b) Closed circuit networks
c) Open circuit networks
d) Virtual circuit networks
View Answer
Answer: d
Explanation: In Virtual circuit networks, each node knows the upstream node from which a
flow data is coming. So, it makes possible for the congested node to track the source of the
congestion and then inform that node to reduce the flow to remove congestion.
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 4/8
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
9. The packet sent by a node to the source to inform it of congestion is called _______
a) Explicit
b) Discard
c) Choke
d) Backpressure
View Answer
Answer: c
Explanation: Choke packet is sent by a node to the source to inform it of congestion. Two
choke packet techniques can be used for the operation called hop-by-hop choke packet and
source choke packet.
advertisement
10. In the slow-start algorithm, the size of the congestion window increases __________ until it
reaches a threshold.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
View Answer
Answer: a
Explanation: In slow-start algorithm, the size of the congestion window increases exponentially
until it reaches a threshold. When it reaches the threshold, it stops increasing and continues
sending packets through the threshold window thus preventing congestion.
11. In the congestion avoidance algorithm, the size of the congestion window increases
____________ until congestion is detected.
a) exponentially
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 5/8
2021/‫‏‬6/‫‏‬22
Congestion Control - Computer Networks Questions & Answers - Sanfoundry
b) additively
c) multiplicatively
d) suddenly
View Answer
Answer: b
Explanation: In the congestion avoidance algorithm, the size of the congestion window
increases additively until congestion is detected. Once congestion is detected, the size of
congestion window is decreased once and then the packets are transmitted to achieve
congestion avoidance.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – AH and ESP Protocols
» Next - Computer Networks Questions & Answers – Virtual Circuit
advertisement
Recommended Posts:
1.
2.
3.
4.
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Cryptography and Network Security MCQ (Multiple Choice Questions)
Terms of Service
Visual Basic MCQ (Multiple Choice Questions)
/https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 6/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Experienced - Sanfoundry
Computer Networks Questions & Answers –
AH and ESP Protocols
« Prev
Next »
This set of Computer Networks Questions and Answers for Experienced people focuses on “AH
and ESP Protocols”.
1. Which mode of IPsec should you use to assure the security and confidentiality of data within
the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
View Answer
Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of
data that is exchanged within the same LAN. ESP tunnel mode is comparatively more secure
and should be used to assure the security of the data within different LANs.
advertisement
2. Which two types of encryption protocols can be used to secure the authentication of
computers using IPsec?
/https://www.sanfoundry.com/computer-networks-questions-answers-experienced 1/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Experienced - Sanfoundry
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
View Answer
Answer: d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an
encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication
that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
3. Which two types of IPsec can be used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
View Answer
Answer: c
Explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose,
option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire
original IP packet unlike transport mode which is not as secure as it only encrypts the data
portion and not the whole packet.
advertisement
4. ______ provides authentication at the IP level.
a) AH
b) ESP
c) PGP
/https://www.sanfoundry.com/computer-networks-questions-answers-experienced 2/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Experienced - Sanfoundry
d) SSL
View Answer
Answer: a
Explanation: The Authentication Header (AH) authenticates the origin of data, and guarantees
the integrity of the information that’s being sent using IPSec. It also provides anti-reply
security.
5. IPsec defines two protocols: _______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) PGP; SSL
View Answer
Answer: c
Explanation: AH ensures that there is no retransmission of data from an unauthorized source,
and protects against data tampering. ESP provides with content protection and ensures that
there is integrity and confidentiality for the message.
advertisement
6. IP Security operates in which layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-experienced 3/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Experienced - Sanfoundry
Answer: a
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and
confidentiality between two machines in an IP network. In the TCP/IP model, it provides
security at the IP layer i.e. the network layer.
7. ESP does not provide ________
a) source authentication
b) data integrity
c) privacy
d) error control
View Answer
Answer: d
Explanation: The ESP provides data confidentiality, integrity and authentication. It provides
confidentiality through encryption. ESP can operate in two modes, transport mode and tunnel
mode.
advertisement
8. In computer security _______ means that computer system assets can be modified only by
authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
View Answer
Answer: b
Explanation: Integrity means that computer system assets can be modified only by authorized
parities. Confidentiality means that the assets can only be accessed by authorized parties.
/https://www.sanfoundry.com/computer-networks-questions-answers-experienced 4/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Experienced - Sanfoundry
Availability refers to the accessibility of the resource to the authorized parties. Authenticity
means that the asset is not unethically changed.
9. In computer security _______ means that the information in a computer system only be
accessible for reading by authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
View Answer
Answer: a
Explanation: Confidentiality means that the assets can only be accessed by authorized parties.
Integrity means that computer system assets can be modified only by authorized parities.
Availability refers to the accessibility of the resource to the authorized parties. Authenticity
means that the asset is not unethically changed.
advertisement
10. Which of the following organizations is primarily concerned with military encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
View Answer
Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs
evaluates, and implements encryption systems for the military and government agencies with
high security needs.
/https://www.sanfoundry.com/computer-networks-questions-answers-experienced 5/8
2021/‫‏‬6/‫‏‬22
UDP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
UDP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “UDP”.
1. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
View Answer
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides
message-based data transmission. TCP is an example of connection-oriented protocols.
advertisement
2. Return value of the UDP port “Chargen” is _______
a) String of characters
b) String of integers
c) Array of characters with integers
/https://www.sanfoundry.com/computer-networks-questions-answers-udp 1/7
2021/‫‏‬6/‫‏‬22
UDP - Computer Networks Questions & Answers - Sanfoundry
d) Array of zero’s and one’s
View Answer
Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing
a random number of characters every time it receives a datagram from the connecting host.
The number of characters is between 0 and 512.
3. Beyond IP, UDP provides additional services such as _______
a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
View Answer
Answer: d
Explanation: De-multiplexing is the delivering of received segments to the correct application
layer processes at the recipients end using UDP. Error checking is done through checksum in
UDP.
advertisement
4. What is the main advantage of UDP?
a) More overload
b) Reliable
c) Low overhead
d) Fast
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-udp 2/7
2021/‫‏‬6/‫‏‬22
UDP - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other
services, the overhead taken to provide these services is reduced in UDP’s operation. Thus,
UDP provides low overhead, and higher speed.
5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
View Answer
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network protocol
implemented by using UDP port number 123 to send and receive time stamps.
advertisement
6. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
View Answer
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte
fields: Source port address, Destination port address, Length of packet, and checksum.
/https://www.sanfoundry.com/computer-networks-questions-answers-udp 3/7
2021/‫‏‬6/‫‏‬22
UDP - Computer Networks Questions & Answers - Sanfoundry
7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
View Answer
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in
Windows Operating System. Ephemeral port numbers are short-lived port numbers which can
be used for clients in a UDP system where there are temporary clients all the time.
advertisement
8. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
View Answer
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP datagram
is 65,535 bytes (8 byte header + 65,527 bytes of data).
9. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
/https://www.sanfoundry.com/computer-networks-questions-answers-udp 4/7
2021/‫‏‬6/‫‏‬22
UDP - Computer Networks Questions & Answers - Sanfoundry
d) UDP length = UDP length + UDP header’s length
View Answer
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header
that defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.
advertisement
10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
View Answer
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it
is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as
UDP doesn’t have to ensure the delivery of the packet.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-udp 5/7
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Freshers - Sanfoundry
Computer Networks Questions & Answers –
TCP-2
« Prev
Next »
This set of Computer Networks Interview Questions and Answers for freshers focuses on “TCP –
2”.
1. The receiver of the data controls the amount of data that are to be sent by the sender is
referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
View Answer
Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed with data. It is
done using various open-loop (prevention) methods and closed-loop (recovery) methods.
advertisement
2. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 1/8
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Freshers - Sanfoundry
c) 20 and 60 bytes
d) 20 and 60 bits
View Answer
Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are no options and
can go up to 60 bytes at maximum with 40 bytes in the options field. The header contains all
the control information required to ensure ordered, error-free and reliable delivery of the
segment.
3. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
View Answer
Answer: b
Explanation: A three-way handshake allows both, the server and the client to choose their
Initial Sequence Number and inform about it to the other party. This won’t be possible using
the two-way handshake mechanism.
advertisement
4. The server program tells its TCP that it is ready to accept a connection. This process is called
___________
a) Active open
b) Active close
c) Passive close
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 2/8
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Freshers - Sanfoundry
d) Passive open
View Answer
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the
server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares) it
with the Server requesting a connection. The Server acknowledges the clients ISN, and then
picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers
ISN.
5. A client that wishes to connect to an open server tells its TCP that it needs to be connected to
that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the
client once it finds the open server and picks an ISN. The Server acknowledges the clients
request, and then picks an ISN and synchronizes it with the Client. At last, the Client
acknowledges the servers ISN.
advertisement
6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is
___________
a) Mutual open
b) Mutual Close
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 3/8
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Freshers - Sanfoundry
c) Simultaneous open
d) Simultaneous close
View Answer
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other and
start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each other
and a connection is established between them. This doesn’t happen usually, because both
sides have to know which port on the other side to send to.
7. A malicious attacker sends a large number of SYNC segments to a server, pretending that each
of them is coming from a different client by faking the source IP address in the datagram. Which
type of attack is being performed in this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow of
SYNC segments sent to the server, the victims are not able to request for a connection to the
server, thus resulting in Denial of Service.
advertisement
8. SYNC flooding attack belongs to a type of security attack known as ___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 4/8
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers for Freshers - Sanfoundry
d) Denial-of-service attack
View Answer
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request,
making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding
and UDP flooding.
9. The sizes of source and destination port address in TCP header are ___________ respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
View Answer
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of service being used
by the network entity. For example, port 21 is used for FTP connections and port 25 is used for
ICMP connections.
advertisement
10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
View Answer
/https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 5/8
2021/‫‏‬6/‫‏‬22
TCP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
TCP-1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “TCP-1”.
1. Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
View Answer
Answer: d
Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of a
stream of bytes between hosts communicating via an IP network.
advertisement
2. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
/https://www.sanfoundry.com/computer-networks-questions-answers-tcp 1/7
2021/‫‏‬6/‫‏‬22
TCP - Computer Networks Questions & Answers - Sanfoundry
d) Packets
View Answer
Answer: a
Explanation: TCP provides stream oriented delivery between hosts communicating via an IP
network and there are no message boundaries. TCP can concatenate data from a number of
send () commands into one stream of data and still transmit it reliably.
3. TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
View Answer
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed
incoming packets in case the sender is sending packets faster than the processing rate of the
received packets.
advertisement
4. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-tcp 2/7
2021/‫‏‬6/‫‏‬22
TCP - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: A segment may be collection of data from many send () statements. TCP
transmits each segment as a stream of bytes.
5. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
View Answer
Answer: a
Explanation: Data can flow both the directions at the same time during a TCP communication
hence, it is full-duplex. This is the reason why TCP is used in systems that require full-duplex
operation such as e-mail systems.
advertisement
6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of
data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
View Answer
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data.
The sender actively checks for acknowledgement from the receiver and once a specific time
period has passed, it retransmits the data.
/https://www.sanfoundry.com/computer-networks-questions-answers-tcp 3/7
2021/‫‏‬6/‫‏‬22
TCP - Computer Networks Questions & Answers - Sanfoundry
7. In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
View Answer
Answer: a
Explanation: As TCP has to ensure ordered delivery of packets, sequence number and
acknowledgement number are used to identify the byte number of the packet in the stream of
bytes being transmitted.
advertisement
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
View Answer
Answer: b
Explanation: The sequence number given to first byte of a segment, with respect to its order
among the previous segments, is the sequence number of that segment.
9. Bytes of data being transferred in each connection are numbered by TCP. These numbers
start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
/https://www.sanfoundry.com/computer-networks-questions-answers-tcp 4/7
2021/‫‏‬6/‫‏‬22
TCP - Computer Networks Questions & Answers - Sanfoundry
c) One
d) Sequence of zero’s and one’s
View Answer
Answer: d
Explanation: One might expect the sequence number of the first byte in the stream to be 0, or
1. But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence
Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the
connection handshake.
advertisement
10. The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
View Answer
Answer: c
Explanation: The acknowledgement field in a segment defines the sequence number of the
byte which is to be received next i.e. sequence number of byte that the sender should transmit
next.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-tcp 5/7
2021/‫‏‬6/‫‏‬22
Telnet Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Telnet – 2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet
– 2”.
1. Telnet protocol is used to establish a connection to __________
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 25
View Answer
Answer: c
Explanation: TCP port 21 is used for FTP, TCP port 22 is used for SSH and TCP port 25 is used
for SMTP. Telnet provides access to a command line interface on a remote computer using the
TCP port number 23.
2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) client can transfer files using to remote server using NVT
View Answer
Answer: d
Explanation: The client can use the NVT only to interact with the programs already present on
the remote server, not to transfer files to it. To transfer files, an FTP connection has to be used.
3. All telnet operations are sent as ________
a) 4 bits
b) 8 bits
c) 16 bits
d) 32 bits
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-telnet 1/4
2021/‫‏‬6/‫‏‬22
Telnet Questions & Answers - Sanfoundry
Answer: b
Explanation: Telnet provides a bi-directional, 8-bit byte oriented communications facility
through which operations are sent as 8-bit bytes for the server to interpret.
4. AbsoluteTelnet is a telnet client for _______ Operating system.
a) windows
b) linux
c) mac
d) ubuntu
View Answer
Answer: a
Explanation: AbsoluteTelnet was originally released in 1999. It was developed by Brian Pence
of Celestial Software.
5. The decimal code of Interpret as Command (IAC) character is _______
a) 252
b) 253
c) 254
d) 255
View Answer
Answer: d
Explanation: If we want that a character be interpreted by the client instead of server, we use
the IAC character. If IAC is followed by any other code than IAC, the client interprets it as a
character.
6. Which of the following is true for character mode operation of telnet implementation?
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) each character typed is aggregated into a word and then sent to the server
d) each character type is aggregated into a line and then sent to the server
View Answer
Answer: a
Explanation: In character mode, each character that the user is typing is immediately sent to
the server which then interprets it only after the complete operation command is received.
7. In which mode of telnet, the client echoes the character on the screen but does not send it
until a whole line is completed?
a) default mode
c) character mode
c) server mode
/https://www.sanfoundry.com/computer-networks-questions-answers-telnet 2/4
2021/‫‏‬6/‫‏‬22
Telnet Questions & Answers - Sanfoundry
d) command mode
View Answer
Answer: a
Explanation: In the default mode, the client does not send each character typed by the user to
the server, thus saving the amount of packet transmissions required for executing each
operation. But the server has to remain idle until the client sends the completed line wasting a
lot of time.
8. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) telnet can be used for remote login
View Answer
Answer: c
Explanation: File Transfer Protocol is used for file transfer. Telnet provides access to the
command-line interface on a remote host.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Telnet – 1
» Next - Computer Networks Questions & Answers – TCP-1
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Microcontroller MCQ (Multiple Choice Questions)
Programming Questions and Answers
Software Engineering MCQ (Multiple Choice Questions)
Java Programming Examples
Network Theory MCQ (Multiple Choice Questions)
Java Programming Examples on Utility Classes
C# Programming Examples on Data Structures
Java MCQ (Multiple Choice Questions)
MySQL MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
JavaScript MCQ (Multiple Choice Questions)
/https://www.sanfoundry.com/computer-networks-questions-answers-telnet 3/4
2021/‫‏‬6/‫‏‬22
Telnet - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Telnet – 1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet
– 1”.
1. The application layer protocol used by a Telnet application is ________
a) Telnet
b) FTP
c) HTTP
d) SMTP
View Answer
Answer: a
Explanation: Telnet is an application layer protocol that provides access to the command-line
interface on a remote host. Telnet stands for teletype network.
2. Which amongst the following statements is correct for “character at a time” mode?
a) Character processing is done on the local system under the control of the remote system
b) Most text typed is immediately sent to the remote host for processing
c) All text is echoed locally, only completed lines are sent to the remote host
d) All text is processed locally, and only confirmed lines are sent to the remote host
View Answer
Answer: b
Explanation: In character at a time mode, the typed text is sent immediately to the remote
host while the user is typing. Another mode used in Telnet is “Old line by line” mode in which
only completed lines are sent to the remote host.
3. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) SMTP
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-telnet 1/4
2021/‫‏‬6/‫‏‬22
Telnet - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Telnet provides access to the command-line interface on a remote computer.
One can login to the computer from the command-line interface.
4. What is the correct syntax to be written in the web browser to initiate a Telnet connection to
www.sanfoundry.com?
a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com
c) telnet://www.sanfoundry.com
d) telnet www.sanfoundry.com
View Answer
Answer: c
Explanation: telnet://” is the header to be used to initiate a Telnet connection to a web server.
One can browse the website using telnet if they are authorized to.
5. Telnet is used for _______
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
View Answer
Answer: c
Explanation: Telnet is an application layer protocol that provides access to the command line
interface of a remote computer that can be used to perform remote login.
6. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) telnet can be used for remote login
View Answer
Answer: c
Explanation: File Transfer Protocol is used for file transfer. Telnet provides access to the
command-line interface on a remote host.
7. Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
/https://www.sanfoundry.com/computer-networks-mcqs-telnet 2/4
2021/‫‏‬6/‫‏‬22
Telnet - Computer Networks Questions & Answers - Sanfoundry
d) character mode
View Answer
Answer: c
Explanation: In line mode, terminal character processing is done on the client side but editing
is enabled on the server side. Line mode reduces the number of packets and is useful for long
delay networks.
8. If we want that a character be interpreted by the client instead of server _________
a) interpret as command (IAC) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) cli character has to be used
View Answer
Answer: a
Explanation: The client must look at each byte that arrives and look for IAC escape character. If
IAC is found, the client moves on to look for any other code or IAC. If the next byte is IAC – a
single byte is presented by the client to the terminal. If IAC is followed by any other code than
IAC, the client interprets this as a command.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – SNMP
» Next - Computer Networks Questions & Answers – Telnet – 2
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
C Programming Examples on File Handling
MySQL MCQ (Multiple Choice Questions)
Linux Command Tutorials with Examples and Explanations
C# Programming Examples on Data Structures
C MCQ (Multiple Choice Questions)
Oracle Database MCQ (Multiple Choice Questions)
C Programming Examples on Strings
Java MCQ (Multiple Choice Questions)
Unix MCQ (Multiple Choice Questions)
C# Programming Examples on Networking
/https://www.sanfoundry.com/computer-networks-mcqs-telnet 3/4
2021/‫‏‬6/‫‏‬22
SNMP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
SNMP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SNMP”.
1. The application-level protocol in which a few manager stations control a set of agents is called
______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
View Answer
Answer: c
Explanation: SNMP stands for Simple Network Management Protocol. It is an application-level
protocol in which a few manager stations control a set of agents. It is used under the TCP/IP
protocol suite and is used for managing devices on the internet.
advertisement
2. Full duplex mode increases the capacity of each domain by ________
a) 10 to 20 mbps
b) 20 to 30 mbps
/https://www.sanfoundry.com/computer-networks-questions-answers-snmp 1/8
2021/‫‏‬6/‫‏‬22
SNMP - Computer Networks Questions & Answers - Sanfoundry
c) 30 to 40 mbps
d) 40 to 50 mbps
View Answer
Answer: a
Explanation: In full duplex mode, both endpoints share a single channel bandwidth to achieve
two-way transmission. This results in complete utilization of the band capacity increasing the
capacity by 10 to 20 mbps than half-duplex mode.
3. Configuration management can be divided into which two subsystems?
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Configuration and dialing up
View Answer
Answer: a
Explanation: The best current practices report is created by a management group to ensure
the most effective configuration management. The group also makes a MIB (Management
Information Base) module to help with the configuration management.
advertisement
4. To use a Simple Network Management System, we need _______
a) Servers
b) IP
c) Protocols
d) Rules
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-snmp 2/8
2021/‫‏‬6/‫‏‬22
SNMP - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: Rules are a collection of expression containing parameters to observe the
attributes of the user’s device, and then execute some actions. It specifies the parameters for
the managed objects inside the application and performs operations that would support the
expression. The input of a rule may be many expressions or even a single expression that end
in an output of single object invoking some action.
5. The main difference between SNMPv3 and SNMPv2 is _______
a) Management
b) Integration
c) Classification
d) Enhanced security
View Answer
Answer: d
Explanation: SNMPv3 has introduced new cryptographic security, through which
confidentiality is provided by encrypting packets and blocking intruders. It also ensures that
the message is coming from a reliable source.
advertisement
6. In Network Management System, the division that is responsible for controlling access to
network based on a predefined policy is called _________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-snmp 3/8
2021/‫‏‬6/‫‏‬22
SNMP - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: Security management is also responsible to provide confidentiality,
authentication and encryption in addition to controlling access to network. Without security
management, the network and its traffic would be vulnerable to be exploited by attackers.
7. BER stands for ________
a) Basic Encoding Rules
b) Basic Encoding Resolver
c) Basic Encoding Rotator
d) Basic Encoding Router
View Answer
Answer: a
Explanation: The Basic Encoding Rules are a set of rules that specify the guidelines to encode
the SNMP messages in binary form. Each SNMP message is encoded into 3 parts namely data,
length and type of message.
advertisement
8. Control of the users’ access to network resources through charges is the main responsibility of
________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
View Answer
Answer: c
Explanation: The accounting management keeps track of the users and their access rights to
the network and controls the user’s access by communicating with the security management.
/https://www.sanfoundry.com/computer-networks-questions-answers-snmp 4/8
2021/‫‏‬6/‫‏‬22
SNMP - Computer Networks Questions & Answers - Sanfoundry
The accounting management takes support of the Management Information Block to perform
its operations.
9. SNMP is the framework for managing devices in an internet using the ______
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
View Answer
Answer: a
Explanation: SNMP is a management protocol in which a few manager stations control a set of
agents using the TCP/IP protocol suite. SNMP stands for Simple Network Management
Protocol.
advertisement
10. Structure of Management Information (SMI), is the guideline of ________
a) HTTP
b) SNMP
c) URL
d) MIB
View Answer
Answer: b
Explanation: SMI was developed by the Storage Networking Industry Association (SNIA) and it
defines a standard that can be manipulated by SNMP. Basically, it defines the standard format
and hierarchy of management data which is used by the SNMP. It does not describe how the
objects are to be managed.
/https://www.sanfoundry.com/computer-networks-questions-answers-snmp 5/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Freshers - Sanfoundry
Computer Networks Questions & Answers –
SMI
« Prev
Next »
This set of Computer Networks Questions and Answers for Freshers focuses on “SMI”.
1. Storage management comprises of _______________
a) SAN Management
b) Data protection
c) Disk operation
d) All of the mentioned
View Answer
Answer: d
Explanation: SAN management, data protection and disk operation are the main components
of the Storage Management Initiative Specification. SMI-S was developed by the Storage
Networking Industry Association.
advertisement
2. Which of the following is not a storage device?
a) Switch
b) RAID Arrays
c) Tape drives
/https://www.sanfoundry.com/computer-networks-questions-answers-freshers 1/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Freshers - Sanfoundry
d) Hub
View Answer
Answer: d
Explanation: Switches, RAID arrays and tape drives are the main storage devices in SMI-S,
while a Hub is simple networking device that cannot be used as storage.
3. Which protocols are used for Storage management?
a) SNMP
b) LDAP
c) POP3
d) MIB
View Answer
Answer: a
Explanation: Simple Network Management Protocol is used for storage management.
Lightweight Directory Access Protocol is used to access or locate information about directories
and other resources on a network. Post Office Protocol 3 is used for e-mailing on the internet.
Management Information Base is a part of SNMP and contains hierarchically organized
information.
advertisement
4. Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.
a) Proprietary management interfaces
b) Multiple applications to manage storage in the data center
c) No single view
d) Single view
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-freshers 2/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Freshers - Sanfoundry
Answer: d
Explanation: A single view is not possible with diverse vendors present. Proprietary
management interfaces, multiple applications management and no single view are the main
difficulties incurred by a SAN administrator in such a situation.
5. How do Storage administrators ensure secure access to storage devices?
a) By using Zoning
b) By putting a physical lock on the storage device
c) By keeping devices shutdown when not in use
d) By keeping devices when used
View Answer
Answer: a
Explanation: Zoning is a method in SAN that can be used by a storage administrator to specify
who can see what in the SAN. Zoning might complicate the scaling process if the size of the
SAN increases.
advertisement
6. Effective Storage management does not include __________
a) security
b) backups
c) reporting
d) connection
View Answer
Answer: d
Explanation: Connection is the responsibility of the connection manager. Storage management
includes management of all necessities such as security, backups and reporting facilities.
/https://www.sanfoundry.com/computer-networks-questions-answers-freshers 3/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Freshers - Sanfoundry
7. Among the following, identify which task is not involved in Storage Capacity management?
a) Identifying storage systems are approaching full capacity
b) Monitoring trends for each resource
c) Tracking Total capacity, total used, total available
d) Preventing unauthorized access to the storage
View Answer
Answer: d
Explanation: Prevention of unauthorized access to storage is the task of Security management.
Identifying when the storage is approaching full capacity, monitoring trends, reporting and
tracking capacity are the tasks of Storage Capacity management.
advertisement
8. Effect of open standards like SMI(s) is _______________
a) standardization drives software interoperability and interchange ability
b) breaks the old-style dependence on proprietary methods, trade secrets, and single providers
c) builds a strong foundation on which others can quickly build and innovate
d) all of the mentioned
View Answer
Answer: d
Explanation: Open standards like SMI-S inculcate a general ideal through which the normal
designers are able to easily implement the standard into their software and its scalability.
Since it is open-source, nothing is hidden from its users and they can implement it as they like
or require to. As a whole lot of time is spent to build it as strong and scalable, it provides an
efficient foundation to the designers to build and innovate on.
9. Task of Distributed Management Task Force is not ________
a) to promote interoperability among the management solution providers
/https://www.sanfoundry.com/computer-networks-questions-answers-freshers 4/8
2021/‫‏‬6/‫‏‬22
Computer Networks Questions and Answers for Freshers - Sanfoundry
b to act as an interface between the various budding technologies and provide solution to
manage various environments
c) to track the operation of the different management solution providers
d) to manage the facility by itself if one of the management solution providers fail
View Answer
Answer: d
Explanation: The Distributed Management Task Force is used just to simplify the overall
management of the network. It cannot manage a network facility by itself in case one of the
management solution providers fails. It provides an interface for promoting interoperability
among management solution providers.
advertisement
10. SMI-S Standard uses which of the following?
a) Java RMI
b) CIM-XML/HTTP
c) CORBA
d) .NET
View Answer
Answer: b
Explanation: The Distributed Management Task Force maintains a Common Information
Model (CIM) to represent a common set of network objects and their relationships. CIMXML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S uses CIMXML/HTTP.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-freshers 5/8
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers - Sanfoundry
Computer Networks Questions & Answers –
Virtual Private Networks
« Prev
Next »
This set of Computer Networks Interview Questions and Answers focuses on “Virtual Private
Networks”.
1. A ___________ is an extension of an enterprise’s private intranet across a public network such as
the internet, creating a secure private connection.
a) VNP
b) VPN
c) VSN
d) VSPN
View Answer
Answer: b
Explanation: VPN provides enhanced security and online anonymity to users on the internet. It
is also used to unblock websites that are unavailable in certain regions.
2. When were VPNs introduced into the commercial world?
a) Early 80’s
b) Late 80’s
c) Early 90’s
d) Late 90’s
View Answer
Answer: d
Explanation: VPNs were first introduced in the year 1996. Then as the internet started to get
popularized, the need for connection security increased. VPN was a great solution to this, and
that’s when VPNs were implemented in the commercial world.
3. What protocol is NOT used in the operation of a VPN?
a) PPTP
b) IPsec
c) YMUM
d) L2TP
View Answer
/https://www.sanfoundry.com/computer-networks-interview-questions-answers 1/5
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers - Sanfoundry
Answer: c
Explanation: PPTP is a tunneling protocol which was initially used for the creation of VPNs.
IPSec is used in encrypting the traffic flowing in the VPN. L2TP is used to tunnel all the L2
traffic on the VPN.
4. Which of the following statements is NOT true concerning VPNs?
a) Financially rewarding compared to leased lines
b) Allows remote workers to access corporate data
c) Allows LAN-to-LAN connectivity over public networks
d) Is the backbone of the Internet
View Answer
Answer: d
Explanation: VPNs are not the backbone of the Internet as they are just a method to create
private intranets on the internet. They are used for enhancing the connection security for the
users.
5. Traffic in a VPN is NOT ____________
a) Invisible from public networks
b) Logically separated from other traffic
c) Accessible from unauthorized public networks
d) Restricted to a single protocol in IPsec
View Answer
Answer: c
Explanation: Traffic in a VPN is not accessible from any unauthorized public networks because
it is secured with the masking IP address. This provides the benefit of access to blocked
resources to the users.
6. VPNs are financially speaking __________
a) Always more expensive than leased lines
b) Always cheaper than leased lines
c) Usually cheaper than leased lines
d) Usually more expensive than leased lines
View Answer
Answer: c
Explanation: The services of a VPN are cheaper for moderate to large scale institutional
networks than the services of leased lines. Though for a small scale network, it does not prove
to be as beneficial as the costs are not reduced to a great degree as compared to leased lines.
7. Which layer 3 protocols can be transmitted over an L2TP VPN?
a) Only IP
b) Only IPX
/https://www.sanfoundry.com/computer-networks-interview-questions-answers 2/5
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers - Sanfoundry
c) Only ICMP
d) IP and IPX
View Answer
Answer: d
Explanation: L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel all the L2 traffic on
an IP network and is able to transmit network layer’s IP and IPX protocol data.
8. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
a) IPsec
b) PPTP
c) PPP
d) L2TP
View Answer
Answer: a
Explanation: ESP is a security component of IPSec. ESP provides content protection and
ensures that there is integrity and confidentiality of the message. The other security
components of IPSec are Authentication Header and Internet Key Exchange.
9. L2F was developed by which company?
a) Microsoft
b) Cisco
c) Blizzard Entertainment
d) IETF
View Answer
Answer: b
Explanation: L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel
PPP traffic, helping create VPNs over the internet.
10. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: b
Explanation: PPTP stands for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol
that was primitively used to create VPNs. It is no longer used for VPNs due to the lack of
security it provides.
/https://www.sanfoundry.com/computer-networks-interview-questions-answers 3/5
2021/‫‏‬6/‫‏‬22
Computer Networks Interview Questions and Answers - Sanfoundry
11. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: c
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and
confidentiality between two machines in an IP network. It operates in the network layer.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for Interviews, here is complete set of 1000+ Multiple
Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – IPSecurity
» Next - Computer Networks Questions & Answers – SMI
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Railway Engineering MCQ (Multiple Choice Questions)
Traffic Engineering MCQ (Multiple Choice Questions)
C Programming Examples on File Handling
Energy & Environment Management MCQ (Multiple Choice Questions)
C# Programming Examples on Data Structures
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
Computer Graphics MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Master of Computer Applications Questions and Answers
SAN MCQ (Multiple Choice Questions)
Cloud Computing MCQ (Multiple Choice Questions)
Cyber Security MCQ (Multiple Choice Questions)
IOT MCQ (Multiple Choice Questions)
Computer Science Questions and Answers
Cryptography and Network Security MCQ (Multiple Choice Questions)
Computer Fundamentals MCQ (Multiple Choice Questions)
Neural Networks MCQ (Multiple Choice Questions)
Computer Networks Questions & Answers – Reference Models – 2
/https://www.sanfoundry.com/computer-networks-interview-questions-answers 4/5
2021/‫‏‬6/‫‏‬22
IPSecurity - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
IPSecurity
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“IPSecurity”.
1. IPSec is designed to provide security at the _________
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
View Answer
Answer: b
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and
confidentiality between two machines in an IP network. In the TCP/IP model, it provides
security at the IP layer i.e. the network layer.
2. In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer
View Answer
Answer: a
Explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire
packet between the IPSec endpoints. Using encryption, it provides secure communication
between the two endpoints.
3. Which component is included in IP security?
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
Ad closed
by
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 1/4
2021/‫‏‬6/‫‏‬22
IPSecurity - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: AH ensures that there is no retransmission of data from an unauthorized source,
and protects against data tampering. ESP provides with content protection and ensures that
there is integrity and confidentiality for the message. IKE is used to make sure that only the
intended sender and receiver can access the message.
4. WPA2 is used for security in _______
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email
View Answer
Answer: c
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and
firms with strong data security and protection for their wireless networks (WiFi) to give them
confidence that only authorized users can access their network.
5. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
View Answer
Answer: a
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network
by using a certain method that ensures that an essential network resource is unavailable to
the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding
and connection flooding.
6. Extensible authentication protocol is authentication framework frequently used in ______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network
View Answer
Answer: b
Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to
connect a network node to the Internet. It designed through extending the methods used by
the Point-to-Point Protocol for authentication.
/https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 2/4
2021/‫‏‬6/‫‏‬22
IPSecurity - Computer Networks Questions & Answers - Sanfoundry
7. Pretty good privacy (PGP) is used in ______
a) Browser security
b) Email security
c) FTP security
d) WiFi security
View Answer
Answer: b
Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the
content of an e-mail transmitted over the internet. It makes sure that the message cannot be
stolen by other unauthorized users.
8. PGP encrypts data by using a block cipher called ______
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) Local data encryption algorithm
View Answer
Answer: a
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP
used the cipher method BassOmatic.
9. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
View Answer
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid
credentials from a victim by spoofing the intended resource, and tricking the victim to give
his/her valid authorization credentials.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 3/4
2021/‫‏‬6/‫‏‬22
DHCP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
DHCP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DHCP”.
1. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
View Answer
Answer: a
Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which
is better than visiting each and every host on the network and configure all of this information
manually.
advertisement
2. DHCP is used for ________
a) IPv6
b) IPv4
c) Both IPv6 and IPv4
/https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 1/7
2021/‫‏‬6/‫‏‬22
DHCP - Computer Networks Questions & Answers - Sanfoundry
d) None of the mentioned
View Answer
Answer: c
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the
hosts know about the change dynamically, and hosts update their info themselves.
3. The DHCP server _________
a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
View Answer
Answer: d
Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP
offer containing IP address being offered, network mask offered, the amount of time that the
client can use and keep it, the ip address of the DHCP server making this offer.
advertisement
4. IP assigned for a client by DHCP server is
a) for a limited period
b) for an unlimited period
c) not time dependent
d) none of the mentioned
View Answer
Answer: a
Explanation: The IP address offered to a client is only for a limited period of time. There is
/https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 2/7
2021/‫‏‬6/‫‏‬22
DHCP - Computer Networks Questions & Answers - Sanfoundry
actually a certain amount of time that the client can use and keep this IP address.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer: b
Explanation: 67 is the UDP port number that is used as the destination port of a server.
Whereas UDP port number 68 is used by the client.
advertisement
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer
Answer: d
Explanation: When a host acquires multiple offers of IP addresses from different DHCP
servers, the host will broadcast a dhcp request identifying the server whose offer has been
accepted.
7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
/https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 3/7
2021/‫‏‬6/‫‏‬22
DHCP - Computer Networks Questions & Answers - Sanfoundry
c) TCP broadcast
d) TCP unicast
View Answer
Answer: a
Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since
TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its
operations.
advertisement
8. After obtaining the IP address, to prevent the IP conflict the client may use _________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Answer: c
Explanation: ARP abbreviation for address resolution protocol is used for mapping IP
addresses to MAC addresses that are present in the local network.
9. What is DHCP snooping?
a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 4/7
2021/‫‏‬6/‫‏‬22
DHCP - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2.
This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.
advertisement
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access
the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned
View Answer
Answer: c
Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered
by unauthorized servers. This features allows only specific mac addresses and IP addresses to
access the network.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – SSH
» Next - Computer Networks Questions & Answers – IPSecurity
/https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 5/7
2021/‫‏‬6/‫‏‬22
SSH - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
SSH
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SSH”.
1. Secure shell (SSH) network protocol is used for __________
a) secure data communication
b) remote command-line login
c) remote command execution
d) all of the mentioned
View Answer
Answer: d
Explanation: SSH provides high encryption and security features while communicating through
a network. It is a cryptographic network protocol.
advertisement
2. SSH can be used in only _____________
a) unix-like operating systems
b) windows
c) both unix-like and windows systems
/https://www.sanfoundry.com/computer-networks-questions-answers-ssh 1/6
2021/‫‏‬6/‫‏‬22
SSH - Computer Networks Questions & Answers - Sanfoundry
d) none of the mentioned
View Answer
Answer: c
Explanation: SSH isn’t confined to a certain network or operating system. It can be
implemented over different networks and on different operating systems.
3. SSH uses ___________ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key
View Answer
Answer: a
Explanation: Public encryption key is slower but more flexible. Every cryptographic security
system requires a private key for private access and a public key for location.
advertisement
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
View Answer
Answer: b
Explanation: Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and
also port forwarding.
/https://www.sanfoundry.com/computer-networks-questions-answers-ssh 2/6
2021/‫‏‬6/‫‏‬22
SSH - Computer Networks Questions & Answers - Sanfoundry
5. Which one of the following protocol can be used for login to a shell on a remote host except
SSH?
a) telnet
b) rlogin
c) both telnet and rlogin
d) none of the mentioned
View Answer
Answer: c
Explanation: SSH is more secured then telnet and rlogin.
advertisement
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) Rsync
d) All of the mentioned
View Answer
Answer: d
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file
transfer protocols which are used by SSH.
7. SSH-2 does not contain ______________
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ssh 3/6
2021/‫‏‬6/‫‏‬22
SSH - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: SSH2 is a more secure, portable and efficient version of SSH that includes SFTP,
which is functionally similar to FTP, but is SSH2 encrypted.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
View Answer
Answer: d
Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide
strong authentication and guarantee confidentiality.
9. SCP protocol is evolved from __________ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) GCP protocol
View Answer
Answer: a
Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion control
algorithm for fast user response times.
10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned
View Answer
Answer: d
Explanation: SSH used public key authentication, Password authentication, Host based
authentication, keyboard authentication and authentication of servers.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-ssh 4/6
2021/‫‏‬6/‫‏‬22
DNS - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
DNS
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DNS”.
1. The entire hostname has a maximum of ___________
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
View Answer
Answer: a
Explanation: An entire hostname can have a maximum of 255 characters. Although each label
must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a
network.
2. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer
Answer: b
Explanation: DNS client also known as DNS resolver also known as DNS lookup helps to
resolve DNS requests using an external DNS server.
3. Servers handle requests for other domains _______
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-dns 1/5
2021/‫‏‬6/‫‏‬22
DNS - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: Whenever a request is received at server from other domains, it handles this
situation by contacting remote DNS server.
4. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
View Answer
Answer: d
Explanation: Domain Name system not only deals with mapping IP addresses with the
hostname but also deals with exchange of information in the server.
5. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
View Answer
Answer: a
Explanation: Root name servers are actually very important and critical as they are the first
step in translating human readable hostnames into IP addresses for carrying out
communication.
6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
View Answer
Answer: a
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a
name server in the DNS. This does not require manual editing.
7. Wildcard domain names start with label _______
a) @
b) *
c) &
/https://www.sanfoundry.com/computer-networks-questions-answers-dns 2/5
2021/‫‏‬6/‫‏‬22
DNS - Computer Networks Questions & Answers - Sanfoundry
d) #
View Answer
Answer: b
Explanation: A wildcard DNS record matches requests to a non existent domain name. This
wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.
8. The right to use a domain name is delegated by domain name registers which are accredited
by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
View Answer
Answer: d
Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP
address space allocation, protocol identifier assignment, generic and country code Top Level
domain name system management (gTLD and ccTLD).
9. The domain name system is maintained by _______
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
View Answer
Answer: a
Explanation: A domain name system is maintained by a distributed database system. It is a
collection of multiple, logically interrelated databases distributed over a computer network.
10. Which one of the following is not true?
a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned
View Answer
Answer: c
Explanation: It need not be that a single hostname will correspond to a ip address. For
example facebook.com and fb.com both correspond to same ip address. So there can be
multiple hostnames for a single ip address.
/https://www.sanfoundry.com/computer-networks-questions-answers-dns 3/5
2021/‫‏‬6/‫‏‬22
SMTP Interview Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
SMTP – 2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SMTP –
2”.
1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for
electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
View Answer
Answer: a
Explanation: Since TCP is a reliable protocol, it’s more efficient to use TCP protocol for e-mail
transfer. TCP also provides more security than other transport layer protocols.
advertisement
2. SMTP connections secured by SSL are known as _____________
a) SMTPS
b) SSMTP
/https://www.sanfoundry.com/computer-networks-questions-answers-smtp 1/6
2021/‫‏‬6/‫‏‬22
SMTP Interview Questions & Answers - Sanfoundry
c) SNMP
d) STARTTLS
View Answer
Answer: a
Explanation: SSMTP is a simple mail transfer program to send mail from a local PC to a mail
host. SNMP is a network management protocol. STARTTLS connections are secured by TLS.
3. SMTP uses which of the following TCP port?
a) 22
b) 23
c) 21
d) 25
View Answer
Answer: d
Explanation: Port 21 is used for FTP control connection, port 22 is used by SSH, and port 23 is
used by TELNET.
advertisement
4. Which one of the following protocol is used to receive mail messages?
a) SMTP
b) Post Office Protocol (POP)
c) Internet Message Access Protocol (IMAP)
d) FTP
View Answer
Answer: d
Explanation: FTP is used to share files. SMTP, POP and IMAP are the protocols used to send
/https://www.sanfoundry.com/computer-networks-questions-answers-smtp 2/6
2021/‫‏‬6/‫‏‬22
SMTP Interview Questions & Answers - Sanfoundry
and receive mails on the internet.
5. What is on-demand mail relay (ODMR)?
a) protocol for SMTP security
b) an SMTP extension
c) protocol for web pages
d) protocol for faster mail transfer
View Answer
Answer: b
Explanation: ODMR is an extension to SMTP, in which mails are relayed to the receivers after
they are authenticated. It allows only the authorized receivers to receive the mail.
advertisement
6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) Name
View Answer
Answer: a
Explanation: The client needs to know the IP of its initial SMTP server as it has to send the mail
first to that server and then the server forwards the mail ahead on behalf of the user.
7. An SMTP session may not include _______
a) zero SMTP transaction
b) one SMTP transaction
c) more than one SMTP transaction
/https://www.sanfoundry.com/computer-networks-questions-answers-smtp 3/6
2021/‫‏‬6/‫‏‬22
SMTP Interview Questions & Answers - Sanfoundry
d) one HTTP transaction
View Answer
Answer: d
Explanation: An SMTP session can only include SMTP transactions regardless the number. Any
other protocol’s transaction is not included in an SMTP session.
8. SMTP defines _______
a) message transport
b) message encryption
c) message content
d) message password
View Answer
Answer: a
Explanation: As the name suggests, Simple Mail Transfer Protocol is only responsible for “how”
the message is transferred i.e. Transport of the message. Other protocols such as TCP are
used to provide other services like encryption for the messages.
9. Which one of the following is an SMTP server configured in such a way that anyone on the
internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) short mail reception
View Answer
Answer: a
Explanation: Anyone can send an e-mail through an Open Mail Relay server so it acted like a
free relay for email agents to forward their mails through. Open Mail Relays are now
unpopular because they can be used by attackers to perform man-in-the-middle attacks.
10. SMTP is not used to deliver messages to ______
a) user’s terminal
b) user’s mailbox
c) user’s word processor
d) user’s email client
View Answer
Answer: c
Explanation: SMTP can only be used to send messages to user’s terminal, email client or
mailbox. A stand-alone word processor cannot be connected to a network, so it won’t be
possible to deliver messages to it.
/https://www.sanfoundry.com/computer-networks-questions-answers-smtp 4/6
2021/‫‏‬6/‫‏‬22
SMTP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
SMTP – 1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SMTP –
1”.
1. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
View Answer
Answer: b
Explanation: SMTP clients are the entities that send mails to other mail servers. The SMTP
servers cannot send independent mails to other SMTP servers as an SMTP server. There are
no masters or peers in SMTP as it is based on the client-server architecture.
2. If you have to send multimedia data over SMTP it has to be encoded into _______
a) Binary
b) Signal
c) ASCII
d) Hash
View Answer
Answer: c
Explanation: Since only 7-bit ASCII codes are transmitted through SMTP, it is mandatory to
convert binary multimedia data to 7-bit ASCII before it is sent using SMTP.
3. Expansion of SMTP is ________
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-smtp 1/5
2021/‫‏‬6/‫‏‬22
SMTP - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: SMTP or Simple Mail Transfer Protocol is an application layer protocol used to
transport e-mails over the Internet. Only 7-bit ASCII codes can be sent using SMTP.
4. In SMTP, the command to write receiver’s mail address is written with the command _______
a) SEND TO
b) RCPT TO
c) MAIL TO
d) RCVR TO
View Answer
Answer: b
Explanation: RCPT TO command is followed by the recipient’s mail address to specify where or
to whom the mail is going to through the internet. If there is more than one receiver, the
command is repeated for each address continually.
5. The underlying Transport layer protocol used by SMTP is ________
a) TCP
b) UDP
c) Either TCP or UDP
d) IMAP
View Answer
Answer: a
Explanation: TCP is a reliable protocol, and Reliability is a mandatory requirement in e-mail
transmission using SMTP.
6. Choose the statement which is wrong incase of SMTP?
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) SMTP is responsible for the transmission of the mail through the internet
View Answer
Answer: b
Explanation: In SMTP, the sending mail server pushes the mail to receiving mail server hence it
is push protocol. In a pull protocol such as HTTP, the receiver pulls the resource from the
sending server.
7. Internet mail places each object in _________
a) Separate messages for each object
b) One message
c) Varies with number of objects
/https://www.sanfoundry.com/computer-networks-mcqs-smtp 2/5
2021/‫‏‬6/‫‏‬22
SMTP - Computer Networks Questions & Answers - Sanfoundry
d) Multiple messages for each object
View Answer
Answer: b
Explanation: It places all objects into one message as it wouldn’t be efficient enough if there
are different messages for each object. The objects include the text and all the multimedia to
be sent.
8. Typically the TCP port used by SMTP is _________
a) 25
b) 35
c) 50
d) 15
View Answer
Answer: a
Explanation: The ports 15, 35 and 50 are all UDP ports and SMTP only uses TCP port 25 for
reliability.
9. A session may include ________
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
View Answer
Answer: a
Explanation: An SMTP session consists of SMTP transactions only even if no transactions have
been performed. But no transactions in the session might mean that the session is inactive or
is just initiated.
10. Which of the following is an example of user agents for e-mail?
a) Microsoft Outlook
b) Facebook
c) Google
d) Tumblr
View Answer
Answer: a
Explanation: Among the options, only Microsoft Outlook is an e-mail agent. Google is a search
engine and Facebook, and Tumblr are social networking platforms. Gmail and Alpine are some
other examples of e-mail agent.
/https://www.sanfoundry.com/computer-networks-mcqs-smtp 3/5
2021/‫‏‬6/‫‏‬22
SMTP - Computer Networks Questions & Answers - Sanfoundry
11. When the sender and the receiver of an email are on different systems, we need only
_________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
View Answer
Answer: d
Explanation: The sender’s User Agent (UA) submits the message to a Message Transfer Agent
(MTA). Then the MTA sends the message to another MTA i.e. a mail relay. Then the receiver
receives the message from the mail relay whenever it is available.
12. User agent does not support this ___________
a) Composing messages
b) Reading messages
c) Replying messages
d) Routing messages
View Answer
Answer: d
Explanation: The user agent is basically a software program that allows the user to send, and
receive e-mail messages. Routing of the message is done by the Message Transfer Agent.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – FTP
» Next - Computer Networks Questions & Answers – SMTP – 2
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
C# Programming Examples on Interfaces
Java Programming Examples on Set & String Problems & Algorithms
IOT MCQ (Multiple Choice Questions)
C# Programming Examples on Data Structures
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
/https://www.sanfoundry.com/computer-networks-mcqs-smtp 4/5
2021/‫‏‬6/‫‏‬22
Internet Security - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Security In The Internet
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Security In The Internet”.
1. IPSec is designed to provide security at the _________
a) transport layer
b) network layer
c) application layer
d) session layer
View Answer
Answer: b
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and
confidentiality between two machines in an IP network. In the TCP/IP model, it provides
security at the IP layer i.e. the network layer.
advertisement
2. In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
/https://www.sanfoundry.com/computer-networks-questions-answers-security 1/8
2021/‫‏‬6/‫‏‬22
Internet Security - Computer Networks Questions & Answers - Sanfoundry
c) IP payload
d) IP trailer
View Answer
Answer: a
Explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire
packet between the IPSec endpoints. Using encryption, it provides secure communication
between the two endpoints.
3. Network layer firewall works as a ________
a) frame filter
b) packet filter
c) signal filter
d) content filter
View Answer
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as software-only, or
a combination of the two. In every case, the purpose of a firewall is to isolate your trusted
internal network (or your personal PC) from the dangers of unknown resources on the
Internet and other network connections that may be harmful. The firewall prevents
unauthorized access to your internal, trusted network from outside threats.
advertisement
4. Network layer firewall has two sub-categories called ____________
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
/https://www.sanfoundry.com/computer-networks-questions-answers-security 2/8
2021/‫‏‬6/‫‏‬22
Internet Security - Computer Networks Questions & Answers - Sanfoundry
d) network firewall and data firewall
View Answer
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless firewalls, creating
two subcategories of the standard network layer firewall. Stateful firewalls have the advantage
of being able to track packets over a period of time for greater analysis and accuracy — but
they require more memory and operate more slowly. Stateless firewalls do not analyze past
traffic and can be useful for systems where speed is more important than security, or for
systems that have very specific and limited needs. For example, a computer that only needs to
connect to a particular backup server does not need the extra security of a stateful firewall.
5. WPA2 is used for security in _______
a) ethernet
b) bluetooth
c) wi-fi
d) e-mail
View Answer
Answer: c
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and
firms with strong data security and protection for their wireless networks (WiFi) to give them
confidence that only authorized users can access their network.
advertisement
6. An attempt to make a computer resource unavailable to its intended users is called ______
a) denial-of-service attack
b) virus attack
c) worms attack
/https://www.sanfoundry.com/computer-networks-questions-answers-security 3/8
2021/‫‏‬6/‫‏‬22
Internet Security - Computer Networks Questions & Answers - Sanfoundry
d) botnet process
View Answer
Answer: a
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network
by using a certain method that ensures that an essential network resource is unavailable to
the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding
and connection flooding.
7. Extensible authentication protocol is authentication framework frequently used in ______
a) wired personal area network
b) wireless networks
c) wired local area network
d) wired metropolitan area network
View Answer
Answer: b
Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to
connect a network node to the Internet. It designed through extending the methods used by
the Point-to-Point Protocol for authentication.
advertisement
8. Pretty good privacy (PGP) is used in ______
a) browser security
b) email security
c) FTP security
d) wifi security
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-security 4/8
2021/‫‏‬6/‫‏‬22
Internet Security - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the
content of an e-mail transmitted over the internet. It makes sure that the message cannot be
stolen by other unauthorized users.
9. PGP encrypts data by using a block cipher called ______
a) international data encryption algorithm
b) private data encryption algorithm
c) internet data encryption algorithm
d) local data encryption algorithm
View Answer
Answer: a
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP
used the cipher method BassOmatic.
advertisement
10. When a DNS server accepts and uses incorrect information from a host that has no authority
giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
View Answer
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid
credentials from a victim by spoofing the intended resource, and tricking the victim to give
his/her valid authorization credentials.
/https://www.sanfoundry.com/computer-networks-questions-answers-security 5/8
2021/‫‏‬6/‫‏‬22
Computer Networks Online Test - Sanfoundry
Computer Networks Questions & Answers –
Packet Forwarding and Routing
« Prev
Next »
This set of Computer Networks online test focuses on “Packet Forwarding and Routing”.
1. The term that is used to place packet in its route to its destination is called __________
a) Delayed
b) Urgent
c) Forwarding
d) Delivering
View Answer
Answer: c
Explanation: Forwarding is done by the nodes in the path from source to destination, that are
not the intended destination for the packet in order to pass the packet to the next node in the
path. The destination machine does not forward the packet to any other node.
advertisement
2. A second technique to reduce routing table and simplify searching process is called _________
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
/https://www.sanfoundry.com/computer-networks-questions-answers-online-test 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Online Test - Sanfoundry
d) Network-Specific Membership
View Answer
Answer: a
Explanation: In the network specific forwarding method, there is only one record, the
destination of the packet, in the routing table and not the other hosts of the network. The
other two forwarding methods are the default method and the next-hop method.
3. Next-Hop Method is used to reduce contents of a _________
a) Revolving table
b) Rotating Table
c) Routing Table
d) Re-allocate table
View Answer
Answer: c
Explanation: In the next-hop forwarding method, the routing table of each router in the path
contains the address of only the next hop in the path of packet. This method is suitable for
short distances only.
advertisement
4. Several techniques can make size of routing table manageable and also handle issues such as
__________
a) Maturity
b) Error reporting
c) Tunneling
d) Security
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-online-test 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Online Test - Sanfoundry
Answer: d
Explanation: The size of the routing table in the technique must be manageable for the
network nodes i.e. it must not be too big. Security of the forwarding packet is the highest
priority for a technique and must be high enough so that only authorized senders and
receivers can access the packet’s content.
5. Host-specific routing is used for purposes such as checking route or providing _____
a) Network Measures
b) Security Measures
c) Routing Measures
d) Delivery Measures
View Answer
Answer: b
Explanation: In host-specific routing, the route of the packet is defined based on the exact
match of the packet’s IP with the routing table entry of the host. It provides the best security
for the packet as the packet is forwarded only to routers in the pre-defined path.
advertisement
6. In Unicast routing, if instability is between three nodes, stability cannot be ________
a) Stable
b) Reversed
c) Guaranteed
d) Forward
View Answer
Answer: c
Explanation: In Unicast routing, there is only sender and one receiver. So, if there is instability
between three nodes, in which one is sender, one is receiver and one is the router in the path,
/https://www.sanfoundry.com/computer-networks-questions-answers-online-test 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Online Test - Sanfoundry
there is no other path available for the packet and the stability of the network is not
guaranteed.
7. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
a) Graph
b) Tree
c) Network
d) Link
View Answer
Answer: a
Explanation: The Djikstra’s shortest path algorithm is the fastest among the algorithms for
finding the shortest path in a graph. But it is a greedy method based algorithm so it does not
guarantee the shortest path every time.
advertisement
8. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________
a) Gaps
b) Loops
c) Holes
d) Links
View Answer
Answer: b
Explanation: In multicast routing, there is one sender and many receivers. So flooding is the
most basic method to forward packets to many receivers. The one issue with flooding is that it
creates routing loops. One loop prevention method is that the routers will not send the packet
to a node where the packet has been received before.
/https://www.sanfoundry.com/computer-networks-questions-answers-online-test 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Online Test - Sanfoundry
9. RPF stands for __________
a) Reverse Path Forwarding
b) Reverse Path Failure
c) Reverse Packet Forwarding
d) Reverse Protocol Failure
View Answer
Answer: a
Explanation: Reverse Path Forwarding is a loop-free forwarding method for multi-cast routing
in modern systems. The method focuses on forwarding the packet away from the source IP in
each iteration to make sure there is no loops.
advertisement
10. LSP stands for __________
a) Link Stable Packet
b) Link State Packet
c) Link State Protocol
d) Link State Path
View Answer
Answer: b
Explanation: A Link State Packet is a packet created by a router that lists its neighboring nodes
and routers in link state routing protocol. It is shared with other routers to find the shortest
path from a source to the destination.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for online tests, here is complete set of 1000+
Multiple Choice Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-online-test 5/7
2021/‫‏‬6/‫‏‬22
Web Caching - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Web Caching
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Web
Caching”.
1. What does REST stand for?
a) Represent State Transfer
b) Representational State Transfer
c) Representing State Transfer
d) Representation State Transfer
View Answer
Answer: b
Explanation: REST stands for Representational State Transfer and is a software architecture
style in which the server sends a representation of the state of the resource that it requests. It
provides interoperability between the systems.
advertisement
2. Which of the following protocol is used by Restful web services as a medium of
communication between client and server?
a) HTTP
/https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 1/7
2021/‫‏‬6/‫‏‬22
Web Caching - Computer Networks Questions & Answers - Sanfoundry
b) FTP
c) Gopher
d) TELNET
View Answer
Answer: a
Explanation: Restful web services make use of HTTP protocol as a medium of communication
between client and server. The REST architecture was known as the HTTP object model back in
the year 1994.
3. Which of the following is not a good practice to create a standard URI for a web service?
a) Maintain Backward Compatibility
b) Use HTTP Verb
c) Using spaces for long resource names
d) Use lowercase letters
View Answer
Answer: c
Explanation: We must use hyphens (-) or underscores (_) instead of spaces to represent long
resource names. It may lead to the resource to be less recognizable for the system if we use
spaces instead.
advertisement
4. Which of the following HTTP methods should be idempotent in nature?
a) OPTIONS
b) DELETE
c) POST
d) HEAD
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 2/7
2021/‫‏‬6/‫‏‬22
Web Caching - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: DELETE operation should be idempotent, means their result will always same no
matter how many times these operations are invoked. Also, the PUT operation is supposed to
be idempotent.
5. Which of the following directive of Cache Control Header of HTTP response indicates that
resource is cachable by only client and server?
a) Public
b) Private
c) Nocache/nostore
d) Maxage
View Answer
Answer: b
Explanation: Private directive indicates that resource is cachable by only client and server; no
intermediary can cache the resource. But if we use the public directive, it indicates that the
resource may be cachable by any intermediary component.
advertisement
6. Which of the following HTTP Status code means CREATED, when a resource is successful
created using POST or PUT request?
a) 200
b) 201
c) 204
d) 304
View Answer
Answer: b
Explanation: HTTP Status Code 201 means CREATED, when a resource is successful created
/https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 3/7
2021/‫‏‬6/‫‏‬22
Web Caching - Computer Networks Questions & Answers - Sanfoundry
using POST or PUT request. The code 200 means success i.e. OK, code 204 means NO
CONTENT, and the code 304 means NOT MODIFIED.
7. Which of the following annotation of JAX RS API is used to annotate a method used to create
resource?
a) @Path
b) @GET
c) @PUT
d) @POST
View Answer
Answer: C
Explanation: @PUT is the HTTP request that is used to create resource and also define a
complete resource path. @POST may also be used to create a resource but it won’t define a
resource path i.e. an accessing medium.
advertisement
8. Which of the following annotation of JAX RS API binds the parameter passed to method to a
HTTP matrix parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam
View Answer
Answer: c
Explanation: @MatrixParam is the annotation that binds the parameter passed to method to a
HTTP matrix parameter in path, while @QueryParam binds to a query parameter,
@PathParam binds to a value and @HeaderParam binds to the HTTP header in the path.
/https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 4/7
2021/‫‏‬6/‫‏‬22
Web Caching - Computer Networks Questions & Answers - Sanfoundry
9. In REST architecture, a REST Server simply provides access to resources and REST client
accesses and presents the resources.
a) False
b) True
View Answer
Answer: b
Explanation: In REST architecture, a REST Server simply provides access to resources and REST
client accesses and presents the resources. It is popularly used because it makes efficient use
of the bandwidth and can be cached for better performance and scalability.
advertisement
10. POST operation should be idempotent.
a) True
b) False
View Answer
Answer: b
Explanation: POST operation can cause different result so they are not idempotent. The
DELETE and PUT operations are idempotent as they invoke the same result every time they
are called.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 5/7
2021/‫‏‬6/‫‏‬22
Cookies - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Cookies
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Cookies”.
1. Cookies were originally designed for ____________
a) Client side programming
b) Server side programming
c) Both Client side programming and Server side programming
d) Socket programming
View Answer
Answer: b
Explanation: Cookies were originally designed for server side programming, and at the lowest
level, they are implemented as an extension to the HTTP protocol. They were introduced with
the intention of providing a better user experience for the websites.
advertisement
2. The Cookie manipulation is done using which property?
a) cookie
b) cookies
/https://www.sanfoundry.com/computer-networks-questions-answers-cookie 1/8
2021/‫‏‬6/‫‏‬22
Cookies - Computer Networks Questions & Answers - Sanfoundry
c) manipulate
d) manipulate cookie
View Answer
Answer: a
Explanation: The cookie property sets or returns all name/value pairs of cookies in the current
document. There are no methods involved: cookies are queried, set, and deleted by reading
and writing the cookie property of the Document object using specially formatted strings.
3. Which of the following explains Cookies nature?
a) Non Volatile
b) Volatile
c) Intransient
d) Transient
View Answer
Answer: d
Explanation: Cookies are transient by default; the values they store last for the duration of the
web browser session but are lost when the user exits the browser. While the browsing session
is active the cookie stores the user values in the user’s storage itself and accesses them.
advertisement
4. Which attribute is used to extend the lifetime of a cookie?
a) Higher-age
b) Increase-age
c) Max-age
d) Lifetime
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-cookie 2/8
2021/‫‏‬6/‫‏‬22
Cookies - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: If you want a cookie to last beyond a single browsing session, you must tell the
browser how long (in seconds) you would like it to retain the cookie by specifying a max-age
attribute. A number of seconds until the cookie expires. A zero or negative number will kill the
cookie immediately.
5. Which of the following defines the Cookie visibility?
a) Document Path
b) LocalStorage
c) SessionStorage
d) All of the mentioned
View Answer
Answer: d
Explanation: sessionStorage, localStorage and Document path all are used to store data on the
client-side. Each one has its own storage and expiration limit. Cookie visibility is scoped by the
document origin as Local Storage and Session Storage are, and also by document path.
advertisement
6. Which of the following can be used to configure the scope of the Cookie visibility?
a) Path
b) Domain
c) Both Path and Domain
d) Server
View Answer
Answer: d
Explanation: The Cookie visibility scope is configurable through cookie attributes path and
domain. Domain attribute in the cookie is used to specify the domain for which the cookie is
/https://www.sanfoundry.com/computer-networks-questions-answers-cookie 3/8
2021/‫‏‬6/‫‏‬22
Cookies - Computer Networks Questions & Answers - Sanfoundry
sent. Path includes the Path attribute in the cookie to specify the path for which this cookie is
sent.
7. How can you set a Cookie visibility scope to local Storage?
a) /
b) %
c) *
d) #
View Answer
Answer: a
Explanation: Setting the path of a cookie to “/” gives scoping like that of localStorage and also
specifies that the browser must transmit the cookie name and value to the server whenever it
requests any web page on the site.
advertisement
8. Which of the following is a Boolean cookie attribute?
a) Bool
b) Secure
c) Lookup
d) Domain
View Answer
Answer: b
Explanation: The final cookie attribute is a boolean attribute named secure that specifies how
cookie values are transmitted over the network. By default, cookies are insecure, which means
that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked
secure, however, it is transmitted only when the browser and server are connected via HTTPS
or another secure protocol.
/https://www.sanfoundry.com/computer-networks-questions-answers-cookie 4/8
2021/‫‏‬6/‫‏‬22
Cookies - Computer Networks Questions & Answers - Sanfoundry
9. Which of the following function is used as a consequence of not including semicolons,
Commas or whitespace in the Cookie value?
a) EncodeURIComponent()
b) EncodeURI()
c) EncodeComponent()
d) Encode()
View Answer
Answer: a
Explanation: Cookie values cannot include semicolons, commas, or whitespace. For this
reason, you may want to use the core JavaScript global function encodeURIComponent() to
encode the value before storing it in the cookie.
advertisement
10. What is the constraint on the data per cookie?
a) 2 KB
b) 1 KB
c) 4 KB
d) 3 KB
View Answer
Answer: c
Explanation: Each cookie can hold up to only 4 KB. In practice, browsers allow many more than
300 cookies total, but the 4 KB size limit may still be enforced by some. Storage of a session
has to be a minimum of 5MB.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-cookie 5/8
2021/‫‏‬6/‫‏‬22
Computer Networks Assessment Questions - Sanfoundry
Computer Networks Questions & Answers –
Socket Programming
« Prev
Next »
This set of Computer Networks Assessment Questions and Answers focuses on “Socket
Programming”.
1. Which methods are commonly used in Server Socket class?
a) Public Output Stream get Output Stream ()
b) Public Socket accept ()
c) Public synchronized void close ()
d) Public void connect ()
View Answer
Answer: b
Explanation: The Public socket accept () method is used by the ServerSocket class to accept the
connection request of exactly one client at a time. The client requests by initializing the socket
object with the servers IP address.
advertisement
2. Which constructor of Datagram Socket class is used to create a datagram socket and binds it
with the given Port Number?
a) Datagram Socket(int port)
/https://www.sanfoundry.com/computer-networks-assessment-questions-answers 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Assessment Questions - Sanfoundry
b) Datagram Socket(int port, Int Address address)
c) Datagram Socket()
d) Datagram Socket(int address)
View Answer
Answer: b
Explanation: Datagram Socket (int port, Int Address address) is used to create a datagram
socket. A datagram socket is created for connection-less communication between the server
and the client. There is no accept() method in this class.
3. The client in socket programming must know which information?
a) IP address of Server
b) Port number
c) Both IP address of Server & Port number
d) Only its own IP address
View Answer
Answer: c
Explanation: The client in socket programming must know IP address of Server as it has to use
that IP address in order to initialize the socket class constructor. That is how the client
requests a connection to the server.
advertisement
4. The URL Connection class can be used to read and write data to the specified resource that is
referred by the URL.
a) True
b) False
View Answer
/https://www.sanfoundry.com/computer-networks-assessment-questions-answers 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Assessment Questions - Sanfoundry
Answer: a
Explanation: The URL Connection class can be used to read and write data to the specified
resource referred by the URL. A connection to the URL is initialized by the OpenConnection()
method of the class.
5. Datagram is basically just a piece of information but there is no guarantee of its content,
arrival or arrival time.
a) True
b) False
View Answer
Answer: a
Explanation: Datagram is basically some information travelling between the sender and the
receiver, but there is no guarantee of its content, arrival or arrival time. A Datagram socket
class object is created to make a datagram connection between the server and the client.
advertisement
6. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
a) Socket
b) IP Address
c) Protocol
d) MAC Address
View Answer
Answer: c
Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol. Out of them, TCP is a
transport layer protocol and FTP, TELNET, SMTP and POP are application layer protocols.
/https://www.sanfoundry.com/computer-networks-assessment-questions-answers 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Assessment Questions - Sanfoundry
7. What does the java.net.InetAddress class represent?
a) Socket
b) IP Address
c) Protocol
d) MAC Address
View Answer
Answer: b
Explanation: The java.net.InetAddress class represents IP Address of a particular specified
host. It can be used to resolve the host name from the IP address or the IP address from the
host name.
advertisement
8. The flush () method of Print Stream class flushes any un-cleared buffers in the memory.
a) True
b) False
View Answer
Answer: a
Explanation: The flush () method of Print Stream class flushes any un cleared buffers in
memory.
9. Which classes are used for connection-less socket programming?
a) Datagram Socket
b) Datagram Packet
c) Both Datagram Socket & Datagram Packet
d) Server Socket
View Answer
/https://www.sanfoundry.com/computer-networks-assessment-questions-answers 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Assessment Questions - Sanfoundry
Answer: c
Explanation: Datagram is basically some information travelling between the sender and the
receiver, but there is no guarantee of its content, arrival or arrival time. Datagram Socket,
Datagram Packet are used for connection-less socket programming, while Server Socket is
used for connection-oriented socket programming.
advertisement
10. In Inet Address class, which method returns the host name of the IP Address?
a) Public String get Hostname()
b) Public String getHostAddress()
c) Public static InetAddress get Localhost()
d) Public getByName()
View Answer
Answer: a
Explanation: In Inet Address class public String getHostname() method returns the host name
of the IP Address. The getHostAddress() method returns the IP address of the given host
name.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks Assessment Questions, here is complete set of
1000+ Multiple Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Ports
/https://www.sanfoundry.com/computer-networks-assessment-questions-answers 5/7
2021/‫‏‬6/‫‏‬22
Ports - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Ports
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ports”.
1. Multiple objects can be sent over a TCP connection between client and server in a persistent
HTTP connection.
a) True
b) False
View Answer
Answer: a
Explanation: Persistent connections are kept active after completing transaction so that
multiple objects can be sent over the same TCP connection.
advertisement
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
/https://www.sanfoundry.com/computer-networks-questions-answers-port 1/7
2021/‫‏‬6/‫‏‬22
Ports - Computer Networks Questions & Answers - Sanfoundry
d) data link layer
View Answer
Answer: a
Explanation: HTTP is an Application layer protocol used to define how messages are formatted
and transmitted through the World Wide Web.
3. In the network HTTP resources are located by __________
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) Union resource locator
View Answer
Answer: a
Explanation: The Uniform Resource Identifier is a name and locator for the resource to be
located by the HTTP. The URLs and URNs are derived through the identifier.
advertisement
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) User datagram protocol
b) Transmission control protocol
c) Border gateway protocol
d) Domain host control protocol
View Answer
Answer: b
Explanation: HTTP clients perform requests using a TCP connection, because the TCP
/https://www.sanfoundry.com/computer-networks-questions-answers-port 2/7
2021/‫‏‬6/‫‏‬22
Ports - Computer Networks Questions & Answers - Sanfoundry
connection provides a more reliable service. UDP is not a reliable protocol, border gateway
protocol is used on top of TCP, while domain host control protocol is a network layer protocol.
5. In HTTP pipelining __________
a) multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) multiple HTTP requests cannot be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
View Answer
Answer: a
Explanation: HTTP pipelining helps the client make multiple requests without having to waiting
for each response, thus saving a lot of time and bandwidth for the client.
advertisement
6. FTP server listens for connection on which port number?
a) 20
b) 21
c) 22
d) 23
View Answer
Answer: b
Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote login. Port 23 is used
for TELNET.
7. In FTP protocol, a client contacts a server using ______ as the transport protocol.
a) Transmission control protocol
/https://www.sanfoundry.com/computer-networks-questions-answers-port 3/7
2021/‫‏‬6/‫‏‬22
Ports - Computer Networks Questions & Answers - Sanfoundry
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
View Answer
advertisement
8. In Active mode FTP, the client initiates both the control and data connections.
a) True
b) False
View Answer
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control connections,
while in Active mode, the client initiates the control connection and then the server initiates
the data connection.
9. The File Transfer Protocol is built on __________
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
View Answer
Answer: c
Explanation: The FTP connection includes a Server and a Client which wish to share files. The
server can have multiple clients at the same time while the client communicates with only one
server at a time.
/https://www.sanfoundry.com/computer-networks-questions-answers-port 4/7
2021/‫‏‬6/‫‏‬22
Ports - Computer Networks Questions & Answers - Sanfoundry
advertisement
10. In File Transfer Protocol, data transfer cannot be done in __________
a) stream mode
b) block mode
c) compressed mode
d) message mode
View Answer
Answer: d
Explanation: In Stream mode, the data is transferred in a continuous stream. In Block mode,
data is transferred after being divided into smaller blocks. In Compressed mode, data is
transferred after being compressed using some compression algorithm.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Cryptography
» Next - Computer Networks Questions & Answers – Socket Programming
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-port 5/7
2021/‫‏‬6/‫‏‬22
Cryptography - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Cryptography
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Cryptography”.
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) decrypted message
View Answer
Answer: a
Explanation: Cipher is a method to implement encryption and decryption of messages
travelling in a network. It’s used to increase the confidentiality of the messages.
advertisement
2. In asymmetric key cryptography, the private key is kept by __________
a) sender
b) receiver
c) sender and receiver
/https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 1/7
2021/‫‏‬6/‫‏‬22
Cryptography - Computer Networks Questions & Answers - Sanfoundry
d) all the connected devices to the network
View Answer
Answer: b
Explanation: The private key is kept only by the receiver of the message. Its aim is to make
sure that only the intended receiver can decipher the message.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) dsa algorithm
View Answer
Answer: c
Explanation: Electronic code book algorithm is a block cipher method in which each block of
text in an encrypted message corresponds to a block of data. It is not feasible for block sizes
smaller than 40 bits.
advertisement
4. In cryptography, the order of the letters in a message is rearranged by __________
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) quadratic ciphers
View Answer
Answer: a
Explanation: In transposition ciphers, the order of letters in a plaintext message is shuffled
/https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 2/7
2021/‫‏‬6/‫‏‬22
Cryptography - Computer Networks Questions & Answers - Sanfoundry
using a pre-defined method. Some of such ciphers are Rail fence cipher and Columnar
transposition.
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
View Answer
Answer: a
Explanation: DES is a symmetric key block cipher in which the block size is 64 bits and the key
size is 64 bits. It is vulnerable to some attacks and is hence not that popularly used.
advertisement
6. Cryptanalysis is used __________
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) to make new ciphers
View Answer
Answer: a
Explanation: Cryptanalysis is a field of study in which a cryptographic scheme is intentionally
tried to breach in order to find flaws and insecurities. It is used to make sure that the scheme
is least vulnerable to attacks.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
/https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 3/7
2021/‫‏‬6/‫‏‬22
Cryptography - Computer Networks Questions & Answers - Sanfoundry
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
View Answer
Answer: b
Explanation: TLS has strong message authentication and key-material generation to prevent
eavesdropping, tampering and message forgery. It has been used since the year 1996.
advertisement
8. Voice privacy in GSM cellular telephone protocol is provided by _______
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer
Answer: a
Explanation: The A5/2 cipher was published in the year 1996 and was cryptanalysed in the
same year within a month. It’s use was discontinued from the year 2006 as it was really weak.
9. ElGamal encryption system is __________
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) block cipher method
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 4/7
2021/‫‏‬6/‫‏‬22
Cryptography - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: The ELGamal encryption system was made by Taher Elgamal in the year 1985 and
is an asymmetric key algorithm. It is popularly used in PGP and other systems.
advertisement
10. Cryptographic hash function takes an arbitrary block of data and returns _________
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) variable sized byte string
View Answer
Answer: a
Explanation: Cryptographic hash functions are used in digital signatures and message
authentication codes. The only issue with it is that it returns the same hash value every time
for a message making it vulnerable to attackers to evaluate and break the cipher.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – RIP v2
» Next - Computer Networks Questions & Answers – Ports
/https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 5/7
2021/‫‏‬6/‫‏‬22
Computer Networks Multiple Choice Questions and Answers - Sanfoundry
Computer Networks Questions & Answers –
RIP v2
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers focuses on “RIP v2”.
1. Which statement is true regarding classless routing protocols?
a) The use of discontinuous networks is not allowed
b) The use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing
View Answer
Answer: b
Explanation: Classful routing means that all hosts in the internetwork use the same mask.
Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also
support discontinuous networking.
advertisement
2. What is route poisoning?
a) It sends back the protocol received from a router as a poison pill, which stops the regular
updates. The use of variable length subnet masks is permitted
b) It is information received from a router that can’t be sent back to the originating router.RIPv2
/https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Multiple Choice Questions and Answers - Sanfoundry
supports classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity
View Answer
Answer: d
Explanation: When a network goes down, the distance-vector routing protocol initiates route
poisoning by advertising the network with a metric of 16, or unreachable.
3. Which of the following is true regarding RIPv2?
a) It has a lower administrative distance than RIPv1
b) It converges faster than RIPv1
c) It has the same timers as RIPv1
d) It is harder to configure than RIPv1
View Answer
Answer: c
Explanation: RIPv2 is pretty much just like RIPv1. It has the same administrative distance and
timers and is configured just like RIPv1.
advertisement
4. Which of the situations might not require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
View Answer
/https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Multiple Choice Questions and Answers - Sanfoundry
Answer: a
Explanation: Multiple routing protocols are required only when we need to migrate from one
routing protocol to another, or when we are using routers from multiple vendors, or when
there are host-based routers from multiple vendors. Routing is not a layer-2 function so we
don’t require multiple routing protocols when new layer-2 switch is added.
5. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP
View Answer
Answer: c
Explanation: OSPF stands for Open Shortest Path First. It is a Link state routing protocol. IP
EIGRP and RIPv2 can be redistributed into OSPF by a Cisco router.
advertisement
6. Which is a reason for avoiding doing route redistribution on two routers between the same
two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
View Answer
Answer: b
Explanation: Routing feedback is an anomaly in which the routing protocols go back and forth
/https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Multiple Choice Questions and Answers - Sanfoundry
between one route and another. Routing feedback is a reason for avoiding doing route
redistribution on two routers between the same two routing domains.
7. What does administrative distance rank?
a) Metrics
b) Sources of routing information
c) Router reliability
d) Best paths
View Answer
Answer: b
Explanation: Sources of routing information is the administrative distance rank. It is used by
routers to select the best path when there are different routes to the same destination. It’s
used only two different routing protocols are being used.
advertisement
8. Which protocol maintains neighbor adjacencies?
a) RIPv2 and EIGRP
b) IGRP and EIGRP
c) RIPv2
d) EIGRP
View Answer
Answer: c
Explanation: Neighbor adjacency refers to the formal handshake performed by neighboring
routers. It is to be done before the router share any routing information. RIP V2 maintains
neighbor adjacencies.
/https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 4/7
2021/‫‏‬6/‫‏‬22
Computer Networks Multiple Choice Questions and Answers - Sanfoundry
9. Which routing protocol implements the diffusing update algorithm?
a) IS-IS
b) IGRP
c) EIGRP
d) OSPF
View Answer
Answer: c
Explanation: The diffusing update algorithm (DUAL) is used to maintain backup routes to a
destination for when the primary route fails. EIGRP routing protocol implements the diffusing
update algorithm.
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – RIP v1
» Next - Computer Networks Questions & Answers – Cryptography
advertisement
/https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 5/7
2021/‫‏‬6/‫‏‬22
RIP v1 - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
RIP v1
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RIP v1”.
1. Which routing protocol has a maximum network diameter (hop count) of 15?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both RIPv1 and RIPv2
View Answer
Answer: d
Explanation: Both RIPv1 and RIPv2 support a maximum hop count of 15 because they use 4bits to store this value. RIPv1 uses classful routing whereas RIPv2 uses classless routing. The
routing updates are broadcasted over the network. It notifies routers about the update so that
they update their own routing tables.
advertisement
2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
/https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 1/7
2021/‫‏‬6/‫‏‬22
RIP v1 - Computer Networks Questions & Answers - Sanfoundry
c) Every 90 seconds
d) RIPv1 does not broadcast periodically
View Answer
Answer: a
Explanation: RIPv1 router broadcasts its routing table every 30 seconds by default. The
broadcasted routing table can be used by other routers to find the shortest path among the
network devices.
3. Which command displays RIP routing updates?
a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route
View Answer
Answer: b
Explanation: The debug IP rip command is used to show the Internet Protocol (IP) Routing
Information Protocol (RIP) updates being sent and received on the router. It verifies that the
updates are being broadcasted and not multicasted.
advertisement
4. Two connected routers are configured with RIP routing. What will be the result when a router
receives a routing update that contains a higher-cost path to a network already in its routing
table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will
/https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 2/7
2021/‫‏‬6/‫‏‬22
RIP v1 - Computer Networks Questions & Answers - Sanfoundry
exchange routing updates to reach convergence
View Answer
Answer: b
Explanation: When a routing update is received by a router, the router first checks the
administrative distance (AD) and always chooses the route with the lowest AD. However, if two
routes are received and they both have the same AD, then the router will choose the one
route with the lowest metrics, or in RIP’s case, hop count.
5. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to
you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
View Answer
Answer: c
Explanation: You cannot have 16 hops on a RIP network by default, because the max default
hops possible is 15. If you receive a route advertised with a metric of 16, this means it is
inaccessible.
advertisement
6. Default administrative distance of a static route is ________
a) 0
b) 90
c) 100
d) 1
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 3/7
2021/‫‏‬6/‫‏‬22
RIP v1 - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: 1 is the default administrative distance of Static Route. It is used by routers to
select the best path when there are different routes to the same destination. It’s used only two
different routing protocols are being used.
7. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) ICMP
d) IP
View Answer
Answer: b
Explanation: RIP gives a full route table update every 30 seconds. The broadcasted routing
table can be used by other routers to find the shortest path among the network devices.
advertisement
8. _________ is the default administrative distance of RIP.
a) 0
b) 90
c) 120
d) 130
View Answer
Answer: c
Explanation: The default administrative distance is the default count of numbers assigned to
arbitrary routes to a destination. The default administrative distance of RIP is 120. It is used to
find the shortest route amongst the number of paths available.
/https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 4/7
2021/‫‏‬6/‫‏‬22
RIP v1 - Computer Networks Questions & Answers - Sanfoundry
9. Which statement is true regarding classless routing protocol?
a) The use of discontinuous networks is not allowed
b) Use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) IGRP supports classes routing within the same autonomous system
View Answer
Answer: b
Explanation: Use of variable length subnet masks is permitted in classless routing protocols.
Also use of discontinuous networks is allowed in such routing protocols. RIPv1 is a classful
routing protocol but RIPv2 is classless routing protocol.
advertisement
10. Where should we use default routing?
a) On stub networks- which have only one exit path out of the network
b) Which have more than one exit path out of the network
c) Minimum five exit paths out of the network
d) Maximum five exit paths out of the network
View Answer
Answer: a
Explanation: We must use default routing on stub networks. They have only one exit path out
of the network, so there can be no specific path decided for such networks.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 5/7
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers – IP
Routing
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IP
Routing”.
1. Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
View Answer
Answer: c
Explanation: The Ethernet 802.3 framing is used for NetWare versions 2 to 3.11, and the
Ethernet 802.2 framing is used for NetWare versions 3.12 and later plus OSI routing, Ethernet
II is used with TCP/IP and DEC net, and Ethernet SNAP is used with TCP/IP and AppleTalk. The
type field in Ethernet 802.2 frame is replaced by a length field in Ethernet 802.3.
advertisement
2. Consider a situation in which you are a system administrator on a NetWare network, you are
running NetWare 4.11 and you cannot communicate with your router. What is the likely
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 1/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
problem?
a) NetWare 4.11 defaults to 802.2 encapsulation
b) NetWare 4.11 defaults to 802.3 encapsulation
c) Cisco routers only work with NetWare 3.11
d) NetWare 3.11 defaults to 802.2 encapsulation
View Answer
Answer: a
Explanation: The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare
3.12and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.
3. NetWare IPX addressing uses a network number and a node number. Which statement is not
true?
a) The network address is administratively assigned and can be up to 16 hexadecimal digits long
b) The node address is always administratively assigned
c) The node address is usually the MAC address
d) If the MAC address is used as the node address, then IPX eliminates the use of ARP
View Answer
Answer: b
Explanation: The network address can be up to 16 hexadecimal digits in length. The node
number is 12 hexadecimal digits. The node address is usually the MAC address. An example
IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is
0000.0c56.de33. The network number is assigned by the system administrator of the Novell
network and the MAC address/node address is not assigned by the administrator.
4. Which NetWare protocol works on layer 3–network layer—of the OSI model?
a) IPX
b) NCP
c) SPX
d) NetBIOS
View Answer
Answer: a
Explanation: IPX (Internetwork Packet Exchange) is the NetWare network layer 3 protocol used
for transferring information on LANs that use Novell’s NetWare.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 2/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
5. Which NetWare protocol provides link-state routing?
a) NLSP
b) RIP
c) SAP
d) NCP
View Answer
Answer: a
Explanation: NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service
Advertisement Protocol) advertises network services. NCP (NetWare Core Protocol) provides
client-to-server connections and applications. RIP is a distance vector routing protocol. NLSP
was developed by Novell to replace RIP routing protocols.
advertisement
6. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP
transaction” command will flood the console. What is the command that you should use?
a) Debug IP IGRP event
b) Debug IP IGRP-events
c) Debug IP IGRP summary
d) Debug IP IGRP events
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 3/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: The “debug IP IGRP events” is used to display a short summary of IGRP routing
information. You can append an IP address onto either console’s command-line to see only
the IGRP updates from a neighbor. The command will only give a short summary and hence
won’t flood the command line.
7. What does the following series of commands “Router IGRP 71 network” accomplish?
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0
b) It loads IGRP for networks 109 and 71
c) It disables RIP
d) It disables all routing protocols
View Answer
Answer: a
Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems
109 and71 with IGRP. IGRP does not disable RIP, both can be used at the same time.
advertisement
8. The “IPX delay number” command will allow an administrator to change the default settings.
What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
View Answer
Answer: a
Explanation: Tick is basically the update rate of clients in the network. The IPX delay number
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 4/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
will give the ticks at a certain time. The default ticks are–for LAN interfaces, one tick, and for
WAN interfaces, six ticks.
9. As a system administrator, you need to set up one Ethernet interface on the Cisco router to
allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish
this?
a) Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX network 6c
b) Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0 IPX encapsulation sap IPX network 6c
c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX
encapsulation sap
d) Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX network 6c
View Answer
Answer: d
Explanation: The following commands setup the sub interfaces to allow for two types of
encapsulation:interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet0.2 IPX encapsulation sap IPX network 6c.
advertisement
10. What does the “IPX maximum-paths 2” command accomplish?
a) It enables load sharing on 2 paths if the paths are equal metric paths
b) It sets up routing to go to network 2
c) It is the default for Cisco IPX load sharing
d) It enables load sharing on 2 paths if the paths are unequal metric paths
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 5/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: It enables load sharing on 2 paths if the paths are equal metric paths. The default
is 1 path and the maximum is 512 paths. The value must always be greater than 1 and must be
a natural number.
11. You want to enable both arpa and snap encapsulation on one router interface. How do you
do this?
a) The interface can handle multiple encapsulation types with no extra configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure anything
View Answer
12. By default, Cisco routers forward GNS SAPs to remote networks.
a) False
b) True
View Answer
Answer: a
Explanation: GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local
network,that server will respond. If there isn’t, the Cisco router has to be configured to
forward theGNS SAP.
13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not
forward them. How are services advertised to other networks?
a) Each router builds its own SAP table and forwards that every 60 seconds
b) Each router assigns a service number and broadcasts that
c) SAPs aren’t necessary with Cisco routers
d) Cisco routers filter out all SAPs
View Answer
Answer: a
Explanation: Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs
can’t befiltered even with 4.x since NDS and time synchronization uses SAPs.
14. Novell’s implementation of RIP updates routing tables every _________ seconds.
a) 60
b) 90
c) 10
d) 30
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 6/9
2021/‫‏‬6/‫‏‬22
IP Routing - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10
seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES
signals every 90 seconds.
15. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the
correct metrics.
a) Ticks & Hops
b) Hops & Loops
c) Loops & Counts
d) Counts & Ticks
View Answer
Answer: a
Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops
are equal, then it uses an administratively assigned tiebreaker.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Designing Subnet Masks
» Next - Computer Networks Questions & Answers – RIP v1
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 7/9
2021/‫‏‬6/‫‏‬22
Computer Networks MCQs - Sanfoundry
Computer Networks Questions & Answers –
Designing Subnet Masks
« Prev
Next »
This set of Computer Networks MCQs focuses on “Designing Subnet Masks”.
1. A network administrator is connecting hosts A and B directly through their Ethernet interfaces,
as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be
done to provide connectivity between the hosts?
i. A crossover cable should be used in place of the straight-through cable.
ii. A rollover cable should be used in place of the straight-through cable.
iii. The subnet masks should be set to 255.255.255.192.
iv. A default gateway needs to be set on each host.
v. The subnet masks should be set to 255.255.255.0.
a) i only
b) ii only
c) iii and iv only
d) i and v only
View Answer
Answer: d
Explanation: First, if you have two hosts directly connected, as shown in the graphic, then you
need a crossover cable. A straight-through cable won’t work. Second, the hosts have different
masks, which puts them in different subnets. The easy solution is just to set both masks to
255.255.255.0 (/24).
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following
can be valid host IDs on the LAN interface attached to the router?
/https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 1/6
2021/‫‏‬6/‫‏‬22
Computer Networks MCQs - Sanfoundry
i. 172.16.1.100
ii. 172.16.1.198
iii. 172.16.2.255
iv. 172.16.3.0
a) i only
b) ii and iii only
c) iii and iv only
d) ii only
View Answer
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23, which is
255.255.254.0. This makes the third octet a block size of 2. The router’s interface is in the
172.16.2.0 subnet, and the broadcast address is 172.16.3.255 because the next subnet is
172.16.4.0. The valid host range is 172.16.2.1 to 172.16.3.254. The router is using the first valid
host address in the range.
3. Which two statements describe the IP address 10.16.3.65/23?
i. The subnet address is 10.16.3.0 255.255.254.0.
ii. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
iii. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
iv. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
a) i and iii
b) ii and iv
c) i, ii and iv
d) ii, iii and iv
View Answer
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address means that there are
15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes
the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in
the 10.16.2.0 subnet. The next subnet is 10.16.4.0, so the broadcast address for the 10.16.2.0
subnet is 10.16.3.255. The valid host addresses are 10.16.2.1 to 10.16.3.254.
4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet
that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
/https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 2/6
2021/‫‏‬6/‫‏‬22
Computer Networks MCQs - Sanfoundry
c) 16
d) 30
View Answer
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each
with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not
at all. The number of host bits would never change.
5. You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful
subnet mask would you use?
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240
provides 16 subnets with 14 hosts which is less than 15, so this will not work. The mask
255.255.255.224 provides 8 subnets, each with 30 hosts so this may work. The mask
255.255.255.192 provides 4 subnets, each with 60 hosts so this may work. Comparing both the
possible masks, 255.255.255.224 provides the best answer.
6. You have a network that needs 29 subnets while maximizing the number of host addresses
available on each subnet. How many bits must you borrow from the host field to provide the
correct subnet mask?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: d
Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We
need more subnets, so let’s add subnet bits. One more subnet bit would be a 248 mask. This
provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best
answer.
7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be
the valid subnet address of this host?
a) 172.16.112.0
b) 172.16.0.0
c) 172.16.96.0
/https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 3/6
2021/‫‏‬6/‫‏‬22
Computer Networks MCQs - Sanfoundry
d) 172.16.255.0
View Answer
Answer: a
Explanation: A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth
octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in
the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a
value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of
127 since 128 is the next subnet
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP addresses on the LAN attached to the router
interface?
a) 6
b) 8
c) 30
d) 32
View Answer
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits.
Six hosts are the maximum number of hosts on this LAN, including the router interface. Out of
the 8 addresses possible with the host bits, the first and the last address are for the subnet id
and broadcast address respectively.
9. What is the subnet id of a host with an IP address 172.16.66.0/21?
a) 172.16.36.0
b) 172.16.48.0
c) 172.16.64.0
d) 172.16.0.0
View Answer
Answer: c
Explanation: A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet,
so we just count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is
72.0, so the broadcast address of the 64 subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 4/6
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Analyzing Subnet Masks
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Analyzing Subnet Masks”.
1. Which of the following is the broadcast address for a Class B network ID using the default
subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
View Answer
Answer: c
Explanation: In this case, the class B network ID is 172.16.0.0. We know that the default mask
of a class B network is 255.255.0.0. If we OR any address in a network with the complement of
the default mask (0.0.255.255), we get the broadcast address of the network. In this case, the
result of OR would be 172.16.255.255.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 1/8
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
2. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class
of address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
View Answer
Answer: b
Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From
the subnet mask, we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127
and 172.16.13.128 to 172.16.13.255. The IP 172.16.13.5 lies in the first subnet. So the starting
address 172.16.13.0 is the subnet address and last address 172.16.13.127 is the broadcast
address.
3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you
use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would use the Class C
mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have
four subnet bits and four host bits. Using our math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.
4. The combination of _________ and __________ is often termed the local address of the local
portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
View Answer
Answer: c
Explanation: It is termed as the local address because the address won’t be applicable outside
the subnet. Sub networking is implemented for remote sensing in transparent way from that
host which is contained in the sub network which called a local operation.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 2/8
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting
View Answer
Answer: a
Explanation: Static subnetting is used when the requirement is of same number of hosts in
each subnet for the institution. The same subnet mask can be used to find the subnet id of
each subnet. It is usually used to divide large networks into smaller parts.
advertisement
6. State whether true or false.
i) A connection oriented protocol can only use unicast addresses.
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 3/8
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
ii) The any cast service is included in IPV6.
a) True, True
b) True, False
c) False, True
d) False, False
View Answer
Answer: a
Explanation: In a connection oriented protocol, the host can only establish connection with
another host on one unique channel, that’s why it can only use unicast addresses. In IPv6,
there is an anycast address in IPv6 which allows sending messages to a group of devices but
not all devices in a network.
7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances
upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
View Answer
Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber
optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000
stations connected.
advertisement
8. Which of the following are Gigabit Ethernets?
a) 1000 BASE-SX
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 4/8
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
b) 1000 BASE-LX
c) 1000 BASE-CX
d) All of the mentioned
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing
various technologies for transmitting Ethernet frames at a rate of a gigabit per second
(1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use
beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of
being considerably faster.
9. _________ is a collective term for a number of Ethernet Standards that carry traffic at the
nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet
View Answer
Answer: b
Explanation: Fast Ethernet is a set of Ethernet Standards which were introduced in 1995, that
carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most commonly used Fast
Ethernet standard.
advertisement
10. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 5/8
2021/‫‏‬6/‫‏‬22
Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry
c) NET/SW
d) FS/NET
View Answer
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its optical
combiner and mixing rod splitter are presented. The limited power budget and relatively large
tapping losses of light wave technology, which limit the use of fiber optics in tapped bus LAN
topologies, are examined and proven tolerable in optical star topologies.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – IPV4 and IPV6 Comparision
» Next - Computer Networks Questions & Answers – Designing Subnet Masks
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
Java Programming Examples on Utility Classes
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Information Science Questions and Answers
Electronics & Communication Engineering Questions and Answers
Electrical Engineering Questions and Answers
/https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 6/8
2021/‫‏‬6/‫‏‬22
IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
IPV4 and IPV6 Comparision
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPV4
and IPV6 Comparision”.
1. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling
View Answer
Answer: a
Explanation: The Internet Protocol is the networking protocol that establishes the internet by
relaying datagram across network boundaries. ICMP is a supporting protocol for IP which
handles the Error Reporting functionality.
advertisement
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
/https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 1/7
2021/‫‏‬6/‫‏‬22
IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not related to
fragmentation but is used to request specific treatment such as high throughput, high
reliability or low latency for the IP packet depending upon the type of service it belongs to.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on
the number of hops it makes (Number of routers it goes through). TTL field is decremented by
one each time the datagram is processed by a router. When the value is 0, the packet is
automatically destroyed.
advertisement
4. If the value in protocol field is 17, the transport layer protocol used is _________
a) TCP
b) UDP
c) ICMP
d) IGMP
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 2/7
2021/‫‏‬6/‫‏‬22
IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can
be used to carry payloads of more than one protocol type. Its most used values are 17 and 6
for UDP and TCP respectively. ICMP and IGMP are network layer protocols.
5. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) ttl
d) identifier
View Answer
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the original
datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits).
advertisement
6. The size of an IP address in IPv6 is _________
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion unique
addresses are available in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a
brilliant alternative in case IPv4 runs out of possible new addresses.
/https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 3/7
2021/‫‏‬6/‫‏‬22
IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry
7. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results in faster
processing of the datagram. There is one fixed header and optional headers which may or
may not exist. The fixed header contains the mandatory essential information about the
packet while the optional headers contain the optional “not that necessary” information.
advertisement
8. In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
View Answer
Answer: c
Explanation: The traffic class field is used to specify the priority of the IP packet which is a
similar functionality to the Type of Service field in the IPv4 header. It’s an 8-bit field and its
values are not defined in the RFC 2460.
9. IPv6 does not use ________ type of address.
a) Broadcast
b) Multicast
/https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 4/7
2021/‫‏‬6/‫‏‬22
IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry
c) Any cast
d) Unicast
View Answer
Answer: a
Explanation: There is no concept of broadcast address in IPv6. Instead, there is an anycast
address in IPv6 which allows sending messages to a group of devices but not all devices in a
network. Anycast address is not standardized in IPv4.
advertisement
10. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
View Answer
Answer: d
Explanation: There is an anycast address in IPv6 which allows sending messages to a group of
devices but not all devices in a network. Anycast address is not standardized in IPv4.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 5/7
2021/‫‏‬6/‫‏‬22
Computer Networks Quiz - Sanfoundry
Computer Networks Questions & Answers –
Transition from IPV4 to IPV6
« Prev
Next »
This set of Computer Networks Quiz focuses on “Transition from IPV4 to IPV6”.
1. The main reason for transition from IPv4 to IPv6 is _________
a) Huge number of systems on the internet
b) Very low number of system on the internet
c) Providing standard address
d) To provide faster internet
View Answer
Answer: a
Explanation: Due to huge number of systems on the internet and the lower number of
available addresses on IPv4, transition from IPv4 to IPv6 needs to happen. IPv4 provides
around 4 billion unique IP addresses whereas IPv6 provides over 340 undecillion unique IP
addresses.
advertisement
2. Which of the following is not a transition strategy?
a) Dual stack
b) Tunneling
/https://www.sanfoundry.com/computer-networks-questions-answers-quiz 1/7
2021/‫‏‬6/‫‏‬22
Computer Networks Quiz - Sanfoundry
c) Conversion
d) Header translation
View Answer
Answer: c
Explanation: As IPv4 addresses are of 32 bits and IPv6 addresses are of 128 bits, it is not
possible to convert IPv4 address to IPv6 address. So, Dual stack, tunneling and header
translation are the three strategies which might help in the transition from IPv4 to IPv6.
3. To determine which version to use when sending a packet to a destination, the source host
queries which of the following?
a) Dual stack
b) Domain Name Server
c) Header information
d) Transport layer
View Answer
Answer: b
Explanation: Source host queries DNS to determine which version to use when sending a
packet to a destination. The DNS contains both, the IPv4 and IPv6 addresses of the modern
dual stack host servers.
advertisement
4. The strategy used when two computers using IPv6 want to communicate with each other and
the packet must pass through a region that uses IPv4 is ______________
a) Dual stack
b) Header translation
c) Conversion
/https://www.sanfoundry.com/computer-networks-questions-answers-quiz 2/7
2021/‫‏‬6/‫‏‬22
Computer Networks Quiz - Sanfoundry
d) Tunneling
View Answer
Answer: d
Explanation: In tunneling, The IPv4 routers can form a tunnel in which at the sender’s side, the
IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4
packet is stripped and the IPv6 packet is sent to the receiver.
5. The correct format of packet in tunnel that uses IPv4 region is ________
i. IPv6 header
ii. Payload
iii. IPv4 header
a) iii-i-ii
b) iii-ii-i
c) i-ii-iii
d) i-iii-ii
View Answer
Answer: a
Explanation: At the sender’s side, the IPv6 datagram is encapsulated in to IPv4 i.e. An IPv4
header is inserted on top of the IPv6 header, and then the packet is sent through the tunnel.
advertisement
6. ___________ is necessary when the sender wants to use IPv6, but the receiver does not
understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
/https://www.sanfoundry.com/computer-networks-questions-answers-quiz 3/7
2021/‫‏‬6/‫‏‬22
Computer Networks Quiz - Sanfoundry
d) Tunneling
View Answer
Answer: b
Explanation: Header translation is used when the sender wants to use IPv6, but the receiver
does not understand IPv6. It is made possible through a Network Address Translation –
Protocol Translation enabled device such as a gateway.
7. Header translation uses ___________ to translate an IPv6 address to an IPv4 address.
a) IP address
b) Physical address
c) Mapped address
d) MAC address
View Answer
Answer: c
Explanation: A mapped IPv6 address contains the IPv4 address in its last 32-bits and is
preceded by 16 1s and 80 0s. It can be used to translate an IPv6 address to an IPv4 address.
advertisement
8. Which of the following is not a step in the Header translation procedure?
a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits
b) The value of the IPv6 priority field is discarded
c) The type of service field in IPv4 is set to zero
d) The IPv6 flow label is considered
View Answer
Answer: d
Explanation: In the header translation procedure, first the IPv6 mapped address is changed to
/https://www.sanfoundry.com/computer-networks-questions-answers-quiz 4/7
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
ICMP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ICMP”.
1. Internet Control Message Protocol (ICMP) has been designed to compensate _________
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
View Answer
Answer: d
Explanation: IP by itself does not provide the features of error reporting or error correction.
So, to address these issues a network layer protocol called Internet Control Message Protocol
is used. ICMP operates over the IP packet to provide error reporting functionality.
advertisement
2. Header size of the ICMP message is _________
a) 8-bytes
b) 8-bits
c) 16-bytes
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 1/8
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
d) 16-bits
View Answer
Answer: a
Explanation: An ICMP message has an 8-byte header and a variable size data section. Out of
the 8 bytes, the first 4 bytes are of a fixed format having the type, code and checksum fields
and the next 4 bytes depend upon the type of the message.
3. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) Previous router
View Answer
Answer: b
Explanation: ICMP notifies the source about the error when an error is detected because the
datagram knows information about source and destination IP address. The source can then
retransmit the data again or try to correct those errors.
advertisement
4. Which of these is not a type of error-reporting message?
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 2/8
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: Router error is not a type of error-reporting message in ICMP. The type of error
reporting message is specified in the ICMP header. Destination unreachable is type 3 error
message, source quench is type 4, and time exceeded is type 11 error message.
5. ICMP error message will not be generated for a datagram having a special address such as
_______
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
View Answer
Answer: a
Explanation: 127.0.0.0 is a special address known as the loopback address which is used for
testing purpose of a machine without actually communicating with a network. Thus no error
reporting message will be generated for such special addresses.
advertisement
6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is
discarded and the router or the host sends a ____________ message back to the source host that
initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 3/8
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Router sends destination unreachable message if the destination is not found.
Destination unreachable is type 3 error reporting message. It is invoked when the router can’t
find a path to the intended destination to forward the packet through.
7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP.
a) error control
b) flow control
c) router control
d) switch control
View Answer
Answer: b
Explanation: Firstly, it informs the source that the datagram has been discarded. Secondly, it
warns the source that there is congestion in the network. It’s type 4 error reporting message
after which the source is expected to reduce the flow of packets.
advertisement
8. In case of time exceeded error, when the datagram visits a router, the value of time to live
field is _________
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
View Answer
Answer: d
Explanation: This field will be decremented by 1 at every router, and will be zero by the time it
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 4/8
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
reaches source. This error reporting message is type 11 and is used to prevent the router from
travelling forever in case some unknown path anomaly occurs.
9. Two machines can use the timestamp request and timestamp replay messages to determine
the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
View Answer
Answer: b
Explanation: The round-trip time refers to the total time taken combining the time taken for a
packet sent from a source to reach a destination and the time taken the acknowledgement
sent by the destination to reach the source. The Router sends destination unreachable
message if the destination is not found.
advertisement
10. During debugging, we can use the ____________ program to find if a host is alive and
responding.
a) traceroute
b) shell
c) ping
d) java
View Answer
Answer: c
Explanation: Ping program is used to find if a host is alive and responding. It is to be entered
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 5/8
2021/‫‏‬6/‫‏‬22
ICMP - Computer Networks Questions & Answers - Sanfoundry
into a command line with the syntax “ping (IP address)” to be executed. Traceroute is a
program used to find the shortest route to the destination IP.
11. In windows ____________ can be used to trace the route of the packet from the source to the
destination.
a) traceroute
b) tracert
c) ping
d) locater
View Answer
Answer: b
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX. Tracert is a
program used to find the shortest route to the destination IP. The Router sends destination
unreachable message if a path to the destination IP is not found.
12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value
of checksum is ___________
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
View Answer
Answer: a
Explanation: The sender side adds the bits of the fragmented packet to find a sum. Checksum
is the compliment of the sum (exchange 0’s and 1’s). The receiver then has to verify the
checksum by adding the bits of the received packet to ensure that the packet is error-free.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – P2P Applications
» Next - Computer Networks Questions & Answers – Transition from IPV4 to IPV6
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-icmp 6/8
2021/‫‏‬6/‫‏‬22
Computer Networks Problems - Sanfoundry
Computer Networks Questions & Answers –
P2P Applications
« Prev
Next »
This set of Computer Networks Problems focuses on “P2P Applications”.
1. Which layer is responsible for process-to-process delivery?
a) Physical layer
b) Network layer
c) Transport layer
d) Application layer
View Answer
Answer: c
Explanation: The transport layer is responsible for process-to-process delivery, error control
and flow control. It provides an interface for the implementation of process to process delivery
through ports. There are 65,535 port numbers.
advertisement
2. In process-to-process delivery, two processes communicate in which of the following
methods?
a) Client/Server
b) Source/Destination
/https://www.sanfoundry.com/computer-networks-problems 1/8
2021/‫‏‬6/‫‏‬22
Computer Networks Problems - Sanfoundry
c) Message Transfer
d) Peer to Peer
View Answer
Answer: a
Explanation: The most common method used for this communication is Client/Server. The
client requests a service through a particular port number to the port of the server using its
socket address. Then the server responds by giving the requested service to the client port.
3. Multiple processes on destinations at transport layer are identified by __________
a) Mac address
b) Port number
c) Host number
d) Host address
View Answer
Answer: b
Explanation: Multiple processes on destinations are identified by a transport layer address
also called as port number. The IP address along with the port number is called the socket
address.
advertisement
4. Range of port numbers in Internet model is __________
a) 0 and 32,765(8-bit)
b) 0 and 32,765(16-bit)
c) 0 and 65,535(32-bit)
d) 0 and 65,535(16-bit)
View Answer
/https://www.sanfoundry.com/computer-networks-problems 2/8
2021/‫‏‬6/‫‏‬22
Computer Networks Problems - Sanfoundry
Answer: d
Explanation: Port numbers are 16-bit integers between 0 and 65,535. They are an interface for
the implementation of process to process delivery for the transport layer.
5. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not
a part of port number ranges?
a) Well-known ports
b) Registered ports
c) Dynamic ports
d) Static ports
View Answer
Answer: d
Explanation: IANA divided port numbers into three ranges i.e., Well-known, Registered and
Dynamic ports. Well-known port numbers range from 0 to 1023, registered port numbers are
from 1024 to 49151 and dynamic port numbers are from 49152 to 65535.
advertisement
6. The combination of an IP address and port number is called as ________
a) Socket address
b) Port address
c) MAC address
d) Host address
View Answer
Answer: a
Explanation: Socket address is the combination of an IP address and a port number and it is
used to define the client-end and server-end processes uniquely.
/https://www.sanfoundry.com/computer-networks-problems 3/8
2021/‫‏‬6/‫‏‬22
Computer Networks Problems - Sanfoundry
7. Which of the following is false with respect to Connectionless service of transport layer
protocol?
a) Packets are not numbered
b) Packets are not delayed
c) No acknowledgement
d) Packet may arrive out of sequence
View Answer
Answer: b
Explanation: There is a high probability in connectionless services like UDP that the packet gets
delayed or lost because there is no connection made between the two end nodes. No
connection means that there is no unique pathway for the packets to travel.
advertisement
8. Correct order in the process of Connection-Oriented services is ________
i. Data transfer
ii. Connection release
iii. Connection establishment
a) i-ii-iii
b) iii-ii-i
c) ii-i-iii
d) iii-i-ii
View Answer
Answer: d
Explanation: First the client has to request a connection and the server has to accept the
connection to establish a connection. Then data transfer can start between the two ends. Then
both client and server need to terminate their ends to terminate the connection.
/https://www.sanfoundry.com/computer-networks-problems 4/8
2021/‫‏‬6/‫‏‬22
Computer Networks Problems - Sanfoundry
9. In transport layer, Multiplexing is done at _________
a) Channel
b) Receiver site
c) Sender site
d) Packet
View Answer
Answer: c
Explanation: At the sender’s side, there are multiple processes which may want to send
packets. But there is only one transport layer protocol like TCP or UDP working at a time. So
the transport layer protocol gets the messages from these processes and separates them with
different port numbers. This process is called multiplexing and it is done before sending
packets to the receivers side.
advertisement
10. The process of error checking and dropping of the header, delivering messages to
appropriate process based on port number is called as _______
a) Delivery of packets
b) Error correction
c) Multiplexing
d) Demultiplexing
View Answer
Answer: d
Explanation: Demultiplexing is the process of error checking and dropping of the header,
delivering messages to appropriate process based on port number. The transport layer does
this on the receiver’s end after the packet is received and takes help of the header attached by
the sender’s side transport layer during multiplexing.
/https://www.sanfoundry.com/computer-networks-problems 5/8
2021/‫‏‬6/‫‏‬23
EIGRP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
EIGRP
« Prev
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “EIGRP”.
1. EIGRP is a routing protocol design by Cisco.
a) True
b) False
View Answer
Answer: a
Explanation: EIGRP stands for Enhanced Interior Gateway Routing Protocol is a routing
protocol designed by Cisco. It is available only on Cisco routers.
advertisement
2. EIGRP metric is ________
a) K-values
b) Bandwidth only
c) Hop Count
d) Delay only
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 1/7
2021/‫‏‬6/‫‏‬23
EIGRP - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: EIGRP metric is K-values which are integers from 0 to 128. They are used to
calculate the overall EIGRP cost with bandwidth and delay metrics.
3. EIGRP can support ____________
a) VLSM/subnetting
b) Auto summary
c) Unequal cast load balancing
d) All of the mentioned
View Answer
Answer: d
Explanation: EIGRP supports variable and fixed length subnetting, Auto summary, and
Unequal cast load balancing to provide efficient routing functionality on Cisco routers.
advertisement
4. EIGRP sends a hello message after every ___________ seconds.
a) 5 seconds (LAN), 60 seconds (WAN)
b) 5 seconds (LAN), 5 seconds (WAN)
c) 15s
d) 180s
View Answer
Answer: a
Explanation: EIGRP routers broadcast the hello packets frequently to familiarize with the
neighbors. EIGRP routers send the hello message after every 5 seconds on LAN, and every 60
seconds on WAN.
/https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 2/7
2021/‫‏‬6/‫‏‬23
EIGRP - Computer Networks Questions & Answers - Sanfoundry
5. Administrative distance for internal EIGRP is ______
a) 90
b) 170
c) 110
d) 91
View Answer
Answer: a
Explanation: Routers use the metric of administrative distance to select the best path when
there are different routes to the same destination from two different routing protocols as it is
a measure of reliability of routing protocols. Administrative distance for internal EIGRP is 90.
advertisement
6. The EIGRP metric values include:
a) Delay
b) Bandwidth
c) MTU
d) All of the mentioned
View Answer
Answer: d
Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU. MTU stands for
Maximum Transmission Unit. They are combined together to give the overall EIGRP cost in Kvalues.
7. For default gateway, which of following commands will you use on a Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
/https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 3/7
2021/‫‏‬6/‫‏‬23
EIGRP - Computer Networks Questions & Answers - Sanfoundry
d) Default network
View Answer
Answer: a
Explanation: IP default network command is used to find the default gateway in Cisco router. If
the router finds routes to the node, it considers the routes to that node for installation as the
gateway to it.
advertisement
8. Administrative distance for external EIGRP route is _______
a) 90
b) 170
c) 110
d) 100
View Answer
Answer: b
Explanation: Routers use the metric of administrative distance to select the best path when
there are different routes to the same destination from two different routing protocols as it is
a measure of reliability of routing protocols. Administrative distance for external EIGRP is 170.
9. EIGRP uses the ____________ algorithm for finding shortest path.
a) SPF
b) DUAL
c) Linkstat
d) Djikstra’s
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 4/7
2021/‫‏‬6/‫‏‬23
EIGRP - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path. DUAL stands for
diffusing update algorithm and it is used to prevent routing loops by recalculating routes
globally.
advertisement
10. In EIGRP best path is known as the successor, where as backup path is known as __________
a) Feasible successor
b) Back-up route
c) Default route
d) There is no backup route in EIGRP
View Answer
Answer: a
Explanation: Feasible successor is the backup path. The backup path is used alternatively used
whenever the best path fails. It is not used primarily because it is comparatively expensive
than the best path.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – PPP
/https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 5/7
2021/‫‏‬6/‫‏‬23
Basic Computer Networks Questions and Answers - Sanfoundry
Computer Networks Questions & Answers –
PPP
« Prev
Next »
This set of Basic Computer Networks Questions and Answers focuses on “PPP”.
1. Both HDLC and PPP are Data link layer protocols.
a) True
b) False
View Answer
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol. HDLC stands for High level
Data Link Control and PPP stands for Point to Point Protocol.
advertisement
2. Which protocol does the PPP protocol provide for handling the capabilities of the
connection/link on the network?
a) LCP
b) NCP
Ad
Online July 13: Don't Miss Out
c) Both LCP and NCP
ISO/IEC 19790 Conference
/https://www.sanfoundry.com/computer-networks-basic-questions-answers 1/7
2021/‫‏‬6/‫‏‬23
Basic Computer Networks Questions and Answers - Sanfoundry
d) TCP
View Answer
Answer: c
Explanation: LCP stands for Link Control Protocol and NCP stands for Network Control
Protocol. LCP and NCP are the PPP protocols which provide interface for handling the
capabilities of the connection/link on the network.
3. The PPP protocol _________
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Is designed for simple links which transport packets between two peers and making an
Internet connection over a phone line
d) Is used for sharing bandwidth
View Answer
Answer: c
Explanation: The PPP protocol is designed for handling simple links which transport packets
between two peers. It is a standard protocol that is used to make an Internet connection over
phone lines.
advertisement
4. PPP provides the _______ layer in the TCP/IP suite.
a) Link
b) Network
c) Transport
d) Application
View Answer
/https://www.sanfoundry.com/computer-networks-basic-questions-answers 2/7
2021/‫‏‬6/‫‏‬23
Basic Computer Networks Questions and Answers - Sanfoundry
Answer: a
Explanation: PPP provides function of the link layer in the TCP/IP suite. It focuses on the link
between two nodes that is going to be used by the users to communicate. It can use preinstalled phone line for the purpose.
5. PPP consists of ________components
a) Three (encapsulating, the Domain Name system)
b) Three (encapsulating, a link control protocol, NCP)
c) Two (a link control protocol, Simple Network Control protocol)
d) One (Simple Network Control protocol)
View Answer
Answer: b
Explanation: PPP consists of three components namely Link Control Protocol (LCP), Network
Control Protocol (NCP), and Encapsulation. LCP and NCP are the PPP protocols which provide
interface for handling the capabilities of the connection/link on the network and encapsulation
provides for multiplexing of different network-layer protocols.
advertisement
6. The PPP encapsulation ____________
a) Provides for multiplexing of different network-layer protocols
b) Requires framing to indicate the beginning and end of the encapsulation
c) Establishing, configuring and testing the data-link connection
d) Provides interface for handling the capabilities of the connection/link on the network
View Answer
Answer: a
Explanation: Encapsulation is a part of PPP which provides means for multiplexing of different
/https://www.sanfoundry.com/computer-networks-basic-questions-answers 3/7
2021/‫‏‬6/‫‏‬23
Basic Computer Networks Questions and Answers - Sanfoundry
network-layer protocols. The other two parts of PPP are Link Control Protocol and Network
Control Protocol.
7. A Link Control Protocol (LCP) is used for ____________
a) Establishing, configuring and testing the data-link connection
b) Establishing and configuring different network-layer protocols
c) Testing the different network-layer protocols
d) Provides for multiplexing of different network-layer protocols
View Answer
Answer: a
Explanation: The Link Control Protocol (LCP) is the part of PPP that is used for establishing,
configuring and testing the data-link connection. The other two components are Network
Control Protocol and Encapsulation.
advertisement
8. A family of network control protocols (NCPs) ____________
a) Are a series of independently defined protocols that provide a dynamic
b) Are a series of independently-defined protocols that encapsulate
c) Are a series of independently defined protocols that provide transparent
d) The same as NFS
View Answer
Answer: b
Explanation: The family of network control protocols (NCPs) is a series of independentlydefined protocols that encapsulate the data flowing between the two nodes. It provides means
for the network nodes to control the link traffic.
/https://www.sanfoundry.com/computer-networks-basic-questions-answers 4/7
2021/‫‏‬6/‫‏‬23
Basic Computer Networks Questions and Answers - Sanfoundry
9. Choose the correct statement from the following.
a) PPP can terminate the link at any time
b) PPP can terminate the link only during the link establishment phase
c) PPP can terminate the link during the authentication phase
d) PPP can terminate the link during the callback control phase
View Answer
Answer: a
Explanation: PPP allows termination of the link at any time in any phase because it works on
the data link layer which is the layer in control of the link of the communication.
advertisement
10. The link necessarily begins and ends with this phase. During the ______ phase, the LCP
automata will be in INITIAL or STARTING states.
a) Link-termination phase
b) Link establishment phase
c) Authentication phase
d) Link dead phase
View Answer
Answer: d
Explanation: The link necessarily begins and ends with the link dead phase. During this phase,
the LCP automata will be in the initial or its final state. The link is non-functioning or inactive
during the link dead phase.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice basic questions and answers on all areas of Computer Networks, here is complete
set of 1000+ Multiple Choice Questions and Answers.
/https://www.sanfoundry.com/computer-networks-basic-questions-answers 5/7
2021/‫‏‬6/‫‏‬23
Computer Networks Questions for Entrance Exams - Sanfoundry
Computer Networks Questions & Answers –
Intrusion Detection Systems
« Prev
Next »
This set of Computer Networks Questions and Answers for Entrance exams focuses on “Intrusion
Detection Systems”.
1. Which of the following is an advantage of anomaly detection?
a) Rules are easy to define
b) Custom protocols can be easily analyzed
c) The engine can scale as the rule set grows
d) Malicious activity that falls within normal usage patterns is detected
View Answer
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can scale more
quickly and easily than the signature-based model because a new signature does not have to
be created for every attack and potential variant.
advertisement
2. A false positive can be defined as ________
a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to
represent legitimate network traffic or behavior
/https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 1/8
2021/‫‏‬6/‫‏‬23
Computer Networks Questions for Entrance Exams - Sanfoundry
b) An alert that indicates nefarious activity on a system that is not running on the network
c) The lack of an alert for nefarious activity
d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns
out to represent legitimate network traffic or behavior and An alert that indicates nefarious
activity on a system that is not running on the network
View Answer
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system that, upon
further inspection, turns out to represent legitimate network traffic or behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in
relation to the firewall is the most productive placement?
a) Inside the firewall
b) Outside the firewall
c) Both inside and outside the firewall
d) Neither inside the firewall nor outside the firewall.
View Answer
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to see all
the “attacks” against your connection, but given the care and feeding any IDS requires, do
yourself a favor and keep your NIDS sensors on the inside of the firewall.
advertisement
4. What is the purpose of a shadow honeypot?
a) To flag attacks against known vulnerabilities
b) To help reduce false positives in a signature-based IDS
c) To randomly check suspicious traffic identified by an anomaly detection system
/https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 2/8
2021/‫‏‬6/‫‏‬23
Computer Networks Questions for Entrance Exams - Sanfoundry
d) To enhance the accuracy of a traditional honeypot
View Answer
Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the same characteristics
of protected applications running on both the server and client side of a network and operate
in conjunction with an ADS.
5. At which two traffic layers do most commercial IDSes generate signatures?
a) Application layer and Network layer
b) Network layer and Session Layer
c) Transport layer and Application layer
d) Transport layer and Network layer
View Answer
Answer: d
Explanation: Most commercial IDSes generate signatures at the network and transport layers.
These signatures are used to ensure that no malicious operation is contained in the traffic.
Nemean generates signature at application and session layer.
advertisement
6. IDS follows a two-step process consisting of a passive component and an active component.
Which of the following is part of the active component?
a) Inspection of password files to detect inadvisable passwords
b) Mechanisms put in place to reenact known methods of attack and record system responses
c) Inspection of system to detect policy violations
d) Inspection of configuration files to detect inadvisable settings
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 3/8
2021/‫‏‬6/‫‏‬23
Computer Networks Questions for Entrance Exams - Sanfoundry
Answer: b
Explanation: Secondary components of mechanism are set in place to reenact known methods
of attack and to record system responses. In passive components, the system I designed just
to record the system’s responses in case of an intrusion.
7. When discussing IDS/IPS, what is a signature?
a) An electronic signature used to authenticate the identity of a user on the network
b) Attack-definition file
c) It refers to “normal,” baseline network behavior
d) It is used to authorize the users on a network
View Answer
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are
constantly updated with attack-definition files (signatures) that describe each type of known
malicious activity. Nemean is a popular signature generation method for conventional
computer networks.
advertisement
8. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at
which two layers?
a) Application layer and Transport layer
b) Network layer and Application layer
c) Session layer and Transport layer
d) Application layer and Session layer
View Answer
Answer: d
Explanation: Nemean automatically generates “semantics-aware” signatures based on traffic
/https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 4/8
2021/‫‏‬6/‫‏‬23
Computer Networks Questions for Entrance Exams - Sanfoundry
at the session and application layers. These signatures are used to ensure that no malicious
operation is contained in the traffic.
9. Which of the following is used to provide a baseline measure for comparison of IDSes?
a) Crossover error rate
b) False negative rate
c) False positive rate
d) Bit error rate
View Answer
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to vary,
it’s critical to have some common measure that may be applied across the board.
advertisement
10. Which of the following is true of signature-based IDSes?
a) They alert administrators to deviations from “normal” traffic behavior
b) They identify previously unknown attacks
c) The technology is mature and reliable enough to use on production networks
d) They scan network traffic or packets to identify matches with attack-definition files
View Answer
Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that describe
each type of known malicious activity. They then scan network traffic for packets that match
the signatures, and then raise alerts to security administrators.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 5/8
2021/‫‏‬6/‫‏‬23
RPC - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
RPC
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RPC”.
1. An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party
View Answer
Answer: b
Explanation: Remote Procedure Call is a method used for constructing distributed, clientserver applications based on extending the conventional local procedure calling where the
client initiates an RPC to start a connection process.
advertisement
2. In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
/https://www.sanfoundry.com/computer-networks-questions-answers-rpc 1/7
2021/‫‏‬6/‫‏‬23
RPC - Computer Networks Questions & Answers - Sanfoundry
d) unless the server is disconnected
View Answer
Answer: a
Explanation: While the server is processing the call i.e. looking through the specifications, the
client is blocked, unless the client sends an asynchronous request to the server for another
operation.
3. A remote procedure call is _______
a) inter-process communication
b) a single process
c) a single thread
d) a single stream
View Answer
Answer: a
Explanation: Remote procedure calls is a form of inter-process communication where the
client initiates an RPC to start a connection process. It is used to construct distributed, clientserver applications.
advertisement
4. RPC allows a computer program to cause a subroutine to execute in _________
a) its own address space
b) another address space
c) both its own address space and another address space
d) applications address space
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-rpc 2/7
2021/‫‏‬6/‫‏‬23
RPC - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: RPC allows a computer program to cause a subroutine to execute in another
address space which is usually the servers address space in a conventional client-server
network.
5. RPC works between two processes. These processes must be ____________
a) on the same computer
b) on different computers connected with a network
c) on the same computer and also on different computers connected with a network
d) on none of the computers
View Answer
Answer: c
Explanation: For the operation of RPC between two processes, it is mandatory that the
processes are present on the same computer and also on different computers connected with
its network.
advertisement
6. A remote procedure is uniquely identified by _________
a) program number
b) version number
c) procedure number
d) all of the mentioned
View Answer
Answer: d
Explanation: Each remote procedure can be uniquely identified by the program number,
version number and the procedure number in the networks scope. The identifiers can be used
to control the remote procedure by parties involved in the process.
/https://www.sanfoundry.com/computer-networks-questions-answers-rpc 3/7
2021/‫‏‬6/‫‏‬23
RPC - Computer Networks Questions & Answers - Sanfoundry
7. An RPC application requires _________
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
View Answer
Answer: d
Explanation: The RPC technique for constructing distributed, client-server applications based
on extending the conventional local procedure calling. It requires a client program, a server
program and specific protocol for client server communication to build the system.
advertisement
8. RPC is used to _________
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and retrieve information by
calling a query
d) to secure the client
View Answer
Answer: c
Explanation: RPC or Remote Procedure Call is used to establish a server on remote machine
that can respond to queries and to retrieve information by calling a query by other computers.
9. RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
/https://www.sanfoundry.com/computer-networks-questions-answers-rpc 4/7
2021/‫‏‬6/‫‏‬23
RPC - Computer Networks Questions & Answers - Sanfoundry
d) channel specific operation
View Answer
Answer: a
Explanation: RPC is a synchronous operation where the remote machine works in sync with
the other machines to act as a server that can respond to queries called by the other
machines.
advertisement
10. The local operating system on the server machine passes the incoming packets to the
___________
a) server stub
b) client stub
c) client operating system
d) client process
View Answer
Answer: a
Explanation: The local operating system on the server machine passes the incoming packets to
the server stub which then processes the packets which contain the queries from the client
machines for retrieving information.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-rpc 5/7
2021/‫‏‬6/‫‏‬23
RTP - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
RTP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RTP”.
1. Real-time transport protocol (RTP) is mostly used in _________
a) streaming media
b) video teleconference
c) television services
d) all of the mentioned
View Answer
Answer: d
Explanation: RTP stands for Real-time transport protocol and is for delivering audio and video
over IP networks. Its applications include streaming media, video teleconference, and
television services.
advertisement
2. RTP is used to ________
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
/https://www.sanfoundry.com/computer-networks-questions-answers-rtp 1/7
2021/‫‏‬6/‫‏‬23
RTP - Computer Networks Questions & Answers - Sanfoundry
d) secure the stream
View Answer
Answer: a
Explanation: RTP is used to carry the media stream for delivering audio and video over IP
networks. Its applications include streaming media, video teleconference, and television
services.
3. RTP provides the facility of jitter ____________
a) media stream
b) expansion
c) media modification
d) security
View Answer
Answer: a
Explanation: RTP provides the facility of jitter media stream through a jitter buffer which works
by reconstructing the sequence of packets on the receiving side. Then an even audio / video
stream is generated.
advertisement
4. Which protocol provides the synchronization between media streams?
a) RTP
b) RTCP
c) RPC
d) RTCT
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-rtp 2/7
2021/‫‏‬6/‫‏‬23
RTP - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: RTCP stands for Real-time Transport Control Protocol and it works with RTP to
send control packets to the users of the networks while RTP handles the actual data delivery.
5. An RTP session is established for ____________
a) each media stream
b) all media streams
c) some predefined number of media streams
d) no media stream
View Answer
Answer: a
Explanation: An RTP session is required to be established for each media stream for delivering
audio and video over the IP network. Each session has independent data transmission.
advertisement
6. RTP can use __________
a) unprevileleged UDP ports
b) stream control transmission protocol
c) datagram congestion control protocol
d) all of the mentioned
View Answer
Answer: d
Explanation: RTP uses unprevileleged UDP ports, stream control transmission protocol, and
datagram congestion control protocol for data delivery over IP networks.
7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
/https://www.sanfoundry.com/computer-networks-questions-answers-rtp 3/7
2021/‫‏‬6/‫‏‬23
RTP - Computer Networks Questions & Answers - Sanfoundry
b) MJPEG
c) MPEG
d) TXT
View Answer
Answer: d
Explanation: RTP is suitable only for multimedia and not for simple text files as the operation
would result into wastage of resources. Other protocols like FTP are suitable for such
transmissions.
advertisement
8. An RTP header has a minimum size of _________
a) 12 bytes
b) 16 bytes
c) 24 bytes
d) 32 bytes
View Answer
Answer: a
Explanation: Each RTP packet has a fixed header of size 12 bytes that contains essential
control information like timestamp, payload type etc. for the receiving system processing.
9. Which one of the following is not correct?
a) RTCP provides canonical end-point identifiers to all session participants
b) RTCP reports are expected to be sent by all participants
c) RTCP itself does not provide any flow encryption or authentication methods
d) RTCP handles the actual data delivery
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-rtp 4/7
2021/‫‏‬6/‫‏‬23
RTP - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: RTCP works with RTP to send control packets to the users of the networks and
provide canonical end-point identifiers to all session participants while RTP handles the actual
data delivery.
advertisement
10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer
of payload data?
a) SRTP
b) RTCP
c) RCP
d) RTCT
View Answer
Answer: a
Explanation: SRTP stands for Secure Real-time Transport Protocol. It is like an extension to RTP
which provides stream security through encryption, message authentication and integrity, and
replay attack protection.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – SONET
/https://www.sanfoundry.com/computer-networks-questions-answers-rtp 5/7
2021/‫‏‬6/‫‏‬23
SONET - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
SONET
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“SONET”.
1. SONET stands for ___________
a) synchronous optical network
b) synchronous operational network
c) stream optical network
d) shell operational network
View Answer
Answer: a
Explanation: SONET stands for synchronous optical network. Frame relay uses SONET to
physically transmit data frames over a Frame Relay network as SONET is cheaper and provides
better network reliability than other carriers.
advertisement
2. In SONET, STS-1 level of electrical signalling has the data rate of _________
a) 51.84 Mbps
b) 155.52 Mbps
/https://www.sanfoundry.com/computer-networks-questions-answers-sonet 1/7
2021/‫‏‬6/‫‏‬23
SONET - Computer Networks Questions & Answers - Sanfoundry
c) 2488.320 Mbps
d) 622.080 Mbps
View Answer
Answer: a
Explanation: STS-1 level provides the data rate of 51.84 Mbps, STS-3 provides a data rate of
155.52 Mbps, STS-12 provides a data rate of 622.080 Mbps and STS-48 provides a data rate of
2488.320 Mbps.
3. The path layer of SONET is responsible for the movement of a signal _________
a) from its optical source to its optical destination
b) across a physical line
c) across a physical section
d) back to its optical source
View Answer
Answer: b
Explanation: The path layer in SONET is responsible for finding the path of the signal across
the physical line to reach the optical destination. It is ideally expected to find the shortest and
the most reliable path to the destination.
advertisement
4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
b) data link layer
c) physical layer
d) transport layer
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-sonet 2/7
2021/‫‏‬6/‫‏‬23
SONET - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: The photonic layer in SONET is like the physical layer of the OSI model. It is the
lowest layer among the four layers of SONET namely the photonic, the section, the line, and
the path layers.
5. In SONET, each synchronous transfer signal STS-n is composed of __________
a) 2000 frames
b) 4000 frames
c) 8000 frames
d) 16000 frames
View Answer
Answer: c
Explanation: SONET defines the electrical signal as STS-N (Synchronous Transport Signal LevelN) and the optical signal as OC-N (Optical Carrier Level-N). The building block of SONET is the
STS-1/OC-1 signal, which is based on an 8-kHz frame rate and operates at 51.84 Mbps.
advertisement
6. Which one of the following is not true about SONET?
a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
b) multiplexing is synchronous TDM
c) all clocks in the network are locked to a master clock
d) STS-1 provides the data rate of 622.080Mbps
View Answer
Answer: d
Explanation: In SONET, STS-N stands for Synchronous Transport Signal Level-N. STS-1 level
provides the data rate of 51.84 Mbps, and STS-12 provides a data rate of 622.080 Mbps.
/https://www.sanfoundry.com/computer-networks-questions-answers-sonet 3/7
2021/‫‏‬6/‫‏‬23
SONET - Computer Networks Questions & Answers - Sanfoundry
7. A linear SONET network can be ________
a) point-to-point
b) multi-point
c) both point-to-point and multi-point
d) single point
View Answer
Answer: c
Explanation: Synchronous Optical Network (SONET) is basically an optical fiber point-to-point
or ring network backbone that provides a way to accommodate additional capacity as the
needs of the organization increase to multipoint networks.
advertisement
8. Automatic protection switching in linear network is defined at the _______
a) line layer
b) section layer
c) photonic layer
d) path layer
View Answer
Answer: a
Explanation: The Line layer in SONET operates like the data link layer in the OSI model and it is
responsible for the movement of signal across a physical line. The Synchronous Transport
Signal Mux/Demux and Add/Drop Mux provide the Line layer functions.
9. A unidirectional path switching ring is a network with __________
a) one ring
b) two rings
c) three rings
/https://www.sanfoundry.com/computer-networks-questions-answers-sonet 4/7
2021/‫‏‬6/‫‏‬23
SONET - Computer Networks Questions & Answers - Sanfoundry
d) four rings
View Answer
Answer: b
Explanation: One ring is used as the working ring and other as the protection ring in which
each node is connected to its respective adjacent nodes by two fibers, one to transmit, and
one to receive.
advertisement
10. What is SDH?
a) sdh is similar standard to SONET developed by ITU-T
b) synchronous digital hierarchy
c) sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by
ITU-T
d) none of the mentioned
View Answer
Answer: c
Explanation: SDH is a standard that allows low bit rates to be combined into high-rate data
streams and as it is synchronous, each individual bit stream can be embedded into and
extracted from high-rate data streams easily.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-sonet 5/7
2021/‫‏‬6/‫‏‬23
WiMAX - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
WiMAX
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“WiMAX”.
1. WiMAX stands for ___________
a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) wireless internet maximum communication
View Answer
Answer: b
Explanation: WiMAX or worldwide interoperability for microwave access is a set of wireless
communication standards. It provides support for multiple physical layer (PHY) and Media
Access Control (MAC) options. It is based on IEEE 802.16 standards.
advertisement
2. WiMAX provides ________
a) simplex communication
b) half duplex communication
/https://www.sanfoundry.com/computer-networks-questions-answers-wimax 1/7
2021/‫‏‬6/‫‏‬23
WiMAX - Computer Networks Questions & Answers - Sanfoundry
c) full duplex communication
d) no communication
View Answer
Answer: c
Explanation: WiMax was developed to provide wireless broadband access to buildings. It can
also be used to connect WLAN hotspots to the Internet. It is based on IEEE 802.16 standards.
3. WiMAX uses the _________
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) channel division multiplexing
View Answer
Answer: a
Explanation: WiMAX physical layer uses orthogonal frequency division multiplexing as it
provides simplified reception in multipath and allows WiMAX to operate in NLOS conditions.
advertisement
4. Which of the following modulation schemes is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
View Answer
Answer: d
Explanation: WiMAX supports a variety of modulation schemes such as binary phase shift
/https://www.sanfoundry.com/computer-networks-questions-answers-wimax 2/7
2021/‫‏‬6/‫‏‬23
WiMAX - Computer Networks Questions & Answers - Sanfoundry
keying modulation, quadrature phase shift keying modulation, and quadrature amplitude
modulation and allows for the scheme to change on a burst-by-burst basis per link, depending
on channel conditions.
5. WiMAX MAC layer provides an interface between ___________
a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) session layer and application layer
View Answer
Answer: a
Explanation: WiMAX provides support for multiple physical layer (PHY) on the physical layer
and Media Access Control (MAC) options for higher layers to provide wireless broadband
access to buildings.
advertisement
6. For encryption, WiMAX supports _______
a) advanced encryption standard
b) triple data encryption standard
c) advanced encryption standard and triple data encryption standard
d) double data encryption standard
View Answer
Answer: c
Explanation: Both advanced encryption standard and triple data encryption standard are block
cipher techniques and are popularly used in WiMAX and other applications for secure
encryption.
/https://www.sanfoundry.com/computer-networks-questions-answers-wimax 3/7
2021/‫‏‬6/‫‏‬23
WiMAX - Computer Networks Questions & Answers - Sanfoundry
7. WiMAX provides _______
a) VoIP services
b) IPTV services
c) Both VoIP and IPTV services
d) no IPTV services
View Answer
Answer: c
Explanation: IPTV can be transmitted over WiMAX, and relies on packet-switching to offer
reliable delivery. VoIP can be operated over a WiMax network with no special hardware or
software.
advertisement
8. Devices that provide the connectivity to a WiMAX network are known as _________
a) subscriber stations
b) base stations
c) gateway
d) switch stations
View Answer
Answer: a
Explanation: Subscriber stations in WiMAX are transceivers (transmitter and receivers). They
are used to convert radio signals into digital signals that can be routed to and from
communication devices. There is a variety of types of WiMAX subscriber stations like portable
PCMCIA cards and fixed stations that provide service to multiple users.
9. WiMAX is mostly used for __________
a) local area network
b) metropolitan area network
/https://www.sanfoundry.com/computer-networks-questions-answers-wimax 4/7
2021/‫‏‬6/‫‏‬23
WiMAX - Computer Networks Questions & Answers - Sanfoundry
c) personal area network
d) wide area network
View Answer
Answer: b
Explanation: WiMAX provides Wi-Fi connectivity within the home or business for computers
and smartphones. WiMAX network operators typically provide a WiMAX Subscriber Unit to do
so. The subscriber unit is used to connect to the metropolitan WiMAX network.
advertisement
10. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer: b
Explanation: The 2.4GHz ISM frequency band is used for personal area network technologies
such as Bluetooth and hence is not suitable for WiMAX which is mostly used for Metropolitan
Area Networks.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
/https://www.sanfoundry.com/computer-networks-questions-answers-wimax 5/7
2021/‫‏‬6/‫‏‬23
Bluetooth - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Bluetooth
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Bluetooth”.
1. An interconnected collection of piconet is called ___________
a) scatternet
b) micronet
c) mininet
d) multinet
View Answer
Answer: a
Explanation: Piconet is the basic unit of a bluetooth system having a master node and upto
seven active slave nodes. A collection of piconets is called scatternet and a slave node of a
piconet may act as a master in a piconet that is part of the scatternet.
advertisement
2. In a piconet, there can be up to ________ parked nodes in the network.
a) 63
b) 127
/https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 1/7
2021/‫‏‬6/‫‏‬23
Bluetooth - Computer Networks Questions & Answers - Sanfoundry
c) 255
d) 511
View Answer
Answer: c
Explanation: A slave node in a piconet can be instructed by the master node to go into parked
mode. Then the slave node enters the parked mode in which the node is not disconnected
from the network but is inactive unless the master wakes it up.
3. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
View Answer
Answer: b
Explanation: Bluetooth is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency
band for transmission.
advertisement
4. Bluetooth uses __________
a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 2/7
2021/‫‏‬6/‫‏‬23
Bluetooth - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: Frequency hopping spread spectrum is a method of transmitting radio signals by
rapidly changing the carrier frequency and is controlled by the codes known to the sender and
receiver only.
5. Unauthorised access of information from a wireless device through a bluetooth connection is
called _________
a) bluemaking
b) bluesnarfing
c) bluestring
d) bluescoping
View Answer
Answer: b
Explanation: Unauthorised access of information from a wireless device through a bluetooth
connection is called Bluesnarfing. It is done through exploiting the vulnerabilities of the
Bluetooth device to steal the transmitted information.
advertisement
6. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) a bluetooth profile for file management
View Answer
Answer: a
Explanation: A2DP stands for Advanced Audio Distribution Profile is a transfer standard use to
/https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 3/7
2021/‫‏‬6/‫‏‬23
Bluetooth - Computer Networks Questions & Answers - Sanfoundry
transmit high definition audio through Bluetooth. It is mainly used in Bluetooth speakers and
wireless headphones.
7. In a piconet, one master device ________
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) can be master in another piconet
View Answer
Answer: b
Explanation: In a scatternet, a slave node of one piconet may act as a master in a piconet that
is part of the scatternet. The scatternet uses this property to connect many piconets together
to create a larger network.
advertisement
8. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
View Answer
Answer: a
Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for transmission. It is used
to create a wireless personal area network for data transfer up to a distance of 10 meters.
9. Bluetooth supports _______
a) point-to-point connections
/https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 4/7
2021/‫‏‬6/‫‏‬23
Bluetooth - Computer Networks Questions & Answers - Sanfoundry
b) point-to-multipoint connection
c) both point-to-point connections and point-to-multipoint connection
d) multipoint to point connection
View Answer
Answer: c
Explanation: In Bluetooth, each slave node communicates with the master of the piconet
independently i.e. each master-slave connection is independent. The slave is not allowed to
communicate with other slaves directly.
advertisement
10. A scatternet can have maximum __________
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
View Answer
Answer: a
Explanation: A scatternet can have maximum of 10 piconets and minimum of 2 piconets. To
connect these piconets, a slave node of one piconet may act as a master in a piconet that is
part of the scatternet.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 5/7
2021/‫‏‬6/‫‏‬23
Internet - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Internet
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Internet”.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) interconnection of wide area networks
View Answer
Answer: b
Explanation: Internet is nothing but an interconnected computer network providing a variety
of communication facilities, consisting of a huge amount of small networks using standardized
communication protocols.
advertisement
2. To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
/https://www.sanfoundry.com/computer-networks-questions-answers-internet 1/7
2021/‫‏‬6/‫‏‬23
Internet - Computer Networks Questions & Answers - Sanfoundry
c) internet service provider
d) different computer
View Answer
Answer: c
Explanation: The ISPs (Internet Service Providers) are the main agents through which every
computer is connected to the internet. They are licensed to allot public IP addresses to its
customers in order to connect them to the internet.
3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
View Answer
Answer: b
Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing
telephone lines to transport high-bandwidth data to service subscribers. DSL was used to
allow the early users access to the internet and it provides dedicated, point-to-point, public
network access.
advertisement
4. ISP exchanges internet traffic between their networks by __________
a) internet exchange point
b) subscriber end point
c) isp end point
/https://www.sanfoundry.com/computer-networks-questions-answers-internet 2/7
2021/‫‏‬6/‫‏‬23
Internet - Computer Networks Questions & Answers - Sanfoundry
d) internet end point
View Answer
Answer: a
Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange
Points. ISPs and CDNs are connected to each other at these physical locations are they help
them provide better service to their customers.
5. Which of the following protocols is used in the internet?
a) HTTP
b) DHCP
c) DNS
d) DNS, HTTP and DNS
View Answer
Answer: d
Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to
allot IPs automatically to the users on the internet, and DNS is used to connect the users to the
host servers on the internet based on the Domain Name.
advertisement
6. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-internet 3/7
2021/‫‏‬6/‫‏‬23
Internet - Computer Networks Questions & Answers - Sanfoundry
Answer: c
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses
are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant
alternative in case IPv4 runs out of possible new addresses.
7. Internet works on _______
a) packet switching
b) circuit switching
c) both packet switching and circuit switching
d) data switching
View Answer
Answer: a
Explanation: Packet switching is the method based on which the internet works. Packet
switching features delivery of packets of data between devices over a shared network.
advertisement
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) local procedure call
View Answer
Answer: c
Explanation: Resource reservation protocol is a transport layer protocol used on the internet.
It operates over IPv4 and IPv6 and is designed to reserve resources required by the network
layer protocols.
/https://www.sanfoundry.com/computer-networks-questions-answers-internet 4/7
2021/‫‏‬6/‫‏‬23
Internet - Computer Networks Questions & Answers - Sanfoundry
9. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) RSVP
View Answer
Answer: a
Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely
assign IP address to the clients connected to the internet. The server that performs this fuction
is called the DHCP server.
advertisement
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) packet switching
View Answer
Answer: d
Explanation: Packet switching is not really related to media access control as it just features
delivery of packets of data between devices over a shared network. Internet is actually based
on packet switching.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-internet 5/7
2021/‫‏‬6/‫‏‬23
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Wireless LAN
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Wireless LAN”.
1. What is the access point (AP) in a wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless devices
itself
d) all the nodes in the network
View Answer
Answer: a
Explanation: Access point in a wireless network is any device that will allow the wireless
devices to a wired network. A router is the best example of an Access Point.
advertisement
2. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 1/7
2021/‫‏‬6/‫‏‬23
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
c) nodes are not required
d) all nodes are access points
View Answer
Answer: a
Explanation: An ad-hoc wireless network is a decentralized kind of a wireless network. An
access point is usually a central device and it would go against the rules of the ad-hoc network
to use one. Hence it is not required.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
View Answer
Answer: b
Explanation: CSMA/CA stands for Carrier-sense multiple access/collision avoidance. It is a
multiple access protocol used by IEEE 802.11 standard for wireless LAN. It’s based on the
principle of collision avoidance by using different algorithms to avoid collisions between
channels.
advertisement
4. In wireless distribution system __________
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 2/7
2021/‫‏‬6/‫‏‬23
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: A Wireless Distribution System allows the connection of multiple access points
together. It is used to expand a wireless network to a larger network.
5. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
View Answer
Answer: c
Explanation: A wireless network interface controller works on the physical layer and the data
link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode
access point is not required.
advertisement
6. In wireless network an extended service set is a set of ________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
View Answer
Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN architecture and is
used to expand the range of the basic service set by allowing connection of multiple basic
service sets.
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 3/7
2021/‫‏‬6/‫‏‬23
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
View Answer
Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded on multiple
carrier frequencies. It is also used in digital television and audio broadcasting in addition to
Wireless LANs.
advertisement
8. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
View Answer
Answer: a
Explanation: Collision detection is not possible in wireless LAN with no extensions. Collision
detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless
LANs.
9. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 4/7
2021/‫‏‬6/‫‏‬23
Wireless LAN - Computer Networks Questions & Answers - Sanfoundry
d) security algorithm for emails
View Answer
Answer: b
Explanation: WEP is a security algorithm for wireless network which intended to provide data
confidentiality comparable to that of traditional wired networks. It was introduced in 1997.
advertisement
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
View Answer
Answer: a
Explanation: WPA or WiFi Protected Access is a security protocol used to provide users and
firms with strong data security and protection for their wireless networks (WiFi) to give them
confidence that only authorized users can access their network.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
/https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 5/7
2021/‫‏‬6/‫‏‬23
Ethernet - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Ethernet
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Ethernet”.
1. Ethernet frame consists of ____________
a) MAC address
b) IP address
c) Default mask
d) Network address
View Answer
Answer: a
Explanation: The Ethernet frame has a header that contains the source and destination MAC
address. Each MAC address is of 48 bits.
advertisement
2. What is start frame delimeter (SFD) in ethernet frame?
a) 10101010
b) 10101011
c) 00000000
/https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 1/7
2021/‫‏‬6/‫‏‬23
Ethernet - Computer Networks Questions & Answers - Sanfoundry
d) 11111111
View Answer
Answer: b
Explanation: The start frame delimiter is a 1 byte field in the Ethernet frame that indicates that
the preceding bits are the start of the frame. It is always set to 10101011.
3. MAC address is of ___________
a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer: d
Explanation: MAC address is like a local address for the NIC that is used to make a local
Ethernet (or wifi) network function. It is of 48 bits.
advertisement
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) encryption algorithm
View Answer
Answer: a
Explanation: autonegotiation is a procedure by which two connected devices choose common
/https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 2/7
2021/‫‏‬6/‫‏‬23
Ethernet - Computer Networks Questions & Answers - Sanfoundry
transmission parameters. It is a signaling mechanism used in Ethernet over Twisted pair
cables.
5. Ethernet in metropolitan area network (MAN) can be used as ___________
a) pure ethernet
b) ethernet over SDH
c) ethernet over MPLS
d) all of the mentioned
View Answer
Answer: d
Explanation: A metropolitan area network (MAN) that is based on Ethernet standards is called
an Ethernet MAN. It is commonly used to connect nodes to the Internet. Businesses also use
Ethernet MANs to connect their own offices to each other.
advertisement
6. A point-to-point protocol over ethernet is a network protocol for __________
a) encapsulating PPP frames inside ethernet frames
b) encapsulating ehternet framse inside PPP frames
c) for security of ethernet frames
d) for security of PPP frames
View Answer
Answer: a
Explanation: PPoE or Point-to-Point protocol over Ethernet was first introduced in 1999. It is
popularly used by modern day Internet Service Providers for Dial-up connectivity.
7. High speed ethernet works on _________
a) coaxial cable
/https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 3/7
2021/‫‏‬6/‫‏‬23
Ethernet - Computer Networks Questions & Answers - Sanfoundry
b) twisted pair cable
c) optical fiber
d) unshielded twisted pair cable
View Answer
Answer: c
Explanation: Fast Ethernet is mostly used in networks along with Category 5 (Cat-5) copper
twisted-pair cable, but it also works with fiber-optic cable. Based on the cable being used,
There can be three types of Fast Ethernet.
advertisement
8. The maximum size of payload field in ethernet frame is __________
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
View Answer
Answer: d
Explanation: The minimum size of the payload field is 40 bytes and the maximum size is 1500
bytes. If the payload size exceeds 1500 bytes, the frame is called a jumbo frame.
9. What is interframe gap?
a) idle time between frames
b) idle time between frame bits
c) idle time between packets
d) idle time between networks
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 4/7
2021/‫‏‬6/‫‏‬23
Ethernet - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: The inter-frame gap is the idle time for the receiver between the incoming frame
flow. The inter-frame gap must be as low as possible for idle connections.
advertisement
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
_______
a) short frame
b) runt frame
c) mini frame
d) man frame
View Answer
Answer: b
Explanation: An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called a runt frame. Such frames are a result of collisions or software malfunctions.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Network Utilities
» Next - Computer Networks Questions & Answers – Wireless LAN
/https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 5/7
2021/‫‏‬6/‫‏‬23
Network Utilities - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Network Utilities
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Network Utilities”.
1. Ping can _________
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: PING (Packet Internet Groper) command is the best way to test connectivity
between two nodes, whether it is Local Area Network (LAN) or Wide Area Network (WAN). Ping
uses ICMP (Internet Control Message Protocol) to communicate to other devices.
advertisement
2. Ping sweep is a part of _________
a) Traceroute
b) Nmap
/https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 1/7
2021/‫‏‬6/‫‏‬23
Network Utilities - Computer Networks Questions & Answers - Sanfoundry
c) Route
d) Ipconfig
View Answer
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which map to
live hosts and are mostly used by network scanning tools like nmap. A ping sweep is basically a
collective ping command execution on a range of IP addresses.
3. ICMP is used in _________
a) Ping
b) Traceroute
c) Ifconfig
d) Both Ping & Traceroute
View Answer
Answer: d
Explanation: ICMP stands for Internet Control Message Protocol. ICMP operates over the IP
packet to provide error reporting functionality, so in case the node is not active or there is no
route, ICMP will be used to report the specific errors for Ping and Traceroute.
advertisement
4. __________ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
/https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 2/7
2021/‫‏‬6/‫‏‬23
Network Utilities - Computer Networks Questions & Answers - Sanfoundry
Answer: a
Explanation: The route command is used to view and manipulate the TCP/IP routing table in
Windows OS. The manipulations done in the routing table with the help of this command will
count as static routes.
5. If you want to find the number of routers between a source and destination, the utility to be
used is ___________
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: Traceroute command is available on Linux OS to find the path i.e. the number of
the routers that the packet has to go through to reach the destination. In Windows, Tracert
command is used to perform the function.
advertisement
6. Which of the following is not related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) Trace the routers in the path to destination
View Answer
Answer: d
Explanation: The Tracert command is available on Microsoft Windows to find the path i.e. the
number of the routers that the packet has to go through to reach its destination.
/https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 3/7
2021/‫‏‬6/‫‏‬23
Network Utilities - Computer Networks Questions & Answers - Sanfoundry
7. __________ allows checking if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) Domain registers
View Answer
Answer: a
Explanation: There are billions of domains available for registration on the World Wide Web,
and many of them are already registered. So when one wants to register a domain, they need
to check whether the domain is available through a domain check.
advertisement
8. Choose the wrong statement from the following.
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
View Answer
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). The
Ping command is used to test connectivity between two nodes and the Tracert/Traceroute
command is used to find the path i.e. the number of the routers that the packet has to go
through to reach its destination.
Sanfoundry Global Education & Learning Series – Computer Networks.
advertisement
/https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 4/7
2021/‫‏‬6/‫‏‬23
Computer Networks Question Bank - Sanfoundry
Computer Networks Questions & Answers –
Network Management
« Prev
Next »
This set of Computer Networks Question Bank focuses on “Network Management”.
1. Complex networks today are made up of hundreds and sometimes thousands of _________
a) Documents
b) Components
c) Servers
d) Entities
View Answer
Answer: b
Explanation: Complex networks today are made up of hundreds and sometimes thousands of
components. For effective functioning of these thousands of components, good network
management is essential.
advertisement
2. Performance management is closely related to _________
a) Proactive Fault Management
b) Fault management
c) Reactive Fault Management
/https://www.sanfoundry.com/computer-networks-questions-bank 1/8
2021/‫‏‬6/‫‏‬23
Computer Networks Question Bank - Sanfoundry
d) Preventive Fault Management
View Answer
Answer: b
Explanation: Fault management is really closely related to performance management. It is
important to ensure that the network handles faults as effectively as it handles it’s normal
functioning to achieve better performance management.
3. Configuration management can be divided into two subsystems: reconfiguration and
__________
a) Documentation
b) Information
c) Servers
d) Entity
View Answer
Answer: a
Explanation: The documentation subsystem of configuration management handles the log
making and reporting functions of the configuration management. It also reports the errors in
the network caused by the configuration’s failure.
advertisement
4. In Network Management System, the term that is responsible for controlling access to
network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
View Answer
/https://www.sanfoundry.com/computer-networks-questions-bank 2/8
2021/‫‏‬6/‫‏‬23
Computer Networks Question Bank - Sanfoundry
Answer: d
Explanation: In Network Management System, the term that is responsible for controlling
access to the network based on predefined policy is called security management. The security
management ensures authentication, confidentiality and integrity in the network.
5. Control of users’ access to network resources through charges is the main responsibility of
______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
View Answer
Answer: c
Explanation: Control of users’ access to network resources through charges is the main
responsibility of accounting management. The accounting management creates a log of the
users activity on the network too and goes hand-in-hand with the configurations management.
advertisement
6. The physical connection between an end point and a switch or between two switches is
__________
a) Transmission path
b) Virtual path
c) Virtual circuit
d) Transmission circuit
View Answer
Answer: a
Explanation: The physical connection between an end point and a switch or between two
/https://www.sanfoundry.com/computer-networks-questions-bank 3/8
2021/‫‏‬6/‫‏‬23
Computer Networks Question Bank - Sanfoundry
switches is transmission path. The transmission path is the physical roadway that the packet
needs to propagate in order to travel through the network.
7. Which of the following networks supports pipelining effect?
a) Circuit-switched networks
b) Message-switched networks
c) Packet-switched networks
d) Stream-switched networks
View Answer
Answer: c
Explanation: Packet switched network is most preferred for pipelining process. Pipelining
exponentially reduces the time taken to transmit a large number of packets in the network.
advertisement
8. In Network Management System, maps track each piece of hardware and its connection to the
_________
a) IP Server
b) Domain
c) Network
d) Data
View Answer
Answer: c
Explanation: Network is the main entity connecting different components in a place. A network
map is made to track each component and its connection to the network to ensure better
network management.
/https://www.sanfoundry.com/computer-networks-questions-bank 4/8
2021/‫‏‬6/‫‏‬23
Computer Networks Question Bank - Sanfoundry
9. MIB is a collection of groups of objects that can be managed by __________
a) SMTP
b) UDP
c) SNMP
d) TCP/IP
View Answer
Answer: c
Explanation: MIB stands for Management Information Base. Simple network management
controls the group of objects in management information base. It is usually used with SNMP
(Simple Network Management Protocol).
advertisement
10. A network management system can be divided into ___________
a) three categories
b) five broad categories
c) seven broad categories
d) ten broad categories
View Answer
Answer: b
Explanation: The five broad categories of network management are
• Fault Management
• Configuration Management
• Accounting (Administration)
• Performance Management
• Security Management.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-bank 5/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Firewalls
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
“Firewalls”.
1. Network layer firewall works as a __________
a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
View Answer
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as software-only, or
a combination of the two. In every case, the purpose of a firewall is to isolate your trusted
internal network (or your personal PC) from the dangers of unknown resources on the
Internet and other network connections that may be harmful. The firewall prevents
unauthorized access to your internal, trusted network from outside threats.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 1/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
2. Network layer firewall has two sub-categories as _________
a) State full firewall and stateless firewall
b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall
d) Network layer firewall and session layer firewall
View Answer
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless firewalls, creating
two subcategories of the standard network layer firewall. Stateful firewalls have the advantage
of being able to track packets over a period of time for greater analysis and accuracy — but
they require more memory and operate more slowly. Stateless firewalls do not analyze past
traffic and can be useful for systems where speed is more important than security, or for
systems that have very specific and limited needs. For example, a computer that only needs to
connect to a particular backup server does not need the extra security of a stateful firewall.
3. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
View Answer
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation, or
a combination of these that determines which information or services can be accessed from
the outside and who is permitted to use the information and services from outside. Generally,
a firewall is installed at the point where the secure internal network and untrusted external
network meet, which is also known as a chokepoint.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 2/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
4. Which of the following is / are the types of firewall?
a) Packet Filtering Firewall
b) Dual Homed Gateway Firewall
c) Screen Host Firewall
d) Dual Host Firewall
View Answer
Answer: a
Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or
combination of these. Depending on the requirements, a firewall can consist of one or more of
the following functional components: Packet-filtering router
5. A proxy firewall filters at _________
a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
View Answer
Answer: d
Explanation: The application firewall is typically built to control all network traffic on any layer
up to the application layer. It is able to control applications or services specifically, unlike a
stateful network firewall, which is – without additional software – unable to control network
traffic regarding a specific application. There are two primary categories of application
firewalls, network-based application firewalls and host-based application firewalls.
advertisement
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 3/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
6. A packet filter firewall filters at __________
a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer
View Answer
Answer: c
Explanation: In computing, a firewall is a network security system that monitors and controls
the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall
typically establishes a barrier between a trusted, secure internal network and another outside
network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are
often categorized as either network firewalls or host-based firewalls.
7. What is one advantage of setting up a DMZ with two firewalls?
a) You can control where traffic goes in three networks
b) You can do stateful packet filtering
c) You can do load balancing
d) Improved network performance
View Answer
Answer: c
Explanation: DMZ stands for De-Militarized Zone. In a topology with a single firewall serving
both internal and external users (LAN and WAN), it acts as a shared resource for these two
zones. So load balancing can be done by adding another firewall.
advertisement
8. What tells a firewall how to reassemble a data stream that has been divided into packets?
a) The source routing feature
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 4/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
View Answer
Answer: a
Explanation: The source routing feature provides a path address for the packet to help the
firewall to reassemble the data stream that was divided into packets. After reassembling, the
firewall can then filter the stream.
9. A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table
b) Bridging table
c) State table
d) Connection table
View Answer
Answer: a
Explanation: The routing table basically gives the state of each connection i.e. whether the
connection is active or not. A routing table ensures the best performance for the stateful
firewall.
advertisement
10. A firewall needs to be __________ so that it can grow proportionally with the network that it
protects.
a) Robust
b) Expansive
c) Fast
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 5/8
2021/‫‏‬6/‫‏‬23
Firewalls - Computer Networks Questions & Answers - Sanfoundry
d) Scalable
View Answer
Answer: b
Explanation: The firewall has to be expansive because a network is expected to grow with time
and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing
network traffic flow and will hence fail.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Datagram Networks
» Next - Computer Networks Questions & Answers – Network Management
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
IOT MCQ (Multiple Choice Questions)
Automata Theory MCQ (Multiple Choice Questions)
SAN MCQ (Multiple Choice Questions)
Basic Electrical Engineering MCQ (Multiple Choice Questions)
Cognitive Radio MCQ (Multiple Choice Questions)
Optical Communication MCQ (Multiple Choice Questions)
C# Programming Examples on Data Structures
/https://www.sanfoundry.com/computer-networks-questions-answers-firewall 6/8
2021/‫‏‬6/‫‏‬23
Computer Networks Aptitude Test - Sanfoundry
Computer Networks Questions & Answers –
Datagram Networks
« Prev
Next »
This set of Computer Networks Questions and Answers for Aptitude test focuses on “Datagram
Networks”.
1. Datagram switching is done at which layer of OSI model?
a) Network layer
b) Physical layer
c) Application layer
d) Transport layer
View Answer
Answer: a
Explanation: Datagram switching is normally done at network layer. In datagram switching, the
datagram stream need not be in order as each datagram can take different routes to the
destination.
advertisement
2. Packets in datagram switching are referred to as ________
a) Switches
b) Segments
/https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 1/7
2021/‫‏‬6/‫‏‬23
Computer Networks Aptitude Test - Sanfoundry
c) Datagrams
d) Data-packets
View Answer
Answer: c
Explanation: As the name suggests, in datagram switching packets are called as datagram.
Each datagram/packet is treated as an individual entity and routed independently through the
network.
3. Datagram networks mainly refers to _________
a) Connection oriented networks
b) Connection less networks
c) Telephone networks
d) Internetwork
View Answer
Answer: b
Explanation: The switch does not keep the information about the connection state, hence it is
connection less. There is no need for establishing a handshake to begin the transmission in
such networks.
advertisement
4. Datagrams are routed to their destinations with the help of ________
a) Switch table
b) Segments table
c) Datagram table
d) Routing table
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 2/7
2021/‫‏‬6/‫‏‬23
Computer Networks Aptitude Test - Sanfoundry
Answer: d
Explanation: Routing table is used to route the packets to their destinations. The
packet/datagram header contains the destination header for the whole journey to source to
the destination through the routers.
5. The main contents of the routing table in datagram networks are ___________
a) Source and Destination address
b) Destination address and Output port
c) Source address and Output port
d) Input port and Output port
View Answer
Answer: b
Explanation: Routing table contains destination address and output port to route the packets
to their destinations. The port address specifies the particular application that the packet has
to be forwarded to after it has reached the destination.
advertisement
6. Which of the following remains same in the header of the packet in a datagram network
during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
View Answer
Answer: a
Explanation: Destination address remains same in the header during the entire journey of the
/https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 3/7
2021/‫‏‬6/‫‏‬23
Computer Networks Aptitude Test - Sanfoundry
packet. There is no pre-decided route for the packets so each datagram/packet is treated as an
individual entity and routed independently through the network.
7. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned
View Answer
Answer: d
Explanation: The delay of each packet in a datagram network is different as each packet might
take a different route to the destination. The delay includes the propagation delay and the
processing delay that is induced at each stop/switch that the packet encounters in its journey.
advertisement
8. During datagram switching, the packets are placed in __________ to wait until the given
transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
View Answer
Answer: b
Explanation: When there are too many packets to be transmitted and the transmission line
gets blocked while transmitting some packets, the remaining packets are stored in queue
during delay and are served as first in first out. The delay is called as queuing delay.
/https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 4/7
2021/‫‏‬6/‫‏‬23
Computer Networks Aptitude Test - Sanfoundry
9. The probability of the error in a transmitted block _________ with the length of the block
a) Remains same
b) Decreases
c) Increases
d) Is not proportional
View Answer
Answer: c
Explanation: Probability of the error in a transmitted block increases with the length of the
block. Hence, the blocks should be as short as possible for ideal transmission with low
possibility of an error.
advertisement
10. Which of the following is false with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) Delay is the same for all packets in a flow
View Answer
Answer: d
Explanation: The delay of each packet in a datagram network is different as each packet might
take a different route to the destination. This happens because there is no pre-decided route
for the packets.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for Aptitude test, here is complete set of 1000+
Multiple Choice Questions and Answers.
/https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 5/7
2021/‫‏‬6/‫‏‬23
Computer Networks Quiz Online - Sanfoundry
Computer Networks Questions & Answers –
OSPF Configuration
« Prev
Next »
This set of Computer Networks online quiz focuses on “OSPF Configuration”.
1. An OSPF router receives an LSA, the router checks its sequence number, and this number
matches the sequence number of the LSA that the receiving router already has. What does the
receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: a
Explanation: When the OSPF router receives an LSA, the router checks its sequence number. If
this number matches the sequence number of the LSA that the receiving router already has,
the router ignores the LSA.
2. An OSPF router receives an LSA. The router checks its sequence number and finds that this
number is higher than the sequence number it already has. Which two tasks does the router
perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: b
Explanation: An OSPF router receives an LSA. If the router checks its sequence number and
finds that the number is higher than the sequence number of the LSA that it already has, the
router adds it to the database, and then floods the LSA to the other routers.
3. An OSPF router receives an LSA. The router checks its sequence number and finds that this
number is lower than the sequence number it already has. What does the router do with the
LSA?
/https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 1/7
2021/‫‏‬6/‫‏‬23
Computer Networks Quiz Online - Sanfoundry
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers
View Answer
Answer: c
Explanation: An OSPF router receives an LSA. If the router checks its sequence number and
finds that this number is lower than the sequence number that it already has, the router sends
newer LSU update to source router. The router then adds it to the database and floods it to
the other routers.
4. Each LSA has its own age timer. By default, how long does an LSA wait before requiring an
update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
View Answer
Answer: c
Explanation: Each LSA has its own age timer. By default, an LSA waits for 30 minutes before
requiring an update. The router then has to send a LSR (Link State Request) to its neighbors to
get an update.
5. Distance vector protocols use the concept of split horizon, but link-state routing protocols,
such as OSPF, do not.
a) True
b) False
View Answer
Answer: b
Explanation: In Distance vector routing protocols, there is a problem called count-to-infinity
which occurs regularly. So, to make sure that it does not occur, the split horizon algorithm is
used. There is no requirement for it in OSPF.
6. The outcome of Dijkstra’s calculation is used to populate the __________
a) Topology table
b) Routing table
c) Neighbor table
d) Adjacency table
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 2/7
2021/‫‏‬6/‫‏‬23
Computer Networks Quiz Online - Sanfoundry
Answer: b
Explanation: The outcome of Djikstra’s calculation is the main source of entries in the routing
table as it is the algorithm that is used to find the shortest path in OSPF. The calculations are
done after receiving every new LSU.
7. What is the IP protocol number for OSPF packets?
a) 89
b) 86
c) 20
d) 76
View Answer
Answer: a
Explanation: 89 is the IP protocol number for OSPF packets. 86 is the protocol number for
DGP, 76 is the protocol number for Backroom-SATNET-Monitoring and 20 is the protocol
number for Host Monitoring Protocol.
8. Which packet is NOT an OSPF packet type?
a) LSU
b) LSR
c) DBD
d) Query
View Answer
Answer: d
Explanation: LSU is the Link State Update packet, LSR is the Link State Request packet and DBD
is the Database Descriptor packet in OSPF. Query packet is NOT an OSPF packet type.
9. Which multicast address does the OSPF Hello protocol use?
a) 224.0.0.5
b) 224.0.0.6
c) 224.0.0.7
d) 224.0.0.8
View Answer
Answer: a
Explanation: Hello protocol is used to discover neighboring routers automatically. It makes
sure that the communication between neighbors is bidirectional. The multicast address that
the OSPF Hello protocol uses is 224.0.0.5.
10. The Hello protocol sends periodic updates to ensure that a neighbor relationship is
maintained between adjacent routers.
a) True
/https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 3/7
2021/‫‏‬6/‫‏‬23
Computer Networks Quiz Online - Sanfoundry
b) False
View Answer
Answer: a
Explanation: The Hello protocol sends periodic updates to ensure that a neighbor relationship
is maintained between adjacent routers. It’s similar to the real world moral construct of saying
“Hello” to initialize the communication.
11. DBD packets are involved during which two states?
a) Exstart and exchange
b) Loading and Two-way
c) Init and Full
d) Down and Loading
View Answer
Answer: a
Explanation: DBD stands for Database Descriptor. DBD packets are involved during the two
states Exstart and Exchange. In exstart, the master and the slaves are decided and in the
exchange state, the DBD is exchanged among the neighbors.
12. At which interval does OSPF refresh LSAs?
a) 10 seconds
b) 30 seconds
c) 30 minutes
d) 1 hour
View Answer
Answer: d
Explanation: Each LSA has its own age timer. By default, an LSA waits for 30 minutes before
requiring an update. So to make sure that each router first has an up-to-date LSA, OSPF
refreshes LSAs after every 1 hour.
13. Which field is NOT a field within an OSPF packet header?
a) Packet length
b) Router ID
c) Authentication type
d) Maxage time
View Answer
Answer: d
Explanation: The packet length field gives the length of the packet in bits. The Authentication
type field gives the type of authentication used. The router ID field gives the ID of the source
router of the packet. In an OSPF packet header, there is no field called Maxage time.
/https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 4/7
2021/‫‏‬6/‫‏‬23
Computer Networks Quiz Online - Sanfoundry
14. Which two commands are required for basic OSPF configuration?
a) “[Network mask] area [area-id]” and “Router ospf [process-id]”
b) “[Wildcard-mask] area [area-id]” and “[Network mask] area [area-id]”
c) Only “Router ospf [process-id]”
d) “[Wildcard-mask] area [area-id]” and “Router ospf [process-id]”
View Answer
Answer: d
Explanation: The “Router ospf [process-id]” command enables OSPF routing protocol in the
router and the “[Wildcard-mask] area [area-id]” command is used to select the interfaces that
we want to include in the OSPF process. That is enough for the basic configuration of OSPF in a
router.
15. Which OSPF show command describes a list of OSPF adjacencies?
a) Show ip ospf interface
b) Show ip ospf
c) Show ip route
d) Show ip ospf neighbor
View Answer
Answer: d
Explanation: The “Show ip ospf neighbor” command is the OSPF show command that can
describe a list of OSPF adjacencies i.e. the list of adjacent nodes or neighbors. The router will
only communicate with its neighbors directly.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks for online Quizzes, here is complete set of 1000+
Multiple Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – OSPF
» Next - Computer Networks Questions & Answers – Datagram Networks
Recommended Posts:
1.
2.
3.
4.
5.
6.
Founder
Microcontroller MCQ (Multiple Choice Questions)
IOT MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
Java Programming Examples on File Handling
C# Programming Examples on Networking
/https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 5/7
2021/‫‏‬6/‫‏‬23
OSPF - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
OSPF
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “OSPF”.
1. Open Shortest Path First (OSPF) is also called as _____________
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Border gateway protocol
View Answer
Answer: a
Explanation: In OSPF, the link state of each path is checked, and then the shortest path is
chosen among only the open state links. Each OSPF router monitors the cost of the link to
each of its neighbors and then floods the link state information to other routers in the
network.
advertisement
2. The computation of the shortest path in OSPF is usually done by ____________
a) Bellman-ford algorithm
b) Routing information protocol
/https://www.sanfoundry.com/computer-networks-questions-answers-ospf 1/8
2021/‫‏‬6/‫‏‬23
OSPF - Computer Networks Questions & Answers - Sanfoundry
c) Dijkstra’s algorithm
d) Distance vector routing
View Answer
Answer: c
Explanation: Shortest path in OSPF is usually computed by Dijkstra’s algorithm. It was
proposed by Edsger W. Dijkstra in the year 1956. It is a greedy method algorithm and hence
may not guarantee the shortest path every time, but is really fast.
3. Which of the following is false with respect to the features of OSPF?
a) Support for fixed-length subnetting by including the subnet mask in the routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the destination
View Answer
Answer: a
Explanation: OSPF provides support for variable-length sunbathing by including the subnet
mask in the routing message. For fixed length subnets, there is no requirement for including
the subnet mask in the routing message as there is just one subnet mask for all the subnets.
advertisement
4. In OSPF, which protocol is used to discover neighbour routers automatically?
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ospf 2/8
2021/‫‏‬6/‫‏‬23
OSPF - Computer Networks Questions & Answers - Sanfoundry
Answer: d
Explanation: Hello protocol is used to discover neighboring routers automatically. It makes
sure that the communication between neighbors is bidirectional. It’s similar to the real world
moral construct of saying “Hello” to initialize the communication.
5. Which of the following is not a type of OSPF packet?
a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK
View Answer
Answer: c
Explanation: The five types of OSPF packets are: Hello, Database description, Link-state
request, Link-state update, and Link-state ACK. There is no Link-state response packet; the
neighbor router sends a Link-state update packet as a response to the Link-state request
packet if there is an update in the routing table.
advertisement
6. What is the correct order of the operations of OSPF?
i – Hello packets
ii – Propagation of link-state information and building of routing tables
iii – Establishing adjacencies and synchronization of database
a) i-ii-iii
b) i-iii-ii
c) iii-ii-i
d) ii-i-iii
View Answer
/https://www.sanfoundry.com/computer-networks-questions-answers-ospf 3/8
2021/‫‏‬6/‫‏‬23
OSPF - Computer Networks Questions & Answers - Sanfoundry
Answer: b
Explanation: OSPF first implements a hello protocol. Then it later on tries to establish
synchronisation with database. Later on building of routing tables is done.
7. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum
View Answer
Answer: d
Explanation: Checksum field is used to detect errors. It makes sure that the data portions that
are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the
sender has to re-transmit the data as it won’t receive an acknowledgement.
advertisement
8. In OSPF database descriptor packet, if there are more database descriptor packets in the flow,
‘M’ field is set to ____________
a) 1
b) 0
c) more
d) -1
View Answer
Answer: a
Explanation: The “M” bit is the more bit, which indicates that there are more packets to be
received in the descriptor packet flow whenever it is set to 1. There is also an “I” bit which
indicates if the packet is first in the flow.
/https://www.sanfoundry.com/computer-networks-questions-answers-ospf 4/8
2021/‫‏‬6/‫‏‬23
OSPF - Computer Networks Questions & Answers - Sanfoundry
9. In OSPF database descriptor packet, which field is used to indicate that the router is master?
a) M
b) MS
c) I
d) Options
View Answer
Answer: b
Explanation: The MS bit is used to indicate if the origin of the packet is a master or a slave. If it
is set to 1, the source of the packet is a master, and if it is set to 0, the source of the packet is a
slave.
advertisement
10. In OSPF database descriptor packet, which field is used to detect a missing packet?
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
View Answer
Answer: c
Explanation: Sequence number field is used to detect a missing packet. The packets are to be
received in order of the sequence number, so if the receiver detects that there is a sequence
number skipped or missing in the order, it stops processing the further received packets and
informs the sender to retransmit the packets in sequence.
Sanfoundry Global Education & Learning Series – Computer Networks.
/https://www.sanfoundry.com/computer-networks-questions-answers-ospf 5/8
22/06/2021
Chapter 3 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Chapter 3
Study
Chapter 3
Terms in this set (44)
transport layer has the role of
communication services
providing ______________ ______________
to the application processes
running on different hosts.
logical communication
transport layer protocols
from app's perspective, hosts running processes are
directly connected
end systems, routers
implemented in _____
____________________ but not in
network ______________
segments
transport layer protocol
transport-layer packets, that sending app process
converts from messages into small chunks
processes, hosts
provides logical
communication b/w ______________
running on diff hosts. network
layer protocol provides
communication bw __________
https://quizlet.com/367709259/chapter-3-flash-cards/
1/7
22/06/2021
Chapter 3 Flashcards | Quizlet
analogy where
Chapter
3 letters sent
processes create messages on each host, then Study
tlp
from coast to coast b/w
collect messages in their respective hosts, and pass
cousins:
on to nlp
app messages = letters
processes = cousins
hosts = houses
transport layer protocol = Ann
and Bill
network layer protocol = postal
service
transport layer is constrained
T
by service model of underlying
network layer protocol (T/F)
TCP vs. UDP
-UDP: unreliable, connectionless service
- TCP: reliable, connection-oriented service
IP service model is a best-
IP makes best effort to deliver segments, but no
effort delivery service,
guarantees
meaning:
IP is said to be unreliable
T
service (T/F)
Extending host-to-host
transport-layer multiplexing and demultiplexing
delivery to process-to-process
delivery is called :
UDP provides 2 services:
https://quizlet.com/367709259/chapter-3-flash-cards/
1) process-to-process data delivery
2) error checking
2/7
22/06/2021
Chapter 3
TCP provides congestion
control, which means:
Chapter 3 Flashcards | Quizlet
- prevents any 1 TCP connection from swampingStudy
the
links and routers bw communicating hosts w lots of
traffic
- tries to give each connection equal share of
bandwidth
a process can have 1+
sockets
_____________, doors through which
data passes from the network
to the process and vice versa
job of delivering data in
demultiplexing
transport layer segment to
correct socket is called:
job of gather data chunks from
multiplexing
different sockets at source,
encapsulating each chunk w
headers to make segments is
called:
well-known port numbers
0 to 1023
range, that are reserved:
source port number needed in
return address
header of segments bc it
serves as a _____________
______________, when dest wants to
send a segment back
a UDP socket is ID'ed by
2( port , IP addr), 4(source IP, source port, dest IP,
__________-tuple and TCP socket is
dest port)
ID'ed by ___________-tuple, which
are
https://quizlet.com/367709259/chapter-3-flash-cards/
3/7
22/06/2021
Chapter 3 Flashcards | Quizlet
when TCP segment
arrives at
Chapter
3
demultiplex
Study
host, 4 fields used to
_________________ segment to right
socket
UDP is said to be
handshaking
connectionless since there is
no _______________ bw the sending
and receiving transport layer
entities
- finer app-level control over what data sent when
(passes packaged data segment immediately to
network layer, TCP throttles)
- no connection establishment (no delays, so DNS
benefits to UDP
runs over UDP not TCP)
- no connection state ( no need to hold all UDP
parameter etc info, so more space on server for diff
UDP apps)
- small packet header overhea
4 fields:
1,2) port numbers
UDP structure:
3) length field for num bytes in segment (header +
data_
4) checksum ( for errors)
UDP checksum
- for error detection, checks if bits altered
functions places at lower levels may be redundant
end-end principle
when compared to cost of providing them at higher
levels
https://quizlet.com/367709259/chapter-3-flash-cards/
4/7
22/06/2021
Chapter 3 Flashcards | Quizlet
implementing
Chapter
3 reliable data
link, transport, application
Study
transfer occurs at _________,
__________, and ____________ layers
reliable channel = _____
no, order
transferred data bits are
corrupted or lost, and all are
delivered in ___________ that they
were sent
reliable data transfer protocol
implements reliable transfer of data, even when
layer below is unreliable end-to-end network layer
unidirectional data transfer
data transfer from sending to receiving side
bidirectional data transfer
transmitting packets in both directions
finite state machine
the finite state machine for the
determine the operations of the sender/receiver
different
sender and receiver are
___________
sending side waits from call
above, below
from _________ before sending
packet. receiving side waits
from call _________ before
receiving packet
https://quizlet.com/367709259/chapter-3-flash-cards/
5/7
22/06/2021
Chapter 3 Flashcards | Quizlet
positive vs. 3negative
Chapter
pos: control messages to let sender know received
Study
acknowledgments aka ARQ
neg: send message back to sender for error and
(Automatic Repeat reQuest)
needs repeating
protocols
Need 3 protocol capabilities in
ARQ protocols to handle bit
errors:
1) Error detection - mechanism, like checksum, to
see if bit errors occurred
2) Receiver feedback - to sender
3) Retransmission - sender sends packet again
sender will not send new data
stop, wait
until it is sure current packet
correctly received, called ______and-________ protocols
another fatal flaw with rdt2.0
ACK/NAK packets may be corrupted, so need
protocol:
checksum to detect
1) send ack from sender to receiver upon receiving
ack,
3 ways to handle corrupt
2) add enough checksum bits to allow sender to
acknowledgements:
recover from bit errors
3) sender resends current data packet when bad
ACK, but introduces duplicate packets
Best sol for ACK problem
add new field to data packet, have sender number
data packets w SEQUENCE NUMBER
the sender may be restricted to sending only
window/pipelining
packets with sequence numbers that fall within a
given range
time needed to transmit packet
d_trans = L/R = (bits/pckt)/(bits/sec) = time unit
into link
https://quizlet.com/367709259/chapter-3-flash-cards/
6/7
22/06/2021
Utilization of
Chapter
3 sender: U_sender
Chapter 3 Flashcards | Quizlet
(L/R)/(R_TT + L/R)
Study
=
1) GO-Back-N - sender allowed to transmit multiple
packets wo waiting for ack, no more than N packets
2 pipelined error recovery
in pipeline
methods:
2) Selective Repeat - only sends back packets that
may have error, receiver acknowledges corrupt
packets
1) invocation above
GBN sender responds to:
2) receipt of ack
3) timeout event
https://quizlet.com/367709259/chapter-3-flash-cards/
7/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
3.2 Multiplexing and Demultiplexing
Study
3.2 Multiplexing and Demultiplexing
Terms in this set (14)
At the destination host, the transport layer receives
segments from the network layer just below. The
Transport Layer
transport layer has the responsibility of delivering
the data in these segments to the appropriate
application process running in the host.
Suppose you are sitting in front of your computer,
and you are downloading Webpages while running
one FTP session and two Telnet sessions. You
therefore have four network application processes
Example of Transport Layer
running - two Telnet processes, one FTP session,
and one HTTP process. When the transport layer in
your computer receives data from the network layer
below, it needs to direct the received data to one of
these four processes.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
1/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
A process (as part of a network application) canStudy
3.2 Multiplexing and Demultiplexing
have one or more sockets, doors through which
data passes from the network to the process and
through which data passes from the process to the
network. Thus, the transport layer in the receiving
How its Done
host does not actually deliver data directly to a
process, but instead to an intermediary socket.
Because at any given time there can be more than
one socket in the receiving host, each socket has a
unique identifier. The format of the identifier
depends on whether the socket is a UDP or a TCP
socket.
Now lets consider how a receiving host directs an
incoming transport-layer segment to the
appropriate socket. Each transport-layer segment
has a set of fields in the segment for this purpose. At
Demultiplexing
the receiving end, the transport layer examines
these fields to identify the receiving socket and then
directs the segment to that socket. This job of
delivering the data in a transport-layer segment to
the correct socket is call demultiplexing.
The job of gathering data chucks at the source host
from different sockets, encapsulating each data
chuck with header information (that will later be
used in demultiplexing) to create segments, and
Multiplexing
passing the segments to the network layer is call
multiplexing. Transport layer multiplexing requires
(1) that sockets have unique identifiers, and (2) that
each segment have special fields that indicate the
socket to which the segment is to be delivered.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
2/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
When a UDP socket is created , the transport later
Study
3.2 Multiplexing and Demultiplexing
automatically assigns a port number to the socket.
In particular, the transport later assigns a port
number in the range 1024 to 65535 that is currently
not being used by any other UDP port in the host.
Alternatively, we can add a line to are program after
we create the socket to associate a specific port
number. With port numbers assigned to UDP
sockets, we can precisely describe UDP
multiplexing/demultiplexing. Supposed a process in
Host A, with UDP port 19157, wants to send a chuck
of application data to a process with UDP port
46428 in Host B. The transport layer in Host A
creates a transport-layer segment that includes the
application data, the source port number (19157),
Connectionless Multiplexing
the destination port number (46428), and two other
and Demultiplexing
values (unimportant to network-layer). The transport
layer then passes the resulting segment to the
network layer. The network layer encapsulates the
segment in an IP datagram and makes a best-effort
attempt to deliver the segment to the receiving
host. If the segment arrives at the receiving Host B,
the transport later at the receiving host examines
the destination port number in the segment (46428)
and delivers the segment to its socket identified by
port 46428. Note Host B could be running multiple
processes, each with its own UDP socket and
associated port number. As UDP segments arrived
from the network, Host B directs (demultiplexes)
each segment to the appropriate socket examining
the segment's destination port number.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
3/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
It is important to not that a UDP socket is fully
3.2 Multiplexing and Demultiplexing
Study
identified by a two-tuple consisting of a destination
IP address and a destination port number. As a
consequence, if two UDP segments have different
source IP addresses and/or source port numbers,
Two-tuple UDP
but have the same destination IP address and
destination port number, then the two segments will
be directed to the same destination process via the
same destination socket. Since everyone talks to the
same destination socket, 1 socket is needed for n
simultaneous connections.
One subtle difference between a TCP socket and a
UDP socket is that a TCP socket is identified by a
four-tuple: (source IP address, source port number,
destination IP address, destination port). thus when
a TCP segment arrives from the network to a host,
the host uses all four values to direct (demultiplex)
the segment to the appropriate socket. In particular,
and in contrast with UDP, two arriving TCP segments
with different source IP address or source port
Connection-Oriented
numbers will (with the exception of a TCP segment
Multiplexing and
carrying the original connection-establishment
Demultiplexing
request) be directed to two different sockets. The
server host may support many simultaneous TCP
connection sockets, with each socket attached to a
process, and with each socket identified by its own
four-tuple. When a TCP segment arrives at the host,
all four fields (source IP address, source port,
destination IP address, destination port) are sued to
direct (demultiplex) the segment to the appropriate
segment. Every n client talks to n sockets, so n + 1
simultaneous connections.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
4/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
At the very least, the transport layer has to provide
Study
3.2 Multiplexing and Demultiplexing
a multiplexing/demultiplexing service in order to
pass data between the network layer and the
correct application-level process. UDP, aside from
the multiplexing/demultiplexing function and some
light error checking, it adds nothing to IP. UDP takes
Connectionless Transport: UDP
messages from the application process, attaches
source and destination port number fields for the
multiplexing/demultiplexing service, adds two other
small fields, and makes a best-effort to deliver the
segment to the receiving host. If the segment
arrives at the receiving host, UDP uses the
destination port number to deliver the segments
data to the correct application process.
DNS is an example of an application-layer protocol
that typically uses UDP. When the DNS application
in a host wants to make a query, it constructs a DNS
query message and passes the message to UDP.
Without performing any handshaking with the UDP
entity running on the destination end system, the
host-side UDP adds header fields to the message
DNS
and passes the resulting segment to the network
layer. The network later encapsulates the UDP
segment into a datagram and sends the datagram to
the name server. The DNS application at the
querying host then waits for a reply to its query. If it
doesn't receive a reply, it might try resending the
query to another name server, or inform the
invoking application that it can not get a reply.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
5/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
Finer application-level control over what data isStudy
3.2 Multiplexing and Demultiplexing
sent, and when. Under UDP, as soon as an
application process passes data to UDP, UDP will
package the data in side a UDP segment and
immediately pass the segment to the network layer.
TCP, on the other hand, has a congestion control
mechanism that throttles the transport-layer TCP
sender when one ore more links between the
Some applications are better
suited for UDP (1)
source and destination hosts become excessively
congested. TCP will also continue to resend a
segment until the receipt of the segment has been
acknowledged be the destination, regardless of
how long reliable delivery takes. Since real-time
applications often require a minimum sending rate,
do not want to overly delay segment transmission,
and can tolerate some data lost, TCP's service
model is not particularly well matched to these
applications needs.
No connection established. UDP does not
Some applications are better
suited for UDP (2)
introduce any delay to establish a connection. DNS
would be much slower if it ran over TCP. HTTP uses
TCP rather than UDP since reliability is critical for
Web pages with test.
No connection state. For this reason, a server
Some applications are better
devoted to a particular application can typically
suited for UDP (3)
support many more active clients when the
application runs over UDP rather then TCP.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
6/7
23/06/2021
3.2 Multiplexing and Demultiplexing Flashcards | Quizlet
Small packet header overhead. The TCP segment
Study
3.2
Multiplexing and Demultiplexing
Some applications are better
suited for UDP (4)
has 20 bytes of header overhead in every segment,
whereas UDP has only 8 bytes of overhead.
https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/
7/7
23/06/2021
3.2 Transport-Layer multiplexing and demultiplexing Flashcards | Quizlet
3.2 Transport-Layer multiplexing and demultiplexing
Study
3.2 Transport-Layer multiplexing and demultiplexing
Terms in this set (13)
multiplexing at sender
demultiplexing at receiver
handle data from multiple sockets, add transport
header (later used for demultiplexing)
use header info to deliver received segments to
correct socket
host receives IP datagrams
-each datagram has source IP address, destination
IP address
How demultiplexing works
-each datagram carries one transport-layer
segment
-each segment has source, destination port number
host uses IP addresses & port numbers to direct
segment to appropriate socket
What each diagram has?
What each diagram carries?
What host uses to direct
source IP address, destination IP address
one transport-layer segment
IP addresses & port numbers
segment to appropriate
socket
socket?
recall: created socket has host-
DatagramSocket mySocket1 = new
local port #:
DatagramSocket(12534);
https://quizlet.com/389356437/32-transport-layer-multiplexing-and-demultiplexing-flash-cards/
1/2
23/06/2021
3.2 Transport-Layer multiplexing and demultiplexing Flashcards | Quizlet
recall:
when creating datagram
IP address
3.2
Transport-Layer
multiplexing-destination
and demultiplexing
to send into UDP socket, must
Study
-destination port #
specify
-checks destination port # in segment
-directs UDP segment to socket with that port #
when host receives UDP
----->
segment:
IP datagrams with same dest. port #, but different
source IP addresses and/or source port numbers
will be directed to same socket at destination
-source IP address
TCP socket identified by 4-
-source port number
tuple:
-dest IP address
-dest port number
demux:
server host may support many
receiver uses all four values to direct segment to
appropriate socket
each socket identified by its own 4-tuple
simultaneous TCP sockets:
web servers have different
-non-persistent HTTP will have different socket for
sockets for each connecting
each request
client
https://quizlet.com/389356437/32-transport-layer-multiplexing-and-demultiplexing-flash-cards/
2/2
23/06/2021
401 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
401
Terms in this set (29)
Protocols define format, order of messages sent
Protocol
and received among network entities, and actions
taken on message transmission, receipt
Network Edge
hosts: clients and servers. Servers often in data
centers
interconnected routers. network of networks.
Network Core
packet-switching: hosts break application-layer
messages into packets.
Circuit switching is a method of implementing a
telecommunications network in which two network
nodes establish a dedicated communications
channel (circuit) through the network before the
Circuit Switching
nodes may communicate. The circuit guarantees the
full bandwidth of the channel and remains
connected for the duration of the communication
session. The circuit functions as if the nodes were
physically connected as with an electrical circuit.
401
https://quizlet.com/157251247/401-flash-cards/
1/11
23/06/2021
401 Flashcards | Quizlet
Packet switching is a digital networking
communications method that groups all transmitted
data into suitably sized blocks, called packets,
which are transmitted via a medium that may be
Packet Switching
shared by multiple simultaneous communication
sessions. Packet switching increases network
efficiency, robustness and enables technological
convergence of many applications operating on the
same network.
The time required to examine a packet's header and
Processing Delay
determine where to direct it. Typically are
microseconds or less in high-speed routers.
The transmission delay is the amount of time
required for the router to push out the packet.
Transmission Delay
L: packet length (bits)
R: link bandwidth (bps)
so transmission delay is = L/R
The propagation delay, is the time it takes a bit to
propagate from one router to the next.
Propagation Delay
d: length of physical link
S: propagation speed in medium (~2x108m/sec)
so propagation delay is = d/s
This type of delay depends upon the number of
Queuing Delay
earlier arriving packets waiting for transmission onto
the link:
R = link bandwidth (bps)
401
https://quizlet.com/157251247/401-flash-cards/
2/11
23/06/2021
401 Flashcards | Quizlet
End-to-end delay or one-way delay (OWD) refers to
End-to-end Delays
the time taken for a packet to be transmitted across
a network from source to destination.
dend-end= N[ dtrans+dprop+dproc+dqueue]
Layer 4. Application Layer
TCP/IP Layering Model
Layer 3. Transport Layer
Layer 2. Internet Layer
Layer 1. Network Access Layer
Application layer is the top most layer of four layer
TCP/IP model. Application layer is present on the
top of the Transport layer. Application layer defines
TCP/IP application protocols and how host
programs interface with Transport layer services to
use the network.
Layer 4. Application Layer
Application layer includes all the higher-level
protocols like DNS (Domain Naming System), HTTP
(Hypertext Transfer Protocol), Telnet, SSH, FTP (File
Transfer Protocol), TFTP (Trivial File Transfer
Protocol), SNMP (Simple Network Management
Protocol), SMTP (Simple Mail Transfer Protocol) ,
DHCP (Dynamic Host Configuration Protocol), X
Windows, RDP (Remote Desktop Protocol) etc.
401
https://quizlet.com/157251247/401-flash-cards/
3/11
23/06/2021
401 Flashcards | Quizlet
Transport Layer is the third layer of the four layer
TCP/IP model. The position of the Transport layer is
between Application layer and Internet layer. The
purpose of Transport layer is to permit devices on
the source and destination hosts to carry on a
Layer 3. Transport Layer
conversation. Transport layer defines the level of
service and status of the connection used when
transporting data.
The main protocols included at Transport layer are
TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol).
401
https://quizlet.com/157251247/401-flash-cards/
4/11
23/06/2021
401 Flashcards | Quizlet
Internet Layer is the second layer of the four layer
TCP/IP model. The position of Internet layer is
between Network Access Layer and Transport layer.
Internet layer pack data into data packets known as
IP datagrams, which contain source and destination
address (logical address or IP address) information
that is used to forward the datagrams between
hosts and across networks. The Internet layer is also
responsible for routing of IP datagrams.
Packet switching network depends upon a
connectionless internetwork layer. This layer is
known as Internet layer. Its job is to allow hosts to
Layer 2. Internet Layer
insert packets into any network and have them to
deliver independently to the destination. At the
destination side data packets may appear in a
different order than they were sent. It is the job of
the higher layers to rearrange them in order to
deliver them to proper network applications
operating at the Application layer.
The main protocols included at Internet layer are IP
(Internet Protocol), ICMP (Internet Control Message
Protocol), ARP (Address Resolution Protocol), RARP
(Reverse Address Resolution Protocol) and IGMP
(Internet Group Management Protocol).
Network Access Layer is the first layer of the four
layer TCP/IP model. Network Access Layer defines
details of how data is physically sent through the
Layer 1. Network Access Layer
network, including how bits are electrically or
optically signaled by hardware devices that
interface directly with a network medium, such as
coaxial cable, optical fiber, or twisted pair copper
401
https://quizlet.com/157251247/401-flash-cards/
wire.
5/11
23/06/2021
401 Flashcards | Quizlet
The client-server model is a distributed application
structure that partitions tasks or workloads between
the providers of a resource or service, called
servers, and service requesters, called clients.[1]
Often clients and servers communicate over a
computer network on separate hardware, but both
client and server may reside in the same system. A
Client Server Model
server host runs one or more server programs
which share their resources with clients. A client
does not share any of its resources, but requests a
server's content or service function. Clients
therefore initiate communication sessions with
servers which await incoming requests. Examples of
computer applications that use the client-server
model are Email, network printing, and the World
Wide Web.
Peer-to-peer (P2P) computing or networking is a
distributed application architecture that partitions
P2P Model
tasks or work loads between peers. Peers are
equally privileged, equipotent participants in the
application. They are said to form a peer-to-peer
network of nodes.
401
https://quizlet.com/157251247/401-flash-cards/
6/11
23/06/2021
401 Flashcards | Quizlet
The Transmission Control Protocol (TCP) is one of
the main protocols of the Internet protocol suite. It
originated in the initial network implementation in
which it complemented the Internet Protocol (IP).
Therefore, the entire suite is commonly referred to
as TCP/IP. TCP provides reliable, ordered, and errorchecked delivery of a stream of octets between
TCP Service
applications running on hosts communicating by an
IP network. Major Internet applications such as the
World Wide Web, email, remote administration and
file transfer rely on TCP. Applications that do not
require reliable data stream service may use the
User Datagram Protocol (UDP), which provides a
connectionless datagram service that emphasizes
reduced latency over reliability.
The User Datagram Protocol (UDP) is one of the
core members of the Internet protocol suite. The
protocol was designed by David P. Reed in 1980
and formally defined in RFC 768. With UDP,
UDP Service
computer applications can send messages, in this
case referred to as datagrams, to other hosts on an
Internet Protocol (IP) network. Prior
communications are not required to set up
transmission channels or data paths.
A small text file placed on your computer when you
visit a Web page. Used to remember you or your
preferences when you revisit that page or to track
Cookies
your browsing activities, cookies facilitate virtual
shopping carts, page customization, and targeted
advertising. They are not programs and cannot read
your hard drive or cause damage to your computer.
401
https://quizlet.com/157251247/401-flash-cards/
7/11
23/06/2021
401 Flashcards | Quizlet
A technique in which Web pages are stored locally,
either on a host or network, and then delivered to
Web Caching
requesters more quickly than if they had been
obtained from the original source.
SMTP
Simple Mail Transfer Protocol
A protocol used by e-mail clients to retrieve
POP3
messages from remote servers
post office protocol 3
internet mail access protocol
Email retrieval protocol designed to enable users to
access their e-mail from various locations without
IMAP
the need to transfer messages or files back and
forth between computers. Messages remain on the
remote mail server and are not automatically
downloaded to a client system.
401
https://quizlet.com/157251247/401-flash-cards/
8/11
23/06/2021
401 Flashcards | Quizlet
The Domain Name System (DNS) is a hierarchical
decentralized naming system for computers,
services, or any resource connected to the Internet
or a private network. It associates various
information with domain names assigned to each of
the participating entities. Most prominently, it
DNS
translates more readily memorized domain names
to the numerical IP addresses needed for the
purpose of locating and identifying computer
services and devices with the underlying network
protocols. By providing a worldwide, distributed
directory service, the Domain Name System is an
essential component of the functionality of the
Internet.
Hypertext Transfer Protocol. A conventional set of
HTTP
communication rules for controlling how Web
browsers and servers pass information back and
forth over the Internet.
401
https://quizlet.com/157251247/401-flash-cards/
9/11
23/06/2021
401 Flashcards | Quizlet
Dynamic Adaptive Streaming over HTTP - is an
adaptive bitrate streaming technique that enables
high quality streaming of media content over the
Internet delivered from conventional HTTP web
servers. Similar to Apple's HTTP Live Streaming
(HLS) solution, MPEG-DASH works by breaking the
content into a sequence of small HTTP-based file
segments, each segment containing a short interval
of playback time of content that is potentially many
hours in duration, such as a movie or the live
broadcast of a sports event. The content is made
available at a variety of different bit rates, i.e.,
alternative segments encoded at different bit rates
DASH
covering aligned short intervals of play back time
are made available. While the content is being
played back by an MPEG-DASH client, the client
automatically selects from the alternatives the next
segment to download and play back based on
current network conditions. The client selects the
segment with the highest bit rate possible that can
be downloaded in time for play back without
causing stalls or re-buffering events in the playback.
Thus, an MPEG-DASH client can seamlessly adapt
to changing network conditions, and provide high
quality play back with fewer stalls or re-buffering
events.
401
https://quizlet.com/157251247/401-flash-cards/
10/11
23/06/2021
401 Flashcards | Quizlet
A content delivery network or content distribution
network (CDN) is a globally distributed network of
proxy servers deployed in multiple data centers.
The goal of a CDN is to serve content to end-users
with high availability and high performance. CDNs
serve a large fraction of the Internet content today,
CDN
including web objects (text, graphics and scripts),
downloadable objects (media files, software,
documents), applications (e-commerce, portals),
live streaming media, on-demand streaming media,
and social networks.
Class Activity
...
1,2,3(1,2,3,4),4(C)
https://quizlet.com/157251247/401-flash-cards/
11/11
22/06/2021
Chapter 1, Section 6:Networks Under Attack :Security Flashcards | Quizlet
Chapter 1, Section 6:Networks Under Attack :Security
Terms in this set (7)
Virus
Worm
Self-replicating infection by receiving/executing
object ex.E-mail attachment
Self-replicating infection by passively receiving
object that gets itself executed
can record keystrokes,websites visited and then
Spyware Malware
uploads info to collection site.Infected host can be
enrolled in Botnet, used for spam and DDoS attacks
attackers make resources (the server and
Denial Of Service (DoS)
bandwidth) unavailable to legitimate traffic by
overwhelming resources with bogus traffic.
1.Select Target
Denial of Service Steps
2.Break Into Hosts around the network (botnet)
3.Send packets to target from compromised hosts
Broadcast media (shared Ethernet,wireless)
Packet Sniffing
Promiscuous Network Interface reads/records all
packets (including passwords)passing by
IP Spoofing
Send Packet with false source address
https://quizlet.com/213685737/chapter-1-section-6networks-under-attack-security-flash-cards/
1/1
22/06/2021
Chapter 3 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Chapter 3
Terms in this set (24)
The ________ is a means of
Data Unit Identifier
uniquely identifying an endsystem-originated datagram
The process in which a
fragmentation
protocol may need to divide a
block received from a higher
layer into multiple blocks of
some smaller bounded size is
called ________
Which of the following is NOT
improved error recovery
an enhancement of IPv6 over
IPv4?
Chapter 3
https://quizlet.com/124033204/chapter-3-flash-cards/
1/5
22/06/2021
The IP standard specifies that a
Chapter 3 Flashcards | Quizlet
Internet Control Message Protocol (ICMP)
compliant implementation must
also implement ________, which
provides a means for
transferring messages from
routers and other hosts to a
host. Because these messages
are transmitted in IP datagrams,
their delivery is not guaranteed
and their use cannot be
considered reliable
Enhancements of IPv6 over
IPv4
The source and destination
Address Autoconfiguration
Support for Resource Allocation
Extended Address Space
host identifier
address fields in the IP header
each contain a 32-bit global
internet address, generally
consisting of a network
identifier and a _______
In 1994 the Internet
FALSE
Architecture Board issued a
report titled "Security in the
Internet Architecture" that the
general consensus was that the
internet was secure and there
were no areas of security
concern
Chapter 3
https://quizlet.com/124033204/chapter-3-flash-cards/
2/5
22/06/2021
IP Addresses are usually
Chapter 3 Flashcards | Quizlet
dotted decimal
written in _______ notation, with a
decimal number representing
each of the octets of the 32-bit
address
Priority could be assigned on a
true
message basis or on a
connection basis
A connectionless internet
true
service is not good for
connectionless transport
protocols because it imposes
unnecessary overhead
Starting with a 32-bit block
Routing header
consisting of four 8-bit fields,
the ____ contains a list of one or
more intermediate nodes to be
visited on the way to a packet's
destination
Although it is intended to
IPv4
ultimately be replaced ____ is
currently the standard IP used
in the TCP/IP networks
Chapter 3
https://quizlet.com/124033204/chapter-3-flash-cards/
3/5
22/06/2021
Chapter 3 Flashcards | Quizlet
Data is transmitted over an
false
internet in packets from a
source system to a destination
across a path involving a single
network and routers
A ____ consists of a set of
Virtual Private Network (VPN)
computer that interconnect by
means of a relatively unsecure
network and makes use of
encryption and special
protocols to provide security
A static table is more flexible
false
than a dynamic table in
responding to both error and
congestion conditions
Flow control allows router and
TRUE
receiving stations to limit the
rate at which they receive data
______ is the foundation on which
IP
all of the internet based
protocols and internetworking
is based
A Class C network is defined as
FALSE
few networks, each with many
hosts
Class A Networks
Few networks, with many hosts
Chapter 3
https://quizlet.com/124033204/chapter-3-flash-cards/
4/5
22/06/2021
Chapter 3 Flashcards | Quizlet
Class B Networks
Class C Networks
An entity may transmit data to
Medium number of networks, each with a medium
number of hosts
Many networks, each with a few hosts
connectionless
another entity in such a way
that each PDU is treated
independently of all prior
PDUs. This is known as ________
data transfer
A ________ operates at layer 3 of
router
the OSI architecture and routes
packets between potentially
different networks
Time to Live is similar to a hop
true
count
https://quizlet.com/124033204/chapter-3-flash-cards/
5/5
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
Study
Chapter 4: Network Layer
Terms in this set (29)
transport segment from sending to receiving host
on sending side encapsulates segments into
datagrams
Network Layer (communication
on receiving side, delivers segments to transport
between hosts)
layer
network layer protocols in EVERY host, router
router examines header fields in all IP datagrams
passing through it
example services for individual datagrams:
-guaranteed delivery
What service model for
-guaranteed delivery with less than 40 msec delay
"channel" transporting
datagrams from sender to
example services for a flow of datagrams:
receiver?
-in-order datagram delivery
-guaranteed minimum bandwidth to flow
-restrictions on changes in inter-packet spacing
two key network-layer
network-layer functions, analogy
functions
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
1/7
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
forwarding: move packets from router's input toStudy
appropriate router output
network-layer functions
routing: determine route taken by packets from
source to destination
-routing algorithms
-deciding where it should go
taking a trip!
analogy
forwarding: process of getting through single
interchange
routing: process of planning trip from source to
destination
local, per-router function
data plane (mechanism)
determines how datagram arriving on router input
port is forwarded to router output port
forwarding function
network-wide logic
control plane (policy)
determines how datagram is routed among routers
along end-end path from source host to destination
host
traditional routing algorithms: implemented in
routers (handed a policy to them, not generating
two control-plane approaches
them)
software-defined networking (SDN): implemented
in (remote) servers
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
2/7
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
per-router control plane
individual routing algorithm components in each
Study
and every router interact in the control plane
routers only know itself and who connected to it
logically centralized control
plane
a distinct (typically remote) controller interacts with
local control agents (CAS)
all the routers connected to the controller
when looking for forwarding table entry for given
destination address, use longest address prefix that
Longest Prefix matching
matches destination address
most specific info you have means the higher
priority
longest prefiz matching: often performed using
ternary content addressable memories (TCAMs)
Content addressable
definition: present address to TCAM: retrieve
address in one clock cycle, regardless of table size
cisco catalyst: can up ~IM routing table entries in
TCAM
high-level view of generic router architecture
routing, management control plane (software)
router architecture overview
operations in millisecond time frame
forwarding data plane (hardware) operatres in
nanosecond timeframe
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
3/7
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
physical layer: bit-level reception
Study
data link layer: e.g. Ethernet
decentralized switching: using header field values,
lookup output port using forwarding table in input
port memory ("match plus action")
Input port functions
goal: complete input port processing at 'line speed'
queuing: if datagrams arrive faster than forwarding
rate into switch fabric
destination-based forwarding, generalized
forwarding
forward based only on destination IP address
destination-based forwarding
(traditional)
(look at IP address and figure out where to send)
generalized forwarding
Three Types of switching
forward based on any set of header field values
memory, bus, crossbar
fabrics
first generation routers:
traditional computers with switching under direct
control of CPU
switching via memory
packet copied to system's memory
speed limited by memory bandwidth (2 bus
crossings per datagram)
IT'S CHEAP
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
4/7
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
datagram from input port memory to output
Study
memory via a shared bus (EVERYTHING DIRECTLY
CONNECTED)
switching via a bus
bus contention: switching speed limited by bus
bandwidth
32 Gbps bus, Cisco 5600: sufficient speed for
access and enterprise routers
overcome bus bandwidth limitations
banyan networks, crossbar, other interconnection
nets initially developed to connect processors in
switching via interconnection
multiprocessor
network
advanced design: fragmenting datagram into fixed
length cells, switch cells through the fabric
Cisco 12000: switches 60 Gbps through the
interconnection network
buffering required when datagrams arrive from
fabric faster than the transmission
scheduling discipline chooses among queued
Output ports (VERY
datagrams from transmission
IMPORTANT)
datagram (packets) can be lost due to congestion,
lack of buffers
priority scheduling - who gets best performance,
network neutrality
buffering when arrival rate via switch exceeds
output line speed
output port queueing
queueing (delay) and loss due to output port buffer
overflow!
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
5/7
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
input port queuing
fabric slower than input ports combined ->
Study
queueing may occur at input queues
(HOL blocking)
queued datagram at front of queue prevents others
in queue from moving forward
head-of-the-line (HOL)
queueing delay and loss due to input buffer
blocking
overflow!
most queueing at output but can happen at input
-> overwhelming the switch fabric
scheduling: choose next packet to send on link
FIFO scheduling: send in order of arrival to queue
discard policy: if packet arrives to full queue: who to
Scheduling mechanisms
discard?
-tail drop: drop arriving packet
-priority: drop/remove on priority basis
random: drop/remove randomly
packet drop policy- which packet to drop
-drop-tail
-active queue management (AQM)
Traditional Queuing Polices
Random Early Detection (RED) - AQM- random
based, proactive, tries to help the queue to not get
full
-triggers timeouts for more packets with larger
bandwidth
priority scheduling: sned highest priority queued
packet
Scheduling policies: priority
multiple classes, with different priorities
-class may depend on marking or other header into,
eg IP source/dest, port numbers, etc
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
6/7
22/06/2021
Chapter 4: Network Layer
Scheduling policies: still more
Chapter 4: Network Layer Flashcards | Quizlet
round robin (RR) scheduling: multiple classes
Study
cyclically scan class queues, sending one complete
packet from each class (if available)
Weighted Fair Queuing (WFQ)
Scheduling policies STILL
MORE
generalized Round Robin
each class gets weighted amount of service in each
cycle
under contention, weights come into play
https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/
7/7
23/06/2021
Chapter 12 Flashcards | Quizlet
Chapter 12
Terms in this set (25)
DNS servers recognize two
iterative queries
types of name resolution
recursive queries
requests. These two types are..
web queries
iterative queries
recursive queries
address queries
Which of the following would
88.143.75.10.in-addr.arpa
be the correct FQDN for a
resource record in a reverse
lookup zone, if the host's IP
address is 10.75.143.88?
127.0.0.1.in-addr.arpa
10.75.143.88.in-addr.arpa
in-addr.arpa.88.143.75.10
88.143.75.10.in-addr.arpa
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
1/14
23/06/2021
What are the servers at the top
Chapter 12 Flashcards | Quizlet
Root servers
of the DNS hierarchy called?
Down-level servers
Authoritative sources
Root servers
Forwarders
The typical query one DNS
recursive query
server sends to a root name
server is called a(n) _______.
recursive query
iterative query
referral
forwarded query
The domain name part of a
hierarchical; periods
DNS name is _______ and consists
of two or more words,
separated by ______.
peer-based; periods
hierarchical; commas
unranked; commas
hierarchical; periods
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
2/14
23/06/2021
What do you call the source
Chapter 12 Flashcards | Quizlet
Authoritative source
responsible for maintaining a
domain's resource records?
Authenticate source
Authoritative source
Root server
Down-level server
When using DNS for name
Less traffic crossing the network perimeter
resolution only, why should a
company consider using DNS
servers outside the network
perimeter?
Less administration
Less internal traffic
Fewer servers in the
communications server rack
Less traffic crossing the
network perimeter
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
3/14
23/06/2021
At what level of the DNS
Chapter 12 Flashcards | Quizlet
At the second-level domain level
hierarchy are actual hosts,
apart from the root servers?
At the root servers level
At the top-level domain level
At the second-level domain
level
At the third-level domain level
Who is responsible for the
Internet Corporation for Assigned Names and
ratification of new top-level
Numbers (ICANN)
domains?
Internet Corporation for
Assigned Names and Numbers
(ICANN)
Network Solutions, Inc. (NSI,
formerly known as InterNIC)
Internet Assigned Numbers
Authority (IANA)
Contoso.com
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
4/14
23/06/2021
What is the character limit on
Chapter 12 Flashcards | Quizlet
63; 255
individual domain names, and
the limit on the Fully Qualified
Domain Names (FQDNs)?
15; 64
63; 255
31; 128
63; 128
Concerning DNS, what is
When a DNS server receives information about a
negative caching?
non-existent host
When a DNS server receives
incorrect information about a
host
When a DNS server receives
obsolete information about a
host
When a DNS server receives
information about a nonexistent host
When a DNS server forwards
incorrect information about a
host
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
5/14
23/06/2021
Chapter 12 Flashcards | Quizlet
A DNS server receives updated
Time To Live (TTL) specified by each DNS server's
information. Other DNS servers
administrator
have outdated information
cached. What determines the
amount of time that the old
DNS data remains cached on a
server and an update might
occur?
The distance (number of
network hops) between the
new information and queried
DNS server
Network congestion between
DNS servers
Time To Live (TTL) specified by
each DNS server's
administrator
The version of Windows Server
on the DNS server
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
6/14
23/06/2021
What is the default TTL for a
Chapter 12 Flashcards | Quizlet
1 hour
Windows Server 2012 R2 DNS
server?
1 hour
12 hours
5 minutes
36 hours
Why is the DNS service
To allow a DHCP server to request a DNS server to
included in Windows Server
update or create a record.
2012 R2 integrated with DHCP
service?
To allow a DNS server to
inform DHCP clients with
updated information.
To update both DNS and
DHCP clients with information
from the Active Directory.
To allow a DHCP server to
request a DNS server to
update or create a record.
DNS and DHCP services are
not integrated in Windows
Server 2012 R2.
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
7/14
23/06/2021
You registered the domain
Chapter 12 Flashcards | Quizlet
subdomains of contoso.com
name contoso.com. The
FQDNs
DNs seattle.contoso.com
and halifax.contoso.com are
examples of different _____.
subdomains of contoso.com
second-level domains
top-level domains
IP addresses
When a DNS server
UDP; 53
communicates a name
resolution query to another
DNS server, what type of
datagram is used, and over
what port?
UDP; 35
TCP; 35
UDP; 53
TCP; 53
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
8/14
23/06/2021
Concerning DNS domain
Chapter 12 Flashcards | Quizlet
.com, .net, .org
hierarchy, what are examples of
global top-level domains?
.com, .net, .org
.mil, .gov, .edu
.aero, .name, .pro
.ca, .cz, .kr
What are some best practices
Avoid an excessive number of domain levels.
when creating internal DNS
namespaces?
Avoid an excessive number of
domain levels.
Keep domain names full and
descriptive; avoid concise
subdomains.
Place less importance on a
convention compared to
spelling.
Never abbreviate.
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
9/14
23/06/2021
Chapter 12 Flashcards | Quizlet
What is the primary purpose of
Name caching enables the second name resolution
name caching?
request for the same name to bypass the referral
process.
Name caching saves an
extraordinary amount of time
for the user.
Name caching greatly reduces
traffic on the company
network.
Name caching validates why
you should deploy cachingonly servers.
Name caching enables the
second name resolution
request for the same name to
bypass the referral process.
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
10/14
23/06/2021
Chapter 12 Flashcards | Quizlet
What client applications utilize
All Internet applications working with host names
DNS to resolve host names
must use DNS to resolve host names into IP
into IP addresses?
address.
Client web browsers, or any
application that uses HyperText
Transfer Protocol (HTTP), use
DNS to resolve host names
into IP addresses.
All Internet applications
working with host names must
use DNS to resolve host names
into IP address.
Any application on a system
that has connectivity to the
Internet uses DNS to resolve
host names into IP addresses.
DNS does not resolve host
names into IP addresses.
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
11/14
23/06/2021
Chapter 12 Flashcards | Quizlet
What is the primary benefit of a
Reducing the traffic and making efficient use of
DNS forwarder?
available bandwidth across the network perimeter
Exchanging iterative queries
for recursive queries across the
network perimeter
Reducing the traffic and
making efficient use of
available bandwidth across the
network perimeter
Making the most of iterative
queries to other DNS servers
Reducing the burden on the
Internet's root name servers
What DNS server represents
Root name server
the top of the DNS hierarchy?
Root name server
Caching-only server
Forwarder
Authoritative source
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
12/14
23/06/2021
What DNS server is never the
Chapter 12 Flashcards | Quizlet
Caching-only server
authoritative source for a
domain, but only serves to
resolve names?
Root name server
Caching-only server
Forwarder
Authoritative source
What DNS server normally
Forwarder
sends iterative queries to
another DNS server?
Root name server
Caching-only server
Forwarder
Authoritative source
Chapter 12
https://quizlet.com/62609800/chapter-12-flash-cards/
13/14
23/06/2021
What DNS server is
Chapter 12 Flashcards | Quizlet
Authoritative source
responsible for maintaining a
particular domain's resource
records?
Root name server
Caching-only server
Forwarder
Authoritative source
https://quizlet.com/62609800/chapter-12-flash-cards/
14/14
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
Study
Chapter 14,15,17
Terms in this set (80)
datagram
IP
ip attaches a header to upper layer data to form an
IP ________
_____ is the foundation on which all of the internet
based protocols and internetworking is based.
the process in which a protocol may need to divide
fragmentation
a block received from a higer layer into multiple
blocks of some smaller bounded size is called _____
fragmentation
in IPV6, ____ may only be performed by source
nodes, not by routes, along a packets delivery path
a device attached to one of the networks of an
an end system
internet that is used to support end user
applications or services is ______
send
IPsec
improved error recovery
https://quizlet.com/391434236/chapter-141517-flash-cards/
the ____ primitive is used to request transmission of a
data unit.
the principal feature of ______ is that it can encrypt
and/or authenticate all traffic at IP level
NOT an enhancement of IPV6 over IPV4
1/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chaptercredit-based
14,15,17
TCP uses ______ flow control technique
accept further segments from
all of the ff are ways of receiving transport entity to
network service
cope with the flow control requirement EXCEPT _____
keep alive
Study
abort connection when no segment are received is
the _____ transport protocol timer
once the passive open command is issued, the
LISTEN
transport entity creates a connection object of
some sort that is in the _____ state
provides a means of informing the destination TCP
Urgent data signaling
users that significant data is in the upcoming data
streams. it is up to the destination user to determine
appropriate action.
the tcp header ____ field contrains the number of
Window
data octets, beginning with the sequence number
indicated in the ack field that the sender is willing to
accept
using _________ a sender retransmits a segment before
timeout because it infers that the segment was lost.
if the sender subsequently receives an ack that does
fast retransmit
not cover all of the segments transmitted before this
is initiated, sender may infer that two segments were
lost from current window and retransmit additional
segment.
routers
https://quizlet.com/391434236/chapter-141517-flash-cards/
an internet consist of multiple separate networks
that are interconnected by _____.
2/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
IP
multicast
the most widely used protocol for internetworking
Study
is the ____
IPV6 allows three types of addresses: anycast,
unicast and ______
starting with a 32-bit block consisting of four 8 bit
routing header
fields, the ______ contains list of one or more
intermediate node to be visited on the way to a
packets destination
a ______ operates at layer 3 of the OSI architecture
router
and routes packets between potentiall different
networks
the services to be provided across adjacent
primitive
protocol layers are expressed in terms of _____ and
parameters
IP addresses are usually written in _________ notation
dotted decimal
with a decimal number representing each of the
octets of the 32 bit address.
128
IPv6 addresses are ____ bits in length
______ protocol provides an end-to-end transfer
Transport
service that shields upper-layer protocols from the
details of the intervening network or networks.
https://quizlet.com/391434236/chapter-141517-flash-cards/
3/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
socket
in TCP, the combination of port and host is reffered
Study
to as a ______
the TS user can signal to the local TCP entity that it
passive open
will passively wait for a request with a _______
command. a server program such as time sharing or
a file transfer application might do this.
when the system upon which a transport entity is
running fails and subsequently restarts, the state
half open
information of all active connections is lost. the
affected connections become ______ because the
side that did not fail does not yet realize the
problem.
PDU
for virtually all protocols data are transferred in
blocks called ____
a function performed by a receiving entity to limit
flow control
the amount or rate of data is sent by a transmitting
entity is _______
an IS used to connect two LANs that use similar
LAN protocols and acts as an address filter, picking
bridge
up packets from one LAN that are intended for a
destination on another LAN and passing those
packets on is a _____.
Data Unit Identifier
the ____ is a means of uniquely identifying an endsystem-originated datagram.
the effect of the ____ is to erase the portion of the
subnet mask
host field that refers to an actual host on a subnet,
leaving the network number and the subnet number.
https://quizlet.com/391434236/chapter-141517-flash-cards/
4/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
Study
a hop-by-hop option that is used to send IPv6
jumbo payload
packetss with payloads longer than 65,535 octets is
_____
in the ipv4 header ____ specifies how long, in
time to live
seconds a datagram is allowed to remain in the
internet.
A _____ consists of a set of computers that
VPN
interconnect by means of a relatively unsecure
network and makes use of encryption and special
protocol to provide security.
an entity may transmit data to another entity in such
connectionless
a way that each PDU is treated independently of all
prior PDUs. this is known as ____ data transfer.
a device used to provide a communications path
and perform the necessary relaying and routing
intermediate system
functions so that data can be exchanged between
devices attached to different networks in the
internet is an _____
ipv4
although it is intended to ultimately be replaced, ____
is currently the standard IP used in TCP/IP networks.
the source and destination address fields in the IP
host identifier
header each contain an 32 bit global internet
address, generally consisting of a network identifier
and a _____
https://quizlet.com/391434236/chapter-141517-flash-cards/
5/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
the IP standard specifies that a compliant
Study
implementation must also implement _____ which
provides a means for transferring messages from
ICMP
routers and other hosts to a host. because these
messages are transmitted in IP datagrams, their
delivery is not guaranteed and their use cannot be
considered reliable.
spatial diversity
MIMO-MAC
with _____ same data is coded and transmitted thru
multiple antennas
_____ is used on the uplink channel to provide
multiple access to subscriber stations
____ scheme uses advance digital signal processing
OFDM
techniques to distribute the data over multiple
carriers at precise frequencies
subchannel
OFDMA subcarriers are divided into groups and
each group is named a _____
with ____ it is possible to simultaneously trainsmit
OFDMA
either from or to different users by allocating the
subcarriers during any one-time interval to multiple
users
orthogonality
https://quizlet.com/391434236/chapter-141517-flash-cards/
the relationship among the subcarriers in OFDM
scheme is reffered to as _____
6/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
OFDMA
like ofdm, ___ employs multiple closely spaced
Study
subcarriers but the subcarriers are divided into
group of subcarriers.
bursts
spatial multiplexing
downlink-broadcast channel
subchannels are further grouped into ____ which can
be allocated to wireless users.
the two tupes of MIMO transmission schemes are
spatial diversity and _________
two applications of MU-MIMO: UPlink-multiple
access channel, MAC and ___________.
the ____ is an algorithm that converts a set of
FFT (Fast fourier transform)
uniformly spaced data points from the time domain
to frequency domain
____ defines subchannels that can be allocated to
subchannelization
subscriber stations depending on their channel
conditions and data requirements.
for the IEEE 802.11a LAN standard, the OFDM
52 subscribers
scheme consists of a set of ______ subcarriers with a
base frequency of 0.3125 MHz
SC-FDMA performs a _____ prior to the IFFT
DFT (discrete fourier transform)
operation, which spreads the data symbols over all
the subcarriers carrying information and produces a
virtual single-carrier structure
frequency hopping
https://quizlet.com/391434236/chapter-141517-flash-cards/
the first type of spread spectrum is known as ____
7/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
spread spectrum
port
CLOSED
Keepalive
earliest application of _____ were military, where Study
it
was use as immunity to jamming
the ____ variable represents a particular TS user at the
specified host.
to begin a connection establishment a TS user is in
_____ state.
abort connection when no segments are received is
the ____ transport protocol timer
_______ provides a means of informing the destination
urgent data signaling
TCP user that significant data is in the upcoming
data stream. It is up to the destination user to
determine appropriate action.
capacity,range and reliability
spatial multiplexing
mimo exploits the space dimensions to improve
wireless systems in terms of _________
____ is when a source data stream is divided among
the transmitting antennas.
______ is used on the downlink channel to enable the
MIMO-BC
base station to transmit different data streams to
multiple users over the same frequency band.
QPSK
https://quizlet.com/391434236/chapter-141517-flash-cards/
____ is a common modulation scheme used with
OFDM.
8/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
SC-FDMA
one prominent advantage of _____ over OFDMA Study
is the
lower peak-to-average power ration of the transmit
waveform, which benefit the mobile user in terms of
battery life and power efficiency.
with ______, each bit in the original signal is
DSSS
represented by multiple bits in the transmitted
signal, using a spreading code.
FFT is a family of algorithms that form a special case
DFT
of the _____, which refers to any algorithm that
generates a quantized fourier transform of a timedomain function.
____antenna architecture has become a key
MIMO
technology in evolving high-speed wireless
networks, including IEEE 802.11 Wi-Fi LANs and
WiMAX
MU MIMO
extends the basic MIMO concept to multiple
endpoints, each with multiple antennas
____ also called multicarrier modulation, uses
OFDM
multiple carrier signals at different frequencies,
sending some of the bits on each channel.
IFFT
the _____ reverses the FFT operation
multiple users employing the same transport
multiplexing
protocol and distinguished by port numbers or
service access points is _____
https://quizlet.com/391434236/chapter-141517-flash-cards/
9/10
22/06/2021
Chapter 14,15,17 Flashcards | Quizlet
Chapter 14,15,17
host
three-way handshake
in case of a single network, ____ refers to an attached
Study
network device
connection establishment in TCP always uses ____
one header must serve to perform all protocol
20
mechanism. this header has a minimum length of ___
octets
when a data segment arrives that is in sequency, the
cummulative
receiving TCP entity has two options converning the
timing of acknowledgment: immediate and ____
listen for connection attempt at specified security
full specified passive open
and precedence from specified destination is the
description of the TCP service request ____ primitive
urgent
the two facilities that TCP provides for labeling data
are push and _____
the _____ field in the TCP header contains the
acknowledgment number
sequency number of the next data octet that the
TCP entity expects to receive
A TCP implementation may employ one of the three
batch
retransmission strategies: First only, individual and
______
https://quizlet.com/391434236/chapter-141517-flash-cards/
10/10
22/06/2021
Chapter 15 Flashcards | Quizlet
Chapter 15
Study
Chapter 15
Terms in this set (41)
A transport protocol can be
F
either connection oriented,
such as UDP, or
connectionless, such as TCP.
(T/F)
The receiver needs to adopt
T
some policy concerning the
amount of data it permits the
sender to transmit. (T/F)
There is no need for
F
connection establishment and
termination procedures to
support connection-oriented
service with a reliable
network service. (T/F)
When a TCP entity detects the
T
presence of congestion in the
Internet, it reduces the flow of
data onto the Internet until it
detects an easing in
congestion. (T/F)
https://quizlet.com/454497303/chapter-15-flash-cards/
1/9
22/06/2021
The SYN segment
functions
Chapter
15
Chapter 15 Flashcards | Quizlet
T
Study
both as a connection request
and as a connection
acknowledgment. (T/F)
In a protocol architecture, the
F
transport protocol sits above
application and other upperlayer protocols, and just below
the network or internetwork
layer. (T/F)
The less the network service
T
provides, the more the
transport protocol must do.
(T/F)
If there is a single host-node
F
link over which all virtual
circuits are multiplexed, the
throughput of a transport
connection can exceed the
data rate of that link. (T/F)
The sliding-window technique
T
would work well with a reliable
network service. (T/F)
An internetwork using IP is an
F
example of a reliable network
service. (T/F)
https://quizlet.com/454497303/chapter-15-flash-cards/
2/9
22/06/2021
A credit scheme
Chapter
15 is a more
Chapter 15 Flashcards | Quizlet
T
Study
effective scheme with an
unreliable network service.
(T/F)
A retransmission timer is the
F
only timer needed for proper
functioning of a transport
protocol. (T/F)
A problem with a two-way
T
handshake is the potential loss
of segments and the potential
presence of obsolete
segments. (T/F)
As with IP, the services
T
provided by TCP are defined in
terms of primitives and
parameters. (T/F)
The credit-based flow control
T
mechanism of TCP was
designed to enable a
destination to restrict the flow
of segments from a source to
avoid buffer overflow at the
destination. (T/F)
TCP uses a ________ flow control
Credit-based
technique.
https://quizlet.com/454497303/chapter-15-flash-cards/
3/9
22/06/2021
The ________ variable
represents a
Chapter
15
Chapter 15 Flashcards | Quizlet
Port
Study
particular TS user at the
specified host
Answer: Accept further segments from the network
service
All of the following are ways of
the receiving transport entity
- use a credit scheme
to cope with the flow control
requirement EXCEPT:
- do nothing
- use a fixed sliding-window protocol
To begin a connection
CLOSED
establishment a TS user is in a
________ state.
Multiple users employing the
Multiplexing
same transport protocol and
distinguished by port numbers
or service access points is
________.
"Abort connection when no
Keepalive
segments are received" is the
________ Transport Protocol Timer.
In the case of a single network,
Host
________ refers to an attached
network device.
https://quizlet.com/454497303/chapter-15-flash-cards/
4/9
22/06/2021
Once the Passive
Chapter
15 Open
Chapter 15 Flashcards | Quizlet
LISTEN
Study
command is issued, the
transport entity creates a
connection object of some
sort that is in the ________ state.
Connection establishment in
Three-way handshake
TCP always uses a ________.
________ provides a means of
Urgent data signaling
informing the destination TCP
user that significant data is in
the upcoming data stream. It is
up to the destination user to
determine appropriate action.
One header must serve to
20
perform all protocol
mechanisms. This header has
a minimum length of ________
octets.
The TCP header ________ field
Window
contains the number of data
octets, beginning
with the sequence number
indicated in the
acknowledgment field, that the
sender is willing to accept.
https://quizlet.com/454497303/chapter-15-flash-cards/
5/9
22/06/2021
When a data
Chapter
15segment arrives
Chapter 15 Flashcards | Quizlet
Cumulative
Study
that is in sequence, the
receiving TCP entity
has two options concerning
the timing of acknowledgment:
Immediate and
________.
The ________ protocol provides
Transport
an end-to-end transfer service
that shields upper-layer
protocols from the details of
the intervening network or
networks.
A ________ service provides for
connection-oriented
the establishment,
maintenance, and termination
of a logical connection
between TS users. To date this
is the most common type of
protocol service available and
has a wide variety of
applications.
In TCP the combination of port
Socket
and host is referred to as a
________.
https://quizlet.com/454497303/chapter-15-flash-cards/
6/9
22/06/2021
In addition 15
to data each
Chapter
Chapter 15 Flashcards | Quizlet
Sequence number
Study
transmitted segment includes
in its header three fields
related to flow control:
acknowledgment number,
window, and ________.
The TS user can signal to the
Passive Open
local TCP entity that it will
passively wait for a
request with a ________ command.
A server program such as timesharing or a file transfer
application might do this.
A ________ timer is reset with each
Persist
outgoing segment. If this timer
ever expires the
protocol entity is required to
send a segment, even if it
duplicates a previous one.
When the system upon which a
Half open
transport entity is running fails
and subsequently restarts, the
state information of all active
connections is lost. The
affected connections become
________ because the side that did
not fail does not yet realize the
problem.
https://quizlet.com/454497303/chapter-15-flash-cards/
7/9
22/06/2021
________ measures
Chapter
15 the time the
Chapter 15 Flashcards | Quizlet
Keepalive
Study
transport machine will continue
to await an acknowledgment of
a transmitted segment after the
segment has been
retransmitted the maximum
number of times. When the
timer expires, the transport
entity assumes that the other
transport entity or intervening
network has failed, closes the
connection, and signals an
abnormal close to the TS user.
TCP uses only a single type of
TCP segment
protocol data unit called a
________.
The ________ field in the TCP
Acknowledgement number
header contains the sequence
number of the next
data octet that the TCP entity
expects to receive.
TCP mechanisms can be
Connection establishment
grouped into the categories of
data transfer, connection
termination, and ________.
A TCP implementation may
Batch
employ one of three
retransmission strategies:
First-only, Individual, and
________.
https://quizlet.com/454497303/chapter-15-flash-cards/
8/9
22/06/2021
In addition 15
to TCP, the ________ is
Chapter
Chapter 15 Flashcards | Quizlet
UDP
Study
the other transport-level
protocol that is
commonly used as part of the
TCP/IP protocol suite.
https://quizlet.com/454497303/chapter-15-flash-cards/
9/9
22/06/2021
CIS 4840 Chapter 14 Flashcards | Quizlet
CIS 4840 Chapter 14
Study
CIS 4840 Chapter 14
Terms in this set (30)
Datagram
IP attaches a h
header to upper data to form an IP
A Next generation IP, known as ______, provides
IPv6
longer address field and more functionality than the
current IP.
_____________ is the foundation on which all of the
IP
internet-based protocols and internet working is
based.
PDUs (Protocol Data Units)
For virtually all protocols data are transferred in
blocks called_______.
The process in which a protocol may need to divide
Fragmentation
a block received from a higher layer into multiple
blocks of toe bounded size is called _______.
A Function performed by receiving entity to limit
Flow Control
the amount or rate of data that is sent by
transmitting entity is ________.
Fragmentation
https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/
in IPV6 _______ may only be performed by source
nodes, not by routers, along a packets deliver path.
1/5
22/06/2021
CIS 4840 Chapter 14 Flashcards | Quizlet
CIS 4840 Chapter 14
An IS used to connect two LANS that use similar
Study
LAN protocols and acts a an address filter, picking
Bridge
up packets from one LAN that are intended for a
destination on another LAN and passing those
packets on, is a ____________.
A device attached to one of the networks of an
An end system
internet that is used t support end user applications
or services is_______.
Data Unit Identifier
Send
The _______ is a means of uniquely identifying an endsystem originated datagram.
The _______ primitive is used to request transmission of
a data unit.
The effect of the _____ is to erase the portion of the
Subnet mask
host field that refers to an actual host on a subnet,
leaving the network number and the subnet number.
IPSec
Jumbo payload
https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/
The principal feature of ______ is that it can encrypt
and. or authenticate all traffic at the IP level.
a hop-by-hop that is used to send IPV6 packets with
payloads longer than 65,535 octets is ________.
2/5
22/06/2021
CIS 4840 Chapter 14 Flashcards | Quizlet
CIS 4840 Chapter 14
Which of the following is NOT an enhancementStudy
of
IPv6 over IPv4?
Improved error recovery
a. support for resource allocation
b. Improved error recover
c. Address auto configuration
d. Expanded address space
routers
An internet consists of multiple separate networks
that are interconnected by _______.
In the IPV4 Header _____ specifies how long, in
TTL (time to Live)
seconds, a datagram is allowed to remain in the
internet.
IP (internet protocol)
the most widely used protocol for internet working
us the _______.
A ______ consists of a set of computers that
VPN (virtual private network)
interconnect by means of a relatively insecure
network and makes use of encryption and special
protocols to provide security.
multicast
IPV6 allows three types of addresses: unicast, any
cast, and _____.
An entity may transmit data to another entity in such
connectionless
a way that each PDU is treated independently of all
prior PDUs. This is known as ____ data transfer.
Starting with 32-bit block consisting of four 8-bit
routing header
fields, the _____ contains a list of one or more
intermediate nodes to be visited the way to a
packets destination.
https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/
3/5
22/06/2021
CIS 4840 Chapter 14 Flashcards | Quizlet
CIS 4840 Chapter 14
Study
A device used to provide a communications path
and perform the necessary relaying and routing
intermediate system (IS)
functions so that data can be changing between
devices attached into different networks in the
internet as an_____.
A ______ operates at layer 3 of the OSI architecture
router
and routes packets between potentially different
networks.
Although it is intended to ultimately be replaced,
IPV4
_____ is currently the standard IP used in TCP/IP
networks.
primitives
the service to be provided across adjacent protocol
layers are expressed in terms of ____ and parameters.
The source and destination address fields in the IP
host identifier
header each contains a 32-bit global Internet
address, generally consisting of a network identifier
and a _____.
IP addresses are usually written in _____ notation, with
dotted decimal
a decimal number representing each of the octets
of the 32-bit address,
https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/
4/5
22/06/2021
CIS 4840 Chapter 14 Flashcards | Quizlet
CIS 4840 Chapter 14
Th IP standard specifies that a complaint
Study
implementation must al implement _______, which
internet control message
protocol (ICMP)
provides a means for transferring messages form
router and other hosts to a host. Because these
messages are transmitted in IP datagrams, their
delivery is to guaranteed and the use cannot be
considered reliable.
128
https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/
IPV6 addresses are ____ bits in length.
5/5
23/06/2021
CIS*3210 - True or False Flashcards | Quizlet
CIS*3210 - True or False
Terms in this set (5)
A user requests a Web page
False
that consists of some text and
three images. For this page, the
client will send one request
message and receive four
response messages.
Two distinct Web pages can be
True
sent over the same persistent
connection
With nonpersistent
False
connections between browser
and origin server, it is possible
for a single TCP segment to
carry two distinct HTTP request
messages
The Date: header in the HTTP
False
response message indicates
when the object in the
response was last modified.
HTTP response messages
False
never have an empty message
body
https://quizlet.com/173544792/cis3210-true-or-false-flash-cards/
1/1
22/06/2021
CNT 4104 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
CNT 4104
Study
CNT 4104
Terms in this set (190)
Data communications deals
true
with the transmission of signals
in a reliable and efficient
manner
Changes in corporate data
true
traffic patterns are driving the
creation of high-speed WANs
A modem is required to
true
establish communication
between a workstation and a
server over a public telephone
network
Compression refers to the
false
ability of a number of devices
to share a transmission facility
The basic building block of any
true
communications facility is the
transmission line
https://quizlet.com/344469319/cnt-4104-flash-cards/
1/26
22/06/2021
Developing
CNT
4104 switching systems
CNT 4104 Flashcards | Quizlet
false
Study
with the capacity and rapid
response to support the
demand requirements with the
increased use of fiber optic
transmission is no longer a
challenge
Frame relay networks are
false. Packet-switching networks are commonly
commonly used for terminal-
used
to-computer and computer-tocomputer communications
The LAN is owned by the same
true
organization that owns the
attached devices
Enterprises have formed ____ to
intranets and extranets
reach customers, suppliers,
and partners while isolating
their proprietary information
from unwanted access
A dominant architecture in the
client/server
business environment and the
more recent Web-focused
intranet trend is _________
computing
The key elements of a simple
source, transmission, destination
communications model are
DWDM enables capacities of
terabits
____ per second
https://quizlet.com/344469319/cnt-4104-flash-cards/
2/26
22/06/2021
CNT 4104 Flashcards | Quizlet
CNT 4104
An _____ uses Internet and Web
Study
intranet
technology in an isolated
facility internal to an enterprise
A network in which small
packet switching
chunks of data are passed
through the network from
node to node, and at each
node the entire data chunk is
received, stored briefly, and
then transmitted to the next
node, is a _____ network
In order for data processing
exchange management
devices to communicate
certain conventions must be
decided on. These
requirements can collectively
be termed _____
In situations in which an
recovery
information exchange is
interrupted due to a fault
somewhere in the system, ____
techniques are needed to
either resume activity at the
point of interruption or to
restore systems to their state
prior to the beginning of the
exchange
https://quizlet.com/344469319/cnt-4104-flash-cards/
3/26
22/06/2021
In a _____
network, a dedicated
CNT
4104
CNT 4104 Flashcards | Quizlet
circuit switching
Study
communications path is
established between two
stations through the nodes of
the network. The telephone
network is the most common
example
A _____ is a physical facility that
NAP / network access provider
provides the infrastructure to
move data between connected
networks
Individual hosts and LANs are
POP / point of presence
connected to an Internet
Service Provider through a ___
The place where telephone
CO / central office
companies terminate customer
lines and locate switching
equipment to interconnect
those lines with other networks
is the ___
Today's networks can offer
QoS / quality of service
differing levels of ______, which
include specifications for
maximum delay and minimum
throughput
https://quizlet.com/344469319/cnt-4104-flash-cards/
4/26
22/06/2021
An _____4104
extends a company's
CNT
CNT 4104 Flashcards | Quizlet
extranet
Study
intranet out onto the Internet
to allow selected customers,
suppliers, and mobile workers
to access the company's
private data and applications
______ is required to assure that
flow control
the source does not
overwhelm the destination by
sending data faster than they
can be processed and
absorbed.
Networks that generally cover
wide area networks
a large geographical area,
require the crossing of public
right-of-ways, consists of a
number of interconnected
switching nodes, and rely on
circuits provided by a common
carrier are _____
Using fixed length packets and
asynchronous transfer mode
sometimes referred to as cell
relay, _______ is a culmination of
developments in circuit
switching and packet switching.
It is so efficient that it can offer
a constant data rate channel
even though it is using a packet
switching technique
https://quizlet.com/344469319/cnt-4104-flash-cards/
5/26
22/06/2021
_______ networks
CNT
4104 provide
CNT 4104 Flashcards | Quizlet
wireless
Study
advantages in the areas of
mobility and ease of
installation and configuration.
The Internet evolved from the
ARPANET
____ which was developed in
1969 by the Advanced
Research Projects Agency of
the U.S Department of Defense
Communicating across
internetworking
arbitrary, multiple, packetswitched networks is _____
Each IP packet includes an
IP address
unique numeric address of the
destination host. This address is
referred to as an ________
__________ is the process of
compression
squeezing the data down so
that a lower capacity, cheaper
transmission facility can be
used to meet a given demand
The OSI protocol architecture
true
consists of 5 layers: physical,
network access, internet,
transport, and application
https://quizlet.com/344469319/cnt-4104-flash-cards/
6/26
22/06/2021
Procedures
CNT
4104needed to allow
CNT 4104 Flashcards | Quizlet
true
Study
data to transverse multiple
interconnected networks is
found in the internet layer of
the TCP/IP protocol
architecture
For most applications running
true
as part of the TCP/IP protocol
architecture, the transport layer
protocol is TCP
The software used at the
false
network access layer is not
dependent on the type of
network used because circuit
switching, packet switching and
local area networks all have
the same standards.
FTP provides a basic electronic
false. Simple Mail Transfer Protocol provides a basic
mail transport facility.
electronic mail transport facility
SSH is an application later
true
protocol in TCP/IP architecture
SSH protocol enables the user
true
and the remote authenticate
each other
https://quizlet.com/344469319/cnt-4104-flash-cards/
7/26
22/06/2021
The development
of IP
CNT
4104
CNT 4104 Flashcards | Quizlet
true
Study
(Internet Protocol) is used at
the internet layer to provide
the routing function across
multiple networks.
It is not necessary for each
false
host on a subnetwork to have
an unique global internet (i.e.,
IP) address.
TCP numbers the segments
true
that it sends to a particular
destination port sequentially.
TCP is a host-to-host protocol
true
TCP is an internet layer
false. TCP is in the transport layer
protocol
Wi-Fi is an application layer
false. Wifi is in the Network access/Data link layer
protocol.
HTTP is an internet later
false. HTTP is in the application layer
protocol
Because UDP is not a reliable
false. both TCP and UDP must contain source and
protocol, its header contains
destination port numbers of their host
no source and destination port
numbers
https://quizlet.com/344469319/cnt-4104-flash-cards/
8/26
22/06/2021
UDP is4104
more reliable than TCP
CNT
CNT 4104 Flashcards | Quizlet
false
Study
protocol
TCP header contains a
true
sequence number of the
contained segment but UDP
does not.
The key features of a protocol
timing
are: syntax, semantics and
________
The ________ layer is concerned
network access
with the exchange of data
between an end system and
the network to which it is
attached.
The header format for TCP is a
20
minimum of ___ octets
_______ provides a basic
SMTP
electronic mail transport
facility
The communication task can
transport
be organized into three
relatively independent layers:
network access layer,
application layer, and _____ layer
https://quizlet.com/344469319/cnt-4104-flash-cards/
9/26
22/06/2021
The full
form of UDP is ______
CNT
4104
CNT 4104 Flashcards | Quizlet
user datagram
Study
protocol
Transport layer PDU is called
packet
segment while network access
layer PDU is called ______
In data communication, an
8
octet contains ___ bits of data
Providing procedures to allow
internet
data to traverse multiple
interconnected networks is the
function of the _____ layer in
TCP/IP protocol architecture
In the TCP/IP protocol
physical
architecture, the ________ layer is
concerned with specifying the
characteristics of the
transmission medium, the
nature of the signals and the
data rate.
________ (SSH) protocol provides
secure shell
a secure remote logon
capability which enables a user
at a terminal or personal
computer to logon to a remote
computer function as if directly
connected to that computer.
https://quizlet.com/344469319/cnt-4104-flash-cards/
10/26
22/06/2021
Each application
on a
CNT
4104
CNT 4104 Flashcards | Quizlet
service access
Study
computer has an address that
is unique within that computer
known as ________ Points (SAPs)
or ports that allow the
transport layer to support
multiple applications at each
computer.
________ is when the sending TCP
checksum
includes a code that is a
function of the contents of the
remainder of the segment. The
receiving TCP performs the
same calculation and
compares the result with the
incoming code. A discrepancy
results if there has been some
error in transmission.
IPv4 includes 32 bits source
128
address field but IPv6 includes
Based on our textbook,
network access
Ethernet is a commonly used
protocol at ________ (or data link)
layer of the TCP/IP protocol
suite.
Sockets programming is a new
false
technology developed for
mobile communications
applications
https://quizlet.com/344469319/cnt-4104-flash-cards/
11/26
22/06/2021
A ___ socket
CNT
4104is one computer
CNT 4104 Flashcards | Quizlet
client/server
Study
uses an address to call a _____
socket on another computer
Computers with server sockets
false. computers with server sockets keep a TCP or
normally keep their TCP or
UDP port open. ready for incoming calls.
UDP port closed until incoming
calls are detected.
In socket programming, the
port/IP
concatenation of a TCP or UDP
______ value and an ______ address
forms a socket, which is unqiue
throughout the Internet
It is possible for an application
true
to have multiple socket
addresses
In practice, when socket
protocol/address
programming is used as an API,
a socket is identified by the
triple_____, local _____, local
process
In socket programming, ____
datagram
sockets make use of UDP
protocol
https://quizlet.com/344469319/cnt-4104-flash-cards/
12/26
22/06/2021
If all blocks
CNT
4104of data sent
CNT 4104 Flashcards | Quizlet
stream
Study
between a pair of sockets need
to be guaranteed for delivery
and arrive in the order that
they were sent, ______ sockets
must be considered
Which is not a core socket
recvfrom()
function for a stream socket?
The server side of a connection
accept()
must use ___________ socket core
function to remove one client
request from its queue.
The first step in using Sockets
In the core socket functions of
create a new socket
domain
language C, the socket()
command includes three
parameters. AF_UNIX, AF_INET,
and AF_INET6 are possible
values of the ____________
parameter.
Every computer, PC or server,
false
is allowed to have one and
only one IP address
Once an IP address is assigned
false
to a device, the IP address
never changes when the
device is placed in different
location
https://quizlet.com/344469319/cnt-4104-flash-cards/
13/26
22/06/2021
Every router
CNT
4104 has a MAC
CNT 4104 Flashcards | Quizlet
true
Study
address and, when a router is
moved from one room to the
other or from one building to
another building, its MAC
address never changes.
Every IP address is 32-bit long
false. IPv4 is 32 bits but IPv6 is 128 bits
because it is a standard.
ARP (Address Resolution) is a
false
protocol defined in the
application layer
ARP can translate or map an IP
true
address to a corresponding
MAC address
Every ICMP header consists of
true
64 bits of data no matter what
type of message it contains.
Because ICMP is a kind of or a
false. some ICMP messages dont need an IP
part of IP protocol in TCP/IP,
addresses
every ICMP message contains
the source host IP address and
destination host IP address.
https://quizlet.com/344469319/cnt-4104-flash-cards/
14/26
22/06/2021
Because
VPN (Virtual Private
CNT
4104
CNT 4104 Flashcards | Quizlet
false
Study
Network) involves the use of
public Internet technology, it
generally requires higher cost
and more complex
maintenance than
implementing and operating a
full private network.
Because IPsec is located in the
true
IP layer, when it is implemented
in a router, there is no need to
change applications software
on a user or server system.
We can use and implement
true
IPsec in a system to include
authentication-only function.
Encryption is not compulsory.
The IP address 216.85.40.100 is
true
a Class C address.
network using a standard Class
true
A network number (or ID) can
host more computers than
Class C.
Two networks with the same
false. every network must have a unique ID or
subnet mask means they have
number
the same network ID or
number.
https://quizlet.com/344469319/cnt-4104-flash-cards/
15/26
22/06/2021
SMTP 4104
standardizes the
CNT
CNT 4104 Flashcards | Quizlet
true
Study
message character set as 7-bit
ASCII.
The author MUA processes
false. The recipient MUA processes receive mail for
receive mail for storage and/or
storage and/or display to the recipient users
display to the recipient user.
POP3 is more complex than
false
IMAP
SMTP is limited to the
true
conversation that takes place
between the
Message Store (MS) and
Message user agent (MUA)
RFC 824 is the standard
true
protocol for transferring mail
between hosts in the TCP/IP
suite; it is defined in RFC 821
IMAP always keeps messages
true
on the server and replicates
copies to the clients.
Domains of URL are organized
false
in a network rather than
hierarchical structure.
DNS allows essentially
false. DNS allows essentially unlimited levels and
unlimited levels and uses the
uses the period as level delimiter in printed names
comma as the level delimiter in
printed names.
https://quizlet.com/344469319/cnt-4104-flash-cards/
16/26
22/06/2021
CNT 4104 Flashcards | Quizlet
Typically,
for fast transmission,
CNT
4104
false. single queries are carried over UDP and
single queries to find IP
queries for a grup pf names are carried over TCP
Study
address of a domain name are
carried over TCP and queries
for a group of names are
carried over UDP.
The _________ is responsible for
MDA
transferring the message from
the MHS to the MS.
The ________ relays mail for one
MTA
application-level hop.
The _______ is a directory lookup
DNS
service that provides a
mapping between the name of
a host on the Internet and its
numerical address.
The protocol that is used for
SMTP
transfer of mail from a user
agent to a MTA and from one
MTA to another is the _________ .
________ supplements SMTP and
MIME
allows the encapsulation of
multimedia (nontext) messages
inside of a standard SMTP
message.
https://quizlet.com/344469319/cnt-4104-flash-cards/
17/26
22/06/2021
CNT 4104 Flashcards | Quizlet
________ 4104
is an Internet standard
CNT
POP3
Study
defined in RFC 1939 that
supports the basic functions of
download and delete for email retrieval.
________ are programs that extract
Resolvers
information from name servers
in response to client requests.
_______ are server programs that
Name servers
hold information about a
portion of the domain name
tree structure and the
associated RRs.
The _______ domain is dedicated
biz
exclusively for private
businesses.
a transaction-oriented client/server protocol, a
HTTP is ___________ .
stateless protocol, and flexible in the formats it can
handle
A ________ is a server that appears
gateway
to the client as if it were an
origin server.
A _______ is a forwarding agent,
proxy
receiving a request for a URL
object
https://quizlet.com/344469319/cnt-4104-flash-cards/
18/26
22/06/2021
The ________
is the foundation
CNT
4104
CNT 4104 Flashcards | Quizlet
HTTP
Study
protocol of the World Wide
Web and can be used in any
client/server application
involving hypertext
Each name server is configured
zone
with a subset of the domain
name space, known as a ________
, which is a collection of one or
more subdomains within a
domain, along with the
associated RRs
Four elements comprise the
resolvers
DNS: domain name space,
DNS database, name servers,
and
The SMTP sender takes
25
messages from the outgoing
mail queue and transmits them
to the proper destination host
via SMTP transactions over one
or more TCP connections to
port ____ on the target hosts.
Three intermediate HTTP
tunnel
systems include proxy,
gateway, and ______.
https://quizlet.com/344469319/cnt-4104-flash-cards/
19/26
22/06/2021
_____ real-time
CNT
4104 applications have
CNT 4104 Flashcards | Quizlet
hard
Study
zero loss tolerate of the
communicated data.
In ________ real-time applications,
hard
a deterministic upper bound
on jitter and high reliability
takes precedence over
network utilization
considerations.
Delay jitter is the maximum
delay
variation in __________
experienced by packets in a
single real-time communication
session.
VoIP works by encoding ________
voice
information into a digital
format, which can be carried
across IP networks in discrete
packets
Whereas traditional telephone
circuit/packet
networks allocate dedicated
circuits for voice
communications using _____
switching, VoIP uses _____
switching, allowing the sharing
of transmission capacity
https://quizlet.com/344469319/cnt-4104-flash-cards/
20/26
22/06/2021
The __________,
CNT
4104 defined in RFC
CNT 4104 Flashcards | Quizlet
session initiation protocol
Study
3261, is an application level
control protocol for setting up,
modifying, and terminating
real-time sessions between
participants over an IP data
network
SIP supports five facets of
session setup
establishing and terminating
multimedia communications:
user capabilities, user
availability, ____________, session
management, and user
location.
The term softphone refers to
VoIP
software operating on a PC
that implements _______.
The __________ data transfer
RTP
protocol is used only for the
transmission of user data,
typically in multicast fashion
among all participants in a
session
The ___________ Protocol (SDP)
session description
describes the content of
sessions, including telephony,
Internet radio, and multimedia
applications.
https://quizlet.com/344469319/cnt-4104-flash-cards/
21/26
22/06/2021
The Payload
CNT
4104 Type field of a
CNT 4104 Flashcards | Quizlet
false. The Payload Type field of RTP header is 7Study
bits
RTP header is 1 bit long
The values in the RTCP Sender
false. Not only the receivers and network managers,
Report enable only the
but also the senders
receivers and network
managers to monitor the
condition on the network as
they relate to a particular
session.
Every RTP header always
false
contains a fixed number of
fields, which is 96 bits long.
The packet loss values in a
false. pack loss values are an indication of persistent
RTCP Sender Report give an
congestion
indication of transient
congestion.
RTCP receivers can only
false. RTCP receivers provide reception quality
provide reception quality
feedback using a Sender Report or a Receiver
feedback by using a Receiver
Report.
Report. Sender Reports are not
allowed for this purpose.
The performance metrics of
real-time
interest of traditional Internet
applications such as file
transfer and electronic mail are
generally throughput and
delay. By contrast, ______________
applications are more
concerned with timing issues
https://quizlet.com/344469319/cnt-4104-flash-cards/
22/26
22/06/2021
Assume,
in a single real-time
CNT
4104
CNT 4104 Flashcards | Quizlet
7.6
Study
communication session, the
minimum end-to-end delay
seen by any packet is 0.4 ms
and the maximum is 8 ms. Then,
the delay jitter should be ____
ms
In a real-time audio
false
communication connection, if
the delay jitter of a buffer is
already set to 6 ms, then any
incoming packets that has
experienced a relative of less
than this setting would have to
be discarded so as not to be
played back out of order.
Real-time applications are
true
more concerned with timing
issues than non-real-time
applications.
A VoIP system is usually more
false
expensive to operate than an
equivalent telephone system
with a PBX and conventional
telephone network service.
SIP can support only single
false. Multimedia is supported
media in teleconferencing.
Multimedia is currently not
supported.
https://quizlet.com/344469319/cnt-4104-flash-cards/
23/26
22/06/2021
A user4104
agent server (UAS)
CNT
CNT 4104 Flashcards | Quizlet
false. User agent client (UAC) issues SIP requestStudy
issues SIP requests.
The jitter measure may provide
true
a warning of increasing
congestion before it leads to
packet loss.
The RTP Timestamp is the
false. The NTP Timestamp is the absolute wall clock
absolute wall clock time when
time when the report was sent
this RTP header was sent.
The Payload Type field of a
true
RTP header identifies the
media type of the payload and
the format of the data,
including the use of
compression or encryption.
If an application-level firewall
false. If an application level firewall prevents the
prevents the forwarding of RTP
forwarding of RTP packets, translator relays should
packets, mixer relays should be
be used to solve this problem.
used to solve the problem.
A transport protocol can be
false. UDP is connectionless and TCP is connection
either connection oriented,
oriented
such as UDP, or
connectionless, such as TCP.
The receiver needs to adopt
true
some policy concerning the
amount of data it permits the
sender to transmit.
https://quizlet.com/344469319/cnt-4104-flash-cards/
24/26
22/06/2021
CNT 4104 Flashcards | Quizlet
There 4104
is no need for
CNT
false. There is a need because connection oriented
Study
connection establishment and
allows each end to assure that the other exists,
termination procedures to
allows exchange or negotiation of optional
support connection-oriented
parameters, triggers allocation of transport entity
service with a reliable network
resources
service.
When a TCP entity detects the
true
presence of congestion in the
Internet, it reduces the flow of
data onto the Internet until it
detects an easing in
congestion.
The SYN segment functions
true
both as a connection request
and as a connection
acknowledgment.
In a protocol architecture, the
false. Transport protocol sits above network layer
transport protocol sits above
and just below application and other upper=layer
application and other upper-
protocols
layer protocols, and just below
the network or internetwork
layer.
The less the network service
true
provides, the more the
transport protocol must do.
The sliding-window technique
true
would work well with a reliable
network service.
https://quizlet.com/344469319/cnt-4104-flash-cards/
25/26
22/06/2021
CNT 4104 Flashcards | Quizlet
An internetwork
using IP is an
CNT
4104
false. Internetworking using IP is an example ofStudy
example of a reliable network
unreliable network service
service.
A credit scheme is a more
true
effective scheme with an
unreliable network service.
https://quizlet.com/344469319/cnt-4104-flash-cards/
26/26
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
Computer Networking Ch.2.1(slides)
Terms in this set (60)
At the core of network application development is
programs communicate
writing _____________ that run on different systems and
_____________ with each other over the network
In a Web application there are _____________ distinct
programs that _____________ with each other: the
two communicate browser host
_____________ program running in the user's _____________
web web host
(desktop, laptop, tablet, smartphone, etc); and the
_____________ server program running in the _____________
server _____________.
In a _____________ file-sharing system there is a _____________
P2P program
in each host that participates in the file-sharing
community. The programs in the various hosts may
be similar or identical
When developing a network application, you need
multiple end systems
to write software that will run on _____________ _____________
_____________
When developing a network application, you do
network core
NOT need to write software that runs on _____________ _____________ devices, such as routers or link-layer
switches
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
1/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
network-core devices do not
run user applications
Even if you wanted to write application software for
network-core devices, you wouldn't be able to do
so. WHY?
The application _____________ , is designed by the
architecture developer
application _____________ and dictates how the
structured
application is _____________ over the various end
systems.
In choosing the application architecture, an
application developer will likely draw on one of the
client server peer to peer
two predominant architectural paradigms used in
modern network application: the _____________ _____________ architecture or the _____________ -_____________ _____________ architecture
In a _____________ -_____________ architecture, there is an
client server server clients
always-on host, called the _____________ , which services
requests from many other hosts, called _____________ .
A classic example of a client-server architecture is
web server
the _____________ _____________ for which an always-on Web
server services requests from browsers running on
client hosts.
When a web server receives a _____________ for an
request requested object
object from a client host, it responds by sending the
_____________ _____________ to the client host
Note that with the client-server architecture,
clients
_____________ do not directly communicate with each
other; for example, in the web application, two
browsers do not directly communicate
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
2/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
Another characteristic of the client-server
server fixed address address
architecture is that the _____________ has a _____________ ,
well-known _____________ , called an IP _____________ .
Because the server has a fixed, well-known address,
always on client server IP
and because the server is _____________ _____________ , a
_____________ can always contact the _____________ by
sending a packet to the server's_____________ address
Some of the better-known applications with a
web FTP email
client-server architecture include the _____________
,_____________ , and _____________
File Transfer Protocol
FTP
A single-server host is incapable of keeping up with
data center
all the requests from clients. For this reason , a
_____________ _____________ is used to create a powerful
virtual server.
server:
always on permanent data
_____________ -_____________ host
centers
_____________ IP address
_____________ _____________ for scaling
clients:
communicate with _____________
server intermittently dynamic
may be _____________ connected
communicate directly
may have _____________ IP addresses
do NOT _____________ _____________ with
each other
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
3/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
dedicated servers
In a P2P architecture, there is minimal(or no) reliance
on _____________ _____________ in data centers
P2P applications exploit _____________ communication
direct intermittently peers
between pairs of _____________ connected hosts, called
_____________
the peers in a P2P network are not owned by the
users
service provider, but are instead desktops and
laptops controlled by _____________ , with most of the
peers residing in homes, universities, and offices.
Because the peers communicate without passing
dedicated server
through a _____________ _____________ , the architecture is
called peer-to-peer
self scalability
One of the most compelling features of P2P
architectures is their _____________ -_____________
in a P2P file-sharing application, although each peer
service capacity
generates workload by requesting files, each peer
also adds _____________ _____________ to the system by
distributing files to other peers
P2P are also _____________ ____________, since they don't
cost effective infrastructure
require significant server _____________ and server
bandwidth( in contrast with clients-server designs
with datacenters
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
4/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
P2P major challenge 1: _____________ _____________ :
residential ISPs have higher bandwidth for
downstream than upstream traffic. But P2P video
ISP friendly
streaming and file distribution applications shift
upstream traffic from servers to residential ISPs,
thereby putting significant stress on the ISPs.
P2P major challenge 2: _____________ : because of their
security
highly distributed and open nature, P2P applications
can be a challenge to secure
P2P major challenge 3: _____________ : P2P applications
also depend on convincing users to volunteer
incentives incentive
bandwidth, storage, and computational resources
to the applications, which is the challenge of
_____________ design
P2P architecture:
NO _____________ -_____________ server
arbitrary end systems _____________
communicate
always on directly self
scalability directly IP addresses
_____________ _____________ -new peers
bring new service
capacity, as well as new
service demands
peers are _____________ connected and
change _____________ ___________
--complex management
hybrid
Some applications have _____________ architectures,
combining both client-server and P2P elements
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
5/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
Hybrid example: many instant messaging
applications use servers to track the _____________
IP addresses
_____________ of users, but user-to-user messages are
sent directly between user hosts without passing
through intermediate servers.
processes
process end system
It is not actually programs, but _____________ that
communicate
A _____________ can be though of as a program running
within an _____________ _____________
When processes are running on the same end
interprocess communication
system, they can communicate with each other with
operating system
_____________ _____________ , using rules that are governed
by the end system's _____________ _____________
processes on two different end systems
computer network
communicate with each other by exchanging
messages across the _____________ _____________
sending process
receiving proces
a _____________ _____________ creates and sends messages
into the network
a _____________ _____________ receives these messages and
possibly responds by sending messages back
a _____________ application consists of _____________ of
network pairs
processes that send messages to each other over a
network.
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
6/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
communicating processes
client server
client server
for each pair of _____________ _____________ , we typically
label one of the two processes as the _____________ and
the other process as the _____________ .
with the web, a browser is a _____________ process and a
web server is a _____________ process
with P2P file sharing, the peer that is downloading
client server
the file is labeled as the _____________ , and the peer
that is uploading the file is labeled as the _____________
in the context of a communication session between
a pair of processes, the process that initiates the
client server
communication is labeled as the _____________ . the
process that waits to be contacted to begin the
session is the _____________
process: program running within a __________
within same host, two processes
communicate using
_____________- _____________ _____________
host inter process
processes in different hosts
communication messages
communicate by exchanging
client server
_____________
_____________ process: process that initiates
communication
_____________ process: process that waits to
be contacted
underlying network
any message sent from one process to another
must go through the _____________ _____________
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
7/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
a _____________ sends messages into and receives
process socket
messages from, the network through a software
interface called a _____________
house door
a process is analogous to a _____________ and its socket
analogous to its _____________
the sending process assumes that there is a
transportation infrastructure
_____________ _____________ on the other side of the door
that will transport the message to the door of the
destination process
application transport
Application Programming
Interface
a socket is the interface between the _____________ layer
and the _____________ layer within the host
a socket is also referred to as the _____________
_____________ _____________ (API) between the application
and the network
the application developer has control of everything
on the application-layer side but can only control
the following on the transport-layer:
transport protocol buffer
1. the choice of _____________ _____________ and
2. perhaps the ability to fix a few transport-layer
parameters such as maximum _____________ and
maximum segment sizes
In order for a process running on one host to send
receiving process
packets to a process running on another host, the
_____________ _____________ needs to have an address
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
8/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
to identify the receiving process, two pieces of
information need to be specified:
address identifier
1. the _____________ of the host and
2. an _____________ that specifies the receiving process
in the destination host
IP address
host
with the internet, the host is identified by its
_____________ _____________
An IP address is a 32-bit quantity that we can think
of as uniquely identifying the _____________
in addition to knowing the address of the host to
which a message is destined, the sending process
receiving process
must also identify the _____________ _____________ (more
specifically, the receiving socket) running in the
host
in addition to knowing the address of the host to
which a message is destined, the sending process
must also identify the receiving process (more
port number
specifically, the receiving socket) running in the
host
a destination _____________ _____________ serves this
purpose
popular applications have been assigned specific
_____________ number. for example a web server is
port 80 25
identified by port number _____________ . a mail
server(using the SMTP protocol) is identified by the
port number _____________
Computer Networking Ch.2.1(slides)
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
9/10
22/06/2021
Computer Networking Ch.2.1(slides) Flashcards | Quizlet
identifier
to receive messages, process must have _____________
IP address
host device has unique 32-bit _____________ _____________
https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/
10/10
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Computer Science Flash cards
Study
Computer Science Flash cards
Terms in this set (26)
What is the difference between
a host and an end system? List
the types of end systems. Is a
web server an End system?
What is a client program? What
is a server program? Does a
server program request and
receive services from a client
program?
https://quizlet.com/255661203/computer-science-flash-cards/
There is no difference. Throughout this text, the
words "host" and "end system" are used
interchangeably. End systems include PCs,
PCs
workstations, Web servers, mail servers, Internetconnected PDAs, WebTVs, etc.
A networking program usually has two programs,
each running on a different host, communicating
with each other. The program that initiates the
communication is the client. Typically, the client
program requests and receives services from the
server program.
1/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Study
Computer Science Flash cards 1. Dial-up modem over telephone line: residential;
2. DSL over telephone line:
1. residential or small office;
List 6 access technologies.
Classify each one a residential
access, company access, or
mobile access.
2. Cable to HFC: residential;
3. 100 Mbps switched
4. Ethernet: company;
5. Wireless LAN: mobile;
6. Cellular mobile access (for example, WAP):
mobile
Is HFC transmission rate
HFC bandwidth is shared among the users. On the
dedicated or shared among
downstream channel, all packets emanate from a
users? Are collisions possible
single source, namely, the head end. Thus, there are
in a downstream HFC channel?
no collisions in the downstream channel.
Why?
List the available residential
access technologies in your
city. For each type of access
provide the advertised
downstream rate, upstream
rate and monthly price.
https://quizlet.com/255661203/computer-science-flash-cards/
1. dial-up;
2. DSL;
3. cable modem;
4. fiber-to-the-home.
2/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Study
Computer Science Flash cards Ethernet LANs have transmission rates of 10 Mbps,
What is the transmission rate of
Ethernet LANs? For a given
transmission rate can each user
on the LAN continuously
100 Mbps, 1 Gbps and 10 Gbps. For an X Mbps
Ethernet (where X = 10, 100, 1,000 or 10,000), a user
can continuously transmit at the rate X Mbps if that
user is the only person sending data. If there are
transmit at that rate?
more than one active user, then each user cannot
What are some of the physical
Ethernet most commonly runs over twisted-pair
media and Ethernet can run
copper wire and "thin" coaxial cable. It also can run
over?
over fibers optic links and thick coaxial cable.
Dial-up modems, HFC, DSL,
Dial up modems: up to 56 Kbps, bandwidth is
and FTTH are all user for
dedicated; ISDN: up to 128 kbps, bandwidth is
redisential access. For each of
dedicated; ADSL: downstream channel is .5-8 Mbps,
these access technologies,
upstream channel is up to 1 Mbps, bandwidth is
provide a range of transmission
dedicated; HFC, downstream channel is 10-30 Mbps
rate and comment on whether
and upstream channel is usually less than a few
the transmission rate is shared
Mbps, bandwidth is shared. FTTH: 2-10Mbps upload;
or dedicated.
10-20 Mbps download; bandwidth is not shared
https://quizlet.com/255661203/computer-science-flash-cards/
continuously transmit at X Mbps
3/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Study
Computer Science Flash cards There are two most popular wireless Internet access
technologies today:
a) Wireless LAN: In a wireless LAN, wireless users
transmit/receive packets to/from a base station
(wireless access point) within a radius of few tens of
meters. The base station is typically connected to
Describe the most popular
the wired Internet and thus serves to connect
wireless Internet access
wireless users to the wired network.
technologies today. Compare
and contrast them.
b) Wide-area wireless access network: In these
systems, packets are transmitted over the same
wireless infrastructure used for cellular telephony,
with the base station thus being managed by a
telecommunications provider. This provides wireless
access to users within a radius of tens of kilometers
of the base station.
What advantage does a circuit-
A circuit-switched network can guarantee a certain
switched network have over a
amount of end-to-end bandwidth for the duration
packet-switched network?
of a call. Most packet-switched networks today
What advantages does TDM
(including the Internet) cannot make any end-to-
have over FDM in a circuit-
end guarantees for bandwidth.
switched network?
What is it said that packet
In a packet switched network, the packets from
switching employs statistical
different sources flowing on a link do not follow any
multiplexing? Contrast
fixed, pre-defined pattern. In TDM circuit switching,
statistical multiplexing with the
each host gets the same slot in a revolving TDM
multiplexing that takes places
frame.
in TDM.
https://quizlet.com/255661203/computer-science-flash-cards/
4/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Suppose there
is exactlyFlash
one cards At time t0 the sending host begins to transmit. At
Study
Computer
Science
packet switch between a
time t1 = L/R1, the sending host completes
sending host and a receiving
transmission and the entire packet is received at the
host. The transmission rate
router (no propagation delay). Because the router
between the sending host and
has the entire packet at time t1, it can begin to
the switch and between the
transmit the packet to the receiving host at time t1.
switch and the receiving host
At time t2 = t1 + L/R2, the router completes
are R1 and R2, respectively.
transmission and the entire packet is received at the
Assuming that the switch uses
receiving host (again, no propagation delay). Thus,
store-and-forward packet
the end-to-end delay is L/R1 + L/R2.
switching, what is the end-toend delay to send a Packet of
length L?
What is the key distinguishing
A tier-1 ISP connects to all other tier-1 ISPs; a tier-2
difference between a tier-1 ISP
ISP connects to only a few of the tier-1 ISPs. Also, a
and a tier-2 ISP?
tier-2 ISP is a customer of one or more tier-1.
https://quizlet.com/255661203/computer-science-flash-cards/
5/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Study
Computer Science Flash cards a.Whe na cirvuit switching is used, how many users
can be supported?
2 users can be supported because each user
requires half of the link bandwidth
b.For the remainer of this problem suppose packet
switching is used. Wher will there be essentially no
queuing delay before the link if two or fewer users
transmit at the same time? What will there be a
queuing delay if three users transmit at the same
time?
Since each user requires 1Mbps when transmitting, if
two or fewer users transmit simultaneously, a
maximum of 2Mbps will be required. Since the
available bandwidth of the shared link is 2Mbps,
Suppose users share a 2 Mbps
link. Also suppose each user
transmits continuosly at 1 Mbps
when transmitting, but each
user transmits only 20 percent
of the time.
there will be no queuing delay before the link.
Whereas, if three users transmit simultaneously, the
bandwidth required will be 3Mbps which is more
than the available bandwidth of the shared link. In
this case, there will be queuing delay before the
link.
c. Find the probability that a given user is
transmitting
Probability that a given user is transmitting = 0.2
d. Suppose now there are three users. Find the
probability that at any given time, all three users are
transmitting simultaneously. Find the fraction of time
during which the queue grows.
Probability that all three users are transmitting
simultaneously = (3/3)p^3(1-p)^(3-3) = (0.2)^3 =
0.008. Since the queue grows when all the users are
https://quizlet.com/255661203/computer-science-flash-cards/
6/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
transmitting, the fraction of time during which the
Study
Computer Science Flash cards queue grows (which is equal to the probability that
all three users are transmitting simultaneously) is
0.008.
R16. Consider sending a packet
The delay components are processing delays,
from a source host to a
transmission delays, propagation delays, and
destination host over a fixed
queuing delays. All of these delays are fixed, except
route. List the delay
for the queuing delays, which are variable.
components in the end-to-end
delay. Which of these delays
are constant and which are
variable?
R17. Visit the Transmission
Java Applet
Versus Propagation Delay
applet at the companion Web
site. Among the rates,
propagation delay, and packet
sizes available, finds a
combination for which the
sender finishes transmitting
before the first bit of the
packet reaches the receiver.
Find another combination for
which the first bit of the packet
reaches the receiver before the
sender finishes transmitting.
https://quizlet.com/255661203/computer-science-flash-cards/
7/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
R18. How longScience
does it take
a
Computer
Flash
cards 10msec; d/s; no; no
Study
packet of length 1,000 bytes to
propagate over a link of
distance 2,500 km,
propagation speed 2.5 · 108
m/s, and transmission rate 2
Mbps? More generally, how
long does it take a packet of
length L to propagate over a
link of distance d, propagation
speed s, and transmission rate
R bps? Does this delay depend
on packet length? Does this
delay depend on transmission
rate?
https://quizlet.com/255661203/computer-science-flash-cards/
8/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
R19. Suppose Science
Host A wants
to cards a. 500 kbps
Computer
Flash
Study
send a large file to Host B. The
path from Host A to Host B has
b. 64 seconds
three links, of rates R1 = 500
kbps, R2 = 2 Mbps, and R3 = 1
c. 100 kbps; 320 seconds
Mbps.
a. Assuming no other traffic in
the network, what is the
throughput for the file transfer.
a. Suppose the file is 4 million
bytes. Dividing the file size by
the through put, roughly how
long will it take to transfer the
file to Host B?
a. Repeat (a) and (b), but now
with R2 reduced to 100 kbps.
https://quizlet.com/255661203/computer-science-flash-cards/
9/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Suppose end Science
system A wants
Study
Computer
Flash cards End system A breaks the large file into chunks. To
to send a large file to end
each chunk, it adds header generating multiple
system B. At a very high level,
packets from the file. The header in each packet
describe how end system A
includes the address of the destination: end system
creates packets from the file.
B. The packet switch uses the destination address to
When one of these packets
determine the outgoing link. Asking which road to
arrives to a packet switch, what
take is analogous to a packet asking which outgoing
information in the packet does
link it should be forwarded on, given the packet's
the switch use to determine the
address.
link onto which the packet is
forwarded? Why is packet
switching in the Internet
analogous to driving from one
city to another and asking
directions along the way?
R22. List five tasks that a layer
Five generic tasks are error control, flow control,
can perform. Is it possible that
segmentation and reassembly, multiplexing, and
one (or more) of these tasks
connection setup. Yes, these tasks can be
could be performed by two (or
duplicated at different layers. For example, error
more) layers?
control is often provided at more than one layer.
R23. What are the five layers in
The five layers in the Internet protocol stack are -
the Internet protocol stack?
from top to bottom - the application layer, the
What are the principal
transport layer, the network layer, the link layer, and
responsibilities of each of
the physical layer. The principal responsibilities are
these layers?
outlined in Section 1.5.1.
https://quizlet.com/255661203/computer-science-flash-cards/
10/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Computer Science Flash cards Application-layer message: data which an
Study
application wants to send and passed onto the
R24. What is an application-
transport layer; transport-layer segment: generated
layer message? A transport-
by the transport layer and encapsulates application-
layer segment? A network-
layer message with transport layer header; network-
layer datagram? A link-layer
layer datagram: encapsulates transport-layer
frame?
segment with a network-layer header; linklayer
frame: encapsulates network layer datagram with a
link-layer header.
R25. Which layers in the
Routers process layers 1 through 3. (This is a little bit
Internet protocol stack does a
of a white lie, as modern routers sometimes act as
router process? Which layers
firewalls or caching components, and process layer
does a link-layer switch
four as well.) Link layer switches process layers 1
process? Which layers does a
through 2. Hosts process all five layers.
host process?
a) Virus: Requires some form of human interaction
to spread. Classic example: E-mail viruses.
R26. What is the difference
b) Worms: No user replication needed. Worm in
between a virus, a worm, and a
infected host scans IP addresses and port numbers,
Trojan horse?
looking for vulnerable processes to infect.
c) Trojan horse: Hidden, devious part of some
otherwise useful software
https://quizlet.com/255661203/computer-science-flash-cards/
11/12
22/06/2021
Computer Science Flash cards Flashcards | Quizlet
Computer Science Flash cards Creation of a botnet requires an attacker to findStudy
vulnerability in some application or system (e.g.
exploiting the buffer overflow vulnerability that
might exist in an application). After finding the
vulnerability, the attacker needs to scan for hosts
that are vulnerable. The target is basically to
compromise a series of systems by exploiting that
particular vulnerability. Any system that is part of the
R27. Describe how a botnet
can be created, and how it can
be used for a DDoS attack.
botnet can automatically scan its environment and
propagate by exploiting the vulnerability. An
important property of such botnets is that the
originator of the botnet can remotely control and
issue commands to all the nodes in the botnet.
Hence, it becomes possible for the attacker to issue
a command to all the nodes, that target a single
node (for example, all nodes in the botnet might be
commanded by the attacker to send a TCP SYN
message to the target, which might result in a TCP
SYN flood attack at the target).
R28. Suppose Alice and Bob
Trudy can pretend to be Bob to Alice (and vice-
are sending packets to each
versa) and partially or completely modify the
other over a computer
message(s) being sent from Bob to Alice. For
network. Suppose Trudy
example, she can easily change the phrase "Alice, I
positions herself in the network
owe you $1000" to "Alice, I owe you $10,000".
so that she can capture all the
Furthermore, Trudy can even drop the packets that
packets sent by Alice and send
are being sent by Bob to Alice (and vise-versa),
whatever she wants to Bob;
even if the packets from Bob to Alice are encrypted.
she can also capture all the
packets sent by Bob and send
whatever she wants to Alice.
List some of the malicious
things Trudy can do from this
position.
https://quizlet.com/255661203/computer-science-flash-cards/
12/12
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Chapter 4: Network Layer
Study
Chapter 4: Network Layer
Terms in this set (39)
What is the name of a network-
Datagram
layer packet?
Router and link-layer switches
Packet switches
are referred to as _______.
What is the difference between
a router and link-layer switch?
A router forwards a packet based on its IP address;
a link-layer switch forwards a packet based on its
MAC address.
Application(7)
Presentation(6)
Name the 7 layers of the OSI
model from top to bottom.
Session(5)
Transport(4)
Network(3)
Data Link(2)
Physical(1)
-Enables user to access the network
Function of the Application
-Provides user interfaces and support for services
Layer
(e.g. the Web, email)
-SMTP: Simple Mail Transfer Protocol
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
1/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
-Formats data so it can be viewed by user
Study
-Encrypt and decrypt
Function of the Presentation
Layer
-JPG: compressed image
-GIF(graphics interchange format): combined
images/frames into single image/animation
-HTTP(Hyper Text Transfer Protocol Secure): secures
messages in code
Function of the Session Layer
-Establishes end connections between two hosts
-Responsible for the transport protocol and error
handling
-End-to-end communication over a network
provides logical communication
Function of the Transport Layer
-Uses TCP and UDP protocol
-TCP: connection oriented, reliable transfer
protocol, segment sequencing, flow control
-UDP: lightweight protocol, unreliable,
connectionless, no sequencing
Function of the Network Layer
Function of the Data Link Layer
Function of the Physical Layer
Data Plane
-Reads IP address from packet
-Routers layer 3 switches
-Reads MAC address from data packet
-Switches
-Sends data onto physical wire
-Hubs, NICS, Cable
Function: packet forwarding, forwarding datagrams
from their input links to their output link
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
2/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
Function: routing, which is to determine the paths
a
Study
packet takes from its source to its destination
Control Plane
-executing router protocols
-responding to up and down attached links
-communicating with remote controllers
-performing management functions
a router's local action of transferring packets from
Difference between Routing
and Forwarding
its input interfaces to its output interfaces, and
forwarding takes place at very short timescales
(typically a few nanoseconds), and thus is typically
implemented in hardware
hold entries to determine the outgoing link
interface to which an arriving packet will be
forwarded via switching fabric
(A router forwards a packet by examining the value
Role of Forwarding Table
of one or more fields in the arriving packet's header,
within Router
and then using these header values to index into its
forwarding table. The value stored in the forwarding
table entry for those values indicates the outgoing
link interface at that router to which that packet is to
be forwarded)
What is the service model of
The service model of the Internet's network layer is
the Internet's network layer?
best-effort service. With this service model, there is
What guarantees are made by
no guarantee that packets will be received in the
the Internet's service model
order in which they were sent, no guarantee of their
regarding the host-to-host
eventual delivery, no guarantee on the end-to-end
delivery of datagrams?
delay, and no minimal bandwidth guarantee.
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
3/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
Input ports: performs several functions
Study
physical layer: terminating incoming physical link to
router
data link layer: performs lookup and forwarding
function, so that data forwarded into switch fabric
of router emerges at correct output port
What is "inside" of your router?
Outport ports: stores datagram that have been
forwarded to it through the switching fabric, and
then transmits the datagrams on the outgoing link.
The output port thus performs the reverse data link
and physical layer functionality as the input port
Routing Processor: executes routing protocols,
maintains routing tables, performs network
management functions within router
Role of Switching Fabric
Describe the three switching
methods
connects the router's input ports to its output ports
Switching via a bus
Switching via memory
Switching via an interconnection network
input port transfers a packet directly to the output
port over a shared bus, without intervention by the
Switching via a bus
routing processor; all output ports receive the
packet but only the correct one will keep it; only
one packet can cross the bus at a time
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
4/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Chapter 4: Network Layer
oldest form of switching; two packets cannot be
Study
forwarded at the same time because only one
memory read/write can be done at a time over the
Switching via memory
shared system bus; lookup of the destination
address and the storing of the packet into the
appropriate memory location are performed by
processing on the input line cards
overcome bandwidth restrictions; crossbar switch is
an interconnection network consisting of 2N buses
that connect N input ports to N output ports. Each
vertical bus intersects each horizontal bus at an
Switching via an
intersection, which can be opened or closed at any
interconnection network
time by the switch fabric controller; non-blocking: a
packet being forwarded will not be blocked as long
as no other packet is being forwarded to the same
port; capable of forwarding multiple packets in
parallel
Destination-based forwarding means that a
datagram arriving at a router will be forwarded to
an output interface based on only the final
Difference between
destination of the datagram.
Destination-based forwarding
and Generalized forwarding
Generalized-forwarding means that besides its final
destination, other factors associated with a
datagram is also considered when a router
determines the output interface for the datagram
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
5/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Suppose that
arriving Layer
Chapter
4: an
Network
A router uses longest prefix matching to determine
Study
packet matches two or more
which link interface a packet will be forwarded to if
entries in a router's forwarding
the packet's destination address matches two or
table. With traditional
more entries in the forwarding table
destination-based forwarding,
what rule does a router apply
to determine which of these
rules should be applied to
determine the output port to
which the arriving packet
should be switched?
Which, if any, can send multiple
An interconnection network is able to send multiple
packets across the fabric in
packets
parallel? (name the type of
switching method)
If the rate at which packets arrive to the fabric
exceeds switching fabric rate, then packets will
Describe how packet loss can
need to queue at the input ports. If this rate
occur at input ports. Describe
mismatch persists, the queues will get larger and
how packet loss at input ports
larger and eventually overflow the input port
can be eliminated (without
buffers, causing packet loss. Packet loss can be
using infinite buffers).
eliminated if the switching fabric speed is at least
ntimes as fast as the input line speed, where nis the
number of input ports.
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
6/10
22/06/2021
Chapter 4: Network Layer
Describe how packet loss can
occur at output ports. Can this
loss be prevented by
increasing the switch fabric
speed?
Chapter 4: Network Layer Flashcards | Quizlet
Assuming input and output line speeds are the Study
same, packet loss can still occur if the rate at which
packets arrive to a single output port exceeds the
line speed. If this rate mismatch persists, the queues
will get larger and larger and eventually overflow
the output port buffers, causing packet loss. Note
that increasing switch fabric speed cannot prevent
this problem from occurring.
HOL blocking: Sometimes a packet that is first in line
at an input port queue must wait because there is
What is HOL blocking? Does it
occur in input ports or output
ports?
no available buffer space at the output port to
which it wants to be forwarded. When this occurs,
all the packets behind the first packet are blocked,
even if their output queues have room to
accommodate them. HOL blocking occurs at the
input port.
Disciplines: FIFO, Priority,
FIFO can ensure that all packets depart in the order
Round Robin (RR), and
in which they arrived.
Weighted Fair Queueing (WFQ)
packet scheduling disciplines?
Which of these queueing
disciplines ensure that all
packets depart in the order in
which they arrived
Give an example showing why
For example, a packet carrying network
a network operator might want
management information should receive priority
one class of packets to be
over regular user traffic. Another example, a real-
given priority over another
time voice-over-IP packet might need to receive
class of packets.
priority over non-real-time traffic such as e-email.
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
7/10
22/06/2021
Chapter 4: Network Layer Flashcards | Quizlet
Suppose Host
A sends Host
B
Chapter
4: Network
Layer
The 8-bit protocol field in the IP datagram contains
Study
a TCP segment encapsulated in
information about which transport layer protocol
an IP datagram. When Host B
the destination host should pass the segment to.
receives the datagram, how
does the network layer in Host
B know it should pass the
segment (that is, the payload
of the datagram) to TCP rather
than to UDP or to some other
upper-layer protocol?
What field in the IP header can
Time-to-live
be used to ensure that a packet
is forwarded through no more
than N routers?
Do routers have IP addresses?
Yes. They have one address for each interface.
If so, how many?
A private network address of a device in a network
What is a private network
refers to a network address that is only meaningful
address? Should a datagram
to those devices within that network. A datagram
with a private network address
with a private network address should never be
ever be present in the larger
present in the larger public Internet, because the
public Internet? Explain.
private network address is potentially used by many
network devices within their own private networks.
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
8/10
22/06/2021
Chapter 4: Network Layer
Chapter 4: Network Layer Flashcards | Quizlet
IPv6 has a fixed length header, which does not Study
include most of the options an IPv4 header can
include. Even though the IPv6 header contains two
Compare and contrast the IPv4
and the IPv6 header fields. Do
they have any fields in
common?
128 bit addresses (source and destination IP
address) the whole header has a fixed length of 40
bytes only. Several of the fields are similar in spirit.
Traffic class, payload length, next header and hop
limit in IPv6 are respectively similar to type of
service, datagram length, upper-layer protocol and
time to live in IPv4.
Forwarding has two main operations: match and
action. With destination-based forwarding, the
match operation of a router looks up only the
destination IP address of the to-be-forwarded
datagram, and the action operation of the router
involves sending the packet into the switching fabric
to a specified output port. With generalized
How does generalized
forwarding, the match can be made over multiple
forwarding differ from
header fields associated with different protocols at
destination-based forwarding?
different layers in the protocol stack, and the action
can include forwarding the packet to one or more
output ports, load-balancing packets across
multiple outgoing interfaces, rewriting header
values (as in NAT), purposefully blocking/dropping
a packet (as in a firewall), sending a packet to a
special server for further processing and action, and
more.
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
9/10
22/06/2021
Chapter 4: Network Layer
Chapter 4: Network Layer Flashcards | Quizlet
Each entry in the forwarding table of a destinationStudy
based forwarding contains only an IP header field
value and the outgoing link interface to which a
What is the difference between
packet (that matches the IP header field value) is to
a forwarding table that we
be forwarded. Each entry of the flow table in
encountered in destination-
OpenFlow includes a set of header field values to
based forwarding?
which an incoming packet will be matched, a set of
counters that are updated as packets are matched
to flow table entries, and a set of actions to be
taken when a packet matches a flow table entry.
"Match plus action" means that a router or a switch
tries to find a match between some of the header
values of a packet with some entry in a flow table,
What is meant by the "match
and then based on that match, the router decides to
plus action" operation of a
which interface(s) the packet will be forwarded and
router or switch? In the case of
even some more operations on the packet. In the
destination-based forwarding
case of destination-based forwarding packet switch,
packet switch, what is matched
a router only tries to find a match between a flow
and what is the action taken? In
table entry with the destination IP address of an
the case of an SDN, name
arriving packet, and the action is to decide to which
three fields that can be
interface(s) the packet will be forwarded. In the
matched, and three actions that
case of an SDN, there are many fields can be
can be taken.
matched, for example, IP source address, TCP
source port, and source MAC address; there are
also many actions can be taken, for example,
forwarding, dropping, and modifying a field value.
Name three header fields in an
Three example header fields in an IP datagram that
IP datagram that can be
can be matched in OpenFlow 1.0 generalized
"matched" in OpenFlow 1.0
forwarding are IP source address, TCP source port,
generalized forwarding. What
and source MAC address. Three fields that cannot
are three IP datagram header
be matched are: TTL field, datagram length field,
fields that cannot be "matched"
header checksum (which depends on TTL field).
in OpenFlow?
https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/
10/10
22/06/2021
HTTP Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
HTTP
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP”.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________
a) 4
b) 1
c) 5
d) 7
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
advertisement
2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
https://www.sanfoundry.com/computer-networks-mcqs-http/
1/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
View Answer
Answer: a
Explanation: By default the http connection is issued with persistent connection. In persistent
connection server leaves connection open after sending response. As little as one RTT (Time for a
small packet to travel from client to server and back) is required for all referenced objects.
3. The time taken by a packet to travel from client to server and then back to the client is called
__________
a) STT
b) RTT
c) PTT
d) JTT
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
advertisement
4. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
https://www.sanfoundry.com/computer-networks-mcqs-http/
2/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
d) Fourth
View Answer
Answer: c
Explanation: In first step client sends a segment to establish a connection with the server. In the
second the step the client waits for the acknowledgement to be received from the server. After
receiving the acknowledgement, the client sends actual data in the third step.
5. In the process of fetching a web page from a server the HTTP request/response takes __________
RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: By default the http connection will be persistent connection. Hence it will take only 1
RTT to fetch a webpage from a server.
advertisement
6. The first line of HTTP request message is called ____________
_____________
a) Request line
b) Header line
c) Status line
https://www.sanfoundry.com/computer-networks-mcqs-http/
3/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
d) Entity line
View Answer
Answer: a
Explanation: The line followed by request line are called header lines and status line is the initial
part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
advertisement
8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT
View Answer
https://www.sanfoundry.com/computer-networks-mcqs-http/
4/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
Answer: c
Explanation: There are two methods which help to request a response from a server. Those are
GET and POST. In GET method, the client requests data from server. In POST method the client
submits data to be processed to the server.
9. The HTTP response message leaves out the requested object when ____________ method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: HEAD method is much faster than GET method. In HEAD method much smaller
amount of data is transferred. The HEAD method asks only for information about a document
and not for the document itself.
advertisement
10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
View Answer
https://www.sanfoundry.com/computer-networks-mcqs-http/
5/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
Answer: d
Explanation: 404 Not Found.
11. Which of the following is not correct?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
View Answer
Answer: a
Explanation: Web cache or also known as HTTP cache is a temporary storage where HTML pages
and images are stored temporarily so that server lag could be reduced.
12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
View Answer
Answer: c
Explanation: The HTTP protocol requests the server of the website its trying to access so that it
can store its files, images etc. in cache memory. This request of asking the server for a document
considering a specific parameter is called conditional GET Request.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: Status line is the the start line of an HTTP response. It contains the information such
as the protocol version, a status text, status code.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
https://www.sanfoundry.com/computer-networks-mcqs-http/
6/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
`
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Application Layer – 2
» Next - Computer Networks Questions & Answers – HTTP & FTP
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
C# Programming Examples on Threads
Bachelor of Computer Applications Questions and Answers
Java MCQ (Multiple Choice Questions)
Network Theory MCQ (Multiple Choice Questions)
HTML MCQ (Multiple Choice Questions)
JUnit MCQ (Multiple Choice Questions)
Java Programming Examples on Utility Classes
MySQL MCQ (Multiple Choice Questions)
Computer Graphics MCQ (Multiple Choice Questions)
Computer Science Questions and Answers
Java Programming Examples on Multithreading
Master of Computer Applications Questions and Answers
Computer Organization and Architecture MCQ (Multiple Choice Questions)
JavaScript MCQ (Multiple Choice Questions)
SAN MCQ (Multiple Choice Questions)
C# Programming Examples on Networking
https://www.sanfoundry.com/computer-networks-mcqs-http/
7/9
22/06/2021
17.
18.
19.
20.
HTTP Questions & Answers - Sanfoundry
Neural Networks MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
Computer Fundamentals MCQ (Multiple Choice Questions)
Computer Networks MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is
Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect
and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux
Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage,
Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage
Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn |
Youtube | Instagram | Facebook | Twitter
Subscribe Sanfoundry Newsletter and Posts
Name*
Email*
Subscribe
https://www.sanfoundry.com/computer-networks-mcqs-http/
8/9
22/06/2021
HTTP Questions & Answers - Sanfoundry
About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact






© 2011-2021 Sanfoundry. All Rights Reserved.
https://www.sanfoundry.com/computer-networks-mcqs-http/
9/9
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Internet
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) interconnection of wide area networks
View Answer
Answer: b
Explanation: Internet is nothing but an interconnected computer network providing a variety of
communication facilities, consisting of a huge amount of small networks using standardized
communication protocols.
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
1/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
2. To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
c) internet service provider
d) different computer
View Answer
Answer: c
Explanation: The ISPs (Internet Service Providers) are the main agents through which every
computer is connected to the internet. They are licensed to allot public IP addresses to its
customers in order to connect them to the internet.
3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
View Answer
Answer: b
Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing telephone
lines to transport high-bandwidth data to service subscribers. DSL was used to allow the early
users access to the internet and it provides dedicated, point-to-point, public network access.
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
2/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
4. ISP exchanges internet traffic between their networks by __________
a) internet exchange point
b) subscriber end point
c) isp end point
d) internet end point
View Answer
Answer: a
Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange
Points. ISPs and CDNs are connected to each other at these physical locations are they help them
provide better service to their customers.
5. Which of the following protocols is used in the internet?
a) HTTP
b) DHCP
c) DNS
d) DNS, HTTP and DNS
View Answer
Answer: d
Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to
allot IPs automatically to the users on the internet, and DNS is used to connect the users to the
host servers on the internet based on the Domain Name.
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
3/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
6. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answer: c
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are
possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative
in case IPv4 runs out of possible new addresses.
7. Internet works on _______
a) packet switching
b) circuit switching
c) both packet switching and circuit switching
d) data switching
View Answer
Answer: a
Explanation: Packet switching is the method based on which the internet works. Packet switching
features delivery of packets of data between devices over a shared network.
advertisement
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
4/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
b) internet relay chat
c) resource reservation protocol
d) local procedure call
View Answer
Answer: c
Explanation: Resource reservation protocol is a transport layer protocol used on the internet. It
operates over IPv4 and IPv6 and is designed to reserve resources required by the network layer
protocols.
9. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) RSVP
View Answer
Answer: a
Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely assign
IP address to the clients connected to the internet. The server that performs this fuction is called
the DHCP server.
advertisement
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
5/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
c) fiber distributed data interface
d) packet switching
View Answer
Answer: d
Explanation: Packet switching is not really related to media access control as it just features
delivery of packets of data between devices over a shared network. Internet is actually based on
packet switching.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Wireless LAN
» Next - Computer Networks Questions & Answers – Bluetooth
advertisement
Recommended Posts:
1. Founder
2. Java Programming Examples on Networking
3. Digital Electronics MCQ (Multiple Choice Questions)
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
6/8
22/06/2021
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Internet - Computer Networks Questions & Answers - Sanfoundry
Information Science Questions and Answers
Electronics & Communication Engineering Questions and Answers
Electrical Engineering Questions and Answers
IOT MCQ (Multiple Choice Questions)
C# Programming Examples on Networking
Information Technology Questions and Answers
Computer Graphics MCQ (Multiple Choice Questions)
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Cryptography and Network Security MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
Computer Science Questions and Answers
Master of Computer Applications Questions and Answers
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Neural Networks MCQ (Multiple Choice Questions)
Computer Fundamentals MCQ (Multiple Choice Questions)
SAN MCQ (Multiple Choice Questions)
Computer Networks Questions & Answers – IPv4
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is
Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect
and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux
Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage,
Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage
Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn |
Youtube | Instagram | Facebook | Twitter
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
7/8
22/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
Subscribe Sanfoundry Newsletter and Posts
Name*
Email*
Subscribe
About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact






© 2011-2021 Sanfoundry. All Rights Reserved.
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
8/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
IOT Questions and Answers – IP Address
« Prev
Next »
This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “IP Address”.
1. What is the format of IP address?
a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit
View Answer
Answer: d
Explanation: The format of an IP address is a 32-bit numeric address written as four numbers
separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP
address.
advertisement
2. Version 6 of IP address has how many bits.
Learn
a) 64 bits
https://www.sanfoundry.com/iot-questions-answers-ip-address/
more
1/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
b) 128 bits
c) 32 bits
d) 256 bits
View Answer
Answer: b
Explanation: Because of the growth of the Internet and the depletion of available IPV4 address, a
new version of IP(IPV6), using 128 nits for the IP address, was developed in 1995, and
standardized as RFC 2460 in 1998. IPV6 deployment has been ongoing since the mid 2000s.
3. IANA stands for __________
a) Internet Assigned Numbers Authority
b) Internal Assigned Numbers Authority
c) Internet Associative Numbers Authoritative
d) Internal Associative Numbers Authority
View Answer
Answer: a
Explanation: The IP address space is managed globally by the Internet Assigned Numbers
Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated
territories for assignment to end users and local Internet registries, such as Internet services
providers.
advertisement
4. RIR stands for ________
a) Regional Internal Registries
https://www.sanfoundry.com/iot-questions-answers-ip-address/
Learn more
2/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
b) Registries Internet Regional
c) Regional Internet Registries
d) Registries Internal Regional
View Answer
Answer: c
Explanation: The IP address space is managed globally by the Internet Assigned Numbers
Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated
territories for assignment to end users and local Internet registries, such as Internet services
providers.
5. Geolocation software is used by host.
a) True
b) False
View Answer
Answer: a
Explanation: The header of each IP packet contains the IP address of the sending host, and that of
the destination host. A host may use geolocation software to deduce the geolocation of it
communication peer.
advertisement
6. How many versio
version /s of IP’s are there?
a) 4 versions
b) 3 versions
c) 2 versions
https://www.sanfoundry.com/iot-questions-answers-ip-address/
Learn more
3/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
d) 1 version
View Answer
Answer: c
Explanation: Two versions of the Internet Protocol are in common use in the Internet today. The
original version of the Internet Protocol for use in the Internet is Internet Protocol Version 4, first
installed in 1983.
7. VLSM stands for ________
a) Version Length Subnet Masking
b) Variable Length Subnet Masking
c) Variable Length Surface Masking
d) Version Length Surface Masking
View Answer
Answer: b
Explanation: The class system of the address space was replaced with Classless Inter – Domain
Routing in 1993. CIDR is based on variable length Subnet Masking to allow allocation and routing
based on arbitrary length prefixes.
advertisement
8. Many desktops and operating systems include which protocol?
a) IPv6 protocol
b) IPv4 protocol
c) Both IPv6 and IPv4 protocol
Learn more
https://www.sanfoundry.com/iot-questions-answers-ip-address/
4/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
d) IPv3 protocol
View Answer
Answer: a
Explanation: All modern desktop and enterprise server operating systems include native support
for the IPv6 protocol, but it is not yet widely deployed in other devices, such as residential
networking routers, voice over IP(VoIP) and multimedia equipment, and network peripherals.
9. The design of the Internet protocol suites adhere to the ________ principle.
a) Data corruption
b) Connection oriented
c) End to End principle
d) Reliability
View Answer
Answer: c
Explanation: The design of the Internet protocol suite adheres to the end to end principle, a
concept adapted from the CYCLADES project. Under the end to end principle, the network
infrastructure is considered inherently unreliable at any signal network element or transmission
medium and is dynamic in terms of availability of links and notes.
advertisement
10. ___________ adjusts the segment size to be smaller than MTU.
a) Internet Protocol 6
b) User Datagram Protocol
Learn more
c) Internet Protocol 4
https://www.sanfoundry.com/iot-questions-answers-ip-address/
5/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
d) Transmission Control Protocol
View Answer
Answer: d
Explanation: The Transmission Control Protocol is an example of a protocol that adjusts its
segment size to be smaller than the MTU.
Sanfoundry Global Education & Learning Series – IOT.
To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - IOT Questions and Answers – Application Layer
» Next - IOT Questions and Answers – MAC Address
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
C Tutorials
Java Programming Examples on Numerical Problems & Algorithms
C Programming Examples
Java Programming Examples on Data-Structures
Learn
more
C Programming Examples on Numerical
Problems
& Algorithms
Cryptography and Network Security MCQ (Multiple Choice Questions)
https://www.sanfoundry.com/iot-questions-answers-ip-address/
6/8
22/06/2021
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
IP Address - IOT Questions and Answers - Sanfoundry
C++ Programming Examples on Numerical Problems & Algorithms
SAN MCQ (Multiple Choice Questions)
Simple Java Programs
C Programming Examples using Recursion
C Programming Examples on Mathematical Functions
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Simple C Programs
C# Programming Examples on Data Structures
Computer Networks MCQ (Multiple Choice Questions)
C Programming Examples on Linked List
IOT MCQ (Multiple Choice Questions)
Java Programming Examples on Networking
C# Programming Examples on Networking
C Programming Examples on Bitwise Operations
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is
Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect
and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux
Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage,
Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage
Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn |
Youtube | Instagram | Facebook | Twitter
Learn more
https://www.sanfoundry.com/iot-questions-answers-ip-address/
7/8
22/06/2021
IP Address - IOT Questions and Answers - Sanfoundry
Subscribe Sanfoundry Newsletter and Posts
Name*
Email*
Subscribe
About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact






© 2011-2021 Sanfoundry. All Rights Reserved.
Learn more
https://www.sanfoundry.com/iot-questions-answers-ip-address/
8/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
IPv4
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv4”.
1. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
View Answer
Answer: a
Explanation: The Internet Protocol is the networking protocol which establishes the internet by
relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which
handles the Error Reporting functionality.
advertisement
Ad
‫اشترك اآلن وخليك بصدارة الببجي‬
Ooredoo Palestine
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
1/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not related to fragmentation
but is used to request specific treatment such as high throughput, high reliability or low latency
for the IP packet depending upon the type of service it belongs to.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on the
number of hops it makes (Number of routers it goes through). TTL field is decremented by one
each time the datagram is processed by a router. When the value is 0, the packet is automatically
destroyed.
advertisement
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
2/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
4. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP
View Answer
Answer: b
Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be
used to carry payloads of more than one protocol type. Its most used values are 17 and 6 for UDP
and TCP respectively. ICMP and IGMP are network layer protocols.
5. The data field cannot carry which of the following?
a) TCP segment
b) UDP segment
c) ICMP messages
d) SMTP messages
View Answer
Answer: c
Explanation: Data field usually has transport layer segments, but it can also carry ICMP messages.
SMTP is an application layer protocol. First it must go through the transport layer to be converted
into TCP segments and then it can be inserted into IP packets.
advertisement
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
3/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
6. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) Protocol field value
View Answer
Answer: a
Explanation: The Flag field in the IP header is used to control and identify the fragments. It
contains three bits: reserved, don’t fragment and more fragments. If the more fragments bit is 0,
it means that the fragment is the last fragment.
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) does not offer error reporting
View Answer
Answer: b
Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the
transport layer protocols like TCP to offer reliability.
advertisement
8. Which of the following demerits does Fragmentation have?
a) complicates routers
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
4/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
b) open to DOS attack
c) overlapping of fragments.
d) all of the mentioned
View Answer
Answer: d
Explanation: Fragmentation makes the implementation of the IP protocol complex and can also
be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation won’t
be required if the transport layer protocols perform wise segmentation.
9. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) ttl
d) identifer
View Answer
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the original datagram.
The offset of the first fragment will always be 0. The size of the field (13 bits) is 3-bits shorter than
the size of the total length field (16 bits).
advertisement
Sanfoundry Global Education & Learning Series – Computer Networks.
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
5/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – World Wide Web
» Next - Computer Networks Questions & Answers – IPv4 Addressing
advertisement
Recommended Posts:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Founder
Energy & Environment Management MCQ (Multiple Choice Questions)
Automata Theory MCQ (Multiple Choice Questions)
Basic Electrical Engineering MCQ (Multiple Choice Questions)
Recruitment Support Service – Employers
C# Programming Examples on Networking
C# Programming Examples on Data Structures
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
IOT MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
Computer Graphics MCQ (Multiple Choice Questions)
Computer Fundamentals MCQ (Multiple Choice Questions)
Computer Science Questions and Answers
Cryptography and Network Security MCQ (Multiple Choice Questions)
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
6/8
22/06/2021
16.
17.
18.
19.
20.
IPv4 - Computer Networks Questions & Answers - Sanfoundry
SAN MCQ (Multiple Choice Questions)
Master of Computer Applications Questions and Answers
Cloud Computing MCQ (Multiple Choice Questions)
Neural Networks MCQ (Multiple Choice Questions)
Computer Networks Questions & Answers – RTP
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is
Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect
and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux
Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage,
Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage
Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn |
Youtube | Instagram | Facebook | Twitter
Subscribe Sanfoundry Newsletter and Posts
Name*
Email*
Subscribe
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
7/8
22/06/2021
IPv4 - Computer Networks Questions & Answers - Sanfoundry
About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact






© 2011-2021 Sanfoundry. All Rights Reserved.
https://www.sanfoundry.com/computer-networks-mcqs-ipv4/
8/8
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
IST 220 exam 2
Terms in this set (41)
Consider a TCP connection
Source port number y and destination port number
between Host A and Host B.
x.
Suppose that the TCP
segments traveling from Host A
to Host B have source port
number x and destination port
number y. What are the source
and destination port numbers
for the segments traveling from
Host B to Host A?
An application developer may not want its
application to use TCP's congestion control, which
Describe why an application
developer might choose to run
an application over UDP rather
than TCP.
can throttle the application's sending rate at times of
congestion. Often, designers of IP telephony and IP
videoconference applications choose to run their
applications over UDP because they want to avoid
TCP's congestion control. Also, some applications
do not need the reliable data transfer provided by
TCP.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
1/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Why is it that voice and video
Since most firewalls are configured to block UDP
traffic is often sent over TCP
traffic, using TCP for video and voice traffic lets the
rather than UDP in today's
traffic though the firewalls. (Note from Marc: it's OK
Internet? (Hint: The answer we
if you didn't know this, since we haven't talked much
are looking for has nothing to
about firewalls. Consider this more of an FYI)
do with TCP's congestioncontrol mechanism.)
Is it possible for an application
Yes. The application developer can put reliable data
to enjoy reliable data transfer
transfer into the application layer protocol. This
even when the application runs
would require a significant amount of work and
over UDP? If so, how?
debugging, however.
Suppose a process in Host C
Yes, both segments will be directed to the same
has a UDP socket with port
socket. For each received segment, at the socket
number 6789. Suppose both
interface, the operating system will provide the
Host A and Host B each send a
process with the IP addresses to determine the
UDP segment to Host C with
origins of the individual segments.
destination port number 6789.
Will both of these segments be
directed to the same socket at
Host C? If so, how will the
process at Host C know that
these two segments originated
from two different hosts?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
2/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
For each persistent connection, the Web server
creates a separate "connection socket". Each
Suppose that a Web server
runs in Host C on port 80.
Suppose this Web server uses
persistent connections, and is
currently receiving requests
from two different Hosts, A and
B. Are all of the requests being
sent through the same socket
at Host C? If they are being
passed through different
sockets, do both of the sockets
have port 80? Discuss and
explain.
connection socket is identified with a four-tuple:
(source IP address, source port number, destination
IP address, destination port number). When host C
receives and IP datagram, it examines these four
fields in the datagram/segment to determine to
which socket it should pass the payload of the TCP
segment. Thus, the requests from A and B pass
through different sockets. The identifier for both of
these sockets has 80 for the destination port;
however, the identifiers for these sockets have
different values for source IP addresses. Unlike UDP,
when the transport layer passes a TCP segment's
payload to the application process, it does not
specify the source IP address, as this is implicitly
specified by the socket identifier.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
3/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
True or false?
False
Host A is sending Host B a
False
large file over a TCP
True
connection. Assume Host B has
False
no data to send Host A. Host B
True
will not send
False
acknowledgments to Host A
False
because Host B cannot
piggyback the
acknowledgments on data.
The size of the TCP rwnd never
changes throughout the
duration of the connection.
Suppose Host A is sending
Host B a large file over a TCP
connection. The number of
unacknowledged bytes that A
sends cannot exceed the size
of the receive buffer.
Suppose Host A is sending a
large file to Host B over a TCP
connection. If the sequence
number for a segment of this
connection is m, then the
sequence number for the
subsequent segment will
necessarily be m + 1.
The TCP segment has a field in
its header for rend .
Suppose that the last
SampleRTT in a TCP connection
is equal to 1 sec. The current
value of TimeoutInterval for the
connection will necessarily be
>= 1 sec.
Suppose Host A sends one
IST
220 exam 2
segment with sequence
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
4/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
number 38 and 4 bytes of data
over a TCP connection to Host
B. In this same segment the
acknowledgment number is
necessarily 42.
Suppose Host A sends two TCP
20 bytes
segments back to back to Host
ACK number = 90
B over a TCP connection. The
first segment has sequence
number 90; the second has
sequence number 110.
How much data is in the first
segment?
Suppose that the first segment
is lost but the second segment
arrives at B. In the
acknowledgment that Host B
sends to Host A, what will be
the acknowledgment number?
Consider the Telnet example
Three segments:
discussed in Section 3.5 . A few
seq = 43, ack =80
seconds after the user types
seq = 80, ack = 44
the letter 'C,' the user types the
seq = 44, ack = 81
letter 'R.' After typing the letter
'R,' how many segments are
sent, and what is put in the
sequence number and
acknowledgment fields of the
segments?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
5/20
22/06/2021
Suppose two TCP connections
IST 220 exam 2 Flashcards | Quizlet
R/2
are present over some
bottleneck link of rate R bps.
Both connections have a huge
file to send (in the same
direction over the bottleneck
link). The transmissions of the
files start at the same time.
What transmission rate would
TCP like to give to each of the
connections?
Suppose Client A initiates a
source port
Telnet session with Server S. At
numbers
about the same time, Client B
destination port
also initiates a Telnet session
numbers
with Server S. Provide possible
a) A --> S
source and destination port
467
numbers for
23
The segments sent from A to S.
b) B --> S
The segments sent from B to S.
513
The segments sent from S to A.
23
The segments sent from S to B.
c) S --> A
If A and B are different hosts, is
23
it possible that the source port
467
number in the segments from A
d) S --> B
to S is the same as that from B
23
to S?
513
How about if they are the same
e) Yes
host?
f) No
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
6/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Consider Figure 3.5 . What are
Suppose the IP addresses of the hosts A, B, and C
the source and destination
are a, b, c, respectively. (Note that a, b, c are
port values in the segments
distinct.)
flowing from the server back to
To host A: Source port =80, source IP address = b,
the clients' processes? What
dest port = 26145, dest IP address = a
are the IP addresses in the
To host C, left process: Source port =80, source IP
network-layer datagrams
address = b, dest port = 7532, dest IP address = c
carrying the transport-layer
To host C, right process: Source port =80, source IP
segments?
address = b, dest port = 26145, dest IP address = c
UDP and TCP use 1s
One's complement: 1 1 0 1 0 0 0 1.
complement for their
To detect errors, the receiver adds the four words
checksums. Suppose you have
(the three original words and the checksum). If the
the following three 8-bit bytes:
sum contains a zero, the receiver knows there has
01010011, 01100110, 01110100.
been an error. All one-bit errors will be detected,
What is the 1s complement of
but two-bit errors can be undetected (e.g., if the last
the sum of these 8-bit bytes?
digit of the first word is converted to a 0 and the
(Note that although UDP and
last digit of the second word is converted to a 1).
TCP use 16-bit words in
computing the checksum, for
this problem you are being
asked to consider 8-bit sums.)
Show all work. Why is it that
UDP takes the 1s complement
of the sum; that is, why not just
use the sum? With the 1s
complement scheme, how
does the receiver detect
errors? Is it possible that a 1-bit
error will go undetected? How
about a 2-bit error?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
7/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Suppose you have the
Adding the two bytes gives 11000001. Taking the
following 2 bytes: 01011100 and
one's complement gives 00111110.
01100101. What is the 1s
complement of the sum of
Adding the two bytes gives 01000000; the one's
these 2 bytes?
complement gives 10111111.
Suppose you have the
First byte = 01010100; second byte = 01101101.
following 2 bytes: 11011010 and
01100101. What is the 1s
complement of the sum of
these 2 bytes?
For the bytes in part (a), give
an example where one bit is
flipped in each of the 2 bytes
and yet the 1s complement
doesn't change.
Suppose that the UDP receiver
computes the Internet
checksum for the received
UDP segment and finds that it
matches the value carried in
the checksum field. Can the
receiver be absolutely certain
that no bit errors have
occurred? Explain.
No, the receiver cannot be absolutely certain that
no bit errors have occurred. This is because of the
manner in which the checksum for the packet is
calculated. If the corresponding bits (that would be
added together) of two 16-bit words in the packet
were 0 and 1 then even if these get flipped to 1 and
0 respectively, the sum still remains the same.
Hence, the 1s complement the receiver calculates
will also be the same. This means the checksum will
verify even if there was transmission error.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
8/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Consider sending an application message over a
transport protocol. With TCP, the application writes
We have said that an
data to the connection send buffer and TCP will
application may choose UDP
grab bytes without necessarily putting a single
for a transport protocol
message in the TCP segment; TCP may put more or
because UDP offers finer
less than a single message in a segment. UDP, on
application control (than TCP)
the other hand, encapsulates in a segment whatever
of what data is sent in a
the application gives it; so that, if the application
segment and when.
gives UDP an application message, this message will
be the payload of the UDP segment. Thus, with UDP,
Why does an application have
an application has more control of what data is sent
more control of what data is
in a segment.
sent in a segment?
With TCP, due to flow control and congestion
Why does an application have
control, there may be significant delay from the time
more control on when the
when an application writes data to its send buffer
segment is sent?
until when the data is given to the network layer.
UDP does not have delays due to flow control and
congestion control.
Let's review some of the
A network-layer packet is a datagram. A router
terminology used in this
forwards a packet based on the packet's IP (layer 3)
textbook. Recall that the name
address. A link-layer switch forwards a packet based
of a transport-layer packet is
on the packet's MAC (layer 2) address.
segment and that the name of
a link-layer packet is frame.
What is the name of a networklayer packet? Recall that both
routers and link-layer switches
are called packet switches.
What is the fundamental
difference between a router
and link-layer switch?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
9/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
The main function of the data plane is packet
We noted that network layer
forwarding, which is to forward datagrams from
functionality can be broadly
their input links to their output links. For example,
divided into data plane
the data plane's input ports perform physical layer
functionality and control plane
function of terminating an incoming physical link at
functionality. What are the main
a router, perform link-layer function to interoperate
functions of the data plane? Of
with the link layer at the other side of the incoming
the control plane?
link, and perform lookup function at the input ports.
The key differences between routing and
forwarding is that forwarding is a router's local
We made a distinction
action of transferring packets from its input
between the forwarding
interfaces to its output interfaces, and forwarding
function and the routing
takes place at very short timescales (typically a few
function performed in the
nanoseconds), and thus is typically implemented in
network layer. What are the key
hardware. Routing refers to the network-wide
differences between routing
process that determines the end-to-end paths that
and forwarding?
packets take from sources to destinations. Routing
takes place on much longer timescales (typically
seconds), and is often implemented in software.
What is the role of the
forwarding table within a
router?
The role of the forwarding table within a router is to
hold entries to determine the outgoing link
interface to which an arriving packet will be
forwarded via switching fabric.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
10/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
We said that a network layer's
The service model of the Internet's network layer is
service model "defines the
best-effort service. With this service model, there is
characteristics of end-to-end
no guarantee that packets will be received in the
transport of packets between
order in which they were sent, no guarantee of their
sending and receiving hosts."
eventual delivery, no guarantee on the end-to-end
What is the service model of
delay, and no minimal bandwidth guarantee.
the Internet's network layer?
What guarantees are made by
the Internet's service model
regarding the host-to-host
delivery of datagrams?
Suppose that an arriving
A router uses longest prefix matching to determine
packet matches two or more
which link interface a packet will be forwarded to if
entries in a router's forwarding
the packet's destination address matches two or
table. With traditional
more entries in the forwarding table. That is, the
destination-based forwarding,
packet will be forwarded to the link interface that
what rule does a router apply
has the longest prefix match with the packet's
to determine which of these
destination.
rules should be applied to
determine the output port to
which the arriving packet
should be switched?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
11/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Suppose Host A sends Host B
The 8-bit protocol field in the IP datagram contains
a TCP segment encapsulated in
information about which transport layer protocol
an IP datagram. When Host B
the destination host should pass the segment to.
receives the datagram, how
does the network layer in Host
B know it should pass the
segment (that is, the payload
of the datagram) to TCP rather
than to UDP or to some other
upper-layer protocol?
What field in the IP header can
Time-to-live.
be used to ensure that a packet
is forwarded through no more
than N routers?
Recall that we saw the Internet
IP header checksum only computes the checksum
checksum being used in both
of an IP packet's IP header fields, which share no
transport-layer segment (in
common bytes with the IP datagram's transport-
UDP and TCP headers, Figures
layer segment part.
3.7 and 3.29 respectively) and
in network-layer datagrams (IP
header, Figure 4.16). Now
consider a transport layer
segment encapsulated in an IP
datagram. Are the checksums
in the segment header and
datagram header computed
over any common bytes in the
IP datagram? Explain your
answer.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
12/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
When a large datagram is
The reassembly of the fragments of an IP datagram
fragmented into multiple
is done in the datagram's destination host.
smaller datagrams, where are
these smaller datagrams
reassembled into a single
larger datagram?
Do routers have IP addresses?
They have one address for each interface.
If so, how many?
Suppose there are three
8 interfaces; 3 forwarding tables.
routers between a source host
and a destination host.
Ignoring fragmentation, an IP
datagram sent from the source
host to the destination host will
travel over how many
interfaces? How many
forwarding tables will be
indexed to move the datagram
from the source to the
destination?
Suppose an application
50% overhead.
generates chunks of 40 bytes
of data every 20 msec, and
each chunk gets encapsulated
in a TCP segment and then an
IP datagram. What percentage
of each datagram will be
overhead, and what
percentage will be application
data?
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
13/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Suppose you purchase a
Typically the wireless router includes a DHCP
wireless router and connect it
server. DHCP is used to assign IP addresses to the 5
to your cable modem. Also
PCs and to the router interface. Yes, the wireless
suppose that your ISP
router also uses NAT as it obtains only one IP
dynamically assigns your
address from the ISP.
connected device (that is, your
wireless router) one IP address.
Also suppose that you have
five PCs at home that use 802.11
to wirelessly connect to your
wireless router. How are IP
addresses assigned to the five
PCs? Does the wireless router
use NAT? Why or why not?
A plug-and-play or zeroconf protocol means that
What is meant by a "plug-and-
the protocol is able to automatically configure a
play" or "zeroconf" protocol?
host's network-related aspects in order to connect
the host into a network.
A private network address of a device in a network
What is a private network
refers to a network address that is only meaningful
address? Should a datagram
to those devices within that network. A datagram
with a private network address
with a private network address should never be
ever be present in the larger
present in the larger public Internet, because the
public Internet? Explain.
private network address is potentially used by many
network devices within their own private networks.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
14/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
IPv6 has a fixed length header, which does not
include most of the options an IPv4 header can
include. Even though the IPv6 header contains two
Compare and contrast the IPv4
and the IPv6 header fields. Do
they have any fields in
common?
128 bit addresses (source and destination IP
address) the whole header has a fixed length of 40
bytes only. Several of the fields are similar in spirit.
Traffic class, payload length, next header and hop
limit in IPv6 are respectively similar to type of
service, datagram length, upper-layer protocol and
time to live in IPv4.
Consider the network below.
a. Data destined to host H3 is forwarded through
interface 3.
Show the forwarding table in
Destination Address Link Interface H3 3
router A, such that all traffic
destined to host H3 is
b. No, because forwarding rules are only based on
forwarded through interface 3.
the destination address.
Can you write down a
forwarding table in router A,
such that all traffic from H1
destined to host H3 is
forwarded through interface 3,
while all traffic from H2
destined to host H3 is
forwarded through interface
4? (Hint: This is a trick
question.)
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
15/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Consider a datagram network
a.
using 32-bit host addresses.
Prefix Match Link Interface
Suppose a router has four links,
11100000 00
numbered 0 through 3, and
0
packets are to be forwarded to
11100000 01000000
the link interfaces as follows:
1
Destination Address Range
1110000
Link Interface 11100000
2
00000000 00000000
11100001 1
00000000
3 otherwise 3
through
11100000 00111111 11111111 11111111
0 11100000 01000000 00000000
00000000
through
11100000 01000000 11111111 11111111
1 11100000 01000001 00000000
00000000
through
11100001 01111111 11111111 11111111
2 otherwise 3
a. Provide a forwarding table
that has five entries, uses
longest prefix matching, and
forwards packets to the correct
link interfaces.
b. Describe how your
forwarding table determines
the appropriate link interface
for datagrams with destination
addresses:
11001000 10010001 01010001
01010101 11100001 01000000
11000011 00111100 11100001
10000000 00010001 01110111
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
16/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Destination Address Range Link Interface
00000000
through
00111111
0
01000000
through
Consider a datagram network
01011111
using 8-bit host addresses.
1
Suppose a router uses longest
01100000
prefix matching and has the
through
following forwarding table:
01111111
Prefix Match Interface 00 0 010
2
1 011 2 10 2 11 3
10000000
For each of the four interfaces,
through
give the associated range of
10111111
destination host addresses and
2
the number of addresses in the
11000000
range.
through
11111111
3
number of addresses for interface 0 = 2^6 = 64
number of addresses for interface 1 = 2^5 = 32
number of addresses for interface 2 = 2^6 + 2^5 = 64
+ 32 = 95
number of addresses for interface 3 = 2^6 = 64
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
17/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Destination Address Range
Link Interface
11000000
Consider a datagram network
through (32 addresses)
using 8-bit host addresses.
11011111
Suppose a router uses longest
0
prefix matching and has the
10000000
following forwarding table:
through(64 addresses)
Prefix Match Interface 1 0 10 1
10111111
111 2 otherwise 3
1
For each of the four interfaces,
11100000
give the associated range of
through (32 addresses)
destination host addresses and
11111111
the number of addresses in the
2
range.
00000000
through (128 addresses)
01111111
3
Consider a router that
223.1.17.0/26
interconnects three subnets:
223.1.17.128/25
Subnet 1, Subnet 2, and Subnet
223.1.17.192/28
3. Suppose all of the interfaces
in each of these three subnets
are required to have the prefix
223.1.17/24. Also suppose that
Subnet 1 is required to support
at least 60 interfaces, Subnet 2
is to support at least 90
interfaces, and Subnet 3 is to
support at least 12 interfaces.
Provide three network
addresses (of the form
a.b.c.d/x) that satisfy these
constraints.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
18/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
The maximum size of the data field in each fragment
is 680 (because there are 20 bytes of IP header).
Consider sending a 2400-byte
Thus the number of required fragments is
datagram into a link that has an
(2400−20)÷680=4
MTU of 700 bytes. Suppose the
.
original datagram is stamped
with the identification number
Each fragment will have identification number 422.
422. How many fragments are
Each fragment except the last one will be of size
generated? What are the
700 bytes (including IP header). The last datagram
values in the various fields in
will be of size 360 bytes (including IP header). The
the IP datagram(s) generated
offsets of the 4 fragments will be 0, 85, 170, 255.
related to fragmentation?
Each of the first three fragments will have their flag
set to 1; the last fragment will have its flag set to 0.
Suppose datagrams are limited
to 1,500 bytes (including
header) between source Host
A and destination Host B.
Assuming a 20-byte IP header,
how many datagrams would be
required to send an MP3
consisting of 5 million bytes?
Explain how you computed
your answer.
MP3 file size = 5 million bytes. Assume the data is
carried in TCP segments, with each TCP segment
also having 20 bytes of header. Then each datagram
can carry 1500 - 40 = 1460 bytes of the MP3 file.
Number of datagrams required = 5×106÷1460=3425
. All but the last datagram will be 1500 bytes; the
last datagram will be 960 + 40 = 1000 bytes. Note
that here there is no fragmentation; the source host
does not create datagrams larger than 1500 bytes,
and these datagrams are smaller than the MTUs of
the links.
IST 220 exam 2
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
19/20
22/06/2021
IST 220 exam 2 Flashcards | Quizlet
Consider the network setup in
Home addresses: 192.168.1.1, 192.168.1.1, 192.168.1.3,
Figure 4.25. Suppose that the
with the router interface being 192.168.1.4.
ISP instead assigns the router
See the NAT translation table below.
the address 24.34.112.235 and
WAN side LAN side 24.34.112.235, 4000 192.168.1.1,
that the network address of the
3345 24.34.112.235, 4001 192.168.1.1, 3346
home network is 192.168.1/24.
24.34.112.235, 4002 192.168.1.2, 3345 24.34.112.235,
Assign addresses to all
4003 192.168.1.2, 3346 24.34.112.235, 4004 192.168.1.3,
interfaces in the home
3345 24.34.112.235, 4005 192.168.1.3, 3346
network.
Suppose each host has two
ongoing TCP connections, all
to port 80 at host 128.119.40.86.
Provide the six corresponding
entries in the NAT translation
table.
https://quizlet.com/584961719/ist-220-exam-2-flash-cards/
20/20
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
MIT 812 Chapter 1 Computer Networks and the Internet.
Study
MIT 812 Chapter 1 Computer Networks and the
Internet.
Terms in this set (28)
What is the difference between
There is no difference. Throughout this text, the
a host and an end system? List
words "host" and "end system" are used
several different types of end
interchangeably. End systems include PCs,
PCs
systems. Is a Web server an
workstations, Web servers, mail servers, PDAs,
end system?
Internet-connected game consoles, etc.
From Wikipedia: Diplomatic protocol is commonly
described as a set of international courtesy rules.
The word protocol is often
These well-established and time-honored rules
used to describe diplomatic
have made it easier for nations and people to live
relations. How does Wikipedia
and work together. Part of protocol has always
describe diplomatic protocol?
been the acknowledgment of the hierarchical
standing of all present. Protocol rules are based on
the principles of civility.
Why are standards important
for protocols?
Standards are important for protocols so that
people can create networking systems and
products that interoperate.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
1/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
1. Dial-upand
modem
telephone line: home;
MIT 812 Chapter 1 Computer Networks
theover
Internet.
Study
List six access technologies.
2. DSL over telephone line: home or small office;
Classify each one as home
3. Cable to HFC: home;
access, enterprise access, or
4. 100 Mbps switched Ethernet: enterprise;
wide-area wireless access.
5. Wifi (802.11): home and enterprise:
6. 3G and 4G: wide-area wireless.
Is HFC transmission rate
HFC bandwidth is shared among the users.
dedicated or shared among
There are no collisions in the downstream channel.
users?
Because in the downstream channel, all packets
Are collisions possible in a
emanate from a single source, namely, the head
downstream HFC channel?
end.
Why or why not?
List the available residential
access technologies in your
city. For each type of access,
provide the advertised
downstream rate, upstream
rate, and monthly price.
In most American cities, the current possibilities
include: dial-up; DSL; cable modem; fiber- to-thehome.
HFC - 300 mbps - $65
- 100 mbps - $65
- 2 mbps - $15
What is the transmission rate of
Ethernet LANs have transmission rates of 10 Mbps,
Ethernet LANs?
100 Mbps, 1 Gbps and 10 Gbps.
What are some of the physical
Today, Ethernet most commonly runs over twisted-
media that Ethernet can run
pair copper wire.
over?
It also can run over fibers optic links.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
2/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Dial up modems:
upInternet.
to 56 Kbps, bandwidth is
MIT 812 Chapter 1 Computer Networks
and the
Dial-up modems, HFC, DSLand
FTTH are all used for
residential access. For each of
these access technologies,
provide a range of transmission
rates and comment on whether
the transmission rate is shared
or dedicated.
Study
dedicated;
DSL: up to 24 Mbps downstream and 2.5 Mbps
upstream, bandwidth is dedicated;
HFC, rates up to 42.8 Mbps and upstream rates of
up to 30.7 Mbps, bandwidth is shared.
FTTH: 2-10Mbps upload; 10-20 Mbps download;
bandwidth is notshared.
a) Wifi (802.11) In a wireless LAN, wireless users
transmit/receive packets to/from an base station
(i.e., wireless access point) within a radius of few
tens of meters. The base station is typically
Describe the most popular
wireless Internet access
technologies today. Compare
and contrast them.
connected to the wired Internet and thus serves to
connect wireless users to the wired network.
b) 3G and 4G wide-area wireless access networks.
In these systems, packets are transmitted over the
same wireless infrastructure used for cellular
telephony, with the base station thus being
managed by a telecommunications provider. This
provides wireless access to users within a radius of
tens of kilometers of the base station.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
3/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Suppose
is exactly
one
At time t0and
the sending
host begins to transmit. At
Study
MIT
812there
Chapter
1 Computer
Networks
the Internet.
packet switch between a
time t1 = L/R1, the sending host completes
sending host and a receiving
transmission and the entire packet is received at the
host. The transmission rates
router (no propagation delay). Because the router
between the sending host and
has the entire packet at time t1, it can begin to
the switch and between the
transmit the packet to the receiving host at time t1.
switch and the receiving host
At time t2 = t1 + L/R2, the router completes
are R1 and R2, respectively.
transmission and the entire packet is received at the
Assuming that the switch uses
receiving host (again, no propagation delay). Thus,
store-and-forward packet
the end-to-end delay is L/R1 + L/R2.
switching, what is the total
end-to-end delay to send a
packet of length L? (Ignore
queuing, propagation delay,
and processing delay
What advantage does a circuitswitched network have over a
packet-switched network?
What advantages does TDM
have over FDM in a circuitswitched network?
A circuit-switched network can guarantee a certain
amount of end-to-end bandwidth for the duration
of a call. Most packet-switched networks today
(including the Internet) cannot make any end-toend guarantees for bandwidth. FDM requires
sophisticated analog hardware to shift signal into
appropriate frequency bands.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
4/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Suppose
share a1 2Computer
Mbps
a) yes 2 users
supported because each Study
user
MIT
812users
Chapter
Networks
andcan
thebeInternet.
link. Also suppose each user
requires half of the link bandwidth.
transmits continuously at 1
b) Since each user requires 1Mbps when
Mbps when transmitting, but
transmitting, if two or fewer users transmit
each user transmits only 20
simultaneously, a maximum of 2Mbps will be
percent of the time. (See the
required. Since the available bandwidth of the
discussion of statistical
shared link is 2Mbps, there will be no queuing delay
multiplexing in Section 1.3.)
before the link. Whereas, if three users transmit
a. When circuit switching is
simultaneously, the bandwidth required will be
used, how many users can be
3Mbps which is more than the available bandwidth
supported?
of the shared link. In this case, there will be queuing
b. For the remainder of this
delay before the link.
problem, suppose packet
c) Probability that a given user is transmitting = 0.2
switching is used. Why will
d) Probability that all three users are transmitting
there be essentially no queuing
simultaneously = (0.2)^3 = 0.008. Since the queue
delay before the link if two or
grows when all the users are transmitting, the
fewer users transmit at the
fraction of time during which the queue grows
same time? Why will there be a
(which is equal to the probability that all three users
queuing delay if three users
are transmitting simultaneously) is 0.008.
transmit at the same time?
c. Find the probability that a
given user is transmitting.
d. Suppose now there are
three users. Find the
probability that at any given
time, all three users are
transmitting simultaneously.
Find the fraction of time during
which the queue grows.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
5/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
If the twoand
ISPs the
do not
peer with each other, then
Study
MIT 812 Chapter 1 Computer Networks
Internet.
when they send traffic to each other they have to
send the traffic through a provider ISP
(intermediary), to which they have to pay for
carrying the traffic. By peering with each other
Why will two ISPs at the same
directly, the two ISPs can reduce their payments to
level of the hierarchy often
their provider ISPs. An Internet Exchange Points
peer with each other? How
(IXP) (typically in a standalone building with its own
does an IXP earn money?
switches) is a meeting point where multiple ISPs can
connect and/or peer together. An ISP earns its
money by charging each of the the ISPs that
connect to the IXP a relatively small fee, which may
depend on the amount of traffic sent to or received
from the IXP. Yes I
Google's private network connects together all its
data centers, big and small. Traffic between the
Google data centers passes over its private network
rather than over the public Internet. Many of these
data centers are located in, or close to, lower tier
Some content providers have
ISPs. Therefore, when Google delivers content to a
created their own networks.
user, it often can bypass higher tier ISPs. What
Describe Google's network.
motivates content providers to create these
What motivates content
networks? First, the content provider has more
providers to create these
control over the user experience, since it has to use
networks?
few intermediary ISPs. Second, it can save money
by sending less traffic into provider networks. Third,
if ISPs decide to charge more money to highly
profitable content providers (in countries where net
neutrality doesn't apply), the content providers can
avoid these extra payments.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
6/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Consider
a packet
The delayand
components
are processing delays,
MIT
812 sending
Chapter
1 Computer Networks
the Internet.
Study
from a source host to a
transmission delays, propagation delays, and
destination host over a fixed
queuing delays. All of these delays are fixed, except
route. List the delay
for the queuing delays, which are variable
components in the end-to-end
delay. Which of these delays
are constant and which are
variable?
Visit the Transmission Versus
a) 1000 km, 1 Mbps, 100 bytes
Propagation Delay applet at
b) 100 km, 1 Mbps, 100 bytes
the companion Web site.
Among the rates, propagation
delay, and packet sizes
available, find a combination
for which the sender finishes
transmitting before the first bit
of the packet reaches the
receiver. Find another
combination for which the first
bit of the packet reaches the
receiver before the sender
finishes transmitting.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
7/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
How long
does it take1 aComputer
packet
10msec; d/s;
no Internet.
MIT
812 Chapter
Networks
andno;the
Study
of length 1,000 bytes to
propagate over a link of
distance 2,500 km,
propagation speed 2.5 * 10^8
m/s, and transmission rate 2
Mbps? More generally, how
long does it take a packet of
length L to propagate over a
link of distance d, propagation
speed s, and transmission rate
R bps? Does this delay depend
on packet length? Does this
delay depend on transmission
rate?
Suppose Host A wants to send
a) 500 kbps
a large file to Host B. The path
b) 64 seconds
from Host A to Host B has
c) 100kbps; 320 seconds
three links, of rates R1 = 500
kbps, R2 = 2 Mbps, and R3 = 1
Mbps. a. Assuming no other
traffic in the network, what is
the throughput for the file
transfer? b. Suppose the file is
4 million bytes. Dividing the file
size by the throughput, roughly
how long will it take to transfer
the file to Host B? c. Repeat (a)
and (b), but now with R2
reduced to 100 kbps.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
8/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Suppose
system Awants
to
End system
A breaks
the large file into chunks. It
Study
MIT
812end
Chapter
1 Computer
Networks
and
the Internet.
send a large file to end system
adds header to each chunk, thereby generating
B. At a very high level, describe
multiple packets from the file. The header in each
how end system Acreates
packet includes the IP address of the destination
packets from the file. When
(end system B). The packet switch uses the
one of these packets arrives to
destination IP address in the packet to determine
a packet switch, what
the outgoing link. Asking which road to take is
information in the packet does
analogous to a packet asking which outgoing link it
the switch use to determine the
should be forwarded on, given the packet's
link onto which the packet is
destination address.
forwarded? Why is packet
switching in the Internet
analogous to driving from one
city to another and asking
directions along the way?
Visit the Queuing and Loss
The maximum emission rate is 500 packets/sec and
applet at the companion Web
the maximum transmission rate is 350 packets/sec.
site. What is the maximum
The corresponding traffic intensity is 500/350 =1.43 >
emission rate and the minimum
1. Loss will eventually occur for each experiment;
transmission rate? With those
but the time when loss first occurs will be different
rates, what is the traffic
from one experiment to the next due to the
intensity? Run
randomness in the emission process.
the applet with these rates and
determine how long it takes for
packet loss to occur. Then
repeat the experiment a
second time and determine
again how long it takes for
packet loss to occur. Are the
values different? Why or why
not?
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
9/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
List five
tasks
that a layer
can
Five generic
error control, flow control,
Study
MIT
812
Chapter
1 Computer
Networks
andtasks
theare
Internet.
perform. Is it possible that one
segmentation and reassembly, multiplexing, and
(or more) of these tasks could
connection setup. Yes, these tasks can be
be performed by two (or more)
duplicated at different layers. For example, error
layers?
control is often provided at more than one layer.
What are the five layers in the
The five layers in the Internet protocol stack are -
Internet protocol stack? What
from top to bottom - the application layer, the
are the principal
transport layer, the network layer, the link layer, and
responsibilities of each of
the physical layer. The principal responsibilities are
these layers?
outlined in Section 1.5.1
Which layers in the Internet
protocol stack does a router
process? Which layers does a
link-layer switch process?
Which layers does a host
process?
Routers process network, link and physical layers
(layers 1 through 3). (This is a little bit of a white lie,
as modern routers sometimes act as firewalls or
caching
components, and process Transport layer as well.)
Link layer switches process link and physical layers
(layers 1 through2). Hosts process all five layers
Application-layer message: data which an
application wants to send and passed onto the
What is an application-layer
message? Atransport-layer
segment? A network layer
datagram? A link-layer frame?
transport layer; transport-layer segment: generated
by the transport layer and encapsulates applicationlayer message with transport layer header; networklayer datagram: encapsulates transport-layer
segment with a network-layer header; linklayer
frame: encapsulates network-layer datagram with a
link-layer header.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
10/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
a) Virus Requires
some
form of human interaction
to
Study
MIT 812 Chapter 1 Computer Networks
and the
Internet.
spread. Classic example: E-mail viruses.
What is the difference between
b) Worms No user replication needed. Worm in
a virus and a worm?
infected host scans IP addresses and port numbers,
looking for vulnerable processes to infect.
Creation of a botnet requires an attacker to find
vulnerability in some application or system (e.g.
exploiting the buffer overflow vulnerability that
might exist in an application). After finding the
vulnerability, the attacker needs to scan for hosts
that are vulnerable. The target is basically to
compromise a series of systems by exploiting that
particular vulnerability. Any system that is part of the
Describe how a botnet can be
botnet can automatically scan its environment and
created, and how it can be
propagate by exploiting the vulnerability. An
used for a DDoS attack.
important property of such botnets is that the
originator of the botnet can remotely control and
issue commands to all the nodes in the botnet.
Hence, it becomes possible for the attacker to issue
a command to all the nodes, that target a single
node (for example, all nodes in the botnet might be
commanded by the attacker to send a TCP SYN
message to the target, which might result in a TCP
SYN flood attack at the target).
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
11/12
22/06/2021
MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet
Suppose
and Bob
are
Trudy canand
pretend
be Bob to Alice (and viceStudy
MIT
812Alice
Chapter
1 Computer
Networks
the to
Internet.
sending packets to each other
versa) and partially or completely modify the
over a computer network.
message(s) being sent from Bob to Alice. For
Suppose Trudy positions
example, she can easily change the phrase "Alice, I
herself in the network so that
owe you $1000" to "Alice, I owe you $10,000".
she can capture all the packets
Furthermore, Trudy can even drop the packets that
sent by Alice and send
are being sent by Bob to Alice (and vise-versa),
whatever she wants to Bob;
even if the packets from Bob to Alice are encrypted.
she can also capture all the
packets sent by Bob and send
whatever she wants to Alice.
List some of the malicious
things Trudy can do from this
position.
https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/
12/12
22/06/2021
Network Chapter 2 Flashcards | Quizlet
Network Chapter 2
Terms in this set (17)
For a p2p file-sharing
No. All communication sessions have a client side
application, do you agree with
and a server side. In a P2P file-sharing application,
the statement, "There is no
the peer that is receiving a file is typically the client
notion of client and server
and the peer that is sending the file is typically the
sides of a communication
server.
session"?
What information is used by a
The IP address of the destination host and the port
process running on one host to
number of the destination socket.
identify a process running on
another host?
6. You would use UDP. With UDP, the transaction
Suppose you wanted to do a
transaction from a remote
client to a server as fast as
possible. Would you use UDP
or TCP? Why?
can be completed in one roundtrip time (RTT) - the
client sends the transaction request into a UDP
socket, and the server sends the reply back to the
client's UDP socket. With TCP, a minimum of two
RTTs are needed - one to set-up the TCP
connection, and another for the client to send the
request, and for the server to send back the reply.
Network Chapter 2
https://quizlet.com/41479403/network-chapter-2-flash-cards/
1/6
22/06/2021
Network Chapter 2 Flashcards | Quizlet
a) Reliable data transfer
TCP provides a reliable byte-stream between client
and server but UDP does not.
List the four broad classes of
b) A guarantee that a certain value for throughput
services that a transport
will be maintained
protocol can provide. For each
Neither
of the service classes, indicate
c) A guarantee that data will be delivered within a
if either UDP or TCP (or both)
specified amount of time
provides such a service.
Neither
d) Security
Neither
Why do HTTP, FTP, SMTP, and
POP3 run on top of TPC rather
than on UDP?
The applications associated with those protocols
require that all application data be received in the
correct order and without gaps. TCP provides this
service whereas UDP does not.
When the user first visits the site, the site returns a
Consider an e-commerce site
cookie number. This cookie number is stored on the
that wants to keep a purchase
user's host and is managed by the browser. During
record for each of its
each subsequent visit (and purchase), the browser
customers. Describe how this
sends the cookie number back to the site. Thus the
can be done with cookies.
site knows when this user (more precisely, this
browser) is visiting the site.
Describe how Web caching
Web caching can bring the desired content "closer"
can reduce the delay in
to the user, perhaps to the same LAN to which the
receiving a requested object.
user's host is connected. Web caching can reduce
Will Web caching reduce the
the delay for all objects, even objects that are not
delay for all objects requested
cached, since caching reduces the traffic on links.
by a user or for only some of
the objects? Why?
Network Chapter 2
https://quizlet.com/41479403/network-chapter-2-flash-cards/
2/6
22/06/2021
Network Chapter 2 Flashcards | Quizlet
Suppose Alice, with a web-
Message is sent from Alice's host to her mail server
based email account (such as
over HTTP. Alice's mail server then sends the
hotmail or gmail), sends a
message to Bob's mail server over SMTP. Bob then
message to Bob, who accesses
transfers the message from his mail server to his
his mail from his mail server
host over POP3.
using POP3. Discuss how the
message gets from Alice's host
to Bob's host. Be sure to list the
series of application-layer
protocols that are used to
move the message between
the two hosts.
1. Single point of failure: if the DNS server crashes,
so does the entire Internet
2. Traffic concentration: the single server would
have to handle all DNS queries for all HTTP requests
and email messages for hundreds of millions of
hosts.
Give four reasons (arguments)
against having one DNS server.
3. Delayed responses: since the single server can
only be close to a very few hosts, most of the hosts
will have to travel large distances (and experience
propagation delay), and traverse many links (some
of which maybe congested) to reach the server.
4. Book-keeping and updates (maintenance): the
DNS server would have to keep track of every new
host or every removed host in the Internet. This
doesn't scale.
Network Chapter 2
https://quizlet.com/41479403/network-chapter-2-flash-cards/
3/6
22/06/2021
Network Chapter 2 Flashcards | Quizlet
The current architecture of DNS is a distributed,
hierarchical database, with 3 levels (and server
types) of hierarchy: 1. the Root DNS servers: there
are 13 root servers around the world, each consists
of a cluster of replicated servers for security and
What is the current architecture
reliability purposes. 2. top-level domain servers
of DNS? (mention the various
(TLD) responsible for top-level domains (e.g., co,
types of servers and their
org, net, edu, gov) and country top-level domains
function)
(e.g., uk, fr, ca, jp). 3. authoritative DNS servers: keep
the mapping for publicly accessible resources at
organizations (e.g., web and mail servers).
4. Local name server: does not belong strictly to the
hierarchy and is queried first when a host requests
to resolve an address.
the two types of queries are: iterative queries and
recursive queries. Iterative (or iterated) queries
propagate from the host to its local DNS server and
from then on to a root server (which replies to the
What are the two types of
query/search propagation in
DNS? What is the main
difference between them? <5
points>
local DNS server), then from the local server to the
TLD server (which replies to the local DNS server),
then from the local server to the authoritative server
(which replies to the local DNS server). The
recursive query, by contrast, puts the burden on the
contacted server and may increase the burden on
the high level servers (e.g., the root server has to
contact the TLD which in turn contacts the
authoritative server. The latter query method may
incur less delay.
Network Chapter 2
https://quizlet.com/41479403/network-chapter-2-flash-cards/
4/6
22/06/2021
d- Discuss a mechanism we
studied to improve DNS
performance and elaborate on
how the performance can
improve.
Network Chapter 2 Flashcards | Quizlet
Using DNS caching is one way to improve DNS
performance, first by reducing the delay required to
get the address resolution (since the cache servers
are now closer to the requesting hosts), and by
reducing the overall load of DNS going to the
higher level DNS servers.
1. Centralized directory of resources/files, as in
Napster. Advantage is that search for resources is
simple with min overhead ( just ask the centralized
server). The disadvantages are: single point of
failure, performance bottleneck and target of
lawsuit.
2. Fully distributed, non-centralized architecture, as
Discuss three different
architectures of the peer-topeer applications. Give
examples of real applications
for each architecture and
discuss the advantages and
disadvantages of each
architecture.
in Gnutella, where all peers and edges form a 'flat'
overlay (without hierarchy). Advantages: robustness
to failure, no performance bottleneck and no target
for lawsuit. Disadvantages is that search is more
involved and incurs high overhead with query
flooding.
3. Hierarchical overlay, with some nodes acting as
super nodes (or cluster heads), or nodes forming
loose neighborhoods (sometimes referred to as
loose hierarchy, as in BitTorrent). Advantages,
robust (no single point of failure), avoids flooding to
search for resources during queries. Disadvantages,
needs to keep track of at least some nodes using
the 'Tracker' server. In general, this architecture
attempts to combine the best of the 2 other
architectures.
Network Chapter 2
https://quizlet.com/41479403/network-chapter-2-flash-cards/
5/6
22/06/2021
Network Chapter 2 Flashcards | Quizlet
In BitTorrent, suppose Alice
It is not necessary that Bob will also provide chunks
provides chunks to Bob
to Alice. Alice has to be in the top 4 neighbors of
throughout a 30-second
Bob for Bob to send out chunks to her (or through
interval. Will Bob necessarily
random selection); this might not occur even if Alice
return the favor and provide
provides chunks to Bob throughout a 30-second
chunks to Alice in this same
interval.
interval? Why or why not?
A user requests a web page
False.
that consists of some text and
two images. For this page, the
client will send one request
message and receive three
response messages. True or
False?
Two distinct web pages (for
True.
example,
www.mit.edu/research.html and
www.mit.edu/students.html)
can be sent over the same
persistent connection. True or
False?
With non-persistent
False.
connections between browser
and origin server, it is possible
for a single TCP segment to
carry two distinct HTTP request
messages. True or False?
https://quizlet.com/41479403/network-chapter-2-flash-cards/
6/6
22/06/2021
Networking Chap 3 Flashcards | Quizlet
Networking Chap 3
Study
Networking Chap 3
Terms in this set (10)
Suppose Host A is sending
False
Host B a large file over a TCP
connection. The number of
unacknowledged bytes that A
sends cannot exceed the size
of the receive buffer. True or
false?
https://quizlet.com/379810076/networking-chap-3-flash-cards/
1/4
22/06/2021
Networking Chap 3 Flashcards | Quizlet
In our Reliable Data
Transfer
Networking
Chap
3
a. Sequence numbers are required for a receiver
to
Study
(rdt) protocols, why did we
find out whether an arr
arriving packet contains new
need to introduce sequence
data or is a retransmission.
numbers?
a. Sequence numbers are
required for a receiver to find
out whether an arr
arriving packet
contains new data or is a
retransmission.
b. Sequence numbers are
required for a sender to find
out whether a sending packet
contains new data.
c. Sequence numbers are
required for a sender to find
out whether a sending packet
contains correct data content.
d. Sequence numbers are
required for a receiver to find
out whether a sending packet
contains correct data content.
True or false? Consider
True
congestion control in TCP.
When the timer expires at the
sender, the value of ssthresh is
set to half of the current value
of the congestion window.
The TCP segment has a field in
True
its header for receive window
(rwnd). True or false?
https://quizlet.com/379810076/networking-chap-3-flash-cards/
2/4
22/06/2021
Suppose that the
last 3
Networking
Chap
Networking Chap 3 Flashcards | Quizlet
False
Study
SampleRTT in a TCP connection
is equal to 1 sec. The current
value of TimeoutInterval for the
connection will necessarily be
greater or equal than1 sec. True
or false?
Why is it that voice and video
b. All in the list
traffic is often sent over TCP
rather than UDP in today's
Internet?
a. TCP has better congestioncontrol mechanism than UDP.
b. All in the list.
c. Applications need the
reliable data transfer provided
by TCP.
d. Most firewalls are
configured to block UDP
traffic, using TCP for video and
voice traffic lets the traffic
though the firewalls.
Host A is sending Host B a
False
large file over a TCP
connection. Assume Host B has
no data to send Host A. Host B
will not send
acknowledgments to Host A,
because Host B cannot
piggyback the
acknowledgments on data.
True or false?
https://quizlet.com/379810076/networking-chap-3-flash-cards/
3/4
22/06/2021
Describe why anChap
application
Networking
3
Networking Chap 3 Flashcards | Quizlet
They want to avoid TCP's congestion control.
Study
developer might choose to run
an application over UDP rather
than TCP.
Suppose Host A is sending a
False
large file to Host B over a TCP
connection. If the sequence
number for a segment of this
connection is m, then the
sequence number for the
subsequent segment will
necessarily be m+1. True or
false?
Suppose that the roundtrip
all in the list
delay between sender and
receiver is constant and known
to the sender. A timer would
still be necessary in protocol
rdt 3.0, assuming that packets
can be lost. Explain.
a. to detect the loss, for each
packet, a timer of constant
duration will still be necessary
at the sender.
b. the sender knows for sure
that the packet for the packet
has been lost,
c. All in the list
d. the sender knows for sure
that the ACK (or NACK) for the
packet has been lost,
https://quizlet.com/379810076/networking-chap-3-flash-cards/
4/4
23/06/2021
networks chapter 1 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
networks chapter 1
Study
networks chapter 1
Terms in this set (42)
end system/host
transmission rate is measured
user devices that connect to the internet
bits/second
in
packet
the data + header bytes sent from one end system
to another
takes a packet arriving on one of its incoming
communication links and forwards that packet on
what does a packet switch do?
one of its outgoing communication links
ex: routers, link-layer switches (typically used in
access networks)
Transmission Control Protocol
Internet Protocol
TCP and IP stand for
IP protocol specifies the format of the packets that
are sent and received among routers and end
systems
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
1/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
How does one
program1
networks
chapter
Internet API: a set of rules that the sending program
Study
running on one end system
must follow so the Internet can deliver the data to
instruct the internet to deliver
the destination program
data to another program
running on another end
system?
defines the format and order of messages
exchanged between two or more communicating
what is a protocol?
entities, as well as the actions taken on the
transmission and/or receipt of a message or other
event
digital subscriber line
DSL
DSL modem uses the existing telephone line to
exchange data with a digital subscriber line access
multiplexer
fiber to the home (FTTH)
optical fiber path from the central office directly to
the home
local area network: connects an end system to the
LAN
edge router
ethernet is the most prevalent access technology
how many seconds does it take
L/R seconds (intuitive)
to send a packet of L bits over
a link with transmission rate R
bits per second?
describe store-and-forward
transmission
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
packet switch must receive the entire packet before
it can begin to transmit the first bit of the packet
onto the outbound link
2/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
what is the end-to-end delay
d_end-to-end = N*L/R
Study
for sending one packet of size
L from source to destination
over a path consisting of N
links each of rate R?
router examines the packet's destination address
what happens when a packet
arrives at a router?
and forwards the packet to an adjacent router
according to its forwarding table (that maps
destination addresses to the router's outbound
links)
the resources needed along a path to provide for
communication between the end systems are
reserved for the duration of the communication
session between the end systems
circuit switching
ex: traditional telephone networks
establish a connection before sending any
information--reserve a constant guaranteed
transmission rate for the duration of the
communication
dedicated end-to-end connection
these resources are not reserved; a session's
messages use the resources on demand, and
therefore might have to wait for access to a
packet switching
communication link
ex: internet
no link resources reserved whatsoever
if a link is congested, packet waits in a buffer
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
3/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
frequency spectrum of a link is divided up among
Study
the connections established across the link
frequency-division multiplexing
(FDM)
(link dedicates a frequency band to each
connection for the duration of the connection bandwidth 4 kHz)
telephone networks
time is divided into frames of fixed duration; each
frame divided into a fixed number of time slots
time-division multiplexing
time domain segmented into frames
(TDM)
with TDM, each circuit gets all the bandwidth
periodically during brief intervals of time
therefore no transmission openings are ever wasted
packet switching:
pros
-better sharing of transmission capacity than circuit
switching
packet switching vs circuit
-simpler, more efficient, less costly to implement
switching
-packet switching allocates link use on demand
cons
-packet switching not suitable for real-time services
(telephone calls, video calls) b/c of variable and
unpredictable end-to-end delays
tier-1 ISP
levels of ISP
regional ISP
access ISP
a group of one or more routers (at the same
point of presence (PoP)
location) in the provider's network where customer
ISPs can provide to the provider ISP
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
4/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
two nearby ISPs at the same level of hierarchy
Study
directly connect their networks together so that all
what does it mean for two ISPs
traffic between them passes over the direct
to "peer"?
connection rather than though upstream
intermediaries
IXP (internet exchange point)
third-party meeting points where multiple ISPs can
peer together
see p34
layers (low to high)
-end system
Network Structure 5
-access ISP
-regional ISP
-IXPs
-Tier 1/content provider networks
nodal processing delay
queuing delay
types of packet delay
transmission delay
propagation delay
add up to total delay
processing delay
time required to examine the packet's header and
determine where to direct the packet (milliseconds)
at the queue in a router, the packet experiences a
queuing delay
queuing delay as it waits to be transmitted onto the
link(microseconds to milliseconds)
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
5/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
our packet can be transmitted only after all the Study
packets that have arrived before it have been
transmitted
transmission delay
Length of packet = L
transmission rate from router A to router B = R
transmission delay = L/R
(time required to push all the packet's bits into the
link)
once a bit is pushed into the link, it propagates at
around the speed of light to router B
propagation delay
distance between two routers divided by
propagation speed
on the order of milliseconds, for wide-area
networks
transmission = time it takes a tollbooth to service an
entire caravan of cars (after the entire caravan has
lined up behind the tollbooth)
transmission vs propagation
propagation = time it takes to travel between
delay
tollbooths
transmission delay is significant for large packets
sent over low-speed dial-up modem links
a queue preceding a link has finite capacity
packet loss
if a packet arrives at a full queue, the packet is
dropped --> lost
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
6/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
1. when the user specifies a destination hostname,
Study
the source's traceroute program sends multiple
packets towards the destination.
2. the packets work their way towards the
how does Traceroute work?
destination, passing through a series of routers
3. when a router receives one of those special
packets, it sends back to the source a short
message that contains the name and address of the
router
rate at which destination host receives the file
throughput in computer
source host sends (bits per second)
networks
throughput is as high as the transmission rate of the
bottleneck link
ex: HTTP (web document request and transfer),
application layer protocols
SMTP (transfer of email messages), FTP (file transfer)
implemented in software in the end systems
transports application-layer messages between
application endpoints
TCP, UDP
transport layer
TCP: breaks long messages into shorter segments,
congestion-control
UDP: connectionless service to its applications (no
flow control, no reliability, no congestion control)
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
7/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
moves network-layer packets known as datagrams
Study
from one host to another
TCP or UDP passes a transport-layer packet
(segment) to the network layer
network layer provides the service of delivering the
segment to the transport layer in the destination
network layer
host
IP protocol, routing protocols
also called IP layer
network layer routes a datagram through a series of
routers between source and destination
to move a packet from one node (host or router) to
the next node in the route, the network layer relies
on the services of the LINK LAYER
link layer
link layer delivers the datagram to the next node
along the route
link layer protocols include: ethernet, wifi, cable
DOCSIS
packet in link layer is called a FRAME
physical layer
moves the individual bits within the frame from one
node to the next
virus: malware that require some form of user
describe the two types of
interaction to infect the user's device
malware
worm: malware that can enter a device without any
explicit user interaction
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
8/9
23/06/2021
networks chapter 1 Flashcards | Quizlet
networks chapter 1
vulnerability attack: if the right sequence of packets
Study
is sent to a vulnerable application or OS, the service
can stop/host can crash
bandwidth flooding: attacker sends a deluge of
three types of DoS attack
packets to the targeted host, clogging the target's
access link; nobody else can reach the server
connection flooding: attacker establishes a large
number of half-open or fully open TCP connections;
host stops accepting legitimate connections
passive receiver that records a copy of every packet
that flies by
can be deployed in wireless AND wired networks!
packet sniffing
packet sniffers are passive (they do not inject
packets into the channel) and so they're difficult to
detect
defense: cryptography
create a packet with an arbitrary (false) source
address, packet content, and destination address
IP spoofing
destination thinks the packet is coming from a
legitimate source address and then follows packet
instructions
solution: end-point authentication
https://quizlet.com/122137188/networks-chapter-1-flash-cards/
9/9
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Networks Chapter 3
Study
Networks Chapter 3
Terms in this set (47)
On the sending side, the transport layer converts
the application-layer messages it receives from a
sending application process into transport-layer
Segment
packets, known as transport-layer segments in
Internet terminology. This is done by (possibly)
breaking the application messages into smaller
chunks and adding a transport-layer header to each
chunk to create the transport-layer segment.
User Datagram Protocol (UDP)
Provides an unreliable, connectionless service to
the invoking application.
Provides a reliable, connection-oriented service to
Transmission Control Protocol
the invoking application. The application developer
(TCP)
selects between UDP and TCP when creating
sockets.
The job of gathering data chunks at the source host
from different sockets, encapsulating each data
Multiplexing
chunk with header information (that will later be
used in demultiplexing) to create segments, and
passing the segments to the network layer is...
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
1/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
At the receiving end, the transport layer examines
Study
these fields to identify the receiving socket and then
Demultiplexing
directs the segment to that socket. This job of
delivering the data to the transport-layer segment
to the correct socket is...
The layer is the fourth layer of the OSI reference
model. It provides transparent transfer of data
Transport Layer
between between end systems using the services of
the network layer (e.g. IP) below to move PDU's of
data between two communicating systems.
Virtual ports are part of TCP/IP networking. These
Port
ports allow software applications to share hardware
resources without interfering with each other.
A method for communicating between client and
Socket
server programs. It is defined as "the endpoint in a
connection."
TCP connection provides a full-duplex service: If
there is a TCP connection between Process A on
one host and Process B on another host, then
Connection
application layer data can flow from Process A to
Process B at the same time as application layer data
flows from Process B to Process A. It is also pointto-point, that is, between a single sender and a
single receiver.
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
2/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
TCP is said to be __________ because before one
Study
application process can begin to send data to
Connection-Oriented
another, the two processes must first "handshake"
with each other--that is, they must send some
preliminary segments to each other to establish the
parameters of the ensuing data transfer.
a security scanner used to discover hosts and
Nmap
services on a computer network, thus creating a
"map" of the network.
Listening Socket
The servers socket just sits there and waits for a
connection.
It is a type of connectionless network socket, which
Datagram Socket
is the sending or receiving point for packet delivery
services. Each packet sent or received on this
socket is individually addressed and routed
Each port number is a 16-bit number, ranging from 0
Well-Known port numbers
to 65535. The port numbers ranging from 0 to 1023
are called well-known-port-numbers.
A data transmission method used in packet
switching networks by which each data unit is
Connectionless Transport
individually addressed and routed based on
information carried in each unit, rather than in the
setup information of a prearranged, fixed data
channel as in connection-oriented communication.
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
3/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
Checksum
It is used to determine whether bits within the UDP
Study
segment have been altered as it moved from source
to destination.
ACK
NACK
The message was received and was not garbled
The message was received but garbled
Definitions of the rdt1.0 sender and receiver are
Finite State Machine
shown in Figure 3.9, page 206. Also, a mathematical
model of computation used to design both
computer programs and sequential logic circuits.
Application-specific function ought to reside on the
End-to-End Principal
end nodes instead of the intermediary nodes. This
provides error detection for UDP.
Reliable data transfer protocols based on such
Automatic Repeat Request
(APR)
retransmission are known as ARQ. It is an errorcontrol method for data transmission that uses ACKs
and timeouts to achieve reliable data transmission
over an unreliable service.
An interruppted signal generated by a program or
Timeout
device that has waited for a certain length of time
for some input but has not received it.
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
4/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
The receiver an ACK signifying that the receiverStudy
has
received all data preceding the acknowledged
sequence number. The sender sets the sequence
Cumulative ACK
number field to the sequence number of the
payload byte in the segments data field, and the
receiver sends an ACK specifying the sequence
number of the next byte they expect to receive.
Stop-and-Wait
The sender sends a message and waits for the
receivers response.
A simple solution to duplicate packets is to add a
new field to the data packet and have the sender
Sequence Number
number its packet by putting a these into this field.
Also, a they allows the transport layer functions on
the destination host to reassemble segments in the
order in which they are transmitted.
Maximum Transmission Unit
(MTU)
The MTU of a communications protocol of a layer is
the size (in bytes) of the largest protocol data unit
that the layer can pass onwards.
The ____ is typically set by first determining the
length of the largest link-layer frame that can be
Maximum Segment Size (MSS)
sent by the local sending host (the so-called MTU),
and then setting the ___ to ensure that a TCP
segment plus the TCP/IP header length will fit into a
single link-layer frame.
As the protocol operates, this window (figure 3.19
Window Size
page 220) slides forward over the sequence number
space. For this reason, N is often referred to as...
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
5/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
As the protocol operates, this window (figure 3.19
Study
page 220) slides forward over the sequence number
Sliding Window
space. For this reason, N is often referred to as the
window size and the GBN protocol itself as a
sliding-window protocol.
The time required for a signal pulse or packet to
Round Trip Time (RTT)
travel from a specific source to a specific
destination and back again.
SYN
FIN
Synchronize sequence numbers. Only the first
packet sent from each end should have this flag set.
No more data from the sender
They are controls bits that indicate different
TCP Flags
connection states or information about how a
packet should be handled.
It is a bi-directional data transmission technique in
the network layer. It makes the most of the sent data
Piggybacking
frames from receiver to emitter, adding the
confirmation that the data frame sent by the sender
was received successfully.
It is a standardized technique in computer
networking for determining the maximum
Path MTU Discovery
transmission unit size on the network path between
two internet protocol hosts, usually with the goal of
avoiding IP fragmentation.
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
6/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
Fast retransmit
In the case that three duplicate ACKs are received,
Study
the TCP sender performs this, retransmitting the
missing segment before that segment's timer
expires.
In this attack, the attacker(s) send a large number of
TCP SYN segments, without completing the third
SYN Flood Attack
handshake step. With the deluge of SYN segments,
the server's connection resources become
exhausted as they are allocated (but never used!)
for half-open connections.
It is part of the congestion-control strategy. It is
used in conjunction with other algorithms to avoid
Slow Start
sending more data than the network is capable of
transmitting, that is, to avoid causing network
congestion.
Exponential Weighted Moving
Avg
It is a type of infinite impulse response filter that
applies weighting factors which decrease
exponentially.
It is thus a speed-matching service--matching the
Flow Control
rate at which the sender is sending against the rate
at which the receiving application is reading.
TCP State Diagram
TCP protocol running on each host make transitions
through various TCP states.
The rate at which the transport layer sends
Offered Load
segments into the network will be denoted lamda_in
bytes/sec. lamda_in is sometimes referred to as...
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
7/8
22/06/2021
Networks Chapter 3 Flashcards | Quizlet
Networks Chapter 3
Congestion Control
AMID
Congestion
As noted earlier, a TCP sender can also be throttled
Study
due to congestion within the IP network; this form
of sender control is referred to as...
The congestion control for TCP. Know for
"Sawtooth"
Different sources compete for resources inside a
network.
One of the factors that determines the number of
Congestion Window
bytes that can be outstanding at any time. This is not
to be confused with TCP window size which is
maintained by the receiver.
Because three segments are sent between two
hosts, the connection-establishment procedure is
Three-Way Handshake
often referred to as a _______. Often referred to as
"SYN-SYN-ACK" because there are three messages
transmitted by TCP to negotiate and start a TCP
session between two computers.
https://quizlet.com/38886599/networks-chapter-3-flash-cards/
8/8
22/06/2021
Networks Final - OSI Model Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
Networks Final - OSI Model
Study
Networks Final - OSI Model
Terms in this set (15)
What does OSI stand for?
Open System Interface
7. Application
6. Presentation
What are the 7 layers of the
OSI model?
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
What's the difference between
TCP/IP model and OSI model?
TCP/IP model does not have a presentation and
session layer and instead are represented by the
application layer.
- Layered architecture allows identification, welldefining relationship of large complex system's
specific parts.
Why Layering in the OSI
model?
- modularization eases maintenance, updating of
system
- change of implementation of layer's service
transparent to rest of system so for example: in
airline functionality, change in gate procedure
doesn't affect the rest of the system.
https://quizlet.com/463347875/networks-final-osi-model-flash-cards/
1/3
22/06/2021
Networks Final - OSI Model Flashcards | Quizlet
Networks Final - OSI Model
1. Flow control (do not overwhelm the receiver)Study
List five tasks that a layer can
2. Error control (correct delivery or indication of
perform. Is it possible that one
(or more) of these tasks could
be performed by two (or more)
layers?
problems)
3. Segmentation/Reassembly
4. Multiplexing
5. Connection setup/release
Yes, these can be performed on each layer.
- Application-layer message: data which an
application wants to send and passed onto the
transport layer
What is an application-layer
- transport-layer segment: generated by the
message? A transport-layer
transport layer and encapsulates application-layer
segment? A network-layer
message with transport layer header
datagram? A link-layer frame?
- network-layer datagram: encapsulates transportlayer segment with a network-layer header
- link-layer frame: encapsulates network layer
datagram with a link-layer header
Which layers in the Internet
- Physical layer
protocol stack does a router
- Link layer
process?
- Network layer
Which layers in the Internet
- Physical layer
protocol stack does a link-layer
- Link layer
switch process?
- Physical layer
Which layers in the Internet
- Link layer
protocol stack does a host
- Network layer
process?
- Transport layer
- Application layer
https://quizlet.com/463347875/networks-final-osi-model-flash-cards/
2/3
22/06/2021
What is the application
layer
Networks
Final - OSI
Model
Networks Final - OSI Model Flashcards | Quizlet
For providing services to the user
Study
responsible for?
What is the transport layer
For delivery of a message from one process to
responsible for?
another
What is the network layer
For the delivery of packets from the original source
responsible for?
to the final destination
What is the data link layer
For transmitting frames from one node to the next
responsible for?
What is the physical layer
For transmitting individual bits from one node to the
responsible for?
next
Which layers in the OSI work as
Application, Presentation, Session, Transport
peer to peer?
https://quizlet.com/463347875/networks-final-osi-model-flash-cards/
3/3
22/06/2021
NWC Flashcards | Quizlet
Home / Science / Computer Science / Computer Networks
NWC
Study
NWC
Terms in this set (52)
Suppose datagrams are limited to 1500bytes
including IP header of 20 bytes. UDP header is 8
bytes. How many datagrams would be required to
send an MP3 of 80000 bytes.
D
53
54
56
55
This command identifies the receiver of the
message in email.
A
RCPT TO
DATA
MAIL FROM
HELO
https://quizlet.com/vn/243943656/nwc-flash-cards/
1/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Because FTP uses a separate control connection
Study
different from data connection, FTP is said to sent its
control information ______
C
Outside-Band
In-Bandwidth
Out-of-band
In-band
The ____ on the physical medium of the link is a little
than or equal to the speed of light
B
Processing Delay
Propagation delay
Transmission delay
Queueing delay
Assume an Ethernet network has speed of 15Mbps.
In the exponential backoff phase of CSMA/CD, after
the first collision of a frame, the adapter then waits
..... before sensing the channel again.
D
Either 0 or 51.2 microseconds
Either 1 or 34 microseconds
Either 1 or 512 microseconds
Either 0 or 34 microseconds
https://quizlet.com/vn/243943656/nwc-flash-cards/
2/15
22/06/2021
NWC Flashcards | Quizlet
NWC
UDP and TCP use 1s complement checksum.
Study
Suppose you have the followings 2 bytes. 00110111
and 01001100. What is the 1s complement of the sum
of those two bytes?
D
10000011
01001100
00110111
01111100
Which one is correct about P2P network?
None of them
One user computer failure can lead to the whole
A
P2P network to fail
A Peer must contain all files for other clients to
download
A user computer is not allowed to change its IP
address
Assume the RTT 40ms, the size of the Web object
0.2Mb and the transmission rate 20Mbps, how long
does it take to download that object from a Web
Server to a client if using non-persistent HTTP.....
A
90ms
170ms
60ms
50ms
https://quizlet.com/vn/243943656/nwc-flash-cards/
3/15
22/06/2021
NWC Flashcards | Quizlet
NWC
The IP broadcast address is:
C
Study
256.256.256.256
FF.FF.FF.FF.FF
255.255.255.255
00.00.00.00
What is DDos Stand for ?
B
Data Domain Open System
Distributed Denial-of-Service
Directed Denial-of-Service
Data Denial-of-Service
Who can send ICMP error reporting messages ?
D
Destination port
Repeaters and senders
Switch
Routers and destination hosts
https://quizlet.com/vn/243943656/nwc-flash-cards/
4/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Suppose that host 10.0.0.2 initiates a connection,Study
using source port 5500 to a web sever listening at
port 80 at 128.119.40.186. The NAT translation table for
this TCP connection.
WAN Side: 138.76.29.7, 5002
LAN Side: 10.0.0., 5500
C
What are the destination IP addresses and port
numbers on the IP datagram arriving to the WAN
side of the router with interface address 138.76.29.7
?
Destination IP: 138.76.29.7, Destination Port: 80
Destination IP: 10.0.0.2, Destination Port: 80
Destination IP: 138.76.29.7, Destination Port: 5002
Destination IP: 10.0.0.2, Destination Port: 5500
What is the total delay for transmission of 1.25MB of
images over fiber optic cable with distance of 3000
km with transmission rate of 1GBps (ignore all other
delays). Assume that the speed of .....
A
2msec
20msec
10msec
21msec
MIME is short for
A
Multipurpose Internet Mail Extensions
Multiple Internet Mail Extensions
Message Internet Mail External
Multipurpose Internet Message Extensions
https://quizlet.com/vn/243943656/nwc-flash-cards/
5/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Which of the following is NOT mechanisms used
to
Study
provide for reliable date transfer?
D
Sequence numbering
ACKs
Handshaking
Checksum
What are two fundamental switching approaches for
building e network core?
D
Frame switching and circuit switching
Channel switching and datagram switching
Message switching and automatic switching
Circuit switching and packet switching
The _____ on the physical medium of the link is a little
____ than or equal to the speed of light
A
Propagation delay....less
Propagation delay....more
Processing Delay ... more
Queueing delay ...... less
Data link packet is called _____. encapsulates ______
C
Segment...datagram
Datagram.... frame
Frame.....bit chunk
Frame...datagram
https://quizlet.com/vn/243943656/nwc-flash-cards/
6/15
22/06/2021
NWC Flashcards | Quizlet
NWC
What is information used to route packet in network
Study
?
Destination Address, Source Address, and Protocol
A
fields in IPP header
Source Address field in IP header
Destination Address field in IP header
Destination Address and Source IP Post fields in IP
header
The DNS protocol runs over _____ and uses port _____
B
TCP...51
UDP...53
UDP...51
HTTP...53
Which one is incorrect about MAC address?
32bits
A
Physically set by manufacturers
Has other names such as LAN address, Ethernet
address
Can not modified by user
That an application can reply on the connection to
deliver all of its data without error and in the proper
order is called
C
Approximated data transfer
Non-Error data transfer
Reliable data transfer
Correctable data transfer
https://quizlet.com/vn/243943656/nwc-flash-cards/
7/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Which one is incorrect about UDP?
Study
No connection state
B
Has congestion control
No connection establishment
Smaller segment header overhead in comparison
with TCP
As soon as the browser receives the IP address
from ___, it can initiate a TCP connection to the HTTP
server located at port _____ at that IP address
B
Client..60
DNS..80
User...80
DNS..60
The job of delivering the data in a transport-layer
segment to the correct application process is
called_____
D
Multiplexing
Gathering
Congestion control
De-multiplexing
In OSI model, as data packet moves from the upper
the lower layer header are
B
Modified
Added
Rearranged
Removed
https://quizlet.com/vn/243943656/nwc-flash-cards/
8/15
22/06/2021
NWC Flashcards | Quizlet
NWC
The client-server model significantly relies on ___
Study
infrastructure servers, the Peer-to-Peer model,
instead, pairs of interminably connected peers,
communicates ___ with each other
A
Always-on ...directly
Usually-off....indirectly
Usually-off...directly
Always-on....indirectly
Suppose a subnet has a block of IP addresses
101.101.101.0/4, which address belongs to that block ?
C
101.101.101.122
101.101.101.111
101.101.101.1
101.101.101.131
That is the MAC protocol used in 802.11 network>
C
CSMA/CD
frame Relay
CSMA/CA
Token passing
What is the 32-bit binary equivalent of the IP
address 1.255.8.252 ?
00000001.11111110.00001000.11111110
B
00000001.11111111.00001000.11111100
00000011.11111110.00001000.11111100
00000111.11111111.00001000.11111100
https://quizlet.com/vn/243943656/nwc-flash-cards/
9/15
22/06/2021
NWC Flashcards | Quizlet
NWC
A set of rules or guidelines that govern interactions
Study
between two computer systems in a computer
network is called_____
D
Network policies
Network conventions
Network rules
Network protocols
If the buffer of the router in the Internet is full, the
router will_____
D
Modify the packets to make it smaller
Transmit packets faster
Automatically enlarge the buffer so that it can store
more packets
Drop incoming packets, resulting packet loss
The "Time-To-Live" field in IP datagram
D
Is one, datagram is discarded
None of them
Decrease by half on passing though each router
Decrease one on passing through each router
Transport-layer packet in the Internet terminology is
referred as:
B
Packet
Segment
Frame
Datagram
https://quizlet.com/vn/243943656/nwc-flash-cards/
10/15
22/06/2021
NWC Flashcards | Quizlet
NWC
In the congestion avoidance phase of TCP
Study
congestion control, if the timeout occurs at the
current congestion window size 90, the congestion
window size will be reduce to ____ and the thresh is
B
_____
0...45
1....45
1...90
0...46
Which on is not an IP address?
B
10.130.140.10
258.222.255.1
255.222.1.1
10.100.200.0
Assume the original message to be sent 101110, the
generator is 1001. What is the remainder resulted
during the CRC computation ?
D
001
101
100
011
What is DDoS stand for ?
C
Data Domain Open System
Dominant Denial-of-Service
Distributed Denial-of-Service
Datagram Denial-of-Service
https://quizlet.com/vn/243943656/nwc-flash-cards/
11/15
22/06/2021
NWC Flashcards | Quizlet
NWC
The most important difference between FTP and
Study
HTTP is
There is no difference between those two protocols
at all
C
HTTP control information is out-of-band while FPT is
not
FTP uses two parallel TCP connections to transfer a
file while HTTP use only one connection
FTP uses one TCP connections to transfer a file
while HTTP use two or more than two parallel
connections
A packet with size of 10KB is transmitted via the link
with the transmission rate of 80kbps; the
transmission delay is
D
10s
1s
100s
1.25s
An HTTP request message always contains_____
B
A header and a body
A request line and a header
A status line, a header, and a body
A reply code
Two-dimensional parity check can
C
Detect a single bit error but not able to correct it
Detect a bust of bit errors
Correct 1 bit error
Correct a bust of bit
https://quizlet.com/vn/243943656/nwc-flash-cards/
12/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Study
Another name of Web cache is
C
Web browser
Router
proxy server
switch
Which one is not a MAC address:
AF-D0-56-F2-05-12
B
A1-000-6C-2D-15-0A
F0-62-D5-EE-EA-6B
FF-62-DE-6F-D2-DD
FTP uses port ___ for sending identification and
password and port ____ for sending data
C
20..21
60..20
21..20
20...20
Ethernet technologies provides ___ to the network
layer
A
Unreliable service
Reliable service
Safe service
Unsafe service
https://quizlet.com/vn/243943656/nwc-flash-cards/
13/15
22/06/2021
NWC Flashcards | Quizlet
NWC
Two of the most important fields in the TCP segment
Study
header are
The sequence number and the IP acknowledgment
B
number
The sequence number and the IP address
The sequence number and the NAK number
The queuing number and the acknowledgment
number
In the file distribution of the client-server model, the
server has to send____ of file to many hosts,
consuming a ____ amount of bandwidth
B
Root...more
Copies....large
Copies...small
Portion...large
There are 4 serial links between the client and the
server, with the transmission rates being 1Mbps,
3Mbps, 2 Mbps, and 1 Mbps. What is the throughput
between the client and the server?
D
3Mbps
2Mbps
4Mbps
1Mbps
https://quizlet.com/vn/243943656/nwc-flash-cards/
14/15
22/06/2021
NWC Flashcards | Quizlet
NWC
How many duplicate ACKs to trigger the Fast
Study
Retransmission mode ?
D
An option
2
1
3
Which one is the flag used for framing in PPP?
B
01111011
011111100
10000001
1000001
In HTTP response message, the status code 200
means:
Website not found
B
Request succeeded and the information is returned
in the response
Request failed and the information is not returned in
the response
Request just failed
https://quizlet.com/vn/243943656/nwc-flash-cards/
15/15
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
Study
problem set 3
Terms in this set (37)
hostname
one out of 2 identifiers for an internet host
mnemonic-appreciated by humans
2nd identifier of internet host
IP address
fixed length hierarchically structured
able to be processed by routers
DNS
translates hostnames to IP addresses
Domain name system
The DNS is (1) a distributed database implemented
in a hierarchy of DNS servers
(2) an application-layer protocol that allows hosts
to query the distributed database
a host with a complicated host name can have 1 or
more alias names.
typcially, more mnemonic than canonical hostnames
host aliasing
DNS can be invoked by an application to obtain the
canonical hostname for a supplied alias hostname
as well as the IP address of the host
https://quizlet.com/231707454/problem-set-3-flash-cards/
1/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
simple mnemonic name used instead of
Study
complicated name.
mail server aliasing
DNS can be invoked by mail application to obtain
canonical hostname for a supplied alias hostname
as well as IP address
load distribution
replicated servers such as web servers: many IP
addresses correspond to one name
each ISP has this
typcially, close to the host
does not belong to the hierarchy of servers but is
central to the DNS architecture
local DNS server
When a host makes a DNS query, the query is sent
to the local DNS server
--has local cache of recent name-to-address
translation pairs (but may be out of date)
--acts a proxy, forwarding the query into the DNS
server hierarchy
1 out of 4 problems with centralized design of DNS
single point failure
if the DNS server crashes, so does the internet
https://quizlet.com/231707454/problem-set-3-flash-cards/
2/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
2nd out of 4 problems with centralized design of
Study
DNS
Traffic volume
A single DNS server would have to handle all DNS
queries (for all the HTTP requests and e-mail
messages generated from hundreds of millions of
hosts).
3rd out of 4 problems with centralized design of
DNS
distant centralized database
A single DNS server cannot be "close to" all the
querying clients therefore, slow congested links
4th out of 4 problems with centralized design of
DNS
maintenance
would have to keep records for all Internet hosts.
Not only would this centralized database be huge,
but it would have to be updated frequently to
account for every new host
distributed hierarchical
data distributed in servers organized in a tree-like
database
structure
one of hierarchical servers
root DNS server
first contacted by local DNS server that cannot
resolve name
https://quizlet.com/231707454/problem-set-3-flash-cards/
3/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
one of hierarchical servers
top-level domain (TLD) DNS
These servers are responsible for top-level domains
server
such as com, org, net, edu, and gov, and all of the
Study
country top-level domains such as uk, fr, ca, and jp
one of hierarchical servers
authoritative DNS server
Houses publicly accessible DNS records that map
the names of publicly accessible hosts (such as web
servers, mail servers) to IP addresses
puts burden of name resolution on contacted name
server
recursive queries
the query from the requesting host asks the local
DNS server to obtain the mapping on requesting
host behalf.
iterative queries
replies to the queries are directly returned to the
local DNS.
Resource Record
response to a query
RR
stored in DNS distributed database (except local
DNS)
A four-tuple that contains the following fields:
(Name, Value, Type, TTL)
last field in resource record (RR)
TTL
TTL is the time to live of the resource record; it
determines when a resource should
be removed from a cache
https://quizlet.com/231707454/problem-set-3-flash-cards/
4/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
third field of the resource record
Study
four different types of responses:
Type
A
CNAME
NS
MX
first field of the resource record
name
Type A: name = hostname
Type NS: name = domain
Type CNAME:
CNAME name = alias hostname
Type MX: name = alias hostname of mail server
2nd field of resource record
Type A: value = IP address of hostname
Type NS: value = hostname of an authoritative DNS
server that knows how to obtain the IP addresses for
value
hosts in the domain. This would have a type A
record
Type CNAME:
CNAME canonical hostname for the alias
hostname
Type MX: value = canonical name of a mail server
that has an alias name
https://quizlet.com/231707454/problem-set-3-flash-cards/
5/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
Type A
provides the standard hostname-to-IP address Study
mapping
(relay1.bar.foo.com, 145.37.93.126, A)
This record is used to route DNS queries further
along in the query chain
Type NS
Server responding is not authoritative
(foo.com, dns.foo.com, NS), (dns.umass.edu,
128.119.40.111, A).
This record can provide querying hosts the
Type CNAME
canonical name for a hostname.
(foo.com, relay1.bar.foo.com, CNAME)
CNAME
MX records allow the hostnames of mail servers to
have simple aliases
Note that by using the MX record, a company can
have the same aliased name for its mail server and
Type MX
for one of its other servers (such as its Web server)
To obtain the canonical name for the mail server, a
DNS client would query for an MX record; to obtain
the canonical name for the other server, the DNS
client would query for the CNAME record
https://quizlet.com/231707454/problem-set-3-flash-cards/
6/9
23/06/2021
problem set 3
problem set 3 Flashcards | Quizlet
contains the first 12 bytes which has a number of
Study
fields
identification -16 bit # for query;reply used same #
header section of DNS
message
flags
1. query or reply
2. recursion desired
3. recursion available
4. reply is authoritative
contains information about query that is being made
question section of DNS
fields:
message
1. name-name that is being queried
2. type-type of question: type A, type NS, type
CNAME, type MX
CNAME
answer section of DNS
message
authority section of DNS
reply from the DNS server which contains the
resource records (RR's) for the name that was
originally queried
contains records of other authoritative servers
message
additional section of DNS
contains other helpful records (additional
message
information that can be used)
https://quizlet.com/231707454/problem-set-3-flash-cards/
7/9
23/06/2021
problem set 3 Flashcards | Quizlet
problem set 3
By typing nslookup in command line, enables you
to
Study
send a DNS query message directly from the host
you're working on to some DNS server (root, TLD,
or authoritative)
nslookup
After receiving the reply message from the DNS
server, nslookup will display the records included in
the reply (in a human-readable format)
This works with most Windows and UNIX platforms
time it takes to distribute a file( size F) from one
server to N peers
client-server:
Dsub cs >= max {NF/u sub s, F/d sub min}
file distributed time
Dcs increases linearly with the with number of peers
(N) b/c client-server sends a copy to each peer
P2P:
Dsub p2p >= max{F/u sub s, F/d sub min,
NF/(u sub s + SUM u sub i)}
increases linearly in N...
file distribution application
BitTorrent
the application distributes a file from a single source
to a large number of peers
self-scalability
https://quizlet.com/231707454/problem-set-3-flash-cards/
8/9
23/06/2021
problem set 3 Flashcards | Quizlet
DHT
problem set
3
distributed Hash Table application
Study
each peer can redistribute any portion of the file it
scalability
has received to any other peers, thereby assisting
the server in the distribution process
message transport layer receives from the
segment
application layer is broken down into smaller chunks
and adding the transport layer header to each
chunk, creating segments
https://quizlet.com/231707454/problem-set-3-flash-cards/
9/9
22/06/2021
Q 6 Flashcards | Quizlet
Q6
Terms in this set (30)
Transmission Delay
fraction of time sender is busy
Usender Utilization
usender = (L/R) / (rtt +L/R)
Sender allows multiple, "in-flight", yet to be
pipelining
acknowledged packets.
-range of sequence numbers must be increased
-buffering at sender and/or receiver
Two generic forms of pipelined
Go-Back-N
protocols
selective repeat
-sender can have up to N unacked packets in
pipeline
-receiver only sends cumulative ack
Go-Back-N protocol
-doesn't ack packet if there's a gap
-sender has timer for oldest unacked packet
-when timer expires, retransmit all unacked packets
Q6
https://quizlet.com/542401477/q-6-flash-cards/
-may recieve duplicate ACKS
1/9
22/06/2021
Q 6 Flashcards | Quizlet
-sender can have up to N unack'ed packets in
pipeline
Selective Repeat Protocol
-rcvr sends individual ack for each packet
-sender maintains timer for each unacked packet
-when timer expires, retransmit only that unacked
packet
is TCP go back n or selective
GO BACK N
repeat
window
window of up to N consecutive unacknowledged
packets allowed
discard and no receiver buffering
GBN out of order packet
re-ACK pkt with highest in-order packet
Q6
https://quizlet.com/542401477/q-6-flash-cards/
2/9
22/06/2021
Q 6 Flashcards | Quizlet
-(Doesnt have to be acknowledged consecutive or
in order)
-each packet has a timer
-received out of order put wait until you have them
all in order
-buffering at receiver
-receiver individually acknowledges all correctly
received pkts
selective repeat protocol pt.2
-buffers pkts, as needed, for eventual in-order
delivery to upper layer
-sender only resends pkts for which ACK not
received
-sender timer for each unACKed pkt
sender window
-N consecutive seq #'s
-limits seq #s of sent, unACKed pkts
data from above:
-if next available seq # in window, send pkt
timeout(n):
selective repeat sender
-resend pkt n, restart timer
ACK(n) in [sendbase,sendbase+N]:
-mark pkt n as received
-if n smallest unACKed pkt, advance window base
to next unACKed seq #
Q6
https://quizlet.com/542401477/q-6-flash-cards/
3/9
22/06/2021
Q 6 Flashcards | Quizlet
pkt n in [rcvbase, rcvbase+N-1]
-send ACK(n)
-out-of-order: buffer
-in-order: deliver (also deliver buffered, in-order
pkts), advance window to next not-yet-received pkt
selective repeat receiver
pkt n in [rcvbase-N,rcvbase-1]
-ACK(n)
otherwise:
-ignore
point-to-point:
-one sender, one receiver
reliable, in-order byte steam:
-no "message boundaries"
TCP
pipelined:
-TCP congestion and flow control set window size
-full duplexed data
-connection-oriented
-flow controlled
Q6
https://quizlet.com/542401477/q-6-flash-cards/
4/9
22/06/2021
Q 6 Flashcards | Quizlet
-full duplex data:
bi-directional data flow in same connection
MSS: maximum segment size
TCP
a. full duplex data
-connection-oriented:
b. connection-oriented
handshaking (exchange of control msgs) inits
c. flow controlled
sender, receiver state before data exchange
-flow controlled:
sender will not overwhelm receiver
5 rows of 32 bits/4 bytes going down
TCP header
length: 32 bits/4 bytes
MINIMUM 160 bits/20 bytes
which are used to establish
connection: ACK, SYN
connection and teardown in
teardown: RST, FIN
TCP header
TCP header: receive window
MSS
flow control
# of bytes receiver is willing to accept
Maximum Segment Size
byte stream "number" of first byte in segment's data
TCP Sequence Numbers
get incremented by adding the byte length
Q6
https://quizlet.com/542401477/q-6-flash-cards/
5/9
22/06/2021
Q 6 Flashcards | Quizlet
seq # of next byte expected from other side
-cumulative ACK
-driven by data and initial number is random
TCP Acks
-receiver is expected to receive a certain number of
bytes
Q: how receiver handles out-of-order segments
A: TCP spec doesn't say, - up to implementor
longer than RTT
-but RTT varies
TCP Timeout
too short: premature timeout, unnecessary
retransmissions
too long: slow reaction to segment loss
SampleRTT: measured time from segment
transmission until ACK receipt
-ignore retransmissions
TCP RTT
SampleRTT will vary, want estimated RTT "smoother"
-average several recent measurements, not just
current SampleRTT
EstimatedRTT = (1- α)EstimatedRTT + αSampleRTT
how TCP estimates RTT
-exponential weighted moving average
-influence of past sample decreases exponentially
fast
-typical value: α = 0.125
Q6
https://quizlet.com/542401477/q-6-flash-cards/
6/9
22/06/2021
Q 6 Flashcards | Quizlet
Estimated RTT plus safety margin
Timeout Interval
Timeout Interval = EstimatedRTT + 4*DevRTT
estimate SampleRTT deviation from EstimatedRTT:
DevRTT = (1-β)DevRTT + β|SampleRTTDeviation
EstimatedRTT|
(typically, β = 0.25)
TCP creates rdt service on top of IP's unreliable
service
-pipelined segments
TCP reliable data transfer
retransmissions triggered by:
-cumulative acks
-single retransmission timer
retransmissions triggered by:
-timeout events
-duplicate acks
Q6
https://quizlet.com/542401477/q-6-flash-cards/
7/9
22/06/2021
Q 6 Flashcards | Quizlet
data rcvd from app:
-create segment with seq #
-seq # is byte-stream number of first data byte in
segment
-start timer if not already running
-think of timer as for oldest unacked segment
-expiration interval: TimeOutInterval
TCP Sender Events
timeout:
-retransmit segment that caused timeout
-restart timer
ack rcvd:
-if ack acknowledges previously unacked segments
-update what is known to be ACKed
-start timer if there are still unacked segments
TCP cumulative acks
if two segments are sent back to back just send ack
for the second one
if there is an arrival of an out of order segment that
is higher than the expected sequence # a gap is
TCP duplicate ack
detected and to solve it, immidietly send duplicate
ack, with the sequence number of the next
expected byte
Q6
https://quizlet.com/542401477/q-6-flash-cards/
8/9
22/06/2021
Q 6 Flashcards | Quizlet
Time-out period often relatively long:
-long delay before resending lost packet
Detect lost segments via duplicate ACKs
-sender often send many segments back to. back
-if segment is lost there will likely be many duplicate
ACKs
TCP fast retransmit
If the timer is still running but receiver keeps
sending the same Acks over and over the sender
doesnt wait for the timer to be over before sending
the missing segment
helps run faster since it doesnt wait for timer to be
over
https://quizlet.com/542401477/q-6-flash-cards/
9/9
22/06/2021
Quiz-06 Flashcards | Quizlet
Quiz-06
Terms in this set (39)
Domain Name System, is implemented in hierarchy
DNS
of many name servers
hosts, name servers communicate to resolve names
hostname to IP address translation
DNS services
host aliasing
mail server aliasing
load distribution
single point of failure
Why not centralize DNS?
traffic volume
distant centralized database
maintenance
client queries root server to find com DNS server
Client quiries .com DNS server to get amazon.com
Amazon DNS query
DNS server
client queries amazon.com DNS server to get IP
address for www.amazon.com
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
1/11
22/06/2021
Quiz-06 Flashcards | Quizlet
contacted by local name server that can not
resolbe name
DNS: root name servers
root name server: contanct authoritative name
server if name mapping not know
gets mapping
returns mapping to local name server
responsible for com, org, net, edu, aero, jobs,
top-level domain (TLD) servers:
museums, and all top-level country domains, e.g.:
uk, fr, ca, jp
Network solutions maintains servers for .com TLD
organization's own DNS server(s), provinding
authoritative hostname to IP mappings for
authoritative DNS servers
organization's named hosts
can be maintained by organization or service
provider
does not strictly belong to hierarchy
each ISP has one
Local DNS name server
when host makes DNS query, query is sent to its
local DNS server; has local cache of recent nameto-address translation pairs; acts as proxy, forwards
query into hierarchy
contacted server replies with name of server to
iterated query
contact
"I don't know this name, but ask this server"
puts burden of name resolution on contacted name
revursive query
server
heavy load at upper levels of hierarchy?
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
2/11
22/06/2021
Quiz-06 Flashcards | Quizlet
one (any) name server learns mapping, it caches
mapping, they time out TTL
TLD servers typically cached in local name servers
DNS: caching, updating
records
cached entries may be out-of-date, if name host
changes IP address, may not be known internetwide until all TTLs expire
distributed database storing resource records
DNS records
RR fromat: (name, value, type, ttl)
name is hostname
type=A records
value is IP address
type=NS
name is domain (e.g., foo.com)
name is alias name for come "canonical" (the real>
name
type=CNAME
www.ibm.com is really servereast.backup2.ibm.com
value is canonical name
type=MX
slide 67 of ch2 ppt
value is name of mailserver associated with name
...
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
3/11
22/06/2021
Quiz-06 Flashcards | Quizlet
register name at DNS registrar
provide names, IP addresses of authoritative name
Inserting records into DNS
server (primary and secondary)
registrar inserts two RRs into .com TLD server
create authoritative server type A record, and type
MX record for mail server
no always-on server
arbitrary end systems directly communicate
peers are intermittently connected and change IP
Pure P2P architecture
address
e.g. file distribution
streaming
VoIP
how much time to distribute file
peer upload/download capacity is limited resource
(size F) from one server to N
peers?
must sequentially send (upload) N file copies:
server transmission
time to send one copy: F/us
time to send N copies: NF/us
each client must download file copy
client
dmin = min client download rate
min client downloat time: F/dmin see slide 74 ch2
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
4/11
22/06/2021
Quiz-06 Flashcards | Quizlet
file divided into 256kb chunks
peers in torrent send/receive file chunks
peer joining torrent; has no chunks, but will
accumulate them over time from other peers
registers with tracker to get list of peers, connects
to subset of peers
Torrent
while downloading, peer uploads chunks to other
peers
peer may change peers with whom it exchanges
chunks
churn: peers may come and go
once peer has entire file, it may (selfishly) leave or
(altruistically) remain in torrent
CDN
content distribution networks
major consumer of internet bandwidth
video trafffic
different users have different capabilities
solution: distributed, application-level infrastructure
video sequence of images diplayed at constant
rate; e.g., 24 images/sec
digital image: array of pixels; each pixel represented
Multimedia: video
by bits
coding: use redundancy within and between images
to decrease # bits used to encode images
spatial (within image)
temporal (from one image to the next)
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
5/11
22/06/2021
Quiz-06 Flashcards | Quizlet
CBR: (constant bit rate): video encoding rate fixed
VBR (varaible bit rate): video encoding rate changes
Multimedia video continued
as amount of spatial, temporal coding changes
e.g., MPEG 1 (CD-ROM) 1.5Mbps
MPEG2 (DVD) 3-6Mbps
MPEG4 (often used in Interent, < 1Mbps)
DASH: Dynamic, Adaptive Streaming over HTTP
server: divides file into multiple chunks, each chunk
stored, encoded at different rates, manifest file:
provides URLs for different chunks
Streaming multimedia: DASH
client: periodically measure server-to-client
bandwidth, consulting manifest, requests one chunk
at a time; chooses mximum coding rate sustainable
given current bandwidth; can choose different
coding rates at different points in time (depending
on available bandwidth at time)
client determines
when: to request chunk (so that buffer starvation, or
overflow does not occur
Intelligence at client
what encoding rate: to request (higher quality when
more bandwidth available)
where: to request chunk (can request from URL
server that is "close" to client or has high avaiable
bandwidth)
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
6/11
22/06/2021
Quiz-06 Flashcards | Quizlet
challenge: how to stream content (selected from
millions of videos) to hundreds of thousands of
simultaneous users?
option 1: single, large "mega-server"
single point of failure
point of network congestion
Content Distribution Networks
long path to distant clients
multiple copies of vide sent over outgoing link
option2: sotre/server multiple copies of videos at
multiple geographically distributed sites (CDN)
enter deep: push CDN servers deep into any access
networks; closer to users
bring home: smaller number of larger clusters in
POPs near access networks; easier to maintain
CDN stores copies of content
OTT challenges: coping with a congested internet;
at CDN nodes
from which CDN node to retrieve content?
viewer behavior in presence of congestion?; what
subscriber requests content
content to place in which CDN node?
from CDN
directed to nearby copy,
retrieves content; may choose
different copy if network path
congested
goal: learn how to buiold client/server applications
that communicate using sockets
Socket Programming
socket: door between application process and endend-transport protocol
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
7/11
22/06/2021
Quiz-06 Flashcards | Quizlet
Application Example:
clent reads a line of characters (data from its
keyboard and sends data to server
UDP: unreliable datagram
sever receives the data and converts character to
TCP: reliable byte stream-
uppercase
oriented
server sends modified data to client
client receives modified data and displays line on its
screen
no 'connection' between client & server
no handshaking before sending data
sender explicitly attaches IP destination address and
port # to each packet
UDP socket programming
receiver extracts sender IP address and port # from
received packte
UDP: transmitted data may be lost or received outof-order
UDP provides unreliable ransfer of groups of bytes
("datagrams") between client and server
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
8/11
22/06/2021
Quiz-06 Flashcards | Quizlet
create socket, port=x:
serverSocket=
socket(AF_INET, SOCK_DGRAM)
read datagram from
severSocket
Socket Integration (server)
write reply to
severSocket
specifying
client address,
port number
create socket:
clientSocket=
socket(AF_INET, SOCK_DGRAM)
Create datagram with server IP and port=x; send
Socket integration (client)
datagram via clientSocket
read datagram from clientSocket
close
clientSocket
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
9/11
22/06/2021
client must contact
Quiz-06 Flashcards | Quizlet
...
server
server process must first
be running
server must have create
socket (door) that
welcomes client's
contact
client contacts server
by : creating TCP socket,
specifying IP address,
port number of server
process
when client creates
socket: client TCP
establishes connection
to server TCP
when contacted by
client, server TCP
creates new socket for
server porcess to
communicate with that
particular client
allows server to talk
with multiple clients
source port number
used to distinguish
clients
TCP provides reliable,
in-order byte-stream
transfer ("pipe")
Quiz-06
https://quizlet.com/236864161/quiz-06-flash-cards/
10/11
22/06/2021
Quiz-06 Flashcards | Quizlet
between client and
server
serverSocket=socket();
Socket Integration TCP (server)
connectionSocket =
serverSocket.accept();
Socket Integration UDP (client)
https://quizlet.com/236864161/quiz-06-flash-cards/
clientSocket = socket()
11/11
ISLAMIC UNIVERSITY OF GAZA
COMPUTER ENGINEERING DEPARTMENT
Networks Discussion
QUIZ # 3-A
Name:
Number:
Q1) Write TRUE/FALSE:
1- [ true ]An algorithm is needed with CSMA to specify what a station should do if the medium is found
busy.
2- [ false ]A Class C network is defined as few networks, each with many hosts.
Q2) Choose the correct answer:
1- Two frames interfering with each other at the receiver so that neither gets through is known as________ .
A. a collision
B. Scrambling
C. a backlog
D. a backoff
2- The process in which a protocol may need to divide a block received from a higher layer into multiple
blocks of some smaller bounded size is called‫ــــــــــــــــــــــــــــــــــــــــــ‬.
A. Subnetting
B. Reassembly
C. Fragmentation
D. Downsizing
3- The effect of the __________ is to erase the portion of the host field that refers to an actual host on a
subnet, leaving the network number and the subnet number.
A. address mask
B. subnet mask
C. echo reply
D. checksum
Q3) You have sub-netted your class C network 192.168.1.0 with a subnet mask of 255.255.255.240. Please
list the following: number of subnets, number of hosts per subnet.
#subnets=24=16
#hosts=216-2=14
Q4) You currently use the default mask for your IP network 192.168.1.0. You need to subnet your network
so that you have 30 additional networks, and 4 hosts per network. Is this possible, and what subnet mask
should you use?
2x>=30
x=5
2n-2>=4
n=3
255.255.255.248
Q5) A transport-layer message consisting of 2000 bits of data and 160 bits of header is sent to an internet
layer, which appends another 160 bits of header. This is then transmitted through two networks, each of
which uses a 20-bit packet header. The destination network has a maximum packet size of 600 bits. How
many bits, including headers, are delivered to the network-layer protocol at the destination?
2000+160+160=2320
2320/600=3.66=4
#bits=2320+4*20=2400
ISLAMIC UNIVERSITY OF GAZA
COMPUTER ENGINEERING DEPARTMENT
Networks Discussion
QUIZ # 3-B
Name:
Number:
Q1) Write TRUE/FALSE:
1- [ true ]With CSMA/CD the amount of wasted capacity is reduced to the time it takes to detect a collision.
2- [ true ]The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32bit address field in IPv4.
Q2) Choose the correct answer:
1- With _____ , a station wishing to transmit first listens to the medium to determine if another transmission is
in progress. If the medium is in use, the station must wait. If the medium is idle, the station may transmit.
A.
B.
C.
D.
ALOHA
transmission backlog delay
CSMA
Ethernet
2- A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting
entity is ___________ .
A.
B.
C.
D.
flow control
error control
data control
transmission control
3- __________ is the foundation on which all of the internet based protocols and internetworking is based.
A.
B.
C.
D.
Datagram
IP
TCP
VPN
Q3) You have sub-netted your class C network 200.138.1.0 with a subnet mask of 255.255.255.252. Please
list the following: Number of subnets, number of hosts per subnet.
#subnets=26=64
#hosts=22-2=2
Q4) You still are using the default mask for your IP network 192.168.1.0. You need to subnet your network
so that you have 5 additional networks, and 60 hosts per network. Is this possible, and what subnet mask
should you use?
2x>=5
x=3
2n-2>=60
n=6
3+6=9>8
It's Not Possible
Q5) Consider a slotted ring of length 20 km with a data rate of 10 Mbps and 400 repeaters, each of which
introduces a 1-bit delay. Each slot contains room for one source address byte, one destination address byte,
two data bytes, and five control bits for a total length of 37 bits. How many slots are on the ring? from book
ISLAMIC UNIVERSITY OF GAZA
COMPUTER ENGINEERING DEPARTMENT
Networks Discussion
QUIZ # 4-A
Name:
Number:
Q1) Write TRUE/FALSE:
1- [ false ] With unicast transmission the router may be required to forward two or more copies of an
incoming datagram.
2- [ true ] The guaranteed service is the most demanding service provided by ISA.
3- [ true ] Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.
4- [ false ] A codepoint is simply a set of state information at a router that expires unless regularly
refreshed from the entity that requested the codepoint.
5- [ false ] The three main functions of IGMP are: Neighbor acquisition, Neighbor reachability and
Network reachability.
Q2) Choose the correct answer:
1- Addresses that refer to a group of hosts on one or more networks are referred to as _________ .
a) multicast addresses
b) unicast addresses
c) broadcast addresses
d) distributed addresses
2- Four formats of Border Gateway Protocol messages are the ___________ messages.
a) open, authenticate, notification, and close
b) notify, authenticate, hold, and send
c) open, notify, keepalive, and receive
d) open, update, keepalive, and notification
3- The DS specifications refer to the forwarding treatment provided at a router as __________ . This
must be available at all routers and typically is the only part of DS implemented in interior routers.
a) WFQ
b)Qos
c) PHB
4- Designed to allow routers to cooperate in the exchange of routing information, the __________ was
developed for use in conjunction with internets that employ the TCP/IP suite. It has become the
preferred exterior router protocol for the Internet.
a) IGMP
b) BGP
c) OSPF
d) RSVP
5- Dispenses with routing metrics and simply provide information about which networks can be
reached by a given router and the ASs that must be crossed to get there.
a) distance-vector routing
b) link-state routing
c) path-vector routing
☺ Good Luck ☺
ISLAMIC UNIVERSITY OF GAZA
COMPUTER ENGINEERING DEPARTMENT
Networks Discussion
QUIZ # 4-B
Name:
Number:
Q1) Write TRUE/FALSE:
1- [ false ] Inelastic traffic easily adapts to changes in delay and throughput across an internet.
2- [ true ] The Open Shortest Path First protocol is an example of a routing protocol that uses link-state
routing.
3- [ true ] The use of resource reservation can enable routers to decide ahead of time if they can meet the
requirement to deliver a multicast transmission to all designated multicast receivers and to reserve the
appropriate resources if possible.
4- [ false ]In BGP Hosts send messages to routers to subscribe to and unsubscribe from a multicast group
defined by a given multicast address.
5- [ true ] ISA is an architecture intended to provide QoS services over IP-based internets.
Q2) Choose the correct answer:
1- If the server does not know the location of the members of the multicast group, then one way to
assure that the packet is received by all members of the group is to __________ a copy of each
packet to each network in the configuration over the least cost route for each network.
a) Multicast
b) multicast unicast
c) broadcast
d) unicast
2- __________ occurs when two neighboring routers in different autonomous systems agree to
exchange routing information regularly.
a) Neighbor acquisition b) Neighbor reachability
c) Network acquisition d) Network reachability.
3- A _________ delays packets as necessary so that the packet stream in a given class does not exceed
the traffic rate specified in the profile for that class.
a) Marker
b) dropper
c) meter
d)shaper
4- Packets are labeled for service handling by means of the 6-bit DS field in the IPv4 header or the IPv6
header. The value of the DS field, referred to as the __________ , is the label used to classify
packets for differentiated services.
a) Marking
b) classifier
c) DS codepoint
d) DS boundary node
5- Taking advantage of the broadcast nature of a LAN to provide an efficient technique for the
exchange of information among multiple hosts and routers, __________ is used by hosts and routers
to exchange multicast group membership information over a LAN.
a)BGP
b) IGMP
c) OSPF
d) RSVP
☺ Good Luck ☺
ISLAMIC UNIVERSITY OF GAZA
COMPUTER ENGINEERING DEPARTMENT
Networks Discussion
QUIZ # 5
Name:
Number:
Q1) Write TRUE/FALSE:
1- [ false ] A transport protocol can be either connection oriented, such as UDP, or connectionless, such as
TCP.
2- [ false ] There is not a need for connection establishment and termination procedures to support
connection-oriented service with a reliable network service.
3- [ true ] The credit-based flow control mechanism of TCP was designed to enable a destination to restrict
the flow of segments from a source to avoid buffer overflow at the destination.
Q2) Choose the correct answer:
1- Connection establishment in TCP always uses a ___________ .
a) Handshake
b) two-way handshake
c) three-way handshake
d) four-way handshake
2- _________ provides a means of informing the destination TCP user that significant data is in the
upcoming data stream. It is up to the destination user to determine appropriate action.
c) Alert signaling
d) Data stream signaling
a) Attention signaling
b) Urgent data signaling
3- The _________ variable represents a particular TS user at the specified host.
a) Port
b) socket
c)host
d)transport
4- To begin a connection establishment a TS user is in a __________ state.
a) LISTEN
b) ESTAB
c) CLOSED
d)OPEN
Q3) Someone posting to comp.protocols.tcp-ip complained about a throughput of 120 kbps on a 256-kbps
link with a 128-ms round-trip delay between the United States and Japan, and a throughput of 33 kbps when
the link was routed over a satellite.
a. What is the utilization over the two links? Assume a 500-ms round-trip delay for the satellite link.
For the first case, the utilization is 120/256 = 47%.
For the second case (satellite), the utilization is 33/256 = 13%.
b. What does the window size appear to be for the two cases?
ER = W/RTT
W = ER × RTT
For the first case W = (120 × 103) × (128 × 10–3) = 15360 bits = 1920 bytes
For the second case W = (33 × 103) × (500 × 10–3) = 16500 bits = 2063 bytes
c. How big should the window size be for the satellite link?
We want ER = (256 × 103) = W/(500 × 10–3)
W = 128,000 bits = 16,000 bytes.
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
Computer Networks Questions & Answers –
Internet
« Prev
Next »
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) interconnection of wide area networks
View Answer
Answer: b
Explanation: Internet is nothing but an interconnected computer network providing a variety of
communication facilities, consisting of a huge amount of small networks using standardized
communication protocols.
advertisement
Ad
ISO/IEC 19790 New Standards?
ISO/IEC 19790 Conference
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
1/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
2. To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
c) internet service provider
d) different computer
View Answer
Answer: c
Explanation: The ISPs (Internet Service Providers) are the main agents through which every
computer is connected to the internet. They are licensed to allot public IP addresses to its
customers in order to connect them to the internet.
3. Internet access by transmitting digital data over the wires of a local telephone network is
provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
View Answer
Answer: b
Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing telephone
lines to transport high-bandwidth data to service subscribers. DSL was used to allow the early
users access to the internet and it provides dedicated, point-to-point, public network access.
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
2/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
4. ISP exchanges internet traffic between their networks by __________
a) internet exchange point
b) subscriber end point
c) isp end point
d) internet end point
View Answer
Answer: a
Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange
Points. ISPs and CDNs are connected to each other at these physical locations are they help them
provide better service to their customers.
5. Which of the following protocols is used in the internet?
a) HTTP
b) DHCP
c) DNS
d) DNS, HTTP and DNS
View Answer
Answer: d
Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to
allot IPs automatically to the users on the internet, and DNS is used to connect the users to the
host servers on the internet based on the Domain Name.
advertisement
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
3/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
6. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answer: c
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are
possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative
in case IPv4 runs out of possible new addresses.
7. Internet works on _______
a) packet switching
b) circuit switching
c) both packet switching and circuit switching
d) data switching
View Answer
Answer: a
Explanation: Packet switching is the method based on which the internet works. Packet switching
features delivery of packets of data between devices over a shared network.
advertisement
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
4/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
b) internet relay chat
c) resource reservation protocol
d) local procedure call
View Answer
Answer: c
Explanation: Resource reservation protocol is a transport layer protocol used on the internet. It
operates over IPv4 and IPv6 and is designed to reserve resources required by the network layer
protocols.
9. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) RSVP
View Answer
Answer: a
Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely assign
IP address to the clients connected to the internet. The server that performs this fuction is called
the DHCP server.
advertisement
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
5/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
c) fiber distributed data interface
d) packet switching
View Answer
Answer: d
Explanation: Packet switching is not really related to media access control as it just features
delivery of packets of data between devices over a shared network. Internet is actually based on
packet switching.
Sanfoundry Global Education & Learning Series – Computer Networks.
To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice
Questions and Answers.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social
networks below and stay updated with latest contests, videos, internships and jobs!
Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest
« Prev - Computer Networks Questions & Answers – Wireless LAN
» Next - Computer Networks Questions & Answers – Bluetooth
advertisement
Recommended Posts:
1. Founder
2. Java Programming Examples on Networking
3. Digital Electronics MCQ (Multiple Choice Questions)
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
6/8
23/06/2021
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Internet - Computer Networks Questions & Answers - Sanfoundry
Information Science Questions and Answers
Electronics & Communication Engineering Questions and Answers
Electrical Engineering Questions and Answers
IOT MCQ (Multiple Choice Questions)
C# Programming Examples on Networking
Information Technology Questions and Answers
Computer Graphics MCQ (Multiple Choice Questions)
Computer Organization and Architecture MCQ (Multiple Choice Questions)
Cryptography and Network Security MCQ (Multiple Choice Questions)
Bachelor of Computer Applications Questions and Answers
Computer Science Questions and Answers
Master of Computer Applications Questions and Answers
Wireless & Mobile Communications MCQ (Multiple Choice Questions)
Neural Networks MCQ (Multiple Choice Questions)
Computer Fundamentals MCQ (Multiple Choice Questions)
SAN MCQ (Multiple Choice Questions)
Computer Networks Questions & Answers – IPv4
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is
Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect
and is passionate about competency developments in these areas. He lives in
Bangalore and delivers focused training sessions to IT professionals in Linux
Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage,
Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage
Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn |
Youtube | Instagram | Facebook | Twitter
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
7/8
23/06/2021
Internet - Computer Networks Questions & Answers - Sanfoundry
Subscribe Sanfoundry Newsletter and Posts
Name*
Email*
Subscribe
About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact






© 2011-2021 Sanfoundry. All Rights Reserved.
https://www.sanfoundry.com/computer-networks-questions-answers-internet/
8/8
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions
Study
Computer Network - Questions
Terms in this set (59)
T1. What are the installation
options in Windows?
- Server with Desktop Experience
- Server Core
- Nano Server
A collection of user and computer accounts and
T1. What is the domain?
additional related objects, centrally managed by
the administrator.
- A kind of database that stores information about
users and network resources.
T1. What is a directory service?
- Has a hierarchical structure.
- In Microsoft Windows environment, domain are
implemented by directory services
of the Active Directory (AD) name.
- Local user accounts (stored and managed in the
T1. What are the types of user
local account database (SAM))
accounts?
- Domain user accounts (stored and managed by
Active Directory)
- L (local)
T1. What are the scopes in
- DL (domain local)
groups?
- G (global)
- U (universal)
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
1/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions It is a collection of computers and devices
Study
T2. What is a computer
interconnected by communications channels that
network?
facilitate communications among users and allows
users to share resources.
T2. What are the network
- ISO/OSI
reference models?
- TCP/IP
T2. What are the transport
- TCP
protocols used on the
- UDP
Internet?
ISO/OSI model:
1. Physical
2. Data Link
3. Network
4. Transport
T2. How is the ISO/OSI model
divided compared to the
TCP/IP model?
5. Session
6. Presentation
7. Application
TCP/IP model:
1. (1, 2) Network Access
2. (3) Internet
3. (4) Transport
4. (5, 6, 7) Application
- LAN: Local Area Network
T2. What types (or scales) of
- WAN: Wide Area Network
networks are there?
- MAN: Metropolitan Area Network
- SAN: Storage Area Network
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
2/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions - Bus
Study
- Ring
T2. What types of physical
network topologies are there?
- Star
- Extended Star
- Hierarchical
- Mesh
- Circuit switching
T3. What switching types are
there?
- Packet switching
--- connection-oriented or Virtual Circuit Switched
Networks
--- connectionless Networks
Upgrade to remove ads
T3. What layers can LAN
switches operate at?
Only ₪11.67/month
- Layer 2
- Layer 2 with Layer 3 features
- Multilayer
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
3/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
T3. What types
of memory- Questions - Port based memory
Computer
Network
buffering are there?
Study
- Shared memory
- Store and forward
T3. What are the switching
methods?
- Cut-through
--- Fast-forward
--- Fragment-free
- Adaptive cut-through
T4. How many bits and octets
- IP v4: 32 bits, 4 octets
are in IP v4 and IP v6?
- IP v6: 128 bits, 16 octets
T4. The header of IPv6 is
- 64-bit processing (32b in IPv4)
optimized for _____
- fixed size. IPv6 header size is 40B
The header has a _____
- simplified
IPv6 header is _____
- 128 bits (IPv4 address is 32 bits long.)
An IPv6 address has a length
of _____
T4. What are the types of
addresses?
- Unicast
- Multicast
- Anycast
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
4/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions - Multiplexing: only packets
Study
- Syntactic transparency
- Universal connectivity
- Immediate delivery
- End-to-End principles
- Loose semantics
- Subnet heterogeneity
T4. What are the principles of
New Internet Architecture
(NIA)?
- Common bearer service
- Connectionless network mechanism
- Global addressing
- Protocol layering
- Distributed control
- Global routing computation
- Regions
- Mobility principles
- Network security
- Network resource allocation
- Minimal dependency
T5. What is routing?
Routing is the act of moving information across an
internetwork from a source to a destination.
Switching vs Routing
T5. What is the differences
between switching and
routing?
Layer 2 vs Layer 3
MAC addresses vs IP addresses
Faster vs Slower
Forwards broadcasts vs Block broadcast
Lower security vs Higher security
- Unicast (one to one)
T5. What are the routing
- Broadcast (one to all)
schemes?
- Multicast (one to many)
- Anycast (one to any)
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
5/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Study
Computer Network - Questions For metric calculated as the sum of metric valuess
T5. What is the metric in packet
transmission?
T6. Routing is the process of ___
Routing algorithms are run on
___
between nodes, the best path from S(ource) do
D(estination) is SACD with the metric value equal to
3.
selecting paths in a network along which to send
network traffic.
the routers
Routable (routed) protocols:
T6. Which ones are the
Routable (routed) protocols
and the Non-routable
protocols?
IP
IPX/SPX
Apple Talk
Non-routable protocols:
NetBEUI
It is the manual editing entries in the routing table
by the administrator.
T6. What is static routing?
It is the use of routing algorithms and cooperation
What is the dynamic routing?
of routers. Dynamic routing is a better solution for
complex networks and networks with frequently
changing values of their parameters.
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
6/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Study
a
Computer Network - Questions "An Autonomous System is a set of routers under
single technical administration, using an interior
gateway protocol and common metrics to route
T6. What is an Autonomous
packets within the AS, and using an exterior
System?
gateway protocol to route packets to other ASes."
Each Autonomous System is identified by a 16 bit
number.
T6. What are the differences
between Link-State (LS) versus
Distance Vector (DV)
Protocols?
T7. What are the mandatory IP
protocol parameters?
T7. What are the types of
Configuration of IP addresses?
T7. What are the basic
components of DHCP?
T7. What are the mandatory
DHCP scope parameters?
LS converge more quickly.
LS are less prone to rooting loops.
DV require less CPU power and memory.
LS are more scalable than DV.
DV are cheaper in implementation than LS
- IP address
- Mask
- Lease time (for DHCP)
- Static configuration (by the network administrator)
- Dynamic configuration (by Dynamic Host
Configuration Protocol)
- DHCP Server
- DHCP Client
- DHCP Relay Agent
- Network IP address range
- Subnet mask
- Lease duration
A relay agent is a device (a computer or router)
T7. What is a relay agent?
which helps transfer broadacst DHCP messages
from DHCP client to remote servers.
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
7/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Study
Computer Network - Questions 16 characters. The first 15 characters is used as the
T8. NetBIOS name consists of
___
host name and the 16th character is used for service
identification on the host.
The Domain Name System (DNS) is a hierarchical,
T8. What is DNS?
distributed database that contains mappings of DNS
domain names to various types of data, such as
Internet Protocol (IP) addresses.
- recursive
T8. There are two types of
- iterative
queries:
Types of DNS servers answer:
- An authoritative answer
- A non-authoritative answer
T8. Tools for DNS
troubleshooting
T9. What is the operating
system?
- ping
- nslookup
- dig
The operating system is software for managing
computer hardware which creates application
runtime environment.
MS Windows Server working as a domain controller:
- Administrators
- Server Operators
T9. Who can share files?
A member server or stand-alone with Windows
Server:
- Administrators
- Power Users
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
8/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Study
Computer Network - Questions They are services which provide information about
T9. What are Directory
Services?
T9. What is an Active Directory?
account, resources, policies, rights, permissions, etc.
in an enterprise or organization.
Active Directory (AD) is a directory service
implemented in the MS Windows Server family.
T10. Where are Firewalls usually
Separating the internal network (LAN) from external
placed?
networks (WAN).
- Generic matches
T10. What are the matches
- Implicit matches
types in firewalls?
- Explicit matches
- Unclean matches
T11. What are the Remote
access clients?
- VPN Client
- Wireless (or Mobile) Client
- Dial-up Clien
Internet Protocol Security (IPsec) is a protocol suite
T11. What is IPSec?
for securing Internet Protocol (IP) communications
by authenticating and encrypting each IP packet of
a communication session.
"Virtualization is a framework or methodology of
dividing the resources of a computer into multiple
execution environments, by applying one or more
T12. What is virtualization?
concepts or technologies such as hardware and
software partitioning, time-sharing, partial or
complete machine simulation, emulation, quality of
service, and many others."
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
9/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions - Problems with addressing
Study
- Problem with network connectivity (including
T13. What are the typical
network problems?
routing)
- Problem with network services
--- DCHP
--- DNS
- ifconfig
- ping
T13. What are the Tools and
programs for network
monitoring and
troubleshooting?
- traceroute
- route
- nslookup
- dig
- tcpdump
- wireshark
- nmap/zenmap
T14. A stream of packets from a
flow
source to a destination is
called a ___
T14. The needs of each flow
- reliability
can be characterized by four
- delay
primary parameters:
- jitter
- bandwidth
Together these determine the
___
QoS (Quality of Service) the flow requires
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
10/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions - Overprovisioning
Study
- Buffering
- Traffic Shaping
T14. Techniques for Achieving
Good Quality of Service
Think of them
- The Leaky Bucket Algorithm
- The Token Bucket Algorithm
- Resource Reservation
- Admission Control
- Proportional Routing
- Packet Scheduling
a computer networking architecture that
T14. Differentiated Services or
DiffServ is __
specifies a simple, scalable and coarse-grained
mechanism for classifying,
managing network traffic and providing Quality of
Service (QoS) guarantees
WLAN Systems
- radio systems
- narrowband systems
T15. What is the WLAN
- spread spectrum systems
Classification?
- direct encoding
- frequency hopping
- optical systems (infrared)
WLAN - Wireless LAN
T15. The main differences
Foto
between the WLAN and LAN
T15. What are the WLAN
- Wireless Network Interface Cards (NIC)
Components?
- Wireless Access Points
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
11/12
23/06/2021
Computer Network - Questions Flashcards | Quizlet
Computer Network - Questions a method of transmitting information from one Study
T15. Fiber-optic communication
place to another by sending pulses of light through
is ___
an optical fiber. The light forms an electromagnetic
carrier wave that is modulated to carry information.
T1. What is the Active Directory
physical structure?
T1. A simple description of the
- Site
- Domain Controller (DC)
- WAN Links
a file; if something is not a file, it is a process."
UNIX system, also applicable
to Linux, is this:
"On a UNIX system, everything
is ___
The syntax is the actual structure--everything from
What is the difference between
syntax and semantics in
programming languages?
variable names to semi-colons. The syntax is the
structure or form of expressions, statements, and
program units but Semantics is the meaning of
those expressions, statements, and program units.
Semantics follows directly from syntax.
https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/
12/12
23/06/2021
Computer Network Ch6 Flashcards | Quizlet
Home / Other / Computer Skills / Cisco
Computer Network Ch6
Study
Computer Network Ch6
Terms in this set (20)
You want to implement a
DHCP
mechanism that automates the
IP configuration, including IP
address, subnet mask, default
gateway, and DNS information.
Which protocol will you use to
accomplish this?
What Layer 4 protocol with its
TCP, 23
default port should be used for
a Telnet connection?
What layer in the IP stack is
Host-to-Host
equivalent to the Transport
layer of the OSI model?
The OSI model has seven
Application
layers and the DoD has four. At
which layer does SMTP works
in both models?
Which of the following services
SNMP, SMTP, HTTP, & FTP
use TCP?
Which of the following
It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast & It
describe the DHCP Discover
uses UDP as the Transport layer protocol.
message?
https://quizlet.com/414710203/computer-network-ch6-flash-cards/
1/4
23/06/2021
What protocol
is used to Ch6
find
Computer
Network
Computer Network Ch6 Flashcards | Quizlet
ARP
Study
the hardware address of a
local device?
You need to make sure that the
NTP
time is consistent across all
your network devices. What
protocol do you need to run
on your network?
Which of the following services
SNMP, DHCP, TFTP
use UDP?
Which of the following
SMTP
protocols is used by clients to
send emails?
Which of the following allows a
They use different port numbers.
server to distinguish among
different simultaneous requests
from the same host?
You need to have secure
443
communications using HTTPS.
What port number is used by
default?
https://quizlet.com/414710203/computer-network-ch6-flash-cards/
2/4
23/06/2021
Computer Network Ch6 Flashcards | Quizlet
Computer Network Ch6
Study
Upgrade to remove ads
You need to log in to a Unix
Only ₪11.67/month
SSH
server across a network that is
not secure. Which of the
following protocols will allow
you to remotely administer this
server securely?
Which of the following
SNMP
protocols can use TCP and
UDP, permit authentication and
secures polling of network
devices, and allow for
automated alerts and reports
on network devices?
You need to have a connection
RDP
to remotely run applications
that are installed only on your
desktop computer at your
office. Which protocol will
provide a GUI interface to your
work computer?
You need to transfer files
FTP
between two hosts. Which
protocol can you use?
https://quizlet.com/414710203/computer-network-ch6-flash-cards/
3/4
23/06/2021
Which of the following
TCP/IP
Computer
Network
Ch6
Computer Network Ch6 Flashcards | Quizlet
Telnet, FTP, TFTP
Study
protocols are used at the
Application layer of the OSI
model?
Which statements are true
regarding ICMP packets?
If a client can ping a website
They can provide hosts with information about
network problems & They are encapsulated within IP
datagrams.
53
by IP address but not by
hostname, or FQDN, which of
the following port numbers
should be checked for
resolving the problem?
Which of the following uses
DNS
both TCP and UDP?
https://quizlet.com/414710203/computer-network-ch6-flash-cards/
4/4
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Home / Other / Computer Skills / Cisco
Computer TIa Network+ Chapter 4
Study
Computer TIa Network+ Chapter 4
Terms in this set (42)
Telecommunications Industry Association/
Electronic Industries Alliance - Also known as
structured cabling
TIA/EIA's joint 568 Commercial
Building Wiring Standard
Describes the best way to install networking media
to maximize performance and minimize upkeep
Apply no matter what type of media, transmission
technology, or networking speeds are involved
Based on hierarchical design and assumes a
network is based on the start topology
the physical point at which the public network of a
telecommunications company (i.e., a phone or cable
Demarc
company) ends and the private network of a
customer begins - this is usually where the cable
physically enters a building.
Location where an incoming network interface
Entrance Facility
enters a building and connects with the building's
backbone cabling.
Main distribution frame or Main cross connect is
where the first point of interconnection between an
MDF
organizations LAN or WAN and a service providers
facility. MDF contains the demarc. Usually the main
servers are housed here
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
1/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Study
Distribution frame - A junction point
Computer TIa Network+ ChapterIntermediate
4
between the MDF and end user equipment. At east
IDF
one IDF per floor. But many companies have several
data closets per floor to better manage the data
feed.
Horizontal wiring
Wiring that connects workstations to the closest
data closet. Usually wired through a plenum.
Unshielded Twisted Pair - a type of copper-based
UTP
cable that consists of one or more insulated twisted
wire pairs encased in a plastic sheath.
Shielded twisted pair - a type of copper-based
STP
cable containing twisted wire pairs that are not only
individually insulted but also surrounded by a
shielding of metallic substance such as foil.
Vertical cross connect
Runs between a building's floors.
A relatively short cable with connectors on both
Patch cable
ends to connect NICs in workstations, printers, and
other network devices to the data closet.
Device Management
Establish a good naming convention
Mounting for hardware or network equipment to
Rack systems
optimize the square footage in equipment rooms.
Keep care of airflow in rack rooms. Hot/cold aisle
layout.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
2/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Computer TIa Network+ Chapter 4
Upgrade to remove ads
Study
Only ₪11.67/month
Network Attached Storage - A form of fault
tolerance in a network, which is a specialized
storage device or group of storage devices that
provides centralized fault-tolerant data storage for
a network. Basically a server dedicated to data
NAS
sharing.
NAS device cannot communicate directly with
clients
Clients go through a file server, which
communicates with the NAS device
Techniques that allow data storage or other
Fault tolerance
operations to continue in the event of a failure or
fault of one of its components. Ex. Storing data on
multiple devices in the case one fails.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
3/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Area Network - A SAN is a network of Study
Computer TIa Network+ ChapterStorage
4
storage devices that communicate directly with
each other and with other networks
Uses a type of architecture that is similar to mesh
topology, which is very fault-tolerant
SANS use one of two types of Transport layer
protocols:
Fibre Channel (FC)
iSCSI
SANs
A SAN can be installed in a location separate from
the LAN it serves
SANs are highly scalable and have:
A very high fault tolerance
Massive storage capabilities
Fast data access
SANs are best suited to environments with huge
quantities of data that must always be quickly
available
Fibre Channel - A transport layer protocol used on
fiber-optic media instead of TCP or UDP. Fibre
Channel connects devices within the SAN and also
FC
connects the SAN to other networks.The
disadvantage to SAN is that its expensive and
requires training for IT personnel to support it. But it
is super fast.
Internet SCSI - pronounced "i scuzzy" - A transport
layer protocol that runs on top of TCP to allow fast
transmissions over LANs, WANs, and the Internet.
iSCSI
iSCI is relatively cheap over Fibre Channel and it
can be run with established Ethernet Lan by using
iSCI software on network clients and servers.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
4/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Studya
Computer TIa Network+ ChapterA 4medium for the transfer of electrical power over
Electric Circuit
closed loop.
Direct Current
Flows at a steady rate in only one direction.
Alternating Current
Continually switches direction on the circuit.
Things that change the form of electrical energy in
some way. There are 4:
Power converters
inverter
rectifier
transformer
voltage regulator
Inverter
Converts DC to AC. A generator might contain an
inverter.
Converts AC to DC. All computers require the
Rectifier
constant flow of electricity that DC power provides.
The power supply in a laptop or desktop comp
contains a rectifier.
Transformer
Voltage Regulator
Changes the voltage of AC.
Maintains a constant voltage level for either AC or
DC power.
Surge - Momentary increase in voltage.
Noise - Fluctuation in voltage caused by other
Power Flaws
devices or EMI
brownout - A momentary decrease in voltage
known as a sag.
blackout - A complete power loss.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
5/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Power Supply - a battery-operated
Study
Computer TIa Network+ ChapterUninterruptible
4
power source directly attached to devices and to a
power supply
UPS
Prevents undesired fluctuations of power from
harming the device or interrupting its services
There are two types:
Standby and Online
This provides continuous voltage by switching
Standby UPS
instantaneously to the battery when it detects a loss
of power from the wall outlet.
Uses the AC power directly from the wall to
Online UPS
continuously charge its battery while providing
power to a network device through its battery. A
server always relies on a UPS in this manner.
Volt-Ampere (VA) is the product of the voltage and
current measured in amps of electricity on a line.
To see how many VA's your device needs 1.4 voltamps = 1 Watt. A computer with 200W power supple
Power needed
will require a UPS of at least 280 VA to keep the
CPU running.
Amount of time
Line conditioning
Cost
Provides a backup power source and can be
Generator
powered by diesel, liquid propane gas, natural gas,
or steam.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
6/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Interface Card contains a transceiver that
Study
Computer TIa Network+ ChapterNetwork
4
transmits and receives data signals over the network
NIC
media. The NIC belongs to the physical layer and
data link layer of the OSI model. NICs do not
analyze information from layers 3 through 7.
Connection type (Ethernet or Wifi)
Maximum network transmission speed (100 Mbps vs
1 Gbps)
Connector interfaces (RJ-45 vs SC)
NIC Chharacteristics
Number of connector interfaces, or ports
Manufacturer
Support for enhanced features, such as PoE+,
buffering, or traffic management
Method of interfacing with the computer's
motherboard and interface standards
3 NIC interface to
motherboard methods
NIC installation
Integrated into the motherboard
Installed in an expansion slot on the motherboard
Installed as a peripheral device
2 step process. Install hardware, then install device
driver (aka software).
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
7/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Study
also called duplex - signals are free
to
Computer TIa Network+ ChapterFull-duplex,
4
travel in both directions over a medium
simultaneously
Half-duplex - signals may travel in both directions
over a medium but in only one direction at a time
Simplex - signals may travel in only one direction
Sometimes called one-way or unidirectional
NIC Transmission Types
Many network devices allow you to specify whether
the device should use half- or full-duplex
Modern NICs use full-duplex by default
If you specify a type that is not supported you get a
speed and duplex mismatch and get failed
transmissions.
Allows the NIC to select the best link speed and
duplex that is also supported by the neighboring
Auto Negotiation
device
Using UNIX or Linux, the ethtool utility allows you to
view and change NIC settings
Ethernet is a Layer 2 standard that:
Is flexible
Ethernet Frames
Capable of running on a variety of network media
Offers excellent throughput at a reasonable cost
Ethernet II is the current Ethernet standard
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
8/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
Study
Computer TIa Network+ ChapterHub
4 - Inefficient and outdated networking device
that has been replaced by switches.
CSMA/CD and Hubs
CSMA/CD (Carrier Sense Multiple Access with
Collision Detection) - The media access control
(MAC) method used by nodes for arbitration on an
old network. Taking turns to get access to the
network.
TX = Transmit. RX = Receieve. Green = Good. Yellow =
One or the other. Red = Bad.
Test with loopback plus (plugs into port and tests
cable for connectivity)
Troubleshooting NIC
Update device drivers using device manager.
Use configuration utilities provided by the NICs
manufacturer
Check the TCP/IP for the NIC's interface by pinging
the loopback address 127.0.0.1 if the ping fails the
settings are configured wrong.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
9/10
23/06/2021
Computer TIa Network+ Chapter 4 Flashcards | Quizlet
up-to-date and detailed documentationStudy
of
Computer TIa Network+ ChapterHaving
4
your network is essential to good troubleshooting
Network diagrams - graphical representations of a
network's devices and connections
May show physical layout, logical topology, IP
address reserves, names of major network devices,
and types of transmission media
Network mapping - the process of discovering and
identifying the devices on a network
Building documentation
To adequately manage a network, record the
following:
Network diagrams
Physical topology
Access methods (ethernet? wifi? etc)
Protocols
Devices
Operating systems
Applications
Configurations
Wiring Schematic
A graphical representation of a networks wired
infrastructure.
https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/
10/10
23/06/2021
Computer TIa Network+ Chapter 5 Flashcards | Quizlet
Computer TIa Network+ Chapter 5
Terms in this set (49)
Electromagnetic waves in the air or in copper wire.
Analog Signaling
They vary infinitely and continuously
Appear as a wavy line when graphed over time
Analog signals are characterized by four properties:
Amplitude
Measure of strength at given point in time
Frequency
Number of times amplitude cycles over fixed time
Analog properties
Wavelength
Distance between one peak and the next
Phase
Progress of wave over time compared to a fixed
point
Digital Signaling
Composed of pulses of precise positive voltages
and zero voltages. It's either on or off.
Computer TIa Network+ Chapter 5
https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/
1/4
23/06/2021
Computer TIa Network+ Chapter 5 Flashcards | Quizlet
Data relies on digital transmission
Network connection may handle only analog
signals
Modem
Accomplishes this translation
Data modulation
Modulator/demodulater
Data modulation
Technology modifying analog signals into digital
signals and vice versa
Make analog signals suitable for carrying data over
a communication path
FM
Frequency modulation radio - The data must travel
along a particular frequency.
Amplitude modulation - The amplitude of the carrier
AM
signal is modified by the application of the data
signal.
Carrier wave
Combined with another analog signal
Produces unique signal
Transmitted from one node to another
Carrier Wave (Standard)
Preset properties
Purpose: convey information
Information wave (data wave)
Added to carrier wave
Modifies one carrier wave property
Baseband
Transmission that are carried on a single channel
with no other
Computer TIa Network+ Chapter
5 transmission sharing the media.
https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/
2/4
23/06/2021
Computer TIa Network+ Chapter 5 Flashcards | Quizlet
Technologies in which multiple transmissions share a
Broadband
single media. Cable TV and cable Internet share the
same coaxial cable and therefore are examples of
broadband.
A form of transmission that allows multiple signal to
travel simultaneously over one medium.
- Subchannels
Multiplexing
Logical multiple smaller channels
- Multiplexer (mux)
Combines many channel signals
Required at the transmitting end of the channel
- Demultiplexer (demux)
Separates the combined signals
Time Division Multiplexing - Divides channel into
TDM
multiple time intervals. A time slot 1, B time slot 2, C
time slot 3. etc.
Transmitter assigns slots to nodes
Statistical Multiplexing
According to priority, need
More efficient than TDM
Frequency Division Multiplexing - Unique frequency
FDM
band for each communications subchannel
Cellular telephone transmission
DSL Internet access
Wavelength Division Multiplexing - One fiber-optic
connection
WDM
Carries multiple light signals simultaneously
Can transmit as many as 20 million telephone
conversations at on time.
Computer TIa Network+ Chapter 5
https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/
3/4
23/06/2021
Computer TIa Network+ Chapter 5 Flashcards | Quizlet
Dense Wavelength Division Multiplexing - Used on
most modern fiber-optic networks
DWDM
Extraordinary capacity
Typically used on high-bandwidth or long-distance
WAN links
Uses more wavelengths for signaling
https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/
4/4
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Computer TIa Network+ Chapter 6
Study
Computer TIa Network+ Chapter 6
Terms in this set (49)
Wireless Local Area Networks. Networks that
transmit signals through the air via radio frequency
(RF) waves
WLANS
Wired and wireless signals share many similarities
Use of the same Layer 3 and higher protocols
The nature of the atmosphere makes wireless
transmission different from wired transmission
The wireless spectrum is a continuum of
electromagnetic waves used for data/voice
communication
Arranged by frequencies
Wireless Spectrum
Lowest to highest
Spans 9 KHz and 300 GHz
Wireless services associated with one area
FCC oversees United States frequencies
ITU oversees international frequencies
Air signals propagate across borders
FCC
Federal Communications Commision
ITU
International Telecommunication Union
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
1/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
pattern
Computer TIa Network+ Chapter-Radiation
6
Study
Relative strength over three-dimensional area
Of all electromagnetic energy that antenna sends,
receives
-Unidirectional (directional antenna)
Antennas
Issues wireless signals along single direction
-Omnidirectional antenna
Issues, receives wireless signals
Equal strength, clarity in all directions
- Range
Reachable geographical area
Line of Sight
When obstacles are in a signal's way, the signal may:
Pass through them
LOS/Signal Propogation
Be absorbed into them
Be subject to three phenomena
Reflection: bounce back to source
Diffraction: splits into secondary waves
Scattering: diffusion in multiple different directions
- Fading
Variation in signal strength as a result of some of the
electromagnetic energy scattered, reflected, or
diffracted
Multipath signaling is a cause of fading
Signal Degregation
- Goodput is the throughput experience at the
application level
Some Web sites, called speed test sites, can
measure your upload and download speeds
To see how your connection's throughput is
affecting your good put
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
2/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Study
networks relied on these frequencies for
Computer TIa Network+ ChapterWireless
6
2.4 GHz band
years. One way to guard against losing connectivity
when "a phone picks up" is by having two different
channels within the 2.5 GHz Band.
Most wireless LANs use this frequency now. Which
5 GHz Band
comprises of for frequency bands: 5.1, 5.3, 5.4, 5.8
GHz.
Wireless Personal Area Network.
WPANs rarely exceed a few meters geographically
and usually only contain a few personal devices
WPAN
Three common wireless technologies used to
connect PAN devices are:
Bluetooth
Infrared (IR)
Near-field communication (NFC)
Bluetooth is named after a medieval king of
Denmark named Harald Bluetooth who fought to
merge several Danish tribes under a single
government.
Bluetooth unites separate entities.
Operates in the radio band of 2.4 GHz to 2.485 GHz
Bluetooth
Hops between frequencies within that band
Called frequency hopping
Requires close proximity to form a connection
Before two Bluetooth devices can connect, they
must be paired
Bluejacking - a connection is used to send
unsolicited data
Bluesnarfing - a connection is used to download
data without permission
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
3/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Computer TIa Network+ ChapterNear
6 field communication.
Study
A form of radio communication that transfers data
wirelessly over very short distances
NFC
Signal can be transmitted one way by an NFC tag,
or smart tag
When employees need access to a secure area
The NFC tag collects power from the smartphone
or other device by magnetic induction
Upgrade to remove ads
Only ₪11.67/month
ad hoc = smaller number of nodes.
Wifi WLAN Architecture
In ad hoc WLAN wireless nodes transmit directly to
each other via wireless NICs without an intervening
connectivity device.
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
4/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
access point or base station is a deviceStudy
Computer TIa Network+ ChapterWireless
6
that accepts wireless signals from multiple nodes
WAP
and re transmits them to the rest of the network. As
such they can be called wireless routers or
gateways.
Wireless mesh network - May include several access
WMN
points (APs)
Provides more fault-tolerant network access to
clients
Wireless technology standards
Most popular: developed by IEEE's 802.11
committee
Notable Wi-Fi standards
802.11 WLAN Standards
802.11b, 802.11a, 802.11g, 802.11n, 802.11ac
All standards use half-duplex signaling
Standards vary at the Physical layer
802.11n and later modify the way frames are used at
the MAC sublayer
Wireless station can either transmit or receive but
Half duplex signaling
cannot do both simultaneously unless there is more
than one transceiver installed.
802.11b
2.4ghz into 22 Mhz channels
5-Ghz band so less congested. Requires more
802.11a
power to transmit; therefore, requires more access
points of 802.11a so this is rarely preferred.
Supposed to be as affordable as 802.11b with
802.11g
increased maximum theoretical throughput and was
still compatible with 802.11b
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
5/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
compatible and uses both the 2.4 GHz
Study
Computer TIa Network+ ChapterBackwards
6
802.11n
and 5GHz bands. It also boasts a maximum
throughput of 600 Mbps.
The newest standard which operates on the 5 GHz
band and exceeds benchmarks set by earlier
802.11ac
standards. This is the first Wi-Fi standard to
approach gigabit Ethernet capabilities. These can
handle multiple transmissions at one time over the
same frequency spectrum.
Carrier Sense Multiple Access with Collision
Avoidance. Minimizes collision potential
CSMA/CA
Uses ACK packets to verify every transmission
Requires more overhead than 802.3
Real throughput less than theoretical maximum
Request to Send/Clear to Send. Ensures packets not
RTS/CTS
inhibited by other transmissions
Efficient for large transmission packets
Further decreases overall 802.11 efficiency
Packet exchanged between computer and access
point in order to gain Internet access
Another function of the MAC sublayer
- Scanning
Association
Surveys surroundings for access point
Active scanning transmits special frame
Known as a probe
- Passive scanning listens for special signal
Known as a beacon fame
SSID
Service Set Identifier, A unique character string
used to identify an access point.
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
6/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Computer TIa Network+ ChapterBasic
6 service set. Group of stations sharing an
BSS
Study
access point
BSSID (basic service set identifier)
Group of stations identifier
Extended service set
Group of access points connected to same LAN
Share ESSID (extended service set identifier)
Allows roaming
ESS
Station moving from one BSS to another without
losing connectivity
When several access points are detected
Select strongest signal, lowest error rate
Poses security risk
Could connect to a powerful, rogue access point
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
7/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
to an
Computer TIa Network+ ChapterTypes
6 of overhead required to manage access Study
802.11 network
ACKs, probes, and beacons
802.11 specifies MAC sublayer frame type
Multiple frame type groups
Management: association and reassociation
Control: medium access and data delivery
ACK and RTS/CTS frames
Data: carry data sent between stations
IEEE 802.11 Frames
802.11 data frame overhead
Four address fields
Source address, transmitter address, receiver
address, and destination address
Sequence Control field
How large packet fragmented
Frame Control field
Wi-Fi share MAC sublayer characteristics
Wi-Fi differ in modulation methods, frequency
usage, and range
Multiple input-multiple output - Multiple access
point antennas may issue signal to one or more
MIMO
receivers
Increases network's throughput, access point's
range
Multiuser MIMO - Newer technology than MIMO
that allows multiple antennas to service multiple
MU-MIMO
clients simultaneously
Reduces congestion and contributes to faster data
transmission
Available with WAVE 2 802.11ac products
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
8/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Study
Computer TIa Network+ ChapterTwo
6 adjacent 20-MHz channels bonded to make
40-MHz channel
Channel bonding
Doubles the bandwidth available in single 20-MHz
channel
Combine multiple frames into one larger frame
Two techniques:
Frame aggregation
Aggregated Mac Service Data Unit (A-MSDU)
Aggregated Mac Protocol Data Unit (A-MPDU)
Advantage: reduces overhead
One access point
Often combined with switching, routing functions
Connects wireless clients to LAN
Acts as Internet gateway
Access point WLAN placement considerations
Typical distances between access point and client
Do not exceed the distance restriction for the 802.11
standard your access point is using
Obstacles
Determining WLAN design
Type and number of, between access point and
clients
After site survey has identified and verified the
quantity and location of access points, you are
ready to install them
Must belong to same ESS and share an ESSID
Enterprise-wide WLAN design considerations
How wireless LAN portions will integrate with wired
portions
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
9/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
CDComputer TIa Network+ ChapterEach
6 AP comes with an installation program onStudy
ROM or DVD
Guides through setup process
Variables set during installation
Configuring a wireless router
Administrator password
SSID
Whether or not DHCP is used
Whether or not the SSID is broadcast
Security options
When configuring clients for wireless access to a
On-boarding
network in an enterprise environment technicians
might need to install a specific program or app.
Off-boarding
This involves removing programs that gave device
special permissions on a network.
The process of comparing and matching a client's
Authentication
credentials with credentials in a client database to
enable the client to log on to the network.
MAC filtering
Encryption
Prevents the AP from authenticating any device
whose MAC address is not listed
Use of an algorithm to scramble data
Wi-Fi Protected Access.
WPA - Assigns every transmission its own key
WPA/WPA2
dynamically.
WPA2 - Replacement for WPA
A stronger encryption protocol
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
10/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
and
Computer TIa Network+ ChapterWired
6 Equivalent Privacy. WEP is easily crackedStudy
WEP
therefore should be never used. A character string is
associated with the access point.
A hacker searches for unprotected wireless
War driving
networks by driving around with a laptop
configured to receive and capture wireless data
transmissions.
A rogue access point can be configured to sound
Evil twin
like a legitimate sounding SSID to have users
connect to.
WPA cracking involves the interception of network
WPA attacks
keys communicated between stations and access
points.
Wifi Protected Setup. A pin can be brute force
WPS attack
attacked which means trying many combinations to
find the correct one.
Two types of software tools:
- Wireless analyzer (Wi-Fi analyzer)
Can evaluate Wi-Fi network availability, optimize Wi-
Troubleshooting Wireless LAN
Fi signal settings, and help identify Wi-Fi security
threats
- Spectrum analyzer
Can assess the quality of the wireless signal
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
11/12
23/06/2021
Computer TIa Network+ Chapter 6 Flashcards | Quizlet
Study
transmitting access points, stations, and
Computer TIa Network+ Chapter- Identify
6
channels over which they are communicating
- Measure signal strength from an AP
- Indicate the effects of attenuation, signal loss, and
noise
List of capabilities common
with these tools
- Interpret signal strength information
- Ensure proper association and reassociation
between APs
- Capture and interpret traffic
- Measure throughput and assess data transmission
errors
- Analyze characteristics of each channel
SSID mismatch
Incorrect encryption
Incorrect or overlapping channels or frequencies
Mismatched standards
Wireless configuration pitfalls
to avoid
Incorrect antenna placement
Interference
Simultaneous wired and wireless connections
Problems with firmware updates
Unoptimized access point power levels
Inappropriate antenna type
Client saturation
https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/
12/12
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Home / Math / Geometry / Topology
Network+ Chapter 1 Computer Network Fundamentals
Study
Network+ Chapter 1 Computer Network
Fundamentals
Terms in this set (67)
converged network
a network transporting multiple types of traffic (for
example, voice, video, and data)
Client
the device an end user uses to access a network
Server
the device which serves up resources to a network
Hub
port
an older technology that interconnects network
components
a receptacle to which a network cable connects
interconnects network components, but does not
Switch
simply take traffic in on one port and blast that
traffic out all other ports
host
any device that transmits or receives traffic on a
network
considered to be a Layer 3 device, which means
Router
that it makes its forwarding decisions based on
logical network addresses.
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
1/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Term to describe
the physical component usedStudy
to
Network+ Chapter 1 Computer Network
Fundamentals
Media
WAN link
interconnect devices
the link that interconnects two or more networks
Local-area network
LAN
Wide-area network
WAN
Campus-area network
CAN
Metropolitan-area network
MAN
Personal-area network
PAN
LAN
interconnects network components within a local
area (for example, within a building).
Sample ______ Topology
LAN
WAN
interconnects network components that are
geographically separated
Sample ______ Topology
WAN
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
2/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Smaller scale
WAN interconnecting close proximity
Study
Network+ Chapter 1 Computer Network
Fundamentals
CAN
MAN
PAN
logical topology
physical topology
buildings. Might be found at a university, industrial
park or business park.
Smaller scale WAN interconnection location
throughout a metropolitan area
Network smaller than a LAN. Range typically limited
to a few meters
The actual traffic flow on a network determines this
The way the network components are physically
connected determines this
Topology which typically uses a cable running
through the area requiring connectivity. Devices
Bus Topology
that need to connect to the network then tap into
this nearby cable. Early Ethernet networks
commonly relied on this type of topology.
Bus Topology
Bus Topology
Topology Benefits: Less cable, less expensive, easy
to install
Topology Characteristics: One cable per segment,
Bus Topology
terminator at each end, Popular in early ethernet
networks, components tap directly into the cables
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
3/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Topology Drawbacks:
Single point of failure,
Network+ Chapter 1 Computer Network
Fundamentals
Bus Topology
Study
difficult troubleshooting, device addition can cause
outage, error on one device can impact other
devices, not scalable
Topology where traffic flows in a circular fashion
around a closed network loop. Typically, sends
Ring Topology
data, in a single direction, to each connected device
in turn, until the intended destination receives the
data.
Ring Topology
Token Ring and FDDI
Fiber Distributed Data
Two variants of a ring topology popularized in the
1990s
FDDI
Interface
counter-rotating rings
two rings which send data in opposite directions
Topology Characteristics: single or dual, a reciever
Ring Topology
and a transmitter per device, each device repeats
the signal
Ring Topology
Ring Topology
Topology Benefits: Easier troubleshooting, Dual:
increased fault tolerance
Topology Drawbacks: Not as scalable, more cable,
Single: break causes an outage
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
4/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Topology with
a central point from which all
Network+ Chapter 1 Computer Network
Fundamentals
Star Topology
Study
attached devices radiate. Most popular topology
used today.
Star Topology
Topology Characteristics: Independent connections
Star Topology
back to a central device, commonly used with
Ethernet technologies.
Star Topology
Star Topology
Topology Benefits: cable break only impacts the
connected device, relatively simple troubleshooting
Topology Drawbacks: more cable, longer
installation time
WAN Topology which has a WAN link from each
Hub-and-Spoke Topology
remote site to the main site. Similar to the star
topology used in LANs
Hub-and-Spoke Topology
Topology Characteristics: each remote site
Hub-and-Spoke Topology
connects back to the main site via a WAN link,
communication between two remote sites travels
through the main site
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
5/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Hub-and-Spoke
Topology
Topology Benefits:
Cheaper, easier to scale
Network+
Chapter
1 Computer Network
Fundamentals
Study
Topology Drawbacks: Suboptimal routes must be
Hub-and-Spoke Topology
used between remote sites, hub site is potential
single point of failure, lacks redundancy
Full-Mesh Topology
WAN topology which directly connects every site to
every other site
Full-Mesh Topology
Topology Characteristics: Direct WAN connection
to every site, the number of required WAN
Full-Mesh Topology
connections can be calculated with the formula w =
n * ( n - 1) / 2, where w = the number of WAN links
and n = the number of sites.
Full-Mesh Topology
Full-Mesh Topology
Partial-Mesh Topology
Topology Benefits: Optimal route exists between
any two sites, fault tolerant, easy troubleshooting
Topology Drawbacks: Difficult and expensive to
scale
WAN topology which is a hybrid of the hub-andspoke topology and full-mesh topology.
Partial-Mesh Topology
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
6/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Topology Characteristics:
Selected sites are
Network+ Chapter 1 Computer Network
Fundamentals
Partial-Mesh Topology
Study
interconnected via direct links, uses fewer links than
a full-mesh topology, uses more links than a huband-spoke topology
Topology Benefits: Provides optimal routes
Partial-Mesh Topology
between selected sites with higher intersite traffic
volumes, more redundant than a hub-and-spoke
Topology Drawbacks: Less fault tolerance than a
Partial-Mesh Topology
full-mesh topology, more expensive than a huband-spoke topology
client/server network
a collection of PCs all sharing files located on a
centralized server.
A collection of interconnected devices (for
peer-to-peer network
example, PCs) which share their resources with one
another.
client/server network
Network Characteristics: Share a common set of
client/server network
resources located on one or more dedicated
servers, resource sharing via dedicated hardware
and network operating systems.
client/server network
Network Benefits: Can easily scale, simplified
administration
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
7/8
23/06/2021
Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet
Study
Network Drawbacks:
More expensive, single point
Network+ Chapter 1 Computer Network
Fundamentals
client/server network
of failure
peer-to-peer network
Network Characteristics: clients share their
peer-to-peer network
resources with other clients, resource sharing is
made available through the clients' OS
peer-to-peer network
peer-to-peer network
Network Benefits: Easy installation, usually cost less
Network Drawbacks: Limited scalability, Lower
performance
https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/
8/8
W4140 Networking Laboratory
1
Midterm
Spring 2009
True or False
1. [2] IP addresses can be divided into two parts: network prefix part and the host part.
True
2. [2] ICMP Route Redirect packets update the routing table of hosts.
False, ICMP Route Redirect packets update the routing cache.
3. [2] ARP can be used to detect and avoid duplicate IP addresses in the subnet.
True
4. [2] In OSPF, all Area Border Routers are part of the backbone area.
True
5. [2] BGP is a path vector protocol.
True
6. [2] If we use the filter ’src host 10.0.1.12 and tcp dst port 80’, tcpdump will show only HTTP packets
that are from 10.0.1.12.
True
7. [2] Cisco IOS commands are divided into hierarchical modes, and the mode with the least priviledge
is the global configuration mode.
False, user exec mode has the least priviledge.
2
The Network Administrator
Kahn is a network administrator for a small but fast growing company. He has configured the network as
shown below. For all the questions below, assume that there are no physical connection problems and that
all hosts have the correct default gateway configured.
PC1
10.0.1.11/29
PC3
10.0.3.11/24
FE1/1
10.0.2.10/29
FE0/1
10.0.1.10/29
Router 1
FE1/1
10.0.2.20/24
PC2
10.0.1.12/29
FE0/1
10.0.3.20/24
Router 2
PC4
10.0.3.138/16
1. [2] How many subnets did he setup?
3 subnets
2. [3] Kahn used static routes to configure the routing tables. What would the final routing table look
like? Draw and fill two-column routing tables for Router 1 and Router 2.
1
W4140 Networking Laboratory
Midterm
Spring 2009
Table 1: Router 1
Prefix
00001010 00000000 00000001 00001 (10.0.1.8/29)
00001010 00000000 00000010 00001 (10.0.2.8/29)
00001010 00000000 00000011 (10.0.3.0/24)
Interface or address
FE0/1
FE1/1
10.0.2.20
Table 2: Router 2
Prefix
00001010 00000000 00000011 (10.0.3.0/24)
00001010 00000000 00000010 (10.0.2.0/24)
00001010 00000000 00000001 00001 (10.0.1.8/29)
Interface or address
FE0/1
FE1/1
10.0.2.10
3. [8] Kahn pings from PC3 to PC1 but it’s not working. He thinks that maybe there is something wrong
with the addresses and netmasks he assigned to the hosts and routers. Is his hypothesis correct? If so,
how should he fix it?
ICMP Echo Request packets have no trouble traveling from PC3 to PC1. The problem
is when the ICMP Echo Reply packet travels from PC1 to PC3, specifically the path
from Router1 to Router2. Since Router1’s FE1/1 network prefix is 29 bits, the interface
assumes that any address that starts with 00001010 00000000 00000010 00001 (29 bits)
is within the same subnet. The first 29 bits of Router2’s FE1/1 network address is
00001010 00000000 00000010 00010. The last two bits are different, so Router1 will not
think Router2 is in the same subnet. Router1 also doesn’t have any routing information
on how to forward packets to this type of address. So the packet is discarded. To fix this
problem, Kahn can reconfigure FE1/1’s network prefix to 24 bits.
4. [5] Kahn notices that when PC4 pings Router 1’s FE1/1 interface, PC4 first sends an ARP request
packet asking for the MAC address of 10.0.2.10. He thinks that no one should answer since Router 1
is not in the same subnet. But to Kahn’s surprise, Router 2 answers with an ARP reply packet with
its own MAC address inside! What is going on? How can Kahn fix Router 2’s behavior?
This happens when proxy ARP is configured. Kahn should disabled proxy ARP on
Router2.
5. [5] The company is growing fast and Kahn needs to add another subnet to the network. The new
subnet needs to support at most 50 hosts. Kahn wants to reduce unused IP addresses in the new
subnet. What is the optimal length of network prefix that Kahn should assign to the new subnet?
To accomodate 50 hosts in the subnet, we need to have at least 6 bits in the host part of IP
address since 26 = 64. Anything shorter will not be able to accomodate 50 hosts. Anything
longer will result in waste of addresses. So, the optimal prefix length is 32 − 6 = 26 bits.
3
Count-To-Infinity
The count-to-infinity problem is a convergence problem that arises in distance vector protocols such as RIP.
1. [5] What is the main symptom of the count-to-infinity problem in terms of convergence time? Explain
how the count-to-infinity problem affects the convergence time.
When there is count-to-infinity problem in the network, it takes much longer for routing
tables to converge. This is because when count-to-infinity problem appears in the network
due to a link failure, routers keep exchanging increasing distance metrics until the distance
finally reaches ‘infinity’.
2
W4140 Networking Laboratory
Midterm
Spring 2009
2. [5] Why does count-to-infinity problem occur in distance vector algorithms?
The problem occurs because distance vector algorithms exchange only the distance information with their immediate neighbours. Let’s assume router X must send a packet to
router Y to reach subnet S. When the link to subnet S breaks, router Y may calculate
a new route to S via X since X has a better metric value to S. This happens because
router Y thinks that X can forward a packet to subnet S. It does not know that router
X is using router Y to get to subnet S. This forms a routing loop between router X and
router Y. Router Y thinks it can reach subnet S via X. Router X thinks it can reach
subnet S via Y. Since there is one hop between router X and router Y, they will keep
exchanging increasing metric values until it reaches ‘infinity’ where both realize that the
link is broken.
3. [8] Name two methods used to avoid the count-to-infinity problem and describe them.
Potential answers are: triggered updates, split horizon, hold-down timer, and poisoned
reverse.
4
File Transfer Using TCP
Vinton wants to send a 292 kilobyte picture from Host A to Host B using TCP. Both hosts are physically
connected to the same Ethernet. The Maximum Transmission Unit (MTU) on the Ethernet is 1500 bytes.
The IP header is 20 bytes and the TCP header is 20 bytes. Assume that there is no packet loss or corruption
within this Ethernet.
1. [2] What is the Maximum Segment Size (MSS) of the hosts?
MSS is the size of maximum TCP payload. 1500 − 20 − 20 = 1460 bytes.
2. [3] How many data packets will Host A send to Host B?
Each data packet will contain 1460 bytes of data. We need to send 292 kilobytes.
204.8. So 205 packets will be sent.
292∗1024
1460
=
3. [5] Based on your answers above, fill in the sequence numbers and acknowledgement numbers in the
ladder diagram.
Answer is in the ladder diagram.
4. [5] Which phase of the congestion control algorithm is the ladder diagram showing? Explain your
answer.
The number of packets sent in one Round Trip Time increases exponentially: that is,
the number of packets increase from 1 to 2 to 4. This is because congestion window is
increased by 1 MSS whenever an ACK is received. This is the Slow Start phase.
5
Extra Credit
[+2] In the real world, Dr. Vinton Cerf and Dr. Robert Kahn are famous for inventing what?
TCP/IP
3
W4140 Networking Laboratory
Midterm
Spring 2009
Host B
Host A
SEQ : 1
ACK : 1461
SEQ : 1461
SEQ : 2921
ACK : 2921
ACK : 4381
4
23/06/2021
Computer Networks Flashcards | Quizlet
Computer Networks
Terms in this set (18)
Suppose Host A sends Host B
The 8-bit protocol field in the IP datagram contains
a TCP segment encapsulated in
information about which transport layer
an IP datagram. When Host B
protocol the destination host should pass the
receives
segment to.
the datagram, how does the
network layer in Host B know it
should pass the segment (that
is, the
payload of the datagram) to
TCP rather than to UDP or to
something else?
Suppose you purchase a
• Typically the wireless router includes a DHCP
wireless router and connect it
server. DHCP is used to assign IP addresses to
to your cable modem. Also
the 5 PCs and to the router interface.
suppose that your
ISP dynamically assigns your
connected device (that is, your
wireless router) one IP address.
Also suppose
that you have five PCs at home
that use 802.11 to wirelessly
connect to your wireless
router.
a. How are IP addresses
assigned to the five PCs?
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
1/10
23/06/2021
Computer Networks Flashcards | Quizlet
Suppose you purchase a
• True, the wireless router also uses NAT as it obtains
wireless router and connect it
only one IP address from the ISP.
to your cable modem. Also
suppose that your
ISP dynamically assigns your
connected device (that is, your
wireless router) one IP address.
Also suppose
that you have five PCs at home
that use 802.11 to wirelessly
connect to your wireless
router.
b. [True/False] The wireless
router uses NAT.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
2/10
23/06/2021
Computer Networks Flashcards | Quizlet
Suppose you purchase a
True, the path with the smallest number of links
wireless router and connect it
between the source and the destination.
to your cable modem. Also
suppose that your
ISP dynamically assigns your
connected device (that is, your
wireless router) one IP address.
Also suppose
that you have five PCs at home
that use 802.11 to wirelessly
connect to your wireless
router.
[True/False] If all edges in the
graph have the same cost, the
least-cost path is also the
shortest path.
A routing algorithm what all
• Link-state (LS)
routers have complete
• Distance-vector (DV)
topology and link cost info is
also referred to as
[ ] algorithm, and a routing
algorithm what each router
knows physically-connected
neighbors and link costs to
neighbor and conducts an
iterative process of exchanging
neighbor
information is also referred to
as [ ] algorithm.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
3/10
23/06/2021
Computer Networks Flashcards | Quizlet
True, routers are organized into autonomous
systems (ASs). Within an AS, all routers run the
same intra-AS routing protocol. The problem of
[True/False] A hierarchical
scale is solved since a router in an AS needs
organization of the Internet has
only to know about routers within its AS and the
made it possible to scale to
subnets that attach to the AS. To route across
millions of users.
ASes, the inter-AS protocol is based on the AS
graph and does not take individual routers into
account.
Is it necessary that every
No. Each AS has administrative autonomy for
autonomous system uses the
routing within an AS.
same intra-AS routing
algorithm? Why or why
not?
[True or False] The alternating-
False
bit protocol is not the same as
the GBN and SR protocols with
a sender and
receiver window size of 1.
[True or False] The size of the
False
TCP rwnd never changes
throughout the duration of the
connection.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
4/10
23/06/2021
Computer Networks Flashcards | Quizlet
) Suppose, Host A sends
Host A continues to send segment with one data
packets to Host B. Host B's
byte, when B's receive window is zero.
receive buffer is 0 (i.e.,
RecvWindow = 0), and Host
B has nothing to send to A.
Thus, Host A is blocked and
can transmit no more data.
How to resolve this?
[True or False]: Suppose Host
True
A is sending Host B a large file
over a TCP connection. The
number of
unacknowledged bytes that A
sends cannot exceed the size
of the receive buffer.
A queued packet in an input queue must wait for
) What is the head of line (HOL)
transfer through the fabric because it is blocked by
blocking? Be specific.
another packet at the head of the line. It occurs at
the input port.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
5/10
23/06/2021
Computer Networks Flashcards | Quizlet
Upgrade to remove ads
) Suppose there are three
Only ₪11.67/month
8 interfaces; 3 forwarding tables
routers between a source host
and a destination host.
Ignoring fragmentation, IP
datagram sent from the source
host to the destination host will
travel over how many
interfaces? How
many forwarding tables will be
indexed to move the datagram
from the source to the
destination?
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
6/10
23/06/2021
Computer Networks Flashcards | Quizlet
Host A and B are
If the second segment arrives before the first
communicating over a TCP
segment, in the acknowledgement of the first
connection, and Host B has
arriving
already received from A all
segment, the acknowledgement number is 127,
bytes up
indicating that it is still waiting for bytes 127 and
through byte 126. Suppose
onwards.
Host A then sends two
segments to Host B back-toback. The first and second
segments contain 80 and 40
bytes of data, respectively. In
the first segment, the sequence
number is 127, the
source port number is 302, and
the destination port number is
80. Host B sends an
acknowledgment whenever it
receives a segment from Host
A. If the second segment
arrives before the first
segment, in the
acknowledgment of
the first arriving segment, what
is the acknowledgement
number?
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
7/10
23/06/2021
Computer Networks Flashcards | Quizlet
Consider sending a 2500-byte
The maximum size of data field in each fragment =
datagram into a link that has an
480 (because there are 20 bytes IP header). Thus
MTU of 500 bytes. Suppose
the number of required fragments = ceil((2500 -
the original datagram
20)/480) = 6.
is stamped with the
• Each fragment will have Identification number 422.
identification number 422. (i)
Each fragment except the last one will be of size
How many fragments are
500 bytes (including IP header). The last datagram
generated? (ii) What are the
will be of size 360 bytes (including IP header). The
offset
offsets of the 6 fragments will be 0, 60, 120, 180, 240,
values in the IP datagram(s)
and 300. Each of the first 5 fragments will have
generated related to
flag = 1; the last fragment will have flag = 0.
fragmentation? Show all your
work.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
8/10
23/06/2021
Computer Networks Flashcards | Quizlet
In TCP (no delay ACK), assume
• TCP:
that the timeout value is
• Host A sends 6 segments in total. They are initially
sufficiently long such that 5
sent segments 1, 2, 3, 4, 5 and later re-sent
consecutive data segments
segments 2.
and their corresponding ACKs
can be received (if not lost in
the channel) by the receiving
host (Host B) and the
sending host (Host A)
respectively. Suppose Host A
sends 5 data segments to Host
B, and the 2nd segment (sent
from A) is lost. In the end, all 5
data segments have been
correctly received by Host B.
Here, sequence number
begins with 1.
(a) (i) How many segments has
Host A sent in total and (ii)
what are their sequence
numbers?
• TCP:
(b) (i) How many ACKs has
• Host B sends 5 ACKs. They are 4 ACKS with
Host B sent in total and (ii)
sequence number 2. There is one ACK with
what are their sequence
sequence
numbers?
numbers 6. Note that TCP always send an ACK with
expected sequence number.
Computer Networks
https://quizlet.com/251666863/computer-networks-flash-cards/
9/10
23/06/2021
Computer Networks Flashcards | Quizlet
In the following congestion
• When packet dropped (e.g., R2), any "upstream
scenario, as the offered load
transmission capacity used (e.g., R1) for that packet
from B-D approaches infinity,
was wasted!
the throughput of A-C
connection at R2 goes zero.
What is the "cost" of
congestion in this scenario?
https://quizlet.com/251666863/computer-networks-flash-cards/
10/10
6/23/2021
Home
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Computer Fundamentals
Computer Network
Control System
Java
HTML
CSS
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
1/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Computer Network MCQ
1) Which of these is a standard interface for serial data transmission?
a. ASCII
b. RS232C
c. 2
d. Centronics
Hide Answer
Workspace
Answer: (b) RS232C
Explanation: The RS232C is a standard interface for serial data transmission that defines
the protocol and physical interface for transmitting serial data fairly easily between
associated appliances and computers.
2) Which type of topology is best suited for large businesses which must carefully control and
coordinate the operation of distributed branch outlets?
a. Ring
b. Local area
c. Hierarchical
d. Star
Hide Answer
Workspace
Answer: (d) Star
Explanation: The star topology is the best network topology for large businesses because
it is simple to control and coordinate from the central computer.
3) Which of the following transmission directions listed is not a legitimate channel?
a. Simplex
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
2/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
b. Half Duplex
c. Full Duplex
d. Double Duplex
Hide Answer
Workspace
Answer: (d) Double Duplex
Explanation: Double duplex is not a legitimate channel for transmission in computer
network.
4) "Parity bits" are used for which of the following purposes?
a. Encryption of data
b. To transmit faster
c. To detect errors
d. To identify the user
Hide Answer
Workspace
Answer: (c) To detect errors
Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is
used for error detection for blocks of data.
5) What kind of transmission medium is most appropriate to carry data in a computer network that is
exposed to electrical interferences?
a. Unshielded twisted pair
b. Optical fiber
c. Coaxial cable
d. Microwave
Hide Answer
Workspace
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
3/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Answer: (b) Optical fiber
Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of
data occurs in the form of light rather than the electric current, so this cable provides
higher data transfer speed than other cables.
6) A collection of hyperlinked documents on the internet forms the ?.?
a. World Wide Web (WWW)
b. E-mail system
c. Mailing list
d. Hypertext markup language
Hide Answer
Workspace
Answer: (a) World Wide Web (WWW)
Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on
the Internet.
7) The location of a resource on the internet is given by its?
a. Protocol
b. URL
c. E-mail address
d. ICQ
Hide Answer
Workspace
Answer: (b) URL
Explanation: A URL (Uniform Resource Locator) is a database connection that describes
the database's location on a computer network and the retrieval process. A URL is a
different form of URI (Uniform Resource Identifier) although the two words are used
⇧ SCROLL TO TOP
interchangeably by many people.
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
4/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
8) The term HTTP stands for?
a. Hyper terminal tracing program
b. Hypertext tracing protocol
c. Hypertext transfer protocol
d. Hypertext transfer program
Hide Answer
Workspace
Answer: (c) Hypertext transfer protocol
Explanation: The term HTTP stands for Hypertext transfer protocol.
9) A proxy server is used as the computer?
a. with external access
b. acting as a backup
c. performing file handling
d. accessing user permissions
Hide Answer
Workspace
Answer: (a) with external access
Explanation: A proxy server is a computer that acts as a gateway between a user's
computer and the Internet. The proxy server is also called application level gateway. By
this the client computer can establish indirect network connection to another network.
10) Which one of the following would breach the integrity of a system?
a. Looking the room to prevent theft
b. Full access rights for all users
c. Fitting
the
system with an anti-theft device
⇧ SCROLL
TO
TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
5/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
d. Protecting the device against willful or accidental damage
Hide Answer
Workspace
Answer: (b) Full access rights for all users
Explanation: None
11) Which software prevents the external access to a system?
a. Firewall
b. Gateway
c. Router
d. Virus checker
Hide Answer
Workspace
Answer: (a) Firewall
Explanation: A firewall is a network securing software that prevents unauthorized users
and dangerous elements from accessing the network. Software firewall acts as a filter for
our network which prevents harmful information.
12) Which one of the following is a valid email address?
a. javat@point.com
b. gmail.com
c. tpoint@.com
d. javatpoint@books
Hide Answer
Workspace
Answer: (a) javat@point.com
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
6/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Explanation: A proper email address is a combination of the email prefix and email
domain, both in appropriate formats. The domain appears to the right side of the @
symbol and the prefix appears to the left side of the @ symbol.
For example, in this email address javat@point.com, "javat" is the prefix, and "point.com" is
the domain.
13) Which of the following best describes uploading information?
a. Sorting data on a disk drive
b. Sending information to a host computer
c. Receiving information from a host computer
d. Sorting data on a hard drive
Hide Answer
Workspace
Answer: (b) Sending information to a host computer
Explanation: None
14) Which one of the following is the most common internet protocol?
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX
Hide Answer
Workspace
Answer: (c) TCP/IP
Explanation: TCP/IP is the most common internet protocol because it is the most widely
used network protocol.
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
7/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
15) Software programs that allow you to legally copy files and give them away at no cost are called
which of the following?
a. Probe ware
b. Timeshare
c. Shareware
d. Public domain
Hide Answer
Workspace
Answer: (d) Public domain
Explanation: Public domain software can be modified, distributed or sold by anyone
without any attention, but no one can ever own it.
16) The term FTP stands for?
a. File transfer program
b. File transmission protocol
c. File transfer protocol
d. File transfer protection
Hide Answer
Workspace
Answer: (c) File transfer protocol
Explanation: The term FTP stands for File transfer protocol.
17) At what speed does tele-computed refer?
a. Interface speed
b. Cycles per second
c. Baud rate
d. Megabyte load
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
8/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Hide Answer
Workspace
Answer: (c) Baud rate
Explanation: In telecommunication, baud rate is a specific unit of the speed rate. It is one
of the significant functions that determine the speed of the communication over the data
channel.
18) Which one of the following is not a network topology?
a. Star
b. Ring
c. Bus
d. Peer to Peer
Hide Answer
Workspace
Answer: (d) Peer to Peer
Explanation: Peer to Peer network is a network to which all computers are used the same
resources and rights as other computers. Its network designed primarily for the small local
area.
19) The maximum length (in bytes) of an IPv4 datagram is?
a. 32
b. 1024
c. 65535
d. 512
Hide Answer
Workspace
Answer: (c) 65535
Explanation:
None
⇧ SCROLL
TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
9/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
20) Which of the following statements could be valid with respect to the ICMP (Internet Control
Message Protocol)?
a. It reports all errors which occur during transmission.
b. A redirect message is used when a router notices that a packet seems to have been
routed wrongly.
c. It informs routers when an incorrect path has been taken.
d. The "destination unreachable" type message is used when a router cannot locate the
destination.
Hide Answer
Workspace
Answer: (b) A redirect message is used when a router notices that a packet seems to have
been routed wrongly.
Explanation: None
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following
subnet masks can be used for the above requirement?
a. 255.243.240
b. 255.255.0.0
c. 255.255.0
d. 255.255.255
Hide Answer
Workspace
Answer: (c) 255.255.255.0
Explanation: This address belongs to class C, so 8 bits are reserved for the host ID. 24 bits
are reserved for network ID.
22) When the mail server sends mail to other mail servers it becomes ___ ?
⇧ SCROLL
TOP
a. SMTPTO
client
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
10/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
b. SMTP server
c. Peer
d. Master
Hide Answer
Workspace
Answer: (a) SMTP client
Explanation: The SMTP client is an organization that allows sending emails using the
SMTP server. SMTP servers can't send emails to other SMTP servers separately. It is based
on client-server architecture.
23) The length of an IPv6 address is?
a. 32 bits
b. 64 bits
c. 128 bits
d. 256 bits
Hide Answer
Workspace
Answer: (c) 128 bits
Explanation: An IPv6 address is 128 bits long, which has 2^128 address space.
24) Consider the following:
1. Twisted pair cables
2. Microwaves and Satellite Signals
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Which of the above is consider as (a) signal transmission medium is data communications?
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
11/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
a. (1) and (5)
b. (1) and (2)
c. (1) (2) and (5)
d. (1) (2) (3) and (5)
Hide Answer
Workspace
Answer: (c) (1) (2) and (5)
Explanation: None
25) Which of the following address belongs class A?
a. 121.12.12.248
b. 130.12.12.248
c. 128.12.12.248
d. 129.12.12.248
Hide Answer
Workspace
Answer: (a) 121.12.12.248
Explanation: 121.12.12.248 address belongs the class A because the first octet value of
this address lies between 0 and 127.
26) Which of the following is correct IPv4 address?
a. 124.201.3.1.52
b. 01.200.128.123
c. 300.142.210.64
d. 10110011.32.16.8
e. 128.64.0.0
Hide Answer
⇧ SCROLL
TO TOP
Workspace
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
12/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Answer: (e) 128.64.0.0
Explanation: 128.64.0.0 is correct IPv4 address because IPv4 is a standard numbering
system that uses four integers from 0 to 255. The IP address is a group of numbers that
identify user system on the network.
27) Which of the following IP addresses can be used as (a) loop-back addresses?
a. 0.0.0.0
b. 127.0.0.1
c. 255.255.255.255
d. 0.255.255.255
Hide Answer
Workspace
Answer: (b) 127.0.0.1
Explanation: A loopback address is a special IP address whose IP address is between
127.0.0.1 to 127.255.255.255. It is reserved for loopback. It doesn't require a physical
connection to a network.
28) The term WAN stands for?
a. Wide Area Net
b. Wide Access Network
c. Wide Area Network
d. Wide Access Net
Hide Answer
Workspace
Answer: (c) Wide Area Network
Explanation: The term WAN stands for Wide Area Network.
⇧ SCROLL TO TOP
29) Which of the following cannot be used as a medium for 802.3 ethernet?
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
13/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
a. A thin coaxial cable
b. A twisted pair cable
c. A microwave link
d. A fiber optical cable
Hide Answer
Workspace
Answer: (c) A microwave link
Explanation: A microwave link cannot be used as a medium for 802.3 ethernets, because
a microwave link is a transmission network that utilizes a beam of radio waves in the
microwave frequency spectrum to relay video, audio, or data between two places.
30) What IP address class allocates 8 bits for the host identification part?
a. Class A
b. Class B
c. Class C
d. Class D
Hide Answer
Workspace
Answer: (c) Class C
Explanation: In class C only, 8 bits are reserved for the host ID, and 24 bits are reserved
for network ID.
31) The term IANA stands for?
a. Internet Assigned Numbers Authority
b. Internal Assigned Numbers Authority
c. Internet Associative Numbers Authoritative
d. Internal Associative Numbers Authority
⇧ SCROLL TO TOP
Hide Answer
Workspace
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
14/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Answer: (a) Internet Assigned Numbers Authority
Explanation: The term IANA stands for Internet Assigned Numbers Authority.
32) How many versions available of IP?
a. 6 version
b. 4 version
c. 2 version
d. 1 version
Hide Answer
Workspace
Answer: (c) 2 version
Explanation: There are only two IP versions are avilable in the present: IP version 4 (IPv4)
and IP version 6 (IPv6).
33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
a. Host to host
b. Application
c. Internet
d. Network Access
Hide Answer
Workspace
Answer: (a) Host to Host
Explanation: The host to host layer conforms the transport layer of the OSI model. This
layer is responsible for the final correspondence and error-free distribution of data.
34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size.
⇧ SCROLL TO TOP
Calculate the maximum throughput.
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
15/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
a. 5999
b. 6900
c. 6027
d. 5027
Hide Answer
Workspace
Answer: (c) 0.6027
Explanation: In Pure Aloha, Efficiency = 18.4%
Usable bandwidth for 18.2 kbps = 18.2 * 0.18 = 3.276 kbps
Therefore, the maximum throughput of Pure Aloha
= 1/2e * 3.276
= (18.4 * 3.276) / 100
= 0.6027
35) On a simplex data link, which of the following is a possible error recovery technique?
a. Backward error correction (BEC)
b. The use of hamming codes
c. Automatic Repeat Request (ARQ)
d. Downward error correction (DEC)
Hide Answer
Workspace
Answer: (b) The use of hamming codes
Explanation: The hamming codes is an error recovery technique that can be used to
detect and correct the errors. It was developed by R.W. Hamming.
36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its
⇧variants?
SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
16/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
a. Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the
data stream is probabilistic.
b. TDM requires the transmitter and receiver to be synchronized periodically.
c. TDM performs efficiently if the arrival pattern of the data stream is probabilistic.
d. Statistical TDM is efficient if the data stream is deterministic.
Hide Answer
Workspace
Answer: (a) and (b)
Explanation: None
37) The term IPv4 stands for?
a. Internet Protocol Version 4
b. Internet Programming Version 4
c. International Programming Version 4
d. None of these
Hide Answer
Workspace
Answer: (a) Internet Protocol Version 4
Explanation: The term IPv4 stands for Internet Protocol Version 4.
38) The term LAN stands for?
a. Local Area Net
b. Local Aera Network
c. Local Array Network
d. Local Array Net
Hide Answer
Workspace
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
17/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Answer: (b) Local Area Network
Explanation: The term LAN stands for Local Area Network.
39) Which of the through is share the data of two computer?
a. Library
b. Network
c. Grouping
d. Integrated system
Hide Answer
Workspace
Answer: (b) Network
Explanation: There are many ways to share data between two computers, but a network
connection is established before data sharing.
40) In specific, if the systems use separate protocols, which one of the following devices is used to
link two systems?
a. Repeater
b. Gateway
c. Bridge
d. Hub
Hide Answer
Workspace
Answer: (b) Gateway
Explanation: If the system used separate protocols, gateway device is used to link two
systems.
⇧ SCROLL TO TOP
41) How many digits of the Data Network Identification Code (DNIC) identify the country?
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
18/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
a. first three
b. first four
c. first five
d. first six
e. None of the above
Hide Answer
Workspace
Answer: (a) first three
Explanation: The first three digits of the Data Network Identification Code (DNIC) is
identify the country (first digit to identify a zone and other two digits to identify the
country within the zone).
42) Which of the following methods is used to broadcast two packets on the medium at a time?
a. Collision
b. Synchronous
c. Asynchronous
d. None of the above
Hide Answer
Workspace
Answer: (a) Collision
Explanation: A collision occurs when two or more computers are attempting to transfer
data across a network at a time.
43) Which of the following is true with regard to the ping command?
a. Ping stands for Packet Internet Generator.
b. The ping command checks the port level connectivity between source destinations end
points.
c. Ping summarizes the packet loss and round-trip delay between two IP end points.
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
19/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
d. The ping command activates the RARP protocol of the IP layer.
Hide Answer
Workspace
Answer: (c) Ping summarizes the packet loss and round-trip delay between two IP end
points.
Explanation: None
44) The private key in asymmetric key cryptography is kept by?
a. Sender
b. Receiver
c. Sender and Receiver
d. None of the these
Hide Answer
Workspace
Answer: (b) Receiver
Explanation: Only the receiver keeps the private key. Its purpose is to ensure that the
message can only be decrypted by the intended receiver.
45) Which of the following algorithms is not used in asymmetric-key cryptography?
a. RSA algorithm
b. Diffie-Hellman algorithm
c. Electronic code book algorithm
d. None of the mentioned
Hide Answer
Workspace
Answer: (c) Electronic code book algorithm
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
20/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Explanation: An electronic code book algorithm is a mode of operation for a block cipher,
where each frame of text in an encrypted document refers to a data field. In other terms,
the same plaintext value would also give the same value for ciphertext.
46) In the cryptography, the sequence of the letters is rearranged by?
a. Transposition ciphers
b. Substitution ciphers
c. Both a and b
d. None of these
Hide Answer
Workspace
Answer: (a) Transposition ciphers
Explanation: A predefined technique shuffles the sequence of letters in a plaintext
message in the transposition ciphers.
47) What is the maximum efficiency of pure aloha at G = 1/2?
a. 1.89
b. 17.99
c. 18.999
d. 18.4
Hide Answer
Workspace
Answer: (d) 18.4
Explanation: The maximum efficiency of pure aloha formula is G * e-2G.
Given, G =1/2
=1/2 x e-2 x 1/2
= 1 / 2e
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
21/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
= 0.184
= 18.4%
48) What is the maximum efficiency of slotted aloha at G = 1?
a. 36.8
b. 35.8
c. 35.5
d. 37.8
Hide Answer
Workspace
Answer: (a) 36.8
Explanation: The maximum efficiency of slotted aloha formula is G * e-G.
Given, G = 1
= 1 x e-1
=1/e
= 0.368
= 36.8%
49) Which of the following statement is true about error detection techniques used on
communications link?
a. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
b. Error detection cannot be used on simplex links.
c. Hamming code can detect up to 3-bit errors.
d. All of the these
Hide Answer
Workspace
⇧ SCROLL TO TOP
Answer: (d) All of the these
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
22/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Explanation: None
50) The correct order of corresponding OSI layers for having functionalities of routing and reconciling
machine representation differences with shared access resolution and ASCII test protocol is?
a. Network, Physical, Transport, Data link
b. Network, Physical, Data link, Application
c. Network, Presentation, Data link, Application
d. Network, Presentation, Physical, Transport
Hide Answer
Workspace
Answer: (c) Network, Presentation, Data link, Application
Explanation: None
← Prev
Next →
For Videos Join Our Youtube Channel: Join Now
Feedback
Send your Feedback to feedback@javatpoint.com
Help Others, Please Share
Learn Latest Tutorials
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
23/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
SoapUI
RPA
Manual Testing
Cucumber
Appium
PostgreSQL
Solr
MongoDB
Gimp
Verilog
Teradata
PhoneGap
Preparation
Aptitude
Aptitude
Logical
Reasoning
Verbal Ability
Verbal Ability
Reasoning
Interview
Questions
Interview
Company
Interview
Questions
Company
Trending Technologies
Artificial
Intelligence
Tutorial
AWS Tutorial
AWS
Selenium
tutorial
Cloud tutorial
Cloud
Selenium
Artificial
Intelligence
⇧ SCROLL TO TOP
Hadoop tutorial
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
24/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Hadoop
Blockchain
Tutorial
ReactJS
Tutorial
Data Science
Tutorial
Angular 7
Tutorial
ReactJS
Data Science
Angular 7
Git Tutorial
Git
Blockchain
Machine
Learning Tutorial
DevOps
Tutorial
Machine Learning
DevOps
B.Tech / MCA
DBMS tutorial
DBMS
Data Structures
tutorial
DAA tutorial
DAA
Data Structures
Computer
Network tutorial
Compiler
Design tutorial
Computer Network
Compiler Design
Ethical Hacking
Tutorial
Computer
Graphics Tutorial
Ethical Hacking
Computer Graphics
Operating
System tutorial
Operating System
Computer
Organization and
Architecture
Discrete
Mathematics
Tutorial
Computer
Organization
Discrete
Mathematics
Software
Engineering
Tutorial
html tutorial
Web Tech.
Software
Engineering
Cyber Security
tutorial
Automata
Tutorial
Cyber Security
Automata
Java tutorial
Java
.Net
Framework
tutorial
C Language
tutorial
C++ tutorial
C++
C
Python tutorial
Python
List of
Programs
Programs
.Net
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
25/26
6/23/2021
Computer Network MCQ (Multiple Choice Questions) - javatpoint
Control
Systems tutorial
Control System
Data Mining
Tutorial
Data Mining
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data.
26/26
6/23/2021
Home
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Computer Fundamentals
Computer Network
Control System
Java
HTML
CSS
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
1/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Computer Network MCQ Part 2
1) In which of the following switching methods, the message is divided into small packets?
a. Message switching
b. Packet switching
c. Virtual switching
d. None of the these
Hide Answer
Workspace
Answer: (b) Packet switching
Explanation: In packet switching, the message is divided into small parts. These small
parts of the message are called packets, and each packet has its own source and
destination address. Each packet is transmitted forward in the network only on the basis of
these addresses.
2) Which of the following switch methods creates a point-to-point physical connection between two
or more computers?
a. Message switching
b. Packet switching
c. Circuit switching
d. None of the these
Hide Answer
Workspace
Answer: (a) Circuit switching
Explanation: Circuit switching is a switching technique in which a point-to-point physical
connection is made between two or more devices.
For example: Telephone system, in which sender and receiver are connected by physical
connection, such as wire.
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
2/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
3) What is the second name of the proxy server?
a. Proxy tools
b. Application proxy
c. Application-level gateway
d. All of the these
Hide Answer
Workspace
Answer: (c) Application-level gateway
Explanation: The proxy server is also known as the application-level gateway. It allows
client computers to establish indirect network connections to other networks.
4) Which of the following servers allows LAN users to share data?
a. Data server
b. Point server
c. File server
d. Communication server
Hide Answer
Workspace
Answer: (c) File server
Explanation: A file server allows LAN users to share the data. It acts as a medium for data
transfer. It uses the FTP protocol to transfer information and data.
5) What is the total vulnerable time value of pure Aloha?
a. Tfr
b. 1/2 Tfr
c. 2 * Tfr
d. 4 * Tfr
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
3/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Hide Answer
Workspace
Answer: 2 * Tfr
Explanation: Total vulnerable time of pure Aloha = 2 * Tfr
6) How many fields are in the SMDS packet?
a. Two
b. Three
c. Four
d. Five
Hide Answer
Workspace
Answer: (b) Three
Explanation: SMDS packet consists of three fields: Destination address, Source address,
and User data. In this, the destination and source addresses are 8 bytes, while the user
data is up to 9188 bytes.
7) What is the maximum data transfer rate of the optical fiber wire?
a. 50 kbps
b. 1000 kbps
c. 1000 Mbps
d. None of the these
Hide Answer
Workspace
Answer: (c) 1000 Mbps
Explanation: 1000 Mbps is the max data transfer rate for optical fiber cables. It is the
fastest among the other kinds of cables like STP and coaxial cables. People are now using
optical fiber
⇧ SCROLL
TO cables
TOP instead of STP for LANs due to their fast data transfer capability.
https://www.javatpoint.com/computer-network-mcq-part2
4/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
8) POTS network works on the principle of ________
a. Telephone switching
b. Proxy server
c. File system
d. Circuit system
Hide Answer
Workspace
Answer: (d) Circuit switching
Explanation: POTS stands for Plain-old-telephone-service, and it works on the principle of
circuit switching. In this, the analog signal is transmitted by copper wire.
9) Which of the following protocols is the bit-oriented protocol?
a. SSL
b. http
c. HDLC
d. All of the these
Hide Answer
Workspace
Answer: (c) HDLC
Explanation: HDLC stands for High-level data link control. It is a set of protocols that are
used to transmit information from one network to another. It is a bit-oriented protocol
that supports both wireless and wired communication.
10) SLIP stands for _______
a. System line internet protocol
b. Serial line internet protocol
⇧ SCROLL
TOP
c. SignalTO
line
internet protocol
https://www.javatpoint.com/computer-network-mcq-part2
5/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
d. Signal internet protocol
Hide Answer
Workspace
Answer: (b) Serial line internet protocol
Explanation: SLIP stands for Serial-line-internet-protocol. It is an internet protocol
through which a user accesses the internet using a computer modem.
11) The second port is used to ____________ in the two-port network.
a. Input terminal
b. Output terminal
c. Signal terminal
d. Bandwidth terminal
Hide Answer
Workspace
Answer: (b) Output terminal
Explanation: A two-port network is an electrical network consisting of two ports. The first
port is used for the input terminal, and the second pair is used for the output terminal.
12) Which of the following layers does the HTTP protocol work on?
a. Physical layer
b. Data-link layer
c. Application layer
d. None of the these
Hide Answer
Workspace
Answer: (c) Application layer
Explanation: The HTTP application works on the application layer protocol. It is used to
⇧ SCROLL TO TOP
transmit messages across the World Wide Web.
https://www.javatpoint.com/computer-network-mcq-part2
6/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
13) Which of the following statement correct about the cipher in cryptography?
a. It is a method for performing encryption and decryption
b. It is used to establish the network connection
c. It is a message event
d. All of the these
Hide Answer
Workspace
Answer: (a) It is a method for performing encryption and decryption
Explanation: A cipher is a method of implementing encryption and decryption of
messages traveling in a network. It is used to increase the confidentiality of messages.
14) SONET stands for ______________.
a. Signal Operation Network
b. Synchronous Optical Network
c. System Optical Network
d. Signal Optical Network
Hide Answer
Workspace
Answer: (b) Synchronous Optical Network
Explanation: SONet stands for Synchronous Optical Network. It is used in the telephone
system. SONet is a technology that converts signals of different capacities into optical
signals.
15) How many layers does the SONET contain?
a. 2 layers
b. 3 layers
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
7/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
c. 4 layers
d. 5 layers
Hide Answer
Workspace
Answer: (c) 4 layers
Explanation: Sonet consists of 4 layers.
Path layer → Line layer → Section layer → Photonic layer
16) RAKE receiver designed for _____.
a. Multipath fading
b. Signals
c. Data network
d. Network connection
Hide Answer
Workspace
Answer: (a) Multipath fading
Explanation: Rake receiver is a radio receiver. It is designed to counter the effects of
multipath fading. It is most commonly used in CDMA and W-CDMA radio devices, such as
wireless LAN devices and mobile phones.
17) What is the formula of high rate in zigzag code?
a. J / (J * 1)
b. -Z / (1 + J)
c. Z * (1 + J)
d. J / (J + 1)
Hide Answer
Workspace
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
8/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Answer: (d) J / (J + 1)
Explanation: Zigzag code is a type of linear error-correcting code. The formula of high
code rate is = J / (J + 1), Where J is the number of Bits per segment.
18) What is the size of the sender window in the Go Back N (ARQ) protocol?
a. 0
b. 1
c. 10
d. n
Hide Answer
Workspace
Answer: (d) n
Explanation: Go back N (ARQ) protocol is a data-link layer protocol that uses sliding
window technology. The size of the sender window is N. For example: Go back 8, then the
size of the sender window will be 8.
19) What is the efficiency of the Go back N (ARQ) protocol?
a. N = N / (2a + 2a)
b. N = N / (1 + 2a)
c. N = N * (2a + 2a)
d. N = N * (1 + 2a)
Hide Answer
Workspace
Answer: (b) N = N / (1 + 2a)
Explanation: Go back N (ARQ) protocol is a data link layer protocol that uses sliding
window technology. The efficiency of the Go back N ARQ protocol is: N = N / (1 + 2a),
Where N is the sender window size.
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
9/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
20) What is the size of the destination port in the UDP protocol?
a. 8 bits
b. 16 bits
c. 20 bits
d. 32 bits
Hide Answer
Workspace
Answer: (b) 16 bits
Explanation: The size of the destination port is 16 bits in UDP protocol, and it is used to
identify the destination port of the data.
21) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error
messages?
a. Ping
b. Route
c. Traceroute
d. Ifconfig
Hide Answer
Workspace
Answer: (c) Traceroute
Explanation: Traceroute works by sending packets of data with a reduced time-to-live
(TTL) that specifies how many steps (hops) a packet can survive before returning. It finds
the exact route taken by each step to arrive at the server and time.
22) A client of the DNS (Domain Name System) application is called _____.
a. DNS server
b. DNS Name
⇧ SCROLL TO TOP
c. DNS resolver
https://www.javatpoint.com/computer-network-mcq-part2
10/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
d. DNS inquirer
Hide Answer
Workspace
Answer: (c) DNS resolver
Explanation: A DNS client is a device that is set up to send name resolution requests to
the DNS server. It is also called the DNS resolver.
23) How many characters consist of the entire hostname?
a. 511 characters
b. 255 characters
c. 127 characters
d. 31 characters
Hide Answer
Workspace
Answer: (a) 255 characters
Explanation: A hostname is a label that is assigned to a network-device. A total of 255
characters can be used in an entire hostname. However, each label must be between 1 and
63 characters.
24) During normal IP packet forwarding by a router, which of the following fields of the IP header is
updated?
a. Repeater
b. Source address
c. Destination address
d. Checksum
Hide Answer
Workspace
Answer: TO
(d) Checksum
⇧ SCROLL
TOP
https://www.javatpoint.com/computer-network-mcq-part2
11/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Explanation: When an IPv4 (Internet Protocol version 4) datagram sends an IP packet by a
router, its header checksum needs to be updated as a result of reducing the TTL field.
25) Which of the following statements is correct about the DWDM?
a. It can transmit data at very high speeds
b. It can transmit data at very slow speeds
c. DWSM stands for digital wave division multiplexing
d. None of the these
Hide Answer
Workspace
Answer: (a) It can transmit data at very high speeds
Explanation: DWSM stands for Dense-Wavelength-Division-Multiplexing. It is a fiber optic
transmission technique in which light wavelengths are used to transmit data. Therefore, it
can transmit data at very high speeds.
26) MAC address is also called ______.
a. Physical address
b. Logical address
c. Source address
d. Destination address
Hide Answer
Workspace
Answer: (a) Physical address
Explanation: Physical address is also known as MAC address. The physical address is
unique because it cannot be changed. This address is stored in the main memory in the
system.
Which ofTO
theTOP
following addresses is 32-bit?
⇧27)
SCROLL
https://www.javatpoint.com/computer-network-mcq-part2
12/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
a. MAC address
b. Virtual address
c. Source address
d. Destination address
Hide Answer
Workspace
Answer: (a) Virtual address
Explanation: The virtual address is also called a logical address, and this address is stored
in virtual memory in the system. The length of this address is 32-bit. For example, IP
address: 190.10.134.76
28) EDI stands for ____.
a. Electronic Data Interchange
b. Electronic Digital Internet
c. Electronic Digital Interchange
d. Electronic Data Internet
Hide Answer
Workspace
Answer: (a) Electronic Data Interchange
Explanation: EDI stands for Electronic-Data-Interchange. It is a communication system in
which data is transferred electronically from one computer to another computer.
29) What is the maximum data transfer rate of the ISDN?
a. 1024 Mbps
b. 64 Mbps
c. 64 kbps
d. 1024 kbps
⇧ SCROLL TO TOP
Hide Answer
Workspace
https://www.javatpoint.com/computer-network-mcq-part2
13/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Answer: (b) 64 kbps
Explanation: The ISDN supports data transfer rates up to 64 kbps. ISDN is a circuitswitched telephone network system. It is a set of communication standards for digital
transmission (e.g., audio, video, and other network-related data).
30) ARPANET stands for _______.
a. Advanced Recheck Projects Agency Internet
b. Advanced Recheck Projects Agency Network
c. Advanced Research Projects Agency Network
d. Advanced Research Projects Agency Internet
Hide Answer
Workspace
Answer: (c) Advanced Research Projects Agency Network
Explanation: ARPANET stands for Advanced-Research-Projects-Agency-Network. It was
the world's first packet-switching network and the first in the world to use the TCP/IP
model.
31) What is the size of the UDP header?
a. 8 bytes
b. 16 bytes
c. 20 bytes
d. 64 bytes
Hide Answer
Workspace
Answer: (a) 8 bytes
Explanation: The size of the UDP header is 64 bits (64 bit means 8 bytes). It is a simple
transport layer communication protocol. It has four parameters: Source port, Destination
⇧ SCROLL TO TOP
port, Length, and Checksum.
https://www.javatpoint.com/computer-network-mcq-part2
14/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
32) Which of the following protocols is the connection-less protocol?
a. UDP
b. TCP
c. IP
d. All of the these
Hide Answer
Workspace
Answer: (a) UDP
Explanation: UDP is a connection-less protocol which means that when data transfer
occurs, this protocol does not establish a connection between the sender and the receiver.
33) Wildcard domain name labels begin with a ______.
a. .
b. 0
c. @
d. *
e. #
Hide Answer
Workspace
Answer: (c) *
Explanation: A wildcard record is a type of resource record that matches one or more
subdomains. It is started with a "*". For example: *.javatpoint.com
34) What is the maximum length of the STP wire?
a. 20 ft
b. 50 ft TO TOP
⇧ SCROLL
https://www.javatpoint.com/computer-network-mcq-part2
15/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
c. 50 meters
d. 100 meters
Hide Answer
Workspace
Answer: (d) 100 meters
Explanation: STP is the full name Shielded twisted-pair. This cable is similar to UTP, but it
has an extra mesh coating or metal foil, and all the wires are inside it. The maximum length
of this wire is 100 meters. If the length is more than 100 meters, then this cable loses its
signals. Therefore, this wire is more suitable for small networks such as LANs.
35) Which network is suitable for a building?
a. WAN
b. LAN
c. MAN
d. PAN
Hide Answer
Workspace
Answer: (b) LAN
Explanation: LAN network is used to connect computers in a small area such as school,
office, residence, etc. It is less expensive and very secure.
36) ________ is a 2G mobile telecommunications based on the CDMA.
a. IS-95
b. ISO 1990
c. IS-97
d. None of the these
Hide Answer
Workspace
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
16/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Answer: (a) IS-95
Explanation: The full name of IS-95 is interim standard 95. It is a second-generation
mobile telecommunications standard based on CDMA (code division multiple access). It
was developed by Qualcomm.
37) Which of the following statements is correct about IRC?
a. It sends the messages in virtual time
b. It is an application layer protocol
c. It works on the proxy model
d. All of the these
Hide Answer
Workspace
Answer: (b) It is an application layer protocol
Explanation: IRC stands for Internet relay chat. It is an application layer protocol that is
used to communicate over the internet as a text message. It sends messages in real-time.
38) Which of the following devices is not a networking device?
a. Hub
b. Switch
c. Bridge
d. None of the these
Hide Answer
Workspace
Answer: (d) None of the these
Explanation: Hub, Switch, and Bridge are networking devices. Therefore, option d is the
correct answer.
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
17/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
39) Which of the following devices does not require power to forward the signals?
a. Active hub
b. Passive hub
c. Repeater
d. Bridge
Hide Answer
Workspace
Answer: (b) Passive hub
Explanation: The passive hub sends the signal forward as it is, so it does not need a
power supply.
40) How many pins does RJ-45 contain?
a. Two
b. Four
c. Eight
d. Ten
Hide Answer
Workspace
Answer: (c) Eight
Explanation: The RJ-45 has eight pins of different colors. The four pins have solid colors,
and the other four pins have light colors.
← Prev
Next →
For Videos Join Our Youtube Channel: Join Now
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
18/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Feedback
Send your Feedback to feedback@javatpoint.com
Help Others, Please Share
Learn Latest Tutorials
SoapUI
RPA
Manual Testing
Cucumber
Appium
PostgreSQL
Solr
MongoDB
Gimp
Verilog
Teradata
PhoneGap
Reasoning
Verbal Ability
Interview
Preparation
Aptitude
Company
Interview
Questions
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
19/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Company
Trending Technologies
Artificial
Intelligence
Tutorial
AWS Tutorial
AWS
Selenium
tutorial
Cloud tutorial
Cloud
Selenium
Artificial
Intelligence
Hadoop tutorial
Hadoop
Blockchain
Tutorial
ReactJS
Tutorial
Data Science
Tutorial
Angular 7
Tutorial
ReactJS
Data Science
Angular 7
Git Tutorial
Git
Blockchain
Machine
Learning Tutorial
DevOps
Tutorial
Machine Learning
DevOps
B.Tech / MCA
DBMS tutorial
DBMS
Data Structures
tutorial
DAA tutorial
DAA
Data Structures
Computer
Network tutorial
Compiler
Design tutorial
Computer Network
Compiler Design
Ethical Hacking
Tutorial
Computer
Graphics Tutorial
Ethical Hacking
Computer Graphics
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
Operating
System tutorial
Operating System
Computer
Organization and
Architecture
Discrete
Mathematics
Tutorial
Computer
Organization
Discrete
Mathematics
Software
Engineering
Tutorial
html tutorial
Web Tech.
Software
Engineering
20/21
6/23/2021
Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint
Cyber Security
tutorial
Automata
Tutorial
Cyber Security
Automata
Java tutorial
Java
.Net
Framework
tutorial
C Language
tutorial
C++ tutorial
C++
C
Python tutorial
Python
List of
Programs
Programs
.Net
Control
Systems tutorial
Control System
Data Mining
Tutorial
Data Mining
⇧ SCROLL TO TOP
https://www.javatpoint.com/computer-network-mcq-part2
21/21
Download
Study collections