IP attaches a header to upper layer data to form an IP __________. Select one: packet subnet datagram layer Although it is intended to ultimately be replaced, IPv4 is currently the standard IP used in TCP/IP networks. Select one: True False Suppose two IPv6 nodes want to communicate using IPv6 datagrams but are connected to each other by intervening IPv4 routers in the middle. The best solution here is_____ Select one: Tunneling No solution Replace the system fragmentation Which of the following is NOT an enhancement of IPv6 over IPv4? Select one: expanded address space header format helps speed processing/forwarding header changes to facilitate QoS improved error recovery Guaranteed delivery with bounded delay: This service guarantees that the packet will be delivered within a specified host-to-host delay bound. In-Order packets: This service ensures that the packet arrives at the destination in the order in which they are sent. Guaranteed max jitter: This service ensures that the amount of time taken between two successive transmissions at the sender is equal to the time between their receipt at the destination. Security services: The network layer provides security by using a session key between the source and destination host. The network layer in the source host encrypts the payloads of datagrams being sent to the destination host. The network layer in the destination host would then decrypt the payload. In such a way, the network layer maintains the data integrity and source authentication services. Suppose datagrams are limited to 1,700 bytes (including header) between source Host A and destination Host B. Assuming a 20-byte IP header, how many datagrams would be required to send an MP3 consisting of 100,000 bytes? Hint: The answer must be an integer number. Answer: 60 طريقة الحل 1700 – ) ثابتة40( = 1660 1660 / 100.000= 60 File size = 100000 bytes. Assume the data is carried in TCP segments, with each TCP segment also having 20 bytes of header. Then each datagram can carry 1500-40=1460 bytes of the file. Number of datagrams required 1105/1460=69. datagrams Answer All but the last datagram will be 1,500 bytes; the last datagram will be 720 (calculated from 681460 - 100000)+40 = 760bytes. Note that here there is no fragmentation - the source host does not create datagrams larger than 1500 bytes, and these datagrams are smaller than the MTUs of the links. _________ determines how datagram is routed among routers along end-end path from source host to destination host. Select one: Control plane Data plane Forwarding None of the above The reassembly of the fragments of an IP datagram is done in the datagram’s destination host. Select one: True False The job of delivering the data in a transport-layer segment to the correct socket is called. Demultiplexing Sequence numbers are required for a receiver to find out whether an arriving packet contains a new data or is a retransmission. The job of gathering data chunks at the source host from different sockets, capsulating each data chunk with header information to create segments, and passing the segments to the network layer is called. Multiplexing Sender can have up to N unacknowledged packets in pipeline, and receiver only sends cumulative ack Go-Back-N protocol Sender can have up to N unacknowledged packets in pipeline, and receiver sends individual ack for each packet. Selective Repeat Protocol To join the internet, the computer has to be connected to a____ A. Internet architecture board B. Internet service provider A ___ is a device that forwards packets between networks by processing the routing information included in the packet. A. Switch B. Router C. Hub D. Firewall Sequence numbers are required for a receiver to find out whether an arriving packet contains a new data or is a retransmission. Select one: True False Zeroconf protocol means that the protocol is able to automatically configure a host’s network-related aspects in order to connect the host into a network. Select one: True False Which of the following field in IPv4 datagram is not related to fragmentation? Select one: More flag TOS Offset Identifier The term IANA stands for? Internet Assigned Numbers Authority Internal Associative Numbers Authority Internal Assigned Numbers Authority Internet Associative Numbers Authoritative How many versions available of IP? One version Four versions Six versions Two versions Generalized-forwarding means that besides its final destination, other factors associated with a datagram is also considered when a router determines the output interface for the datagram Select one: True False The term IPv4 stands for? Internet Programming Version 4 International Protocol Version 4 International Programming Version 4 Internet Protocol Version 4 These are the features present in IPv4 but not in IPv6 Select one: Fragmentation Header checksum Options All of the mentioned The size of IP address in IPv6 is Select one: 4 octets 16 byte 32 bits 40 bytes There is not a need for connection establishment and termination procedures to support connection-oriented service with a reliable network service. Select one: True False The first line of HTTP request message is called ____________ Select one: Header line Entity line Request line Status line Status line: Explanation: Status line is the the start line of an HTTP response. Which is a time-sensitive service? Select one: Internet telephony File download E-mail File transfer Given that DNS RR format: (name, value, type, ttl) If Type=CNAME, then Value is a________________ for the alias hostname Name . canonical hostname hostname mail server domain FTP uses _________ parallel TCP connections to transfer a file Select one: 4 3 1 2 HTTP response messages never have an empty message body. Select one: True False POP3 protocol is stateless across sessions. Select one: True False A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. Select one: True False In DNS: iterated query puts burden of name resolution on contacted name server, and heavy load at upper levels of hierarchy. Select one: True False The domain name system is maintained by _______ Select one: a single computer centralized database system distributed database system a single server When displaying a web page, the application layer uses the _____________ Select one: SMTP protocol FTP protocol TCP protocol HTTP protocol Demultiplexing in UDP, receiver uses four values: 1. source IP address 2. source port number 3. destination IP address 4. destination port number to direct segment to appropriate socket. Select one: True False The first line of HTTP response message is called request line. Select one: True False Given that DNS RR format: (name, value, type, ttl) If Type=A , then Name is a domain (such as foo.com ) and Value is the hostname of an authoritative DNS server that knows how to obtain the IP addresses for hosts in the domain. False UDP provides a reliable byte-stream between client and server but TCP does not. Select one: True False Transport services and protocols provide logical communication between hosts. Select one: True False SMTP is a "push" protocol, while HTTP is a "pull" protocol. Select one: True False In computer network nodes are ___________ Select one: the computer that routes the data all of the mentioned the computer that terminates the data the computer that originates the data Router can be called (host) Select one: True False Upstream transmission rate typically is larger than downstream transmission rate Select one: True False Transport layer is implemented in routers. Select one: True False To join the internet, the computer has to be connected to a _________ a) internet architecture board b) internet society c) internet service provider d) different computer Most routers use this principle Select one: Stop and wait Store and forward Both Stop and wait and Store and forward None of the mentioned For persistent HTTP, multiple objects can be sent over single TCP connection between client and server. Select one: True False _______ define format, order of messages sent and received among network entities, and actions taken on message transmission and receipt. Protocols Sender wont overwhelme receiver. flow control Program running within a host. Process Responsible for com, org, net, edu, aero, jobs, museums. top-level domain (TLD) servers Suppose you wanted to do a transaction from a remote client to a server as fast as possible. would you use UDP or TCP. User Datagram Protocol (UDP) Provides interrupted TCP connection, data integrity, and endpoint authentication. SSL Attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic. Denial Of Service (DoS) Promiscuous network interface reads/records all packets (ex. including passwords!) Passing by. Packet Sniffing Send packet with false source address. IP Spoofing Self-Replicating infection by passively receiving object that gets itself executed. Worm Self-replicating infection by receiving/executing object (ex. e-mail attachment). Virus In TCP, the byte stream "number" of first byte in segment's data is called. sequence number Encapsulates transport-layer segment with a network-layer header. network-layer datagram Generated by the transport layer and encapsulates application-layer message with transport layer header. transport-layer segment Data which an application wants to send and passed onto the transport layer. Applicationlayer message Encapsulates Network layer datagram with a link-layer Header. link-layer frame Pipelined protocols means that sender sends one packet, then walts for receiver response Select one: True False Which of the following is false with respect to TCP? a) Connection-oriented b) Process-to-process c) Transport layer protocol d) Unreliable In TCP, sending and receiving data is done as _______ a) Stream of bytes b) Sequence of characters c) Lines of data d) Packets TCP process may not write and read data at the same speed. So we need __________ for storage. a) Packets b) Buffers c) Segments d) Stacks TCP groups a number of bytes together into a packet called _______ a) Packet b) Buffer c) Segment d) Stack Communication offered by TCP is ________ a) Full-duplex b) Half-duplex c) Semi-duplex d) Byte by byte To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. a) Packet b) Buffer c) Segment d) Acknowledgment In segment header, sequence number and acknowledgement number fields refer to _______ a) Byte number b) Buffer number c) Segment number d) Acknowledgment Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment? a) 10000 b) 10001 c) 12001 d) 11001 Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________ a) Fixed number b) Random sequence of 0’s and 1’s c) One d) Sequence of zero’s and one’s The value of acknowledgement field in a segment defines _______ a) sequence number of the byte received previously b) total number of bytes to receive c) sequence number of the next byte to be received d) sequence of zeros and ones The size of an IP address in IPv6 is _________ a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits The header length of an IPv6 datagram is ___________ a) 10bytes b) 25bytes c) 30bytes d) 40bytes In the IPv6 header, the traffic class field is similar to which field in the IPv4 header? a) Fragmentation field b) Fast-switching c) ToS field d) Option field IPv6 does not use _________ type of address. a) broadcast b) multicast c) anycast d) unicast Which among the following features is present in IPv6 but not in IPv4? a) Fragmentation b) Header checksum c) Options d) Anycast address The _________ field determines the lifetime of IPv6 datagram a) Hop limit b) TTL c) Next header d) Type of traffic Dual-stack approach refers to _________ a) implementing Ipv4 with 2 stacks b) implementing Ipv6 with 2 stacks c) node has both IPv4 and IPv6 support d) implementing a MAC address with 2 stacks Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________ a) Use dual-stack approach b) Tunneling c) No solution d) Replace the system Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______ a) 96 to 127 b) 0 to 63 c) 80 to 95 d) 64 to 79 Services provided by Internet transport protocols TCP service: connection-oriented: setup required between client, server reliable transport between sending and receiving process flow control: sender won’t overwhelm receiver congestion control: throttle sender when network overloaded does not provide: timing, minimum bandwidth guarantees UDP service: connection-less: unreliable data transfer between sending and receiving process does not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? There is no difference. "Host" and "end system" are used interchangeably. End systems include PCs, workstations, Web servers, mail servers, Internet-connected PDAs, WebTVs, etc. Why are standards important for protocols? Standards are important for protocols so that both communicating computers are sending and interpreting data in the same order and manner. 1- A telephone network is an example of a packet switching network Select one: True False 1. A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched 2- Using higher access link is more performance and cheaper than installing a local cache in the institutional network. Select one; True False 3- Consider sending a 10000-byte datagram into a link that has an MTU of 980 bytes. Suppose the original datagram is stamped with the identification number 422 How many fragments are generated? Hint: The value must be integer number only. Answer: 10 (10000-20) / (980-20) = 10.3 = 10 20 = IP header 4- Router can be called (host) Select one: True False 5- TCP is the network layer protocol used on the Internet today. Select one: True False 6- IMAP protocol is stateless across sessions. Select one: True False 7- In the email system, the header lines, as: "To:, From:, Subject:", are the same as SMTP commands "MAIL FROM, RCPT TO:" Select one: True False 8- ISO stands for _______________ Select one: International Standards Organization International Organization for Standardization International standalone organization none of the mentioned 9- DHCP client and servers on the same subnet communicate via----------------Select one: TCP unicast TCP broadcast UDP unicast UDP broadcast 10- "Parity bits" are used for which of the following purposes? To transmit faster To detect errors To identify the user Encryption of data. 11- Route aggregation means that an ISP uses a single prefix to advertise multiple networks. Select one: True False 12- Each IP packet must contain --------------------Only Destination address. Only Source address. Source and Destination address. Source or Destination address. 13- During normal IP packet forwarding by a router, which of the following fields of the IP header is updated? Checksum Destination address Repeater Source address 14- Which of the following field in IPV4 datagram is not related to fragmentation? Select one: TOS Offset Identifier More flag 15- A network-layer packet is a datagram. A router forwards a packet based on the packet's -------------------- address Select one: MAC flow PORT IP 16- Which field helps to check rearrangement of the fragments? tti flag identifier offset 17- Transport layer protocols deals with Select one: node to node communication process to process communication application to application communication 18- what is the header size of UDP packet? Select one: 16 bytes 8 bits 8 bytes 19- The first Network was called ASAPNET Select one: True False 20- The value of acknowledgement field in a segment defines_____________ Select one: Number of previous bytes to receive Sequence of zero's and one's Number of the expected next byte to receive Total number of bytes to receive 21- Two devices are in network if ________________ . Select one: a process in one device is able to exchange information with a process in another device a process is running on both devices PIDs of the processes running of different devices are same 22- What allows TCP to detect lost segments and in turn recover from that loss? Select one: Checksum Acknowledgment number Sequence number Both Sequence & Acknowledgment number 23- Which layer provides the services to user? Select one: presentation layer application layer session layer Network layer 24- The receiver of the data controls the amount of data that are to be sent by the sender is referred as -----------------Select one: Congestion control Flow control Error control Error detection 25- Suppose Host A sends two TCP segments to Host B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. Then the data in the first segment is ____________ 91 bytes 20 bytes 110 bytes 90 bytes Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. a. How much data is in the first segment? b. Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, what will be the acknowledgment number? a) Consider sequence numbers,First segment=90 Second segment=110 Data in the first segment=110-90 =20 b) Consider the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, then the acknowledgment number will be first segment of sequence number, that is 90. 26- A _________ set of rules that governs data communication. Select one: Standards Protocols RFCS Servers 27- With nonpersistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. Select one: True False 28- A ----------------is a device that forwards packets between networks by processing the routing information included in the packet. Select one: firewall hub router switch 29- The Date: header in the HTTP response message indicates when the object in the response was last modified. Select one: True False The first line of HTTP request message is called ____________ Header line Entity line Request line Status line Which is a time-sensitive service? Internet telephony File download E-mail File transfer FTP uses _________ parallel TCP connections to transfer a file 4 3 1 2 HTTP response messages never have an empty message body. True False POP3 protocol is stateless across sessions. True False A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. True False In DNS: iterated query puts burden of name resolution on contacted name server, and heavy load at upper levels of hierarchy. True False The domain name system is maintained by _______ a single computer centralized database system distributed database system a single server The number of objects in a Web page which consists of 10 jpeg images and HTML text is Answer : 10(jpeg)+1(html) = 11 When displaying a web page, the application layer uses the _____________ SMTP protocol FTP protocol TCP protocol HTTP protocol User datagram protocol is called connectionless because__________ it is received in the same order as sent order it sends data as a stream of related packets all UDP packets are treated independently by transport layer Which of the following is true with respect to TCP Connection-oriented Process-to-process Transport layer protocol All of the mentioned Communication offered by TCP is__________ Semi-duplex Half-duplex Full-duplex Byte by byte TCP groups a number of bytes together into a packet called__________ Segment Packet Buffer Stack What allows TCP to detect lost segments and in turn recover from that loss? Acknowledgment number Checksum Sequence number Both Sequence & Acknowledgment number TCP fast retransmit means that if sender receives 3 ACKs for same data (“triple duplicate ACKs”), resend unacked segment with smallest sequence #. True False To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. Acknowledgment Segment Buffer Packet TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False "Stop and wait" protocols means that sender allows multiple, “in-flight”, yet-to-beacknowledged packets. True False (truth pipelining) Transport layer protocols deals with : application to application communication process to process communication node to node communication The TCP segment has a field in its header for rwnd . True False For "Go-back-N" protocol, sender maintains timer for each unacked packet. when timer expires, retransmit only that unacked packet. True False A transport-layer protocol can provide reliable data transfer even if the underlying network layer is unreliable, by carefully combining acknowledgments, timers, retransmissions, and sequence numbers. True False 1. The first line of HTTP request message is called ____________ a. Select one: i. Header line ii. Entity line iii. Request line iv. Status line 2. Which is a time-sensitive service? a. Select one: i. Internet telephony ii. File download iii. E-mail iv. File transfer 3. Given that DNS RR format: (name, value, type, ttl) If Type=CNAME, then Value is a________________ for the alias hostname Name . a. Select one: i. canonical hostname ii. hostname iii. mail server iv. domain 4. FTP uses _________ parallel TCP connections to transfer a file a. Select one: i. 4 ii. 3 iii. 1 iv. 2 5. Installing a local cache in the institutional network is more performance and cheaper than using higher access link. a. Select one: i. True ii. False 6. HTTP response messages never have an empty message body. a. Select one: i. True ii. False 7. POP3 protocol is stateless across sessions. a. Select one: i. True ii. False 8. A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. a. Select one: i. True ii. False 9. In DNS: iterated query puts burden of name resolution on contacted name server, and heavy load at upper levels of hierarchy. a. Select one: i. True ii. False 10. The domain name system is maintained by _______ a. Select one: i. a single computer ii. centralized database system iii. distributed database system iv. a single server 11. When displaying a web page, the application layer uses the _____________ a. Select one: i. SMTP protocol ii. FTP protocol iii. TCP protocol iv. HTTP protocol The minimum size of TCP segment header is 20 bytes 32 bytes 16 bytes 20 bits UDP provides unreliable transfer of datagrams between client and server. True Recall the Go-back-N protocol in Section 3.4. this protocol have a timer for each unacknowledged packet GBN does not use timer GBN has only one timer, for the oldest unacknowledged packet Sequence numbers are required for a receiver to find out whether an arriving packet contains new data or is a retransmission. True False "Stop and wait" protocols means that sender allows multiple, "in-flight", yet-to-beacknowledged packets. True False (truth is pipelining) "Total length" field in UDP packet header is the length of UDP header plus data Only UDP header Only checksum Only data Suppose Host A sends two TCP segments to Host B over a TCP connection. The first segment has sequence number 90 the second has sequence number 110. Then the data in the first segment is_____________ 90 bytes 20 bytes 91 bytes 110 bytes Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily 42. True False The value of acknowledgement field in a segment defines__________ Sequence of zero's and one's Number of previous bytes to receive Number of the expected next byte to receive Total number of bytes to receive The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to. True False The size of the TCP rwnd never changes throughout the duration of the connection.( The size of the TCP advertised window (RcvWindow) never changes throughout the duration of the connection. ) True False Demultiplexing in UDP, receiver uses four values: 1. source IP address 2. source port number 3. destination IP address 4. destination port number to direct segment to appropriate socket. True False A transport protocol can be either connection oriented, such as UDP, or connectionless, such as TCP. True False what is the header size of UDP packet? 8 bits 16 bytes 124 bytes 8 bytes What allows TCP to detect lost segments and in turn recover from that loss? Both Sequence & Acknowledgment number Acknowledgment number Sequence number Checksum Internet works on Select one: packet switching both packet switching and circuit switching data switching circuit switching Two devices are in network if Select one: none of the mentioned a process is running on both devices PIDs of the processes running of different devices are same a process in one device is able to exchange information with a process in another device If there are N routers from source to destination, total end to end delay in sending packet ( Lnumber of bits in the packet, R. transmission rate) Select one: N (2N*L)/R (N*L) /R 1/R ISO stands for Select one: International Standards Organization none of the mentioned International Organization for Standardization International standalone organization define format, order of messages sent and received among n message transmission, receipt Select one Protocols None of the RFCS Standards Which address identifies a process on a host? Select one: logical address specific address port address physical address The first Network was called ASAPNET True False Which of this is a network edge device? Select one: Switch Bridge Router Smartphones Application layer is responsible for process to process delivery. Select one: True False Transport layer is implemented in routers. True False The first line of HTTP request message is called ____________ Header line Entity line Request line Status line Which is a time-sensitive service? Internet telephony File download E-mail File transfer FTP uses _________ parallel TCP connections to transfer a file 4 3 1 2 HTTP response messages never have an empty message body. True False POP3 protocol is stateless across sessions. True False A user requests a Web page that consists of some text and three images. For this page, the client will send one request message and receive four response messages. True False In DNS: iterated query puts burden of name resolution on contacted name server, and heavy load at upper levels of hierarchy. True False The domain name system is maintained by _______ a single computer centralized database system distributed database system a single server The number of objects in a Web page which consists of 10 jpeg images and HTML text is Answer : 10(jpeg)+1(html) = 11 When displaying a web page, the application layer uses the _____________ SMTP protocol FTP protocol TCP protocol HTTP protocol User datagram protocol is called connectionless because__________ it is received in the same order as sent order it sends data as a stream of related packets all UDP packets are treated independently by transport layer Which of the following is true with respect to TCP Connection-oriented Process-to-process Transport layer protocol All of the mentioned Communication offered by TCP is__________ Semi-duplex Half-duplex Full-duplex Byte by byte TCP groups a number of bytes together into a packet called__________ Segment Packet Buffer Stack What allows TCP to detect lost segments and in turn recover from that loss? Acknowledgment number Checksum Sequence number Both Sequence & Acknowledgment number TCP fast retransmit means that if sender receives 3 ACKs for same data (“triple duplicate ACKs”), resend unacked segment with smallest sequence #. True False To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. Acknowledgment Segment Buffer Packet TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False "Stop and wait" protocols means that sender allows multiple, “in-flight”, yet-to-beacknowledged packets. True False (truth pipelining) Transport layer protocols deals with : application to application communication process to process communication node to node communication The TCP segment has a field in its header for rwnd . True False For "Go-back-N" protocol, sender maintains timer for each unacked packet. when timer expires, retransmit only that unacked packet. True False A transport-layer protocol can provide reliable data transfer even if the underlying network layer is unreliable, by carefully combining acknowledgments, timers, retransmissions, and sequence numbers. True False MCQS for Computer Networks (Ch1-3) A local area network (LAN) is defined by _______________ A. The geometric size of the network B. The maximum number of hosts in the network C. The maximum number hosts in the network and/or the geometric size of the network D. The topology of the network The largest geographic area a wide area network (WAN) can span is A. a town B. a state C. a country D. the world The TCP/IP protocol suite consists of _______ layers. A. two B. Three C. five D. six A router is involved in ____________ layers of the TCP/IP protocol suite. A. two B. Three C. four D. five A link-layer switch is involved in ______________ layers of the TCP/IP protocol suite A. two B. Three C. four D. five In the TCP/IP protocol suite, which of the following is an application layer protocol? A. The User Datagram Protocol (UDP) B. The Internet Protocol (IP) C. The File Transfer Protocol (FTP) D. The Transmission Control Protocol (TCP) In the TCP/IP protocol suite, which of the following is a transport layer protocol? A. The Internet Control Message protocol (ICMP) B. The Internet Protocol (IP) C. The Address Resolution Protocol (ARP) D. The Transmission Control Protocol (TCP) In the TCP/IP protocol suite, which of the following is a network layer protocol? A. The Stream Control Transmission Protocol (SCTP) B. The Secure Shell (SSH) C. The Internet Protocol (IP) D. User Datagram Protocol (UDP) In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next. A. physical B. data link C. transport D. network The transport-layer packet in the TCP/IP protocol suite is called A. a message B. a datagram C. a segment or a user datagram D. a frame In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium. A. programs B. dialogs C. protocols D. bits In the TCP/IP protocol suite, a port number is the identifier at the ____________. A. application layer B. transport layer C. network layer D. physical layer In the TCP/IP protocol suite, a logical address is the identifier at the _______________. A. network layer B. transport layer C. data-link layer D. application layer The _________ layer is responsible for the delivery of a message from one process to another. A. physical B. transport C. network D. application The Internet Protocol (IP) is ________ protocol. A. a reliable B. a connection-oriented C. a reliable and connection-oriented D. an unreliable The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model A. application, presentation, and session B. application, transport, and network C. application, data-link, and physical D. network, data-link, and physical A proposed standard is elevated to ________ standard status after at least two successful tries. A. informational B. historic C. draft D. None of the choices are correct An RFC is labeled ________ if it must be implemented by all Internet systems. A. required B. elective C. recommended D. None of the choices are correct In the original ARPANET, _______ were directly connected to each other. A. interface message processors (IMPs) B. host computers C. networks _______ was formed to connect universities with no defense ties. A. ARPANET B. CSNET C. NSFNET D. ANSNET Currently _______ is responsible for the management of Internet domain names and addresses A. NIC B. ICANN C. ISOC D. IEFE In TCP/IP, a message at the application layer is encapsulated in a packet at the ________ layer. A. network B. transport C. data link D. physical In TCP/IP, a message at the transport layer is encapsulated in a packet at the ________ layer. A. network B. transport C. data link D. physical In TCP/IP, a message belonging to the network layer is decapsulated from a packet at the ________ layer. A. network B. transport C. data link D. physical In TCP/IP, a message belonging to the transport layer is decapsulated from a packet at the ________ layer A. network B. transport C. data link D. physical In TCP/IP, a logical connection between an entity at the network layer can be made with another entity at the ________ layer. A. network B. transport C. data link D. physical In TCP/IP, a logical connection between an entity at the data-link layer can be made with another entity at the ________ layer. A. network B. transport C. data link D. physical In TCP/IP, a packet at the third layer carries data belonging to the ________ layer and the header belonging to the _________ layer. A. third; third B. third; fourth C. fourth; third D. fourth; fourth In a client-server paradigm, a _______ program provides services to a (another) _______ program A. client; client B. client; server C. server; client D. server; server In a client-server paradigm A. both the server and the client must be running all the time. B. both the server and the client need to be running only when they are needed. C. the server must be running all the time but the client needs to be running only when it is needed. D. the client must be running all the time but the server needs to be running only when it is needed The first section of a URL identifier is the __________. A. protocol B. path C. host D. port A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only A. static B. dynamic C. active D. None of the choices are correct _____________ is a language for creating a static document A. Extensible Style Language (XSL) B. Hypertext Markup Language (HTML) C. Extensible Markup Language (XML) D. All choices are correct A _______ document is created by a Web server whenever a browser requests the document A. static B. dynamic C. active D. None of the choices are correct For many applications, we need a program or a script to be run at the client site. These are called _______________ documents A. static B. dynamic C. active D. None of the choices are correct HTTP uses the services of _________ A. UDP B. IP C. TCP D. DNS In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line A. request; response B. status; response C. status; status D. None of the choices are correct In a ___________ connection, one TCP connection is made for each request/response. A. persistent B. nonpersistent C. persistent or a nonpersistent D. None of the choices are correct In a ___________ connection, the server leaves the connection open for more requests after sending a response. A. persistent B. nonpersistent C. persistent or nonpersistent D. None of the choices are correct In HTTP, _______ server is a computer that keeps copies of responses to recent requests. A. a regular B. a proxy C. an auxiliary D. a remote An HTTP request message always contains _______. A. a header line and a body B. a request line and a header line C. a request line, a header line, and a body D. a request line, a header line, a blank line, and a body Which of the following is present in both an HTTP request line and a status line? A. version number B. URL C. status code D. method FTP uses the services of ________. A. UDP B. IP C. TCP D. none of the choices are correct 16 . In FTP, _________ well-known port(s) is (are) used. A. one B. two C. three D. four During an FTP session the control connection is opened _______. A. once B. twice C. many times D. none of the choices are correct During an FTP session the data connection may be opened _______. A. only once B. only two times C. as many times as needed D. none of the choices are correct In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______. A. file types B. data structures C. transmission modes D. none of the choices are correct . In FTP, there are three types of _______: stream, block, and compressed. A. file types B. data types C. transmission modes D. none of the choices are correct In FTP, ASCII, EBCDIC, and image define an attribute called _______. A. file type B. data structure C. transmission mode D. none of the choices are correct In FTP, when we _______, it is copied from the client to the server. A. retrieve a file B. store a file C. open a file D. none of the choices are correct In the common scenario, the electronic mail system needs _________________________. A. two UAs, two MTAs and one MAA B. two UAs, two MTAs and two MAAs C. two UAs, two pairs of MTAs and a pair of MAAs D. two UAs, two pairs of MTAs and a two pairs of MAAs ________ provides service to the user to make the process of sending or receiving a message easier. A. An MTA B. An MAA C. A UA D. None of the choices are correct An e-mail message contains the ________ and the __________. A. header; envelop B. header; body C. envelop; body D. None of the choices are correct In the Internet, an e-mail address consists of two parts: a _______ and a _______. A. local part; domain name B. global part; domain name C. label; domain name D. local part; label _________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail. A. SMPT B. MPEG C. MIME D. POP The formal protocol that defines the MTA client and server in the Internet is called ___________. A. SMTP B. SNMP C. TELNET D. SSH SMTP is a __________ protocol. A. pull B. push C. push and pull D. None of the choices are correct The message access protocol is a ________ protocol. A. pull B. push C. push and pull D. None of the choices are correct In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits A. 8bit B. binary C. base64 D. quoted-printable In the _______ encoding scheme, a non-ASCII character is sent as 3 characters. A. 8bit B. base64 C. quoted-printable D. binary TELNET is an abbreviation for ____________. A. terminal network B. telephone network C. telecommunication network D. None of the choices are correct When a user logs into a local time-sharing system, it is called ________ login. A. local B. remote C. local or remote D. None of the choices are correct When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. A. local B. remote C. local or remote D. None of the choices are correct Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________. A. sending; receiving B. request; reply C. data; control D. None of the choices are correct For data, NVT uses US ASCII characters with the highest order bit set to ______. A. 1 B. 0 C. 1 or 0 D. None of the choices are correct For control, NVT uses US ASCII characters with the highest order bit set to ______. A. 1 B. 0 C. 1 or 0 D. None of the choices are correct The _______ translates local characters into NVT characters. A. terminal driver B. TELNET client C. TELNET server D. pseudoterminal driver The _______ translates NVT characters into a form acceptable by the remote operating system. A. terminal driver B. TELNET client C. TELNET server D. pseudoterminal driver The _________ component in the SSH provides confidentiality, integrity, authentication and compression. A. SSH Application B. SSH-AUTH C. SSH-CONN D. SSH-TRAN Port forwarding is ____________________________. A. a protocol used to forward messages from one port to another port B. a procedure for changing an ephemeral port to a well-known port C. a service, provided by SSH, that creates a secure channel for applications that do not have security services. D. None of the choices are correct In a _______ name space, a name is a sequence of characters without structure. A. linear B. flat C. hierarchical D. organized In a _________ name space, each name is made of several parts. A. linear B. flat C. hierarchical D. organized In the DNS, the names are defined in ___________ structure. A. a linear list B. an inverted-tree C. a three-dimensional D. None of the choices are correct The root of the DNS tree is _______. A. a string of 127 characters B. a string of 63 characters C. a string of 15 characters D. an empty string In the domain name space, a full domain name is a sequence of labels separated by ________. A. colons B. semicolons C. dots D. commas In the domain name space, if a label is terminated by a null string, it is called a __________. A. PQDN B. CQDN C. SQDN D. None of the choices are correct In the domain name space, if a label is not terminated by a null string, it is called a __________. A. FQDN B. PQDN C. SQDN D. None of the choices are correct In the domain name space, a _________ is a subtree of the domain name space. A. label B. name C. domain D. None of the choices are correct In the domain name space, what a server is responsible for or has authority over is called a _________. A. domain B. label C. zone D. None of the choices are correct A _______ server is a computer whose zone system consists of the whole tree. A. domain B. zone C. root D. primary A ________ server is a computer that stores a file about the zone for which it has an authority. A. primary B. secondary C. zone D. root A ________ server is a computer that transfers the complete information about a zone from another server. A. primary B. secondary C. zone D. root In the Internet, the country domain section uses ___________ country abbreviations. A. two-character B. three-character C. four-character D. None of the choices are correct In __________ resolution, the resolver expects the server to supply the final answer. A. iterative B. recursive C. straight D. None of the choices are correct In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query. A. iterative B. recursive C. straight D. None of the choices are correct DNS can use the services of ________. A. UDP B. TCP C. either UDP or TCP D. None of the choices are correct A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base A. NIC B. ICANN C. ISOC D. IEFE In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm. A. client-server; client-server B. peer-to-peer; client-server C. client-server; peer-to-peer D. peer-to-peer; peer-to-peer Napster is an example of a ____________ peer-to-peer network A. centralized B. structured-decentralized C. unstructured-decentralized D. None of the choices are correct Gnutella is an example of a ____________ peer-to-peer network A. centralized B. structured-decentralized C. unstructured-decentralized D. None of the choices are correct BitTorrent is an example of a ____________ peer-to-peer network A. centralized B. structured-decentralized C. unstructured-decentralized D. None of the choices are correct In a structured-decentralized P2P network, ________________. A. the directory system is kept in a center B. a query to find a file must be flooded through the network C. a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved D. None of the choices are correct In a DHT-based network, each peer A. has a partial knowledge about the whole network. B. has a complete knowledge about the whole network. C. only has a knowledge about its successor. D. None of the choices are correct The finger table is the routing table used in ______________. A. Gnutella B. Pastry C. Kademlia D. None of the choices are correct Which of the following is not a Chord interface. A. Lookup B. Fix node C. Stabilize D. Join In __________ a key is stored in a node whose identifier is numerically closest to the key. A. Chord B. Pastry C. Kademlia D. None of the choices are correct To resolve a query, _________ uses two entities: a routing table and a leaf set. A. Chord B. Pastry C. Kademlia D. None of the choices are correct In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them. A. AND B. NOR C. OR D. None of the choices are correct In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree A. Chord B. Pastry C. Kademlia D. None of the choices are correct In Kademlia, each node in the network divides the binary tree into m subtrees that. A. include the node itself B. do not include the node itself C. include the node itself and the successor node D. None of the choices are correct Trackerless BitTorrent uses __________ DHT to do the job of tracking. A. Chord B. Pastry C. Kademlia D. None of the choices are correct At the transport layer, to define the processes, we need two identifiers called ____________. A. logical addresses B. physical addresses C. port addresses D. None of the choices are correct The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the ___________ ports. A. well-known; registered; dynamic or private B. registered; dynamic or private; well-known C. private or dynamic; well-known; registered D. private or dynamic; registered; well-known UDP and TCP are two protocols at the ___________ layer. A. data link B. network C. transport D. application Which of the following functions are performed by UDP? A. process-to-process communication B. host-to-host communication C. node-to-node communication D. None of the choices are correct A port number is _______ bits long. A. 8 B. 16 C. 32 D. 64 Which of the following does UDP provide? A. flow control B. connection-oriented delivery C. error control D. None of the choices are correct The source port number on the UDP user datagram header defines _______. A. the sending computer B. the receiving computer C. the process running on the sending computer D. None of the choices are correct To use the services of UDP, we need ________ socket addresses. A. four B. two C. three D. None of the choices are correct UDP packets are called __________ . A. user datagrams B. segments C. frames D. None of the choices are correct UDP packets have a fixed-size header of _______ bytes. A. 16 B. 8 C. 40 D. 32 TCP is a __________ protocol. A. byte-oriented B. message-oriented C. block-oriented D. None of the choices are correct TCP groups a number of bytes together into a packet called a ___________. A. user datagram B. segment C. datagram D. None of the choices are correct TCP is a(n) ___________ protocol. A. connection-oriented B. connectionless C. both connection-oriented and connectionless D. None of the choices are correct TCP is a(n) _______ transport protocol. A. unreliable B. best-effort delivery C. reliable D. None of the choices are correct TCP uses _________________ to check the safe and sound arrival of data. A. an acknowledgment mechanism B. out-of-band signaling C. the services of another protocol D. None of the choices are correct The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. A. 0 B. 1 C. randomly generated number D. None of the choices are correct In TCP, the sequence number for each segment is the number of the _______ byte (virtual byte) carried in that segment. A. first B. last C. middle D. None of the choices are correct Communication in TCP is ___________. A. simplex B. half-duplex C. full-duplex D. None of the choices are correct In TCP, the value of the acknowledgment field in a sent segment defines the sequence number related to the ______ byte a party expects to receive next. A. first B. last C. next D. None of the choices are correct The inclusion of the checksum in the TCP segment is ________. A. optional B. mandatory C. depends on the type of data D. None of the choices are correct In TCP, a SYN segment consumes _____ sequence number(s). A. no B. one C. two D. None of the choices are correct In TCP, a SYN + ACK segment consumes _____ sequence numbers. A. no B. three C. two D. one In TCP, an ACK segment, if carrying no data, consumes ______ sequence number(s). A. no B. one C. two D. None of the choices are correct The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack. A. ACK flooding B. FIN flooding C. SYN flooding D. None of the choices are correct The SYN flooding attack belongs to a group of security attacks known as a _____ attack. A. denial of service B. replay C. man-in-the middle D. None of the choices are correct One of the main duties of the transport layer is to provide ____________ communication. A. node-to-node B. host-to-host C. process-to-process D. None of the choices are correct In TCP, a FIN segment consumes ____ sequence numbers if it does not carry data. A. two B. three C. no D. one A client program normally uses ____________ port number. A server program normally uses __________ port number. A. a well-known; an ephemeral B. an ephemeral; a well-known C. a private; a well-known D. None of the choices are correct In TCP, a FIN + ACK segment consumes _____ sequence number(s) if it does not carry data. A. two B. three C. one D. no A socket address is a combination of __________. A. A MAC address and a logical address B. A MAC address and a port number C. a user-specific address and a logical address D. None of the choices are correct In TCP, one end can stop sending data while still receiving data. This is called a ______ termination. A. half-close B. half-open C. full-close D. None of the choices are correct ______________ means accepting items from more than one source. ______________ means delivering items to more than one source. A. Demultiplexing; Multiplexing B. Multiplexing; Demultiplexing C. Encapsulation; Decapsulation D. Pulling; Pushing TCP sliding windows are __________ oriented. A. packet B. segment C. byte D. None of the choices are correct ________ means the producer delivers the items when they are produced. _______ means the consumer takes the items when it is ready to do so. A. Pushing; pulling B. Pulling; pushing C. Forwarding; accepting D. None of the choices are correct In TCP, the size of the send window is the ________ of rwnd and cwnd. A. maximum B. sum of C. minimum D. None of the choices are correct In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive window size is _______ where m is the number of bits in the sequence. A. 1; 1 B. 2 m; – 1 C. 1; 2m D. 2m; 2m In TCP, the window should not be _________. A. opened B. closed C. shrunk D. slide In the Go-Back-N protocol, the maximum send window size is ______ and the maximum receive window size is _______, where m is related to the number of bits in the sequence. number. A. 1; 1 B. 1; 2m C. 2m – 1; 1 D. 2m – 1; 2m – 1 In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. A. ten B. zero C. one D. None of the choices are correct In the selective-repeat protocol, the maximum send window size is ______ and the maximum receive window size is _______, where m is the number of bits in the sequence. A. 1; 1 B. 1; 2m – 1 C. 2m – 1; 1 D. 2m – 1; 2m – 1 A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. A. silly window syndrome B. unexpected syndrome C. window bug D. None of the choices are correct UDP is a ________________ transport protocol. A. connectionless, reliable B. connection-oriented, unreliable C. connectionless, unreliable D. None of the choices are correct Nagle's algorithm can solve the silly window syndrome created by the _________. A. sender B. receiver C. both sender and receiver D. None of the choices are correct UDP is an acronym for _______. A. User Delivery Protocol B. User Datagram Procedure C. User Datagram Protocol D. None of the choices are correct Clark's solution can solve the silly window syndrome created by the _________. A. sender B. receiver C. both sender and receiver D. None of the choices are correct Delayed acknowledgment can solve the silly window syndrome created by the _________. A. sender B. receiver C. both sender and receiver D. None of the choices are correct In TCP, an ACK segments that carry no data consumes _______ sequence number(s). A. no B. one C. two D. None of the choices are correct In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. A. one B. two C. three D. None of the choices are correct In TCP, ________ retransmission timer is set for an ACK segment. A. one B. a previous C. no D. None of the choices are correct In TCP, there can be ______ RTT measurement(s) in progress at any time. A. two B. only one C. several D. None of the choices are correct We need to multiply the header length field by _______ to find the total number of bytes in the TCP header. A. 2 B. 4 C. 6 D. None of the choices are correct In TCP, urgent data requires the urgent pointer field as well as the URG bit (to be set) in the _______ field. A. control B. offset C. sequence number D. None of the choices are correct In TCP, if the ACK value is 200, then byte _______ has been received successfully. A. 199 B. 200 C. 201 D. None of the choices are correct In TCP, the _______ timer prevents a long idle connection between two TCPs. A. retransmission B. persistence C. keepalive D. None of the choices are correct In TCP, the _______ timer is needed to handle the zero window-size advertisement. A. retransmission B. persistence C. keepalive D. None of the choices are correct In TCP, Karn's algorithm is used in calculations by the _______ timer. A. retransmission B. persistence C. keepalive D. None of the choices are correct In TCP, a special segment called a probe is sent by a sending TCP when the _______ timer goes off. A. transmission B. persistence C. keepalive D. None of the choices are correct __________ control refers to the mechanisms and techniques to keep the load below the capacity. A. flow B. error C. congestion D. None of the choices are correct In TCP's ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold. A. congestion avoidance B. congestion detection C. slow start D. None of the choices are correct In TCP's __________ algorithm the size of the congestion window increases additively until congestion is detected. A. congestion avoidance B. congestion detection C. slow start D. None of the choices are correct ________ treats the two signs of congestion detections, timeout and three duplicate ACKs, in the same way. A. Taho TCP B. Reno TCP C. new Reno TCP D. None of the choices are correct In ______ TCP, when the connection is established, TCP starts the slow start algorithms and sets the ssthresh variable to a pre-agreed value (normally 64 or 128 kilobytes) and the cwnd variable to 1 MSS. A. Taho TCP B. Reno TCP C. new Reno TCP D. None of the choices are correct The ___________ added a new state to the congestion control FSM, called the fast recovery state. A. Taho TCP B. Reno TCP C. new Reno TCP D. None of the choices are correct The ___________ treated the two signals of congestion, timeout and arrival of three duplicate ACKs, differently. A. Taho TCP B. Reno TCP C. new Reno TCP D. None of the choices are correct The __________ state in Reno TCP is a state somehow between the slow start and the congestion avoidance states. A. congestion avoidance B. congestion detection C. slow recovery D. None of the choices are correct In the Reno TCP, when TCP enters the fast recovery, if duplicate ACKs continue to come, TCP ____________________________________. A. stays in this state, but the cwnd grows additively B. stays in this state, but the cwnd grows exponentially C. moves to slow start state D. moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs, TCP ____________________________________. A. stays in this state, but the cwnd grows additively B. stays in this state, but the cwnd grows exponentially C. moves to slow start state D. moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value In the Reno TCP, when TCP enters the fast recovery, if a new (non duplicate) ACK arrives TCP ____________________________________. A. stays in this state, but the cwnd grows additively B. stays in this state, but the cwnd grows exponentially C. moves to slow start state D. moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh value A later version of TCP, called ______ TCP, made an extra optimization on the _______ TCP. A. New Reno; Reno B. New Taho; Taho C. New Reno; Taho D. New Taho; Reno In the slow start algorithm, the size of the congestion window grows ______________ until ___________________. A. exponentially; it reaches a threshold B. exponentially; congestion is detected C. additively; it reaches a threshold D. additively; congestion is detected In the congestion avoidance algorithm, the size of the congestion window grows ______________ congestion is detected. A. exponentially; it reaches a threshold B. exponentially; congestion is detected C. additively; it reaches a threshold D. additively; congestion is detected The congestion window size, after it passes the initial slow start state, follows a saw tooth pattern called _________________________________. A. exponential increase, additive decrease B. additive increase, exponential decrease C. multiplicative increase, additive decrease D. additive increase, multiplicative decrease ?Which layer is used to link the network support layers and user support layers In the OSi model, as a data packet moves from the lower to the upper layers, headers are Transport layer is implemented in In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ?Which layer is responsible for process to process delivery in a general network model FTP is built on----- architecture Communication channel is shared by all the machines on the network in Which of the following layers is an addition to OSI model when compared with TCP IP ?model OSI stands for ?How many layers are present in the Internet protocol stack (TCP/IP model) Which type at topology is best suited for large businesses which must carefully control and ?coordinate the operation of distributed branch outlets The domain name system is maintained by The DNS protocol runs over UDP and uses port The HTTP response message leaves out the requested object when FTP server listens for connection on port number With nonpersistent connections between browser and origin server, it is possible for a single .TCP segment te HTTP request messages The packet of information at the application layer is called HTTP response messages never have an emnpty measage body ?Which one of the following protocol delivers/stores mail to receiver server ,POP3 protocol is stateless across sessions FTP uses_ _ _ parallel TCP connections to transfer a file HTTP is "stateless", server maintains no Information about past client requests When displaying a web page, the application layer uses the The HTTP response message leaves out the requested object when. method is used The process which initiates the communication is the server; the process that waits to be .contacted is the client Installing a local cache in the institutional network is more performance and cheaper than .using higher access link 2021/6/22 FTP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – FTP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “FTP”. 1. Expansion of FTP is __________ a) Fine Transfer Protocol b) File Transfer Protocol c) First Transfer Protocol d) Fast Transfer Protocol View Answer Answer: b Explanation: File Transfer Protocol is an application layer protocol used to share “files” between a server and a client. The protocol uses two separate ports for data and control connections: port 20 for data and port 21 for control. 2. FTP is built on _____ architecture. a) Client-server b) P2P c) Data centric d) Service oriented View Answer Answer: a Explanation: An FTP connection includes a Server and a Client which wish to share a number of data files. The server can transfer files with multiple clients at the same time while the client communicates with only one server at a time. 3. FTP uses _________ parallel TCP connections to transfer a file. a) 1 b) 2 c) 3 d) 4 View Answer /https://www.sanfoundry.com/computer-networks-mcqs-ftp 1/5 2021/6/22 FTP - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: Control connection using FTP port: 21, and data connection using FTP port: 20. The FTP session is started or ended using port 21 and the actual data i.e. files are sent through port 20. 4. Identify the incorrect statement regarding FTP. a) FTP stands for File Transfer Protocol b) FTP uses two parallel TCP connections c) FTP sends its control information in-band d) FTP sends exactly one file over the data connection View Answer Answer: c Explanation: FTP is out-of-band because the data connection is done separately through port 20 and control connection is done separately through port 21. 5. If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______ a) 5 b) 10 c) 2 d) 6 View Answer Answer: d Explanation: The client would first initiate the TCP control connection through port 21. Then for every file transfer, a separate connection would be made through port 20. Now, since we have five files to be transferred, 1 control connection + 5 data connections = 6 total TCP connections. 6. FTP server _____________ a) Maintains state information b) Is stateless c) Has single TCP connection for a file transfer d) Has UDP connection for file transfer View Answer Answer: a Explanation: FTP server maintains state information of every control connection to keep track of the active and inactive connections in the session. This helps the server decide which connection to terminate, in case the connection is inactive for too long. 7. The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format. /https://www.sanfoundry.com/computer-networks-mcqs-ftp 2/5 2021/6/22 FTP - Computer Networks Questions & Answers - Sanfoundry a) 8 b) 7 c) 3 d) 5 View Answer Answer: b Explanation: FTP was designed to transmit commands only in English characters that are possible with just 7 bits in ASCII. Even the media has to be converted to ASCII before transmission. 8. Find the FTP reply whose message is wrongly matched. a) 331 – Username OK, password required b) 425 – Can’t open data connection c) 452 – Error writing file d) 452 – Can’t open data connection View Answer Answer: d Explanation: The correct response code for the message “Can’t open data connection” is 425. Response code 452 is sent usually when the connection is suddenly closed. 9. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________ a) Stream mode b) Block mode c) Compressed mode d) Message mode View Answer Answer: a Explanation: Stream mode is the default mode of FTP, in which the TCP transforms/fragments the data into segments, and then after the transmission is completed, converts it back to stream of bytes. 10. The password is sent to the server using ________ command. a) PASSWD b) PASS c) PASSWORD d) PWORD View Answer Answer: b Explanation: The PASS command, preceded by the username, completes the user’s /https://www.sanfoundry.com/computer-networks-mcqs-ftp 3/5 2021/6/22 HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – HTTP & FTP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP & FTP”. 1. Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection. a) True b) False View Answer Answer: a Explanation: Persistent connections are kept active after completing transaction so that multiple objects can be sent over the same TCP connection. 2. HTTP is ________ protocol. a) application layer b) transport layer c) network layer d) data link layer View Answer Answer: a Explanation: HTTP is an Application layer protocol used to define how messages are formatted and transmitted through the World Wide Web. 3. In the network HTTP resources are located by a) uniform resource identifier b) unique resource locator c) unique resource identifier d) union resource locator View Answer Answer: a Explanation: The Uniform Resource Identifier is a name and locator for the resource to be /https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 1/5 2021/6/22 HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry located by the HTTP. The URLs and URNs are derived through the identifier. 4. HTTP client requests by establishing a __________ connection to a particular port on the server. a) user datagram protocol b) transmission control protocol c) border gateway protocol d) domain host control protocol View Answer Answer: b Explanation: HTTP clients perform requests using a TCP connection, because the TCP connection provides a more reliable service. UDP is not a reliable protocol, border gateway protocol is used on top of TCP, while domain host control protocol is a network layer protocol. 5. In HTTP pipelining ________________ a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses b) multiple HTTP requests can not be sent on a single TCP connection c) multiple HTTP requests are sent in a queue on a single TCP connection d) multiple HTTP requests are sent at random on a single TCP connection View Answer Answer: a Explanation: HTTP pipelining helps the client make multiple requests without having to waiting for each response, thus saving a lot of time and bandwidth for the client. 6. FTP server listens for connection on port number ____________ a) 20 b) 21 c) 22 d) 23 View Answer Answer: b Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote login. Port 23 is used for TELNET. 7. In FTP protocol, client contacts server using ____ as the transport protocol. a) transmission control protocol b) user datagram protocol c) datagram congestion control protocol d) stream control transmission protocol View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 2/5 2021/6/22 HTTP & FTP - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: The clients use the Transmission Control Protocol for FTP as it’s more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is required to be as high as possible for FTP. 8. In Active mode FTP, the client initiates both the control and data connections. a) True b) False View Answer Answer: b Explanation: In Passive mode of FTP, the client initiates both data and control connections, while in Active mode, the client initiates the control connection and then the server initiates the data connection. 9. The File Transfer Protocol is built on ______________ a) data centric architecture b) service oriented architecture c) client server architecture d) connection oriented architecture View Answer Answer: c Explanation: The FTP connection includes a Server and a Client which wish to share files. The server can have multiple clients at the same time while the client communicates with only one server at a time. 10. In File Transfer Protocol, data transfer cannot be done in ___________ a) stream mode b) block mode c) compressed mode d) message mode View Answer Answer: d Explanation: In Stream mode, the data is transferred in a continuous stream. In Block mode, data is transferred after being divided into smaller blocks. In Compressed mode, data is transferred after being compressed using some compression algorithm. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-http-ftp 3/5 2021/6/22 HTTP Questions & Answers - Sanfoundry Computer Networks Questions & Answers – HTTP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP”. 1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________ a) 4 b) 1 c) 5 d) 7 View Answer Answer: c Explanation: 4 jpeg images + 1 base HTML file. 2. The default connection type used by HTTP is _________ a) Persistent b) Non-persistent c) Can be either persistent or non-persistent depending on connection request d) None of the mentioned View Answer Answer: a Explanation: By default the http connection is issued with persistent connection. In persistent connection server leaves connection open after sending response. As little as one RTT (Time for a small packet to travel from client to server and back) is required for all referenced objects. 3. The time taken by a packet to travel from client to server and then back to the client is called __________ a) STT b) RTT c) PTT d) JTT View Answer /https://www.sanfoundry.com/computer-networks-mcqs-http 1/6 2021/6/22 HTTP Questions & Answers - Sanfoundry Answer: b Explanation: RTT stands for round-trip time. 4. The HTTP request message is sent in _________ part of three-way handshake. a) First b) Second c) Third d) Fourth View Answer Answer: c Explanation: In first step client sends a segment to establish a connection with the server. In the second the step the client waits for the acknowledgement to be received from the server. After receiving the acknowledgement, the client sends actual data in the third step. 5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3 View Answer Answer: b Explanation: By default the http connection will be persistent connection. Hence it will take only 1 RTT to fetch a webpage from a server. 6. The first line of HTTP request message is called _____________ a) Request line b) Header line c) Status line d) Entity line View Answer Answer: a Explanation: The line followed by request line are called header lines and status line is the initial part of response message. 7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line /https://www.sanfoundry.com/computer-networks-mcqs-http 2/6 2021/6/22 HTTP Questions & Answers - Sanfoundry d) Entity body View Answer Answer: a Explanation: It is specified in the method field of request line in the HTTP request message. 8. The __________ method when used in the method field, leaves entity body empty. a) POST b) SEND c) GET d) PUT View Answer Answer: c Explanation: There are two methods which help to request a response from a server. Those are GET and POST. In GET method, the client requests data from server. In POST method the client submits data to be processed to the server. 9. The HTTP response message leaves out the requested object when ____________ method is used a) GET b) POST c) HEAD d) PUT View Answer Answer: c Explanation: HEAD method is much faster than GET method. In HEAD method much smaller amount of data is transferred. The HEAD method asks only for information about a document and not for the document itself. 10. Find the oddly matched HTTP status codes a) 200 OK b) 400 Bad Request c) 301 Moved permanently d) 304 Not Found View Answer Answer: d Explanation: 404 Not Found. 11. Which of the following is not correct? a) Web cache doesnt has its own disk space /https://www.sanfoundry.com/computer-networks-mcqs-http 3/6 2021/6/22 HTTP Questions & Answers - Sanfoundry b) Web cache can act both like server and client c) Web cache might reduce the response time d) Web cache contains copies of recently requested objects View Answer Answer: a Explanation: Web cache or also known as HTTP cache is a temporary storage where HTML pages and images are stored temporarily so that server lag could be reduced. 12. The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentioned View Answer Answer: c Explanation: The HTTP protocol requests the server of the website its trying to access so that it can store its files, images etc. in cache memory. This request of asking the server for a document considering a specific parameter is called conditional GET Request. 13. Which of the following is present in both an HTTP request line and a status line? a) HTTP version number b) URL c) Method d) None of the mentioned View Answer Answer: a Explanation: Status line is the the start line of an HTTP response. It contains the information such as the protocol version, a status text, status code. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. ` Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Application Layer – 2 /https://www.sanfoundry.com/computer-networks-mcqs-http 4/6 2021/6/22 HTTP Questions & Answers - Sanfoundry » Next - Computer Networks Questions & Answers – HTTP & FTP Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. C# Programming Examples on Threads Bachelor of Computer Applications Questions and Answers Java MCQ (Multiple Choice Questions) Network Theory MCQ (Multiple Choice Questions) HTML MCQ (Multiple Choice Questions) JUnit MCQ (Multiple Choice Questions) Java Programming Examples on Utility Classes MySQL MCQ (Multiple Choice Questions) Computer Graphics MCQ (Multiple Choice Questions) Computer Science Questions and Answers Java Programming Examples on Multithreading Master of Computer Applications Questions and Answers Computer Organization and Architecture MCQ (Multiple Choice Questions) JavaScript MCQ (Multiple Choice Questions) SAN MCQ (Multiple Choice Questions) C# Programming Examples on Networking Neural Networks MCQ (Multiple Choice Questions) Java Programming Examples on Networking Computer Fundamentals MCQ (Multiple Choice Questions) Computer Networks MCQ (Multiple Choice Questions) advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols /https://www.sanfoundry.com/computer-networks-mcqs-http 5/6 2021/6/22 Application Layer Interview Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Application Layer – 2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Application Layer – 2”. 1. The ____________ translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay chat View Answer Answer: a Explanation: Domain name system is the way the internet domain names are stored and translated to IP addresses. The domain names systems matches the name of website to ip addresses of the website. 2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a) HTTP b) FTP c) Telnet d) TCP View Answer Answer: c Explanation: Telnet is used for accessing remote computers. Using telnet a user can access computer remotely. With Telnet, you can log on as a regular user with whatever privileges you may have been granted to the specific application and data on the computer. 3. Application layer protocol defines ____________ a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages /https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 1/6 2021/6/22 Application Layer Interview Questions & Answers - Sanfoundry d) all of the mentioned View Answer Answer: d Explanation: Application layer deals with the user interface, what message is to be sent or the message format, syntax and semantics. A user has access to application layer for sending and receiving messages. 4. Which one of the following protocol delivers/stores mail to reciever server? a) simple mail transfer protocol b) post office protocol c) internet mail access protocol d) hypertext transfer protocol View Answer Answer: a Explanation: SMTP, abbreviation for Simple Mail Transfer Protocol is an application layer protocol. A client who wishes to send a mail creates a TCP connection to the SMTP server and then sends the mail across the connection. 5. The ASCII encoding of binary data is called a) base 64 encoding b) base 32 encoding c) base 16 encoding d) base 8 encoding View Answer Answer: a Explanation: Base64 is used commonly in a number of applications including email via MIME, and storing complex data in XML. Problem with sending normal binary data to a network is that bits can be misinterpreted by underlying protocols, produce incorrect data at receiving node and that is why we use this code. 6. Which one of the following is an internet standard protocol for managing devices on IP network? a) dynamic host configuration protocol b) simple network management protocol c) internet message access protocol d) media gateway protocol View Answer Answer: b Explanation: SNMP is a set of protocols for network management and monitoring. This /https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 2/6 2021/6/22 Application Layer Interview Questions & Answers - Sanfoundry protocol is included in the application layer. SNMP uses 7 protocol data units. 7. Which one of the following is not an application layer protocol? a) media gateway protocol b) dynamic host configuration protocol c) resource reservation protocol d) session initiation protocol View Answer Answer: c Explanation: Resource reservation protocol is used in transport layer. It is designed to reserve resources across a network for quality of service using the integrated services model. 8. Which protocol is a signaling communication protocol used for controlling multimedia communication sessions? a) session initiation protocol b) session modelling protocol c) session maintenance protocol d) resource reservation protocol View Answer Answer: a Explanation: SIP is a signaling protocol in which its function includes initiating, maintaining and terminating real time sessions. SIP is used for signaling and controlling multimedia sessions. 9. Which one of the following is not correct? a) Application layer protocols are used by both source and destination devices during a communication session b) HTTP is a session layer protocol c) TCP is an application layer protocol d) All of the mentioned View Answer Answer: d Explanation: HTTP is an application layer protocol. Whereas TCP is a transport layer protocol. 10. When displaying a web page, the application layer uses the _____________ a) HTTP protocol b) FTP protocol c) SMTP protocol d) TCP protocol View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-application-layer 3/6 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Application Layer – 1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Application Layer – 1”. 1. Which is not a application layer protocol? a) HTTP b) SMTP c) FTP d) TCP View Answer Answer: d Explanation: TCP is transport layer protocol. advertisement 2. The packet of information at the application layer is called __________ a) Packet b) Message c) Segment /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 1/8 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry d) Frame View Answer Answer: b Explanation: For Application, Presentation and Session layers there is no data format for message. Message is message as such in these three layers. But when it comes to Transport, Network, Data and Physical layer they have data in format of segments, packets, frames and bits respectively. 3. Which one of the following is an architecture paradigms? a) Peer to peer b) Client-server c) HTTP d) Both Peer-to-Peer & Client-Server View Answer Answer: d Explanation: HTTP is a protocol. advertisement 4. Application developer has permission to decide the following on transport layer side a) Transport layer protocol b) Maximum buffer size c) Both Transport layer protocol and Maximum buffer size d) None of the mentioned View Answer Answer: c Explanation: Application layer provides the interface between applications and the network. So /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 2/8 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry application developer can decide what transport layer to use and what should be its maximum buffer size. 5. Application layer offers _______ service. a) End to end b) Process to process c) Both End to end and Process to process d) None of the mentioned View Answer Answer: a Explanation: End to End service is provided in the application layer. Whereas process to process service is provided at the transport layer. advertisement 6. E-mail is _________ a) Loss-tolerant application b) Bandwidth-sensitive application c) Elastic application d) None of the mentioned View Answer Answer: c Explanation: Because it can work with available throughput. 7. Pick the odd one out. a) File transfer b) File download c) E-mail /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 3/8 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry d) Interactive games View Answer Answer: d Explanation: File transfer, File download and Email are services provided by the application layer and there are message and data oriented. advertisement 8. Which of the following is an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned View Answer Answer: d Explanation: The services provided by the application layer are network virtual terminal, file transfer, access and management, mail services, directory services, various file and data operations. 9. To deliver a message to the correct application program running on a host, the _______ address must be consulted. a) IP b) MAC c) Port d) None of the mentioned View Answer /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 4/8 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: IP address lets you know where the network is located. Whereas MAC address is a unique address for every device. Port address identifies a process or service you want to carry on. advertisement 10. Which is a time-sensitive service? a) File transfer b) File download c) E-mail d) Internet telephony View Answer Answer: d Explanation: Internet telephony is Loss-tolerant other applications are not. 11. Transport services available to applications in one or another form _________ a) Reliable data transfer b) Timing c) Security d) All of the mentioned View Answer Answer: d Explanation: The transport services that are provided to application are reliable data transfer, security and timing. These are very important for proper end to end services. 12. Electronic mail uses which Application layer protocol? a) SMTP /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 5/8 2021/6/22 Application Layer - Computer Networks Questions & Answers - Sanfoundry b) HTTP c) FTP d) SIP View Answer Answer: a Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one used in application layer is SMTP. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Packet Switching & Circuit Switching » Next - Computer Networks Questions & Answers – Application Layer – 2 advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. C Programming Examples on File Handling Linux MCQ (Multiple Choice Questions) Computer Organization and Architecture MCQ (Multiple Choice Questions) C# Programming Examples on Files Computer Graphics MCQ (Multiple Choice Questions) Java Programming Examples on Networking /https://www.sanfoundry.com/computer-networks-mcqs-application-layer 6/8 2021/6/22 Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Packet Switching & Circuit Switching « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Packet Switching & Circuit Switching”. 1. A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched View Answer Answer: b Explanation: Circuit switching is connection oriented switching technique, whereas in the case of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer, whereas packet switching is implemented in the Network layer. Internet too is based on the concept of circuit switching. advertisement 2. Most packet switches use this principle ____________ a) Stop and wait /https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 1/7 2021/6/22 Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry b) Store and forward c) Store and wait d) Stop and forward View Answer Answer: b Explanation: The packet switch will not transmit the first bit to outbound link until it receives the entire packet. If the entire packet is not received and the time-out period expires, the packet switch will inform the sender to resend the part of packet or the entire packet based on the algorithm being used. 3. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ______________ a) N b) (N*L)/R c) (2N*L)/R d) L/R View Answer Answer: b Explanation: The equation to find the end to end delay when no. of bits, transmission rate and no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of all, the processing delay, queuing delay, transmission delay and propagation delay. advertisement 4. What are the Methods to move data through a network of links and switches? a) Packet switching and Line switching b) Circuit switching and Line switching c) Line switching and bit switching /https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 2/7 2021/6/22 Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry d) Packet switching and Circuit switching View Answer Answer: d Explanation: Packet switching and Circuit switching are two different types of switching methods used to connect the multiple communicating devices with one another. Packet switching is used in conventional LAN systems and circuit switching is used in telephonic systems. 5. The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching View Answer Answer: b Explanation: In circuit switching, a physical path between the sender and receiver is established. This path is maintained until the connection is needed. Circuit switching is implemented in the Physical layer and is used in telephonic systems. advertisement 6. As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability /https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 3/7 2021/6/22 Packet & Circuit Switching - Computer Networks Questions & Answers - Sanfoundry d) store and forward View Answer Answer: b Explanation: Circuit switching is connection oriented and is always implemented in the physical layer. Once a path is set, all transmission occurs through the same path. It is used since the early times in telephonic systems. 7. In _________ systems, resources are allocated on demand. a) packet switching b) circuit switching c) line switching d) frequency switching View Answer Answer: a Explanation: In packet switching, the bits are received in out of order and need to be assembled at the receiver end, whereas in the case of Circuit switching, all the bits are received in order. All transmissions may not occur through the same path in case of packet switching. advertisement 8. Which of the following is not an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) Error control View Answer /https://www.sanfoundry.com/computer-networks-mcqs-packet-circuit-switching 4/7 2021/6/22 Physical Media - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Physical Media « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Physical Media”. 1. Which of this is not a guided media? a) Fiber optical cable b) Coaxial cable c) Wireless LAN d) Copper wire View Answer Answer: c Explanation: Wireless LAN is unguided media. advertisement 2. UTP is commonly used in __________ a) DSL b) FTTP c) HTTP /https://www.sanfoundry.com/computer-networks-mcqs-physical-media 1/7 2021/6/22 Physical Media - Computer Networks Questions & Answers - Sanfoundry d) None of the mentioned View Answer Answer: a Explanation: Unshielded twisted pair(UTP) is commonly used in home access. 3. Coaxial cable consists of _______ concentric copper conductors. a) 1 b) 2 c) 3 d) 4 View Answer Answer: b Explanation: Coaxial cable has an inner conductor surrounded by a insulating layer, which is surrounded by a conducting shield. Coaxial cable is used to carry high frequency signals with low losses. advertisement 4. Fiber optics posses following properties __________ a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap d) All of the mentioned View Answer Answer: d Explanation: In fibre optics the transmission of information is in the form of light or photons. /https://www.sanfoundry.com/computer-networks-mcqs-physical-media 2/7 2021/6/22 Physical Media - Computer Networks Questions & Answers - Sanfoundry Due to all above properties mentioned in options fibre optics can be submerged in water and are used at more risk environments. 5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________ a) n*39.8 b) n*51.8 c) 2n*51.8 d) None of the mentioned View Answer Answer: b Explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical carrier represented as OC-n has n*51.8 Mbits/s transmission speed. For eg. OC-3 has 3*51.8 Mbits/s speed. advertisement 6. Terrestrial radio channels are broadly classifed into _____ groups. a) 2 b) 3 c) 4 d) 1 View Answer Answer: b Explanation: The three types are those that operate over very short distance, those that operate in local areas, those that operate in the wide area. 7. Radio channels are attractive medium because __________ a) Can penetrate walls /https://www.sanfoundry.com/computer-networks-mcqs-physical-media 3/7 2021/6/22 Physical Media - Computer Networks Questions & Answers - Sanfoundry b) Connectivity can be given to mobile user c) Can carry signals for long distance d) All of the mentioned View Answer Answer: d Explanation: Radio channels can penetrate walls, can be used to provide connectivity to mobile users and can also carry signals for long distances. advertisement 8. Geostationary satellites ___________ a) Are placed at a fixed point above the earth b) Rotate the earth about a fixed axis c) Rotate the earth about a varying axis d) All of the mentioned View Answer Answer: a Explanation: They are placed in orbit at 36,000km above Earth’s surface. Sanfoundry Global Education & Learning Series – Computer Networks. advertisement /https://www.sanfoundry.com/computer-networks-mcqs-physical-media 4/7 2021/6/22 Network Attacks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Network Attacks « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Attacks”. 1. The attacker using a network of compromised devices is known as _____________ a) Internet b) Botnet c) Telnet d) D-net View Answer Answer: b Explanation: Botnet is a network of compromised devices used by the attacker without the owner’s knowledge to perform unethical activities such as spamming. The attacker usually uses the least secure devices to create the botnet. advertisement 2. Which of the following is a form of DoS attack? a) Vulnerability attack b) Bandwidth flooding /https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 1/7 2021/6/22 Network Attacks Questions & Answers - Sanfoundry c) Connection flooding d) All of the mentioned View Answer Answer: d Explanation: In a DoS attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. In vulnerability attack, the attacker exploits any obvious vulnerable entity in the network to deny the victim access into the network. In bandwidth flooding, the attacker floods the victim with a huge flow of packets and uses up all the bandwidth. In connection flooding, the attacker floods the victim network with a huge number of connections, so that, no other machine can connect to it. 3. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding View Answer Answer: c Explanation: In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports. advertisement /https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 2/7 2021/6/22 Network Attacks Questions & Answers - Sanfoundry 4. The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding View Answer Answer: b Explanation: In Bandwidth flooding, the attacker floods the victim machine with a deluge of packets to make sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation. 5. Packet sniffers involve ____________ a) Active receiver b) Passive receiver c) Legal receiver d) Partially-active receiver View Answer Answer: b Explanation: The function of packet sniffers is to just silently receive the packets flowing in the channel. If they inject any packets into the channel, they might alert the other users about the intrusion. advertisement 6. Sniffers can be prevented by using _______________ a) Wired environment b) WiFi c) Ethernet LAN /https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 3/7 2021/6/22 Network Attacks Questions & Answers - Sanfoundry d) Switched network View Answer Answer: d Explanation: Switches make sure that the packet is sent to the intended receiver and no one else, thus preventing Sniffers to perform their function. Intelligent switches are hence used preferably for the network. 7. Firewalls are often configured to block ___________ a) UDP traffic b) TCP traffic c) Sensitive traffic d) Best-effort traffic View Answer Answer: a Explanation: UDP is more vulnerable to attacks, so firewalls are often configured to block suspicious UDP traffic. advertisement 8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero? a) Propagation delay b) Queuing delay c) Transmission delay d) Processing delay View Answer /https://www.sanfoundry.com/computer-networks-mcqs-network-attacks 4/7 2021/6/22 Computer Networks Questions for Campus Interviews - Sanfoundry Computer Networks Questions & Answers – STP Cables « Prev Next » This set of Computer Networks Questions and Answers for Campus interviews focuses on “STP (Shielded Twisted Pair) Cables”. 1. _____________ allows LAN users to share computer programs and data. a) Communication server b) Print server c) File server d) Network View Answer Answer: c Explanation: A file server allows LAN users to share computer programs and data. It uses the File Transfer Protocol to provide this feature on ports 20 and 21. The file server works as a medium for the transfer. advertisement 2. With respect to physical media, STP cables stands for _________ a) Shielded Twisted Pair Cable b) Spanning Tree Protocol Cable /https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 1/8 2021/6/22 Computer Networks Questions for Campus Interviews - Sanfoundry c) Static Transport Protocol Cable d) Shielded Two Power Cable View Answer Answer: a Explanation: For physical media, STP cable stands for Shielded twisted pair cable. 100 Mbps is the max data capacity of STP cable and its default connector is RJ45. It is popularly used in LANs due to its ease of maintenance and installation. 3. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________ a) LAN intrinsic software b) LAN aware software c) Groupware d) LAN ignorant software View Answer Answer: a Explanation: A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of LAN intrinsic software. They are used to give better functionality of the program and the applications working over it to the users of the LAN. advertisement 4. The __________ portion of LAN management software restricts access, records user activities and audit data, etc. a) Configuration management b) Security management c) Performance management /https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 2/8 2021/6/22 Computer Networks Questions for Campus Interviews - Sanfoundry d) Recovery management View Answer Answer: b Explanation: The Security management portion of LAN management software restricts access, records user activities, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ensures authentication, confidentiality, and integrity in the LAN. 5. What is the max length of the Shielded twisted pair cable? a) 100 ft b) 200 ft c) 100 m d) 200 m View Answer Answer: c Explanation: The max the Shielded twisted pair cable is 100 meters. If the length exceeds 100 meters, the loss of signals flowing through the cable would be really high. Thus, STP cable is more suitable for smaller networks like LANs. advertisement 6. What is the max data transfer rate of STP cables? a) 10 Mbps b) 100 Mbps c) 1000 Mbps d) 10000 Mbps View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 3/8 2021/6/22 Computer Networks Questions for Campus Interviews - Sanfoundry Answer: b Explanation: 100 Mbps is the max data transfer rate that can be handled by STP cables, and its default connector is RJ-45. 100 Mbps is a feasible data transfer rate for small networks like LANs. 7. Which connector does the STP cable use? a) BNC b) RJ-11 c) RJ-45 d) RJ-69 View Answer Answer: c Explanation: RJ-45 is used for STP cable. 100 Mbps is the max data transfer rate that can be handled by STP. RJ-45 is popularly used to connect to modern-day routers, computer network cards, and other network devices. advertisement 8. What is the central device in star topology? a) STP server b) Hub/switch c) PDC d) Router View Answer Answer: b Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central switch or hub. Every message sent from a source /https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 4/8 2021/6/22 Computer Networks Questions for Campus Interviews - Sanfoundry computer goes through the switch or hub and the switch or hub then forwards the message only to the intended destination computer. 9. What is the max data transfer rate for optical fiber cable? a) 10 Mbps b) 100 Mbps c) 1000 Mbps d) 10000 Mbps View Answer Answer: d Explanation: Fiber channel speeds have been increasing over the years. 10000 Mbps is the max data transfer rate for optical fiber cables. It is said to be the fastest among the other kinds of cables like STP cables and co-axial cables. People are now using optical fiber cables instead of STP cables for LANs due to their fast data transfer capability. 10. Which of the following architecture uses the CSMA/CD access method? a) ARC net b) Ethernet c) Router d) STP server View Answer Answer: b Explanation: Collision detection is not possible in Ethernet without extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in the Ethernet architecture. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-campus-interviews 5/8 2021/6/22 Delays & Loss - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Delays and Loss « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Delays and Loss”. 1. Which of the following delay is faced by the packet in travelling from one end system to another? a) Propagation delay b) Queuing delay c) Transmission delay d) All of the mentioned View Answer Answer: d Explanation: When a packet has to travel from one end system to another, it first faces the queuing delay when there are multiple packets which are to be sent, then it faces the transmission delay to convert the packet into bits to be transmitted, and then it faces the propagation delay to propagate the bits through the physical medium. advertisement Ads by Stop seeing this ad Why this ad? /https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 1/8 2021/6/22 Delays & Loss - Computer Networks Questions & Answers - Sanfoundry 2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds) a) 3.2 b) 32 c) 0.32 d) 320 View Answer Answer: a Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2 microseconds. 3. The time required to examine the packet’s header and determine where to direct the packet is part of __________ a) Processing delay b) Queuing delay c) Transmission delay d) Propagation delay View Answer Answer: a Explanation: Processing delay is induced at a router’s or other network processor’s end in the path of the packet and is caused by the time taken by the processor to examine the packet’s header to decide the further path of the packet. advertisement 4. Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________ a) La/R b) LR/a /https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 2/8 2021/6/22 Delays & Loss - Computer Networks Questions & Answers - Sanfoundry c) R/La d) Ra/L View Answer Answer: a Explanation: Traffic Intensity = (Number of bits in packet * Average Transmission rate)/Current Transmission rate. 5. In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________ a) 20Mbps b) 10Mbps c) 40Mbps d) 50Mbps View Answer Answer: b Explanation: The throughput is generally the transmission rate of bottleneck link. advertisement 6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is? a) N/2 b) N c) N-1 d) 2N View Answer /https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 3/8 2021/6/22 Delays & Loss - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: In the equation N (dproc + dtrans + dprop), N is the number of checkpoints/stops that the packet makes as it reaches the destination. The stops are made at each router and the final destination node. Now, since N = number of routers + final node, then number of routers = N – final node. As we know, there is only 1 final node in a path, thus, number of routers = N – 1. Suppose, There is a path A->R1->R2->B for a packet where A is the source node, B is the final node and R1 and R2 are routers. The total delay would be given by N (dproc + dtrans + dprop) where N = 3, since the packet would stop at R1, R2 and B. The number of routers here are 2, and (N – 1) is also 2. 7. The total nodal delay is given by ____________ a) dnodal = dproc – dqueue + dtrans + dprop b) dnodal = dproc + dtrans – dqueue c) dnodal = dproc + dqueue + dtrans + dprop d) dnodal = dproc + dqueue – dtrans – dprop View Answer Answer: c Explanation: The total node-to-node delay, that is, nodal delay is the sum of all, the processing delay, queuing delay, transmission delay and propagation delay. Ideally, the nodal delay must be low as possible for a better Quality of Service of the network. advertisement 8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero? a) Propagation delay b) Queuing delay c) Transmission delay /https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 4/8 2021/6/22 Delays & Loss - Computer Networks Questions & Answers - Sanfoundry d) Processing delay View Answer Answer: b Explanation: Since there is no other packet to be transmitted, there is no need for a queue. Therefore, the delay caused due to the queuing would be none i.e. 0. 9. Transmission delay does not depend on _____________ a) Packet length b) Distance between the routers c) Transmission rate d) Bandwidth of medium View Answer Answer: b Explanation: Transmission delay = packet length / transmission rate. The transmission rate depends upon the bandwidth of the medium. advertisement 10. Propagation delay depends on ___________ a) Packet length b) Transmission rate c) Distance between the routers d) Speed of the CPU View Answer Answer: c Explanation: Propagation delay is caused when the packet is in its electric signal form and is travelling through a medium (a wire or a electromagnetic wave). Propagation delay is the time /https://www.sanfoundry.com/computer-networks-mcqs-delays-loss 5/8 2021/6/22 Multiplexing - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Multiplexing « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Multiplexing”. 1. The sharing of a medium and its link by two or more devices is called _________ a) Fully duplexing b) Multiplexing c) Micropleixng d) Duplexing View Answer Answer: b Explanation: Multiplexing is a method using which one can send multiples signals through a shared medium at the same time. This helps in using less resources and thus saving the cost of sending messages. advertisement Ads by 2. Multiplexing is used in _______ a) Packet switching Stop seeing this ad b) Circuit switching Why this ad? /https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 1/7 2021/6/22 Multiplexing - Computer Networks Questions & Answers - Sanfoundry c) Data switching d) Packet & Circuit switching View Answer Answer: b Explanation: Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network. 3. Which multiplexing technique used to transmit digital signals? a) FDM b) TDM c) WDM d) FDM & WDM View Answer Answer: b Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network). advertisement 4. If there are n signal sources of same data rate, then the TDM link has _______ slots. a) n b) n/2 c) n*2 /https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 2/7 2021/6/22 Multiplexing - Computer Networks Questions & Answers - Sanfoundry d) 2n View Answer Answer: a Explanation: In TDM, the total unit of time is divided equally among all the signal sources and each and every source has access to the complete channel bandwidth during its allotted time slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin. 5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________ a) 32kbps b) 500bps c) 500kbps d) 32bps View Answer Answer: a Explanation: Transmission rate= frame rate * number of bits in a slot. Given: Frame rate = 4000/sec and number of bits in slot = 8 Thus, Transmission rate = (4000 * 8) bps = 32000bps = 32kbps advertisement 6. The state when dedicated signals are idle are called __________ a) Death period b) Poison period c) Silent period /https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 3/7 2021/6/22 Multiplexing - Computer Networks Questions & Answers - Sanfoundry d) Stop period View Answer Answer: c Explanation: There are instances when connection between two endpoints has been established, but no communication or transfer of messages occurs. This period of time is called silent period. The silent period ends when either of the two endpoints starts the communication. 7. Multiplexing provides _________ a) Efficiency b) Privacy c) Anti jamming d) Both Efficiency & Privacy View Answer Answer: d Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high privacy when implemented because in the implementation, the transport layer of the OSI network model handles the function of multiplexing through interfaces called ports which provide the required efficiency and privacy. advertisement 8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources. a) Greater than b) Lesser than c) Equal to /https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 4/7 2021/6/22 Multiplexing - Computer Networks Questions & Answers - Sanfoundry d) Equal to or greater than View Answer Answer: a Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than the sum of transmission rates of the single sources. This happens because the transmission rate is provided to each source only for a small period of time. 9. In TDM, slots are further divided into _________ a) Seconds b) Frames c) Packets d) Bits View Answer Answer: b Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing. advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-mcqs-multiplexing 5/7 2021/6/22 Topology Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Topology « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Topology”. 1. Physical or logical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control View Answer Answer: a Explanation: Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network . advertisement Ads by 2. Which network topology requires central controller hub? Stopaseeing this ad Whyor this ad? a) Star /https://www.sanfoundry.com/computer-networks-mcqs-topology 1/7 2021/6/22 Topology Questions & Answers - Sanfoundry b) Mesh c) Ring d) Bus View Answer Answer: a Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer. 3. _______ topology requires a multipoint connection. a) Star b) Mesh c) Ring d) Bus View Answer Answer: d Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a node tries to send a message or data to other nodes, this data passes through all other nodes in the network through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network applications. advertisement 4. Data communication system spanning states, countries, or the whole world is ________ a) LAN b) WAN c) MAN /https://www.sanfoundry.com/computer-networks-mcqs-topology 2/7 2021/6/22 Topology Questions & Answers - Sanfoundry d) PAN View Answer Answer: b Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet. 5. Data communication system within a building or campus is________ a) LAN b) WAN c) MAN d) PAN View Answer Answer: a Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the computer network concepts can be visibly used. advertisement 6. WAN stands for __________ a) World area network b) Wide area network c) Web area network d) Web access network View Answer /https://www.sanfoundry.com/computer-networks-mcqs-topology 3/7 2021/6/22 Topology Questions & Answers - Sanfoundry Answer: b Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. These are used to connect cities, states or even countries. They can be connected through leased lines or satellites. 7. In TDM, slots are further divided into __________ a) Seconds b) Frames c) Packets d) Bits View Answer Answer: b Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing. advertisement 8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency. a) FDM b) TDM c) Both FDM & TDM d) PDM View Answer Answer: a Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is /https://www.sanfoundry.com/computer-networks-mcqs-topology 4/7 2021/6/22 Transport Layer - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Transport Layer « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Transport Layer”. 1. Transport layer aggregates data from different applications into a single stream before passing it to ____________ a) network layer b) data link layer c) application layer d) physical layer View Answer Answer: a Explanation: The flow of data in the OSI model flows in following manner Application -> Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer has its own set of functions and protocols to ensure efficient network performance. advertisement 2. Which of the following are transport layer protocols used in networking? a) TCP and FTP /https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 1/8 2021/6/22 Transport Layer - Computer Networks Questions & Answers - Sanfoundry b) UDP and HTTP c) TCP and UDP d) HTTP and FTP View Answer Answer: c Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram Protocol. TCP is connection oriented whereas UDP is connectionless. 3. User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly View Answer Answer: a Explanation: UDP is an alternative for TCP and it is used for those purposes where speed matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is connection oriented. advertisement 4. Transmission control protocol ___________ a) is a connection-oriented protocol b) uses a three way handshake to establish a connection c) receives data from application as a single stream d) all of the mentioned View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 2/8 2021/6/22 Transport Layer - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network. Major internet applications like www, email, file transfer etc rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than timely delivery. 5. An endpoint of an inter-process communication flow across a computer network is called __________ a) socket b) pipe c) port d) machine View Answer Answer: a Explanation: Socket is one end point in a two way communication link in the network. TCP layer can identify the application that data is destined to be sent by using the port number that is bound to socket. advertisement 6. Socket-style API for windows is called ____________ a) wsock b) winsock c) wins d) sockwi View Answer Answer: b Explanation: Winsock is a programming interface which deals with input output requests for /https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 3/8 2021/6/22 Transport Layer - Computer Networks Questions & Answers - Sanfoundry internet applications in windows OS. It defines how windows network software should access network services. 7. Which one of the following is a version of UDP with congestion control? a) datagram congestion control protocol b) stream control transmission protocol c) structured stream transport d) user congestion control protocol View Answer Answer: a Explanation: The datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation. It is used in modern day systems where there are really high chances of congestion. The protocol was last updated in the year 2008. advertisement 8. A _____ is a TCP name for a transport service access point. a) port b) pipe c) node d) protocol View Answer Answer: a Explanation: Just as the IP address identifies the computer, the network port identifies the application or service running on the computer. A port number is 16 bits. The combination of IP address preceded with the port number is called the socket address. /https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 4/8 2021/6/22 Transport Layer - Computer Networks Questions & Answers - Sanfoundry 9. Transport layer protocols deals with ____________ a) application to application communication b) process to process communication c) node to node communication d) man to man communication View Answer Answer: b Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals with logical communication between process. It is responsible for delivering a message between network host. advertisement 10. Which of the following is a transport layer protocol? a) stream control transmission protocol b) internet control message protocol c) neighbor discovery protocol d) dynamic host configuration protocol View Answer Answer: a Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol used in networking system where streams of data are to be continuously transmitted between two connected network nodes. Some of the other transport layer protocols are RDP, RUDP, TCP, DCCP, UDP etc. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-transport-layer 5/8 2021/6/22 Network Layer - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Network Layer « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Layer”. 1. The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes View Answer Answer: c Explanation: In computer networks, the data from the application layer is sent to the transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits. advertisement Ads by Stop seeing this ad Why this ad? /https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 1/8 2021/6/22 Network Layer - Computer Networks Questions & Answers - Sanfoundry 2. Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control View Answer Answer: d Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network communications. Error control is a function of the data link layer and the transport layer. 3. A 4 byte IP address consists of __________ a) only network address b) only host address c) network address & host address d) network address & MAC address View Answer Answer: c Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and host portion and it depends on address class. The size of the host address and network address depends upon the class of the address in classful IP addressing. advertisement 4. In virtual circuit network each packet contains ___________ a) full source and destination address b) a short VC number c) only source address /https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 2/8 2021/6/22 Network Layer - Computer Networks Questions & Answers - Sanfoundry d) only destination address View Answer Answer: b Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. Each virtual circuit is used to transfer data over a larger packet switched network. 5. Which of the following routing algorithms can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned View Answer Answer: d Explanation: The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The routing algorithms go hand in hand with the operations of all the routers in the networks. The routers are the main participants in these algorithms. advertisement 6. Which of the following is not correct in relation to multi-destination routing? a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets /https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 3/8 2021/6/22 Network Layer - Computer Networks Questions & Answers - Sanfoundry d) there are multiple receivers View Answer Answer: c Explanation: In multi-destination routing, there is more than one receiver and the route for each destination which is contained in a list of destinations is to be found by the routing algorithm. Multi-destination routing is also used in broadcasting. 7. A subset of a network that includes all the routers but contains no loops is called ________ a) spanning tree b) spider structure c) spider tree d) special tree View Answer Answer: a Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. advertisement 8. Which one of the following algorithm is not used for congestion control? a) traffic aware routing b) admission control c) load shedding d) routing information protocol View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 4/8 2021/6/22 Network Layer - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: The Routing Information Protocol (RIP) is used by the network layer for the function of dynamic routing. Congestion control focuses on the flow of the traffic in the network and uses algorithms like traffic aware routing, admission control and load shedding to deal with congestion. 9. The network layer protocol for internet is __________ a) ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol View Answer Answer: b Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer. advertisement 10. ICMP is primarily used for __________ a) error and diagnostic functions b) addressing c) forwarding d) routing View Answer Answer: a Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking devices to send error messages and operational information indicating a host or router cannot /https://www.sanfoundry.com/computer-networks-questions-answers-network-layer 5/8 2021/6/22 Data Link Layer - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Data Link Layer « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Data Link Layer”. 1. The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer View Answer Answer: a Explanation: In computer networks, the data from application layer is sent to transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits. Error control and flow control data is inserted in the frames at the data link layer. advertisement Ads by Stop seeing this ad Why this ad? /https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 1/8 2021/6/22 Data Link Layer - Computer Networks Questions & Answers - Sanfoundry 2. Which of the following tasks is not done by data link layer? a) framing b) error control c) flow control d) channel coding View Answer Answer: d Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with framing, error control and flow control. Data link layer is the layer where the packets are encapsulated into frames. 3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) error control sublayer View Answer Answer: b Explanation: Media access control (MAC) deals with transmission of data packets to and from the network-interface card, and also to and from another remotely shared channel. The MAC sublayer also prevents collision using protocols like CSMA/CD. advertisement 4. Header of a frame generally contains ______________ Ads by a) synchronization bytes Stop seeing this ad Why this ad? b) addresses /https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 2/8 2021/6/22 Data Link Layer - Computer Networks Questions & Answers - Sanfoundry c) frame identifier d) all of the mentioned View Answer Answer: d Explanation: In a frame, the header is a part of the data that contains all the required information about the transmission of the file. It contains information like synchronization bytes, addresses, frame identifier etc. It also contains error control information for reducing the errors in the transmitted frames. 5. Automatic repeat request error management mechanism is provided by ________ a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) application access control sublayer View Answer Answer: a Explanation: The logical link control is a sublayer of data link layer whose main function is to manage traffic, flow and error control. The automatic repeat request error management mechanism is provided by the LLC when an error is found in the received frame at the receiver’s end to inform the sender to re-send the frame. advertisement 6. When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ a) random error Ads by b) burst error Stop seeing this ad Why this ad? c) inverted error /https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 3/8 2021/6/22 Data Link Layer - Computer Networks Questions & Answers - Sanfoundry d) double error View Answer Answer: b Explanation: When a single bit error occurs in a data, it is called single bit error. When more than a single bit of data is corrupted or has error, it is called burst error. If a single bit error occurs, the bit can be simply repaired by inverting it, but in case of a burst error, the sender has to send the frame again. 7. CRC stands for __________ a) cyclic redundancy check b) code repeat check c) code redundancy check d) cyclic repeat check View Answer Answer: a Explanation: Cyclic redundancy check is a code that is added to a data which helps us to identify any error that occurred during the transmission of the data. CRC is only able to detect errors, not correct them. CRC is inserted in the frame trailer. advertisement 8. Which of the following is a data link protocol? a) ethernet b) point to point protocol c) hdlc d) all of the mentioned Ads by View Answer Stop seeing this ad Why this ad? /https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 4/8 2021/6/22 Data Link Layer - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP (Point to point protocol) etc. These protocols are used to provide the logical link control function of the Data Link Layer. 9. Which of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) Both CSMA/CD & CSMA/CA d) HDLC View Answer Answer: c Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel access. advertisement 10. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a) piggybacking b) cyclic redundancy check c) fletcher’s checksum d) parity check View Answer Ads by Stop seeing this ad Why this ad? /https://www.sanfoundry.com/computer-networks-questions-answers-data-link-layer 5/8 2021/6/22 Physical Layer - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Physical Layer « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Physical Layer”. 1. The physical layer is concerned with ___________ a) bit-by-bit delivery p) process to process delivery c) application to application delivery d) port to port delivery View Answer Answer: a Explanation: Physical layer deals with bit to bit delivery in networking. The data unit in the physical layer is bits. Process to process delivery or the port to port delivery is dealt in the transport layer. The various transmission mediums aid the physical layer in performing its functions. advertisement 2. Which transmission media provides the highest transmission speed in a network? a) coaxial cable /https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 1/8 2021/6/22 Physical Layer - Computer Networks Questions & Answers - Sanfoundry b) twisted pair cable c) optical fiber d) electrical cable View Answer Answer: c Explanation: Fiber optics is considered to have the highest transmission speed among the all mentioned above. The fiber optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx whereas IEEE standard for it is 802.3z. It is popularly used for modern day network connections due to its high transmission rate. 3. Bits can be sent over guided and unguided media as analog signal by ___________ a) digital modulation b) amplitude modulation c) frequency modulation d) phase modulation View Answer Answer: a Explanation: In analog modulation, digital low frequency baseband signal (digital bit stream) is transmitted over a higher frequency. Whereas in digital modulation the only difference is that the base band signal is of discrete amplitude level. The bits are represented by only two frequency levels, one for high and one for low. advertisement 4. The portion of physical layer that interfaces with the media access control sublayer is called ___________ a) physical signalling sublayer b) physical data sublayer /https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 2/8 2021/6/22 Physical Layer - Computer Networks Questions & Answers - Sanfoundry c) physical address sublayer d) physical transport sublayer View Answer Answer: a Explanation: The portion of physical layer that interfaces with the medium access control sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding, reception, decoding and performs optional isolation functions. It handles which media connection the signal should be forwarded to physically. 5. The physical layer provides __________ a) mechanical specifications of electrical connectors and cables b) electrical specification of transmission line signal level c) specification for IR over optical fiber d) all of the mentioned View Answer Answer: d Explanation: Anything dealing with a network cable or the standards in use – including pins, connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer deals with bit to bit delivery of the data aided by the various transmission mediums. advertisement 6. In asynchronous serial communication the physical layer provides ___________ a) start and stop signalling b) flow control c) both start & stop signalling and flow control d) only start signalling View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 3/8 2021/6/22 Physical Layer - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: In asynchronous serial communication, the communication is not synchronized by clock signal. Instead of a start and stop signaling and flow control method is followed. Unlike asynchronous serial communication, in synchronous serial communication a clock signal is used for communication, so the start and stop method is not really required. 7. The physical layer is responsible for __________ a) line coding b) channel coding c) modulation d) all of the mentioned View Answer Answer: d Explanation: The physical layer is responsible for line coding, channel coding and modulation that is needed for the transmission of the information. The physical configuration including pins, connectors and the electric current used is dealt in the physical layer based on the requirement of the network application. advertisement 8. The physical layer translates logical communication requests from the ______ into hardware specific operations. a) data link layer b) network layer c) trasnport layer d) application layer View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 4/8 2021/6/22 Physical Layer - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Physical layer accepts data or information from the data link layer and converts it into hardware specific operations so as to transfer the message through physical cables. Some examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables. 9. A single channel is shared by multiple signals by ____________ a) analog modulation b) digital modulation c) multiplexing d) phase modulation View Answer Answer: c Explanation: In communication and computer networks, the main goal is to share a scarce resource. This is done by multiplexing, where multiple analog or digital signals are combined into one signal over a shared medium. The multiple kinds of signals are designated by the transport layer which is the layer present on a higher level than the physical layer. advertisement 10. Wireless transmission of signals can be done via ___________ a) radio waves b) microwaves c) infrared d) all of the mentioned View Answer Answer: d Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves. These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless /https://www.sanfoundry.com/computer-networks-questions-answers-physical-layer 5/8 2021/6/22 Reference Models - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Reference Models – 2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models – 2”. 1. OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet View Answer Answer: a Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of computer network. advertisement 2. The number of layers in ISO OSI reference model is __________ a) 4 /https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 1/8 2021/6/22 Reference Models - Computer Networks Questions & Answers - Sanfoundry b) 5 c) 6 d) 7 View Answer Answer: d Explanation: In OSI reference model, there are 7 layers namely Application, Presentation, Session, Transport, Network, Data Link and Physical layer. Each layer uses a protocol to perform its designated function, for example, the data link layer uses error detection protocols for error control functions. 3. TCP/IP model does not have ______ layer but OSI model have this layer. a) session layer b) transport layer c) application layer d) network layer View Answer Answer: a Explanation: In OSI reference model, there are two layers which are not present in TCP/IP model. They are Presentation and Session layer. The functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP. advertisement 4. Which layer is used to link the network support layers and user support layers? a) session layer b) data link layer c) transport layer /https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 2/8 2021/6/22 Reference Models - Computer Networks Questions & Answers - Sanfoundry d) network layer View Answer Answer: c Explanation: Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers. The transport layer links these layers by segmenting and rearranging the data. It uses protocols like TCP and UDP. 5. Which address is used on the internet for employing the TCP/IP protocols? a) physical address and logical address b) port address c) specific address d) all of the mentioned View Answer Answer: d Explanation: The physical, logical, port and specific addresses are used in TCP/IP protocol. All the addressing schemes, that is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model and OSI model. In TCP/IP, the addresses are more focused on the internet implementation of these addresses. advertisement 6. TCP/IP model was developed _____ the OSI model. a) prior to b) after c) simultaneous to d) with no link to View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 3/8 2021/6/22 Reference Models - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was developed with the intention to create a model for the Internet while OSI was intended to be a general network model. 7. Which layer is responsible for process to process delivery in a general network model? a) network layer b) transport layer c) session layer d) data link layer View Answer Answer: b Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two systems in a network. The protocols used in Transport layer is TCP and UDP. The transport layer is responsible for segmentation of the data. It uses ports for the implementation of process-to-process delivery. advertisement 8. Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address View Answer Answer: c Explanation: A port number is a way to identify a specific process to which an Internet or other /https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 4/8 2021/6/22 Reference Models - Computer Networks Questions & Answers - Sanfoundry network message is to be forwarded when it arrives at a server. Some examples of port numbers are port 20 which is used for FTP data, port 22 which is used for SSH remote login ,and port 23 which is used for TELNET. 9. Which layer provides the services to user? a) application layer b) session layer c) presentation layer d) physical layer View Answer Answer: a Explanation: In networking, a user mainly interacts with application layer to create and send information to other computer or network. Application layer provides the interface between applications and the network. It is the top-most layer in both the TCP/IP and the OSI model. advertisement 10. Transmission data rate is decided by ____________ a) network layer b) physical layer c) data link layer d) transport layer View Answer Answer: b Explanation: Physical layer is a layer 1 device which deals with network cables or the standards in use like connectors, pins, electric current used etc. Basically the transmission speed is determined by the cables and connectors used. Hence it is physical layer that determines the /https://www.sanfoundry.com/computer-networks-questions-answers-reference-models 5/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Reference Models – 1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models – 1”. 1. How many layers are present in the Internet protocol stack (TCP/IP model)? a) 5 b) 7 c) 6 d) 10 View Answer Answer: a Explanation: There are five layers in the Internet Protocol stack. The five layers in Internet Protocol stack is Application, Transport, Network, Data link and Physical layer. The internet protocol stack model is also called the TCP/IP model and it’s used in modern Internet Communication. advertisement 2. The number of layers in ISO OSI reference model is __________ a) 5 /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 1/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry b) 7 c) 6 d) 10 View Answer Answer: b Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport, Network, Data link and Physical layer. OSI stands for Open System Interconnect and it is a generalized model. 3. Which of the following layers is an addition to OSI model when compared with TCP IP model? a) Application layer b) Presentation layer c) Session layer d) Session and Presentation layer View Answer Answer: d Explanation: The only difference between OSI model and TCP/IP model is that the functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP. OSI is a generalized model and TCP/IP is an application specific model. advertisement 4. Application layer is implemented in ____________ a) End system b) NIC c) Ethernet d) Packet transport View Answer /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 2/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry Answer: a Explanation: Not only application layer, but presentation layer, session layer and transport layer are also implemented in the end system. The layers below are implemented outside the end system, for example, the network layer is implemented on the routers and the physical layer is implemented for the medium. 5. Transport layer is implemented in ______________ a) End system b) NIC c) Ethernet d) Signal transmission View Answer Answer: a Explanation: Application, Presentation, Session and Transport layer are implemented in the end system. The transport layer handles the process to process delivery of the packet through ports. advertisement 6. The functionalities of the presentation layer include ____________ a) Data compression b) Data encryption c) Data description d) All of the mentioned View Answer Answer: d Explanation: Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation. It connects the application /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 3/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry layer with the layers below converting the human readable text and media to machine readable format and vice-versa. 7. Delimiting and synchronization of data exchange is provided by __________ a) Application layer b) Session layer c) Transport layer d) Link layer View Answer Answer: b Explanation: The session layer provides the mechanism for opening, closing and managing a session between end-user application processes. The session layer 5 is responsible for establishing managing synchronizing and terminating sessions. In TCP/IP protocol stack, the functions of the session layer are handled by the transport layer itself and thus the session layer is missing from the TCP/IP model. advertisement 8. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ a) Application layer b) Transport layer c) Link layer d) Session layer View Answer Answer: d Explanation: In OSI reference model, the fifth layer is Session layer. Session layer provides the mechanism for opening, closing and managing a session between end-user application /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 4/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry processes. In TCP/IP protocol stack, the functions of the session layer are handled by the transport layer itself and thus the session layer is missing from the TCP/IP model. 9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a) Application layer b) Transport layer c) Link layer d) Session layer View Answer Answer: a Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from device A to device B, the 5th layer to receive data at B is application layer. Application layer provides the interface between applications and the network. The user interacts with only this layer. advertisement 10. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a) Added b) Removed c) Rearranged d) Randomized View Answer Answer: b Explanation: In OSI reference model, when data packet moves from lower layers to higher layer, headers get removed. Whereas when the data packet moves from higher layer to lower /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 5/8 2021/6/22 Reference Models Questions & Answers - Sanfoundry layers, headers are added. These headers contain the essential control information for the protocols used on the specific layer. 11. Which of the following statements can be associated with OSI model? a) A structured way to discuss and easier update system components b) One layer may duplicate lower layer functionality c) Functionality at one layer no way requires information from another layer d) It is an application specific network model View Answer Answer: c Explanation: One layer may use the information from another layer, for example timestamp value. The information is contained in the header inserted by the previous layer. The headers are added as the packet moves from higher layers to the lower layers. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Access Networks » Next - Computer Networks Questions & Answers – Reference Models – 2 advertisement Recommended Posts: /https://www.sanfoundry.com/computer-networks-mcqs-reference-models 6/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Access Networks « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Access Networks”. 1. Which of this is not a constituent of residential telephone line? a) A high-speed downstream channel b) A medium-speed downstream channel c) A low-speed downstream channel d) An ultra-high speed downstream channel View Answer Answer: c Explanation: A low-speed downstream channel is not a constituent of a residential telephone line. But it might be just a two-way telephone channel. Internet can be provided through a high-speed downstream channel in a residential telephone line. advertisement 2. DSL telcos provide which of the following services? a) Wired phone access b) ISP /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 1/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry c) Wired phone access and ISP d) Network routing and ISP View Answer Answer: c Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service Provider. In a Digital Subscriber Line system, the same company which provides phone connection is also an ISP. The internet is provided through the pre-installed telephone lines. 3. The function of DSLAM is to __________ a) Convert analog signals into digital signals b) Convert digital signals into analog signals c) Amplify digital signals d) De-amplify digital signals View Answer Answer: a Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office does this function. advertisement 4. Which of the following terms is not associated with DSL? a) DSLAM b) CO c) Splitter d) CMTS View Answer /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 2/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: CMTS stands for Cable modem termination system. It is used in cable internet access. In cable internet access, internet is not provided through telephone lines and the companies that provide such connections don’t necessarily provide telephone access. 5. HFC contains _______ a) Fibre cable b) Coaxial cable c) A combination of Fibre cable and Coaxial cable d) Twisted Pair Cable View Answer Answer: c Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable. It has been popularly used since the early 1990s. It is stronger than the optical fiber cables and faster than the co-axial cables. advertisement 6. Which of the following statements is not applicable for cable internet access? a) It is a shared broadcast medium b) It includes HFCs c) Cable modem connects home PC to Ethernet port d) Analog signal is converted to digital signal in DSLAM View Answer Answer: d Explanation: CMTS stands for Cable modem termination system. In cable access analog signal is converted to digital signal by CMTS. In cable internet access, internet is not provided through telephone lines. DSLAM is used by Telecom companies. /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 3/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry 7. Among the optical-distribution architectures that are essentially switched ethernet is __________ a) AON b) PON c) NON d) MON View Answer Answer:a Explanation: AON stands for Active optical networks which are essentially switched Ethernets. Each user has his/her own dedicated optical fiber line connecting to the ISP in an AON. advertisement 8. StarBand provides __________ a) FTTH internet access b) Cable access c) Telephone access d) Satellite access View Answer Answer: d Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015. It was discontinued from September 30 2015 due to increasing competition from other ISPs. 9. Home Access is provided by __________ a) DSL b) FTTP c) Cable /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 4/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry d) All of the mentioned View Answer Answer: d Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by the cable connections and then the DSLs. FTTP is popularly used in modern connections. advertisement 10. ONT is connected to splitter using _________ a) High speed fibre cable b) HFC c) Optical cable d) Twisted pair cable View Answer Answer: c Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an optical fibre cable. It translates light signals from the fibre optic line to electric signals that the router can read. 11. Which of the following factors affect transmission rate in DSL? a) The gauge of the twisted-pair line b) Degree of electrical interfernece c) Shadow fading d) The gauge of the twisted-pair line and degree of electrical interference View Answer /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 5/8 2021/6/22 Access Networks - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair line i.e. the protection and electrical interference would affect the transmission rate in DSL. Unlike DSL, FTTP is not really affected by these factors. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Basics – 2 » Next - Computer Networks Questions & Answers – Reference Models – 1 advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Mechatronics Engineering Questions and Answers Electrical Engineering Questions and Answers Instrumentation Engineering Questions and Answers Digital Signal Processing MCQ (Multiple Choice Questions) Digital Electronics MCQ (Multiple Choice Questions) Electronics & Communication Engineering Questions and Answers Computer Organization and Architecture MCQ (Multiple Choice Questions) Electrical & Electronics Engineering Questions and Answers Computer Graphics MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers /https://www.sanfoundry.com/computer-networks-mcqs-access-networks 6/8 2021/6/22 Computer Network Basics Interview Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Basics – 2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 2”. 1. When collection of various computers seems a single coherent system to its client, then it is called _________ a) computer network b) distributed system c) networking system d) mail system View Answer Answer: b Explanation: A Computer network is defined as a collection of interconnected computers which uses a single technology for connection. A distributed system is also the same as computer network but the main difference is that the whole collection of computers appears to its users as a single coherent system. Example:- World wide web advertisement /https://www.sanfoundry.com/computer-networks-question-answers-basics 1/8 2021/6/22 Computer Network Basics Interview Questions & Answers - Sanfoundry 2. Two devices are in network if __________ a) a process in one device is able to exchange information with a process in another device b) a process is running on both devices c) PIDs of the processes running of different devices are same d) a process is active and another is inactive View Answer Answer: a Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct protocol. 3. Which of the following computer networks is built on the top of another network? a) prior network b) chief network c) prime network d) overlay network View Answer Answer: d Explanation: An overlay network is a computer network that is built on top of another network. Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P). advertisement 4. In computer network nodes are _________ a) the computer that originates the data b) the computer that routes the data /https://www.sanfoundry.com/computer-networks-question-answers-basics 2/8 2021/6/22 Computer Network Basics Interview Questions & Answers - Sanfoundry c) the computer that terminates the data d) all of the mentioned View Answer Answer: d Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes. 5. Communication channel is shared by all the machines on the network in ________ a) broadcast network b) unicast network c) multicast network d) anycast network View Answer Answer: a Explanation: In a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. In unicast network, information is sent to only one specific station. The broadcast address of the network is the last assigned address of the network. advertisement 6. Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network View Answer /https://www.sanfoundry.com/computer-networks-question-answers-basics 3/8 2021/6/22 Computer Network Basics Interview Questions & Answers - Sanfoundry Answer: a Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission. 7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub View Answer Answer: c Explanation: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination. advertisement 8. A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system View Answer Answer: b Explanation: A protocol stack refers to a group of protocols that are running concurrently that /https://www.sanfoundry.com/computer-networks-question-answers-basics 4/8 2021/6/22 Computer Network Basics Interview Questions & Answers - Sanfoundry are employed for the implementation of network protocol suite. Each layer in the network model has to use one specific protocol from the protocol stack. 9. Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes terminates d) in case of transfer failure View Answer Answer: a Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques. advertisement 10. Which of the following networks extends a private network across public networks? a) local area network b) virtual private network c) enterprise private network d) storage area network View Answer Answer: b Explanation: A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites which are unavailable in certain regions. /https://www.sanfoundry.com/computer-networks-question-answers-basics 5/8 2021/6/22 Computer Network Basics Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Basics – 1 Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 1”. 1. The IETF standards documents are called ________ a) RFC b) RCF c) ID d) DFC View Answer Answer: a Explanation: RFC stands for Request For Comments and they are documents that describe methods, behaviors, research, or innovations applicable to the working of the Internet. advertisement 2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________ a) Added b) Removed /https://www.sanfoundry.com/computer-networks-mcqs-basics 1/7 2021/6/22 Computer Network Basics Questions & Answers - Sanfoundry c) Rearranged d) Modified View Answer Answer: a Explanation: Each layer adds its own header to the packet from the previous layer. For example, in the Internet layer, the IP header is added over the TCP header on the data packet that came from the transport layer. 3. The structure or format of data is called ___________ a) Syntax b) Semantics c) Struct d) Formatting View Answer Answer: a Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. In programming languages, syntax of the instructions plays a vital role in designing of the program. advertisement 4. Communication between a computer and a keyboard involves ______________ transmission. a) Automatic b) Half-duplex c) Full-duplex d) Simplex View Answer /https://www.sanfoundry.com/computer-networks-mcqs-basics 2/7 2021/6/22 Computer Network Basics Questions & Answers - Sanfoundry Answer: d Explanation: In simplex transmission, data flows in single direction which in this case refers to the data flowing from the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to the computer only. 5. The first Network was called ________ a) CNNET b) NSFNET c) ASAPNET d) ARPANET View Answer Answer: d Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the first network to be implemented which used the TCP/IP protocol in the year 1969. advertisement 6. A _______ is the physical path over which a message travels. a) Path b) Medium c) Protocol d) Route View Answer Answer: b Explanation: Messages travel from sender to receiver via a physical path called the medium using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided (wireless). /https://www.sanfoundry.com/computer-networks-mcqs-basics 3/7 2021/6/22 Computer Network Basics Questions & Answers - Sanfoundry 7. Which organization has authority over interstate and international commerce in the communications field? a) ITU-T b) IEEE c) FCC d) ISOC View Answer Answer: c Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is responsible for regulating all interstate communications originating or terminating in USA. It was founded in the year 1934. advertisement 8. Which of this is not a network edge device? a) PC b) Smartphones c) Servers d) Switch View Answer Answer: d Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch can’t operate as a host, but as a central device which can be used to manage network communication. 9. A _________ set of rules that governs data communication. a) Protocols b) Standards /https://www.sanfoundry.com/computer-networks-mcqs-basics 4/7 2021/6/22 Computer Network Basics Questions & Answers - Sanfoundry c) RFCs d) Servers View Answer Answer: a Explanation: In communications, a protocol refers to a set of rules and regulations that allow a network of nodes to transmit and receive information. Each layer in the network model has a protocol set, for example, the transport layer has TCP and UDP protocols. advertisement 10. Three or more devices share a link in ________ connection. a) Unipoint b) Multipoint c) Point to point d) Simplex View Answer Answer: b Explanation: A multipoint communication is established when three or many network nodes are connected to each other. Frame relay, Ethernet and ATM are some examples of multipoint connections. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-mcqs-basics 5/7 2021/6/22 exam 1 Flashcards | Quizlet Home / Other / Computer Skills / Cisco Systems exam 1 Study exam 1 Terms in this set (52) 1) physical/ Ethernet 2) data-link/ Ethernet The OSI model consists of 3) network/ IP how many Layers? Name 4) transport/ TCP/UDP Them. 5) session/ TCP/UDP/application 6) presentation/ application 7) application/ application Also note that the OSI model is just that, a model. Does the OSI model match modern networks systems exactly? In the real world exactly which function is performed at which layer can be somewhat fuzzy. For example, ICMP can be though of as a inband layer 3 signaling protocol or a layer 4 transport protocol. What layer is closest to the layer one; physical Ethernet transmission medium (IE closest to the wire) In what layer is the data unit layer 2; data-link Ethernet usually called a frame? In what layer is the data unit layer 3; network IP usually called a packet? /https://quizlet.com/266699170/exam-1-flash-cards 1/10 2021/6/22 In what 1layer is the data unit exam exam 1 Flashcards | Quizlet layer 4; transport TCP/UDP Study usually called a segment? As the data packet moves deleted from lower (hardware) to upper (user) layers headers and/or trailers are (added or deleted) As the data packet moves added from upper (user) to lower (hardware) layers headers and/or trailers are (added or deleted) Layer 4 (trasport) Reliable transmission of data segments between points on a network, including segmentation, acknowledgement and What is the main function of multiplexing the transport layer? What about the session layer? Layer 5 (session) Managing communication sessions, i.e. continuous exchange of information in the form of multiple back-and-forth transmissions between two nodes When we talk about Ethernet layer 2 we are talking mostly about which OSI "layer"? When we talk about IP we are layer 3 talking mostly about which OSI "layer"? When we talk about TCP we layer 4 are talking mostly about which OSI "layer"? /https://quizlet.com/266699170/exam-1-flash-cards 2/10 2021/6/22 exam 1 Flashcards | Quizlet exam 1 Study Upgrade to remove adverts What is the difference between two hosts on the same "network" and two hosts on the same "Internetwork"? Two hosts are on the same Only ₪11.67/month Two hosts on the same network is equal to two hosts on the same IP subnet . Two hosts on the same internetwork is equal to two hosts on the same autonomous network or network owned by one company or being. Yes. They are on the same network. layer 2 network. Can they communicate directly (without using a layer 3 router)? Two hosts are on the same No. In this case they are on different networks, the layer 3 internetwork but not router will on the same layer 2 network. have to relay layer 3 (IPv4) between the two Layer Can they communicate 2 networks. directly (without using a layer 3 router)? /https://quizlet.com/266699170/exam-1-flash-cards 3/10 2021/6/22 exam 1 exam 1 Flashcards | Quizlet WHEN were they defined: Study TCP was documented in 1974, UDP in 1980 TYPE OF DOCUMENT: Internet standards are defined in documents called Requests For Comments (RFCs). TCP was written in 1973, then revised and formally documented in RFC 675, Specification of Internet Transmission Control Program, December 1974. When were the IP and TCP and UDP protocols defined? In what type of document? Who publishes these documents? Where would you go on the Internet to look these up these documents? UDP was defined in RFC 768, User Datagram Protocol, in 1980 PUBLISHER: The TCP/IP protocols were initially developed as part of the research network developed by the 2 United States DARPA(Defense Advanced Research Projects Agency or ARPA) scientists— Vint Cerf and Bob Kahn, persons most often called the fathers of the Internet. Basic internetworking was to be done by IP, and the reliability features by TCP. This paved the way for the creation of an alternative transport-layer protocol for applications that didn't want or need the features provided by TCP. This, of course, is the User Datagram Protocol (UDP). IEEE 802.3 is a working group and a collection of Who sets the standards for Ethernet? Institute of Electrical and Electronics Engineers (IEEE) standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. When was the the TCP/IP RFC 1981 RFC's defining IP (RFC 791), ICMP (RFC792), released? and TCP (RFC 793) released Where would you look to file rfc-editor the current "Best practices" documents for the Internet? /https://quizlet.com/266699170/exam-1-flash-cards 4/10 2021/6/22 exam 1 Flashcards | Quizlet What are exam 1 two names for a Hub/Repeater. Study device that sits in the middle of a standard half duplex 10BaseT star physical topology network? What is the maximum length 100 meters for a 100 base TX segment? What are two names for a Bridge/Switch device that sits in the middle of a standard 10BaseT network and separates collision domains? Upgrade to remove adverts Only ₪11.67/month Name two types of ethernet 10 base 5/10 base 2 are two types of ethernet media that use a physical bus media that use a physical bus topology. topology? What are the advantages to Bus doesn't need extra devices, disadvantage is if using a star physical topology one problem occurs the whole segment is down. as opposed to a bus physical Star can isolate a faulty segment but you need topology for ethernet. What hub/repeater. are the disadvantages? What is the maximum length 100 meters for a 1000 base TX segment? /https://quizlet.com/266699170/exam-1-flash-cards 5/10 2021/6/22 exam 1 exam 1 Flashcards | Quizlet Ethernet requires a device to sit in the center Study of Can a network technology be the star and link up all systems. This is a Repeater a physical star, but a logical or Hub (synonyms) in older half duplex systems. It bus? What is an example of is a bridge or switch in modern full duplex this? What does it mean to be systems. Modern ethernet (IE 100BaseTX or a logical bus network? newer/faster) is an example of this. Can you run a plain old Yes, blue and/or brown pair phone line and a 100mbps (100TX) ethernet on the same cat5 cable? If so, which pairs would you assign to each? Can you run a plain old No, GiGE bit Ethernet means all 4 pairs phone line and a GiGE ethernet on the same cat5 cable? If so, which pairs would you assign to each? Which can move data a Singlemode longer distance, Multimode fiber or Singlemode fiber? What type (laser or LED) and 1550 wavelength (1310 or 1550) of optics would you use on a Singlemode fiber to go the longest distance? What type of connector ends RJ45 or 8P8C are used for ethernet on UTP cable? /https://quizlet.com/266699170/exam-1-flash-cards 6/10 2021/6/22 exam 1 Flashcards | Quizlet Which pairs exam 1 in a Cat 5 Orange and green pairs Study ethernet cable are used for 100mbps ethernet? What colors are they marked with? Upgrade to remove adverts What is the normally used Only ₪11.67/month Yellow color for a single mode fiber optic patch cables. What is the normally used Orange color for a multimode mode fiber optic patch cables. wavelength-division multiplexing (WDM) is a What does WDM mean in technology which multiplexes a number of optical relation to fiber optic cables? carrier signals onto a single optical fiber by using different wavelengths (i.e., colors) of laser light. Is a single fiber strand of any No, one channel for each direction use for standard fiber optic connections? What modern technology WDM might be used to run a full duplex connection on a single fiber? What is a end station? One interface /https://quizlet.com/266699170/exam-1-flash-cards 7/10 2021/6/22 What is 1an intermediate exam exam 1 Flashcards | Quizlet Multiple interfaces Study station? Collison domain: A collision domain is, as the name implies, a part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. The packets collide and both devices must send the packets again, which reduces network efficiency. Collisions are often in a hub environment, because each port on a hub is in the What is the difference same collision domain. By contrast, each port on a between a collison domain bridge, a switch or a router is in a separate and a broadcast domain in collision domain. ethernet? Broadcast domain A broadcast domain is a domain in which a broadcast is forwarded. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. All ports on a hub or a switch are by default in the same broadcast domain. All ports on a router are in the different broadcast domains and routers don't forward broadcasts from one broadcast domain to another How far from a 100Mbps 100 meters repeater can you located a workstation that is connected via twisted pair? If you have a full duplex 100 100 meters, signal continuation Mbps Ethernet running over a twisted pair cat 5 copper cable media, how far away from the switch can you locate the end station? What is the cause of this limitation? /https://quizlet.com/266699170/exam-1-flash-cards 8/10 2021/6/22 If you have exam 1 a switch exam 1 Flashcards | Quizlet half duplex Study connected to a repeater would you want the switches port to be set to full or half duplex? Does a port which is set to full no duplex listen for collisions when it transmits? Should you trust that auto- most of the time negotiation of duplex and speed will always work? If you have two 1000Mbps single-mode 1310 Ethernet switches that are linked via fiber optics what type of fiber optic connection (and on what type of fiber) should you use to link the switches if they are 5 Kilometers apart? (assume lowest cost solution) If you have two 1000Mbps multi-mode 1550 Ethernet switches that are linked via fiber optics what type of fiber optic connection (and on what type of fiber) would you use to link the switches if they are 300 meters apart? (assume lowest cost solution) /https://quizlet.com/266699170/exam-1-flash-cards 9/10 2021/6/22 exam 1 Flashcards | Quizlet Two end1 stations are exam yes for both ( if you are in the collision domain, Study connected to a Hub/repeater. you always going to be in the broadcast domain ) Are they the same collision domain? Are they in the same broadcast domain? Two end stations are no for collision domain, yes for broadcast domain connected to a bridge/switch. Are they in the same collision domain? Are they in the same broadcast domain? How many bytes does a Vlan 4 octates tag add to a Ethernet frame? What is the maximum size of a 1522 ( not on the test ) 802.1q Ethernet frame (not including the preamble) How many different vlans can 4096 you have on a 802.1q enabled switch? /https://quizlet.com/266699170/exam-1-flash-cards 10/10 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Networks & Internet Technologies Final Exam Study Networks & Internet Technologies Final Exam Terms in this set (101) A communication mechanism True with a dedicated path between two endpoints with guaranteed isolation is called circuit switching. The best example of a packet False switched network is the analog telephone system, also known and the "Public Switched Telephone Network" or "PSTN." 1. A single communication is not affected by others Which of the following is a property of the circuit 2. Circuits are not permanent but created when switched paradigm? needed and removed when communication ends 3. Endpoint-to-endpoint communication /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 1/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet a. Small blocks data a. Packets Networks & of Internet Technologies Final Exam b. The basis of the Internet b. Packet Switching c. Uses Frequency Division c. Circuit Switching Study Multiplexing d. Packet Switching d. Uses Statistical Multiplexing e. Circuit Switching e. Uses Synchronous Time Division Multiplexing f. Packets f. Varied in size depending on g. Circuit Switching technology but commonly 1500 Bytes h. Packet Switching g. Can communicate with only i. Packet Switching one recipient h. Can communicate with one or many recipients i. Lower in cost due to the ability to share a single path a. LAN a. Local Area Network b. MAN b. Metropolitan Area Network c. WAN c. Wide Area Network /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 2/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet a. Organizationally Unique Technologies a. OUI Networks & Internet Final Exam Study Identifier b. OUI b. First 24-bits of a MAC address c. NIC c. Network Interface Card d. MAC Address d. Ethernet Address e. MAC Address e. Media Access Control f. NIC address g. MAC Address f. Network Interface Controller h. MAC Address g. 90:B1:1C:9B:3A:CC h.48-bit unique address 01:00:5E:C0:00:08 a. multicast address .11111111.11111111.11111111.11111111.11111111.11111111 b. broadcast address One computer gets a copy of the c. Unicast Address acket d. Unicast Address . 00-50-56-C0-00-08 e. Multicast Address Some computers get a copy of the acket f. Broadcast Address All computers get a copy of the g. Broadcast Address acket . FF:FF:FF:FF:FF:FF /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 3/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Each frame consists of twoTechnologies false Final Exam Networks & Internet Study parts: The footer and the payload. The largest part of a frame is false (usually) the header. In a frame, the payload is true transmitted second. a. It allows for sequences of bits to be reserved for marking the beginning and end of the frame Which of the following statements are TRUE about bit/Byte stuffing? b. Once used, the receiving end reverses the changes automatically c. Once completed, it ensures the reserved characters do not appear in the payload. Network Hardware (NICs) do true not understand IP addresses. Mapping between a protocol true address (IP address) and a hardware address (MAC address) is called address resolution. As a packet travels along a true network path from router to router, the Source and Destination MAC address change from hop to hop but the Source and Destination IP do not. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 4/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet In an ARP query, how manyTechnologies 1 Networks & Internet Final Exam Study computers reply to the broadcast? What does ICMP stand for? Internet Control Message Protocol What does DHCP stand for? Dynamic Host Configuration Protocol Each subnet must have its false own DHCP server. Hosts using IPv6 addresses true don't use DHCP because they generates their own unique addresses using a multicast (broadcast) discovery of a network prefix and the MAC address (split) for the suffix. When IPv4 addresses started true to become scarce, Network Address Translation (NAT) was invented to allow multiple computers to share a single global address. a. 169.254.0.0/16 Which of the following are designated as PRIVATE addresses and are nonroutable? b. 192.168.0.0/16 c. 172.16.0.0/12 d. 10.0.0.0/8 /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 5/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet a. Uses a translation table Technologies a. Both NAT Exam and NAPT Networks & Internet Final b. Network Address and Port Study b. NAPT Translation c. NAT c. Network Address Translation d. NAPT d. Uses port number to e. Both NAT and NAPT associate each datagram with a specific "conversation" f. Both NAT and NAPT e. Replaces the IP source address when sending datagrams to the Internet f. Replaces the IP destination address when receiving datagrams from the Internet Most broadband providers true provide their customers with a NAPT device that we commonly call our "router." In actuality it is usually a modem, router, NAT/NAPT, Wi-Fi access point all wrapped into one. Application programs must false be aware of the physical network they are using. The size of an IP datagram is false always the same. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 6/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet The size of each field of anTechnologies IP true Final Exam Networks & Internet Study header is always the same. a. source IP b. checksum Which of the following are Header fields in an IPv4 datagram? (select all that apply) c. Version d. Time to Live (TTL) e. Destination IP f. Header Length g. Total Length IP routers use ________ to forwarding tables determine the next hop a packet will take. There is one entry in every false router for each host on the Internet. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 7/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet In the following excerpt from 172.19.0.128/25 Networks & Internet Technologies Final Exam Study a router forwarding table, which entry would apply to a packet with destination IP 172.19.0.200: Remember: the MOST specific route that applies is the one used. 172.16.0.200/32 172.19.0.0/25 172.19.0.128/25 172.16.0.0/16 172.19.0.0/16 172.0.0.0/8 As an IP datagram is sent over true the Internet, the destination address in the header does not change. IP is a guaranteed paradigm false meaning that datagrams may be lost, duplicated, delayed, delivered out of order, or delivered with corrupted data. An IP datagram is true encapsulated in the payload of a frame for transmission. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 8/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Put the following in order Technologies a. 4 Final Exam Networks & Internet Study starting when a fully formed frame arrives at the first b. 2 router. (Note the start point!!!) c. 3 a. The frame is sent across the physical network. d. 1 b. The router reads the IP datagram destination address from the header and calculates the new frame header (destination MAC address) using its ARP tables. c. The router encapsulates the datagram into the payload of a new frame d. The router de-encapsulates the frame and discards the old header information The maximum amount of data true a frame can send is called the Maximum Transmission Unit. When one network has a MTU true of 1500 and the next has an MTU of 1492 the router cannot re-encapsulate the first datagram to send over the second network. UDP is the only true connectionless transport protocol. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 9/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet IP lacks an important feature true Final Exam Networks & Internet Technologies Study necessary for all applications; it cannot distinguish amongst different applications on a single host. TCP and UDP function on this layer 4 Layer of the Internet Model. Which of the following are 1. Can send or receive from many applications features of UDP? (check all that apply) 2. Cannot guarantee delivery /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 10/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Match the definitions with the a. best-effort Networks & Internet Technologies Final Exam Study features of UDP. b. Connectionless Paradigm a. Uses IP for transmission with no further steps to c. Connectionless Paradigm ensure transmission or correct errors. d. Message-Oriented interface b.Applications do not need to e. end-to-end protocol set up or tear down a connection before sending f. arbitrary modes of interaction data; it can be sent at any time. g. best-effort delivery c. No state information is used or saved; No control messages are used. Data is the only element of the transmission. d. Does not divide up data into multiple packets or combine messages for delivery. e. Allows an individual application (not the host itself) to be an endpoint for communication. f. Can send 1-to-1, 1-to-many, many-to-1 or many-to-many. g. All the delivery problems of IP (messages can be lost, duplicated, delayed, corrupted or delivered out of order) still exist and are not detected or corrected. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 11/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Networks & Internet Each UDP message must fitTechnologies true Final Exam Study inside a single IP datagram. As a result of the fixed size of IP headers, and the common (and small) MTU, programmers typically limit UDP messages to prevent fragmentation. UDP would be a good true protocol to use for live streaming radio. Applications use logical port false numbers that are independent of the OS to identify it as an endpoint. To keep UDP short, there are true no headers just data. Checksum field is optional in true UDP. To ensure that a particular true user datagram was delivered to the intended host, UDP sometimes adds information from the IP layer like source IP and destination IP but this is only used to calculate a checksum, not for delivery itself. This is called a pseudo header. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 12/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet TCP uses the & unreliable IP Technologies true Final Exam Networks Internet Study service to provide reliable data delivery. 1. A three way handshake must be used to Which of the following are establish a connection to a destination before features of TCP? (check all sending data. that apply) 2. Delivered in order, and exactly as sent /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 13/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Match the definitions with the a. connection orientation Networks & Internet Technologies Final Exam Study features of TCP. b. point-to-point communication a. Applications must request a connection before sending c. complete reliability data. d. full duplex communication b. Each connection has exactly 2 endpoints. e. stream interface c. Guaranteed delivery f. stream interface exactly as sent, complete and in order. g. reliable startup and graceful shutdown d. Data can flow in either direction and from either side of the connection at any time. e. Sends a continuous sequence of data; Data is not grouped into messages or records. f. Sending application data size is not guaranteed during delivery. g. Applications reliably start a communication, ensures that all data has been delivered and then both sides agree to shut down the connection. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 14/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet TCP provides&a virtual true Final Exam Networks Internet Technologies Study connection between applications. This illusion of a physical connection is named as such because it is achieved through software. TCP segments and UDP true datagrams are encapsulated in IP packets which are encapsulated in network Frames and sent across the physical medium. 1. End systems might crash or reboot 2. Machines with faster hardware can generate data faster than slower ones can read and Which of the following are interpret said data causing the slower processor problems that TCP must to be overrun. overcome to ensure reliability? (choose all that 3. Intermediate switches and router can be apply) overrun with data from many aggressive hosts sending on a common link. 4. Messages can be lost, duplicated, corrupted, delayed, or delivered out of order To handle duplicate packets true and out of order packets, TCP attached a sequencing number to each packet. If the packet is the next expected, it is passed up to the application, if not, it is catalogued and stored until it is ready to be used. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 15/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet To handle packet lost, TCP Technologies false Final Exam Networks & Internet Study uses negative acknowledgement with retransmission. Whenever a frame does not arrive, a small message is sent back to the sender reporting the failure. A packet will be retransmitted false indefinitely until it is received. To prevent a packet for one unique TCP session from being confused with a different session, a ________ ID is added to each packet. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 16/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Match the following a. stop and go Networks & Internet Technologies Final Exam Study definitions and terms: b. sliding window a. When a subsequent packet is not sent until the previous c. congestion packet is acknowledged. d. retransmission b. When a group of packets are sent (continuously) until acknowledgement of the first packet in the group arrives. c. When delivery of packets is delayed due to the limitations of the speed of a connection and the buffer of the intermediate systems. d. When TCP does to receive an acknowledgement within a specific amount of time, it sends the packet again. Complete the following a. synchronization segment Abbreviations: b. acknowledgement a. SYN c. finish segment b. ACK c. FIN Which sequence for the SYN, SYN/ACK, ACK three-way handshake used to establish a TCP connection is correct? /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 17/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet 1. source port Networks & Internet Technologies Final Exam Study 2. sequence number Which of the following are header fields for TCP? 3. checksum 4. destination port 5. acknowledgement number 6. window Ethernet devices and cabling false has remained basically constant for over 30 years and new hardware is not compatible with older hardware. The 16-bit type field allows for true an Ethernet frame to be used with multiple protocols like IPv4 or IPv6. In the conventional Ethernet true frame, the payload cannot be more than 1500 bytes; in the IEEE 802.3 standard, it cannot be more than 1492 bytes. 1. calculates the CRC (used for error checking) What does a NIC do? 2. recognizes addresses and frames 3. sends and receives frames /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 18/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet The original Ethernet was Technologies false Final Exam Networks & Internet Study called thick net because the wires used to interconnect computers were heavy fiber cables. It was also called 10BASE5. The next upgrade to Ethernet true wiring used a more skinnier more flexible coaxial cable and was called thin net or 10BASE2. The third generation of true Ethernet wiring was called twisted pair Ethernet and (at least physically) abandoned the bus model for a central interconnection called a hub which directly connected to each NIC. Match the Names with their a. 100BASE-T Designations. b. 1000BASE-T a. fast ethernet c. 10BASE-T b. gigabit ethernet 1000BASE-T c. twisted pair ethernet d. gig-E Twisted pair Ethernet uses this RJ-45 type of connector. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 19/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet For Ethernet,& there are twoTechnologies true Final Exam Networks Internet Study types of cables, patch(or straight) and crossover (or crossed). A maximum length true specification is a fundamental part of LAN technology. A repeater is an analog true hardware device used to extend a LAN. It amplifies and sends all incoming signals to the other side. 1. Bridges "learn" which computers are connected to which port/segment by looking into the headers of incoming frames for MAC addresses. Which of the following are true about adaptive bridges? 2. A bridge examines the destination MAC address in a frame, and does not forward the frame onto the other LAN segment unless necessary. 3. They are sometimes also called learning bridges A bridged network is faster true than a non-bridged one. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 20/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet To prevent a & cycle from Technologies false Final Exam Networks Internet Study causing an endless loop, bridges implement an algorithm that computes a Distributed Spanning Exchange. That is, the algorithm views bridges as nodes in a graph, and imposes a tree on the graph. 1. root election What are the steps of the Spanning Tree Protocol? 2. shortest path computation 3. forwarding A hub is an analog device that true forwards signals among (all) computers connected to it while a switch is a digital device that forwards packets to specific ports only. The acronym VLAN stands for false Visual Local Area Network. Which of the following are 1. VLAN switches allow one switch to act like true of a VLAN switch? (check multiple independent switches dividing computers all that apply) into separate broadcast domains VLANs CANNOT operate false across multiple switches. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 21/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet The government (FCC) true Final Exam Networks & Internet Technologies Study regulates the frequencies in the electromagnetic spectrum that can be used for wireless communication. 1. Wi-Max used for mobile broadband Which of the following are 2. LTE cellular data network wireless network technologies? 3. Bluetooth 4. Wi-Fi routers at home 1. PAN 1. Personal Are Network 2. WLAN 2. Wireless Local Area Network 3. MAN 3. Metropolitan Area Network 4. WAN 4. Wide Area Network Wi-Fi stands for Wireless true Fidelity. The WiFi Alliance is a non- true profit organization that certifies products based off of the IEEE 802.11 standard. What is the term for using spread spectrum multiple frequencies to send data increasing performance and tolerating interference for wireless? /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 22/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Two hosts communicating ad hoc networking Networks & Internet Technologies Final Exam Study with each other directly without the use of an Access Point is called: Most wireless LANs are set up true so hosts connect to an access point which is connected to a switch/router. When a host is in range of two false wireless access points, it must associate with a particular AP. The header of a wireless false frame can only have one destination MAC address. Two different types of access true points exist, cheap dumb ones that rely on the computer to choose when to change their association and expensive intelligent ones that coordinate with each other to provide smooth handoffs. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 23/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet There are two&classes of Technologies false Final Exam Networks Internet Study WiMAX, Mobile (802.16e) and Fixed (802.16d): Fixed WiMAX allows for handoffs between access points and is used for Wireless broadband access to laptops and cell phones. Mobile WiMAX doesn't allow for hand-offs and is used for wireless broadband connections to buildings and houses. 1. can cover areas up to 10Km Which of the following are 2. Can provide transmission speeds of up to key features of WiMAX? 70Mbps full-duplex at closer ranger (check all that apply) 3. Allows for both line of sight (LOS) and non line of sight (NLOS) access /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 24/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet Match the following PAN Technologies a. bluetooth Networks & Internet Final Exam Study Technologies with their features or definitions: b. ultra wideband (UWB) a. 802.15.1a c. zigbee b.802.15.3a d. bluetooth c. 802.15.4 e. bluetooth d. Up to 721 Kbps @5m f. zigbee e. Uses 1 frequency band g. ultra wideband (UWB) f. Uses 3 frequency bands h. bluetooth g. Uses many frequency i. zigbee bands (spectrum) h. Used to replace cabling for peripherals i. Used for home automation and remote controlled devices 1. Transmission range and speeds vary considerably but typical applications are seen at rates up to 16Mbps and distances around 5m Which of the following are true about Infrared wireless 2. Signal reflects off objects and cannot not go technology? (check all that through them. apply) 3. Transmission is directional in a 30 degree cone 4. Often used in remote controls /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 25/26 2021/6/22 Networks & Internet Technologies Final Exam Flashcards | Quizlet 1. HasFinal limitedExam distance Networks & Internet Technologies Study Which of the following are 2. Used to "tag" items and devices for inventory true about RFID? (check all control, and detection, and embedding digital that apply) data. 3. Short for Radio Frequency Identification Wireless WAN technologies false can be divided into two categories, Cellular and Metropolitan communications systems. Ideally, each cell tower forms true a hexagon because the cells can be arranged in a honeycomb. In practice, cellular coverage is not perfect and transmits in a circular pattern. In practice, all cells are the false same size. Interference can be true minimized if adjacent cells use different frequencies. /https://quizlet.com/250870626/networks-internet-technologies-final-exam-flash-cards 26/26 2021/6/22 Midterm Answers Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Midterm Answers Study Midterm Answers Terms in this set (87) In 1980, the Internet was a A. Less than 100 sites research project that involved: Computer networking is easy False for a beginner because there is a single underlying theory that explains the relationship among all parts. Early communications False networks such as the telegraph and telephone systems use packets to send information. Packet switching is the basis True for the modern Internet. A. a concept In the 1970s, the Internet was: B. a revolution in computer networking C. a set of standards D. proposed by Vinton Cerf and Robert Kahn /https://quizlet.com/135114631/midterm-answers-flash-cards 1/15 2021/6/22 Because theAnswers Internet tolerates Midterm Midterm Answers Flashcards | Quizlet False Study heterogeneity, engineers can't experiment with new networking technologies without disrupting existing networks. For communication to be True successful across networks, all entities must agree on how information will be represented and communicated. The term protocol refers to a True specification for network communications. Multiple protocols designed True to work together in a complete, cooperative set are called a suite. Protocols in a suite are True furthermore collected into a unified whole known as a layering model. Protocol implementations True follow the layering model by passing the output from a protocol in one layer to the input of a protocol in the next layer. /https://quizlet.com/135114631/midterm-answers-flash-cards 2/15 2021/6/22 Midterm Answers Flashcards | Quizlet A pair of protocols in Midterm Answers True Study adjacent layers pass a pointer to the packet rather than create a new copy. Upgrade to remove adverts As data passes down through Only ₪11.67/month Added the protocol layers on the sending computer, headers are: The TCP/IP protocol suite that A. 5 is widely used today corresponds to a model that contains how many layers? The primary motivation for False early computer networks was email due to computers being large and expensive. /https://quizlet.com/135114631/midterm-answers-flash-cards 3/15 2021/6/22 The Advanced Research Midterm Answers Midterm Answers Flashcards | Quizlet B. ARPANET Study Projects Agency, an agency of the US. Department of Defense, gathered researchers and contractors together to produce a working data network known as ? . As the Internet experienced A. focus on new applications exponential growth over the B. increase in communication speeds past 25 years, it changed in the following ways: A. audio Multimedia is Data that B. video contains a combination of ? D. text E. graphics A. traditional communications systems adopting Recent trends in computer networks and the Internet include: Internet technology B. high-quality teleconferencing C. cloud computing D. social networking applications E. sensor networks Which of the following A. The pair uses the connection to exchange data statements describe a C. A pair of applications requests a connection connection-oriented interaction? What handles initiating B. application programs contact with and accepting contact from a remote computer? /https://quizlet.com/135114631/midterm-answers-flash-cards 4/15 2021/6/22 In the client-server paradigm, Midterm Answers Midterm Answers Flashcards | Quizlet True Study the server software waits passively for contact, while the client software actively initiates contact. Boiling it down to its core True definition, server software consists of a program dedicated to providing a service. A client can access multiple True services but typically contacts only one remote server at a time. B. A program that waits passively for communication A server can be defined as: C. A computer that has fast CPU, large memory, and powerful operating system D. A computer dedicated to running one or more server programs Can a computer operate Yes multiple clients and even multiple copies of a single application? Can a computer run multiple Yes server programs? /https://quizlet.com/135114631/midterm-answers-flash-cards 5/15 2021/6/22 Can consolidating multiple Midterm Answers Midterm Answers Flashcards | Quizlet Yes Study server programs on a single computer reduce cost without significantly reducing performance? How does a client identify a A - 1. Computer server on the Internet? B - 2. Service A. Internet Protocol address B. Protocol port number When a request arrives at a False server, software on the server uses the IP address to determine which application on the server computer should handle the request. A server can act as a client. True If only one server provides a True given service, the network connection that connects the server to the Internet can become a bottleneck. If a ______ architecture is C. peer-to-peer implemented in server code, data is distributed equally among a set of N servers. In the real world, a p2p False system enables extremely large traffic to one computer because N can be extremely small. /https://quizlet.com/135114631/midterm-answers-flash-cards 6/15 2021/6/22 The primaryAnswers example of Midterm Midterm Answers Flashcards | Quizlet D. TCP/IP Study communications software that enables clients and servers to interoperate is: The amount of work done on B. thick client a client vs. a server varies across server software. In which model is application processing, graphic rendering and storage all offloaded from the server to the client? In the thin client model, the True server handles more of the work relative to the thick client model. In a three-tier client/server B. backend server architecture, the following D. client/user machine types of machines are found: F. middle-tier/gateway server The World Wide Web is: C. One of many services in use on the Internet A. a markup language HTML can be defined as: B. declarative C. a representation standard /https://quizlet.com/135114631/midterm-answers-flash-cards 7/15 2021/6/22 Midterm Answers Flashcards | Quizlet Match the term to its place in Midterm Answers A - 1. document name a Uniform Resource Locator. C - 2. computer name Study E - 3. protocol vvv://www:xxx/yyy?zzz B - 4. port D - 5. parameters A. yyy B. xxx C. www D. zzz E. vvv In terms of the client-server True model, a browser is a client that extracts a server name from a URL and contacts the server. A browser can significantly A. cache reduce download time by saving images in a _____ . FTP handles both uploading True and downloading of any type of data. An FTP client allocates a B. port random ______ before sending a request to the server on a known _____. (same word for both answers) In the original architecture of B. mail transfer application Internet email service, what component acted as both a client and server? /https://quizlet.com/135114631/midterm-answers-flash-cards 8/15 2021/6/22 The MIME standard encodes Midterm Answers Midterm Answers Flashcards | Quizlet A. printable letters Study non-text attachments as _______ Match each part of the C - 1. xxx domain name below. B - 2. yyy A - 3. zzz xxx.yyy.zzz A. top-level domain B. group or organization C. individual computer No computer can run a web False server unless the computer's domain name starts with www. What does DNS stand for? The name resolution process C. Domain Name System False involves a resolver that forms a DNS reply message and waits for a DNS request message. An email program using SMTP False requests a mail exchange (MX) record from the DNS database. A MAC address is returned in response. The best way to form large False networks is to simply interconnect the wires from one to another. /https://quizlet.com/135114631/midterm-answers-flash-cards 9/15 2021/6/22 Midterm Answers Flashcards | Quizlet Which of the following Midterm Answers A. Network Hardware (Layer 1) incompatibilities prevent two B. Frames (Layer 2) networks from simply being C. Addresses (Layer 3) Study directly connected (bridged)? There is only one internet, False THE Internet. What is/are the basic C. router component(s) used for interconnecting heterogeneous networks? What is the minimum number A. 1 of routers that can be used to connect 4 networks? Using multiple routers True improves reliability and avoids a single point of failure by sending traffic along an alternate path if a link fails. Internet protocol software False shows the detailed information of the physical network connection such as the IP address, MAC address, DNS server, default router, and the route a packet takes. /https://quizlet.com/135114631/midterm-answers-flash-cards 10/15 2021/6/22 Midterm Answers Flashcards | Quizlet Match the Layer with its Midterm Answers A - 1. Physical description in the TCP/IP B - 2. Network Interface (MAC) Model D - 3. Internet (IP) A. Layer 1 E - 4. Transport (TCP) B. Layer 2 C - 5. Session C. None C - 6. Presentation D. Layer 3 F - 7. Application Study E. Layer 4 F. Layer 5 A. Apple iPhone 6 Plus B. Sonos PLAY:5 Speakers C. GE Profile™ Series 30" Built-In Double Which of the following could Convection Wall Oven with Brillion Technology be a host? (look up the (look this one up!!) product if you are unsure of D. Dell Optiplex 9020 MiniTower the features) E. Samsung UHD 4K HU8550 Series Smart TV H. Titan Supercomputer in Oak Ridge National Laboratory I. Jawbone Era Bluetooth Headset Changing IPv4 to IPv6 is easy False as it only requires a change to one part of the Internet. A. abstract IP Addresses are: (select all B. uniform that apply) C. independent from MAC addresses D. unique _____ uses 32-bit addresses and IPv4 ____ uses 128-bit addresses. IPv6 An IP address is a ______ B. binary number assigned to a host and used for all communication with the host. /https://quizlet.com/135114631/midterm-answers-flash-cards 11/15 2021/6/22 On a single Answers network, two Midterm Midterm Answers Flashcards | Quizlet True Study computers cannot have the same IP address. How many primary classes 3 did the original classful IP addressing scheme divide IPv4 into? onsider the classful addressing Class Identifier cheme: Prefix the following Class C IP address Suffix written in binary for your benefit) ach part has a name. What are they? P address: 000000.10101000.00000000.00000001 00----.--------.--------.---------0000.10101000.00000000.-------------.--------.-------.00000001 Unicasting still uses Class D False addresses for delivery to a set or group of computers on the same network. Which IP addresses are A. 10.9.8.7 properly formatted in dotted D. 172.16.45.222 decimal notation? F. 255.255.255.255 /https://quizlet.com/135114631/midterm-answers-flash-cards 12/15 2021/6/22 Midterm Answers Which of the following describes the logic AND used in calculating netmasks? Your computer has been Midterm Answers Flashcards | Quizlet 1&1=1 Study 1&0=0 0&1=0 0&0=0 C. 172.16.128.64/26 configured in the following way: 172.16.128.67 mask 255.255.255.192 How would you represent the network you are on in CIDR notation? Match the following special B - 1. Directed Broadcast Address IPv4 addresses A - 2. Limited Broadcast address A. 255.255.255.255 C - 3. Loopback Address B. 192.168.0.255 D - 4. network address C. 127.0.0.1 E - 5. This computer D. 192.168.0.0 E. 0.0.0.0 A router must have multiple IP True addresses to "route" packets from one network to another. In an IPv6 address, the True interface address/suffix is always constant and of length 64bits. What are the three parts of an IPv6 address? A. Subnet C. Global Prefix D. Interface /https://quizlet.com/135114631/midterm-answers-flash-cards 13/15 2021/6/22 Midterm Answers Which of the following is an IPv6 address in proper notation A communication mechanism Midterm Answers Flashcards | Quizlet A. ABCD::4 Study B. FE80::2AA:FF:FE9A:4CA2 C. 2607:f8b0:4004:806::1013 D. FE80:0:0:0:02AA:00FF:FE9A:4CA2 Circuit Switching with a dedicated path between two endpoints with guaranteed isolation is called _________ _____________ The best example of a circuit True switched network is the analog telephone system, also known and the "Public Switched Telephone Network" or "PSTN" B. a single communication is not affected by Which of the following is a others property of the circuit C. circuits are not permanent but created when switched paradigm? needed and removed when communication ends D. Endpoint-to-endpoint communication C - 1. Small blocks of data A - 2. The basis of the Internet B - 3. Uses Frequency Division Multiplexing A - 4. Uses Statistical Multiplexing Match the term with it's B - 5. Uses Synchronous Time Division definition: Multiplexing A. Packet switching C - 6. Varied in size depending on the technology B. Curcuit Switching but commonly 1500 Bytes. C. Packets B - 7. Can communicate with only one recipient A - 8. Can communicate with one or many recipients A - 9. Lower in cost due to the ability to share a single path /https://quizlet.com/135114631/midterm-answers-flash-cards 14/15 2021/6/22 Midterm Answers Flashcards | Quizlet Complete the following Midterm Answers Local categories of Packet Switched Metropolitan Networks: Wide Study LAN: ______ Area Network MAN: _________ Area Network WAN: ______ Area Network D - 1. Organizationally Unique Identifier D - 2. First 24-bits of a MAC address Match the following terms B - 3. Network Interface Card and descriptions A - 4. Ethernet Address A. MAC address A - 5. Media Access Control address B. NIC B - 6. Network Interface Controller C. N/A A - 7. 90:B1:1C:9B:3A:CC D. OUI A - 8. 48-bit unique address C - 9. unicast C - 10. multicast A - 1. FF:FF:FF:FF:FF:FF Match the following A. Broadcast Address B. Multicast Address C. Unicast Address A - 2. 11111111.11111111.11111111.11111111.11111111.11111111 A - 3. All computers get a copy of the packet C - 4. One computer gets a copy of the packet C - 5. 00-50-56-C0-00-08 B - 6. 01:00:5E:C0:00:08 B - 7. Some computers get a copy of the packet Each frame consists of two Header parts: The _______ and the Payload _________ The largest part of a frame is False (usually) the header In a frame, the payload is True transmitted second. /https://quizlet.com/135114631/midterm-answers-flash-cards 15/15 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet Home / Other / Computer Skills / Cisco Systems Computer Networking Fundamentals Student Test Bank Study Computer Networking Fundamentals Student Test Bank Terms in this set (142) What is the first octet range for a class C IP 192 - 223 address? In computer networks a loss in signal strength attenuation measured in decibels is referred to as: Which networking device uses NAT? Router Which one of the following is an example of a 192.168.0.1 loopback address? Which communication method refers to the Half Duplex transmission of data in just one direction at a time? Which one of the following correctly describes A protocol that handles error and control messages. ICMP? Identify a feature of fibre optic cable. Immunity to electromagnetic interference TCP port 80 is associated with which application HTTP layer? Which one of the following WAN link connection Public internet connection. options best describes a cable modem connection? The cabling junction box, located on the The demarcation point customer premises, that connects the customer premises equipment to the local loop is termed? Which one of the following encryption algorithms AES is an example of asymmetric encryption? Identify the a type of VPN access Remote Access /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 1/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet Computer Networking Fundamentals Student Test Bank Upgrade to remove adverts Which ITU-T standard for synchronous Study Only ₪11.67/month V.35 communications uses a 34-pin rectangular connector? What is the maximum signaling rate of an HSSI 52 Mbps WAN link? Which one of the following WAN connection links PPP involve Call setup? Which one of the following is best for suited for ATM simultaneous use of voice and data? Which one of the following is a circuit switched ISDN communication link? Which one of the following devices is commonly CSU/DSU used as a DCE? What characteristic of UTP cabling helps avoid Twisting of pairs. crosstalk? Which one of the following IP addresses is a 224.0.0.2 multicast destination address? Which of the following type of connection Switch to Router requires a straight through UTP cable? Which type of broadcast is sent to all hosts on a Direct Broadcast network and may be forwarded by a router of the router? A router separates a computer network into: Which one of the following is the valid host range Broadcast Domains 194.30.1.1 - 254 for the network ID 194.30.1.0 with a default subnet mask? Which one of the following ranges are 1-1023 considered 'well known' port numbers? In which layer of the OSI model is routing Network performed? Which transport layer protocol provides a UDP connectionless service between hosts? What protocol is used to find the hardware ARP address of a local device? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 2/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet What is the purpose of a subnet mask in IP To determine Computer Networking Fundamentals Student Test Bank the network ID of a host from its IP address. Study addressing? What subnet mask would be used with the hosts 255.255.252.0 on the 160.40.1.0/22 network? What is one of the primary functions of a router? Which protocol is associated with layer 4 of the To forward packets towards their destination. UDP OSI model? How many bits are in an Ethernet MAC address? The Domain Name System (DNS) is primarily used 48 determine the IP address of a host given its symbolic name to: Which transport layer protocol is responsible for TCP reliable delivery of data? Which one of the following address ranges is 224.0.0.0 - 224.0.0.255 reserved for 'well known' multicast addresses? What class of IP address is 224.40.5.16? D In the OSI model which is the correct order of Data, Segment, Packet, Frame, Bitstream data encapsulation? At which layer of the OSI model does a router 3 exist? How many layers are in the OSI model? 7 Which technology is used to efficiently transport QoS Voice over IP (VoIP) traffic? Which one of the following is the main standard IEEE 802.15 for Bluetooth? Data confidentiality can be ensured by which Authentication component of VPN technology? Which IPsec security protocol should be used ESP when confidentiality is required? Which one of the following is true about an IEEE It has no access points. 802.11 Wireless LAN . Independent Basic Service Set (IBSS) topology? Which of following cable type is designed to CAT 5e carry up to 1000 Mbps signals? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 3/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet Which of the following is a characteristic of a Fault Tolerance Computer Networking Fundamentals Student Test Bank Study computer network? What is the role of QOS in a converged network? Establishes delivery priorities for different communication types in a network. Why is single mode fibre-optic cable preferred It has less dispersion of light. for longer distances over multi- mode fibre optic? Which device should be used for enabling a host Router to communicate with another host on a different network? The XYZ company has two offices, one MAN downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices? What is one of the disadvantages of a peer-to- limited security peer network compared to a server-based network? When data is being prepared for transmission encapsulation onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called? Which part of the network communication NIC driver process is responsible for sending and receiving data to and from the network media? You have just started a new business. You need to peer-to-peer network have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation? You're the network administrator for a company WAN located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing? In a physical bus topology, both ends of the signal bounce medium must be terminated in order to prevent what? What does the frame trailer consist of in an cyclic redundancy check Ethernet frame? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 4/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet What is the IEEE standard governing wireless 802.11 Bank Computer Networking Fundamentals Student Test Study networking? What is the main advantage of a point-to-point data travels on a dedicated link topology? What is the media access method used by CSMA/CD Ethernet? What type of logical topology is at work when logical bus using an Ethernet hub? When discussing Ethernet standards, what does the transmission speed, the type of transmissions, and the length or type of the XBaseY terminology refer to? cabling When using UTP cabling, what is the maximum 100 meters cable length that can be used from the NIC to a hub or switch? Which of the following is NOT a characteristic of operates in half-duplex only Unshielded Twisted Pair cabling? Which of the following is NOT an advantage of a provides redundancy and fault tolerance physical star? What are all of the connections in a network cable plant considered, including the cables and their connectors? What is a disadvantage of using fiber-optic difficult to install cabling? What is the term used that defines network structured cabling cabling in the work area and between telecommunications closets and equipment rooms? What type of wiring should be used for a high- fiber-optic cabling speed connection between two buildings? When a signal travels across network medium, it attenuation signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon? Which of the following connections might require switch to switch a crossover cable? Which of the following is a length of cable that patch cable connects a computer to either a networking device or to an RJ-45 jack? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 5/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet How many bits are available inFundamentals an IPv6 network Student Test 16 Computer Networking Bank Study for creating subnets when the prefix is /48 and the host ID is 64 bits? In what layer does the NIC operate? Network Access The last 64 bits of an IPv6 address are the the MAC address interface identifier. Where is that number derived from? The Transport layer deals with which unit of segment information? What is the decimal equivalent to the binary 193 number 11000001? Which of the following is not a function of the delivers packets efficiently Network Access layer? Which part of a computer's IP address subnet mask configuration indicates the portion of the address that specifies the network ID? You are the network administrator for a company PAT that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address? At each layer of the OSI model, data is appended encapsulation to the original message and then sent on to the next lower layer. What is this process called? At what layer do NICs operate? Data Link The Transport layer segments data into smaller MTU chunks, the size of which is determined by which of the following? What information would you find in the header of window size a Transport layer PDU? What layer is responsible for making sure that the 6 data that it sends and receives is in a format that the receiving and sending computers can understand? Which is the IEEE standard that sets the standards 802.11 for wireless networking? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 6/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet Which layer isNetworking responsible forFundamentals determining the Student Test Network Computer Bank Study best path a packet should travel across an internetwork? Which layer is responsible for establishing a Session connection between the source and destination? Which layer of the OSI model is responsible for Presentation encryption and decryption? You are working at the help desk and you get a Network layer device message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem? Besides a managed switch, what is a high-end smart switch that offers features such as multicast processing and port security called? Each interface on a router must have an IP MAC address address and what else to be able to communicate on the network? When an access control list is applied on a packet filtering router's interface, that interface is performing a specific function on the packets that it receives. What is that function called? Which is the PCI bus type that has the highest PCIe possible transfer rate? Which of the following combinations will you find MAC address/switch port number in a switching table? Which of the following is not a function that the ability to transfer it's switching table with neighboring switches would be found in a managed switch? Which of the following is the fastest switching cut-through mode? Which of the following is the switching protocol STP that is used to eliminate the possibility of switching loops? Which common e-mail protocol allows the user to IMAP access messages, yet still have them stored on the server? A MAC address is composed of two 24-bit It's the organizationally unique identifier for the manufacturer of the device. numbers. What does the first 24-bit number represent? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 7/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet A wireless router is actually composed of three Student Test a router and a switch Computer Networking Fundamentals Bank Study devices, a wireless access point and which two other devices? At which layer would you find errors that were Physical caused by EMI? Every NIC is embedded with a unique address MAC address that consists of a 12-digit hexadecimal value. What is this address called? The switch reads each frame and makes a note of where each MAC address How does a switch "learn" MAC addresses? came from. How many bits are in an IPv6 address? 128 In wireless networks, what type of media access CSMA/CA control is used? Just as a switch keeps records of MAC addresses ARP that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses? TCP establishes a connection with the destination three-way handshake device using which process? What command would you issue from the ping IPaddress command prompt to test whether your computer has connectivity to the network? What does it usually mean when the activity light It is communicating with the network. on a switch is blinking? What is one of the disadvantages of a server- additional costs based network compared to a peer-to-peer network? What is the IEEE standard that governs all forms 802.3 of Ethernet media? What is the main disadvantage of cable modem It uses a bus topology. networking? What is the maximum cable length for both 100 m category 5e and category 6 UTP cable? What is the most common topology and switched / Ethernet technology combination in use today? What is the way in which bit signals are encoding represented on the network medium? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 8/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet What was the Networking primary reason Fundamentals to create a share Bank resources, communicate with e-mail, share information Computer Student Test Study network? When a frame is received, which component switch reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? When referring to network bandwidth, what is the bits per second basic unit of measurement? Which layer has been subdivided into the Logical Data Link Link Control sublayer and the Media Access Control sublayer? Which layer is responsible for the encoding of 1 signals? Which of the following is NOT a component of an 4-byte frame check sequence Ethernet frame header? Which of the following is not a true statement It determines the path used based on the destination IP address. regarding the function of a switch? Devices on a hub have to share the available bandwidth; switches are intelligent Why is the use of a switch preferred over a hub? - they read the frame and determine where to send it; switches can operate in full-duplex mode. What directory service protocol used in Linux LDAP systems is also supported by Windows? What is a partial copy of a VM that is used to snapshot restore it to a previous state? What is the native file-sharing protocol in Linux? What method does the CPU use to divide its NFS time slicing computing cycles between more than one process? Which edition of Windows Server 2008 includes Datacenter Edition support for up to 64 processors and provides unlimited virtual instances? Which of the following virtualization products VMware Workstation provides hosted virtualization? You are testing out a new DHCP server and want host-only to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 9/10 2021/6/22 Computer Networking Fundamentals Student Test Bank Flashcards | Quizlet The 802.11i standard is the newest version of WPA2Bank Computer Networking Fundamentals Student Test Study wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as? What is a policy that defines the methods authentication involved when a user logs on to the network called? What process, available on most routers, will help NAT improve security by masking the internal IP address of the transmitting device? Which of the following is a scanner used as a tool Port to determine what possible points of entry exist that are open and vulnerable on your system? Which protocol is used to encrypt data as it IPSec travels a network? After you have set up a network for a small Telnet business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first? Before you purchase any software for a small EULA business, especially the OS, you should be aware of the number of users that are allowed to access the software. What document will give you that information? You have been asked to install a VPN remote Routing and Remote Access Service (RRAS) access solution using Windows Server.What do you need to install? Which command will display the configured IP ipconfig /all address, default gateway, and DNS servers for a Windows workstation? You are currently troubleshooting a network issue tests that the local IP stack is functioning with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish? /https://quizlet.com/42171441/computer-networking-fundamentals-student-test-bank-flash-cards 10/10 2021/6/22 Computer Networks Test - Sanfoundry Computer Networks Questions & Answers – IPv6 Addressing « Prev Next » This set of Computer Networks test focuses on “IPv6 Addressing”. 1. Dual-stack approach refers to _________ a) Implementing Ipv4 with 2 stacks b) Implementing Ipv6 with 2 stacks c) Node has both IPv4 and IPv6 support d) Implementing a MAC address with 2 stacks View Answer Answer: c Explanation: Dual-stack is one of the approaches used to support IPv6 in already existing systems. ISPs are using it as a method to transfer from IPv4 to IPv6 completely eventually due to the lower number of possible available addresses in IPv4. advertisement 2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________ a) Use dual-stack approach b) Tunneling /https://www.sanfoundry.com/computer-networks-questions-answers-test 1/7 2021/6/22 Computer Networks Test - Sanfoundry c) No solution d) Replace the system View Answer Answer: b Explanation: The IPv4 routers can form a tunnel in which at the sender’s side, the IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver. 3. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______ a) 96 to 127 b) 0 to 63 c) 80 to 95 d) 64 to 79 View Answer Answer: a Explanation: Teredo is a technique through which gives the possibility for full IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address of the IPv4 network. advertisement 4. A link local address of local addresses is used in an _______ a) Isolated router b) Isolated mask c) Isolated subnet d) Isolated net View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-test 2/7 2021/6/22 Computer Networks Test - Sanfoundry Answer: c Explanation: Isolated subnet is very huge sharing network area in this link local address of local addresses is used. A link local address can be configured on any subnet with the prefix “FE80::”. 5. In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called _________ a) Unspecified address b) Loopback address c) Compatible address d) Mapped address View Answer Answer: b Explanation: In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called loop back address. IPv6 loopback address is 0000:0000:0000:0000:0000:0000:0000:0001. IPv4 loopback address is 127.0.0.1. It’s a reserved address. 6. A few leftmost bits in each address of IPv6 address define its category is called ________ a) Prefix type b) Postfix type c) Reserved type d) Local type View Answer Answer: a Explanation: Prefix is the bits in the IP address which are placed in leftmost position. A network prefix in IPv6 is given by a CIDR format-liked number at the end of the address. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-test 3/7 2021/6/22 Computer Networks Test - Sanfoundry 7. In IPv6 addresses, addresses that start with eight 0s are called ________ a) Unicast addresses b) Multicast addresses c) Any cast addresses d) Reserved addresses View Answer Answer: d Explanation: In IPv6 address format, the starting bits are specified with eight 0s to represent reserved addresses. These reserved addresses have a certain function pre-defined like the loop-back address is used to test a network card. Reserved addresses cannot be allotted to a machine. advertisement 8. Which statement(s) about IPv6 addresses are true? a) Leading zeros are required b) Two colons (::) are used to represent successive hexadecimal fields of zeros c) Two colons (::) are used to separate fields d) A single interface cannot have multiple IPv6 addresses of different types View Answer Answer: b Explanation: In order to shorten the written length of an IPv6 address, successive fields of zeros may be replaced by double colons. In trying to shorten the address further, leading zeros may also be removed. Just as with IPv4, a single device’s interface can have more than one address; with IPv6 there are more types of addresses and the same rule applies. There can be link-local, global unicast, and multicast addresses all assigned to the same interface. /https://www.sanfoundry.com/computer-networks-questions-answers-test 4/7 2021/6/22 Computer Networks Test - Sanfoundry 9. When was IPv6 launched? a) June 2, 2012 b) June 4, 2012 c) June 5, 2012 d) June 6, 2012 View Answer Answer: d Explanation: IPv6 is the latest version of the Internet Protocol released on 6th June 2012. An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for tests, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – IPv6 » Next - Computer Networks Questions & Answers – P2P Applications advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-test 5/7 2021/6/22 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Wireless LAN « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Wireless LAN”. 1. What is the access point (AP) in a wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) all the nodes in the network View Answer Answer: a Explanation: Access point in a wireless network is any device that will allow the wireless devices to a wired network. A router is the best example of an Access Point. advertisement 2. In wireless ad-hoc network _________ a) access point is not required b) access point is must /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 1/7 2021/6/22 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry c) nodes are not required d) all nodes are access points View Answer Answer: a Explanation: An ad-hoc wireless network is a decentralized kind of a wireless network. An access point is usually a central device and it would go against the rules of the ad-hoc network to use one. Hence it is not required. 3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD View Answer Answer: b Explanation: CSMA/CA stands for Carrier-sense multiple access/collision avoidance. It is a multiple access protocol used by IEEE 802.11 standard for wireless LAN. It’s based on the principle of collision avoidance by using different algorithms to avoid collisions between channels. advertisement 4. In wireless distribution system __________ a) multiple access point are inter-connected with each other b) there is no access point c) only one access point exists d) access points are not required View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 2/7 2021/6/22 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: A Wireless Distribution System allows the connection of multiple access points together. It is used to expand a wireless network to a larger network. 5. A wireless network interface controller can work in _______ a) infrastructure mode b) ad-hoc mode c) both infrastructure mode and ad-hoc mode d) WDS mode View Answer Answer: c Explanation: A wireless network interface controller works on the physical layer and the data link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required. advertisement 6. In wireless network an extended service set is a set of ________ a) connected basic service sets b) all stations c) all access points d) connected access points View Answer Answer: a Explanation: The extended service set is a part of the IEEE 802.11 WLAN architecture and is used to expand the range of the basic service set by allowing connection of multiple basic service sets. /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 3/7 2021/6/22 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry 7. Mostly ________ is used in wireless LAN. a) time division multiplexing b) orthogonal frequency division multiplexing c) space division multiplexing d) channel division multiplexing View Answer Answer: b Explanation: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier frequencies. It is also used in digital television and audio broadcasting in addition to Wireless LANs. advertisement 8. Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks View Answer Answer: a Explanation: Collision detection is not possible in wireless LAN with no extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless LANs. 9. What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 4/7 2021/6/22 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry d) security algorithm for emails View Answer Answer: b Explanation: WEP is a security algorithm for wireless network which intended to provide data confidentiality comparable to that of traditional wired networks. It was introduced in 1997. advertisement 10. What is WPA? a) wi-fi protected access b) wired protected access c) wired process access d) wi-fi process access View Answer Answer: a Explanation: WPA or WiFi Protected Access is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 5/7 2021/6/22 IPv6 - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IPv6 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv6”. 1. The size of an IP address in IPv6 is _________ a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits View Answer Answer: b Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses. advertisement 2. The header length of an IPv6 datagram is ___________ a) 10bytes b) 25bytes c) 30bytes /https://www.sanfoundry.com/computer-networks-mcqs-ipv6 1/7 2021/6/22 IPv6 - Computer Networks Questions & Answers - Sanfoundry d) 40bytes View Answer Answer: d Explanation: IPv6 datagram has fixed header length of 40bytes, which results in faster processing of the datagram. There is one fixed header and optional headers which may or may not exist. The fixed header contains the mandatory essential information about the packet while the optional headers contain the optional “not that necessary” information. 3. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header? a) Fragmentation field b) Fast-switching c) ToS field d) Option field View Answer Answer: c Explanation: The traffic class field is used to specify the priority of the IP packet which is a similar functionality to the Type of Service field in the IPv4 header. It’s an 8-bit field and its values are not defined in the RFC 2460. advertisement 4. IPv6 does not use _________ type of address. a) broadcast b) multicast c) anycast d) unicast View Answer /https://www.sanfoundry.com/computer-networks-mcqs-ipv6 2/7 2021/6/22 IPv6 - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: There is no concept of broadcast address in IPv6. Instead, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4. 5. Which among the following features is present in IPv6 but not in IPv4? a) Fragmentation b) Header checksum c) Options d) Anycast address View Answer Answer: d Explanation: There is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4. advertisement 6. The _________ field determines the lifetime of IPv6 datagram a) Hop limit b) TTL c) Next header d) Type of traffic View Answer Answer: a Explanation: The Hop limit value is decremented by one by a router when the datagram is forwarded by the router. When the value becomes zero the datagram is discarded. The field is 8-bits wide, so an IPv6 packet can live up to 255 router hops only. /https://www.sanfoundry.com/computer-networks-mcqs-ipv6 3/7 2021/6/22 IPv6 - Computer Networks Questions & Answers - Sanfoundry 7. Dual-stack approach refers to _________ a) implementing Ipv4 with 2 stacks b) implementing Ipv6 with 2 stacks c) node has both IPv4 and IPv6 support d) implementing a MAC address with 2 stacks View Answer Answer: c Explanation: Dual-stack is one of the approaches used to support IPv6 in already existing systems. ISPs are using it as a method to transfer from IPv4 to IPv6 completely eventually due to the lower number of possible available addresses in IPv4. advertisement 8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________ a) Use dual-stack approach b) Tunneling c) No solution d) Replace the system View Answer Answer: b Explanation: The IPv4 routers can form a tunnel in which at the sender’s side, the IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver. 9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______ a) 96 to 127 /https://www.sanfoundry.com/computer-networks-mcqs-ipv6 4/7 2021/6/22 IPv6 - Computer Networks Questions & Answers - Sanfoundry b) 0 to 63 c) 80 to 95 d) 64 to 79 View Answer Answer: a Explanation: Teredo is a technique through which gives the possibility for full IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4 network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address of the IPv4 network. advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – IPv4 Addressing » Next - Computer Networks Questions & Answers – IPv6 Addressing advertisement /https://www.sanfoundry.com/computer-networks-mcqs-ipv6 5/7 2021/6/22 Computer Networks Interview Questions and Answers for Experienced - Sanfoundry Computer Networks Questions & Answers – IPv4 Addressing « Prev Next » This set of Computer Networks Interview Questions and Answers for Experienced people focuses on “IPv4 Addressing”. 1. Which of these is not applicable for IP protocol? a) Connectionless b) Offer reliable service c) Offer unreliable service d) Does not offer error reporting View Answer Answer: b Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the transport layer protocols like TCP to offer reliability. advertisement 2. Which of the following demerits does Fragmentation have? a) Complicates routers b) Open to DOS attack c) Overlapping of fragments /https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 1/7 2021/6/22 Computer Networks Interview Questions and Answers for Experienced - Sanfoundry d) All of the mentioned View Answer Answer: d Explanation: Fragmentation makes the implementation of the IP protocol complex and can also be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation won’t be required if the transport layer protocols perform wise segmentation. 3. Which field helps to check rearrangement of the fragments? a) Offset b) Flag c) TTL d) Identifier View Answer Answer: a Explanation: The Fragment Offset field specifies where the fragment fits in the original datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits). advertisement 4. In classless addressing, there are no classes but addresses are still granted in ______ a) IPs b) Blocks c) Codes d) Sizes View Answer /https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 2/7 2021/6/22 Computer Networks Interview Questions and Answers for Experienced - Sanfoundry Answer: b Explanation: In classless addressing, there are no classes but addresses are still granted in blocks. The total number of addresses in a block of classless IP addresses = 2(32 – CIDR_value). 5. In IPv4 Addresses, classful addressing is replaced with ________ a) Classless Addressing b) Classful Addressing c) Classful Advertising d) Classless Advertising View Answer Answer: a Explanation: Classful addressing is replaced with classless addressing as a large ratio of the available addresses in a class in calssful addressing is wasted. In classless addressing, one can reserve the number of IP addresses required by modifying the CIDR value and make sure that not many addresses are wasted. advertisement 6. First address in a block is used as network address that represents the ________ a) Class Network b) Entity c) Organization d) Codes View Answer Answer: c Explanation: First address in a block is used as network address that represents the organization. The network address can be found by AND’ing any address in the block by the default mask. The last address in a block represents the broadcast address. /https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 3/7 2021/6/22 Computer Networks Interview Questions and Answers for Experienced - Sanfoundry 7. In classful addressing, a large part of available addresses are ________ a) Organized b) Blocked c) Wasted d) Communicated View Answer Answer: c Explanation: In classful addressing, a large part of available addresses are wasted. Thus to solve this classful addressing is replaced with classless addressing where one can reserve the number of IP addresses required by modifying the CIDR value and make sure that not many addresses are wasted. advertisement 8. Network addresses are a very important concept of ________ a) Routing b) Mask c) IP Addressing d) Classless Addressing View Answer Answer: c Explanation: Network addresses are a very important concept of IP addressing. The first address in a block is used as network address that represents the organization. The network address can be found by AND’ing any address in the block or class by the default mask. 9. Which of this is not a class of IP address? a) Class E b) Class C /https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 4/7 2021/6/22 Computer Networks Interview Questions and Answers for Experienced - Sanfoundry c) Class D d) Class F View Answer Answer: d Explanation: Class F is not a class of IP addressing. There are only five classes of IP addresses: Class A (0.0.0.0 to 127.255.255.255), Class B (128.0.0.0 to 191.255.255.255), Class C (192.0.0.0 to 223.255.255.255), Class D (224.0.0.0 to 239.255.255.255), and Class E (240.0.0.0 to 255.255.255.255). advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for Interviews, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – IPv4 » Next - Computer Networks Questions & Answers – IPv6 advertisement /https://www.sanfoundry.com/computer-networks-interview-questions-answers-experienced 5/7 2021/6/22 IPv4 - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IPv4 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv4”. 1. Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling conventions View Answer Answer: a Explanation: The Internet Protocol is the networking protocol which establishes the internet by relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which handles the Error Reporting functionality. advertisement 2. Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset c) TOS /https://www.sanfoundry.com/computer-networks-mcqs-ipv4 1/7 2021/6/22 IPv4 - Computer Networks Questions & Answers - Sanfoundry d) Identifier View Answer Answer: c Explanation: TOS-type of service identifies the type of packets. It is not related to fragmentation but is used to request specific treatment such as high throughput, high reliability or low latency for the IP packet depending upon the type of service it belongs to. 3. The TTL field has value 10. How many routers (max) can process this datagram? a) 11 b) 5 c) 10 d) 1 View Answer Answer: c Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on the number of hops it makes (Number of routers it goes through). TTL field is decremented by one each time the datagram is processed by a router. When the value is 0, the packet is automatically destroyed. advertisement 4. If the value in protocol field is 17, the transport layer protocol used is _____________ a) TCP b) UDP c) ICMP d) IGMP View Answer /https://www.sanfoundry.com/computer-networks-mcqs-ipv4 2/7 2021/6/22 IPv4 - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry payloads of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP and IGMP are network layer protocols. 5. The data field cannot carry which of the following? a) TCP segment b) UDP segment c) ICMP messages d) SMTP messages View Answer Answer: c Explanation: Data field usually has transport layer segments, but it can also carry ICMP messages. SMTP is an application layer protocol. First it must go through the transport layer to be converted into TCP segments and then it can be inserted into IP packets. advertisement 6. What should be the flag value to indicate the last fragment? a) 0 b) 1 c) TTl value d) Protocol field value View Answer Answer: a Explanation: The Flag field in the IP header is used to control and identify the fragments. It contains three bits: reserved, don’t fragment and more fragments. If the more fragments bit is 0, it means that the fragment is the last fragment. /https://www.sanfoundry.com/computer-networks-mcqs-ipv4 3/7 2021/6/22 IPv4 - Computer Networks Questions & Answers - Sanfoundry 7. Which of these is not applicable for IP protocol? a) is connectionless b) offer reliable service c) offer unreliable service d) does not offer error reporting View Answer Answer: b Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the transport layer protocols like TCP to offer reliability. advertisement 8. Which of the following demerits does Fragmentation have? a) complicates routers b) open to DOS attack c) overlapping of fragments. d) all of the mentioned View Answer Answer: d Explanation: Fragmentation makes the implementation of the IP protocol complex and can also be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation won’t be required if the transport layer protocols perform wise segmentation. 9. Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl /https://www.sanfoundry.com/computer-networks-mcqs-ipv4 4/7 2021/6/22 IPv4 - Computer Networks Questions & Answers - Sanfoundry d) identifer View Answer Answer: a Explanation: The Fragment Offset field specifies where the fragment fits in the original datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits). advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – World Wide Web » Next - Computer Networks Questions & Answers – IPv4 Addressing advertisement /https://www.sanfoundry.com/computer-networks-mcqs-ipv4 5/7 2021/6/22 World Wide Web - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – World Wide Web « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “World Wide Web”. 1. A piece of icon or image on a web page associated with another webpage is called ______ a) url b) hyperlink c) plugin d) extension View Answer Answer: b Explanation: URLs are locators for resources present on the World Wide Web. A plugin provides extra functionality to the webpage. An extension provides modification allowance for the core functionality of a webpage. Hyperlink is piece of icon or image on a web page associated with another webpage. advertisement 2. Dynamic web page ______ a) is same every time whenever it displays /https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 1/7 2021/6/22 World Wide Web - Computer Networks Questions & Answers - Sanfoundry b) generates on demand by a program or a request from browser c) both is same every time whenever it displays and generates on demand by a program or a request from browser d) is different always in a predefined order View Answer Answer: b Explanation: A dynamic web page provides different content every time the user opens it based on some events like new additions or time of the day. Languages such as JavaScript are used to respond to client-side events while languages such as PHP as used to respond to server-side events. 3. What is a web browser? a) a program that can display a web page b) a program used to view html documents c) it enables user to access the resources of internet d) all of the mentioned View Answer Answer: d Explanation: A web browser is an application program that is used to access the World Wide Web resources, applications and websites. Some examples of web browsers are Google Chrome, Internet Explorer and Safari. advertisement 4. Common gateway interface is used to _______ a) generate executable files from web content by web server b) generate web pages c) stream videos /https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 2/7 2021/6/22 World Wide Web - Computer Networks Questions & Answers - Sanfoundry d) download media files View Answer Answer: a Explanation: CGI is an interface through servers can run execute console-based executable files on a web server that generates dynamic web pages. A CGI script executes only when a request is made. The script then generates HTML. 5. URL stands for ________ a) unique reference label b) uniform reference label c) uniform resource locator d) unique resource locator View Answer Answer: c Explanation: The Uniform Resource Locator is a locator for the resource to be located by HTTP on the World Wide Web. The URL is derived from the Uniform Resource Identifier. advertisement 6. A web cookie is a small piece of data that is _______ a) sent from a website and stored in user’s web browser while a user is browsing a website b) sent from user and stored in the server while a user is browsing a website c) sent from root server to all servers d) sent from the root server to other root servers View Answer Answer: a Explanation: A web cookie is a small piece of data sent from a website and stored in user’s web /https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 3/7 2021/6/22 World Wide Web - Computer Networks Questions & Answers - Sanfoundry browser while a user is browsing the website and is used to remember stateful information about the user’s operations on the website. This can help the website provide a better browsing experience to the user. 7. Which one of the following is not used to generate dynamic web pages? a) PHP b) ASP.NET c) JSP d) CSS View Answer Answer: d Explanation: CSS alone cannot be used to generate dynamic web pages as it does not provide many event handling functions. It can be used along with JavaScript to generate dynamic web pages which are visually compelling. advertisement 8. An alternative to JavaScript on windows platform is _______ a) VBScript b) ASP.NET c) JSP d) PHP View Answer Answer: a Explanation: VBScript is a general-purpose, lightweight and active scripting language which can be used on Microsoft Visual Basic. It was first released in 1996. /https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 4/7 2021/6/22 World Wide Web - Computer Networks Questions & Answers - Sanfoundry 9. What is document object model (DOM)? a) convention for representing and interacting with objects in html documents b) application programming interface c) hierarchy of objects in ASP.NET d) scripting language View Answer Answer: a Explanation: DOM is a hierarchical model i.e. a tree used to represent an HTML or XML document. Every node of the tree an object that represents a part of the document. advertisement 10. AJAX stands for _______ a) asynchronous javascript and xml b) advanced JSP and xml c) asynchronous JSP and xml d) advanced javascript and xml View Answer Answer: a Explanation: AJAX is a group of technologies that works on the client-side to create asynchronous web applications. It is used to modify only a part of a webpage and not the whole webpage whenever some event occurs. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-world-wide-web 5/7 2021/6/22 Frame Relay - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Frame Relay « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Frame Relay”. 1. Frame Relay is cheaper than other _____ a) LANs b) WANs c) MANs d) Multipoint Networks View Answer Answer: b Explanation: Frame relay is a standardized wide area network technology and is popularly used because it is cheaper than leased line WANs. It is also very simple to configure user equipment in a Frame Relay network. advertisement 2. Frame Relay networks offer an option called _______ a) Voice Over For Relay b) Voice Over Fine Relay /https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 1/7 2021/6/22 Frame Relay - Computer Networks Questions & Answers - Sanfoundry c) Voice On Frame Relay d) Voice Over Frame Relay View Answer Answer: d Explanation: Frame Relay networks offer an option called Voice over Frame Relay, which transmits voice and voice-band data over a Frame Relay network. It has two sub-protocols FRF11 and FRF12. 3. There are ________ total features of Frame Relay. a) Five b) Seven c) Nine d) Ten View Answer Answer: c Explanation: Frame relay is a wide area network technology used to transmit information over a network in the form of frames using relays. The frames are of variable size. It is cheaper than other WANs and it’s simple to configure user equipment in the network. advertisement 4. Frame Relay does not provide flow or error control, they must be provided by the ______ a) Lower Level Protocol b) Highest Level Protocol c) Upper Level Protocol d) Lowest Level Protocol View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 2/7 2021/6/22 Frame Relay - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: Frame relay only provides error detection using CRC. If errors are detected, the upper-layer protocols, such as TCP are expected to provide error correction features. Network layer provides flow control. 5. Frame Relay deploys physical layer carriers such as _______ a) ADMs b) UPSR c) BLSR d) SONET View Answer Answer: d Explanation: Frame Relays uses carriers such as SONET (for fiber-optic connections) to physically transmit data frames over a Frame Relay network. SONET is cheaper and provides better network reliability than other carriers. advertisement 6. Frame relay provides error detection at the ______ a) physical layer b) data link layer c) network layer d) transport layer View Answer Answer: b Explanation: Frame relay provides error detection using CRC in the data link layer. The transport layer then provides the error correction features if an error is detected. /https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 3/7 2021/6/22 Frame Relay - Computer Networks Questions & Answers - Sanfoundry 7. Virtual circuit identifier in frame relay is called _______ a) data link connection identifier b) frame relay identifier c) cell relay identifier d) circuit connection identifier View Answer Answer: a Explanation: The Data Link Connection Identifier is 10-bit virtual circuit identifier. It is used to assign frames to the specified Permanent Virtual Circuits or Switched Virtual Circuits. advertisement 8. Frame relay has only _______ a) physical layer b) data link layer c) physical layer and data link layer d) network layer and data link layer View Answer Answer: c Explanation: The physical layer is guided by the protocols recognized by the ANSI and provides conversion to frames. The data link layer supports the simplified core functions specified by the OSI model like error detection. 9. In frame relay networks, extended address is used ________ a) to increase the range of data link connection identifiers b) for error detection c) for encryption /https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 4/7 2021/6/22 Frame Relay - Computer Networks Questions & Answers - Sanfoundry d) for error recovery View Answer Answer: a Explanation: Extended address is indicated by the last bit of every address byte in the DLCI. It specifies whether the byte is the last in the addressing field. It is used to increase the range of data link connection identifiers. advertisement 10. What is FRAD in frame relay network? a) FRAD assembles and disassembles the frames coming from other protocols b) FRAD is used for modulation and demodulation c) FRAD is used for error detection d) FRAD is used for error recovery View Answer Answer: a Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It converts packets into frames that can be transmitted over Frame Relay Networks. It operates at the physical layer. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest /https://www.sanfoundry.com/computer-networks-questions-answers-frame-relay-2 5/7 2021/6/22 ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – ATM & Frame Relay « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ATM & Frame Relay”. 1. ATM and frame relay are ________ a) virtual circuit networks b) datagram networks c) virtual private networks d) virtual public networks View Answer Answer: a Explanation: ATM and frame relay are transmission modes in which information is transferred through electric circuit layer as packets. ATM has fixed packet size and frame relay has variable packet size. 2. ATM uses _______________ a) asynchronous frequency division multiplexing b) asynchronous time division multiplexing c) asynchronous space division multiplexing d) asynchronous amplitude division multiplexing View Answer Answer: b Explanation: ATM uses a constant data stream consisting of transmission cells to transmit information in a fixed division of time. The packet size remains fixed. 3. ATM standard defines _______ layers. a) 2 b) 3 c) 4 d) 5 View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 1/5 2021/6/22 ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: The three layers are physical layer, ATM layer and application adoption layer. The physical layer corresponds to the physical layer, ATM layer corresponds to the data link layer and the AAL layer corresponds to the network layer of the OSI model. 4. ATM can be used for ________ a) local area network b) wide area network c) campus area network d) networks covering any range View Answer Answer: d Explanation: ATM is a connection oriented network for cell relay which can be implemented for networks covering any area. It uses Time Division Multiplexing and supports voice, video and data communications. 5. An ATM cell has the payload field of __________ a) 32 bytes b) 48 bytes c) 64 bytes d) 128 bytes View Answer Answer: b Explanation: An ATM field contains a header and a payload. The header is of 5 bytes and the payload is of 48 bytes. The size of the header remains fixed. 6. Frame relay has error detection at the ______ a) physical layer b) data link layer c) network layer d) transport layer View Answer Answer: b Explanation: The Frame Relay header contains an 8-bit Header Error Control field (HEC). The HEC field contains an 8-bit CRC which is used for error control. 7. Virtual circuit identifier in frame relay is called ______ a) data link connection identifier b) frame relay identifier c) cell relay identifier /https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 2/5 2021/6/22 ATM & Frame Relay - Computer Networks Questions & Answers - Sanfoundry d) circuit connection identifier View Answer Answer: a Explanation: The Data Link Connection Identifier is 10-bit virtual circuit identifier. It is used to assign frames to the specified Permanent Virtual Circuits or Switched Virtual Circuits. 8. Frame relay has _______ a) only physical layer b) only data link layer c) only network layer d) both physical and data link layer View Answer Answer: d Explanation: The physical layer is guided by the protocols recognized by the ANSI. The data link layer supports the simplified core functions specified by the OSI model. 9. In frame relay networks, extended address is used _______ a) to increase the range of data link connection identifiers b) for error detection c) for encryption d) for error recovery View Answer Answer: a Explanation: Extended address is indicated by the last bit of every address byte in the DLCI. It specifies whether the byte is the last in the addressing field. It is used to increase the range of data link connection identifiers. 10. What is FRAD in frame relay network? a) FRAD assembles and disassembles the frames coming from other protocols b) FRAD is used for modulation and demodulation c) FRAD is used for error detection d) FRAD is used for error recovery View Answer Answer: a Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It converts packets into frames that can be transmitted over Frame Relay Networks. It operates at the physical layer. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-atm-frame-relay 3/5 2021/6/22 Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Virtual Circuit « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Virtual Circuit”. 1. Which of the following is not a characteristic of Virtual Circuit Network? a) There are setup and teardown phases in addition to the data transfer phase b) Resources can be allocated during setup phase or on demand c) All packets follow the same path established during the connection d) Virtual circuit network is implemented in application layer View Answer Answer: d Explanation: Virtual circuit network is normally implemented in data link layer. It is a combination of circuit-switched network and datagram network which are implemented in the physical layer and network layer respectively. advertisement 2. The address that is unique in the scope of the network or internationally if the network is part of an international network is called as ______ a) Global address /https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 1/7 2021/6/22 Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry b) Network address c) Physical address d) IP address View Answer Answer: a Explanation: Global address is a network address that is unique internationally and is used as a common address by all the users of the network. It is used to create a virtual circuit identifier. 3. The Identifier that is used for data transfer in virtual circuit network is called _______ a) Global address b) Virtual circuit identifier c) Network identifier d) IP identifier View Answer Answer: b Explanation: A virtual circuit identifier is a type of numeric identifying address that is used to distinguish between different virtual circuits in a circuit-switched network. It is used for data transfer and has a switch scope. advertisement 4. Which of the following is not a phase of virtual circuit network? a) Setup phase b) Data transfer phase c) Termination phase d) Teardown phase View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 2/7 2021/6/22 Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: There are three phases in a virtual circuit network: setup, data transfer and teardown phase. There is no termination phase in it. 5. Steps required in setup process are ___________ a) Setup request and acknowledgement b) Setup request and setup response c) Setup request and setup termination d) Setup and termination steps View Answer Answer: a Explanation: Setup request (sent by a source) and acknowledgement (sent by the destination) are the steps in the setup process. Both the ends’ switches make table entries during the setup process. advertisement 6. During teardown phase, the source, after sending all the frames to destination, sends a _____ to notify termination. a) teardown response b) teardown request c) termination request d) termination response View Answer Answer: b Explanation: The source, after sending all the frames to destination sends teardown request to which, destination sends teardown response. The switches then delete the corresponding table entries. /https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 3/7 2021/6/22 Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry 7. Delay of the resource allocated during setup phase during data transfer is ________ a) constant b) increases for each packet c) same for each packet d) different for each packet View Answer Answer: c Explanation: If a resource is allocated during setup phase, delay is same for each packet as there is only one-time delay during the setup phase and no delay during the data transfer phase. advertisement 8. Delay of the resource allocated on demand during data transfer is ________ a) constant b) increases for each packet c) same for each packet d) different for each packet View Answer Answer: d Explanation: If a resource is to be allocated on demand during the data transfer phase, the delay for each packet would be different depending upon the resource requirement of the packets. 9. In virtual circuit network, the number of delay times for setup and teardown respectively are _______ a) 1 and 1 b) 1 and 2 /https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 4/7 2021/6/22 Virtual Circuit - Computer Networks Questions & Answers - Sanfoundry c) 2 and 1 d) 2 and 2 View Answer Answer: a Explanation: There is one-time delay for both setup and teardown phase. The one-time delay in setup phase is for resource allocation and the one-time delay in teardown phase is for the de-allocation of the resources. advertisement 10. In data transfer phase, how many columns does the table contain? a) 1 b) 2 c) 3 d) 4 View Answer Answer: d Explanation: The switch maintains a table for each Virtual Circuit Network. In the data transfer phase, it maintains 2 columns each for incoming data and outgoing data. The columns are in the following order: Source port, Source VCI, Destination port, Destination VCI. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-virtual-circuit 5/7 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Congestion Control « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Congestion Control”. 1. Two broad categories of congestion control are a) Open-loop and Closed-loop b) Open-control and Closed-control c) Active control and Passive control d) Active loop and Passive loop View Answer Answer: a Explanation: Open loop congestion control techniques are used to prevent congestion before it even happens by enforcing certain policies. Closed loop congestion control techniques are used to treat congestion after it has happened. advertisement 2. In open-loop control, policies are applied to __________ a) Remove after congestion occurs b) Remove after sometime /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 1/8 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry c) Prevent before congestion occurs d) Prevent before sending packets View Answer Answer: c Explanation: Open loop congestion control techniques are used to prevent congestion before it even happens by enforcing certain policies. Retransmission policy, window policy and acknowledgement policy are some policies that might be enforced. 3. Retransmission of packets must not be done when _______ a) Packet is lost b) Packet is corrupted c) Packet is needed d) Packet is error-free View Answer Answer: d Explanation: Retransmission refers to the sender having to resend the packet to the receiver. It needs to be done only when some anomaly occurs with the packet like when the packet is lost or corrupted. advertisement 4. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ a) Packet which are not lost b) Only those packets which are lost or corrupted c) Packet from starting /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 2/8 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry d) All the packets View Answer Answer: b Explanation: In Selective Repeat, the sender side uses a searching algorithm to find the packets which need to be retransmitted based on the negative acknowledgements received and then resends only those packets thus saving bandwidth. 5. Discarding policy is mainly done by _______ a) Sender b) Receiver c) Router d) Switch View Answer Answer: c Explanation: The discarding policy adopted by the routers mainly states that the routers discard sensitive or corrupted packets that it receives, thus controlling the integrity of the packet flow. The discarding policy is adopted as an open loop congestion control technique. advertisement 6. Closed-Loop control mechanisms try to _________ a) Remove after congestion occurs b) Remove after sometime c) Prevent before congestion occurs d) Prevent before sending packets View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 3/8 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: In closed loop congestion control, methods are implemented to remove congestion after it occurs. Some of the methods used are backpressure and choke packet. 7. The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______ a) Admission policy b) Backpressure c) Forward signaling d) Backward signaling View Answer Answer: b Explanation: In this closed loop congestion control technique, the congested node propagates in the opposite direction of the data flow to inform the predecessor node to reduce the flow of packets. This is why this technique is called a node-to-node congestion control technique. advertisement 8. Backpressure technique can be applied only to _______ a) Congestion networks b) Closed circuit networks c) Open circuit networks d) Virtual circuit networks View Answer Answer: d Explanation: In Virtual circuit networks, each node knows the upstream node from which a flow data is coming. So, it makes possible for the congested node to track the source of the congestion and then inform that node to reduce the flow to remove congestion. /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 4/8 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry 9. The packet sent by a node to the source to inform it of congestion is called _______ a) Explicit b) Discard c) Choke d) Backpressure View Answer Answer: c Explanation: Choke packet is sent by a node to the source to inform it of congestion. Two choke packet techniques can be used for the operation called hop-by-hop choke packet and source choke packet. advertisement 10. In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold. a) exponentially b) additively c) multiplicatively d) suddenly View Answer Answer: a Explanation: In slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold. When it reaches the threshold, it stops increasing and continues sending packets through the threshold window thus preventing congestion. 11. In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected. a) exponentially /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 5/8 2021/6/22 Congestion Control - Computer Networks Questions & Answers - Sanfoundry b) additively c) multiplicatively d) suddenly View Answer Answer: b Explanation: In the congestion avoidance algorithm, the size of the congestion window increases additively until congestion is detected. Once congestion is detected, the size of congestion window is decreased once and then the packets are transmitted to achieve congestion avoidance. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – AH and ESP Protocols » Next - Computer Networks Questions & Answers – Virtual Circuit advertisement Recommended Posts: 1. 2. 3. 4. Wireless & Mobile Communications MCQ (Multiple Choice Questions) Cryptography and Network Security MCQ (Multiple Choice Questions) Terms of Service Visual Basic MCQ (Multiple Choice Questions) /https://www.sanfoundry.com/computer-networks-questions-answers-congestion-control 6/8 2021/6/22 Computer Networks Questions and Answers for Experienced - Sanfoundry Computer Networks Questions & Answers – AH and ESP Protocols « Prev Next » This set of Computer Networks Questions and Answers for Experienced people focuses on “AH and ESP Protocols”. 1. Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? a) AH transport mode b) ESP transport mode c) ESP tunnel mode d) AH tunnel mode View Answer Answer: b Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN. ESP tunnel mode is comparatively more secure and should be used to assure the security of the data within different LANs. advertisement 2. Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? /https://www.sanfoundry.com/computer-networks-questions-answers-experienced 1/8 2021/6/22 Computer Networks Questions and Answers for Experienced - Sanfoundry a) Kerberos V5 b) SHA c) MD5 d) Both SHA and MD5 View Answer Answer: d Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect. 3. Which two types of IPsec can be used to secure communications between two LANs? a) AH tunnel mode b) ESP tunnel mode c) Both AH tunnel mode and ESP tunnel mode d) ESP transport mode View Answer Answer: c Explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as secure as it only encrypts the data portion and not the whole packet. advertisement 4. ______ provides authentication at the IP level. a) AH b) ESP c) PGP /https://www.sanfoundry.com/computer-networks-questions-answers-experienced 2/8 2021/6/22 Computer Networks Questions and Answers for Experienced - Sanfoundry d) SSL View Answer Answer: a Explanation: The Authentication Header (AH) authenticates the origin of data, and guarantees the integrity of the information that’s being sent using IPSec. It also provides anti-reply security. 5. IPsec defines two protocols: _______ and ________ a) AH; SSL b) PGP; ESP c) AH; ESP d) PGP; SSL View Answer Answer: c Explanation: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. advertisement 6. IP Security operates in which layer of the OSI model? a) Network b) Transport c) Application d) Physical View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-experienced 3/8 2021/6/22 Computer Networks Questions and Answers for Experienced - Sanfoundry Answer: a Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer. 7. ESP does not provide ________ a) source authentication b) data integrity c) privacy d) error control View Answer Answer: d Explanation: The ESP provides data confidentiality, integrity and authentication. It provides confidentiality through encryption. ESP can operate in two modes, transport mode and tunnel mode. advertisement 8. In computer security _______ means that computer system assets can be modified only by authorized parities. a) confidentiality b) integrity c) availability d) authenticity View Answer Answer: b Explanation: Integrity means that computer system assets can be modified only by authorized parities. Confidentiality means that the assets can only be accessed by authorized parties. /https://www.sanfoundry.com/computer-networks-questions-answers-experienced 4/8 2021/6/22 Computer Networks Questions and Answers for Experienced - Sanfoundry Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed. 9. In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities. a) confidentiality b) integrity c) availability d) authenticity View Answer Answer: a Explanation: Confidentiality means that the assets can only be accessed by authorized parties. Integrity means that computer system assets can be modified only by authorized parities. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed. advertisement 10. Which of the following organizations is primarily concerned with military encryption systems? a) NSA b) NIST c) IEEE d) ITU View Answer Answer: a Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs evaluates, and implements encryption systems for the military and government agencies with high security needs. /https://www.sanfoundry.com/computer-networks-questions-answers-experienced 5/8 2021/6/22 UDP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – UDP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “UDP”. 1. Which of the following is false with respect to UDP? a) Connection-oriented b) Unreliable c) Transport layer protocol d) Low overhead View Answer Answer: a Explanation: UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols. advertisement 2. Return value of the UDP port “Chargen” is _______ a) String of characters b) String of integers c) Array of characters with integers /https://www.sanfoundry.com/computer-networks-questions-answers-udp 1/7 2021/6/22 UDP - Computer Networks Questions & Answers - Sanfoundry d) Array of zero’s and one’s View Answer Answer: a Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing a random number of characters every time it receives a datagram from the connecting host. The number of characters is between 0 and 512. 3. Beyond IP, UDP provides additional services such as _______ a) Routing and switching b) Sending and receiving of packets c) Multiplexing and demultiplexing d) Demultiplexing and error checking View Answer Answer: d Explanation: De-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using UDP. Error checking is done through checksum in UDP. advertisement 4. What is the main advantage of UDP? a) More overload b) Reliable c) Low overhead d) Fast View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-udp 2/7 2021/6/22 UDP - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: As UDP does not provide assurance of delivery of packet, reliability and other services, the overhead taken to provide these services is reduced in UDP’s operation. Thus, UDP provides low overhead, and higher speed. 5. Port number used by Network Time Protocol (NTP) with UDP is ________ a) 161 b) 123 c) 162 d) 124 View Answer Answer: b Explanation: The Network Time Protocol is a clock synchronization network protocol implemented by using UDP port number 123 to send and receive time stamps. advertisement 6. What is the header size of a UDP packet? a) 8 bytes b) 8 bits c) 16 bytes d) 124 bytes View Answer Answer: a Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte fields: Source port address, Destination port address, Length of packet, and checksum. /https://www.sanfoundry.com/computer-networks-questions-answers-udp 3/7 2021/6/22 UDP - Computer Networks Questions & Answers - Sanfoundry 7. The port number is “ephemeral port number”, if the source host is _______ a) NTP b) Echo c) Server d) Client View Answer Answer: d Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows Operating System. Ephemeral port numbers are short-lived port numbers which can be used for clients in a UDP system where there are temporary clients all the time. advertisement 8. “Total length” field in UDP packet header is the length of _________ a) Only UDP header b) Only data c) Only checksum d) UDP header plus data View Answer Answer: d Explanation: Total length is the 16 bit field which contains the length of UDP header and the data. The maximum value of the Total length field and the maximum size of a UDP datagram is 65,535 bytes (8 byte header + 65,527 bytes of data). 9. Which is the correct expression for the length of UDP datagram? a) UDP length = IP length – IP header’s length b) UDP length = UDP length – UDP header’s length c) UDP length = IP length + IP header’s length /https://www.sanfoundry.com/computer-networks-questions-answers-udp 4/7 2021/6/22 UDP - Computer Networks Questions & Answers - Sanfoundry d) UDP length = UDP length + UDP header’s length View Answer Answer: a Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP header that defines the total length of the IP packet. There is another field in the IP header that defines the length of the header. So if we subtract the length of the IP header that is encapsulated in the IP packet, we get the length of UDP datagram. advertisement 10. The ______ field is used to detect errors over the entire user datagram. a) udp header b) checksum c) source port d) destination port View Answer Answer: b Explanation: Checksum field is used to detect errors over the entire user datagram. Though it is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as UDP doesn’t have to ensure the delivery of the packet. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-udp 5/7 2021/6/22 Computer Networks Interview Questions and Answers for Freshers - Sanfoundry Computer Networks Questions & Answers – TCP-2 « Prev Next » This set of Computer Networks Interview Questions and Answers for freshers focuses on “TCP – 2”. 1. The receiver of the data controls the amount of data that are to be sent by the sender is referred to as ___________ a) Flow control b) Error control c) Congestion control d) Error detection View Answer Answer: a Explanation: Flow control is done to prevent the receiver from being overflowed with data. It is done using various open-loop (prevention) methods and closed-loop (recovery) methods. advertisement 2. Size of TCP segment header ranges between ___________ a) 16 and 32 bytes b) 16 and 32 bits /https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 1/8 2021/6/22 Computer Networks Interview Questions and Answers for Freshers - Sanfoundry c) 20 and 60 bytes d) 20 and 60 bits View Answer Answer: c Explanation: The size of the header can be 20 bytes at a minimum if there are no options and can go up to 60 bytes at maximum with 40 bytes in the options field. The header contains all the control information required to ensure ordered, error-free and reliable delivery of the segment. 3. Connection establishment in TCP is done by which mechanism? a) Flow control b) Three-Way Handshaking c) Forwarding d) Synchronization View Answer Answer: b Explanation: A three-way handshake allows both, the server and the client to choose their Initial Sequence Number and inform about it to the other party. This won’t be possible using the two-way handshake mechanism. advertisement 4. The server program tells its TCP that it is ready to accept a connection. This process is called ___________ a) Active open b) Active close c) Passive close /https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 2/8 2021/6/22 Computer Networks Interview Questions and Answers for Freshers - Sanfoundry d) Passive open View Answer Answer: d Explanation: This is the first step in the Three-Way Handshaking process and is started by the server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares) it with the Server requesting a connection. The Server acknowledges the clients ISN, and then picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers ISN. 5. A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ___________ a) Active open b) Active close c) Passive close d) Passive open View Answer Answer: a Explanation: This is the second step in the Three-Way Handshaking process and is done by the client once it finds the open server and picks an ISN. The Server acknowledges the clients request, and then picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers ISN. advertisement 6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________ a) Mutual open b) Mutual Close /https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 3/8 2021/6/22 Computer Networks Interview Questions and Answers for Freshers - Sanfoundry c) Simultaneous open d) Simultaneous close View Answer Answer: c Explanation: In simultaneous open situation, two nodes send an SYN signal to each other and start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each other and a connection is established between them. This doesn’t happen usually, because both sides have to know which port on the other side to send to. 7. A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation? a) SYNC flooding attack b) Active attack c) Passive attack d) Denial-of-service attack View Answer Answer: a Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow of SYNC segments sent to the server, the victims are not able to request for a connection to the server, thus resulting in Denial of Service. advertisement 8. SYNC flooding attack belongs to a type of security attack known as ___________ a) SYNC flooding attack b) Active attack c) Passive attack /https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 4/8 2021/6/22 Computer Networks Interview Questions and Answers for Freshers - Sanfoundry d) Denial-of-service attack View Answer Answer: d Explanation: During SYNC flooding the system collapses and denies service to every request, making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding and UDP flooding. 9. The sizes of source and destination port address in TCP header are ___________ respectively. a) 16-bits and 32-bits b) 16-bits and 16-bits c) 32-bits and 16-bits d) 32-bits and 32-bits View Answer Answer: b Explanation: All port addresses are of 16 bits and they specify the type of service being used by the network entity. For example, port 21 is used for FTP connections and port 25 is used for ICMP connections. advertisement 10. What allows TCP to detect lost segments and in turn recover from that loss? a) Sequence number b) Acknowledgment number c) Checksum d) Both Sequence & Acknowledgment number View Answer /https://www.sanfoundry.com/computer-networks-interview-questions-answers-freshers 5/8 2021/6/22 TCP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – TCP-1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “TCP-1”. 1. Which of the following is false with respect to TCP? a) Connection-oriented b) Process-to-process c) Transport layer protocol d) Unreliable View Answer Answer: d Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network. advertisement 2. In TCP, sending and receiving data is done as _______ a) Stream of bytes b) Sequence of characters c) Lines of data /https://www.sanfoundry.com/computer-networks-questions-answers-tcp 1/7 2021/6/22 TCP - Computer Networks Questions & Answers - Sanfoundry d) Packets View Answer Answer: a Explanation: TCP provides stream oriented delivery between hosts communicating via an IP network and there are no message boundaries. TCP can concatenate data from a number of send () commands into one stream of data and still transmit it reliably. 3. TCP process may not write and read data at the same speed. So we need __________ for storage. a) Packets b) Buffers c) Segments d) Stacks View Answer Answer: b Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed incoming packets in case the sender is sending packets faster than the processing rate of the received packets. advertisement 4. TCP groups a number of bytes together into a packet called _______ a) Packet b) Buffer c) Segment d) Stack View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-tcp 2/7 2021/6/22 TCP - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: A segment may be collection of data from many send () statements. TCP transmits each segment as a stream of bytes. 5. Communication offered by TCP is ________ a) Full-duplex b) Half-duplex c) Semi-duplex d) Byte by byte View Answer Answer: a Explanation: Data can flow both the directions at the same time during a TCP communication hence, it is full-duplex. This is the reason why TCP is used in systems that require full-duplex operation such as e-mail systems. advertisement 6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. a) Packet b) Buffer c) Segment d) Acknowledgment View Answer Answer: d Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data. The sender actively checks for acknowledgement from the receiver and once a specific time period has passed, it retransmits the data. /https://www.sanfoundry.com/computer-networks-questions-answers-tcp 3/7 2021/6/22 TCP - Computer Networks Questions & Answers - Sanfoundry 7. In segment header, sequence number and acknowledgement number fields refer to _______ a) Byte number b) Buffer number c) Segment number d) Acknowledgment View Answer Answer: a Explanation: As TCP has to ensure ordered delivery of packets, sequence number and acknowledgement number are used to identify the byte number of the packet in the stream of bytes being transmitted. advertisement 8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment? a) 10000 b) 10001 c) 12001 d) 11001 View Answer Answer: b Explanation: The sequence number given to first byte of a segment, with respect to its order among the previous segments, is the sequence number of that segment. 9. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________ a) Fixed number b) Random sequence of 0’s and 1’s /https://www.sanfoundry.com/computer-networks-questions-answers-tcp 4/7 2021/6/22 TCP - Computer Networks Questions & Answers - Sanfoundry c) One d) Sequence of zero’s and one’s View Answer Answer: d Explanation: One might expect the sequence number of the first byte in the stream to be 0, or 1. But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the connection handshake. advertisement 10. The value of acknowledgement field in a segment defines _______ a) sequence number of the byte received previously b) total number of bytes to receive c) sequence number of the next byte to be received d) sequence of zeros and ones View Answer Answer: c Explanation: The acknowledgement field in a segment defines the sequence number of the byte which is to be received next i.e. sequence number of byte that the sender should transmit next. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-tcp 5/7 2021/6/22 Telnet Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Telnet – 2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet – 2”. 1. Telnet protocol is used to establish a connection to __________ a) TCP port number 21 b) TCP port number 22 c) TCP port number 23 d) TCP port number 25 View Answer Answer: c Explanation: TCP port 21 is used for FTP, TCP port 22 is used for SSH and TCP port 25 is used for SMTP. Telnet provides access to a command line interface on a remote computer using the TCP port number 23. 2. Which one of the following is not true? a) telnet defines a network virtual terminal (NVT) standard b) client programs interact with NVT c) server translates NVT operations d) client can transfer files using to remote server using NVT View Answer Answer: d Explanation: The client can use the NVT only to interact with the programs already present on the remote server, not to transfer files to it. To transfer files, an FTP connection has to be used. 3. All telnet operations are sent as ________ a) 4 bits b) 8 bits c) 16 bits d) 32 bits View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-telnet 1/4 2021/6/22 Telnet Questions & Answers - Sanfoundry Answer: b Explanation: Telnet provides a bi-directional, 8-bit byte oriented communications facility through which operations are sent as 8-bit bytes for the server to interpret. 4. AbsoluteTelnet is a telnet client for _______ Operating system. a) windows b) linux c) mac d) ubuntu View Answer Answer: a Explanation: AbsoluteTelnet was originally released in 1999. It was developed by Brian Pence of Celestial Software. 5. The decimal code of Interpret as Command (IAC) character is _______ a) 252 b) 253 c) 254 d) 255 View Answer Answer: d Explanation: If we want that a character be interpreted by the client instead of server, we use the IAC character. If IAC is followed by any other code than IAC, the client interprets it as a character. 6. Which of the following is true for character mode operation of telnet implementation? a) each character typed is sent by the client to the server b) each character typed is discarded by the server c) each character typed is aggregated into a word and then sent to the server d) each character type is aggregated into a line and then sent to the server View Answer Answer: a Explanation: In character mode, each character that the user is typing is immediately sent to the server which then interprets it only after the complete operation command is received. 7. In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed? a) default mode c) character mode c) server mode /https://www.sanfoundry.com/computer-networks-questions-answers-telnet 2/4 2021/6/22 Telnet Questions & Answers - Sanfoundry d) command mode View Answer Answer: a Explanation: In the default mode, the client does not send each character typed by the user to the server, thus saving the amount of packet transmissions required for executing each operation. But the server has to remain idle until the client sends the completed line wasting a lot of time. 8. Which one of the following is not correct? a) telnet is a general purpose client-server program b) telnet lets user access an application on a remote computer c) telnet can also be used for file transfer d) telnet can be used for remote login View Answer Answer: c Explanation: File Transfer Protocol is used for file transfer. Telnet provides access to the command-line interface on a remote host. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Telnet – 1 » Next - Computer Networks Questions & Answers – TCP-1 Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Microcontroller MCQ (Multiple Choice Questions) Programming Questions and Answers Software Engineering MCQ (Multiple Choice Questions) Java Programming Examples Network Theory MCQ (Multiple Choice Questions) Java Programming Examples on Utility Classes C# Programming Examples on Data Structures Java MCQ (Multiple Choice Questions) MySQL MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers JavaScript MCQ (Multiple Choice Questions) /https://www.sanfoundry.com/computer-networks-questions-answers-telnet 3/4 2021/6/22 Telnet - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Telnet – 1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet – 1”. 1. The application layer protocol used by a Telnet application is ________ a) Telnet b) FTP c) HTTP d) SMTP View Answer Answer: a Explanation: Telnet is an application layer protocol that provides access to the command-line interface on a remote host. Telnet stands for teletype network. 2. Which amongst the following statements is correct for “character at a time” mode? a) Character processing is done on the local system under the control of the remote system b) Most text typed is immediately sent to the remote host for processing c) All text is echoed locally, only completed lines are sent to the remote host d) All text is processed locally, and only confirmed lines are sent to the remote host View Answer Answer: b Explanation: In character at a time mode, the typed text is sent immediately to the remote host while the user is typing. Another mode used in Telnet is “Old line by line” mode in which only completed lines are sent to the remote host. 3. _______ allows you to connect and login to a remote computer a) Telnet b) FTP c) HTTP d) SMTP View Answer /https://www.sanfoundry.com/computer-networks-mcqs-telnet 1/4 2021/6/22 Telnet - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Telnet provides access to the command-line interface on a remote computer. One can login to the computer from the command-line interface. 4. What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com? a) telnet//www.sanfoundry.com b) telnet:www.sanfoundry.com c) telnet://www.sanfoundry.com d) telnet www.sanfoundry.com View Answer Answer: c Explanation: telnet://” is the header to be used to initiate a Telnet connection to a web server. One can browse the website using telnet if they are authorized to. 5. Telnet is used for _______ a) Television on net b) Network of Telephones c) Remote Login d) Teleshopping site View Answer Answer: c Explanation: Telnet is an application layer protocol that provides access to the command line interface of a remote computer that can be used to perform remote login. 6. Which one of the following is not correct? a) telnet is a general purpose client-server program b) telnet lets user access an application on a remote computer c) telnet can also be used for file transfer d) telnet can be used for remote login View Answer Answer: c Explanation: File Transfer Protocol is used for file transfer. Telnet provides access to the command-line interface on a remote host. 7. Which operating mode of telnet is full duplex? a) default mode b) server mode c) line mode /https://www.sanfoundry.com/computer-networks-mcqs-telnet 2/4 2021/6/22 Telnet - Computer Networks Questions & Answers - Sanfoundry d) character mode View Answer Answer: c Explanation: In line mode, terminal character processing is done on the client side but editing is enabled on the server side. Line mode reduces the number of packets and is useful for long delay networks. 8. If we want that a character be interpreted by the client instead of server _________ a) interpret as command (IAC) escape character has to be used b) control functions has to be disabled c) it is not possible d) cli character has to be used View Answer Answer: a Explanation: The client must look at each byte that arrives and look for IAC escape character. If IAC is found, the client moves on to look for any other code or IAC. If the next byte is IAC – a single byte is presented by the client to the terminal. If IAC is followed by any other code than IAC, the client interprets this as a command. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – SNMP » Next - Computer Networks Questions & Answers – Telnet – 2 Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. C Programming Examples on File Handling MySQL MCQ (Multiple Choice Questions) Linux Command Tutorials with Examples and Explanations C# Programming Examples on Data Structures C MCQ (Multiple Choice Questions) Oracle Database MCQ (Multiple Choice Questions) C Programming Examples on Strings Java MCQ (Multiple Choice Questions) Unix MCQ (Multiple Choice Questions) C# Programming Examples on Networking /https://www.sanfoundry.com/computer-networks-mcqs-telnet 3/4 2021/6/22 SNMP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – SNMP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SNMP”. 1. The application-level protocol in which a few manager stations control a set of agents is called ______ a) HTML b) TCP c) SNMP d) SNMP/IP View Answer Answer: c Explanation: SNMP stands for Simple Network Management Protocol. It is an application-level protocol in which a few manager stations control a set of agents. It is used under the TCP/IP protocol suite and is used for managing devices on the internet. advertisement 2. Full duplex mode increases the capacity of each domain by ________ a) 10 to 20 mbps b) 20 to 30 mbps /https://www.sanfoundry.com/computer-networks-questions-answers-snmp 1/8 2021/6/22 SNMP - Computer Networks Questions & Answers - Sanfoundry c) 30 to 40 mbps d) 40 to 50 mbps View Answer Answer: a Explanation: In full duplex mode, both endpoints share a single channel bandwidth to achieve two-way transmission. This results in complete utilization of the band capacity increasing the capacity by 10 to 20 mbps than half-duplex mode. 3. Configuration management can be divided into which two subsystems? a) Reconfiguration and documentation b) Management and configuration c) Documentation and dialing up d) Configuration and dialing up View Answer Answer: a Explanation: The best current practices report is created by a management group to ensure the most effective configuration management. The group also makes a MIB (Management Information Base) module to help with the configuration management. advertisement 4. To use a Simple Network Management System, we need _______ a) Servers b) IP c) Protocols d) Rules View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-snmp 2/8 2021/6/22 SNMP - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: Rules are a collection of expression containing parameters to observe the attributes of the user’s device, and then execute some actions. It specifies the parameters for the managed objects inside the application and performs operations that would support the expression. The input of a rule may be many expressions or even a single expression that end in an output of single object invoking some action. 5. The main difference between SNMPv3 and SNMPv2 is _______ a) Management b) Integration c) Classification d) Enhanced security View Answer Answer: d Explanation: SNMPv3 has introduced new cryptographic security, through which confidentiality is provided by encrypting packets and blocking intruders. It also ensures that the message is coming from a reliable source. advertisement 6. In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________ a) Fault Management b) Secured Management c) Active Management d) Security Management View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-snmp 3/8 2021/6/22 SNMP - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: Security management is also responsible to provide confidentiality, authentication and encryption in addition to controlling access to network. Without security management, the network and its traffic would be vulnerable to be exploited by attackers. 7. BER stands for ________ a) Basic Encoding Rules b) Basic Encoding Resolver c) Basic Encoding Rotator d) Basic Encoding Router View Answer Answer: a Explanation: The Basic Encoding Rules are a set of rules that specify the guidelines to encode the SNMP messages in binary form. Each SNMP message is encoded into 3 parts namely data, length and type of message. advertisement 8. Control of the users’ access to network resources through charges is the main responsibility of ________ a) Reactive Fault Management b) Reconfigured Fault Management c) Accounting Management d) Security Management View Answer Answer: c Explanation: The accounting management keeps track of the users and their access rights to the network and controls the user’s access by communicating with the security management. /https://www.sanfoundry.com/computer-networks-questions-answers-snmp 4/8 2021/6/22 SNMP - Computer Networks Questions & Answers - Sanfoundry The accounting management takes support of the Management Information Block to perform its operations. 9. SNMP is the framework for managing devices in an internet using the ______ a) TCP/IP protocol b) UDP c) SMTP d) None View Answer Answer: a Explanation: SNMP is a management protocol in which a few manager stations control a set of agents using the TCP/IP protocol suite. SNMP stands for Simple Network Management Protocol. advertisement 10. Structure of Management Information (SMI), is the guideline of ________ a) HTTP b) SNMP c) URL d) MIB View Answer Answer: b Explanation: SMI was developed by the Storage Networking Industry Association (SNIA) and it defines a standard that can be manipulated by SNMP. Basically, it defines the standard format and hierarchy of management data which is used by the SNMP. It does not describe how the objects are to be managed. /https://www.sanfoundry.com/computer-networks-questions-answers-snmp 5/8 2021/6/22 Computer Networks Questions and Answers for Freshers - Sanfoundry Computer Networks Questions & Answers – SMI « Prev Next » This set of Computer Networks Questions and Answers for Freshers focuses on “SMI”. 1. Storage management comprises of _______________ a) SAN Management b) Data protection c) Disk operation d) All of the mentioned View Answer Answer: d Explanation: SAN management, data protection and disk operation are the main components of the Storage Management Initiative Specification. SMI-S was developed by the Storage Networking Industry Association. advertisement 2. Which of the following is not a storage device? a) Switch b) RAID Arrays c) Tape drives /https://www.sanfoundry.com/computer-networks-questions-answers-freshers 1/8 2021/6/22 Computer Networks Questions and Answers for Freshers - Sanfoundry d) Hub View Answer Answer: d Explanation: Switches, RAID arrays and tape drives are the main storage devices in SMI-S, while a Hub is simple networking device that cannot be used as storage. 3. Which protocols are used for Storage management? a) SNMP b) LDAP c) POP3 d) MIB View Answer Answer: a Explanation: Simple Network Management Protocol is used for storage management. Lightweight Directory Access Protocol is used to access or locate information about directories and other resources on a network. Post Office Protocol 3 is used for e-mailing on the internet. Management Information Base is a part of SNMP and contains hierarchically organized information. advertisement 4. Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors. a) Proprietary management interfaces b) Multiple applications to manage storage in the data center c) No single view d) Single view View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-freshers 2/8 2021/6/22 Computer Networks Questions and Answers for Freshers - Sanfoundry Answer: d Explanation: A single view is not possible with diverse vendors present. Proprietary management interfaces, multiple applications management and no single view are the main difficulties incurred by a SAN administrator in such a situation. 5. How do Storage administrators ensure secure access to storage devices? a) By using Zoning b) By putting a physical lock on the storage device c) By keeping devices shutdown when not in use d) By keeping devices when used View Answer Answer: a Explanation: Zoning is a method in SAN that can be used by a storage administrator to specify who can see what in the SAN. Zoning might complicate the scaling process if the size of the SAN increases. advertisement 6. Effective Storage management does not include __________ a) security b) backups c) reporting d) connection View Answer Answer: d Explanation: Connection is the responsibility of the connection manager. Storage management includes management of all necessities such as security, backups and reporting facilities. /https://www.sanfoundry.com/computer-networks-questions-answers-freshers 3/8 2021/6/22 Computer Networks Questions and Answers for Freshers - Sanfoundry 7. Among the following, identify which task is not involved in Storage Capacity management? a) Identifying storage systems are approaching full capacity b) Monitoring trends for each resource c) Tracking Total capacity, total used, total available d) Preventing unauthorized access to the storage View Answer Answer: d Explanation: Prevention of unauthorized access to storage is the task of Security management. Identifying when the storage is approaching full capacity, monitoring trends, reporting and tracking capacity are the tasks of Storage Capacity management. advertisement 8. Effect of open standards like SMI(s) is _______________ a) standardization drives software interoperability and interchange ability b) breaks the old-style dependence on proprietary methods, trade secrets, and single providers c) builds a strong foundation on which others can quickly build and innovate d) all of the mentioned View Answer Answer: d Explanation: Open standards like SMI-S inculcate a general ideal through which the normal designers are able to easily implement the standard into their software and its scalability. Since it is open-source, nothing is hidden from its users and they can implement it as they like or require to. As a whole lot of time is spent to build it as strong and scalable, it provides an efficient foundation to the designers to build and innovate on. 9. Task of Distributed Management Task Force is not ________ a) to promote interoperability among the management solution providers /https://www.sanfoundry.com/computer-networks-questions-answers-freshers 4/8 2021/6/22 Computer Networks Questions and Answers for Freshers - Sanfoundry b to act as an interface between the various budding technologies and provide solution to manage various environments c) to track the operation of the different management solution providers d) to manage the facility by itself if one of the management solution providers fail View Answer Answer: d Explanation: The Distributed Management Task Force is used just to simplify the overall management of the network. It cannot manage a network facility by itself in case one of the management solution providers fails. It provides an interface for promoting interoperability among management solution providers. advertisement 10. SMI-S Standard uses which of the following? a) Java RMI b) CIM-XML/HTTP c) CORBA d) .NET View Answer Answer: b Explanation: The Distributed Management Task Force maintains a Common Information Model (CIM) to represent a common set of network objects and their relationships. CIMXML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S uses CIMXML/HTTP. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-freshers 5/8 2021/6/22 Computer Networks Interview Questions and Answers - Sanfoundry Computer Networks Questions & Answers – Virtual Private Networks « Prev Next » This set of Computer Networks Interview Questions and Answers focuses on “Virtual Private Networks”. 1. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection. a) VNP b) VPN c) VSN d) VSPN View Answer Answer: b Explanation: VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites that are unavailable in certain regions. 2. When were VPNs introduced into the commercial world? a) Early 80’s b) Late 80’s c) Early 90’s d) Late 90’s View Answer Answer: d Explanation: VPNs were first introduced in the year 1996. Then as the internet started to get popularized, the need for connection security increased. VPN was a great solution to this, and that’s when VPNs were implemented in the commercial world. 3. What protocol is NOT used in the operation of a VPN? a) PPTP b) IPsec c) YMUM d) L2TP View Answer /https://www.sanfoundry.com/computer-networks-interview-questions-answers 1/5 2021/6/22 Computer Networks Interview Questions and Answers - Sanfoundry Answer: c Explanation: PPTP is a tunneling protocol which was initially used for the creation of VPNs. IPSec is used in encrypting the traffic flowing in the VPN. L2TP is used to tunnel all the L2 traffic on the VPN. 4. Which of the following statements is NOT true concerning VPNs? a) Financially rewarding compared to leased lines b) Allows remote workers to access corporate data c) Allows LAN-to-LAN connectivity over public networks d) Is the backbone of the Internet View Answer Answer: d Explanation: VPNs are not the backbone of the Internet as they are just a method to create private intranets on the internet. They are used for enhancing the connection security for the users. 5. Traffic in a VPN is NOT ____________ a) Invisible from public networks b) Logically separated from other traffic c) Accessible from unauthorized public networks d) Restricted to a single protocol in IPsec View Answer Answer: c Explanation: Traffic in a VPN is not accessible from any unauthorized public networks because it is secured with the masking IP address. This provides the benefit of access to blocked resources to the users. 6. VPNs are financially speaking __________ a) Always more expensive than leased lines b) Always cheaper than leased lines c) Usually cheaper than leased lines d) Usually more expensive than leased lines View Answer Answer: c Explanation: The services of a VPN are cheaper for moderate to large scale institutional networks than the services of leased lines. Though for a small scale network, it does not prove to be as beneficial as the costs are not reduced to a great degree as compared to leased lines. 7. Which layer 3 protocols can be transmitted over an L2TP VPN? a) Only IP b) Only IPX /https://www.sanfoundry.com/computer-networks-interview-questions-answers 2/5 2021/6/22 Computer Networks Interview Questions and Answers - Sanfoundry c) Only ICMP d) IP and IPX View Answer Answer: d Explanation: L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel all the L2 traffic on an IP network and is able to transmit network layer’s IP and IPX protocol data. 8. ESP (Encapsulating Security Protocol) is defined in which of the following standards? a) IPsec b) PPTP c) PPP d) L2TP View Answer Answer: a Explanation: ESP is a security component of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and Internet Key Exchange. 9. L2F was developed by which company? a) Microsoft b) Cisco c) Blizzard Entertainment d) IETF View Answer Answer: b Explanation: L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel PPP traffic, helping create VPNs over the internet. 10. Which layer of the OSI reference model does PPTP work at? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4 View Answer Answer: b Explanation: PPTP stands for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol that was primitively used to create VPNs. It is no longer used for VPNs due to the lack of security it provides. /https://www.sanfoundry.com/computer-networks-interview-questions-answers 3/5 2021/6/22 Computer Networks Interview Questions and Answers - Sanfoundry 11. Which layer of the OSI reference model does IPsec work at? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4 View Answer Answer: c Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. It operates in the network layer. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for Interviews, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – IPSecurity » Next - Computer Networks Questions & Answers – SMI Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Railway Engineering MCQ (Multiple Choice Questions) Traffic Engineering MCQ (Multiple Choice Questions) C Programming Examples on File Handling Energy & Environment Management MCQ (Multiple Choice Questions) C# Programming Examples on Data Structures Computer Organization and Architecture MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers Computer Graphics MCQ (Multiple Choice Questions) Java Programming Examples on Networking Wireless & Mobile Communications MCQ (Multiple Choice Questions) Master of Computer Applications Questions and Answers SAN MCQ (Multiple Choice Questions) Cloud Computing MCQ (Multiple Choice Questions) Cyber Security MCQ (Multiple Choice Questions) IOT MCQ (Multiple Choice Questions) Computer Science Questions and Answers Cryptography and Network Security MCQ (Multiple Choice Questions) Computer Fundamentals MCQ (Multiple Choice Questions) Neural Networks MCQ (Multiple Choice Questions) Computer Networks Questions & Answers – Reference Models – 2 /https://www.sanfoundry.com/computer-networks-interview-questions-answers 4/5 2021/6/22 IPSecurity - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IPSecurity « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPSecurity”. 1. IPSec is designed to provide security at the _________ a) Transport layer b) Network layer c) Application layer d) Session layer View Answer Answer: b Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer. 2. In tunnel mode, IPSec protects the ______ a) Entire IP packet b) IP header c) IP payload d) IP trailer View Answer Answer: a Explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints. 3. Which component is included in IP security? a) Authentication Header (AH) b) Encapsulating Security Payload (ESP) c) Internet key Exchange (IKE) d) All of the mentioned Ad closed by View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 1/4 2021/6/22 IPSecurity - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can access the message. 4. WPA2 is used for security in _______ a) Ethernet b) Bluetooth c) Wi-Fi d) Email View Answer Answer: c Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. 5. An attempt to make a computer resource unavailable to its intended users is called ______ a) Denial-of-service attack b) Virus attack c) Worms attack d) Botnet process View Answer Answer: a Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding and connection flooding. 6. Extensible authentication protocol is authentication framework frequently used in ______ a) Wired personal area network b) Wireless networks c) Wired local area network d) Wired metropolitan area network View Answer Answer: b Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to connect a network node to the Internet. It designed through extending the methods used by the Point-to-Point Protocol for authentication. /https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 2/4 2021/6/22 IPSecurity - Computer Networks Questions & Answers - Sanfoundry 7. Pretty good privacy (PGP) is used in ______ a) Browser security b) Email security c) FTP security d) WiFi security View Answer Answer: b Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes sure that the message cannot be stolen by other unauthorized users. 8. PGP encrypts data by using a block cipher called ______ a) International data encryption algorithm b) Private data encryption algorithm c) Internet data encryption algorithm d) Local data encryption algorithm View Answer Answer: a Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP used the cipher method BassOmatic. 9. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________ a) DNS lookup b) DNS hijacking c) DNS spoofing d) DNS authorizing View Answer Answer: c Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-ipsecurity 3/4 2021/6/22 DHCP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – DHCP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DHCP”. 1. DHCP (dynamic host configuration protocol) provides __________ to the client. a) IP address b) MAC address c) Url d) None of the mentioned View Answer Answer: a Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually. advertisement 2. DHCP is used for ________ a) IPv6 b) IPv4 c) Both IPv6 and IPv4 /https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 1/7 2021/6/22 DHCP - Computer Networks Questions & Answers - Sanfoundry d) None of the mentioned View Answer Answer: c Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts know about the change dynamically, and hosts update their info themselves. 3. The DHCP server _________ a) maintains a database of available IP addresses b) maintains the information about client configuration parameters c) grants a IP address when receives a request from a client d) all of the mentioned View Answer Answer: d Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP address being offered, network mask offered, the amount of time that the client can use and keep it, the ip address of the DHCP server making this offer. advertisement 4. IP assigned for a client by DHCP server is a) for a limited period b) for an unlimited period c) not time dependent d) none of the mentioned View Answer Answer: a Explanation: The IP address offered to a client is only for a limited period of time. There is /https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 2/7 2021/6/22 DHCP - Computer Networks Questions & Answers - Sanfoundry actually a certain amount of time that the client can use and keep this IP address. 5. DHCP uses UDP port _________ for sending data to the server. a) 66 b) 67 c) 68 d) 69 View Answer Answer: b Explanation: 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port number 68 is used by the client. advertisement 6. The DHCP server can provide the _______ of the IP addresses. a) dynamic allocation b) automatic allocation c) static allocation d) all of the mentioned View Answer Answer: d Explanation: When a host acquires multiple offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been accepted. 7. DHCP client and servers on the same subnet communicate via _________ a) UDP broadcast b) UDP unicast /https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 3/7 2021/6/22 DHCP - Computer Networks Questions & Answers - Sanfoundry c) TCP broadcast d) TCP unicast View Answer Answer: a Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its operations. advertisement 8. After obtaining the IP address, to prevent the IP conflict the client may use _________ a) internet relay chat b) broader gateway protocol c) address resolution protocol d) none of the mentioned View Answer Answer: c Explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses to MAC addresses that are present in the local network. 9. What is DHCP snooping? a) techniques applied to ensure the security of an existing DHCP infrastructure b) encryption of the DHCP server requests c) algorithm for DHCP d) none of the mentioned View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 4/7 2021/6/22 DHCP - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2. This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients. advertisement 10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. a) MAC address b) IP address c) Both MAC address and IP address d) None of the mentioned View Answer Answer: c Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered by unauthorized servers. This features allows only specific mac addresses and IP addresses to access the network. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – SSH » Next - Computer Networks Questions & Answers – IPSecurity /https://www.sanfoundry.com/computer-networks-questions-answers-dhcp 5/7 2021/6/22 SSH - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – SSH « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SSH”. 1. Secure shell (SSH) network protocol is used for __________ a) secure data communication b) remote command-line login c) remote command execution d) all of the mentioned View Answer Answer: d Explanation: SSH provides high encryption and security features while communicating through a network. It is a cryptographic network protocol. advertisement 2. SSH can be used in only _____________ a) unix-like operating systems b) windows c) both unix-like and windows systems /https://www.sanfoundry.com/computer-networks-questions-answers-ssh 1/6 2021/6/22 SSH - Computer Networks Questions & Answers - Sanfoundry d) none of the mentioned View Answer Answer: c Explanation: SSH isn’t confined to a certain network or operating system. It can be implemented over different networks and on different operating systems. 3. SSH uses ___________ to authenticate the remote computer. a) public-key cryptography b) private-key cryptography c) any of public-key or private-key d) both public-key & private-key View Answer Answer: a Explanation: Public encryption key is slower but more flexible. Every cryptographic security system requires a private key for private access and a public key for location. advertisement 4. Which standard TCP port is assigned for contacting SSH servers? a) port 21 b) port 22 c) port 23 d) port 24 View Answer Answer: b Explanation: Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and also port forwarding. /https://www.sanfoundry.com/computer-networks-questions-answers-ssh 2/6 2021/6/22 SSH - Computer Networks Questions & Answers - Sanfoundry 5. Which one of the following protocol can be used for login to a shell on a remote host except SSH? a) telnet b) rlogin c) both telnet and rlogin d) none of the mentioned View Answer Answer: c Explanation: SSH is more secured then telnet and rlogin. advertisement 6. Which one of the following is a file transfer protocol using SSH? a) SCP b) SFTP c) Rsync d) All of the mentioned View Answer Answer: d Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file transfer protocols which are used by SSH. 7. SSH-2 does not contain ______________ a) transport layer b) user authentication layer c) physical layer d) connection layer View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ssh 3/6 2021/6/22 SSH - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: SSH2 is a more secure, portable and efficient version of SSH that includes SFTP, which is functionally similar to FTP, but is SSH2 encrypted. 8. Which one of the following feature was present in SSH protocol, version 1? a) password changing b) periodic replacement of session keys c) support for public-key certificates d) none of the mentioned View Answer Answer: d Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide strong authentication and guarantee confidentiality. 9. SCP protocol is evolved from __________ over SSH. a) RCP protocol b) DHCP protocol c) MGCP protocol d) GCP protocol View Answer Answer: a Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion control algorithm for fast user response times. 10. Which one of the following authentication method is used by SSH? a) public-key b) host based c) password d) all of the mentioned View Answer Answer: d Explanation: SSH used public key authentication, Password authentication, Host based authentication, keyboard authentication and authentication of servers. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-ssh 4/6 2021/6/22 DNS - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – DNS « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DNS”. 1. The entire hostname has a maximum of ___________ a) 255 characters b) 127 characters c) 63 characters d) 31 characters View Answer Answer: a Explanation: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a network. 2. A DNS client is called _________ a) DNS updater b) DNS resolver c) DNS handler d) none of the mentioned View Answer Answer: b Explanation: DNS client also known as DNS resolver also known as DNS lookup helps to resolve DNS requests using an external DNS server. 3. Servers handle requests for other domains _______ a) directly b) by contacting remote DNS server c) it is not possible d) none of the mentioned View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-dns 1/5 2021/6/22 DNS - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: Whenever a request is received at server from other domains, it handles this situation by contacting remote DNS server. 4. DNS database contains _______ a) name server records b) hostname-to-address records c) hostname aliases d) all of the mentioned View Answer Answer: d Explanation: Domain Name system not only deals with mapping IP addresses with the hostname but also deals with exchange of information in the server. 5. If a server has no clue about where to find the address for a hostname then _______ a) server asks to the root server b) server asks to its adjcent server c) request is not processed d) none of the mentioned View Answer Answer: a Explanation: Root name servers are actually very important and critical as they are the first step in translating human readable hostnames into IP addresses for carrying out communication. 6. Which one of the following allows client to update their DNS entry as their IP address change? a) dynamic DNS b) mail transfer agent c) authoritative name server d) none of the mentioned View Answer Answer: a Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a name server in the DNS. This does not require manual editing. 7. Wildcard domain names start with label _______ a) @ b) * c) & /https://www.sanfoundry.com/computer-networks-questions-answers-dns 2/5 2021/6/22 DNS - Computer Networks Questions & Answers - Sanfoundry d) # View Answer Answer: b Explanation: A wildcard DNS record matches requests to a non existent domain name. This wildcard DNS record is specified by using asterisk “*” as the starting of a domain name. 8. The right to use a domain name is delegated by domain name registers which are accredited by _______ a) internet architecture board b) internet society c) internet research task force d) internet corporation for assigned names and numbers View Answer Answer: d Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP address space allocation, protocol identifier assignment, generic and country code Top Level domain name system management (gTLD and ccTLD). 9. The domain name system is maintained by _______ a) distributed database system b) a single server c) a single computer d) none of the mentioned View Answer Answer: a Explanation: A domain name system is maintained by a distributed database system. It is a collection of multiple, logically interrelated databases distributed over a computer network. 10. Which one of the following is not true? a) multiple hostnames may correspond to a single IP address b) a single hostname may correspond to many IP addresses c) a single hostname may correspond to a single IP address d) none of the mentioned View Answer Answer: c Explanation: It need not be that a single hostname will correspond to a ip address. For example facebook.com and fb.com both correspond to same ip address. So there can be multiple hostnames for a single ip address. /https://www.sanfoundry.com/computer-networks-questions-answers-dns 3/5 2021/6/22 SMTP Interview Questions & Answers - Sanfoundry Computer Networks Questions & Answers – SMTP – 2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SMTP – 2”. 1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer. a) TCP b) UDP c) DCCP d) SCTP View Answer Answer: a Explanation: Since TCP is a reliable protocol, it’s more efficient to use TCP protocol for e-mail transfer. TCP also provides more security than other transport layer protocols. advertisement 2. SMTP connections secured by SSL are known as _____________ a) SMTPS b) SSMTP /https://www.sanfoundry.com/computer-networks-questions-answers-smtp 1/6 2021/6/22 SMTP Interview Questions & Answers - Sanfoundry c) SNMP d) STARTTLS View Answer Answer: a Explanation: SSMTP is a simple mail transfer program to send mail from a local PC to a mail host. SNMP is a network management protocol. STARTTLS connections are secured by TLS. 3. SMTP uses which of the following TCP port? a) 22 b) 23 c) 21 d) 25 View Answer Answer: d Explanation: Port 21 is used for FTP control connection, port 22 is used by SSH, and port 23 is used by TELNET. advertisement 4. Which one of the following protocol is used to receive mail messages? a) SMTP b) Post Office Protocol (POP) c) Internet Message Access Protocol (IMAP) d) FTP View Answer Answer: d Explanation: FTP is used to share files. SMTP, POP and IMAP are the protocols used to send /https://www.sanfoundry.com/computer-networks-questions-answers-smtp 2/6 2021/6/22 SMTP Interview Questions & Answers - Sanfoundry and receive mails on the internet. 5. What is on-demand mail relay (ODMR)? a) protocol for SMTP security b) an SMTP extension c) protocol for web pages d) protocol for faster mail transfer View Answer Answer: b Explanation: ODMR is an extension to SMTP, in which mails are relayed to the receivers after they are authenticated. It allows only the authorized receivers to receive the mail. advertisement 6. An email client needs to know the _________ of its initial SMTP server. a) IP address b) MAC address c) URL d) Name View Answer Answer: a Explanation: The client needs to know the IP of its initial SMTP server as it has to send the mail first to that server and then the server forwards the mail ahead on behalf of the user. 7. An SMTP session may not include _______ a) zero SMTP transaction b) one SMTP transaction c) more than one SMTP transaction /https://www.sanfoundry.com/computer-networks-questions-answers-smtp 3/6 2021/6/22 SMTP Interview Questions & Answers - Sanfoundry d) one HTTP transaction View Answer Answer: d Explanation: An SMTP session can only include SMTP transactions regardless the number. Any other protocol’s transaction is not included in an SMTP session. 8. SMTP defines _______ a) message transport b) message encryption c) message content d) message password View Answer Answer: a Explanation: As the name suggests, Simple Mail Transfer Protocol is only responsible for “how” the message is transferred i.e. Transport of the message. Other protocols such as TCP are used to provide other services like encryption for the messages. 9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it? a) open mail relay b) wide mail reception c) open mail reception d) short mail reception View Answer Answer: a Explanation: Anyone can send an e-mail through an Open Mail Relay server so it acted like a free relay for email agents to forward their mails through. Open Mail Relays are now unpopular because they can be used by attackers to perform man-in-the-middle attacks. 10. SMTP is not used to deliver messages to ______ a) user’s terminal b) user’s mailbox c) user’s word processor d) user’s email client View Answer Answer: c Explanation: SMTP can only be used to send messages to user’s terminal, email client or mailbox. A stand-alone word processor cannot be connected to a network, so it won’t be possible to deliver messages to it. /https://www.sanfoundry.com/computer-networks-questions-answers-smtp 4/6 2021/6/22 SMTP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – SMTP – 1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SMTP – 1”. 1. When the mail server sends mail to other mail servers it becomes ____________ a) SMTP server b) SMTP client c) Peer d) Master View Answer Answer: b Explanation: SMTP clients are the entities that send mails to other mail servers. The SMTP servers cannot send independent mails to other SMTP servers as an SMTP server. There are no masters or peers in SMTP as it is based on the client-server architecture. 2. If you have to send multimedia data over SMTP it has to be encoded into _______ a) Binary b) Signal c) ASCII d) Hash View Answer Answer: c Explanation: Since only 7-bit ASCII codes are transmitted through SMTP, it is mandatory to convert binary multimedia data to 7-bit ASCII before it is sent using SMTP. 3. Expansion of SMTP is ________ b) Simple Message Transfer Protocol c) Simple Mail Transmission Protocol d) Simple Message Transmission Protocol View Answer /https://www.sanfoundry.com/computer-networks-mcqs-smtp 1/5 2021/6/22 SMTP - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: SMTP or Simple Mail Transfer Protocol is an application layer protocol used to transport e-mails over the Internet. Only 7-bit ASCII codes can be sent using SMTP. 4. In SMTP, the command to write receiver’s mail address is written with the command _______ a) SEND TO b) RCPT TO c) MAIL TO d) RCVR TO View Answer Answer: b Explanation: RCPT TO command is followed by the recipient’s mail address to specify where or to whom the mail is going to through the internet. If there is more than one receiver, the command is repeated for each address continually. 5. The underlying Transport layer protocol used by SMTP is ________ a) TCP b) UDP c) Either TCP or UDP d) IMAP View Answer Answer: a Explanation: TCP is a reliable protocol, and Reliability is a mandatory requirement in e-mail transmission using SMTP. 6. Choose the statement which is wrong incase of SMTP? a) It requires message to be in 7bit ASCII format b) It is a pull protocol c) It transfers files from one mail server to another mail server d) SMTP is responsible for the transmission of the mail through the internet View Answer Answer: b Explanation: In SMTP, the sending mail server pushes the mail to receiving mail server hence it is push protocol. In a pull protocol such as HTTP, the receiver pulls the resource from the sending server. 7. Internet mail places each object in _________ a) Separate messages for each object b) One message c) Varies with number of objects /https://www.sanfoundry.com/computer-networks-mcqs-smtp 2/5 2021/6/22 SMTP - Computer Networks Questions & Answers - Sanfoundry d) Multiple messages for each object View Answer Answer: b Explanation: It places all objects into one message as it wouldn’t be efficient enough if there are different messages for each object. The objects include the text and all the multimedia to be sent. 8. Typically the TCP port used by SMTP is _________ a) 25 b) 35 c) 50 d) 15 View Answer Answer: a Explanation: The ports 15, 35 and 50 are all UDP ports and SMTP only uses TCP port 25 for reliability. 9. A session may include ________ a) Zero or more SMTP transactions b) Exactly one SMTP transactions c) Always more than one SMTP transactions d) Number of SMTP transactions cant be determined View Answer Answer: a Explanation: An SMTP session consists of SMTP transactions only even if no transactions have been performed. But no transactions in the session might mean that the session is inactive or is just initiated. 10. Which of the following is an example of user agents for e-mail? a) Microsoft Outlook b) Facebook c) Google d) Tumblr View Answer Answer: a Explanation: Among the options, only Microsoft Outlook is an e-mail agent. Google is a search engine and Facebook, and Tumblr are social networking platforms. Gmail and Alpine are some other examples of e-mail agent. /https://www.sanfoundry.com/computer-networks-mcqs-smtp 3/5 2021/6/22 SMTP - Computer Networks Questions & Answers - Sanfoundry 11. When the sender and the receiver of an email are on different systems, we need only _________ a) One MTA b) Two UAs c) Two UAs and one MTA d) Two UAs and two MTAs View Answer Answer: d Explanation: The sender’s User Agent (UA) submits the message to a Message Transfer Agent (MTA). Then the MTA sends the message to another MTA i.e. a mail relay. Then the receiver receives the message from the mail relay whenever it is available. 12. User agent does not support this ___________ a) Composing messages b) Reading messages c) Replying messages d) Routing messages View Answer Answer: d Explanation: The user agent is basically a software program that allows the user to send, and receive e-mail messages. Routing of the message is done by the Message Transfer Agent. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – FTP » Next - Computer Networks Questions & Answers – SMTP – 2 Recommended Posts: 1. 2. 3. 4. 5. 6. 7. Wireless & Mobile Communications MCQ (Multiple Choice Questions) C# Programming Examples on Interfaces Java Programming Examples on Set & String Problems & Algorithms IOT MCQ (Multiple Choice Questions) C# Programming Examples on Data Structures Computer Organization and Architecture MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers /https://www.sanfoundry.com/computer-networks-mcqs-smtp 4/5 2021/6/22 Internet Security - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Security In The Internet « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Security In The Internet”. 1. IPSec is designed to provide security at the _________ a) transport layer b) network layer c) application layer d) session layer View Answer Answer: b Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer. advertisement 2. In tunnel mode, IPSec protects the ______ a) Entire IP packet b) IP header /https://www.sanfoundry.com/computer-networks-questions-answers-security 1/8 2021/6/22 Internet Security - Computer Networks Questions & Answers - Sanfoundry c) IP payload d) IP trailer View Answer Answer: a Explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints. 3. Network layer firewall works as a ________ a) frame filter b) packet filter c) signal filter d) content filter View Answer Answer: b Explanation: As you know, firewalls are available as hardware appliances, as software-only, or a combination of the two. In every case, the purpose of a firewall is to isolate your trusted internal network (or your personal PC) from the dangers of unknown resources on the Internet and other network connections that may be harmful. The firewall prevents unauthorized access to your internal, trusted network from outside threats. advertisement 4. Network layer firewall has two sub-categories called ____________ a) stateful firewall and stateless firewall b) bit oriented firewall and byte oriented firewall c) frame firewall and packet firewall /https://www.sanfoundry.com/computer-networks-questions-answers-security 2/8 2021/6/22 Internet Security - Computer Networks Questions & Answers - Sanfoundry d) network firewall and data firewall View Answer Answer: a Explanation: Most network layer firewalls can operate as stateful or stateless firewalls, creating two subcategories of the standard network layer firewall. Stateful firewalls have the advantage of being able to track packets over a period of time for greater analysis and accuracy — but they require more memory and operate more slowly. Stateless firewalls do not analyze past traffic and can be useful for systems where speed is more important than security, or for systems that have very specific and limited needs. For example, a computer that only needs to connect to a particular backup server does not need the extra security of a stateful firewall. 5. WPA2 is used for security in _______ a) ethernet b) bluetooth c) wi-fi d) e-mail View Answer Answer: c Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. advertisement 6. An attempt to make a computer resource unavailable to its intended users is called ______ a) denial-of-service attack b) virus attack c) worms attack /https://www.sanfoundry.com/computer-networks-questions-answers-security 3/8 2021/6/22 Internet Security - Computer Networks Questions & Answers - Sanfoundry d) botnet process View Answer Answer: a Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding and connection flooding. 7. Extensible authentication protocol is authentication framework frequently used in ______ a) wired personal area network b) wireless networks c) wired local area network d) wired metropolitan area network View Answer Answer: b Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to connect a network node to the Internet. It designed through extending the methods used by the Point-to-Point Protocol for authentication. advertisement 8. Pretty good privacy (PGP) is used in ______ a) browser security b) email security c) FTP security d) wifi security View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-security 4/8 2021/6/22 Internet Security - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes sure that the message cannot be stolen by other unauthorized users. 9. PGP encrypts data by using a block cipher called ______ a) international data encryption algorithm b) private data encryption algorithm c) internet data encryption algorithm d) local data encryption algorithm View Answer Answer: a Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP used the cipher method BassOmatic. advertisement 10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________ a) DNS lookup b) DNS hijacking c) DNS spoofing d) DNS authorizing View Answer Answer: c Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials. /https://www.sanfoundry.com/computer-networks-questions-answers-security 5/8 2021/6/22 Computer Networks Online Test - Sanfoundry Computer Networks Questions & Answers – Packet Forwarding and Routing « Prev Next » This set of Computer Networks online test focuses on “Packet Forwarding and Routing”. 1. The term that is used to place packet in its route to its destination is called __________ a) Delayed b) Urgent c) Forwarding d) Delivering View Answer Answer: c Explanation: Forwarding is done by the nodes in the path from source to destination, that are not the intended destination for the packet in order to pass the packet to the next node in the path. The destination machine does not forward the packet to any other node. advertisement 2. A second technique to reduce routing table and simplify searching process is called _________ a) Network-Specific Method b) Network-Specific Motion c) Network-Specific Maintaining /https://www.sanfoundry.com/computer-networks-questions-answers-online-test 1/7 2021/6/22 Computer Networks Online Test - Sanfoundry d) Network-Specific Membership View Answer Answer: a Explanation: In the network specific forwarding method, there is only one record, the destination of the packet, in the routing table and not the other hosts of the network. The other two forwarding methods are the default method and the next-hop method. 3. Next-Hop Method is used to reduce contents of a _________ a) Revolving table b) Rotating Table c) Routing Table d) Re-allocate table View Answer Answer: c Explanation: In the next-hop forwarding method, the routing table of each router in the path contains the address of only the next hop in the path of packet. This method is suitable for short distances only. advertisement 4. Several techniques can make size of routing table manageable and also handle issues such as __________ a) Maturity b) Error reporting c) Tunneling d) Security View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-online-test 2/7 2021/6/22 Computer Networks Online Test - Sanfoundry Answer: d Explanation: The size of the routing table in the technique must be manageable for the network nodes i.e. it must not be too big. Security of the forwarding packet is the highest priority for a technique and must be high enough so that only authorized senders and receivers can access the packet’s content. 5. Host-specific routing is used for purposes such as checking route or providing _____ a) Network Measures b) Security Measures c) Routing Measures d) Delivery Measures View Answer Answer: b Explanation: In host-specific routing, the route of the packet is defined based on the exact match of the packet’s IP with the routing table entry of the host. It provides the best security for the packet as the packet is forwarded only to routers in the pre-defined path. advertisement 6. In Unicast routing, if instability is between three nodes, stability cannot be ________ a) Stable b) Reversed c) Guaranteed d) Forward View Answer Answer: c Explanation: In Unicast routing, there is only sender and one receiver. So, if there is instability between three nodes, in which one is sender, one is receiver and one is the router in the path, /https://www.sanfoundry.com/computer-networks-questions-answers-online-test 3/7 2021/6/22 Computer Networks Online Test - Sanfoundry there is no other path available for the packet and the stability of the network is not guaranteed. 7. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________ a) Graph b) Tree c) Network d) Link View Answer Answer: a Explanation: The Djikstra’s shortest path algorithm is the fastest among the algorithms for finding the shortest path in a graph. But it is a greedy method based algorithm so it does not guarantee the shortest path every time. advertisement 8. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________ a) Gaps b) Loops c) Holes d) Links View Answer Answer: b Explanation: In multicast routing, there is one sender and many receivers. So flooding is the most basic method to forward packets to many receivers. The one issue with flooding is that it creates routing loops. One loop prevention method is that the routers will not send the packet to a node where the packet has been received before. /https://www.sanfoundry.com/computer-networks-questions-answers-online-test 4/7 2021/6/22 Computer Networks Online Test - Sanfoundry 9. RPF stands for __________ a) Reverse Path Forwarding b) Reverse Path Failure c) Reverse Packet Forwarding d) Reverse Protocol Failure View Answer Answer: a Explanation: Reverse Path Forwarding is a loop-free forwarding method for multi-cast routing in modern systems. The method focuses on forwarding the packet away from the source IP in each iteration to make sure there is no loops. advertisement 10. LSP stands for __________ a) Link Stable Packet b) Link State Packet c) Link State Protocol d) Link State Path View Answer Answer: b Explanation: A Link State Packet is a packet created by a router that lists its neighboring nodes and routers in link state routing protocol. It is shared with other routers to find the shortest path from a source to the destination. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for online tests, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-online-test 5/7 2021/6/22 Web Caching - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Web Caching « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Web Caching”. 1. What does REST stand for? a) Represent State Transfer b) Representational State Transfer c) Representing State Transfer d) Representation State Transfer View Answer Answer: b Explanation: REST stands for Representational State Transfer and is a software architecture style in which the server sends a representation of the state of the resource that it requests. It provides interoperability between the systems. advertisement 2. Which of the following protocol is used by Restful web services as a medium of communication between client and server? a) HTTP /https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 1/7 2021/6/22 Web Caching - Computer Networks Questions & Answers - Sanfoundry b) FTP c) Gopher d) TELNET View Answer Answer: a Explanation: Restful web services make use of HTTP protocol as a medium of communication between client and server. The REST architecture was known as the HTTP object model back in the year 1994. 3. Which of the following is not a good practice to create a standard URI for a web service? a) Maintain Backward Compatibility b) Use HTTP Verb c) Using spaces for long resource names d) Use lowercase letters View Answer Answer: c Explanation: We must use hyphens (-) or underscores (_) instead of spaces to represent long resource names. It may lead to the resource to be less recognizable for the system if we use spaces instead. advertisement 4. Which of the following HTTP methods should be idempotent in nature? a) OPTIONS b) DELETE c) POST d) HEAD View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 2/7 2021/6/22 Web Caching - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: DELETE operation should be idempotent, means their result will always same no matter how many times these operations are invoked. Also, the PUT operation is supposed to be idempotent. 5. Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server? a) Public b) Private c) Nocache/nostore d) Maxage View Answer Answer: b Explanation: Private directive indicates that resource is cachable by only client and server; no intermediary can cache the resource. But if we use the public directive, it indicates that the resource may be cachable by any intermediary component. advertisement 6. Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request? a) 200 b) 201 c) 204 d) 304 View Answer Answer: b Explanation: HTTP Status Code 201 means CREATED, when a resource is successful created /https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 3/7 2021/6/22 Web Caching - Computer Networks Questions & Answers - Sanfoundry using POST or PUT request. The code 200 means success i.e. OK, code 204 means NO CONTENT, and the code 304 means NOT MODIFIED. 7. Which of the following annotation of JAX RS API is used to annotate a method used to create resource? a) @Path b) @GET c) @PUT d) @POST View Answer Answer: C Explanation: @PUT is the HTTP request that is used to create resource and also define a complete resource path. @POST may also be used to create a resource but it won’t define a resource path i.e. an accessing medium. advertisement 8. Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path? a) @PathParam b) @QueryParam c) @MatrixParam d) @HeaderParam View Answer Answer: c Explanation: @MatrixParam is the annotation that binds the parameter passed to method to a HTTP matrix parameter in path, while @QueryParam binds to a query parameter, @PathParam binds to a value and @HeaderParam binds to the HTTP header in the path. /https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 4/7 2021/6/22 Web Caching - Computer Networks Questions & Answers - Sanfoundry 9. In REST architecture, a REST Server simply provides access to resources and REST client accesses and presents the resources. a) False b) True View Answer Answer: b Explanation: In REST architecture, a REST Server simply provides access to resources and REST client accesses and presents the resources. It is popularly used because it makes efficient use of the bandwidth and can be cached for better performance and scalability. advertisement 10. POST operation should be idempotent. a) True b) False View Answer Answer: b Explanation: POST operation can cause different result so they are not idempotent. The DELETE and PUT operations are idempotent as they invoke the same result every time they are called. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-web-caching 5/7 2021/6/22 Cookies - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Cookies « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cookies”. 1. Cookies were originally designed for ____________ a) Client side programming b) Server side programming c) Both Client side programming and Server side programming d) Socket programming View Answer Answer: b Explanation: Cookies were originally designed for server side programming, and at the lowest level, they are implemented as an extension to the HTTP protocol. They were introduced with the intention of providing a better user experience for the websites. advertisement 2. The Cookie manipulation is done using which property? a) cookie b) cookies /https://www.sanfoundry.com/computer-networks-questions-answers-cookie 1/8 2021/6/22 Cookies - Computer Networks Questions & Answers - Sanfoundry c) manipulate d) manipulate cookie View Answer Answer: a Explanation: The cookie property sets or returns all name/value pairs of cookies in the current document. There are no methods involved: cookies are queried, set, and deleted by reading and writing the cookie property of the Document object using specially formatted strings. 3. Which of the following explains Cookies nature? a) Non Volatile b) Volatile c) Intransient d) Transient View Answer Answer: d Explanation: Cookies are transient by default; the values they store last for the duration of the web browser session but are lost when the user exits the browser. While the browsing session is active the cookie stores the user values in the user’s storage itself and accesses them. advertisement 4. Which attribute is used to extend the lifetime of a cookie? a) Higher-age b) Increase-age c) Max-age d) Lifetime View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-cookie 2/8 2021/6/22 Cookies - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: If you want a cookie to last beyond a single browsing session, you must tell the browser how long (in seconds) you would like it to retain the cookie by specifying a max-age attribute. A number of seconds until the cookie expires. A zero or negative number will kill the cookie immediately. 5. Which of the following defines the Cookie visibility? a) Document Path b) LocalStorage c) SessionStorage d) All of the mentioned View Answer Answer: d Explanation: sessionStorage, localStorage and Document path all are used to store data on the client-side. Each one has its own storage and expiration limit. Cookie visibility is scoped by the document origin as Local Storage and Session Storage are, and also by document path. advertisement 6. Which of the following can be used to configure the scope of the Cookie visibility? a) Path b) Domain c) Both Path and Domain d) Server View Answer Answer: d Explanation: The Cookie visibility scope is configurable through cookie attributes path and domain. Domain attribute in the cookie is used to specify the domain for which the cookie is /https://www.sanfoundry.com/computer-networks-questions-answers-cookie 3/8 2021/6/22 Cookies - Computer Networks Questions & Answers - Sanfoundry sent. Path includes the Path attribute in the cookie to specify the path for which this cookie is sent. 7. How can you set a Cookie visibility scope to local Storage? a) / b) % c) * d) # View Answer Answer: a Explanation: Setting the path of a cookie to “/” gives scoping like that of localStorage and also specifies that the browser must transmit the cookie name and value to the server whenever it requests any web page on the site. advertisement 8. Which of the following is a Boolean cookie attribute? a) Bool b) Secure c) Lookup d) Domain View Answer Answer: b Explanation: The final cookie attribute is a boolean attribute named secure that specifies how cookie values are transmitted over the network. By default, cookies are insecure, which means that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked secure, however, it is transmitted only when the browser and server are connected via HTTPS or another secure protocol. /https://www.sanfoundry.com/computer-networks-questions-answers-cookie 4/8 2021/6/22 Cookies - Computer Networks Questions & Answers - Sanfoundry 9. Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value? a) EncodeURIComponent() b) EncodeURI() c) EncodeComponent() d) Encode() View Answer Answer: a Explanation: Cookie values cannot include semicolons, commas, or whitespace. For this reason, you may want to use the core JavaScript global function encodeURIComponent() to encode the value before storing it in the cookie. advertisement 10. What is the constraint on the data per cookie? a) 2 KB b) 1 KB c) 4 KB d) 3 KB View Answer Answer: c Explanation: Each cookie can hold up to only 4 KB. In practice, browsers allow many more than 300 cookies total, but the 4 KB size limit may still be enforced by some. Storage of a session has to be a minimum of 5MB. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-cookie 5/8 2021/6/22 Computer Networks Assessment Questions - Sanfoundry Computer Networks Questions & Answers – Socket Programming « Prev Next » This set of Computer Networks Assessment Questions and Answers focuses on “Socket Programming”. 1. Which methods are commonly used in Server Socket class? a) Public Output Stream get Output Stream () b) Public Socket accept () c) Public synchronized void close () d) Public void connect () View Answer Answer: b Explanation: The Public socket accept () method is used by the ServerSocket class to accept the connection request of exactly one client at a time. The client requests by initializing the socket object with the servers IP address. advertisement 2. Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number? a) Datagram Socket(int port) /https://www.sanfoundry.com/computer-networks-assessment-questions-answers 1/7 2021/6/22 Computer Networks Assessment Questions - Sanfoundry b) Datagram Socket(int port, Int Address address) c) Datagram Socket() d) Datagram Socket(int address) View Answer Answer: b Explanation: Datagram Socket (int port, Int Address address) is used to create a datagram socket. A datagram socket is created for connection-less communication between the server and the client. There is no accept() method in this class. 3. The client in socket programming must know which information? a) IP address of Server b) Port number c) Both IP address of Server & Port number d) Only its own IP address View Answer Answer: c Explanation: The client in socket programming must know IP address of Server as it has to use that IP address in order to initialize the socket class constructor. That is how the client requests a connection to the server. advertisement 4. The URL Connection class can be used to read and write data to the specified resource that is referred by the URL. a) True b) False View Answer /https://www.sanfoundry.com/computer-networks-assessment-questions-answers 2/7 2021/6/22 Computer Networks Assessment Questions - Sanfoundry Answer: a Explanation: The URL Connection class can be used to read and write data to the specified resource referred by the URL. A connection to the URL is initialized by the OpenConnection() method of the class. 5. Datagram is basically just a piece of information but there is no guarantee of its content, arrival or arrival time. a) True b) False View Answer Answer: a Explanation: Datagram is basically some information travelling between the sender and the receiver, but there is no guarantee of its content, arrival or arrival time. A Datagram socket class object is created to make a datagram connection between the server and the client. advertisement 6. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________ a) Socket b) IP Address c) Protocol d) MAC Address View Answer Answer: c Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol. Out of them, TCP is a transport layer protocol and FTP, TELNET, SMTP and POP are application layer protocols. /https://www.sanfoundry.com/computer-networks-assessment-questions-answers 3/7 2021/6/22 Computer Networks Assessment Questions - Sanfoundry 7. What does the java.net.InetAddress class represent? a) Socket b) IP Address c) Protocol d) MAC Address View Answer Answer: b Explanation: The java.net.InetAddress class represents IP Address of a particular specified host. It can be used to resolve the host name from the IP address or the IP address from the host name. advertisement 8. The flush () method of Print Stream class flushes any un-cleared buffers in the memory. a) True b) False View Answer Answer: a Explanation: The flush () method of Print Stream class flushes any un cleared buffers in memory. 9. Which classes are used for connection-less socket programming? a) Datagram Socket b) Datagram Packet c) Both Datagram Socket & Datagram Packet d) Server Socket View Answer /https://www.sanfoundry.com/computer-networks-assessment-questions-answers 4/7 2021/6/22 Computer Networks Assessment Questions - Sanfoundry Answer: c Explanation: Datagram is basically some information travelling between the sender and the receiver, but there is no guarantee of its content, arrival or arrival time. Datagram Socket, Datagram Packet are used for connection-less socket programming, while Server Socket is used for connection-oriented socket programming. advertisement 10. In Inet Address class, which method returns the host name of the IP Address? a) Public String get Hostname() b) Public String getHostAddress() c) Public static InetAddress get Localhost() d) Public getByName() View Answer Answer: a Explanation: In Inet Address class public String getHostname() method returns the host name of the IP Address. The getHostAddress() method returns the IP address of the given host name. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks Assessment Questions, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Ports /https://www.sanfoundry.com/computer-networks-assessment-questions-answers 5/7 2021/6/22 Ports - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Ports « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ports”. 1. Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection. a) True b) False View Answer Answer: a Explanation: Persistent connections are kept active after completing transaction so that multiple objects can be sent over the same TCP connection. advertisement 2. HTTP is ________ protocol. a) application layer b) transport layer c) network layer /https://www.sanfoundry.com/computer-networks-questions-answers-port 1/7 2021/6/22 Ports - Computer Networks Questions & Answers - Sanfoundry d) data link layer View Answer Answer: a Explanation: HTTP is an Application layer protocol used to define how messages are formatted and transmitted through the World Wide Web. 3. In the network HTTP resources are located by __________ a) Uniform resource identifier b) Unique resource locator c) Unique resource identifier d) Union resource locator View Answer Answer: a Explanation: The Uniform Resource Identifier is a name and locator for the resource to be located by the HTTP. The URLs and URNs are derived through the identifier. advertisement 4. HTTP client requests by establishing a __________ connection to a particular port on the server. a) User datagram protocol b) Transmission control protocol c) Border gateway protocol d) Domain host control protocol View Answer Answer: b Explanation: HTTP clients perform requests using a TCP connection, because the TCP /https://www.sanfoundry.com/computer-networks-questions-answers-port 2/7 2021/6/22 Ports - Computer Networks Questions & Answers - Sanfoundry connection provides a more reliable service. UDP is not a reliable protocol, border gateway protocol is used on top of TCP, while domain host control protocol is a network layer protocol. 5. In HTTP pipelining __________ a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses b) multiple HTTP requests cannot be sent on a single TCP connection c) multiple HTTP requests are sent in a queue on a single TCP connection d) multiple HTTP requests are sent at random on a single TCP connection View Answer Answer: a Explanation: HTTP pipelining helps the client make multiple requests without having to waiting for each response, thus saving a lot of time and bandwidth for the client. advertisement 6. FTP server listens for connection on which port number? a) 20 b) 21 c) 22 d) 23 View Answer Answer: b Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote login. Port 23 is used for TELNET. 7. In FTP protocol, a client contacts a server using ______ as the transport protocol. a) Transmission control protocol /https://www.sanfoundry.com/computer-networks-questions-answers-port 3/7 2021/6/22 Ports - Computer Networks Questions & Answers - Sanfoundry b) User datagram protocol c) Datagram congestion control protocol d) Stream control transmission protocol View Answer advertisement 8. In Active mode FTP, the client initiates both the control and data connections. a) True b) False View Answer Answer: b Explanation: In Passive mode of FTP, the client initiates both data and control connections, while in Active mode, the client initiates the control connection and then the server initiates the data connection. 9. The File Transfer Protocol is built on __________ a) data centric architecture b) service oriented architecture c) client server architecture d) connection oriented architecture View Answer Answer: c Explanation: The FTP connection includes a Server and a Client which wish to share files. The server can have multiple clients at the same time while the client communicates with only one server at a time. /https://www.sanfoundry.com/computer-networks-questions-answers-port 4/7 2021/6/22 Ports - Computer Networks Questions & Answers - Sanfoundry advertisement 10. In File Transfer Protocol, data transfer cannot be done in __________ a) stream mode b) block mode c) compressed mode d) message mode View Answer Answer: d Explanation: In Stream mode, the data is transferred in a continuous stream. In Block mode, data is transferred after being divided into smaller blocks. In Compressed mode, data is transferred after being compressed using some compression algorithm. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Cryptography » Next - Computer Networks Questions & Answers – Socket Programming advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-port 5/7 2021/6/22 Cryptography - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Cryptography « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cryptography”. 1. In cryptography, what is cipher? a) algorithm for performing encryption and decryption b) encrypted message c) both algorithm for performing encryption and decryption and encrypted message d) decrypted message View Answer Answer: a Explanation: Cipher is a method to implement encryption and decryption of messages travelling in a network. It’s used to increase the confidentiality of the messages. advertisement 2. In asymmetric key cryptography, the private key is kept by __________ a) sender b) receiver c) sender and receiver /https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 1/7 2021/6/22 Cryptography - Computer Networks Questions & Answers - Sanfoundry d) all the connected devices to the network View Answer Answer: b Explanation: The private key is kept only by the receiver of the message. Its aim is to make sure that only the intended receiver can decipher the message. 3. Which one of the following algorithm is not used in asymmetric-key cryptography? a) rsa algorithm b) diffie-hellman algorithm c) electronic code book algorithm d) dsa algorithm View Answer Answer: c Explanation: Electronic code book algorithm is a block cipher method in which each block of text in an encrypted message corresponds to a block of data. It is not feasible for block sizes smaller than 40 bits. advertisement 4. In cryptography, the order of the letters in a message is rearranged by __________ a) transpositional ciphers b) substitution ciphers c) both transpositional ciphers and substitution ciphers d) quadratic ciphers View Answer Answer: a Explanation: In transposition ciphers, the order of letters in a plaintext message is shuffled /https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 2/7 2021/6/22 Cryptography - Computer Networks Questions & Answers - Sanfoundry using a pre-defined method. Some of such ciphers are Rail fence cipher and Columnar transposition. 5. What is data encryption standard (DES)? a) block cipher b) stream cipher c) bit cipher d) byte cipher View Answer Answer: a Explanation: DES is a symmetric key block cipher in which the block size is 64 bits and the key size is 64 bits. It is vulnerable to some attacks and is hence not that popularly used. advertisement 6. Cryptanalysis is used __________ a) to find some insecurity in a cryptographic scheme b) to increase the speed c) to encrypt the data d) to make new ciphers View Answer Answer: a Explanation: Cryptanalysis is a field of study in which a cryptographic scheme is intentionally tried to breach in order to find flaws and insecurities. It is used to make sure that the scheme is least vulnerable to attacks. 7. Which one of the following is a cryptographic protocol used to secure HTTP connection? a) stream control transmission protocol (SCTP) /https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 3/7 2021/6/22 Cryptography - Computer Networks Questions & Answers - Sanfoundry b) transport layer security (TLS) c) explicit congestion notification (ECN) d) resource reservation protocol View Answer Answer: b Explanation: TLS has strong message authentication and key-material generation to prevent eavesdropping, tampering and message forgery. It has been used since the year 1996. advertisement 8. Voice privacy in GSM cellular telephone protocol is provided by _______ a) A5/2 cipher b) b5/4 cipher c) b5/6 cipher d) b5/8 cipher View Answer Answer: a Explanation: The A5/2 cipher was published in the year 1996 and was cryptanalysed in the same year within a month. It’s use was discontinued from the year 2006 as it was really weak. 9. ElGamal encryption system is __________ a) symmetric key encryption algorithm b) asymmetric key encryption algorithm c) not an encryption algorithm d) block cipher method View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 4/7 2021/6/22 Cryptography - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: The ELGamal encryption system was made by Taher Elgamal in the year 1985 and is an asymmetric key algorithm. It is popularly used in PGP and other systems. advertisement 10. Cryptographic hash function takes an arbitrary block of data and returns _________ a) fixed size bit string b) variable size bit string c) both fixed size bit string and variable size bit string d) variable sized byte string View Answer Answer: a Explanation: Cryptographic hash functions are used in digital signatures and message authentication codes. The only issue with it is that it returns the same hash value every time for a message making it vulnerable to attackers to evaluate and break the cipher. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – RIP v2 » Next - Computer Networks Questions & Answers – Ports /https://www.sanfoundry.com/computer-networks-questions-answers-cryptography 5/7 2021/6/22 Computer Networks Multiple Choice Questions and Answers - Sanfoundry Computer Networks Questions & Answers – RIP v2 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers focuses on “RIP v2”. 1. Which statement is true regarding classless routing protocols? a) The use of discontinuous networks is not allowed b) The use of variable length subnet masks is permitted c) RIPv1 is a classless routing protocol d) RIPv2 supports classless routing View Answer Answer: b Explanation: Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontinuous networking. advertisement 2. What is route poisoning? a) It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted b) It is information received from a router that can’t be sent back to the originating router.RIPv2 /https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 1/7 2021/6/22 Computer Networks Multiple Choice Questions and Answers - Sanfoundry supports classless routing c) It prevents regular update messages from reinstating a route that has just come up d) It describes when a router sets the metric for a downed link to infinity View Answer Answer: d Explanation: When a network goes down, the distance-vector routing protocol initiates route poisoning by advertising the network with a metric of 16, or unreachable. 3. Which of the following is true regarding RIPv2? a) It has a lower administrative distance than RIPv1 b) It converges faster than RIPv1 c) It has the same timers as RIPv1 d) It is harder to configure than RIPv1 View Answer Answer: c Explanation: RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is configured just like RIPv1. advertisement 4. Which of the situations might not require multiple routing protocols in a network? a) When a new Layer 2-only switch is added to the network b) When you are migrating from one routing protocol to another c) When you are using routers from multiple vendors d) When there are host-based routers from multiple vendors View Answer /https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 2/7 2021/6/22 Computer Networks Multiple Choice Questions and Answers - Sanfoundry Answer: a Explanation: Multiple routing protocols are required only when we need to migrate from one routing protocol to another, or when we are using routers from multiple vendors, or when there are host-based routers from multiple vendors. Routing is not a layer-2 function so we don’t require multiple routing protocols when new layer-2 switch is added. 5. Which two routing protocols can be redistributed into OSPF by a Cisco router? a) IP EIGRP and AppleTalk EIGRP b) AppleTalk EIGRP and RIPv2 c) RIPv2 and IP EIGRP d) IPX RIP & AppleTalk EIGRP View Answer Answer: c Explanation: OSPF stands for Open Shortest Path First. It is a Link state routing protocol. IP EIGRP and RIPv2 can be redistributed into OSPF by a Cisco router. advertisement 6. Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains? a) Higher cost of two routers b) Routing feedback c) Cisco IOS incompatibility d) Not possible to use two routers View Answer Answer: b Explanation: Routing feedback is an anomaly in which the routing protocols go back and forth /https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 3/7 2021/6/22 Computer Networks Multiple Choice Questions and Answers - Sanfoundry between one route and another. Routing feedback is a reason for avoiding doing route redistribution on two routers between the same two routing domains. 7. What does administrative distance rank? a) Metrics b) Sources of routing information c) Router reliability d) Best paths View Answer Answer: b Explanation: Sources of routing information is the administrative distance rank. It is used by routers to select the best path when there are different routes to the same destination. It’s used only two different routing protocols are being used. advertisement 8. Which protocol maintains neighbor adjacencies? a) RIPv2 and EIGRP b) IGRP and EIGRP c) RIPv2 d) EIGRP View Answer Answer: c Explanation: Neighbor adjacency refers to the formal handshake performed by neighboring routers. It is to be done before the router share any routing information. RIP V2 maintains neighbor adjacencies. /https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 4/7 2021/6/22 Computer Networks Multiple Choice Questions and Answers - Sanfoundry 9. Which routing protocol implements the diffusing update algorithm? a) IS-IS b) IGRP c) EIGRP d) OSPF View Answer Answer: c Explanation: The diffusing update algorithm (DUAL) is used to maintain backup routes to a destination for when the primary route fails. EIGRP routing protocol implements the diffusing update algorithm. advertisement Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – RIP v1 » Next - Computer Networks Questions & Answers – Cryptography advertisement /https://www.sanfoundry.com/computer-networks-multiple-choice-questions-answers 5/7 2021/6/22 RIP v1 - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – RIP v1 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RIP v1”. 1. Which routing protocol has a maximum network diameter (hop count) of 15? a) RIPv1 b) RIPv2 c) EIGRP d) Both RIPv1 and RIPv2 View Answer Answer: d Explanation: Both RIPv1 and RIPv2 support a maximum hop count of 15 because they use 4bits to store this value. RIPv1 uses classful routing whereas RIPv2 uses classless routing. The routing updates are broadcasted over the network. It notifies routers about the update so that they update their own routing tables. advertisement 2. How often does a RIPv1 router broadcast its routing table by default? a) Every 30 seconds b) Every 60 seconds /https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 1/7 2021/6/22 RIP v1 - Computer Networks Questions & Answers - Sanfoundry c) Every 90 seconds d) RIPv1 does not broadcast periodically View Answer Answer: a Explanation: RIPv1 router broadcasts its routing table every 30 seconds by default. The broadcasted routing table can be used by other routers to find the shortest path among the network devices. 3. Which command displays RIP routing updates? a) Show IP route b) Debug IP rip c) Show protocols d) Debug IP route View Answer Answer: b Explanation: The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router. It verifies that the updates are being broadcasted and not multicasted. advertisement 4. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table? a) The updated information will be added to the existing routing table Debug IP rip b) The update will be ignored and no further action will occur Debug IP route c) The updated information will replace the existing routing table entry d) The existing routing table entry will be deleted from the routing table and all routers will /https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 2/7 2021/6/22 RIP v1 - Computer Networks Questions & Answers - Sanfoundry exchange routing updates to reach convergence View Answer Answer: b Explanation: When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP’s case, hop count. 5. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean? a) The route is 16 hops away Debug IP rip b) The route has a delay of 16 microseconds Debug IP route c) The route is inaccessible d) The route is queued at 16 messages a second View Answer Answer: c Explanation: You cannot have 16 hops on a RIP network by default, because the max default hops possible is 15. If you receive a route advertised with a metric of 16, this means it is inaccessible. advertisement 6. Default administrative distance of a static route is ________ a) 0 b) 90 c) 100 d) 1 View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 3/7 2021/6/22 RIP v1 - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: 1 is the default administrative distance of Static Route. It is used by routers to select the best path when there are different routes to the same destination. It’s used only two different routing protocols are being used. 7. Which protocol gives a full route table update every 30 seconds? a) IEGRP b) RIP c) ICMP d) IP View Answer Answer: b Explanation: RIP gives a full route table update every 30 seconds. The broadcasted routing table can be used by other routers to find the shortest path among the network devices. advertisement 8. _________ is the default administrative distance of RIP. a) 0 b) 90 c) 120 d) 130 View Answer Answer: c Explanation: The default administrative distance is the default count of numbers assigned to arbitrary routes to a destination. The default administrative distance of RIP is 120. It is used to find the shortest route amongst the number of paths available. /https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 4/7 2021/6/22 RIP v1 - Computer Networks Questions & Answers - Sanfoundry 9. Which statement is true regarding classless routing protocol? a) The use of discontinuous networks is not allowed b) Use of variable length subnet masks is permitted c) RIPv1 is a classless routing protocol d) IGRP supports classes routing within the same autonomous system View Answer Answer: b Explanation: Use of variable length subnet masks is permitted in classless routing protocols. Also use of discontinuous networks is allowed in such routing protocols. RIPv1 is a classful routing protocol but RIPv2 is classless routing protocol. advertisement 10. Where should we use default routing? a) On stub networks- which have only one exit path out of the network b) Which have more than one exit path out of the network c) Minimum five exit paths out of the network d) Maximum five exit paths out of the network View Answer Answer: a Explanation: We must use default routing on stub networks. They have only one exit path out of the network, so there can be no specific path decided for such networks. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-ripv1 5/7 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IP Routing « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IP Routing”. 1. Which type of Ethernet framing is used for TCP/IP and DEC net? a) Ethernet 802.3 b) Ethernet 802.2 c) Ethernet II d) Ethernet SNAP View Answer Answer: c Explanation: The Ethernet 802.3 framing is used for NetWare versions 2 to 3.11, and the Ethernet 802.2 framing is used for NetWare versions 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DEC net, and Ethernet SNAP is used with TCP/IP and AppleTalk. The type field in Ethernet 802.2 frame is replaced by a length field in Ethernet 802.3. advertisement 2. Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 1/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry problem? a) NetWare 4.11 defaults to 802.2 encapsulation b) NetWare 4.11 defaults to 802.3 encapsulation c) Cisco routers only work with NetWare 3.11 d) NetWare 3.11 defaults to 802.2 encapsulation View Answer Answer: a Explanation: The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare 3.12and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3. 3. NetWare IPX addressing uses a network number and a node number. Which statement is not true? a) The network address is administratively assigned and can be up to 16 hexadecimal digits long b) The node address is always administratively assigned c) The node address is usually the MAC address d) If the MAC address is used as the node address, then IPX eliminates the use of ARP View Answer Answer: b Explanation: The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network and the MAC address/node address is not assigned by the administrator. 4. Which NetWare protocol works on layer 3–network layer—of the OSI model? a) IPX b) NCP c) SPX d) NetBIOS View Answer Answer: a Explanation: IPX (Internetwork Packet Exchange) is the NetWare network layer 3 protocol used for transferring information on LANs that use Novell’s NetWare. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 2/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry 5. Which NetWare protocol provides link-state routing? a) NLSP b) RIP c) SAP d) NCP View Answer Answer: a Explanation: NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service Advertisement Protocol) advertises network services. NCP (NetWare Core Protocol) provides client-to-server connections and applications. RIP is a distance vector routing protocol. NLSP was developed by Novell to replace RIP routing protocols. advertisement 6. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use? a) Debug IP IGRP event b) Debug IP IGRP-events c) Debug IP IGRP summary d) Debug IP IGRP events View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 3/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: The “debug IP IGRP events” is used to display a short summary of IGRP routing information. You can append an IP address onto either console’s command-line to see only the IGRP updates from a neighbor. The command will only give a short summary and hence won’t flood the command line. 7. What does the following series of commands “Router IGRP 71 network” accomplish? 10.0.0.0 router IGRP 109 network 172.68.7.0 a) It isolates networks 10.0.0.0 and 172.68.7.0 b) It loads IGRP for networks 109 and 71 c) It disables RIP d) It disables all routing protocols View Answer Answer: a Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109 and71 with IGRP. IGRP does not disable RIP, both can be used at the same time. advertisement 8. The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings? a) For LAN interfaces, one tick; for WAN interfaces, six ticks b) For LAN interfaces, six ticks; for WAN interfaces, one tick c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks View Answer Answer: a Explanation: Tick is basically the update rate of clients in the network. The IPX delay number /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 4/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry will give the ticks at a certain time. The default ticks are–for LAN interfaces, one tick, and for WAN interfaces, six ticks. 9. As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this? a) Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX network 6c b) Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0 IPX encapsulation sap IPX network 6c c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX encapsulation sap d) Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX encapsulation sap IPX network 6c View Answer Answer: d Explanation: The following commands setup the sub interfaces to allow for two types of encapsulation:interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet0.2 IPX encapsulation sap IPX network 6c. advertisement 10. What does the “IPX maximum-paths 2” command accomplish? a) It enables load sharing on 2 paths if the paths are equal metric paths b) It sets up routing to go to network 2 c) It is the default for Cisco IPX load sharing d) It enables load sharing on 2 paths if the paths are unequal metric paths View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 5/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths. The value must always be greater than 1 and must be a natural number. 11. You want to enable both arpa and snap encapsulation on one router interface. How do you do this? a) The interface can handle multiple encapsulation types with no extra configuration b) Assign two network numbers, one for each encapsulation type c) Enable Novell-ether to run multiple encapsulation types d) Both arpa and snap are enabled by default so you don’t have to configure anything View Answer 12. By default, Cisco routers forward GNS SAPs to remote networks. a) False b) True View Answer Answer: a Explanation: GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local network,that server will respond. If there isn’t, the Cisco router has to be configured to forward theGNS SAP. 13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? a) Each router builds its own SAP table and forwards that every 60 seconds b) Each router assigns a service number and broadcasts that c) SAPs aren’t necessary with Cisco routers d) Cisco routers filter out all SAPs View Answer Answer: a Explanation: Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs can’t befiltered even with 4.x since NDS and time synchronization uses SAPs. 14. Novell’s implementation of RIP updates routing tables every _________ seconds. a) 60 b) 90 c) 10 d) 30 View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 6/9 2021/6/22 IP Routing - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds. 15. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics. a) Ticks & Hops b) Hops & Loops c) Loops & Counts d) Counts & Ticks View Answer Answer: a Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal, then it uses an administratively assigned tiebreaker. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Designing Subnet Masks » Next - Computer Networks Questions & Answers – RIP v1 advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-ip-routing-2 7/9 2021/6/22 Computer Networks MCQs - Sanfoundry Computer Networks Questions & Answers – Designing Subnet Masks « Prev Next » This set of Computer Networks MCQs focuses on “Designing Subnet Masks”. 1. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? i. A crossover cable should be used in place of the straight-through cable. ii. A rollover cable should be used in place of the straight-through cable. iii. The subnet masks should be set to 255.255.255.192. iv. A default gateway needs to be set on each host. v. The subnet masks should be set to 255.255.255.0. a) i only b) ii only c) iii and iv only d) i and v only View Answer Answer: d Explanation: First, if you have two hosts directly connected, as shown in the graphic, then you need a crossover cable. A straight-through cable won’t work. Second, the hosts have different masks, which puts them in different subnets. The easy solution is just to set both masks to 255.255.255.0 (/24). 2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid host IDs on the LAN interface attached to the router? /https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 1/6 2021/6/22 Computer Networks MCQs - Sanfoundry i. 172.16.1.100 ii. 172.16.1.198 iii. 172.16.2.255 iv. 172.16.3.0 a) i only b) ii and iii only c) iii and iv only d) ii only View Answer Answer: c Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This makes the third octet a block size of 2. The router’s interface is in the 172.16.2.0 subnet, and the broadcast address is 172.16.3.255 because the next subnet is 172.16.4.0. The valid host range is 172.16.2.1 to 172.16.3.254. The router is using the first valid host address in the range. 3. Which two statements describe the IP address 10.16.3.65/23? i. The subnet address is 10.16.3.0 255.255.254.0. ii. The lowest host address in the subnet is 10.16.2.1 255.255.254.0. iii. The last valid host address in the subnet is 10.16.2.254 255.255.254.0. iv. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. a) i and iii b) ii and iv c) i, ii and iv d) ii, iii and iv View Answer Answer: b Explanation: The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 10.16.2.0 subnet. The next subnet is 10.16.4.0, so the broadcast address for the 10.16.2.0 subnet is 10.16.3.255. The valid host addresses are 10.16.2.1 to 10.16.3.254. 4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? a) 14 b) 15 /https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 2/6 2021/6/22 Computer Networks MCQs - Sanfoundry c) 16 d) 30 View Answer Answer: d Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change. 5. You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? a) 255.255.255.192 b) 255.255.255.224 c) 255.255.255.240 d) 255.255.255.248 View Answer Answer: b Explanation: You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets with 14 hosts which is less than 15, so this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts so this may work. The mask 255.255.255.192 provides 4 subnets, each with 60 hosts so this may work. Comparing both the possible masks, 255.255.255.224 provides the best answer. 6. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? a) 2 b) 3 c) 4 d) 5 View Answer Answer: d Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so let’s add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This is the best answer. 7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? a) 172.16.112.0 b) 172.16.0.0 c) 172.16.96.0 /https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 3/6 2021/6/22 Computer Networks MCQs - Sanfoundry d) 172.16.255.0 View Answer Answer: a Explanation: A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subnet 8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface? a) 6 b) 8 c) 30 d) 32 View Answer Answer: a Explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts are the maximum number of hosts on this LAN, including the router interface. Out of the 8 addresses possible with the host bits, the first and the last address are for the subnet id and broadcast address respectively. 9. What is the subnet id of a host with an IP address 172.16.66.0/21? a) 172.16.36.0 b) 172.16.48.0 c) 172.16.64.0 d) 172.16.0.0 View Answer Answer: c Explanation: A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just count by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so the broadcast address of the 64 subnet is 71.255. 10. The network address of 172.16.0.0/19 provides how many subnets and hosts? a) 7 subnets, 30 hosts each b) 8 subnets, 8,190 hosts each c) 8 subnets, 2,046 hosts each d) 7 subnets, 2,046 hosts each View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-mcqs 4/6 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Analyzing Subnet Masks « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Analyzing Subnet Masks”. 1. Which of the following is the broadcast address for a Class B network ID using the default subnetmask? a) 172.16.10.255 b) 255.255.255.255 c) 172.16.255.255 d) 172.255.255.255 View Answer Answer: c Explanation: In this case, the class B network ID is 172.16.0.0. We know that the default mask of a class B network is 255.255.0.0. If we OR any address in a network with the complement of the default mask (0.0.255.255), we get the broadcast address of the network. In this case, the result of OR would be 172.16.255.255. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 1/8 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry 2. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address? a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127 b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127 c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255 d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255 View Answer Answer: b Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From the subnet mask, we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255. The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is the subnet address and last address 172.16.13.127 is the broadcast address. 3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use? a) 255.255.255.252 b) 255.255.255.255 c) 255.255.255.240 d) 255.255.255.248 View Answer Answer: c Explanation: If you have eight networks and each requires 10 hosts, you would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet bits and four host bits. Using our math, we’d get the following: 24-2=14 subnets 24-2=14 hosts. 4. The combination of _________ and __________ is often termed the local address of the local portion of the IP address. a) Network number and host number b) Network number and subnet number c) Subnet number and host number d) Host number View Answer Answer: c Explanation: It is termed as the local address because the address won’t be applicable outside the subnet. Sub networking is implemented for remote sensing in transparent way from that host which is contained in the sub network which called a local operation. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 2/8 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry 5. _________ implies that all subnets obtained from the same subnet mask. a) Static subnetting b) Dynamic subnetting c) Variable length subnetting d) Dynamic length subnetting View Answer Answer: a Explanation: Static subnetting is used when the requirement is of same number of hosts in each subnet for the institution. The same subnet mask can be used to find the subnet id of each subnet. It is usually used to divide large networks into smaller parts. advertisement 6. State whether true or false. i) A connection oriented protocol can only use unicast addresses. /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 3/8 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry ii) The any cast service is included in IPV6. a) True, True b) True, False c) False, True d) False, False View Answer Answer: a Explanation: In a connection oriented protocol, the host can only establish connection with another host on one unique channel, that’s why it can only use unicast addresses. In IPv6, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. 7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. a) FDDI b) FDDT c) FDDR d) FOTR View Answer Answer: a Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000 stations connected. advertisement 8. Which of the following are Gigabit Ethernets? a) 1000 BASE-SX /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 4/8 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry b) 1000 BASE-LX c) 1000 BASE-CX d) All of the mentioned View Answer Answer: d Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of being considerably faster. 9. _________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s. a) Ethernet b) Fast Ethernet c) Gigabit Ethernet d) Gigabyte Ethernet View Answer Answer: b Explanation: Fast Ethernet is a set of Ethernet Standards which were introduced in 1995, that carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most commonly used Fast Ethernet standard. advertisement 10. _________ is another kind of fiber optic network with an active star for switching. a) S/NET b) SW/NET /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 5/8 2021/6/22 Analyzing Subnet Masks - Computer Networks Questions & Answers - Sanfoundry c) NET/SW d) FS/NET View Answer Answer: a Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its optical combiner and mixing rod splitter are presented. The limited power budget and relatively large tapping losses of light wave technology, which limit the use of fiber optics in tapped bus LAN topologies, are examined and proven tolerable in optical star topologies. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – IPV4 and IPV6 Comparision » Next - Computer Networks Questions & Answers – Designing Subnet Masks advertisement Recommended Posts: 1. 2. 3. 4. 5. Java Programming Examples on Utility Classes Wireless & Mobile Communications MCQ (Multiple Choice Questions) Information Science Questions and Answers Electronics & Communication Engineering Questions and Answers Electrical Engineering Questions and Answers /https://www.sanfoundry.com/computer-networks-questions-answers-analyzing-subnet-mask 6/8 2021/6/22 IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IPV4 and IPV6 Comparision « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPV4 and IPV6 Comparision”. 1. Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling View Answer Answer: a Explanation: The Internet Protocol is the networking protocol that establishes the internet by relaying datagram across network boundaries. ICMP is a supporting protocol for IP which handles the Error Reporting functionality. advertisement 2. Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset /https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 1/7 2021/6/22 IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry c) TOS d) Identifier View Answer Answer: c Explanation: TOS-type of service identifies the type of packets. It is not related to fragmentation but is used to request specific treatment such as high throughput, high reliability or low latency for the IP packet depending upon the type of service it belongs to. 3. The TTL field has value 10. How many routers (max) can process this datagram? a) 11 b) 5 c) 10 d) 1 View Answer Answer: c Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on the number of hops it makes (Number of routers it goes through). TTL field is decremented by one each time the datagram is processed by a router. When the value is 0, the packet is automatically destroyed. advertisement 4. If the value in protocol field is 17, the transport layer protocol used is _________ a) TCP b) UDP c) ICMP d) IGMP View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 2/7 2021/6/22 IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry payloads of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP and IGMP are network layer protocols. 5. Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl d) identifier View Answer Answer: a Explanation: The Fragment Offset field specifies where the fragment fits in the original datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3bits shorter than the size of the total length field (16 bits). advertisement 6. The size of an IP address in IPv6 is _________ a) 4bytes b) 128bits c) 8bytes d) 100bits View Answer Answer: b Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion unique addresses are available in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses. /https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 3/7 2021/6/22 IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry 7. The header length of an IPv6 datagram is ___________ a) 10bytes b) 25bytes c) 30bytes d) 40bytes View Answer Answer: d Explanation: IPv6 datagram has fixed header length of 40bytes, which results in faster processing of the datagram. There is one fixed header and optional headers which may or may not exist. The fixed header contains the mandatory essential information about the packet while the optional headers contain the optional “not that necessary” information. advertisement 8. In an IPv6 header, the traffic class field is similar to which field in the IPv4 header? a) Fragmentation field b) Fast switching c) TOS field d) Option field View Answer Answer: c Explanation: The traffic class field is used to specify the priority of the IP packet which is a similar functionality to the Type of Service field in the IPv4 header. It’s an 8-bit field and its values are not defined in the RFC 2460. 9. IPv6 does not use ________ type of address. a) Broadcast b) Multicast /https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 4/7 2021/6/22 IPV4 & IPV6 Comparision - Computer Networks Questions & Answers - Sanfoundry c) Any cast d) Unicast View Answer Answer: a Explanation: There is no concept of broadcast address in IPv6. Instead, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4. advertisement 10. Which are the features present in IPv4 but not in IPv6? a) Fragmentation b) Header checksum c) Options d) Anycast address View Answer Answer: d Explanation: There is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-ipv4-ipv6-comparison 5/7 2021/6/22 Computer Networks Quiz - Sanfoundry Computer Networks Questions & Answers – Transition from IPV4 to IPV6 « Prev Next » This set of Computer Networks Quiz focuses on “Transition from IPV4 to IPV6”. 1. The main reason for transition from IPv4 to IPv6 is _________ a) Huge number of systems on the internet b) Very low number of system on the internet c) Providing standard address d) To provide faster internet View Answer Answer: a Explanation: Due to huge number of systems on the internet and the lower number of available addresses on IPv4, transition from IPv4 to IPv6 needs to happen. IPv4 provides around 4 billion unique IP addresses whereas IPv6 provides over 340 undecillion unique IP addresses. advertisement 2. Which of the following is not a transition strategy? a) Dual stack b) Tunneling /https://www.sanfoundry.com/computer-networks-questions-answers-quiz 1/7 2021/6/22 Computer Networks Quiz - Sanfoundry c) Conversion d) Header translation View Answer Answer: c Explanation: As IPv4 addresses are of 32 bits and IPv6 addresses are of 128 bits, it is not possible to convert IPv4 address to IPv6 address. So, Dual stack, tunneling and header translation are the three strategies which might help in the transition from IPv4 to IPv6. 3. To determine which version to use when sending a packet to a destination, the source host queries which of the following? a) Dual stack b) Domain Name Server c) Header information d) Transport layer View Answer Answer: b Explanation: Source host queries DNS to determine which version to use when sending a packet to a destination. The DNS contains both, the IPv4 and IPv6 addresses of the modern dual stack host servers. advertisement 4. The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is ______________ a) Dual stack b) Header translation c) Conversion /https://www.sanfoundry.com/computer-networks-questions-answers-quiz 2/7 2021/6/22 Computer Networks Quiz - Sanfoundry d) Tunneling View Answer Answer: d Explanation: In tunneling, The IPv4 routers can form a tunnel in which at the sender’s side, the IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver. 5. The correct format of packet in tunnel that uses IPv4 region is ________ i. IPv6 header ii. Payload iii. IPv4 header a) iii-i-ii b) iii-ii-i c) i-ii-iii d) i-iii-ii View Answer Answer: a Explanation: At the sender’s side, the IPv6 datagram is encapsulated in to IPv4 i.e. An IPv4 header is inserted on top of the IPv6 header, and then the packet is sent through the tunnel. advertisement 6. ___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6. a) Dual stack b) Header translation c) Conversion /https://www.sanfoundry.com/computer-networks-questions-answers-quiz 3/7 2021/6/22 Computer Networks Quiz - Sanfoundry d) Tunneling View Answer Answer: b Explanation: Header translation is used when the sender wants to use IPv6, but the receiver does not understand IPv6. It is made possible through a Network Address Translation – Protocol Translation enabled device such as a gateway. 7. Header translation uses ___________ to translate an IPv6 address to an IPv4 address. a) IP address b) Physical address c) Mapped address d) MAC address View Answer Answer: c Explanation: A mapped IPv6 address contains the IPv4 address in its last 32-bits and is preceded by 16 1s and 80 0s. It can be used to translate an IPv6 address to an IPv4 address. advertisement 8. Which of the following is not a step in the Header translation procedure? a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits b) The value of the IPv6 priority field is discarded c) The type of service field in IPv4 is set to zero d) The IPv6 flow label is considered View Answer Answer: d Explanation: In the header translation procedure, first the IPv6 mapped address is changed to /https://www.sanfoundry.com/computer-networks-questions-answers-quiz 4/7 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – ICMP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ICMP”. 1. Internet Control Message Protocol (ICMP) has been designed to compensate _________ a) Error-reporting b) Error-correction c) Host and management queries d) All of the mentioned View Answer Answer: d Explanation: IP by itself does not provide the features of error reporting or error correction. So, to address these issues a network layer protocol called Internet Control Message Protocol is used. ICMP operates over the IP packet to provide error reporting functionality. advertisement 2. Header size of the ICMP message is _________ a) 8-bytes b) 8-bits c) 16-bytes /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 1/8 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry d) 16-bits View Answer Answer: a Explanation: An ICMP message has an 8-byte header and a variable size data section. Out of the 8 bytes, the first 4 bytes are of a fixed format having the type, code and checksum fields and the next 4 bytes depend upon the type of the message. 3. During error reporting, ICMP always reports error messages to ________ a) Destination b) Source c) Next router d) Previous router View Answer Answer: b Explanation: ICMP notifies the source about the error when an error is detected because the datagram knows information about source and destination IP address. The source can then retransmit the data again or try to correct those errors. advertisement 4. Which of these is not a type of error-reporting message? a) Destination unreachable b) Source quench c) Router error d) Time exceeded View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 2/8 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: Router error is not a type of error-reporting message in ICMP. The type of error reporting message is specified in the ICMP header. Destination unreachable is type 3 error message, source quench is type 4, and time exceeded is type 11 error message. 5. ICMP error message will not be generated for a datagram having a special address such as _______ a) 127.0.0.0 b) 12.1.2 c) 11.1 d) 127 View Answer Answer: a Explanation: 127.0.0.0 is a special address known as the loopback address which is used for testing purpose of a machine without actually communicating with a network. Thus no error reporting message will be generated for such special addresses. advertisement 6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram. a) Destination unreachable b) Source quench c) Router error d) Time exceeded View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 3/8 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Router sends destination unreachable message if the destination is not found. Destination unreachable is type 3 error reporting message. It is invoked when the router can’t find a path to the intended destination to forward the packet through. 7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP. a) error control b) flow control c) router control d) switch control View Answer Answer: b Explanation: Firstly, it informs the source that the datagram has been discarded. Secondly, it warns the source that there is congestion in the network. It’s type 4 error reporting message after which the source is expected to reduce the flow of packets. advertisement 8. In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________ a) Remains constant b) Decremented by 2 c) Incremented by 1 d) Decremented by 1 View Answer Answer: d Explanation: This field will be decremented by 1 at every router, and will be zero by the time it /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 4/8 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry reaches source. This error reporting message is type 11 and is used to prevent the router from travelling forever in case some unknown path anomaly occurs. 9. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them. a) Half-trip time b) Round-trip time c) Travel time for the next router d) Time to reach the destination/source View Answer Answer: b Explanation: The round-trip time refers to the total time taken combining the time taken for a packet sent from a source to reach a destination and the time taken the acknowledgement sent by the destination to reach the source. The Router sends destination unreachable message if the destination is not found. advertisement 10. During debugging, we can use the ____________ program to find if a host is alive and responding. a) traceroute b) shell c) ping d) java View Answer Answer: c Explanation: Ping program is used to find if a host is alive and responding. It is to be entered /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 5/8 2021/6/22 ICMP - Computer Networks Questions & Answers - Sanfoundry into a command line with the syntax “ping (IP address)” to be executed. Traceroute is a program used to find the shortest route to the destination IP. 11. In windows ____________ can be used to trace the route of the packet from the source to the destination. a) traceroute b) tracert c) ping d) locater View Answer Answer: b Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX. Tracert is a program used to find the shortest route to the destination IP. The Router sends destination unreachable message if a path to the destination IP is not found. 12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ___________ a) 10101111 10100011 b) 01010000 01011100 c) 10101111 01011100 d) 01010000 10100011 View Answer Answer: a Explanation: The sender side adds the bits of the fragmented packet to find a sum. Checksum is the compliment of the sum (exchange 0’s and 1’s). The receiver then has to verify the checksum by adding the bits of the received packet to ensure that the packet is error-free. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – P2P Applications » Next - Computer Networks Questions & Answers – Transition from IPV4 to IPV6 advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-icmp 6/8 2021/6/22 Computer Networks Problems - Sanfoundry Computer Networks Questions & Answers – P2P Applications « Prev Next » This set of Computer Networks Problems focuses on “P2P Applications”. 1. Which layer is responsible for process-to-process delivery? a) Physical layer b) Network layer c) Transport layer d) Application layer View Answer Answer: c Explanation: The transport layer is responsible for process-to-process delivery, error control and flow control. It provides an interface for the implementation of process to process delivery through ports. There are 65,535 port numbers. advertisement 2. In process-to-process delivery, two processes communicate in which of the following methods? a) Client/Server b) Source/Destination /https://www.sanfoundry.com/computer-networks-problems 1/8 2021/6/22 Computer Networks Problems - Sanfoundry c) Message Transfer d) Peer to Peer View Answer Answer: a Explanation: The most common method used for this communication is Client/Server. The client requests a service through a particular port number to the port of the server using its socket address. Then the server responds by giving the requested service to the client port. 3. Multiple processes on destinations at transport layer are identified by __________ a) Mac address b) Port number c) Host number d) Host address View Answer Answer: b Explanation: Multiple processes on destinations are identified by a transport layer address also called as port number. The IP address along with the port number is called the socket address. advertisement 4. Range of port numbers in Internet model is __________ a) 0 and 32,765(8-bit) b) 0 and 32,765(16-bit) c) 0 and 65,535(32-bit) d) 0 and 65,535(16-bit) View Answer /https://www.sanfoundry.com/computer-networks-problems 2/8 2021/6/22 Computer Networks Problems - Sanfoundry Answer: d Explanation: Port numbers are 16-bit integers between 0 and 65,535. They are an interface for the implementation of process to process delivery for the transport layer. 5. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges? a) Well-known ports b) Registered ports c) Dynamic ports d) Static ports View Answer Answer: d Explanation: IANA divided port numbers into three ranges i.e., Well-known, Registered and Dynamic ports. Well-known port numbers range from 0 to 1023, registered port numbers are from 1024 to 49151 and dynamic port numbers are from 49152 to 65535. advertisement 6. The combination of an IP address and port number is called as ________ a) Socket address b) Port address c) MAC address d) Host address View Answer Answer: a Explanation: Socket address is the combination of an IP address and a port number and it is used to define the client-end and server-end processes uniquely. /https://www.sanfoundry.com/computer-networks-problems 3/8 2021/6/22 Computer Networks Problems - Sanfoundry 7. Which of the following is false with respect to Connectionless service of transport layer protocol? a) Packets are not numbered b) Packets are not delayed c) No acknowledgement d) Packet may arrive out of sequence View Answer Answer: b Explanation: There is a high probability in connectionless services like UDP that the packet gets delayed or lost because there is no connection made between the two end nodes. No connection means that there is no unique pathway for the packets to travel. advertisement 8. Correct order in the process of Connection-Oriented services is ________ i. Data transfer ii. Connection release iii. Connection establishment a) i-ii-iii b) iii-ii-i c) ii-i-iii d) iii-i-ii View Answer Answer: d Explanation: First the client has to request a connection and the server has to accept the connection to establish a connection. Then data transfer can start between the two ends. Then both client and server need to terminate their ends to terminate the connection. /https://www.sanfoundry.com/computer-networks-problems 4/8 2021/6/22 Computer Networks Problems - Sanfoundry 9. In transport layer, Multiplexing is done at _________ a) Channel b) Receiver site c) Sender site d) Packet View Answer Answer: c Explanation: At the sender’s side, there are multiple processes which may want to send packets. But there is only one transport layer protocol like TCP or UDP working at a time. So the transport layer protocol gets the messages from these processes and separates them with different port numbers. This process is called multiplexing and it is done before sending packets to the receivers side. advertisement 10. The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______ a) Delivery of packets b) Error correction c) Multiplexing d) Demultiplexing View Answer Answer: d Explanation: Demultiplexing is the process of error checking and dropping of the header, delivering messages to appropriate process based on port number. The transport layer does this on the receiver’s end after the packet is received and takes help of the header attached by the sender’s side transport layer during multiplexing. /https://www.sanfoundry.com/computer-networks-problems 5/8 2021/6/23 EIGRP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – EIGRP « Prev This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “EIGRP”. 1. EIGRP is a routing protocol design by Cisco. a) True b) False View Answer Answer: a Explanation: EIGRP stands for Enhanced Interior Gateway Routing Protocol is a routing protocol designed by Cisco. It is available only on Cisco routers. advertisement 2. EIGRP metric is ________ a) K-values b) Bandwidth only c) Hop Count d) Delay only View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 1/7 2021/6/23 EIGRP - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: EIGRP metric is K-values which are integers from 0 to 128. They are used to calculate the overall EIGRP cost with bandwidth and delay metrics. 3. EIGRP can support ____________ a) VLSM/subnetting b) Auto summary c) Unequal cast load balancing d) All of the mentioned View Answer Answer: d Explanation: EIGRP supports variable and fixed length subnetting, Auto summary, and Unequal cast load balancing to provide efficient routing functionality on Cisco routers. advertisement 4. EIGRP sends a hello message after every ___________ seconds. a) 5 seconds (LAN), 60 seconds (WAN) b) 5 seconds (LAN), 5 seconds (WAN) c) 15s d) 180s View Answer Answer: a Explanation: EIGRP routers broadcast the hello packets frequently to familiarize with the neighbors. EIGRP routers send the hello message after every 5 seconds on LAN, and every 60 seconds on WAN. /https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 2/7 2021/6/23 EIGRP - Computer Networks Questions & Answers - Sanfoundry 5. Administrative distance for internal EIGRP is ______ a) 90 b) 170 c) 110 d) 91 View Answer Answer: a Explanation: Routers use the metric of administrative distance to select the best path when there are different routes to the same destination from two different routing protocols as it is a measure of reliability of routing protocols. Administrative distance for internal EIGRP is 90. advertisement 6. The EIGRP metric values include: a) Delay b) Bandwidth c) MTU d) All of the mentioned View Answer Answer: d Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU. MTU stands for Maximum Transmission Unit. They are combined together to give the overall EIGRP cost in Kvalues. 7. For default gateway, which of following commands will you use on a Cisco router? a) IP default network b) IP default gateway c) IP default route /https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 3/7 2021/6/23 EIGRP - Computer Networks Questions & Answers - Sanfoundry d) Default network View Answer Answer: a Explanation: IP default network command is used to find the default gateway in Cisco router. If the router finds routes to the node, it considers the routes to that node for installation as the gateway to it. advertisement 8. Administrative distance for external EIGRP route is _______ a) 90 b) 170 c) 110 d) 100 View Answer Answer: b Explanation: Routers use the metric of administrative distance to select the best path when there are different routes to the same destination from two different routing protocols as it is a measure of reliability of routing protocols. Administrative distance for external EIGRP is 170. 9. EIGRP uses the ____________ algorithm for finding shortest path. a) SPF b) DUAL c) Linkstat d) Djikstra’s View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 4/7 2021/6/23 EIGRP - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: EIGRP uses the DUAL algorithm for finding shortest path. DUAL stands for diffusing update algorithm and it is used to prevent routing loops by recalculating routes globally. advertisement 10. In EIGRP best path is known as the successor, where as backup path is known as __________ a) Feasible successor b) Back-up route c) Default route d) There is no backup route in EIGRP View Answer Answer: a Explanation: Feasible successor is the backup path. The backup path is used alternatively used whenever the best path fails. It is not used primarily because it is comparatively expensive than the best path. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – PPP /https://www.sanfoundry.com/computer-networks-questions-answers-eigrp-2 5/7 2021/6/23 Basic Computer Networks Questions and Answers - Sanfoundry Computer Networks Questions & Answers – PPP « Prev Next » This set of Basic Computer Networks Questions and Answers focuses on “PPP”. 1. Both HDLC and PPP are Data link layer protocols. a) True b) False View Answer Answer: a Explanation: Both HDLC and PPP both are Data link layer protocol. HDLC stands for High level Data Link Control and PPP stands for Point to Point Protocol. advertisement 2. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network? a) LCP b) NCP Ad Online July 13: Don't Miss Out c) Both LCP and NCP ISO/IEC 19790 Conference /https://www.sanfoundry.com/computer-networks-basic-questions-answers 1/7 2021/6/23 Basic Computer Networks Questions and Answers - Sanfoundry d) TCP View Answer Answer: c Explanation: LCP stands for Link Control Protocol and NCP stands for Network Control Protocol. LCP and NCP are the PPP protocols which provide interface for handling the capabilities of the connection/link on the network. 3. The PPP protocol _________ a) Is designed for simple links which transport packets between two peers b) Is one of the protocols for making an Internet connection over a phone line c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line d) Is used for sharing bandwidth View Answer Answer: c Explanation: The PPP protocol is designed for handling simple links which transport packets between two peers. It is a standard protocol that is used to make an Internet connection over phone lines. advertisement 4. PPP provides the _______ layer in the TCP/IP suite. a) Link b) Network c) Transport d) Application View Answer /https://www.sanfoundry.com/computer-networks-basic-questions-answers 2/7 2021/6/23 Basic Computer Networks Questions and Answers - Sanfoundry Answer: a Explanation: PPP provides function of the link layer in the TCP/IP suite. It focuses on the link between two nodes that is going to be used by the users to communicate. It can use preinstalled phone line for the purpose. 5. PPP consists of ________components a) Three (encapsulating, the Domain Name system) b) Three (encapsulating, a link control protocol, NCP) c) Two (a link control protocol, Simple Network Control protocol) d) One (Simple Network Control protocol) View Answer Answer: b Explanation: PPP consists of three components namely Link Control Protocol (LCP), Network Control Protocol (NCP), and Encapsulation. LCP and NCP are the PPP protocols which provide interface for handling the capabilities of the connection/link on the network and encapsulation provides for multiplexing of different network-layer protocols. advertisement 6. The PPP encapsulation ____________ a) Provides for multiplexing of different network-layer protocols b) Requires framing to indicate the beginning and end of the encapsulation c) Establishing, configuring and testing the data-link connection d) Provides interface for handling the capabilities of the connection/link on the network View Answer Answer: a Explanation: Encapsulation is a part of PPP which provides means for multiplexing of different /https://www.sanfoundry.com/computer-networks-basic-questions-answers 3/7 2021/6/23 Basic Computer Networks Questions and Answers - Sanfoundry network-layer protocols. The other two parts of PPP are Link Control Protocol and Network Control Protocol. 7. A Link Control Protocol (LCP) is used for ____________ a) Establishing, configuring and testing the data-link connection b) Establishing and configuring different network-layer protocols c) Testing the different network-layer protocols d) Provides for multiplexing of different network-layer protocols View Answer Answer: a Explanation: The Link Control Protocol (LCP) is the part of PPP that is used for establishing, configuring and testing the data-link connection. The other two components are Network Control Protocol and Encapsulation. advertisement 8. A family of network control protocols (NCPs) ____________ a) Are a series of independently defined protocols that provide a dynamic b) Are a series of independently-defined protocols that encapsulate c) Are a series of independently defined protocols that provide transparent d) The same as NFS View Answer Answer: b Explanation: The family of network control protocols (NCPs) is a series of independentlydefined protocols that encapsulate the data flowing between the two nodes. It provides means for the network nodes to control the link traffic. /https://www.sanfoundry.com/computer-networks-basic-questions-answers 4/7 2021/6/23 Basic Computer Networks Questions and Answers - Sanfoundry 9. Choose the correct statement from the following. a) PPP can terminate the link at any time b) PPP can terminate the link only during the link establishment phase c) PPP can terminate the link during the authentication phase d) PPP can terminate the link during the callback control phase View Answer Answer: a Explanation: PPP allows termination of the link at any time in any phase because it works on the data link layer which is the layer in control of the link of the communication. advertisement 10. The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states. a) Link-termination phase b) Link establishment phase c) Authentication phase d) Link dead phase View Answer Answer: d Explanation: The link necessarily begins and ends with the link dead phase. During this phase, the LCP automata will be in the initial or its final state. The link is non-functioning or inactive during the link dead phase. Sanfoundry Global Education & Learning Series – Computer Networks. To practice basic questions and answers on all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-basic-questions-answers 5/7 2021/6/23 Computer Networks Questions for Entrance Exams - Sanfoundry Computer Networks Questions & Answers – Intrusion Detection Systems « Prev Next » This set of Computer Networks Questions and Answers for Entrance exams focuses on “Intrusion Detection Systems”. 1. Which of the following is an advantage of anomaly detection? a) Rules are easy to define b) Custom protocols can be easily analyzed c) The engine can scale as the rule set grows d) Malicious activity that falls within normal usage patterns is detected View Answer Answer: c Explanation: Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily than the signature-based model because a new signature does not have to be created for every attack and potential variant. advertisement 2. A false positive can be defined as ________ a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior /https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 1/8 2021/6/23 Computer Networks Questions for Entrance Exams - Sanfoundry b) An alert that indicates nefarious activity on a system that is not running on the network c) The lack of an alert for nefarious activity d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network View Answer Answer: d Explanation: A false positive is any alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior. 3. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement? a) Inside the firewall b) Outside the firewall c) Both inside and outside the firewall d) Neither inside the firewall nor outside the firewall. View Answer Answer: a Explanation: There are legitimate political, budgetary and research reasons to want to see all the “attacks” against your connection, but given the care and feeding any IDS requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall. advertisement 4. What is the purpose of a shadow honeypot? a) To flag attacks against known vulnerabilities b) To help reduce false positives in a signature-based IDS c) To randomly check suspicious traffic identified by an anomaly detection system /https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 2/8 2021/6/23 Computer Networks Questions for Entrance Exams - Sanfoundry d) To enhance the accuracy of a traditional honeypot View Answer Answer: c Explanation: “Shadow honeypots,” as researchers call them, share all the same characteristics of protected applications running on both the server and client side of a network and operate in conjunction with an ADS. 5. At which two traffic layers do most commercial IDSes generate signatures? a) Application layer and Network layer b) Network layer and Session Layer c) Transport layer and Application layer d) Transport layer and Network layer View Answer Answer: d Explanation: Most commercial IDSes generate signatures at the network and transport layers. These signatures are used to ensure that no malicious operation is contained in the traffic. Nemean generates signature at application and session layer. advertisement 6. IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component? a) Inspection of password files to detect inadvisable passwords b) Mechanisms put in place to reenact known methods of attack and record system responses c) Inspection of system to detect policy violations d) Inspection of configuration files to detect inadvisable settings View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 3/8 2021/6/23 Computer Networks Questions for Entrance Exams - Sanfoundry Answer: b Explanation: Secondary components of mechanism are set in place to reenact known methods of attack and to record system responses. In passive components, the system I designed just to record the system’s responses in case of an intrusion. 7. When discussing IDS/IPS, what is a signature? a) An electronic signature used to authenticate the identity of a user on the network b) Attack-definition file c) It refers to “normal,” baseline network behavior d) It is used to authorize the users on a network View Answer Answer: b Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. Nemean is a popular signature generation method for conventional computer networks. advertisement 8. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers? a) Application layer and Transport layer b) Network layer and Application layer c) Session layer and Transport layer d) Application layer and Session layer View Answer Answer: d Explanation: Nemean automatically generates “semantics-aware” signatures based on traffic /https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 4/8 2021/6/23 Computer Networks Questions for Entrance Exams - Sanfoundry at the session and application layers. These signatures are used to ensure that no malicious operation is contained in the traffic. 9. Which of the following is used to provide a baseline measure for comparison of IDSes? a) Crossover error rate b) False negative rate c) False positive rate d) Bit error rate View Answer Answer: a Explanation: As the sensitivity of systems may cause the false positive/negative rates to vary, it’s critical to have some common measure that may be applied across the board. advertisement 10. Which of the following is true of signature-based IDSes? a) They alert administrators to deviations from “normal” traffic behavior b) They identify previously unknown attacks c) The technology is mature and reliable enough to use on production networks d) They scan network traffic or packets to identify matches with attack-definition files View Answer Answer: d Explanation: They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-entrance-exams 5/8 2021/6/23 RPC - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – RPC « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RPC”. 1. An RPC (remote procedure call) is initiated by the _________ a) server b) client c) client after the sever d) a third party View Answer Answer: b Explanation: Remote Procedure Call is a method used for constructing distributed, clientserver applications based on extending the conventional local procedure calling where the client initiates an RPC to start a connection process. advertisement 2. In RPC, while a server is processing the call, the client is blocked ________ a) unless the client sends an asynchronous request to the server b) unless the call processing is complete c) for the complete duration of the connection /https://www.sanfoundry.com/computer-networks-questions-answers-rpc 1/7 2021/6/23 RPC - Computer Networks Questions & Answers - Sanfoundry d) unless the server is disconnected View Answer Answer: a Explanation: While the server is processing the call i.e. looking through the specifications, the client is blocked, unless the client sends an asynchronous request to the server for another operation. 3. A remote procedure call is _______ a) inter-process communication b) a single process c) a single thread d) a single stream View Answer Answer: a Explanation: Remote procedure calls is a form of inter-process communication where the client initiates an RPC to start a connection process. It is used to construct distributed, clientserver applications. advertisement 4. RPC allows a computer program to cause a subroutine to execute in _________ a) its own address space b) another address space c) both its own address space and another address space d) applications address space View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-rpc 2/7 2021/6/23 RPC - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: RPC allows a computer program to cause a subroutine to execute in another address space which is usually the servers address space in a conventional client-server network. 5. RPC works between two processes. These processes must be ____________ a) on the same computer b) on different computers connected with a network c) on the same computer and also on different computers connected with a network d) on none of the computers View Answer Answer: c Explanation: For the operation of RPC between two processes, it is mandatory that the processes are present on the same computer and also on different computers connected with its network. advertisement 6. A remote procedure is uniquely identified by _________ a) program number b) version number c) procedure number d) all of the mentioned View Answer Answer: d Explanation: Each remote procedure can be uniquely identified by the program number, version number and the procedure number in the networks scope. The identifiers can be used to control the remote procedure by parties involved in the process. /https://www.sanfoundry.com/computer-networks-questions-answers-rpc 3/7 2021/6/23 RPC - Computer Networks Questions & Answers - Sanfoundry 7. An RPC application requires _________ a) specific protocol for client server communication b) a client program c) a server program d) all of the mentioned View Answer Answer: d Explanation: The RPC technique for constructing distributed, client-server applications based on extending the conventional local procedure calling. It requires a client program, a server program and specific protocol for client server communication to build the system. advertisement 8. RPC is used to _________ a) establish a server on remote machine that can respond to queries b) retrieve information by calling a query c) establish a server on remote machine that can respond to queries and retrieve information by calling a query d) to secure the client View Answer Answer: c Explanation: RPC or Remote Procedure Call is used to establish a server on remote machine that can respond to queries and to retrieve information by calling a query by other computers. 9. RPC is a _________ a) synchronous operation b) asynchronous operation c) time independent operation /https://www.sanfoundry.com/computer-networks-questions-answers-rpc 4/7 2021/6/23 RPC - Computer Networks Questions & Answers - Sanfoundry d) channel specific operation View Answer Answer: a Explanation: RPC is a synchronous operation where the remote machine works in sync with the other machines to act as a server that can respond to queries called by the other machines. advertisement 10. The local operating system on the server machine passes the incoming packets to the ___________ a) server stub b) client stub c) client operating system d) client process View Answer Answer: a Explanation: The local operating system on the server machine passes the incoming packets to the server stub which then processes the packets which contain the queries from the client machines for retrieving information. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-rpc 5/7 2021/6/23 RTP - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – RTP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RTP”. 1. Real-time transport protocol (RTP) is mostly used in _________ a) streaming media b) video teleconference c) television services d) all of the mentioned View Answer Answer: d Explanation: RTP stands for Real-time transport protocol and is for delivering audio and video over IP networks. Its applications include streaming media, video teleconference, and television services. advertisement 2. RTP is used to ________ a) carry the media stream b) monitor transmission statistics of streams c) monitor quality of service of streams /https://www.sanfoundry.com/computer-networks-questions-answers-rtp 1/7 2021/6/23 RTP - Computer Networks Questions & Answers - Sanfoundry d) secure the stream View Answer Answer: a Explanation: RTP is used to carry the media stream for delivering audio and video over IP networks. Its applications include streaming media, video teleconference, and television services. 3. RTP provides the facility of jitter ____________ a) media stream b) expansion c) media modification d) security View Answer Answer: a Explanation: RTP provides the facility of jitter media stream through a jitter buffer which works by reconstructing the sequence of packets on the receiving side. Then an even audio / video stream is generated. advertisement 4. Which protocol provides the synchronization between media streams? a) RTP b) RTCP c) RPC d) RTCT View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-rtp 2/7 2021/6/23 RTP - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: RTCP stands for Real-time Transport Control Protocol and it works with RTP to send control packets to the users of the networks while RTP handles the actual data delivery. 5. An RTP session is established for ____________ a) each media stream b) all media streams c) some predefined number of media streams d) no media stream View Answer Answer: a Explanation: An RTP session is required to be established for each media stream for delivering audio and video over the IP network. Each session has independent data transmission. advertisement 6. RTP can use __________ a) unprevileleged UDP ports b) stream control transmission protocol c) datagram congestion control protocol d) all of the mentioned View Answer Answer: d Explanation: RTP uses unprevileleged UDP ports, stream control transmission protocol, and datagram congestion control protocol for data delivery over IP networks. 7. Which one of the following multimedia formats can not be supported by RTP? a) MPEG-4 /https://www.sanfoundry.com/computer-networks-questions-answers-rtp 3/7 2021/6/23 RTP - Computer Networks Questions & Answers - Sanfoundry b) MJPEG c) MPEG d) TXT View Answer Answer: d Explanation: RTP is suitable only for multimedia and not for simple text files as the operation would result into wastage of resources. Other protocols like FTP are suitable for such transmissions. advertisement 8. An RTP header has a minimum size of _________ a) 12 bytes b) 16 bytes c) 24 bytes d) 32 bytes View Answer Answer: a Explanation: Each RTP packet has a fixed header of size 12 bytes that contains essential control information like timestamp, payload type etc. for the receiving system processing. 9. Which one of the following is not correct? a) RTCP provides canonical end-point identifiers to all session participants b) RTCP reports are expected to be sent by all participants c) RTCP itself does not provide any flow encryption or authentication methods d) RTCP handles the actual data delivery View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-rtp 4/7 2021/6/23 RTP - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: RTCP works with RTP to send control packets to the users of the networks and provide canonical end-point identifiers to all session participants while RTP handles the actual data delivery. advertisement 10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data? a) SRTP b) RTCP c) RCP d) RTCT View Answer Answer: a Explanation: SRTP stands for Secure Real-time Transport Protocol. It is like an extension to RTP which provides stream security through encryption, message authentication and integrity, and replay attack protection. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – SONET /https://www.sanfoundry.com/computer-networks-questions-answers-rtp 5/7 2021/6/23 SONET - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – SONET « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SONET”. 1. SONET stands for ___________ a) synchronous optical network b) synchronous operational network c) stream optical network d) shell operational network View Answer Answer: a Explanation: SONET stands for synchronous optical network. Frame relay uses SONET to physically transmit data frames over a Frame Relay network as SONET is cheaper and provides better network reliability than other carriers. advertisement 2. In SONET, STS-1 level of electrical signalling has the data rate of _________ a) 51.84 Mbps b) 155.52 Mbps /https://www.sanfoundry.com/computer-networks-questions-answers-sonet 1/7 2021/6/23 SONET - Computer Networks Questions & Answers - Sanfoundry c) 2488.320 Mbps d) 622.080 Mbps View Answer Answer: a Explanation: STS-1 level provides the data rate of 51.84 Mbps, STS-3 provides a data rate of 155.52 Mbps, STS-12 provides a data rate of 622.080 Mbps and STS-48 provides a data rate of 2488.320 Mbps. 3. The path layer of SONET is responsible for the movement of a signal _________ a) from its optical source to its optical destination b) across a physical line c) across a physical section d) back to its optical source View Answer Answer: b Explanation: The path layer in SONET is responsible for finding the path of the signal across the physical line to reach the optical destination. It is ideally expected to find the shortest and the most reliable path to the destination. advertisement 4. The photonic layer of the SONET is similar to the __________ of OSI model. a) network layer b) data link layer c) physical layer d) transport layer View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-sonet 2/7 2021/6/23 SONET - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: The photonic layer in SONET is like the physical layer of the OSI model. It is the lowest layer among the four layers of SONET namely the photonic, the section, the line, and the path layers. 5. In SONET, each synchronous transfer signal STS-n is composed of __________ a) 2000 frames b) 4000 frames c) 8000 frames d) 16000 frames View Answer Answer: c Explanation: SONET defines the electrical signal as STS-N (Synchronous Transport Signal LevelN) and the optical signal as OC-N (Optical Carrier Level-N). The building block of SONET is the STS-1/OC-1 signal, which is based on an 8-kHz frame rate and operates at 51.84 Mbps. advertisement 6. Which one of the following is not true about SONET? a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame b) multiplexing is synchronous TDM c) all clocks in the network are locked to a master clock d) STS-1 provides the data rate of 622.080Mbps View Answer Answer: d Explanation: In SONET, STS-N stands for Synchronous Transport Signal Level-N. STS-1 level provides the data rate of 51.84 Mbps, and STS-12 provides a data rate of 622.080 Mbps. /https://www.sanfoundry.com/computer-networks-questions-answers-sonet 3/7 2021/6/23 SONET - Computer Networks Questions & Answers - Sanfoundry 7. A linear SONET network can be ________ a) point-to-point b) multi-point c) both point-to-point and multi-point d) single point View Answer Answer: c Explanation: Synchronous Optical Network (SONET) is basically an optical fiber point-to-point or ring network backbone that provides a way to accommodate additional capacity as the needs of the organization increase to multipoint networks. advertisement 8. Automatic protection switching in linear network is defined at the _______ a) line layer b) section layer c) photonic layer d) path layer View Answer Answer: a Explanation: The Line layer in SONET operates like the data link layer in the OSI model and it is responsible for the movement of signal across a physical line. The Synchronous Transport Signal Mux/Demux and Add/Drop Mux provide the Line layer functions. 9. A unidirectional path switching ring is a network with __________ a) one ring b) two rings c) three rings /https://www.sanfoundry.com/computer-networks-questions-answers-sonet 4/7 2021/6/23 SONET - Computer Networks Questions & Answers - Sanfoundry d) four rings View Answer Answer: b Explanation: One ring is used as the working ring and other as the protection ring in which each node is connected to its respective adjacent nodes by two fibers, one to transmit, and one to receive. advertisement 10. What is SDH? a) sdh is similar standard to SONET developed by ITU-T b) synchronous digital hierarchy c) sdh stands for synchronous digital hierarchy and is a similar standard to SONET developed by ITU-T d) none of the mentioned View Answer Answer: c Explanation: SDH is a standard that allows low bit rates to be combined into high-rate data streams and as it is synchronous, each individual bit stream can be embedded into and extracted from high-rate data streams easily. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-sonet 5/7 2021/6/23 WiMAX - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – WiMAX « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “WiMAX”. 1. WiMAX stands for ___________ a) wireless maximum communication b) worldwide interoperability for microwave access c) worldwide international standard for microwave access d) wireless internet maximum communication View Answer Answer: b Explanation: WiMAX or worldwide interoperability for microwave access is a set of wireless communication standards. It provides support for multiple physical layer (PHY) and Media Access Control (MAC) options. It is based on IEEE 802.16 standards. advertisement 2. WiMAX provides ________ a) simplex communication b) half duplex communication /https://www.sanfoundry.com/computer-networks-questions-answers-wimax 1/7 2021/6/23 WiMAX - Computer Networks Questions & Answers - Sanfoundry c) full duplex communication d) no communication View Answer Answer: c Explanation: WiMax was developed to provide wireless broadband access to buildings. It can also be used to connect WLAN hotspots to the Internet. It is based on IEEE 802.16 standards. 3. WiMAX uses the _________ a) orthogonal frequency division multiplexing b) time division multiplexing c) space division multiplexing d) channel division multiplexing View Answer Answer: a Explanation: WiMAX physical layer uses orthogonal frequency division multiplexing as it provides simplified reception in multipath and allows WiMAX to operate in NLOS conditions. advertisement 4. Which of the following modulation schemes is supported by WiMAX? a) binary phase shift keying modulation b) quadrature phase shift keying modulation c) quadrature amplitude modulation d) all of the mentioned View Answer Answer: d Explanation: WiMAX supports a variety of modulation schemes such as binary phase shift /https://www.sanfoundry.com/computer-networks-questions-answers-wimax 2/7 2021/6/23 WiMAX - Computer Networks Questions & Answers - Sanfoundry keying modulation, quadrature phase shift keying modulation, and quadrature amplitude modulation and allows for the scheme to change on a burst-by-burst basis per link, depending on channel conditions. 5. WiMAX MAC layer provides an interface between ___________ a) higher transport layers and physical layer b) application layer and network layer c) data link layer and network layer d) session layer and application layer View Answer Answer: a Explanation: WiMAX provides support for multiple physical layer (PHY) on the physical layer and Media Access Control (MAC) options for higher layers to provide wireless broadband access to buildings. advertisement 6. For encryption, WiMAX supports _______ a) advanced encryption standard b) triple data encryption standard c) advanced encryption standard and triple data encryption standard d) double data encryption standard View Answer Answer: c Explanation: Both advanced encryption standard and triple data encryption standard are block cipher techniques and are popularly used in WiMAX and other applications for secure encryption. /https://www.sanfoundry.com/computer-networks-questions-answers-wimax 3/7 2021/6/23 WiMAX - Computer Networks Questions & Answers - Sanfoundry 7. WiMAX provides _______ a) VoIP services b) IPTV services c) Both VoIP and IPTV services d) no IPTV services View Answer Answer: c Explanation: IPTV can be transmitted over WiMAX, and relies on packet-switching to offer reliable delivery. VoIP can be operated over a WiMax network with no special hardware or software. advertisement 8. Devices that provide the connectivity to a WiMAX network are known as _________ a) subscriber stations b) base stations c) gateway d) switch stations View Answer Answer: a Explanation: Subscriber stations in WiMAX are transceivers (transmitter and receivers). They are used to convert radio signals into digital signals that can be routed to and from communication devices. There is a variety of types of WiMAX subscriber stations like portable PCMCIA cards and fixed stations that provide service to multiple users. 9. WiMAX is mostly used for __________ a) local area network b) metropolitan area network /https://www.sanfoundry.com/computer-networks-questions-answers-wimax 4/7 2021/6/23 WiMAX - Computer Networks Questions & Answers - Sanfoundry c) personal area network d) wide area network View Answer Answer: b Explanation: WiMAX provides Wi-Fi connectivity within the home or business for computers and smartphones. WiMAX network operators typically provide a WiMAX Subscriber Unit to do so. The subscriber unit is used to connect to the metropolitan WiMAX network. advertisement 10. Which of the following frequencies is not used in WiMAX for communication? a) 2.3 GHz b) 2.4 GHz c) 2.5 GHz d) 3.5 GHz View Answer Answer: b Explanation: The 2.4GHz ISM frequency band is used for personal area network technologies such as Bluetooth and hence is not suitable for WiMAX which is mostly used for Metropolitan Area Networks. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! /https://www.sanfoundry.com/computer-networks-questions-answers-wimax 5/7 2021/6/23 Bluetooth - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Bluetooth « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Bluetooth”. 1. An interconnected collection of piconet is called ___________ a) scatternet b) micronet c) mininet d) multinet View Answer Answer: a Explanation: Piconet is the basic unit of a bluetooth system having a master node and upto seven active slave nodes. A collection of piconets is called scatternet and a slave node of a piconet may act as a master in a piconet that is part of the scatternet. advertisement 2. In a piconet, there can be up to ________ parked nodes in the network. a) 63 b) 127 /https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 1/7 2021/6/23 Bluetooth - Computer Networks Questions & Answers - Sanfoundry c) 255 d) 511 View Answer Answer: c Explanation: A slave node in a piconet can be instructed by the master node to go into parked mode. Then the slave node enters the parked mode in which the node is not disconnected from the network but is inactive unless the master wakes it up. 3. Bluetooth is the wireless technology for __________ a) local area network b) personal area network c) metropolitan area network d) wide area network View Answer Answer: b Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission. advertisement 4. Bluetooth uses __________ a) frequency hopping spread spectrum b) orthogonal frequency division multiplexing c) time division multiplexing d) channel division multiplexing View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 2/7 2021/6/23 Bluetooth - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: Frequency hopping spread spectrum is a method of transmitting radio signals by rapidly changing the carrier frequency and is controlled by the codes known to the sender and receiver only. 5. Unauthorised access of information from a wireless device through a bluetooth connection is called _________ a) bluemaking b) bluesnarfing c) bluestring d) bluescoping View Answer Answer: b Explanation: Unauthorised access of information from a wireless device through a bluetooth connection is called Bluesnarfing. It is done through exploiting the vulnerabilities of the Bluetooth device to steal the transmitted information. advertisement 6. What is A2DP (advanced audio distribution profile)? a) a bluetooth profile for streaming audio b) a bluetooth profile for streaming video c) a bluetooth profile for security d) a bluetooth profile for file management View Answer Answer: a Explanation: A2DP stands for Advanced Audio Distribution Profile is a transfer standard use to /https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 3/7 2021/6/23 Bluetooth - Computer Networks Questions & Answers - Sanfoundry transmit high definition audio through Bluetooth. It is mainly used in Bluetooth speakers and wireless headphones. 7. In a piconet, one master device ________ a) can not be slave b) can be slave in another piconet c) can be slave in the same piconet d) can be master in another piconet View Answer Answer: b Explanation: In a scatternet, a slave node of one piconet may act as a master in a piconet that is part of the scatternet. The scatternet uses this property to connect many piconets together to create a larger network. advertisement 8. Bluetooth transceiver devices operate in ______ band. a) 2.4 GHz ISM b) 2.5 GHz ISM c) 2.6 GHz ISM d) 2.7 GHz ISM View Answer Answer: a Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for transmission. It is used to create a wireless personal area network for data transfer up to a distance of 10 meters. 9. Bluetooth supports _______ a) point-to-point connections /https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 4/7 2021/6/23 Bluetooth - Computer Networks Questions & Answers - Sanfoundry b) point-to-multipoint connection c) both point-to-point connections and point-to-multipoint connection d) multipoint to point connection View Answer Answer: c Explanation: In Bluetooth, each slave node communicates with the master of the piconet independently i.e. each master-slave connection is independent. The slave is not allowed to communicate with other slaves directly. advertisement 10. A scatternet can have maximum __________ a) 10 piconets b) 20 piconets c) 30 piconets d) 40 piconets View Answer Answer: a Explanation: A scatternet can have maximum of 10 piconets and minimum of 2 piconets. To connect these piconets, a slave node of one piconet may act as a master in a piconet that is part of the scatternet. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-bluetooth 5/7 2021/6/23 Internet - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Internet « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”. 1. What is internet? a) a single network b) a vast collection of different networks c) interconnection of local area networks d) interconnection of wide area networks View Answer Answer: b Explanation: Internet is nothing but an interconnected computer network providing a variety of communication facilities, consisting of a huge amount of small networks using standardized communication protocols. advertisement 2. To join the internet, the computer has to be connected to a _________ a) internet architecture board b) internet society /https://www.sanfoundry.com/computer-networks-questions-answers-internet 1/7 2021/6/23 Internet - Computer Networks Questions & Answers - Sanfoundry c) internet service provider d) different computer View Answer Answer: c Explanation: The ISPs (Internet Service Providers) are the main agents through which every computer is connected to the internet. They are licensed to allot public IP addresses to its customers in order to connect them to the internet. 3. Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ a) leased line b) digital subscriber line c) digital signal line d) digital leased line View Answer Answer: b Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing telephone lines to transport high-bandwidth data to service subscribers. DSL was used to allow the early users access to the internet and it provides dedicated, point-to-point, public network access. advertisement 4. ISP exchanges internet traffic between their networks by __________ a) internet exchange point b) subscriber end point c) isp end point /https://www.sanfoundry.com/computer-networks-questions-answers-internet 2/7 2021/6/23 Internet - Computer Networks Questions & Answers - Sanfoundry d) internet end point View Answer Answer: a Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange Points. ISPs and CDNs are connected to each other at these physical locations are they help them provide better service to their customers. 5. Which of the following protocols is used in the internet? a) HTTP b) DHCP c) DNS d) DNS, HTTP and DNS View Answer Answer: d Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to allot IPs automatically to the users on the internet, and DNS is used to connect the users to the host servers on the internet based on the Domain Name. advertisement 6. The size of an IP address in IPv6 is _________ a) 32 bits b) 64 bits c) 128 bits d) 265 bits View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-internet 3/7 2021/6/23 Internet - Computer Networks Questions & Answers - Sanfoundry Answer: c Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses. 7. Internet works on _______ a) packet switching b) circuit switching c) both packet switching and circuit switching d) data switching View Answer Answer: a Explanation: Packet switching is the method based on which the internet works. Packet switching features delivery of packets of data between devices over a shared network. advertisement 8. Which one of the following is not an application layer protocol used in internet? a) remote procedure call b) internet relay chat c) resource reservation protocol d) local procedure call View Answer Answer: c Explanation: Resource reservation protocol is a transport layer protocol used on the internet. It operates over IPv4 and IPv6 and is designed to reserve resources required by the network layer protocols. /https://www.sanfoundry.com/computer-networks-questions-answers-internet 4/7 2021/6/23 Internet - Computer Networks Questions & Answers - Sanfoundry 9. Which protocol assigns IP address to the client connected in the internet? a) DHCP b) IP c) RPC d) RSVP View Answer Answer: a Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely assign IP address to the clients connected to the internet. The server that performs this fuction is called the DHCP server. advertisement 10. Which one of the following is not used in media access control? a) ethernet b) digital subscriber line c) fiber distributed data interface d) packet switching View Answer Answer: d Explanation: Packet switching is not really related to media access control as it just features delivery of packets of data between devices over a shared network. Internet is actually based on packet switching. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-internet 5/7 2021/6/23 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Wireless LAN « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Wireless LAN”. 1. What is the access point (AP) in a wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) all the nodes in the network View Answer Answer: a Explanation: Access point in a wireless network is any device that will allow the wireless devices to a wired network. A router is the best example of an Access Point. advertisement 2. In wireless ad-hoc network _________ a) access point is not required b) access point is must /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 1/7 2021/6/23 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry c) nodes are not required d) all nodes are access points View Answer Answer: a Explanation: An ad-hoc wireless network is a decentralized kind of a wireless network. An access point is usually a central device and it would go against the rules of the ad-hoc network to use one. Hence it is not required. 3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD View Answer Answer: b Explanation: CSMA/CA stands for Carrier-sense multiple access/collision avoidance. It is a multiple access protocol used by IEEE 802.11 standard for wireless LAN. It’s based on the principle of collision avoidance by using different algorithms to avoid collisions between channels. advertisement 4. In wireless distribution system __________ a) multiple access point are inter-connected with each other b) there is no access point c) only one access point exists d) access points are not required View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 2/7 2021/6/23 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: A Wireless Distribution System allows the connection of multiple access points together. It is used to expand a wireless network to a larger network. 5. A wireless network interface controller can work in _______ a) infrastructure mode b) ad-hoc mode c) both infrastructure mode and ad-hoc mode d) WDS mode View Answer Answer: c Explanation: A wireless network interface controller works on the physical layer and the data link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required. advertisement 6. In wireless network an extended service set is a set of ________ a) connected basic service sets b) all stations c) all access points d) connected access points View Answer Answer: a Explanation: The extended service set is a part of the IEEE 802.11 WLAN architecture and is used to expand the range of the basic service set by allowing connection of multiple basic service sets. /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 3/7 2021/6/23 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry 7. Mostly ________ is used in wireless LAN. a) time division multiplexing b) orthogonal frequency division multiplexing c) space division multiplexing d) channel division multiplexing View Answer Answer: b Explanation: In orthogonal frequency division multiplexing, digital data is encoded on multiple carrier frequencies. It is also used in digital television and audio broadcasting in addition to Wireless LANs. advertisement 8. Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks View Answer Answer: a Explanation: Collision detection is not possible in wireless LAN with no extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless LANs. 9. What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 4/7 2021/6/23 Wireless LAN - Computer Networks Questions & Answers - Sanfoundry d) security algorithm for emails View Answer Answer: b Explanation: WEP is a security algorithm for wireless network which intended to provide data confidentiality comparable to that of traditional wired networks. It was introduced in 1997. advertisement 10. What is WPA? a) wi-fi protected access b) wired protected access c) wired process access d) wi-fi process access View Answer Answer: a Explanation: WPA or WiFi Protected Access is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest /https://www.sanfoundry.com/computer-networks-questions-answers-wireless-lan 5/7 2021/6/23 Ethernet - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Ethernet « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ethernet”. 1. Ethernet frame consists of ____________ a) MAC address b) IP address c) Default mask d) Network address View Answer Answer: a Explanation: The Ethernet frame has a header that contains the source and destination MAC address. Each MAC address is of 48 bits. advertisement 2. What is start frame delimeter (SFD) in ethernet frame? a) 10101010 b) 10101011 c) 00000000 /https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 1/7 2021/6/23 Ethernet - Computer Networks Questions & Answers - Sanfoundry d) 11111111 View Answer Answer: b Explanation: The start frame delimiter is a 1 byte field in the Ethernet frame that indicates that the preceding bits are the start of the frame. It is always set to 10101011. 3. MAC address is of ___________ a) 24 bits b) 36 bits c) 42 bits d) 48 bits View Answer Answer: d Explanation: MAC address is like a local address for the NIC that is used to make a local Ethernet (or wifi) network function. It is of 48 bits. advertisement 4. What is autonegotiation? a) a procedure by which two connected devices choose common transmission parameters b) a security algorithm c) a routing algorithm d) encryption algorithm View Answer Answer: a Explanation: autonegotiation is a procedure by which two connected devices choose common /https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 2/7 2021/6/23 Ethernet - Computer Networks Questions & Answers - Sanfoundry transmission parameters. It is a signaling mechanism used in Ethernet over Twisted pair cables. 5. Ethernet in metropolitan area network (MAN) can be used as ___________ a) pure ethernet b) ethernet over SDH c) ethernet over MPLS d) all of the mentioned View Answer Answer: d Explanation: A metropolitan area network (MAN) that is based on Ethernet standards is called an Ethernet MAN. It is commonly used to connect nodes to the Internet. Businesses also use Ethernet MANs to connect their own offices to each other. advertisement 6. A point-to-point protocol over ethernet is a network protocol for __________ a) encapsulating PPP frames inside ethernet frames b) encapsulating ehternet framse inside PPP frames c) for security of ethernet frames d) for security of PPP frames View Answer Answer: a Explanation: PPoE or Point-to-Point protocol over Ethernet was first introduced in 1999. It is popularly used by modern day Internet Service Providers for Dial-up connectivity. 7. High speed ethernet works on _________ a) coaxial cable /https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 3/7 2021/6/23 Ethernet - Computer Networks Questions & Answers - Sanfoundry b) twisted pair cable c) optical fiber d) unshielded twisted pair cable View Answer Answer: c Explanation: Fast Ethernet is mostly used in networks along with Category 5 (Cat-5) copper twisted-pair cable, but it also works with fiber-optic cable. Based on the cable being used, There can be three types of Fast Ethernet. advertisement 8. The maximum size of payload field in ethernet frame is __________ a) 1000 bytes b) 1200 bytes c) 1300 bytes d) 1500 bytes View Answer Answer: d Explanation: The minimum size of the payload field is 40 bytes and the maximum size is 1500 bytes. If the payload size exceeds 1500 bytes, the frame is called a jumbo frame. 9. What is interframe gap? a) idle time between frames b) idle time between frame bits c) idle time between packets d) idle time between networks View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 4/7 2021/6/23 Ethernet - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: The inter-frame gap is the idle time for the receiver between the incoming frame flow. The inter-frame gap must be as low as possible for idle connections. advertisement 10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called _______ a) short frame b) runt frame c) mini frame d) man frame View Answer Answer: b Explanation: An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called a runt frame. Such frames are a result of collisions or software malfunctions. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Network Utilities » Next - Computer Networks Questions & Answers – Wireless LAN /https://www.sanfoundry.com/computer-networks-questions-answers-ethernet 5/7 2021/6/23 Network Utilities - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Network Utilities « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Utilities”. 1. Ping can _________ a) Measure round-trip time b) Report packet loss c) Report latency d) All of the mentioned View Answer Answer: d Explanation: PING (Packet Internet Groper) command is the best way to test connectivity between two nodes, whether it is Local Area Network (LAN) or Wide Area Network (WAN). Ping uses ICMP (Internet Control Message Protocol) to communicate to other devices. advertisement 2. Ping sweep is a part of _________ a) Traceroute b) Nmap /https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 1/7 2021/6/23 Network Utilities - Computer Networks Questions & Answers - Sanfoundry c) Route d) Ipconfig View Answer Answer: b Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap. A ping sweep is basically a collective ping command execution on a range of IP addresses. 3. ICMP is used in _________ a) Ping b) Traceroute c) Ifconfig d) Both Ping & Traceroute View Answer Answer: d Explanation: ICMP stands for Internet Control Message Protocol. ICMP operates over the IP packet to provide error reporting functionality, so in case the node is not active or there is no route, ICMP will be used to report the specific errors for Ping and Traceroute. advertisement 4. __________ command is used to manipulate TCP/IP routing table. a) route b) Ipconfig c) Ifconfig d) Traceroute View Answer /https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 2/7 2021/6/23 Network Utilities - Computer Networks Questions & Answers - Sanfoundry Answer: a Explanation: The route command is used to view and manipulate the TCP/IP routing table in Windows OS. The manipulations done in the routing table with the help of this command will count as static routes. 5. If you want to find the number of routers between a source and destination, the utility to be used is ___________ a) route b) Ipconfig c) Ifconfig d) Traceroute View Answer Answer: d Explanation: Traceroute command is available on Linux OS to find the path i.e. the number of the routers that the packet has to go through to reach the destination. In Windows, Tracert command is used to perform the function. advertisement 6. Which of the following is not related to ipconfig in Microsoft Windows? a) Display all current TCP/IP network configuration values b) Modify DHCP settings c) Modify DNS settings d) Trace the routers in the path to destination View Answer Answer: d Explanation: The Tracert command is available on Microsoft Windows to find the path i.e. the number of the routers that the packet has to go through to reach its destination. /https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 3/7 2021/6/23 Network Utilities - Computer Networks Questions & Answers - Sanfoundry 7. __________ allows checking if a domain is available for registration. a) Domain Check b) Domain Dossier c) Domain Lookup d) Domain registers View Answer Answer: a Explanation: There are billions of domains available for registration on the World Wide Web, and many of them are already registered. So when one wants to register a domain, they need to check whether the domain is available through a domain check. advertisement 8. Choose the wrong statement from the following. a) Nslookup is used to query a DNS server for DNS data b) Ping is used to check connectivity c) Pathping combines the functionality of ping with that of route d) Ifconfig can configure TCP/IP network interface parameters View Answer Answer: c Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). The Ping command is used to test connectivity between two nodes and the Tracert/Traceroute command is used to find the path i.e. the number of the routers that the packet has to go through to reach its destination. Sanfoundry Global Education & Learning Series – Computer Networks. advertisement /https://www.sanfoundry.com/computer-networks-mcqs-network-utilities 4/7 2021/6/23 Computer Networks Question Bank - Sanfoundry Computer Networks Questions & Answers – Network Management « Prev Next » This set of Computer Networks Question Bank focuses on “Network Management”. 1. Complex networks today are made up of hundreds and sometimes thousands of _________ a) Documents b) Components c) Servers d) Entities View Answer Answer: b Explanation: Complex networks today are made up of hundreds and sometimes thousands of components. For effective functioning of these thousands of components, good network management is essential. advertisement 2. Performance management is closely related to _________ a) Proactive Fault Management b) Fault management c) Reactive Fault Management /https://www.sanfoundry.com/computer-networks-questions-bank 1/8 2021/6/23 Computer Networks Question Bank - Sanfoundry d) Preventive Fault Management View Answer Answer: b Explanation: Fault management is really closely related to performance management. It is important to ensure that the network handles faults as effectively as it handles it’s normal functioning to achieve better performance management. 3. Configuration management can be divided into two subsystems: reconfiguration and __________ a) Documentation b) Information c) Servers d) Entity View Answer Answer: a Explanation: The documentation subsystem of configuration management handles the log making and reporting functions of the configuration management. It also reports the errors in the network caused by the configuration’s failure. advertisement 4. In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________ a) Fault Management b) Secured Management c) Active Management d) Security Management View Answer /https://www.sanfoundry.com/computer-networks-questions-bank 2/8 2021/6/23 Computer Networks Question Bank - Sanfoundry Answer: d Explanation: In Network Management System, the term that is responsible for controlling access to the network based on predefined policy is called security management. The security management ensures authentication, confidentiality and integrity in the network. 5. Control of users’ access to network resources through charges is the main responsibility of ______________ a) Reactive Fault Management b) Reconfigured Fault Management c) Accounting Management d) Security Management View Answer Answer: c Explanation: Control of users’ access to network resources through charges is the main responsibility of accounting management. The accounting management creates a log of the users activity on the network too and goes hand-in-hand with the configurations management. advertisement 6. The physical connection between an end point and a switch or between two switches is __________ a) Transmission path b) Virtual path c) Virtual circuit d) Transmission circuit View Answer Answer: a Explanation: The physical connection between an end point and a switch or between two /https://www.sanfoundry.com/computer-networks-questions-bank 3/8 2021/6/23 Computer Networks Question Bank - Sanfoundry switches is transmission path. The transmission path is the physical roadway that the packet needs to propagate in order to travel through the network. 7. Which of the following networks supports pipelining effect? a) Circuit-switched networks b) Message-switched networks c) Packet-switched networks d) Stream-switched networks View Answer Answer: c Explanation: Packet switched network is most preferred for pipelining process. Pipelining exponentially reduces the time taken to transmit a large number of packets in the network. advertisement 8. In Network Management System, maps track each piece of hardware and its connection to the _________ a) IP Server b) Domain c) Network d) Data View Answer Answer: c Explanation: Network is the main entity connecting different components in a place. A network map is made to track each component and its connection to the network to ensure better network management. /https://www.sanfoundry.com/computer-networks-questions-bank 4/8 2021/6/23 Computer Networks Question Bank - Sanfoundry 9. MIB is a collection of groups of objects that can be managed by __________ a) SMTP b) UDP c) SNMP d) TCP/IP View Answer Answer: c Explanation: MIB stands for Management Information Base. Simple network management controls the group of objects in management information base. It is usually used with SNMP (Simple Network Management Protocol). advertisement 10. A network management system can be divided into ___________ a) three categories b) five broad categories c) seven broad categories d) ten broad categories View Answer Answer: b Explanation: The five broad categories of network management are • Fault Management • Configuration Management • Accounting (Administration) • Performance Management • Security Management. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-bank 5/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Firewalls « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Firewalls”. 1. Network layer firewall works as a __________ a) Frame filter b) Packet filter c) Content filter d) Virus filter View Answer Answer: b Explanation: As you know, firewalls are available as hardware appliances, as software-only, or a combination of the two. In every case, the purpose of a firewall is to isolate your trusted internal network (or your personal PC) from the dangers of unknown resources on the Internet and other network connections that may be harmful. The firewall prevents unauthorized access to your internal, trusted network from outside threats. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 1/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry 2. Network layer firewall has two sub-categories as _________ a) State full firewall and stateless firewall b) Bit oriented firewall and byte oriented firewall c) Frame firewall and packet firewall d) Network layer firewall and session layer firewall View Answer Answer: a Explanation: Most network layer firewalls can operate as stateful or stateless firewalls, creating two subcategories of the standard network layer firewall. Stateful firewalls have the advantage of being able to track packets over a period of time for greater analysis and accuracy — but they require more memory and operate more slowly. Stateless firewalls do not analyze past traffic and can be useful for systems where speed is more important than security, or for systems that have very specific and limited needs. For example, a computer that only needs to connect to a particular backup server does not need the extra security of a stateful firewall. 3. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________ a) Chock point b) Meeting point c) Firewall point d) Secure point View Answer Answer: a Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation, or a combination of these that determines which information or services can be accessed from the outside and who is permitted to use the information and services from outside. Generally, a firewall is installed at the point where the secure internal network and untrusted external network meet, which is also known as a chokepoint. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 2/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry 4. Which of the following is / are the types of firewall? a) Packet Filtering Firewall b) Dual Homed Gateway Firewall c) Screen Host Firewall d) Dual Host Firewall View Answer Answer: a Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or combination of these. Depending on the requirements, a firewall can consist of one or more of the following functional components: Packet-filtering router 5. A proxy firewall filters at _________ a) Physical layer b) Data link layer c) Network layer d) Application layer View Answer Answer: d Explanation: The application firewall is typically built to control all network traffic on any layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is – without additional software – unable to control network traffic regarding a specific application. There are two primary categories of application firewalls, network-based application firewalls and host-based application firewalls. advertisement /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 3/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry 6. A packet filter firewall filters at __________ a) Physical layer b) Data link layer c) Network layer or Transport layer d) Application layer View Answer Answer: c Explanation: In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls. 7. What is one advantage of setting up a DMZ with two firewalls? a) You can control where traffic goes in three networks b) You can do stateful packet filtering c) You can do load balancing d) Improved network performance View Answer Answer: c Explanation: DMZ stands for De-Militarized Zone. In a topology with a single firewall serving both internal and external users (LAN and WAN), it acts as a shared resource for these two zones. So load balancing can be done by adding another firewall. advertisement 8. What tells a firewall how to reassemble a data stream that has been divided into packets? a) The source routing feature /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 4/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry b) The number in the header’s identification field c) The destination IP address d) The header checksum field in the packet header View Answer Answer: a Explanation: The source routing feature provides a path address for the packet to help the firewall to reassemble the data stream that was divided into packets. After reassembling, the firewall can then filter the stream. 9. A stateful firewall maintains a ___________ which is a list of active connections. a) Routing table b) Bridging table c) State table d) Connection table View Answer Answer: a Explanation: The routing table basically gives the state of each connection i.e. whether the connection is active or not. A routing table ensures the best performance for the stateful firewall. advertisement 10. A firewall needs to be __________ so that it can grow proportionally with the network that it protects. a) Robust b) Expansive c) Fast /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 5/8 2021/6/23 Firewalls - Computer Networks Questions & Answers - Sanfoundry d) Scalable View Answer Answer: b Explanation: The firewall has to be expansive because a network is expected to grow with time and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing network traffic flow and will hence fail. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Datagram Networks » Next - Computer Networks Questions & Answers – Network Management advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. 7. IOT MCQ (Multiple Choice Questions) Automata Theory MCQ (Multiple Choice Questions) SAN MCQ (Multiple Choice Questions) Basic Electrical Engineering MCQ (Multiple Choice Questions) Cognitive Radio MCQ (Multiple Choice Questions) Optical Communication MCQ (Multiple Choice Questions) C# Programming Examples on Data Structures /https://www.sanfoundry.com/computer-networks-questions-answers-firewall 6/8 2021/6/23 Computer Networks Aptitude Test - Sanfoundry Computer Networks Questions & Answers – Datagram Networks « Prev Next » This set of Computer Networks Questions and Answers for Aptitude test focuses on “Datagram Networks”. 1. Datagram switching is done at which layer of OSI model? a) Network layer b) Physical layer c) Application layer d) Transport layer View Answer Answer: a Explanation: Datagram switching is normally done at network layer. In datagram switching, the datagram stream need not be in order as each datagram can take different routes to the destination. advertisement 2. Packets in datagram switching are referred to as ________ a) Switches b) Segments /https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 1/7 2021/6/23 Computer Networks Aptitude Test - Sanfoundry c) Datagrams d) Data-packets View Answer Answer: c Explanation: As the name suggests, in datagram switching packets are called as datagram. Each datagram/packet is treated as an individual entity and routed independently through the network. 3. Datagram networks mainly refers to _________ a) Connection oriented networks b) Connection less networks c) Telephone networks d) Internetwork View Answer Answer: b Explanation: The switch does not keep the information about the connection state, hence it is connection less. There is no need for establishing a handshake to begin the transmission in such networks. advertisement 4. Datagrams are routed to their destinations with the help of ________ a) Switch table b) Segments table c) Datagram table d) Routing table View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 2/7 2021/6/23 Computer Networks Aptitude Test - Sanfoundry Answer: d Explanation: Routing table is used to route the packets to their destinations. The packet/datagram header contains the destination header for the whole journey to source to the destination through the routers. 5. The main contents of the routing table in datagram networks are ___________ a) Source and Destination address b) Destination address and Output port c) Source address and Output port d) Input port and Output port View Answer Answer: b Explanation: Routing table contains destination address and output port to route the packets to their destinations. The port address specifies the particular application that the packet has to be forwarded to after it has reached the destination. advertisement 6. Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet? a) Destination address b) Source address c) Checksum d) Padding View Answer Answer: a Explanation: Destination address remains same in the header during the entire journey of the /https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 3/7 2021/6/23 Computer Networks Aptitude Test - Sanfoundry packet. There is no pre-decided route for the packets so each datagram/packet is treated as an individual entity and routed independently through the network. 7. Which of the following is true with respect to the delay in datagram networks? a) Delay is greater than in a virtual circuit network b) Each packet may experience a wait at a switch c) Delay is not uniform for the packets of a message d) All of the mentioned View Answer Answer: d Explanation: The delay of each packet in a datagram network is different as each packet might take a different route to the destination. The delay includes the propagation delay and the processing delay that is induced at each stop/switch that the packet encounters in its journey. advertisement 8. During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available. a) Stack b) Queue c) Hash d) Routing table View Answer Answer: b Explanation: When there are too many packets to be transmitted and the transmission line gets blocked while transmitting some packets, the remaining packets are stored in queue during delay and are served as first in first out. The delay is called as queuing delay. /https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 4/7 2021/6/23 Computer Networks Aptitude Test - Sanfoundry 9. The probability of the error in a transmitted block _________ with the length of the block a) Remains same b) Decreases c) Increases d) Is not proportional View Answer Answer: c Explanation: Probability of the error in a transmitted block increases with the length of the block. Hence, the blocks should be as short as possible for ideal transmission with low possibility of an error. advertisement 10. Which of the following is false with respect to the datagram networks? a) Number of flows of packets are not limited b) Packets may not be in order at the destination c) Path is not reserved d) Delay is the same for all packets in a flow View Answer Answer: d Explanation: The delay of each packet in a datagram network is different as each packet might take a different route to the destination. This happens because there is no pre-decided route for the packets. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for Aptitude test, here is complete set of 1000+ Multiple Choice Questions and Answers. /https://www.sanfoundry.com/computer-networks-questions-answers-aptitude-test 5/7 2021/6/23 Computer Networks Quiz Online - Sanfoundry Computer Networks Questions & Answers – OSPF Configuration « Prev Next » This set of Computer Networks online quiz focuses on “OSPF Configuration”. 1. An OSPF router receives an LSA, the router checks its sequence number, and this number matches the sequence number of the LSA that the receiving router already has. What does the receiving router do with the LSA? a) Ignores the LSA b) Adds it to the database c) Sends newer LSU update to source router d) Floods the LSA to the other routers View Answer Answer: a Explanation: When the OSPF router receives an LSA, the router checks its sequence number. If this number matches the sequence number of the LSA that the receiving router already has, the router ignores the LSA. 2. An OSPF router receives an LSA. The router checks its sequence number and finds that this number is higher than the sequence number it already has. Which two tasks does the router perform with the LSA? a) Ignores the LSA b) Adds it to the database c) Sends newer LSU update to source router d) Floods the LSA to the other routers View Answer Answer: b Explanation: An OSPF router receives an LSA. If the router checks its sequence number and finds that the number is higher than the sequence number of the LSA that it already has, the router adds it to the database, and then floods the LSA to the other routers. 3. An OSPF router receives an LSA. The router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA? /https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 1/7 2021/6/23 Computer Networks Quiz Online - Sanfoundry a) ignores the LSA b) adds it to the database c) sends newer LSU update to source router d) floods the LSA to the other routers View Answer Answer: c Explanation: An OSPF router receives an LSA. If the router checks its sequence number and finds that this number is lower than the sequence number that it already has, the router sends newer LSU update to source router. The router then adds it to the database and floods it to the other routers. 4. Each LSA has its own age timer. By default, how long does an LSA wait before requiring an update? a) 30 seconds b) 1 minute c) 30 minutes d) 1 hour View Answer Answer: c Explanation: Each LSA has its own age timer. By default, an LSA waits for 30 minutes before requiring an update. The router then has to send a LSR (Link State Request) to its neighbors to get an update. 5. Distance vector protocols use the concept of split horizon, but link-state routing protocols, such as OSPF, do not. a) True b) False View Answer Answer: b Explanation: In Distance vector routing protocols, there is a problem called count-to-infinity which occurs regularly. So, to make sure that it does not occur, the split horizon algorithm is used. There is no requirement for it in OSPF. 6. The outcome of Dijkstra’s calculation is used to populate the __________ a) Topology table b) Routing table c) Neighbor table d) Adjacency table View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 2/7 2021/6/23 Computer Networks Quiz Online - Sanfoundry Answer: b Explanation: The outcome of Djikstra’s calculation is the main source of entries in the routing table as it is the algorithm that is used to find the shortest path in OSPF. The calculations are done after receiving every new LSU. 7. What is the IP protocol number for OSPF packets? a) 89 b) 86 c) 20 d) 76 View Answer Answer: a Explanation: 89 is the IP protocol number for OSPF packets. 86 is the protocol number for DGP, 76 is the protocol number for Backroom-SATNET-Monitoring and 20 is the protocol number for Host Monitoring Protocol. 8. Which packet is NOT an OSPF packet type? a) LSU b) LSR c) DBD d) Query View Answer Answer: d Explanation: LSU is the Link State Update packet, LSR is the Link State Request packet and DBD is the Database Descriptor packet in OSPF. Query packet is NOT an OSPF packet type. 9. Which multicast address does the OSPF Hello protocol use? a) 224.0.0.5 b) 224.0.0.6 c) 224.0.0.7 d) 224.0.0.8 View Answer Answer: a Explanation: Hello protocol is used to discover neighboring routers automatically. It makes sure that the communication between neighbors is bidirectional. The multicast address that the OSPF Hello protocol uses is 224.0.0.5. 10. The Hello protocol sends periodic updates to ensure that a neighbor relationship is maintained between adjacent routers. a) True /https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 3/7 2021/6/23 Computer Networks Quiz Online - Sanfoundry b) False View Answer Answer: a Explanation: The Hello protocol sends periodic updates to ensure that a neighbor relationship is maintained between adjacent routers. It’s similar to the real world moral construct of saying “Hello” to initialize the communication. 11. DBD packets are involved during which two states? a) Exstart and exchange b) Loading and Two-way c) Init and Full d) Down and Loading View Answer Answer: a Explanation: DBD stands for Database Descriptor. DBD packets are involved during the two states Exstart and Exchange. In exstart, the master and the slaves are decided and in the exchange state, the DBD is exchanged among the neighbors. 12. At which interval does OSPF refresh LSAs? a) 10 seconds b) 30 seconds c) 30 minutes d) 1 hour View Answer Answer: d Explanation: Each LSA has its own age timer. By default, an LSA waits for 30 minutes before requiring an update. So to make sure that each router first has an up-to-date LSA, OSPF refreshes LSAs after every 1 hour. 13. Which field is NOT a field within an OSPF packet header? a) Packet length b) Router ID c) Authentication type d) Maxage time View Answer Answer: d Explanation: The packet length field gives the length of the packet in bits. The Authentication type field gives the type of authentication used. The router ID field gives the ID of the source router of the packet. In an OSPF packet header, there is no field called Maxage time. /https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 4/7 2021/6/23 Computer Networks Quiz Online - Sanfoundry 14. Which two commands are required for basic OSPF configuration? a) “[Network mask] area [area-id]” and “Router ospf [process-id]” b) “[Wildcard-mask] area [area-id]” and “[Network mask] area [area-id]” c) Only “Router ospf [process-id]” d) “[Wildcard-mask] area [area-id]” and “Router ospf [process-id]” View Answer Answer: d Explanation: The “Router ospf [process-id]” command enables OSPF routing protocol in the router and the “[Wildcard-mask] area [area-id]” command is used to select the interfaces that we want to include in the OSPF process. That is enough for the basic configuration of OSPF in a router. 15. Which OSPF show command describes a list of OSPF adjacencies? a) Show ip ospf interface b) Show ip ospf c) Show ip route d) Show ip ospf neighbor View Answer Answer: d Explanation: The “Show ip ospf neighbor” command is the OSPF show command that can describe a list of OSPF adjacencies i.e. the list of adjacent nodes or neighbors. The router will only communicate with its neighbors directly. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks for online Quizzes, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – OSPF » Next - Computer Networks Questions & Answers – Datagram Networks Recommended Posts: 1. 2. 3. 4. 5. 6. Founder Microcontroller MCQ (Multiple Choice Questions) IOT MCQ (Multiple Choice Questions) Java Programming Examples on Networking Java Programming Examples on File Handling C# Programming Examples on Networking /https://www.sanfoundry.com/computer-networks-questions-answers-online-quiz 5/7 2021/6/23 OSPF - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – OSPF « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “OSPF”. 1. Open Shortest Path First (OSPF) is also called as _____________ a) Link state protocol b) Error-correction protocol c) Routing information protocol d) Border gateway protocol View Answer Answer: a Explanation: In OSPF, the link state of each path is checked, and then the shortest path is chosen among only the open state links. Each OSPF router monitors the cost of the link to each of its neighbors and then floods the link state information to other routers in the network. advertisement 2. The computation of the shortest path in OSPF is usually done by ____________ a) Bellman-ford algorithm b) Routing information protocol /https://www.sanfoundry.com/computer-networks-questions-answers-ospf 1/8 2021/6/23 OSPF - Computer Networks Questions & Answers - Sanfoundry c) Dijkstra’s algorithm d) Distance vector routing View Answer Answer: c Explanation: Shortest path in OSPF is usually computed by Dijkstra’s algorithm. It was proposed by Edsger W. Dijkstra in the year 1956. It is a greedy method algorithm and hence may not guarantee the shortest path every time, but is really fast. 3. Which of the following is false with respect to the features of OSPF? a) Support for fixed-length subnetting by including the subnet mask in the routing message b) More flexible link cost than can range from 1 to 65535 c) Use of designated router d) Distribution of traffic over multiple paths that have equal cost to the destination View Answer Answer: a Explanation: OSPF provides support for variable-length sunbathing by including the subnet mask in the routing message. For fixed length subnets, there is no requirement for including the subnet mask in the routing message as there is just one subnet mask for all the subnets. advertisement 4. In OSPF, which protocol is used to discover neighbour routers automatically? a) Link state protocol b) Error-correction protocol c) Routing information protocol d) Hello protocol View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ospf 2/8 2021/6/23 OSPF - Computer Networks Questions & Answers - Sanfoundry Answer: d Explanation: Hello protocol is used to discover neighboring routers automatically. It makes sure that the communication between neighbors is bidirectional. It’s similar to the real world moral construct of saying “Hello” to initialize the communication. 5. Which of the following is not a type of OSPF packet? a) Hello b) Link-state request c) Link-state response d) Link-state ACK View Answer Answer: c Explanation: The five types of OSPF packets are: Hello, Database description, Link-state request, Link-state update, and Link-state ACK. There is no Link-state response packet; the neighbor router sends a Link-state update packet as a response to the Link-state request packet if there is an update in the routing table. advertisement 6. What is the correct order of the operations of OSPF? i – Hello packets ii – Propagation of link-state information and building of routing tables iii – Establishing adjacencies and synchronization of database a) i-ii-iii b) i-iii-ii c) iii-ii-i d) ii-i-iii View Answer /https://www.sanfoundry.com/computer-networks-questions-answers-ospf 3/8 2021/6/23 OSPF - Computer Networks Questions & Answers - Sanfoundry Answer: b Explanation: OSPF first implements a hello protocol. Then it later on tries to establish synchronisation with database. Later on building of routing tables is done. 7. In OSPF header, which field is used to detect errors in the packet? a) Type b) Area ID c) Authentication type d) Checksum View Answer Answer: d Explanation: Checksum field is used to detect errors. It makes sure that the data portions that are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgement. advertisement 8. In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to ____________ a) 1 b) 0 c) more d) -1 View Answer Answer: a Explanation: The “M” bit is the more bit, which indicates that there are more packets to be received in the descriptor packet flow whenever it is set to 1. There is also an “I” bit which indicates if the packet is first in the flow. /https://www.sanfoundry.com/computer-networks-questions-answers-ospf 4/8 2021/6/23 OSPF - Computer Networks Questions & Answers - Sanfoundry 9. In OSPF database descriptor packet, which field is used to indicate that the router is master? a) M b) MS c) I d) Options View Answer Answer: b Explanation: The MS bit is used to indicate if the origin of the packet is a master or a slave. If it is set to 1, the source of the packet is a master, and if it is set to 0, the source of the packet is a slave. advertisement 10. In OSPF database descriptor packet, which field is used to detect a missing packet? a) LSA header b) MS c) Database descriptor sequence number d) Options View Answer Answer: c Explanation: Sequence number field is used to detect a missing packet. The packets are to be received in order of the sequence number, so if the receiver detects that there is a sequence number skipped or missing in the order, it stops processing the further received packets and informs the sender to retransmit the packets in sequence. Sanfoundry Global Education & Learning Series – Computer Networks. /https://www.sanfoundry.com/computer-networks-questions-answers-ospf 5/8 22/06/2021 Chapter 3 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Chapter 3 Study Chapter 3 Terms in this set (44) transport layer has the role of communication services providing ______________ ______________ to the application processes running on different hosts. logical communication transport layer protocols from app's perspective, hosts running processes are directly connected end systems, routers implemented in _____ ____________________ but not in network ______________ segments transport layer protocol transport-layer packets, that sending app process converts from messages into small chunks processes, hosts provides logical communication b/w ______________ running on diff hosts. network layer protocol provides communication bw __________ https://quizlet.com/367709259/chapter-3-flash-cards/ 1/7 22/06/2021 Chapter 3 Flashcards | Quizlet analogy where Chapter 3 letters sent processes create messages on each host, then Study tlp from coast to coast b/w collect messages in their respective hosts, and pass cousins: on to nlp app messages = letters processes = cousins hosts = houses transport layer protocol = Ann and Bill network layer protocol = postal service transport layer is constrained T by service model of underlying network layer protocol (T/F) TCP vs. UDP -UDP: unreliable, connectionless service - TCP: reliable, connection-oriented service IP service model is a best- IP makes best effort to deliver segments, but no effort delivery service, guarantees meaning: IP is said to be unreliable T service (T/F) Extending host-to-host transport-layer multiplexing and demultiplexing delivery to process-to-process delivery is called : UDP provides 2 services: https://quizlet.com/367709259/chapter-3-flash-cards/ 1) process-to-process data delivery 2) error checking 2/7 22/06/2021 Chapter 3 TCP provides congestion control, which means: Chapter 3 Flashcards | Quizlet - prevents any 1 TCP connection from swampingStudy the links and routers bw communicating hosts w lots of traffic - tries to give each connection equal share of bandwidth a process can have 1+ sockets _____________, doors through which data passes from the network to the process and vice versa job of delivering data in demultiplexing transport layer segment to correct socket is called: job of gather data chunks from multiplexing different sockets at source, encapsulating each chunk w headers to make segments is called: well-known port numbers 0 to 1023 range, that are reserved: source port number needed in return address header of segments bc it serves as a _____________ ______________, when dest wants to send a segment back a UDP socket is ID'ed by 2( port , IP addr), 4(source IP, source port, dest IP, __________-tuple and TCP socket is dest port) ID'ed by ___________-tuple, which are https://quizlet.com/367709259/chapter-3-flash-cards/ 3/7 22/06/2021 Chapter 3 Flashcards | Quizlet when TCP segment arrives at Chapter 3 demultiplex Study host, 4 fields used to _________________ segment to right socket UDP is said to be handshaking connectionless since there is no _______________ bw the sending and receiving transport layer entities - finer app-level control over what data sent when (passes packaged data segment immediately to network layer, TCP throttles) - no connection establishment (no delays, so DNS benefits to UDP runs over UDP not TCP) - no connection state ( no need to hold all UDP parameter etc info, so more space on server for diff UDP apps) - small packet header overhea 4 fields: 1,2) port numbers UDP structure: 3) length field for num bytes in segment (header + data_ 4) checksum ( for errors) UDP checksum - for error detection, checks if bits altered functions places at lower levels may be redundant end-end principle when compared to cost of providing them at higher levels https://quizlet.com/367709259/chapter-3-flash-cards/ 4/7 22/06/2021 Chapter 3 Flashcards | Quizlet implementing Chapter 3 reliable data link, transport, application Study transfer occurs at _________, __________, and ____________ layers reliable channel = _____ no, order transferred data bits are corrupted or lost, and all are delivered in ___________ that they were sent reliable data transfer protocol implements reliable transfer of data, even when layer below is unreliable end-to-end network layer unidirectional data transfer data transfer from sending to receiving side bidirectional data transfer transmitting packets in both directions finite state machine the finite state machine for the determine the operations of the sender/receiver different sender and receiver are ___________ sending side waits from call above, below from _________ before sending packet. receiving side waits from call _________ before receiving packet https://quizlet.com/367709259/chapter-3-flash-cards/ 5/7 22/06/2021 Chapter 3 Flashcards | Quizlet positive vs. 3negative Chapter pos: control messages to let sender know received Study acknowledgments aka ARQ neg: send message back to sender for error and (Automatic Repeat reQuest) needs repeating protocols Need 3 protocol capabilities in ARQ protocols to handle bit errors: 1) Error detection - mechanism, like checksum, to see if bit errors occurred 2) Receiver feedback - to sender 3) Retransmission - sender sends packet again sender will not send new data stop, wait until it is sure current packet correctly received, called ______and-________ protocols another fatal flaw with rdt2.0 ACK/NAK packets may be corrupted, so need protocol: checksum to detect 1) send ack from sender to receiver upon receiving ack, 3 ways to handle corrupt 2) add enough checksum bits to allow sender to acknowledgements: recover from bit errors 3) sender resends current data packet when bad ACK, but introduces duplicate packets Best sol for ACK problem add new field to data packet, have sender number data packets w SEQUENCE NUMBER the sender may be restricted to sending only window/pipelining packets with sequence numbers that fall within a given range time needed to transmit packet d_trans = L/R = (bits/pckt)/(bits/sec) = time unit into link https://quizlet.com/367709259/chapter-3-flash-cards/ 6/7 22/06/2021 Utilization of Chapter 3 sender: U_sender Chapter 3 Flashcards | Quizlet (L/R)/(R_TT + L/R) Study = 1) GO-Back-N - sender allowed to transmit multiple packets wo waiting for ack, no more than N packets 2 pipelined error recovery in pipeline methods: 2) Selective Repeat - only sends back packets that may have error, receiver acknowledges corrupt packets 1) invocation above GBN sender responds to: 2) receipt of ack 3) timeout event https://quizlet.com/367709259/chapter-3-flash-cards/ 7/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet Home / Science / Computer Science / Computer Networks 3.2 Multiplexing and Demultiplexing Study 3.2 Multiplexing and Demultiplexing Terms in this set (14) At the destination host, the transport layer receives segments from the network layer just below. The Transport Layer transport layer has the responsibility of delivering the data in these segments to the appropriate application process running in the host. Suppose you are sitting in front of your computer, and you are downloading Webpages while running one FTP session and two Telnet sessions. You therefore have four network application processes Example of Transport Layer running - two Telnet processes, one FTP session, and one HTTP process. When the transport layer in your computer receives data from the network layer below, it needs to direct the received data to one of these four processes. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 1/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet A process (as part of a network application) canStudy 3.2 Multiplexing and Demultiplexing have one or more sockets, doors through which data passes from the network to the process and through which data passes from the process to the network. Thus, the transport layer in the receiving How its Done host does not actually deliver data directly to a process, but instead to an intermediary socket. Because at any given time there can be more than one socket in the receiving host, each socket has a unique identifier. The format of the identifier depends on whether the socket is a UDP or a TCP socket. Now lets consider how a receiving host directs an incoming transport-layer segment to the appropriate socket. Each transport-layer segment has a set of fields in the segment for this purpose. At Demultiplexing the receiving end, the transport layer examines these fields to identify the receiving socket and then directs the segment to that socket. This job of delivering the data in a transport-layer segment to the correct socket is call demultiplexing. The job of gathering data chucks at the source host from different sockets, encapsulating each data chuck with header information (that will later be used in demultiplexing) to create segments, and Multiplexing passing the segments to the network layer is call multiplexing. Transport layer multiplexing requires (1) that sockets have unique identifiers, and (2) that each segment have special fields that indicate the socket to which the segment is to be delivered. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 2/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet When a UDP socket is created , the transport later Study 3.2 Multiplexing and Demultiplexing automatically assigns a port number to the socket. In particular, the transport later assigns a port number in the range 1024 to 65535 that is currently not being used by any other UDP port in the host. Alternatively, we can add a line to are program after we create the socket to associate a specific port number. With port numbers assigned to UDP sockets, we can precisely describe UDP multiplexing/demultiplexing. Supposed a process in Host A, with UDP port 19157, wants to send a chuck of application data to a process with UDP port 46428 in Host B. The transport layer in Host A creates a transport-layer segment that includes the application data, the source port number (19157), Connectionless Multiplexing the destination port number (46428), and two other and Demultiplexing values (unimportant to network-layer). The transport layer then passes the resulting segment to the network layer. The network layer encapsulates the segment in an IP datagram and makes a best-effort attempt to deliver the segment to the receiving host. If the segment arrives at the receiving Host B, the transport later at the receiving host examines the destination port number in the segment (46428) and delivers the segment to its socket identified by port 46428. Note Host B could be running multiple processes, each with its own UDP socket and associated port number. As UDP segments arrived from the network, Host B directs (demultiplexes) each segment to the appropriate socket examining the segment's destination port number. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 3/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet It is important to not that a UDP socket is fully 3.2 Multiplexing and Demultiplexing Study identified by a two-tuple consisting of a destination IP address and a destination port number. As a consequence, if two UDP segments have different source IP addresses and/or source port numbers, Two-tuple UDP but have the same destination IP address and destination port number, then the two segments will be directed to the same destination process via the same destination socket. Since everyone talks to the same destination socket, 1 socket is needed for n simultaneous connections. One subtle difference between a TCP socket and a UDP socket is that a TCP socket is identified by a four-tuple: (source IP address, source port number, destination IP address, destination port). thus when a TCP segment arrives from the network to a host, the host uses all four values to direct (demultiplex) the segment to the appropriate socket. In particular, and in contrast with UDP, two arriving TCP segments with different source IP address or source port Connection-Oriented numbers will (with the exception of a TCP segment Multiplexing and carrying the original connection-establishment Demultiplexing request) be directed to two different sockets. The server host may support many simultaneous TCP connection sockets, with each socket attached to a process, and with each socket identified by its own four-tuple. When a TCP segment arrives at the host, all four fields (source IP address, source port, destination IP address, destination port) are sued to direct (demultiplex) the segment to the appropriate segment. Every n client talks to n sockets, so n + 1 simultaneous connections. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 4/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet At the very least, the transport layer has to provide Study 3.2 Multiplexing and Demultiplexing a multiplexing/demultiplexing service in order to pass data between the network layer and the correct application-level process. UDP, aside from the multiplexing/demultiplexing function and some light error checking, it adds nothing to IP. UDP takes Connectionless Transport: UDP messages from the application process, attaches source and destination port number fields for the multiplexing/demultiplexing service, adds two other small fields, and makes a best-effort to deliver the segment to the receiving host. If the segment arrives at the receiving host, UDP uses the destination port number to deliver the segments data to the correct application process. DNS is an example of an application-layer protocol that typically uses UDP. When the DNS application in a host wants to make a query, it constructs a DNS query message and passes the message to UDP. Without performing any handshaking with the UDP entity running on the destination end system, the host-side UDP adds header fields to the message DNS and passes the resulting segment to the network layer. The network later encapsulates the UDP segment into a datagram and sends the datagram to the name server. The DNS application at the querying host then waits for a reply to its query. If it doesn't receive a reply, it might try resending the query to another name server, or inform the invoking application that it can not get a reply. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 5/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet Finer application-level control over what data isStudy 3.2 Multiplexing and Demultiplexing sent, and when. Under UDP, as soon as an application process passes data to UDP, UDP will package the data in side a UDP segment and immediately pass the segment to the network layer. TCP, on the other hand, has a congestion control mechanism that throttles the transport-layer TCP sender when one ore more links between the Some applications are better suited for UDP (1) source and destination hosts become excessively congested. TCP will also continue to resend a segment until the receipt of the segment has been acknowledged be the destination, regardless of how long reliable delivery takes. Since real-time applications often require a minimum sending rate, do not want to overly delay segment transmission, and can tolerate some data lost, TCP's service model is not particularly well matched to these applications needs. No connection established. UDP does not Some applications are better suited for UDP (2) introduce any delay to establish a connection. DNS would be much slower if it ran over TCP. HTTP uses TCP rather than UDP since reliability is critical for Web pages with test. No connection state. For this reason, a server Some applications are better devoted to a particular application can typically suited for UDP (3) support many more active clients when the application runs over UDP rather then TCP. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 6/7 23/06/2021 3.2 Multiplexing and Demultiplexing Flashcards | Quizlet Small packet header overhead. The TCP segment Study 3.2 Multiplexing and Demultiplexing Some applications are better suited for UDP (4) has 20 bytes of header overhead in every segment, whereas UDP has only 8 bytes of overhead. https://quizlet.com/247534375/32-multiplexing-and-demultiplexing-flash-cards/ 7/7 23/06/2021 3.2 Transport-Layer multiplexing and demultiplexing Flashcards | Quizlet 3.2 Transport-Layer multiplexing and demultiplexing Study 3.2 Transport-Layer multiplexing and demultiplexing Terms in this set (13) multiplexing at sender demultiplexing at receiver handle data from multiple sockets, add transport header (later used for demultiplexing) use header info to deliver received segments to correct socket host receives IP datagrams -each datagram has source IP address, destination IP address How demultiplexing works -each datagram carries one transport-layer segment -each segment has source, destination port number host uses IP addresses & port numbers to direct segment to appropriate socket What each diagram has? What each diagram carries? What host uses to direct source IP address, destination IP address one transport-layer segment IP addresses & port numbers segment to appropriate socket socket? recall: created socket has host- DatagramSocket mySocket1 = new local port #: DatagramSocket(12534); https://quizlet.com/389356437/32-transport-layer-multiplexing-and-demultiplexing-flash-cards/ 1/2 23/06/2021 3.2 Transport-Layer multiplexing and demultiplexing Flashcards | Quizlet recall: when creating datagram IP address 3.2 Transport-Layer multiplexing-destination and demultiplexing to send into UDP socket, must Study -destination port # specify -checks destination port # in segment -directs UDP segment to socket with that port # when host receives UDP -----> segment: IP datagrams with same dest. port #, but different source IP addresses and/or source port numbers will be directed to same socket at destination -source IP address TCP socket identified by 4- -source port number tuple: -dest IP address -dest port number demux: server host may support many receiver uses all four values to direct segment to appropriate socket each socket identified by its own 4-tuple simultaneous TCP sockets: web servers have different -non-persistent HTTP will have different socket for sockets for each connecting each request client https://quizlet.com/389356437/32-transport-layer-multiplexing-and-demultiplexing-flash-cards/ 2/2 23/06/2021 401 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks 401 Terms in this set (29) Protocols define format, order of messages sent Protocol and received among network entities, and actions taken on message transmission, receipt Network Edge hosts: clients and servers. Servers often in data centers interconnected routers. network of networks. Network Core packet-switching: hosts break application-layer messages into packets. Circuit switching is a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the Circuit Switching nodes may communicate. The circuit guarantees the full bandwidth of the channel and remains connected for the duration of the communication session. The circuit functions as if the nodes were physically connected as with an electrical circuit. 401 https://quizlet.com/157251247/401-flash-cards/ 1/11 23/06/2021 401 Flashcards | Quizlet Packet switching is a digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, which are transmitted via a medium that may be Packet Switching shared by multiple simultaneous communication sessions. Packet switching increases network efficiency, robustness and enables technological convergence of many applications operating on the same network. The time required to examine a packet's header and Processing Delay determine where to direct it. Typically are microseconds or less in high-speed routers. The transmission delay is the amount of time required for the router to push out the packet. Transmission Delay L: packet length (bits) R: link bandwidth (bps) so transmission delay is = L/R The propagation delay, is the time it takes a bit to propagate from one router to the next. Propagation Delay d: length of physical link S: propagation speed in medium (~2x108m/sec) so propagation delay is = d/s This type of delay depends upon the number of Queuing Delay earlier arriving packets waiting for transmission onto the link: R = link bandwidth (bps) 401 https://quizlet.com/157251247/401-flash-cards/ 2/11 23/06/2021 401 Flashcards | Quizlet End-to-end delay or one-way delay (OWD) refers to End-to-end Delays the time taken for a packet to be transmitted across a network from source to destination. dend-end= N[ dtrans+dprop+dproc+dqueue] Layer 4. Application Layer TCP/IP Layering Model Layer 3. Transport Layer Layer 2. Internet Layer Layer 1. Network Access Layer Application layer is the top most layer of four layer TCP/IP model. Application layer is present on the top of the Transport layer. Application layer defines TCP/IP application protocols and how host programs interface with Transport layer services to use the network. Layer 4. Application Layer Application layer includes all the higher-level protocols like DNS (Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple Network Management Protocol), SMTP (Simple Mail Transfer Protocol) , DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop Protocol) etc. 401 https://quizlet.com/157251247/401-flash-cards/ 3/11 23/06/2021 401 Flashcards | Quizlet Transport Layer is the third layer of the four layer TCP/IP model. The position of the Transport layer is between Application layer and Internet layer. The purpose of Transport layer is to permit devices on the source and destination hosts to carry on a Layer 3. Transport Layer conversation. Transport layer defines the level of service and status of the connection used when transporting data. The main protocols included at Transport layer are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). 401 https://quizlet.com/157251247/401-flash-cards/ 4/11 23/06/2021 401 Flashcards | Quizlet Internet Layer is the second layer of the four layer TCP/IP model. The position of Internet layer is between Network Access Layer and Transport layer. Internet layer pack data into data packets known as IP datagrams, which contain source and destination address (logical address or IP address) information that is used to forward the datagrams between hosts and across networks. The Internet layer is also responsible for routing of IP datagrams. Packet switching network depends upon a connectionless internetwork layer. This layer is known as Internet layer. Its job is to allow hosts to Layer 2. Internet Layer insert packets into any network and have them to deliver independently to the destination. At the destination side data packets may appear in a different order than they were sent. It is the job of the higher layers to rearrange them in order to deliver them to proper network applications operating at the Application layer. The main protocols included at Internet layer are IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP (Reverse Address Resolution Protocol) and IGMP (Internet Group Management Protocol). Network Access Layer is the first layer of the four layer TCP/IP model. Network Access Layer defines details of how data is physically sent through the Layer 1. Network Access Layer network, including how bits are electrically or optically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted pair copper 401 https://quizlet.com/157251247/401-flash-cards/ wire. 5/11 23/06/2021 401 Flashcards | Quizlet The client-server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A Client Server Model server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await incoming requests. Examples of computer applications that use the client-server model are Email, network printing, and the World Wide Web. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions P2P Model tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. 401 https://quizlet.com/157251247/401-flash-cards/ 6/11 23/06/2021 401 Flashcards | Quizlet The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered, and errorchecked delivery of a stream of octets between TCP Service applications running on hosts communicating by an IP network. Major Internet applications such as the World Wide Web, email, remote administration and file transfer rely on TCP. Applications that do not require reliable data stream service may use the User Datagram Protocol (UDP), which provides a connectionless datagram service that emphasizes reduced latency over reliability. The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. With UDP, UDP Service computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network. Prior communications are not required to set up transmission channels or data paths. A small text file placed on your computer when you visit a Web page. Used to remember you or your preferences when you revisit that page or to track Cookies your browsing activities, cookies facilitate virtual shopping carts, page customization, and targeted advertising. They are not programs and cannot read your hard drive or cause damage to your computer. 401 https://quizlet.com/157251247/401-flash-cards/ 7/11 23/06/2021 401 Flashcards | Quizlet A technique in which Web pages are stored locally, either on a host or network, and then delivered to Web Caching requesters more quickly than if they had been obtained from the original source. SMTP Simple Mail Transfer Protocol A protocol used by e-mail clients to retrieve POP3 messages from remote servers post office protocol 3 internet mail access protocol Email retrieval protocol designed to enable users to access their e-mail from various locations without IMAP the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system. 401 https://quizlet.com/157251247/401-flash-cards/ 8/11 23/06/2021 401 Flashcards | Quizlet The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it DNS translates more readily memorized domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System is an essential component of the functionality of the Internet. Hypertext Transfer Protocol. A conventional set of HTTP communication rules for controlling how Web browsers and servers pass information back and forth over the Internet. 401 https://quizlet.com/157251247/401-flash-cards/ 9/11 23/06/2021 401 Flashcards | Quizlet Dynamic Adaptive Streaming over HTTP - is an adaptive bitrate streaming technique that enables high quality streaming of media content over the Internet delivered from conventional HTTP web servers. Similar to Apple's HTTP Live Streaming (HLS) solution, MPEG-DASH works by breaking the content into a sequence of small HTTP-based file segments, each segment containing a short interval of playback time of content that is potentially many hours in duration, such as a movie or the live broadcast of a sports event. The content is made available at a variety of different bit rates, i.e., alternative segments encoded at different bit rates DASH covering aligned short intervals of play back time are made available. While the content is being played back by an MPEG-DASH client, the client automatically selects from the alternatives the next segment to download and play back based on current network conditions. The client selects the segment with the highest bit rate possible that can be downloaded in time for play back without causing stalls or re-buffering events in the playback. Thus, an MPEG-DASH client can seamlessly adapt to changing network conditions, and provide high quality play back with fewer stalls or re-buffering events. 401 https://quizlet.com/157251247/401-flash-cards/ 10/11 23/06/2021 401 Flashcards | Quizlet A content delivery network or content distribution network (CDN) is a globally distributed network of proxy servers deployed in multiple data centers. The goal of a CDN is to serve content to end-users with high availability and high performance. CDNs serve a large fraction of the Internet content today, CDN including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks. Class Activity ... 1,2,3(1,2,3,4),4(C) https://quizlet.com/157251247/401-flash-cards/ 11/11 22/06/2021 Chapter 1, Section 6:Networks Under Attack :Security Flashcards | Quizlet Chapter 1, Section 6:Networks Under Attack :Security Terms in this set (7) Virus Worm Self-replicating infection by receiving/executing object ex.E-mail attachment Self-replicating infection by passively receiving object that gets itself executed can record keystrokes,websites visited and then Spyware Malware uploads info to collection site.Infected host can be enrolled in Botnet, used for spam and DDoS attacks attackers make resources (the server and Denial Of Service (DoS) bandwidth) unavailable to legitimate traffic by overwhelming resources with bogus traffic. 1.Select Target Denial of Service Steps 2.Break Into Hosts around the network (botnet) 3.Send packets to target from compromised hosts Broadcast media (shared Ethernet,wireless) Packet Sniffing Promiscuous Network Interface reads/records all packets (including passwords)passing by IP Spoofing Send Packet with false source address https://quizlet.com/213685737/chapter-1-section-6networks-under-attack-security-flash-cards/ 1/1 22/06/2021 Chapter 3 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Chapter 3 Terms in this set (24) The ________ is a means of Data Unit Identifier uniquely identifying an endsystem-originated datagram The process in which a fragmentation protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________ Which of the following is NOT improved error recovery an enhancement of IPv6 over IPv4? Chapter 3 https://quizlet.com/124033204/chapter-3-flash-cards/ 1/5 22/06/2021 The IP standard specifies that a Chapter 3 Flashcards | Quizlet Internet Control Message Protocol (ICMP) compliant implementation must also implement ________, which provides a means for transferring messages from routers and other hosts to a host. Because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable Enhancements of IPv6 over IPv4 The source and destination Address Autoconfiguration Support for Resource Allocation Extended Address Space host identifier address fields in the IP header each contain a 32-bit global internet address, generally consisting of a network identifier and a _______ In 1994 the Internet FALSE Architecture Board issued a report titled "Security in the Internet Architecture" that the general consensus was that the internet was secure and there were no areas of security concern Chapter 3 https://quizlet.com/124033204/chapter-3-flash-cards/ 2/5 22/06/2021 IP Addresses are usually Chapter 3 Flashcards | Quizlet dotted decimal written in _______ notation, with a decimal number representing each of the octets of the 32-bit address Priority could be assigned on a true message basis or on a connection basis A connectionless internet true service is not good for connectionless transport protocols because it imposes unnecessary overhead Starting with a 32-bit block Routing header consisting of four 8-bit fields, the ____ contains a list of one or more intermediate nodes to be visited on the way to a packet's destination Although it is intended to IPv4 ultimately be replaced ____ is currently the standard IP used in the TCP/IP networks Chapter 3 https://quizlet.com/124033204/chapter-3-flash-cards/ 3/5 22/06/2021 Chapter 3 Flashcards | Quizlet Data is transmitted over an false internet in packets from a source system to a destination across a path involving a single network and routers A ____ consists of a set of Virtual Private Network (VPN) computer that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security A static table is more flexible false than a dynamic table in responding to both error and congestion conditions Flow control allows router and TRUE receiving stations to limit the rate at which they receive data ______ is the foundation on which IP all of the internet based protocols and internetworking is based A Class C network is defined as FALSE few networks, each with many hosts Class A Networks Few networks, with many hosts Chapter 3 https://quizlet.com/124033204/chapter-3-flash-cards/ 4/5 22/06/2021 Chapter 3 Flashcards | Quizlet Class B Networks Class C Networks An entity may transmit data to Medium number of networks, each with a medium number of hosts Many networks, each with a few hosts connectionless another entity in such a way that each PDU is treated independently of all prior PDUs. This is known as ________ data transfer A ________ operates at layer 3 of router the OSI architecture and routes packets between potentially different networks Time to Live is similar to a hop true count https://quizlet.com/124033204/chapter-3-flash-cards/ 5/5 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer Study Chapter 4: Network Layer Terms in this set (29) transport segment from sending to receiving host on sending side encapsulates segments into datagrams Network Layer (communication on receiving side, delivers segments to transport between hosts) layer network layer protocols in EVERY host, router router examines header fields in all IP datagrams passing through it example services for individual datagrams: -guaranteed delivery What service model for -guaranteed delivery with less than 40 msec delay "channel" transporting datagrams from sender to example services for a flow of datagrams: receiver? -in-order datagram delivery -guaranteed minimum bandwidth to flow -restrictions on changes in inter-packet spacing two key network-layer network-layer functions, analogy functions https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 1/7 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer forwarding: move packets from router's input toStudy appropriate router output network-layer functions routing: determine route taken by packets from source to destination -routing algorithms -deciding where it should go taking a trip! analogy forwarding: process of getting through single interchange routing: process of planning trip from source to destination local, per-router function data plane (mechanism) determines how datagram arriving on router input port is forwarded to router output port forwarding function network-wide logic control plane (policy) determines how datagram is routed among routers along end-end path from source host to destination host traditional routing algorithms: implemented in routers (handed a policy to them, not generating two control-plane approaches them) software-defined networking (SDN): implemented in (remote) servers https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 2/7 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer per-router control plane individual routing algorithm components in each Study and every router interact in the control plane routers only know itself and who connected to it logically centralized control plane a distinct (typically remote) controller interacts with local control agents (CAS) all the routers connected to the controller when looking for forwarding table entry for given destination address, use longest address prefix that Longest Prefix matching matches destination address most specific info you have means the higher priority longest prefiz matching: often performed using ternary content addressable memories (TCAMs) Content addressable definition: present address to TCAM: retrieve address in one clock cycle, regardless of table size cisco catalyst: can up ~IM routing table entries in TCAM high-level view of generic router architecture routing, management control plane (software) router architecture overview operations in millisecond time frame forwarding data plane (hardware) operatres in nanosecond timeframe https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 3/7 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer physical layer: bit-level reception Study data link layer: e.g. Ethernet decentralized switching: using header field values, lookup output port using forwarding table in input port memory ("match plus action") Input port functions goal: complete input port processing at 'line speed' queuing: if datagrams arrive faster than forwarding rate into switch fabric destination-based forwarding, generalized forwarding forward based only on destination IP address destination-based forwarding (traditional) (look at IP address and figure out where to send) generalized forwarding Three Types of switching forward based on any set of header field values memory, bus, crossbar fabrics first generation routers: traditional computers with switching under direct control of CPU switching via memory packet copied to system's memory speed limited by memory bandwidth (2 bus crossings per datagram) IT'S CHEAP https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 4/7 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer datagram from input port memory to output Study memory via a shared bus (EVERYTHING DIRECTLY CONNECTED) switching via a bus bus contention: switching speed limited by bus bandwidth 32 Gbps bus, Cisco 5600: sufficient speed for access and enterprise routers overcome bus bandwidth limitations banyan networks, crossbar, other interconnection nets initially developed to connect processors in switching via interconnection multiprocessor network advanced design: fragmenting datagram into fixed length cells, switch cells through the fabric Cisco 12000: switches 60 Gbps through the interconnection network buffering required when datagrams arrive from fabric faster than the transmission scheduling discipline chooses among queued Output ports (VERY datagrams from transmission IMPORTANT) datagram (packets) can be lost due to congestion, lack of buffers priority scheduling - who gets best performance, network neutrality buffering when arrival rate via switch exceeds output line speed output port queueing queueing (delay) and loss due to output port buffer overflow! https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 5/7 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer input port queuing fabric slower than input ports combined -> Study queueing may occur at input queues (HOL blocking) queued datagram at front of queue prevents others in queue from moving forward head-of-the-line (HOL) queueing delay and loss due to input buffer blocking overflow! most queueing at output but can happen at input -> overwhelming the switch fabric scheduling: choose next packet to send on link FIFO scheduling: send in order of arrival to queue discard policy: if packet arrives to full queue: who to Scheduling mechanisms discard? -tail drop: drop arriving packet -priority: drop/remove on priority basis random: drop/remove randomly packet drop policy- which packet to drop -drop-tail -active queue management (AQM) Traditional Queuing Polices Random Early Detection (RED) - AQM- random based, proactive, tries to help the queue to not get full -triggers timeouts for more packets with larger bandwidth priority scheduling: sned highest priority queued packet Scheduling policies: priority multiple classes, with different priorities -class may depend on marking or other header into, eg IP source/dest, port numbers, etc https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 6/7 22/06/2021 Chapter 4: Network Layer Scheduling policies: still more Chapter 4: Network Layer Flashcards | Quizlet round robin (RR) scheduling: multiple classes Study cyclically scan class queues, sending one complete packet from each class (if available) Weighted Fair Queuing (WFQ) Scheduling policies STILL MORE generalized Round Robin each class gets weighted amount of service in each cycle under contention, weights come into play https://quizlet.com/237108264/chapter-4-network-layer-flash-cards/ 7/7 23/06/2021 Chapter 12 Flashcards | Quizlet Chapter 12 Terms in this set (25) DNS servers recognize two iterative queries types of name resolution recursive queries requests. These two types are.. web queries iterative queries recursive queries address queries Which of the following would 88.143.75.10.in-addr.arpa be the correct FQDN for a resource record in a reverse lookup zone, if the host's IP address is 10.75.143.88? 127.0.0.1.in-addr.arpa 10.75.143.88.in-addr.arpa in-addr.arpa.88.143.75.10 88.143.75.10.in-addr.arpa Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 1/14 23/06/2021 What are the servers at the top Chapter 12 Flashcards | Quizlet Root servers of the DNS hierarchy called? Down-level servers Authoritative sources Root servers Forwarders The typical query one DNS recursive query server sends to a root name server is called a(n) _______. recursive query iterative query referral forwarded query The domain name part of a hierarchical; periods DNS name is _______ and consists of two or more words, separated by ______. peer-based; periods hierarchical; commas unranked; commas hierarchical; periods Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 2/14 23/06/2021 What do you call the source Chapter 12 Flashcards | Quizlet Authoritative source responsible for maintaining a domain's resource records? Authenticate source Authoritative source Root server Down-level server When using DNS for name Less traffic crossing the network perimeter resolution only, why should a company consider using DNS servers outside the network perimeter? Less administration Less internal traffic Fewer servers in the communications server rack Less traffic crossing the network perimeter Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 3/14 23/06/2021 At what level of the DNS Chapter 12 Flashcards | Quizlet At the second-level domain level hierarchy are actual hosts, apart from the root servers? At the root servers level At the top-level domain level At the second-level domain level At the third-level domain level Who is responsible for the Internet Corporation for Assigned Names and ratification of new top-level Numbers (ICANN) domains? Internet Corporation for Assigned Names and Numbers (ICANN) Network Solutions, Inc. (NSI, formerly known as InterNIC) Internet Assigned Numbers Authority (IANA) Contoso.com Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 4/14 23/06/2021 What is the character limit on Chapter 12 Flashcards | Quizlet 63; 255 individual domain names, and the limit on the Fully Qualified Domain Names (FQDNs)? 15; 64 63; 255 31; 128 63; 128 Concerning DNS, what is When a DNS server receives information about a negative caching? non-existent host When a DNS server receives incorrect information about a host When a DNS server receives obsolete information about a host When a DNS server receives information about a nonexistent host When a DNS server forwards incorrect information about a host Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 5/14 23/06/2021 Chapter 12 Flashcards | Quizlet A DNS server receives updated Time To Live (TTL) specified by each DNS server's information. Other DNS servers administrator have outdated information cached. What determines the amount of time that the old DNS data remains cached on a server and an update might occur? The distance (number of network hops) between the new information and queried DNS server Network congestion between DNS servers Time To Live (TTL) specified by each DNS server's administrator The version of Windows Server on the DNS server Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 6/14 23/06/2021 What is the default TTL for a Chapter 12 Flashcards | Quizlet 1 hour Windows Server 2012 R2 DNS server? 1 hour 12 hours 5 minutes 36 hours Why is the DNS service To allow a DHCP server to request a DNS server to included in Windows Server update or create a record. 2012 R2 integrated with DHCP service? To allow a DNS server to inform DHCP clients with updated information. To update both DNS and DHCP clients with information from the Active Directory. To allow a DHCP server to request a DNS server to update or create a record. DNS and DHCP services are not integrated in Windows Server 2012 R2. Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 7/14 23/06/2021 You registered the domain Chapter 12 Flashcards | Quizlet subdomains of contoso.com name contoso.com. The FQDNs DNs seattle.contoso.com and halifax.contoso.com are examples of different _____. subdomains of contoso.com second-level domains top-level domains IP addresses When a DNS server UDP; 53 communicates a name resolution query to another DNS server, what type of datagram is used, and over what port? UDP; 35 TCP; 35 UDP; 53 TCP; 53 Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 8/14 23/06/2021 Concerning DNS domain Chapter 12 Flashcards | Quizlet .com, .net, .org hierarchy, what are examples of global top-level domains? .com, .net, .org .mil, .gov, .edu .aero, .name, .pro .ca, .cz, .kr What are some best practices Avoid an excessive number of domain levels. when creating internal DNS namespaces? Avoid an excessive number of domain levels. Keep domain names full and descriptive; avoid concise subdomains. Place less importance on a convention compared to spelling. Never abbreviate. Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 9/14 23/06/2021 Chapter 12 Flashcards | Quizlet What is the primary purpose of Name caching enables the second name resolution name caching? request for the same name to bypass the referral process. Name caching saves an extraordinary amount of time for the user. Name caching greatly reduces traffic on the company network. Name caching validates why you should deploy cachingonly servers. Name caching enables the second name resolution request for the same name to bypass the referral process. Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 10/14 23/06/2021 Chapter 12 Flashcards | Quizlet What client applications utilize All Internet applications working with host names DNS to resolve host names must use DNS to resolve host names into IP into IP addresses? address. Client web browsers, or any application that uses HyperText Transfer Protocol (HTTP), use DNS to resolve host names into IP addresses. All Internet applications working with host names must use DNS to resolve host names into IP address. Any application on a system that has connectivity to the Internet uses DNS to resolve host names into IP addresses. DNS does not resolve host names into IP addresses. Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 11/14 23/06/2021 Chapter 12 Flashcards | Quizlet What is the primary benefit of a Reducing the traffic and making efficient use of DNS forwarder? available bandwidth across the network perimeter Exchanging iterative queries for recursive queries across the network perimeter Reducing the traffic and making efficient use of available bandwidth across the network perimeter Making the most of iterative queries to other DNS servers Reducing the burden on the Internet's root name servers What DNS server represents Root name server the top of the DNS hierarchy? Root name server Caching-only server Forwarder Authoritative source Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 12/14 23/06/2021 What DNS server is never the Chapter 12 Flashcards | Quizlet Caching-only server authoritative source for a domain, but only serves to resolve names? Root name server Caching-only server Forwarder Authoritative source What DNS server normally Forwarder sends iterative queries to another DNS server? Root name server Caching-only server Forwarder Authoritative source Chapter 12 https://quizlet.com/62609800/chapter-12-flash-cards/ 13/14 23/06/2021 What DNS server is Chapter 12 Flashcards | Quizlet Authoritative source responsible for maintaining a particular domain's resource records? Root name server Caching-only server Forwarder Authoritative source https://quizlet.com/62609800/chapter-12-flash-cards/ 14/14 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 Study Chapter 14,15,17 Terms in this set (80) datagram IP ip attaches a header to upper layer data to form an IP ________ _____ is the foundation on which all of the internet based protocols and internetworking is based. the process in which a protocol may need to divide fragmentation a block received from a higer layer into multiple blocks of some smaller bounded size is called _____ fragmentation in IPV6, ____ may only be performed by source nodes, not by routes, along a packets delivery path a device attached to one of the networks of an an end system internet that is used to support end user applications or services is ______ send IPsec improved error recovery https://quizlet.com/391434236/chapter-141517-flash-cards/ the ____ primitive is used to request transmission of a data unit. the principal feature of ______ is that it can encrypt and/or authenticate all traffic at IP level NOT an enhancement of IPV6 over IPV4 1/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chaptercredit-based 14,15,17 TCP uses ______ flow control technique accept further segments from all of the ff are ways of receiving transport entity to network service cope with the flow control requirement EXCEPT _____ keep alive Study abort connection when no segment are received is the _____ transport protocol timer once the passive open command is issued, the LISTEN transport entity creates a connection object of some sort that is in the _____ state provides a means of informing the destination TCP Urgent data signaling users that significant data is in the upcoming data streams. it is up to the destination user to determine appropriate action. the tcp header ____ field contrains the number of Window data octets, beginning with the sequence number indicated in the ack field that the sender is willing to accept using _________ a sender retransmits a segment before timeout because it infers that the segment was lost. if the sender subsequently receives an ack that does fast retransmit not cover all of the segments transmitted before this is initiated, sender may infer that two segments were lost from current window and retransmit additional segment. routers https://quizlet.com/391434236/chapter-141517-flash-cards/ an internet consist of multiple separate networks that are interconnected by _____. 2/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 IP multicast the most widely used protocol for internetworking Study is the ____ IPV6 allows three types of addresses: anycast, unicast and ______ starting with a 32-bit block consisting of four 8 bit routing header fields, the ______ contains list of one or more intermediate node to be visited on the way to a packets destination a ______ operates at layer 3 of the OSI architecture router and routes packets between potentiall different networks the services to be provided across adjacent primitive protocol layers are expressed in terms of _____ and parameters IP addresses are usually written in _________ notation dotted decimal with a decimal number representing each of the octets of the 32 bit address. 128 IPv6 addresses are ____ bits in length ______ protocol provides an end-to-end transfer Transport service that shields upper-layer protocols from the details of the intervening network or networks. https://quizlet.com/391434236/chapter-141517-flash-cards/ 3/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 socket in TCP, the combination of port and host is reffered Study to as a ______ the TS user can signal to the local TCP entity that it passive open will passively wait for a request with a _______ command. a server program such as time sharing or a file transfer application might do this. when the system upon which a transport entity is running fails and subsequently restarts, the state half open information of all active connections is lost. the affected connections become ______ because the side that did not fail does not yet realize the problem. PDU for virtually all protocols data are transferred in blocks called ____ a function performed by a receiving entity to limit flow control the amount or rate of data is sent by a transmitting entity is _______ an IS used to connect two LANs that use similar LAN protocols and acts as an address filter, picking bridge up packets from one LAN that are intended for a destination on another LAN and passing those packets on is a _____. Data Unit Identifier the ____ is a means of uniquely identifying an endsystem-originated datagram. the effect of the ____ is to erase the portion of the subnet mask host field that refers to an actual host on a subnet, leaving the network number and the subnet number. https://quizlet.com/391434236/chapter-141517-flash-cards/ 4/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 Study a hop-by-hop option that is used to send IPv6 jumbo payload packetss with payloads longer than 65,535 octets is _____ in the ipv4 header ____ specifies how long, in time to live seconds a datagram is allowed to remain in the internet. A _____ consists of a set of computers that VPN interconnect by means of a relatively unsecure network and makes use of encryption and special protocol to provide security. an entity may transmit data to another entity in such connectionless a way that each PDU is treated independently of all prior PDUs. this is known as ____ data transfer. a device used to provide a communications path and perform the necessary relaying and routing intermediate system functions so that data can be exchanged between devices attached to different networks in the internet is an _____ ipv4 although it is intended to ultimately be replaced, ____ is currently the standard IP used in TCP/IP networks. the source and destination address fields in the IP host identifier header each contain an 32 bit global internet address, generally consisting of a network identifier and a _____ https://quizlet.com/391434236/chapter-141517-flash-cards/ 5/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 the IP standard specifies that a compliant Study implementation must also implement _____ which provides a means for transferring messages from ICMP routers and other hosts to a host. because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable. spatial diversity MIMO-MAC with _____ same data is coded and transmitted thru multiple antennas _____ is used on the uplink channel to provide multiple access to subscriber stations ____ scheme uses advance digital signal processing OFDM techniques to distribute the data over multiple carriers at precise frequencies subchannel OFDMA subcarriers are divided into groups and each group is named a _____ with ____ it is possible to simultaneously trainsmit OFDMA either from or to different users by allocating the subcarriers during any one-time interval to multiple users orthogonality https://quizlet.com/391434236/chapter-141517-flash-cards/ the relationship among the subcarriers in OFDM scheme is reffered to as _____ 6/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 OFDMA like ofdm, ___ employs multiple closely spaced Study subcarriers but the subcarriers are divided into group of subcarriers. bursts spatial multiplexing downlink-broadcast channel subchannels are further grouped into ____ which can be allocated to wireless users. the two tupes of MIMO transmission schemes are spatial diversity and _________ two applications of MU-MIMO: UPlink-multiple access channel, MAC and ___________. the ____ is an algorithm that converts a set of FFT (Fast fourier transform) uniformly spaced data points from the time domain to frequency domain ____ defines subchannels that can be allocated to subchannelization subscriber stations depending on their channel conditions and data requirements. for the IEEE 802.11a LAN standard, the OFDM 52 subscribers scheme consists of a set of ______ subcarriers with a base frequency of 0.3125 MHz SC-FDMA performs a _____ prior to the IFFT DFT (discrete fourier transform) operation, which spreads the data symbols over all the subcarriers carrying information and produces a virtual single-carrier structure frequency hopping https://quizlet.com/391434236/chapter-141517-flash-cards/ the first type of spread spectrum is known as ____ 7/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 spread spectrum port CLOSED Keepalive earliest application of _____ were military, where Study it was use as immunity to jamming the ____ variable represents a particular TS user at the specified host. to begin a connection establishment a TS user is in _____ state. abort connection when no segments are received is the ____ transport protocol timer _______ provides a means of informing the destination urgent data signaling TCP user that significant data is in the upcoming data stream. It is up to the destination user to determine appropriate action. capacity,range and reliability spatial multiplexing mimo exploits the space dimensions to improve wireless systems in terms of _________ ____ is when a source data stream is divided among the transmitting antennas. ______ is used on the downlink channel to enable the MIMO-BC base station to transmit different data streams to multiple users over the same frequency band. QPSK https://quizlet.com/391434236/chapter-141517-flash-cards/ ____ is a common modulation scheme used with OFDM. 8/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 SC-FDMA one prominent advantage of _____ over OFDMA Study is the lower peak-to-average power ration of the transmit waveform, which benefit the mobile user in terms of battery life and power efficiency. with ______, each bit in the original signal is DSSS represented by multiple bits in the transmitted signal, using a spreading code. FFT is a family of algorithms that form a special case DFT of the _____, which refers to any algorithm that generates a quantized fourier transform of a timedomain function. ____antenna architecture has become a key MIMO technology in evolving high-speed wireless networks, including IEEE 802.11 Wi-Fi LANs and WiMAX MU MIMO extends the basic MIMO concept to multiple endpoints, each with multiple antennas ____ also called multicarrier modulation, uses OFDM multiple carrier signals at different frequencies, sending some of the bits on each channel. IFFT the _____ reverses the FFT operation multiple users employing the same transport multiplexing protocol and distinguished by port numbers or service access points is _____ https://quizlet.com/391434236/chapter-141517-flash-cards/ 9/10 22/06/2021 Chapter 14,15,17 Flashcards | Quizlet Chapter 14,15,17 host three-way handshake in case of a single network, ____ refers to an attached Study network device connection establishment in TCP always uses ____ one header must serve to perform all protocol 20 mechanism. this header has a minimum length of ___ octets when a data segment arrives that is in sequency, the cummulative receiving TCP entity has two options converning the timing of acknowledgment: immediate and ____ listen for connection attempt at specified security full specified passive open and precedence from specified destination is the description of the TCP service request ____ primitive urgent the two facilities that TCP provides for labeling data are push and _____ the _____ field in the TCP header contains the acknowledgment number sequency number of the next data octet that the TCP entity expects to receive A TCP implementation may employ one of the three batch retransmission strategies: First only, individual and ______ https://quizlet.com/391434236/chapter-141517-flash-cards/ 10/10 22/06/2021 Chapter 15 Flashcards | Quizlet Chapter 15 Study Chapter 15 Terms in this set (41) A transport protocol can be F either connection oriented, such as UDP, or connectionless, such as TCP. (T/F) The receiver needs to adopt T some policy concerning the amount of data it permits the sender to transmit. (T/F) There is no need for F connection establishment and termination procedures to support connection-oriented service with a reliable network service. (T/F) When a TCP entity detects the T presence of congestion in the Internet, it reduces the flow of data onto the Internet until it detects an easing in congestion. (T/F) https://quizlet.com/454497303/chapter-15-flash-cards/ 1/9 22/06/2021 The SYN segment functions Chapter 15 Chapter 15 Flashcards | Quizlet T Study both as a connection request and as a connection acknowledgment. (T/F) In a protocol architecture, the F transport protocol sits above application and other upperlayer protocols, and just below the network or internetwork layer. (T/F) The less the network service T provides, the more the transport protocol must do. (T/F) If there is a single host-node F link over which all virtual circuits are multiplexed, the throughput of a transport connection can exceed the data rate of that link. (T/F) The sliding-window technique T would work well with a reliable network service. (T/F) An internetwork using IP is an F example of a reliable network service. (T/F) https://quizlet.com/454497303/chapter-15-flash-cards/ 2/9 22/06/2021 A credit scheme Chapter 15 is a more Chapter 15 Flashcards | Quizlet T Study effective scheme with an unreliable network service. (T/F) A retransmission timer is the F only timer needed for proper functioning of a transport protocol. (T/F) A problem with a two-way T handshake is the potential loss of segments and the potential presence of obsolete segments. (T/F) As with IP, the services T provided by TCP are defined in terms of primitives and parameters. (T/F) The credit-based flow control T mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination. (T/F) TCP uses a ________ flow control Credit-based technique. https://quizlet.com/454497303/chapter-15-flash-cards/ 3/9 22/06/2021 The ________ variable represents a Chapter 15 Chapter 15 Flashcards | Quizlet Port Study particular TS user at the specified host Answer: Accept further segments from the network service All of the following are ways of the receiving transport entity - use a credit scheme to cope with the flow control requirement EXCEPT: - do nothing - use a fixed sliding-window protocol To begin a connection CLOSED establishment a TS user is in a ________ state. Multiple users employing the Multiplexing same transport protocol and distinguished by port numbers or service access points is ________. "Abort connection when no Keepalive segments are received" is the ________ Transport Protocol Timer. In the case of a single network, Host ________ refers to an attached network device. https://quizlet.com/454497303/chapter-15-flash-cards/ 4/9 22/06/2021 Once the Passive Chapter 15 Open Chapter 15 Flashcards | Quizlet LISTEN Study command is issued, the transport entity creates a connection object of some sort that is in the ________ state. Connection establishment in Three-way handshake TCP always uses a ________. ________ provides a means of Urgent data signaling informing the destination TCP user that significant data is in the upcoming data stream. It is up to the destination user to determine appropriate action. One header must serve to 20 perform all protocol mechanisms. This header has a minimum length of ________ octets. The TCP header ________ field Window contains the number of data octets, beginning with the sequence number indicated in the acknowledgment field, that the sender is willing to accept. https://quizlet.com/454497303/chapter-15-flash-cards/ 5/9 22/06/2021 When a data Chapter 15segment arrives Chapter 15 Flashcards | Quizlet Cumulative Study that is in sequence, the receiving TCP entity has two options concerning the timing of acknowledgment: Immediate and ________. The ________ protocol provides Transport an end-to-end transfer service that shields upper-layer protocols from the details of the intervening network or networks. A ________ service provides for connection-oriented the establishment, maintenance, and termination of a logical connection between TS users. To date this is the most common type of protocol service available and has a wide variety of applications. In TCP the combination of port Socket and host is referred to as a ________. https://quizlet.com/454497303/chapter-15-flash-cards/ 6/9 22/06/2021 In addition 15 to data each Chapter Chapter 15 Flashcards | Quizlet Sequence number Study transmitted segment includes in its header three fields related to flow control: acknowledgment number, window, and ________. The TS user can signal to the Passive Open local TCP entity that it will passively wait for a request with a ________ command. A server program such as timesharing or a file transfer application might do this. A ________ timer is reset with each Persist outgoing segment. If this timer ever expires the protocol entity is required to send a segment, even if it duplicates a previous one. When the system upon which a Half open transport entity is running fails and subsequently restarts, the state information of all active connections is lost. The affected connections become ________ because the side that did not fail does not yet realize the problem. https://quizlet.com/454497303/chapter-15-flash-cards/ 7/9 22/06/2021 ________ measures Chapter 15 the time the Chapter 15 Flashcards | Quizlet Keepalive Study transport machine will continue to await an acknowledgment of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer expires, the transport entity assumes that the other transport entity or intervening network has failed, closes the connection, and signals an abnormal close to the TS user. TCP uses only a single type of TCP segment protocol data unit called a ________. The ________ field in the TCP Acknowledgement number header contains the sequence number of the next data octet that the TCP entity expects to receive. TCP mechanisms can be Connection establishment grouped into the categories of data transfer, connection termination, and ________. A TCP implementation may Batch employ one of three retransmission strategies: First-only, Individual, and ________. https://quizlet.com/454497303/chapter-15-flash-cards/ 8/9 22/06/2021 In addition 15 to TCP, the ________ is Chapter Chapter 15 Flashcards | Quizlet UDP Study the other transport-level protocol that is commonly used as part of the TCP/IP protocol suite. https://quizlet.com/454497303/chapter-15-flash-cards/ 9/9 22/06/2021 CIS 4840 Chapter 14 Flashcards | Quizlet CIS 4840 Chapter 14 Study CIS 4840 Chapter 14 Terms in this set (30) Datagram IP attaches a h header to upper data to form an IP A Next generation IP, known as ______, provides IPv6 longer address field and more functionality than the current IP. _____________ is the foundation on which all of the IP internet-based protocols and internet working is based. PDUs (Protocol Data Units) For virtually all protocols data are transferred in blocks called_______. The process in which a protocol may need to divide Fragmentation a block received from a higher layer into multiple blocks of toe bounded size is called _______. A Function performed by receiving entity to limit Flow Control the amount or rate of data that is sent by transmitting entity is ________. Fragmentation https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/ in IPV6 _______ may only be performed by source nodes, not by routers, along a packets deliver path. 1/5 22/06/2021 CIS 4840 Chapter 14 Flashcards | Quizlet CIS 4840 Chapter 14 An IS used to connect two LANS that use similar Study LAN protocols and acts a an address filter, picking Bridge up packets from one LAN that are intended for a destination on another LAN and passing those packets on, is a ____________. A device attached to one of the networks of an An end system internet that is used t support end user applications or services is_______. Data Unit Identifier Send The _______ is a means of uniquely identifying an endsystem originated datagram. The _______ primitive is used to request transmission of a data unit. The effect of the _____ is to erase the portion of the Subnet mask host field that refers to an actual host on a subnet, leaving the network number and the subnet number. IPSec Jumbo payload https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/ The principal feature of ______ is that it can encrypt and. or authenticate all traffic at the IP level. a hop-by-hop that is used to send IPV6 packets with payloads longer than 65,535 octets is ________. 2/5 22/06/2021 CIS 4840 Chapter 14 Flashcards | Quizlet CIS 4840 Chapter 14 Which of the following is NOT an enhancementStudy of IPv6 over IPv4? Improved error recovery a. support for resource allocation b. Improved error recover c. Address auto configuration d. Expanded address space routers An internet consists of multiple separate networks that are interconnected by _______. In the IPV4 Header _____ specifies how long, in TTL (time to Live) seconds, a datagram is allowed to remain in the internet. IP (internet protocol) the most widely used protocol for internet working us the _______. A ______ consists of a set of computers that VPN (virtual private network) interconnect by means of a relatively insecure network and makes use of encryption and special protocols to provide security. multicast IPV6 allows three types of addresses: unicast, any cast, and _____. An entity may transmit data to another entity in such connectionless a way that each PDU is treated independently of all prior PDUs. This is known as ____ data transfer. Starting with 32-bit block consisting of four 8-bit routing header fields, the _____ contains a list of one or more intermediate nodes to be visited the way to a packets destination. https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/ 3/5 22/06/2021 CIS 4840 Chapter 14 Flashcards | Quizlet CIS 4840 Chapter 14 Study A device used to provide a communications path and perform the necessary relaying and routing intermediate system (IS) functions so that data can be changing between devices attached into different networks in the internet as an_____. A ______ operates at layer 3 of the OSI architecture router and routes packets between potentially different networks. Although it is intended to ultimately be replaced, IPV4 _____ is currently the standard IP used in TCP/IP networks. primitives the service to be provided across adjacent protocol layers are expressed in terms of ____ and parameters. The source and destination address fields in the IP host identifier header each contains a 32-bit global Internet address, generally consisting of a network identifier and a _____. IP addresses are usually written in _____ notation, with dotted decimal a decimal number representing each of the octets of the 32-bit address, https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/ 4/5 22/06/2021 CIS 4840 Chapter 14 Flashcards | Quizlet CIS 4840 Chapter 14 Th IP standard specifies that a complaint Study implementation must al implement _______, which internet control message protocol (ICMP) provides a means for transferring messages form router and other hosts to a host. Because these messages are transmitted in IP datagrams, their delivery is to guaranteed and the use cannot be considered reliable. 128 https://quizlet.com/348641704/cis-4840-chapter-14-flash-cards/ IPV6 addresses are ____ bits in length. 5/5 23/06/2021 CIS*3210 - True or False Flashcards | Quizlet CIS*3210 - True or False Terms in this set (5) A user requests a Web page False that consists of some text and three images. For this page, the client will send one request message and receive four response messages. Two distinct Web pages can be True sent over the same persistent connection With nonpersistent False connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages The Date: header in the HTTP False response message indicates when the object in the response was last modified. HTTP response messages False never have an empty message body https://quizlet.com/173544792/cis3210-true-or-false-flash-cards/ 1/1 22/06/2021 CNT 4104 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks CNT 4104 Study CNT 4104 Terms in this set (190) Data communications deals true with the transmission of signals in a reliable and efficient manner Changes in corporate data true traffic patterns are driving the creation of high-speed WANs A modem is required to true establish communication between a workstation and a server over a public telephone network Compression refers to the false ability of a number of devices to share a transmission facility The basic building block of any true communications facility is the transmission line https://quizlet.com/344469319/cnt-4104-flash-cards/ 1/26 22/06/2021 Developing CNT 4104 switching systems CNT 4104 Flashcards | Quizlet false Study with the capacity and rapid response to support the demand requirements with the increased use of fiber optic transmission is no longer a challenge Frame relay networks are false. Packet-switching networks are commonly commonly used for terminal- used to-computer and computer-tocomputer communications The LAN is owned by the same true organization that owns the attached devices Enterprises have formed ____ to intranets and extranets reach customers, suppliers, and partners while isolating their proprietary information from unwanted access A dominant architecture in the client/server business environment and the more recent Web-focused intranet trend is _________ computing The key elements of a simple source, transmission, destination communications model are DWDM enables capacities of terabits ____ per second https://quizlet.com/344469319/cnt-4104-flash-cards/ 2/26 22/06/2021 CNT 4104 Flashcards | Quizlet CNT 4104 An _____ uses Internet and Web Study intranet technology in an isolated facility internal to an enterprise A network in which small packet switching chunks of data are passed through the network from node to node, and at each node the entire data chunk is received, stored briefly, and then transmitted to the next node, is a _____ network In order for data processing exchange management devices to communicate certain conventions must be decided on. These requirements can collectively be termed _____ In situations in which an recovery information exchange is interrupted due to a fault somewhere in the system, ____ techniques are needed to either resume activity at the point of interruption or to restore systems to their state prior to the beginning of the exchange https://quizlet.com/344469319/cnt-4104-flash-cards/ 3/26 22/06/2021 In a _____ network, a dedicated CNT 4104 CNT 4104 Flashcards | Quizlet circuit switching Study communications path is established between two stations through the nodes of the network. The telephone network is the most common example A _____ is a physical facility that NAP / network access provider provides the infrastructure to move data between connected networks Individual hosts and LANs are POP / point of presence connected to an Internet Service Provider through a ___ The place where telephone CO / central office companies terminate customer lines and locate switching equipment to interconnect those lines with other networks is the ___ Today's networks can offer QoS / quality of service differing levels of ______, which include specifications for maximum delay and minimum throughput https://quizlet.com/344469319/cnt-4104-flash-cards/ 4/26 22/06/2021 An _____4104 extends a company's CNT CNT 4104 Flashcards | Quizlet extranet Study intranet out onto the Internet to allow selected customers, suppliers, and mobile workers to access the company's private data and applications ______ is required to assure that flow control the source does not overwhelm the destination by sending data faster than they can be processed and absorbed. Networks that generally cover wide area networks a large geographical area, require the crossing of public right-of-ways, consists of a number of interconnected switching nodes, and rely on circuits provided by a common carrier are _____ Using fixed length packets and asynchronous transfer mode sometimes referred to as cell relay, _______ is a culmination of developments in circuit switching and packet switching. It is so efficient that it can offer a constant data rate channel even though it is using a packet switching technique https://quizlet.com/344469319/cnt-4104-flash-cards/ 5/26 22/06/2021 _______ networks CNT 4104 provide CNT 4104 Flashcards | Quizlet wireless Study advantages in the areas of mobility and ease of installation and configuration. The Internet evolved from the ARPANET ____ which was developed in 1969 by the Advanced Research Projects Agency of the U.S Department of Defense Communicating across internetworking arbitrary, multiple, packetswitched networks is _____ Each IP packet includes an IP address unique numeric address of the destination host. This address is referred to as an ________ __________ is the process of compression squeezing the data down so that a lower capacity, cheaper transmission facility can be used to meet a given demand The OSI protocol architecture true consists of 5 layers: physical, network access, internet, transport, and application https://quizlet.com/344469319/cnt-4104-flash-cards/ 6/26 22/06/2021 Procedures CNT 4104needed to allow CNT 4104 Flashcards | Quizlet true Study data to transverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture For most applications running true as part of the TCP/IP protocol architecture, the transport layer protocol is TCP The software used at the false network access layer is not dependent on the type of network used because circuit switching, packet switching and local area networks all have the same standards. FTP provides a basic electronic false. Simple Mail Transfer Protocol provides a basic mail transport facility. electronic mail transport facility SSH is an application later true protocol in TCP/IP architecture SSH protocol enables the user true and the remote authenticate each other https://quizlet.com/344469319/cnt-4104-flash-cards/ 7/26 22/06/2021 The development of IP CNT 4104 CNT 4104 Flashcards | Quizlet true Study (Internet Protocol) is used at the internet layer to provide the routing function across multiple networks. It is not necessary for each false host on a subnetwork to have an unique global internet (i.e., IP) address. TCP numbers the segments true that it sends to a particular destination port sequentially. TCP is a host-to-host protocol true TCP is an internet layer false. TCP is in the transport layer protocol Wi-Fi is an application layer false. Wifi is in the Network access/Data link layer protocol. HTTP is an internet later false. HTTP is in the application layer protocol Because UDP is not a reliable false. both TCP and UDP must contain source and protocol, its header contains destination port numbers of their host no source and destination port numbers https://quizlet.com/344469319/cnt-4104-flash-cards/ 8/26 22/06/2021 UDP is4104 more reliable than TCP CNT CNT 4104 Flashcards | Quizlet false Study protocol TCP header contains a true sequence number of the contained segment but UDP does not. The key features of a protocol timing are: syntax, semantics and ________ The ________ layer is concerned network access with the exchange of data between an end system and the network to which it is attached. The header format for TCP is a 20 minimum of ___ octets _______ provides a basic SMTP electronic mail transport facility The communication task can transport be organized into three relatively independent layers: network access layer, application layer, and _____ layer https://quizlet.com/344469319/cnt-4104-flash-cards/ 9/26 22/06/2021 The full form of UDP is ______ CNT 4104 CNT 4104 Flashcards | Quizlet user datagram Study protocol Transport layer PDU is called packet segment while network access layer PDU is called ______ In data communication, an 8 octet contains ___ bits of data Providing procedures to allow internet data to traverse multiple interconnected networks is the function of the _____ layer in TCP/IP protocol architecture In the TCP/IP protocol physical architecture, the ________ layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals and the data rate. ________ (SSH) protocol provides secure shell a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer. https://quizlet.com/344469319/cnt-4104-flash-cards/ 10/26 22/06/2021 Each application on a CNT 4104 CNT 4104 Flashcards | Quizlet service access Study computer has an address that is unique within that computer known as ________ Points (SAPs) or ports that allow the transport layer to support multiple applications at each computer. ________ is when the sending TCP checksum includes a code that is a function of the contents of the remainder of the segment. The receiving TCP performs the same calculation and compares the result with the incoming code. A discrepancy results if there has been some error in transmission. IPv4 includes 32 bits source 128 address field but IPv6 includes Based on our textbook, network access Ethernet is a commonly used protocol at ________ (or data link) layer of the TCP/IP protocol suite. Sockets programming is a new false technology developed for mobile communications applications https://quizlet.com/344469319/cnt-4104-flash-cards/ 11/26 22/06/2021 A ___ socket CNT 4104is one computer CNT 4104 Flashcards | Quizlet client/server Study uses an address to call a _____ socket on another computer Computers with server sockets false. computers with server sockets keep a TCP or normally keep their TCP or UDP port open. ready for incoming calls. UDP port closed until incoming calls are detected. In socket programming, the port/IP concatenation of a TCP or UDP ______ value and an ______ address forms a socket, which is unqiue throughout the Internet It is possible for an application true to have multiple socket addresses In practice, when socket protocol/address programming is used as an API, a socket is identified by the triple_____, local _____, local process In socket programming, ____ datagram sockets make use of UDP protocol https://quizlet.com/344469319/cnt-4104-flash-cards/ 12/26 22/06/2021 If all blocks CNT 4104of data sent CNT 4104 Flashcards | Quizlet stream Study between a pair of sockets need to be guaranteed for delivery and arrive in the order that they were sent, ______ sockets must be considered Which is not a core socket recvfrom() function for a stream socket? The server side of a connection accept() must use ___________ socket core function to remove one client request from its queue. The first step in using Sockets In the core socket functions of create a new socket domain language C, the socket() command includes three parameters. AF_UNIX, AF_INET, and AF_INET6 are possible values of the ____________ parameter. Every computer, PC or server, false is allowed to have one and only one IP address Once an IP address is assigned false to a device, the IP address never changes when the device is placed in different location https://quizlet.com/344469319/cnt-4104-flash-cards/ 13/26 22/06/2021 Every router CNT 4104 has a MAC CNT 4104 Flashcards | Quizlet true Study address and, when a router is moved from one room to the other or from one building to another building, its MAC address never changes. Every IP address is 32-bit long false. IPv4 is 32 bits but IPv6 is 128 bits because it is a standard. ARP (Address Resolution) is a false protocol defined in the application layer ARP can translate or map an IP true address to a corresponding MAC address Every ICMP header consists of true 64 bits of data no matter what type of message it contains. Because ICMP is a kind of or a false. some ICMP messages dont need an IP part of IP protocol in TCP/IP, addresses every ICMP message contains the source host IP address and destination host IP address. https://quizlet.com/344469319/cnt-4104-flash-cards/ 14/26 22/06/2021 Because VPN (Virtual Private CNT 4104 CNT 4104 Flashcards | Quizlet false Study Network) involves the use of public Internet technology, it generally requires higher cost and more complex maintenance than implementing and operating a full private network. Because IPsec is located in the true IP layer, when it is implemented in a router, there is no need to change applications software on a user or server system. We can use and implement true IPsec in a system to include authentication-only function. Encryption is not compulsory. The IP address 216.85.40.100 is true a Class C address. network using a standard Class true A network number (or ID) can host more computers than Class C. Two networks with the same false. every network must have a unique ID or subnet mask means they have number the same network ID or number. https://quizlet.com/344469319/cnt-4104-flash-cards/ 15/26 22/06/2021 SMTP 4104 standardizes the CNT CNT 4104 Flashcards | Quizlet true Study message character set as 7-bit ASCII. The author MUA processes false. The recipient MUA processes receive mail for receive mail for storage and/or storage and/or display to the recipient users display to the recipient user. POP3 is more complex than false IMAP SMTP is limited to the true conversation that takes place between the Message Store (MS) and Message user agent (MUA) RFC 824 is the standard true protocol for transferring mail between hosts in the TCP/IP suite; it is defined in RFC 821 IMAP always keeps messages true on the server and replicates copies to the clients. Domains of URL are organized false in a network rather than hierarchical structure. DNS allows essentially false. DNS allows essentially unlimited levels and unlimited levels and uses the uses the period as level delimiter in printed names comma as the level delimiter in printed names. https://quizlet.com/344469319/cnt-4104-flash-cards/ 16/26 22/06/2021 CNT 4104 Flashcards | Quizlet Typically, for fast transmission, CNT 4104 false. single queries are carried over UDP and single queries to find IP queries for a grup pf names are carried over TCP Study address of a domain name are carried over TCP and queries for a group of names are carried over UDP. The _________ is responsible for MDA transferring the message from the MHS to the MS. The ________ relays mail for one MTA application-level hop. The _______ is a directory lookup DNS service that provides a mapping between the name of a host on the Internet and its numerical address. The protocol that is used for SMTP transfer of mail from a user agent to a MTA and from one MTA to another is the _________ . ________ supplements SMTP and MIME allows the encapsulation of multimedia (nontext) messages inside of a standard SMTP message. https://quizlet.com/344469319/cnt-4104-flash-cards/ 17/26 22/06/2021 CNT 4104 Flashcards | Quizlet ________ 4104 is an Internet standard CNT POP3 Study defined in RFC 1939 that supports the basic functions of download and delete for email retrieval. ________ are programs that extract Resolvers information from name servers in response to client requests. _______ are server programs that Name servers hold information about a portion of the domain name tree structure and the associated RRs. The _______ domain is dedicated biz exclusively for private businesses. a transaction-oriented client/server protocol, a HTTP is ___________ . stateless protocol, and flexible in the formats it can handle A ________ is a server that appears gateway to the client as if it were an origin server. A _______ is a forwarding agent, proxy receiving a request for a URL object https://quizlet.com/344469319/cnt-4104-flash-cards/ 18/26 22/06/2021 The ________ is the foundation CNT 4104 CNT 4104 Flashcards | Quizlet HTTP Study protocol of the World Wide Web and can be used in any client/server application involving hypertext Each name server is configured zone with a subset of the domain name space, known as a ________ , which is a collection of one or more subdomains within a domain, along with the associated RRs Four elements comprise the resolvers DNS: domain name space, DNS database, name servers, and The SMTP sender takes 25 messages from the outgoing mail queue and transmits them to the proper destination host via SMTP transactions over one or more TCP connections to port ____ on the target hosts. Three intermediate HTTP tunnel systems include proxy, gateway, and ______. https://quizlet.com/344469319/cnt-4104-flash-cards/ 19/26 22/06/2021 _____ real-time CNT 4104 applications have CNT 4104 Flashcards | Quizlet hard Study zero loss tolerate of the communicated data. In ________ real-time applications, hard a deterministic upper bound on jitter and high reliability takes precedence over network utilization considerations. Delay jitter is the maximum delay variation in __________ experienced by packets in a single real-time communication session. VoIP works by encoding ________ voice information into a digital format, which can be carried across IP networks in discrete packets Whereas traditional telephone circuit/packet networks allocate dedicated circuits for voice communications using _____ switching, VoIP uses _____ switching, allowing the sharing of transmission capacity https://quizlet.com/344469319/cnt-4104-flash-cards/ 20/26 22/06/2021 The __________, CNT 4104 defined in RFC CNT 4104 Flashcards | Quizlet session initiation protocol Study 3261, is an application level control protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network SIP supports five facets of session setup establishing and terminating multimedia communications: user capabilities, user availability, ____________, session management, and user location. The term softphone refers to VoIP software operating on a PC that implements _______. The __________ data transfer RTP protocol is used only for the transmission of user data, typically in multicast fashion among all participants in a session The ___________ Protocol (SDP) session description describes the content of sessions, including telephony, Internet radio, and multimedia applications. https://quizlet.com/344469319/cnt-4104-flash-cards/ 21/26 22/06/2021 The Payload CNT 4104 Type field of a CNT 4104 Flashcards | Quizlet false. The Payload Type field of RTP header is 7Study bits RTP header is 1 bit long The values in the RTCP Sender false. Not only the receivers and network managers, Report enable only the but also the senders receivers and network managers to monitor the condition on the network as they relate to a particular session. Every RTP header always false contains a fixed number of fields, which is 96 bits long. The packet loss values in a false. pack loss values are an indication of persistent RTCP Sender Report give an congestion indication of transient congestion. RTCP receivers can only false. RTCP receivers provide reception quality provide reception quality feedback using a Sender Report or a Receiver feedback by using a Receiver Report. Report. Sender Reports are not allowed for this purpose. The performance metrics of real-time interest of traditional Internet applications such as file transfer and electronic mail are generally throughput and delay. By contrast, ______________ applications are more concerned with timing issues https://quizlet.com/344469319/cnt-4104-flash-cards/ 22/26 22/06/2021 Assume, in a single real-time CNT 4104 CNT 4104 Flashcards | Quizlet 7.6 Study communication session, the minimum end-to-end delay seen by any packet is 0.4 ms and the maximum is 8 ms. Then, the delay jitter should be ____ ms In a real-time audio false communication connection, if the delay jitter of a buffer is already set to 6 ms, then any incoming packets that has experienced a relative of less than this setting would have to be discarded so as not to be played back out of order. Real-time applications are true more concerned with timing issues than non-real-time applications. A VoIP system is usually more false expensive to operate than an equivalent telephone system with a PBX and conventional telephone network service. SIP can support only single false. Multimedia is supported media in teleconferencing. Multimedia is currently not supported. https://quizlet.com/344469319/cnt-4104-flash-cards/ 23/26 22/06/2021 A user4104 agent server (UAS) CNT CNT 4104 Flashcards | Quizlet false. User agent client (UAC) issues SIP requestStudy issues SIP requests. The jitter measure may provide true a warning of increasing congestion before it leads to packet loss. The RTP Timestamp is the false. The NTP Timestamp is the absolute wall clock absolute wall clock time when time when the report was sent this RTP header was sent. The Payload Type field of a true RTP header identifies the media type of the payload and the format of the data, including the use of compression or encryption. If an application-level firewall false. If an application level firewall prevents the prevents the forwarding of RTP forwarding of RTP packets, translator relays should packets, mixer relays should be be used to solve this problem. used to solve the problem. A transport protocol can be false. UDP is connectionless and TCP is connection either connection oriented, oriented such as UDP, or connectionless, such as TCP. The receiver needs to adopt true some policy concerning the amount of data it permits the sender to transmit. https://quizlet.com/344469319/cnt-4104-flash-cards/ 24/26 22/06/2021 CNT 4104 Flashcards | Quizlet There 4104 is no need for CNT false. There is a need because connection oriented Study connection establishment and allows each end to assure that the other exists, termination procedures to allows exchange or negotiation of optional support connection-oriented parameters, triggers allocation of transport entity service with a reliable network resources service. When a TCP entity detects the true presence of congestion in the Internet, it reduces the flow of data onto the Internet until it detects an easing in congestion. The SYN segment functions true both as a connection request and as a connection acknowledgment. In a protocol architecture, the false. Transport protocol sits above network layer transport protocol sits above and just below application and other upper=layer application and other upper- protocols layer protocols, and just below the network or internetwork layer. The less the network service true provides, the more the transport protocol must do. The sliding-window technique true would work well with a reliable network service. https://quizlet.com/344469319/cnt-4104-flash-cards/ 25/26 22/06/2021 CNT 4104 Flashcards | Quizlet An internetwork using IP is an CNT 4104 false. Internetworking using IP is an example ofStudy example of a reliable network unreliable network service service. A credit scheme is a more true effective scheme with an unreliable network service. https://quizlet.com/344469319/cnt-4104-flash-cards/ 26/26 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet Computer Networking Ch.2.1(slides) Terms in this set (60) At the core of network application development is programs communicate writing _____________ that run on different systems and _____________ with each other over the network In a Web application there are _____________ distinct programs that _____________ with each other: the two communicate browser host _____________ program running in the user's _____________ web web host (desktop, laptop, tablet, smartphone, etc); and the _____________ server program running in the _____________ server _____________. In a _____________ file-sharing system there is a _____________ P2P program in each host that participates in the file-sharing community. The programs in the various hosts may be similar or identical When developing a network application, you need multiple end systems to write software that will run on _____________ _____________ _____________ When developing a network application, you do network core NOT need to write software that runs on _____________ _____________ devices, such as routers or link-layer switches Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 1/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet network-core devices do not run user applications Even if you wanted to write application software for network-core devices, you wouldn't be able to do so. WHY? The application _____________ , is designed by the architecture developer application _____________ and dictates how the structured application is _____________ over the various end systems. In choosing the application architecture, an application developer will likely draw on one of the client server peer to peer two predominant architectural paradigms used in modern network application: the _____________ _____________ architecture or the _____________ -_____________ _____________ architecture In a _____________ -_____________ architecture, there is an client server server clients always-on host, called the _____________ , which services requests from many other hosts, called _____________ . A classic example of a client-server architecture is web server the _____________ _____________ for which an always-on Web server services requests from browsers running on client hosts. When a web server receives a _____________ for an request requested object object from a client host, it responds by sending the _____________ _____________ to the client host Note that with the client-server architecture, clients _____________ do not directly communicate with each other; for example, in the web application, two browsers do not directly communicate Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 2/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet Another characteristic of the client-server server fixed address address architecture is that the _____________ has a _____________ , well-known _____________ , called an IP _____________ . Because the server has a fixed, well-known address, always on client server IP and because the server is _____________ _____________ , a _____________ can always contact the _____________ by sending a packet to the server's_____________ address Some of the better-known applications with a web FTP email client-server architecture include the _____________ ,_____________ , and _____________ File Transfer Protocol FTP A single-server host is incapable of keeping up with data center all the requests from clients. For this reason , a _____________ _____________ is used to create a powerful virtual server. server: always on permanent data _____________ -_____________ host centers _____________ IP address _____________ _____________ for scaling clients: communicate with _____________ server intermittently dynamic may be _____________ connected communicate directly may have _____________ IP addresses do NOT _____________ _____________ with each other Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 3/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet dedicated servers In a P2P architecture, there is minimal(or no) reliance on _____________ _____________ in data centers P2P applications exploit _____________ communication direct intermittently peers between pairs of _____________ connected hosts, called _____________ the peers in a P2P network are not owned by the users service provider, but are instead desktops and laptops controlled by _____________ , with most of the peers residing in homes, universities, and offices. Because the peers communicate without passing dedicated server through a _____________ _____________ , the architecture is called peer-to-peer self scalability One of the most compelling features of P2P architectures is their _____________ -_____________ in a P2P file-sharing application, although each peer service capacity generates workload by requesting files, each peer also adds _____________ _____________ to the system by distributing files to other peers P2P are also _____________ ____________, since they don't cost effective infrastructure require significant server _____________ and server bandwidth( in contrast with clients-server designs with datacenters Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 4/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet P2P major challenge 1: _____________ _____________ : residential ISPs have higher bandwidth for downstream than upstream traffic. But P2P video ISP friendly streaming and file distribution applications shift upstream traffic from servers to residential ISPs, thereby putting significant stress on the ISPs. P2P major challenge 2: _____________ : because of their security highly distributed and open nature, P2P applications can be a challenge to secure P2P major challenge 3: _____________ : P2P applications also depend on convincing users to volunteer incentives incentive bandwidth, storage, and computational resources to the applications, which is the challenge of _____________ design P2P architecture: NO _____________ -_____________ server arbitrary end systems _____________ communicate always on directly self scalability directly IP addresses _____________ _____________ -new peers bring new service capacity, as well as new service demands peers are _____________ connected and change _____________ ___________ --complex management hybrid Some applications have _____________ architectures, combining both client-server and P2P elements Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 5/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet Hybrid example: many instant messaging applications use servers to track the _____________ IP addresses _____________ of users, but user-to-user messages are sent directly between user hosts without passing through intermediate servers. processes process end system It is not actually programs, but _____________ that communicate A _____________ can be though of as a program running within an _____________ _____________ When processes are running on the same end interprocess communication system, they can communicate with each other with operating system _____________ _____________ , using rules that are governed by the end system's _____________ _____________ processes on two different end systems computer network communicate with each other by exchanging messages across the _____________ _____________ sending process receiving proces a _____________ _____________ creates and sends messages into the network a _____________ _____________ receives these messages and possibly responds by sending messages back a _____________ application consists of _____________ of network pairs processes that send messages to each other over a network. Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 6/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet communicating processes client server client server for each pair of _____________ _____________ , we typically label one of the two processes as the _____________ and the other process as the _____________ . with the web, a browser is a _____________ process and a web server is a _____________ process with P2P file sharing, the peer that is downloading client server the file is labeled as the _____________ , and the peer that is uploading the file is labeled as the _____________ in the context of a communication session between a pair of processes, the process that initiates the client server communication is labeled as the _____________ . the process that waits to be contacted to begin the session is the _____________ process: program running within a __________ within same host, two processes communicate using _____________- _____________ _____________ host inter process processes in different hosts communication messages communicate by exchanging client server _____________ _____________ process: process that initiates communication _____________ process: process that waits to be contacted underlying network any message sent from one process to another must go through the _____________ _____________ Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 7/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet a _____________ sends messages into and receives process socket messages from, the network through a software interface called a _____________ house door a process is analogous to a _____________ and its socket analogous to its _____________ the sending process assumes that there is a transportation infrastructure _____________ _____________ on the other side of the door that will transport the message to the door of the destination process application transport Application Programming Interface a socket is the interface between the _____________ layer and the _____________ layer within the host a socket is also referred to as the _____________ _____________ _____________ (API) between the application and the network the application developer has control of everything on the application-layer side but can only control the following on the transport-layer: transport protocol buffer 1. the choice of _____________ _____________ and 2. perhaps the ability to fix a few transport-layer parameters such as maximum _____________ and maximum segment sizes In order for a process running on one host to send receiving process packets to a process running on another host, the _____________ _____________ needs to have an address Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 8/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet to identify the receiving process, two pieces of information need to be specified: address identifier 1. the _____________ of the host and 2. an _____________ that specifies the receiving process in the destination host IP address host with the internet, the host is identified by its _____________ _____________ An IP address is a 32-bit quantity that we can think of as uniquely identifying the _____________ in addition to knowing the address of the host to which a message is destined, the sending process receiving process must also identify the _____________ _____________ (more specifically, the receiving socket) running in the host in addition to knowing the address of the host to which a message is destined, the sending process must also identify the receiving process (more port number specifically, the receiving socket) running in the host a destination _____________ _____________ serves this purpose popular applications have been assigned specific _____________ number. for example a web server is port 80 25 identified by port number _____________ . a mail server(using the SMTP protocol) is identified by the port number _____________ Computer Networking Ch.2.1(slides) https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 9/10 22/06/2021 Computer Networking Ch.2.1(slides) Flashcards | Quizlet identifier to receive messages, process must have _____________ IP address host device has unique 32-bit _____________ _____________ https://quizlet.com/150423719/computer-networking-ch21slides-flash-cards/ 10/10 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Computer Science Flash cards Study Computer Science Flash cards Terms in this set (26) What is the difference between a host and an end system? List the types of end systems. Is a web server an End system? What is a client program? What is a server program? Does a server program request and receive services from a client program? https://quizlet.com/255661203/computer-science-flash-cards/ There is no difference. Throughout this text, the words "host" and "end system" are used interchangeably. End systems include PCs, PCs workstations, Web servers, mail servers, Internetconnected PDAs, WebTVs, etc. A networking program usually has two programs, each running on a different host, communicating with each other. The program that initiates the communication is the client. Typically, the client program requests and receives services from the server program. 1/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Study Computer Science Flash cards 1. Dial-up modem over telephone line: residential; 2. DSL over telephone line: 1. residential or small office; List 6 access technologies. Classify each one a residential access, company access, or mobile access. 2. Cable to HFC: residential; 3. 100 Mbps switched 4. Ethernet: company; 5. Wireless LAN: mobile; 6. Cellular mobile access (for example, WAP): mobile Is HFC transmission rate HFC bandwidth is shared among the users. On the dedicated or shared among downstream channel, all packets emanate from a users? Are collisions possible single source, namely, the head end. Thus, there are in a downstream HFC channel? no collisions in the downstream channel. Why? List the available residential access technologies in your city. For each type of access provide the advertised downstream rate, upstream rate and monthly price. https://quizlet.com/255661203/computer-science-flash-cards/ 1. dial-up; 2. DSL; 3. cable modem; 4. fiber-to-the-home. 2/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Study Computer Science Flash cards Ethernet LANs have transmission rates of 10 Mbps, What is the transmission rate of Ethernet LANs? For a given transmission rate can each user on the LAN continuously 100 Mbps, 1 Gbps and 10 Gbps. For an X Mbps Ethernet (where X = 10, 100, 1,000 or 10,000), a user can continuously transmit at the rate X Mbps if that user is the only person sending data. If there are transmit at that rate? more than one active user, then each user cannot What are some of the physical Ethernet most commonly runs over twisted-pair media and Ethernet can run copper wire and "thin" coaxial cable. It also can run over? over fibers optic links and thick coaxial cable. Dial-up modems, HFC, DSL, Dial up modems: up to 56 Kbps, bandwidth is and FTTH are all user for dedicated; ISDN: up to 128 kbps, bandwidth is redisential access. For each of dedicated; ADSL: downstream channel is .5-8 Mbps, these access technologies, upstream channel is up to 1 Mbps, bandwidth is provide a range of transmission dedicated; HFC, downstream channel is 10-30 Mbps rate and comment on whether and upstream channel is usually less than a few the transmission rate is shared Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; or dedicated. 10-20 Mbps download; bandwidth is not shared https://quizlet.com/255661203/computer-science-flash-cards/ continuously transmit at X Mbps 3/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Study Computer Science Flash cards There are two most popular wireless Internet access technologies today: a) Wireless LAN: In a wireless LAN, wireless users transmit/receive packets to/from a base station (wireless access point) within a radius of few tens of meters. The base station is typically connected to Describe the most popular the wired Internet and thus serves to connect wireless Internet access wireless users to the wired network. technologies today. Compare and contrast them. b) Wide-area wireless access network: In these systems, packets are transmitted over the same wireless infrastructure used for cellular telephony, with the base station thus being managed by a telecommunications provider. This provides wireless access to users within a radius of tens of kilometers of the base station. What advantage does a circuit- A circuit-switched network can guarantee a certain switched network have over a amount of end-to-end bandwidth for the duration packet-switched network? of a call. Most packet-switched networks today What advantages does TDM (including the Internet) cannot make any end-to- have over FDM in a circuit- end guarantees for bandwidth. switched network? What is it said that packet In a packet switched network, the packets from switching employs statistical different sources flowing on a link do not follow any multiplexing? Contrast fixed, pre-defined pattern. In TDM circuit switching, statistical multiplexing with the each host gets the same slot in a revolving TDM multiplexing that takes places frame. in TDM. https://quizlet.com/255661203/computer-science-flash-cards/ 4/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Suppose there is exactlyFlash one cards At time t0 the sending host begins to transmit. At Study Computer Science packet switch between a time t1 = L/R1, the sending host completes sending host and a receiving transmission and the entire packet is received at the host. The transmission rate router (no propagation delay). Because the router between the sending host and has the entire packet at time t1, it can begin to the switch and between the transmit the packet to the receiving host at time t1. switch and the receiving host At time t2 = t1 + L/R2, the router completes are R1 and R2, respectively. transmission and the entire packet is received at the Assuming that the switch uses receiving host (again, no propagation delay). Thus, store-and-forward packet the end-to-end delay is L/R1 + L/R2. switching, what is the end-toend delay to send a Packet of length L? What is the key distinguishing A tier-1 ISP connects to all other tier-1 ISPs; a tier-2 difference between a tier-1 ISP ISP connects to only a few of the tier-1 ISPs. Also, a and a tier-2 ISP? tier-2 ISP is a customer of one or more tier-1. https://quizlet.com/255661203/computer-science-flash-cards/ 5/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Study Computer Science Flash cards a.Whe na cirvuit switching is used, how many users can be supported? 2 users can be supported because each user requires half of the link bandwidth b.For the remainer of this problem suppose packet switching is used. Wher will there be essentially no queuing delay before the link if two or fewer users transmit at the same time? What will there be a queuing delay if three users transmit at the same time? Since each user requires 1Mbps when transmitting, if two or fewer users transmit simultaneously, a maximum of 2Mbps will be required. Since the available bandwidth of the shared link is 2Mbps, Suppose users share a 2 Mbps link. Also suppose each user transmits continuosly at 1 Mbps when transmitting, but each user transmits only 20 percent of the time. there will be no queuing delay before the link. Whereas, if three users transmit simultaneously, the bandwidth required will be 3Mbps which is more than the available bandwidth of the shared link. In this case, there will be queuing delay before the link. c. Find the probability that a given user is transmitting Probability that a given user is transmitting = 0.2 d. Suppose now there are three users. Find the probability that at any given time, all three users are transmitting simultaneously. Find the fraction of time during which the queue grows. Probability that all three users are transmitting simultaneously = (3/3)p^3(1-p)^(3-3) = (0.2)^3 = 0.008. Since the queue grows when all the users are https://quizlet.com/255661203/computer-science-flash-cards/ 6/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet transmitting, the fraction of time during which the Study Computer Science Flash cards queue grows (which is equal to the probability that all three users are transmitting simultaneously) is 0.008. R16. Consider sending a packet The delay components are processing delays, from a source host to a transmission delays, propagation delays, and destination host over a fixed queuing delays. All of these delays are fixed, except route. List the delay for the queuing delays, which are variable. components in the end-to-end delay. Which of these delays are constant and which are variable? R17. Visit the Transmission Java Applet Versus Propagation Delay applet at the companion Web site. Among the rates, propagation delay, and packet sizes available, finds a combination for which the sender finishes transmitting before the first bit of the packet reaches the receiver. Find another combination for which the first bit of the packet reaches the receiver before the sender finishes transmitting. https://quizlet.com/255661203/computer-science-flash-cards/ 7/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet R18. How longScience does it take a Computer Flash cards 10msec; d/s; no; no Study packet of length 1,000 bytes to propagate over a link of distance 2,500 km, propagation speed 2.5 · 108 m/s, and transmission rate 2 Mbps? More generally, how long does it take a packet of length L to propagate over a link of distance d, propagation speed s, and transmission rate R bps? Does this delay depend on packet length? Does this delay depend on transmission rate? https://quizlet.com/255661203/computer-science-flash-cards/ 8/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet R19. Suppose Science Host A wants to cards a. 500 kbps Computer Flash Study send a large file to Host B. The path from Host A to Host B has b. 64 seconds three links, of rates R1 = 500 kbps, R2 = 2 Mbps, and R3 = 1 c. 100 kbps; 320 seconds Mbps. a. Assuming no other traffic in the network, what is the throughput for the file transfer. a. Suppose the file is 4 million bytes. Dividing the file size by the through put, roughly how long will it take to transfer the file to Host B? a. Repeat (a) and (b), but now with R2 reduced to 100 kbps. https://quizlet.com/255661203/computer-science-flash-cards/ 9/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Suppose end Science system A wants Study Computer Flash cards End system A breaks the large file into chunks. To to send a large file to end each chunk, it adds header generating multiple system B. At a very high level, packets from the file. The header in each packet describe how end system A includes the address of the destination: end system creates packets from the file. B. The packet switch uses the destination address to When one of these packets determine the outgoing link. Asking which road to arrives to a packet switch, what take is analogous to a packet asking which outgoing information in the packet does link it should be forwarded on, given the packet's the switch use to determine the address. link onto which the packet is forwarded? Why is packet switching in the Internet analogous to driving from one city to another and asking directions along the way? R22. List five tasks that a layer Five generic tasks are error control, flow control, can perform. Is it possible that segmentation and reassembly, multiplexing, and one (or more) of these tasks connection setup. Yes, these tasks can be could be performed by two (or duplicated at different layers. For example, error more) layers? control is often provided at more than one layer. R23. What are the five layers in The five layers in the Internet protocol stack are - the Internet protocol stack? from top to bottom - the application layer, the What are the principal transport layer, the network layer, the link layer, and responsibilities of each of the physical layer. The principal responsibilities are these layers? outlined in Section 1.5.1. https://quizlet.com/255661203/computer-science-flash-cards/ 10/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Computer Science Flash cards Application-layer message: data which an Study application wants to send and passed onto the R24. What is an application- transport layer; transport-layer segment: generated layer message? A transport- by the transport layer and encapsulates application- layer segment? A network- layer message with transport layer header; network- layer datagram? A link-layer layer datagram: encapsulates transport-layer frame? segment with a network-layer header; linklayer frame: encapsulates network layer datagram with a link-layer header. R25. Which layers in the Routers process layers 1 through 3. (This is a little bit Internet protocol stack does a of a white lie, as modern routers sometimes act as router process? Which layers firewalls or caching components, and process layer does a link-layer switch four as well.) Link layer switches process layers 1 process? Which layers does a through 2. Hosts process all five layers. host process? a) Virus: Requires some form of human interaction to spread. Classic example: E-mail viruses. R26. What is the difference b) Worms: No user replication needed. Worm in between a virus, a worm, and a infected host scans IP addresses and port numbers, Trojan horse? looking for vulnerable processes to infect. c) Trojan horse: Hidden, devious part of some otherwise useful software https://quizlet.com/255661203/computer-science-flash-cards/ 11/12 22/06/2021 Computer Science Flash cards Flashcards | Quizlet Computer Science Flash cards Creation of a botnet requires an attacker to findStudy vulnerability in some application or system (e.g. exploiting the buffer overflow vulnerability that might exist in an application). After finding the vulnerability, the attacker needs to scan for hosts that are vulnerable. The target is basically to compromise a series of systems by exploiting that particular vulnerability. Any system that is part of the R27. Describe how a botnet can be created, and how it can be used for a DDoS attack. botnet can automatically scan its environment and propagate by exploiting the vulnerability. An important property of such botnets is that the originator of the botnet can remotely control and issue commands to all the nodes in the botnet. Hence, it becomes possible for the attacker to issue a command to all the nodes, that target a single node (for example, all nodes in the botnet might be commanded by the attacker to send a TCP SYN message to the target, which might result in a TCP SYN flood attack at the target). R28. Suppose Alice and Bob Trudy can pretend to be Bob to Alice (and vice- are sending packets to each versa) and partially or completely modify the other over a computer message(s) being sent from Bob to Alice. For network. Suppose Trudy example, she can easily change the phrase "Alice, I positions herself in the network owe you $1000" to "Alice, I owe you $10,000". so that she can capture all the Furthermore, Trudy can even drop the packets that packets sent by Alice and send are being sent by Bob to Alice (and vise-versa), whatever she wants to Bob; even if the packets from Bob to Alice are encrypted. she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position. https://quizlet.com/255661203/computer-science-flash-cards/ 12/12 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Chapter 4: Network Layer Study Chapter 4: Network Layer Terms in this set (39) What is the name of a network- Datagram layer packet? Router and link-layer switches Packet switches are referred to as _______. What is the difference between a router and link-layer switch? A router forwards a packet based on its IP address; a link-layer switch forwards a packet based on its MAC address. Application(7) Presentation(6) Name the 7 layers of the OSI model from top to bottom. Session(5) Transport(4) Network(3) Data Link(2) Physical(1) -Enables user to access the network Function of the Application -Provides user interfaces and support for services Layer (e.g. the Web, email) -SMTP: Simple Mail Transfer Protocol https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 1/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer -Formats data so it can be viewed by user Study -Encrypt and decrypt Function of the Presentation Layer -JPG: compressed image -GIF(graphics interchange format): combined images/frames into single image/animation -HTTP(Hyper Text Transfer Protocol Secure): secures messages in code Function of the Session Layer -Establishes end connections between two hosts -Responsible for the transport protocol and error handling -End-to-end communication over a network provides logical communication Function of the Transport Layer -Uses TCP and UDP protocol -TCP: connection oriented, reliable transfer protocol, segment sequencing, flow control -UDP: lightweight protocol, unreliable, connectionless, no sequencing Function of the Network Layer Function of the Data Link Layer Function of the Physical Layer Data Plane -Reads IP address from packet -Routers layer 3 switches -Reads MAC address from data packet -Switches -Sends data onto physical wire -Hubs, NICS, Cable Function: packet forwarding, forwarding datagrams from their input links to their output link https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 2/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer Function: routing, which is to determine the paths a Study packet takes from its source to its destination Control Plane -executing router protocols -responding to up and down attached links -communicating with remote controllers -performing management functions a router's local action of transferring packets from Difference between Routing and Forwarding its input interfaces to its output interfaces, and forwarding takes place at very short timescales (typically a few nanoseconds), and thus is typically implemented in hardware hold entries to determine the outgoing link interface to which an arriving packet will be forwarded via switching fabric (A router forwards a packet by examining the value Role of Forwarding Table of one or more fields in the arriving packet's header, within Router and then using these header values to index into its forwarding table. The value stored in the forwarding table entry for those values indicates the outgoing link interface at that router to which that packet is to be forwarded) What is the service model of The service model of the Internet's network layer is the Internet's network layer? best-effort service. With this service model, there is What guarantees are made by no guarantee that packets will be received in the the Internet's service model order in which they were sent, no guarantee of their regarding the host-to-host eventual delivery, no guarantee on the end-to-end delivery of datagrams? delay, and no minimal bandwidth guarantee. https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 3/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer Input ports: performs several functions Study physical layer: terminating incoming physical link to router data link layer: performs lookup and forwarding function, so that data forwarded into switch fabric of router emerges at correct output port What is "inside" of your router? Outport ports: stores datagram that have been forwarded to it through the switching fabric, and then transmits the datagrams on the outgoing link. The output port thus performs the reverse data link and physical layer functionality as the input port Routing Processor: executes routing protocols, maintains routing tables, performs network management functions within router Role of Switching Fabric Describe the three switching methods connects the router's input ports to its output ports Switching via a bus Switching via memory Switching via an interconnection network input port transfers a packet directly to the output port over a shared bus, without intervention by the Switching via a bus routing processor; all output ports receive the packet but only the correct one will keep it; only one packet can cross the bus at a time https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 4/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Chapter 4: Network Layer oldest form of switching; two packets cannot be Study forwarded at the same time because only one memory read/write can be done at a time over the Switching via memory shared system bus; lookup of the destination address and the storing of the packet into the appropriate memory location are performed by processing on the input line cards overcome bandwidth restrictions; crossbar switch is an interconnection network consisting of 2N buses that connect N input ports to N output ports. Each vertical bus intersects each horizontal bus at an Switching via an intersection, which can be opened or closed at any interconnection network time by the switch fabric controller; non-blocking: a packet being forwarded will not be blocked as long as no other packet is being forwarded to the same port; capable of forwarding multiple packets in parallel Destination-based forwarding means that a datagram arriving at a router will be forwarded to an output interface based on only the final Difference between destination of the datagram. Destination-based forwarding and Generalized forwarding Generalized-forwarding means that besides its final destination, other factors associated with a datagram is also considered when a router determines the output interface for the datagram https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 5/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Suppose that arriving Layer Chapter 4: an Network A router uses longest prefix matching to determine Study packet matches two or more which link interface a packet will be forwarded to if entries in a router's forwarding the packet's destination address matches two or table. With traditional more entries in the forwarding table destination-based forwarding, what rule does a router apply to determine which of these rules should be applied to determine the output port to which the arriving packet should be switched? Which, if any, can send multiple An interconnection network is able to send multiple packets across the fabric in packets parallel? (name the type of switching method) If the rate at which packets arrive to the fabric exceeds switching fabric rate, then packets will Describe how packet loss can need to queue at the input ports. If this rate occur at input ports. Describe mismatch persists, the queues will get larger and how packet loss at input ports larger and eventually overflow the input port can be eliminated (without buffers, causing packet loss. Packet loss can be using infinite buffers). eliminated if the switching fabric speed is at least ntimes as fast as the input line speed, where nis the number of input ports. https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 6/10 22/06/2021 Chapter 4: Network Layer Describe how packet loss can occur at output ports. Can this loss be prevented by increasing the switch fabric speed? Chapter 4: Network Layer Flashcards | Quizlet Assuming input and output line speeds are the Study same, packet loss can still occur if the rate at which packets arrive to a single output port exceeds the line speed. If this rate mismatch persists, the queues will get larger and larger and eventually overflow the output port buffers, causing packet loss. Note that increasing switch fabric speed cannot prevent this problem from occurring. HOL blocking: Sometimes a packet that is first in line at an input port queue must wait because there is What is HOL blocking? Does it occur in input ports or output ports? no available buffer space at the output port to which it wants to be forwarded. When this occurs, all the packets behind the first packet are blocked, even if their output queues have room to accommodate them. HOL blocking occurs at the input port. Disciplines: FIFO, Priority, FIFO can ensure that all packets depart in the order Round Robin (RR), and in which they arrived. Weighted Fair Queueing (WFQ) packet scheduling disciplines? Which of these queueing disciplines ensure that all packets depart in the order in which they arrived Give an example showing why For example, a packet carrying network a network operator might want management information should receive priority one class of packets to be over regular user traffic. Another example, a real- given priority over another time voice-over-IP packet might need to receive class of packets. priority over non-real-time traffic such as e-email. https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 7/10 22/06/2021 Chapter 4: Network Layer Flashcards | Quizlet Suppose Host A sends Host B Chapter 4: Network Layer The 8-bit protocol field in the IP datagram contains Study a TCP segment encapsulated in information about which transport layer protocol an IP datagram. When Host B the destination host should pass the segment to. receives the datagram, how does the network layer in Host B know it should pass the segment (that is, the payload of the datagram) to TCP rather than to UDP or to some other upper-layer protocol? What field in the IP header can Time-to-live be used to ensure that a packet is forwarded through no more than N routers? Do routers have IP addresses? Yes. They have one address for each interface. If so, how many? A private network address of a device in a network What is a private network refers to a network address that is only meaningful address? Should a datagram to those devices within that network. A datagram with a private network address with a private network address should never be ever be present in the larger present in the larger public Internet, because the public Internet? Explain. private network address is potentially used by many network devices within their own private networks. https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 8/10 22/06/2021 Chapter 4: Network Layer Chapter 4: Network Layer Flashcards | Quizlet IPv6 has a fixed length header, which does not Study include most of the options an IPv4 header can include. Even though the IPv6 header contains two Compare and contrast the IPv4 and the IPv6 header fields. Do they have any fields in common? 128 bit addresses (source and destination IP address) the whole header has a fixed length of 40 bytes only. Several of the fields are similar in spirit. Traffic class, payload length, next header and hop limit in IPv6 are respectively similar to type of service, datagram length, upper-layer protocol and time to live in IPv4. Forwarding has two main operations: match and action. With destination-based forwarding, the match operation of a router looks up only the destination IP address of the to-be-forwarded datagram, and the action operation of the router involves sending the packet into the switching fabric to a specified output port. With generalized How does generalized forwarding, the match can be made over multiple forwarding differ from header fields associated with different protocols at destination-based forwarding? different layers in the protocol stack, and the action can include forwarding the packet to one or more output ports, load-balancing packets across multiple outgoing interfaces, rewriting header values (as in NAT), purposefully blocking/dropping a packet (as in a firewall), sending a packet to a special server for further processing and action, and more. https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 9/10 22/06/2021 Chapter 4: Network Layer Chapter 4: Network Layer Flashcards | Quizlet Each entry in the forwarding table of a destinationStudy based forwarding contains only an IP header field value and the outgoing link interface to which a What is the difference between packet (that matches the IP header field value) is to a forwarding table that we be forwarded. Each entry of the flow table in encountered in destination- OpenFlow includes a set of header field values to based forwarding? which an incoming packet will be matched, a set of counters that are updated as packets are matched to flow table entries, and a set of actions to be taken when a packet matches a flow table entry. "Match plus action" means that a router or a switch tries to find a match between some of the header values of a packet with some entry in a flow table, What is meant by the "match and then based on that match, the router decides to plus action" operation of a which interface(s) the packet will be forwarded and router or switch? In the case of even some more operations on the packet. In the destination-based forwarding case of destination-based forwarding packet switch, packet switch, what is matched a router only tries to find a match between a flow and what is the action taken? In table entry with the destination IP address of an the case of an SDN, name arriving packet, and the action is to decide to which three fields that can be interface(s) the packet will be forwarded. In the matched, and three actions that case of an SDN, there are many fields can be can be taken. matched, for example, IP source address, TCP source port, and source MAC address; there are also many actions can be taken, for example, forwarding, dropping, and modifying a field value. Name three header fields in an Three example header fields in an IP datagram that IP datagram that can be can be matched in OpenFlow 1.0 generalized "matched" in OpenFlow 1.0 forwarding are IP source address, TCP source port, generalized forwarding. What and source MAC address. Three fields that cannot are three IP datagram header be matched are: TTL field, datagram length field, fields that cannot be "matched" header checksum (which depends on TTL field). in OpenFlow? https://quizlet.com/340406487/chapter-4-network-layer-flash-cards/ 10/10 22/06/2021 HTTP Questions & Answers - Sanfoundry Computer Networks Questions & Answers – HTTP « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP”. 1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________ a) 4 b) 1 c) 5 d) 7 View Answer Answer: c Explanation: 4 jpeg images + 1 base HTML file. advertisement 2. The default connection type used by HTTP is _________ a) Persistent b) Non-persistent https://www.sanfoundry.com/computer-networks-mcqs-http/ 1/9 22/06/2021 HTTP Questions & Answers - Sanfoundry c) Can be either persistent or non-persistent depending on connection request d) None of the mentioned View Answer Answer: a Explanation: By default the http connection is issued with persistent connection. In persistent connection server leaves connection open after sending response. As little as one RTT (Time for a small packet to travel from client to server and back) is required for all referenced objects. 3. The time taken by a packet to travel from client to server and then back to the client is called __________ a) STT b) RTT c) PTT d) JTT View Answer Answer: b Explanation: RTT stands for round-trip time. advertisement 4. The HTTP request message is sent in _________ part of three-way handshake. a) First b) Second c) Third https://www.sanfoundry.com/computer-networks-mcqs-http/ 2/9 22/06/2021 HTTP Questions & Answers - Sanfoundry d) Fourth View Answer Answer: c Explanation: In first step client sends a segment to establish a connection with the server. In the second the step the client waits for the acknowledgement to be received from the server. After receiving the acknowledgement, the client sends actual data in the third step. 5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3 View Answer Answer: b Explanation: By default the http connection will be persistent connection. Hence it will take only 1 RTT to fetch a webpage from a server. advertisement 6. The first line of HTTP request message is called ____________ _____________ a) Request line b) Header line c) Status line https://www.sanfoundry.com/computer-networks-mcqs-http/ 3/9 22/06/2021 HTTP Questions & Answers - Sanfoundry d) Entity line View Answer Answer: a Explanation: The line followed by request line are called header lines and status line is the initial part of response message. 7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line d) Entity body View Answer Answer: a Explanation: It is specified in the method field of request line in the HTTP request message. advertisement 8. The __________ method when used in the method field, leaves entity body empty. a) POST b) SEND c) GET d) PUT View Answer https://www.sanfoundry.com/computer-networks-mcqs-http/ 4/9 22/06/2021 HTTP Questions & Answers - Sanfoundry Answer: c Explanation: There are two methods which help to request a response from a server. Those are GET and POST. In GET method, the client requests data from server. In POST method the client submits data to be processed to the server. 9. The HTTP response message leaves out the requested object when ____________ method is used a) GET b) POST c) HEAD d) PUT View Answer Answer: c Explanation: HEAD method is much faster than GET method. In HEAD method much smaller amount of data is transferred. The HEAD method asks only for information about a document and not for the document itself. advertisement 10. Find the oddly matched HTTP status codes a) 200 OK b) 400 Bad Request c) 301 Moved permanently d) 304 Not Found View Answer https://www.sanfoundry.com/computer-networks-mcqs-http/ 5/9 22/06/2021 HTTP Questions & Answers - Sanfoundry Answer: d Explanation: 404 Not Found. 11. Which of the following is not correct? a) Web cache doesnt has its own disk space b) Web cache can act both like server and client c) Web cache might reduce the response time d) Web cache contains copies of recently requested objects View Answer Answer: a Explanation: Web cache or also known as HTTP cache is a temporary storage where HTML pages and images are stored temporarily so that server lag could be reduced. 12. The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentioned View Answer Answer: c Explanation: The HTTP protocol requests the server of the website its trying to access so that it can store its files, images etc. in cache memory. This request of asking the server for a document considering a specific parameter is called conditional GET Request. 13. Which of the following is present in both an HTTP request line and a status line? a) HTTP version number b) URL c) Method d) None of the mentioned View Answer Answer: a Explanation: Status line is the the start line of an HTTP response. It contains the information such as the protocol version, a status text, status code. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. https://www.sanfoundry.com/computer-networks-mcqs-http/ 6/9 22/06/2021 HTTP Questions & Answers - Sanfoundry ` Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Application Layer – 2 » Next - Computer Networks Questions & Answers – HTTP & FTP advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. C# Programming Examples on Threads Bachelor of Computer Applications Questions and Answers Java MCQ (Multiple Choice Questions) Network Theory MCQ (Multiple Choice Questions) HTML MCQ (Multiple Choice Questions) JUnit MCQ (Multiple Choice Questions) Java Programming Examples on Utility Classes MySQL MCQ (Multiple Choice Questions) Computer Graphics MCQ (Multiple Choice Questions) Computer Science Questions and Answers Java Programming Examples on Multithreading Master of Computer Applications Questions and Answers Computer Organization and Architecture MCQ (Multiple Choice Questions) JavaScript MCQ (Multiple Choice Questions) SAN MCQ (Multiple Choice Questions) C# Programming Examples on Networking https://www.sanfoundry.com/computer-networks-mcqs-http/ 7/9 22/06/2021 17. 18. 19. 20. HTTP Questions & Answers - Sanfoundry Neural Networks MCQ (Multiple Choice Questions) Java Programming Examples on Networking Computer Fundamentals MCQ (Multiple Choice Questions) Computer Networks MCQ (Multiple Choice Questions) advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter Subscribe Sanfoundry Newsletter and Posts Name* Email* Subscribe https://www.sanfoundry.com/computer-networks-mcqs-http/ 8/9 22/06/2021 HTTP Questions & Answers - Sanfoundry About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact © 2011-2021 Sanfoundry. All Rights Reserved. https://www.sanfoundry.com/computer-networks-mcqs-http/ 9/9 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Internet « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”. 1. What is internet? a) a single network b) a vast collection of different networks c) interconnection of local area networks d) interconnection of wide area networks View Answer Answer: b Explanation: Internet is nothing but an interconnected computer network providing a variety of communication facilities, consisting of a huge amount of small networks using standardized communication protocols. advertisement https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 1/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 2. To join the internet, the computer has to be connected to a _________ a) internet architecture board b) internet society c) internet service provider d) different computer View Answer Answer: c Explanation: The ISPs (Internet Service Providers) are the main agents through which every computer is connected to the internet. They are licensed to allot public IP addresses to its customers in order to connect them to the internet. 3. Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ a) leased line b) digital subscriber line c) digital signal line d) digital leased line View Answer Answer: b Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing telephone lines to transport high-bandwidth data to service subscribers. DSL was used to allow the early users access to the internet and it provides dedicated, point-to-point, public network access. advertisement https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 2/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 4. ISP exchanges internet traffic between their networks by __________ a) internet exchange point b) subscriber end point c) isp end point d) internet end point View Answer Answer: a Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange Points. ISPs and CDNs are connected to each other at these physical locations are they help them provide better service to their customers. 5. Which of the following protocols is used in the internet? a) HTTP b) DHCP c) DNS d) DNS, HTTP and DNS View Answer Answer: d Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to allot IPs automatically to the users on the internet, and DNS is used to connect the users to the host servers on the internet based on the Domain Name. advertisement https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 3/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 6. The size of an IP address in IPv6 is _________ a) 32 bits b) 64 bits c) 128 bits d) 265 bits View Answer Answer: c Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses. 7. Internet works on _______ a) packet switching b) circuit switching c) both packet switching and circuit switching d) data switching View Answer Answer: a Explanation: Packet switching is the method based on which the internet works. Packet switching features delivery of packets of data between devices over a shared network. advertisement 8. Which one of the following is not an application layer protocol used in internet? a) remote procedure call https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 4/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry b) internet relay chat c) resource reservation protocol d) local procedure call View Answer Answer: c Explanation: Resource reservation protocol is a transport layer protocol used on the internet. It operates over IPv4 and IPv6 and is designed to reserve resources required by the network layer protocols. 9. Which protocol assigns IP address to the client connected in the internet? a) DHCP b) IP c) RPC d) RSVP View Answer Answer: a Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely assign IP address to the clients connected to the internet. The server that performs this fuction is called the DHCP server. advertisement 10. Which one of the following is not used in media access control? a) ethernet b) digital subscriber line https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 5/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry c) fiber distributed data interface d) packet switching View Answer Answer: d Explanation: Packet switching is not really related to media access control as it just features delivery of packets of data between devices over a shared network. Internet is actually based on packet switching. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Wireless LAN » Next - Computer Networks Questions & Answers – Bluetooth advertisement Recommended Posts: 1. Founder 2. Java Programming Examples on Networking 3. Digital Electronics MCQ (Multiple Choice Questions) https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 6/8 22/06/2021 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Internet - Computer Networks Questions & Answers - Sanfoundry Information Science Questions and Answers Electronics & Communication Engineering Questions and Answers Electrical Engineering Questions and Answers IOT MCQ (Multiple Choice Questions) C# Programming Examples on Networking Information Technology Questions and Answers Computer Graphics MCQ (Multiple Choice Questions) Computer Organization and Architecture MCQ (Multiple Choice Questions) Cryptography and Network Security MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers Computer Science Questions and Answers Master of Computer Applications Questions and Answers Wireless & Mobile Communications MCQ (Multiple Choice Questions) Neural Networks MCQ (Multiple Choice Questions) Computer Fundamentals MCQ (Multiple Choice Questions) SAN MCQ (Multiple Choice Questions) Computer Networks Questions & Answers – IPv4 advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 7/8 22/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry Subscribe Sanfoundry Newsletter and Posts Name* Email* Subscribe About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact © 2011-2021 Sanfoundry. All Rights Reserved. https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 8/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry IOT Questions and Answers – IP Address « Prev Next » This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “IP Address”. 1. What is the format of IP address? a) 34 bit b) 64 bit c) 16 bit d) 32 bit View Answer Answer: d Explanation: The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. advertisement 2. Version 6 of IP address has how many bits. Learn a) 64 bits https://www.sanfoundry.com/iot-questions-answers-ip-address/ more 1/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry b) 128 bits c) 32 bits d) 256 bits View Answer Answer: b Explanation: Because of the growth of the Internet and the depletion of available IPV4 address, a new version of IP(IPV6), using 128 nits for the IP address, was developed in 1995, and standardized as RFC 2460 in 1998. IPV6 deployment has been ongoing since the mid 2000s. 3. IANA stands for __________ a) Internet Assigned Numbers Authority b) Internal Assigned Numbers Authority c) Internet Associative Numbers Authoritative d) Internal Associative Numbers Authority View Answer Answer: a Explanation: The IP address space is managed globally by the Internet Assigned Numbers Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated territories for assignment to end users and local Internet registries, such as Internet services providers. advertisement 4. RIR stands for ________ a) Regional Internal Registries https://www.sanfoundry.com/iot-questions-answers-ip-address/ Learn more 2/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry b) Registries Internet Regional c) Regional Internet Registries d) Registries Internal Regional View Answer Answer: c Explanation: The IP address space is managed globally by the Internet Assigned Numbers Authority(IANA), and by five Regional Internet Registries(RIR) responsible in their designated territories for assignment to end users and local Internet registries, such as Internet services providers. 5. Geolocation software is used by host. a) True b) False View Answer Answer: a Explanation: The header of each IP packet contains the IP address of the sending host, and that of the destination host. A host may use geolocation software to deduce the geolocation of it communication peer. advertisement 6. How many versio version /s of IP’s are there? a) 4 versions b) 3 versions c) 2 versions https://www.sanfoundry.com/iot-questions-answers-ip-address/ Learn more 3/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry d) 1 version View Answer Answer: c Explanation: Two versions of the Internet Protocol are in common use in the Internet today. The original version of the Internet Protocol for use in the Internet is Internet Protocol Version 4, first installed in 1983. 7. VLSM stands for ________ a) Version Length Subnet Masking b) Variable Length Subnet Masking c) Variable Length Surface Masking d) Version Length Surface Masking View Answer Answer: b Explanation: The class system of the address space was replaced with Classless Inter – Domain Routing in 1993. CIDR is based on variable length Subnet Masking to allow allocation and routing based on arbitrary length prefixes. advertisement 8. Many desktops and operating systems include which protocol? a) IPv6 protocol b) IPv4 protocol c) Both IPv6 and IPv4 protocol Learn more https://www.sanfoundry.com/iot-questions-answers-ip-address/ 4/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry d) IPv3 protocol View Answer Answer: a Explanation: All modern desktop and enterprise server operating systems include native support for the IPv6 protocol, but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP(VoIP) and multimedia equipment, and network peripherals. 9. The design of the Internet protocol suites adhere to the ________ principle. a) Data corruption b) Connection oriented c) End to End principle d) Reliability View Answer Answer: c Explanation: The design of the Internet protocol suite adheres to the end to end principle, a concept adapted from the CYCLADES project. Under the end to end principle, the network infrastructure is considered inherently unreliable at any signal network element or transmission medium and is dynamic in terms of availability of links and notes. advertisement 10. ___________ adjusts the segment size to be smaller than MTU. a) Internet Protocol 6 b) User Datagram Protocol Learn more c) Internet Protocol 4 https://www.sanfoundry.com/iot-questions-answers-ip-address/ 5/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry d) Transmission Control Protocol View Answer Answer: d Explanation: The Transmission Control Protocol is an example of a protocol that adjusts its segment size to be smaller than the MTU. Sanfoundry Global Education & Learning Series – IOT. To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - IOT Questions and Answers – Application Layer » Next - IOT Questions and Answers – MAC Address advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. C Tutorials Java Programming Examples on Numerical Problems & Algorithms C Programming Examples Java Programming Examples on Data-Structures Learn more C Programming Examples on Numerical Problems & Algorithms Cryptography and Network Security MCQ (Multiple Choice Questions) https://www.sanfoundry.com/iot-questions-answers-ip-address/ 6/8 22/06/2021 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. IP Address - IOT Questions and Answers - Sanfoundry C++ Programming Examples on Numerical Problems & Algorithms SAN MCQ (Multiple Choice Questions) Simple Java Programs C Programming Examples using Recursion C Programming Examples on Mathematical Functions Wireless & Mobile Communications MCQ (Multiple Choice Questions) Simple C Programs C# Programming Examples on Data Structures Computer Networks MCQ (Multiple Choice Questions) C Programming Examples on Linked List IOT MCQ (Multiple Choice Questions) Java Programming Examples on Networking C# Programming Examples on Networking C Programming Examples on Bitwise Operations advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter Learn more https://www.sanfoundry.com/iot-questions-answers-ip-address/ 7/8 22/06/2021 IP Address - IOT Questions and Answers - Sanfoundry Subscribe Sanfoundry Newsletter and Posts Name* Email* Subscribe About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact © 2011-2021 Sanfoundry. All Rights Reserved. Learn more https://www.sanfoundry.com/iot-questions-answers-ip-address/ 8/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – IPv4 « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv4”. 1. Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling conventions View Answer Answer: a Explanation: The Internet Protocol is the networking protocol which establishes the internet by relaying datagrams across network boundaries. ICMP is a supporting protocol for IP which handles the Error Reporting functionality. advertisement Ad اشترك اآلن وخليك بصدارة الببجي Ooredoo Palestine https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 1/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry 2. Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset c) TOS d) Identifier View Answer Answer: c Explanation: TOS-type of service identifies the type of packets. It is not related to fragmentation but is used to request specific treatment such as high throughput, high reliability or low latency for the IP packet depending upon the type of service it belongs to. 3. The TTL field has value 10. How many routers (max) can process this datagram? a) 11 b) 5 c) 10 d) 1 View Answer Answer: c Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on the number of hops it makes (Number of routers it goes through). TTL field is decremented by one each time the datagram is processed by a router. When the value is 0, the packet is automatically destroyed. advertisement https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 2/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry 4. If the value in protocol field is 17, the transport layer protocol used is _____________ a) TCP b) UDP c) ICMP d) IGMP View Answer Answer: b Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry payloads of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP and IGMP are network layer protocols. 5. The data field cannot carry which of the following? a) TCP segment b) UDP segment c) ICMP messages d) SMTP messages View Answer Answer: c Explanation: Data field usually has transport layer segments, but it can also carry ICMP messages. SMTP is an application layer protocol. First it must go through the transport layer to be converted into TCP segments and then it can be inserted into IP packets. advertisement https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 3/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry 6. What should be the flag value to indicate the last fragment? a) 0 b) 1 c) TTl value d) Protocol field value View Answer Answer: a Explanation: The Flag field in the IP header is used to control and identify the fragments. It contains three bits: reserved, don’t fragment and more fragments. If the more fragments bit is 0, it means that the fragment is the last fragment. 7. Which of these is not applicable for IP protocol? a) is connectionless b) offer reliable service c) offer unreliable service d) does not offer error reporting View Answer Answer: b Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the transport layer protocols like TCP to offer reliability. advertisement 8. Which of the following demerits does Fragmentation have? a) complicates routers https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 4/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry b) open to DOS attack c) overlapping of fragments. d) all of the mentioned View Answer Answer: d Explanation: Fragmentation makes the implementation of the IP protocol complex and can also be exploited by attackers to create a DOS attack such as a teardrop attack. Fragmentation won’t be required if the transport layer protocols perform wise segmentation. 9. Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl d) identifer View Answer Answer: a Explanation: The Fragment Offset field specifies where the fragment fits in the original datagram. The offset of the first fragment will always be 0. The size of the field (13 bits) is 3-bits shorter than the size of the total length field (16 bits). advertisement Sanfoundry Global Education & Learning Series – Computer Networks. https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 5/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – World Wide Web » Next - Computer Networks Questions & Answers – IPv4 Addressing advertisement Recommended Posts: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Founder Energy & Environment Management MCQ (Multiple Choice Questions) Automata Theory MCQ (Multiple Choice Questions) Basic Electrical Engineering MCQ (Multiple Choice Questions) Recruitment Support Service – Employers C# Programming Examples on Networking C# Programming Examples on Data Structures Computer Organization and Architecture MCQ (Multiple Choice Questions) Wireless & Mobile Communications MCQ (Multiple Choice Questions) IOT MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers Computer Graphics MCQ (Multiple Choice Questions) Computer Fundamentals MCQ (Multiple Choice Questions) Computer Science Questions and Answers Cryptography and Network Security MCQ (Multiple Choice Questions) https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 6/8 22/06/2021 16. 17. 18. 19. 20. IPv4 - Computer Networks Questions & Answers - Sanfoundry SAN MCQ (Multiple Choice Questions) Master of Computer Applications Questions and Answers Cloud Computing MCQ (Multiple Choice Questions) Neural Networks MCQ (Multiple Choice Questions) Computer Networks Questions & Answers – RTP advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter Subscribe Sanfoundry Newsletter and Posts Name* Email* Subscribe https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 7/8 22/06/2021 IPv4 - Computer Networks Questions & Answers - Sanfoundry About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact © 2011-2021 Sanfoundry. All Rights Reserved. https://www.sanfoundry.com/computer-networks-mcqs-ipv4/ 8/8 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks IST 220 exam 2 Terms in this set (41) Consider a TCP connection Source port number y and destination port number between Host A and Host B. x. Suppose that the TCP segments traveling from Host A to Host B have source port number x and destination port number y. What are the source and destination port numbers for the segments traveling from Host B to Host A? An application developer may not want its application to use TCP's congestion control, which Describe why an application developer might choose to run an application over UDP rather than TCP. can throttle the application's sending rate at times of congestion. Often, designers of IP telephony and IP videoconference applications choose to run their applications over UDP because they want to avoid TCP's congestion control. Also, some applications do not need the reliable data transfer provided by TCP. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 1/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Why is it that voice and video Since most firewalls are configured to block UDP traffic is often sent over TCP traffic, using TCP for video and voice traffic lets the rather than UDP in today's traffic though the firewalls. (Note from Marc: it's OK Internet? (Hint: The answer we if you didn't know this, since we haven't talked much are looking for has nothing to about firewalls. Consider this more of an FYI) do with TCP's congestioncontrol mechanism.) Is it possible for an application Yes. The application developer can put reliable data to enjoy reliable data transfer transfer into the application layer protocol. This even when the application runs would require a significant amount of work and over UDP? If so, how? debugging, however. Suppose a process in Host C Yes, both segments will be directed to the same has a UDP socket with port socket. For each received segment, at the socket number 6789. Suppose both interface, the operating system will provide the Host A and Host B each send a process with the IP addresses to determine the UDP segment to Host C with origins of the individual segments. destination port number 6789. Will both of these segments be directed to the same socket at Host C? If so, how will the process at Host C know that these two segments originated from two different hosts? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 2/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet For each persistent connection, the Web server creates a separate "connection socket". Each Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B. Are all of the requests being sent through the same socket at Host C? If they are being passed through different sockets, do both of the sockets have port 80? Discuss and explain. connection socket is identified with a four-tuple: (source IP address, source port number, destination IP address, destination port number). When host C receives and IP datagram, it examines these four fields in the datagram/segment to determine to which socket it should pass the payload of the TCP segment. Thus, the requests from A and B pass through different sockets. The identifier for both of these sockets has 80 for the destination port; however, the identifiers for these sockets have different values for source IP addresses. Unlike UDP, when the transport layer passes a TCP segment's payload to the application process, it does not specify the source IP address, as this is implicitly specified by the socket identifier. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 3/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet True or false? False Host A is sending Host B a False large file over a TCP True connection. Assume Host B has False no data to send Host A. Host B True will not send False acknowledgments to Host A False because Host B cannot piggyback the acknowledgments on data. The size of the TCP rwnd never changes throughout the duration of the connection. Suppose Host A is sending Host B a large file over a TCP connection. The number of unacknowledged bytes that A sends cannot exceed the size of the receive buffer. Suppose Host A is sending a large file to Host B over a TCP connection. If the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be m + 1. The TCP segment has a field in its header for rend . Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. The current value of TimeoutInterval for the connection will necessarily be >= 1 sec. Suppose Host A sends one IST 220 exam 2 segment with sequence https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 4/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet number 38 and 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily 42. Suppose Host A sends two TCP 20 bytes segments back to back to Host ACK number = 90 B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. How much data is in the first segment? Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgment that Host B sends to Host A, what will be the acknowledgment number? Consider the Telnet example Three segments: discussed in Section 3.5 . A few seq = 43, ack =80 seconds after the user types seq = 80, ack = 44 the letter 'C,' the user types the seq = 44, ack = 81 letter 'R.' After typing the letter 'R,' how many segments are sent, and what is put in the sequence number and acknowledgment fields of the segments? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 5/20 22/06/2021 Suppose two TCP connections IST 220 exam 2 Flashcards | Quizlet R/2 are present over some bottleneck link of rate R bps. Both connections have a huge file to send (in the same direction over the bottleneck link). The transmissions of the files start at the same time. What transmission rate would TCP like to give to each of the connections? Suppose Client A initiates a source port Telnet session with Server S. At numbers about the same time, Client B destination port also initiates a Telnet session numbers with Server S. Provide possible a) A --> S source and destination port 467 numbers for 23 The segments sent from A to S. b) B --> S The segments sent from B to S. 513 The segments sent from S to A. 23 The segments sent from S to B. c) S --> A If A and B are different hosts, is 23 it possible that the source port 467 number in the segments from A d) S --> B to S is the same as that from B 23 to S? 513 How about if they are the same e) Yes host? f) No IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 6/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Consider Figure 3.5 . What are Suppose the IP addresses of the hosts A, B, and C the source and destination are a, b, c, respectively. (Note that a, b, c are port values in the segments distinct.) flowing from the server back to To host A: Source port =80, source IP address = b, the clients' processes? What dest port = 26145, dest IP address = a are the IP addresses in the To host C, left process: Source port =80, source IP network-layer datagrams address = b, dest port = 7532, dest IP address = c carrying the transport-layer To host C, right process: Source port =80, source IP segments? address = b, dest port = 26145, dest IP address = c UDP and TCP use 1s One's complement: 1 1 0 1 0 0 0 1. complement for their To detect errors, the receiver adds the four words checksums. Suppose you have (the three original words and the checksum). If the the following three 8-bit bytes: sum contains a zero, the receiver knows there has 01010011, 01100110, 01110100. been an error. All one-bit errors will be detected, What is the 1s complement of but two-bit errors can be undetected (e.g., if the last the sum of these 8-bit bytes? digit of the first word is converted to a 0 and the (Note that although UDP and last digit of the second word is converted to a 1). TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a 1-bit error will go undetected? How about a 2-bit error? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 7/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Suppose you have the Adding the two bytes gives 11000001. Taking the following 2 bytes: 01011100 and one's complement gives 00111110. 01100101. What is the 1s complement of the sum of Adding the two bytes gives 01000000; the one's these 2 bytes? complement gives 10111111. Suppose you have the First byte = 01010100; second byte = 01101101. following 2 bytes: 11011010 and 01100101. What is the 1s complement of the sum of these 2 bytes? For the bytes in part (a), give an example where one bit is flipped in each of the 2 bytes and yet the 1s complement doesn't change. Suppose that the UDP receiver computes the Internet checksum for the received UDP segment and finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain that no bit errors have occurred? Explain. No, the receiver cannot be absolutely certain that no bit errors have occurred. This is because of the manner in which the checksum for the packet is calculated. If the corresponding bits (that would be added together) of two 16-bit words in the packet were 0 and 1 then even if these get flipped to 1 and 0 respectively, the sum still remains the same. Hence, the 1s complement the receiver calculates will also be the same. This means the checksum will verify even if there was transmission error. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 8/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Consider sending an application message over a transport protocol. With TCP, the application writes We have said that an data to the connection send buffer and TCP will application may choose UDP grab bytes without necessarily putting a single for a transport protocol message in the TCP segment; TCP may put more or because UDP offers finer less than a single message in a segment. UDP, on application control (than TCP) the other hand, encapsulates in a segment whatever of what data is sent in a the application gives it; so that, if the application segment and when. gives UDP an application message, this message will be the payload of the UDP segment. Thus, with UDP, Why does an application have an application has more control of what data is sent more control of what data is in a segment. sent in a segment? With TCP, due to flow control and congestion Why does an application have control, there may be significant delay from the time more control on when the when an application writes data to its send buffer segment is sent? until when the data is given to the network layer. UDP does not have delays due to flow control and congestion control. Let's review some of the A network-layer packet is a datagram. A router terminology used in this forwards a packet based on the packet's IP (layer 3) textbook. Recall that the name address. A link-layer switch forwards a packet based of a transport-layer packet is on the packet's MAC (layer 2) address. segment and that the name of a link-layer packet is frame. What is the name of a networklayer packet? Recall that both routers and link-layer switches are called packet switches. What is the fundamental difference between a router and link-layer switch? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 9/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet The main function of the data plane is packet We noted that network layer forwarding, which is to forward datagrams from functionality can be broadly their input links to their output links. For example, divided into data plane the data plane's input ports perform physical layer functionality and control plane function of terminating an incoming physical link at functionality. What are the main a router, perform link-layer function to interoperate functions of the data plane? Of with the link layer at the other side of the incoming the control plane? link, and perform lookup function at the input ports. The key differences between routing and forwarding is that forwarding is a router's local We made a distinction action of transferring packets from its input between the forwarding interfaces to its output interfaces, and forwarding function and the routing takes place at very short timescales (typically a few function performed in the nanoseconds), and thus is typically implemented in network layer. What are the key hardware. Routing refers to the network-wide differences between routing process that determines the end-to-end paths that and forwarding? packets take from sources to destinations. Routing takes place on much longer timescales (typically seconds), and is often implemented in software. What is the role of the forwarding table within a router? The role of the forwarding table within a router is to hold entries to determine the outgoing link interface to which an arriving packet will be forwarded via switching fabric. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 10/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet We said that a network layer's The service model of the Internet's network layer is service model "defines the best-effort service. With this service model, there is characteristics of end-to-end no guarantee that packets will be received in the transport of packets between order in which they were sent, no guarantee of their sending and receiving hosts." eventual delivery, no guarantee on the end-to-end What is the service model of delay, and no minimal bandwidth guarantee. the Internet's network layer? What guarantees are made by the Internet's service model regarding the host-to-host delivery of datagrams? Suppose that an arriving A router uses longest prefix matching to determine packet matches two or more which link interface a packet will be forwarded to if entries in a router's forwarding the packet's destination address matches two or table. With traditional more entries in the forwarding table. That is, the destination-based forwarding, packet will be forwarded to the link interface that what rule does a router apply has the longest prefix match with the packet's to determine which of these destination. rules should be applied to determine the output port to which the arriving packet should be switched? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 11/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Suppose Host A sends Host B The 8-bit protocol field in the IP datagram contains a TCP segment encapsulated in information about which transport layer protocol an IP datagram. When Host B the destination host should pass the segment to. receives the datagram, how does the network layer in Host B know it should pass the segment (that is, the payload of the datagram) to TCP rather than to UDP or to some other upper-layer protocol? What field in the IP header can Time-to-live. be used to ensure that a packet is forwarded through no more than N routers? Recall that we saw the Internet IP header checksum only computes the checksum checksum being used in both of an IP packet's IP header fields, which share no transport-layer segment (in common bytes with the IP datagram's transport- UDP and TCP headers, Figures layer segment part. 3.7 and 3.29 respectively) and in network-layer datagrams (IP header, Figure 4.16). Now consider a transport layer segment encapsulated in an IP datagram. Are the checksums in the segment header and datagram header computed over any common bytes in the IP datagram? Explain your answer. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 12/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet When a large datagram is The reassembly of the fragments of an IP datagram fragmented into multiple is done in the datagram's destination host. smaller datagrams, where are these smaller datagrams reassembled into a single larger datagram? Do routers have IP addresses? They have one address for each interface. If so, how many? Suppose there are three 8 interfaces; 3 forwarding tables. routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? Suppose an application 50% overhead. generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and then an IP datagram. What percentage of each datagram will be overhead, and what percentage will be application data? IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 13/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Suppose you purchase a Typically the wireless router includes a DHCP wireless router and connect it server. DHCP is used to assign IP addresses to the 5 to your cable modem. Also PCs and to the router interface. Yes, the wireless suppose that your ISP router also uses NAT as it obtains only one IP dynamically assigns your address from the ISP. connected device (that is, your wireless router) one IP address. Also suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs? Does the wireless router use NAT? Why or why not? A plug-and-play or zeroconf protocol means that What is meant by a "plug-and- the protocol is able to automatically configure a play" or "zeroconf" protocol? host's network-related aspects in order to connect the host into a network. A private network address of a device in a network What is a private network refers to a network address that is only meaningful address? Should a datagram to those devices within that network. A datagram with a private network address with a private network address should never be ever be present in the larger present in the larger public Internet, because the public Internet? Explain. private network address is potentially used by many network devices within their own private networks. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 14/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet IPv6 has a fixed length header, which does not include most of the options an IPv4 header can include. Even though the IPv6 header contains two Compare and contrast the IPv4 and the IPv6 header fields. Do they have any fields in common? 128 bit addresses (source and destination IP address) the whole header has a fixed length of 40 bytes only. Several of the fields are similar in spirit. Traffic class, payload length, next header and hop limit in IPv6 are respectively similar to type of service, datagram length, upper-layer protocol and time to live in IPv4. Consider the network below. a. Data destined to host H3 is forwarded through interface 3. Show the forwarding table in Destination Address Link Interface H3 3 router A, such that all traffic destined to host H3 is b. No, because forwarding rules are only based on forwarded through interface 3. the destination address. Can you write down a forwarding table in router A, such that all traffic from H1 destined to host H3 is forwarded through interface 3, while all traffic from H2 destined to host H3 is forwarded through interface 4? (Hint: This is a trick question.) IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 15/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Consider a datagram network a. using 32-bit host addresses. Prefix Match Link Interface Suppose a router has four links, 11100000 00 numbered 0 through 3, and 0 packets are to be forwarded to 11100000 01000000 the link interfaces as follows: 1 Destination Address Range 1110000 Link Interface 11100000 2 00000000 00000000 11100001 1 00000000 3 otherwise 3 through 11100000 00111111 11111111 11111111 0 11100000 01000000 00000000 00000000 through 11100000 01000000 11111111 11111111 1 11100000 01000001 00000000 00000000 through 11100001 01111111 11111111 11111111 2 otherwise 3 a. Provide a forwarding table that has five entries, uses longest prefix matching, and forwards packets to the correct link interfaces. b. Describe how your forwarding table determines the appropriate link interface for datagrams with destination addresses: 11001000 10010001 01010001 01010101 11100001 01000000 11000011 00111100 11100001 10000000 00010001 01110111 IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 16/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Destination Address Range Link Interface 00000000 through 00111111 0 01000000 through Consider a datagram network 01011111 using 8-bit host addresses. 1 Suppose a router uses longest 01100000 prefix matching and has the through following forwarding table: 01111111 Prefix Match Interface 00 0 010 2 1 011 2 10 2 11 3 10000000 For each of the four interfaces, through give the associated range of 10111111 destination host addresses and 2 the number of addresses in the 11000000 range. through 11111111 3 number of addresses for interface 0 = 2^6 = 64 number of addresses for interface 1 = 2^5 = 32 number of addresses for interface 2 = 2^6 + 2^5 = 64 + 32 = 95 number of addresses for interface 3 = 2^6 = 64 IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 17/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Destination Address Range Link Interface 11000000 Consider a datagram network through (32 addresses) using 8-bit host addresses. 11011111 Suppose a router uses longest 0 prefix matching and has the 10000000 following forwarding table: through(64 addresses) Prefix Match Interface 1 0 10 1 10111111 111 2 otherwise 3 1 For each of the four interfaces, 11100000 give the associated range of through (32 addresses) destination host addresses and 11111111 the number of addresses in the 2 range. 00000000 through (128 addresses) 01111111 3 Consider a router that 223.1.17.0/26 interconnects three subnets: 223.1.17.128/25 Subnet 1, Subnet 2, and Subnet 223.1.17.192/28 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also suppose that Subnet 1 is required to support at least 60 interfaces, Subnet 2 is to support at least 90 interfaces, and Subnet 3 is to support at least 12 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 18/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet The maximum size of the data field in each fragment is 680 (because there are 20 bytes of IP header). Consider sending a 2400-byte Thus the number of required fragments is datagram into a link that has an (2400−20)÷680=4 MTU of 700 bytes. Suppose the . original datagram is stamped with the identification number Each fragment will have identification number 422. 422. How many fragments are Each fragment except the last one will be of size generated? What are the 700 bytes (including IP header). The last datagram values in the various fields in will be of size 360 bytes (including IP header). The the IP datagram(s) generated offsets of the 4 fragments will be 0, 85, 170, 255. related to fragmentation? Each of the first three fragments will have their flag set to 1; the last fragment will have its flag set to 0. Suppose datagrams are limited to 1,500 bytes (including header) between source Host A and destination Host B. Assuming a 20-byte IP header, how many datagrams would be required to send an MP3 consisting of 5 million bytes? Explain how you computed your answer. MP3 file size = 5 million bytes. Assume the data is carried in TCP segments, with each TCP segment also having 20 bytes of header. Then each datagram can carry 1500 - 40 = 1460 bytes of the MP3 file. Number of datagrams required = 5×106÷1460=3425 . All but the last datagram will be 1500 bytes; the last datagram will be 960 + 40 = 1000 bytes. Note that here there is no fragmentation; the source host does not create datagrams larger than 1500 bytes, and these datagrams are smaller than the MTUs of the links. IST 220 exam 2 https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 19/20 22/06/2021 IST 220 exam 2 Flashcards | Quizlet Consider the network setup in Home addresses: 192.168.1.1, 192.168.1.1, 192.168.1.3, Figure 4.25. Suppose that the with the router interface being 192.168.1.4. ISP instead assigns the router See the NAT translation table below. the address 24.34.112.235 and WAN side LAN side 24.34.112.235, 4000 192.168.1.1, that the network address of the 3345 24.34.112.235, 4001 192.168.1.1, 3346 home network is 192.168.1/24. 24.34.112.235, 4002 192.168.1.2, 3345 24.34.112.235, Assign addresses to all 4003 192.168.1.2, 3346 24.34.112.235, 4004 192.168.1.3, interfaces in the home 3345 24.34.112.235, 4005 192.168.1.3, 3346 network. Suppose each host has two ongoing TCP connections, all to port 80 at host 128.119.40.86. Provide the six corresponding entries in the NAT translation table. https://quizlet.com/584961719/ist-220-exam-2-flash-cards/ 20/20 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Home / Science / Computer Science / Computer Networks MIT 812 Chapter 1 Computer Networks and the Internet. Study MIT 812 Chapter 1 Computer Networks and the Internet. Terms in this set (28) What is the difference between There is no difference. Throughout this text, the a host and an end system? List words "host" and "end system" are used several different types of end interchangeably. End systems include PCs, PCs systems. Is a Web server an workstations, Web servers, mail servers, PDAs, end system? Internet-connected game consoles, etc. From Wikipedia: Diplomatic protocol is commonly described as a set of international courtesy rules. The word protocol is often These well-established and time-honored rules used to describe diplomatic have made it easier for nations and people to live relations. How does Wikipedia and work together. Part of protocol has always describe diplomatic protocol? been the acknowledgment of the hierarchical standing of all present. Protocol rules are based on the principles of civility. Why are standards important for protocols? Standards are important for protocols so that people can create networking systems and products that interoperate. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 1/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet 1. Dial-upand modem telephone line: home; MIT 812 Chapter 1 Computer Networks theover Internet. Study List six access technologies. 2. DSL over telephone line: home or small office; Classify each one as home 3. Cable to HFC: home; access, enterprise access, or 4. 100 Mbps switched Ethernet: enterprise; wide-area wireless access. 5. Wifi (802.11): home and enterprise: 6. 3G and 4G: wide-area wireless. Is HFC transmission rate HFC bandwidth is shared among the users. dedicated or shared among There are no collisions in the downstream channel. users? Because in the downstream channel, all packets Are collisions possible in a emanate from a single source, namely, the head downstream HFC channel? end. Why or why not? List the available residential access technologies in your city. For each type of access, provide the advertised downstream rate, upstream rate, and monthly price. In most American cities, the current possibilities include: dial-up; DSL; cable modem; fiber- to-thehome. HFC - 300 mbps - $65 - 100 mbps - $65 - 2 mbps - $15 What is the transmission rate of Ethernet LANs have transmission rates of 10 Mbps, Ethernet LANs? 100 Mbps, 1 Gbps and 10 Gbps. What are some of the physical Today, Ethernet most commonly runs over twisted- media that Ethernet can run pair copper wire. over? It also can run over fibers optic links. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 2/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Dial up modems: upInternet. to 56 Kbps, bandwidth is MIT 812 Chapter 1 Computer Networks and the Dial-up modems, HFC, DSLand FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated. Study dedicated; DSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is notshared. a) Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from an base station (i.e., wireless access point) within a radius of few tens of meters. The base station is typically Describe the most popular wireless Internet access technologies today. Compare and contrast them. connected to the wired Internet and thus serves to connect wireless users to the wired network. b) 3G and 4G wide-area wireless access networks. In these systems, packets are transmitted over the same wireless infrastructure used for cellular telephony, with the base station thus being managed by a telecommunications provider. This provides wireless access to users within a radius of tens of kilometers of the base station. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 3/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Suppose is exactly one At time t0and the sending host begins to transmit. At Study MIT 812there Chapter 1 Computer Networks the Internet. packet switch between a time t1 = L/R1, the sending host completes sending host and a receiving transmission and the entire packet is received at the host. The transmission rates router (no propagation delay). Because the router between the sending host and has the entire packet at time t1, it can begin to the switch and between the transmit the packet to the receiving host at time t1. switch and the receiving host At time t2 = t1 + L/R2, the router completes are R1 and R2, respectively. transmission and the entire packet is received at the Assuming that the switch uses receiving host (again, no propagation delay). Thus, store-and-forward packet the end-to-end delay is L/R1 + L/R2. switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation delay, and processing delay What advantage does a circuitswitched network have over a packet-switched network? What advantages does TDM have over FDM in a circuitswitched network? A circuit-switched network can guarantee a certain amount of end-to-end bandwidth for the duration of a call. Most packet-switched networks today (including the Internet) cannot make any end-toend guarantees for bandwidth. FDM requires sophisticated analog hardware to shift signal into appropriate frequency bands. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 4/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Suppose share a1 2Computer Mbps a) yes 2 users supported because each Study user MIT 812users Chapter Networks andcan thebeInternet. link. Also suppose each user requires half of the link bandwidth. transmits continuously at 1 b) Since each user requires 1Mbps when Mbps when transmitting, but transmitting, if two or fewer users transmit each user transmits only 20 simultaneously, a maximum of 2Mbps will be percent of the time. (See the required. Since the available bandwidth of the discussion of statistical shared link is 2Mbps, there will be no queuing delay multiplexing in Section 1.3.) before the link. Whereas, if three users transmit a. When circuit switching is simultaneously, the bandwidth required will be used, how many users can be 3Mbps which is more than the available bandwidth supported? of the shared link. In this case, there will be queuing b. For the remainder of this delay before the link. problem, suppose packet c) Probability that a given user is transmitting = 0.2 switching is used. Why will d) Probability that all three users are transmitting there be essentially no queuing simultaneously = (0.2)^3 = 0.008. Since the queue delay before the link if two or grows when all the users are transmitting, the fewer users transmit at the fraction of time during which the queue grows same time? Why will there be a (which is equal to the probability that all three users queuing delay if three users are transmitting simultaneously) is 0.008. transmit at the same time? c. Find the probability that a given user is transmitting. d. Suppose now there are three users. Find the probability that at any given time, all three users are transmitting simultaneously. Find the fraction of time during which the queue grows. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 5/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet If the twoand ISPs the do not peer with each other, then Study MIT 812 Chapter 1 Computer Networks Internet. when they send traffic to each other they have to send the traffic through a provider ISP (intermediary), to which they have to pay for carrying the traffic. By peering with each other Why will two ISPs at the same directly, the two ISPs can reduce their payments to level of the hierarchy often their provider ISPs. An Internet Exchange Points peer with each other? How (IXP) (typically in a standalone building with its own does an IXP earn money? switches) is a meeting point where multiple ISPs can connect and/or peer together. An ISP earns its money by charging each of the the ISPs that connect to the IXP a relatively small fee, which may depend on the amount of traffic sent to or received from the IXP. Yes I Google's private network connects together all its data centers, big and small. Traffic between the Google data centers passes over its private network rather than over the public Internet. Many of these data centers are located in, or close to, lower tier Some content providers have ISPs. Therefore, when Google delivers content to a created their own networks. user, it often can bypass higher tier ISPs. What Describe Google's network. motivates content providers to create these What motivates content networks? First, the content provider has more providers to create these control over the user experience, since it has to use networks? few intermediary ISPs. Second, it can save money by sending less traffic into provider networks. Third, if ISPs decide to charge more money to highly profitable content providers (in countries where net neutrality doesn't apply), the content providers can avoid these extra payments. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 6/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Consider a packet The delayand components are processing delays, MIT 812 sending Chapter 1 Computer Networks the Internet. Study from a source host to a transmission delays, propagation delays, and destination host over a fixed queuing delays. All of these delays are fixed, except route. List the delay for the queuing delays, which are variable components in the end-to-end delay. Which of these delays are constant and which are variable? Visit the Transmission Versus a) 1000 km, 1 Mbps, 100 bytes Propagation Delay applet at b) 100 km, 1 Mbps, 100 bytes the companion Web site. Among the rates, propagation delay, and packet sizes available, find a combination for which the sender finishes transmitting before the first bit of the packet reaches the receiver. Find another combination for which the first bit of the packet reaches the receiver before the sender finishes transmitting. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 7/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet How long does it take1 aComputer packet 10msec; d/s; no Internet. MIT 812 Chapter Networks andno;the Study of length 1,000 bytes to propagate over a link of distance 2,500 km, propagation speed 2.5 * 10^8 m/s, and transmission rate 2 Mbps? More generally, how long does it take a packet of length L to propagate over a link of distance d, propagation speed s, and transmission rate R bps? Does this delay depend on packet length? Does this delay depend on transmission rate? Suppose Host A wants to send a) 500 kbps a large file to Host B. The path b) 64 seconds from Host A to Host B has c) 100kbps; 320 seconds three links, of rates R1 = 500 kbps, R2 = 2 Mbps, and R3 = 1 Mbps. a. Assuming no other traffic in the network, what is the throughput for the file transfer? b. Suppose the file is 4 million bytes. Dividing the file size by the throughput, roughly how long will it take to transfer the file to Host B? c. Repeat (a) and (b), but now with R2 reduced to 100 kbps. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 8/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Suppose system Awants to End system A breaks the large file into chunks. It Study MIT 812end Chapter 1 Computer Networks and the Internet. send a large file to end system adds header to each chunk, thereby generating B. At a very high level, describe multiple packets from the file. The header in each how end system Acreates packet includes the IP address of the destination packets from the file. When (end system B). The packet switch uses the one of these packets arrives to destination IP address in the packet to determine a packet switch, what the outgoing link. Asking which road to take is information in the packet does analogous to a packet asking which outgoing link it the switch use to determine the should be forwarded on, given the packet's link onto which the packet is destination address. forwarded? Why is packet switching in the Internet analogous to driving from one city to another and asking directions along the way? Visit the Queuing and Loss The maximum emission rate is 500 packets/sec and applet at the companion Web the maximum transmission rate is 350 packets/sec. site. What is the maximum The corresponding traffic intensity is 500/350 =1.43 > emission rate and the minimum 1. Loss will eventually occur for each experiment; transmission rate? With those but the time when loss first occurs will be different rates, what is the traffic from one experiment to the next due to the intensity? Run randomness in the emission process. the applet with these rates and determine how long it takes for packet loss to occur. Then repeat the experiment a second time and determine again how long it takes for packet loss to occur. Are the values different? Why or why not? https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 9/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet List five tasks that a layer can Five generic error control, flow control, Study MIT 812 Chapter 1 Computer Networks andtasks theare Internet. perform. Is it possible that one segmentation and reassembly, multiplexing, and (or more) of these tasks could connection setup. Yes, these tasks can be be performed by two (or more) duplicated at different layers. For example, error layers? control is often provided at more than one layer. What are the five layers in the The five layers in the Internet protocol stack are - Internet protocol stack? What from top to bottom - the application layer, the are the principal transport layer, the network layer, the link layer, and responsibilities of each of the physical layer. The principal responsibilities are these layers? outlined in Section 1.5.1 Which layers in the Internet protocol stack does a router process? Which layers does a link-layer switch process? Which layers does a host process? Routers process network, link and physical layers (layers 1 through 3). (This is a little bit of a white lie, as modern routers sometimes act as firewalls or caching components, and process Transport layer as well.) Link layer switches process link and physical layers (layers 1 through2). Hosts process all five layers Application-layer message: data which an application wants to send and passed onto the What is an application-layer message? Atransport-layer segment? A network layer datagram? A link-layer frame? transport layer; transport-layer segment: generated by the transport layer and encapsulates applicationlayer message with transport layer header; networklayer datagram: encapsulates transport-layer segment with a network-layer header; linklayer frame: encapsulates network-layer datagram with a link-layer header. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 10/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet a) Virus Requires some form of human interaction to Study MIT 812 Chapter 1 Computer Networks and the Internet. spread. Classic example: E-mail viruses. What is the difference between b) Worms No user replication needed. Worm in a virus and a worm? infected host scans IP addresses and port numbers, looking for vulnerable processes to infect. Creation of a botnet requires an attacker to find vulnerability in some application or system (e.g. exploiting the buffer overflow vulnerability that might exist in an application). After finding the vulnerability, the attacker needs to scan for hosts that are vulnerable. The target is basically to compromise a series of systems by exploiting that particular vulnerability. Any system that is part of the Describe how a botnet can be botnet can automatically scan its environment and created, and how it can be propagate by exploiting the vulnerability. An used for a DDoS attack. important property of such botnets is that the originator of the botnet can remotely control and issue commands to all the nodes in the botnet. Hence, it becomes possible for the attacker to issue a command to all the nodes, that target a single node (for example, all nodes in the botnet might be commanded by the attacker to send a TCP SYN message to the target, which might result in a TCP SYN flood attack at the target). https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 11/12 22/06/2021 MIT 812 Chapter 1 Computer Networks and the Internet. Flashcards | Quizlet Suppose and Bob are Trudy canand pretend be Bob to Alice (and viceStudy MIT 812Alice Chapter 1 Computer Networks the to Internet. sending packets to each other versa) and partially or completely modify the over a computer network. message(s) being sent from Bob to Alice. For Suppose Trudy positions example, she can easily change the phrase "Alice, I herself in the network so that owe you $1000" to "Alice, I owe you $10,000". she can capture all the packets Furthermore, Trudy can even drop the packets that sent by Alice and send are being sent by Bob to Alice (and vise-versa), whatever she wants to Bob; even if the packets from Bob to Alice are encrypted. she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position. https://quizlet.com/507843025/mit-812-chapter-1-computer-networks-and-the-internet-flash-cards/ 12/12 22/06/2021 Network Chapter 2 Flashcards | Quizlet Network Chapter 2 Terms in this set (17) For a p2p file-sharing No. All communication sessions have a client side application, do you agree with and a server side. In a P2P file-sharing application, the statement, "There is no the peer that is receiving a file is typically the client notion of client and server and the peer that is sending the file is typically the sides of a communication server. session"? What information is used by a The IP address of the destination host and the port process running on one host to number of the destination socket. identify a process running on another host? 6. You would use UDP. With UDP, the transaction Suppose you wanted to do a transaction from a remote client to a server as fast as possible. Would you use UDP or TCP? Why? can be completed in one roundtrip time (RTT) - the client sends the transaction request into a UDP socket, and the server sends the reply back to the client's UDP socket. With TCP, a minimum of two RTTs are needed - one to set-up the TCP connection, and another for the client to send the request, and for the server to send back the reply. Network Chapter 2 https://quizlet.com/41479403/network-chapter-2-flash-cards/ 1/6 22/06/2021 Network Chapter 2 Flashcards | Quizlet a) Reliable data transfer TCP provides a reliable byte-stream between client and server but UDP does not. List the four broad classes of b) A guarantee that a certain value for throughput services that a transport will be maintained protocol can provide. For each Neither of the service classes, indicate c) A guarantee that data will be delivered within a if either UDP or TCP (or both) specified amount of time provides such a service. Neither d) Security Neither Why do HTTP, FTP, SMTP, and POP3 run on top of TPC rather than on UDP? The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not. When the user first visits the site, the site returns a Consider an e-commerce site cookie number. This cookie number is stored on the that wants to keep a purchase user's host and is managed by the browser. During record for each of its each subsequent visit (and purchase), the browser customers. Describe how this sends the cookie number back to the site. Thus the can be done with cookies. site knows when this user (more precisely, this browser) is visiting the site. Describe how Web caching Web caching can bring the desired content "closer" can reduce the delay in to the user, perhaps to the same LAN to which the receiving a requested object. user's host is connected. Web caching can reduce Will Web caching reduce the the delay for all objects, even objects that are not delay for all objects requested cached, since caching reduces the traffic on links. by a user or for only some of the objects? Why? Network Chapter 2 https://quizlet.com/41479403/network-chapter-2-flash-cards/ 2/6 22/06/2021 Network Chapter 2 Flashcards | Quizlet Suppose Alice, with a web- Message is sent from Alice's host to her mail server based email account (such as over HTTP. Alice's mail server then sends the hotmail or gmail), sends a message to Bob's mail server over SMTP. Bob then message to Bob, who accesses transfers the message from his mail server to his his mail from his mail server host over POP3. using POP3. Discuss how the message gets from Alice's host to Bob's host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts. 1. Single point of failure: if the DNS server crashes, so does the entire Internet 2. Traffic concentration: the single server would have to handle all DNS queries for all HTTP requests and email messages for hundreds of millions of hosts. Give four reasons (arguments) against having one DNS server. 3. Delayed responses: since the single server can only be close to a very few hosts, most of the hosts will have to travel large distances (and experience propagation delay), and traverse many links (some of which maybe congested) to reach the server. 4. Book-keeping and updates (maintenance): the DNS server would have to keep track of every new host or every removed host in the Internet. This doesn't scale. Network Chapter 2 https://quizlet.com/41479403/network-chapter-2-flash-cards/ 3/6 22/06/2021 Network Chapter 2 Flashcards | Quizlet The current architecture of DNS is a distributed, hierarchical database, with 3 levels (and server types) of hierarchy: 1. the Root DNS servers: there are 13 root servers around the world, each consists of a cluster of replicated servers for security and What is the current architecture reliability purposes. 2. top-level domain servers of DNS? (mention the various (TLD) responsible for top-level domains (e.g., co, types of servers and their org, net, edu, gov) and country top-level domains function) (e.g., uk, fr, ca, jp). 3. authoritative DNS servers: keep the mapping for publicly accessible resources at organizations (e.g., web and mail servers). 4. Local name server: does not belong strictly to the hierarchy and is queried first when a host requests to resolve an address. the two types of queries are: iterative queries and recursive queries. Iterative (or iterated) queries propagate from the host to its local DNS server and from then on to a root server (which replies to the What are the two types of query/search propagation in DNS? What is the main difference between them? <5 points> local DNS server), then from the local server to the TLD server (which replies to the local DNS server), then from the local server to the authoritative server (which replies to the local DNS server). The recursive query, by contrast, puts the burden on the contacted server and may increase the burden on the high level servers (e.g., the root server has to contact the TLD which in turn contacts the authoritative server. The latter query method may incur less delay. Network Chapter 2 https://quizlet.com/41479403/network-chapter-2-flash-cards/ 4/6 22/06/2021 d- Discuss a mechanism we studied to improve DNS performance and elaborate on how the performance can improve. Network Chapter 2 Flashcards | Quizlet Using DNS caching is one way to improve DNS performance, first by reducing the delay required to get the address resolution (since the cache servers are now closer to the requesting hosts), and by reducing the overall load of DNS going to the higher level DNS servers. 1. Centralized directory of resources/files, as in Napster. Advantage is that search for resources is simple with min overhead ( just ask the centralized server). The disadvantages are: single point of failure, performance bottleneck and target of lawsuit. 2. Fully distributed, non-centralized architecture, as Discuss three different architectures of the peer-topeer applications. Give examples of real applications for each architecture and discuss the advantages and disadvantages of each architecture. in Gnutella, where all peers and edges form a 'flat' overlay (without hierarchy). Advantages: robustness to failure, no performance bottleneck and no target for lawsuit. Disadvantages is that search is more involved and incurs high overhead with query flooding. 3. Hierarchical overlay, with some nodes acting as super nodes (or cluster heads), or nodes forming loose neighborhoods (sometimes referred to as loose hierarchy, as in BitTorrent). Advantages, robust (no single point of failure), avoids flooding to search for resources during queries. Disadvantages, needs to keep track of at least some nodes using the 'Tracker' server. In general, this architecture attempts to combine the best of the 2 other architectures. Network Chapter 2 https://quizlet.com/41479403/network-chapter-2-flash-cards/ 5/6 22/06/2021 Network Chapter 2 Flashcards | Quizlet In BitTorrent, suppose Alice It is not necessary that Bob will also provide chunks provides chunks to Bob to Alice. Alice has to be in the top 4 neighbors of throughout a 30-second Bob for Bob to send out chunks to her (or through interval. Will Bob necessarily random selection); this might not occur even if Alice return the favor and provide provides chunks to Bob throughout a 30-second chunks to Alice in this same interval. interval? Why or why not? A user requests a web page False. that consists of some text and two images. For this page, the client will send one request message and receive three response messages. True or False? Two distinct web pages (for True. example, www.mit.edu/research.html and www.mit.edu/students.html) can be sent over the same persistent connection. True or False? With non-persistent False. connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages. True or False? https://quizlet.com/41479403/network-chapter-2-flash-cards/ 6/6 22/06/2021 Networking Chap 3 Flashcards | Quizlet Networking Chap 3 Study Networking Chap 3 Terms in this set (10) Suppose Host A is sending False Host B a large file over a TCP connection. The number of unacknowledged bytes that A sends cannot exceed the size of the receive buffer. True or false? https://quizlet.com/379810076/networking-chap-3-flash-cards/ 1/4 22/06/2021 Networking Chap 3 Flashcards | Quizlet In our Reliable Data Transfer Networking Chap 3 a. Sequence numbers are required for a receiver to Study (rdt) protocols, why did we find out whether an arr arriving packet contains new need to introduce sequence data or is a retransmission. numbers? a. Sequence numbers are required for a receiver to find out whether an arr arriving packet contains new data or is a retransmission. b. Sequence numbers are required for a sender to find out whether a sending packet contains new data. c. Sequence numbers are required for a sender to find out whether a sending packet contains correct data content. d. Sequence numbers are required for a receiver to find out whether a sending packet contains correct data content. True or false? Consider True congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to half of the current value of the congestion window. The TCP segment has a field in True its header for receive window (rwnd). True or false? https://quizlet.com/379810076/networking-chap-3-flash-cards/ 2/4 22/06/2021 Suppose that the last 3 Networking Chap Networking Chap 3 Flashcards | Quizlet False Study SampleRTT in a TCP connection is equal to 1 sec. The current value of TimeoutInterval for the connection will necessarily be greater or equal than1 sec. True or false? Why is it that voice and video b. All in the list traffic is often sent over TCP rather than UDP in today's Internet? a. TCP has better congestioncontrol mechanism than UDP. b. All in the list. c. Applications need the reliable data transfer provided by TCP. d. Most firewalls are configured to block UDP traffic, using TCP for video and voice traffic lets the traffic though the firewalls. Host A is sending Host B a False large file over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknowledgments to Host A, because Host B cannot piggyback the acknowledgments on data. True or false? https://quizlet.com/379810076/networking-chap-3-flash-cards/ 3/4 22/06/2021 Describe why anChap application Networking 3 Networking Chap 3 Flashcards | Quizlet They want to avoid TCP's congestion control. Study developer might choose to run an application over UDP rather than TCP. Suppose Host A is sending a False large file to Host B over a TCP connection. If the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be m+1. True or false? Suppose that the roundtrip all in the list delay between sender and receiver is constant and known to the sender. A timer would still be necessary in protocol rdt 3.0, assuming that packets can be lost. Explain. a. to detect the loss, for each packet, a timer of constant duration will still be necessary at the sender. b. the sender knows for sure that the packet for the packet has been lost, c. All in the list d. the sender knows for sure that the ACK (or NACK) for the packet has been lost, https://quizlet.com/379810076/networking-chap-3-flash-cards/ 4/4 23/06/2021 networks chapter 1 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks networks chapter 1 Study networks chapter 1 Terms in this set (42) end system/host transmission rate is measured user devices that connect to the internet bits/second in packet the data + header bytes sent from one end system to another takes a packet arriving on one of its incoming communication links and forwards that packet on what does a packet switch do? one of its outgoing communication links ex: routers, link-layer switches (typically used in access networks) Transmission Control Protocol Internet Protocol TCP and IP stand for IP protocol specifies the format of the packets that are sent and received among routers and end systems https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 1/9 23/06/2021 networks chapter 1 Flashcards | Quizlet How does one program1 networks chapter Internet API: a set of rules that the sending program Study running on one end system must follow so the Internet can deliver the data to instruct the internet to deliver the destination program data to another program running on another end system? defines the format and order of messages exchanged between two or more communicating what is a protocol? entities, as well as the actions taken on the transmission and/or receipt of a message or other event digital subscriber line DSL DSL modem uses the existing telephone line to exchange data with a digital subscriber line access multiplexer fiber to the home (FTTH) optical fiber path from the central office directly to the home local area network: connects an end system to the LAN edge router ethernet is the most prevalent access technology how many seconds does it take L/R seconds (intuitive) to send a packet of L bits over a link with transmission rate R bits per second? describe store-and-forward transmission https://quizlet.com/122137188/networks-chapter-1-flash-cards/ packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link 2/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 what is the end-to-end delay d_end-to-end = N*L/R Study for sending one packet of size L from source to destination over a path consisting of N links each of rate R? router examines the packet's destination address what happens when a packet arrives at a router? and forwards the packet to an adjacent router according to its forwarding table (that maps destination addresses to the router's outbound links) the resources needed along a path to provide for communication between the end systems are reserved for the duration of the communication session between the end systems circuit switching ex: traditional telephone networks establish a connection before sending any information--reserve a constant guaranteed transmission rate for the duration of the communication dedicated end-to-end connection these resources are not reserved; a session's messages use the resources on demand, and therefore might have to wait for access to a packet switching communication link ex: internet no link resources reserved whatsoever if a link is congested, packet waits in a buffer https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 3/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 frequency spectrum of a link is divided up among Study the connections established across the link frequency-division multiplexing (FDM) (link dedicates a frequency band to each connection for the duration of the connection bandwidth 4 kHz) telephone networks time is divided into frames of fixed duration; each frame divided into a fixed number of time slots time-division multiplexing time domain segmented into frames (TDM) with TDM, each circuit gets all the bandwidth periodically during brief intervals of time therefore no transmission openings are ever wasted packet switching: pros -better sharing of transmission capacity than circuit switching packet switching vs circuit -simpler, more efficient, less costly to implement switching -packet switching allocates link use on demand cons -packet switching not suitable for real-time services (telephone calls, video calls) b/c of variable and unpredictable end-to-end delays tier-1 ISP levels of ISP regional ISP access ISP a group of one or more routers (at the same point of presence (PoP) location) in the provider's network where customer ISPs can provide to the provider ISP https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 4/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 two nearby ISPs at the same level of hierarchy Study directly connect their networks together so that all what does it mean for two ISPs traffic between them passes over the direct to "peer"? connection rather than though upstream intermediaries IXP (internet exchange point) third-party meeting points where multiple ISPs can peer together see p34 layers (low to high) -end system Network Structure 5 -access ISP -regional ISP -IXPs -Tier 1/content provider networks nodal processing delay queuing delay types of packet delay transmission delay propagation delay add up to total delay processing delay time required to examine the packet's header and determine where to direct the packet (milliseconds) at the queue in a router, the packet experiences a queuing delay queuing delay as it waits to be transmitted onto the link(microseconds to milliseconds) https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 5/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 our packet can be transmitted only after all the Study packets that have arrived before it have been transmitted transmission delay Length of packet = L transmission rate from router A to router B = R transmission delay = L/R (time required to push all the packet's bits into the link) once a bit is pushed into the link, it propagates at around the speed of light to router B propagation delay distance between two routers divided by propagation speed on the order of milliseconds, for wide-area networks transmission = time it takes a tollbooth to service an entire caravan of cars (after the entire caravan has lined up behind the tollbooth) transmission vs propagation propagation = time it takes to travel between delay tollbooths transmission delay is significant for large packets sent over low-speed dial-up modem links a queue preceding a link has finite capacity packet loss if a packet arrives at a full queue, the packet is dropped --> lost https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 6/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 1. when the user specifies a destination hostname, Study the source's traceroute program sends multiple packets towards the destination. 2. the packets work their way towards the how does Traceroute work? destination, passing through a series of routers 3. when a router receives one of those special packets, it sends back to the source a short message that contains the name and address of the router rate at which destination host receives the file throughput in computer source host sends (bits per second) networks throughput is as high as the transmission rate of the bottleneck link ex: HTTP (web document request and transfer), application layer protocols SMTP (transfer of email messages), FTP (file transfer) implemented in software in the end systems transports application-layer messages between application endpoints TCP, UDP transport layer TCP: breaks long messages into shorter segments, congestion-control UDP: connectionless service to its applications (no flow control, no reliability, no congestion control) https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 7/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 moves network-layer packets known as datagrams Study from one host to another TCP or UDP passes a transport-layer packet (segment) to the network layer network layer provides the service of delivering the segment to the transport layer in the destination network layer host IP protocol, routing protocols also called IP layer network layer routes a datagram through a series of routers between source and destination to move a packet from one node (host or router) to the next node in the route, the network layer relies on the services of the LINK LAYER link layer link layer delivers the datagram to the next node along the route link layer protocols include: ethernet, wifi, cable DOCSIS packet in link layer is called a FRAME physical layer moves the individual bits within the frame from one node to the next virus: malware that require some form of user describe the two types of interaction to infect the user's device malware worm: malware that can enter a device without any explicit user interaction https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 8/9 23/06/2021 networks chapter 1 Flashcards | Quizlet networks chapter 1 vulnerability attack: if the right sequence of packets Study is sent to a vulnerable application or OS, the service can stop/host can crash bandwidth flooding: attacker sends a deluge of three types of DoS attack packets to the targeted host, clogging the target's access link; nobody else can reach the server connection flooding: attacker establishes a large number of half-open or fully open TCP connections; host stops accepting legitimate connections passive receiver that records a copy of every packet that flies by can be deployed in wireless AND wired networks! packet sniffing packet sniffers are passive (they do not inject packets into the channel) and so they're difficult to detect defense: cryptography create a packet with an arbitrary (false) source address, packet content, and destination address IP spoofing destination thinks the packet is coming from a legitimate source address and then follows packet instructions solution: end-point authentication https://quizlet.com/122137188/networks-chapter-1-flash-cards/ 9/9 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Networks Chapter 3 Study Networks Chapter 3 Terms in this set (47) On the sending side, the transport layer converts the application-layer messages it receives from a sending application process into transport-layer Segment packets, known as transport-layer segments in Internet terminology. This is done by (possibly) breaking the application messages into smaller chunks and adding a transport-layer header to each chunk to create the transport-layer segment. User Datagram Protocol (UDP) Provides an unreliable, connectionless service to the invoking application. Provides a reliable, connection-oriented service to Transmission Control Protocol the invoking application. The application developer (TCP) selects between UDP and TCP when creating sockets. The job of gathering data chunks at the source host from different sockets, encapsulating each data Multiplexing chunk with header information (that will later be used in demultiplexing) to create segments, and passing the segments to the network layer is... https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 1/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 At the receiving end, the transport layer examines Study these fields to identify the receiving socket and then Demultiplexing directs the segment to that socket. This job of delivering the data to the transport-layer segment to the correct socket is... The layer is the fourth layer of the OSI reference model. It provides transparent transfer of data Transport Layer between between end systems using the services of the network layer (e.g. IP) below to move PDU's of data between two communicating systems. Virtual ports are part of TCP/IP networking. These Port ports allow software applications to share hardware resources without interfering with each other. A method for communicating between client and Socket server programs. It is defined as "the endpoint in a connection." TCP connection provides a full-duplex service: If there is a TCP connection between Process A on one host and Process B on another host, then Connection application layer data can flow from Process A to Process B at the same time as application layer data flows from Process B to Process A. It is also pointto-point, that is, between a single sender and a single receiver. https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 2/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 TCP is said to be __________ because before one Study application process can begin to send data to Connection-Oriented another, the two processes must first "handshake" with each other--that is, they must send some preliminary segments to each other to establish the parameters of the ensuing data transfer. a security scanner used to discover hosts and Nmap services on a computer network, thus creating a "map" of the network. Listening Socket The servers socket just sits there and waits for a connection. It is a type of connectionless network socket, which Datagram Socket is the sending or receiving point for packet delivery services. Each packet sent or received on this socket is individually addressed and routed Each port number is a 16-bit number, ranging from 0 Well-Known port numbers to 65535. The port numbers ranging from 0 to 1023 are called well-known-port-numbers. A data transmission method used in packet switching networks by which each data unit is Connectionless Transport individually addressed and routed based on information carried in each unit, rather than in the setup information of a prearranged, fixed data channel as in connection-oriented communication. https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 3/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 Checksum It is used to determine whether bits within the UDP Study segment have been altered as it moved from source to destination. ACK NACK The message was received and was not garbled The message was received but garbled Definitions of the rdt1.0 sender and receiver are Finite State Machine shown in Figure 3.9, page 206. Also, a mathematical model of computation used to design both computer programs and sequential logic circuits. Application-specific function ought to reside on the End-to-End Principal end nodes instead of the intermediary nodes. This provides error detection for UDP. Reliable data transfer protocols based on such Automatic Repeat Request (APR) retransmission are known as ARQ. It is an errorcontrol method for data transmission that uses ACKs and timeouts to achieve reliable data transmission over an unreliable service. An interruppted signal generated by a program or Timeout device that has waited for a certain length of time for some input but has not received it. https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 4/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 The receiver an ACK signifying that the receiverStudy has received all data preceding the acknowledged sequence number. The sender sets the sequence Cumulative ACK number field to the sequence number of the payload byte in the segments data field, and the receiver sends an ACK specifying the sequence number of the next byte they expect to receive. Stop-and-Wait The sender sends a message and waits for the receivers response. A simple solution to duplicate packets is to add a new field to the data packet and have the sender Sequence Number number its packet by putting a these into this field. Also, a they allows the transport layer functions on the destination host to reassemble segments in the order in which they are transmitted. Maximum Transmission Unit (MTU) The MTU of a communications protocol of a layer is the size (in bytes) of the largest protocol data unit that the layer can pass onwards. The ____ is typically set by first determining the length of the largest link-layer frame that can be Maximum Segment Size (MSS) sent by the local sending host (the so-called MTU), and then setting the ___ to ensure that a TCP segment plus the TCP/IP header length will fit into a single link-layer frame. As the protocol operates, this window (figure 3.19 Window Size page 220) slides forward over the sequence number space. For this reason, N is often referred to as... https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 5/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 As the protocol operates, this window (figure 3.19 Study page 220) slides forward over the sequence number Sliding Window space. For this reason, N is often referred to as the window size and the GBN protocol itself as a sliding-window protocol. The time required for a signal pulse or packet to Round Trip Time (RTT) travel from a specific source to a specific destination and back again. SYN FIN Synchronize sequence numbers. Only the first packet sent from each end should have this flag set. No more data from the sender They are controls bits that indicate different TCP Flags connection states or information about how a packet should be handled. It is a bi-directional data transmission technique in the network layer. It makes the most of the sent data Piggybacking frames from receiver to emitter, adding the confirmation that the data frame sent by the sender was received successfully. It is a standardized technique in computer networking for determining the maximum Path MTU Discovery transmission unit size on the network path between two internet protocol hosts, usually with the goal of avoiding IP fragmentation. https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 6/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 Fast retransmit In the case that three duplicate ACKs are received, Study the TCP sender performs this, retransmitting the missing segment before that segment's timer expires. In this attack, the attacker(s) send a large number of TCP SYN segments, without completing the third SYN Flood Attack handshake step. With the deluge of SYN segments, the server's connection resources become exhausted as they are allocated (but never used!) for half-open connections. It is part of the congestion-control strategy. It is used in conjunction with other algorithms to avoid Slow Start sending more data than the network is capable of transmitting, that is, to avoid causing network congestion. Exponential Weighted Moving Avg It is a type of infinite impulse response filter that applies weighting factors which decrease exponentially. It is thus a speed-matching service--matching the Flow Control rate at which the sender is sending against the rate at which the receiving application is reading. TCP State Diagram TCP protocol running on each host make transitions through various TCP states. The rate at which the transport layer sends Offered Load segments into the network will be denoted lamda_in bytes/sec. lamda_in is sometimes referred to as... https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 7/8 22/06/2021 Networks Chapter 3 Flashcards | Quizlet Networks Chapter 3 Congestion Control AMID Congestion As noted earlier, a TCP sender can also be throttled Study due to congestion within the IP network; this form of sender control is referred to as... The congestion control for TCP. Know for "Sawtooth" Different sources compete for resources inside a network. One of the factors that determines the number of Congestion Window bytes that can be outstanding at any time. This is not to be confused with TCP window size which is maintained by the receiver. Because three segments are sent between two hosts, the connection-establishment procedure is Three-Way Handshake often referred to as a _______. Often referred to as "SYN-SYN-ACK" because there are three messages transmitted by TCP to negotiate and start a TCP session between two computers. https://quizlet.com/38886599/networks-chapter-3-flash-cards/ 8/8 22/06/2021 Networks Final - OSI Model Flashcards | Quizlet Home / Science / Computer Science / Computer Networks Networks Final - OSI Model Study Networks Final - OSI Model Terms in this set (15) What does OSI stand for? Open System Interface 7. Application 6. Presentation What are the 7 layers of the OSI model? 5. Session 4. Transport 3. Network 2. Data Link 1. Physical What's the difference between TCP/IP model and OSI model? TCP/IP model does not have a presentation and session layer and instead are represented by the application layer. - Layered architecture allows identification, welldefining relationship of large complex system's specific parts. Why Layering in the OSI model? - modularization eases maintenance, updating of system - change of implementation of layer's service transparent to rest of system so for example: in airline functionality, change in gate procedure doesn't affect the rest of the system. https://quizlet.com/463347875/networks-final-osi-model-flash-cards/ 1/3 22/06/2021 Networks Final - OSI Model Flashcards | Quizlet Networks Final - OSI Model 1. Flow control (do not overwhelm the receiver)Study List five tasks that a layer can 2. Error control (correct delivery or indication of perform. Is it possible that one (or more) of these tasks could be performed by two (or more) layers? problems) 3. Segmentation/Reassembly 4. Multiplexing 5. Connection setup/release Yes, these can be performed on each layer. - Application-layer message: data which an application wants to send and passed onto the transport layer What is an application-layer - transport-layer segment: generated by the message? A transport-layer transport layer and encapsulates application-layer segment? A network-layer message with transport layer header datagram? A link-layer frame? - network-layer datagram: encapsulates transportlayer segment with a network-layer header - link-layer frame: encapsulates network layer datagram with a link-layer header Which layers in the Internet - Physical layer protocol stack does a router - Link layer process? - Network layer Which layers in the Internet - Physical layer protocol stack does a link-layer - Link layer switch process? - Physical layer Which layers in the Internet - Link layer protocol stack does a host - Network layer process? - Transport layer - Application layer https://quizlet.com/463347875/networks-final-osi-model-flash-cards/ 2/3 22/06/2021 What is the application layer Networks Final - OSI Model Networks Final - OSI Model Flashcards | Quizlet For providing services to the user Study responsible for? What is the transport layer For delivery of a message from one process to responsible for? another What is the network layer For the delivery of packets from the original source responsible for? to the final destination What is the data link layer For transmitting frames from one node to the next responsible for? What is the physical layer For transmitting individual bits from one node to the responsible for? next Which layers in the OSI work as Application, Presentation, Session, Transport peer to peer? https://quizlet.com/463347875/networks-final-osi-model-flash-cards/ 3/3 22/06/2021 NWC Flashcards | Quizlet Home / Science / Computer Science / Computer Networks NWC Study NWC Terms in this set (52) Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 80000 bytes. D 53 54 56 55 This command identifies the receiver of the message in email. A RCPT TO DATA MAIL FROM HELO https://quizlet.com/vn/243943656/nwc-flash-cards/ 1/15 22/06/2021 NWC Flashcards | Quizlet NWC Because FTP uses a separate control connection Study different from data connection, FTP is said to sent its control information ______ C Outside-Band In-Bandwidth Out-of-band In-band The ____ on the physical medium of the link is a little than or equal to the speed of light B Processing Delay Propagation delay Transmission delay Queueing delay Assume an Ethernet network has speed of 15Mbps. In the exponential backoff phase of CSMA/CD, after the first collision of a frame, the adapter then waits ..... before sensing the channel again. D Either 0 or 51.2 microseconds Either 1 or 34 microseconds Either 1 or 512 microseconds Either 0 or 34 microseconds https://quizlet.com/vn/243943656/nwc-flash-cards/ 2/15 22/06/2021 NWC Flashcards | Quizlet NWC UDP and TCP use 1s complement checksum. Study Suppose you have the followings 2 bytes. 00110111 and 01001100. What is the 1s complement of the sum of those two bytes? D 10000011 01001100 00110111 01111100 Which one is correct about P2P network? None of them One user computer failure can lead to the whole A P2P network to fail A Peer must contain all files for other clients to download A user computer is not allowed to change its IP address Assume the RTT 40ms, the size of the Web object 0.2Mb and the transmission rate 20Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP..... A 90ms 170ms 60ms 50ms https://quizlet.com/vn/243943656/nwc-flash-cards/ 3/15 22/06/2021 NWC Flashcards | Quizlet NWC The IP broadcast address is: C Study 256.256.256.256 FF.FF.FF.FF.FF 255.255.255.255 00.00.00.00 What is DDos Stand for ? B Data Domain Open System Distributed Denial-of-Service Directed Denial-of-Service Data Denial-of-Service Who can send ICMP error reporting messages ? D Destination port Repeaters and senders Switch Routers and destination hosts https://quizlet.com/vn/243943656/nwc-flash-cards/ 4/15 22/06/2021 NWC Flashcards | Quizlet NWC Suppose that host 10.0.0.2 initiates a connection,Study using source port 5500 to a web sever listening at port 80 at 128.119.40.186. The NAT translation table for this TCP connection. WAN Side: 138.76.29.7, 5002 LAN Side: 10.0.0., 5500 C What are the destination IP addresses and port numbers on the IP datagram arriving to the WAN side of the router with interface address 138.76.29.7 ? Destination IP: 138.76.29.7, Destination Port: 80 Destination IP: 10.0.0.2, Destination Port: 80 Destination IP: 138.76.29.7, Destination Port: 5002 Destination IP: 10.0.0.2, Destination Port: 5500 What is the total delay for transmission of 1.25MB of images over fiber optic cable with distance of 3000 km with transmission rate of 1GBps (ignore all other delays). Assume that the speed of ..... A 2msec 20msec 10msec 21msec MIME is short for A Multipurpose Internet Mail Extensions Multiple Internet Mail Extensions Message Internet Mail External Multipurpose Internet Message Extensions https://quizlet.com/vn/243943656/nwc-flash-cards/ 5/15 22/06/2021 NWC Flashcards | Quizlet NWC Which of the following is NOT mechanisms used to Study provide for reliable date transfer? D Sequence numbering ACKs Handshaking Checksum What are two fundamental switching approaches for building e network core? D Frame switching and circuit switching Channel switching and datagram switching Message switching and automatic switching Circuit switching and packet switching The _____ on the physical medium of the link is a little ____ than or equal to the speed of light A Propagation delay....less Propagation delay....more Processing Delay ... more Queueing delay ...... less Data link packet is called _____. encapsulates ______ C Segment...datagram Datagram.... frame Frame.....bit chunk Frame...datagram https://quizlet.com/vn/243943656/nwc-flash-cards/ 6/15 22/06/2021 NWC Flashcards | Quizlet NWC What is information used to route packet in network Study ? Destination Address, Source Address, and Protocol A fields in IPP header Source Address field in IP header Destination Address field in IP header Destination Address and Source IP Post fields in IP header The DNS protocol runs over _____ and uses port _____ B TCP...51 UDP...53 UDP...51 HTTP...53 Which one is incorrect about MAC address? 32bits A Physically set by manufacturers Has other names such as LAN address, Ethernet address Can not modified by user That an application can reply on the connection to deliver all of its data without error and in the proper order is called C Approximated data transfer Non-Error data transfer Reliable data transfer Correctable data transfer https://quizlet.com/vn/243943656/nwc-flash-cards/ 7/15 22/06/2021 NWC Flashcards | Quizlet NWC Which one is incorrect about UDP? Study No connection state B Has congestion control No connection establishment Smaller segment header overhead in comparison with TCP As soon as the browser receives the IP address from ___, it can initiate a TCP connection to the HTTP server located at port _____ at that IP address B Client..60 DNS..80 User...80 DNS..60 The job of delivering the data in a transport-layer segment to the correct application process is called_____ D Multiplexing Gathering Congestion control De-multiplexing In OSI model, as data packet moves from the upper the lower layer header are B Modified Added Rearranged Removed https://quizlet.com/vn/243943656/nwc-flash-cards/ 8/15 22/06/2021 NWC Flashcards | Quizlet NWC The client-server model significantly relies on ___ Study infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ___ with each other A Always-on ...directly Usually-off....indirectly Usually-off...directly Always-on....indirectly Suppose a subnet has a block of IP addresses 101.101.101.0/4, which address belongs to that block ? C 101.101.101.122 101.101.101.111 101.101.101.1 101.101.101.131 That is the MAC protocol used in 802.11 network> C CSMA/CD frame Relay CSMA/CA Token passing What is the 32-bit binary equivalent of the IP address 1.255.8.252 ? 00000001.11111110.00001000.11111110 B 00000001.11111111.00001000.11111100 00000011.11111110.00001000.11111100 00000111.11111111.00001000.11111100 https://quizlet.com/vn/243943656/nwc-flash-cards/ 9/15 22/06/2021 NWC Flashcards | Quizlet NWC A set of rules or guidelines that govern interactions Study between two computer systems in a computer network is called_____ D Network policies Network conventions Network rules Network protocols If the buffer of the router in the Internet is full, the router will_____ D Modify the packets to make it smaller Transmit packets faster Automatically enlarge the buffer so that it can store more packets Drop incoming packets, resulting packet loss The "Time-To-Live" field in IP datagram D Is one, datagram is discarded None of them Decrease by half on passing though each router Decrease one on passing through each router Transport-layer packet in the Internet terminology is referred as: B Packet Segment Frame Datagram https://quizlet.com/vn/243943656/nwc-flash-cards/ 10/15 22/06/2021 NWC Flashcards | Quizlet NWC In the congestion avoidance phase of TCP Study congestion control, if the timeout occurs at the current congestion window size 90, the congestion window size will be reduce to ____ and the thresh is B _____ 0...45 1....45 1...90 0...46 Which on is not an IP address? B 10.130.140.10 258.222.255.1 255.222.1.1 10.100.200.0 Assume the original message to be sent 101110, the generator is 1001. What is the remainder resulted during the CRC computation ? D 001 101 100 011 What is DDoS stand for ? C Data Domain Open System Dominant Denial-of-Service Distributed Denial-of-Service Datagram Denial-of-Service https://quizlet.com/vn/243943656/nwc-flash-cards/ 11/15 22/06/2021 NWC Flashcards | Quizlet NWC The most important difference between FTP and Study HTTP is There is no difference between those two protocols at all C HTTP control information is out-of-band while FPT is not FTP uses two parallel TCP connections to transfer a file while HTTP use only one connection FTP uses one TCP connections to transfer a file while HTTP use two or more than two parallel connections A packet with size of 10KB is transmitted via the link with the transmission rate of 80kbps; the transmission delay is D 10s 1s 100s 1.25s An HTTP request message always contains_____ B A header and a body A request line and a header A status line, a header, and a body A reply code Two-dimensional parity check can C Detect a single bit error but not able to correct it Detect a bust of bit errors Correct 1 bit error Correct a bust of bit https://quizlet.com/vn/243943656/nwc-flash-cards/ 12/15 22/06/2021 NWC Flashcards | Quizlet NWC Study Another name of Web cache is C Web browser Router proxy server switch Which one is not a MAC address: AF-D0-56-F2-05-12 B A1-000-6C-2D-15-0A F0-62-D5-EE-EA-6B FF-62-DE-6F-D2-DD FTP uses port ___ for sending identification and password and port ____ for sending data C 20..21 60..20 21..20 20...20 Ethernet technologies provides ___ to the network layer A Unreliable service Reliable service Safe service Unsafe service https://quizlet.com/vn/243943656/nwc-flash-cards/ 13/15 22/06/2021 NWC Flashcards | Quizlet NWC Two of the most important fields in the TCP segment Study header are The sequence number and the IP acknowledgment B number The sequence number and the IP address The sequence number and the NAK number The queuing number and the acknowledgment number In the file distribution of the client-server model, the server has to send____ of file to many hosts, consuming a ____ amount of bandwidth B Root...more Copies....large Copies...small Portion...large There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 1 Mbps. What is the throughput between the client and the server? D 3Mbps 2Mbps 4Mbps 1Mbps https://quizlet.com/vn/243943656/nwc-flash-cards/ 14/15 22/06/2021 NWC Flashcards | Quizlet NWC How many duplicate ACKs to trigger the Fast Study Retransmission mode ? D An option 2 1 3 Which one is the flag used for framing in PPP? B 01111011 011111100 10000001 1000001 In HTTP response message, the status code 200 means: Website not found B Request succeeded and the information is returned in the response Request failed and the information is not returned in the response Request just failed https://quizlet.com/vn/243943656/nwc-flash-cards/ 15/15 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 Study problem set 3 Terms in this set (37) hostname one out of 2 identifiers for an internet host mnemonic-appreciated by humans 2nd identifier of internet host IP address fixed length hierarchically structured able to be processed by routers DNS translates hostnames to IP addresses Domain name system The DNS is (1) a distributed database implemented in a hierarchy of DNS servers (2) an application-layer protocol that allows hosts to query the distributed database a host with a complicated host name can have 1 or more alias names. typcially, more mnemonic than canonical hostnames host aliasing DNS can be invoked by an application to obtain the canonical hostname for a supplied alias hostname as well as the IP address of the host https://quizlet.com/231707454/problem-set-3-flash-cards/ 1/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 simple mnemonic name used instead of Study complicated name. mail server aliasing DNS can be invoked by mail application to obtain canonical hostname for a supplied alias hostname as well as IP address load distribution replicated servers such as web servers: many IP addresses correspond to one name each ISP has this typcially, close to the host does not belong to the hierarchy of servers but is central to the DNS architecture local DNS server When a host makes a DNS query, the query is sent to the local DNS server --has local cache of recent name-to-address translation pairs (but may be out of date) --acts a proxy, forwarding the query into the DNS server hierarchy 1 out of 4 problems with centralized design of DNS single point failure if the DNS server crashes, so does the internet https://quizlet.com/231707454/problem-set-3-flash-cards/ 2/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 2nd out of 4 problems with centralized design of Study DNS Traffic volume A single DNS server would have to handle all DNS queries (for all the HTTP requests and e-mail messages generated from hundreds of millions of hosts). 3rd out of 4 problems with centralized design of DNS distant centralized database A single DNS server cannot be "close to" all the querying clients therefore, slow congested links 4th out of 4 problems with centralized design of DNS maintenance would have to keep records for all Internet hosts. Not only would this centralized database be huge, but it would have to be updated frequently to account for every new host distributed hierarchical data distributed in servers organized in a tree-like database structure one of hierarchical servers root DNS server first contacted by local DNS server that cannot resolve name https://quizlet.com/231707454/problem-set-3-flash-cards/ 3/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 one of hierarchical servers top-level domain (TLD) DNS These servers are responsible for top-level domains server such as com, org, net, edu, and gov, and all of the Study country top-level domains such as uk, fr, ca, and jp one of hierarchical servers authoritative DNS server Houses publicly accessible DNS records that map the names of publicly accessible hosts (such as web servers, mail servers) to IP addresses puts burden of name resolution on contacted name server recursive queries the query from the requesting host asks the local DNS server to obtain the mapping on requesting host behalf. iterative queries replies to the queries are directly returned to the local DNS. Resource Record response to a query RR stored in DNS distributed database (except local DNS) A four-tuple that contains the following fields: (Name, Value, Type, TTL) last field in resource record (RR) TTL TTL is the time to live of the resource record; it determines when a resource should be removed from a cache https://quizlet.com/231707454/problem-set-3-flash-cards/ 4/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 third field of the resource record Study four different types of responses: Type A CNAME NS MX first field of the resource record name Type A: name = hostname Type NS: name = domain Type CNAME: CNAME name = alias hostname Type MX: name = alias hostname of mail server 2nd field of resource record Type A: value = IP address of hostname Type NS: value = hostname of an authoritative DNS server that knows how to obtain the IP addresses for value hosts in the domain. This would have a type A record Type CNAME: CNAME canonical hostname for the alias hostname Type MX: value = canonical name of a mail server that has an alias name https://quizlet.com/231707454/problem-set-3-flash-cards/ 5/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 Type A provides the standard hostname-to-IP address Study mapping (relay1.bar.foo.com, 145.37.93.126, A) This record is used to route DNS queries further along in the query chain Type NS Server responding is not authoritative (foo.com, dns.foo.com, NS), (dns.umass.edu, 128.119.40.111, A). This record can provide querying hosts the Type CNAME canonical name for a hostname. (foo.com, relay1.bar.foo.com, CNAME) CNAME MX records allow the hostnames of mail servers to have simple aliases Note that by using the MX record, a company can have the same aliased name for its mail server and Type MX for one of its other servers (such as its Web server) To obtain the canonical name for the mail server, a DNS client would query for an MX record; to obtain the canonical name for the other server, the DNS client would query for the CNAME record https://quizlet.com/231707454/problem-set-3-flash-cards/ 6/9 23/06/2021 problem set 3 problem set 3 Flashcards | Quizlet contains the first 12 bytes which has a number of Study fields identification -16 bit # for query;reply used same # header section of DNS message flags 1. query or reply 2. recursion desired 3. recursion available 4. reply is authoritative contains information about query that is being made question section of DNS fields: message 1. name-name that is being queried 2. type-type of question: type A, type NS, type CNAME, type MX CNAME answer section of DNS message authority section of DNS reply from the DNS server which contains the resource records (RR's) for the name that was originally queried contains records of other authoritative servers message additional section of DNS contains other helpful records (additional message information that can be used) https://quizlet.com/231707454/problem-set-3-flash-cards/ 7/9 23/06/2021 problem set 3 Flashcards | Quizlet problem set 3 By typing nslookup in command line, enables you to Study send a DNS query message directly from the host you're working on to some DNS server (root, TLD, or authoritative) nslookup After receiving the reply message from the DNS server, nslookup will display the records included in the reply (in a human-readable format) This works with most Windows and UNIX platforms time it takes to distribute a file( size F) from one server to N peers client-server: Dsub cs >= max {NF/u sub s, F/d sub min} file distributed time Dcs increases linearly with the with number of peers (N) b/c client-server sends a copy to each peer P2P: Dsub p2p >= max{F/u sub s, F/d sub min, NF/(u sub s + SUM u sub i)} increases linearly in N... file distribution application BitTorrent the application distributes a file from a single source to a large number of peers self-scalability https://quizlet.com/231707454/problem-set-3-flash-cards/ 8/9 23/06/2021 problem set 3 Flashcards | Quizlet DHT problem set 3 distributed Hash Table application Study each peer can redistribute any portion of the file it scalability has received to any other peers, thereby assisting the server in the distribution process message transport layer receives from the segment application layer is broken down into smaller chunks and adding the transport layer header to each chunk, creating segments https://quizlet.com/231707454/problem-set-3-flash-cards/ 9/9 22/06/2021 Q 6 Flashcards | Quizlet Q6 Terms in this set (30) Transmission Delay fraction of time sender is busy Usender Utilization usender = (L/R) / (rtt +L/R) Sender allows multiple, "in-flight", yet to be pipelining acknowledged packets. -range of sequence numbers must be increased -buffering at sender and/or receiver Two generic forms of pipelined Go-Back-N protocols selective repeat -sender can have up to N unacked packets in pipeline -receiver only sends cumulative ack Go-Back-N protocol -doesn't ack packet if there's a gap -sender has timer for oldest unacked packet -when timer expires, retransmit all unacked packets Q6 https://quizlet.com/542401477/q-6-flash-cards/ -may recieve duplicate ACKS 1/9 22/06/2021 Q 6 Flashcards | Quizlet -sender can have up to N unack'ed packets in pipeline Selective Repeat Protocol -rcvr sends individual ack for each packet -sender maintains timer for each unacked packet -when timer expires, retransmit only that unacked packet is TCP go back n or selective GO BACK N repeat window window of up to N consecutive unacknowledged packets allowed discard and no receiver buffering GBN out of order packet re-ACK pkt with highest in-order packet Q6 https://quizlet.com/542401477/q-6-flash-cards/ 2/9 22/06/2021 Q 6 Flashcards | Quizlet -(Doesnt have to be acknowledged consecutive or in order) -each packet has a timer -received out of order put wait until you have them all in order -buffering at receiver -receiver individually acknowledges all correctly received pkts selective repeat protocol pt.2 -buffers pkts, as needed, for eventual in-order delivery to upper layer -sender only resends pkts for which ACK not received -sender timer for each unACKed pkt sender window -N consecutive seq #'s -limits seq #s of sent, unACKed pkts data from above: -if next available seq # in window, send pkt timeout(n): selective repeat sender -resend pkt n, restart timer ACK(n) in [sendbase,sendbase+N]: -mark pkt n as received -if n smallest unACKed pkt, advance window base to next unACKed seq # Q6 https://quizlet.com/542401477/q-6-flash-cards/ 3/9 22/06/2021 Q 6 Flashcards | Quizlet pkt n in [rcvbase, rcvbase+N-1] -send ACK(n) -out-of-order: buffer -in-order: deliver (also deliver buffered, in-order pkts), advance window to next not-yet-received pkt selective repeat receiver pkt n in [rcvbase-N,rcvbase-1] -ACK(n) otherwise: -ignore point-to-point: -one sender, one receiver reliable, in-order byte steam: -no "message boundaries" TCP pipelined: -TCP congestion and flow control set window size -full duplexed data -connection-oriented -flow controlled Q6 https://quizlet.com/542401477/q-6-flash-cards/ 4/9 22/06/2021 Q 6 Flashcards | Quizlet -full duplex data: bi-directional data flow in same connection MSS: maximum segment size TCP a. full duplex data -connection-oriented: b. connection-oriented handshaking (exchange of control msgs) inits c. flow controlled sender, receiver state before data exchange -flow controlled: sender will not overwhelm receiver 5 rows of 32 bits/4 bytes going down TCP header length: 32 bits/4 bytes MINIMUM 160 bits/20 bytes which are used to establish connection: ACK, SYN connection and teardown in teardown: RST, FIN TCP header TCP header: receive window MSS flow control # of bytes receiver is willing to accept Maximum Segment Size byte stream "number" of first byte in segment's data TCP Sequence Numbers get incremented by adding the byte length Q6 https://quizlet.com/542401477/q-6-flash-cards/ 5/9 22/06/2021 Q 6 Flashcards | Quizlet seq # of next byte expected from other side -cumulative ACK -driven by data and initial number is random TCP Acks -receiver is expected to receive a certain number of bytes Q: how receiver handles out-of-order segments A: TCP spec doesn't say, - up to implementor longer than RTT -but RTT varies TCP Timeout too short: premature timeout, unnecessary retransmissions too long: slow reaction to segment loss SampleRTT: measured time from segment transmission until ACK receipt -ignore retransmissions TCP RTT SampleRTT will vary, want estimated RTT "smoother" -average several recent measurements, not just current SampleRTT EstimatedRTT = (1- α)EstimatedRTT + αSampleRTT how TCP estimates RTT -exponential weighted moving average -influence of past sample decreases exponentially fast -typical value: α = 0.125 Q6 https://quizlet.com/542401477/q-6-flash-cards/ 6/9 22/06/2021 Q 6 Flashcards | Quizlet Estimated RTT plus safety margin Timeout Interval Timeout Interval = EstimatedRTT + 4*DevRTT estimate SampleRTT deviation from EstimatedRTT: DevRTT = (1-β)DevRTT + β|SampleRTTDeviation EstimatedRTT| (typically, β = 0.25) TCP creates rdt service on top of IP's unreliable service -pipelined segments TCP reliable data transfer retransmissions triggered by: -cumulative acks -single retransmission timer retransmissions triggered by: -timeout events -duplicate acks Q6 https://quizlet.com/542401477/q-6-flash-cards/ 7/9 22/06/2021 Q 6 Flashcards | Quizlet data rcvd from app: -create segment with seq # -seq # is byte-stream number of first data byte in segment -start timer if not already running -think of timer as for oldest unacked segment -expiration interval: TimeOutInterval TCP Sender Events timeout: -retransmit segment that caused timeout -restart timer ack rcvd: -if ack acknowledges previously unacked segments -update what is known to be ACKed -start timer if there are still unacked segments TCP cumulative acks if two segments are sent back to back just send ack for the second one if there is an arrival of an out of order segment that is higher than the expected sequence # a gap is TCP duplicate ack detected and to solve it, immidietly send duplicate ack, with the sequence number of the next expected byte Q6 https://quizlet.com/542401477/q-6-flash-cards/ 8/9 22/06/2021 Q 6 Flashcards | Quizlet Time-out period often relatively long: -long delay before resending lost packet Detect lost segments via duplicate ACKs -sender often send many segments back to. back -if segment is lost there will likely be many duplicate ACKs TCP fast retransmit If the timer is still running but receiver keeps sending the same Acks over and over the sender doesnt wait for the timer to be over before sending the missing segment helps run faster since it doesnt wait for timer to be over https://quizlet.com/542401477/q-6-flash-cards/ 9/9 22/06/2021 Quiz-06 Flashcards | Quizlet Quiz-06 Terms in this set (39) Domain Name System, is implemented in hierarchy DNS of many name servers hosts, name servers communicate to resolve names hostname to IP address translation DNS services host aliasing mail server aliasing load distribution single point of failure Why not centralize DNS? traffic volume distant centralized database maintenance client queries root server to find com DNS server Client quiries .com DNS server to get amazon.com Amazon DNS query DNS server client queries amazon.com DNS server to get IP address for www.amazon.com Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 1/11 22/06/2021 Quiz-06 Flashcards | Quizlet contacted by local name server that can not resolbe name DNS: root name servers root name server: contanct authoritative name server if name mapping not know gets mapping returns mapping to local name server responsible for com, org, net, edu, aero, jobs, top-level domain (TLD) servers: museums, and all top-level country domains, e.g.: uk, fr, ca, jp Network solutions maintains servers for .com TLD organization's own DNS server(s), provinding authoritative hostname to IP mappings for authoritative DNS servers organization's named hosts can be maintained by organization or service provider does not strictly belong to hierarchy each ISP has one Local DNS name server when host makes DNS query, query is sent to its local DNS server; has local cache of recent nameto-address translation pairs; acts as proxy, forwards query into hierarchy contacted server replies with name of server to iterated query contact "I don't know this name, but ask this server" puts burden of name resolution on contacted name revursive query server heavy load at upper levels of hierarchy? Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 2/11 22/06/2021 Quiz-06 Flashcards | Quizlet one (any) name server learns mapping, it caches mapping, they time out TTL TLD servers typically cached in local name servers DNS: caching, updating records cached entries may be out-of-date, if name host changes IP address, may not be known internetwide until all TTLs expire distributed database storing resource records DNS records RR fromat: (name, value, type, ttl) name is hostname type=A records value is IP address type=NS name is domain (e.g., foo.com) name is alias name for come "canonical" (the real> name type=CNAME www.ibm.com is really servereast.backup2.ibm.com value is canonical name type=MX slide 67 of ch2 ppt value is name of mailserver associated with name ... Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 3/11 22/06/2021 Quiz-06 Flashcards | Quizlet register name at DNS registrar provide names, IP addresses of authoritative name Inserting records into DNS server (primary and secondary) registrar inserts two RRs into .com TLD server create authoritative server type A record, and type MX record for mail server no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP Pure P2P architecture address e.g. file distribution streaming VoIP how much time to distribute file peer upload/download capacity is limited resource (size F) from one server to N peers? must sequentially send (upload) N file copies: server transmission time to send one copy: F/us time to send N copies: NF/us each client must download file copy client dmin = min client download rate min client downloat time: F/dmin see slide 74 ch2 Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 4/11 22/06/2021 Quiz-06 Flashcards | Quizlet file divided into 256kb chunks peers in torrent send/receive file chunks peer joining torrent; has no chunks, but will accumulate them over time from other peers registers with tracker to get list of peers, connects to subset of peers Torrent while downloading, peer uploads chunks to other peers peer may change peers with whom it exchanges chunks churn: peers may come and go once peer has entire file, it may (selfishly) leave or (altruistically) remain in torrent CDN content distribution networks major consumer of internet bandwidth video trafffic different users have different capabilities solution: distributed, application-level infrastructure video sequence of images diplayed at constant rate; e.g., 24 images/sec digital image: array of pixels; each pixel represented Multimedia: video by bits coding: use redundancy within and between images to decrease # bits used to encode images spatial (within image) temporal (from one image to the next) Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 5/11 22/06/2021 Quiz-06 Flashcards | Quizlet CBR: (constant bit rate): video encoding rate fixed VBR (varaible bit rate): video encoding rate changes Multimedia video continued as amount of spatial, temporal coding changes e.g., MPEG 1 (CD-ROM) 1.5Mbps MPEG2 (DVD) 3-6Mbps MPEG4 (often used in Interent, < 1Mbps) DASH: Dynamic, Adaptive Streaming over HTTP server: divides file into multiple chunks, each chunk stored, encoded at different rates, manifest file: provides URLs for different chunks Streaming multimedia: DASH client: periodically measure server-to-client bandwidth, consulting manifest, requests one chunk at a time; chooses mximum coding rate sustainable given current bandwidth; can choose different coding rates at different points in time (depending on available bandwidth at time) client determines when: to request chunk (so that buffer starvation, or overflow does not occur Intelligence at client what encoding rate: to request (higher quality when more bandwidth available) where: to request chunk (can request from URL server that is "close" to client or has high avaiable bandwidth) Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 6/11 22/06/2021 Quiz-06 Flashcards | Quizlet challenge: how to stream content (selected from millions of videos) to hundreds of thousands of simultaneous users? option 1: single, large "mega-server" single point of failure point of network congestion Content Distribution Networks long path to distant clients multiple copies of vide sent over outgoing link option2: sotre/server multiple copies of videos at multiple geographically distributed sites (CDN) enter deep: push CDN servers deep into any access networks; closer to users bring home: smaller number of larger clusters in POPs near access networks; easier to maintain CDN stores copies of content OTT challenges: coping with a congested internet; at CDN nodes from which CDN node to retrieve content? viewer behavior in presence of congestion?; what subscriber requests content content to place in which CDN node? from CDN directed to nearby copy, retrieves content; may choose different copy if network path congested goal: learn how to buiold client/server applications that communicate using sockets Socket Programming socket: door between application process and endend-transport protocol Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 7/11 22/06/2021 Quiz-06 Flashcards | Quizlet Application Example: clent reads a line of characters (data from its keyboard and sends data to server UDP: unreliable datagram sever receives the data and converts character to TCP: reliable byte stream- uppercase oriented server sends modified data to client client receives modified data and displays line on its screen no 'connection' between client & server no handshaking before sending data sender explicitly attaches IP destination address and port # to each packet UDP socket programming receiver extracts sender IP address and port # from received packte UDP: transmitted data may be lost or received outof-order UDP provides unreliable ransfer of groups of bytes ("datagrams") between client and server Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 8/11 22/06/2021 Quiz-06 Flashcards | Quizlet create socket, port=x: serverSocket= socket(AF_INET, SOCK_DGRAM) read datagram from severSocket Socket Integration (server) write reply to severSocket specifying client address, port number create socket: clientSocket= socket(AF_INET, SOCK_DGRAM) Create datagram with server IP and port=x; send Socket integration (client) datagram via clientSocket read datagram from clientSocket close clientSocket Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 9/11 22/06/2021 client must contact Quiz-06 Flashcards | Quizlet ... server server process must first be running server must have create socket (door) that welcomes client's contact client contacts server by : creating TCP socket, specifying IP address, port number of server process when client creates socket: client TCP establishes connection to server TCP when contacted by client, server TCP creates new socket for server porcess to communicate with that particular client allows server to talk with multiple clients source port number used to distinguish clients TCP provides reliable, in-order byte-stream transfer ("pipe") Quiz-06 https://quizlet.com/236864161/quiz-06-flash-cards/ 10/11 22/06/2021 Quiz-06 Flashcards | Quizlet between client and server serverSocket=socket(); Socket Integration TCP (server) connectionSocket = serverSocket.accept(); Socket Integration UDP (client) https://quizlet.com/236864161/quiz-06-flash-cards/ clientSocket = socket() 11/11 ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Discussion QUIZ # 3-A Name: Number: Q1) Write TRUE/FALSE: 1- [ true ]An algorithm is needed with CSMA to specify what a station should do if the medium is found busy. 2- [ false ]A Class C network is defined as few networks, each with many hosts. Q2) Choose the correct answer: 1- Two frames interfering with each other at the receiver so that neither gets through is known as________ . A. a collision B. Scrambling C. a backlog D. a backoff 2- The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is calledــــــــــــــــــــــــــــــــــــــــــ. A. Subnetting B. Reassembly C. Fragmentation D. Downsizing 3- The effect of the __________ is to erase the portion of the host field that refers to an actual host on a subnet, leaving the network number and the subnet number. A. address mask B. subnet mask C. echo reply D. checksum Q3) You have sub-netted your class C network 192.168.1.0 with a subnet mask of 255.255.255.240. Please list the following: number of subnets, number of hosts per subnet. #subnets=24=16 #hosts=216-2=14 Q4) You currently use the default mask for your IP network 192.168.1.0. You need to subnet your network so that you have 30 additional networks, and 4 hosts per network. Is this possible, and what subnet mask should you use? 2x>=30 x=5 2n-2>=4 n=3 255.255.255.248 Q5) A transport-layer message consisting of 2000 bits of data and 160 bits of header is sent to an internet layer, which appends another 160 bits of header. This is then transmitted through two networks, each of which uses a 20-bit packet header. The destination network has a maximum packet size of 600 bits. How many bits, including headers, are delivered to the network-layer protocol at the destination? 2000+160+160=2320 2320/600=3.66=4 #bits=2320+4*20=2400 ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Discussion QUIZ # 3-B Name: Number: Q1) Write TRUE/FALSE: 1- [ true ]With CSMA/CD the amount of wasted capacity is reduced to the time it takes to detect a collision. 2- [ true ]The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32bit address field in IPv4. Q2) Choose the correct answer: 1- With _____ , a station wishing to transmit first listens to the medium to determine if another transmission is in progress. If the medium is in use, the station must wait. If the medium is idle, the station may transmit. A. B. C. D. ALOHA transmission backlog delay CSMA Ethernet 2- A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ___________ . A. B. C. D. flow control error control data control transmission control 3- __________ is the foundation on which all of the internet based protocols and internetworking is based. A. B. C. D. Datagram IP TCP VPN Q3) You have sub-netted your class C network 200.138.1.0 with a subnet mask of 255.255.255.252. Please list the following: Number of subnets, number of hosts per subnet. #subnets=26=64 #hosts=22-2=2 Q4) You still are using the default mask for your IP network 192.168.1.0. You need to subnet your network so that you have 5 additional networks, and 60 hosts per network. Is this possible, and what subnet mask should you use? 2x>=5 x=3 2n-2>=60 n=6 3+6=9>8 It's Not Possible Q5) Consider a slotted ring of length 20 km with a data rate of 10 Mbps and 400 repeaters, each of which introduces a 1-bit delay. Each slot contains room for one source address byte, one destination address byte, two data bytes, and five control bits for a total length of 37 bits. How many slots are on the ring? from book ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Discussion QUIZ # 4-A Name: Number: Q1) Write TRUE/FALSE: 1- [ false ] With unicast transmission the router may be required to forward two or more copies of an incoming datagram. 2- [ true ] The guaranteed service is the most demanding service provided by ISA. 3- [ true ] Traffic on a network or internet can be divided into two broad categories: elastic and inelastic. 4- [ false ] A codepoint is simply a set of state information at a router that expires unless regularly refreshed from the entity that requested the codepoint. 5- [ false ] The three main functions of IGMP are: Neighbor acquisition, Neighbor reachability and Network reachability. Q2) Choose the correct answer: 1- Addresses that refer to a group of hosts on one or more networks are referred to as _________ . a) multicast addresses b) unicast addresses c) broadcast addresses d) distributed addresses 2- Four formats of Border Gateway Protocol messages are the ___________ messages. a) open, authenticate, notification, and close b) notify, authenticate, hold, and send c) open, notify, keepalive, and receive d) open, update, keepalive, and notification 3- The DS specifications refer to the forwarding treatment provided at a router as __________ . This must be available at all routers and typically is the only part of DS implemented in interior routers. a) WFQ b)Qos c) PHB 4- Designed to allow routers to cooperate in the exchange of routing information, the __________ was developed for use in conjunction with internets that employ the TCP/IP suite. It has become the preferred exterior router protocol for the Internet. a) IGMP b) BGP c) OSPF d) RSVP 5- Dispenses with routing metrics and simply provide information about which networks can be reached by a given router and the ASs that must be crossed to get there. a) distance-vector routing b) link-state routing c) path-vector routing ☺ Good Luck ☺ ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Discussion QUIZ # 4-B Name: Number: Q1) Write TRUE/FALSE: 1- [ false ] Inelastic traffic easily adapts to changes in delay and throughput across an internet. 2- [ true ] The Open Shortest Path First protocol is an example of a routing protocol that uses link-state routing. 3- [ true ] The use of resource reservation can enable routers to decide ahead of time if they can meet the requirement to deliver a multicast transmission to all designated multicast receivers and to reserve the appropriate resources if possible. 4- [ false ]In BGP Hosts send messages to routers to subscribe to and unsubscribe from a multicast group defined by a given multicast address. 5- [ true ] ISA is an architecture intended to provide QoS services over IP-based internets. Q2) Choose the correct answer: 1- If the server does not know the location of the members of the multicast group, then one way to assure that the packet is received by all members of the group is to __________ a copy of each packet to each network in the configuration over the least cost route for each network. a) Multicast b) multicast unicast c) broadcast d) unicast 2- __________ occurs when two neighboring routers in different autonomous systems agree to exchange routing information regularly. a) Neighbor acquisition b) Neighbor reachability c) Network acquisition d) Network reachability. 3- A _________ delays packets as necessary so that the packet stream in a given class does not exceed the traffic rate specified in the profile for that class. a) Marker b) dropper c) meter d)shaper 4- Packets are labeled for service handling by means of the 6-bit DS field in the IPv4 header or the IPv6 header. The value of the DS field, referred to as the __________ , is the label used to classify packets for differentiated services. a) Marking b) classifier c) DS codepoint d) DS boundary node 5- Taking advantage of the broadcast nature of a LAN to provide an efficient technique for the exchange of information among multiple hosts and routers, __________ is used by hosts and routers to exchange multicast group membership information over a LAN. a)BGP b) IGMP c) OSPF d) RSVP ☺ Good Luck ☺ ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Discussion QUIZ # 5 Name: Number: Q1) Write TRUE/FALSE: 1- [ false ] A transport protocol can be either connection oriented, such as UDP, or connectionless, such as TCP. 2- [ false ] There is not a need for connection establishment and termination procedures to support connection-oriented service with a reliable network service. 3- [ true ] The credit-based flow control mechanism of TCP was designed to enable a destination to restrict the flow of segments from a source to avoid buffer overflow at the destination. Q2) Choose the correct answer: 1- Connection establishment in TCP always uses a ___________ . a) Handshake b) two-way handshake c) three-way handshake d) four-way handshake 2- _________ provides a means of informing the destination TCP user that significant data is in the upcoming data stream. It is up to the destination user to determine appropriate action. c) Alert signaling d) Data stream signaling a) Attention signaling b) Urgent data signaling 3- The _________ variable represents a particular TS user at the specified host. a) Port b) socket c)host d)transport 4- To begin a connection establishment a TS user is in a __________ state. a) LISTEN b) ESTAB c) CLOSED d)OPEN Q3) Someone posting to comp.protocols.tcp-ip complained about a throughput of 120 kbps on a 256-kbps link with a 128-ms round-trip delay between the United States and Japan, and a throughput of 33 kbps when the link was routed over a satellite. a. What is the utilization over the two links? Assume a 500-ms round-trip delay for the satellite link. For the first case, the utilization is 120/256 = 47%. For the second case (satellite), the utilization is 33/256 = 13%. b. What does the window size appear to be for the two cases? ER = W/RTT W = ER × RTT For the first case W = (120 × 103) × (128 × 10–3) = 15360 bits = 1920 bytes For the second case W = (33 × 103) × (500 × 10–3) = 16500 bits = 2063 bytes c. How big should the window size be for the satellite link? We want ER = (256 × 103) = W/(500 × 10–3) W = 128,000 bits = 16,000 bytes. 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry Computer Networks Questions & Answers – Internet « Prev Next » This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”. 1. What is internet? a) a single network b) a vast collection of different networks c) interconnection of local area networks d) interconnection of wide area networks View Answer Answer: b Explanation: Internet is nothing but an interconnected computer network providing a variety of communication facilities, consisting of a huge amount of small networks using standardized communication protocols. advertisement Ad ISO/IEC 19790 New Standards? ISO/IEC 19790 Conference https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 1/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 2. To join the internet, the computer has to be connected to a _________ a) internet architecture board b) internet society c) internet service provider d) different computer View Answer Answer: c Explanation: The ISPs (Internet Service Providers) are the main agents through which every computer is connected to the internet. They are licensed to allot public IP addresses to its customers in order to connect them to the internet. 3. Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ a) leased line b) digital subscriber line c) digital signal line d) digital leased line View Answer Answer: b Explanation: DSL (Digital Subscriber Line) is the technology designed to use the existing telephone lines to transport high-bandwidth data to service subscribers. DSL was used to allow the early users access to the internet and it provides dedicated, point-to-point, public network access. advertisement https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 2/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 4. ISP exchanges internet traffic between their networks by __________ a) internet exchange point b) subscriber end point c) isp end point d) internet end point View Answer Answer: a Explanation: ISPs exchange internet traffic between their networks by using Internet Exchange Points. ISPs and CDNs are connected to each other at these physical locations are they help them provide better service to their customers. 5. Which of the following protocols is used in the internet? a) HTTP b) DHCP c) DNS d) DNS, HTTP and DNS View Answer Answer: d Explanation: HTTP is used to browse all the websites on the World Wide Web, DHCP is used to allot IPs automatically to the users on the internet, and DNS is used to connect the users to the host servers on the internet based on the Domain Name. advertisement https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 3/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry 6. The size of an IP address in IPv6 is _________ a) 32 bits b) 64 bits c) 128 bits d) 265 bits View Answer Answer: c Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340 undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of possible new addresses. 7. Internet works on _______ a) packet switching b) circuit switching c) both packet switching and circuit switching d) data switching View Answer Answer: a Explanation: Packet switching is the method based on which the internet works. Packet switching features delivery of packets of data between devices over a shared network. advertisement 8. Which one of the following is not an application layer protocol used in internet? a) remote procedure call https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 4/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry b) internet relay chat c) resource reservation protocol d) local procedure call View Answer Answer: c Explanation: Resource reservation protocol is a transport layer protocol used on the internet. It operates over IPv4 and IPv6 and is designed to reserve resources required by the network layer protocols. 9. Which protocol assigns IP address to the client connected in the internet? a) DHCP b) IP c) RPC d) RSVP View Answer Answer: a Explanation: DHCP stands for Domain Host Control Protocol. It is responsible to remotely assign IP address to the clients connected to the internet. The server that performs this fuction is called the DHCP server. advertisement 10. Which one of the following is not used in media access control? a) ethernet b) digital subscriber line https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 5/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry c) fiber distributed data interface d) packet switching View Answer Answer: d Explanation: Packet switching is not really related to media access control as it just features delivery of packets of data between devices over a shared network. Internet is actually based on packet switching. Sanfoundry Global Education & Learning Series – Computer Networks. To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers. Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs! Telegram | Youtube | LinkedIn | Instagram | Facebook | Twitter | Pinterest « Prev - Computer Networks Questions & Answers – Wireless LAN » Next - Computer Networks Questions & Answers – Bluetooth advertisement Recommended Posts: 1. Founder 2. Java Programming Examples on Networking 3. Digital Electronics MCQ (Multiple Choice Questions) https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 6/8 23/06/2021 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Internet - Computer Networks Questions & Answers - Sanfoundry Information Science Questions and Answers Electronics & Communication Engineering Questions and Answers Electrical Engineering Questions and Answers IOT MCQ (Multiple Choice Questions) C# Programming Examples on Networking Information Technology Questions and Answers Computer Graphics MCQ (Multiple Choice Questions) Computer Organization and Architecture MCQ (Multiple Choice Questions) Cryptography and Network Security MCQ (Multiple Choice Questions) Bachelor of Computer Applications Questions and Answers Computer Science Questions and Answers Master of Computer Applications Questions and Answers Wireless & Mobile Communications MCQ (Multiple Choice Questions) Neural Networks MCQ (Multiple Choice Questions) Computer Fundamentals MCQ (Multiple Choice Questions) SAN MCQ (Multiple Choice Questions) Computer Networks Questions & Answers – IPv4 advertisement Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 7/8 23/06/2021 Internet - Computer Networks Questions & Answers - Sanfoundry Subscribe Sanfoundry Newsletter and Posts Name* Email* Subscribe About | Certifications | Internships | Jobs | Privacy Policy | Terms | Copyright | Contact © 2011-2021 Sanfoundry. All Rights Reserved. https://www.sanfoundry.com/computer-networks-questions-answers-internet/ 8/8 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions Study Computer Network - Questions Terms in this set (59) T1. What are the installation options in Windows? - Server with Desktop Experience - Server Core - Nano Server A collection of user and computer accounts and T1. What is the domain? additional related objects, centrally managed by the administrator. - A kind of database that stores information about users and network resources. T1. What is a directory service? - Has a hierarchical structure. - In Microsoft Windows environment, domain are implemented by directory services of the Active Directory (AD) name. - Local user accounts (stored and managed in the T1. What are the types of user local account database (SAM)) accounts? - Domain user accounts (stored and managed by Active Directory) - L (local) T1. What are the scopes in - DL (domain local) groups? - G (global) - U (universal) https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 1/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions It is a collection of computers and devices Study T2. What is a computer interconnected by communications channels that network? facilitate communications among users and allows users to share resources. T2. What are the network - ISO/OSI reference models? - TCP/IP T2. What are the transport - TCP protocols used on the - UDP Internet? ISO/OSI model: 1. Physical 2. Data Link 3. Network 4. Transport T2. How is the ISO/OSI model divided compared to the TCP/IP model? 5. Session 6. Presentation 7. Application TCP/IP model: 1. (1, 2) Network Access 2. (3) Internet 3. (4) Transport 4. (5, 6, 7) Application - LAN: Local Area Network T2. What types (or scales) of - WAN: Wide Area Network networks are there? - MAN: Metropolitan Area Network - SAN: Storage Area Network https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 2/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions - Bus Study - Ring T2. What types of physical network topologies are there? - Star - Extended Star - Hierarchical - Mesh - Circuit switching T3. What switching types are there? - Packet switching --- connection-oriented or Virtual Circuit Switched Networks --- connectionless Networks Upgrade to remove ads T3. What layers can LAN switches operate at? Only ₪11.67/month - Layer 2 - Layer 2 with Layer 3 features - Multilayer https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 3/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet T3. What types of memory- Questions - Port based memory Computer Network buffering are there? Study - Shared memory - Store and forward T3. What are the switching methods? - Cut-through --- Fast-forward --- Fragment-free - Adaptive cut-through T4. How many bits and octets - IP v4: 32 bits, 4 octets are in IP v4 and IP v6? - IP v6: 128 bits, 16 octets T4. The header of IPv6 is - 64-bit processing (32b in IPv4) optimized for _____ - fixed size. IPv6 header size is 40B The header has a _____ - simplified IPv6 header is _____ - 128 bits (IPv4 address is 32 bits long.) An IPv6 address has a length of _____ T4. What are the types of addresses? - Unicast - Multicast - Anycast https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 4/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions - Multiplexing: only packets Study - Syntactic transparency - Universal connectivity - Immediate delivery - End-to-End principles - Loose semantics - Subnet heterogeneity T4. What are the principles of New Internet Architecture (NIA)? - Common bearer service - Connectionless network mechanism - Global addressing - Protocol layering - Distributed control - Global routing computation - Regions - Mobility principles - Network security - Network resource allocation - Minimal dependency T5. What is routing? Routing is the act of moving information across an internetwork from a source to a destination. Switching vs Routing T5. What is the differences between switching and routing? Layer 2 vs Layer 3 MAC addresses vs IP addresses Faster vs Slower Forwards broadcasts vs Block broadcast Lower security vs Higher security - Unicast (one to one) T5. What are the routing - Broadcast (one to all) schemes? - Multicast (one to many) - Anycast (one to any) https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 5/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Study Computer Network - Questions For metric calculated as the sum of metric valuess T5. What is the metric in packet transmission? T6. Routing is the process of ___ Routing algorithms are run on ___ between nodes, the best path from S(ource) do D(estination) is SACD with the metric value equal to 3. selecting paths in a network along which to send network traffic. the routers Routable (routed) protocols: T6. Which ones are the Routable (routed) protocols and the Non-routable protocols? IP IPX/SPX Apple Talk Non-routable protocols: NetBEUI It is the manual editing entries in the routing table by the administrator. T6. What is static routing? It is the use of routing algorithms and cooperation What is the dynamic routing? of routers. Dynamic routing is a better solution for complex networks and networks with frequently changing values of their parameters. https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 6/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Study a Computer Network - Questions "An Autonomous System is a set of routers under single technical administration, using an interior gateway protocol and common metrics to route T6. What is an Autonomous packets within the AS, and using an exterior System? gateway protocol to route packets to other ASes." Each Autonomous System is identified by a 16 bit number. T6. What are the differences between Link-State (LS) versus Distance Vector (DV) Protocols? T7. What are the mandatory IP protocol parameters? T7. What are the types of Configuration of IP addresses? T7. What are the basic components of DHCP? T7. What are the mandatory DHCP scope parameters? LS converge more quickly. LS are less prone to rooting loops. DV require less CPU power and memory. LS are more scalable than DV. DV are cheaper in implementation than LS - IP address - Mask - Lease time (for DHCP) - Static configuration (by the network administrator) - Dynamic configuration (by Dynamic Host Configuration Protocol) - DHCP Server - DHCP Client - DHCP Relay Agent - Network IP address range - Subnet mask - Lease duration A relay agent is a device (a computer or router) T7. What is a relay agent? which helps transfer broadacst DHCP messages from DHCP client to remote servers. https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 7/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Study Computer Network - Questions 16 characters. The first 15 characters is used as the T8. NetBIOS name consists of ___ host name and the 16th character is used for service identification on the host. The Domain Name System (DNS) is a hierarchical, T8. What is DNS? distributed database that contains mappings of DNS domain names to various types of data, such as Internet Protocol (IP) addresses. - recursive T8. There are two types of - iterative queries: Types of DNS servers answer: - An authoritative answer - A non-authoritative answer T8. Tools for DNS troubleshooting T9. What is the operating system? - ping - nslookup - dig The operating system is software for managing computer hardware which creates application runtime environment. MS Windows Server working as a domain controller: - Administrators - Server Operators T9. Who can share files? A member server or stand-alone with Windows Server: - Administrators - Power Users https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 8/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Study Computer Network - Questions They are services which provide information about T9. What are Directory Services? T9. What is an Active Directory? account, resources, policies, rights, permissions, etc. in an enterprise or organization. Active Directory (AD) is a directory service implemented in the MS Windows Server family. T10. Where are Firewalls usually Separating the internal network (LAN) from external placed? networks (WAN). - Generic matches T10. What are the matches - Implicit matches types in firewalls? - Explicit matches - Unclean matches T11. What are the Remote access clients? - VPN Client - Wireless (or Mobile) Client - Dial-up Clien Internet Protocol Security (IPsec) is a protocol suite T11. What is IPSec? for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. "Virtualization is a framework or methodology of dividing the resources of a computer into multiple execution environments, by applying one or more T12. What is virtualization? concepts or technologies such as hardware and software partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others." https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 9/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions - Problems with addressing Study - Problem with network connectivity (including T13. What are the typical network problems? routing) - Problem with network services --- DCHP --- DNS - ifconfig - ping T13. What are the Tools and programs for network monitoring and troubleshooting? - traceroute - route - nslookup - dig - tcpdump - wireshark - nmap/zenmap T14. A stream of packets from a flow source to a destination is called a ___ T14. The needs of each flow - reliability can be characterized by four - delay primary parameters: - jitter - bandwidth Together these determine the ___ QoS (Quality of Service) the flow requires https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 10/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions - Overprovisioning Study - Buffering - Traffic Shaping T14. Techniques for Achieving Good Quality of Service Think of them - The Leaky Bucket Algorithm - The Token Bucket Algorithm - Resource Reservation - Admission Control - Proportional Routing - Packet Scheduling a computer networking architecture that T14. Differentiated Services or DiffServ is __ specifies a simple, scalable and coarse-grained mechanism for classifying, managing network traffic and providing Quality of Service (QoS) guarantees WLAN Systems - radio systems - narrowband systems T15. What is the WLAN - spread spectrum systems Classification? - direct encoding - frequency hopping - optical systems (infrared) WLAN - Wireless LAN T15. The main differences Foto between the WLAN and LAN T15. What are the WLAN - Wireless Network Interface Cards (NIC) Components? - Wireless Access Points https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 11/12 23/06/2021 Computer Network - Questions Flashcards | Quizlet Computer Network - Questions a method of transmitting information from one Study T15. Fiber-optic communication place to another by sending pulses of light through is ___ an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. T1. What is the Active Directory physical structure? T1. A simple description of the - Site - Domain Controller (DC) - WAN Links a file; if something is not a file, it is a process." UNIX system, also applicable to Linux, is this: "On a UNIX system, everything is ___ The syntax is the actual structure--everything from What is the difference between syntax and semantics in programming languages? variable names to semi-colons. The syntax is the structure or form of expressions, statements, and program units but Semantics is the meaning of those expressions, statements, and program units. Semantics follows directly from syntax. https://quizlet.com/ie/434189658/computer-network-questions-flash-cards/ 12/12 23/06/2021 Computer Network Ch6 Flashcards | Quizlet Home / Other / Computer Skills / Cisco Computer Network Ch6 Study Computer Network Ch6 Terms in this set (20) You want to implement a DHCP mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this? What Layer 4 protocol with its TCP, 23 default port should be used for a Telnet connection? What layer in the IP stack is Host-to-Host equivalent to the Transport layer of the OSI model? The OSI model has seven Application layers and the DoD has four. At which layer does SMTP works in both models? Which of the following services SNMP, SMTP, HTTP, & FTP use TCP? Which of the following It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast & It describe the DHCP Discover uses UDP as the Transport layer protocol. message? https://quizlet.com/414710203/computer-network-ch6-flash-cards/ 1/4 23/06/2021 What protocol is used to Ch6 find Computer Network Computer Network Ch6 Flashcards | Quizlet ARP Study the hardware address of a local device? You need to make sure that the NTP time is consistent across all your network devices. What protocol do you need to run on your network? Which of the following services SNMP, DHCP, TFTP use UDP? Which of the following SMTP protocols is used by clients to send emails? Which of the following allows a They use different port numbers. server to distinguish among different simultaneous requests from the same host? You need to have secure 443 communications using HTTPS. What port number is used by default? https://quizlet.com/414710203/computer-network-ch6-flash-cards/ 2/4 23/06/2021 Computer Network Ch6 Flashcards | Quizlet Computer Network Ch6 Study Upgrade to remove ads You need to log in to a Unix Only ₪11.67/month SSH server across a network that is not secure. Which of the following protocols will allow you to remotely administer this server securely? Which of the following SNMP protocols can use TCP and UDP, permit authentication and secures polling of network devices, and allow for automated alerts and reports on network devices? You need to have a connection RDP to remotely run applications that are installed only on your desktop computer at your office. Which protocol will provide a GUI interface to your work computer? You need to transfer files FTP between two hosts. Which protocol can you use? https://quizlet.com/414710203/computer-network-ch6-flash-cards/ 3/4 23/06/2021 Which of the following TCP/IP Computer Network Ch6 Computer Network Ch6 Flashcards | Quizlet Telnet, FTP, TFTP Study protocols are used at the Application layer of the OSI model? Which statements are true regarding ICMP packets? If a client can ping a website They can provide hosts with information about network problems & They are encapsulated within IP datagrams. 53 by IP address but not by hostname, or FQDN, which of the following port numbers should be checked for resolving the problem? Which of the following uses DNS both TCP and UDP? https://quizlet.com/414710203/computer-network-ch6-flash-cards/ 4/4 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Home / Other / Computer Skills / Cisco Computer TIa Network+ Chapter 4 Study Computer TIa Network+ Chapter 4 Terms in this set (42) Telecommunications Industry Association/ Electronic Industries Alliance - Also known as structured cabling TIA/EIA's joint 568 Commercial Building Wiring Standard Describes the best way to install networking media to maximize performance and minimize upkeep Apply no matter what type of media, transmission technology, or networking speeds are involved Based on hierarchical design and assumes a network is based on the start topology the physical point at which the public network of a telecommunications company (i.e., a phone or cable Demarc company) ends and the private network of a customer begins - this is usually where the cable physically enters a building. Location where an incoming network interface Entrance Facility enters a building and connects with the building's backbone cabling. Main distribution frame or Main cross connect is where the first point of interconnection between an MDF organizations LAN or WAN and a service providers facility. MDF contains the demarc. Usually the main servers are housed here https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 1/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Study Distribution frame - A junction point Computer TIa Network+ ChapterIntermediate 4 between the MDF and end user equipment. At east IDF one IDF per floor. But many companies have several data closets per floor to better manage the data feed. Horizontal wiring Wiring that connects workstations to the closest data closet. Usually wired through a plenum. Unshielded Twisted Pair - a type of copper-based UTP cable that consists of one or more insulated twisted wire pairs encased in a plastic sheath. Shielded twisted pair - a type of copper-based STP cable containing twisted wire pairs that are not only individually insulted but also surrounded by a shielding of metallic substance such as foil. Vertical cross connect Runs between a building's floors. A relatively short cable with connectors on both Patch cable ends to connect NICs in workstations, printers, and other network devices to the data closet. Device Management Establish a good naming convention Mounting for hardware or network equipment to Rack systems optimize the square footage in equipment rooms. Keep care of airflow in rack rooms. Hot/cold aisle layout. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 2/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Computer TIa Network+ Chapter 4 Upgrade to remove ads Study Only ₪11.67/month Network Attached Storage - A form of fault tolerance in a network, which is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network. Basically a server dedicated to data NAS sharing. NAS device cannot communicate directly with clients Clients go through a file server, which communicates with the NAS device Techniques that allow data storage or other Fault tolerance operations to continue in the event of a failure or fault of one of its components. Ex. Storing data on multiple devices in the case one fails. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 3/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Area Network - A SAN is a network of Study Computer TIa Network+ ChapterStorage 4 storage devices that communicate directly with each other and with other networks Uses a type of architecture that is similar to mesh topology, which is very fault-tolerant SANS use one of two types of Transport layer protocols: Fibre Channel (FC) iSCSI SANs A SAN can be installed in a location separate from the LAN it serves SANs are highly scalable and have: A very high fault tolerance Massive storage capabilities Fast data access SANs are best suited to environments with huge quantities of data that must always be quickly available Fibre Channel - A transport layer protocol used on fiber-optic media instead of TCP or UDP. Fibre Channel connects devices within the SAN and also FC connects the SAN to other networks.The disadvantage to SAN is that its expensive and requires training for IT personnel to support it. But it is super fast. Internet SCSI - pronounced "i scuzzy" - A transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. iSCSI iSCI is relatively cheap over Fibre Channel and it can be run with established Ethernet Lan by using iSCI software on network clients and servers. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 4/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Studya Computer TIa Network+ ChapterA 4medium for the transfer of electrical power over Electric Circuit closed loop. Direct Current Flows at a steady rate in only one direction. Alternating Current Continually switches direction on the circuit. Things that change the form of electrical energy in some way. There are 4: Power converters inverter rectifier transformer voltage regulator Inverter Converts DC to AC. A generator might contain an inverter. Converts AC to DC. All computers require the Rectifier constant flow of electricity that DC power provides. The power supply in a laptop or desktop comp contains a rectifier. Transformer Voltage Regulator Changes the voltage of AC. Maintains a constant voltage level for either AC or DC power. Surge - Momentary increase in voltage. Noise - Fluctuation in voltage caused by other Power Flaws devices or EMI brownout - A momentary decrease in voltage known as a sag. blackout - A complete power loss. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 5/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Power Supply - a battery-operated Study Computer TIa Network+ ChapterUninterruptible 4 power source directly attached to devices and to a power supply UPS Prevents undesired fluctuations of power from harming the device or interrupting its services There are two types: Standby and Online This provides continuous voltage by switching Standby UPS instantaneously to the battery when it detects a loss of power from the wall outlet. Uses the AC power directly from the wall to Online UPS continuously charge its battery while providing power to a network device through its battery. A server always relies on a UPS in this manner. Volt-Ampere (VA) is the product of the voltage and current measured in amps of electricity on a line. To see how many VA's your device needs 1.4 voltamps = 1 Watt. A computer with 200W power supple Power needed will require a UPS of at least 280 VA to keep the CPU running. Amount of time Line conditioning Cost Provides a backup power source and can be Generator powered by diesel, liquid propane gas, natural gas, or steam. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 6/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Interface Card contains a transceiver that Study Computer TIa Network+ ChapterNetwork 4 transmits and receives data signals over the network NIC media. The NIC belongs to the physical layer and data link layer of the OSI model. NICs do not analyze information from layers 3 through 7. Connection type (Ethernet or Wifi) Maximum network transmission speed (100 Mbps vs 1 Gbps) Connector interfaces (RJ-45 vs SC) NIC Chharacteristics Number of connector interfaces, or ports Manufacturer Support for enhanced features, such as PoE+, buffering, or traffic management Method of interfacing with the computer's motherboard and interface standards 3 NIC interface to motherboard methods NIC installation Integrated into the motherboard Installed in an expansion slot on the motherboard Installed as a peripheral device 2 step process. Install hardware, then install device driver (aka software). https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 7/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Study also called duplex - signals are free to Computer TIa Network+ ChapterFull-duplex, 4 travel in both directions over a medium simultaneously Half-duplex - signals may travel in both directions over a medium but in only one direction at a time Simplex - signals may travel in only one direction Sometimes called one-way or unidirectional NIC Transmission Types Many network devices allow you to specify whether the device should use half- or full-duplex Modern NICs use full-duplex by default If you specify a type that is not supported you get a speed and duplex mismatch and get failed transmissions. Allows the NIC to select the best link speed and duplex that is also supported by the neighboring Auto Negotiation device Using UNIX or Linux, the ethtool utility allows you to view and change NIC settings Ethernet is a Layer 2 standard that: Is flexible Ethernet Frames Capable of running on a variety of network media Offers excellent throughput at a reasonable cost Ethernet II is the current Ethernet standard https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 8/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet Study Computer TIa Network+ ChapterHub 4 - Inefficient and outdated networking device that has been replaced by switches. CSMA/CD and Hubs CSMA/CD (Carrier Sense Multiple Access with Collision Detection) - The media access control (MAC) method used by nodes for arbitration on an old network. Taking turns to get access to the network. TX = Transmit. RX = Receieve. Green = Good. Yellow = One or the other. Red = Bad. Test with loopback plus (plugs into port and tests cable for connectivity) Troubleshooting NIC Update device drivers using device manager. Use configuration utilities provided by the NICs manufacturer Check the TCP/IP for the NIC's interface by pinging the loopback address 127.0.0.1 if the ping fails the settings are configured wrong. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 9/10 23/06/2021 Computer TIa Network+ Chapter 4 Flashcards | Quizlet up-to-date and detailed documentationStudy of Computer TIa Network+ ChapterHaving 4 your network is essential to good troubleshooting Network diagrams - graphical representations of a network's devices and connections May show physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission media Network mapping - the process of discovering and identifying the devices on a network Building documentation To adequately manage a network, record the following: Network diagrams Physical topology Access methods (ethernet? wifi? etc) Protocols Devices Operating systems Applications Configurations Wiring Schematic A graphical representation of a networks wired infrastructure. https://quizlet.com/157549924/computer-tia-network-chapter-4-flash-cards/ 10/10 23/06/2021 Computer TIa Network+ Chapter 5 Flashcards | Quizlet Computer TIa Network+ Chapter 5 Terms in this set (49) Electromagnetic waves in the air or in copper wire. Analog Signaling They vary infinitely and continuously Appear as a wavy line when graphed over time Analog signals are characterized by four properties: Amplitude Measure of strength at given point in time Frequency Number of times amplitude cycles over fixed time Analog properties Wavelength Distance between one peak and the next Phase Progress of wave over time compared to a fixed point Digital Signaling Composed of pulses of precise positive voltages and zero voltages. It's either on or off. Computer TIa Network+ Chapter 5 https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/ 1/4 23/06/2021 Computer TIa Network+ Chapter 5 Flashcards | Quizlet Data relies on digital transmission Network connection may handle only analog signals Modem Accomplishes this translation Data modulation Modulator/demodulater Data modulation Technology modifying analog signals into digital signals and vice versa Make analog signals suitable for carrying data over a communication path FM Frequency modulation radio - The data must travel along a particular frequency. Amplitude modulation - The amplitude of the carrier AM signal is modified by the application of the data signal. Carrier wave Combined with another analog signal Produces unique signal Transmitted from one node to another Carrier Wave (Standard) Preset properties Purpose: convey information Information wave (data wave) Added to carrier wave Modifies one carrier wave property Baseband Transmission that are carried on a single channel with no other Computer TIa Network+ Chapter 5 transmission sharing the media. https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/ 2/4 23/06/2021 Computer TIa Network+ Chapter 5 Flashcards | Quizlet Technologies in which multiple transmissions share a Broadband single media. Cable TV and cable Internet share the same coaxial cable and therefore are examples of broadband. A form of transmission that allows multiple signal to travel simultaneously over one medium. - Subchannels Multiplexing Logical multiple smaller channels - Multiplexer (mux) Combines many channel signals Required at the transmitting end of the channel - Demultiplexer (demux) Separates the combined signals Time Division Multiplexing - Divides channel into TDM multiple time intervals. A time slot 1, B time slot 2, C time slot 3. etc. Transmitter assigns slots to nodes Statistical Multiplexing According to priority, need More efficient than TDM Frequency Division Multiplexing - Unique frequency FDM band for each communications subchannel Cellular telephone transmission DSL Internet access Wavelength Division Multiplexing - One fiber-optic connection WDM Carries multiple light signals simultaneously Can transmit as many as 20 million telephone conversations at on time. Computer TIa Network+ Chapter 5 https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/ 3/4 23/06/2021 Computer TIa Network+ Chapter 5 Flashcards | Quizlet Dense Wavelength Division Multiplexing - Used on most modern fiber-optic networks DWDM Extraordinary capacity Typically used on high-bandwidth or long-distance WAN links Uses more wavelengths for signaling https://quizlet.com/157600050/computer-tia-network-chapter-5-flash-cards/ 4/4 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Computer TIa Network+ Chapter 6 Study Computer TIa Network+ Chapter 6 Terms in this set (49) Wireless Local Area Networks. Networks that transmit signals through the air via radio frequency (RF) waves WLANS Wired and wireless signals share many similarities Use of the same Layer 3 and higher protocols The nature of the atmosphere makes wireless transmission different from wired transmission The wireless spectrum is a continuum of electromagnetic waves used for data/voice communication Arranged by frequencies Wireless Spectrum Lowest to highest Spans 9 KHz and 300 GHz Wireless services associated with one area FCC oversees United States frequencies ITU oversees international frequencies Air signals propagate across borders FCC Federal Communications Commision ITU International Telecommunication Union https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 1/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet pattern Computer TIa Network+ Chapter-Radiation 6 Study Relative strength over three-dimensional area Of all electromagnetic energy that antenna sends, receives -Unidirectional (directional antenna) Antennas Issues wireless signals along single direction -Omnidirectional antenna Issues, receives wireless signals Equal strength, clarity in all directions - Range Reachable geographical area Line of Sight When obstacles are in a signal's way, the signal may: Pass through them LOS/Signal Propogation Be absorbed into them Be subject to three phenomena Reflection: bounce back to source Diffraction: splits into secondary waves Scattering: diffusion in multiple different directions - Fading Variation in signal strength as a result of some of the electromagnetic energy scattered, reflected, or diffracted Multipath signaling is a cause of fading Signal Degregation - Goodput is the throughput experience at the application level Some Web sites, called speed test sites, can measure your upload and download speeds To see how your connection's throughput is affecting your good put https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 2/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Study networks relied on these frequencies for Computer TIa Network+ ChapterWireless 6 2.4 GHz band years. One way to guard against losing connectivity when "a phone picks up" is by having two different channels within the 2.5 GHz Band. Most wireless LANs use this frequency now. Which 5 GHz Band comprises of for frequency bands: 5.1, 5.3, 5.4, 5.8 GHz. Wireless Personal Area Network. WPANs rarely exceed a few meters geographically and usually only contain a few personal devices WPAN Three common wireless technologies used to connect PAN devices are: Bluetooth Infrared (IR) Near-field communication (NFC) Bluetooth is named after a medieval king of Denmark named Harald Bluetooth who fought to merge several Danish tribes under a single government. Bluetooth unites separate entities. Operates in the radio band of 2.4 GHz to 2.485 GHz Bluetooth Hops between frequencies within that band Called frequency hopping Requires close proximity to form a connection Before two Bluetooth devices can connect, they must be paired Bluejacking - a connection is used to send unsolicited data Bluesnarfing - a connection is used to download data without permission https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 3/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Computer TIa Network+ ChapterNear 6 field communication. Study A form of radio communication that transfers data wirelessly over very short distances NFC Signal can be transmitted one way by an NFC tag, or smart tag When employees need access to a secure area The NFC tag collects power from the smartphone or other device by magnetic induction Upgrade to remove ads Only ₪11.67/month ad hoc = smaller number of nodes. Wifi WLAN Architecture In ad hoc WLAN wireless nodes transmit directly to each other via wireless NICs without an intervening connectivity device. https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 4/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet access point or base station is a deviceStudy Computer TIa Network+ ChapterWireless 6 that accepts wireless signals from multiple nodes WAP and re transmits them to the rest of the network. As such they can be called wireless routers or gateways. Wireless mesh network - May include several access WMN points (APs) Provides more fault-tolerant network access to clients Wireless technology standards Most popular: developed by IEEE's 802.11 committee Notable Wi-Fi standards 802.11 WLAN Standards 802.11b, 802.11a, 802.11g, 802.11n, 802.11ac All standards use half-duplex signaling Standards vary at the Physical layer 802.11n and later modify the way frames are used at the MAC sublayer Wireless station can either transmit or receive but Half duplex signaling cannot do both simultaneously unless there is more than one transceiver installed. 802.11b 2.4ghz into 22 Mhz channels 5-Ghz band so less congested. Requires more 802.11a power to transmit; therefore, requires more access points of 802.11a so this is rarely preferred. Supposed to be as affordable as 802.11b with 802.11g increased maximum theoretical throughput and was still compatible with 802.11b https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 5/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet compatible and uses both the 2.4 GHz Study Computer TIa Network+ ChapterBackwards 6 802.11n and 5GHz bands. It also boasts a maximum throughput of 600 Mbps. The newest standard which operates on the 5 GHz band and exceeds benchmarks set by earlier 802.11ac standards. This is the first Wi-Fi standard to approach gigabit Ethernet capabilities. These can handle multiple transmissions at one time over the same frequency spectrum. Carrier Sense Multiple Access with Collision Avoidance. Minimizes collision potential CSMA/CA Uses ACK packets to verify every transmission Requires more overhead than 802.3 Real throughput less than theoretical maximum Request to Send/Clear to Send. Ensures packets not RTS/CTS inhibited by other transmissions Efficient for large transmission packets Further decreases overall 802.11 efficiency Packet exchanged between computer and access point in order to gain Internet access Another function of the MAC sublayer - Scanning Association Surveys surroundings for access point Active scanning transmits special frame Known as a probe - Passive scanning listens for special signal Known as a beacon fame SSID Service Set Identifier, A unique character string used to identify an access point. https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 6/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Computer TIa Network+ ChapterBasic 6 service set. Group of stations sharing an BSS Study access point BSSID (basic service set identifier) Group of stations identifier Extended service set Group of access points connected to same LAN Share ESSID (extended service set identifier) Allows roaming ESS Station moving from one BSS to another without losing connectivity When several access points are detected Select strongest signal, lowest error rate Poses security risk Could connect to a powerful, rogue access point https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 7/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet to an Computer TIa Network+ ChapterTypes 6 of overhead required to manage access Study 802.11 network ACKs, probes, and beacons 802.11 specifies MAC sublayer frame type Multiple frame type groups Management: association and reassociation Control: medium access and data delivery ACK and RTS/CTS frames Data: carry data sent between stations IEEE 802.11 Frames 802.11 data frame overhead Four address fields Source address, transmitter address, receiver address, and destination address Sequence Control field How large packet fragmented Frame Control field Wi-Fi share MAC sublayer characteristics Wi-Fi differ in modulation methods, frequency usage, and range Multiple input-multiple output - Multiple access point antennas may issue signal to one or more MIMO receivers Increases network's throughput, access point's range Multiuser MIMO - Newer technology than MIMO that allows multiple antennas to service multiple MU-MIMO clients simultaneously Reduces congestion and contributes to faster data transmission Available with WAVE 2 802.11ac products https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 8/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Study Computer TIa Network+ ChapterTwo 6 adjacent 20-MHz channels bonded to make 40-MHz channel Channel bonding Doubles the bandwidth available in single 20-MHz channel Combine multiple frames into one larger frame Two techniques: Frame aggregation Aggregated Mac Service Data Unit (A-MSDU) Aggregated Mac Protocol Data Unit (A-MPDU) Advantage: reduces overhead One access point Often combined with switching, routing functions Connects wireless clients to LAN Acts as Internet gateway Access point WLAN placement considerations Typical distances between access point and client Do not exceed the distance restriction for the 802.11 standard your access point is using Obstacles Determining WLAN design Type and number of, between access point and clients After site survey has identified and verified the quantity and location of access points, you are ready to install them Must belong to same ESS and share an ESSID Enterprise-wide WLAN design considerations How wireless LAN portions will integrate with wired portions https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 9/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet CDComputer TIa Network+ ChapterEach 6 AP comes with an installation program onStudy ROM or DVD Guides through setup process Variables set during installation Configuring a wireless router Administrator password SSID Whether or not DHCP is used Whether or not the SSID is broadcast Security options When configuring clients for wireless access to a On-boarding network in an enterprise environment technicians might need to install a specific program or app. Off-boarding This involves removing programs that gave device special permissions on a network. The process of comparing and matching a client's Authentication credentials with credentials in a client database to enable the client to log on to the network. MAC filtering Encryption Prevents the AP from authenticating any device whose MAC address is not listed Use of an algorithm to scramble data Wi-Fi Protected Access. WPA - Assigns every transmission its own key WPA/WPA2 dynamically. WPA2 - Replacement for WPA A stronger encryption protocol https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 10/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet and Computer TIa Network+ ChapterWired 6 Equivalent Privacy. WEP is easily crackedStudy WEP therefore should be never used. A character string is associated with the access point. A hacker searches for unprotected wireless War driving networks by driving around with a laptop configured to receive and capture wireless data transmissions. A rogue access point can be configured to sound Evil twin like a legitimate sounding SSID to have users connect to. WPA cracking involves the interception of network WPA attacks keys communicated between stations and access points. Wifi Protected Setup. A pin can be brute force WPS attack attacked which means trying many combinations to find the correct one. Two types of software tools: - Wireless analyzer (Wi-Fi analyzer) Can evaluate Wi-Fi network availability, optimize Wi- Troubleshooting Wireless LAN Fi signal settings, and help identify Wi-Fi security threats - Spectrum analyzer Can assess the quality of the wireless signal https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 11/12 23/06/2021 Computer TIa Network+ Chapter 6 Flashcards | Quizlet Study transmitting access points, stations, and Computer TIa Network+ Chapter- Identify 6 channels over which they are communicating - Measure signal strength from an AP - Indicate the effects of attenuation, signal loss, and noise List of capabilities common with these tools - Interpret signal strength information - Ensure proper association and reassociation between APs - Capture and interpret traffic - Measure throughput and assess data transmission errors - Analyze characteristics of each channel SSID mismatch Incorrect encryption Incorrect or overlapping channels or frequencies Mismatched standards Wireless configuration pitfalls to avoid Incorrect antenna placement Interference Simultaneous wired and wireless connections Problems with firmware updates Unoptimized access point power levels Inappropriate antenna type Client saturation https://quizlet.com/157638140/computer-tia-network-chapter-6-flash-cards/ 12/12 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Home / Math / Geometry / Topology Network+ Chapter 1 Computer Network Fundamentals Study Network+ Chapter 1 Computer Network Fundamentals Terms in this set (67) converged network a network transporting multiple types of traffic (for example, voice, video, and data) Client the device an end user uses to access a network Server the device which serves up resources to a network Hub port an older technology that interconnects network components a receptacle to which a network cable connects interconnects network components, but does not Switch simply take traffic in on one port and blast that traffic out all other ports host any device that transmits or receives traffic on a network considered to be a Layer 3 device, which means Router that it makes its forwarding decisions based on logical network addresses. https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 1/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Term to describe the physical component usedStudy to Network+ Chapter 1 Computer Network Fundamentals Media WAN link interconnect devices the link that interconnects two or more networks Local-area network LAN Wide-area network WAN Campus-area network CAN Metropolitan-area network MAN Personal-area network PAN LAN interconnects network components within a local area (for example, within a building). Sample ______ Topology LAN WAN interconnects network components that are geographically separated Sample ______ Topology WAN https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 2/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Smaller scale WAN interconnecting close proximity Study Network+ Chapter 1 Computer Network Fundamentals CAN MAN PAN logical topology physical topology buildings. Might be found at a university, industrial park or business park. Smaller scale WAN interconnection location throughout a metropolitan area Network smaller than a LAN. Range typically limited to a few meters The actual traffic flow on a network determines this The way the network components are physically connected determines this Topology which typically uses a cable running through the area requiring connectivity. Devices Bus Topology that need to connect to the network then tap into this nearby cable. Early Ethernet networks commonly relied on this type of topology. Bus Topology Bus Topology Topology Benefits: Less cable, less expensive, easy to install Topology Characteristics: One cable per segment, Bus Topology terminator at each end, Popular in early ethernet networks, components tap directly into the cables https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 3/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Topology Drawbacks: Single point of failure, Network+ Chapter 1 Computer Network Fundamentals Bus Topology Study difficult troubleshooting, device addition can cause outage, error on one device can impact other devices, not scalable Topology where traffic flows in a circular fashion around a closed network loop. Typically, sends Ring Topology data, in a single direction, to each connected device in turn, until the intended destination receives the data. Ring Topology Token Ring and FDDI Fiber Distributed Data Two variants of a ring topology popularized in the 1990s FDDI Interface counter-rotating rings two rings which send data in opposite directions Topology Characteristics: single or dual, a reciever Ring Topology and a transmitter per device, each device repeats the signal Ring Topology Ring Topology Topology Benefits: Easier troubleshooting, Dual: increased fault tolerance Topology Drawbacks: Not as scalable, more cable, Single: break causes an outage https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 4/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Topology with a central point from which all Network+ Chapter 1 Computer Network Fundamentals Star Topology Study attached devices radiate. Most popular topology used today. Star Topology Topology Characteristics: Independent connections Star Topology back to a central device, commonly used with Ethernet technologies. Star Topology Star Topology Topology Benefits: cable break only impacts the connected device, relatively simple troubleshooting Topology Drawbacks: more cable, longer installation time WAN Topology which has a WAN link from each Hub-and-Spoke Topology remote site to the main site. Similar to the star topology used in LANs Hub-and-Spoke Topology Topology Characteristics: each remote site Hub-and-Spoke Topology connects back to the main site via a WAN link, communication between two remote sites travels through the main site https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 5/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Hub-and-Spoke Topology Topology Benefits: Cheaper, easier to scale Network+ Chapter 1 Computer Network Fundamentals Study Topology Drawbacks: Suboptimal routes must be Hub-and-Spoke Topology used between remote sites, hub site is potential single point of failure, lacks redundancy Full-Mesh Topology WAN topology which directly connects every site to every other site Full-Mesh Topology Topology Characteristics: Direct WAN connection to every site, the number of required WAN Full-Mesh Topology connections can be calculated with the formula w = n * ( n - 1) / 2, where w = the number of WAN links and n = the number of sites. Full-Mesh Topology Full-Mesh Topology Partial-Mesh Topology Topology Benefits: Optimal route exists between any two sites, fault tolerant, easy troubleshooting Topology Drawbacks: Difficult and expensive to scale WAN topology which is a hybrid of the hub-andspoke topology and full-mesh topology. Partial-Mesh Topology https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 6/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Topology Characteristics: Selected sites are Network+ Chapter 1 Computer Network Fundamentals Partial-Mesh Topology Study interconnected via direct links, uses fewer links than a full-mesh topology, uses more links than a huband-spoke topology Topology Benefits: Provides optimal routes Partial-Mesh Topology between selected sites with higher intersite traffic volumes, more redundant than a hub-and-spoke Topology Drawbacks: Less fault tolerance than a Partial-Mesh Topology full-mesh topology, more expensive than a huband-spoke topology client/server network a collection of PCs all sharing files located on a centralized server. A collection of interconnected devices (for peer-to-peer network example, PCs) which share their resources with one another. client/server network Network Characteristics: Share a common set of client/server network resources located on one or more dedicated servers, resource sharing via dedicated hardware and network operating systems. client/server network Network Benefits: Can easily scale, simplified administration https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 7/8 23/06/2021 Network+ Chapter 1 Computer Network Fundamentals Flashcards | Quizlet Study Network Drawbacks: More expensive, single point Network+ Chapter 1 Computer Network Fundamentals client/server network of failure peer-to-peer network Network Characteristics: clients share their peer-to-peer network resources with other clients, resource sharing is made available through the clients' OS peer-to-peer network peer-to-peer network Network Benefits: Easy installation, usually cost less Network Drawbacks: Limited scalability, Lower performance https://quizlet.com/155081214/network-chapter-1-computer-network-fundamentals-flash-cards/ 8/8 W4140 Networking Laboratory 1 Midterm Spring 2009 True or False 1. [2] IP addresses can be divided into two parts: network prefix part and the host part. True 2. [2] ICMP Route Redirect packets update the routing table of hosts. False, ICMP Route Redirect packets update the routing cache. 3. [2] ARP can be used to detect and avoid duplicate IP addresses in the subnet. True 4. [2] In OSPF, all Area Border Routers are part of the backbone area. True 5. [2] BGP is a path vector protocol. True 6. [2] If we use the filter ’src host 10.0.1.12 and tcp dst port 80’, tcpdump will show only HTTP packets that are from 10.0.1.12. True 7. [2] Cisco IOS commands are divided into hierarchical modes, and the mode with the least priviledge is the global configuration mode. False, user exec mode has the least priviledge. 2 The Network Administrator Kahn is a network administrator for a small but fast growing company. He has configured the network as shown below. For all the questions below, assume that there are no physical connection problems and that all hosts have the correct default gateway configured. PC1 10.0.1.11/29 PC3 10.0.3.11/24 FE1/1 10.0.2.10/29 FE0/1 10.0.1.10/29 Router 1 FE1/1 10.0.2.20/24 PC2 10.0.1.12/29 FE0/1 10.0.3.20/24 Router 2 PC4 10.0.3.138/16 1. [2] How many subnets did he setup? 3 subnets 2. [3] Kahn used static routes to configure the routing tables. What would the final routing table look like? Draw and fill two-column routing tables for Router 1 and Router 2. 1 W4140 Networking Laboratory Midterm Spring 2009 Table 1: Router 1 Prefix 00001010 00000000 00000001 00001 (10.0.1.8/29) 00001010 00000000 00000010 00001 (10.0.2.8/29) 00001010 00000000 00000011 (10.0.3.0/24) Interface or address FE0/1 FE1/1 10.0.2.20 Table 2: Router 2 Prefix 00001010 00000000 00000011 (10.0.3.0/24) 00001010 00000000 00000010 (10.0.2.0/24) 00001010 00000000 00000001 00001 (10.0.1.8/29) Interface or address FE0/1 FE1/1 10.0.2.10 3. [8] Kahn pings from PC3 to PC1 but it’s not working. He thinks that maybe there is something wrong with the addresses and netmasks he assigned to the hosts and routers. Is his hypothesis correct? If so, how should he fix it? ICMP Echo Request packets have no trouble traveling from PC3 to PC1. The problem is when the ICMP Echo Reply packet travels from PC1 to PC3, specifically the path from Router1 to Router2. Since Router1’s FE1/1 network prefix is 29 bits, the interface assumes that any address that starts with 00001010 00000000 00000010 00001 (29 bits) is within the same subnet. The first 29 bits of Router2’s FE1/1 network address is 00001010 00000000 00000010 00010. The last two bits are different, so Router1 will not think Router2 is in the same subnet. Router1 also doesn’t have any routing information on how to forward packets to this type of address. So the packet is discarded. To fix this problem, Kahn can reconfigure FE1/1’s network prefix to 24 bits. 4. [5] Kahn notices that when PC4 pings Router 1’s FE1/1 interface, PC4 first sends an ARP request packet asking for the MAC address of 10.0.2.10. He thinks that no one should answer since Router 1 is not in the same subnet. But to Kahn’s surprise, Router 2 answers with an ARP reply packet with its own MAC address inside! What is going on? How can Kahn fix Router 2’s behavior? This happens when proxy ARP is configured. Kahn should disabled proxy ARP on Router2. 5. [5] The company is growing fast and Kahn needs to add another subnet to the network. The new subnet needs to support at most 50 hosts. Kahn wants to reduce unused IP addresses in the new subnet. What is the optimal length of network prefix that Kahn should assign to the new subnet? To accomodate 50 hosts in the subnet, we need to have at least 6 bits in the host part of IP address since 26 = 64. Anything shorter will not be able to accomodate 50 hosts. Anything longer will result in waste of addresses. So, the optimal prefix length is 32 − 6 = 26 bits. 3 Count-To-Infinity The count-to-infinity problem is a convergence problem that arises in distance vector protocols such as RIP. 1. [5] What is the main symptom of the count-to-infinity problem in terms of convergence time? Explain how the count-to-infinity problem affects the convergence time. When there is count-to-infinity problem in the network, it takes much longer for routing tables to converge. This is because when count-to-infinity problem appears in the network due to a link failure, routers keep exchanging increasing distance metrics until the distance finally reaches ‘infinity’. 2 W4140 Networking Laboratory Midterm Spring 2009 2. [5] Why does count-to-infinity problem occur in distance vector algorithms? The problem occurs because distance vector algorithms exchange only the distance information with their immediate neighbours. Let’s assume router X must send a packet to router Y to reach subnet S. When the link to subnet S breaks, router Y may calculate a new route to S via X since X has a better metric value to S. This happens because router Y thinks that X can forward a packet to subnet S. It does not know that router X is using router Y to get to subnet S. This forms a routing loop between router X and router Y. Router Y thinks it can reach subnet S via X. Router X thinks it can reach subnet S via Y. Since there is one hop between router X and router Y, they will keep exchanging increasing metric values until it reaches ‘infinity’ where both realize that the link is broken. 3. [8] Name two methods used to avoid the count-to-infinity problem and describe them. Potential answers are: triggered updates, split horizon, hold-down timer, and poisoned reverse. 4 File Transfer Using TCP Vinton wants to send a 292 kilobyte picture from Host A to Host B using TCP. Both hosts are physically connected to the same Ethernet. The Maximum Transmission Unit (MTU) on the Ethernet is 1500 bytes. The IP header is 20 bytes and the TCP header is 20 bytes. Assume that there is no packet loss or corruption within this Ethernet. 1. [2] What is the Maximum Segment Size (MSS) of the hosts? MSS is the size of maximum TCP payload. 1500 − 20 − 20 = 1460 bytes. 2. [3] How many data packets will Host A send to Host B? Each data packet will contain 1460 bytes of data. We need to send 292 kilobytes. 204.8. So 205 packets will be sent. 292∗1024 1460 = 3. [5] Based on your answers above, fill in the sequence numbers and acknowledgement numbers in the ladder diagram. Answer is in the ladder diagram. 4. [5] Which phase of the congestion control algorithm is the ladder diagram showing? Explain your answer. The number of packets sent in one Round Trip Time increases exponentially: that is, the number of packets increase from 1 to 2 to 4. This is because congestion window is increased by 1 MSS whenever an ACK is received. This is the Slow Start phase. 5 Extra Credit [+2] In the real world, Dr. Vinton Cerf and Dr. Robert Kahn are famous for inventing what? TCP/IP 3 W4140 Networking Laboratory Midterm Spring 2009 Host B Host A SEQ : 1 ACK : 1461 SEQ : 1461 SEQ : 2921 ACK : 2921 ACK : 4381 4 23/06/2021 Computer Networks Flashcards | Quizlet Computer Networks Terms in this set (18) Suppose Host A sends Host B The 8-bit protocol field in the IP datagram contains a TCP segment encapsulated in information about which transport layer an IP datagram. When Host B protocol the destination host should pass the receives segment to. the datagram, how does the network layer in Host B know it should pass the segment (that is, the payload of the datagram) to TCP rather than to UDP or to something else? Suppose you purchase a • Typically the wireless router includes a DHCP wireless router and connect it server. DHCP is used to assign IP addresses to to your cable modem. Also the 5 PCs and to the router interface. suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. Also suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. a. How are IP addresses assigned to the five PCs? Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 1/10 23/06/2021 Computer Networks Flashcards | Quizlet Suppose you purchase a • True, the wireless router also uses NAT as it obtains wireless router and connect it only one IP address from the ISP. to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. Also suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. b. [True/False] The wireless router uses NAT. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 2/10 23/06/2021 Computer Networks Flashcards | Quizlet Suppose you purchase a True, the path with the smallest number of links wireless router and connect it between the source and the destination. to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. Also suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. [True/False] If all edges in the graph have the same cost, the least-cost path is also the shortest path. A routing algorithm what all • Link-state (LS) routers have complete • Distance-vector (DV) topology and link cost info is also referred to as [ ] algorithm, and a routing algorithm what each router knows physically-connected neighbors and link costs to neighbor and conducts an iterative process of exchanging neighbor information is also referred to as [ ] algorithm. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 3/10 23/06/2021 Computer Networks Flashcards | Quizlet True, routers are organized into autonomous systems (ASs). Within an AS, all routers run the same intra-AS routing protocol. The problem of [True/False] A hierarchical scale is solved since a router in an AS needs organization of the Internet has only to know about routers within its AS and the made it possible to scale to subnets that attach to the AS. To route across millions of users. ASes, the inter-AS protocol is based on the AS graph and does not take individual routers into account. Is it necessary that every No. Each AS has administrative autonomy for autonomous system uses the routing within an AS. same intra-AS routing algorithm? Why or why not? [True or False] The alternating- False bit protocol is not the same as the GBN and SR protocols with a sender and receiver window size of 1. [True or False] The size of the False TCP rwnd never changes throughout the duration of the connection. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 4/10 23/06/2021 Computer Networks Flashcards | Quizlet ) Suppose, Host A sends Host A continues to send segment with one data packets to Host B. Host B's byte, when B's receive window is zero. receive buffer is 0 (i.e., RecvWindow = 0), and Host B has nothing to send to A. Thus, Host A is blocked and can transmit no more data. How to resolve this? [True or False]: Suppose Host True A is sending Host B a large file over a TCP connection. The number of unacknowledged bytes that A sends cannot exceed the size of the receive buffer. A queued packet in an input queue must wait for ) What is the head of line (HOL) transfer through the fabric because it is blocked by blocking? Be specific. another packet at the head of the line. It occurs at the input port. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 5/10 23/06/2021 Computer Networks Flashcards | Quizlet Upgrade to remove ads ) Suppose there are three Only ₪11.67/month 8 interfaces; 3 forwarding tables routers between a source host and a destination host. Ignoring fragmentation, IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination? Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 6/10 23/06/2021 Computer Networks Flashcards | Quizlet Host A and B are If the second segment arrives before the first communicating over a TCP segment, in the acknowledgement of the first connection, and Host B has arriving already received from A all segment, the acknowledgement number is 127, bytes up indicating that it is still waiting for bytes 127 and through byte 126. Suppose onwards. Host A then sends two segments to Host B back-toback. The first and second segments contain 80 and 40 bytes of data, respectively. In the first segment, the sequence number is 127, the source port number is 302, and the destination port number is 80. Host B sends an acknowledgment whenever it receives a segment from Host A. If the second segment arrives before the first segment, in the acknowledgment of the first arriving segment, what is the acknowledgement number? Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 7/10 23/06/2021 Computer Networks Flashcards | Quizlet Consider sending a 2500-byte The maximum size of data field in each fragment = datagram into a link that has an 480 (because there are 20 bytes IP header). Thus MTU of 500 bytes. Suppose the number of required fragments = ceil((2500 - the original datagram 20)/480) = 6. is stamped with the • Each fragment will have Identification number 422. identification number 422. (i) Each fragment except the last one will be of size How many fragments are 500 bytes (including IP header). The last datagram generated? (ii) What are the will be of size 360 bytes (including IP header). The offset offsets of the 6 fragments will be 0, 60, 120, 180, 240, values in the IP datagram(s) and 300. Each of the first 5 fragments will have generated related to flag = 1; the last fragment will have flag = 0. fragmentation? Show all your work. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 8/10 23/06/2021 Computer Networks Flashcards | Quizlet In TCP (no delay ACK), assume • TCP: that the timeout value is • Host A sends 6 segments in total. They are initially sufficiently long such that 5 sent segments 1, 2, 3, 4, 5 and later re-sent consecutive data segments segments 2. and their corresponding ACKs can be received (if not lost in the channel) by the receiving host (Host B) and the sending host (Host A) respectively. Suppose Host A sends 5 data segments to Host B, and the 2nd segment (sent from A) is lost. In the end, all 5 data segments have been correctly received by Host B. Here, sequence number begins with 1. (a) (i) How many segments has Host A sent in total and (ii) what are their sequence numbers? • TCP: (b) (i) How many ACKs has • Host B sends 5 ACKs. They are 4 ACKS with Host B sent in total and (ii) sequence number 2. There is one ACK with what are their sequence sequence numbers? numbers 6. Note that TCP always send an ACK with expected sequence number. Computer Networks https://quizlet.com/251666863/computer-networks-flash-cards/ 9/10 23/06/2021 Computer Networks Flashcards | Quizlet In the following congestion • When packet dropped (e.g., R2), any "upstream scenario, as the offered load transmission capacity used (e.g., R1) for that packet from B-D approaches infinity, was wasted! the throughput of A-C connection at R2 goes zero. What is the "cost" of congestion in this scenario? https://quizlet.com/251666863/computer-networks-flash-cards/ 10/10 6/23/2021 Home Computer Network MCQ (Multiple Choice Questions) - javatpoint Computer Fundamentals Computer Network Control System Java HTML CSS ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 1/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Computer Network MCQ 1) Which of these is a standard interface for serial data transmission? a. ASCII b. RS232C c. 2 d. Centronics Hide Answer Workspace Answer: (b) RS232C Explanation: The RS232C is a standard interface for serial data transmission that defines the protocol and physical interface for transmitting serial data fairly easily between associated appliances and computers. 2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets? a. Ring b. Local area c. Hierarchical d. Star Hide Answer Workspace Answer: (d) Star Explanation: The star topology is the best network topology for large businesses because it is simple to control and coordinate from the central computer. 3) Which of the following transmission directions listed is not a legitimate channel? a. Simplex ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 2/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint b. Half Duplex c. Full Duplex d. Double Duplex Hide Answer Workspace Answer: (d) Double Duplex Explanation: Double duplex is not a legitimate channel for transmission in computer network. 4) "Parity bits" are used for which of the following purposes? a. Encryption of data b. To transmit faster c. To detect errors d. To identify the user Hide Answer Workspace Answer: (c) To detect errors Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used for error detection for blocks of data. 5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? a. Unshielded twisted pair b. Optical fiber c. Coaxial cable d. Microwave Hide Answer Workspace ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 3/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Answer: (b) Optical fiber Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of data occurs in the form of light rather than the electric current, so this cable provides higher data transfer speed than other cables. 6) A collection of hyperlinked documents on the internet forms the ?.? a. World Wide Web (WWW) b. E-mail system c. Mailing list d. Hypertext markup language Hide Answer Workspace Answer: (a) World Wide Web (WWW) Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on the Internet. 7) The location of a resource on the internet is given by its? a. Protocol b. URL c. E-mail address d. ICQ Hide Answer Workspace Answer: (b) URL Explanation: A URL (Uniform Resource Locator) is a database connection that describes the database's location on a computer network and the retrieval process. A URL is a different form of URI (Uniform Resource Identifier) although the two words are used ⇧ SCROLL TO TOP interchangeably by many people. https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 4/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint 8) The term HTTP stands for? a. Hyper terminal tracing program b. Hypertext tracing protocol c. Hypertext transfer protocol d. Hypertext transfer program Hide Answer Workspace Answer: (c) Hypertext transfer protocol Explanation: The term HTTP stands for Hypertext transfer protocol. 9) A proxy server is used as the computer? a. with external access b. acting as a backup c. performing file handling d. accessing user permissions Hide Answer Workspace Answer: (a) with external access Explanation: A proxy server is a computer that acts as a gateway between a user's computer and the Internet. The proxy server is also called application level gateway. By this the client computer can establish indirect network connection to another network. 10) Which one of the following would breach the integrity of a system? a. Looking the room to prevent theft b. Full access rights for all users c. Fitting the system with an anti-theft device ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 5/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint d. Protecting the device against willful or accidental damage Hide Answer Workspace Answer: (b) Full access rights for all users Explanation: None 11) Which software prevents the external access to a system? a. Firewall b. Gateway c. Router d. Virus checker Hide Answer Workspace Answer: (a) Firewall Explanation: A firewall is a network securing software that prevents unauthorized users and dangerous elements from accessing the network. Software firewall acts as a filter for our network which prevents harmful information. 12) Which one of the following is a valid email address? a. javat@point.com b. gmail.com c. tpoint@.com d. javatpoint@books Hide Answer Workspace Answer: (a) javat@point.com ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 6/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Explanation: A proper email address is a combination of the email prefix and email domain, both in appropriate formats. The domain appears to the right side of the @ symbol and the prefix appears to the left side of the @ symbol. For example, in this email address javat@point.com, "javat" is the prefix, and "point.com" is the domain. 13) Which of the following best describes uploading information? a. Sorting data on a disk drive b. Sending information to a host computer c. Receiving information from a host computer d. Sorting data on a hard drive Hide Answer Workspace Answer: (b) Sending information to a host computer Explanation: None 14) Which one of the following is the most common internet protocol? a. HTML b. NetBEUI c. TCP/IP d. IPX/SPX Hide Answer Workspace Answer: (c) TCP/IP Explanation: TCP/IP is the most common internet protocol because it is the most widely used network protocol. ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 7/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint 15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following? a. Probe ware b. Timeshare c. Shareware d. Public domain Hide Answer Workspace Answer: (d) Public domain Explanation: Public domain software can be modified, distributed or sold by anyone without any attention, but no one can ever own it. 16) The term FTP stands for? a. File transfer program b. File transmission protocol c. File transfer protocol d. File transfer protection Hide Answer Workspace Answer: (c) File transfer protocol Explanation: The term FTP stands for File transfer protocol. 17) At what speed does tele-computed refer? a. Interface speed b. Cycles per second c. Baud rate d. Megabyte load ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 8/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Hide Answer Workspace Answer: (c) Baud rate Explanation: In telecommunication, baud rate is a specific unit of the speed rate. It is one of the significant functions that determine the speed of the communication over the data channel. 18) Which one of the following is not a network topology? a. Star b. Ring c. Bus d. Peer to Peer Hide Answer Workspace Answer: (d) Peer to Peer Explanation: Peer to Peer network is a network to which all computers are used the same resources and rights as other computers. Its network designed primarily for the small local area. 19) The maximum length (in bytes) of an IPv4 datagram is? a. 32 b. 1024 c. 65535 d. 512 Hide Answer Workspace Answer: (c) 65535 Explanation: None ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 9/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint 20) Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)? a. It reports all errors which occur during transmission. b. A redirect message is used when a router notices that a packet seems to have been routed wrongly. c. It informs routers when an incorrect path has been taken. d. The "destination unreachable" type message is used when a router cannot locate the destination. Hide Answer Workspace Answer: (b) A redirect message is used when a router notices that a packet seems to have been routed wrongly. Explanation: None 21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement? a. 255.243.240 b. 255.255.0.0 c. 255.255.0 d. 255.255.255 Hide Answer Workspace Answer: (c) 255.255.255.0 Explanation: This address belongs to class C, so 8 bits are reserved for the host ID. 24 bits are reserved for network ID. 22) When the mail server sends mail to other mail servers it becomes ___ ? ⇧ SCROLL TOP a. SMTPTO client https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 10/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint b. SMTP server c. Peer d. Master Hide Answer Workspace Answer: (a) SMTP client Explanation: The SMTP client is an organization that allows sending emails using the SMTP server. SMTP servers can't send emails to other SMTP servers separately. It is based on client-server architecture. 23) The length of an IPv6 address is? a. 32 bits b. 64 bits c. 128 bits d. 256 bits Hide Answer Workspace Answer: (c) 128 bits Explanation: An IPv6 address is 128 bits long, which has 2^128 address space. 24) Consider the following: 1. Twisted pair cables 2. Microwaves and Satellite Signals 3. Repeaters 4. Analog Transmissions 5. Fiber optics Which of the above is consider as (a) signal transmission medium is data communications? ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 11/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint a. (1) and (5) b. (1) and (2) c. (1) (2) and (5) d. (1) (2) (3) and (5) Hide Answer Workspace Answer: (c) (1) (2) and (5) Explanation: None 25) Which of the following address belongs class A? a. 121.12.12.248 b. 130.12.12.248 c. 128.12.12.248 d. 129.12.12.248 Hide Answer Workspace Answer: (a) 121.12.12.248 Explanation: 121.12.12.248 address belongs the class A because the first octet value of this address lies between 0 and 127. 26) Which of the following is correct IPv4 address? a. 124.201.3.1.52 b. 01.200.128.123 c. 300.142.210.64 d. 10110011.32.16.8 e. 128.64.0.0 Hide Answer ⇧ SCROLL TO TOP Workspace https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 12/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Answer: (e) 128.64.0.0 Explanation: 128.64.0.0 is correct IPv4 address because IPv4 is a standard numbering system that uses four integers from 0 to 255. The IP address is a group of numbers that identify user system on the network. 27) Which of the following IP addresses can be used as (a) loop-back addresses? a. 0.0.0.0 b. 127.0.0.1 c. 255.255.255.255 d. 0.255.255.255 Hide Answer Workspace Answer: (b) 127.0.0.1 Explanation: A loopback address is a special IP address whose IP address is between 127.0.0.1 to 127.255.255.255. It is reserved for loopback. It doesn't require a physical connection to a network. 28) The term WAN stands for? a. Wide Area Net b. Wide Access Network c. Wide Area Network d. Wide Access Net Hide Answer Workspace Answer: (c) Wide Area Network Explanation: The term WAN stands for Wide Area Network. ⇧ SCROLL TO TOP 29) Which of the following cannot be used as a medium for 802.3 ethernet? https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 13/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint a. A thin coaxial cable b. A twisted pair cable c. A microwave link d. A fiber optical cable Hide Answer Workspace Answer: (c) A microwave link Explanation: A microwave link cannot be used as a medium for 802.3 ethernets, because a microwave link is a transmission network that utilizes a beam of radio waves in the microwave frequency spectrum to relay video, audio, or data between two places. 30) What IP address class allocates 8 bits for the host identification part? a. Class A b. Class B c. Class C d. Class D Hide Answer Workspace Answer: (c) Class C Explanation: In class C only, 8 bits are reserved for the host ID, and 24 bits are reserved for network ID. 31) The term IANA stands for? a. Internet Assigned Numbers Authority b. Internal Assigned Numbers Authority c. Internet Associative Numbers Authoritative d. Internal Associative Numbers Authority ⇧ SCROLL TO TOP Hide Answer Workspace https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 14/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Answer: (a) Internet Assigned Numbers Authority Explanation: The term IANA stands for Internet Assigned Numbers Authority. 32) How many versions available of IP? a. 6 version b. 4 version c. 2 version d. 1 version Hide Answer Workspace Answer: (c) 2 version Explanation: There are only two IP versions are avilable in the present: IP version 4 (IPv4) and IP version 6 (IPv6). 33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer? a. Host to host b. Application c. Internet d. Network Access Hide Answer Workspace Answer: (a) Host to Host Explanation: The host to host layer conforms the transport layer of the OSI model. This layer is responsible for the final correspondence and error-free distribution of data. 34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size. ⇧ SCROLL TO TOP Calculate the maximum throughput. https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 15/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint a. 5999 b. 6900 c. 6027 d. 5027 Hide Answer Workspace Answer: (c) 0.6027 Explanation: In Pure Aloha, Efficiency = 18.4% Usable bandwidth for 18.2 kbps = 18.2 * 0.18 = 3.276 kbps Therefore, the maximum throughput of Pure Aloha = 1/2e * 3.276 = (18.4 * 3.276) / 100 = 0.6027 35) On a simplex data link, which of the following is a possible error recovery technique? a. Backward error correction (BEC) b. The use of hamming codes c. Automatic Repeat Request (ARQ) d. Downward error correction (DEC) Hide Answer Workspace Answer: (b) The use of hamming codes Explanation: The hamming codes is an error recovery technique that can be used to detect and correct the errors. It was developed by R.W. Hamming. 36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its ⇧variants? SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 16/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint a. Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data stream is probabilistic. b. TDM requires the transmitter and receiver to be synchronized periodically. c. TDM performs efficiently if the arrival pattern of the data stream is probabilistic. d. Statistical TDM is efficient if the data stream is deterministic. Hide Answer Workspace Answer: (a) and (b) Explanation: None 37) The term IPv4 stands for? a. Internet Protocol Version 4 b. Internet Programming Version 4 c. International Programming Version 4 d. None of these Hide Answer Workspace Answer: (a) Internet Protocol Version 4 Explanation: The term IPv4 stands for Internet Protocol Version 4. 38) The term LAN stands for? a. Local Area Net b. Local Aera Network c. Local Array Network d. Local Array Net Hide Answer Workspace ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 17/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Answer: (b) Local Area Network Explanation: The term LAN stands for Local Area Network. 39) Which of the through is share the data of two computer? a. Library b. Network c. Grouping d. Integrated system Hide Answer Workspace Answer: (b) Network Explanation: There are many ways to share data between two computers, but a network connection is established before data sharing. 40) In specific, if the systems use separate protocols, which one of the following devices is used to link two systems? a. Repeater b. Gateway c. Bridge d. Hub Hide Answer Workspace Answer: (b) Gateway Explanation: If the system used separate protocols, gateway device is used to link two systems. ⇧ SCROLL TO TOP 41) How many digits of the Data Network Identification Code (DNIC) identify the country? https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 18/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint a. first three b. first four c. first five d. first six e. None of the above Hide Answer Workspace Answer: (a) first three Explanation: The first three digits of the Data Network Identification Code (DNIC) is identify the country (first digit to identify a zone and other two digits to identify the country within the zone). 42) Which of the following methods is used to broadcast two packets on the medium at a time? a. Collision b. Synchronous c. Asynchronous d. None of the above Hide Answer Workspace Answer: (a) Collision Explanation: A collision occurs when two or more computers are attempting to transfer data across a network at a time. 43) Which of the following is true with regard to the ping command? a. Ping stands for Packet Internet Generator. b. The ping command checks the port level connectivity between source destinations end points. c. Ping summarizes the packet loss and round-trip delay between two IP end points. ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 19/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint d. The ping command activates the RARP protocol of the IP layer. Hide Answer Workspace Answer: (c) Ping summarizes the packet loss and round-trip delay between two IP end points. Explanation: None 44) The private key in asymmetric key cryptography is kept by? a. Sender b. Receiver c. Sender and Receiver d. None of the these Hide Answer Workspace Answer: (b) Receiver Explanation: Only the receiver keeps the private key. Its purpose is to ensure that the message can only be decrypted by the intended receiver. 45) Which of the following algorithms is not used in asymmetric-key cryptography? a. RSA algorithm b. Diffie-Hellman algorithm c. Electronic code book algorithm d. None of the mentioned Hide Answer Workspace Answer: (c) Electronic code book algorithm ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 20/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Explanation: An electronic code book algorithm is a mode of operation for a block cipher, where each frame of text in an encrypted document refers to a data field. In other terms, the same plaintext value would also give the same value for ciphertext. 46) In the cryptography, the sequence of the letters is rearranged by? a. Transposition ciphers b. Substitution ciphers c. Both a and b d. None of these Hide Answer Workspace Answer: (a) Transposition ciphers Explanation: A predefined technique shuffles the sequence of letters in a plaintext message in the transposition ciphers. 47) What is the maximum efficiency of pure aloha at G = 1/2? a. 1.89 b. 17.99 c. 18.999 d. 18.4 Hide Answer Workspace Answer: (d) 18.4 Explanation: The maximum efficiency of pure aloha formula is G * e-2G. Given, G =1/2 =1/2 x e-2 x 1/2 = 1 / 2e ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 21/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint = 0.184 = 18.4% 48) What is the maximum efficiency of slotted aloha at G = 1? a. 36.8 b. 35.8 c. 35.5 d. 37.8 Hide Answer Workspace Answer: (a) 36.8 Explanation: The maximum efficiency of slotted aloha formula is G * e-G. Given, G = 1 = 1 x e-1 =1/e = 0.368 = 36.8% 49) Which of the following statement is true about error detection techniques used on communications link? a. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors. b. Error detection cannot be used on simplex links. c. Hamming code can detect up to 3-bit errors. d. All of the these Hide Answer Workspace ⇧ SCROLL TO TOP Answer: (d) All of the these https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 22/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Explanation: None 50) The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is? a. Network, Physical, Transport, Data link b. Network, Physical, Data link, Application c. Network, Presentation, Data link, Application d. Network, Presentation, Physical, Transport Hide Answer Workspace Answer: (c) Network, Presentation, Data link, Application Explanation: None ← Prev Next → For Videos Join Our Youtube Channel: Join Now Feedback Send your Feedback to feedback@javatpoint.com Help Others, Please Share Learn Latest Tutorials ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 23/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint SoapUI RPA Manual Testing Cucumber Appium PostgreSQL Solr MongoDB Gimp Verilog Teradata PhoneGap Preparation Aptitude Aptitude Logical Reasoning Verbal Ability Verbal Ability Reasoning Interview Questions Interview Company Interview Questions Company Trending Technologies Artificial Intelligence Tutorial AWS Tutorial AWS Selenium tutorial Cloud tutorial Cloud Selenium Artificial Intelligence ⇧ SCROLL TO TOP Hadoop tutorial https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 24/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Hadoop Blockchain Tutorial ReactJS Tutorial Data Science Tutorial Angular 7 Tutorial ReactJS Data Science Angular 7 Git Tutorial Git Blockchain Machine Learning Tutorial DevOps Tutorial Machine Learning DevOps B.Tech / MCA DBMS tutorial DBMS Data Structures tutorial DAA tutorial DAA Data Structures Computer Network tutorial Compiler Design tutorial Computer Network Compiler Design Ethical Hacking Tutorial Computer Graphics Tutorial Ethical Hacking Computer Graphics Operating System tutorial Operating System Computer Organization and Architecture Discrete Mathematics Tutorial Computer Organization Discrete Mathematics Software Engineering Tutorial html tutorial Web Tech. Software Engineering Cyber Security tutorial Automata Tutorial Cyber Security Automata Java tutorial Java .Net Framework tutorial C Language tutorial C++ tutorial C++ C Python tutorial Python List of Programs Programs .Net ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 25/26 6/23/2021 Computer Network MCQ (Multiple Choice Questions) - javatpoint Control Systems tutorial Control System Data Mining Tutorial Data Mining ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq#:~:text=Explanation%3A The parity bit is,detection for blocks of data. 26/26 6/23/2021 Home Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Computer Fundamentals Computer Network Control System Java HTML CSS ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 1/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Computer Network MCQ Part 2 1) In which of the following switching methods, the message is divided into small packets? a. Message switching b. Packet switching c. Virtual switching d. None of the these Hide Answer Workspace Answer: (b) Packet switching Explanation: In packet switching, the message is divided into small parts. These small parts of the message are called packets, and each packet has its own source and destination address. Each packet is transmitted forward in the network only on the basis of these addresses. 2) Which of the following switch methods creates a point-to-point physical connection between two or more computers? a. Message switching b. Packet switching c. Circuit switching d. None of the these Hide Answer Workspace Answer: (a) Circuit switching Explanation: Circuit switching is a switching technique in which a point-to-point physical connection is made between two or more devices. For example: Telephone system, in which sender and receiver are connected by physical connection, such as wire. ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 2/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 3) What is the second name of the proxy server? a. Proxy tools b. Application proxy c. Application-level gateway d. All of the these Hide Answer Workspace Answer: (c) Application-level gateway Explanation: The proxy server is also known as the application-level gateway. It allows client computers to establish indirect network connections to other networks. 4) Which of the following servers allows LAN users to share data? a. Data server b. Point server c. File server d. Communication server Hide Answer Workspace Answer: (c) File server Explanation: A file server allows LAN users to share the data. It acts as a medium for data transfer. It uses the FTP protocol to transfer information and data. 5) What is the total vulnerable time value of pure Aloha? a. Tfr b. 1/2 Tfr c. 2 * Tfr d. 4 * Tfr ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 3/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Hide Answer Workspace Answer: 2 * Tfr Explanation: Total vulnerable time of pure Aloha = 2 * Tfr 6) How many fields are in the SMDS packet? a. Two b. Three c. Four d. Five Hide Answer Workspace Answer: (b) Three Explanation: SMDS packet consists of three fields: Destination address, Source address, and User data. In this, the destination and source addresses are 8 bytes, while the user data is up to 9188 bytes. 7) What is the maximum data transfer rate of the optical fiber wire? a. 50 kbps b. 1000 kbps c. 1000 Mbps d. None of the these Hide Answer Workspace Answer: (c) 1000 Mbps Explanation: 1000 Mbps is the max data transfer rate for optical fiber cables. It is the fastest among the other kinds of cables like STP and coaxial cables. People are now using optical fiber ⇧ SCROLL TO cables TOP instead of STP for LANs due to their fast data transfer capability. https://www.javatpoint.com/computer-network-mcq-part2 4/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 8) POTS network works on the principle of ________ a. Telephone switching b. Proxy server c. File system d. Circuit system Hide Answer Workspace Answer: (d) Circuit switching Explanation: POTS stands for Plain-old-telephone-service, and it works on the principle of circuit switching. In this, the analog signal is transmitted by copper wire. 9) Which of the following protocols is the bit-oriented protocol? a. SSL b. http c. HDLC d. All of the these Hide Answer Workspace Answer: (c) HDLC Explanation: HDLC stands for High-level data link control. It is a set of protocols that are used to transmit information from one network to another. It is a bit-oriented protocol that supports both wireless and wired communication. 10) SLIP stands for _______ a. System line internet protocol b. Serial line internet protocol ⇧ SCROLL TOP c. SignalTO line internet protocol https://www.javatpoint.com/computer-network-mcq-part2 5/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint d. Signal internet protocol Hide Answer Workspace Answer: (b) Serial line internet protocol Explanation: SLIP stands for Serial-line-internet-protocol. It is an internet protocol through which a user accesses the internet using a computer modem. 11) The second port is used to ____________ in the two-port network. a. Input terminal b. Output terminal c. Signal terminal d. Bandwidth terminal Hide Answer Workspace Answer: (b) Output terminal Explanation: A two-port network is an electrical network consisting of two ports. The first port is used for the input terminal, and the second pair is used for the output terminal. 12) Which of the following layers does the HTTP protocol work on? a. Physical layer b. Data-link layer c. Application layer d. None of the these Hide Answer Workspace Answer: (c) Application layer Explanation: The HTTP application works on the application layer protocol. It is used to ⇧ SCROLL TO TOP transmit messages across the World Wide Web. https://www.javatpoint.com/computer-network-mcq-part2 6/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 13) Which of the following statement correct about the cipher in cryptography? a. It is a method for performing encryption and decryption b. It is used to establish the network connection c. It is a message event d. All of the these Hide Answer Workspace Answer: (a) It is a method for performing encryption and decryption Explanation: A cipher is a method of implementing encryption and decryption of messages traveling in a network. It is used to increase the confidentiality of messages. 14) SONET stands for ______________. a. Signal Operation Network b. Synchronous Optical Network c. System Optical Network d. Signal Optical Network Hide Answer Workspace Answer: (b) Synchronous Optical Network Explanation: SONet stands for Synchronous Optical Network. It is used in the telephone system. SONet is a technology that converts signals of different capacities into optical signals. 15) How many layers does the SONET contain? a. 2 layers b. 3 layers ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 7/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint c. 4 layers d. 5 layers Hide Answer Workspace Answer: (c) 4 layers Explanation: Sonet consists of 4 layers. Path layer → Line layer → Section layer → Photonic layer 16) RAKE receiver designed for _____. a. Multipath fading b. Signals c. Data network d. Network connection Hide Answer Workspace Answer: (a) Multipath fading Explanation: Rake receiver is a radio receiver. It is designed to counter the effects of multipath fading. It is most commonly used in CDMA and W-CDMA radio devices, such as wireless LAN devices and mobile phones. 17) What is the formula of high rate in zigzag code? a. J / (J * 1) b. -Z / (1 + J) c. Z * (1 + J) d. J / (J + 1) Hide Answer Workspace ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 8/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Answer: (d) J / (J + 1) Explanation: Zigzag code is a type of linear error-correcting code. The formula of high code rate is = J / (J + 1), Where J is the number of Bits per segment. 18) What is the size of the sender window in the Go Back N (ARQ) protocol? a. 0 b. 1 c. 10 d. n Hide Answer Workspace Answer: (d) n Explanation: Go back N (ARQ) protocol is a data-link layer protocol that uses sliding window technology. The size of the sender window is N. For example: Go back 8, then the size of the sender window will be 8. 19) What is the efficiency of the Go back N (ARQ) protocol? a. N = N / (2a + 2a) b. N = N / (1 + 2a) c. N = N * (2a + 2a) d. N = N * (1 + 2a) Hide Answer Workspace Answer: (b) N = N / (1 + 2a) Explanation: Go back N (ARQ) protocol is a data link layer protocol that uses sliding window technology. The efficiency of the Go back N ARQ protocol is: N = N / (1 + 2a), Where N is the sender window size. ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 9/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 20) What is the size of the destination port in the UDP protocol? a. 8 bits b. 16 bits c. 20 bits d. 32 bits Hide Answer Workspace Answer: (b) 16 bits Explanation: The size of the destination port is 16 bits in UDP protocol, and it is used to identify the destination port of the data. 21) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages? a. Ping b. Route c. Traceroute d. Ifconfig Hide Answer Workspace Answer: (c) Traceroute Explanation: Traceroute works by sending packets of data with a reduced time-to-live (TTL) that specifies how many steps (hops) a packet can survive before returning. It finds the exact route taken by each step to arrive at the server and time. 22) A client of the DNS (Domain Name System) application is called _____. a. DNS server b. DNS Name ⇧ SCROLL TO TOP c. DNS resolver https://www.javatpoint.com/computer-network-mcq-part2 10/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint d. DNS inquirer Hide Answer Workspace Answer: (c) DNS resolver Explanation: A DNS client is a device that is set up to send name resolution requests to the DNS server. It is also called the DNS resolver. 23) How many characters consist of the entire hostname? a. 511 characters b. 255 characters c. 127 characters d. 31 characters Hide Answer Workspace Answer: (a) 255 characters Explanation: A hostname is a label that is assigned to a network-device. A total of 255 characters can be used in an entire hostname. However, each label must be between 1 and 63 characters. 24) During normal IP packet forwarding by a router, which of the following fields of the IP header is updated? a. Repeater b. Source address c. Destination address d. Checksum Hide Answer Workspace Answer: TO (d) Checksum ⇧ SCROLL TOP https://www.javatpoint.com/computer-network-mcq-part2 11/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Explanation: When an IPv4 (Internet Protocol version 4) datagram sends an IP packet by a router, its header checksum needs to be updated as a result of reducing the TTL field. 25) Which of the following statements is correct about the DWDM? a. It can transmit data at very high speeds b. It can transmit data at very slow speeds c. DWSM stands for digital wave division multiplexing d. None of the these Hide Answer Workspace Answer: (a) It can transmit data at very high speeds Explanation: DWSM stands for Dense-Wavelength-Division-Multiplexing. It is a fiber optic transmission technique in which light wavelengths are used to transmit data. Therefore, it can transmit data at very high speeds. 26) MAC address is also called ______. a. Physical address b. Logical address c. Source address d. Destination address Hide Answer Workspace Answer: (a) Physical address Explanation: Physical address is also known as MAC address. The physical address is unique because it cannot be changed. This address is stored in the main memory in the system. Which ofTO theTOP following addresses is 32-bit? ⇧27) SCROLL https://www.javatpoint.com/computer-network-mcq-part2 12/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint a. MAC address b. Virtual address c. Source address d. Destination address Hide Answer Workspace Answer: (a) Virtual address Explanation: The virtual address is also called a logical address, and this address is stored in virtual memory in the system. The length of this address is 32-bit. For example, IP address: 190.10.134.76 28) EDI stands for ____. a. Electronic Data Interchange b. Electronic Digital Internet c. Electronic Digital Interchange d. Electronic Data Internet Hide Answer Workspace Answer: (a) Electronic Data Interchange Explanation: EDI stands for Electronic-Data-Interchange. It is a communication system in which data is transferred electronically from one computer to another computer. 29) What is the maximum data transfer rate of the ISDN? a. 1024 Mbps b. 64 Mbps c. 64 kbps d. 1024 kbps ⇧ SCROLL TO TOP Hide Answer Workspace https://www.javatpoint.com/computer-network-mcq-part2 13/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Answer: (b) 64 kbps Explanation: The ISDN supports data transfer rates up to 64 kbps. ISDN is a circuitswitched telephone network system. It is a set of communication standards for digital transmission (e.g., audio, video, and other network-related data). 30) ARPANET stands for _______. a. Advanced Recheck Projects Agency Internet b. Advanced Recheck Projects Agency Network c. Advanced Research Projects Agency Network d. Advanced Research Projects Agency Internet Hide Answer Workspace Answer: (c) Advanced Research Projects Agency Network Explanation: ARPANET stands for Advanced-Research-Projects-Agency-Network. It was the world's first packet-switching network and the first in the world to use the TCP/IP model. 31) What is the size of the UDP header? a. 8 bytes b. 16 bytes c. 20 bytes d. 64 bytes Hide Answer Workspace Answer: (a) 8 bytes Explanation: The size of the UDP header is 64 bits (64 bit means 8 bytes). It is a simple transport layer communication protocol. It has four parameters: Source port, Destination ⇧ SCROLL TO TOP port, Length, and Checksum. https://www.javatpoint.com/computer-network-mcq-part2 14/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 32) Which of the following protocols is the connection-less protocol? a. UDP b. TCP c. IP d. All of the these Hide Answer Workspace Answer: (a) UDP Explanation: UDP is a connection-less protocol which means that when data transfer occurs, this protocol does not establish a connection between the sender and the receiver. 33) Wildcard domain name labels begin with a ______. a. . b. 0 c. @ d. * e. # Hide Answer Workspace Answer: (c) * Explanation: A wildcard record is a type of resource record that matches one or more subdomains. It is started with a "*". For example: *.javatpoint.com 34) What is the maximum length of the STP wire? a. 20 ft b. 50 ft TO TOP ⇧ SCROLL https://www.javatpoint.com/computer-network-mcq-part2 15/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint c. 50 meters d. 100 meters Hide Answer Workspace Answer: (d) 100 meters Explanation: STP is the full name Shielded twisted-pair. This cable is similar to UTP, but it has an extra mesh coating or metal foil, and all the wires are inside it. The maximum length of this wire is 100 meters. If the length is more than 100 meters, then this cable loses its signals. Therefore, this wire is more suitable for small networks such as LANs. 35) Which network is suitable for a building? a. WAN b. LAN c. MAN d. PAN Hide Answer Workspace Answer: (b) LAN Explanation: LAN network is used to connect computers in a small area such as school, office, residence, etc. It is less expensive and very secure. 36) ________ is a 2G mobile telecommunications based on the CDMA. a. IS-95 b. ISO 1990 c. IS-97 d. None of the these Hide Answer Workspace ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 16/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Answer: (a) IS-95 Explanation: The full name of IS-95 is interim standard 95. It is a second-generation mobile telecommunications standard based on CDMA (code division multiple access). It was developed by Qualcomm. 37) Which of the following statements is correct about IRC? a. It sends the messages in virtual time b. It is an application layer protocol c. It works on the proxy model d. All of the these Hide Answer Workspace Answer: (b) It is an application layer protocol Explanation: IRC stands for Internet relay chat. It is an application layer protocol that is used to communicate over the internet as a text message. It sends messages in real-time. 38) Which of the following devices is not a networking device? a. Hub b. Switch c. Bridge d. None of the these Hide Answer Workspace Answer: (d) None of the these Explanation: Hub, Switch, and Bridge are networking devices. Therefore, option d is the correct answer. ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 17/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint 39) Which of the following devices does not require power to forward the signals? a. Active hub b. Passive hub c. Repeater d. Bridge Hide Answer Workspace Answer: (b) Passive hub Explanation: The passive hub sends the signal forward as it is, so it does not need a power supply. 40) How many pins does RJ-45 contain? a. Two b. Four c. Eight d. Ten Hide Answer Workspace Answer: (c) Eight Explanation: The RJ-45 has eight pins of different colors. The four pins have solid colors, and the other four pins have light colors. ← Prev Next → For Videos Join Our Youtube Channel: Join Now ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 18/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Feedback Send your Feedback to feedback@javatpoint.com Help Others, Please Share Learn Latest Tutorials SoapUI RPA Manual Testing Cucumber Appium PostgreSQL Solr MongoDB Gimp Verilog Teradata PhoneGap Reasoning Verbal Ability Interview Preparation Aptitude Company Interview Questions ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 19/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Company Trending Technologies Artificial Intelligence Tutorial AWS Tutorial AWS Selenium tutorial Cloud tutorial Cloud Selenium Artificial Intelligence Hadoop tutorial Hadoop Blockchain Tutorial ReactJS Tutorial Data Science Tutorial Angular 7 Tutorial ReactJS Data Science Angular 7 Git Tutorial Git Blockchain Machine Learning Tutorial DevOps Tutorial Machine Learning DevOps B.Tech / MCA DBMS tutorial DBMS Data Structures tutorial DAA tutorial DAA Data Structures Computer Network tutorial Compiler Design tutorial Computer Network Compiler Design Ethical Hacking Tutorial Computer Graphics Tutorial Ethical Hacking Computer Graphics ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 Operating System tutorial Operating System Computer Organization and Architecture Discrete Mathematics Tutorial Computer Organization Discrete Mathematics Software Engineering Tutorial html tutorial Web Tech. Software Engineering 20/21 6/23/2021 Computer Network MCQ (Multiple Choice Questions) Part 2 - javatpoint Cyber Security tutorial Automata Tutorial Cyber Security Automata Java tutorial Java .Net Framework tutorial C Language tutorial C++ tutorial C++ C Python tutorial Python List of Programs Programs .Net Control Systems tutorial Control System Data Mining Tutorial Data Mining ⇧ SCROLL TO TOP https://www.javatpoint.com/computer-network-mcq-part2 21/21