0% found this document useful (0 votes)
98 views

Key Computer Communication

The document contains 10 multiple choice questions about error control techniques. Common error control techniques assessed include single and two-dimensional parity, block codes using generator polynomials and matrices, and probability of error for bit sequences. The questions cover concepts like parity bit calculation, error detection and correction capabilities of different techniques, polynomial to binary mapping, and shift register implementation of polynomial codes.

Uploaded by

Cường Trần
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views

Key Computer Communication

The document contains 10 multiple choice questions about error control techniques. Common error control techniques assessed include single and two-dimensional parity, block codes using generator polynomials and matrices, and probability of error for bit sequences. The questions cover concepts like parity bit calculation, error detection and correction capabilities of different techniques, polynomial to binary mapping, and shift register implementation of polynomial codes.

Uploaded by

Cường Trần
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 120

Course 1 –week1

Graded Assessment - Communication Networks and Services


Which of following protocol is HTTP built upon

2 points

SMTP

TCP

UDP

IP

2.
Question 2
Which of following requirements are necessary for packet networks to support multiple and diverse
applications?

2 points

Transfer arbitrary message size

Low delay for interactive applications

Packets have maximum length

All of the above

3.
Question 3
What was the concern of the telephone system that motivated the ARPANET design?

2 points

Scalability
Vulnerability

Efficiency

None of the above

4.
Question 4
Which of the following is an application layer protocol?

2 points

DNS

HTTP

UDP

TCP

5.
Question 5
Which of the following are features of ARPANET design?

2 points

Connectionless packet transmission

Routing tables at the packet switches

Destinations identified by unique addresses

All of the above


6.
Question 6
Bluetooth is an example of

1 point

Wide Area Network

Local Area Network

Metropolitan Area Network

Personal Area Network

7.
Question 7
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

1 point

Rearranged

Modified

Removed

Added

8.
Question 8
The ________ is the physical path over which a message travels

1 point

Protocol

Path
Medium

Route

9.
Question 9
Three or more devices share a link in ________ connection

1 point

Unipoint

Multipoint

Point to Point

None of the above

10.
Question 10
Which of the following is true for Transport Control Protocol

1 point

Connection oriented

Process to Process

Transport layer protocol

Connectionless
Course 1 – week2 : Graded Assessment - Layered Architecture
In a LAN, which address is used to transfer frames to appropriate destination?

2 points

IP address

Physical address

Domain name

None of the above

2.
Question 2
Suppose an application layer entity wants to send an L-byte message to its peer process, using an
existing TCP connection. The TCP segment consists of the message plus 20 bytes of header. The
segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP packet
in turn goes inside an Ethernet frame that has 18 bytes of header and trailer. What is the bandwidth
utilization in terms of the percentage of the transmitted bits in the physical layer corresponds to
message information if L = 500 bytes?

2 points

80%

100%

90%

70%

3.
Question 3
Of the following services, which service(s) does the IP layer provides?
2 points

Error control

Flow control

Connection-based data transfer

None of the above

4.
Question 4
Which of the following is true about the ways in which the OSI reference model and TCP/IP
reference model differ.

2 points

All of the above

They differ in the number of layers

TCP/IP model does not have session layer, but OSI model has

TCP/IP model does not have presentation layer, but OSI model has

5.
Question 5
Which of following statements is true about how the data link layer and transport layer differ?

2 points

Data link layer is concerned with framing and the transport layer is not

Data link layer is concerned with flow control and the transport layer is not
Data link layer is concerned with multiplexing and the transport layer is not

All of the above

6.
Question 6
This layer is an addition to OSI model

1 point

Application layer

Presentation layer

Session layer

Presentation layer and Session layer

7.
Question 7
The functionalities of presentation layer includes

1 point

Data compression

Data encryption

Data decryption

All of the above


Practice Assessment - Socket API & Digital Transmissions

Week3

1.
Question 1
Which of the following applications would you select TCP protocol for?

2 points

Domain name service

File transfer

None of the above

Web browsing

2.
Question 2
In BSD socket API, which type of socket is used to create a TCP socket?

2 points

SOCK_STREAM

SOCK_RAW

SOCK_DGRAM

None of the above

3.
Question 3
In BSD socket API, which type of socket is used to create a UDP socket?
2 points

SOCK_STREAM

SOCK_DGRAM

SOCK_RAW

None of the above

4.
Question 4
In BSD socket API, which system call is used to assign a network address to the socket?

2 points

connect()

listen()

None of the above

bind()

5.
Question 5
In BSD socket API, if a client knows the server name but not server’s network address, what system
call should the client use to get server’s network address?

1 point

None of the above

Connect()
gethostbyname()

gettimeofday()

6.
Question 6
In a transmission system, which of the following statement is true for a receiver

1 point

Receives energy from medium

Converts information into signal suitable for transmission

Converts received signal into a form suitable for delivery to user

All of the above

7.
Question 7
In digital transmission, long distance digital communications require the use of a generator to
recover original data sequence and re-transmits on next segment

1 point

True

False

8.
Question 8
In twisted pair, a category 5 UTP cable can support a data rate of up to 16MHz

1 point

True

False
9.
Question 9
Which of the following statement is true for optical fiber

1 point

Plentiful bandwidth for new services

Dominates long distance transmission

Distance less of a cost factor in communications

All of the above

10.
Question 10
Which of the following are advantages of optical fiber

1 point

No corrosion

Extremely low bandwidth

Wavelength dependency

Noise immunity
Graded Assessment - Socket API & Digital Transmissions
Week3
1.
Question 1
In BSD socket API, which call is usually used for transmitting data in the connectionless mode?

1 point

accept()

connect()

sendto()

None of the above

2.
Question 2
Which of following statement about TCP/UDP sockets is wrong?

1 point

TCP socket is stream oriented

UDP socket is block oriented

TCP is faster than UDP

All of the above

3.
Question 3
Which of following are commonly used as digital communication medium?

1 point

All of the above

Twisted pair

Optical fiber

Coaxial cable

4.
Question 4
Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in
cable 2.5 x 10^8 meters per second. The link has transmission bandwidth of 100 megabits/second
(100 x 10^6 bits per second). The packet size is 400 bits. What is the signal propagation delay?

1 point

None of the above

4 x 10^-7 seconds

4 x 10^-6 seconds

4 x 10^-9 seconds

5.
Question 5
Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in
cable 2.5 x 10^8 meters per second. The link has transmission bandwidth of 100 megabits/second
(100 x 10^6 bits per second). The packet size is 400 bits. What is the packet transmission delay?

1 point

None of the above


4 x 10^-9 seconds

4 x 10^-7 seconds

4 x 10^-6 seconds

6.
Question 6
An API allows application programs to access certain resources through a predefined interface?

1 point

True

False

7.
Question 7
In transport protocol, which of the following statements is true for User Datagram Protocol

1 point

It enables best-effort connectionless transfer of individual block of information

It enables connection-oriented reliable transfer of individual block of information

It enables best-effort connectionless reliable transfer of a stream of bytes

None of the above

8.
Question 8
Which of the following sentences are true for connectionless stream mode of service

1 point

Multiple write/read between peer processes


Send/receive to/from multiple peer processes

Destination address with each block

No setup overhead and delay

9.
Question 9
In transmission delay, in order to reduce the number of bits in a message we use data compression

1 point

True

False

10.
Question 10
Which of the following is true of data compression algorithms

1 point

Recover information approximately

Represent the information using fewer bits

Modify data headers

Recover original information exactly


Practice Assessment - Error Control
Week4
Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what is the even parity bit?

2 points

None of the above

2.
Question 2
Which of following statements are true for single-bit parity error detection?

2 points

It can detect all single bit errors in an information frame

It can detect all double bit errors in an information frame

It can detect all tripe bit errors in an information frame

None of the above

3.
Question 3
Which of following statements are true for two-dimensional parity error detection?
2 points

It can detect all single bit errors in an information frame

It can correct all single bit errors in an information frame

It can detect all double bit errors in an information frame

All of the above

4.
Question 4
Assume bit errors occur at random. If each bit has 50% probability to be in error by transmission.
What is the probability of a four-bit frame to be in error by transmission?

2 points

1/4

1/8

1/16

None of the above

5.
Question 5
What is the binary sequence that corresponds to polynomial code X^3 + x^2 + 1?

2 points

111

1110
1101

0111

6.
Question 6
Block codes are generated using _____.

1 point

Generator matrix

Generator polynomial

Both of the mentioned

None of the mentioned

7.
Question 7
Which of the following is true for two-dimensional parity check

1 point

More parity bit to improve coverage

Arrange information in columns

Arrange information in rows

Add multiple parity bits to each column

8.
Question 8
Polynomial codes are implemented using shift register circuits

1 point
True

False

9.
Question 9
What is the binary equivalent of the following polynomial arithmetic

x7 + x6 + x5 + x2 + 1

1 point

11100101

11011101

11101101

11100111

10.
Question 10
Using Euclidean Division, what will be the remainder of 70 by 999 where 70 is the divisor and 999 is
the dividend

1 point

14

17

21

19
Graded Assessment - Error Control
Week4
1.
Question 1
Given an information polynomial code I(x) = X^7 + x^6 + x^1 + 1, which is its corresponding per-bit
information frame?

2 points

01100011

10100010

None of the above

11000011

2.
Question 2
What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator polynomial x^3 + 1?

2 points

x^2 + x + 1

None of the above

x^2 + x

x^2 + 1
3.
Question 3
Given a generator polynomial g(x) = x^3 + x + 1. Consider the information sequence 1001. By CRC
method, what is the resulted codeword for transmission?

2 points

1001000

1001110

1001111

1010110

4.
Question 4
Which of following generator polynomial can detect all single bit errors in an information frame?

2 points

g(x) = x

g(x) = x^2

g(x) = x + 1

All of the above

5.
Question 5
Internet protocols use check bits to detect errors, instead of using CRC polynomial. The primary
rationale is

2 points

Strength of error detection capability


Simplicity of implementation

CRC polynomial cannot work for Internet protocols

None of the above

6.
Question 6
The two basic approaches in error control are error prevention and detection, and error correction
and re-transmission

1 point

True

False

7.
Question 7
Find parity bit for 1001011

1 point

None of the above

8.
Question 8
The divisor in a cyclic code is normally called the _________.

1 point
Degree

Redundancy

Generator

None of the above

9.
Question 9
The checksum of 0000 and 0000 is

1 point

0101

1010

1111

0000

10.
Question 10
In ASCII, a single parity bit code can detect ________ errors.

1 point

An odd number of

Two

An even number of
No errors

Practice Assessment - Peer-to-Peer Protocols


Course 2 week1
1.
Question 1
In networks where errors are infrequent, which approach is favored for efficiency?

2 points

Hop-by-hop approach

End-to-end approach

Either one of the above

Neither one of the above

2.
Question 2
Which of the following statements is true about the stop-and-wait ARQ protocol?

2 points

Stop-and-wait is only efficient if the link bandwidth is high

Stop-and-wait is only efficient if the link delay-bandwidth product is small

Stop-and-wait is only efficient if the link bandwidth is low

Stop-and-wait is only efficient if the link delay-bandwidth product is large


3.
Question 3
Consider a situation where an interactive application produces a packet to send each keystroke from
the client and the server echoes each keystroke that it receives from the client. Which of following
strategies for sending ACK frames in a Go-Back-N is appropriate for the situation?

2 points

send an ACK frame immediately after each frame is received

send an ACK frame after every other frame is received

send an ACK frame when the next piggyback opportunity arises

Any one of the above

4.
Question 4
Consider a bulk data transfer application where a server sends a large file that is segmented in a
number of full-size packets that are to be transferred to the client. Assume the channel has a low
probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is
appropriate for the situation?

2 points

Any one of the above

send an ACK frame immediately after each frame is received

send an ACK frame after every other frame is received

send an ACK frame when the next piggyback opportunity arises

5.
Question 5
Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the
value of frame number x at receiver B?
2 points

None of the above

6.
Question 6
ARQ protocols combine error detection, retransmission and sequence numbering to provide
reliability
1 point

True

False

7.
Question 7
A service model specifies a level of performance that can be expected in the transfer of information.

1 point

True

False

8.
Question 8
A service offered at a given layer can include which of the following feature(s)

1 point

Sequencing

Reliability

Timing

All of the above

9.
Question 9
Digital communication technologies may introduce errors in communication, which of the following
can be used to provide reliable communication

1 point

DNS
TCP

UDP

HDLC

10.
Question 10
Ensuring that information is not altered during transfer is associated with

1 point

Integrity

Authentication

Availability

Confidentiality

Honor Code Agreement


Course 2 week1

1.
Question 1
Given 3 bits for sequence numbers, what is the maximum sliding window size at the receiver in Go
Back 3 ARQ?

2 points

None of the above

2.
Question 2
Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding
window size to be 4, what is the maximum sliding window size at the receiver?

2 points

None of the above

3.
Question 3
Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the
value of frame number x at receiver B?

2 points

None of the above

4.
Question 4
In the scenario above, what should be the value of frame number y at receiver B?

2 points

None of the above

5.
Question 5
If the probability of error is very low in a communication link, which of the following statements is true
about performance of ARQ protocol?

2 points

Stop-and-wait and Go-back-N ARQ protocols have similar performance

Stop-and-wait and Selective Repeat ARQ protocols have similar performance

Go-back-N ARQ and Selective Repeat ARQ protocols have similar performance

None of the above

6.
Question 6
In peer-to-peer protocol, the purpose of Automatic Repeat Request is

1 point

to ensure a sequence of information packet is delivered out-of-order


to ensure a sequence of information packet is delivered without errors or duplication despite
transmission errors and losses

to ensure a sequence of information packet is delivered in order

to ensure a sequence of information packet is delivered with an ACK request

7.
Question 7
Which of the basic elements of ARQ is associated with negative acknowledgement

1 point

Timeout mechanism

ACKs

Error detecting code

NAKs

8.
Question 8
In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the completion
of time of the previous frame transmission is called

1 point

Transitioning

Pipelining

Channeling

None of the above


9.
Question 9
In Stop-and-Wait protocol, sequence number are not required

1 point

True

False

10.
Question 10
The disadvantage of Stop-and-Wait protocol

1 point

Error free communication channel does not exist

Acknowledgement may get lost

Deadlock situation may occur

All of the above

Honor Code Agreement


Practice Assessment - Reliable Services and Data Link Controls

Graded Assessment - Peer-to-Peer Protocols


Course 2 week2
1.
Question 1
Which of the following statements are true for the best-effort service of IP?

2 points

Packets can arrive with errors or be lost

Packets can arrive out-of-order

Packets can arrive after very long delays

All of the above

2.
Question 2
Which of following services belong to the data link layer?

2 points

Insert framing information into the transmitted stream to indicate the boundaries that define frames

Provide error control to ensure reliable transmission

Provide flow control to prevent the transmitter from overrunning the receiver buffer

All of the above

3.
Question 3
Which ARQ flow control protocol is used by TCP?

2 points

Stop-and-Wait
Selective Repeat

Go-back-N

None of the above

4.
Question 4
By framing, frame boundaries can be determined using

2 points

Character Counts

Control Characters

Flags

All of the above

5.
Question 5
Which of following statements are true about framing protocols?

2 points

PPP uses character-based framing which requires byte stuffing

HDLC uses Flag-based framing which required bit stuffing

All of the above

None of the above

6.
Question 6
In IP network, which of the following statement is incorrect

1 point

Packets can arrive out-of-order

Packets can arrive with errors or be lost

Packets can arrive after long delays

Packets always arrive on time

7.
Question 7
Framing involves identifying the beginning and end of a block of information within a digital stream

1 point

True

False

8.
Question 8
Which of the following statements are true for PPP byte stuffing

1 point

Malicious users may inflate bandwidth

Size of frame varies unpredictably due to byte insertion

All of the above

None of the above


9.
Question 9
In PPP authentication, which of the following is true for Password Authentication Protocol

1 point

Initiator must send ID and password

Initiator and authenticator share a secret key

Transmitted unencrypted, susceptible to eavesdropping

After several attempts, LCP closes link

10.
Question 10
In HDLC frame format, flag is used to identify secondary station (1 or more octets)

1 point

True

False

Honor Code Agreement

Graded Assessment - Reliable Services and Data Link Controls


Course2 week2
1.
Question 1
Perform the bit stuffing procedure for the following binary sequence: 1101111111011111110101.
What is the outcome?

1 point

110111110110111110110101

110111111101111111010100
0010000000100000001010

None of the above

2.
Question 2
Perform bit de-stuffing for the following sequence: 11101111101111100111110.

1 point

11101111111111011111

00010000010000011000001

11100111111110011111

None of the above

3.
Question 3
PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the
following?

1 point

Byte stuffing

Bit stuffing

Word stuffing

None of the above

4.
Question 4
HDLC is another data link control protocol widely in use. Its framing is based on which of the
following?

1 point

Byte stuffing

Bit stuffing

Word stuffing

None of the above

5.
Question 5
Which of following statements are true for HDLC?

1 point

supports various data transfer modes

supports multi-point links and point to point links

implements error control and flow control mechanisms

All of the above

6.
Question 6
In PPP authentication, which of the following is true for Challenge-Handshake Authentication
Protocol (CHAP)

1 point

Initiator must send ID and password


After several attempts, LCP closes link

Initiator and authenticator share a secret key

Authenticator can reissue challenge during session

7.
Question 7
In error detection and loss recovery, which of the following statement is correct

1 point

Frames may undergo errors in transmission

CRCs detect errors and such frames treated as lost

Frames lost due to loss-of-synchronization or receiver buffer overflow

All of the above

8.
Question 8
In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet transmission

1 point

True

False

9.
Question 9
Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may
coexist within the same transport channel

1 point
True

False

10.
Question 10
In Generic Framing Procedure (GFP), which of the following sentences are correct

1 point

GFP uses an explicit payload length indicator provided in its frame header to accommodate variable
length PDUs

GFP provides flexible encapsulation framework that supports either a fixed or variable length frame
structure

GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs)

GFP uses a variation of HEC-based self delineation technique

Practice Assessment - Medium Access Controls

1.
Question 1
What is the primary function of medium access control?

2 points

It is to deal with the flow control of a shared communication link.

It is to minimize or eliminate the incidence of collisions of a shared communication link.


It is to deal with the congestion control of a shared communication link.

None of the above

2.
Question 2
What is the primary benefit provided by the Slotted ALOHA compared to ALOHA?

2 points

Higher maximum throughput

Lower access delay

Both of the above

None of the above

3.
Question 3
What is the vulnerable period of collisions in ALOHA?

2 points

Round-trip propagation delay


One frame transmission time

Two frame transmission time

None of the above

4.
Question 4
What is the vulnerable period of collisions in Slotted ALOHA?
Round-trip propagation delay
One frame transmission time
Two frame transmission time
None of the above

5.
Question 5
What is the vulnerable period of collisions in Carrier Sense Multiple Access (CSMA)?

2 points

One frame transmission time

None of the above

One propagation delay


Round-trip propagation delay

6.
Question 6
The primary function of Media Access Control is to minimize or eliminate the instance of the
collisions to achieve a reasonable utilization of the medium

1 point

True

False

7.
Question 7
In media sharing techniques, which of the following are channelization approaches

1 point

Frequency Division Multiple Access

Time Division Multiple Access

Data Division Multiple Access

Code Division Multiple Access

8.
Question 8
Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of
the

1 point

I-persistent process

P-persistent process

Persistent process

Non-persistent process

9.
Question 9
Random access is also called the

1 point

Controlled access

Channelization

Authentication

Contention methods
10.
Question 10
In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of

1 point

Propagation delay

Collision delay

Transmit delay

None of the above

Honor Code Agreement

Graded Assessment - Medium Access Controls


Week3 course2
1.
Question 1
Polling is a scheduling approach for dynamic medium access control. Which of following statements
are correct?

2 points

Polling performance can deteriorate with large delay-bandwidth product

Polling can provide bounds on access delay to the shared medium


Polling can provide fairness through regulated access opportunities

All of the above

2.
Question 2
2) In a collision-free reservation system that has a large number of light-traffic stations, and the
delay-bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to
reserve mini-slots?

2 points

1-persistent CSMA

Slotted ALOHA

CSMA/CD

None of the above

3.
Question 3
In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision
to be detected and resolved?

2 points

Round-trip propagation delay

One propagation delay

One frame transmission time

None of the above

4.
Question 4
Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel. Suppose that frames
are 1000 bits long. What is the maximum throughput of the system in number of frames per second.

2 points

1 frame per second

10 frames per second

100 frames per second

None of the above

5.
Question 5
Consider building a CSMA/CD network running at 1Gbps over a 1-km cable. The signal speed in the
cable is 200,000 km/sec. What is the minimum frame size?

2 points

64 Bytes

640 Bytes

1250 Bytes

None of the above

6.
Question 6
In media access control, which of the following statements are true for Channelization

1 point

Inefficient for bursty traffic


Does not scale well to large numbers of users

Widely used in internet traffic

Inflexible in allocating bandwidth to users with different requirements

7.
Question 7
Time-out period is equal to maximum possible propagation delay of

1 point

Square-trip

Triangle-trip

Rectangle-trip

Round-trip

8.
Question 8
In Carrier Sense Multiple Access (CSMA), if station senses medium before trying to use it then
chance of collision can be

1 point

Increased

Reduced

Doubled

Highlighted
9.
Question 9
Carrier Sense Multiple Access (CSMA) is based on medium called

1 point

Sense before transmit

Listen before talk

Listen before sending

Sense before Collision

10.
Question 10
Which of the following is not true for MAC scheduling

1 point

Reduced computational or procedural complexity

More efficient channel utilization

Can provide fairness to stations

Less variability in delays

Honor Code Agreement

Practice Assessment - Local Area Networks


1.
Question 1
Which of following features are typically true for local area networks?

2 points

Low error rate


All of the above

High speed

Low round-trip delay

2.
Question 2
Use HDLC and Ethernet to identify similarities between medium access control and data link control
protocols. Which of following statements are true?

2 points

Both contains framing information that delineates the beginning and end of each frame.

Both check the CRC in the received frames for errors

Both implement error control and flow control for reliable transmission.

None of the above

3.
Question 3
Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and wireless LANs. Which
of following statements are true about the differences?

2 points

Error rate

All of the above

Station mobility

Collision detection
4.
Question 4
Which of following is not a primary responsibility of the MAC sublayer in LANs?

2 points

Channel access

Protocol data unit addressing

Fragmentation and reassembly of MAC service data unit

Reliable connection-oriented service

5.
Question 5
In Ethernet, slot time that is at least the round-trip propagation delay, is the critical system parameter
for

2 points

upper bound on time to detect collision

upper bound on time to acquire channel

All of the above

quantum for re-transmission scheduling

6.
Question 6
Which one of the following event is not possible in wireless LAN.

1 point

Collision avoidance
Collision detection

Multi-mode data transfer

Acknowledgement of data frames

7.
Question 7
In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and Contention-Free
Periods (CFPs)

1 point

True

False

8.
Question 8
CSMA/CD is not used in DCF because

1 point

a station is unable to listen to the channel for collisions while transmitting

physical carrier sense detects the presence of other WLAN users

in idle state, a station is unable to listen to the channel for collisions

None of the above

9.
Question 9
In infrastructure network supporting voice and data traffic, data traffic is transported through the CP
and voice traffic through the CFP

1 point
True

False

10.
Question 10
In 802.11 protocol, which of the following statements are true for Basic Service Set (BSS)

1 point

Location in a Basic Service Area (BSA)

Multiple BSSs interconnected by Central System (CS)

Stations in BSS can communicate with each other

Distinct collocated BSS's cannot coexist

Honor Code Agreement

Local Area Networks


Week 4 course 2
1.
Question 1
Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average frame size of
512 bytes. Assume the propagation speed is at 2/3 of light speed. What is the value of normalized
delay-bandwidth product?

2 points

0.0122
0.122

1.22

None of the above

2.
Question 2
Wireless data communication is compelling, because of

2 points

Its easy and low-cost deployment

Its support to personal and mobile devices

Its high reliability to noise and interference

All of the above

3.
Question 3
Why not use CSMA/CD in a wireless LAN? The primary reason is

2 points

The round-trip delay in a wireless LAN is too large

The frame is usually very small in a wireless LAN

The hidden station problem

All of the above

4.
Question 4
In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is used to
transmit high-priority frames such as ACKs?

2 points

PIFS

None of the above

DIFS

SIFS

5.
Question 5
Which of following statements identifies the similarity between HDLC (data link control) and Ethernet
(medium access control)

2 points

Both provide connection-oriented packet transfer services to the network layer

Both implement error control and flow control functions to provide reliable transmission

All of the above

Both contain framing information that delineates the beginning and end of each frame

6.
Question 6
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

1 point

CDMA
CSMA/CD

ALOHA

CSMA/CA

7.
Question 7
Which of the following are management services offered by the MAC sublayer in wireless LAN

1 point

Storage management

Roaming within ESS

Network management

Power management

8.
Question 8
In CSMA/CA, An amount of time divided into slots called

1 point

Contention signals

Contention window

Contention procedure

Contention energy

9.
Question 9
In medium access control sublayer, medium usage is mediated by the access control during
contention period

1 point

True

False

10.
Question 10
In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process
we use a

1 point

Station

Loop

Signal

Practice Assessment - Frame Switching and Packet Switching

1.
Question 1
Which layer LAN bridges work on?

1 point

Transport layer

Network layer

Medium access control


None of above

2.
Question 2
One can use repeaters, bridges and routers to interconnect two LANs. Which of the following
approaches will make local traffic stay in its own LAN?

1 point

bridges

routers

repeaters

All of the above

3.
Question 3
Of the following network layer functions, which one is optional?

1 point

Routing

Forwarding

Congestion control

None of the above

4.
Question 4
Of the following, which is a basic function of transparent bridge?

1 point

Prevents loops in the topology


All of the above

Learns where stations are attached to the LAN

Forwards frames from one LAN to another

5.
Question 5
It is possible for a network layer to provide a choice of services to the user of the network. Which of
following the IP network layer offers

1 point

connection-oriented transfer of packets with delay guarantee

All of the above

Best-effort connectionless service

connection-oriented reliable stream service

6.
Question 6
The network layer is considered the most complex layer because of the following reasons

1 point

Responsible for displaying received information to users

User scalability

Challenges such as addressing and routing

Requires coordinated actions of multiple, geographically distributed network elements


7.
Question 7
An end-to-end function is best implemented at a lower level than at a higher level

1 point

True

False

8.
Question 8
Which of the following is an essential network function

1 point

Forwarding

Routing

Priority and scheduling

All of the above

9.
Question 9
In network layer, which of the following statement is true for packet networks

1 point

Individual packet streams are highly bursty

User demand can undergo dramatic change

Internet structure is highly decentralized

All of the above


10.
Question 10
The main purpose of access multiplexer is to combine the typically bursty traffic flows from the
individual computers into aggregate flows

1 point

True

False

Honor Code Agreement

Graded Assessment - Frame Switching and Packet Switching


Course 3 week1
1.
Question 1
Which of the following functions can a home router perform?

1 point

All of the above

Local area network access using WiFi

Private IP addresses in home by network address translation

Single global IP address using DHCP

2.
Question 2
Consider a three hop network from the source to the destination. Let m be the packet transmission
time at each hop. Let n be the propagation delay at each hop. Assume there is no queuing delay and
processing time at each hop. Based on store-and-forward, what is the total time for the packet to be
transmitted to the destination?

1 point

m+n
3m + n

3m + 3n

None of the above

3.
Question 3
Consider a three hop network from the source to the destination. Let m be the message
transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no
queueing delay and processing time at each hop. Based on store-and-forward, what is the total time
for three packets to be transmitted to the destination by packet pipelining?

1 point

3m + 3n

5m + 3n

9m + 9n

None of the above

4.
Question 4
Six stations (S1-S6) are connected to an extended LAN through transparent bridges (B1 and B2), as
shown in the following figure. Initially, the forwarding tables are empty. Both bridges use backward
learning to build their tables. Suppose station S2 transmits a frame to S1. Which of following
statements is correct?
1 point

The frame will reach bridge B2 only

The frame will reach bridge B1 only

None of the above

The frame will reach both bridges B1 and B2

5.
Question 5
Following the above question. Suppose stations S 3 transmits a frame to S5. Which of following
statements is correct?

1 point

The frame will reach bridge B1 only

The frame will reach bridge B2 only

The frame will reach both bridges B1 and B2

None of the above


6.
Question 6
One can use repeaters, bridges and routers to interconnect two LANs. Which of the following
approaches will make local traffic appear in both LANs?

1 point

Repeater

Routers

Bridges

All of the above

7.
Question 7
Packet pipelining can lead to latency in message delivery

1 point

True

False

8.
Question 8
In internet, switching is done by using datagram approach to packet switching at the

1 point

Application layer

Physical layer

Network layer
Data link layer

9.
Question 9
A transparent bridge's duties include

1 point

Forwarding

Blocking

Filtering frame

All of the above

10.
Question 10
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in
microseconds)

1 point

3.2

320

0.32

32

Honor Code Agreement

Practice Assessment - Routing in Packet Networks


1.
Question 1
Which of following networks represents an example of virtual circuit switching at the network layer?
1 point

IP

ATM

Both of the above

All of the above

2.
Question 2
Consider a three hop network from the source to the destination. Let m be the message
transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no
queueing delay and processing time at each hop. Based on cut-through switching, what is the total
time for three packets to be transmitted to the destination?

1 point

3m + 3n

5m + 3n

9m + 9n

None of the above

3.
Question 3
Which of following issue exists in virtual-circuit subnet but not in datagram subnet?

1 point

Addressing

State information
Routing

None of the above

4.
Question 4
Which of following describe general goals in a routing algorithm?

1 point

Rapid responsiveness to network changes

Robustness under high load and link failure

Low overhead for implementation

All of the above

5.
Question 5
Which of following describe benefits of flooding, a specialized routing approach?

1 point

All of the above

Useful in propagating information to all nodes

Always reach the destination by the fastest path

No routing table needed for routers

6.
Question 6
A Virtual-Circuit Network (VCN) is normally implemented in the
1 point

session layer

data link layer

network layer

Physical layer

7.
Question 7
In routing approaches, which of the following statement is true for deflection routing

1 point

Fixed, preset routing procedures

No route synthesis

Useful in starting up network

Predefined source to destination route

8.
Question 8
To reduce size of routing table, routers do lookup table on MAC address

1 point

True

False

Honor Code Agreement


Graded Assessment - Routing in Packet Networks
Course 3 week2
1.
Question 1
Flooding may easily swamp the network as one packet creates multiple packets, possibly in
exponential growth rate. What are possible means to reduce resource consumption in the network?

1 point

Use a time-to-live field in each packet to limit its lifetime

Add a unique identifier to a packet for removing its duplicate

Use address and sequence number to discard duplicates

All of the above

2.
Question 2
What are possible metrics for routing?

1 point

Hop count

Delay

Bandwidth

All of the above

3.
Question 3
Consider the network as shown in the figure. We use the Bellman-Ford algorithm to find the set of
shortest paths from all nodes to the destination node 2. Each node maintains an entry (n, cost) about
the next node along the current shortest path and the current minimum cost from the node to the
destination. Initially, each node has entry (-1, infinity).
In the first algorithm iteration, which nodes will update their entries and inform their neighbors?

1 point

All of the above

4.
Question 4
Following the above question, in the second algorithm iteration, which nodes will update their entries
and inform their neighbors?

1 point

6
All of the above

5.
Question 5
Following the above question, in the third algorithm iteration, which nodes will update their entries
and inform their neighbors?

1 point

All of the above

6.
Question 6
In link state routing, after the construction of link state packets new routes are computed using

1 point

Dijkstra's algorithm

Bellman Ford algorithm

Leaky bucket algorithm

None of the above

7.
Question 7
A subset of a network that includes all the routers but contains no loops is called

1 point

Broadcast structure
spanning tree

Multi-destination routing structure

None of the above

8.
Question 8
In a router, which of the following statement is true for creating routing tables

1 point

Need information on state of links

Need to distribute link state information using a routing protocol

Need to compute routes based on information

All of the above

9.
Question 9
In a virtual-circuit packet network, routing is determined during connection set-up

1 point

True

False

10.
Question 10
In deflection routing, bufferless operation is considered a disadvantage due to packet loss

1 point

True
False

Practice Assessment - Shortest-Path Routing


1.
Question 1
What is the root problem of Bellman-Ford algorithm for distance vector approach?

1 point

Counting to infinity

Flooding overhead

Cannot work in IP

All of the above

2.
Question 2
What is the root problem of link state routing?

1 point

Counting to infinity

Flooding overhead

Slow reaction to link failures

All of the above

3.
Question 3
Which of following describe the benefits of link state routing compared to distance vector routing?

1 point
Fast convergence

Support for multiple metrics

Support for multiple paths to a destination

All of the above

4.
Question 4
Which of following is the implementation of distance vector approach in the IP routing protocol?

1 point

RIP

OSPF

BGP

None of the above

5.
Question 5
Which of following is the implementation of link state approach in the IP routing protocol?

1 point

RIP

OSPF

BGP

None of the above


6.
Question 6
In Routing Information Protocol (RIP), the use of max number limited to 15 limits the count-to-infinity
problem

1 point

True

False

7.
Question 7
In an OSPF network, routers in area only knows complete topology inside area and limits the
flooding of link-state information to area

1 point

True

False

8.
Question 8
In link state routing, which of the following are possible steps taken to resolve the problem of old
update messages

1 point

Add time stamp to each update message

Add sequence number to each update message

Add a null number to each update message

None of the above

9.
Question 9
In Asynchronous Transfer Mode (ATM), which of the following is an examples of supported services
1 point

Real time voice and video

Circuit emulation for digital transport

Data traffic with bandwidth guarantees

All of the above

10.
Question 10
In Asynchronous Transfer Mode (ATM), the packet structure attribute simplifies implementation and
ensures high speed transfer

1 point

True

False

Honor Code Agreement

Graded Assessment - Shortest-Path Routing


Cousera 3 week3
1.
Question 1
Which of the following features are true for asynchronous transfer mode (ATM)?

1 point

All of the above

It supports quality of service

It is connection-oriented
It only supports fixed-length packets

2.
Question 2
Consider the network as shown in the figure. We use the Dijkstra’s algorithm to find the set of
shortest paths from all nodes to the destination node 4. In Dijkstra’s algorithm, each iteration the
next closet node is added to the set with the root node.

At the first iteration, which node will be added to the set N?

1 point

3.
Question 3
Following the question above, at the second iteration, which node will be added to the set N?

1 point

5
3

4.
Question 4
Following the question above, at the third iteration, which node will be added to the set N?

1 point

5.
Question 5
Following the question above, at the fourth iteration, which node will be added to the set N?

1 point

6.
Question 6
In RIP operation, which of the following statement is correct

1 point

Router sends update message to neighbors every 30 sec

To deal with changes in topology such as a link failure, a router expects an update from each of its
neighbors within 180 sec

Convergence speed up by triggered updates

All of the above

7.
Question 7
What are the limitations of RIP protocol

1 point

Limited metric use

Slow convergence

Fixed number of hops

Update message overhead

8.
Question 8
In Open Shortest Path First (OSPF), which of the following statements are correct

1 point

Each router builds an identical link-state database

Enables each router to learn complete network topology


OSPF typically converges slower than RIp when there is a failure in the network

Allows routers to build shortest path tree with router as root

9.
Question 9
Which of the following is a type of router defined in OSPF

1 point

Internal router

Area border router

Backbone router

All of the above

10.
Question 10
In a distance vector routing, if a link fails

1 point

All routers immediately update their link database and recalculate their shortest path

Neighboring routers exchange routing tables that may use failed links

Routers set link distance to infinity and floods the network with an update packet

All of the above

Honor Code Agreement


Course3-week 4

Practice Assessment - Traffic Management


1.
Question 1
Based on traffic granularity, which of the following levels is traffic management not usually classified
into?

1 point

Byte level

Flow level

Flow-aggregated level

Packet level

2.
Question 2
Which of following statements is true for FIFO queueing?

1 point

FIFO queueing cannot provide differentiated QoS to packet flows

All of the above

In FIFO queueing, arriving packets will be discarded if the buffer is full

In FIFO queueing, all packet flows share the same buffer

3.
Question 3
Which of following is not a packet-level mechanism?

1 point

Token bucket shaping


Fair queueing

Head-of-line priority queueing

Random early detection

4.
Question 4
What are typical end-to-end Quality-of-Service factors?

1 point

Packet delay

Jitter

All of the above

Packet loss rate

5.
Question 5
By Random Early Detection (RED), when a given source transmits at a higher rate than others, the
source will

1 point

Achieves a higher bandwidth

Suffers a higher packet-dropping rate

Achieves a lower waiting delay

Suffers a lower packet-dropping rate


6.
Question 6
The simplest approach to queue scheduling is First-In, First-out queueing, where all packet flow
make use of different buffer

1 point

True

False

7.
Question 7
In FIFO queueing, delay and loss of packets depends on _________ and _________

1 point

Packet size, sequence number

inter-arrival, packet lengths

routing path, sequence number

RTT value, packet lengths

8.
Question 8
Which of the following is a feature of fair queueing

1 point

Every user flows share the same logical buffer

Idealized system assumes fluid flow from queues

Addresses different users by order or request


None of the above

9.
Question 9
In buffer management, drop priorities requires packet to drop when buffer is full

1 point

True

False

10.
Question 10
What are the key mechanisms in Open-Loop Control

1 point

Traffic shaping

Admission control

Re-routing

Policing

Honor Code Agreement

Graded Assessment - Traffic Management


1.
Question 1
Which of the following statements is wrong about fair queuing?

1 point

Fair queueing is a packet-level traffic management

Fair queueing attempts to provide equal-size buffers to flows


Fair queueing attempts to provide equitable access to transmission bandwidth

All of the above

2.
Question 2
To guarantee network performance during the lifetime of admitted flows, open-loop control relies on
the following mechanism except:

1 point

Head-of-Line queueing

Admission control

Traffic shaping

Traffic policing

3.
Question 3
Which of following statements about leaky bucket is wrong?

1 point

In the leaky bucket, the packet output rate is always constant

In the leaky bucket, the packet output rate can be variable

In leaky bucket, when the bucket is full, the new arriving packets may be discarded

Leaky bucket is a flow-level traffic management mechanism

4.
Question 4
Consider a token bucket approach for traffic shaping. A token is generated every 5 micro-seconds.
Each packet can hold 48 bytes of data. What is the sustainable data transmission rate by the token
bucket?

1 point

7.68 Mbps

76.8 Mbps

768 Mbps

None of the above

With a token every 5 m sec, 200,000 cells/sec can be sent. Each packet holds 48 data bytes or 384
bits. The net data rate is then 76.8 Mbps.

5.
Question 5
Upon which of the following condition is token bucket and leaky bucket the same?

1 point

Token bucket size is infinite

Leaky bucket size is zero

Token bucket size is zero

Leaky bucket size is infinite

6.
Question 6
In Head of Line (HOL) priority queueing, which of the following statement is a feature for this
approach

1 point
Provides differential QoS

High-priority classes can hog all of the bandwidth and starve lower priority classes

Need to provide some isolation between classes

All of the above

7.
Question 7
In buffer management, which feature requires packet to drop when buffer is full

1 point

Aggregation

Drop priorities

Drop strategy

Fairness

8.
Question 8
In buffer management, which of the following statement is correct for Random Early Detection (RED)
technique

1 point

Improves performance of cooperating TCP sources

Reduce loss probability of misbehaving sources

Packets produced by TCP will reduce input rate in response to network congestion
Early drop causes some sources to reduce rate before others, causing gradual reduction in in
aggregate input rate

9.
Question 9
In Closed-Loop flow control, which of the following mechanism is used in congestion control to
regulate the flow from sources into network

1 point

Buffer length

Link utilization

Packet header size

Round-Trip Time

10.
Question 10
In congestion warning, the feedback mechanism can be implicit or explicit. Which of the following is
an example of implicit feedback

1 point

A time-out due to missing acknowledgement

The warning bit in ACKs

Choke packets to the source

None of the above

Honor Code Agreement

Practice Assessment - TCP/IP and Advanced Topics


1.
Question 1
Which of the following protocols work at IP layer?

1 point

ICMP

ARP

IGMP

All of the above

2.
Question 2
Which of the following packet header length cannot be used in an IPv4 packet header?

1 point

20 Bytes

30 Bytes

60 Bytes

64 Bytes

3.
Question 3
How many bits used for header checksum in IPv4 packets?

1 point

8 bits

16 bits
32 bits

None of the above

4.
Question 4
What is the dotted notation of an IP address of 10000000 10000111 01000100 00000101 ?

1 point

128.133.68.5

128.135.68.5

128.135.65.5

128.135.65.5

5.
Question 5
Given a network address 128.100.0.0, what is its network class type?

1 point

Class A

Class B

Class C

None of the above

6.
Question 6
Which of the following is provided at the IP layer
1 point

Connectionless

Best effort delivery service

Both of the above

None of the above

7.
Question 7
You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which will be your
closest choice

1 point

255.255.255.224

255.255.255.192

255.255.255.240

255.255.255.248

8.
Question 8
What is the subnetwork number of a host with an IP address of 172.16.66.0/21

1 point

172.16.48.0

172.16.64.0

172.16.0.0
172.16.36.0

9.
Question 9
What is the first valid host on the subnetwork that the node 172.30.190.198/24 belongs to?

1 point

172.30.190.0

172.30.190.1

172.30.190.100

None of the above

10.
Question 10
Based on 1.1.1.0/24, the IP address would be:

1 point

Class A

Class B

Class C

Class D

Honor Code Agreement

TCP/IP and Advanced Topics


1.
Question 1
Which of following is the range of IPv4 addresses spanned by Class C?

1 point
1.0.0.0 to 127.255.255.255

128.0.0.0 to 191.255.255.255

192.0.0.0 to 223.255.255.255

None of the above

2.
Question 2
If a subnet needs to accommodate up to 500 hosts. How many bits for HostID would be sufficient?

1 point

3.
Question 3
Consider a Class B network, where the subnet ID takes 9 bits. What will be the subnet mask?

1 point

11111111 11111111 11111110 00000000

11111111 11111111 11111111 10000000

11111111 11111111 00000000 00000000


None of the above

4.
Question 4
Given a subnet mask 255.255.255.240, how many hosts the subnet can support?

1 point

14

30

62

None of the above

5.
Question 5
A host in an organization has an IP address 150.32.64.34 and a subnet mask 255.255.240.0. What
is the address of this subnet?

1 point

150.32.64.32

150.32.64.24

150.32.64.16

150.32.64.0

6.
Question 6
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that
uses the 255.255.255.224 subnet mask

1 point
14

15

30

62

7.
Question 7
When calculating usable hosts per subnet, the following formula is used 2^bits - 2. For what reason
is two subtracted? (choose two)

1 point

Network

Broadcast

Multicast

Unicast

8.
Question 8
How many hosts can be addressed on 10.0.0.0/16?

1 point

16

254

65536
65534

9.
Question 9
Which of the following is a valid IP host address given the network ID of 191.254.0.0 while using 11
bits for subnetting?

1 point

191.54.1.64

191.254.1.29

191.254.0.32

191.254.0.96

10.
Question 10
DISCO Corporation has been assigned the Class B network address 165.87.0.0. DISCO needs to
divide the network into eight subnets. What subnet mask should be applied to the network to provide
the most hosts per subnet?

1 point

255.255.192.0

255.255.248.0

255.255.224.0

255.255.240.0

Honor Code Agreement

Practice Assessment - IP Addressing


1.
Question 1
Which class of IP addresses does CIDR performs aggregation on?
1 point

Class B

Class D

Class A

Class C

2.
Question 2
Using a CIDR notation, a prefix 205.100.0.0 of length 22 is written as 205.100.0.0/22. What network
mask that the /22 notation indicates?

1 point

205.255.255.0

255.255.252.0

255.255.22.0

None of the above

3.
Question 3
Perform CIDR aggregation on the following /24 IP addresses: 128.58.24.0/24, 128.58.25.0/24,
128.58.26.0/24, 128.58.27.0/24. What is the CIDR outcome?

1 point

128.58.28.0/22

128.58.24.0/22
128.58.28.0/24

None of the above

4.
Question 4
Which protocol provides conversion from an IP address to a physical address?

1 point

ARP

DNS

ICMP

IGRP

5.
Question 5
Which protocol is used to assign temporary IP addresses to hosts?

1 point

ICMP

DHCP

ARP

None of the above

6.
Question 6
In order to maximize the usage of limited IP addresses, which of the following protocol is commonly
used
1 point

NAT

DHCP

Both of the above

None of the above

7.
Question 7
The internet protocol allows IP fragmentation so that datagrams can be fragmented into pieces small
enough to pass over a link with a smaller MTU than the original datagram size

1 point

True

False

8.
Question 8
Which of the following statement is correct for IPv6

1 point

Broadcast in IPv4 have been replaced with multicast in IPv6

Does not support multiple multiple IPv6 address per interface

There are 2.7 billion available addresses

Addresses are not hierarchical and are randomly assigned

9.
Question 9
Bootstrap Protocol (BOOTP) allows a diskless workstation to be remotely booted up in a network
with TCP port designation for both client and server

1 point

True

False

10.
Question 10
In NAT operations, which of the following statements are correct (Select 3)

1 point

NAT maps each private IP address and port number into shared global IP address and available port
number

Translation table allows packets to be routed ambiguously

Hosts inside private networks generate packets with private IP address and TCP/UDP port numbers

Translation table allows packets to be routed unambiguously

Honor Code Agreement

. Graded Assessment - IP Addressing

Question 1
Packet is to be forwarded to a network with MTU of 592 bytes. The packet has an IP header of 20
bytes and a data part of 1484 bytes. Which of following maximum data length per fragment is
legitimate?

1 point

592

568
562

572

2.
Question 2
What information is used as the entry of the lookup table in a Network Address Translation box?

1 point

IP address

TCP port number

UDP port number

All of the above

3.
Question 3
IPv6 allows fragmentation at

1 point

Source only

Intermediate routers only

Both source and intermediate routers

None of the above

4.
Question 4
Which of following fields that IPv6 dropped from IPv4?
1 point

All of the above

Header checksum

ID/flags/frag offset

Header length

5.
Question 5
Which of following techniques can be used for transitioning from IPv4 to IPv6?

1 point

Network address translation

Dynamic host configuration protocol

IP tunneling

All of the above

6.
Question 6
Which fields in IP packet provide for fragmentation of datagrams to allow differing MTUs in the
internet

1 point

Fragmentation offset

Flags

Type of service
Identification

7.
Question 7
IPv6 has a much larger space of

1 point

28

216

232

2128

8.
Question 8
Which of these statements are true of IPv6 representation

1 point

A single interface may be assigned multiple IPv6 addresses of any type

Every IPv6 interface contains at least one loopback address

Leading zeros in an IPv6 16 bit hexadecimal field are mandatory

The first 64 bits represent the dynamically created interface ID.

9.
Question 9
Which of the following statement is true for DHCP

1 point

Used extensively to assign temporary IP addresses to hosts


Allows ISP to maximize usage of their limited IP addresses

Time threshold to enforce lease time

All of the above

10.
Question 10
In Network Address Translation (NAT), which of the following statement is true for a packet with an
associated private IP address at the routers in the global internet

1 point

Create an exception and then forward the packet to the destination address in the header

Discarded due to the nature of the packet address

Redirected to other routers for address confirmation

Forwarded to the destination address in the packet header

Honor Code Agreement

Graded Assessment - Transmission Control Protocol


1.
Question 1
When a TCP client initiates a three-way handshake with a sequence number x, what will be the
acknowledgement number when the TCP server replies?

1 point

x+1

x + y (where y is the sequence number proposed by TCP server)


None of the above

2.
Question 2
TCP header has a field called window size. What value is the value window size set to?

1 point

Round-trip delay

Advertised window size for congestion control

None of the above

Advertised window size for flow control

3.
Question 3
In general, there are three phases of congestion behavior, i.e., light traffic, knee, congestion
collapse. Which phase does TCP congestion avoidance maps to?

1 point

Light traffic

Knee

Congestion collapse

None of the above

4.
Question 4
When three duplicate acknowledgements arrive before timeout expires, what will TCP congestion
control algorithm reset congestion threshold to for fast re-transmission and fast recovery?

1 point
Reset congestion threshold to 1

Reset congestion threshold to half of the current congestion window size

Reset congestion threshold to the current congestion window size

None of the above

5.
Question 5
Assume a TCP source writes a 1200-byte message in one write. Which of following is possible for
the destination to receive the message?

1 point

It receives a 1200-byte message in one read

All of the above

It receives three reads of 400 bytes each

It receives two reads of 600 bytes each

6.
Question 6
The process of combining multiple outgoing protocol streams at the Transport and Network layers in
TCP/IP is called Multiplexing

1 point

True

False

7.
Question 7
TIMELY provides a framework for rate control that depends on transport layer protocol for reliability

1 point

True

False

8.
Question 8
The operation of TCP congestion control can be divided into three phases, which phase requires
that the congestion window size be increased by one segment upon receiving an ACK from receiver

1 point

Congestion avoidance

Slow start

Congestion

None of the above

9.
Question 9
In a router, the control of the transmission rate at the sender's side such that the router's buffer will
not be over-filled is called _________ if sender is transmitting too fast

1 point

Network under-utilization

Host flooding

Network congestion

None of the above


10.
Question 10
Congestion control is associated with the window size field

1 point

True

False

Honor Code Agreement

Practice Assessment - Transmission Control Protocol


1.
Question 1
Which of following control is enabled in UDP?

1 point

Flow control

Error control

Congestion control

None of the above

2.
Question 2
Which of following information is not used in UDP de-multiplexing?

1 point

Source port number

Destination IP address

Source IP address
Destination port number

3.
Question 3
TCP adopts selective repeat ARQ protocol for flow control. In TCP flow control implementation, the
window slides at

1 point

Per-packet basis

Per-byte basis

Per-bit basis

None of the above

4.
Question 4
Which flag bit in TCP header must be set when a TCP client initiates a three-way handshake?

1 point

SYN

ACK

RST

None of the above

5.
Question 5
Which flag bit in TCP header must be set when a TCP entity wants to terminate a connection?

1 point
ACK

FIN

RST

SYN

6.
Question 6
In Transmission Control Protocol (TCP), When a segment carries a combination of data and control
information, it uses a

1 point

Source Number

Port Number

Sequence Number

Slot Number

7.
Question 7
Transmission Control Protocol (TCP), has same Checksum controlling like

1 point

IP

UDP

TCP/IP
ICMP

8.
Question 8
In TCP connection management, which of the following statements are true

1 point

Select initial sequence numbers (ISN) to protect against segments from prior connections

High bandwidth connection pose a problem

Use global clock to select ISN sequence number

Time for clock to go through a full cycle should be less than the maximum lifetime of a segment

9.
Question 9
In phases of congestion behavior, when arrival rate is greater than outgoing line bandwidth

1 point

Congestion onset

Light traffic

Congestion collapse

Knee

10.
Question 10
Which of the following services are provided by UDP

1 point

IP
De-multiplexing

Error Checking

All of the above

Graded Assessment - Advanced Topics

1.
Question 1
What is the security requirement in case of Denial of Service?

1 point

Privacy

Availability

Integrity

None of the above

2.
Question 2
In a software defined network (SDN), which of the architectural layer is responsible for switch
configuration and forwarding instruction?

1 point

Middle layer

Infrastructure layer

Security layer
None of the above

3.
Question 3
What is the security requirement in case of Malicious Code?

1 point

Privacy

Availability

Integrity

All of the above

4.
Question 4
Which of the following is not a general misconception of SDN?

1 point

SDN is a mechanism

SDN is an open API for that provides standard interface for programming switches

SDN is a framework to solve a set of problems

All of the above

5.
Question 5
Which component of NFV comprises of hardware and software required to deploy, manage and
execute VNFs.

1 point

Network function
Network function modules

NFVI

None of the above

6.
Question 6
In Reverse-Path Broadcasting (RPB) scenario, assume each router knows current shortest path to
source node. Which of the following statement denotes the router's action

1 point

The router stores the packet in a buffer and wait for an explicit routing request from the source

If shortest path to source is through different port, router drops the packet

Upon receipt of a multicast packet, router records the packet's destination address and the
forwarding port

If shortest path to source is through the same port, router forwards the packet to all other ports

7.
Question 7
A peer with which a mobile node is communicating is called

1 point

Correspondent node

Foreign agent

Mobile node

Home agent
8.
Question 8
Reverse Path Multicasting (RPM) is used to increase

1 point

Efficiency

Performance

Accuracy

Strength

9.
Question 9
In Reverse Path Forwarding, router receives a packet and extracts the

1 point

Source address

Protocol address

IP address

Standard address

10.
Question 10
A network can receive a multicast packet from a particular source only through a

1 point

designated parent resolve

designated parent router


designated protocol router

None of the above

Practice Assessment - Advanced Topics


1.
Question 1
Which of following protocol allows a host to signal its multicast group membership to its attached
routers?

1 point

ICMP

IGMP

OPSF

None of the above

2.
Question 2
Which of following statements most accurately describes the reverse-path broadcasting?

1 point

It assumes that the shortest path from the source to a given router should be the same as the
shortest path from the router to the source

Each link in the network to be symmetric

Each packet is forwarded by a router exactly once

All of the above

3.
Question 3
Which class of IP address does the reverse-path broadcasting uses?

1 point

Class B

Class C

Class A

Class D

4.
Question 4
Attackers attempt to gain unauthorized access to server. What type of network security threat it
imposes?

1 point

Client imposter

Server imposter

Man-in-Middle

None of the above

5.
Question 5
In mobile IP, when a home agent wants to send a packet to a mobile host in a foreign network, each
IP packet at the home agent will be encapsulated with an outer IP header. What is the destination IP
address in the outer IP header?

1 point

Care-of address
Mobile host’s address

Home agent’s address

None of the above

6.
Question 6
An IP address associated with a mobile node while visiting a foreign link

1 point

Handover address

Home address

Care of address

Home link

7.
Question 7
TCP SYN flood attack exploits the TCP three-way handshake

1 point

True

False

8.
Question 8
In multicast communication, relationship is

1 point

one to one
many to one

one to many

one to all

Honor Code Agreement

You might also like