Computer Networks Exam Solution
Computer Networks Exam Solution
The layer has the primary responsibility for communications between one device
and the devices connected to it.
⇤ A. network
⇤ B. physical
⇤ C. transport
⌅ D. link
⇤ E. application
⇤ A. computers
⌅ B. networks
⇤ C. switches
⇤ D. gateways
⇤ E. hosts
3. What is the size of an IPv4 address?
⌅ A. 32 bit
⇤ B. 48 bit
⇤ C. 64 bit
⇤ D. 80 bit
⇤ E. 128 bit
4. As a message proceeds down the protocol stack, the destination port number is added
at the:
⇤ A. Application Layer
⌅ B. Transport Layer
⇤ C. Network Layer
⇤ D. Data Link Layer
⇤ E. None of the above
5. What is the port number for SMTP?
⇤ A. 21
⌅ B. 25
⇤ C. 65
⇤ D. 70
⇤ E. 80
⇤ A. authoritative
⌅ B. top level domain
⇤ C. root
⇤ D. default
⇤ E. none of the above
⇤ A. Email
⇤ B. File transfer
⇤ C. Web
⌅ D. Multimedia streaming
⇤ E. All of the above
8. In a client/server connection using HTTP over TCP, if multiple objects are sent over the
same TCP connection, then the connection is classified as:
⇤ A. Stateless
⌅ B. Persistant
⇤ C. Non-persistant
⇤ D. Stable
⇤ E. Reliable
9. Consider the Go-Back-N protocol with a sender window size of N = 4 and a sequence
number range of 1024. Suppose that at time t the next in-order packet that the receiver
is expecting has sequence number 228. Assume that the medium does not reorder
messages. Which of the following is a possible pair of values for the senders send base
and nextseqnum pointers at time t?
⇤ A. Flow Control
⌅ B. Congestion Control
⇤ C. Connection Management
⇤ D. All of the above
⇤ E. None of the above
11. TCP and UDP use the 16-bit Internet Checksum for computing the value of the checksum
field in each segment. In this question you are asked to use the same method but for
simplicity we restrict to 8-bit words. Suppose you have the following three 8-bit words:
11101011
01010101
10110111
What is the value of the 8-bit Internet Checksum (i.e., the 1s complement of the 8-bit
sum) of these words?
⌅ A. 00000111
⇤ B. 00001000
⇤ C. 00001010
⇤ D. 00001001
⇤ E. None of the above
12. Consider a router that interconnects three subnets: X, Y, and Z. Suppose all of the in-
terfaces in each of these subnets are required to have the prefix 13.2.80.0/21. Suppose
subnet X is required to support 1000 interfaces, and subnets Y and Z are each required
to support 500 interfaces. Which set of network addresses for X,Y and Z satisfies these
constraints?
⌅ A. 192.168.132.1 and 192.168.146.1 are not in the IP range of any of the 3 subnets.
⇤ B. 192.168.132.1 is in the range of X, and
192.168.146.1 is in the range of Z.
⇤ C. 192.168.132.1 is in the range of Y, and
192.168.146.1 is in the range of Z.
⇤ D. 192.168.132.1 is is not in the IP range of any of the 3 subnets, and
192.168.146.1 is in the range of Z.
⇤ E. 192.168.132.1 is in the range of X, and
192.168.146.1 is not in the IP range of any of the 3 subnets.
14. When the speed of the incoming packets at a router exceeds the outgoing link data rate,
which of the following may occur?
⇤ A. Transmission delay
⇤ B. Queuing delay
⇤ C. Packet loss
⌅ D. All of the above
⇤ E. None of the above
⇤ A. Slotted Aloha
⇤ B. CSMA/CA
⌅ C. CSMA/CD
⇤ D. TDMA
⇤ E. FDMA
16. What are the CRC bits defined by the generator 1101 and the data bit string 111011?
⇤ A. 011
⇤ B. 100
⇤ C. 101
⇤ D. 110
⌅ E. 111
⇤ A. 40
⇤ B. 400
⇤ C. 1000
⇤ D. 4000
⌅ E. 10000
18. What is the main advantage of first distributing a session key and then using symmetric-
key cryptography rather than using public-key cryptography techniques for the whole
communication?
19. Consider RSA with p = 5 and q = 7. What are the values of n and z?
⌅ A. n = 35 and z = 24
⇤ B. n = 35 and z = 96
⇤ C. n = 119 and z = 24
⇤ D. n = 119 and z = 96
⇤ E. None of the above
⌅ A. Block Cypher
⇤ B. Stream Cypher
⇤ C. Public key cryptography
⇤ D. A and B
⇤ E. All of the above